extremist network interdiction
DESCRIPTION
Extremist Network Interdiction. LCDR Michael Albrecht LCDR Brian Colburn LT Michael Wiederholt. Current Captured US POWs. Warren Weinstein. Caitlan Coleman. Sgt Bowe Bergdahl. Initial Problem Statement. How do we rescue our American captives? Options: Department of Defense - PowerPoint PPT PresentationTRANSCRIPT
Extremist Network Interdiction
LCDR Michael Albrecht
LCDR Brian Colburn
LT Michael Wiederholt
2
3
4
5
6
7
Current Captured US POWs
8
Warren Weinstein Caitlan Coleman
Sgt Bowe Bergdahl
Initial Problem Statement
• How do we rescue our American captives?
• Options:– Department of Defense
• Holding location is believed in the vicinity of Miramshah, Pakistan
• Intractable option due to geo-political boundaries and sensitivities
– State Department• Negotiations
• Prisoner Swap
9
Roadblock to Negotiations?
Drone Strikes
•5 Nov 2013, Hakimullah Meshud was killed by a suspected drone strike.
– Claimed to be the reason the Taliban left the peace table.
•Double-Edged Sword
– Significantly degrades the ability, and influence, of our enemies.
– Possibility of severing the ties between the Islamic Emirate and the insurgents who are directly in control of the American captives.
10
New Problem Statement
With continued drone strikes, how resilient is the terrorist network
communication?
11
Intel Center - Unclassified
12
Dirt Bag But not necessarily “terrorist”
Question: How to connect the all the dots?
Associate the connection between the Islamic Emirate to the captives
Mullah Omar
Compress Chart to Excel
13
Name id Within Connections Province strength Attackable
AnwarDangar ANW_DAN PeshawarShura KabulAttackNetwork Parwan$Kapisa 50 1
JalaluddinHaqqani JAL_HAQ HaqqaniNetwork CAPTIVES 1000 1
Dawood DA_W KabulAttackNetwork 1 1
… … … … … ..
.. … … … … .. …
The Area of Responsibility
14
Shura & Province Nodes
15
Insurgent Nodes
16
The Network
17
Shortest-Path
18
50
10
5
10
GAMS Formulation
19
Shortest Path Objective
GAMS Formulation
20
Interdiction Dual
Resilience Curve
21
Order of Attack:1. Sirajuddin Haqqani2. Taj Mir Jawad 3. Mullah Omar
Attack Results
22
Resilience Curve
23
Order of Attack:1. Ahmed Taha Khalid 2. Badruddin Haqqani 3. Jalaluddin Haqqani 4. Maulawi Sangin Zadran 5. Mohammed Nasir 6. Sirajuddin Haqqani
Omar not attacked
24
Resilience Curve
25
Order of Attack:1. Ahmed Taha Khalid 2. Eid Mohammed 3. Hamid Dullah 4. Maulawi Mohammed Ahmed 5. Maulawi Sangin Zadran 6. Sarwar Khan 7. Sirajuddin Haqqani 8. Taj Mir Jawad
Omar and Jalaluddin not attacked
26
Measure of Effectiveness
• Results list– Ahmed Taha Khalid – Eid Mohammed – Hamid Dullah – Maulawi Mohammed Ahmed – Maulawi Sangin Zadran – Sarwar Khan – Sirajuddin Haqqani – Taj Mir Jawad
27
Uses of Model
• Identify critical nodes– Sever communications between insurgent entities– Fracture any two insurgent networks
• Modify the start and end nodes
• Prevent unwanted results– Conflicting directives between agencies
• DPMO / State Department work to negotiate release
vs
• DoD strikes to degrade insurgent capabilities
28
Limitations / Follow-On Work
• The list is roughly “all or nothing”– Many multiple paths
• Does not detail the significance of any one individual– Higher fidelity influence information is required
• Run model on CLASSIFIED Network– Unknown networks or individuals?
• Other Networks other than Islamic Emirate to negotiate with Haqqani
• Unknown Networks that could influence Haqqani
• Purchase a license through Intel Center (NPS Investment)– Just need $3K-$100k no big deal
29
Resources
• Intelcenter.com– Network graph
• Gams code by Dr. Ned Dimitrov– Modified spstop.gms
• Various news articles– www.longwarjournal.com
30
Questions?
31
QUESTIONS?
COMMENTS?
32