ppt - ISMOR

Quantitative Profiling of
Trafficking Networks;
“Rumsfeldian” Spaghetti
and the Combination of
Science and Art
Jonathan Dalley CEng MIET
Sensor Systems Group
Dstl Sensors & Countermeasures
Room 201-C, Building 005
Dstl Porton Down
Salisbury
Wiltshire SP4 0JQ
United Kingdom


Telephone : +44 (0) 1980 65 8754
Email :
[email protected]
“There are known knowns; there are things we know we know.
We also know there are known unknowns; that is to say we
know there are some things we do not know.
But there are also unknown unknowns; there are things we do
not know we don't know”
US Secretary of Defence Donald Rumsfeld 12/02/2002
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Scope
• Discuss Networks and Analysis of;
– Open
– Closed
– Partially Open
• Worked example
• Model Maturation
• Conclusions
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Introduction
• Art vs Science, Intelligence vs Analytics
– Intelligence
• Objective/qualitative analysis of information gathered by
observation, interview and intercept.
– Analytics
• Subjective/quantitative analysis based on the application of
statistical models and analysis against measured data.
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Network Science
The National Research Council defines Network Science
as "the study of network representations of physical,
biological, and social phenomena leading to predictive
models of these phenomena.“
• For the purposes of this presentation I have defined
networks as being either;
– Open
– Closed
– Partially Open
© Crown Copyright Dstl 2011
Dstl is part of the
Ministry of Defence
Open Networks (known known)
• Characterised by access available to measure
all aspects of the network
• Measurables define the network
• Examples:
– Passenger flight networks
– Postal network
– Road network
– Production line
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Closed Networks (unknown
unknown)
• Characterised by an inability to observe cause, effect or
function.
• Existence comes out of an recognition that there are
networks acting that we are not aware of.
• Logically impossible to quantify.
• Examples: N/A
© Crown Copyright Dstl 2011
Dstl is part of the
Ministry of Defence
Partially Open Networks (known
unknown)
• Characterised by observed network effect without
quantifiable knowledge of the network interactions.
• Quantified by observation of the effect/output of the
network. Often the only directly measurable aspect.
• Examples:
– Illicit trafficking of Drugs/Humans/Lethal Aid/Immigration
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Terminology
• System
– A set of interacting or interdependent components forming an
integrated whole
• Sub-System
– Sub-component of a system
• Super-System
– A system of systems
• Macro-System
– A system of super-systems
© Crown Copyright Dstl 2011
Dstl is part of the
Ministry of Defence
Worked Example, Exercise Scenario
• Cigarettes have been made illegal in London
• There is continued demand for cigarettes
– Public supplied through ad-hoc illegal road-side salesmen
– Assessed to be run by territorial gangs
• Facilitation/supply assessed to be collaborative but may
include extensive supplier network
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Observation of Cigarette Salesmen
Activity
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Wembley
City
Croydon
Identification of Gang Laydown
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Assumption Generation
• Assume uniform rate of arrest / police counter cigarette
activity
• How many stores have been interdicted?
• Where gang boundaries overlap a 50:50 distribution of
activity is assumed (initially)
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Quantities of Cigarettes by Gang
Randomly Generated Figures (Example)
Total Cigarettes Interdicted (2011), KG
90.00
80.00
70.00
60.00
50.00
40.00
30.00
20.00
10.00
0.00
Coydon
Bromley
Kingston Wembley
Barnett Woodford
Green
City
Total Cigarettes Interdicted (2011), KG
© Crown Copyright Dstl 2011
Dstl is part of the
Ministry of Defence
Identification of Gang Interactions
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
External Influence/Supply
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Definition of Points of Entry
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Definition of Gang Interactions
15%
10%
15%
Dstl is part of the
Ministry of Defence
© Crown Copyright Dstl 2012
Quantify Boundary Interactions
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Quantify Points of Entry
(Tactical/Operational Bdry)
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Quantify Gang Feed and Nodes
(Tactical Connectivity)
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
So What?
• A lack of activity is indicative of something
• Non-Operational feed network elements could be
indicative of various results:
– Rival gangs
– Separate system
– Different role (e.g. not sales orientated)
– Inactivity in Bromley indicative of:
• Northern supply focus?
• Facilitative focus?
• Highest level of flow within the network
• Largest point of entry into the network
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Quantify Operational & Strategic Connectivity
Dstl is part of the
Ministry of Defence
© Crown Copyright Dstl 2012
Maturing the Model
• The example shown is a fairly simple model
• The in the previous example, the model can be further
matured through the maturation of assumptions:
– Population Density (proxy for criminality density)
– Security force density (may influence arrest/activity rate)
• By population
• By geographic area
– Etc.
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Constraints
• Limited by
– Intelligence Understanding
– Robustness of assumption
– Common data capture
– Knowledge of whether you are correct
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Conclusions
• This approach has been developed from a tactical
perspective.
• The tactical network will be inherently “Wicked”
– Any imposed constraint/change will imply change in the network
• It has not been tested at the operational/strategic level
where it may be more stable to imposed change.
• Benefit may be observed in diverse subject networks.
• This work has been developed in isolation.
– External feedback and common experiences are appreciated.
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence
Questions
© Crown Copyright Dstl 2012
Dstl is part of the
Ministry of Defence