Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Architecting a System of SystemsResponding to Maritime DomainTerrorism by Orthogonal ArrayExperiment& Thomas Huynh, Brian Connett, Jared ‘‘Chewey’’ Chiu-Rourman, Jennifer Davis, Andrew Kessler,
Joseph Oravec, Michael Schewfelt, and Shaunnah Wark
AbstractIn this work we solve the problem of architecting a conceptual, cost-effective, near-term system
of systems (SoS) to respond to terrorist threats to the United States emanating from the maritime
domain. The threats include a weapon of mass destruction smuggled on a container ship, a com-
mandeered ship used as a weapon, and small boats used by terrorists to attack maritime commerce
traffic and critical shore infrastructures. We formulate the problem as an assignment problem, which
is then solved using the orthogonal array experiment. The optimality of the resulting SoS architectureis validated against a heuristically developed architecture and an optimal effective, but not necessar-
ily cost-effective, architecture obtained also with the orthogonal array experiment approach. The
principal results of the orthogonal array experiment method reported herein underline this successful
exploratory work in architecting an SoS. This method can be extended to architecting of other sys-
tems of systems.
IntroductionBased on previous terrorist attacks (Eberhart
2003; Fritelli 2003) and directly derived from
threats and threat scenarios described in the
Homeland Security Council’s Planning
Scenarios document (Howe 2004), three
commonly postulated terrorist attacks in the
maritime domain are (1) using a standard
cargo container to smuggle a weapon of mass
destruction (WMD) such as a nuclear device
into the United States for a terror attack,
(2) commandeering a merchant ship and
using it as a weapon against targets in the
US coastal harbors and ports, and (3) ramming
small boats packed with explosives into
US ships or coastal and shore critical
infrastructure.
Whereas there have been no reported precedents
to support a WMD attack, using a standard
cargo container to smuggle a nuclear device into
the Unites States to be detonated is known as a
viable means employed by terrorists (Eberhart
2003; Fritelli 2005).
Historical precedents of ships used as weapons
(SAW) and their destructive power lend support
to commonly postulated SAW attacks (Eberhart
2003). Exploded in the harbor of Halifax,
Nova Scotia, on December 6, 1917, the French
ammunition ship Mont Blanc killed approxi-
mately 1,900 people, injured 9,000 others, and
damaged or destroyed 1,600 buildings (Kitz
1989). On April 16, 1947, due to an onboard
fire, the French ammonium nitrate carrier
Nomenclature:C2: Command and Control
C4ISR: Command, Control,Communications, Computers,Intelligence, Surveillance,and Reconnaissance
CG: Guided Missile Cruisers
CIP: Common IntelligencePicture
COP: Common OperatingPicture
COTS: Commercial Off theShelf
DoD: Department of Defense
DoE: Department of Energy
DDG: Guided Missile De-stroyers
F/F: Find and Fix
FFG: Guided Missile Frigates
FIN: Finish
FRC: Fast Response Cutter
HPGe: High-Purity Germa-nium
LCS: Littoral Combat Ship
LRM: Linear Radiation Moni-tor
JTO: Joint Technical Opera-tions
HVU: High-Value Unit
MMG: Medium Machine Gun
MTR: Maritime Threat Re-sponse
NaI: Sodium Iodide
NPS: Naval PostgraduateSchool
O&S: Operating and Support
PACAREA: Pacific Area
PBS: Prepare the Battlespace
PoR: Program of Record
Ps: Probability of Success
RDT&E: Research, Develop-ment, Test, and Evaluation
RID: Radioisotope Identifier
T E C H N I C A L P A P E R
& 2009, American Society of Naval Engineers
DOI: 10.1111/j.1559-3584.2009.01142.x
2009 #1&79
S.S. Grandcamp exploded at the pier in Texas
City, TX, killing 581 and injuring 5,000; the
resulting fire destroyed two additional merchant
ships near the Grandcamp and burned the city
for a week, not to mention that the blast threw
the ship’s 3,000-pound anchor over two miles
(Stephens 1996). On March 27–28, 1942, in
an extensive special operations mission, the
World War I–era destroyer HMS Campbelltown
(ex-USS Buchanan) with four tons of explosives,
disguised as a German gunboat, entered the
St. Nazaire harbor under intense fire, as its
deception was uncovered by the enemy, from a
number of large-caliber guns, taking multiple
hits and suffering numerous personnel casual-
ties, and rammed into the St. Nazaire dry dock at
18 knots, exactly as planned (Smith 2003;
McRaven 1993). On May 9, 1980, in the midst
of dense fog and thunderstorms, the bulk carrier
Summit Venture hit one of the supports of the
Sunshine Skyway Bridge, a 15-mile cantilever-
truss bridge connecting St. Petersburg and
Bradenton, FL, and caused a 1,300-foot section
of the bridge to fall into Tampa Bay, killing
35 people (Mair 1982). On May 26, 2002, a tug
and barge hit a bridge portion of Interstate 40
over the Arkansas River, collapsing a 600-foot
section of the bridge, killing
14 and injuring 5 (NTSB 2004).
A small boat attack (SBA) by terrorists is the
most likely future attack because bombing of
public transportation, suicide or otherwise, is
the most common form of terror attack. The
number of terrorist attacks on transportation is
too numerous to be included here; only the most
recent attacks are cited. On October 12, 2000,
the detonation of a terrorist suicide boat packed
with high explosives severely damaged the USS
Cole, killing 17 and wounding 39 sailors (CRS
2001); the cost of repairing the ship was approx
imately $250 million (Perl and O’Rourke 2001).
On October 6, 2002, the French oil tanker M/V
Limburg suffered a similar attack 3 nautical
miles from the coast of Yemen, spilling an esti-
mated 90,000 barrels of oil and breaching both
hulls of the ship’s double-hull design (Howland
2004). Finally, two separate ferry bombings in
the Philippines in 2004 and 2005 killed over 100
people (Villanueva 2004; Pareno 2005).
To aid the United States in combating these ter-
rorist threats against its coastal harbors and
ports, enormous amounts of resources have been
allocated to obtaining intelligence on impending
attacks by these threats (Wilson 2004). Even
with intelligence availability, fighting such ter-
rorist attacks, however, remains a challenge, in
the sense of how to effectively organize, equip,
and train the US forces to thwart a planned at-
tack by these terrorists. There is thus a need to
develop a system of systems (SoS) to respond to
those terrorist attacks. An SoS is a composite
system that is composed of component systems,
each of which serves organizational and human
purposes and may be locally managed and opti-
mized independently, or nearly so, of the
objectives to be met by the composite system
(Sage and Cuppan 2001). We shall call the SoS
developed with the objectives to respond to
those terrorist attacks the maritime threat re-
sponse (MTR) SoS.
In this work, a conceptual, near-term, cost-
effective SoS architecture is developed to
respond to three attacks aimed at the San
Francisco Bay and to do so with minimal impact
on commerce and economic cost. By a concep-
tual SoS we mean a concept, not an actual SoS; it
is merely a concept proposed in an academic
project.1 As defined in the Data Analysis section,
the cost-effective measure is a dimensionless
quantity normalized through the range of costs
and performance. The near-term MTR SoS will
consist of systems that are currently in service, in
development, and commercial off-the-shelf
technologies or systems that would be available
and/or could be developed within the next 5
years. The systems that constitute the MTR SoS
include hardware, software, and human re-
sources, which, as will be seen later in the paper,
account for the total SoS cost. The MTR SoS ar-
SBA: Small Boat Attack
SOP: Standard OperatingProcedures
US: United States
USCG: US Coast Guard
USV: Unmanned Surface Ve-hicles
VAMOSC: Visibility and Man-agement of Operating andSupport Costs
WHEC: High Endurance Cut-ter
WMD: Weapon of Mass De-struction
WMSL: Maritime SecurityCutter
1The SoS architectures proposed in this paper do not rep-
resent the views of the Naval Postgraduate School, the USNavy, or the Department of Defense.
NAVAL ENGINEERS JOURNAL80 & 2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
chitecture is fixed—in the sense that the systems
that form the SoS remain unchanged. It is
intended to be a single, simplistic SoS architec-
ture that will be used to counter the three attacks
aimed at the San Francisco Bay. In countering
these attacks, the MTR SoS and its concepts
of operations must satisfy two requirements:
(1) meet and defeat the threats as early as
practicable and (2) operate with minimum im-
pact on commerce.
Huynh et al. (2007) solve the problem of archi-
tecting a conceptual, cost-effective, near-term
SoS to respond only to a SBA. In this work, we
solve the problem of architecting a conceptual,
cost-effective, near-term SoS to respond to all
three attacks—a container ship carrying a WMD
, a large commercial ship used as a weapon
(SAW), and an SBA. As in Huynh et al., due to
the scope of this paper, the concepts of opera-
tions of the MTR SoS will not be discussed here.
The target of the three attacks is the San Fran-
cisco/Oakland major metropolitan area, known
as the Bay area, which has numerous features that
make it an attractive target for terrorist attacks.
Millions of people live in the Bay area and millions
of visitors and tourists visit it annually. The Bay
area has the second-largest container port in Cal-
ifornia, which is the fourth largest in the nation.
The combined ports of San Francisco, Oakland,
and Richmond receive an average of 10 interna-
tional merchant vessels daily, primarily crude oil
tankers and container ships (Young 2005).
