Wednesday, August 18, 2010

Phoenix Program 2.0, Kilcullen's Way, Convexity, Paramilitary Hedge Funds


(grainy photo of SAS-trained Army Special Forces operator Richard Meadows preparing to lead the assault team of the Son Tay Raid---note early SinglePoint Occluded Eye Gunsite on his CAR-15. One of the greatest soldiers America has ever produced, Meadows spent his entire career in Special Forces and Ranger units. He served with MACV-SOG in Vietnam, was a founding member of the Army's national-level Special Mission Unit, and conducted still-classified paramilitary operations for the CIA both in Vietnam and after his retirement from the Army in 1977. A key element in the man's success was his mastery of the prisoner-snatch operation)

Quick Summary of Today's Key Point: Traditional raid theory seeks to minimize time on target in order to lower the raider unit's vulnerability to larger enemy forces. Counternetwork raids that target isolated insurgent cells are less vulnerable to this threat, but must also develop a more thorough and skilled post-hit Sensitive Site Exploitation (SSE) capability in order to collect intelligence that can provide a lead to the next cell or to a highly networked individual (money-launderer, opium- or weapons-transportation hub, etc.). Quantitative trading and hedge fund strategies may provide some conceptual insights into how a campaign of exploitation missions could be designed.

Find, Fix, Finish, Exploit, Assess (F3EA)

The modern incarnation of the Vietnam War Phoenix Program (described briefly in the last post, in case you missed it and are not familiar with the program) might be the “F3EA” framework now being employed by Joint Special Operations Task Force members in combat theaters overseas. F3EA developed from the ad hoc manhunting programs that had targeted enemy VIPs. The idea behind it is to embed “Exploit” and “Assess” components in the typical mission profile, with the Assess phase feeding the next mission cycle directly. As with Phoenix and unilateral SEAL platoon operations in Vietnam, F3EA prioritizes speed and agility and organic intelligence-gathering efforts over high-level planning and resources.

Decomposing F3EA into constituent building blocks, we see that “Find, Fix, and Finish” describes the typical military goal of pinning an enemy force against the tactical equivalent of an immovable object (the “anvil”)and then smashing it with overwhelming combat power (the “hammer”). The “Exploit” and “Assess” components are really what differentiates F3EA from traditional direct action operations.

“Exploitation” is a buzzword for efforts that gather actionable intelligence. “Assess” is the process of analysis and development of that intelligence to form a new mission concept---the military equivalent of what scientists mean by a properly specified hypothesis. The innovation of F3EA is to house the direct action components and the intelligence components under one roof, with the expectation that successful missions will be those that are able to generate spin-off missions.

One of the better descriptions of F3EA comes from David Kilcullen:

But make no mistake, counterinsurgency is war, and war is inherently violent. Killing the enemy is, and always will be, a key part of guerrilla warfare. Some insurgents at the irreconcilable extremes simply cannot be co-opted or won over; they must be hunted down, killed, or captured, and this is necessarily a ruthless practice conducted with the utmost energy that the laws of war permit. In Iraq and Afghanistan since 9/11, we have experienced major success against terrorists and insurgent groups through a rapid twenty-four-hour cycle of intelligence-led strikes, described as "counternetwork operations," that focuses on the most senior leaders. This cycle, known as "Find, Fix, Finish, Exploit, Assess" (F3EA) has proven highly successful in taking networks apart, and convincing senior enemy figures that they simply cannot achieve their objectives by continued fighting. This approach fuses operations and intelligence and, though costly and resource intensive, can generate a lethal momentum that causes insurgent networks to collapse catastrophically.

Kilcullen's Way


(Australian counterinsurgency guru David Kilcullen)

One of the true leading intellectual lights in the counterinsurgency literature, former Australian Army officer David Kilcullen has served as an senior advisor to General Petraeus in Iraq and General McChrystal in Afghanistan, and as an adjunct professor at Johns Hopkins AIS, one of the most prestigious international studies/security studies programs in the United States.

