+ All Categories
Home > Documents > Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Date post: 20-Jan-2016
Category:
Upload: mervin-casey
View: 219 times
Download: 0 times
Share this document with a friend
Popular Tags:
15
S 3 T 2 T 1 I 3 S 1 S 2 D 2 D 1 I 1 2 I
Transcript
Page 1: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

S3

T2

T1

I3

S1

S2

D2

D1

I1

2I

Page 2: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

New Horizons in Search Theory 4th Workshop

INVESTIGATING ‘HIDER THEORY’

©2004 Alidade Incorporated. All Rights Reserved

Page 3: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

Agenda

• Introduction• Previous Workshops• Abstract and Charge• Schedule

Page 4: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

Introduction

• Newport Center for Information Age Warfare Sciences

• Santa Fe Institute/BiosGroup, Inc.• Premise for Workshop Series

– Search Theory, as understood by military researchers, had not fundamentally changed in many decades, although the platforms and operational concepts were under extraordinary transformation

Page 5: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

New Horizons in Search Theory:From Abstraction to Application

   

 May 21-23, 2001

Newport, Rhode Island

S3

T2

T1

I3

S1

S2

D2

D1

I1

2I

ALIDADECONSULTING

NEWPORT CENTER FOR INFORMATION AGE WARFARE STUDIES

Page 6: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

2001: From Abstraction to Application

• Focus:– Bring the combinatoric optimization

crowd and military search theorists together to see if they had anything in common

• Stu Kauffman, Jose Lobo, Bill MacReady

• Wayne Hughes, Brian McCue, Don DelBalzo

• Colloquium– Is Search Still Relevant?

Page 7: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

S3

T2

T1

I3

S1

S2

D2

D1

I1

2I

New Horizons in Search Theory 2nd International Workshop 

“Search Theory, Invented Now”

NEWPORT CENTER FOR INFORMATION AGE WARFARE STUDIES

Page 8: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

2002: Search Theory, Invented Now

• Focus:– Examine the changes in operational

concepts, mathematical tools and platform technologies to see if we would invent the same Search Theory now as we did then

• Josh Epstein, Fred Glover, Rob Axtell• Brian McCue, Ralph Klingbeil, Ray Hill• Colloquium

– Search Theory, Invented Now– Agent-based modeling approaches

Page 9: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

New Horizons in Search Theory, 3nd Workshop

 “NETWORKED SEARCHES AND SEARCHES IN NETWORKS”

 

ALIDADEINCORPORATED

NEWPORT CENTER FOR INFORMATION AGE WARFARE STUDIES

Page 10: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

2003: Networked Searches, Searches in Networks

• Focus:– Examine aspects of search using networks

as well as aspects of search for information within networks.

• Dave Davis, Peter Dodd

• Brian McCue, Ray Christian, Ray Hill

• Colloquium– Search with Networks

Page 11: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

2004: Investigating Hider Theory

• A ballistic missile submarine (SSBN) that does not want to be detected while on deterrence patrol

• A downed pilot in enemy-controlled territory who does not want to be found by the enemy but does want to be rescued

• An embezzler who does not want to be discovered for a long time

• An in-country terrorist waiting for orders or opportunity to strike within some time duration

• An encrypted electronic message that is perhaps buried within a benign or noise transmission

• A pollution event; hide who did it and perhaps blame someone else

“Hider Theory” should shed light on what these examples have in common and what makes them different.

Page 12: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

AgendaDay 1

• Morning Session– Welcome and Introduction: Jeff Cares– An Exploration of Zig-zagging, Brian McCue– Investigating Terrorist and Smuggling Games,

Jim Taylor– Intro to Hider Theory, Ralph Klingbeil

• Lunch• Afternoon Session

– An Operational Perspective of Smuggling Tactics, CAPT Ivan Luke, USCG

– An Operational Perspective of Submarine Evasion Operations, CDR Dale Sykora,USN

– Breakout groups

Page 13: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

AgendaDay 2

• Morning Session– Breakout

• Lunch• Afternoon Session

– Breakout– Report

Page 14: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

Remember

•Time is built into the schedule to ask and answer questions

•Workshops should work!

Page 15: Investigating Hider Theory ©2004 Alidade Incorporated. All Rights Reserved.

Investigating Hider Theory

©2004 Alidade Incorporated. All Rights Reserved

Alidade Services


Recommended