After ISIL One Day Conference
The purpose of this one-day conference is to help the Special Operation Forces (SOF) community’s strategic planning and forward posturing by accessing academic expertise to answer this question: what are the greatest challenges and opportunities to peace and stability after the military defeat of ISIS?
Resources and Resiliency
The United States Department of Defense has awarded the Laboratory for Unconventional Conflict Analysis and Simulation (LUCAS) a $1.6 million Minerva Initiative grant to conduct fundamental research on the resiliency of strategic actors.
Course of Action Simulator
The Course of Action Simulator (CAS) was developed as an analytical and educational model of how two states adopt courses of action in response to threats, resource constraints, and complex priorities.
Computational Security Studies
The domain of international security is best understood in terms of its growing complexity. The research of international security is best constructed with tools that address this complexity
Cultural Discourses Analytics
As the U.S. Army Operating Concepts states, “Army forces [must] process cross-cultural capabilities that permit them to operate effectively among populations” .
Social Network Analysis
Iranian strategic decision- making remains largely misunderstood by the West. The system in place does make the Supreme Leader the ultimate decision-maker, and it does give the president constitutional authority.
What is Complexity
Complexity is the underlying science to all we do. Dr. Rivera recently gave a talk on Complexity for the Department of Defense’s Office of Basic Research’s inaugural Science Technology and Innovation Exchange. That talk is available here.
...and increasingly challenging in new ways. As such, we combine academic and modeling support to the Special Operations and Intelligence Communities in their fight against Violent Extremist Organizations. We bring the academic and subject matter expertise of the Social Science Research Institute at Duke University and the Triangle Institute for Security Studies, as we are the Computational Security Studies arm of both organizations.
Ruobing Wang, PhD
North Africa, the Arabian Peninsula, and nations in the Middle East are home to the most water-starved communities on the planet. Changes in water access can threaten human security in general and humanitarian and economic stability in particular. Climate-driven strife can compound political and social instabilities, worsening conflict where it already occurs and increasing vulnerability Read more about Resources and Resiliency[…]
Since September 11, 2001 the United States has expended virtually immeasurable power, wealth, and life in hot pursuit of Al Qaida and the many subsequent groups of that ilk that have since emerged. While that war was necessary it also afforded great cover to America’s other rivals/enemies. This research project examines the role of Hizb’allah and Read more about Mapping Hizb’allah and Al Quds[…]
Shi’a Islam is a cleric based religion. Each Shi’a selects a Marja, one worthy of emulation, and follows his teachings. These teachings range from spiritual matters; issues of family, marriage, property, and inheritance; to political matters. While there are several Marjas, the most influential Marja is Grand Ayatollah Ali Al Sistani of Najaf, Iraq. Sistani Read more about Social Movements and Conflict[…]
Technical Supplement for Course of Action Simulator Luke A. Maier Technical Paper 2014-1v2 Summary: The Course of Action Simulator (CAS) was developed as an analytical and educational model of how two states adopt courses of action in response to threats, resource constraints, and complex priorities. This analytical tool was featured in several presentations and Read more about Technical Supplement for CAS[…]