Skip to main content

The NOEM: A Tool for Understanding/ Exploring the Complexities of Today’s Operational Environment

  • Chapter
  • First Online:
Handbook of Computational Approaches to Counterterrorism

Abstract

Recent events have shown that today’s and future wars are/will be much different than those fought in the previous decades. Destroying the will of the people will no longer be the primary goal in such endeavors. Success will be decided by our ability to understand the local populace, provide human security, and eventually enable the country/region to govern itself and maintain security. To accomplish this, we need to understand the environment in which we are to operate in—including the local populace. The National Operational Environment Model (NOEM) is a large-scale stochastic model representing the environment of a nation-state or region along with a set of capabilities which allow one to exercise the model. The NOEM enables a user to identify potential problem regions within the environment, test a wide variety of policy options on a national or regional basis, determine suitable courses of actions given a specified set of initial conditions, and investigate resource allocation levels that will best improve overall country or regional stability. The different policy options or actions can be simulated, revealing potential unforeseen effects and general trends over time. In this chapter we explore previous work in the area of stability management, provide an overview of the NOEM, and discuss two different use cases.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 149.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Army Field Manual 3-24.2, Tactics in counterinsurgency. Headquarters Department of the Army, Washington DC, 21 April 2009, 3–1, see also 1–22 – 1–23

    Google Scholar 

  2. Barnett TPM (2004) The pentagon’s new map: war and peace in the twenty-first century. G.P. Putnam’s Sons, New York

    Google Scholar 

  3. The National Security Strategy of the United States of America, September 2002

    Google Scholar 

  4. Tyson AS (2008) Standard warfare may be eclipsed by nation-building. By Washington Post Sunday, October 5, 2008

    Google Scholar 

  5. Gates RM (2008) Speech to the National Defense University National Defense University (Washington, D.C.) As Delivered by Secretary of Defense Robert M. Gates, Washington, D.C., Monday, September 29, 2008

    Google Scholar 

  6. Department of Defense Directive Number 3000.05, November 28, 2005, paragraph 4.2

    Google Scholar 

  7. Dixon J (2009) What causes civil wars? Integrating quantitative research findings. International Studies Review 11:707–735

    Article  Google Scholar 

  8. Goldstone JA, Bates RH, Epstein DL, Gurr TR, Lustik MB, Marshall MG, Ulfelder J, Woodward M (2010) A global model for forecasting political instability (19 pages; b/w). American Journal of Political Science 54(1):190–208

    Article  Google Scholar 

  9. Abdollahian M, Baranick M, Efird B, Kugler J (2006) Senturion a predictive political simulation model. Defense & Technology Paper, National Defense University, Washington DC, July, vol. 32

    Google Scholar 

  10. Anderson EG (2009) Modeling insurgencies and counterinsurgencies. Proceedings of the 2009 International System Dynamics Conference (Albuquerque, NM)

    Google Scholar 

  11. Epstein JM, Axtell R (1996) Growing artificial societies, social science from the bottom up. Brookings Institution Press, 1775 Massachusetts Avenue, N.W., Washington DC; The MIT Press, Cambridge, Massachusetts & London, England

    Google Scholar 

  12. Pierson B, Barge, W, Crane C (2005) The hairball that stabilized Iraq: modeling FM 3–24 National Defense University HSCB Conference. http://www.ndu.edu/ctnsp/HSCB/HSCB COIN - CDRBrett Pierson et al - The Hairball that Stabilized Iraq -Modeling FM 3-24.pdf

  13. Kerr A (1995) National environmental indicators: program summary. Environment Canada, State of the Environment Directorate, Indicators Branch, Ottawa. Unpublished

    Google Scholar 

  14. Richardson DB (2004) Modeling and analysis of post-conflict reconstruction. MS Thesis, United States Air Force Institute of Technology

    Google Scholar 

  15. Robbins MJ (2005) Investigating the complexities of nation building: a sub-national regional perspective. MS Thesis, School of Engineering and Management, Air Force Institute of Technology, Wright Patterson AFB, OH

    Google Scholar 

  16. Fensterer GD (2006) Planning and assessing stability operations: a proposed value focus thinking approach. MS Thesis, School of Engineering & Management, Air Force, Institute of Technology, Wright Patterson AFB, OH

