[go: up one dir, main page]

Academia.eduAcademia.edu

Backgrounds

1996

We describe JOINT DEFENDER, a new two-sided optimization model for planning the pre-positioning of defensive missile interceptors to counter an attack threat. In our basic model, a defender pre-positions ballistic missile defense platforms to minimize the worst-case damage an attacker can achieve; we assume that the attacker will be aware of defensive pre-positioning decisions, and that both sides have complete information as to target values, attacking-missile launch sites, weapon system capabilities, etc. Other model variants investigate the value of secrecy by restricting the attacker’s and/or defender’s access to information. For a realistic scenario, we can evaluate a completely transparent exchange in a few minutes on a laptop computer, and can plan near-optimal secret defenses in seconds. JOINT DEFENDER’s mathematical foundation and its computational efficiency complement current missile-defense planning tools that use heuristics or supercomputing. The model can also provide ...

OPERATIONS RESEARCH informs Vol. 53, No. 5, September–October 2005, pp. 745–763 issn 0030-364X  eissn 1526-5463  05  5305  0745 ® doi 10.1287/opre.1050.0231 © 2005 INFORMS OR PRACTICE A Two-Sided Optimization for Theater Ballistic Missile Defense Gerald Brown, Matthew Carlyle, Douglas Diehl, Jeffrey Kline, Kevin Wood Operations Research Department, Naval Postgraduate School, Monterey, California 93943 {gbrown@nps.edu, mcarlyle@nps.edu, ddiehl@nps.edu, jekline@nps.edu, kwood@nps.edu} We describe JOINT DEFENDER, a new two-sided optimization model for planning the pre-positioning of defensive missile interceptors to counter an attack threat. In our basic model, a defender pre-positions ballistic missile defense platforms to minimize the worst-case damage an attacker can achieve; we assume that the attacker will be aware of defensive pre-positioning decisions, and that both sides have complete information as to target values, attacking-missile launch sites, weapon system capabilities, etc. Other model variants investigate the value of secrecy by restricting the attacker’s and/or defender’s access to information. For a realistic scenario, we can evaluate a completely transparent exchange in a few minutes on a laptop computer, and can plan near-optimal secret defenses in seconds. JOINT DEFENDER’s mathematical foundation and its computational efficiency complement current missile-defense planning tools that use heuristics or supercomputing. The model can also provide unique insight into the value of secrecy and deception to either side. We demonstrate with two hypothetical North Korean scenarios. Subject classifications: missile defense; optimization; bilevel integer linear program; mixed-integer linear program. Area of review: OR Practice. History: Received June 2004; revision received September 2004; accepted March 2005. production facilities and prepared launch sites. Figure 2 depicts some of those launch sites and the areas they threaten. North Korea is developing longer-range intercontinental ballistic missiles (e.g., the Taep’o-Dong II) that will be capable of striking the western coast of the United States and Alaska (CIA 2001). Given that North Korea also claims to have developed fission weapons, it is vital that we understand how to best deploy (i.e., pre-position) interceptor platforms to defend against TBM attacks from that country. In response to such threats, this paper develops JOINT DEFENDER, a bilevel integer linear program for prepositioning theater ballistic missile defense (TBMD) assets, and demonstrates how to analyze scenarios using two hypothetical Korean examples. Before developing this new model, we first describe the interceptor platforms that have been fielded or are under development, and review the analytical tools currently used to plan deployment of these platforms. They may vex us with shot, or with assault. To intercept this inconvenience, a piece of ordnance ‘gainst it I have placed. Shakespeare, Henry IV 1. Theater Ballistic Missile Defense: Background This paper introduces JOINT DEFENDER, a new, bilevel (i.e., two-sided) optimization model to help plan the prepositioning of the defensive interceptor platforms that the United States and its allies are deploying to counter exigent theater ballistic missile threats. Solutions require only a few seconds or minutes on a personal computer and can yield important new insights. 1.1. The Theater Ballistic Missile Threat Theater ballistic missiles (TBMs) can deliver highexplosive, chemical, biological, or nuclear warheads over long distances. Although no potential adversary other than Russia possesses TBMs capable of striking the United States, both China and North Korea are developing missiles that will likely have that capability by 2015 (CIA 2001). Existing short-range and medium-range TBMs pose immediate threats in many regional conflicts, however, as demonstrated in the first and second Gulf wars. Figure 1 illustrates some TBMs that currently concern military planners. North Korea is particularly worrisome. It is known to be developing and exporting ballistic missiles and missile technology, and has numerous indigenous missile- 1.2. TBM Interceptor Platforms Figure 3 shows three components of the United States joint missile defense, which we will use as representative defensive platforms. The Army’s PATRIOT anti-missile missile system is currently deployed and has been used in Operation Iraqi Freedom. PATRIOT provides terminal defense against ballistic missiles, cruise missiles, and aircraft. It consists of 745 Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 746 Figure 1. Operations Research 53(5), pp. 745–763, © 2005 INFORMS Current ballistic missile threats. Shown left to right are a North Korean Scud-B transporter-erector-launcher (TEL), a TEL firing a missile, and an Iranian fixed ballistic missile launcher. a mobile launcher, a phased-array air search-and-tracking radar, plus various command and support vehicles. It can shoot three types of interceptor missiles, the PAC-2, PAC-2 GEM, and PAC-3 (Jane’s 2003c). The Army is developing theater high altitude air defense (THAAD), which will provide a midcourse, high-altitude defense against ballistic missiles using a kinetic-kill interceptor. THAAD’s physical composition resembles that of PATRIOT (Jane’s 2003c). “Navy AEGIS” refers to deployed Ticonderoga-class guided-missile cruisers and Arleigh Burke-class guidedmissile destroyers. Each of these ships carries the AEGIS SPY-1 phased-array radar and can function as a TBM interceptor platform. These ships currently carry Standard Missile-2 (SM2) variants that provide terminal defense against cruise missiles and aircraft. The Navy is now developing the Standard Missile-3 (SM3), a kinetic-kill exoatmoFigure 2. Approximate maximum ranges of North Korean Scud-B, Scud-C, and No-Dong theater ballistic missiles. Note that all of Japan and Okinawa are vulnerable to the No-Dong missile. SCUD-B SCUD- C NO-DONG spheric interceptor, to provide a midcourse defense against TBMs (Jane’s 2003b). TBMD has become an important component of the Department of Defense research and development budget (Department of Defense 2004), and we may expect the United States to field a number of new TBMD systems in the next few years. Indeed, an air-based laser is already under development (Jane’s 2003e). We do not include this future system in our demonstration scenarios, but incorporating such innovations in JOINT DEFENDER is straightforward. 1.3. Current TBMD Planning Tools Effective pre-positioning of TBMD assets is crucial given that (a) a defensive interceptor has limited range, (b) it can destroy a TBM only at certain points in the TBM’s trajectory, and (c) that trajectory will depend on the type of TBM and its launch and target coordinates. Currently, joint forces commanders can plan pre-positioning using several analytical tools; we describe these next and point out their strengths and weaknesses. Area Air Defense Commander System. The Navy’s area air defense commander system (AADCS), AN/UYQ89, is currently deployed on command ships USS BLUERIDGE, USS MOUNT WHITNEY, the AEGIS cruiser USS SHILOH, and at the Joint National Integration Center in Colorado (Jane’s 2003a). In addition to modules for real-time tracking of assets and threats, AADCS contains a planning module that enables air-defense commanders to plan and “war-game” potential TBMD scenarios. AADCS uses 32-processor Silicon Graphics supercomputers to evaluate, using an enumeration-based myopic heuristic, a sequence of increasingly complex “defense plans” before committing to a good one (Silicon Graphics Incorporated 2003). For each target in a scenario, in priority order, AADCS enumerates every possible combination of (a) enemy launch site, (b) missile type, (c) interceptorplatform position on a fine geographical grid, and (d) intercept salvo (set of interceptors that might be shot at the TBM). For each of those combinations, it evaluates the probability of intercepting the TBM successfully. Once AADCS identifies the required platform(s), position(s), Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 747 Operations Research 53(5), pp. 745–763, © 2005 INFORMS Figure 3. TBMD platforms, deployable or under development. Shown left to right are a THAAD launch vehicle, an AEGIS guided missile cruiser firing a standard missile, and a PATRIOT launch vehicle. and corresponding salvo(s) that yield a sufficiently high probability of intercept, the next target in the priority list is analyzed, more platforms are positioned, and so on. (Once a platform’s position is fixed, it is also