In the books The Accidental Guerrilla and Counterinsurgency, Killcullen provides an engaging and very practical account of the lessons he learned in East Timor, but also takes a more conceptual view of the counterinsurgency process and the analytical frameworks that can be brought to bear to aid in understanding. Killcullen explains how a global insurgency movement requires new tools:

Although counterinsurgency is more appropriate than counterterrorism in this conflict, traditional counterinsurgency techniques from the 1960s cannot simply be applied to today’s problems in simplistic or mechanistic fashion. This is because counterinsurgency, in its “classical” form, is optimized to defeat insurgency in one country, not to fight a global insurgency. ..

At the global level, no world government exists with the power to integrate the actions of independent nations to the extremely close degree required by traditional counterinsurgency theory; nor can regional counterinsurgency programs be closely enough aligned to block all insurgent maneuver. This is particularly true when the enemy---as in this case---is not a Maoist-style mass urban movement but a largely urban-based insurgency operating in small cells and teams with an extremely low tactical signature in the urban clutter of globalized cities. In today’s international system, a unified global approach---even only in those areas directly affected by Al Qa’eda-sponsored jihad---would be intensely problematic. It would demand cooperation far beyond anything yet achieved between diverse states.



(this well-funded, very highly trained counternetwork warfare specialist has no jurisdictional limitations, but Kilcullen is concerned that, in the real world, most operators do)

Kilcullen recommends that sophisticated counterinsurgency professionals study Complex Adaptive Systems and networks. He notes that systems have transcendent, emergent properties that are not visible when studies are limited to their component parts. A good COIN systems analyst, like a good hedge fund manager, will have the ability to view the situation from both macro and micro scales, often generating deeper insights and understanding from the "gestalt switch" which can occur as a problem is viewed at multiple scales and through the prism of multiple disciplines.

Kilcullen:

As shown, the global jihad is a series of nested interactions---insurgencies within insurgencies and networks within networks. So it is important to understand which is the "system in focus": an individual group, a localized insurgency, a regional jihad, or a global insurgency as a whole. Most analysis of Iraq treats the problem in terms of single-country classical counterinsurgency. That is, the "system in focus" for most analysts is the Iraqi theater, and links to the broader Middle Eastern jihad or global insurgency are secondary. Lacking a complex systems perspective, some analysts appear to assume that the "system in focus" is all that exists, whereas (as shown) the true danger of individual jihad theaters is their aggregated effect at the systemic level as a global counterinsurgency.

Looking for solutions, Kilcullen invokes the Vietnam War era's CORDS and Phoenix Programs as a useful model for disrupting the nodes and energy flows of the insurgent system:

De-linking would result in actions to target the insurgent infrastructure that would resemble the unfairly maligned (but highly effective) Vietnam-era CORDS program. Contrary to popular mythology, this was largely a civilian aid and development program, supported by targeted military pacification operations and intelligence activity to disrupt the Viet Cong infrastructure. A global CORDS program (including the other key elements that formed part of the successful Vietnam CORDS system) would provide a useful starting point for considering how disaggregation would develop in practice.

Tactical Implications: Relative Superiority in the Counternetwork Warfare and "Manhunting" Contexts

There are a series of tactical implications that would come with a policy that really pursued decentralized counternetwork operations. One such implication concerns how the assault force views the temporal aspects of a prisoner-snatch mission---the urgency with which the team exfiltrates the target area after conducting the mission. As typically taught in elite light infantry and special operations schools, the unilateral supermission approach relies heavily on established procedures for conducting raids, many of which were originally developed for sabotage missions and direct action missions during WWII. It generally seeks to minimize the raiding force's "time on target".

Raiding procedures typically are based on the assumption that the raiding force is operating behind enemy lines. The team has a temporary advantage due to surprise and agility, but this advantage suffers from serious time decay: a small commando unit is not equipped to hold terrain, so it cannot remain in place on the target for long once contact with the enemy had been made. The advantages of speed, surprise, and sudden violence---referred to by Bill McRaven and others as “relative superiority” (RS)--- must be gained early in the mission and used to accomplish whatever the team’s objective is. RS confers a fleeting tactical advantage that must be exploited before it dissipates and the outcomes of the engagement are decided by “absolute superiority” (AS).

