Deploying PAWS: Field Optimization of the Protection Assistant for Wildlife Security

Poaching is a serious threat to the conservation of key species and whole ecosystems. While conducting foot patrols is the most commonly used approach in many countries to prevent poaching, such patrols often do not make the best use of limited patrolling resources. To remedy this situation, prior work introduced a novel emerging application called PAWS (Protection Assistant for Wildlife Security); PAWS was proposed as a game-theoretic ("security games") decision aid to optimize the use of patrolling resources. This paper reports on PAWS's significant evolution from a proposed decision aid to a regularly deployed application, reporting on the lessons from the first tests in Africa in Spring 2014, through its continued evolution since then, to current regular use in Southeast Asia and plans for future worldwide deployment. In this process, we have worked closely with two NGOs (Panthera and Rimba) and incorporated extensive feedback from professional patrolling teams. We outline key technical advances that lead to PAWS's regular deployment: (i) incorporating complex topographic features, e.g., ridge-lines, in generating patrol routes; (ii) handling uncertainties in species distribution (game theoretic payoffs); (iii) ensuring scalability for patrolling large-scale conservation areas with fine-grained guidance; and (iv) handling complex patrol scheduling constraints.

[1]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[2]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[3]  J. Ragle,et al.  IUCN Red List of Threatened Species , 2010 .

[4]  Eric Langmuir Mountaincraft and Leadership: A Handbook for Mountaineers and Hillwalking Leaders in the British Isles , 1984 .

[5]  Jean Clobert,et al.  The impact on tigers of poaching versus prey depletion , 2008 .

[6]  Moses Makonjio Okello,et al.  Correlates of wildlife snaring patterns in Tsavo West National Park, Kenya , 2006 .

[7]  Milind Tambe,et al.  "A Game of Thrones": When Human Behavior Models Compete in Repeated Stackelberg Security Games , 2015, AAMAS.

[8]  Rong Yang,et al.  Adaptive resource allocation for wildlife protection against illegal poachers , 2014, AAMAS.

[9]  E. Dinerstein Setting Priorities for the Conservation and Recovery of WILD TIGERS : 2005-2015 , 2006 .

[10]  Simon Thompson Unjustifiable Risk?: The Story of British Climbing , 2010 .

[11]  Amos Azaria,et al.  Analyzing the Effectiveness of Adversary Modeling in Security Games , 2013, AAAI.

[12]  Robert P. Anderson,et al.  Maximum entropy modeling of species geographic distributions , 2006 .

[13]  Ariel D. Procaccia,et al.  Strategyproof Classification with Shared Inputs , 2009, IJCAI.

[14]  Adi Botea,et al.  Near Optimal Hierarchical Path-Finding , 2004, J. Game Dev..

[15]  David G. Tarboton,et al.  On the extraction of channel networks from digital elevation data , 1991 .

[16]  E. Stokes,et al.  Improving effectiveness of protection efforts in tiger source sites: Developing a framework for law enforcement monitoring using MIST. , 2010, Integrative zoology.

[17]  Martyn Plummer,et al.  JAGS: A program for analysis of Bayesian graphical models using Gibbs sampling , 2003 .

[18]  Bo An,et al.  Regret-Based Optimization and Preference Elicitation for Stackelberg Security Games with Uncertainty , 2014, AAAI.

[19]  Noa Agmon,et al.  Making the Most of Our Regrets: Regret-Based Solutions to Handle Payoff Uncertainty and Elicitation in Green Security Games , 2015, GameSec.

[20]  Vincent Conitzer,et al.  Complexity of Computing Optimal Stackelberg Strategies in Security Resource Allocation Games , 2010, AAAI.

[21]  Milind Tambe,et al.  Optimal patrol strategy for protecting moving targets with multiple mobile resources , 2013, AAMAS.

[22]  Milind Tambe,et al.  When Security Games Go Green: Designing Defender Strategies to Prevent Poaching and Illegal Fishing , 2015, IJCAI.

[23]  Rong Yang,et al.  Scaling-up Security Games with Boundedly Rational Adversaries: A Cutting-plane Approach , 2013, IJCAI.

[24]  T. Tsiligirides,et al.  Heuristic Methods Applied to Orienteering , 1984 .

[25]  W. Tobler,et al.  Three Presentations on Geographical Analysis and Modeling: Non- Isotropic Geographic Modeling; Speculations on the Geometry of Geography; and Global Spatial Analysis (93-1) , 1993 .

[26]  Dirk Van Oudheusden,et al.  The orienteering problem: A survey , 2011, Eur. J. Oper. Res..

[27]  W. Tobler,et al.  THREE PRESENTATIONS ON GEOGRAPHICAL ANALYSIS AND MODELING , 1993 .

[28]  A. Lemieux Situational prevention of poaching , 2014 .

[29]  Peter Leimgruber,et al.  Setting priorities for conservation and recovery of wild tigers: 2005-2015. The technical assessment , 2010 .