Mr. Steve Verna Northrop Grumman 01 May 2007 Validation Methodology for Agent-Based Simulations Workshop Irregular Warfare Working Definition.

Slides:



Advertisements
Similar presentations
International Relations Theory
Advertisements

INTRODUCTION TO SPECIAL OPERATIONSUnclassified Special Operations Overview Click arrow below to continue WARNING - This document contains technical data.
Special Operations Center of Excellence
What is Game Theory? It is part of the theory of purposeful behavior commonly known as rational choice theory. It specifically focuses on situations with.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
The Language of the Military Profession
Information Warfare an Information Management Perspective JS Vorster & R P van Heerden Research Funding: DST, CSIR DPSS.
Breakout 6: Financial Networks, Agent-Based Simulation, and Large- Scale Computation secretary: Michael Wellman moderator: William Rand.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Designing Social Inquiry
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 1 Introduction to Police Administration.
Nature and Scope of Marketing Research
CSCE 727 Strategic Information Warfare. National Security Issues Information Warfare - Farkas2 Interesting read: B. Baer Arnold, Cyber war in Ukraine.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
US Army Combined Arms Center Approach to the IW Environment.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
The Changing Face of War. Introduction “If you want peace, understand war” Basil Lindell Hart You may not be interested in war, but war is interested.
Defensive Terrain in Cyberspace Thomas Pingel January 31, 2002 Advisor: Sara Fabrikant Committee?
Counterterrorismvs.Anti-terrorism. ► What are the goals of counterterrorism?
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Joint Training Challenges of Irregular Warfare/COIN and Full Spectrum Training Requirements Brief for WJTSC LtCol John Merna, J7/9-TJ 23 September.
1. 2 USAF CONOPS & AIR AND SPACE POWER REVIEW Chap 23 & 24.
SponsorProblem AssessRisk SolutionStrategy Measures of Merit (MoM) Human & OrganisationalIssues Scenarios Methods & Tools Data Products
How are decisions made in organizations?
Security Environment During Coalition Operations.
Validation Methodology for Agent-Based Simulations Workshop Perspectives on Agent-Based Simulation and VV&A Dr. Bob Sheldon Joint and External Analysis.
ASYMMETRIC THREATS, TERRORISM AND THE CHANGING FACE OF WARFARE By Professor Richard Shultz Director, International Security Studies Program The Fletcher.
Hard Date Change in Master 1 TRADOC: Where Tomorrow’s Victories Begin Adaptive Leaders Methodology (ALM) 18 February 2009 Mr. Donald Vandergriff Leader.
Aspen, Colorado September 19 th, 2013 BLACK AND VEATCH UTILITY EXECUTIVE LEADERSHIP INSTITUTE: “PREDICTABLE PERFORMANCE”
A Military Guide to Terrorism in the Twenty-First Century
NATO CLASSIFICATION.
The Changing Role of Military Officers and Defense Officials in Dealing with Future Defence and Security Challenges.
Liberal Approaches to International Relations POL 3080 Approaches to IR.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Jan Kallberg, Bhavani Thuraisingham Chapter 19 - From Cyber Terrorism to State Actors’ Covert Cyber Operations,
TEFMA 2008 Sudhish Nayyar. AGENDA CRISIS –What is the worst thing that could happen? –Where? –When? Steps in effective Crisis Management Aon’s capabilities.
Foresight Planning & Strategy Dr. Sameh Aboul Enein.
Management Practices Lecture-5 1. Recap Behavioral Management The Hawthorne Studies Theory X and Y Theory X v. Theory Y Theory Z Systems Considerations.
Military Intelligence
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Boston – June 12 th. Ready Now Chris Kozlow Collaboration "I not only use all of the brains I have, but all I can borrow." Woodrow Wilson 28th President.
Office of the Deputy Chief of Staff
 War  Guerrilla war  Terrorism  Coups d’état  Assassination  Economic/property damage  Sabotage  Riot Continuum 1.
POWER IN WORLD POLITICS PO420 World Politics Prof. Murat Arik School of Legal Studies Kaplan University.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Winning the Next War 1 Winning the Next War: Institutionalizing Lessons Learned from Today’s Regional Conflicts The American Institute of Engineers Conference.
Application of Criminological Theory to Terrorism Prevention Detective Eric Paull Planning Research and Development Akron, OH Police Department.
1 Homeland Security/Defense Education Consortium Recommendations Current and Emerging Threats Context and Organizations Policies, Strategies,
CHAPTER ONE EDUCATIONAL RESEARCH. THINKING THROUGH REASONING (INDUCTIVELY) Inductive Reasoning : developing generalizations based on observation of a.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Horizon 2020 Secure Societies European Info Day and Brokerage Event
What is Cyber Security Cyber War Cyber Power?
Strategic Planning for Learning Organizations
Causes, Practices and Effects of War
Capital Project / Infrastructure Renewal – Making the Business Case
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Factors Contributing to Rise of Authoritarian Dictators
Conduction of a simulation considering cascading effects
OVERLOOKED LESSONS FOR 21ST CENTURY CONFLICT
R. W. Eberth Sanderling Research, Inc. 01 May 2007
Chapter 19 Transnational actors and international organizations in global politics Name: MA XINYUE Student No.:ID02403 Student No.:ID02403.
Strategic threat assessment
Individual Differences: Personality, Skills, and Abilities
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Homeland Security Program School of Health, Science & Criminal Justice Fall 2015 Assessment Report
STUDYING LAW AT ROMA 3 LEGAL Responses To Global CrIme
Small unit proficiency
Brigadier General Md Amin Akbar Colonel Justus Majyambere
Presentation transcript:

