IED Fight Goes Virtual

Stealthily enter an Afghan village in the dead of night. Detect and de-arm roadside bombs. Find and destroy IED funding and supply chains. All from the safety of a computer terminal.

The Joint IED Defeat Organization is funding research of a virtual training simulation and computer game based on the online World of Warcraft game.

Virtual military training is gaining in popularity. Its benefits are obvious – no casualties. As the technology advances, the virtual experience is becoming more life like.

Working with the Joint IED Defeat Organization, Matt Kaufman, chief of technology and integration at the Army’s Training and Doctrine Command, spoke with American Forces Press Service about EDGE.

“Our goal is to be able to recreate the devices, people and activities in the operational environment as accurately as possible to forces in training,” he said.

In addition to technical training, EDGE will provide full-effect training from accurately representing the path of a bullet to how to address village leaders.

“There is also the noncombatant battle space, the whole notion of how to communicate with elders and clergy and community leaders, build rapport, spot bad guys in a crowd and discern attitudes and how they change,” said Ben Jordan, director of the operational environment lab models and simulations directorate in TRADOC’s Intelligence Support Activity. “These are the kinds of things you can get at.”

While EDGE is still in development, other agencies have started implementing virtual training programs. The Secret Service will begin using 3-D models and gaming technology for agent training.


You may also be interested in...

Red Hat’s David Egts: Open-Source Training, ‘Sense of Mission’ Could Help Agencies Address Cyber Skills Gap

David Egts, chief technologist for Red Hat’s North American public sector, has said there are several options …

HHS, Industry Aim to Help Health Organizations Mitigate Cyber Threats With New Publication

The Department of Health and Human Services has released a four-volume document that outlines 10 …

Cloud-Based Identity Tools, Mobile Device-Based Authentication Among Cyber Market Trends to Watch in 2019

Some of the trends in the cybersecurity market to watch in 2019 include the availability …