Using Pattern Analysis and Systematic Randomness to Allocate U.S. Border Security Resources
ResearchPublished Mar 27, 2012
This report investigates how the Office of Border Patrol could employ pattern and trend analysis and systematic randomness to increase interdiction rates and mitigate smuggler adaptation. The analysis shows how approaches that combine the techniques yield higher interdiction rates than approaches using either technique alone, and it examines the circumstances in which combined approaches are competitive with perfect surveillance.
ResearchPublished Mar 27, 2012
The U.S. Department of Homeland Security is responsible for protecting U.S. borders against terrorist threats, criminal endeavors, illegal immigration, and contraband. Unfortunately, due to budgetary and other resource constraints, it cannot "see and be" everywhere at once. In response, the Office of Border Patrol (OBP) is investigating how pattern and trend analysis and systematic randomness can be used to position border security personnel and equipment in the places and at the times they will be most effective. A RAND study examined how these techniques affect interdiction rates, incorporating results from a RAND-developed agent-based simulation model of the interaction of border patrol agents and illegal smugglers. The model allowed an exploration of how interdiction rates differ across thousands of scenarios that vary by the number of patrols, the rate of illegal flow, the size of the border, and the approach OBP takes to using pattern and trend analysis and systematic randomness. The analysis shows how approaches that combine these two techniques yield higher interdiction rates than approaches using either technique alone, and it identifies circumstances in which combined approaches are competitive with perfect surveillance.
The research described in this report was sponsored by the Department of Homeland Security and was conducted under the auspices of the RAND Homeland Security and Defense Center, a joint center of the RAND National Security Research Division and RAND Infrastructure, Safety, and Environment.
This publication is part of the RAND technical report series. RAND technical reports, products of RAND from 2003 to 2011, presented research findings on a topic limited in scope or intended for a narrow audience; discussions of the methodology employed in research; literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; and preliminary findings. All RAND technical reports were subject to rigorous peer review to ensure high standards for research quality and objectivity.
This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.
RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.