Numerous points of critical infrastructure
also exist in or near the San Francisco Bay. Con-
necting San Francisco to the Marin peninsula,
the Golden Gate Bridge is one of the nation’s
premier landmarks and one of the most famous
bridges in the world. The San Francisco–
Oakland Bay Bridge is a vital economic connec-
tion between San Francisco and Oakland. There
are other large public transportation systems
and hubs, such as two large airports, numerous
ferries, rail lines, and three other bridges of
significant size. Any response to a maritime
threat that would curtail or stop transportation
in the Bay area would have significant economic
impact estimable in billions of dollars (CQ 2002;
Arnold et al. 2006). In addition, a large explo-
sion, fire, or chemical cloud at the highly visited
Fisherman’s Wharf waterfront tourist area
(approximately 10 million visitors in 2004) has
the potential for mass casualties and the ‘‘cine-
matic’’ effect terrorists pursue. Furthermore, the
Bay area is also relatively isolated from large
military concentration areas, such as the West
Coast naval assets in San Diego and Seattle. The
main assets for immediate maritime defense are
therefore US Coast Guard (USCG) units already
in the Bay area. Even USCG PACAREA and
District 11 assets are spread from the Oregon to
Mexican borders. Assistance from the other as-
sets may thus be several days in arriving in the
San Francisco Bay.
In the WMD scenario, some information con-
cerning the origin and the time of departure of a
smuggled nuclear WMD is available, but the in-
formation is insufficient and not specific enough
to allow identification of a single vessel that car-
ries the WMD. As available intelligence
information received does allow the search to be
focused on 20 merchant ships inbound daily to
the Bay area, a group of 20 potential attacking
vessels must therefore be of suspect and subject
to identification (Kessler et al. 2006). Two types
of nuclear devices are postulated:
(1) a nuclear device that uses a significant
amount of either enriched uranium (4 25 kg)
or Plutonium-239 (greater than 8 kg); or (2) a
radiological dispersion device or ‘‘Dirty Bomb,’’
which is composed of a small amount of Cesium-
137, Americium-141, Strontium-90, or Cobalt-
60 wrapped in approximately 100 pounds of
conventional explosive. Any of the two devices,
shielded by either a 0.64–5.08-cm-thick square
lead container or a 128-cm layer of high-density
nitrogen, is placed, undetected by port authori-
ties or the originating company, in a cargo
container on one of the 20 container vessels that
have departed a common Far East port within a
24- to 48-hour period for the United States. No
terrorists are assumed to be onboard the ship to
help ‘‘shepherd’’ the device to its destination.
NAVAL ENGINEERS JOURNAL 2009 #1&81
Oblivious to its presence, the ship’s crews and
owners are expected to cooperate with friendly
forces when approached.
In the SAW scenario, a team of terrorists on-
board the ship in a legitimate capacity—
operating and navigating the vessel and/or per-
forming other tasks—would need to seize
control of the vessel at the last possible moment.
Presumably, there are 10 terrorists, 2 for each of
five major control stations: bridge, engineering
control, after steering, and two engine rooms.
The terrorists are armed and will defend against
boarding by MTR forces. If the ship is boarded
(or an attempt to board is made) by friendly se-
curity forces, the terrorists will offer armed
resistance and will seize control of the ship if
they have not already commandeered it.
The SBA scenario involves protection of five oil
tankers inbound to the Bay area and 13 ferries
operating on five different routes. The arrival of
the five oil tankers is uniformly distributed over
a 24-hour period; the ferries operate 12 out of
every 24 hours. The scenario also requires the
constant protection of points of critical infra-
structure representing strategic targets such as
oil offload terminals, pipelines, power facilities,
and so forth. The attacker uses a single 30-foot
civilian speedboat with a top speed of 40 knots.
The speedboat is loaded with 1,000 pounds of
conventional explosives.
An MTR mission includes searching and detect-
ing the threat, neutralizing the detected threat,
and supporting and maintaining the MTR units.
To execute the WMD, SAW, and SBA missions,
an MTR SoS performs five top-level functions:
(1) Command, Control, Computers, Communi-
cations, Intelligence, Surveillance, and
Reconnaissance (C4ISR); (2) Prepare the Battle-
space; (3) Find/Fix Threat; (4) Finish Threat;
and (5) Sustain. The C4ISR function ensures
that the SoS has the appropriate means to carry
out a mission in terms of command and control
and to have appropriate communication chan-
nels to keep the MTR forces informed of the
status of operations.
The Prepare the Battlespace function ensures
that the SoS has the appropriate personnel,
equipment, and platforms to carry out the mis-
sions; it also renders the area of operations ready
for countering a potential attack. The Find/Fix
and Finish functions (the word ‘‘Threat’’ being
left out for convenience) are executed as the
MTR forces actually carry out the missions. The
Sustain function ensures that all units and
equipment are properly supported and main-
tained for the duration of operations. As the
system concepts for Sustain are unique (Kessler
et al. 2006), system concepts corresponding only
to the first four top-level functions are identified
for use in an MTR SoS, and associated concepts
of operations are assessed for cost, applicability,
and utility. As will be seen later, some functions
may be supported by as many as four different
system concepts, whereas the others by as few as
two concepts. We do not suggest that the system
concepts considered here form a complete set of
system solutions. Rather, they are potential ‘‘best
fit’’ solutions associated with the top-level SoS
functions. The ‘‘best fit’’ solutions are meant to
be the solutions that result from a combination
of the operational experience of the SEA-9 class
and the information collected from its research.
Simulations of the selected system concepts
along with the various concepts of operations
are conducted to determine the effectiveness of
an SoS in each individual scenario and in all the
scenarios combined. The different missions
performed by an MTR SoS are not necessarily
congruent, but they all affect the architecture of
the MTR SoS.
As in Huynh et al. (2007), the focus of this
paper2 is the methodology employed to develop
architectures of a conceptual, cost-effective,
near-term MTR SoS to respond to the three
maritime-domain threats and to do so with
2This focused area is only a part of a major campus-wide,
integrated systems engineering and analysis project car-ried out at the Naval Postgraduate School by the academic
year 2006 SEA class, known as SEA-9, whose members
are all but the first author of this paper, who is their ad-visor.
NAVAL ENGINEERS JOURNAL82 &2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
minimal impact on commerce and economic
cost. By cost effectiveness we mean maximum
performance at a minimum cost; as defined in
the Data Analysis section, the cost-effective
measure is a dimensionless quantity normalized
using the range of costs and performance.
The MTR SoS will consist of systems that are
currently in service, in development, and com-
mercial off-the-shelf technologies or systems
that could be developed within the next 5 years
(Kessler et al. 2006).
Intelligence is always needed before a response is
carried out, and the MTR SoS needs and makes
use of intelligence. Due to the limited scope of
this work, we consider any intelligence system
such as national, military, and human assets to
be external to the MTR SoS; the boundary of the
MTR SoS does thus not enclose these intelli-
gence assets, but intelligence produced by them
can be received and used by the MTR SoS. The
MTR SoS itself, however, has its own internal
intelligence provided to the components within
the SoS boundary; the nature of the internal in-
telligence will be discussed later. For practical
reasons, we also assume an MTR SoS solution to
be free from any political and jurisdictional
issues that can potentially exist.
The use of specially constructed tables known as
orthogonal arrays for designing robust products
and processes was originally espoused by
G. Taguchi in Japan in the 1950s and 1960s.
Taguchi (1978, 1993), Taguchi and Wu (1980),
and Roy (1990) contain a detailed description of
the Taguchi method. It has been employed in-
creasingly in many American industries, such as
AT&T, ITT, Xerox, and Ford. As in Huynh
(1997), Huynh and Gillen (2001), and Huynh
et al. (2007), our work here is a novel applica-
tion of the orthogonal array experiment to an
SoS architecting problem. The orthogonal array
experiment is extremely efficient and, for this
class of problems, provides optimal SoS archi-
tecture design. Optimality is ensured by the
Taguchi method (Taguchi 1978, 1993;
Taguchi and Wu 1980; Roy 1990). Parentheti-
cally, the orthogonal array experiment and the
Taguchi method are used interchangeably in
this paper.
The scope of this paper emphasizes the mechan-
ics of applying the Taguchi method to solve the
MTR SoS architecting problem. We will there-
fore confine our discussion of the Taguchi
method to the architecting problem at hand,
without delving into all the statistical back-
ground and details of the Taguchi method as it
applies to the quality control problem (Taguchi
1978; Taguchi and Wu 1980; Roy 1990; Bendell,
Disney, and Pridmore 1989).
Our goals in this paper are (1) explain our
exploratory work in applying the orthogonal
array experiment to solve system architecting
problems, which we treat as assignment prob-
lems; (2) delineate the mechanics of solving the
system architecting problems or assignment
problems of this kind and the procedures to
process experimental results; and (3) illustrate
our approach with the problem of architecting
an MTR SoS to respond to the terrorist attacks
involving a nuclear device smuggled on a con-
tainer ship, SAW, and small boats.
In the remaining of the paper, we define the
problem of architecting an MTR SoS for the
MTR missions and formulate it as an assignment
problem. We follow with a discussion of the ad-
aptation of the Taguchi method, which involves
selecting an appropriate orthogonal array, iden-
tifying the factors and their levels for the
problem at hand, running the orthogonal array
experiments, and then analyzing the experimen-
tal results to obtain an optimal cost-effective SoS
architecture. To verify that the resulting cost-
effective SoS architecture is indeed a ‘‘best’’
architecture, we compare its performance and
cost with those of a heuristically developed
architecture and an optimal effective, but not
necessarily cost-effective, architecture obtained
also with the orthogonal array experiment ap-
proach. Parenthetically, a ‘‘best’’ architecture is
in the sense that it satisfies the required perfor-
mance while keeping the cost as low as possible.
We then end with some concluding remarks.
