This report summarizes research on how top-down risk analysis models could help inform the staffing, systems, and strategies for the U.S. Air Force Security Forces. Although existing security planning supports bottom-up, asset-based security plann...Lasīt vairāk
This report details the theoretical motivation and design of a wargame meant to address the lack of serious games that consider nuclear weapon employment and tools available to teach stakeholders about the challenges of nuclear weapon employment....Lasīt vairāk
Richard Mason, Michael Kennedy, James Bonomo, Tim Conley, Ryan Consaul, David R Frelinger, David A Galvan, Dahlia Anne Goldfeld, Scott A Grossman, Brian A Jackson...
The authors assess the costs associated with realistic threats to domestic, nonmilitary uses of the Global Positioning System (GPS), and consider possible additions to the positioning, navigation, and timing ecosystem in light of those costs...Lasīt vairāk
David T Orletsky, William Young, Yuna Huh Wong, Brien Alkire, Steven Berner, David R Frelinger, Forrest E Morgan, Karl P Mueller, Marek N Posard, Richard Silberglitt...
This report presents the results of a fiscal year 2016 RAND Project AIR FORCE add-on project to generate a range of future projections to assist Air Force strategic planning in developing the Air Force Strategic Environment Assessment....Lasīt vairāk
This report examines what role nonstrategic nuclear weapons could play in deterring a Russian invasion of the Baltic states, where the North Atlantic Treaty Organization’s current posture is weak....Lasīt vairāk
This report analyzes Taiwans options for allocating resources for air defense, describes the air defense problem that China poses and characterizes current and potential capabilities and levels of funding to improve Taiwans air defensE...Lasīt vairāk
Michael J. Lostumbo, Jerry M. Sollinger, Michael J. McNerney, Eric Peltz, Derek Eaton, David R. Frelinger, Victoria A. Greenfield, John Halliday, Patrick Mills, Bruce R. Nardulli...
This independent assessment is a comprehensive study of the strategic benefits, risks, and costs of U.S. military presence overseas. The report provides policymakers a way to evaluate the range of strategic benefits and costs that follow...Lasīt vairāk
Making aviation security more cost-effective is hampered by considerable uncertainty about the terrorist threat, security system performance, and the costs of security measures. This volume focuses on exploring ways to inform decisi...Lasīt vairāk
For its operational planning and budget programming, the Department of Defense (DoD) needs frequent access to current, detailed data on authorized force structures for all the services. Having users aggregate this information themselves was difficult...Lasīt vairāk
Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of po...Lasīt vairāk
The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly force against them can harm and alienate the very people whose cooperation U.S. forces are trying to earn. To solve this problem, a new RAND study propose...Lasīt vairāk
David C. Gompert, John Gordon, Adam Grissom, David R. Frelinger, Seth G. Jones, Martin C. Libicki, Edward O'Connell, Brooke K. Stearns, Robert E. Hunter
Examines how the United States should improve its counterinsurgency (COIN) capabilities through, for example, much greater focus on understanding jihadist strategy, using civil measures to strengthen the local government, and enabling local forces to...Lasīt vairāk
Terrorist organizations use many technologies as they plan and stage attacks. This book explores the purpose and manner of the use of communication and computer technologies, their net effect, and security forces possible responses. The authors conc...Lasīt vairāk
Develops approaches for assessing asymmetric attacks using cruise missiles or unmanned aerial vehicles, a novel potential threat to homeland targets, in the context of other options available to terrorist actors and for identifying the factors that m...Lasīt vairāk
Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population pl...Lasīt vairāk
This report assesses the effect of sharing installations and environment geospatial data assets across the Department of Defense Global Information Grid. The authors found that the assets support a wide range of missions from installation management...Lasīt vairāk
This report assesses the key risks facing U.S. commercial remote sensing firms. These companies aim to become an important part of the U.S. commercial remote sensing industry, which today largely consists of aerial data providers and the value-added...Lasīt vairāk