Web Content Display Web Content Display

Guerilla Checkers
Guerilla Checkers

Asymmetric Warfare
Asymmetric Warfare

Guerilla Checkers

Guerilla Checkers

Guerrilla Checkers simulates many of the core interactions between guerrillas and the state. The guerrillas have many, but weak pieces, while the state has fewer, but more powerful pieces. The game is played on a standard checkers board; the State plays similar to playing checkers and the guerrillas play similar to playing the game of Go.

 

Guerrillas: Receive 66 pieces and place two pieces each turn.

State: Six pieces, all of which are on the board at the start.

 

The player who clears the board of all enemy pieces at the end of his turn wins. The Guerrilla player loses if he runs out of stones.

 

Guerilla Pieces

Guerrilla Movement

The Guerrilla player does not move his pieces. Instead, he places two and only two stones per turn on the board, on the points (intersections) of the squares. The first stone must be orthogonally adjacent to any stone on the board; the second stone must be orthogonally adjacent to the first stone placed. He may not place stones on the board edge points. He captures an enemy checker by surrounding it (i.e. having a stone, or a board edge point, on each of the four points of the square the checker occupies – note this makes the edge of the board very dangerous for the State player). The checker is removed from the board.

State Movement

The State player moves one checker per turn, one square diagonally as a King in regular checkers, or makes captures by jumping over the point between two squares. He is not forced to capture if he does not want to, but if he does he must take all possible captures. Captured stones are removed from the board.

Soldier Pieces

 

Asymmetric Warfare

Asymmetric Warfare

The Game

This game depicts, in a very abstract way, the essence of insurgent warfare. The game is for two players, the State (representing the existing government or leadership of a country or organization) and the Insurgent (representing the opposition to that government or leadership). The State has powerful forces but less information; the Insurgent has complete information but little actual power. Whichever side overcomes its disadvantage wins (the State by gaining information on the Insurgents and killing them; the Insurgents by penetrating to the centre of State power).

Roles

  • Insurgents
  • State

Concepts

Hidden information: For the whole game, the Insurgent has complete visibility into all spaces on the map. The State can see only those spaces on the map that contain his own pieces, contain two or more Insurgent pieces, or are temporarily visible by "interrogating" an Insurgent piece.

The map: The map is in the shape of four concentric circles, each divided into 12 spaces for a total of 48 spaces. Each space is marked with coordinates: a letter from A to D denoting which ring it is in, and a space number from 1 to 12. An "adjacent space" is one that shares a border with another space; therefore, a space could be adjacent to from four to six spaces, depending on where it is on the map. The single central space is called the Capital, and the ring of 12 spaces surrounding it is called the Inner Circle.

Winning: The aim of the Insurgent is to place sufficient of his pieces in the Inner Circle that he is deemed to have captured the Capital. The aim of the State player is to eliminate 12 or more Insurgent pieces, making an Insurgent victory impossible.

Playing the Game

The game is played in player-turns. The Insurgent goes first, followed by the State player. If a player wishes he can always PASS – he does nothing and the other player begins his turn.

Winning the Game

The Insurgent wins by capturing the Capital. This is accomplished by having, at the end of any his player-turns, Insurgent pieces occupying either:
  • Four connected spaces in the Inner Circle (that is, there are at least four Insurgentoccupied spaces in the Inner Circle that also share a border with one or two other Insurgent-occupied spaces in the Inner Circle), or
  • Any six of the twelve spaces of the Inner Circle.
The State player wins by killing 12 Insurgent pieces (making an Insurgent victory impossible).

Web Content Display Web Content Display

Asymmetric Warfare

In an asymmetric conflict, the state has the preponderance of power, but very little information; the insurgents have lots of information but very little power. Whoever reverses this dynamic first is likely to win. The state must gain information; the insurgent must grow and become more powerful. This concept, originally articulated by Gordon McCormick, forms the basis of the game, Asymmetric Warfare.

The state begins with five all-powerful pieces in the center. The insurgent starts with five pieces, placing them in the outside ring. The insurgent sees everything, but the state cannot see the insurgent pieces (information asymmetry). The state pieces, however, will always win in combat (power asymmetry). The insurgent wins if it surrounds the capital with enough forces. The state wins if it kills enough of the insurgent pieces.

Balance of Terror

Balance of Terror is a strategic two-player game of terrorism and counterterrorism. Nothing comes easy for either side, with both players facing difficult tradeoffs. The state must protect its citizens (stability), but cannot over-react and lose the support of the people (legitimacy). The state is also financially constrained, with limited resources (budget) to spend each turn, and a reserve fund of unspent resources from previous turns (bank). The terrorist, meanwhile, must grow its organization (mobilization), while protecting existing members (security). The terrorist also has a budget for each turn plus a bank of unspent resources. The state player wins if the terrorist's security or mobilization drops too low, while the terrorist wins if the state's stability or legitimacy drops too low.

COIN of the Realm

Coin of the Realm challenges players to think about many of the core interactions between governments and insurgents. Each player must generate resources, mobilize forces, secure their bases, move units, conduct combat operations, and gain popular support. Importantly, each side performs these tasks in different ways with advantages and disadvantages for each, highlighting the asymmetries of insurgency/counterinsurgency types of conflict. To win, both players need to gain a certain level of popular support (68 for the state, 27 for the insurgents). The higher requirements for the state give the insurgents an advantage. It is also possible for the insurgent to win if the state vacates the capital, whether voluntarily or if all state pieces in the capital are destroyed. This forces the state to always leave one or more pieces in the capital and gives an advantage in operational flexibility to the insurgent.

