Optimal Defensive Allocations in the Face of Uncertain Terrorist Preferences, with an Emphasis on Transportation
Chen Wang,Vicki M. Bier
2012-01-01
Abstract:INTRODUCTIONAllocating a limited budget to protect potential targets against terrorist attackers is an important but difficult task. In doing so, we must take into account both the strategic nature of the attackers, and also the defender's uncertain knowledge about attacker preferences. A variety of game-theoretic models in the face of defender uncertainty have been studied and applied.1This study is based on the sequential game with incomplete information developed by Bier et al.2 In that model, the defender moves first to allocate her defensive resources among the potential targets under uncertain knowledge about attacker preferences; the attacker then selects the target with the highest payoff to attack, in light of any defensive investments.3 Knowing or assuming that the attacker would play his best response to any given defensive allocation, the defender wishes to choose her allocation so as to effectively protect against attacks, deter attacks, or deflect attacks to less important targets. However, with uncertainty about the attacker's utility function, the defender cannot predict the attacker's best response for sure; therefore, the defender is assumed to minimize her expected total loss (where the defender objectives may in general be different from the attacker objectives).This paper extends the above game-theoretic model for determining optimal defensive resource allocations to the case of more realistic multi-attribute terrorist objective functions. In particular, we compare the optimal defensive resource allocations in the face of uncertain terrorist preferences with and without transportation-related attributes. The defender's uncertainty about terrorist preferences is represented both by probability distributions over the attacker's attribute weights, and by allowing for attributes that are important to the attacker but not known to the defender.One closely related task is to elicit the attacker attribute weights in the terrorist multi-attribute objective from the judgments of intelligence experts. However, direct estimation of attribute weights can be difficult, since intelligence analysts are usually not familiar with utility theory, and historical data about terrorist attacks are relatively sparse. In such cases, indirect elicitation may be preferable. In particular, this paper uses an approach in which experts are asked to give (partial) rank orderings of attack strategies or targets, and the attribute weights in the attacker objective function are then inferred from those partial rankings using probabilistic inversion.4 We believe that this approach will increase the acceptance of quantitative methods by intelligence experts, and also make it possible to elicit the opinions of a large number of experts in an automated (e.g., online) manner.ModelAs in Wang and Bier, 5 we assume that the defender's objective is to minimize the total expected loss, as given bywhere:* n = number of targets* ci= defender's resource allocation to target i* B = defender's total budget* vi = defender's valuation of target i* hi(c1,...,cn) = probability of an attack on target i* p(ci) = = success probability of an attack on target i, as a function of the budget allocated to target i, where ? is the cost effectiveness of defensive investment.6The attacker is then assumed to observe the defender's resource allocations ci and then choose the target with the highest payoff in light of any defensive investment:p(ci)Uiwhere:* Ui = uj(Aij)xj + eixm = attacker's utility of target i* xj= attacker weight on attribute j(xj ? 0, j=1, ... , m, and =1)* Aij = attacker rating of target i on attribute j(j=1, ... , m - 1)* uj= single-attribute utility function for attribute , taking on values in [0, 1].* ? …