War games teach data sharing

Two computer-simulated exercises showed that U.S. and coalition forces can improve data sharing and train together by connecting their virtual laboratories, said Joint Forces Command officials in statements.

The Thor's Hammer and Multinational Experiment 3 computer war games, which ended earlier this month, demonstrated information sharing and working relationships between military, civilian and coalition organizations. The games taught groups that they can train together in these areas using the coalition Collaborative Information Environment, said command officials in Norfolk, Va.

"While the analysts are still reviewing the game's results, Thor's Hammer will yield important exploration areas for future concept development," said Navy Cmdr. Mike Taylor, joint experimentation officer who planned and coordinated the computer-simulated war game.

Multinational Experiment 3 showed that the United States, the United Kingdom, Australia, Canada, France, Germany and the North Atlantic Treaty Organization can connect their computer laboratories to train in real-world and computer-simulated environments. The countries want to use the virtual training network to continue studying waging war in coalitions to include logistics and medical support, said Joint Forces Command officials.

Joint Forces Command and the Army later this spring will conduct its annual Unified Quest computer-simulated war game. The week-long event will include studying how to quickly switch from warfighting to peace-keeping operations, which U.S. coalition forces continue to struggle at in Iraq.

Featured

  • Government Innovation Awards
    Government Innovation Awards - https://governmentinnovationawards.com

    Congratulations to the 2020 Rising Stars

    These early-career leaders already are having an outsized impact on government IT.

  • Cybersecurity
    cybersecurity (Rawpixel/Shutterstock.com)

    CMMC clears key regulatory hurdle

    The White House approved an interim rule to mandate defense contractors prove they adhere to existing cybersecurity standards from the National Institute of Standards and Technology.

Stay Connected