The Mathematics of War: Attrition and the Lanchester Combat Model

AS can be modeled using the famous Lanchester combat equations, a set of differential equations that reveals how, in attrition-style fights of both shock battle and ranged weapons, an initial asymmetry in force strength can quickly turn into a bloodbath for the smaller force. For ancient combat, the Lanchester model is often referred to as "Lanchester's Linear Law", while the modern combat version is the "Lanchester Square Law."

For a contemporary military operator, the critical insight of the Lanchester equation is the exponential nature of casualties suffered by the smaller force when forces of roughly equal technological sophistication, equal situational awareness, and unequal size clash head-to-head (there are many more sophisticated variations of the Lanchester model that attempt to take into account differences in technology---this is where the oft-abused term "force multiplier" actually comes into practice, as a superior technology is converted into a numerical equivalent and then used as an input feed to the original model. For example, a force of 10 men that has a technological coefficient of 1.5 would, per Lanchester, be equivalent to a force of 15 that was equipped with baseline technology).

Note that Lanchester equations are really for straightforward attrition fights; they are not meant for modeling scenarios in which one side continually stalks and ambushes another. Particularly in situations of protracted guerrilla warfare, modified versions of the Lotka-Volterra predator-prey model from ecology may be more appropriate as starting points, with Lanchester being reserved for a contingency in which the ambushed force is able to effectively fight back.

The major goal of a smaller force is to escape from a Lanchester-governed engagement at all costs, particularly as a unit must operate at some minimum size in order to be able to evacuate casualties without suffering an enormous maneuver penalty (normally four men are needed to move one seriously wounded man if distances and speeds of any tactical significance are to be sustainable). Thus there are tipping points in an engagement at which a smaller force, having sustained casualties, must either abandon some wounded comrades, move out with all hands and face a significant maneuver disadvantage, or remain fixed in place and suffer the full brunt of the Lanchester's cold, mathematical onslaught.

There is an equivalent to Lanchester in economics and game theory (modeled using von Stackelberg and Cournot duoplies), and it reveals how competition can cause corporate profit margins to approach zero, leaving the lowest-cost, highest-volume producer---the numerically superior combatant in Lanchester terms---eventually seizing market share by underpricing all competitors. Strategy guru Michael Porter created his “Five Forces Model”, now taught in virtually every MBA program, to provide a framework by which corporate strategists could attempt to avoid a head-on competitive clash with other companies and the typical collapse in profit margins that would ensue from commoditization of products and intense competition for market share (and which would ultimately be good for consumers, by the way).


(Michael Porter's "5 Forces" framework examines the economic forces that can affect a company's ability to impose monopoly pricing power on consumers. His first book was amusing called Competitive Strategy because publishers balked at his intended, more honest original title: Anti-Competitive Strategy. In a sense, Porter's approach is to try to thwart the natural selection pressures of the free market ecosystem and to find a protected niche in which economic rents can be enjoyed because competition has broken down)

In much the same as Porter looks to avoid the collapse of profit margins that results from economic competition, the relative superiority approach to warfare that is articulated by McRaven is an attempt to systematically avoid the attrition trap of the Lanchester combat equations. Attrition-style warfare is correctly identified as posing a number of extremely perilous scenarios for small units.


(McRaven's relative superiority graph---the shaded region represents a commando unit's vulnerability. The graph begins at 0,0 with contact with the enemy, and depicts a drag race between time, the probability of mission completion, and the SOF team's establishment of relative superiority ((RS)). RS is depicted as a horizonal line across the middle of the rectangle; once RS is achieved, the SOF team's chances of mission success shoot up vertically. As one moves to the right, representing the passage of time, the unit's failure to achieve RS would cause its effectiveness to decay and the unit to becomes more and more vulnerable. The shaded region would expand to fill the space and could be thought of as a crushing weight that would ultimately suffocate the commando unit).

McRaven:

...An inherent weakness in special forces is their lack of firepower relative to a large conventional force. Consequently when they lose relative superiority, they lose the initiative, and the stronger form of warfare generally prevails.

The key to a special operations mission is to gain relative superiority early in the engagement. The longer and engagement continues, the more likely the outcome will be affected by the will of the enemy, chance, and uncertainty, the factors that comprise the frictions of war.

