Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MPI Ethno. Forsch.  (26)
  • BSZ  (2)
  • HU Berlin
  • Rand Corporation  (27)
  • National security  (27)
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833092403 , 0833093703 , 0833092405 , 9780833093707
    Language: English
    Pages: 1 Online-Ressource (xxi, 172 pages)
    Series Statement: Research report RR-1232-OSD
    Parallel Title: Erscheint auch als McNerney, Michael J. (Michael Joseph) Defense institution building in Africa
    Keywords: Security sector 21st century ; National security 21st century ; Security sector ; National security ; Military policy ; National security ; Security sector ; Säkerhetspolitik ; Försvarspolitik ; Säkerhetssektorer ; Försvarsorganisation ; Africa ; POLITICAL SCIENCE ; International Relations ; Treaties ; Africa Military policy 21st century ; Africa ; Electronic book
    Abstract: This report assesses U.S. efforts in defense institution building (DIB) in Africa and suggests possible improvements to planning and execution. It first defines DIB and reviews some best practices from DIB and security sector reform experiences. It also highlights how DIB activities serve U.S. official strategic guidance for Africa. The report then examines how DIB is currently planned and executed in Africa and describes the range of programs that are available to U.S. planners for that purpose. It also provides a structured approach to aid in the prioritization of such programs. The report then analyzes DIB efforts in two African nations--Liberia and Libya. Finally, it examines how other institutions and countries undertake DIB by taking a closer look at the DIB activities of DoD's regional centers, as well as the relatively extensive experience of two key U.S. allies--the United Kingdom and France--in this domain"--Publisher's description
    Abstract: This report assesses U.S. efforts in defense institution building (DIB) in Africa and suggests possible improvements to planning and execution. It first defines DIB and reviews some best practices from DIB and security sector reform experiences. It also highlights how DIB activities serve U.S. official strategic guidance for Africa. The report then examines how DIB is currently planned and executed in Africa and describes the range of programs that are available to U.S. planners for that purpose. It also provides a structured approach to aid in the prioritization of such programs. The report then analyzes DIB efforts in two African nations--Liberia and Libya. Finally, it examines how other institutions and countries undertake DIB by taking a closer look at the DIB activities of DoD's regional centers, as well as the relatively extensive experience of two key U.S. allies--the United Kingdom and France--in this domain"--Publisher's description
    Note: Includes bibliographical references (pages 161-172)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833092205 , 0833092367 , 9780833092359 , 0833092200 , 9780833092366
    Language: English
    Pages: 1 Online-Ressource (xix, 163 pages)
    Series Statement: Research report RR-1210-RC
    Series Statement: Strategic rethink
    Parallel Title: Print version Binnendijk, Hans Friends, foes, and future directions
    Keywords: World politics 21st century ; National security ; World politics ; National security ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; Military policy ; Military relations ; National security ; World politics ; United States ; POLITICAL SCIENCE ; International Relations ; Treaties ; United States Military policy ; United States Military relations ; United States ; United States ; Electronic book
    Abstract: " ... RAND experts explore the elements of a national strategy for the conduct of U.S. foreign and security policy in this administration and the next. The report evaluates three broad strategies for dealing with U.S. partners and adversaries in Europe, Asia, and the Middle East in a time of diminishing defense budgets and an American public preference for a domestic focus. The three strategies are to be more assertive, to be more collaborative, or to retrench from international commitments. All three of these alternative approaches are constrained and a balance will need to be struck among them -- that balance may differ from region to region."--Publisher's description
    Description / Table of Contents: Introduction -- The Partnership Setting -- Anatomy of the Potential Adversaries: China ; Russia ; North Korea ; Iran ; Salafi jihadism -- U.S. Constraints Limit Assertiveness -- European Partners and the "Free Rider" Problem -- Asian Partners and Inadequate Security Structures -- In Search of a Middle East Partnership Strategy Conclusion: Choosing an Approach.
    Note: Includes bibliographical references (pages 151-163)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833092496 , 0833092499 , 9780833092526 , 0833092529 , 0833092499 , 0833092529 , 9780833092496 , 9780833092526
    Language: English
    Pages: 1 Online-Ressource (1 recurso en línea (xv, 104 páginas)))
    Series Statement: Research report RR-1335-RC
    Parallel Title: Erscheint auch als Harold, Scott Warren. Getting to Yes with China in Cyberspace
    Keywords: Cyberterrorism Prevention ; Security, International 21st century ; National security ; Cyberspace Political aspects ; Cyberspace Political aspects ; Cyberterrorism ; Information warfare 21st century ; Internet in espionage ; Cyberterrorism ; Espionage, Chinese ; Cyberspace operations (Military science) ; Cyberterrorism ; Security, International ; National security ; Cyberspace ; Cyberspace ; Cyberterrorism ; Information warfare ; Internet in espionage ; Cyberterrorism ; Espionage, Chinese ; Cyberspace operations (Military science) ; Cyberspace ; Political aspects ; Cyberterrorism ; Cyberterrorism ; Prevention ; Diplomatic relations ; Espionage, Chinese ; Information warfare ; Internet in espionage ; National security ; Security, International ; Telecommunications ; Electrical & Computer Engineering ; Engineering & Applied Sciences ; COMPUTERS ; Networking ; Security ; Cyberspace operations (Military science) ; China ; United States ; United States Foreign relations 21st century ; China Foreign relations 21st century ; United States ; China
    Abstract: "Since the founding of the People's Republic of China in 1949, the U.S.-China relationship has been characterized by conflict, confrontation, and strategic mistrust. The tensions that divide the two countries have been growing in importance in recent years. Unfortunately, they apply just as much to cyberspace as to relations in the physical world. Indeed, of all the areas where the relationship between the two sides is troubled, cyberspace has been one of the most contentious. The United States and China began formal negotiations in 2013 to resolve such differences only to see them abruptly suspended in 2014, when China broke them off in response to the U.S. indictment of several Chinese military officers on charges related to cyber-espionage activities. This study explores U.S. policy options for managing relations with China over this critical policy area through the use of agreements and norms of behavior. It looks at two basic questions: Can the United States and China achieve meaningful outcomes through formal negotiations over norms and rules in cyberspace? And, if so, what areas are most likely to yield agreement and what might be exchanged for what? This analysis should be of interest to two communities: those concerned with U.S. relations with China, and those concerned with developing norms of conduct in cyberspace, notably those that enhance security and freedom"--Publisher's description
    Abstract: Ch. 1. The "cyber problem" in U.S.-China relations -- ch. 2. Coming to terms -- ch. 3. Getting to now -- ch. 4. Getting to yes? -- ch. 5. Conclusions -- Postscript.
    Abstract: Preface -- Summary -- Abbreviations -- Chapter One: The "Cyber Problem" in U.S.-China Relations: Purpose and Approach -- Organization of This Report -- Chapter Two: Coming to Terms: The Dimensions and Implications of Divergent Views of Deterrence -- Sources of Difference -- Elements of Difference -- Law and Equality -- The Application of Different Deterrence Approaches to Cyberspace: Hegemony -- Attribution Versus the Correlation of Forces -- Escalation -- Stability -- Signaling -- Overall -- Chapter Three: Getting to Now: China's Cyber Espionage -- The 2011 U.S. International Strategy for Cyberspace -- Mandiant, Snowden, and the PLA 5 -- Track Two Talks Between CICIR and CSIS -- What Could the United States Do to Discourage China's EMCE? -- Chapter Four: Getting to Yes?: Setting -- Track One Negotiations: Economically Motivated Cyber Espionage -- What Does China Want? -- Alternatives to Bilateral Negotiations with China -- The Law of Armed Conflict and the Right to Retaliate -- A Mutual Forbearance Proposal -- Chapter Five: Conclusions -- Postscript -- References.
