Adaptive resource allocation for wildlife protection against illegal poachers

Illegal poaching is an international problem that leads to the extinction of species and the destruction of ecosystems. As evidenced by dangerously dwindling populations of endangered species, existing anti-poaching mechanisms are insufficient. This paper introduces the Protection Assistant for Wildlife Security (PAWS) application - a joint deployment effort done with researchers at Uganda's Queen Elizabeth National Park (QENP) with the goal of improving wildlife ranger patrols. While previous works have deployed applications with a game-theoretic approach (specifically Stackelberg Games) for counter-terrorism, wildlife crime is an important domain that promotes a wide range of new deployments. Additionally, this domain presents new research challenges and opportunities related to learning behavioral models from collected poaching data. In addressing these challenges, our first contribution is a behavioral model extension that captures the heterogeneity of poachers' decision making processes. Second, we provide a novel framework, PAWS-Learn, that incrementally improves the behavioral model of the poacher population with more data. Third, we develop a new algorithm, PAWS-Adapt, that adaptively improves the resource allocation strategy against the learned model of poachers. Fourth, we demonstrate PAWS's potential effectiveness when applied to patrols in QENP, where PAWS will be deployed.

[1]  W. A. Wagenaar Generation of random sequences by human subjects: A critical survey of literature. , 1972 .

[2]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[3]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[4]  Edward Opiyo Ouko Where , when and why are there elephant poaching hotspots in Kenya ? , 2013 .

[5]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[6]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[7]  Vincent Conitzer Computing Game-Theoretic Solutions and Applications to Security , 2012, AAAI.

[8]  Moses Makonjio Okello,et al.  Correlates of wildlife snaring patterns in Tsavo West National Park, Kenya , 2006 .

[9]  William D. Moreto To conserve and protect: examining law enforcement ranger culture and operations in Queen Elizabeth National Park, Uganda , 2013 .

[10]  Ya'akov Gal,et al.  Learning Social Preferences in Games , 2004, AAAI.

[11]  Milind Tambe,et al.  Online planning for optimal protector strategies in resource conservation games , 2014, AAMAS.

[12]  Gerald Tesauro,et al.  Playing repeated Stackelberg games with unknown opponents , 2012, AAMAS.

[13]  E. Stokes,et al.  Improving effectiveness of protection efforts in tiger source sites: Developing a framework for law enforcement monitoring using MIST. , 2010, Integrative zoology.

[14]  Vincent Conitzer,et al.  Learning and Approximating the Optimal Strategy to Commit To , 2009, SAGT.

[15]  Rong Yang,et al.  A robust approach to addressing human adversaries in security games , 2012, AAMAS.

[16]  Tomas Holmern,et al.  Local law enforcement and illegal bushmeat hunting outside the Serengeti National Park, Tanzania , 2007, Environmental Conservation.

[17]  S. Pires,et al.  The illegal parrot trade in the neo-tropics: The relationship between poaching and illicit pet markets , 2012 .

[18]  Sarit Kraus,et al.  Facing the challenge of human-agent negotiations via effective general opponent modeling , 2009, AAMAS.