Simply put, the chaos that a small force can create through speed, surprise, and violence of action gives it an advantage in the early stages of contact. As time goes on, the enemy force is able to develop situational awareness and to start to employ its numerical advantage to overwhelm the special warfare unit. This assumption is perhaps exemplified by the heavy use of stopwatches during mission rehearsals: a designated operator, often a senior NCO, calls out the "time on target" at regular intervals so that the team is aware that they need to finish the job and leave the area as quickly as possible. There is little opportunity for “Exploitation and Assessment” to be conducted at the target, and this poses the central tension for F3EA-type counternetwork operations because we know from criminal forensics in the law-enforcement world that detailed crime-scene work is crucial for developing evidence and leads, particularly when multinational criminal syndicates and complex enterprises are involved.

The minimal time on target philosophy is optimized for missions that involve a short, sharp, one-sided combat operation followed immediately by the setting of explosives to destroy an enemy facility or infrastructure; when it meets missions that involve nuanced and detailed intelligence gathering, the result can be an unpleasant "smash & grab" style that emulates despised death squads and risks alienating members of the local populace. Because there is no time for nuance, large groups of prisoners and witnesses may all be rounded up (the membership of which could be largely innocent) and whisked away to a support facility, at which point they are handed off to a group of professional interrogators.

I run the risk of presenting an oversimplified, cartoon version of the standard RS interpretation, but I think the important point is that much of commando raiding philosophy is built on the assumption that the commando force has absolute inferiority---largely based on numbers---to a conventional military opponent, and thus the commando force cannot linger in a fixed position once enemy contact has been made. In other words, commando teams would be advanced representations of insurgency tactics.

In contrast, a commando team operating in a counter-insurgency role may in fact reliably have numerical superiority over the small insurgent/terrorist cells that it targets.

Relative Superiority and Air Combat Maneuvering


(one of my heroes: Triple-Ace and professional badass Robin Olds, then a MiG-killing colonel in Vietnam, was perhaps America's premier fighter pilot---259 combat missions, 16 air-to-air combat victories---and the only man inducted into both the National Aviation Hall of Fame and the College Football Hall of Fame. Olds defied regulations in many ways, from his flamboyant handlebar mustache to his hard-drinking social life and penchant for singing ribald fighter pilot songs. He had an extremely advanced tactical mind, was a student of decision science, and, interestingly enough, was not a great fan of the theoretical work of fellow USAF officer and dogfighting enthusiast John Boyd)

When larger units, even entire campaigns, are involved, relative superiority is typically examined via maneuver warfare theory. The goals of maneuver warfare are much the same: avoid static, attrition-style fights and bloody frontal attacks on prepared enemy positions and look to rapidly exploit pockets of weakness that appear---areas of “relative superiority”---in order to converge on the enemy’s headquarters apparatus. The colorful descriptive phrases that are associated with maneuver warfare---“cutting off the head of the snake”, etc.---reinforce this goal of targeting the centralized decision-making capability of the enemy organization.

As we discussed in the last post, the assumption that the enemy force is organized with a coherent management structure in place can become a dangerously convenient conceit and can result in mission priorities that target leaders who in fact have little or no control of the larger organization.

Much of the theoretical work on maneuver warfare and mental agility theory in this country have started by focusing on attention-decision-action loops that take place within a single, discrete engagement (air-to-air combat being the prototypical engagement and John Boyd’s OODA being the prototypical model), and then developing first principles for dominance that can then be scaled-up for application to much larger units.


(John Boyd's famous OODA loop. While various critics have complained that OODA is, like Freudian psychology, guilty of failure to make falsifiable predictions, it is still generally regarded as a useful starting place because of its accessibility as a standard model for battlefield decision-making)

As theorists move from the micro to the macro, the analysis has tended to become more conceptual in nature and has described ways to enhance the exploitation/OODA qualities of a military force by decentralizing combat leadership responsibilities and empowering small maneuver units. Small units in the field, having immediate access to information and being less vulnerable to Clausewitzian fog, can make rapid decisions and act to exploit opportunities as they appear.

However, the decentralization of the decision-making process has generally been limited to the tactical side: higher, centralized command and control entities generally still provide mission tasking, review mission plans (via Briefback or some similar management review process), provide force lists of available assets (helicopters, gunship support, etc.), and conduct after-action debriefs.