    Note: "March 22, 2016"--Table of contents page , Incluye referencias bibliográficas
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833094537 , 0833094351 , 083309453X , 9780833094353
    Language: English
    Pages: 1 Online-Ressource (ix, 57 pages)
    Series Statement: Perspectives PE-192-RC
    Keywords: Terrorism Risk assessment 21st century ; Intelligence service Methodology ; Terrorism Prevention 21st century ; Civil-military relations ; National security 21st century ; Terrorism ; Intelligence service ; Terrorism ; Civil-military relations ; National security ; POLITICAL SCIENCE ; Security (National & International) ; Administrative agencies ; Reorganization ; Executive advisory bodies ; Interagency coordination ; Military readiness ; Decision making ; National security ; Decision making ; United States ; Electronic book
    Abstract: "Every president needs a decisionmaking system that harnesses the full capabilities and accumulated wisdom of the U.S. government and the nation's many stakeholders. Yet national security professionals--the officials who must advise the president on the most-difficult decisions -- cite a range of structural problems that hinder effective policymaking. While a more focused and timely decisionmaking process will not necessarily improve outcomes for the United States, poor choices could be calamitous. This Perspective analyzes a range of management challenges in the national security system and presents eight recommendations for strengthening U.S. decisionmaking and oversight of policy implementation. Among the conclusions: The National Security Council staff size should be reduced to better focus on high-priority areas. Civil-military operations should be planned by a new joint office at the State Department with a military general officer as deputy. Red-team and lessons-learned efforts would help ensure that the system is adaptive and responsive. Better integration of intelligence insights and secondments of senior officials across agencies can improve the quality and coherence of decisionmaking. And the use of special envoys, or "czars," should be limited"--Publisher's description
    Description / Table of Contents: Foreword -- Acknowledgments -- Chapter 1: Introduction: Evolution of Strategies and Systems -- Chapter 2: Why Process Matters -- Chapter 3: How Did the National Security System Evolve? -- How Do Other Nations Make Decisions? -- Chapter 4: Previous Attempts at Reform -- Chapter 5: Changing Environment -- Chapter 6: Recommendations for the National Security Decision Structure -- NSC Staff Size -- Civil-Military Cooperation and Resource Sharing -- Decline of Disciplined, Organizational Messaging Systems -- Including the Right Agencies -- Integrating Intelligence Insights -- Groupthink and Embedded Assumptions -- Continuity, Integration, and Professional Staff Development -- Overuse of Czars -- Chapter 7: Conclusion: Strategizing, Decisionmaking, and Policy Implementation -- Abbreviations -- Bibliography -- About the Author.
    Note: "April 5, 2016"--Table of contents page , Includes bibliographical references (pages 51-56)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833090874 , 0833093479 , 0833090879 , 9780833093479
    Language: English
    Pages: 1 Online-Ressource (xi, 60 pages)
    Series Statement: Research Report RR-1069-MCIA
    Parallel Title: Print version Connable, Ben From negative to positive stability
    Keywords: Forced migration ; Humanitarian assistance ; National security 21st century ; International relief ; Emigration and immigration law ; Refugees ; Forced migration ; Humanitarian assistance ; National security ; International relief ; Emigration and immigration law ; Refugees ; Economic history ; Emigration and immigration law ; Forced migration ; Humanitarian assistance ; International relief ; National security ; Refugees ; Social conditions ; Civil War (Syria : 2011- ) ; Jordan ; Syria ; POLITICAL SCIENCE ; Human Rights ; History ; Jordan Economic conditions 21st century ; Jordan Social conditions 21st century ; Syria History Civil War, 2011- ; Jordan ; Jordan ; Syria ; Electronic book
    Abstract: "As of late 2014, many American and Jordanian experts believe Jordan to be stable. Yet while Jordan is stable, it faces a range of existing and emerging challenges. These include chronic unemployment, sporadic political unrest, budget deficits, a water shortage, and geographically isolated yet troubling internal security concerns. The Syrian refugee crisis both exacerbates these challenges and offers opportunities to the government of Jordan. If the Syrian refugees remain relatively content and continue to assimilate into northern and central Jordan, they might directly benefit the Jordanian economy by stimulating growth. Donors and lenders have increased their support to Jordan, in turn offering the government an opportunity to improve the lives of both Syrian refugees and Jordanian citizens. Most important, Jordan benefits from what one expert terms negative stability: Jordanian citizens might be dissatisfied with many aspects of their government, but the chaos in neighboring states has thus far dissuaded Jordanians from pursuing civil or violent actions that might destabilize Jordan. Jordanians do not want their country to look like Syria, Iraq, or Egypt. Jordan is likely to undergo further and perhaps unforeseen challenges in 2015 and 2016, but it has the opportunity to alleviate many of its enduring challenges. If Jordan wisely invests forthcoming international refugee support, it has the opportunity to shift popular outlook from negative to positive--and more optimistic--stability. This report's analytic forecasts should help the United States determine how to support Jordan as it faces the Syrian refugee crisis"--Publisher's description
    Description / Table of Contents: Preface -- Figures and Table -- Summary -- Chapter One: Introduction to the Status of Syrian Refugees as of Late 2014: Geographic Orientation and Syrian Refugees as of Late 2014 -- Syrian Refugees in Jordan: Late 2014 -- Methodology -- Organization of This Report -- Chapter Two: Assessment of Stability and Strategic Challenges: Late 2014: Jordan's Stability as of Late 2014 -- Security from External and Internal Threats -- Political Turmoil and the Impact of the Arab Spring -- Water Shortages Contribute to Economic and Social Unease -- Economic and Financial Dependencies -- Existing Refugee and Nonnational Worker Populations -- Summary of Stability Issues as of Late 2014 -- Chapter Three: Economic Factors and Forecasted Impact: Current Economic Status and Economic Integration of Syrian Refugees -- Forecast: The Impact of Syrian Refugees on Jordan's Economic Stability -- Chapter Four: Social Factors and Forecasted Impact: Assessing Late-2014 Social Integration and Social Impacts of Syrian Refugees -- Forecast: Impact of Syrian Refugees on Jordan's Social Stability -- Chapter Five: Security Assessment and Forecasted Impact: Impact of Syrian Refugees on Jordanian Security as of Late 2014 -- Forecast: The Impact of Syrian Refugees on Jordan's Security -- Chapter Six: Conclusion, Summary Forecast, and Black Swan Warnings: Black Swans -- Abbreviations -- Bibliography.
    Note: "November 30, 2015"--Table of contents page , Includes bibliographical references (pages 39-60)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833088673 , 0833093312 , 083308867X , 9780833093318
    Language: English
    Pages: 1 Online-Ressource (xxiii, 96 pages)
    Series Statement: [Research report] RR-935-OSD
    Parallel Title: Print versionPaul, Christopher, 1971- Building partner capacity assessment framework
    Keywords: National security International cooperation ; Evaluation ; Soldiers Training of ; International cooperation ; Evaluation ; Military education International cooperation ; Evaluation ; Military assistance, American Evaluation ; National security ; Soldiers ; Military education ; Military assistance, American ; POLITICAL SCIENCE ; Security (National & International) ; Military assistance, American ; Evaluation ; Electronic books
    Abstract: "For both diplomatic and national security reasons, security cooperation continues to be important for the United States. The Department of Defense conducts an assortment of programs aimed at building the capacity of partner nations, and training is an important element of these efforts. The needs and existing capabilities of various nations differ, however, as will results. Planning for each building partner capacity (BPC) effort carefully, assessing progress while the effort is in progress, and assessing results are all important to ensure that it meets U.S. goals and partner expectations. This report presents a framework intended to aid all these steps. Before execution, the framework can help determine and plan for what might go wrong with the intended BPC effort. During BPC execution, the framework can help monitor progress to discover whether everything is going according to plan and, if not, what is wrong and what can be done about it. Finally, the framework can help determine whether the BPC has achieved its objectives and, if not, why and what can be done about it in the future"--Publisher's description
    Description / Table of Contents: Preface -- Figures and Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter One: Introduction: Study Background and Companion Reports -- Methods and Approach -- Outline of the Remainder of the Report -- Chapter Two: The BPC Training and Equipping Logic Model: Nested Logic Models -- Target High-Level Outcomes in the BPC Training and Equipping Logic Model -- Target Core Outputs of the Sequential Phases of the BPC Training and Equipping Logic Model -- Input Categories -- BPC Training and Equipping Logic Model Overview -- Chapter Three: Description of Logic Model Elements for the Preengagement Phase: U.S. Program Goals and Plans: Preengagement -- U.S. Political Will: Preengagement -- Partner Nation Political Will: Preengagement -- Funding: Preengagement -- Partner Nation Personnel: Preengagement -- U.S. Trainers: Preengagement -- Equipment: Preengagement -- Logistics and Transport: Preengagement -- Facilities: Preengagement -- Curriculum and Training Content: Preengagement -- Chapter Four: Description of Logic Model Elements for the Engagement Phase: U.S. Program Goals and Plans: During Engagement -- U.S. Political Will: During Engagement -- Partner Nation Political Will: During Engagement -- Funding: During Engagement -- Partner Nation Personnel: During Engagement -- U.S. Trainers: During Engagement -- Equipment: During Engagement -- Logistics and Transport: During Engagement -- Facilities: During Engagement -- Curriculum and Training Content: During Engagement -- Chapter Five: Description of Logic Model Elements for the Postengagement Phase, Including Outcomes: U.S. Program Goals and Plans: Postengagement -- U.S. Program Goals and Plans: Outcomes -- U.S. Political Will: Postengagement -- U.S. Political Will: Outcomes -- Partner Nation Political Will: Postengagement -- Partner Nation Political Will: Outcomes -- Funding: Postengagement -- Funding: Outcomes -- Partner Nation Personnel: Postengagement -- Partner Nation Personnel: Outcomes -- U.S. Trainers: Postengagement -- U.S. Trainers: Outcomes -- Equipment: Postengagement -- Equipment: Outcomes -- Logistics and Transportation: Postengagement -- Logistics and Transportation: Outcomes -- Facilities: Postengagement -- Facilities: Outcomes -- Curriculum and Training Content: Postengagement -- Curriculum and Training Content: Outcomes -- Chapter Six: Using the BPC Training and Equipping Logic Model as Part of an Assessment Framework: Three Questions, Three Places to Start -- Contextualizing the Logic Model -- The Logic Model Helps with Selection and Prioritization of Measures -- References.
    Note: "Prepared for the Joint Staff J5, the Office of Cost Assessment and Program Evaluation in the Office of the Secretary of Defense, and the Office of the Under Secretary of Defense for Policy"--Preface , "National Defense Research Institute , Includes bibliographical references (pages 95-96)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833091833 , 083309369X , 0833091832 , 9780833093691
    Language: English
    Pages: 1 Online-Ressource (xvii, 83 pages)
    Series Statement: Rand Corporation research report series RR-1231-OSD
    Parallel Title: Print versionBaron, Joshua William National security implications of virtual currency
    Keywords: National security Economic aspects ; Electronic funds transfers Political aspects ; National security ; Electronic funds transfers ; COMPUTERS ; Internet ; General ; National security ; Economic aspects ; Banking ; Finance ; Business & Economics ; Electronic books
    Abstract: "This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. A VC, such as Bitcoin, is a digital representation of value that can be transferred, stored, or traded electronically and that is neither issued by a central bank or public authority, nor necessarily attached to a fiat currency (dollars, euros, etc.), but is accepted by people as a means of payment. We addressed the following research questions from both the technological and political-economic perspectives: (1) Why would a non-state actor deploy a VC? That is, what political and/or economic utility is there to gain? How might this non-state actor go about such a deployment? What challenges would it have to overcome? (2) How might a government or organization successfully technologically disrupt a VC deployment by a non-state actor, and what degree of cyber sophistication would be required? (3) What additional capabilities become possible when the technologies underlying the development and implementation of VCs are used for purposes broader than currency?"--Publisher's web site
    Description / Table of Contents: Preface -- Summary -- Acknowledgments -- Abbreviations -- Chapter One: Introduction: Approach -- Chapter Two: The Current State of Virtual Currencies: The Evolution to Virtual Currencies -- Origins and Trends of Virtual Currencies -- Early Systems -- Bitcoin -- Virtual Currencies After Bitcoin: Altcoins -- Authority (De)centralization and Implications for Virtual Currency Design -- Virtual Currencies and Non-State Actors -- Chapter Three: Can Virtual Currencies Increase Political Power?: Non-State Currencies Emerge When State Currencies Do Not Meet Groups' Needs -- Non-State Currencies Are Not Likely to Be VCs Now But Could Be VCs in the Future -- Chapter Four: Technical Challenges to Virtual Currency Deployment: Developing and Deploying a Virtual Currency: Developing Software for a Virtual Currency -- Physically Deploying a Virtual Currency -- Deployment Challenges for Decentralized Virtual Currencies -- Virtual Currencies, Adoption, and Value -- Ensuring Anonymity of Currency Use: Anonymity Versus Virtual Currency Centralization -- "Anonymity": A Bitcoin Case Study -- Some New Altcoins Build in Anonymous Transactions -- Cyber Threats to Virtual Currencies: Attacks Used by Tier I and Tier II Opponents -- Attacks Used by Tier III and Tier IV Opponents -- Attacks Used by Tier V and Tier VI Opponents -- The Possibility of Successful Defense -- Chapter Five: Implications Beyond Currency: Block-Chain Technology and Distributed Consensus -- Virtual Currencies Increase Cryptographic Sophistication -- Virtual Currencies and the Trend Toward Resilient, Decentralized Cyber Services -- Toward Resilient, Public Cyber Key Terrain -- Chapter Six: Conclusions and Future Research: For Future Research -- Appendix: Rating Cyber Threat Sophistication by Tiers -- References.
    Note: "National Defense Research Institute , Includes bibliographical references (pages 73-83) , Series from web site
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corporation
    ISBN: 9780833090379 , 0833090372 , 9780833090386 , 0833090380 , 9780833088505 , 0833090313
    Language: English
    Pages: 1 Online-Ressource (xxii, 110 pages)
    DDC: 303.48/25106
    Keywords: Geopolitics ; National security ; China ; Africa ; China ; Africa ; United States ; Electronic books ; Electronic books ; Electronic book
    Abstract: "This report explores China's rapidly expanding involvement in Africa in order to better inform U.S. thinking about its relations both with China and with African states. The report pays particular attention to geostrategic competition in Africa, potential security threats, and opportunities on the continent. It examines the economic, political, and security interests driving Chinese engagement with African states and assesses potential medium-term changes in Sino-African relations across these three dimensions. It then assesses how China's interests and behavior on the continent affect the interests of the United States. In this matter, misperceptions often result from faulty assumptions about the potential for conflict over resources, images of Cold War-style geopolitical competition, and the nature of China's economic engagement with the continent. The report concludes by offering policy recommendations for U.S. and Army leaders concerned with U.S. security relationships with African states and with managing Sino-American relations in Africa. In particular, the report recommends that the United States should view China's sometimes-unfavorable activities in Africa in context and continue to seek opportunities to engage Beijing on mutual interests, such as defeating violent extremists, improving African infrastructure to promote trade and development, and encouraging economic and political stability on the continent."--Page 4 of cover
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833089007 , 083309338X , 0833089005 , 9780833093387
    Language: English
    Pages: 1 Online-Ressource (xi, 62 pages)
    Series Statement: Research reports RR-1007-AF
    Parallel Title: Erscheint auch als Snyder, Don, 1962- Improving the cybersecurity of U.S. Air Force military systems throughout their life cycles
    Keywords: United States Rules and practice ; United States ; Computer networks Security measures ; Cyberspace Security measures ; Cyberinfrastructure Security measures ; Evaluation ; Risk assessment ; Cyberterrorism Prevention 21st century ; National security 21st century ; Computer networks ; Cyberspace ; Cyberinfrastructure ; Risk assessment ; Cyberterrorism ; National security ; HISTORY ; Military ; Aviation ; Computer networks ; Security measures ; Cyberterrorism ; Prevention ; National security ; Risk assessment ; Telecommunications ; Electrical & Computer Engineering ; Engineering & Applied Sciences ; United States ; United States ; Rules ; Electronic books
    Abstract: "There is increasing concern that Air Force systems containing information technology are vulnerable to intelligence exploitation and offensive attack through cyberspace. In this report, the authors analyze how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of its military systems. The focus is primarily on the subset of procured systems for which the Air Force has some control over design, architectures, protocols, and interfaces (e.g., weapon systems, platform information technology), as opposed to commercial, off-the-shelf information technology and business systems. The main themes in the authors' findings are that cybersecurity laws and policies were created to manage commercial, off-the-shelf information technology and business systems and do not adequately address the challenges of securing military systems. Nor do they adequately capture the impact to operational missions. Cybersecurity is mainly added on to systems, not designed in. The authors recommend 12 steps that the Air Force can take to improve the cybersecurity of its military systems throughout their life cycles"--Publisher's description
    Description / Table of Contents: Preface -- Figures -- Summary -- Acknowledgments -- 1. Cybersecurity Management: Introduction -- What Should Cybersecurity in Acquisition Achieve? -- Managing Cybersecurity Risk -- Challenges for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Principles for Managing Cybersecurity -- Summary -- 2. Cybersecurity Laws and Policies -- Introduction -- Legislation and Federal Cybersecurity Policy -- Department of Defense Cybersecurity Policy -- Cybersecurity and Air Force Life-Cycle Management -- Conclusion -- 3. Findings and Recommendations: Findings -- Discussion -- Recommendations -- Closing Remarks -- Abbreviations -- References.
