Optimal employment of port radar and picket ships to detect attacker speedboats a defender-attacker optimization model to enhance maritime domain awareness
Abdul-Ghaffar, Ahmad M.
Brown, Gerald G.
Kline, Jeffrey E.
MetadataShow full item record
The U.S. Coast Guard has deployed several hundred port patrol vessels to protect U.S. Navy ships and other high-value assets in ports world-wide. Each vessel has an armed crew of four, is relatively fast, and features a simple surface search radar, radios, and a machine gun. These vessels coordinate surveillance patrols in groups of two or four, perhaps working with shorebased radar. We seek to advantageously position these vessels, and perhaps shore-based radar too, to minimize the probability that an intelligent adversary in one or more speed-boats will evade detection while mounting an attack. Attackers can use elevated obstructions to our radar detection in their attack paths, and ports feature many such restrictions to navigation and observation. We make a key, but realistic assumption that complicates planning: we assume the attackers will see or be told of our defensive positions and capabilities in advance of mounting their attack. We demonstrate our defender-attacker optimization with a fictitious port, and with Los Angeles-Long Beach, Hong Kong, U.S. Navy 5-th Fleet in Bahrain, and the Al Basra oil terminal. In cases we analyze, we can almost certainly detect any attack, even though the attacker, observing our pre-positions, plans clever, evasive attack tracks.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, is not copyrighted in the U.S.
Showing items related by title, author, creator and subject.
Lack, Lindsey A. (Monterey, California. Naval Postgraduate School, 2003);The attack of choice for a professional attacker is system subversion: the insertion of a trap door that allows the attacker to bypass an operating system's protection controls. This attack provides significant capabilities ...
Petrakos, Nikolaos (Monterey, California. Naval Postgraduate School, 2009);In this study, we investigated an algebraic-type attack, known as the cube attack, against wireless networks. We implemented the cube attack in a wireless system, namely Bluetooth. We formally modeled the encryption function ...
Ausdemore, Steven E. (Monterey, California: Naval Postgraduate School, 2015);The Newtown Connecticut school attack at the Sandy Hook elementary school on December 14, 2012, was another example of the tragedy of mass murder. When a targeted attack occurs, the victims must await the arrival of law ...