Game Theory Sparks Terrorism Risk Modeling

There isn’t enough historical data to help companies keep pace with intelligent adversaries.

While many terrorist plots are still being developed, “the vast majority are interdicted through the diligence of western intelligence and law enforcement agencies. Mass surveillance of communication links, and the intrusion of intelligence moles, elevate[s] the likelihood of plot interdiction with plot size,” Woo said.

The reasoning is that the larger the terrorist cell, the more likely it is that information will leak out about it to the authorities. RMS estimates that a plot involving as many as 10 would-be terrorists has only a 5 percent chance of not being caught. “With the intensive global surveillance conducted today by Western intelligence agencies, a plot involving as many as 19 hijackers or bombers would have only a minimal chance of eluding their attention,” Woo testified.

But if the balance of power has shifted to counter-terrorism, the chances are good that terrorists will adjust to that, too. To model the risk under current circumstances and be able predict the likelihood of attacks, government and private-sector analysts are increasingly relying on computer simulations and games, according to Barry Ezell, an associate professor of research at the Virginia Modeling, Analysis and Simulation Center at Old Dominion University.

To explain how such a game-theory application might work, Ezell supplies the example of running a seaport. Such an operation could have many activities running simultaneously: ships, trains and other modes of transport arriving, unloading and loading cargo, and departing.

“You can create that environment in a simulated world,” Ezell says, noting that data generated for all those different activities can be used to simulate the operations of the port. “And then you can inject the effects of different terrorism scenarios into that simulation, and look at the consequences to your port operations.”

At that point, the game player (perhaps in the guise of a “blue team” playing against a terrorist “red team”) can introduce various security measures aimed at averting terrorism. Then the player would rerun the scenarios to see how each security measure “drives down the consequences” of the terrorist plot, according to Ezell.

By playing such games, he adds, “you can discover some black swan events that you would have never learned using other approaches.”

4 thoughts on “Game Theory Sparks Terrorism Risk Modeling

  1. Very insightful and I will certainly post forward. We face risk everyday of our lives and perhaps by human nature spend much of each day trying not the thing about it… Good strategy for a single person, not so good for organizations, who surprise me with an ‘isn’t this an insurance matter’ attitude.

    It is about analysis, review, process and procedure… and then some.

    • It sounds like the editors had a bare spot to fill when they used this article. Here in the DC metro area, “game theory” has not been referenced since … um… college days for most of us. Check out both Google (west coast) and InQtel / DARPA award lists (East Coast, Arlington VA) for the latest developments in predictive modeling. Or NIST / Germany collaborative efforts. Game theory algorithms long ago gave way to a new genre of real -time prediction, much of which will utilize technology reflected in early stages of squid and related R&D, (see NIST 2012), and incorporate physical elements such as ambient noise monitoring and other pervasive capture methodologies.

      But the real danger to corporations worldwide, is not terrorism – which per US Dept of State’s latest tallies, kills on average 150 – 250 persons worldwide, each year, 2001 being an exception – but executive kidnap, family kidnap, and crime. Drug cartels and syndicated crimes kill far more each year, than the 911 flights combined. And kidnap or threats to family members are much more likely to impact a corporate executive or senior manager, than is terrorism.

      Our own company continues to search diligently, and to support the ongoing and heartbreaking search, for our CEO’s kidnapped child, violently abducted at age 8, from very near CIA HQ in Mclean VA, following extortion threats and demands referencing his mother’s alleged CIA affiliation and White House recognition for Sept. 11 intelligence actions. Evan Carpenter remains missing, and even the US Pentagon, opening its own inquiry into Evan’s disappearance earlier this year, has found no sign of this child. Child or family member kidnap – for extortion or retaliation – remains the most common threat worldwide, facing corporations or government or law enforcement individuals; followed by drug or crime cartel killings. Witnesses to Evan’s kidnap could not stop crying, hysterically. And this was because his mother’s involvement and recognition for efforts in public safety, were not kept confidential. Wherever there is a lot of money or influence involved, there will be a lot of risk.
      This is a significant point for people to remember, because it is a very different motivation, from terrorism. And requires an entirely different mindset to address. And yet, this motive – greed, and its adjacent motive of coercion (desire to compel or prevent a certain action, whether testimony, or providing information, etc) – poses a much greater threat to corporate or government execs than terrorism. And to families.

      Evan is the first child to be hurt – possibly murdered – on US soil because of a parent’s intelligence affiliation or role, in US history. And he was only 8.

  2. Science has moved much farther ahead than this article would indicate. In fact there exists a new science based on probability (versus predictive modeling) that already does and surpasses what is being discussed in this article. It is a scientific breakthrough that was patented by USPTO in January 2012. See USPTO, Complexity Systems Management Method, Patent No.: US 8,103,601 B2. The research behind this patent received the Navigator Award from the Potomac Institute (with ties to DARPA and the IC) way back in 2004. It is always a good idea to have a patent watch or other search mechanism for new technologies before writing articles like these. Otherwise you risk looking a bit silly to real scientists who believe in real research before they write a paper.

  3. In the current environment where companies operate on global foot print the tentacles of terrorism extents beyond the company to the dealers and supplier bases. With lack of data and a robust model to predict the impact,it has become difficult to manage on a global platform.


Your email address will not be published. Required fields are marked *