    Note: "October 27, 2015"--Table of contents page
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833091512 , 0833091549 , 0833091514 , 9780833091543
    Language: English
    Pages: 1 Online-Ressource (35 pages)
    Series Statement: Strategic rethink
    Series Statement: Research reports RR-1223-RC
    Keywords: Terrorism Prevention 21st century ; International cooperation ; Civil-military relations 21st century ; Security, International 21st century ; Strategic planning 21st century ; National security 21st century ; Terrorism ; Civil-military relations ; Security, International ; Strategic planning ; National security ; Security, International ; Strategic planning ; Terrorism ; Prevention ; International cooperation ; POLITICAL SCIENCE ; Terrorism ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Operational readiness ; United States ; Civil-military relations ; National security ; United States Armed Forces ; Operational readiness ; United States Foreign relations 21st century ; Decision making ; United States Armed Forces ; Appropriations and expenditures ; United States ; United States ; United States ; Electronic book
    Abstract: "This report is the second in RAND's ongoing Strategic Rethink series, in which RAND experts explore the elements of a national strategy for the conduct of U.S. foreign and security policy in this administration and the next. The report analyzes defense options available to the United States in responding to the re-emergence of a belligerent Russia, the seizure of significant territory in Iraq and Syria by violent extremists, growing Chinese military power and assertiveness, and other threats to U.S. security and interests. It focuses on ways that the United States might adapt military instruments to meet these emerging challenges, assessing in broad terms the cost of defense investments commensurate with the interests at stake. The report argues that currently projected levels of defense spending are insufficient to meet the demands of an ambitious national security strategy"--Publisher's description
    Description / Table of Contents: Preface -- Acknowledgments -- America's Security Deficiit -- Changing Demands on Defense -- Readiness -- Enhancing Allied Defenses -- Choices for Sizing the Defense Budget -- Abbreviations -- References -- Figures -- Tables.
    Note: Includes bibliographical references (pages 33-35)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780833085139 , 0833086499 , 0833085131 , 9780833086495
    Language: English
    Pages: 1 Online-Ressource (xxxiii, 152 pages)
    Parallel Title: Print version Hanauer, Larry Evaluating the impact of the Department of Defense Regional Centers for Security Studies
    Keywords: United States Management ; Evaluation ; United States ; National security International cooperation ; Military assistance, American ; National security ; Military assistance, American ; National security ; International cooperation ; Military & Naval Science ; Law, Politics & Government ; Armies ; POLITICAL SCIENCE ; International Relations ; Treaties ; Management ; Evaluation ; Military assistance, American ; United States ; Electronic books
    Abstract: The five U.S. Department of Defense (DoD) Regional Centers for Security Studies have been helping partner nations build strategic capacity for almost 20 years. However, recent DoD budget constraints have put pressure on the regional centers (RCs) to increase efficiency. The Office of the Secretary of Defense (OSD) asked RAND to conduct a study on the overall impact of the RCs, their effectiveness in advancing DoD policy priorities, the ways in which they assess their programs, and ways in which they could improve their impact and efficiency and the resulting outcomes. The RAND study team found that centers have had great success at the missions they have undertaken. They are high-impact components of U.S. security cooperation and engagement efforts, despite their relatively small budgets. The team identified 24 ways in which the centers advance U.S. interests, including building partner capacity, building relationships, fostering pro-U.S. outlooks, offering unique opportunities for engagement, and promoting regional dialogue that reduces tensions. However, RCs should improve impact-oriented data collection and analysis for improved assessment, methodically collecting such data over time. OSD and the combatant commands should improve their oversight and management of the RCs to ensure alignment with department- and theater-level objectives. In addition, OSD should maintain the RCs' focus on regional security challenges rather than refashioning them to address specific threats. Options to consider for greater impact include evaluating the balance between core residential courses and in-region workshops and determining whether and to what extent the centers should develop customized programs for DoD components so as to secure funds beyond the core budget they receive from OSD
    Abstract: The five U.S. Department of Defense (DoD) Regional Centers for Security Studies have been helping partner nations build strategic capacity for almost 20 years. However, recent DoD budget constraints have put pressure on the regional centers (RCs) to increase efficiency. The Office of the Secretary of Defense (OSD) asked RAND to conduct a study on the overall impact of the RCs, their effectiveness in advancing DoD policy priorities, the ways in which they assess their programs, and ways in which they could improve their impact and efficiency and the resulting outcomes. The RAND study team found that centers have had great success at the missions they have undertaken. They are high-impact components of U.S. security cooperation and engagement efforts, despite their relatively small budgets. The team identified 24 ways in which the centers advance U.S. interests, including building partner capacity, building relationships, fostering pro-U.S. outlooks, offering unique opportunities for engagement, and promoting regional dialogue that reduces tensions. However, RCs should improve impact-oriented data collection and analysis for improved assessment, methodically collecting such data over time. OSD and the combatant commands should improve their oversight and management of the RCs to ensure alignment with department- and theater-level objectives. In addition, OSD should maintain the RCs' focus on regional security challenges rather than refashioning them to address specific threats. Options to consider for greater impact include evaluating the balance between core residential courses and in-region workshops and determining whether and to what extent the centers should develop customized programs for DoD components so as to secure funds beyond the core budget they receive from OSD
    Note: "Prepared for the Office of the Secretary of Defense , "RR-388-OSD"--Page 4 of cover , "National Defense Research Institute , Includes bibliographical references (pages 145-152)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833086198 , 0833086367 , 0833086197 , 9780833086365
    Language: English
    Pages: 1 Online-Ressource (16 pages)
    Parallel Title: Print version LaTourrette, Tom, 1963- Impact on federal spending of allowing the terrorism risk insurance act to expire
    Keywords: United States Evaluation ; United States ; Risk management ; National security ; Terrorism Risk assessment ; Risk (Insurance) ; Terrorism insurance Evaluation ; Risk management ; National security ; Terrorism ; Risk (Insurance) ; Terrorism insurance ; National security ; Risk (Insurance) ; Risk management ; United States ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law creates an incentive for a functioning private terrorism insurance market by providing a government reinsurance backstop for catastrophic terrorist attack losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again considering the appropriate government role in terrorism insurance markets. This policy brief examines the potential federal spending implications of allowing TRIA to expire. Combining information on federal spending through TRIA, the influence of TRIA on the availability of terrorism insurance coverage, and the relationship between uninsured losses and federal disaster assistance spending, the authors find that, in the absence of a terrorist attack, TRIA costs taxpayers relatively little, and in the event of a terrorist attack comparable to any experienced before, it is expected to save taxpayers money
    Note: "RAND Corporation , "Policy Brief , "This work was conducted within RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , Caption title , Includes bibliographical references (pages 14-16)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833085887 , 0833086340 , 0833085883 , 9780833086341
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Series Statement: RAND Corporation research report series RR-449-RC
    Parallel Title: Print vversion Davis, Lynn E. (Lynn Etheridge), 1943- Armed and dangerous?