    Google Scholar 

  17. Manwaring MG, Joes AJ eds (2000) Beyond declaring victory and coming home: the challenges of peace and stability operations. Greenwood Publishing Group, ISBN 0275967689, 9780275967680

    Google Scholar 

  18. Orr RC (ed) (2004) Winning the peace: an american strategy for post-conflict reconstruction by center for strategic and international studies. Center for Strategic & International Studies (CSIS), ISBN 0-89206-444-7

    Google Scholar 

  19. Covey J, Dziedzic Michael J, Hawley LR (eds) (2005) The quest for viable peace: international intervention and strategies for conflict transformation. United States Institute for Peace, ISBN-10: 1929223676, ISBN-13: 978-1929223671

    Google Scholar 

  20. Cederman L-E, Girardi L (2007) Beyond fractionalization: mapping ethnicity onto nationalist insurgencies. American Political Science Review 101:173–185 Copyright © 2007 by the American Political Science Association. DOI: 10.1017/S0003055407070086, Published online: 05 February 2007

    Article  Google Scholar 

  21. Karl R, de Rouen JR, Sobek D (2004) The dynamics of civil war duration and outcome. Journal of Peace Research 41:303–320

    Article  Google Scholar 

  22. Fearon JD, Laitin DD (2003) Ethnicity, insurgency, and civil war. American Political Science Review 97(1):75–90

    Google Scholar 

  23. Kalyvas S (2006) The logic of violence in civil war. Cambridge University Press, New York, 508 p

    Book  Google Scholar 

  24. Ruvinsky A, Wedgwood WJ (2011) V&V Techniques. Unpublished – Office of Naval Research, Model Evaluation and Application (MESA)

    Google Scholar 

  25. Lakatos I (1965) Falsification and the methodology of scientific research programmes. In: Lakatos I, Musgrave A (eds) Criticism and the growth of knowledge. Cambridge University Press, Cambridge

    Google Scholar 

  26. Sargent R (2004) Validation and verification of simulation models. Proceedings of the 2004 Winter Simulation Conference

    Google Scholar 

  27. Zacharias G et al (2008) Behavioral modeling and simulation: from individual to societies. The National Academies Press, Washington, DC

    Google Scholar 

  28. Hartley D, Starr S (2010) Verification and validation. In: Kott A, Citrenbaum G (eds) Estimating impact: a handbook of computational methods and models for anticipating economic, social, and security effects in international interventions. Springer, New York, pp 311–336

    Google Scholar 

  29. Petty M. (2010) Chapter 10: Verification, validation, and accreditation. In: Sokolowski JA, Banks CM (eds) Modeling and simulation fundamentals: theoretical underpinnings and practical domains. John Wiley & Sons, Inc., Hoboken, New Jersey. ISBN-10: 0470486740, ISBN-13: 978-0470486740

    Google Scholar 

  30. Balci O. (1998) Verifi cation, validation, and testing. In: Banks J (ed) Handbook of simulation: principles, methodology, advances, applications, and practice. Wiley, New York, pp. 335–393

    Google Scholar 

  31. Sallach D (2011) Herding concepts: the contextual validation of social agent models. Presented at The Computational Social Science Society of the Americas, 2011

    Google Scholar 

  32. Wedgwood J, Schlicher B (2011) Verification and validation of complex models. Presented at NOEM Days conference. AFRL, Rome

    Google Scholar 

  33. Choucri N, Electris C, Goldsmith D, Mistree D, Madnick SE, Morrison JB, Siegel MD, Sweitzer-Hamilton M (2006) Understanding & modeling state stability: exploiting system dynamics. ESD-WP-2006-04, February 2006

    Google Scholar 

  34. Flynn MT, Pottinger M, Paul D Fixing Intel: a blueprint for making intelligence relevant in Afghanistan. Center for a New American Security, www.cnas.org

