homehome Home chatchat Notifications


How A.I. and game theory is fighting poaching and illegal logging

Park rangers risk their lives on a daily basis to protect wildlife from poachers. They're also underfunded and understaffed, so allocating resources as efficiently as possible is critical. This is where artificial intelligence, big data, machine learning, and game theory come in. The A.I. can identify and predict poaching patterns, and adapts in time so that park patrols can transition from "reactive" to "proactive" control. Pilot programs launched in Uganda and Malaysia have so far been successful, and a similar system is currently being developed for illegal logging.

Tibi Puiu
April 25, 2016 @ 3:49 pm

share Share

Park rangers risk their lives on a daily basis to protect wildlife from poachers. They’re also underfunded and understaffed, so allocating resources as efficiently as possible is critical. This is where artificial intelligence, big data,  machine learning, and game theory come in.

The A.I. can identify and predict poaching patterns, and adapts in time so that park patrols can transition from “reactive” to “proactive” control. Pilot programs launched in Uganda and Malaysia have so far been successful, and a similar system is currently being developed for illegal logging.

Elephant ivory seized from poachers in Garamba. Credit: Flickr Enough Project

Elephant ivory seized from poachers in Garamba. Credit: Flickr Enough Project

The AI-driven system was developed by researchers at the University of Southern California (USC). Aptly named Protection Assistant for Wildlife Security (PAWS), the A.I. essentially plays “green security games”, or game theory for wildlife protection.

Game theory is “the study of mathematical models of conflict and cooperation between intelligent rational decision-makers.” It’s mainly used in economics and psychology to predict outcomes, but game theory can work just as well wherever coordinated human activity is involved. Previously, similar methods were used by the Coast Guard and Transporation Security Administration to improve airport and waterway security.

Using data like patrol activity and poaching signaling, PAWS can plan which routes rangers need to follow to maximize poacher apprehension or minimize wildlife risk. What makes it particularly practical is that it also incorporates topographical data, so the plotted routes actually make sense. Rangers are also directed on patrol routes that minimize elevation changes — this saves time and energy.

As PAWS is fed more data, it becomes better at predicting the best outcomes against poaching. Since PAWS was implemented in Uganda and Malaysia in 2014, authorities report more observations of poaching activities per square kilometer. To make things more interesting, PAWS also randomizes routes so poachers can’t learn to avoid which routes to avoid.

“This research is a step in demonstrating that AI can have a really significant positive impact on society and allow us to assist humanity in solving some of the major challenges we face,” said USC’s  Milind Tambe, professor of computer science and industrial and systems engineering.

PAWS can be fitted to combat all sorts of illegal activities, like logging. Since 2015, two NGOs in Malaysia have been using PAWS to protect the nation’s forests.

The team recently combined PAWS with a new tool called CAPTURE (Comprehensive Anti-Poaching Tool with Temporal and Observation Uncertainty Reasoning) that predicts attacking probability even more accurately.

“There is an urgent need to protect the natural resources and wildlife on our beautiful planet, and we computer scientists can help in various ways,” said Fei Fang, a Ph.D. candidate in the computer science department at the University of Southern California (USC). “Our work on PAWS addresses one facet of the problem, improving the efficiency of patrols to combat poaching.”

Such solutions are impressive and much needed. There are only 3,200 tigers left in the world, down from more than 60,000 a century ago. Elephants, rhinos and scores of other wild animal species are threatened by extinction due to poaching. Meanwhile, illegal loggers harvest timber worth as much  as $100 billion each year. This undermines economies, destroys habitats and further exacerbates a global problem. Like before, technology is here to help solve complex problems.

share Share

This 5,500-year-old Kish tablet is the oldest written document

Beer, goats, and grains: here's what the oldest document reveals.

A Huge, Lazy Black Hole Is Redefining the Early Universe

Astronomers using the James Webb Space Telescope have discovered a massive, dormant black hole from just 800 million years after the Big Bang.

Did Columbus Bring Syphilis to Europe? Ancient DNA Suggests So

A new study pinpoints the origin of the STD to South America.

The Magnetic North Pole Has Shifted Again. Here’s Why It Matters

The magnetic North pole is now closer to Siberia than it is to Canada, and scientists aren't sure why.

For better or worse, machine learning is shaping biology research

Machine learning tools can increase the pace of biology research and open the door to new research questions, but the benefits don’t come without risks.

This Babylonian Student's 4,000-Year-Old Math Blunder Is Still Relatable Today

More than memorializing a math mistake, stone tablets show just how advanced the Babylonians were in their time.

Sixty Years Ago, We Nearly Wiped Out Bed Bugs. Then, They Started Changing

Driven to the brink of extinction, bed bugs adapted—and now pesticides are almost useless against them.

LG’s $60,000 Transparent TV Is So Luxe It’s Practically Invisible

This TV screen vanishes at the push of a button.

Couple Finds Giant Teeth in Backyard Belonging to 13,000-year-old Mastodon

A New York couple stumble upon an ancient mastodon fossil beneath their lawn.

Worms and Dogs Thrive in Chernobyl’s Radioactive Zone — and Scientists are Intrigued

In the Chernobyl Exclusion Zone, worms show no genetic damage despite living in highly radioactive soil, and free-ranging dogs persist despite contamination.