extremist network interdiction

32
Extremist Network Interdiction LCDR Michael Albrecht LCDR Brian Colburn LT Michael Wiederholt

Upload: rolando-alban

Post on 30-Dec-2015

87 views

Category:

Documents


0 download

DESCRIPTION

Extremist Network Interdiction. LCDR Michael Albrecht LCDR Brian Colburn LT Michael Wiederholt. Current Captured US POWs. Warren Weinstein. Caitlan Coleman. Sgt Bowe Bergdahl. Initial Problem Statement. How do we rescue our American captives? Options: Department of Defense - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Extremist Network Interdiction

Extremist Network Interdiction

LCDR Michael Albrecht

LCDR Brian Colburn

LT Michael Wiederholt

Page 2: Extremist Network Interdiction

2

Page 3: Extremist Network Interdiction

3

Page 4: Extremist Network Interdiction

4

Page 5: Extremist Network Interdiction

5

Page 6: Extremist Network Interdiction

6

Page 7: Extremist Network Interdiction

7

Page 8: Extremist Network Interdiction

Current Captured US POWs

8

Warren Weinstein Caitlan Coleman

Sgt Bowe Bergdahl

Page 9: Extremist Network Interdiction

Initial Problem Statement

• How do we rescue our American captives?

• Options:– Department of Defense

• Holding location is believed in the vicinity of Miramshah, Pakistan

• Intractable option due to geo-political boundaries and sensitivities

– State Department• Negotiations

• Prisoner Swap

9

Page 10: Extremist Network Interdiction

Roadblock to Negotiations?

Drone Strikes

•5 Nov 2013, Hakimullah Meshud was killed by a suspected drone strike.

– Claimed to be the reason the Taliban left the peace table.

•Double-Edged Sword

– Significantly degrades the ability, and influence, of our enemies.

– Possibility of severing the ties between the Islamic Emirate and the insurgents who are directly in control of the American captives.

10

Page 11: Extremist Network Interdiction

New Problem Statement

With continued drone strikes, how resilient is the terrorist network

communication?

11

Page 12: Extremist Network Interdiction

Intel Center - Unclassified

12

Dirt Bag But not necessarily “terrorist”

Question: How to connect the all the dots?

Associate the connection between the Islamic Emirate to the captives

Mullah Omar

Page 13: Extremist Network Interdiction

Compress Chart to Excel

13

Name id Within Connections Province strength Attackable

AnwarDangar ANW_DAN PeshawarShura KabulAttackNetwork Parwan$Kapisa 50 1

JalaluddinHaqqani JAL_HAQ HaqqaniNetwork CAPTIVES 1000 1

Dawood DA_W KabulAttackNetwork 1 1

… … … … … ..

.. … … … … .. …

Page 14: Extremist Network Interdiction

The Area of Responsibility

14

Page 15: Extremist Network Interdiction

Shura & Province Nodes

15

Page 16: Extremist Network Interdiction

Insurgent Nodes

16

Page 17: Extremist Network Interdiction

The Network

17

Page 18: Extremist Network Interdiction

Shortest-Path

18

50

10

5

10

Page 19: Extremist Network Interdiction

GAMS Formulation

19

Shortest Path Objective

Page 20: Extremist Network Interdiction

GAMS Formulation

20

Interdiction Dual

Page 21: Extremist Network Interdiction

Resilience Curve

21

Order of Attack:1. Sirajuddin Haqqani2. Taj Mir Jawad 3. Mullah Omar

Page 22: Extremist Network Interdiction

Attack Results

22

Page 23: Extremist Network Interdiction

Resilience Curve

23

Order of Attack:1. Ahmed Taha Khalid 2. Badruddin Haqqani 3. Jalaluddin Haqqani 4. Maulawi Sangin Zadran 5. Mohammed Nasir 6. Sirajuddin Haqqani

Page 24: Extremist Network Interdiction

Omar not attacked

24

Page 25: Extremist Network Interdiction

Resilience Curve

25

Order of Attack:1. Ahmed Taha Khalid 2. Eid Mohammed 3. Hamid Dullah 4. Maulawi Mohammed Ahmed 5. Maulawi Sangin Zadran 6. Sarwar Khan 7. Sirajuddin Haqqani 8. Taj Mir Jawad

Page 26: Extremist Network Interdiction

Omar and Jalaluddin not attacked

26

Page 27: Extremist Network Interdiction

Measure of Effectiveness

• Results list– Ahmed Taha Khalid – Eid Mohammed – Hamid Dullah – Maulawi Mohammed Ahmed – Maulawi Sangin Zadran – Sarwar Khan – Sirajuddin Haqqani – Taj Mir Jawad

27

Page 28: Extremist Network Interdiction

Uses of Model

• Identify critical nodes– Sever communications between insurgent entities– Fracture any two insurgent networks

• Modify the start and end nodes

• Prevent unwanted results– Conflicting directives between agencies

• DPMO / State Department work to negotiate release

vs

• DoD strikes to degrade insurgent capabilities

28

Page 29: Extremist Network Interdiction

Limitations / Follow-On Work

• The list is roughly “all or nothing”– Many multiple paths

• Does not detail the significance of any one individual– Higher fidelity influence information is required

• Run model on CLASSIFIED Network– Unknown networks or individuals?

• Other Networks other than Islamic Emirate to negotiate with Haqqani

• Unknown Networks that could influence Haqqani

• Purchase a license through Intel Center (NPS Investment)– Just need $3K-$100k no big deal

29

Page 30: Extremist Network Interdiction

Resources

• Intelcenter.com– Network graph

• Gams code by Dr. Ned Dimitrov– Modified spstop.gms

• Various news articles– www.longwarjournal.com

30

Page 31: Extremist Network Interdiction

Questions?

31

Page 32: Extremist Network Interdiction

QUESTIONS?

COMMENTS?

32