NAVAL ENGINEERS JOURNAL 2009 #1&83
MTRSoSArchitectingas anAssignmentProblemWe first define the problem of architecting an SoS
to respond to the three maritime terrorist threats
and then formulate it as an assignment problem.
MTR SoS ARCHITECTING PROBLEM
As its system concepts are unique and common
to all architectures (Kessler et al. 2006), Sustain
will not be included in the formulation of the
MTR SoS architecting problem as an assignment
problem. Again, we do not suggest that the
system concepts considered here represent all
possible system solutions; rather, they are
potential ‘‘best fit’’ solutions associated with the
top-level SoS.
C4ISR—The C4ISR has four elements:
Command and Control (C2), Communicate,
Compute, and Provide Intelligence, Surveillance,
and Reconnaissance. The C4ISR system attri-
butes are span of control, command structure,
and the suite of communications and computing
tools employed. ‘‘Span of control’’ relates to the
size of the geographic region and the number of
operating units in the region under a single com-
mander’ control. The span of control can be
Area or Local. An Area commander controls the
forces to search and/or protect approximately
20 commercial ships across the Pacific Ocean as
well as within San Francisco Bay. A Local com-
mander controls the forces to protect a single
high-value unit (HVU).
A command structure can be control-free,
selective control, mission oriented, problem
bounding, problem solving, objective oriented,
interventionist, or cyclic. In the highly distrib-
uted control-free structure, the commander
assigns missions to his subordinates, who then
employ all the assets available to them to
accomplish their missions. In a selective-control
structure, the higher command issues mission
orders, expects subordinates to take broad and
deep initiatives, follows the battle in detail, and
remains prepared to intervene. In a mission-
oriented structure, each command level assigns
missions to its subordinates and permits them to
define further details of the military situation,
beginning with selecting the objectives necessary
to accomplish the missions. In a problem-
bounding command structure, the higher
command composes its directives in terms of the
objectives to be accomplished but couches them
in very general terms. A problem-solving
approach involves issuing directives that articu-
late both missions and objectives for two levels
of subordinates and substantial guidance as to
how the objectives are to be achieved. An objec-
tive-oriented structure allows some level of trust,
creativity, and initiative in subordinate com-
mands, but it stresses synchronization of assets
and actions. An interventionist structure relies
heavily on central authority to issue directives,
but it also maintains very detailed information
about the battle and attempts centralized control
through detailed directives. The greatest degree
of centralization occurs in a cyclic structure in
which the senior command issues orders to all
subordinates on the basis of a preset cycle time.
In the maritime domain, the objective-
oriented structure is the most appropriate C2
structure option (Alberts and Hayes 1995).
As it incorporates the advantages of the prob-
lem-bounding and problem-solving structures, it
allows increased coordination and continuous
contact between superior and subordinate com-
mands as well as among subordinate commands.
The problem-solving approach will also be a C2
structure option, which, as a back-up structure,
would be used in the event of either net-centric
technology failure or lack of trust in either tech-
nology or subordinates. MTR communications
infrastructure must be near real time, transoce-
anic, and interoperable across local law
enforcement, National Fleet, and coalition
forces. The communications system must ensure
that messages, data, voice, and images ex-
changed between parties in the MTR SoS are
transmitted and received efficiently with mini-
mal delays. Internal communications take place
within a small group, task force, or agency;
external communications refer to communica-
tion links among all MTR actors. Whereas the
internal communications rely on local area
NAVAL ENGINEERS JOURNAL84 &2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
networks, the external communications employ
wireless networks and paging systems.
The two main computing system components
are information assurance and data fusion.
Information assurance refers to the ‘‘technical
and managerial measures designed to ensure the
confidentiality, possession or control, integrity,
authenticity, availability and utility of informa-
tion and information systems’’ (Answers.com
2006). The MTR information assurance system
will thus concentrate on protecting and securing
the systems and information within the MTR
domain. As information is being transmitted,
received, processed, and stored within the MTR
domain, the MTR system will employ encryp-
tion and authentication to protect information
against unauthorized access, hash the informa-
tion to protect it from modification without
notice, and implement system redundancy to
protect the missions from the loss of informa-
tion. To prevent the loss of information or
services to the commanders, redundant systems
are included for disaster recovery. The Defense
in Depth Security Model (Harrison 2004) is the
guiding framework for the MTR information
assurance system concept.
Data fusion must enable a high level of situa-
tional awareness while minimizing the chance of
information overload. Data/information certi-
fied as authentic from the trusted external
sources is then processed and correlated based
on the set of rules and requirements provided by
the commanders. A hybrid data fusion concept
employs both rule-based and self-learned algo-
rithms.
The intelligence component of C4ISR sends the
entire fused common operating picture (COP) to
all operating units, the entire fused COP blended
with the common intelligence picture (CIP) to all
teams, and specific fused COPs blended with the
CIP to the appropriate teams.
Based on speed and cost, four selected C4ISR
system concepts have common Communicate,
Compute, and Provide Intelligence components
but different C2 components. The Communicate
concept is a combined Local Area Network
(LAN), Wireless Metropolitan Area Network
(WMAN), and Wide Area Paging (WAP). The
Compute concept is Defense in Depth and
Hybrid Data Fusion. The Provide Intelligence
concept is Customized COP and CIP. The C2
system concepts are Area Problem Solving, Area
Objective Oriented, Local Problem Solving, and
Local Objective Oriented.
Prepare Battlespace for WMD and SAW Mis-sions—Preparing the Critical Infrastructure and
activating Preplanned Operations Orders are,
for the WMD mission, primarily notifying the
Department of Energy (DoE) Joint Technical
Operations (JTO) Teams as well as other
existing chemical and biological specialists
throughout the Department of Defense (DoD)
and other various government and civilian
agencies, and, for the SAW mission, identifying
the critical structures and population centers
that could be affected and take the necessary
efforts to protect those areas to the greatest ex-
tent possible.
Assemble Forces will gather the forces such as
the special operations forces, marines, and
boarding teams specially trained to use search
equipment and to execute visit, board, search,
and seizure tactics. Deploy Forces identifies the
locations of the assets and platforms to be de-
ployed and their response capability. For both
WMD and SAW missions, the platforms would
need to be deployable for 49 days in order to
intercept multiple ships. This need quickly nar-
rows to the use of vessels from the DoD and the
Department of Homeland Security (USCG).
One-half of Navy ships in any location are
assumed to be available for surge operations at
any time. Grouped by availability, the system
concepts are then: (1) Current Ship Systems such
as US Navy Guided Missile Frigates (FFG),
Guided Missile Destroyers (DDG), Guided
Missile Cruisers (CG) and USCG High Endur-
ance Cutters (378-foot High Endurance Cutter
[WHEC]); (2) the Program of Record (PoR)
Littoral Combat Ship (LCS) and Maritime
NAVAL ENGINEERS JOURNAL 2009 #1&85
Security Cutter (WMSL); and (3) Commercial
Off-The-Shelf (COTS) Modification (commer-
cial existing systems capable of modification to
meet the missions) such as a converted National
Steel and Shipbuilding Company Tote Orca
carrier that houses up to six smaller 118-foot
high-speed ‘‘Wally’’ boats. The current Ship
Systems (CG, DDG, FFG, and WHEC) and the
Program of Record Ships (LCS and WMSL)
need AOE (i.e., underway replenishment ship)
logistical support, whereas the COTS modifica-
tion option will be able to operate independently
for over 20 days.
PBS for SBA Mission—Four system concepts are
selected for the SBA mission: (1) two small
escorts, (2) two medium escorts, (3) two small
escorts and two medium escorts, and (4) high-
value vessel-based escort teams. A small escort is
a highly maneuverable, small boat (25–35 feet
long) with a top speed of 40 knots and a crew of
four or five. A medium escort is a larger craft
(80–150 feet long) with inboard engines, a top
speed of 35 knots, and a crew of 20. For exam-
ple, the US Navy 34-foot Dauntless Boat Units
and the 110-foot Coast Guard cutter are, re-
spectively, small and medium escorts. The
medium escorts has a longer endurance, which
affects the number of vessels required in an
overall force structure. The small escort mounts
one medium machine gun (MMG) in each posi-
tion. The medium escort has a medium caliber
gun only in the bow position and two MMGs on
the port and starboard positions. The team on-
board the HVU consists of six 2-man teams,
each armed with a light machine gun.
Find/Fix for WMD Mission—Find/fix of the
WMD mission involves conducting a search of
each container ship to determine if any of the
containers holds a nuclear device. Find/Fix
considers four system concepts: (1) the Linear
Radiation Monitor (LRM) and Fission Meter,
(2) the LRM and the High-Purity Germanium
(HPGe) Radioisotope Identifier (RID), (3) the
sodium iodide (NaI) detector and Mission
Meter (FM), and (4) the NaI detector and
HPGe RID.
A 24.4-meter long, self-contained g-ray
detector system for use in the interdiction and
location of nuclear materials, the LRM has
18 g-ray detectors and 9 neutron detectors on a
rope, with a control module at the operator end
for display and alarms. Lowered down
between the guide rails between individual
containers, the LRM detector system can simul-
taneously scan up to eight containers and allows
actual detector elements to be significantly
closer (on the order of 1.5–6 m). Placed in a
given cargo hold, the FM can collect neutron
data over extraordinarily long periods of time,
often necessary with lower energy emitting
nuclear devices that may be shielded. Being not
focused on any one particular container, the FM,
which collects neutron emissions throughout
the hold, can also search multiple containers.
An HPGe RID has superior performance in
identifying radionuclides in static conditions
(i.e., identifying the isotope once the source has
been located) (Keyser et al. 2005). Coupled with
a device capable of locating the source, it can be
highly successful in finding illicit materials. A
complement to the g-ray identifier (Rowland
2006), the FM detects neutron sources beyond
what would be expected from background.
Finally, a sodium iodide (NaI) detector is effec-
tive in detecting a point source, but its size and
weight limit its capabilities onboard a cargo
carrying container ship.
Find/Fix for SAW Mission—Find/Fix for the SAW
mission involves the only system concept—
searching for and identifying suspected
terrorists among the crew. Identification
mechanisms are fingerprinting, database
searches, and biometric data collection and
comparison. A biometric search system will
be feasible within the next 5 years and thus
satisfies the near-term requirement for emerging
technology (Hunton 2005).
Find/Fix for SBA Mission—Searching for
surface contacts during escort operations,
Find/Fix for the SBA mission involves visual
means (e.g., binoculars) or both radar and
visual means.
NAVAL ENGINEERS JOURNAL86 & 2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
Finish for WMD Mission—If a nuclear device is
found on a vessel, specialized personnel from
the DoE will handle the response functions,
which remain out of the scope of the MTR SoS.
In unforeseen circumstances, or by order of DoE
or higher authority, a suspect vessel may need to
be sunk. An assumption of a cooperative mer-
chant and no terrorists onboard the vessel then
implies only one system concept for Finish:
Sink/Disable.
Finish for SAW Mission—Two SAW Finish
concepts are (1) escort potential attackers and
recapture seized vessels and (2) escort potential
attackers and disable seized vessels. A variety of
weapons and platforms could disable or sink a
large merchant vessel, such as command-
activated, deployable mines potentially to be
fielded in the 5-year timeframe.
Finish for SBA Mission—Added to the weapons
organic to the escorts are armed helicopters and
unarmed unmanned surface vehicles (USV). An
armed helicopter offers two potential benefits:
challenge suspicious small boat traffic and ‘‘clear
a path’’ for the HVU and offer additional
engagement capability. An unarmed USV offers
these capabilities: allow friendly forces to
physically impose themselves between suspi-
cious vessels and the HVU without risk to
personnel to deliver challenges and warnings
at greater distances from the HVU, shoulder
suspect vessels or ram identified targets, and
complicate enemy plans by forcing the enemy to
take action earlier than desired. Four SBA Finish
system concepts are (1) organic weapons only,
(2) organic weapons and armed helicopters,
(3) organic weapons and USVs, and (4) organic
weapons, USVs, and armed helicopters.
Table 1 summarizes the seven functions and
their associated system concepts. Note that the
numbers 1, 2, and 3 in the parentheses stand for
the WMD, SAW, and SBA missions, respectively,
and PBS, F/F, and FIN for Prepare Battlespace,
Find/Fix, and Finish, respectively. Both F/F(2)
and FIN(2) are supported by two system con-
cepts; PBS(1,2) is supported by two concepts;
and C4ISR, PBS(3), and FIN(3) all are carried
out by four systems concepts. An MTR SoS ar-
chitecture is a combination of these system
concepts. But, which pertinent system concept is
selected to perform a top-level function, so that,
together, the selected system concepts constitute
an optimal MTR SoS architecture? The optimal
architecture will maximize the probability of
mission success while minimizing the cost of de-
lay to commerce caused by the response to the
threats and the cost associated with the SoS.
Answering this question amounts to solving an
assignment problem to determine which perti-
nent system concept is assigned to a top-level
function, so that, put together, the assigned sys-
tem concepts result in an optimal MTR SoS
TABLE 1: System Concepts per Function Considered for SoS Architecture
Top-level
function
System concept
1 2 3 4
C4ISR Area—problem solving Local—problem solving Area—objective-
oriented
Local—objective-
orientedPBS(1,2) (WMD,
SAW)
AO—CG/DDG/FFG/
WHEC
AO—LCS/WMSL Modified COTS (Mer-
chant)PBS(3) (SBA) Small escorts Medium escorts Small & medium escorts HVU-based teamsF/F(1) (WMD) LRM & fission meter LRM & HPGe RID NaI RID & fission meter NaI & HPGe RIDF/F(3) (SBA) Visual means Visual means and radar — —FIN(2) (SAW) Escort potential attack-
ers & recapture seized
vessels
Escort potential attackers &
disable seized vessels
— —
FIN(3) (SBA) Organic weapons only Organic weapons & armed
helicopters
Organic weapons and
USVs
Organic weapons,
USVs & armed he-
licopters
NAVAL ENGINEERS JOURNAL 2009 #1&87
architecture, in the sense that it maximizes some
objective function of performance and cost.
We now formulate the MTR SoS architecting
problem as an assignment problem.
MTR SoS ARCHITECTING AS AN ASSIGNMENT
PROBLEM
Let F denote the set of the seven SoS top-level
functions, Fj, j 5 1, . . ., 7, and Sj the set of system
concepts that can perform function Fj. Let X de-
note an allocation function defined according to
Xjk ¼1; if system concept k of Sj is assigned to Fj
0; otherwise
�
where j 5 1, . . ., 7, and k 5 1, . . ., |Sj|; |Sj| denotes
the number of elements (i.e., system concepts) in
Sj. As shown in Table 1, |S1| 5 |S3| 5 |S7| 5 4,
|S5| 5 |S6| 5 2, and |S2| 5 3.
Probability of Mission Success—An MTR
mission is declared successful if each of the three
terrorist attacks is successfully stopped, i.e., the
functions satisfy the mission success criteria (i.e.,
operational effectiveness requirements) spelled
out in Table 2 while minimizing delay and
impact on commerce. The mission success or
failure is related to the allocations of the system
concepts to the top-level functions; that is, it is a
function of Xjk. The probability of mission
success, Ps, is the fraction of the number of
Monte Carlo simulation runs in which the
missions are a success. It is therefore also a
function of Xjk. The probability of mission
success is obtained by Monte Carlo simulation.
The Monte Carlo method is a convenient and
useful method for obtaining solutions to the
problem at hand.
Cost—The total cost of an SoS architecture
depends on the allocations Xjk. It is contributed
by the cost of procurement of both additional
existing and new SoS components (platforms),
the cost of operating and supporting (O&S) the
SoS, and the cost associated with time delay
suffered by commerce while the SoS is respond-
ing to a potential attack, and the cost associated
with damage to the physical entities resulting
from failures of the SoS to neutralize the terrorist
threat. The delay cost is determined in terms
of time delay to commerce via a mission-level
EXTEND models described in (Kessler et al.
2006). (EXTEND is a modeling and simulation
tool developed by Imagine That Inc., San Jose,
CA.) The damage cost is determined from these
same models in terms of the percentage of sys-
tem failures to neutralize the terrorist threats. All
costs are in monetary units (FY2006$M).
For a given SoS architecture, whereas the cost
of procuring the SoS is fixed, the remaining costs
change with mission execution and are gener-
ated by Monte Carlo simulation (Kessler et al.
2006). The cost of procuring the SoS depends on
the number of platforms in the SoS architecture
and the cost of each platform. The platform
costs are obtained from official DoD budget
TABLE 2: Mission Success Criteria
Function
Mission
WMD SAW SBA
C4ISR Process time � 24 h Process time � 30 min (depend-
ing on intelligence latency)
Process time � 1 h
PBS Time to assemble teams
& deploy vessels o24 h
Time to assemble teams
& deploy vessels o24 h;
Alert team with Pilot
Immediately start clearing non-essen-
tial boats; Time to assemble crews &
deploy escort vehicles o1 hFind/Fix Time to search 9400 TEU ship
o160 h; Pd � 0.96, PFA �10� 6; Dwell time per container
� 3 min
Determine Potential Attack
Vehicle status upon boarding;
Search Potential Attack Vehicle
with escort teams
Detect incoming small boats at suffi-
cient range to allow warning, ID, and
two shots prior to vehicle approach;
Ps � 0.94Finish Transfer to DoE JTO Time to disable Potential Attack
Vehicle � 2 min; Ps � 0.91
Time to defeat attack � 15 s; � 0.94
NAVAL ENGINEERS JOURNAL88 & 2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
documents (OUSD [Comptroller] 2004), Jane’s or
the original equipment manufacturer, and official
USCG materials for USCG Deepwater assets
(USCG Fact File 2004 and 2005); the costs of new
systems are obtained by modifying the costs of the
existing systems that are analogous to the new
systems. Parenthetically, PoR National Fleet as-
sets, such as the LCS and the National Security
Cutter (WMSL), are assumed to be sunk costs and
are therefore not included in the total cost compu-
tation. The O&S cost reflects the number of days
per year during which the platforms in the SoS
would be involved in MTR-related activities and
the daily O&S rate, which accounts for both the
system and personnel O&S rates. The latter are
obtained by adjusting the data drawn from the
Naval Center for Cost Analysis (NCCA) Visibility
and Management of Operating and Support Costs
(VAMOSC) database (NCCA), for the expected
amount of time during which the SoS would be
involved in annual MTR-related training, exer-
cises, and operations. If the needed VAMOSC data
do not exist, the existing analogous VAMOSC
data are used for cost scaling. The VAMOSC data
include all annual costs for personnel, mainte-
nance, fuel, and expendables. The average O&S
costs for selected classes of ships and aircraft form
the basis for MTR SoS platform O&S cost esti-
mates. Since the emphasis of this paper is the use of
the Taguchi method to optimize MTR SoS archi-
tecture, we will not delve into the details of the
estimation of the O&S cost, which can be found in
Kessler et al. (2006).
