Mafia Mayhem
Three-Round Intelligence Analysis Exercise
SIMULATION OVERVIEW
SIM PARAMETERS
TRACK
National Security
ROUNDS
3
DURATION
1h 15m
TEAM MODEL
All teams, same materials
POSTURE
PROSPECTIVE
AUDIENCE
Intelligence analysis students, law enforcement training, national security courses
LEARNING OBJECTIVES
Apply Analysis of Competing Hypotheses (ACH) to evaluate multiple actors across a rich multi-source intelligence package
Distinguish between evidence of motive and evidence of action when evaluating competing hypotheses
Produce properly hedged analytical judgments that distinguish evidence from assumption
Identify and test key assumptions using the Key Assumptions Check (KAC) technique
Demonstrate analytical agility by updating conclusions when new evidence warrants
Recognize how deeply embedded assumptions - particularly about what actors "would never do" - can cause analysts to miss threats hiding in plain sight
HOW IT RUNS
01
Briefing
Participants receive a scenario overview and their team assignment. Facilitator sets context and opens the document room.
02
Document Review
Teams examine declassified primary source documents in the shared document room. Each round releases new intelligence as the situation develops.
03
Analysis & Submission
Teams complete a structured analytic worksheet applying ACH and Key Assumptions Check, then submit their assessment.
04
Stakeholder Response
An AI-driven decision-maker responds to each team's assessment, reflecting how a real principal would react to the analysis provided.
05
Debrief
Teams compare their analysis against an expert benchmark. AI coaching surfaces analytical gaps, cognitive biases, and key insights.
PRIMARY SOURCE DOCUMENTS
This simulation is populated with real, declassified documents obtained through the Freedom of Information Act, National Archives, and other primary source repositories. Participants work with the same intelligence picture that analysts faced at the time.
FBI organized crime surveillance files, court exhibits from U.S. v. Gotti, declassified NYPD intelligence reports, and contemporaneous journalism from 1985–86.
DOCUMENT LIBRARY
26
primary source documents across 3 rounds
CLASSIFICATION
All documents are declassified or in the public domain.
WHO IT IS FOR
Intelligence Studies Programs
Ideal for upper-division or graduate courses in intelligence analysis, national security, or foreign policy. Builds practitioner skills through live simulation.
Professional Development
Used by agencies, think tanks, and defense contractors to train analysts in structured analytic techniques and collaborative assessment.
War Colleges & PME
Integrates with professional military education curricula focused on strategic intelligence and decision support.
RELATED SIMULATIONS
Cuban Missile Crisis
Multi-INT Crisis Analysis — October 1962
View simulation
Yom Kippur War
Analyzing threats under conditions of Groupthink
View simulation
Country Alpha in Crisis
Network Mapping, Threat Assessment, and Disruption Analysis
View simulation
Run this simulation with your team
IntelSim sessions are facilitated by an instructor and run entirely online. Contact us to schedule a demo or discuss licensing.