Sophisticated counternetwork operations may have to take this a step further, and may increase the decentralization and empowerment of the man on the field by further integrating mission tasking, mission planning, and after-action reporting into his sphere of control. This would require extremely entrepreneurial individuals, qualified in many disciplines, and a national command authority which is prepared to take a hands-off approach to certain aspects of global counterinsurgency.

Key Issue: Time on Target

In practical terms, the network model of raiding may initially entail the same tactics, techniques, and procedures as the supermission, but things diverge once the target has been cleared safe. Rather than emphasizing a speedy withdrawal from the target, a counternetwork team may have to secure the area and switch to a detailed intelligence-gathering mode. In some cases, interrogations may take place on the target or in an area that is adjacent to it. Computers and documents would be seized for immediate exploitation.

The counternetwork team is thus less concerned with getting away before a stronger enemy force arrives and the commando team gets fixed in a Lanchester death trap (the central preoccupation of McRaven’s model), and more concerned with occupation of the target, perhaps for a dangerously extended period by traditional time-on-target standards, in order to get information that can lead to the next cell. This shift occurs because counterinsurgency involves isolated cells of enemy personnel rather than engagements with enemy main force units. In a counterinsurgency paradigm, enemy main force units have virtually no chance of escaping detection by US telemetry assets, and even less chance of successfully engaging US combat forces in direct combat. The threats posed by an insurgency are those of elusiveness and speed.

Gamma, Mission Performance, and Vulnerability to Extreme Events

One interesting aspect of the RS framework is the implication of the small team’s exposure to “tail risk”, or extreme events. The idealized RS-based mission has the team prepare perfectly in advance and then using its advantages in specific preparation, situational awareness, and surprise to run through a sleepy and complacent enemy force. The payoffs to the commando team come up front in the form of relative superiority and can deteriorate if the team remains too long on the target---the payoff function resembles that of a gang of bankrobbers.

Viewing this from behind the prism of options theory, we might say that McRaven's minimal time-on-target RS approach has a mathematical property called negative gamma, while a more specifically developed network approach would have positive gamma.

Gamma is a term from quantitative finance that refers to the way that an option’s riskiness (really an option's delta, but let's keep things straightforward) responds to changes in the underlying asset (say, the option is based on U.S. S&P 500 index futures). An easy, admittedly overly simplistic way to look at it is to say that a positive gamma, or long gamma, position becomes MORE valuable as volatility increases. Positive gamma trades tend to be more valuable when there is more time available.

A negative or short gamma position entails an option that becomes less valuable as volatility increases (maintaining short gamma positions costs you more under more volatile conditions). Short gamma traders are looking to get paid upfront---in a sense, to follow McRaven’s dictum and achieve RS early in the engagement---and then they watch the clock very carefully. They hope to be in and out of the market before an extreme event occurs, as their losses can be very large. In contrast, the long gamma trader wants more and more time on his side and hopes for an extreme event to happen on his watch, because he will tend to make money in a wild-volatility environment. The difficulty for the long-gamma position is that it can be expensive to maintain one for long periods of time if market volatility ends up being low.

To conceptualize a short gamma business model, imagine an insurance company that specializes in writing homeowner's insurance policies for coastal Florida. If the company was able to somehow shorten the length of the Atlantic hurricane season, it almost certainly would love to do so, since the hurricane season leaves the company vulnerable to catastrophic losses.

For long gamma, think of a venture capital group that has made numerous small investments in promising start-up companies. The company has limited risks in any one investment. It knows that it can take awhile for things to work out, for connections to be made, for start-ups to gain knowledge through trial-and-error experimentation. Start-ups tend not to have advantages in the beginning---the successful ones will gain traction as they mature. The more time these small, vulnerable companies can stay alive, the better the chances that one of them will make it big and serve as the wildly profitable, breakout extreme event that the venture capital firm depends on seeing every now and then.

Gamma and Sensitive Site Exploitation (SSE)

The long gamma mission concept is one that has quite limited objectives in terms of pre-mission planning, but which contains an embedded capacity for very rapid exploitation, analysis, and new mission planning if the unit captures a lucky break.