considered for defending subsequent, lower-priority targets.) AADCS provides an estimate of defense coverage and an expected number of enemy missiles that will leak through the defense plan. AADCS’s brute-force enumeration determines an optimal defense for its highest-priority target, and that enumeration goes on to optimize a sequence of restricted problems. Several weaknesses are apparent: the procedure is essentially a sequential greedy heuristic with no guarantee of global optimality, it ignores the enemy’s strategy, and it requires an expensive computational platform. Theater Battle Management Core Systems (TBMCS). The U.S. Air Force’s air operations centers use theater battle management core systems (TBMCS) for theater-level planning in support of the area air defense commander. TBMCS supports strategic planning, air battle planning, and mission preparation, together with mission execution, reporting, and analysis; the last items are supported in near real-time as situations unfold. A module in TBMCS automates an overlay of potential “launch fans” by defensive “interceptor envelopes.” That is, the module evaluates a manuallyprepared, pre-positioning plan for defenses by analyzing the intersection of (a) the two-dimensional projection on the earth’s surface of the three-dimensional region that might be traversed by a TBM, and (b) a similar projection for the “kill zone” of an interceptor shot from a given position. This procedure suggests a plausible solution that indicates whether or not a hypothesized attacking missile can be struck by a pre-positioned interceptor, subject to the error induced by two-dimensional projections. TBMCS cannot optimize defense plans because it requires human intervention (i.e., guessing), it does not measure expected damage incurred by an attack, and it ignores the enemy’s strategy. Commander’s Analysis and Planning Simulation. Since 1993, the Missile Defense Agency has sponsored commander’s analysis and planning simulation (CAPS), which is currently hosted by theater ballistic missile- planning cells of Central Command, European Command, Pacific Command, Strategic Command, the Naval Postgraduate School, and others—a total of more than 50 sites. CAPS helps assess defense-system capabilities and positioning. The performance of manually-prepared defense plans can be evaluated against manually-prepared threat scenarios (Sparta 2004). The CAPS operator selects the “best-looking” defense plan that appears to protect defended assets (targets) with high probability and appears to maximize the number of missiles the defender can engage. CAPS does not make the two-dimensional approximations that TBMCS does, but it still requires human intervention and ignores the enemy’s strategy. All three fielded systems, AADCS, TBMCS, and CAPS, address the complex problem of TBM defense in very different ways, with wide variation in computational requirements, degrees of fidelity, and objectives. These systems can be used to search for “good” defense plans, but only through manual or automated heuristics. None of the systems account for how the enemy might change his strategy in response to observing pre-positioned TBMD assets, i.e., in response to observing an implemented defense plan. 2. A New Two-Sided Optimization for TBMD Planning We introduce a new paradigm for planning the prepositioning of TBMD assets. We first express enemy courses of action as an “inner” mathematical optimization that maximizes expected damage subject to known defensive positions and capabilities. An “outer” optimization minimizes that maximum by pre-positioning defensive platforms and committing to intercept strategies appropriately. We can most conveniently express our model for TBMD as a bilevel integer linear program (BLILP) (e.g., Moore and Bard 1990). Then, because of its special structure, we can convert our BLILP into a standard mixed-integer linear program (MILP) to actually solve it. With the roles of attacker and defender reversed, this general idea has been successfully used to model a number of networkinterdiction problems (Phillips 1993, Wood 1993, Israeli and Wood 2002; see Whiteman 2000 for details on an 748 application; see Fulkerson and Harding 1977, Golden 1978 for earlier, bilevel linear-programming models involving continuous interdiction effort; and see Salmeron et al. 2004 for an application of a bilevel optimization to interdicting electric power grids). In these network-interdiction problems, an interdictor uses limited offensive resources to attack and damage an adversary’s network (e.g., road system, communications network) to minimize the maximum benefit his adversary can obtain from it. Skroch (2004) and Brown et al. (2004) model the optimal disruption of a weapons development program by interdicting a project network. Their BLILP cannot be converted to a MILP, and is solved with a decomposition algorithm. 2.1. TBMD Terminology and Assumptions The following terminology and assumptions characterize JOINT DEFENDER. Both sides have full knowledge of the parameters and data described below. Each launch site for attacking missiles is located by latitude and longitude. Any finite number of dispersed launch sites may exist. Each target vulnerable to enemy attack is located by latitude and longitude. Any finite number of dispersed targets may exist, and each has a target value. Each candidate defender position is located by latitude and longitude. Any finite number of candidate positions may exist. The set of positions can include, for example, a discretized field of grid points with desired geographic fidelity. Each enemy missile has a minimum and maximum range, and can hit any target within this range of its launch site with a known probability of kill. This probability can depend on the missile type, target, and range from launch site to target. An enemy attack consists of a launch of a missile from an enemy launch site against a vulnerable target. The enemy’s goal is to launch a set of attacks that maximizes total expected target damage. Each defender class consists of a given number of individual platforms, each endowed with a loadout of a given number of each type of interceptor weapon (antimissile missiles are the only extant interceptors, but other types, like the air-based laser, are under development). Each defending platform may be located at any candidate defender position that is secure and compatible for its class. That is, ships may only be positioned at sea, land units on compatible terrain, and air defenders in safe airspace. A single attack (one missile from one launch site to one target) may be engaged by any defending platform with an intercept salvo of any number of any types of interceptor missiles available on that platform. For planning purposes, and as a matter of effective tactical doctrine, we assume that the planned intercept of each enemy missile will be executed by a single defending platform. (In execution, this would not preclude defending platforms from Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense Operations Research 53(5), pp. 745–763, © 2005 INFORMS providing a layered defense to defended targets, but we do not address this complication.) The probability of negation defines the probability that an intercept salvo will destroy the attacking missile; this varies by attack launch site, missile type, target location, defender position, defending salvo, and any synergy among the intercepting missiles in that salvo. The geometry of such an engagement can be depicted by an oblate spherical triangle, with apexes at the launch site, the target location, and the defender’s position. The probability of negation for an intercept salvo is then a function of (a) the relative positions of missile and interceptor, (b) the vulnerability of the attacking missile to the interceptor at the point of intercept—some interceptors can only strike a missile traversing its early- or middle-phase flyout trajectory, and some provide only terminal-phase defense—and (c) the combined effectiveness of the entire intercept salvo. In practice, JOINT DEFENDER uses probabilities of negation computed through a mathematical approximation, or through lookup and interpolation of engineering estimates in “cross-range” and “down-range” tables for each type of intercept salvo and missile altitude. The probability of negation for an interceptor salvo does not rely on an independence assumption among missiles in that salvo. 2.2. Mathematical Development of JOINT DEFENDER The attacker controls a set of launch sites s ∈ S, and possesses fixed m s missiles of type m ∈ M pre-positioned at site s, as well as a pool of mobilem missiles that can be transported to any capable receiving launch site. Transport of the mobile missiles may be restricted by move m s and/or movem s . Launch site s can launch no more than fixed m s + movem s missiles of type m. (Of course, if the defender knows that launch site s is incapable of launching missile type m, fixed m s = movem s = 0.) The defender guards a set of targets t ∈ T , with each target t having value val t . An attack a ∈ A consists of a launch from site sa ∈ S of a missile of type ma ∈ M at a target ta ∈ T . This attack will hit and destroy the target with probability of kill Pka , assuming that the defender takes no action. An upper bound missilest may be placed on the number of missiles the attacker will launch at target t. The attacker must decide which missiles to launch at which targets to maximize total expected target damage, weighted by target value. The defender controls a set of defending platforms p ∈ P , each of which is a member of platform class cp ∈ C. Each platform of class c can be pre-positioned at any one location g ∈ Gc ⊆ G. Each platform p carries loadout p i defensive interceptors of type i ∈ I. An attack a can be engaged with alternative defensive actions d ∈ D, where defense d launches salvoa c d i interceptors of type(s) i and succeeds in thwarting the attack with probability of negation Pna c g d . Each defensive engagement is conditional, meaning that if attack a is not launched, then no interceptor devoted to engaging that attack is launched. Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense Operations Research 53(5), pp. 745–763, © 2005 INFORMS The defender wishes to optimize defensive prepositioning for attack interception while assuming the attacker will observe these preparations and optimize his multimissile attack to exploit any weaknesses in these defenses. The defender’s objective is to minimize the maximum total expected damage to targets. We note that this model is a conservative one for the defender because he must protect against the worst possible attack. It is conservative for the attacker, because he must plan against the best possible defense. However, variants of the model we describe later enable analysis of a range of situations, from conservative to optimistic, for either opponent. Model JD-MINMAX: Minimize Maximum Expected Total Damage Indices and Index Sets Attacker m ∈ M attacking missile types s ∈ S attacker launch sites t ∈ T targets (“defended asset”) a ∈ A attacks (a single missile launched at a target) a ∈ Am s ⊆ A attacks launching a missile of type m from site s a ∈ At ⊆ A attacks a with target t sa launch site of attack a, sa ∈ S ma missile type launched in attack a, ma ∈ M ta target of attack a, ta ∈ T Defender p∈P c∈C cp g∈G defending platforms defending platform classes class of platform p, cp ∈ C candidate stationing positions for a defending platform g ∈ Gc ⊆ G candidate stationing positions for a defending platform of class c i ∈ I defensive interceptor types d ∈ D defense options Data units Attacker mobilem fixed m s movem s , movem s missilest valt Pka attacker’s total supply of mobile missile type m (missiles) attacker’s total supply of stationary type m missiles at launch site s (missiles) minimum and maximum number of mobile missile type m that attacker can transport to launch site s (missiles) maximum number of missiles that can attack target t (missiles) value of target t (value) probability that attack a hits and destroys its target ta if not intercepted, i.e., probability of kill (fraction) 749 Defender loadout p i number of type i interceptors carried by platform p (interceptors) salvoa c d i number of type i interceptors used against attack a by a class c platform exercising defense option d (interceptors) shoot p maximum number of interceptors platform p can shoot in an exchange (interceptors) Pna c g d probability that attack a is negated if platform p, class c = cp , in position g ∈ Gcp exercises defense option d, i.e., probability of negation (fraction) Variables units Attacker Wm s number of type m mobile missiles transported to launch site s (missiles) Ya 1 if attack a is launched, 0 otherwise (binary) (Y, the vector of attacks by individual missiles, is an “attack plan”) Defender Xp g 1 if platform p is positioned at g, 0 otherwise (binary) Ra p g d 1 if attack a is engaged by platform p from position g ∈ Gcp exercising defense option d, 0 otherwise (binary) Formulation of JD-MINMAX. We specify a set of dual variables, in square brackets, for each constraint of the inner (maximization) problem in JD-MINMAX. These duals are only defined (and used) for solutions to the linear programming relaxation of the integer linear program that results when X and R are fixed.           valt Pka 1− Pna cp  g d Ra p g d Ya A0  max    Y     t a∈At p g d              s.t. mobile ∀ m   A1 W  m m m s       s        −W + fixed ∀ ms   A2 Y  m s m s a m s ∗ Z = min a∈Am s  X R∈XR      Ya  missilest ∀ t t  A3        a∈At          W  move and integer move   m s m s m s      ∀ ms − m s  m s  A4          0  Ya  1 and integer ∀ a !a " A5 The notation X R ∈ XR denotes all feasible prepositioning and interception plans for the defender. This feasible set is described in detail below. The attacker’s objective (A0) expresses total expected target damage, assuming a cumulative effect across targets, and for multiple missiles striking a single target. Constraints (A1) limit the number of mobile missiles of each type that can be transported to launch sites. Constraints (A2) limit the maximum number of missiles of each type, both mobile and fixed, that can be launched from each launch site. Constraints (A3) limit the number of missiles that can attack each target. Constraints (A4) limit the number of mobile missiles of each type that can be transported to each launch site. Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 750 Operations Research 53(5), pp. 745–763, © 2005 INFORMS The objective (A0) expresses expected incremental target value damage inflicted as a consequence of each attacking missile. For an area target, such as a city or airfield, such a cumulative damage model is standard (e.g., Eckler and Burr 1972). But a point target might be destroyed by any single attacking missile, and the lack of a joint probability expression for surviving more than one hit means that the attacker can be over-credited with damage value. (This problem disappears if the attacker can launch no more than one missile at any target, which can be enforced through constraints (A3).) We believe that when it comes to weapons of mass destruction carried by TBMs, the damage to an economy and a society will continue to increase as the number of successful missile strikes increases. Thus, the cumulative model of damage is appropriate, although there might be some diminishing returns to an attacker as the number of successful strikes on a target (or in a target area) increases. Appendix A suggests how to modify the objective function for diminishing returns or point targets, should these issues arise. The defender’s actions are limited by X R ∈ XR, where XR is defined by the following set of constraints:  Xp g  1 ∀ p (D1) 2.3. Solving JD-MINMAX with JD-MILP Direct solution of a min-max model like JD-MINMAX is impossible with standard software. We could create a specialized decomposition algorithm for solving it, along the lines of Israeli and Wood (2002), but prefer a simpler method if one exists. In this case it does: Although the attacker’s decision vector W is integer and Y is binary, the constraint matrix involving W and Y is totally unimodular and all corresponding right-hand side data are integer. Thus, all solutions to the linear-programming relaxation of the attacker’s maximizing problem are intrinsically integer. Therefore, we can simply take the linear-programming relaxation of the inner problem to create an inner maximization that is a linear program. We then use the dual variables defined above, and take the dual of that inner maximization to create a “min-min” problem. This results in a simple, minimizing MILP, which we solve using standard optimization software. The MILP is JD-MILP    min mobilem m + fixed m s m s + missilest t      X R m m s g  Xp g  1 ∀g (optional) (D2) ∀ a (D3) −  movem s t m s +  movem s m s + m s m s  a p  Ra p g d  1 p g d  a d + salvoa cp  d i Ra p g d  shoot p ∀p (optional) (D5) Ra p g d  Xp g m s  0 ∀ m s (T0) (T1) Pka val ta Pna cp  g d Ra p g d p g d ∀ p i g ∈ Gcp  (D4) a g d  m s ma  sa + ta + !a + salvoa cp  d i Ra p g d  loadout p i Xp g  s.t. m − m s − !a  Pka valta ∀ a (T2)  Xp g  1 ∀ p (T3)  Xp g  1 ∀ g (T4) g ∀ a p g (D6) d all Xp g  Ra p g d ∈ #0 1$" p (D7) Each constraint (D1) limits a platform to occupy at most one grid position; each constraint (D2) optionally limits a grid position to accommodate at most one platform; each constraint (D3) allows at most one interception of each attack; each constraint (D4) limits the number of interceptor engagements from each positioned platform and gridpoint combination; each constraint (D5) optionally limits the total number of interceptors that a platform can shoot in the short period of time that elapses in an exchange; each constraint (D6) permits an engagement only from an occupied platform and grid-point combination; and constraints (D7) require binary decisions. Note that constraints (D3) do not require a response for every attacking missile. Indeed, if defenses are overwhelmed, it may be impossible to intercept every missile launched, and we must allow for this eventuality. The attacker plans to maximize expected damage, and the defender plans to minimize the attacker’s maximum expected damage.  Ra p g d  1 ∀ a (T5) p g d  salvoa cp  d i Ra p g d − loadout p i Xp g  0 a d ∀ p i g ∈ Gcp  (T6)  salvoa cp  d i Ra p g d  shoot p ∀ p (T7) a g d  Ra p g d  Xp g ∀ a p g (T8) d all m  m s  a  m s  m s  0 all Xp g  Ra p g d ∈ #0 1$" (T9) The solution of JD-MILP yields an optimal defense prepositioning plan X∗ and interceptor-commitment plan R∗ . We recover the associated, optimal mobile-missile transport plan W∗ and attack plan Y∗ by fixing X = X∗ and R = R∗ in JD-MINMAX, and solving the linear program that results. Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense Operations Research 53(5), pp. 745–763, © 2005 INFORMS JD-MILP can be embellished with additional features as long as the modifications can be expressed linearly in X R ∈ XR, and the embellishments that modify the attacker’s constraints (A1)–(A5) do not destroy their total unimodularity. (If maintaining total unimodularity in the attacker’s optimization is too restrictive, more general solution methods apply, as mentioned above.) 