Objective Function—In this work, we introduce
a dimensionless objective function, z, which
results from mapping the performance measure
(Ps) and the total system cost (C) by means of a
rule r,
z ¼ rðPs; CÞ
The objective function z is thus a function of the
allocations Xjk. A specific rule r resulting in a
dimensionless objective function is elaborated in
the Data Analysis section.
The problem of optimizing the MTR SoS
architecture amounts to determining the alloca-
tions Xjk that maximize the probability of
mission success while minimizing the cost of
delay on commerce and the system cost. By
virtue of r, the problem becomes one of deter-
mining an assignment of the system concepts to
the seven SoS top-level functions that maximizes
the objective function z. We solve this problem
using the orthogonal array experiment approach
employed in Huynh (1997) and Huynh and
Gillen (2001).
TheOrthogonalArrayExperimentOrthogonal arrays have a mathematical founda-
tion in linear algebra, specifically, the Galois
field theory; they began with Euler as Latin
squares in the 18th century (Euler 1849). R.A.
Fisher was the first to apply them extensively.
Factorial design of experiments was first intro-
duced by Fisher in the 1920s. For a full factorial
design the number of possible conditions or ex-
periments is Lm, where m is the number of
factors and L is the number of levels for each
factor. Taguchi’s partial factorial design requires
only a smaller number of unique factor/level
combinations captured in an orthogonal array.
All combinations of levels occur an equal num-
ber of times in every pair of columns of an
orthogonal array. This combinatorial property
ensures the orthogonality property (Pao,
Phadke, and Sherrerd 1989); all columns in the
array are thus orthogonal to each other.
DEFINITION OF FACTORS AND LEVELS
A key step in designing orthogonal array exper-
iments is defining the factors and their levels. In
the Taguchi parlance (Roy 1990), factors are the
causes that produce an effect, levels are the way
in which the factors are changed, and the re-
sponse is the result produced by the factors. In
our approach, we identify the SoS top-level
functions as factors; thus, C4ISR, PBS(1,2),
PBS(3), F/F(1), F/F(3), FIN(2), and FIN(3) are
the factors. From here on, functions and factors
are used interchangeably. Care should be exer-
cised in choosing factors and levels
appropriately so as to take advantage of the es-
tablished orthogonal arrays. In general, there is
no systematic way to define factors and their
NAVAL ENGINEERS JOURNAL 2009 #1&89
levels for assignment problems (Huynh 1997).
For the problem at hand, the levels of a function
(factor) are defined as the different system con-
cepts that can perform the function. The system
concepts supporting a function are thus the lev-
els of the function (factor).
THE ORTHOGONAL ARRAY EXPERIMENT
DESIGN
At the outset, for the problem at hand, an
experiment is a computer simulation. As
mentioned above, for a full factorial design the
number of possible combinations of these system
concepts, 3,072, need be evaluated for their
effectiveness, using Monte Carlo simulation.
Each simulation run takes more than 3 minutes
on an Intel Pentium (R) CPU 3.40 GHz Dell
computer employed in this work. It would
therefore take 704 days of continuous running of
the simulation to evaluate those potential com-
binations (architectures), with each combination
requiring 100 simulation runs. This would be
impractical.
The use of orthogonal arrays reduces the number
of experiments drastically. Taguchi and Wu
(1980) have tabulated a number of orthogonal
arrays that can be conveniently used to construct
orthogonal designs for any experimental situa-
tion. Given the number of factors (7) and levels
(2–4), the appropriate orthogonal array for the
problem at hand is a portion of the mixed L32
(21, 49) orthogonal array (Taguchi and Konishi
1987), shown in Table 3. The columns in the or-
TABLE 3: The Orthogonal Array Reduced from L32ð21; 49Þ
TRIAL C4ISR PBS(1,2) PBS(3) F/F(1) F/F(3) FINISH(2) FINISH(3)
1 1 1 1 1 1 1 12 1 2 2 2 2 2 23 1 3 3 3 1 1 34 1 1 4 4 2 2 45 2 1 1 2 2 1 36 2 2 2 1 1 2 47 2 3 3 4 2 1 18 2 2 4 3 1 2 29 3 1 2 3 2 1 210 3 2 1 4 1 2 111 3 3 4 1 2 1 412 3 3 3 2 1 2 313 4 1 2 4 1 1 414 4 2 1 3 2 2 315 4 3 4 2 1 1 216 4 1 3 1 2 2 117 1 1 4 1 2 2 318 1 2 3 2 1 1 419 1 3 2 3 2 2 120 1 2 1 4 1 1 221 2 1 4 2 1 2 122 2 2 3 1 2 1 223 2 3 2 4 1 2 324 2 3 1 3 2 1 425 3 1 3 3 1 2 426 3 2 4 4 2 1 327 3 3 1 1 1 2 228 3 1 2 2 2 1 129 4 1 3 4 2 2 230 4 2 4 3 1 1 131 4 3 1 2 2 2 432 4 2 2 1 1 1 3
NAVAL ENGINEERS JOURNAL90 & 2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
thogonal array correspond to the factors (func-
tions). Each of the 32 rows or experiments (or
conditions) corresponds to an architecture trial.
For example, the seventh experiment (row) in-
volves the C4ISR locally controlled, problem
solving concept (system concept [level] 2), the
PBS(1,2) modified COTS (system concept [level]
3), the PBS(3) small and medium escorts option
(system concept [level] 3), the F/F(1) NaI and
HPGe RID (system concept [level] 4), the F/F(3)
visual means and radar (system concept [level]
2), the FIN(2) escort potential attackers and re-
capture seized vessels (system concept [level] 1),
and the FIN(3) organic weapons only (system
concept [level] 1). We now thus deal with only
32 experiments.
EXPERIMENT
Experimental Procedure—Carrying out an exper-
iment for each row of the orthogonal array
means performing a Monte Carlo simulation of
the MTR SoS response, z, to the three types of
attack. The Monte Carlo simulation involves
between 500 and 2,000 simulation runs of the
EXTEND MTR mission model, each of which
produces success or failure of the WMD, SAW,
and SBA missions. Again, the missions are de-
clared success if the mission success criteria in
Table 2 are satisfied. A statistical analysis of the
Monte Carlo simulation results then yields the
probability of success for the tree missions.
MTR Modeling and Simulation—MTR modeling
and simulation aid in the evaluation of the effec-
tiveness of the proposed SoS architectures. To
strictly evaluate the capability of the SoS, cost is
not included in the simulation. Cost will be ap-
plied later to determine affordability and the
possible need for trade-off considerations. In
addition to the EXTEND MTR mission model,
the modeling tools include also a Microsoft Ex-
cel model and the Fatigue Avoidance Scheduling
Tool (FAST) v1.0.26. Since this paper is focused
on the application of the Taguchi method, we
will not elucidate these models in detail. We will,
however, provide a cursory discussion of only
the MTR mission model. Regarding the Excel
and FAST model, we mention only that the level
of training and proficiency in FAST is assumed
to be at peak performance for all units and
personnel involved and that the Excel model
determines the probabilities associated with a
subfunction and a subsystem, which are then
used in the determination of the overall SoS
capability.
MTR Mission Model—The MTR mission model
captures the capabilities of the various subsys-
tems and equipment to be employed in the three
missions as well as the operating limitations of
the personnel and equipment. Also incorporated
in the model are the location and availability of
assets to be used in each mission and the relative
distances to be traversed in order to respond to
the maritime threat, the actual threat location,
vessel sizes, latency of information, actions of
the terrorists, random variation of search and
detection times, and the probabilities of detec-
tion, false alarm, and success. The MTR mission
model represents the C4ISR, PBS, Find/Fix, and
Finish functions. Constrained by the scope of the
paper, we will not describe the modules of the
MTR mission model. We also hasten to add that
the accuracy and fidelity of the models used in
the simulation affect the response of each exper-
iment, and, hence, the Taguchi analysis results.
Care must thus be taken to ensure the different
models in the simulation are accurate and have a
similar level of fidelity. Table 4 depicts the mod-
ules that represent the MTR SoS functions
carried out in each of the WMD, SAW, and SBA
three missions. We will not elaborate on the
modules, whose detailed descriptions can be
found in (Kessler et al. 2006). We briefly de-
scribe, however, as an example, the application
of the modules to the SBA mission. Four mod-
ules represent the sub-functions of the C4ISR
function—Receiving Communications, Com-
mand and Control, Compute, and Transmit
Communications. Two modules—Mission
Database and Initial Orders—represent the
PBS function. Finally, four modules represent
the sub-functions of the Finish function—
Small Boat Attacker Generator, Helicopter
Engagement, MTR Escorts or Teams Onboard
Engagement, and Delay to Commerce. Input to
NAVAL ENGINEERS JOURNAL 2009 #1&91
the EXTEND MTR mission simulation also in-
cludes the L32 (21, 49) orthogonal array, the SoS
architecture alternatives with their components
and pertinent characteristics. Output from the
MTR mission model is mission success or failure
for each Monte Carlo run. Post-processing yields
the probability of mission success for each of the
32 trials (experiments). Table 5 displays the ex-
perimental results—the probability of mission
success (in the second column) and the total cost
(in the third column) for each of the 32 trials—
and the dimensionless response (in the fourth
column), which is defined in the section that
follows.
DATA ANALYSIS
As in Huynh (1997) and Huynh and Gillen
(2001), the data analysis performed here
consists of the standard analysis outlined by
Taguchi (Roy 1990). The purpose of the data
analysis is to study the main effects of each of the
factors (the SoS top-level functions) in order to
identify the optimal condition (Roy 1990).