In the current global counterinsurgency campaign, examples of these tail events are numerous. Gretchen Peters describes one of them in her study of the links between the opium trade and insurgents in Afghanistan and Pakistan:

U.S. counternarcotics agents raided a drug smugglers' lair in Kabul, where they confiscated a satellite telephone. When the CIA ran numbers stored in its memory, they discovered the telephone had been used repeatedly to call suspected terrorist cells in western Europe, Turkey, and the Balkans.

In the context of a global counterinsurgency campaign, a positive-gamma portfolio may entail having units in the arsenal that can operate in disturbing ways. This could entail a number of privileges that have historically been subject to abuse, including the authority to employ bribes, favors, and prostitutes to create effective local agent networks ; the ability to conduct “vigorous and time-sensitive” field interrogations on the scene and to break any number of international laws in the hot pursuit of cells and individuals ; access to quasi-legal or illegal intelligence collection sources (cell phones, e-mails); an assassination capability; UNODIR mission-planning freedoms; and the expensive and permanent attachment of transportation assets for conducting paramilitary expeditions. Suffice to say that the potential risks involves in creating such a dangerous attack dog and then unleashing it on foreign shores may be difficult for policymakers to willingly take on.

Partnering with Pirates: Can Hedge Funds Help?

Systems theory, Complexity, long-tailed distributions, and power laws have become virtual buzzwords among national security academics and bloggers, and I lost track of the number of times I heard the phrase "black swan" used at a terrorism think-tankers conference I attended a few years ago. One popular term for the systems-rich environment is "VUCA"---"Volatility, Uncertainty, Complexity, and Ambiguity".

I rather like VUCA and think that it is useful term. However, it is one thing to be aware of these things on an abstract, conceptual level, and another to be able to determine how these phenomena must be monetized, tactically, in the real world. One will frequently find that think-tank academics and public policy types will want to use all the right vocabulary words and appear to be knowledgeable about the latest scientific-sounding analytical tools and frameworks, but they will be unwilling to make any statements that could lead to testable predictions or to take a hard position regarding the many trade-offs and concerns that come with campaigning in the VUCA environment.

In this regard, I agree with Joan Johnson-Freese of the Naval War College that some percentage of military officers “should be trained to think like hedge fund managers”. Obviously what Joan means by “hedge fund thinking” needs to be fully defined, but I think her general opinion is that good hedge funds specialize in finding profitable trading opportunities in the particular markets and asset classes that they cover.

That said, it is important to note that many hedge fund guys run portfolios based on convergence plays---they make money from normalcy and lose money in extreme events. In a power law environment, that strategy eventually runs into trouble. In the case of a counterinsurgency campaign, that strategy would not be poised to quickly take advantage of unexpected exploitation windfalls.

I believe that the members of the hedge fund community that have some things to offer the policy academics and national security brain trusts will tend to be found in the directional global macro strategy space, where markets are viewed in holistic terms as ecosystems with many complex, interdependent parts (as opposed to, say, a very detail-oriented stock-picking strategy that seeks to isolate a single company and place it in a strategic vacuum). Although few of them have any operational qualifications to speak of, global macro managers tend to look to many different disciplines for inspiration and techniques, so they probably are better equipped to meet the operator and security think-tank communities halfway and to offer ideas that may be relevant to COIN.

(The possibility of cross-pollination between the worlds of trading and military affairs is not a unique view: Marine Corps senior officers have spent time with New York Mercantile Exchange traders (courtesy of decision theorist Gary Klein). Nassim Taleb has participated in intellectual exchanges with military and intelligence community professionals, and so on).

Illustration of Global Macro Thinking

To get a further sense of how hedge fund managers may try to construct trades that will profit from extreme events, here is a short trade discussion video featuring Taleb, who probably needs no introduction here, and the enfant terrible (but very smart) Scottish global macro fund manager Hugh Hendry. The two men have very different views on economic conditions and emerging risks and opportunities, but both want to retain extreme event-profit exposure in their portfolios:


(at the risk of taking an overly long, rambling detour from the subject at hand, I will go into a bit more detail on how a global macro hedge fund manager like Hendry is setting up a big trade. I believe that the mysterious low risk/high payoff trading opportunity that Hendry alludes to at the end of the clip involves buying credit default swaps on Japanese corporations, particularly utility companies, that have high rollover-debt requirements.

