Timely exposure of a secret project: Which activities to monitor?

A defender wants to detect as quickly as possible whether some attacker is secretly conducting a project that could harm the defender. Security services, for example, need to expose a terrorist plot in time to prevent it. The attacker, in turn, schedules his activities so as to remain undiscovered as long as possible. One pressing question for the defender is: which of the project's activities to focus intelligence efforts on? We model the situation as a zero‐sum game, establish that a late‐start schedule defines a dominant attacker strategy, and describe a dynamic program that yields a Nash equilibrium for the zero‐sum game. Through an innovative use of cooperative game theory, we measure the harm reduction thanks to each activity's intelligence effort, obtain insight into what makes intelligence effort more effective, and show how to identify opportunities for further harm reduction. We use a detailed example of a nuclear weapons development project to demonstrate how a careful trade‐off between time and ease of detection can reduce the harm significantly.

[1]  Edward H. Kaplan,et al.  Terror Queues , 2010, Oper. Res..

[2]  Lawrence M. Wein,et al.  An Overlapping Networks Approach to Resource Allocation for Domestic Counterterrorism , 2010 .

[3]  Kevin D. Glazebrook,et al.  Optimal patrol to uncover threats in time when detection is imperfect , 2014 .

[4]  Edward H. Kaplan,et al.  Estimating the Duration of Jihadi Terror Plots in the United States , 2012 .

[5]  Moshe Kress,et al.  Finding the needles in the haystack: efficient intelligence processing , 2016, J. Oper. Res. Soc..

[6]  Gregory A. Godfrey,et al.  Likelihood-based optimization of threat operation timeline estimation , 2009, 2009 12th International Conference on Information Fusion.

[7]  Edieal J. Pinker,et al.  Public Warnings in Counterterrorism Operations: Managing the "Cry-Wolf" Effect When Facing a Strategic Adversary , 2018, Oper. Res..

[8]  Edieal J. Pinker,et al.  Technical Note - Managing a Secret Project , 2013, Oper. Res..

[9]  Edieal J. Pinker,et al.  On the complexity of project scheduling to minimize exposed time , 2014, Eur. J. Oper. Res..

[10]  John Cunningham,et al.  A Bayesian, Nonlinear Particle Filtering Approach for Tracking the State of Terrorist Operations , 2007, 2007 IEEE Intelligence and Security Informatics.

[11]  Gerald G. Brown,et al.  Anatomy of a Project to Produce a First Nuclear Weapon , 2006 .

[12]  Kenneth L. Lasoen War of Nerves: The Domestic Terror Threat and the Belgian Army , 2018 .

[13]  Bernhard von Stengel,et al.  Recursive Inspection Games , 2014, Math. Oper. Res..

[14]  Johannes O. Royset,et al.  On the Complexity of Delaying an Adversary’s Project , 2005 .

[15]  L. S. Shapley,et al.  17. A Value for n-Person Games , 1953 .

[16]  Roberto Szechtman,et al.  Scheduling policies for an antiterrorist surveillance system , 2009 .

[17]  Pradeep Dubey,et al.  Value Theory Without Efficiency , 1981, Math. Oper. Res..

[18]  Daniel Kuhn,et al.  Interdiction Games on Markovian PERT Networks , 2015, Manag. Sci..

[19]  John N. Tsitsiklis,et al.  Delay-Predictability Trade-offs in Reaching a Secret Goal , 2018, Oper. Res..

[20]  M. Townsley,et al.  Crime Script Analysis of Drug Manufacturing In Clandestine Laboratories Implications for Prevention , 2011 .

[21]  Moshe Kress,et al.  When Is Information Sufficient for Action? Search with Unreliable yet Informative Intelligence , 2016, Oper. Res..

[22]  James E. Kelley,et al.  Critical-Path Planning and Scheduling: Mathematical Basis , 1961 .

[23]  Gerald G. Brown,et al.  Interdicting a Nuclear-Weapons Project , 2009, Oper. Res..

[24]  Rudolf Avenhaus,et al.  Playing for time: A sequential inspection game , 2005, Eur. J. Oper. Res..

[25]  Moshe Kress,et al.  Models of sensor operations for border surveillance , 2008 .

[26]  Jerry S. Kelly,et al.  NP-completeness of some problems concerning voting games , 1990 .

[27]  R. Kemp Environmental Detection of Clandestine Nuclear Weapon Programs , 2016 .

[28]  Steve Alpern,et al.  Mining Coal or Finding Terrorists: The Expanding Search Paradigm , 2013, Oper. Res..

[29]  D. Leech An Empirical Comparison of the Performance of Classical Power Indices , 2002 .

[30]  Edward H. Kaplan,et al.  OR Forum - Intelligence Operations Research: The 2010 Philip McCord Morse Lecture , 2012, Oper. Res..

[31]  Edieal J. Pinker An Analysis of Short-Term Responses to Threats of Terrorism , 2007, Manag. Sci..

[32]  Steve Alpern,et al.  Patrolling a Border , 2016, Oper. Res..