Mr. Steve Verna Northrop Grumman 01 May 2007 Validation Methodology for Agent-Based Simulations Workshop Irregular Warfare Working Definition

Purpose of This Briefing To provide participants with a working definition of Irregular Warfare (IW) for potential use in future discussions in this workshop To explain the rationale behind MCCDC’s focus on IW To define relevant aspects of IW at the tactical, operational and strategic levels of warfare

Definitions of IW “A warfighting philosophy that seeks to achieve strategic objectives by avoiding an adversary's conventional military strength while eroding an adversary's power and will, primarily through the use of indirect, non-traditional aspects of warfare.” Irregular Warfare Workshop (20 Sep 2005)

Definitions of IW (Cont’d) “A violent struggle among state and non- state actors for legitimacy and influence over the relevant populations.” Terms of reference for upcoming MORS workshop on “Improving Cooperation Among Nations in Irregular Warfare Analysis,” Naval Postgraduate School, Monterey, CA (December )

Why the Focus on IW? Military Operations Research cannot remain locked in the Cold War New adversaries are:  Non-Governmental, but organized nonetheless  Using new warfare techniques “Hearts and minds” focus May be striving to achieve non-military (e.g., economic, political, ideological) objectives and impacts (e.g., WTC attack) Capturing terrain is irrelevant MS&A needs to catch up  IW may best be modeled and analyzed through ABS

General Historical Perspective Military modeling and analysis dates from 1940s  Anti-submarine/U-boat search and screening Availability of digital computers (1960s) made wide-spread use of military simulation possible  Force-on-force, physics-based simulations Confidence in predictive abilities of models required confidence in those models: VALIDATION Emergence of unparalleled conventional military power of U.S. (1990s) led to rise in consideration of asymmetric threats  IW is one aspect of this

General Historical Perspective (Cont’d) Modeling IW requires new tools  Force-on-force perspective not/less important  Psychological aspects of decision making rise in importance  Need to capture/simulate human behavior New tools require new techniques  Including new validation techniques

Modeling Irregular Warfare Many intangibles  Population sensitivity  Human factors Non-linearity  Breakpoints Co-evolution  Both sides adapt to the actions of the other in dynamic and unpredictable ways Both sides operate with different objectives

IW Boundaries Our definition of IW needs to encompass all levels of warfare  Tactical, operational, strategic  Boundaries between these levels are ‘soft’ We are simplifying the issue by focusing on selected aspects of each level of warfare

Aspects of Tactical IW Appropriate for Potential Consideration in This Workshop: Improvised explosive devices Suicide bombers Hostage taking Sabotage Urban warfare Inappropriate for Potential Consideration in This Workshop: Criminal activities Computer viruses Cyber attacks Drug trafficking

Aspects of Operational IW Appropriate for Potential Consideration in This Workshop: Guerrilla warfare Psychological operations Terrorism Intelligence activities Inappropriate for Potential Consideration in This Workshop: Commodities trading manipulation Money laundering

Aspects of Strategic IW Appropriate for Potential Consideration in This Workshop: Nation building Infrastructure restoration & improvement Information operations Subversion Population dynamics Inappropriate for Potential Consideration in This Workshop: Political campaigns