    Keywords: Technology Risk assessment ; National security ; Military art and science Technological innovations ; Arms control ; Drone aircraft Risk assessment ; Technology ; National security ; Military art and science ; Arms control ; Drone aircraft ; Technology ; Risk assessment ; United States ; Military art and science ; Technological innovations ; POLITICAL SCIENCE ; International Relations ; Arms Control ; Arms control ; National security ; Electronic books
    Abstract: Armed drones are making the headlines, especially in their role in targeted killings. In this report, RAND researchers stepped back and asked whether these weapons are transformative. The answer is no, though they offer significant capabilities to their users, especially in counterterrorism operations as has been the case for the United States. Will they proliferate? Yes, but upon a closer look at the types of systems, only a few rich countries will be in a position to develop the higher technology and longer range systems. U.S. adversaries and others will likely find weapons such as aircraft and air defenses more cost and militarily effective. Their proliferation will not create the kinds of global dangers that call for new arms control efforts, but the risks to regional stability cannot be dismissed entirely, as is the case of any conventional weapon. How the United States will use these weapons today and into the future will be important in shaping a broader set of international norms that discourage their misuse by others
    Note: "RAND Corporation , Caption title , Includes bibliographical references (pages 26-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833087379 , 0833089587 , 0833087371 , 9780833089588
    Language: English
    Pages: 1 Online-Ressource (xxi, 62 pages + database)
    Series Statement: Report RR-736-AF
    Keywords: Database of U.S. security treaties and agreements ; Database of U.S. security treaties and agreements ; Information storage and retrieval systems Treaties ; Information storage and retrieval systems Status of forces agreements ; Status of forces agreements Databases ; National security Law and legislation ; Legal research ; Information storage and retrieval systems ; Information storage and retrieval systems ; Status of forces agreements ; National security ; Information storage and retrieval systems ; Status of forces agreements ; Law - U.S ; Law, Politics & Government ; Law - U.S. - General ; POLITICAL SCIENCE ; International Relations ; Treaties ; United States ; Diplomatic relations ; Databases ; Treaties ; United States Treaties Foreign relations ; United States Databases Foreign relations ; United States ; United States ; Electronic books
    Abstract: Treaties and agreements are powerful foreign policy tools that the United States uses to build and solidify relationships with partners and to influence the behavior of other states. As a result, the overall U.S. portfolio of treaties and agreements can offer insight into the distribution and depth of U.S. commitments internationally, including its military commitments and 'presence' in a given country or region. However, despite their importance, there is currently no comprehensive record of current or historical security-related treaties signed by the United States that can be used for empirical analysis. To address the shortcomings in existing datasets and indexes to contribute to the study of U.S. security treaties and agreements, we have developed a new, more comprehensive treaty database that will enhance the ability of researchers to study the full portfolio of U.S. security agreements. This report discusses our approach to data collection and coding and also presents a summary of the database's content. Its appendixes define each individual variable used in the analysis. The database was developed as part of a larger project focused on estimating the economic value of U.S. military presence overseas. In the context of this larger project, the treaty database provided an alternative way to measure 'military presence.' In addition to using numbers of troops as a measure of presence, we also used numbers of security-related agreements, drawing on the information in the treaty database described in this report. This measure provided us with additional insight into the value and role of U.S. engagement and operations in overseas areas
    Abstract: Treaties and agreements are powerful foreign policy tools that the United States uses to build and solidify relationships with partners and to influence the behavior of other states. As a result, the overall U.S. portfolio of treaties and agreements can offer insight into the distribution and depth of U.S. commitments internationally, including its military commitments and 'presence' in a given country or region. However, despite their importance, there is currently no comprehensive record of current or historical security-related treaties signed by the United States that can be used for empirical analysis. To address the shortcomings in existing datasets and indexes to contribute to the study of U.S. security treaties and agreements, we have developed a new, more comprehensive treaty database that will enhance the ability of researchers to study the full portfolio of U.S. security agreements. This report discusses our approach to data collection and coding and also presents a summary of the database's content. Its appendixes define each individual variable used in the analysis. The database was developed as part of a larger project focused on estimating the economic value of U.S. military presence overseas. In the context of this larger project, the treaty database provided an alternative way to measure 'military presence.' In addition to using numbers of troops as a measure of presence, we also used numbers of security-related agreements, drawing on the information in the treaty database described in this report. This measure provided us with additional insight into the value and role of U.S. engagement and operations in overseas areas
    Note: "The accompanying CD ... contains an actual Excel database of treaties. The database does not include text, but includes titles, dates, and other classifications."--Email from author , "Prepared for the United States Air Force , "RAND Project AIR FORCE , Includes bibliographical references (pages 59-62)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833080981 , 0833084607 , 0833080989 , 9780833084606
    Language: English
    Pages: 1 Online-Ressource (57 pages)
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- RAND security cooperation prioritization and propensity matching tool
    Keywords: Security, International ; Decision making Data processing ; Military assistance, American Planning ; National security International cooperation ; Security, International ; Decision making ; Military assistance, American ; National security ; Security, International ; United States ; Law, Politics & Government ; International Relations ; Military policy ; POLITICAL SCIENCE ; Security (National & International) ; Decision making ; Data processing ; Diplomatic relations ; National security ; International cooperation ; United States Foreign relations 1989- ; United States Military policy ; United States ; United States ; Electronic books
    Abstract: Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
    Abstract: Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 51-57)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833085405 , 0833085409 , 9780833081490 , 0833084712 , 0833081497 , 9780833084712
    Language: English
    Pages: 1 Online-Ressource (x, 71 pages)
    Series Statement: Rand Corporation research report RR378
    Parallel Title: Print version Speier, Richard Penaid nonproliferation
    Keywords: Ballistic missile defenses ; Weapons of mass destruction ; National security ; Ballistic missile defenses ; Weapons of mass destruction ; National security ; National security ; Weapons of mass destruction ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; HISTORY ; Military ; Weapons ; Ballistic missile defenses ; Military readiness ; United States Defenses ; United States ; Electronic books
    Abstract: An attacker's missile-borne countermeasures to ballistic missile defenses are known as penetration aids, or penaids. To support efforts to prevent the proliferation of penaid-related items, this research recommends controls on potential exports according to the structure of the international Missile Technology Control Regime
    Abstract: An attacker's missile-borne countermeasures to ballistic missile defenses are known as penetration aids, or penaids. To support efforts to prevent the proliferation of penaid-related items, this research recommends controls on potential exports according to the structure of the international Missile Technology Control Regime
    Note: "National Defense Research Institute , "RR-378-DTRA"--Page 4 of cover , "Prepared for the Naval Postgraduate School, Project on Advanced Systems and Concepts for Combating WMD , Includes bibliographical references (pages 69-71)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833082107 , 0833084658 , 0833082108 , 9780833084651
    Language: English
    Pages: 1 Online-Ressource (xxix, 196 pages)
    Series Statement: Rand Corporation research report series RR-413-OSD
    Keywords: Nation-building Evaluation ; National security International cooperation ; Evaluation ; Nation-building ; National security ; Law, Politics & Government ; International Relations ; United States ; POLITICAL SCIENCE ; Political Freedom ; Electronic books
    Abstract: Security cooperation has long been an important instrument of the U.S. government and the Department of Defense for advancing national security objectives vis-à-vis allies and partner countries, including building critical relationships, securing peacetime and contingency access, and building partner capacity (BPC). One of the key challenges for policymakers and combatant commands is gaining a more complete understanding of the real value of BPC activities. Assessments of prior and ongoing BPC activities, in particular, have become increasingly important given the current fiscal climate and budgetary limitations. But it is no easy task to assess the value of what are essentially qualitative activities, and data limitations severely hinder assessments. The tools available -- such as resources, authorities, programs, processes, and organizational relationships -- may or may not be the optimal ones for the delivery of BPC activities to partner countries. This report characterizes security cooperation mechanisms used by combatant commands for BPC, produces a detailed database of the mechanism elements, develops and applies a preliminary means of evaluating the effectiveness and efficiency of select mechanisms, and draws on the analysis from the case studies to recommend ways to improve the effectiveness and efficiency of those mechanisms in the future
