Military Review English Edition January-February 2014 | Page 24

their analysis and reaction. All of this information, whether virtual or provided by a trainer, carries the explanation of simulacra because military professionals or closely related contractors create and manage all of the virtual systems and scenarios.34 We encounter the same problem as the opposing forces problem in that identical planning methodologies, concepts, language, and values drive the virtual enemies. Within both, their explanation reflects our own institutionalisms. Thus, virtual criminals do what opposing forces criminals do in “live” training because we explain them as such. In other words, building a virtual casino that imitates Venice will still maintain the same simulacra that the actual Venice casino in Las Vegas has. Neither reflects the real thing, and both are copies with no original. However, virtual training simulacrum encounters yet another problem with context. Contextually, virtual systems can only create a narrow spectrum of simulation that orient largely on physical and quantifiable aspects.35 A virtual enemy tank can move at the appropriate speed over accurate virtual terrain and fire weapons at a rate, range, and damage that quantifiably simulate a real enemy tank. Beyond the superficial layer that modern entertainment video games also achieve, our military trainers and contractors inject in all other motives, information, and relationships. Thus, the simulated criminal elements in the virtual game are entirely symbolic and divorced from any real criminal action or process. While a virtual enemy tank is relatively simplistic, a virtual suicide bomber or explosives smuggling network is not. Quantification works with bullets far better than human behavior, particularly when different societies interact.36 Most analysis or conclusions that the Army unit derives from the virtual system are entirely out of context, other than the quantifiable aspects of casualties and damaged equipment. The virtual suicide bomber attacks because we say he does. Unfortunately, our military has a strong preference for seeking understanding of complexity through metrics, categorization, and reductionism where descriptive statistics trump explanation.37 This is why virtual systems are appealing to the military and how the two-fold training simulacra occurs without us realizing it. 22 All of the recommendations postulated earlier for the opposing forces also applies to virtual systems, in that the military professionals and contractors who build the virtual scenarios could adapt many of the non-Western concepts and thus depict simulated context in the virtual system. Their awareness of their own institutional preferences and the empowerment to shift to alternate methodologies, concepts, and approaches will require critical followed by creative thinking.38 A criminal element, while digitally presented, would operate based upon motives and decisions that are foreign to how our Army prefers to think and act. This would require extensive preparation so that as the virtual criminals move and act, the contextual information would feed into the Army unit appropriately. While the metrics within the virtual system would remain the same, it would also be largely irrelevant to the Army unit seeking deeper understanding of a complex environment. Ultimately, it is simple to track suicide bomber statistics, but difficult to explain emergent trends and phenomenon on why the environment is transforming as observed.39 Ultimately, it is simple to track suicide bomber statistics, but difficult to explain emergent trends and phenomenon on why the environment is transforming as observed. Since we exploit virtual systems for their ability to generate descriptive metrics and quantification that nourishes our institutionalisms at the expense of enabling our deep understanding, we need not change the hardware of our virtual training centers. To transform our Army tra ining strategy, we again need to change our training philosophy and critically think about the simulacra we produce. At best, virtual systems remain a cost- and time-effective January-February 2014 MILITARY REVIEW