2.4. Variants of JOINT DEFENDER to Assess the Value of Flexibility By tightening or relaxing constraints (D1)–(D7) on the defender and solving the resulting versions of JD-MILP, we can assess the value of flexibility, or the lack thereof, to the defender. For instance, a commander might not currently be able to place an AEGIS platform in a set of positions G′ that is threatened by the adversary’s coastal defenses. The commander could solve JD-MILP with and without G′ included in G, and determine whether or not it is worthwhile to neutralize those coastal defenses. (This comparison we envisage still assumes transparency between the sides, and that the attacker will know that his defenses have been neutralized and that the previously inaccessible positions are now available to the defender.) 2.5. The Value of Secrecy JD-MILP’s assumption of complete transparency between attacker and defender can lead to unappealing (but logical) outcomes. Suppose, for example, that a defender has two assets to defend, has two interceptors for that defense, and each interceptor has a Pn of 1. Further, assume that he is opposed by an attacker who has two missiles that can strike either target (asset), each with a Pk of 1. Because the attacker can see the defender’s preparations, he will destroy at least one target—with probability 1. This may be unappealing because, in the familiar setting of a two-person zero-sum game with randomized strategies, the defender can have a positive probability of losing neither of his assets. Of course, the game-theoretic setting requires opacity, i.e., each opponent must hide his intentions from the other. But, completely hiding missile launch sites and interceptor platforms such as ships is impossible. On the other hand, both attacker and defender probably do not have complete knowledge of their opponent’s plans. To handle this issue, we can modify JD-MINMAX, and JD-MILP correspondingly, to represent situations in which some of the defender’s assets are hidden from the attacker, and/or some launch sites or missiles are hidden from the defender. We refer to the defender being able to conceal part of his decision, fooling the attacker into basing his strategy on partial, or bogus data, and then taking advantage of that deception. This section discusses this case and its converse, where the attacker can conceal some information from the defender. The Value of Defender Secrecy. The following procedure will evaluate the advantage the defender can gain by 751 hiding the existence of a subset of his platforms from the attacker: (1) Solve the standard version of JD-MILP to determine total expected damage Z ∗ under the assumption that the defender’s platforms are all visible to the attacker. (2) Remove platforms whose existence the defender can hide; the attacker knows nothing whatsoever about these platforms. (3) Solve this modified version of JD-MILP for the visible defense strategy X∗  R∗ , and recover the attacker’s optimal strategy Y∗ . (4) Fix the “visible-defense strategy” X∗  R∗  and the unsuspecting attacker’s strategy Y∗ in JD-MINMAX and solve the defender’s minimization to determine the optimal strategy for the hidden platforms, and the total expected damage Z ∗∗ , given the attacker’s obviously suboptimal strategy. (5) Because of the attacker’s suboptimal strategy, Z ∗∗  Z ∗ , so that Z ∗ − Z ∗∗ may be viewed as “the value of secrecy” to the defender. If we hide all defending platforms, and use this procedure, we are estimating the “value of a total surprise defense.” (This emulates current planning tools.) The Value of Attacker Secrecy. Suppose that the defender has gained enough information to be able to, in essence, fix all the variables Wm s in JD-MINMAX. That is, he knows the exact location of every missile the attacker possesses. Both sides solve the resulting restricted version of JD-MILP and determine the total expected damage Z ∗∗ ; let X∗∗ represent the defender’s optimal pre-positioning plan for this situation. Now, if the attacker can transport his missiles from site to site without being observed, and do this optimally, he may be able to increase expected damage, because the defender has been fooled and will use his original, now suboptimal, pre-positioning plan X∗∗ . So, the attacker solves JD-MILP with X fixed at X∗∗ (for simplicity, we allow the defender to reoptimize interceptor commitments R), determines an optimal “missile-transport plan” W∗ , and optimal attack plan Y∗ with objective value Z ∗ . Clearly, Z ∗∗  Z ∗ , and the difference Z ∗ − Z ∗∗ represents the value of secrecy to the attacker. Suppose that the attacker can fool the defender into thinking he will never launch his missiles, or that he has none at all. In that case, X∗∗  R∗∗  = 0 0, i.e., no defense, is a reasonable response from the defender. If we fix X R = 0 0 in JD-MINMAX and solve the resulting linear program to obtain Z ∗ , we can determine the “value of a total surprise attack” by comparing Z ∗ to the optimal objective from JD-MILP for a baseline, nonsurprise scenario. 3. Case Study: North Korea, Circa 2010 We have developed two North Korean scenarios, circa 2010, which specify a North Korean arsenal of ballistic missiles and launch sites, a U.S. contingent of ballistic missile defense platforms, and a list of targets with associated Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 752 Operations Research 53(5), pp. 745–763, © 2005 INFORMS target values. We use these scenarios, and variants, to demonstrate JOINT DEFENDER. In the basic scenario we put each North Korean missile at a specific launch site, but we also report cases in which the missiles are transportable. When no confusion results, we use the term JOINT DEFENDER to mean JD-MINMAX, or JD-MILP, or the full decision-support system that incorporates these models, prepares data for problem generation, solves the problem, and returns solutions in accessible format. Each diamond indicates a North Korean launch site. Figure 4. 0 50 100 Yong-don kilometers Chunggang-up China No-dong Korea, Democratic People's Republic of Toksong Kanggamchan 3.1. The Attacker’s Launch Sites Kanggye The attacker’s hypothetical missile launch sites are based on known North Korean missile facilities and bases taken from unclassified sources (Federation of American Scientists 2003). Table 1 lists these sites, and Figure 4 shows their approximate locations. Paegun Mayang Tokchlon Sunchon Ok'pyong Namgung-ri Pyongyang Mari'gyongdae-ri Sangwon 3.2. Attacker Missiles Chiha-ri Table 2 displays the selection of missiles from the North Korean inventory we model in this scenario, along with their approximate minimum and maximum ranges. These ranges have been compiled from unclassified sources (e.g., Jane’s 2003d). We assume that each missile hits and destroys its assigned target with perfect reliability, i.e., Pka = 1"0 for any a, if the missile is not intercepted. This expresses the worst-case situation. 3.3. Targets on a Defended Asset List (DAL) Table 3 displays the defended asset list (DAL) and target values for all scenarios, and Figure 5 displays target locations on an area map. We generate target values for the Table 1. Korea, Republic of DAL based upon a subjective assessment of the four factors currently used in air-defense planning: criticality, vulnerability, reconstitutability, and threat (e.g., Department of the Army Field Manuals FM 3-01.11 2000a and FM 44-100 2000b). Target t’s criticality ct judges the degree to which an asset is essential to the defender. A high value indicates that the asset is extremely critical, and a low value indicates otherwise. North Korean launch sites (after Federation of American Scientists 2003). These comprise current North Korean missile-production facilities and missile bases, and are used in our scenarios as potential launch sites. For fixed-launch-site scenarios, the maximum number and type of each North Korean ballistic missile is shown for each launch site. When we permit transporting mobile missiles, this same inventory of Scud-B, Scud-C, and No-Dong missiles is mobile. Missile types Launch sites Chiha-ri Chunggang-up Kanggamchan Kanggye Mari’gyongdae-ri Mayang Namgung-ri No-dong Ok’pyong Paegun Pyongyang Sangwon Sunchon Tokch’on Toksong Yong-don Latitude (N) 38 41 40 40 38 40 39 40 39 39 39 38 39 39 40 41 ′ 37 46′ 24′ 07′ 59′ 00′ 08′ 50′ 17′ 58′ 00′ 50′ 25′ 45′ 25′ 59′ Longitude (E) 126 126 125 126 125 128 125 129 127 124 125 126 125 126 128 129 ′ 41 53′ 12′ 35′ 40′ 11′ 46′ 40′ 18′ 35′ 45′ 05′ 55′ 15′ 10′ 58′ Scud-B Scud-C No-Dong 15 20 10 15 15 20 15 15 5 15 15 15 20 15 15 15 10 10 10 10 10 20 2 15 10 10 10 10 10 15 15 20 10 5 15 15 15 5 5 5 Taep’o-Dong I Taep’o-Dong II 1 1 1 1 1 1 Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 753 Operations Research 53(5), pp. 745–763, © 2005 INFORMS Table 2. North Korean ballistic missile types with their range limits. The Scud-B, Scud-C, and NoDong missiles are operational today; the intercontinental Taep’o-Dongs are in development. Table 4. Interceptor Minimum Maximum 40 40 1350 2200 3500 330 700 1500 2900 4300 Scud-B Scud-C No-Dong Taep’o-Dong I Taep’o-Dong II Vulnerability vt represents the degree to which a target is susceptible to an air or missile attack or is vulnerable to surveillance. A high value indicates that the target is extremely vulnerable, i.e., unprotected and in the open; a low value indicates otherwise. Reconstitutability rt assesses the degree to which the target can recover from inflicted damage, and incorporates time, the need or lack of need for special repair equipment, and the amount of manpower required to resume normal operation. A high value indicates that the target would need considerable time, equipment and/or manpower to return to normal operation following an attack; a low value indicates otherwise. Threat ht subjectively estimates the probability of a target being attacked. A high value indicates that it is nearly certain that the enemy will attack this target. We combine these factors through val t = lnct × vt × rt × ht  + 1 250 160 160 70 120 1200 of target value can be replaced, but any alternative should address these four important components. Initially, we allow a defended target to be attacked at most once. We want results that are easy to visualize, so we present point targets, easily located on a map. 3.4. Defensive Platforms To evaluate the defender’s 2010 defense plan, we assume that two AEGIS cruisers are deployed, each with 10 SM3 and 20 SM2 interceptors, along with one AEGIS destroyer with 20 SM2 interceptors. Each AEGIS ship has been configured for ballistic-missile defense and deploys as an independent entity. The defender also has two land-based defensive assets. He can use one PATRIOT battery, which consists of eight mobile launchers (and support vehicles), each loaded with four PAC-3 missiles, two PAC-2 GEM missiles, and one PAC-2 missile. And, he can use one THAAD battery whose salient features comprise a mobile launcher and 10 interceptors. 3.5. Interceptor Ranges where all ct , vt , rt , and ht range from about 1 to about 10. The natural log function (ln) is chosen somewhat arbitrarily so that valt also ranges from about 1 to 10. Our definition Table 3. Maximum range (km) THAAD PAC-2 PAC-2GEM PAC-3 SM2 block III variants SM3 Range (km) Missile Ranges for each defender interceptor. Table 4 specifies the maximum range of the various interceptors used by defense platforms in our scenario. Ranges are gleaned from the open literature (Jane’s 2003b, c, e). Targets on a defended asset list (DAL). Targets are on this list because of their political or military significance and are spread out over South Korea, the main islands of Japan, and Okinawa. Each target is assigned four scores, reflecting criticality, vulnerability, reconstitutability, and threat. For example, Seoul has c v r h values of 4 8 5 9, which result in a target value of ln4 × 8 × 5 × 9 + 1 = 8"3. The example values shown here are completely arbitrary. Target Atsugi, JP Misawa, JP Okinawa, JP Sasebo, JP Tokyo, JP Yokosuka, JP Chinhae, ROK Inchon, ROK Kunsan, ROK Osan AB, ROK Pusan, ROK Seoul, ROK Latitude (N) 35 40 26 33 35 35 35 37 35 37 35 37 ′ 27 42′ 20′ 09′ 41′ 17′ 08′ 29′ 54′ 06′ 06′ 27′ Longitude (E) 139 141 127 129 140 139 128 126 126 127 129 126 ′ 27 25′ 47′ 44′ 00′ 40′ 41′ 38′ 37′ 02′ 02′ 57′ c v r h val 4 8 7 7 4 8 7 3 10 10 8 4 7 5 7 8 9 8 7 6 7 8 7 8 6 7 8 7 4 7 7 5 9 9 8 5 5 5 3 7 7 7 8 4 10 10 10 9 7.7 8.2 8.1 8.9 7.9 9.1 8.9 6.9 9.7 9.9 9.4 8.3 Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 754 Figure 5. Operations Research 53(5), pp. 745–763, © 2005 INFORMS Candidate platform positions for the defender. Each circle in Japan and South Korea represents a target; each diamond in North Korea represents an attacker launch site; sea-based platforms can be located at any grid point at sea; land-based platforms can be based at any grid point on land excluding those in North Korea and China (the upper left-hand corner); land-based platforms can also be collocated with targets. For simplicity, grid points are placed at each integer value of latitude and longitude. In reality, the defender’s candidate locations could be specified with much greater freedom. 3.6. Interceptor Effectiveness: Probability of Negation (Pn) For simplicity, these test cases assume “reasonable engagement conditions,” which means that a nonterminal interceptor is within range of an attacking missile’s trajectory, or a terminal defender is, effectively, collocated with the target of an attack. When these conditions are met, we set the probability of negation (Pn) for an interceptor to a reasonable but hypothetical value between 0.7 and 0.9, and set it to 0.0 otherwise. Alternatively, JOINT DEFENDER could employ a set of (potentially enormous) tables that provide interceptor effectiveness indexed by interceptor type and engagement geometry as specified by cross-range and down-range proximity, and by the attacking missile’s altitude. (With respect to the great circle arc connecting the launch site to the target of the attacking missile, the “crossrange” proximity is the distance from the defending platform to the closest point of the arc, and the “down-range” proximity is the distance from this closest point to the target.) We derive the joint probability that a salvo of interceptors negates an attacker’s missile from the negation probabilities of the missiles that comprise a salvo. In this paper, we assume independence between interceptors in a salvo, but JOINT DEFENDER does not require this. 3.7. Candidate Defender Positions We discretize candidate defender positions into a latitude and longitude grid with increments of one degree, about 60 nautical miles; see Figure 5. This discretization yields 304 candidate grid locations for pre-positioning interceptor platforms, although geography precludes certain classes from being assigned to certain positions. Terminal defensive platforms can also collocate with targets. In addition to obvious restrictions to locate land units on land, and to position ships at sea, we have defined an optional, restricted set of sea positions that are at least 100 nautical miles from the North Korean coast. This puts the ships outside of the 60 nautical-mile range of North Korea’s shore-based HY-1 Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 755 Operations Research 53(5), pp. 745–763, © 2005 INFORMS Silkworm and HY-2 Seersucker anti-ship missiles (Federation of American Scientists 2004, Department of the Army 1999). Our approach does not depend on the structure of the set of candidate locations; we only require that the list be finite. In a real scenario the area commander might nominate a list of candidate positions for JOINT DEFENDER to evaluate based on his expert knowledge of the theater and the capabilities of the platforms under his command. 3.8. Scenario Variants We develop a sequence of scenario variants to illustrate how the defender or attacker can evaluate flexibility in their strategy. We depict postures for the defender in which: (D1) The defender does nothing. This establishes a worst-case baseline for any surprise attack. (D2) The defender hides nothing, including his commitments to intercept each potential attacking missile. This is the completely flexible and transparent case where attacker and defender each have complete knowledge of each other’s plans. (D3) The defender lets his platform locations be seen, keeps his ships out of range of shore-based anti-ship missiles, and hides his interceptor commitments. (D4) The defender lets his platform locations be seen, suppresses shore-based threats to his ships as necessary, positions his ships as close to shore as he pleases, and hides his interceptor commitments. (D5) The defender hides the positions of his ships, does not hide the positions of his ground-based interceptors, but does hide all interceptor commitments. (D6) The defender hides everything so that the defense is a complete surprise to the attacker. This establishes a best-case baseline for whatever the attacker decides to do. (This is the case assumed by current TBMD planning tools.) Posture D2 is our baseline. JD-MINMAX represents this “perfectly transparent” case by allowing the attacker to see both the defender’s pre-positioning decisions X, as well as his interceptor commitments R. This constitutes a restriction of the defender’s capabilities in a real engagement, in which (a) the attacker would observe only the defender’s pre-positioning; (b) he would plan and launch an attack given that information; (c) the defender would observe the attack; (d) and only then, after knowing the details of the attack, would the defender need to commit (allocate) interceptors from his pre-positioned platforms. The unrestricted model would be, however, significantly harder to solve than JD-MINMAX. In postures D3 through D5, we relax our baseline posture to model the case in which the attacker has information about the locations of some or all of the defensive platforms but does not know specific interceptor commitments. Exact solution of this model would also be difficult, so we approximate this situation by (a) solving JD-MINMAX as if the defender were using posture D2 (revealing both position and intercept commitments), (b) fixing the resulting attack plan, and then (c) letting the defender re-allocate his interceptors to engage the attacking missiles more effectively. In addition, we evaluate postures D7 through D10 under the same assumptions as D4, with one defending platform of each type omitted from the theater. (Specifically, D7 omits CG48, D8 omits DDG68, D9 omits Pbat1, and D10 omits Tbat1; see platform names in Table 6.) We depict postures for the attacker in which: (A1) The attacker must use a fixed launch site for each missile, or (A2) The attacker transports mobile missiles in secret to any launch site he chooses, while deceiving the defender into expecting fixed launch sites. 4. Results and Analysis We generate JD-MILP using the general algebraic modeling system (GAMS) (Brooke et al. 1998) and solve it with CPLEX 9.0 (ILOG 2003) on a 2 GHz laptop computer operating under Windows XP (Microsoft Corporation 2004). The largest models encountered in analyzing the North Korean cases have, after filtering and presolve reductions, about 120,000 binary variables, 250 continuous variables, and 6,000 constraints. In our experience, posture D6 (a surprise defense, the case assumed by current TBMD planning tools) can be solved optimally in a few seconds. A good solution to the more nuanced cases, such as posture D2 (where attacker and defender have complete knowledge of each other), is discovered within a minute or two, although proving near optimality with a 1% relative tolerance can take a half hour or more. 4.1. Multimissile Attack with No Defense Table 5 lists an optimal multimissile attack that launches a single missile from each fixed launch site at an undefended target. This produces a total expected damage of 103.0 (each attacking missile is assumed to hit its target). In this “posture,” D1-A1, the defender does nothing and the attacker uses fixed launch sites. Figure 6 illustrates the tracks that attacking missiles would follow in this scenario. 4.2. An Optimal Defense Plan Assuming that the attacker does not observe defensive preparations, the defender positions his assets to intercept an optimal, theaterwide attack (this is posture D6-A1, with positions shown in Table 6), and reduces expected damage from 103.0 to 1.0. The defender knows in advance about all optimal attack opportunities, so he positions his defensive platforms and engages the attacker’s missiles with interceptors having high probabilities of negation. The Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 756 Operations Research 53(5), pp. 745–763, © 2005 INFORMS Table 5. An optimal, theaterwide undefended attack plan. There are no defensive interceptions at all. Each target on the defended asset list is attacked with a single missile producing a combined expected damage of 103.0. (See map in Figure 6.) Target Launch site Atsugi, JP Misawa, JP Okinawa, JP Sasebo, JP Tokyo, JP Yokosuka, JP Chinhae, ROK Inchon, ROK Kunsan, ROK Osan AB, ROK Pusan, ROK Seoul, ROK Figure 6. Kanggamchan Kanggamchan Chiha-ri Chiha-ri Kanggamchan Kanggamchan Chiha-ri Chiha-ri Chiha-ri Chiha-ri Chiha-ri Chiha-ri Expected damage Missile type No-Dong No-Dong No-Dong Scud-C No-Dong No-Dong Scud-C Scud-B Scud-B Scud-B Scud-C Scud-B 7.7 8.2 8.1 8.9 7.9 9.1 8.9 6.9 9.7 9.9 9.4 8.3 Map of an optimal, theaterwide undefended attack plan. Maximal attacks are shown with at most one missile aimed at each target and with no interceptions. Maximum expected damage is 103.0. (See data in Table 5.) Misawa, JP Inchon, ROK Seoul, ROK Osan AB, ROK Tokyo, JP Kunsan, ROK Pusan, ROK Atsugi, JP Yokosuka, JP Chinhae, ROK Sasebo, JP Okinawa, JP Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 757 Operations Research 53(5), pp. 745–763, © 2005 INFORMS Table 6. Optimal defender positions maintaining defense secrecy against an optimal theaterwide attack. From these (hidden) positions, defending platforms intercept all attacking missiles, but do not necessarily destroy every missile intercepted. The maximum expected damage is reduced to 1.0, or about one-tenth of an attacking missile leaking through. Defender class Platform Latitude (N) AEGIS CG AEGIS CG AEGIS DDG PATRIOT THAAD CG47 CG48 DDG68 Pbat1 Tbat1 35 34 36 37 40 expected damage, evaluating to 1.0, derives from approximately one-tenth of an attacking missile leaking through over all engagements. Figure 7 illustrates the defender’s positions relative to an optimal attack plan, and the subsequent, optimal engagements of the plan’s attacking missiles. 4.3. Assume Transparency: A Two-Sided Optimization If each side can observe everything the other intends to do, the attacker knows that the defender may commit an interceptor salvo to each candidate missile attack, and shoot it if he launches that missile. The defender knows that the attacker may get some of his missiles through. The defender’s objective is to minimize maximum expected damage, given the attacker can see and take advantage of pre-positioned, defensive forces. This is posture D2-A1. The two-sided attack and defense produces an optimal set of interceptor commitments against threatened launches and shots at missiles launched, as well as, perhaps, some launches against which there is no available defense. Here, the expected damage of 22.7 represents loss of undefended targets Inchon and Chinhae, but still represents an overall reduction in expected damage from a surprise attack of 78 percent. Inchon and Chinhae are undefended because available interceptors cannot cover all possible attacking missiles. In posture D4-A1 we model the situation where the attacker observes platform positions for the defender, but the defender keeps his interception decisions secret. Tables 7 and 8, respectively, illustrate such a defense and the attacking missiles engaged, and Figure 8 depicts the missile attacks, defense, and engagements on a map of the theater. 4.4. A More Stressful Scenario Showing How to Evaluate Partial Transparency, Secrecy, Deception, and the Incremental Value of Each Defender Platform Now consider a more stressful case for the defender that is too cluttered to illustrate on a map of the theater. Suppose that the attacker can launch as many as 00′ 00′ 00′ 06′ 42′ Longitude (E) 130 129 126 127 141 00′ 00′ 00′ 02′ 25′ three missiles of any type from any launch site, and that each target can be attacked as many as 10 times. Posture D3-A1 exhibits 96 attacks, defended by 53 intercepting salvos using 90 interceptors. Total expected target damage is 394.4, with 43 attacking missiles expected to leak through defenses. Maintaining total defender secrecy, D6-A1, reduces total expected damage to 152.2. Suppose that the defender can keep naval defensive platforms hidden from the attacker, but the attacker can observe all land-based defenses; this is posture D5-A1. The resulting expected damage changes from the upper bound of total transparency toward the lower bound of total defender secrecy; see Figure 9. The difference between the expected damage in the transparent solution and the expected damage of this solution is the value of partial defender secrecy. In practical terms, this value quantifies how an increase in information hiding either through funding, strategy, or a combination of both, will reduce the attacker’s ability to inflict damage. The value of partial defender secrecy is bounded by the difference between the expected damage of the completely transparent solution and the expected damage given complete defender secrecy. In the latter case, the defender knows which individual attacks will occur and hides the existence of all interceptors from the attacker (with resulting value 394"4 − 152"2 = 242"2). The attacker may gain some advantage from secretly transporting missiles to alternative launch sites. Defending ships are most affected by this deception. In contrast, the PATRIOT battery provides a terminal defense that is relatively insensitive to an incoming missile’s track, which depends on its origin. We present defensive postures D7 through D10 to assess the value of each defending platform. Here, we assume that posture D4 applies (platforms are seen by the attacker, but engagements are concealed), as one platform of each type is successively removed. Table 9 shows the value of each platform, estimated by comparison with all platforms available. The Patriot battery is valuable in both fixed and mobile attack-missile postures (∼90 units of expected damage); the Aegis cruiser is more valuable in the mobile attack posture (∼110 units of expected damage), but has low value in Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 758 Figure 7. Operations Research 53(5), pp. 745–763, © 2005 INFORMS Map of optimal defender positions and engagements when defense secrecy is maintained against an optimal, theaterwide attack. From these (hidden) positions, defending platforms intercept all attacking missiles, but do not necessarily destroy every missile intercepted. The maximum expected damage is reduced to 1.0, which corresponds to the expected damage from one tenth of an attacking missile leaking through the defense. Tbat1 Pbat-1 DDG68 C347 CG48 Table 7. Optimal defending platform positions given that these positions are observed by the attacker, but defending interceptor commitments are kept secret. Each defending platform is positioned to minimize the attacker’s worst possible attack. The defender, while determining his platform positions, commits interceptors to thwart potential missile attacks that may not actually be launched, but will be intercepted if they are. Once positioned, the defender can intercept any attacking missile he chooses. (See map in Figure 8.) Defender class Platform Latitude (N) AEGIS CG AEGIS CG AEGIS DDG PATRIOT THAAD CG47 CG48 DDG68 Pbat1 Tbat1 34 36 35 37 40 00′ 00′ 00′ 27′ 00′ Longitude (E) 130 126 130 126 140 00′ 00′ 00′ 57′ 00′ Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 759 Operations Research 53(5), pp. 745–763, © 2005 INFORMS Table 8. An optimal attack plan given that defending platform positions are observed by the attacker, but defending interceptor commitments are kept secret. Each target is attacked with at most one missile. The defender, while determining his platform positions, commits interceptors to thwart potential attacks that may not actually be launched, but will be intercepted if they are. Once positioned, the defender can intercept any attacking missile he chooses. Total defended asset list target value at risk is 103.0 and expected target damage is 1.0. (See map in Figure 8.) Target Atsugi, JP Misawa, JP Okinawa, JP Sasebo, JP Tokyo, JP Yokosuka, JP Chinhae, ROK Inchon, ROK Kunsan, ROK Osan AB, ROK Pusan, ROK Seoul, ROK Figure 8. Launch site Kanggamchan Kanggamchan Chiha-ri Chiha-ri Kanggamchan Kanggamchan Chiha-ri Namgung-ri Chiha-ri Chiha-ri Chiha-ri