INTELSIM

INTELSIM PLATFORM - SIMULATION LIBRARY

The IntelSim
Simulation Library

Each simulation is built around a real or realistic case, populated with primary source materials, and designed to practice one or more structured analytic techniques under time pressure.

Request a Demo
NATIONAL SECURITY

Mafia Mayhem

Three-Round Intelligence Analysis Exercise

A powerful organized crime family is in internal crisis. Serious tensions have developed between the family's leadership and a rival crew within the organization - driven by policy disputes that threaten millions in annual revenue and a recent shift in the family's power structure that has removed the one figure capable of keeping the peace. Working through three rounds of intelligence reports spanning HUMINT, SIGINT, physical surveillance, and financial intelligence, your team will apply structured analytical techniques to assess the threat landscape, identify the most probable actors, and test the assumptions underlying your analysis.

ACHKey Assumptions Check
NATIONAL SECURITY

Cuban Missile Crisis

Multi-INT Crisis Analysis — October 1962

October 16, 1962 — 0900 Hours. A U-2 reconnaissance mission over western Cuba has returned with photographs analyzed overnight by the National Photographic Interpretation Center. The findings are alarming: what appear to be Soviet medium-range ballistic missile sites under construction near San Cristóbal.

Source CredibilityKey Assumptions CheckSynthesis
BUSINESS

Middle Earth Market Entry

A Cross-Functional Market Entry Business Exercise

Your company — Middle Earth Rings and Things — is preparing to enter one of four candidate markets: Rivendell, Mordor, Rohan, or Gondor. The board has allocated $1 million for the market entry investment.

Bias IdentificationSynthesis
BUSINESS

Middle Earth Market Entry — Small Group

A structured analytical exercise in market selection

Teams of three analysts advise CEO Bilbo Baggins on which of three candidate regional markets should enter.

SynthesisKey Assumptions Check
NATIONAL SECURITY

Yom Kippur War

Analyzing threats under conditions of Groupthink

Following Israel's decisive victory in the 1967 Six-Day War, Israel occupies the Sinai Peninsula and the eastern bank of the Suez Canal — seized from Egypt — and the Golan Heights, seized from Syria. Both Arab states regard these losses as a national humiliation and a strategic emergency. They have spent six years rebuilding their militaries with Soviet assistance, conducting intensive combined-arms training, and deploying a dense Soviet-supplied surface-to-air missile network along the Canal.

Bias IdentificationDevil's AdvocacyKey Assumptions Check
NATIONAL SECURITY

Country Alpha in Crisis

Network Mapping, Threat Assessment, and Disruption Analysis

Country Alpha has emerged from a destabilizing civil war. The nation's dominant political leader (designated CRUISE) has consolidated significant personal power, generating both loyalty and resentment among the political establishment. Factional tensions are unresolved.

network analysisstructured brainstormingDeception Detection
BUSINESS

Kelvari Strait Crisis

Strategic Supply Chain Simulation

Teams represent the leadership of competing fabless semiconductor firms navigating a disrupted global supply chain. Each round, teams submit a sealed Course of Action. An AI Adjudicator resolves all submissions simultaneously against the evolving world state. Teams that reason well about second-order effects and competitor behavior outperform teams that react to surface signals or follow the crowd.

Synthesis
COMING SOON
NATIONAL SECURITY

Soviet Leadership Succession

KGB Intelligence Assessment — Post-Chernenko Transition

Analysts assess Kremlin succession dynamics following the death of Konstantin Chernenko in March 1985. Multiple factions compete for influence as Mikhail Gorbachev consolidates power — a pivotal moment in Cold War history with profound strategic implications.

ACHKey Assumptions Check
COMING SOON
NATIONAL SECURITY

Iran Hostage Crisis

Crisis Assessment — US Embassy Takeover, November 1979

Iranian student militants seize the US Embassy in Tehran and take 52 American diplomats hostage. Analysts must assess Iranian government intent, the likelihood of a negotiated release, and the risk of prolonged captivity — under acute time pressure.

ACHKey Assumptions Check
COMING SOON
NATIONAL SECURITY

Chinese Intervention in Korea

Post-Mortem Analysis — Intelligence Failure, October–November 1950

In October–November 1950, Chinese forces crossed the Yalu River and launched a devastating surprise offensive against UN forces. Analysts examine the pre-intervention warning intelligence and diagnose why MacArthur's headquarters dismissed clear indicators of Chinese intent.

Post-MortemACHBias Identification
COMING SOON
NATIONAL SECURITY

Operation Fortitude

Red Team Analysis — German Deception Assessment, 1944

Teams adopt the perspective of German OKW intelligence analysts in the spring of 1944. Using available indicators, they must assess Allied invasion intent and likely landing sites — working with the same fragmentary, heavily manipulated intelligence available to German counterparts.

Red Team AnalysisDeception Detection
COMING SOON
NATIONAL SECURITY

Operation RYAN

Soviet Nuclear War Threat Assessment, 1983

Teams adopt the perspective of KGB analysts in 1983, tasked with assessing US preparations for a nuclear first strike under Operation RYAN (Raketno-Yadernoe Napadenie — Nuclear Missile Attack). The period's heightened tensions — Pershing II deployments, Reagan's SDI speech, Able Archer 83 — drive an extraordinary analytical environment.

Red Team AnalysisBias Identification
COMING SOON
NATIONAL SECURITY

Yom Kippur War

Retrospective Analysis — Arab Coalition Surprise Attack, October 1973

Israeli and US intelligence agencies received extensive warning indicators prior to the Egyptian-Syrian surprise attack on October 6, 1973. Analysts examine the pre-war intelligence record and diagnose how analytic assumptions, political pressure, and confirmation bias produced one of the most consequential warning failures in modern history.

Post-MortemACHBias Identification
COMING SOON
BUSINESS

Corporate Intelligence Failure

Strategic Warning Failure — Competitive Threat Assessment

A mid-market technology firm faces an aggressive competitive move from a well-funded disruptor. Analysts must assess the competitor's strategic intent, likely product roadmap, and market timing — with incomplete information and competing hypotheses — to inform a critical board-level decision.

ACHKey Assumptions Check
COMING SOON
BUSINESS

Organized Fraud: The Insider Threat

Business Intelligence Analysis — Internal Threat Assessment

Anomalous financial patterns and behavioral indicators suggest a coordinated insider threat within a financial services firm. Analysts must synthesize HR, financial, access log, and HUMINT reporting to assess whether an organized fraud scheme is underway — before the firm's next regulatory audit.

ACHSource Credibility
COMING SOON
BUSINESS

Disinformation Campaign

Red Team Analysis — Strategic Influence Operation

Teams adopt the perspective of a hostile actor conducting a strategic disinformation campaign against a multinational corporation. By designing the operation themselves, analysts develop an intuitive understanding of how influence operations work — and how to detect and counter them.

Red Team AnalysisDeception Detection

Ready to run a simulation with your team?

IntelSim sessions are facilitated by an instructor and run online. Contact us to schedule a demo or discuss licensing for your program.

Request a DemoEngagement Options