The main effects indicate the general trend of
the influence of the factors, that is, the effect of
a factor (function) on the objective function
when it goes from one level (system concept)
to another. The analysis of the main effects
involves the calculation of the averages for the
levels of all factors. We now describe the data
analysis.
Let Ne be the number of experiments (rows), aij
denote the level of the column (function or fac-
tor) in the ithh
row (trial, experiment, or
condition), and z denote the response (i.e., the
objective function) corresponding to the ith row.
The architectural trial (row in the orthogonal
array) that yields the most expensive architec-
ture is assigned a score of 0 for cost, whereas the
trial that yields the least expensive architecture a
score of 100 for cost. These two extreme data
are then used in a linear function to obtain the
dimensionless cost scores of the remaining trials,
xi associated with the ith experiment (row),
according to
xi ¼100
xmax � xmin
ðxmax � CiÞ;
where xmax ¼ maxi2Ne
Ci, xmin ¼ mini2Ne
Ci, and Ne
TABLE 4: Application of MTR SoS Functional Modules to MTR Missions
Function Module
Mission
WMD SAW SBA
C4ISR Receiving communications X X X
Command and Control X X X
Compute X X X
Transmit communications X X XPBS Mission Database X X X
PAV generator X X
Ship intercept X X
Sea state generator X X
Initial orders XFind/Fix Container search X
Ship search and engagement XFinish Small boat attacker generator X
Helicopter engagement X
MTR escorts or teams onboard engagement X
Delay to commerce XSustain Ship fuel consumption X X
Watch team sleep analysis X X X
Small boat availability and reliability X
Helicopter availability and reliability X
NAVAL ENGINEERS JOURNAL92 &2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
denotes the number of experiments (rows). The
dimensionless cost score thus varies between 0
and 100.
Likewise, the trial that yields the highest proba-
bility of success is assigned a score of 100 for
effectiveness, whereas the trial that yields the
lowest probability of success a score of 0 for
effectiveness. These two extreme data are then
used in a linear function to obtain the dimen-
sionless effectiveness scores of the remaining
trials, pi associated with the ithh
experiment
(row), according to
pi ¼100
pmax � pminðPsi� pminÞ
where pmax ¼ maxi2Ne
Psiand pmin ¼ min
i2NePsi
. The
dimensionless effectiveness score varies between
0 and 100. In this work, the rule r that amal-
gamates the total cost, Ci, and the probability of
success, Psi, into a the dimensionless response zi
associated with the ith row is simply the sum of
the two resulting dimensionless scores,
zi ¼ xi þ pi
The dimensionless response zi thus varies
between 0 and 200.
Then the average performance (i.e., the objective
function) of the jth factor (function) at the athj
level, denoted by fjaj
D E, is calculated according to
fjaj
D E¼ 1
Njaj
XNe
i¼1
dðaij � ajÞzi;j ¼ 1; � � � ; 7
aj ¼ 1; � � � ; Sj
�� �� !
;
TABLE 5: Normalized Cost-Effectiveness Scores by Trial Number
Trial Probability of Success, Ps Cost ($M) Effectiveness score Cost score Cost-effectiveness score
1 0.84 290.3 55.5 55.5 151.32 0.90 1628.2 95.8 62.5 146.93 0.89 4100.5 62.5 0.9 82.64 0.80 174.1 34.5 98.7 133.25 0.86 309.9 65.6 95.3 160.96 0.92 1650.9 93.4 61.9 155.37 0.89 4077.8 81.4 1.4 82.88 0.84 123.0 55.1 100.0 155.19 0.92 1721.7 94.4 60.1 154.610 0.82 286.2 42.8 95.9 138.711 0.90 1365.0 85.4 69.0 154.412 0.86 4134.7 62.8 0.0 62.813 0.93 1699.0 100.0 60.7 160.714 0.82 266.6 46.4 96.4 142.915 0.87 1384.6 70.4 68.6 138.916 0.87 1850.2 71.1 56.9 128.117 0.75 246.8 10.4 96.9 107.418 0.92 1664.4 93.5 61.6 155.119 0.77 4065.7 21.7 1.7 23.420 0.87 184.7 67.3 98.5 165.821 0.73 239.1 0.0 97.1 97.122 0.93 1714.4 98.6 60.3 158.923 0.84 4015.7 54.6 3.0 57.524 0.90 1377.5 85.3 68.7 154.125 0.86 1785.2 66.5 58.6 125.126 0.79 215.3 30.7 97.7 128.427 0.85 1434.4 61.4 67.3 128.828 0.87 1765.4 69.3 59.1 128.429 0.89 1735.2 79.4 59.8 139.230 0.74 223.1 6.6 97.5 104.131 0.88 1426.7 74.4 67.5 141.932 0.87 1752.4 71.6 59.4 131.0
NAVAL ENGINEERS JOURNAL 2009 #1&93
in which Njaj, the number of experiments (rows)
the athj level (system function) assigned to the jth
factor (function), is
Njaj¼XNe
i¼1
dðaij � ajÞ;
and
d aij � aj
� �¼
1; if aij ¼ aj
0; otherwise
�
As an example, consider the Fix/Find function
for the WMD mission (F/F1). The F/F1 function
can be carried out by four system concepts—
LRM and Fission Meter, LRM and HPGe RID,
NaI RID and Fission Meter, and NaI and HPGe
RID (Table 1). In this case, j 5 4, |S4 5 4|, a4 5 1,
2, 3, and 4, and
N4a4¼ 8;
in all cases, Ne 5 32. From the expression of
fjaj
D Eabove, the average performance of the F/
F1 at Level 1 (LRM and Fission Meter) is 140.
It is roughly 130 at Level 2 (LRM and HPGe
RID), 115 at Level 3 (NaI RID and Fission
Meter), and 125 at Level 4 (NaI and HPGe RID).
These results are captured in the graph corre-
sponding to F/F1 in Figure 1. Since the larger the
better is the quality characteristic, Level 1 (LRM
and Fission Meter) is selected to provide the F/F1
function.
Reflecting the data analysis results in Table 5,
Figure 2 displays the graphs of the average
performance fjaj
D Eagainst the levels (system
concepts) for reach factor (function). It depicts
the main effects of the factors (functions) on the
overall objective function. The selected level of a
factor corresponds to the largest the average
performance.
OPTIMAL, COST-EFFECTIVE MTR SoS
ARCHITECTURE
Figure 1 shows that f14h i , f22h i , f31h i , f41h i ,
f52h i , f61h i , and f74h i are the largest values
among, respectively, the values f1a1
� �, f2a2
� �,
f3a3
� �, f4a4
� �, f5a5
� �, f6a1
� �, and f7a7
� �. In other
words, the maximum average performances are
obtained with factor 1 at level 4, factor 2 at level
2, and factor 3 at level 1, factor 4 at level 1, fac-
tor 5 at level 2, factor 6 at level 1, and factor
7 at level 4. This means that, as displayed in
Table 6, the optimal cost-effective MTR SoS
architecture consists of locally controlled,
objective-oriented approach for C4ISR, LCSs
and Maritime Security Cutters supported by
oil tankers for PBS(1,2), small escort boats
only for PBS(3), LRM and Fission Meter for
Mea
n of
CO
ST
-EF
F
432
140
120
100321 4321
432
140
120
10021 21
432
140
120
100
C4 PBS1,2 PBS3
F/F1 F/F3 FIN2
1
1
1
FIN3
Figure 1: Main Effects of System Conceptson Overall SoS Cost Effectiveness
NAVAL ENGINEERS JOURNAL94 &2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
FF(1), visual look-out backed up by radar
search for FF(3), escort potential attackers and
recapture seized vessels for FIN(2), and organic
weapons, armed helicopters, and USV support
for FIN(3).
Figure 2 graphically depicts the physical, func-
tional, and operational views of the optimal,
cost-effective MTR SoS architecture employed
to counter the three terrorist attacks—WMD,
SAW, and SWBA. The SoS components (in up-
percase) reflect those in Table 6. The top-level
SoS functions (in lowercase) are also included.
The ‘‘lightning strokes’’ depict the communica-
tions among the SoS components.
