recommended reading

Army wants to build a massive virtual world to train soldiers

The Army could replicate areas where it conducts both peacekeeping and military operations.United States Army Simulation and Training Technology Center

The Army wants to develop a massive virtual world populated by 10,000 avatars that are managed by artificial intelligence and operate over a 32-mile square simulated landscape.

Officials at the Army Research, Development and Engineering Command's Simulation and Technology Training Center said they want a systems integrator to put together a virtual world that includes soldiers, vehicles and weapons that can move around a landscape built from Defense Department digital terrain elevation data.

The Simulation and Technology Training Center also said in its request for information that it wants to incorporate technologies used in massively multiplayer online games and offer classified and unclassified versions.

The Army is looking for the contractor to create avatars that have the same kind of Web 2.0 communications found in the real world, including chat, instant messaging and links to smart phones.

Based on the requirements, the Army is likely to choose a closed world open only to its personnel, and not a public world such as Second Life, which is open to everyone, said Dan Frank, managing partner for Three Wire Systems , a virtual world developer in Vienna, Va., which placed first in this year's Federal Virtual World Challenge.

While the Army did not clearly define what kind of operations it planned to conduct in the virtual world, Frank said the proposal indicated it would replicate operations in areas such as Kandahar, Afghanistan, where the service emphasizes peacekeeping missions as well as traditional military operations.

The requirement for the use of massively multiplayer online game technology also indicates the Army might want to replicate Microsoft's Xbox Live experience, where thousands of players worldwide vie against each other inside a virtual world. The service wants avatars to be able to handle thousands of simultaneous connections.

The Army is following the lead of the Air Force, which set up MyBase in Second Life in February 2008, said Jacque Davison, president of Davison Associates and a retired Army helicopter pilot who has nearly three decades of experience in the construction of 3-D objects and virtual worlds. Davison Associates is a virtual world company that placed third in the Federal Virtual Worlds Challenge.

Gen. William Loomey III, commander of the Air Education and Training Command, said in a white paper that MyBase will cater to cyber savvy young airmen "who have been living in a digital world their entire lives and are better prepared than any other generation to operate in this environment. It is imperative that we understand their needs and expectations, and develop an enterprisewide system that fosters learning and captures their most critical asset -- knowledge."

Davison said he believes all the military services eventually will set up cradle-to-grave virtual worlds that will start with recruitment, provide knowledge management during active duty, and then keep retirees connected when they leave a service.

The Army did not answer questions on the RFI by deadline. Responses are due June 23.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.