Chiha-ri Missile type Salvo option No-Dong No-Dong No-Dong Scud-C No-Dong No-Dong Scud-C Scud-C Scud-B Scud-B Scud-C Scud-C 2 2 2 2 2 2 2 2 2 2 2 2 SM3 SM3 SM3 SM2-III SM3 SM3 SM2-III PAC3 SM2-III PAC3 SM2-III PAC3 Salvo Pn Defender Expected damage 0.99 0.99 0.99 0.99 0.99 0.99 0.99 0.99 0.99 0.99 0.99 0.99 CG48 CG48 CG47 CG47 CG47 CG47 DDG68 Pbat1 CG48 Pbat1 DDG68 Pbat1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 0.1 Map of an optimal theaterwide attack given that defending platform positions are observed by the attacker, but defending interceptor commitments are kept secret. Each target is attacked with at most one missile. The defender, while determining his platform positions, commits interceptors to thwart potential attacks that may not actually be launched, but will be intercepted if they are. Once positioned, the defender can intercept any attacking missile he chooses. Total defended asset list target value at risk is 103.0 and expected target damage is 1.0. (See data in Tables 7 and 8.) Tbat-1 Pbat-1 CG48 DDG68 CG47 Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 760 Figure 9. Operations Research 53(5), pp. 745–763, © 2005 INFORMS Minimized maximum expected target damage for 20 scenarios mixing defense and attack postures. From D1 to D6, the defender works harder and harder to intercept attacks and conceals more and more information from the attacker, while the attacker either has known, observed launch sites (vertical scale A1) or mobile launch sites hidden from the defender (vertical scale A2). For example, with defending ships hidden from the attacker, posture D5-A1 has expected damage 355.5 with known, fixed attack launch sites, or 394.7 if the attacking missiles can be transported to surprise launch sites D5-A2. Moving defending ships out of range of shore-based anti-ship missiles, D2, does not degrade the defense. The value of secrecy is the positive difference between the expected damage under that level of secrecy and the expected damage in the fully transparent model (e.g., the value of complete defender secrecy is 456"1 − 152"2 = 303"9). Value of Various Levels of Secrecy D1: Surprise attack 1,000 1,000 829.9 829.9 D2: Fully transparent 456.1 394.4 355.5 458.1 394.7 394.4 D3: Seen defenders, ships standoff D4: Seen defenders D5: Ships hidden 152.2 152.2 D6: Surprise defense 0 0 A1 Table 9. A2 Defensive postures D7 through D10 show the effect of removing one of each type of defender platform from the scenario. Posture D4 provides a baseline for comparison. In each scenario, the remaining platforms reposition and resort to defensive salvos using fewer interceptors. For instance, when launch locations are fixed, removing one Aegis cruiser (CG48) results in a moderate increase in expected target damage 398"5 − 394"4 = 4"1. But, when launch sites are mobile, removing the same platform results in a dramatic increase in expected target damage 504"3 − 394"4 = 109"9. A1: Fixed launch sites Posture D4: All platforms seen (baseline) D7: Remove CG48 D8: Remove DDG68 D9: Remove Pbat1 D10: Remove Tbat1 A2: Mobile launch sites Expected damage Increase from D4 Expected damage Increase from D4 394.4 0"0 394.4 0"0 398.5 432.6 482.6 404.4 4"1 38"2 88"2 10"0 504.3 432.6 482.6 404.4 109"9 38"2 88"2 10"0 Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 761 Operations Research 53(5), pp. 745–763, © 2005 INFORMS the fixed-launch-site attack posture (∼4 units of expected damage). 5. Conclusions We have introduced JOINT DEFENDER, a new optimization-based decision-support tool for pre-positioning theater ballistic missile defense (TBMD) assets, i.e., missile-interceptor platforms. JOINT DEFENDER can model a scenario in which both attacker and defender have knowledge of the other’s strategy, it can model no defense at all, and it can model an optimal defense against an attack assuming that the attacker expects no defense. Existing defensive planning tools can only evaluate the last type of scenario, and then, only approximately. JOINT DEFENDER solves such problems exactly on a laptop computer in just a few seconds. JOINT DEFENDER can also model a more complicated scenario in which a defender first pre-positions his TBMD platforms to protect a set of targets. An attacker observes those defensive positions and, given that information, launches his missiles so as to maximize the total expected value of target damage. The defender can optimize his pre-positioning (and commitments of interceptors to attacking missiles), because he knows the attacker will behave to optimize his own objective function. The attacker cannot increase expected damage by using any other strategy. We develop JOINT DEFENDER as a bilevel integer linear program, but convert it to a standard mixed-integer linear program for solution purposes. We have demonstrated its practicability by solving a number of realistic scenarios involving North Korea, using data gleaned from public sources. We have also explored the “value of secrecy” to both sides of the conflict. JOINT DEFENDER identifies an optimal plan for a typical transparent scenario in a minute or two on a laptop computer, although we find instances that require one half hour to prove optimality. Two-sided mathematical models of military conflict have been studied since Lanchester (1916). Danskin (1967, p. viii) recounts that, in 1951, the Rand Corporation studied two-sided situations where “one side allocates anti-missile defenses to various cities. The other side observes this allocation and then allocates missiles to those cities.” In discussing defense against nuclear strikes, and in addition to using a dual reformulation from max-min to max-max, Owen (1969, p. 491) states: “It is, of course, assumed that the defender must deploy his hardware first; the attacker, in full knowledge of this deployment, will act next.” In Appendix B, we establish the relationship between our twosided model (JD-MINMAX) in JOINT DEFENDER and a game invented by von Stackelberg (1952). These seminal contributions, achieved solely with classical mathematics (i.e., with no computers) but only by asserting many simplifying assumptions (such as continuous activities) still offer prescient insight. We have now discovered how to actually formulate and solve such problems with realistic fidelity. In contrast to our bilevel optimization, a standard gametheoretic model would assume that the attacker does not observe the positioning of defensive assets before launching his attack, and the defender is unaware of the allocation of attacking missiles to targets (e.g., Matheson 1975), or that either side is unaware of the total number of assets (offensive or defensive) possessed by the adversary. Eckler and Burr (1972) discuss solutions for many versions of such games. Bracken et al. (1987) discuss solutions that are robust with respect to uncertain numbers of attacking assets. Diehl (2004) provides the contemporary (unclassified) foundation for JOINT DEFENDER, discusses the philosophy of target damage functions, and suggests some alternative solution strategies that we have not pursued here. JOINT DEFENDER represents a substantial technological advance over existing TBMD planning tools that employ heuristics, or expect the planner to guess at good defense plans, or require supercomputers for implementation. None of these existing tools assumes that the attacker can detect defensive preparations and respond accordingly—this is a key weakness addressed by JOINT DEFENDER. Planners are comfortable with a decision-support tool they can control, so JOINT DEFENDER accepts advice such as “fix this platform in this position,” “try this position first,” or “we have no advice to offer.” Similarly, JOINT DEFENDER accepts, but does not require, other advice on the details of an interception plan, including “evaluate this exact plan.” The Joint Task Force’s area air defense commander and regional air defense commander can use JOINT DEFENDER for initial defense planning and assessment, and for assessing the value of hiding information from the attacker. JOINT DEFENDER can also provide insight to TBMD program officers in Washington, DC. For instance, it can evaluate trade-offs between investing in a few, highly effective but expensive interceptors or in larger numbers of relatively inexpensive, but less effective interceptors. JOINT DEFENDER has been presented to Naval Warfare Development Command (NWDC), to the United States Strategic Command program and requirements staff, and has undergone additional proof testing with a number of scenarios of interest to these organizations. The NWDC’s air defense department head, Captain Garry Holmstrom, USN (ret), has stated, “This project has produced a most promising solution to the Joint as well as the Navy’s problem of BMD asset allocation, at minimal development and fielding cost.” JOINT DEFENDER is now under further development for NWDC in preparation for further testing and future integration into the TBMD planning environment, and for potential use in the Global Command and Control System-Maritime and/or the Area Air Defense Command System-lite. 6. Epilogue On or about 1 October 2004, the USS Curtis Wilbur, a destroyer of the U.S. 7th Fleet, began patrolling the Sea of Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense 762 Operations Research 53(5), pp. 745–763, © 2005 INFORMS Japan as our first step in building a missile shield for the United States and its allies (Army Times 2004). Appendix A. Variations on JD-MINMAX’S Objective Function The objective function (A0) models area targets that can be damaged more than once, but not point targets that can be destroyed just once (e.g., Eckler and Burr 1972). If we