Comparisonof ResultsTo verify that the resulting cost-effective SoS ar-
chitecture is indeed a ‘‘best’’ architecture, we
compare its performance and cost with those of
two additional architectures, namely, a maxi-
mum-performance SoS architecture and a
heuristic cost-effective SoS architecture. The
Taguchi method is also employed to develop the
TABLE 6: Cost-Effective MTR SoS Architecture
SoS Function
System Concept
1 2 3 4
C4ISR Locally controlled, objec-
tive oriented approachPBS(1,2) (WMD,
SAW)
Littoral combat ships & maritime security
cutter supported by oil tankersPBS(3) (WMD,
SAW)
Small escorts only
F/F(1) (WMD,
SAW)
Linear radiation monitor &
fission meterF/F(3) (WMD,
SAW)
Visual Look- out backed by Radar Search
FIN(2) (WMD,
SAW)
Escort potential attackers &
recapture seized vesselsFIN(3) (WMD,
SAW)
Organic weapons, USVs &
armed helicopters
Figure 2: Optimal, Cost-Effective MTR SoSArchitecture
NAVAL ENGINEERS JOURNAL 2009 #1&95
maximum-performance architecture, but with
the objective function being the probability of
mission success; the cost is not considered. The
heuristic cost-effective SoS architecture is based
on the collective experience of the SEA class
(Kessler et al. 2006) and consists of the lowest
cost system concepts that would meet system
effectiveness requirements. Table 7 shows the
components of these two architectures along
with those of the optimal cost-effective SoS ar-
chitecture. Figure 3 shows the cost-effectiveness
curve, which depicts the cost of each architecture
against the probability of success across all three
missions. The ‘‘knee’’ in the cost-effectiveness
curve corresponds to the optimal cost-effective
architecture. The reason for the ‘‘knee,’’ and
hence the selection of this ‘‘best’’ architecture, is
now elaborated. First, the large difference be-
tween the cost of the maximum performance
architecture and the other two architectures is
caused by the cost of the procurement of the
requisite number of medium-sized escorts for the
TABLE 7: Allocation of System Concepts to Top-level Functions in the HeuristicCost-effective, Optimal Cost-effective and Optimal Effective SoS Architectures
Function Mission Option System concepts
Architecture
Heuristic
Optimal cost
effective
Optimal
effective
C4ISR 1 Area control/problem solving
WMD, SAW, & SBA 2 Area control/objective-oriented X
3 Local control/problem solving
4 Local control/objective-oriented X XPBS 1 AO – CG/DDG/FFG/WHEC
WMD & SAW 2 AO – LCS/WMSL X X X
3 Modified COTS (Merchant)
1 Small escorts X X X
SBA 2 Medium escorts
3 Small & medium escortsFind/Fix 1 LRM & fission meter X X X
WMD 2 LRM & HPGe RID
3 NaI RID & fission meter
4 NaI & HPGe RID
1 Visual means X X
SBA 2 Visual means & radar XFinish 1 Escort potential attackers & recapture seized vessels X X
SAW 2 Escort potential attackers & disable seized vessels X
1 Organic weapons only
2 Organic weapons & armed helicopters X
SBA 3 Organic weapons and USVs
4 Organic weapons, USVs & armed helicopters X X
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
0 500 1000 1500 2000Total SoS Cost (FY2006 $M)
Pro
babi
lity
of S
ucce
ss
Heuristic cost-effective
architecture Optimalcost-
effectivearchitecture
Maximum-performancearchitecture
Figure 3: SoS CostEffectiveness for Com-bined Missions
NAVAL ENGINEERS JOURNAL96 & 2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
SBA mission. The cost for procurement alone of
the small escort only SBA force in the optimal
cost-effective architecture is $83.6 million. The
result is a 1,385% increase in the overall SBA
mission cost for only a 12% increase in SBA
mission effectiveness. Second, although the
optimal cost-effective architecture is slightly
more expensive than the heuristic cost-effective
architecture, it delivers 5% improvement in per-
formance (i.e., the mission probability of
success). The optimal cost-effective architecture
can be procured and operated at a cost of $315.1
million in FY2006 dollars. Table 8 shows the
cost estimated for the results of the three differ-
ent missions without the MTR system in place
as well as the expected value of damage cost
associated with the optimal cost-effective archi-
tecture in place. With the MTR system in place,
the expected value of damage suffered drops
from $1,900 million to $127 million. This drop
in the expected value of damage of $1,773 mil-
lion is obtained through the expenditure of only
$315.1 million in FY2006 dollars. In other
words, the procurement of the optimal cost-
effective architecture should save $5.63 for
every dollar spent.
ConclusionAs in Huynh (1997) and Huynh and Gillen
(2001), our exploratory work here establishes
the applicability of the orthogonal array experi-
ment (or the Taguchi method) to optimizing an
SoS architecture. In this work we develop the
architectures of a conceptual, cost-effective,
near-term SoS to respond to the terrorist threats
to the United States that emanate from the mar-
itime domain. To this end, we formulate this SoS
architecting problem as an assignment problem,
which is then solved using the orthogonal array
experiment. The orthogonal array experiment
approach allows us to solve this assignment
problem by carrying out the smallest possible
number of experiments and determining the
solution from the responses of the experiments.
It is efficient and, for this class of problems,
provides an optimal cost-effective architecture
for the MTR SoS. The results discussed in this
paper underline this successful exploratory
work in architecting an SoS. This method
can therefore be extended to other SoS
architecting.
AcknowledgmentsWe thank Ling Siew Ng, Seng Chuan Lim,
Cheng Lock Chua, Eng Choon Yeo, Kok Long
Lee, Heng Hui Chew, Kwang Yong Lim, Ee Shen
Tean, Sze Tek Ho, and Choon Chung for their
contribution to this MTR SEA-9 project at the
Naval Postgraduate School.
ReferencesAlberts, D.S. and R.E. Hayes, Command arrangements
for peace operations, Command and Control
Research Program (CCRP) Publications, National
Defense University, 1995.
Answers.com, ‘‘Information assurance,’’ http://
www.answers.com/, 2006, accessed April 2006.
Arnold, B., C. Cammarata, D. Farmer, K. Kowalewski, F.
Lapido, M. Lasky, D. Moore, ‘‘The economic costs of
disruption in container shipments,’’ Congressional
Budget Office, March 26, 2006.
Bendell, A., J. Disney, and W.A. Pridmore (Editors),
Taguchi methods: Applications in world industry, IFS
Publications/Springer-Verlag, New York, 1989.
TABLE 8: Probability of Mission Success & Damage Cost of Optimal Cost-EffectiveArchitecture
MTR mission
Optimal cost-
effective SoS,
Ps (%)
Raw damage
cost from
attacks ($M)
Relative prob-
ability of
occurrence (%)
Expected damage
without optimal
cost-effective SoS ($)
Expected damage
with optimal
cost-effective SoS ($)
WMD 99 500,000 0.001 1,000 10SAW 99 2,500 1 500 5SBA 72 1,000 2 400 112
NAVAL ENGINEERS JOURNAL 2009 #1&97
Chu, W.W., ‘‘Optimal file allocation in a multiple
computer system,’’ IEEE Transactions on Computers,
Vol. 18, pp. 885–889, 1969.
CQ, ‘‘Port shutdown for terrorist incidents could cost
billions, drill shows,’’ CQ Homeland Security, Decem-
ber 5, 2002.
CRS, ‘‘Terrorist attack on USS Cole: Background
and issues for Congress,’’ Report RS20721,
March 2001.
Eberhart, D., ‘‘Container ships: the next terrorist
weapon?’’ http://www.newsmax.com, accessed April
2006; ‘‘Peril on the Sea,’’ The Economist, October 2,
2003.
Euler, L., ‘‘Recherches Sur une Espece de Carres
Magiques,’’ Commentationes, Arithmeticae Collectae,
Vol. II, pp. 302–361, 1849.
Fritelli, J.F., ‘‘Port and maritime security: Background
and issues for Congress,’’ CRS Report RL31733, US
Library of Congress, Washington, D.C., 2005.
Harrison, R., The antivirus defense-in-depth guide,
version 2.0, Microsoft TechNet, Seattle, WA, 2004.
Howe, D., ‘‘Planning scenarios,’’ Homeland
Security Council, July 2004.
Howland, J., ‘‘Hazardous seas/maritime sector vulner-
able to devastating terrorist attacks,’’ JINSA Online,
April 1, 2004.
Hunton, R., ‘‘A proposed model for the collection and
use of biometric identifiers obtained at sea as an effort
to prevent seaborne terrorist activity and enhance
security at the port of Charleston, South Carolina,’’
Master’s Thesis, Naval Postgraduate School, Monterey,
CA, March 2005.
Huynh, T.V., ‘‘Optimal file allocation in a distributed
computer network by orthogonal array experiments,’’
IEEE Aerospace Applications Conference Proceedings,
Vol. 4, pp. 105–114, 1997.
Huynh, T.V. and D.C. Gillen, ‘‘Dynamic bandwidth allo-
cation in a satellite communication network,’’ IEEE
Aerospace Applications Conference Proceedings, Vol. 3,
pp. 1221–1232, 2001.
Huynh, T.V., A. Kessler, J. Oravec, S. Wark, and
J. Davis, ‘‘Orthogonal array experiment for architecting
a system of systems responding to small boat
attacks,’’ Systems Engineering, Vol. 10, No. 3, pp.
241–259, 2001.
Kessler, A., M. Schewfelt, B. Connett, C. Chiurourman, J.
Oravec, S. Wark, J. Davis, L.S. Ng, S.C. Lim, C.L. Chua, E.C.
Yeo, K.L. Lee, H.H. Chew, K.Y. Lim, E.S. Tean, S.T. Ho, and
K.C. Chung, ‘‘Maritime threat response,’’ Report NPS-
97-06-004, June 2006.
Keyser, R.M., T.R. Twomey, and D.L. Upp, ‘‘An improved
handheld radioisotope identifier (RID) for both locat-
ing and identifying radioactive materials,’’ ORTEC, HPS
Midyear Meeting, January 2005.
Kitz, J.F., Shattered city: The Halifax explosion and the
road to recovery, Nimbus, Halifax, Nova Scotia, 1989.
Mair, G., Bridge down, Stein and Day, New York, 1982.
McRaven, W., ‘‘The theory of special operations.’’
Master’s Thesis, Naval Postgraduate School, Monterey,
CA, June 1993.
NCCA (Naval Center for Cost Analysis), ‘‘Visibility
and management of operating and support costs,’’
Database, http://www.navyvamosc.com
NTSB, US, ‘‘Towboat Robert Y. Love Allision with inter-
state 40 highway bridge near Webbers falls, Oklahoma,
May 26, 2002,’’ Highway/marine accident report NTSB/
HAR-04/05 by National Transportation Safety Board,
Washington, DC, 2004.
OUSD (Comptroller), Office of the Under Secretary of
Defense (Comptroller), DoD summary budget materi-
als/budget links, http://www.dod.mil/comptroller/
budgetindex.html
Pao, T.W., M.S. Phadke, and C.S. Sherrerd, ‘‘Computer
response time optimization using orthogonal array
experiments, ‘‘Taguchi methods, applications in world
industry, IFS Publications/Springer-Verlag, London,
1989.
