Professional Documents
Culture Documents
Defence Science and Technology Laboratory, Portsdown West, UK; 2Craneld University, Craneld, UK
This paper rstly discusses the modelling of Peace Support Operations (PSO) within the defence simulation modelling
context. It then provides a summary background of the current relevant approaches in such modelling, taking account
of the increasing complexity of the strategic environment, and the relevance of ideas from Complex Adaptive Systems
theory. It goes on to describe the details of two agent-based models spanning the problem domain, which capture the
key ideas of complexity, within a PSO context, taking account of the complex interactions between peacekeepers,
civilians, insurgents and non-governmental organisations involved.
Journal of Simulation advance online publication, 26 March 2010; doi:10.1057/jos.2010.2
Keywords: conict analysis; defence studies; military
1. Introduction
Over the 60 years and more of defence operational research
(OR) as a recognised discipline, the nature of the operations
under examination have changed signicantly several times:
the battles of World War II; the early, nuclear-focused Cold
War, together with sporadic smaller operations, in the 1950s
and 1960s; the mature Cold War of the 1970s and 1980s; and
then the rapid change to the present far more complex
operational environment. Looking to the future, we need to
consider a very wide spectrum of possible operational
contexts. At one end of the spectrum are major hostilities,
although on a lesser scale than the NATO-Warsaw Pact
cataclysm which was the focus of planning during the Cold
War. While serious conict in Europe cannot be entirely
ruled out, the Gulf Wars of 1991 and 2003 are seen as much
more representative of this end of the spectrum in the near
term. Towards the other end of the spectrum we have a
range of operations including peacekeeping, peace enforcement, protected evacuations and the provision of humanitarian relief. We bundle all of these together under the term
Peace Support Operations (PSO). Increasingly, military
means are used only in close conjunction with other means,
such as diplomacy and economic reconstruction. Following
the events of 11 September 2001, counter-terrorism is now
also given prominence.
In the more global change which we are now experiencing,
transitioning from the industrial age to the information age,
defence is not immune, and the rise of concepts such as
network-centric operations (Alberts et al, 2003), also known
as network-enabled capability in the UK and elsewhere in
*Correspondence: J Moffat, Policy and Capability Studies Department,
Defence Science and Technology Laboratory (Dstl), Portsdown West,
PO17 6AD, UK.
Conventional warghting
PSO
Mission/operation
Stability
Focus
Commitment
Relatively stable
Enemy
Common (military)
Principles
Unity
Decision making
Operations
Of command
Hierarchical
Surprise, secrecy
Of purpose
Consensus
Transparency
Information
Nature of the problem
Key question
Focus
Situation awareness
Information database
Known unknowns
How to get information
Enemy military
Common: air-land-sea
Very large, well structured
Unknown unknowns
What information to get
Military, political, economic, social factors
Limited dissemination; more complex
Larger, less structured
Behavioural aspects
Very difcult
Political, military and societal
Softer analysis (including soft OR).
Non-linear interaction
Decentralised control
There is no master oracle dictating the actions of each and every combatant.
Self-organisation
Non-equilibrium order
Military conicts, by their nature, proceed far from equilibrium. Correlation of local effects is key.
Adaptation
Collectivist dynamics
There is a continual feedback between the behaviour of combatants and the command structure.
Villages 2
Village 1
Valley pass
High ground
overlooking city
Seaport
City (N)
City (E)
City (W)
City (S)
Plan
Objective
BLUE PARTY
CONCEPT OF OPERATIONS
A group of missions linked by logical initiation conditions.
PLAN A
Mission
Activity
10. Relationships
In models of warghting, typically only two sides are
represented. This is a suitable assumption for most conventional battles. However, in non-warghting operations this
assumption is not valid, as there are often a large number of
participants, none of whom can be classied purely as hostile
to each other. For example, in the context of Bosnia there
were three main armed factions, their respective civilian
populations and the peacekeeping forces. Very quickly it
becomes obvious that any successful attempt to model nonwarghting operations requires a multi-sided approach. It was
decided that each side in the simulation would be identied
as a separate party and that the relationships between those
parties would be used to describe their afliations, rather than
aggregating like-minded parties into distinct sides.