partition the set of targets T into area and point targets, i.e., T = #Tarea  Tpoint $, the following objective function models the situation more accurately:  val t min max Y X R∈XR t∈Tarea     · Pna cp  g d Ra p g d Ya Pka 1 − a∈At + Appendix B. Stackelberg Games p g d   valt 1 − t∈Tpoint a∈At  1 − Pka · 1−  Pna cp  g d Ra p g d p g d Ya  " (A0′ ) But, our linear-programming subproblem for the attacker no longer suffices. On the other hand, one can argue that, even in the case of area targets, the damage resulting from multiple successful strikes is not additive. For instance, the economy and welfare of a city might suffer almost as much from a single successful missile strike as from two. Ignoring variations in weapon types for simplicity, a sensible modeling technique makes the expected value of a set of successful strikes on a target a concave function of the expected number of such strikes. (Indeed, the simple point-target model fits this description.) We can accommodate this by subtracting larger and larger fractions of expected target value as the number of attacking missiles increases:  val t min max Y X R∈XR t∈Tarea     Pna cp  g d Ra p g d Ya Pka 1 − · a∈At p g d missilest −  Pka ftk Ytk′  (A0′′ ) k=1 where (a) Ytk′ is 1 if the number of missiles targeted at t is greater than or equal to k and is 0 otherwise, and (b) ftk , 0  ftk < 1 for all t and k, is an increasing function of k; this takes into account some approximation of the probability that each attacking missile is thwarted. The inner subproblem remains totally unimodular because we simply replace constraints (A2) with missilest  a∈At Ya −  Ytk′  0 k=1 0  Ytk  1 ∀ t k" ∀ t Thus, the inner subproblem remains a linear program with a dual formulation, and a mixed-integer linear program formulation for the overall problem can be created. If it becomes imperative to model point targets with an objective akin to (A0′ ), the linear objective of (A0) can be maintained by letting Ya represent a multiweapon strike and adjusting ka accordingly. Unfortunately, the constraints necessary to enforce this would result in a subproblem that is not totally unimodular. Brown et al. (2004) (see also the discussion on trilevel defense models in Israeli and Wood 2002) deal successfully with this issue by solving their analog of JD-MINMAX with a specialized decomposition algorithm. That technology also applies to our problem, at least in theory. The models in JOINT DEFENDER’s basic model comprises an instance of a Stackelberg game (von Stackelberg 1952; see Luo et al. 1996, pp. 11–15 for an overview), which we represent as a bilevel integer linear program (e.g., Moore and Bard 1990). The bilevel program converts to a standard MILP for solution purposes. The key ingredients of any Stackelberg game are a leader (our defender) and a follower (our attacker). The basic (“one-play”) version of the game we use has two phases: (a) The leader carries out a set of actions to coerce behavior from the follower, and (b) the follower observes the leader’s actions and how they have affected his ability to respond and/or the value of responding, and reacts by optimizing his own objective. The leader has an objective, too, which is based on the costs of his own actions and his evaluation of the follower’s responses. Because the leader understands and models the follower’s optimizing behavior precisely, he can and does optimize his own objective by coercing the follower appropriately. If the follower suboptimizes for some reason, or if the leader has assumed that the follower has more flexibility or ability than he actually does, the leader can guarantee the actual outcome will be no worse than one predicted by the game. The leader’s and follower’s objectives in a Stackelberg game need not be diametrically opposed, but are in our TBMD problem. Our attacker (follower) wishes to maximize total expected damage while our defender (leader) wishes to minimize that maximum. Our defender’s actions are constrained by the physical limits on deploying TBMD platforms and on the physical limits of his interceptors. Our attacker’s actions of firing TBMs are not constrained by our defender’s actions, but the values associated with firing TBMs are. Our defender’s actions affect the success probabilities for our attacker’s missiles and thereby the objective of total expected damage. References Army Times. 2004. Destroyer patrol is first step in defense against missile attacks. Associated Press, October 1. Retrieved September 8, 2005. http://www.armytimes.com/story.php?f=1-292925-382918.php. Brown et al.: A Two-Sided Optimization for Theater Ballistic Missile Defense Operations Research 53(5), pp. 745–763, © 2005 INFORMS Bracken, J., P. S. Brooks, J. E. Falk. 1987. Robust preallocated preferential defense. Naval Res. Logist. 34 1–22. Brooke, A., D. Kendrick, A. Meeraus, R. Raman. 1998. GAMS: A User’s Guide. GAMS Development Corporation, Washington, DC. Brown, G. G., W. M. Carlyle, R. C. Harney, E. M. Skroch, R. K. Wood. 2004. Interdicting a nuclear weapons project (in review). Central Intelligence Agency. 2001. Foreign Missile Developments and the Ballistic Missile Threat Through 2015. Unclassified summary of the National Intelligence Estimate produced by the National Intelligence Council. Retrieved May 28, 2004 from http://www.cia.gov/nic/ special_missilethreat2001.html. Danskin, J. M. 1967. The Theory of Max-Min. Springer-Verlag, New York. Department of Defense. 2004. Fiscal 2005 Department of Defense Budget Release, February 2. Retrieved March 19, 2004 from http://east. defenselink.mil/releases/2004/nr20040202-0301.html. Department of the Army. 1999. FY 99 Air and Missile Defense Master Plan (1999), Chapter 2—Threat. Retrieved May 24, 2004 from http:// fas.org/spp/starwars/docops/amd99. Department of the Army. 2000a. Field Manual FM 3-01.11. Appendix A— ADA Employment Principles, Guidelines, and Priorities. Retrieved May 3, 2004 from http://www.globalsecurity.org/military/library/ policy/army/fm/. Department of the Army. 2000b. Army Field Manual FM 44-100, Chapter 4. Fundamentals of Army Air and Missile Defense Operations. Retrieved May 3, 2004 from http://www.globalsecurity.org/military/ library/policy/army/fm/. Diehl, D. D. 2004. How to optimize joint theater ballistic missile defense. Master’s thesis, Naval Postgraduate School, Monterey, CA. Eckler, A. R., S. A. Burr. 1972. Mathematical Models of Target Coverage and Missile Allocation. Military Operations Research Society, Alexandria, VA. Federation of American Scientists. 2003. DPRK—Special Weapons Facilities. Retrieved April 13, 2004 from http://www.fas.org/nuke/guide/ dprk/facility/index.html. Federation of American Scientists. 2004. C-201/HY-2/SY-1 CSS-N-2/ CSS-C-3/SEERSUCKER. Retrieved May 24, 2004 from http://www. fas.org/man/dod-101/sys/missile/row/c-201.htm. Fulkerson, D. R., G. C. Harding. 1977. Maximizing the minimum sourcesink path subject to a budget constraint. Math. Programming 13 116–118. Golden, B. 1978. A problem in network interdiction. Naval Res. Logist. Quart. 25 711–713. ILOG. 2003. ILOG CPLEX 9.0 user’s manual. ILOG S.A., Gentilly Cedex, France. Israeli, E., R. K. Wood. 2002. Shortest-path network interdiction. Networks 40 97–111. 763 Jane’s. 2003a. C4I Systems, Command Information Systems—Naval, United States. Retrieved May 19, 2004 from www4.janes.com. Jane’s. 2003b. Electro-Optic Systems 2002–2003, Naval Systems— Surface-to-Air Missiles, United States. Retrieved May 19, 2004 from www4.janes.com. Jane’s. 2003c. Land Base Air Defense, Static and Towed Surface-toAir Missile Systems, United States. Retrieved May 19, 2004 from www4.janes.com. Jane’s. 2003d. Strategic Weapon Systems 38, Offensive Weapons, Korea, North. Retrieved May 19, 2004 from www4.janes.com. Jane’s. 2003e. Strategic Weapon Systems 39, Defensive Weapons, United States. Retrieved May 19, 2004 from www4.janes.com. Lanchester, F. W. 1916. Aircraft in Warfare: The Dawn of the Fourth Arm. Constable and Co., London, UK. Luo, Z. Q., J. S. Pang, D. Ralph. 1996. Mathematical Programs with Equilibrium Constraints. Cambridge University Press, Cambridge, UK. Matheson, J. D. 1975. Multidimensional preferential strategies. Analytic Services, Inc., report no. SDN 75-3, Arlington, VA, November, National Technical Information Service Number ADA021224/1. Microsoft Corporation. 2004. Windows XP Home Page. Retrieved May 24, 2004 from http://www.microsoft.com/windowsxp/default.asp. Moore, J. T., J. F. Bard. 1990. The mixed integer linear bilevel programming problem. Oper. Res. 38 911–921. Owen, G. 1969. Minimization of fatalities in a nuclear attack model. Oper. Res. 17 489–505. Phillips, C. 1993. The network inhibition problem. Proc. 25th Annual ACM Sympos. Theory Comput. ACM Press, San Diego, CA, 776–785. Salmeron, J., K. Wood, R. Baldick. 2004. Analysis of electric grid security under terrorist threat. IEEE Trans. Power Systems 19 905–912. Silicon Graphics Incorporated. 2003. Press release, February 12. Retrieved April 25, 2004 from http://www.sig.com/newsroom/press_ releases/2003/february/q2_wins.html. Skroch, E. 2004. How to optimally interdict a belligerent project to develop a nuclear weapon. Master’s thesis, Naval Postgraduate School, Monterey, CA. Sparta, Inc. 2004. Commander’s Analysis and Planning Simulation (CAPS). v 8.0 user’s manual. Sparta, Inc., San Diego, CA. von Stackelberg, H. 1952. The Theory of the Market Economy (translated from German). William Hodge & Co., London, UK. Whiteman, P. S. 2000. Improving the effectiveness of single-strike effectiveness for network interdiction. Military Oper. Res. 4 15–30. Wood, R. K. 1993. Deterministic network interdiction. Math. Comput. Model. 17 1–18.