Asymmetric Threat Assessment Tool (ATAT)

Gary W. King, Matthew Schmill, Andrew Hannon, Paul Cohen

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Planning for Effects Based Operations (EBO) requires understanding not just immediate effects - bomb damage and casualties - but also non-immediate secondary effects. This is difficult because secondary effects involve complex interactions of political, military, economic, social, infrastructure and information (PMESII) factors. Indeed, our experience in Bosnia, Somalia and Iraq implies that the psychological hearts-and-minds effects are often of greater importance in the long run than the primary military ones. We present the Asymmetric Threat Assessment Tool (ATAT), an agent based society simulator designed to explicitly model interacting causal chains on both physical and psychological levels. We discuss the use of a prototype of the tool in a Joint Forces Integrated Battlefield Command (IBC) experiment where it provided "what-if" analysis of situation dependent actions and reactions.

Original languageEnglish (US)
Title of host publicationSimulation Interoperability Standards Organization - 14th Conference on Behavior Representation in Modeling and Simulation 2005
Pages105-111
Number of pages7
StatePublished - 2005
Externally publishedYes
Event14th Conference on Behavior Representation in Modeling and Simulation 2005 - Universal City, CA, United States
Duration: May 16 2005May 19 2005

Publication series

NameSimulation Interoperability Standards Organization - 14th Conference on Behavior Representation in Modeling and Simulation 2005

Other

Other14th Conference on Behavior Representation in Modeling and Simulation 2005
Country/TerritoryUnited States
CityUniversal City, CA
Period5/16/055/19/05

Keywords

  • Group and individual behavior
  • Intelligent agents
  • Knowledge acquisition/engineering
  • Synthetic environments

ASJC Scopus subject areas

  • Modeling and Simulation

Fingerprint

Dive into the research topics of 'Asymmetric Threat Assessment Tool (ATAT)'. Together they form a unique fingerprint.

Cite this