Pareno, R.D., ‘‘Thirty injured in Philippines ferry bomb
attack,’’ Philippine Star, August 29, 2005.
Perl, R. and R. O’Rourke, ‘‘Terrorist attack on USS Cole:
Background and issues for Congress.’’ CRE Report
RS2072, 2001.
Rowland, M., CG-SMG-2 3.2.2, 3.2.3, 3.2.4, Lawrence
Livermore National Laboratory, accessed 2006.
Roy, R., A primer on the Taguchi method, Van Nostrand
Reinhold, New York, 1990.
Sage, A.P. and C.D. Cuppan, ‘‘On the systems engineer-
ing and management of systems-of-systems and
federations of systems,’’ Information, Knowledge, Sys-
tems Management, Vol. 2, No. 4, pp. 325–345, 2001.
NAVAL ENGINEERS JOURNAL98 & 2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
Smith, R.B., ‘‘British raid on St. Nazaire: The greatest
raid of all,’’ World War Two, 2003.
Stephens, H.W., The Texas city disaster, 1947, Universityof Texas Press, Austin, 1996.
Taguchi, G., ‘‘Off-line and on-line quality control
systems,’’ International Conference on Quality Control,Tokyo, Japan, 1978.
Taguchi, G., Taguchi on robust technology development:
bringing quality engineering upstream, ASME Press,
New York, 1993.
Taguchi, G. and S. Konishi, Orthogonal arrays
and linear graphs–tools for quality engineering,
American Supplier Institute Inc., Dearborn,MI, 1987.
Taguchi, G. and Y.I. Wu, Introduction to off-line quality
control, Central Japan Control Association, Meieki Nak-
amura Ku Nagaya, Japan, 1980.
USCG Fact File, Fiscal year 2004 Coast Guard report:
FY2003 performance report and FY2005 budget in
brief, http://www.uscg.mil/hq/g-cp/comrel/factfile/index.htm
Villanueva, M., ‘‘Superferry sinking last February a
terrorist act,’’ Philippine Headline News Online,
October 12, 2004.
Wilson, E. ‘‘Maritime domain awareness (MDA),’’
Stakeholder, July 12, 2004.
Young, R., ‘‘Baseline study of U.S. port merchant ship
traffic during 2004,’’ Office of Naval Intelligence, August
31, 2005.
AuthorBiographiesThomas Huynh is an associate professor of
systems engineering at the Naval Postgraduate
School in Monterey, CA. His research interests
include uncertainty management in systems en-
gineering, complex systems and complexity
theory, system scaling, simulation-based acqui-
sition, and system-of-systems engineering
methodology. Prior to joining the Naval Post-
graduate School, Dr. Huynh was a Fellow at the
Lockheed Martin Advanced Technology Center,
where he engaged in research in computer net-
work performance, computer timing control,
bandwidth allocation, heuristic algorithms,
nonlinear estimation, perturbation theory, dif-
ferential equations, and optimization. He was
also a lecturer in the Mathematics department at
San Jose State University. Dr. Huynh obtained
simultaneously a B.S. in Chemical Engineering
and a B.A. in Applied Mathematics from Uni-
versity of California, Berkeley and an M.S. and a
Ph.D. in Physics from University of California,
Los Angeles.
Brian Connett, an Information Warfare Officer,
is a graduate of the Officer Candidate School,
Surface Warfare Officer Division Officer
Course, Information Warfare School and a
recent graduate of the Naval Postgraduate
School’s Graduate School for Engineering and
Applied Sciences. While at Naval Postgraduate
School, he led an effort to analyze the nuclear
material detection capabilities of various tools
and the overall probability of actually locating
such materials on cargo ships in-transit across
the Pacific Ocean for a group project tasked
with developing architectures of a system of
systems to respond to maritime terrorist threats.
He served as the Communications Officer on the
USS Lake Erie CG-70 and as an Operations
Officer at Special Boat Team 20. He is currently
assigned to the Naval Information Operations
Center, Hawaii serving as the Operations
Officer and Senior Watch Officer for a joint
team with over 500 service members from the
every branch of the military. Before joining
the Navy, he worked several projects directly
related to the Y2K issues as a co-operative
education student. He holds a B.S. in Informa-
tion Systems from Drexel University, and an
M.S. in Systems Engineering & Analysis from
the Naval Postgraduate School in Monterey,
California.
Jared ‘‘Chewey’’ Chiu-Rourman, a Surface War-
fare Officer, is a graduate of the Officer
Candidate School and the Surface Warfare
Officer Division Officer Course and a recent
graduate of the Naval Postgraduate School’s
Graduate School for Engineering and Applied
Sciences. While at NPS, he led an effort to
analyze the logistic and operational availability
NAVAL ENGINEERS JOURNAL 2009 #1&99
requirements for a group project tasked with
developing architectures of a system of systems
to respond to maritime terrorist threats. LT
Chiu-Rourman served as First Lieutenant on
USS Cormorant MHC-57 and as Assistant Plans
Officer in Commander Destroyer Squadron 15,
forward deployed in Yokosuka, Japan. In his
next assignment, he will be the Combat Systems
Officer on USS Hawes FFG-53, home-ported in
Norfolk, VA. Before joining the Navy, he was
enlisted in the Hawaii Army National Guard as
a Combat Engineer, attached to the 227th
Engineer Co. He holds a B.A. in Physics (minor
in Mathematics) from the University of Hawaii
at Hilo and an M.S. in Systems Engineering &
Analysis from the Naval Postgraduate School in
Monterey, California.
Jennifer Davis is a systems engineer at Northrop
Grumman Ship Systems in Pascagoula, Missis-
sippi, and a recent graduate of the Naval
Postgraduate School’s Graduate School for En-
gineering and Applied Sciences. While at NPS,
she led a C4ISR effort for a group project
tasked with developing architectures of a system
of systems to respond to maritime terrorist
threats. A former U.S. Navy helicopter pilot,
Ms. Davis has worked at Northrop Grumman
Ship Systems since 2001, specializing in the
ship/aircraft interface. She holds a B.S. in
Ocean Engineering from the U.S. Naval Acad-
emy and an M.S. in Systems Engineering
from the Naval Postgraduate School, Monterey,
California.
Andrew Kessler is an FA-18 Hornet pilot, a
Strike Fighter Tactics Instructor, and a recent
graduate of the Naval Postgraduate School’s
Graduate School for Engineering and Applied
Sciences. While at NPS, he was the student team
leader for a group project tasked with develop-
ing architectures of a system of systems to
respond to maritime terrorist threats. During his
career in the Navy, he has served in a number of
operational strike fighter squadrons and made
numerous deployments to the Western Pacific,
Mediterranean, and Indian Oceans as well as the
Arabian Gulf. LCDR Kessler was an instructor
at the Navy TOPGUN School, where he was the
subject matter expert on FA-18 radar systems
and the F-35 Joint Strike Fighter. He holds a B.A.
in Political Science from Yale University, an M.S.
in International Relations from Troy State Uni-
versity, and an M.S. in Systems Engineering from
the Naval Postgraduate School in Monterey,
California.
Joseph Oravec, a Surface Warfare Officer, is a
graduate of the Officer Candidate School and
the Surface Warfare Officer Division Officer
Course (with distinction) and a recent graduate
of the Naval Postgraduate School’s Graduate
School for Engineering and Applied Sciences.
While at NPS, he led an effort to analyze the
small boat attack for a group project tasked with
developing architectures of a system of systems
to respond to maritime terrorist threats. LT
Oravec served as a Fire Control Officer on USS
Stump DD-978 and as a Weapons Officer on
USS Whirlwind PC-11. In his next assignment,
he will be a Chief Engineer on USS Harper’s
Ferry LSD-49, forward deployed to Sasebo,
Japan. Before joining the Navy, he taught Amer-
ican Government as an adjunct instructor at St.
Petersburg College. He holds a B.A. with a dual
major in Political Science and International
Affairs (minor in Economics) from Florida State
University, an M.S. in Political Science Educa-
tion from University of South Florida, and an
M.S. in Systems Engineering & Analysis from
the Naval Postgraduate School in Monterey,
California.
Michael Shewfelt is a recent graduate of the
Naval Postgraduate School’s Graduate School
for Engineering and Applied Sciences. Marine
Corps MAJ Shewfelt holds a B.S. from the US
Naval Academy and an M.S. in Systems En-
gineering from the Naval Postgraduate School in
Monterey, California. [ROM]
Shaunnah Wark is a recent graduate of the Naval
Postgraduate School’s Graduate School for En-
gineering and Applied Sciences. While at NPS,
she earned the award for Most Valuable Team
Member of the 2006 SEA class tasked with
NAVAL ENGINEERS JOURNAL100 & 2009 #1
Architecting an SoS Responding to Maritime Domain Terrorism
developing architectures of a system of systems
to respond to maritime terrorist threats. ENS
Wark graduated with distinction from the U.S.
Naval Academy in 2005, where she won the
Patriot League Championships in women’s
rowing and garnered awards of National Scho-
lar-Athlete, Patriot-League Scholar-Athlete of
the Year for Women’s Crew. She was also named
to the 2005 ESPN Magazine’s Academic All-
America Women’s At-Large Third Team. She
will serve as a surface warfare officer on the USS
Shoup (DDG 86). She holds a B.S. in Systems
Engineering from the U.S. Naval Academy and
an M.S. in Systems Engineering from the
Naval Postgraduate School in Monterey,
California.
NAVAL ENGINEERS JOURNAL 2009 #1&101