Probabilistic Warnings in National Security Crises: Pearl Harbor Revisited
نویسندگان
چکیده
Imagine a situation where a group of adversaries is preparing an attack on the United States or U.S. interests. An intelligence analyst has observed some signals, but the situation is rapidly changing. The analyst faces the decision to alert a principal decision maker that an attack is imminent, or to wait until more is known about the situation. This warning decision is based on the analyst's observation and evaluation of signals, independent or correlated, and on her updating of the prior probabilities of possible scenarios and their outcomes. The warning decision also depends on the analyst's assessment of the crisis' dynamics and perception of the preferences of the principal decision maker, as well as the lead time needed for an appropriate response. This article presents a model to support this analyst's dynamic warning decision. As with most problems involving warning, the key is to manage the tradeoffs between false positives and false negatives given the probabilities and the consequences of intelligence failures of both types. The model is illustrated by revisiting the case of the attack on Pearl Harbor in December 1941. It shows that the radio silence of the Japanese fleet carried considerable information (Sir Arthur Conan Doyle's "dog in the night" problem), which was misinterpreted at the time. Even though the probabilities of different attacks were relatively low, their consequences were such that the Bayesian dynamic reasoning described here may have provided valuable information to key decision makers.
منابع مشابه
Historical Cognition: An Investigation of Factors Affecting Reasoning about Historical Causality
We assessed whether students’ reasoning about historical causality is biased by accessibility and previous knowledge. Undergraduates in Canada provided explanations for historical events: the attacks on Pearl Harbor and September 11, 2001. Participants were then given several explanations for these events, including conventional historical and alternative conspiracist explanations, and reported...
متن کاملClosing the Book on Pearl Harbor
Recent attempts to resuscitate well-worn conspiracy theories concerning the Pearl Harbor attack are based on selective reading of documentary evidence and ignore conclusive, recently declassified materials which show that JN-25 and other Japanese naval codes were not being read by U. S. Navy codebreakers prior to the Japanese attack.
متن کاملEffects of initial surface wettability on biofilm formation and subsequent settlement of Hydroides elegans.
Hydroides elegans is a major fouling organism in tropical waters around the world, including Pearl Harbor, Hawaii. To determine the importance of initial surface characteristics on biofilm community composition and subsequent colonization by larvae of H. elegans, the settlement and recruitment of larvae to biofilmed surfaces with six different initial surface wettabilities were tested in Pearl ...
متن کاملExtension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...
متن کاملAlice in Warningland: A Large-Scale Field Study of Browser Security Warning Effectiveness
We empirically assess whether browser security warnings are as ineffective as suggested by popular opinion and previous literature. We used Mozilla Firefox and Google Chrome’s in-browser telemetry to observe over 25 million warning impressions in situ. During our field study, users continued through a tenth of Mozilla Firefox’s malware and phishing warnings, a quarter of Google Chrome’s malware...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Decision Analysis
دوره 13 شماره
صفحات -
تاریخ انتشار 2016