Wargaming

A General Theory of Influence in a DIME/PMESII/ASCOP/IRC2 Model

Abstract:

The leading question of this paper is “How can one conceptualise influence warfare in order to simulate it?” The authors discuss the foundational aspects of theory and model of influence warfare by building a conceptual framework. The framework forms a prism with three axes along the DIME/PMESII/ASCOP dimensions. The DIME concept groups the many instru-ments of power a nation-state can muster into four elements: Diplomacy, Information, Military, and Economics. PMESII describes the operational environment in six domains: Political, Military, Economic, Social, Information, and Infrastructure. ASCOPE is used in COunterINsurgency (COIN) environments to analyse the cultural and human environment (the ‘human terrain’) and encompasses Areas, Structures, Capabilities, Organization, People, and Events.

The Persuasion Game: Serious Gaming Information Warfare and Influence

Abstract:

In an age of hybrid, asymmetric, and non-linear conflict, the role of Information Operations has become increasingly important. This paper presents a research project examining ways of better enabling stakeholders to respond to the increasing use of influence in warfare, in hybrid conflict, in competition, and in the realms of hard and soft politics. The project consisted of an international, cross-sector research group that drew on military, government, academic, and industry expertise in order to understand the best way to employ wargame influence. The use of wargaming as a training/research tool is familiar in military and civil contexts; the project discussed presents a truly innovative approach to influence studies, and shows the benefits of an interdisciplinary, cross-domain research team.

Specifying Functional Requirements for Simulating Professional Offensive Cyber Operations

ABSTRACT

Several nations are acquiring the capability for conducting professional offensive cyber operations to fight wars and combat crime and terrorism. They need to know how the attack process works, what resources are required, and how to command and control operations. Simulation is a powerful technology for gaining understanding about such issues. This article presents the functional requirements specification for an agent-based simulator of professional offensive cyber operations in a networked environment. Requirements cover the simulation infrastructure, including time handling, stochastic behaviour, modelling representation, interfacing, and simulation control. Cyber-specific use cases are grouped by stakeholder and phase of operation.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com