    Abstract: Security cooperation has long been an important instrument of the U.S. government and the Department of Defense for advancing national security objectives vis-à-vis allies and partner countries, including building critical relationships, securing peacetime and contingency access, and building partner capacity (BPC). One of the key challenges for policymakers and combatant commands is gaining a more complete understanding of the real value of BPC activities. Assessments of prior and ongoing BPC activities, in particular, have become increasingly important given the current fiscal climate and budgetary limitations. But it is no easy task to assess the value of what are essentially qualitative activities, and data limitations severely hinder assessments. The tools available -- such as resources, authorities, programs, processes, and organizational relationships -- may or may not be the optimal ones for the delivery of BPC activities to partner countries. This report characterizes security cooperation mechanisms used by combatant commands for BPC, produces a detailed database of the mechanism elements, develops and applies a preliminary means of evaluating the effectiveness and efficiency of select mechanisms, and draws on the analysis from the case studies to recommend ways to improve the effectiveness and efficiency of those mechanisms in the future
    Note: "National Defense Research Institute , "Prepared for the Joint Staff and OSD/CAPE , Includes bibliographical references (pages 193-196)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780833073846 , 0833073842 , 9780833073402 , 0833073826 , 0833073400 , 9780833073822
    Language: English
    Pages: 1 Online-Ressource (xvii, 50 pages)
    Series Statement: Rand Corporation monograph series MG-1211-AF
    Parallel Title: Print version U.S. overseas military presence
    DDC: 355/.033573
    Keywords: National security Planning ; Military bases, American ; National security ; Military bases, American ; National security ; Planning ; Military & Naval Science ; Law, Politics & Government ; Armies ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; Armed Forces ; Military policy ; Planning ; Military readiness ; Military readiness ; Planning ; United States ; United States Armed Forces ; United States Military policy ; Planning ; United States Defenses ; United States Defenses ; Planning ; United States ; United States ; United States ; United States ; Electronic books
    Abstract: "Since World War II, the United States has relied on a global network of military bases and forces to protect its interests and those of its allies. But the international environment has changed greatly over the decades, and economic concerns have risen, leading some to debate just what America's role should now be in the world. This monograph addresses one aspect of this debate by introducing a new analytical approach to defining future U.S. military presence overseas. It does so by first considering U.S. global security interests, then focusing on specific threats to them in East Asia, Europe, and the Middle East. With that, the researchers designed a menu of global postures based on different strategic perspectives. They evaluated the global postures in terms of their operational performance and then compared them in terms of their associated U.S. Air Force bases, combat forces, active-duty personnel, and base operating costs. These analyses offer insights on the critical strategic choices that policymakers need to address and that the public needs to debate as they consider future overseas U.S. military presence. Among these choices are for the United States to depend more on its allies, rely more on U.S. based military forces, focus its presence more on East Asia or on the Middle East, or retain its current overseas presence in the face of expanding threats. Those involved in debates on the future global U.S. posture will need to make explicit their implicit underlying perspectives on what role overseas military presence can play in achieving U.S. global security interests."--Publisher's description
    Abstract: Introduction -- Path to defining future global U.S. postures -- Comparison of global postures -- Strategic choices: Overseas U.S. military presence -- Appendix A. Protecting the global commons: confusing means with ends -- Appendix B. Database of current U.S. bases overseas -- Appendix C. Comparison of global postures
    Abstract: "Since World War II, the United States has relied on a global network of military bases and forces to protect its interests and those of its allies. But the international environment has changed greatly over the decades, and economic concerns have risen, leading some to debate just what America's role should now be in the world. This monograph addresses one aspect of this debate by introducing a new analytical approach to defining future U.S. military presence overseas. It does so by first considering U.S. global security interests, then focusing on specific threats to them in East Asia, Europe, and the Middle East. With that, the researchers designed a menu of global postures based on different strategic perspectives. They evaluated the global postures in terms of their operational performance and then compared them in terms of their associated U.S. Air Force bases, combat forces, active-duty personnel, and base operating costs. These analyses offer insights on the critical strategic choices that policymakers need to address and that the public needs to debate as they consider future overseas U.S. military presence. Among these choices are for the United States to depend more on its allies, rely more on U.S. based military forces, focus its presence more on East Asia or on the Middle East, or retain its current overseas presence in the face of expanding threats. Those involved in debates on the future global U.S. posture will need to make explicit their implicit underlying perspectives on what role overseas military presence can play in achieving U.S. global security interests."--Publisher's description
    Note: "This research was conducted in the Strategy and Doctrine Program of RAND Project Air Force"--Preface , "RAND Project Air Force , Includes bibliographical references (pages 47-50)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780833052629 , 0833059114 , 0833052624 , 9780833059116
    Language: English
    Pages: 1 Online-Ressource (xxiii, 129 pages)
    Series Statement: RAND Corporation technical report series TR972
    Parallel Title: Print version Lessons from U.S. allies in security cooperation with third countries
    Keywords: Military policy Case studies ; National security Case studies International cooperation ; Military policy ; National security ; National security ; International cooperation ; Military & Naval Science ; Law, Politics & Government ; Armies ; HISTORY ; Military ; Other ; Australia ; France ; Great Britain ; United States ; Australia ; security policy ; cooperation ; France ; security policy ; cooperation ; UK ; security policy ; cooperation ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Strategy ; Military policy ; Military relations ; Case studies ; France Military relations ; Great Britain Military relations ; United States Military relations ; Australia Military relations ; France ; Great Britain ; United States ; Australia ; Electronic book
    Abstract: Introduction -- Australia's Approach to Security Cooperation -- France's Approach to Security Cooperation -- The United Kingdom's Approach to Security Cooperation -- Comparing the Case Studies -- Conclusions and Recommendations -- Appendix A: Royal Australian Air Force Activities with Foreign Partners -- Appendix B: Brazilian Air Force Activities with Foreign Partners -- Appendix C: Chilean Air Force Activities with Foreign Partners -- Appendix D: Colombian Air Force Activities with Foreign Partners -- Appendix E: French Air Force Activities with Foreign Partners -- Appendix F: Indian Air Force Activities with Foreign Partners -- Appendix G: Israeli Air and Space Force Activities with Foreign Partners -- Appendix H: Japan Air Self-Defense Force Activities with Foreign Partners -- Appendix I: Pakistan Air Force Activities with Foreign Partners -- Appendix J: Republic of Korea Air Force Activities with Foreign Partners -- Appendix K: Singapore Air Force Activities with Foreign Partners -- Appendix L: South African Air Force Activities with Foreign Partners -- Appendix M: United Arab Emirates Air Force Activities with Foreign Partners -- Appendix N: Royal Air Force Activities with Foreign Partners
    Abstract: Introduction -- Australia's Approach to Security Cooperation -- France's Approach to Security Cooperation -- The United Kingdom's Approach to Security Cooperation -- Comparing the Case Studies -- Conclusions and Recommendations -- Appendix A: Royal Australian Air Force Activities with Foreign Partners -- Appendix B: Brazilian Air Force Activities with Foreign Partners -- Appendix C: Chilean Air Force Activities with Foreign Partners -- Appendix D: Colombian Air Force Activities with Foreign Partners -- Appendix E: French Air Force Activities with Foreign Partners -- Appendix F: Indian Air Force Activities with Foreign Partners -- Appendix G: Israeli Air and Space Force Activities with Foreign Partners -- Appendix H: Japan Air Self-Defense Force Activities with Foreign Partners -- Appendix I: Pakistan Air Force Activities with Foreign Partners -- Appendix J: Republic of Korea Air Force Activities with Foreign Partners -- Appendix K: Singapore Air Force Activities with Foreign Partners -- Appendix L: South African Air Force Activities with Foreign Partners -- Appendix M: United Arab Emirates Air Force Activities with Foreign Partners -- Appendix N: Royal Air Force Activities with Foreign Partners
    Note: "Project Air Force , Includes bibliographical references (pages 121-129) , Title from PDF title screen (viewed Oct. 9, 2011)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780833047564 , 0833050265 , 0833047566 , 9780833050267