(At almost 200%, Japan's debt/GDP ratio is the second highest in the world---after Zimbabwe's---and the government has been able to finance this debt at extremely cheap rates because of "special" access to massive Japanese domestic savings. The situation in Japan has now become dire---tax receipts have dropped about 15% and expenses are double receipts. Worse, demographic realities and years of zero-percent interest rates are driving Japan's savings rate down to very low levels, which will eventually force Japan to have to finance its debts in the international bond markets. Higher interest rates could cause Japan's debt service payments alone to converge on, perhaps even exceed, its revenues, which would probably force a restructuring that would have terrifying implications for investors and institutions all over the world.

(An advantage that the Japanese government has over, say, the United States is that much of Japanese government debt was issued in longer-term maturities. However, many Japanese corporations have short-term debt that must be rolled over at the same time that the voracious Japanese government is trying to desperately sell large amount of its own debt to cover its structural deficits. Hendry believes that this will increase the borrowing costs of Japanese corporations and so he has purchased credit default swaps that will pay off in the event that the corporations run into financing trouble.)

Convexity

In simplest terms, developing the ability to exploit fat-tailed statistical distributions entails becoming skilled at constructing and maintaining a portfolio of long option positions. Long options present positive convexity, which means that extreme events will tend to represent limited-liability profit opportunities rather than catastrophic periods of large losses. However, being able to capture extremes in a stochastic environment usually means that prediction is impossible, so tactics, techniques, and procedures that give operators the ability to recognize and exploit unexpected opportunities---trendfollowing, as described in an early post on disaster prediction and trading systems---becomes critical.



Imagine that, on each of the above graphs, the vertical axis depicts profitability of a hedge fund strategy and the horizontal axis depicts a continuum of market price changes, starting with very negative price changes on the far left, zero change in the middle, and then moving to very positive price changes on the far right. The concave profit function depicts a strategy that makes money when market prices essentially do nothing---the profit peaks at zero change, the mid-point of the price change continuum. The convex profit function has two peaks, because it makes money at the positive and negative extremes, when markets rise or fall in large, divergent moves.

Living on Kurtosis: How Crisis Hunting Hedge Funds Shoot Moving Targets



(top 3gun competitive shooters like Bennie Cooley have three different techniques for engaging moving targets)

Casual and abstract connections are easy to make, but linking Black Swan hedge funds and counternetwork operations in a meaningful way means trying to identify how the fund managers make money from extreme events and how these practices can somehow be extended to the very different world of commando units and vicious urban fighting. To attempt to describe how hedge funds and Commodity Trading Advisors (CTAs) try to systematically profit from tail events in the markets, I will run the risk of the strained analogy and recruit some ideas and terms from yet a third disparate group---the competitive shooting community. I have had the opportunity to train with a few great competitive riflemen, skeet- and trap-shooters, including Bennie Cooley and King Heiple, and was taught that there are three ways for a rifleman or shotgunner to engage moving targets: the ambush, the sustained lead, and the swing-through. Interestingly, these techniques seem to correspond to those used by hedge fund managers to capture profits from extreme events.

-In the ambush technique, the shooter sets his sights on a location that the target must move through in the future. As the target moves into this space, the shooter engages it. An obvious problem with the ambush is that a fast-moving target can suddenly appear in the shooter’s sights and force a sloppy trigger pull. For this reason, the ambush technique is best used on slow-moving targets at long ranges; the advantage of the ambush is that the shooting position can be prepared to a very high degree.

The ambush equivalent in the trading world would be the type of strategies that are employed by options traders like Nassim Taleb. Taleb uses deep out-of-the-money straddles---option strategies that involve purchasing a call and a put and which pay off if market prices move violently up or down---to profit from extreme directional moves either up or down. He made his reputation on one such trade: Nassim had purchased a large number of deeply out-of-the-money (and very cheap) options on Eurodollar futures contracts prior to the spectacular market crash of October 1987, and these options provided the equivalent of years of profitable trading when Eurodollars spiked during the crisis.