Contagion

Contagion introduces players to how terrorists spread their ideologies and how states counter that with their own ideology. Both sides try to gain as much popular support as possible, all while also denying their opponent support. With limited resources, players must choose whether to defend their gains against attacks or grow their support in new areas. They must also weigh the value of promoting their own message versus undermining their opponent's message. While the game is won by gaining sufficient popular support, players can also choose to take actions to undermine their rivals. For every agent placed or boost enacted, players can choose between a positive message, a mixed message (half the power of both positive and negative), or a negative message. Players must pay attention to their opponent's actions and make strategic choices between expanding their own control or undermining their opponent's loyalty, or a little bit of both.

CounterNet

CounterNet is a single-player, web-based game focused on how terrorists use the internet and social media for various purposes, to include: propaganda, financing, training, planning, execution of attacks, recruitment, incitement, radicalization, spreading public information, and for secret communication.  The player is assuming the role of a government professional responsible for tracking and ultimately preventing an attack by a fictional eco-terrorist group.  The actions they take have positive or negative effects on a series of 'badges' that they are trying to maximize.  For example, taking counter-financing actions at the appropriate time in the game will increase the player's counter-financing badge, and ultimately have a positive effect on the overall score.

Cyber Strike

CyberStrike is a six-player game that simulates the complex strategic environment of cyber conflict.  Players can play as criminals, terrorists, hackers, or states, with each role having different capabilities and goals.  Players have to consider how their offensive capabilities match up with their adversaries' defensive capabilities, and vice versa; whether to attack opponents or defend against them; whether to retaliate against attacks, particularly if the perpetrator is unknown; whether to invest in offense, defense, or detection capabilities; whether to ally with others; whether to share information or not; and how they can deter future attacks.

The game is intentionally designed for thinking about the macro, strategic decisions in the cyber world. It does not require or teach any technical aspects of cyber conflict.

Dark Networks

The Dark Networks game focuses on the organizational structure of terrorist groups and how these structures can be altered to make the terrorist group more or less effective. It reinforces many of the concepts and ideas from the field of social network analysis (SNA). It is a two-player, strategic game between the state and the terrorist. Each player may have a strategy to defeat the other, but they must adapt their strategies over time to maximize their advantages. The core tradeoff in this game is between security and effectiveness for the terrorist group. Measures taken to increase effectiveness (growing, centralizing) will diminish the terrorist group's security, and vice versa. This forces players to think about which attribute (security or effectiveness) they wish to maximize. This will change depending on the timing in the game and players' strategies.

Follow the Money

Follow the Money is a game of terrorist financing and counter-terrorist financing. It reinforces some key methods used by terrorists to move money (banks, hawalas, courriers) and a key strategic choice the state must make of freezing or following financial transactions. The terrorists start with full information, while the state has incomplete information.

At the start of the game, the state only sees a small number of the total financial institutions within the game, and does not see any of the terrorist cell members. The player must take actions to reveal more of the network. The state player has ten agents that it can distribute within the visible financial network. Each agent can do one of the following every turn: observe transactions coming through the financial institution, follow the money to the next institution, or freeze (really seize) the money and remove it from the game. From the state player's perspective, this game highlights the strategic choices that must be made on whether to use financial transactions to gain more intelligence on the terrorist network (by following and observing) or to use these transactions to disrupt an operation (by freezing).

Guerrilla Checkers

What happens when we are playing a different game from our enemy? Guerrilla Checkers allows players to essentially play two different games – the state plays with the rules of checkers, while the insurgent plays with the rules of Go.

The game uses a standard checkerboard (8x8 grid), with six state pieces starting in the center of the board. The state moves one piece each turn and can move its pieces diagonally, like in Checkers. The guerrilla player starts the game by placing two of its pieces on the intersection points between the squares. Every turn the insurgent places another two pieces. Besides highlighting the asymmetries of conflict, this game also reinforces several themes from insurgency and counterinsurgency. For the state, clustering too many pieces together can be dangerous, as are the outside edges of the board. The guerrilla has more forces, but they are weak and must isolate and trap the state pieces to capture them. With pieces moving and fighting differently, both sides must develop their own strategy while also understanding how their opponent is playing.

Info Chess

On the modern battlefield, the informational component of war is just as important as the physical dimension. The game of InfoChess adds in hidden information and Information Warfare (IW) concepts to the classic game of chess.

Each move consists of two phases: a required physical move and an optional information warfare move. Information Warfare moves are either Psyops or Electronic Warfare. Psyops force an opponent's piece to surrender, removing a piece from the board. Electronic Warfare disrupts the opponent's ability to communicate to its units and prevents the opponent from making its next physical move. Each of these moves requires the players to spend limited available points. These Information Warfare moves can also be defended by the opponent.

The game ends when the king is captured, but since the king starts off invisible, it must first be discovered. Players who ignore the informational side of the game do so at their own peril.

Specops

Player controls two squads in an attempt to accomplish the mission goals. Squad members will automatically react to threats based on the weapons posture.

 

Play Games Now