    Language: English
    Pages: 1 Online-Ressource (xxiii, 138 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Larrabee, F. Stephen Troubled partnership
    Keywords: World politics 1989- ; Geopolitics ; Social change ; National security ; National security ; World politics ; Geopolitics ; Social change ; National security ; National security ; Diplomatic relations ; Military relations ; National security ; Social change ; World politics ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; Turkey ; United States ; Geopolitics ; Turkey Military relations ; Turkey Foreign relations ; United States Military relations ; United States Foreign relations ; Turkey ; Turkey ; United States ; United States
    Abstract: Turkey stands at the nexus of four geographic areas of growing strategic importance in the post-Cold War era: the Balkans, the Middle East, the Caucasus/Central Asia, and the Persian Gulf region. In each of these areas, Turkey's cooperation is critical for achieving U.S. policy goals. However, in recent years, especially since 2003, U.S.- Turkish relations have undergone serious strains. Sharp differences over Iraq and the Kurdish issue have been compounded by differences over the Middle East, particularly relations with Iran, Iraq, and Syria. At the same time, Turkey has witnessed a sharp rise in anti-American sentiment. This monograph examines the causes of recent strains in the U.S.-Turkish security partnership and options for reducing these strains
    Abstract: Turkey stands at the nexus of four geographic areas of growing strategic importance in the post-Cold War era: the Balkans, the Middle East, the Caucasus/Central Asia, and the Persian Gulf region. In each of these areas, Turkey's cooperation is critical for achieving U.S. policy goals. However, in recent years, especially since 2003, U.S.- Turkish relations have undergone serious strains. Sharp differences over Iraq and the Kurdish issue have been compounded by differences over the Middle East, particularly relations with Iran, Iraq, and Syria. At the same time, Turkey has witnessed a sharp rise in anti-American sentiment. This monograph examines the causes of recent strains in the U.S.-Turkish security partnership and options for reducing these strains
    Note: Includes bibliographical references (pages 127-138)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780833051035 , 0833051121 , 0833051032 , 9780833051127
    Language: English
    Pages: 1 Online-Ressource (xli, 133 pages)
    Series Statement: Rand Corporation monograph series MG-1031-NIJ
    Parallel Title: Print version Long-term effects of law enforcement's post-9/11 focus on counterterrorism and homeland security
    Keywords: Civil defense ; National security ; Law enforcement ; Terrorism Prevention ; Police training Costs ; Civil defense ; National security ; Law enforcement ; Terrorism ; Police training ; Civil defense ; Law enforcement ; National security ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Law Enforcement ; Electronic books
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Note: Includes bibliographical references (pages 121-133)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833047007 , 083304723X , 9781282282698 , 1282282697 , 9780833047236 , 0833047000
    Language: English
    Pages: 1 Online-Ressource (xxiv, 101 pages)
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Imported oil and U.S. national security
    Keywords: Petroleum industry and trade Government policy ; National security ; Petroleum industry and trade ; Petroleum industry and trade ; National security ; Petroleum industry and trade ; BUSINESS & ECONOMICS ; International ; Marketing ; POLITICAL SCIENCE ; International Relations ; Trade & Tariffs ; BUSINESS & ECONOMICS ; International ; General ; BUSINESS & ECONOMICS ; Exports & Imports ; POLITICAL SCIENCE ; Public Policy ; Environmental Policy ; National security ; Petroleum industry and trade ; Petroleum industry and trade ; Government policy ; oil ; natural security ; USA ; United States
    Abstract: Introduction -- Oil markets and U.S. national security -- Oil as a foreign policy instrument -- Oil revenues, rogue states, and terrorist groups -- Incremental costs for U.S. forces to secure the supply and transit of oil from the Persian Gulf -- Policy options to address U.S. national security concerns linked to imported oil
    Abstract: In 2007, on a net basis, the United States imported 58 percent of the oil it consumed. This book critically evaluates commonly suggested links between these oil imports and U.S. national security. The major risk to the United States posed by reliance on oil is the economic costs of a major disruption in global oil supplies. On the other hand, the study found no evidence that oil exporters have been able to use embargoes or threats of embargoes to achieve key political and foreign policy goals. Oil revenues are irrelevant for terrorist groups' ability to launch attacks. The study also assesses the economic, political, and military costs and benefits of potential policies to alleviate challenges to U.S. national security linked to imported oil. Of these measures, the adoption of the following energy policies by the U.S. government would most effectively reduce the costs to U.S. national security of importing oil: (1) Support well-functioning oil markets and refrain from imposing price controls or rationing during times of severe disruptions in supply. (2) Initiate a high-level review of prohibitions on exploring and developing new oil fields in restricted areas in order to provide policymakers and stakeholders with up-to-date and unbiased information on both economic benefits and environmental risks from relaxing those restrictions. (3) Ensure that licensing and permitting procedures and environmental standards for developing and producing oil and oil substitutes are clear, efficient, balanced in addressing both costs and benefits, and transparent. (4) Impose an excise tax on oil to increase fuel economy and soften growth in demand for oil. (5) Provide more U.S. government funding for research on improving the efficiency with which the U.S. economy uses oil and competing forms of energy.--Publisher description
    Abstract: In 2007, on a net basis, the United States imported 58 percent of the oil it consumed. This book critically evaluates commonly suggested links between these oil imports and U.S. national security. The major risk to the United States posed by reliance on oil is the economic costs of a major disruption in global oil supplies. On the other hand, the study found no evidence that oil exporters have been able to use embargoes or threats of embargoes to achieve key political and foreign policy goals. Oil revenues are irrelevant for terrorist groups' ability to launch attacks. The study also assesses the economic, political, and military costs and benefits of potential policies to alleviate challenges to U.S. national security linked to imported oil. Of these measures, the adoption of the following energy policies by the U.S. government would most effectively reduce the costs to U.S. national security of importing oil: (1) Support well-functioning oil markets and refrain from imposing price controls or rationing during times of severe disruptions in supply. (2) Initiate a high-level review of prohibitions on exploring and developing new oil fields in restricted areas in order to provide policymakers and stakeholders with up-to-date and unbiased information on both economic benefits and environmental risks from relaxing those restrictions. (3) Ensure that licensing and permitting procedures and environmental standards for developing and producing oil and oil substitutes are clear, efficient, balanced in addressing both costs and benefits, and transparent. (4) Impose an excise tax on oil to increase fuel economy and soften growth in demand for oil. (5) Provide more U.S. government funding for research on improving the efficiency with which the U.S. economy uses oil and competing forms of energy.--Publisher description
    Note: "Sponsored by the Institute for 21st Century Energy, U.S. Chamber of Commerce , Issued by: RAND Infrastructure, Safety, and Environment and National Security Research Division , Includes bibliographical references (pages 93-103) , Title from PDF title page (viewed May 11, 2009)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780833040954 , 0833040952 , 9780833038234 , 0833040901 , 0833038230 , 9780833040909
    Language: English
    Pages: 1 Online-Ressource (xxiv, 97 pages)
    Parallel Title: Print version Developing Iraq's security sector
    Keywords: National security ; Police ; Civil defense ; Law enforcement ; National security ; Police ; Civil defense ; Law enforcement ; Civil defense ; Law enforcement ; National security ; Police ; Armies ; Military & Naval Science ; Law, Politics & Government ; Iraq ; HISTORY ; Military ; Strategy ; LAW ; Civil Law ; Electronic books
    Abstract: Following the war in Iraq, the United States and its allies found that their prewar expectations of security did not match the actual postwar environment. Iraqi security forces had largely disappeared, and those that remained were incapable of countering a rising tide of political violence and crime. From May 2003 to June 28, 2004 (when it handed over authority to the Iraqi Interim Government), the Coalition Provisional Authority (CPA) sought to field Iraqi security forces and to develop security sector institutions. This book-all of whose authors were advisors to the CPA-breaks out the various elements of Iraq?s security sector, including the defense, interior, and justice sectors, and assesses the CPA?s successes and failures. Furthermore, the book identifies six problems underlying the coalition?s approach that need to be addressed if Iraq is to recover from past mistakes. Iraq needs capable security forces in the near term and sustainable security institutions for the long term. The authors emphasize that the onus must remain on the United States and its international partners to ensure that long-term institution-building remains on the Iraqi agenda