-The sustained-lead technique has the shooter tracking a moving target with his muzzle and keeping slightly ahead as he smoothly depresses the trigger. The natural pause of the movement as the trigger breaks causes the sights to converge on the target as the weapon fires. This helps to avoid the major problem that shooters face when engaging moving targets: the tendency to get on the trigger too late and to shoot behind the mover.

CTAs that employ certain quantitative “signal vs. noise” trendfollowing strategies use something similar to the sustained lead. Some strategies involve setting statistical “tripwires” above and below the current average price of the market. The sensitivity of the tripwires is a function of the volatility of the market: if prices are moving wildly on a daily basis, the trading algorithms will set entry tripwires that are some distance from current prices in order to stay out of the way of the white noise. If prices are barely moving at all, the tripwires can be set fairly close because a relatively small divergence from current prices could have significant meaning.

Sustained lead has similarities to ambush trading and both tend to make their major profits at the same time, but there are important differences as well. I note that an estimated 95% of high-level skeet shooters use the sustained lead approach, and our firm employs it as our primary trading strategy because we feel it has some important advantages over the other systematic kurtosis-exploitation methods (but they all can work very well and there is an inescapable subjective element here, since the trading strategy must be appropriate for the psychological attributes---the emotional command system settings described by our old friend Jaak Panksepp---of the trader).

-Swing-through techniques have the shooter starting with his muzzle behind the target, and then accelerating to overtake the target as the trigger is depressed. As in the sustained lead, the technique attempts to mitigate the tendency of most shooters to fire too late.

The trading equivalent of the swing-through is the use of simple momentum models that buy and sell when prices exceed or fall below a computed moving average. Unlike the sustained lead, no filter is used to try to differentiate between signal and noise in market price action. These systems worked very well with commodity and financial futures in the 1970s and a simple, robust commercial trading system called "Aberration" that uses/used this type of algorithm was consistently ranked as one of the top trading systems available based on real-time "paper-trading" results. Swing-through systems, which are sometimes also called "reversal" systems, may come back to wild profitability again, but many of the original proprietary trading teams that used them have since moved towards sustained lead models as markets have become choppier.

I believe that most F3EA missions are going to be conceptually similar to the swing-through approach to momentum trading, and will share some of the same strengths and weaknesses. The major strength of the swing-through is that it is always in the market looking for trends to exploit; the major weakness is that it can be "tricked" or faked into following false leads because it has no filter for distinguishing between noise and signal.

In an operational context, this may mean that so much intel is gathered from grassroots efforts---local missions to exploit prisoners and conduct SSE---that analytical capacities become overtaxed. Over time, the whole decision system could become inundated with stimulus, causing it to slow down, causing the ability to originate high-quality missions to hit a bottleneck, and causing the F3EA organization to lose the agility that is its primary weapon against insurgents.

A possible solution would be to gradually raise the inhouse analytical capabilities of the field teams, giving them a greater discretion and precision when it comes to intelligence collection on the target.

7 comments:

  1. I'm not qualified to comment substantively on this series, but I just thought I'd say I'm enjoying it immensely. We must be getting close to building Batman, eh?

    BTW, I think you're right to not insist too much on falsifiability with respect to OODA.

    ReplyDelete
  2. Yes, yes, I think Batman is coming...

    ReplyDelete
  3. Hi, this blog is really amazing and provide me answers to all my questions. This is really informative and I will for sure refer my friends the same. I got the freebies with the Com Luv premium and adding this now makes it all even juicier than ever.

    phoenix property management

    ReplyDelete
  4. You made some decent points there. I looked on the internet for the issue and found most individuals will go along with your opinion. Thanks!phoenix property management

    ReplyDelete
  5. I really thankful to you for this great read!! You did a very great job, keep it up.Pheonix property management

    ReplyDelete
  6. The primary purpose of the Urban Aero Systems is to introduce cutting-edge aerospace technologies, while having its own modern infrastructure, with an experienced team in Aviation. We assist in providing clients with the world's most highly specialized consultants and research partners in the Aviation field.
    http://www.urbanaerosystems.com/

    ReplyDelete
  7. Get daily suggestions and guides for making $1,000s per day ONLINE for FREE.
    SUBSCRIBE NOW

    ReplyDelete