An embeddable testbed for insurgent and terrorist agent theories: InsurgiSim
نویسندگان
چکیده
Many simulators today contain traditional opponents and lack an asymmetric insurgent style adversary. InsurgiSim prototypes an embeddable testbed containing a threat network of agents that one can easily configure and deploy for training and analysis purposes. The insurgent network was constructed inside a socio-cognitive agent framework (FactionSim-PMFserv) that includes: (a) a synthesis of best-of-breed models of personality, culture, values, emotions, stress, social relations, mobilization, as well as (b) an IDE for authoring and managing reusable archetypes and their task-sets (Sect. 2). Agents and markups in this library are not scripted, and act to follow their values and fulfill their needs. So it's desirable to profile the agents (e.g., faction leaders, cell logisticians, followers, bomb maker, financier, recruiter, etc.) as faithfully to the real world as possible. Doing this will improve the utility of InsurgiSim for studying what may be driving the insurgent agents in a given area of operation as Sect. 3 explains. InsurgiSim's bridge is an HLA federate and can be embedded to drive all or some of the insurgent agents in a 3rd party simulator. Three such examples are summarized in Sect.4. The paper closes with next steps to improve InsurgiSim's capabilities and utility.
منابع مشابه
More Combatants, More Terror?: An Empirical Test of the Outbidding Thesis
In armed internal conflict, violence against civilians is frequent. For insurgent groups, so-called terrorist acts are an important part of conflict with the state and yet there are numerous unanswered questions about the role and uses of terrorism during these conflicts. This paper examines the causes of terrorism in the context of a larger struggle between a state and insurgent groups. In par...
متن کاملPattern in escalations in insurgent and terrorist activity.
In military planning, it is important to be able to estimate not only the number of fatalities but how often attacks that result in fatalities will take place. We uncovered a simple dynamical pattern that may be used to estimate the escalation rate and timing of fatal attacks. The time difference between fatal attacks by insurgent groups within individual provinces in both Afghanistan and Iraq,...
متن کاملMitigating Issues Related to the Modeling of Insurgent Recruitment
Modeling the specific motivations and influences related to an individual‘s decision to become involved in insurgent warfare presents its own collection of unique challenges. The difficulty of the problem often necessitates simplifications that, while making the task more manageable, may inadvertently ̳smooth away‘ critical aspects of the problem. Augmenting the challenge is that research into t...
متن کاملCounterterrorism v. Counterinsurgency: Lessons from Algeria and Afghanistan
In the aftermath of the September 11, 2001 attacks on the United States the terms of terrorism and insurgency have become part of the everyday American lexicon and for that matter much of the international community’s as well. So common has the usage of these terms become that it would appear they are almost interchangeable if not the same. There is, however, a distinction between a terrorist a...
متن کاملParticle Swarm Social Adaptive Model for Multi-Agent Based Insurgency Warfare Simulation
To better understand insurgent activities and asymmetric warfare, a social adaptive model for modeling multiple insurgent groups attacking multiple military and civilian targets is proposed and investigated. This report presents a pilot study using the particle swarm modeling, a widely used nonlinear optimal tool to model the emergence of insurgency campaign. The objective of this research is t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Intelligent Decision Technologies
دوره 2 شماره
صفحات -
تاریخ انتشار 2008