Optimal employment of port radar and picket ships to detect attacker speedboats a defender-attacker optimization model to enhance maritime domain awareness

Download
Author
Abdul-Ghaffar, Ahmad M.
Date
2008-06Advisor
Brown, Gerald G.
Second Reader
Kline, Jeffrey E.
Metadata
Show full item recordAbstract
The U.S. Coast Guard has deployed several hundred port patrol vessels to protect U.S. Navy ships and other high-value assets in ports world-wide. Each vessel has an armed crew of four, is relatively fast, and features a simple surface search radar, radios, and a machine gun. These vessels coordinate surveillance patrols in groups of two or four, perhaps working with shorebased radar. We seek to advantageously position these vessels, and perhaps shore-based radar too, to minimize the probability that an intelligent adversary in one or more speed-boats will evade detection while mounting an attack. Attackers can use elevated obstructions to our radar detection in their attack paths, and ports feature many such restrictions to navigation and observation. We make a key, but realistic assumption that complicates planning: we assume the attackers will see or be told of our defensive positions and capabilities in advance of mounting their attack. We demonstrate our defender-attacker optimization with a fictitious port, and with Los Angeles-Long Beach, Hong Kong, U.S. Navy 5-th Fleet in Bahrain, and the Al Basra oil terminal. In cases we analyze, we can almost certainly detect any attack, even though the attacker, observing our pre-positions, plans clever, evasive attack tracks.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, is not copyrighted in the U.S.Related items
Showing items related by title, author, creator and subject.
-
Using the bootstrap concept to build an adaptable and compact subversion artifice
Lack, Lindsey A. (Monterey, California. Naval Postgraduate School, 2003-06);The attack of choice for a professional attacker is system subversion: the insertion of a trap door that allows the attacker to bypass an operating system's protection controls. This attack provides significant capabilities ... -
Cube-type algebraic attacks on wireless encryption protocols
Petrakos, Nikolaos (Monterey, California. Naval Postgraduate School, 2009-09);In this study, we investigated an algebraic-type attack, known as the cube attack, against wireless networks. We implemented the cube attack in a wireless system, namely Bluetooth. We formally modeled the encryption function ... -
Eliminating the lost time interval of law enforcement to active shooter events in schools
Ausdemore, Steven E. (Monterey, California: Naval Postgraduate School, 2015-09);The Newtown Connecticut school attack at the Sandy Hook elementary school on December 14, 2012, was another example of the tragedy of mass murder. When a targeted attack occurs, the victims must await the arrival of law ...