    Abstract: Following the war in Iraq, the United States and its allies found that their prewar expectations of security did not match the actual postwar environment. Iraqi security forces had largely disappeared, and those that remained were incapable of countering a rising tide of political violence and crime. From May 2003 to June 28, 2004 (when it handed over authority to the Iraqi Interim Government), the Coalition Provisional Authority (CPA) sought to field Iraqi security forces and to develop security sector institutions. This book-all of whose authors were advisors to the CPA-breaks out the various elements of Iraq?s security sector, including the defense, interior, and justice sectors, and assesses the CPA?s successes and failures. Furthermore, the book identifies six problems underlying the coalition?s approach that need to be addressed if Iraq is to recover from past mistakes. Iraq needs capable security forces in the near term and sustainable security institutions for the long term. The authors emphasize that the onus must remain on the United States and its international partners to ensure that long-term institution-building remains on the Iraqi agenda
    Note: "MG-365-OSD"--Page 4 of cover , Includes bibliographical references (pages 93-97)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corp
    ISBN: 9780833035202 , 0833048171 , 9781598754131 , 1598754130 , 9781282451223 , 1282451227 , 9780833048172 , 0833035207
    Language: English
    Pages: 1 Online-Ressource (xxx, 155 pages)
    Parallel Title: Print version Out of the ordinary
    Keywords: Criminal methods ; Terrorism Forecasting ; Terrorism Psychological aspects ; Intelligence service ; National security ; Crime forecasting ; Criminal behavior, Prediction of ; Criminal methods ; Terrorism ; Terrorism ; Intelligence service ; National security ; Crime forecasting ; Criminal behavior, Prediction of ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Security (National & International) ; Crime forecasting ; Criminal behavior, Prediction of ; Criminal methods ; Intelligence service ; National security ; Terrorism ; Forecasting ; Terrorism ; Psychological aspects ; United States ; Electronic books
    Abstract: Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
    Abstract: Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
    Note: "MG-126-RC , Includes bibliographical references (pages 151-155) and appendices , Title from title screen (viewed 11/23/2004)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 9780833032898 , 0833034103 , 0833032925 , 0833032895 , 9780833032928 , 9780833034106
    Language: English
    Pages: 1 Online-Ressource (xxiv, 390 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: MR / Rand Corporation MR-1576-RC
    Series Statement: MR/Rand Corporation MR-1576-RC
    Parallel Title: Print version New challenges, new tools for defense decisionmaking
    Keywords: National security ; World politics 21st century ; National security ; World politics ; Electronic books ; Military readiness ; National security ; World politics ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; International Relations ; General ; Military policy ; Decision making ; United States Defenses ; United States Military policy ; Decision making ; United States ; United States ; Electronic books
    Abstract: It is still easy to underestimate how much the collapse of the Soviet Union and the end of the Cold War?and then the terrorist attacks of September 11, 2001 -- transformed the task of American foreign and defense policymaking. In place of predictability (if a sometimes terrifying predictability), the world is now very unpredictable. In place of a single overriding threat and benchmark by which all else could be measured, a number of possible threats have arisen, not all of them states. In place of force-on-force engagements, U.S. defense planners have to assume "asymmetric" threats -- ways not to defeat U.S. power but to render it irrelevant. This book frames the challenges for defense policy that the transformed world engenders, and it sketches new tools for dealing with those challenges -- from new techniques in modeling and gaming, to planning based on capabilities rather than threats, to personnel planning and making use of "best practices" from the private sector
    Abstract: It is still easy to underestimate how much the collapse of the Soviet Union and the end of the Cold War?and then the terrorist attacks of September 11, 2001 -- transformed the task of American foreign and defense policymaking. In place of predictability (if a sometimes terrifying predictability), the world is now very unpredictable. In place of a single overriding threat and benchmark by which all else could be measured, a number of possible threats have arisen, not all of them states. In place of force-on-force engagements, U.S. defense planners have to assume "asymmetric" threats -- ways not to defeat U.S. power but to render it irrelevant. This book frames the challenges for defense policy that the transformed world engenders, and it sketches new tools for dealing with those challenges -- from new techniques in modeling and gaming, to planning based on capabilities rather than threats, to personnel planning and making use of "best practices" from the private sector
    Note: "MR-1576-RC , Includes bibliographical references and index , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833033475 , 0833034138 , 0833033476 , 9780833034137
    Language: English
    Pages: 1 Online-Ressource (xxi, 307 pages)
    Series Statement: MR/Rand Corporation MR-1657-A
    Parallel Title: Print version U.S. Army and the new national security strategy
    Keywords: United States ; United States ; National security ; World politics 21st century ; National security ; World politics ; World politics ; HISTORY ; Military ; United States ; POLITICAL SCIENCE ; Security (National & International) ; Military policy ; National security ; United States ; United States Military policy ; United States ; Electronic books
    Abstract: How is the U.S. Army changing to fulfill its role in light of the new national security strategy? How must it change further to better accomplish its manifold and varied missions? How did the attacks of September 11, 2001, alter or accelerate the need for change? Is the Army's far-reaching program for change known as the Army Transformation on the right track? Fourteen RAND analysts with broad experience in strategic and Army planning have undertaken to answer these questions. In this book, the authors use nine chapters to examine the Army's role in the offensive war on terrorism; the Army's homeland security needs; the implications for the Army of the increase in emphasis on the Asia-Pacific region; the Army's role in coalition operations; the unfinished business of jointness-the lessons to be learned from recent Army operations and how the Army can better prepare for the future; the Army's deployability, logistical, and personnel challenges; and whether the Army can afford the Transformation as currently envisaged. These chapters are bracketed by a concise introduction, a description of the new national security strategy and the Army's place in it, and a succinct summary of the authors' conclusions. This book is nothing less than a call for the Army to change and a prescription for what needs to be done
    Note: "MR-1657-A"--Page 4 of cover , "Prepared for the United States Army , Includes bibliographical references , ch. 1. Introduction , ch. 2. New national security strategy , ch. 3. U.S. Army and the offensive war on terrorism , ch. 4. Defining the Army's homeland security needs , ch. 5. Shift to Asia, implications for U.S. land power , ch. 6. Preparing for coalition operations , ch. 7. Transformation and the unfinished business of jointness, lessons for the Army from the Persian Gulf, Kosovo, and Afghanistan , ch. 8. Preparing the Army for joint operations , ch. 9. Moving rapidly to the fight , ch. 10. Taking care of people, the future of Army personnel , ch. 11. Making the power projection Army a reality , ch. 12. Resourcing the twenty-first century Army , ch. 13. Refining Army transformation
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Santa Monica, CA : Rand
    ISBN: 9780833026675 , 0833026674 , 0585239576 , 9780585239576 , 9780833032560 , 0833032569
    Language: English
    Pages: Online Ressource (xxi, 153 pages) , illustrations
    Edition: Online-Ausg.
    Parallel Title: Print version Countering the new terrorism
    DDC: 303.625
    Keywords: United States / Air Force Security measures ; United States / Air Force ; United States Security measures ; United States Security measures ; United States ; Terrorism Prevention ; United States ; Information warfare Prevention ; United States ; National security United States ; Air power United States ; National security ; Information warfare Prevention ; Air power ; Terrorism Prevention ; Information warfare Prevention ; National security ; Air power ; Terrorism Prevention ; Air power ; Information warfare ; Prevention ; Military policy ; National security ; Armed Forces ; Security measures ; Terrorism ; Prevention ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; United States Military policy ; United States ; United States Military policy ; United States Military policy ; United States ; Electronic book ; Electronic books
    Abstract: The contours of terrorism are changing, and the new terrorism has more diverse sources, motivations, and tactics than the old. It is more lethal, global in reach, and characterized by network forms of organization. Terrorist sponsorship is becoming hazier and "privatized." The August 1998 terrorist bombings of U.S. embassies in Kenya and Tanzania fit in many ways the new mold. The chapters in this book trace the evolution of international terrorism against civilian and U.S. military targets, look ahead to where terrorism is going, and assess how it might be contained. Terrorism and counterterrorism are placed in strategic perspective, including how terrorism might be applied as an asymmetric strategy by less-capable adversaries. The report builds on a existing body of RAND research on terrorism and political violence, and makes extensive use of the RAND-St. Andrews Chronology of International Terrorism
    Note: "Prepared for the United States Air Force. - "Project Air Force. - "MR-989-AF"--Page 4 of cover. - Includes bibliographical references and index. - Description based on print version record , "Project Air Force , "MR-989-AF"--P. [4] of cover , Includes bibliographical references and index
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...