In accepting that a multi-sided model is required it is
necessary to identify the relationships that will be required to
describe the afliations of each party. Again, in modelling of
warghting, only one type of relationship is modelled, that
of hostility between parties. A greater range of relationships
is required in non-warghting models. A ve-point scale is
used to represent the range: hostile, uncooperative, neutral,
sympathetic (co-operative), and friendly. It was also
recognised that a relationship between two parties does not
have to be symmetric. For example, a NMO may consider its
Figure 3
PLAN B
PLAN C
PLAN F
PLAN D
SUCCESS
PLAN G
PLAN I
FAILURE
Key:
Agent
2
One cell away
Two cells away
Three cells away
Figure 5
Figure 6
Sensor range
Figure 7
Add up
weights within
shaded area for
both i and j
cells
these sites and will prefer to move to the site with the higher
utility. Broadly speaking, the agent will look at each site
within sensor range and add the weights corresponding to the
contents of each site, multiplied by a distance factor. It does
this for both site i and j and moves towards the site where this
utility calculation is higher. Thus although the agent course of
action is set to move, it may decide to stay in the same cell, if
this has higher utility than any other cell it could move to.
In calculating this utility, each factor in the calculation is
assigned a weight by the original agent, with a positive
weight meaning attraction, and a negative weight a
repulsion. Each weight has an integer value between
(100) and ( 100); the higher the value, the more the
agent wants to move towards that factor. These weights
depend on the actor type of the agent (ie, whether it
represents a peacekeeper squad, NGO group, etc).
The following factors are included:
1.
2.
3.
4.
5.
6.
7.
8.
PK peacekeeper;
NG NGO;
IN insurgent;
CI civilian;
CO site containing combat;
CN site containing a civilian in need;
EL site without electricity;
WA site without water.
simulations. As time progresses, we would expect the peacekeepers and insurgents to self-organise and form clusters of
interaction, which we call skirmishes.
14. Skirmishes
We dene a skirmish as a continuing series of interactions
between peacekeepers and insurgents. A skirmish is started
by the insurgents through a single shot or bomb. This can
result in anything from no response to an exchange of re
involving the whole set of peacekeepers. A skirmish
continues until it peters out with no interaction from either
side for at least one timestep. Two metrics are used; the
number of shots and bombs employed (the size of the
skirmish), and the length of the skirmish in model timesteps
(the duration of the skirmish).
A number of scenarios of increasing complexity were
modelled. In each case, the scenario is run 50 times, and the
results pooled as a cloud. (This is standard practice in
complexity-based analysis.) In our case this is justied
because the skirmishes occur at random throughout the
runs, and can be seen as independent events. For each of
these, statistics were accumulated throughout the 50 runs of
the model, in terms of the distribution of skirmish sizes, and
skirmish durations.
Figures 9 and 10 show the results for the most complex
scenario modelled. These are plotted on a log-log scale to
test the hypothesis that they approximate to a powerlaw
distribution. (The reasons for expecting such powerlaw
behaviour, based on data from real conicts, are discussed
below.) A powerlaw distribution would form a straight line
on such a plot, and the best t straight line is shown on
each plot.
These results (and the others obtained from the model)
indicate a wide spectrum of skirmish sizes and durations
15. Summary
In this paper, we have discussed the ideas of complex and
adaptive systems, and how these ideas relate to the
increasing complex environment of PSO. Having reviewed
the evolution of closed form simulation modelling ideas in
this environment, we described in detail two agent-based
approaches spanning the problem domainthe DIAMOND model at the whole of country perspective, and
the HWM at the local tactical level. Further development
of the HWM is underway, with the aim of producing a
closed form simulation of PSO at the tactical level, which
incorporates the ideas being developed in the STOAT
tactical gaming environment.
AcknowledgementsThe lead author wishes to acknowledge discussion and exchange of ideas on complex endeavours with their
originators: Dr David Alberts (Ofce of the Secretary of Defense,
US DoD, Washington DC, USA) and Dr Richard Hayes (President,
Evidence Based Research, Washington DC, USA).
References
Alberts D and Hayes R (1995). Command Arrangements for Peace
Operations. US DoD CCRP: Washington DC, USA.
Alberts D and Hayes R (2007). Planning; Complex Endeavours. US
DoD CCRP: Washington DC, USA.
Alberts D, Garstka J and Stein F (2003). Network Centric Warfare.
US DoD CCRP: Washington DC, USA.
Atkinson S and Moffat J (2005). The Agile Organisation: From
Informal Networks to Complex Effects and Agility. US DoD
CCRP: Washington DC, USA.
Dobias P and Sprague K (2009). Intermittency of casualties in
asymmetric warfare. J Battleeld Technol 12(1).
Frewer L (2007). The development of an agent based model to
investigate possible power law relationships in peacekeeping
operations PhD Thesis, Craneld University.