  35. Joint Publication 3-0 (2006) Joint Operations. Chapter V, 17 Sept 2006

    Google Scholar 

  36. Joint Publication 3-07. Stability Operations. 29 Sept 2011

    Google Scholar 

  37. Kott A, Corpac PS (2007) COMPOEX Technology to Assist Leaders in Planning and Executing Campaigns in Complex Operational Environments, Twelfth International Command and Control Research and Technology Symposium (12th ICCRTS). 19–21 June 2007, Newport, RI

    Google Scholar 

  38. Flynn MT, Pottinger Matt, Paul D (2012) Fixing Intel: a blueprint for making intelligence relevant in Afghanistan Center for a New American Security, www.cnas.org. January 2010

  39. Miller JO, Honabarger Lt, Jason B (2006) Modeling and Measuring Network Centric Warfare (NCW) With the System Effectiveness Analysis Simulation (SEAS), Eleventh Annual International Command and Control Research and Technology Symposium (11th ICCRTS), 26–28 Sept 2006, Cambridge, UK

    Google Scholar 

  40. Nysether NE (2007) Classifying failing states. MS Thesis, School of Engineering and Management, Air Force Institute of Technology, Wright Patterson AFB, OH

    Google Scholar 

  41. O’Brien S (2010) Analyzing Complex Threats for Operations and Readiness (ACTOR). Center For Army Analysis, Fort Belvoir Va. Sep 2001, DTIC Accession Number: ADA399370

    Google Scholar 

  42. Pierce BM, Zanol J (2011) MANeuver in N-Dimensional Terrain (MAN^N), A Full Spectrum Maneuver Concept. http://smallwarsjournal.com/jrnl/art/maneuver-in-n-dimensional-terrain-mann, Authors’ notes from visit to National Training Center, Ft Irwin, CA, 11–12 Feb 2008

    Google Scholar 

  43. Taylor G, Frederiksen R, Vane RR III, Waltz E (2004) Agent-based simulation of geo-political conflict. Presented at Innovative Applications of Artificial Intelligence (IAAI), July 2004

    Google Scholar 

  44. The Fund for Peace (www.fundforpeace.org) (FFP)

  45. United States Department of Defense. Measuring Stability and Security in Iraq. Quarterly reports to Congress submitted pursuant to the section entitled “Measuring Stability and Security in Iraq” of House Conference Report 109-72 accompanying H.R. 1268, Emergency Supplemental Appropriations Act for Defense, the Global War on Terror, and Tsunami Relief, 2005, Public Law 109-13. http://www.defense.gov/home/features/iraq_reports/index.html

  46. United States Government Accountability Office Military Operations: Actions Needed to Improve DoD’s Stability Operations Approach and Enhance Interagency Planning. Report to the Ranking Member, Subcommittee on National Security and Foreign Affairs, Committee on Oversight and Government Reform, House of Representatives, May 2007

    Google Scholar 

  47. Wagenhals, L, Levis, A (2001), Modeling Effects-Based Operations in Support of War Games, in A. Sisti & D. Trevisani, eds, Enabling Technology for Simulation Science V, vol. 4367, International Society for Optical Engineering, pp. 365–376

    Google Scholar 

  48. Del Valle S, Stroud P, Mniszewski S (2008) Dynamic Contact Patterns and Social Structure in Realistic Social Networks, Social Networks: Development, Evaluation and Influence. Nova Science Publishers, 2008.

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank the remainder members of the NOEM development team (from ITT: Chris Kies, Brian Sullivan, Roger Nestler, Andrew Allen; from CUBRIC: Jeff Spaulding) for their dedication and support. We would also like to share our appreciation with Dr. Dennis Leedom (EBR Inc.), Janet Wedgwood (Lockheed Martin) and Bob Schlicher (Oakridge National Laboratory) for their support and collaboration in performing V&V on the NOEM. This work has been partially supported by Dr Joe Lyons, Air Force Office of Scientific Research (AFOSR) under a Laboratory Research Imitation Request (LRIR) effort.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to John J. Salerno .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Salerno, J.J. et al. (2013). The NOEM: A Tool for Understanding/ Exploring the Complexities of Today’s Operational Environment. In: Subrahmanian, V. (eds) Handbook of Computational Approaches to Counterterrorism. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-5311-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-5311-6_17

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-5310-9

  • Online ISBN: 978-1-4614-5311-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics