Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (28)
  • 2010-2014  (28)
  • Rand Corporation  (28)
  • Military Science - General  (16)
  • Terrorism  (12)
Datasource
Material
Language
  • English  (28)
Years
Year
  • 1
    ISBN: 9780833082619 , 083308996X , 0833082612 , 9780833089960
    Language: English
    Pages: 1 Online-Ressource (xxiii, 75 pages)
    Series Statement: RAND Corporation research report series RR-448-A
    Parallel Title: Print version Crowley, James C., 1945- Changing the Army's weapon training strategies to meet operational requirements more efficiently and effectively
    Keywords: Military education ; Military weapons ; Soldiers Training of ; Military education ; Military weapons ; Soldiers ; Law, Politics & Government ; United States ; Military weapons ; Soldiers ; Training of ; TECHNOLOGY & ENGINEERING ; Military Science ; Military Science - General ; Military education ; Military & Naval Science ; Electronic books
    Abstract: "The ability of soldiers to engage the enemy effectively is fundamental to the operational success of the U.S. Army. As a result, the Army devotes considerable effort and resources to weapon training. The Army's current challenge is to adapt weapon training strategies to meet complex operational environments and changing unit readiness processes; take full advantage of training technologies; and, in an era of declining defense budgets, make weapon training strategies more efficient. This report documents the findings, conclusions, and implications of a two-year project supporting the Army's efforts to adapt its weapon training strategies and the processes through which they are developed. The potential of emerging technologies to make weapon training strategies more effective and efficient is also examined. The report outlines directions the Army could take to improve its weapon training strategies and the processes for adapting them. It concludes that improving the processes for adapting weapon training to new requirements can make them more effective and efficient, but that improvements should be made in the context of holistically improving the Army's training and leader development programs. In addition, while there are many potential benefits to increasing the use of technologies in weapon training strategies, there are many factors that act to limit the amount of improvement that must be considered before deciding on implementation."--Abstract on RAND home page
    Abstract: "The ability of soldiers to engage the enemy effectively is fundamental to the operational success of the U.S. Army. As a result, the Army devotes considerable effort and resources to weapon training. The Army's current challenge is to adapt weapon training strategies to meet complex operational environments and changing unit readiness processes; take full advantage of training technologies; and, in an era of declining defense budgets, make weapon training strategies more efficient. This report documents the findings, conclusions, and implications of a two-year project supporting the Army's efforts to adapt its weapon training strategies and the processes through which they are developed. The potential of emerging technologies to make weapon training strategies more effective and efficient is also examined. The report outlines directions the Army could take to improve its weapon training strategies and the processes for adapting them. It concludes that improving the processes for adapting weapon training to new requirements can make them more effective and efficient, but that improvements should be made in the context of holistically improving the Army's training and leader development programs. In addition, while there are many potential benefits to increasing the use of technologies in weapon training strategies, there are many factors that act to limit the amount of improvement that must be considered before deciding on implementation."--Abstract on RAND home page
    Note: "Prepared for the United States Army , "RAND Arroyo Center , "Approved for public release; distribution unlimited , "RR-448-A"--Page 4 of cover , "The research described in this report was sponsored by the United States Army under Contract, No. W74V8H-06-C-0001"--Title page verso , Includes bibliographical references (pages 73-75)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833085382 , 0833085387 , 9780833085351 , 0833085352
    Language: English
    Pages: 1 Online-Ressource (21 pages)
    Parallel Title: Erscheint auch als Willis, Henry H National security perspectives on terrorism risk insurance in the United States
    Keywords: United States Evaluation ; United States ; Terrorism History 21st century ; Terrorism Risk assessment ; Risk management Evaluation ; Risk (Insurance) Evaluation ; Terrorism insurance Evaluation ; Terrorism ; Terrorism ; Risk management ; Risk (Insurance) ; Terrorism insurance ; BUSINESS & ECONOMICS ; Insurance ; General ; United States ; History ; Evaluation ; Risk management ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Terrorism ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law provides a government reinsurance backstop in the case of a terrorist attack by providing mechanisms for avoiding an immediate drawdown of capital for insured losses or possibly covering the most extreme losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again reconsidering the appropriate government role in terrorism insurance markets. This policy brief examines the potential national security implications of allowing TRIA to expire. Examining the history of terrorism in the United States since the passage of TRIA and reviewing counterterrorism studies, the authors find that terrorism remains a real national security threat, but one that is very difficult for insurers to model the risk of. They also find that terrorism risk insurance can contribute to making communities more resilient to terrorism events, so, to the extent that terrorism insurance is more available with TRIA than without it, renewing the legislation would contribute to improved national security
    Note: "Policy Brief , "This work was conducted within the RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , "RAND Corporation , Caption title , Includes bibliographical references (pages 19-21)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9780833087720 , 083308772X , 9780833087737 , 0833087746 , 0833087738 , 0833087711 , 9780833087713 , 9780833087744
    Language: English
    Pages: 1 Online-Ressource (1 online resource)
    Parallel Title: Erscheint auch als Ramchand, Rajeev Developing a research strategy for suicide prevention in the Department of Defense
    Keywords: United States Personnel management ; Research ; United States ; Suicide Prevention ; Government policy ; Military research ; Suicide Prevention ; Research ; Psychology, Military ; Suicide ; Military research ; Suicide ; Psychology, Military ; Military research ; Personnel management ; Research ; Psychology, Military ; Suicide ; Prevention ; Government policy ; Military Science - General ; Military & Naval Science ; Law, Politics & Government ; United States ; United States ; PSYCHOLOGY ; Suicide ; United States Armed Forces ; Mental health services ; United States ; Electronic books
    Abstract: The study indexed each of 12 research goals according to rankings of importance, effectiveness, cultural acceptability, cost, and learning potential provided by experts who participated in a multistep elicitation exercise. The results revealed that research funding is overwhelmingly allocated to prevention goals already considered by experts to be effective. Other goals considered by experts to be important and appropriate for the military context receive relatively little funding and have been the subject of relatively few studies, meaning that there is still much to learn about these strategies. Furthermore, DoD, like other organizations, suffers from a research-to-practice gap. The most promising results from studies funded by DoD and other entities do not always find their way to those responsible for implementing suicide prevention programs that serve military personnel
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833086198 , 0833086367 , 0833086197 , 9780833086365
    Language: English
    Pages: 1 Online-Ressource (16 pages)
    Parallel Title: Print version LaTourrette, Tom, 1963- Impact on federal spending of allowing the terrorism risk insurance act to expire
    Keywords: United States Evaluation ; United States ; Risk management ; National security ; Terrorism Risk assessment ; Risk (Insurance) ; Terrorism insurance Evaluation ; Risk management ; National security ; Terrorism ; Risk (Insurance) ; Terrorism insurance ; National security ; Risk (Insurance) ; Risk management ; United States ; SOCIAL SCIENCE ; Disasters & Disaster Relief ; Evaluation ; Terrorism Risk Insurance Act of 2002 (United States) ; Electronic books
    Abstract: Congress enacted the Terrorism Risk Insurance Act (TRIA) in 2002, in response to terrorism insurance becoming unavailable or, when offered, extremely costly in the wake of the 9/11 attacks. The law creates an incentive for a functioning private terrorism insurance market by providing a government reinsurance backstop for catastrophic terrorist attack losses. Extended first in 2005 and again in 2007, TRIA is set to expire at the end of 2014, and Congress is again considering the appropriate government role in terrorism insurance markets. This policy brief examines the potential federal spending implications of allowing TRIA to expire. Combining information on federal spending through TRIA, the influence of TRIA on the availability of terrorism insurance coverage, and the relationship between uninsured losses and federal disaster assistance spending, the authors find that, in the absence of a terrorist attack, TRIA costs taxpayers relatively little, and in the event of a terrorist attack comparable to any experienced before, it is expected to save taxpayers money
    Note: "RAND Corporation , "Policy Brief , "This work was conducted within RAND Center for Catastrophic Risk Management and Compensation ... part of RAND Justice, Infrastructure, and Environment"--Back cover , Caption title , Includes bibliographical references (pages 14-16)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833089915 , 0833089919 , 9780833087492 , 0833087495
    Language: English
    Pages: 1 Online-Ressource (xxx, 133 pages)
    DDC: 355.5/40973
    Keywords: United States Officers ; Training of ; United States ; Asymmetric warfare ; Military education Evaluation ; Leadership ; Asymmetric warfare ; Military education ; Leadership ; Law, Politics & Government ; Military Science - General ; United States ; Armed Forces ; Officers ; Training of ; Asymmetric warfare ; Leadership ; Military education ; Evaluation ; United States ; Military & Naval Science ; Electronic books
    Abstract: The Asymmetric Warfare Group offers the Asymmetric Warfare Adaptive Leader Program (AWALP)--a 10-day course designed to enhance adaptive performance in leaders and promote innovative solutions in training in support of unified land operations. This report describes results of a systematic evaluation of AWALP, offers recommendations to improve the course, and provides recommendations for ongoing evaluation of AWALP and other courses or events that address adaptive performance and acquisition of other intangible skills. The study used a pretest-posttest design and collected data from 104 students who participated in AWALP. Results show substantial improvement in training outcomes, including students' self-efficacy for being adaptive and leading adaptive teams and knowledge of course concepts. Graduates also reported that they were applying course concepts on the job after returning to their units. In addition, students had exceptionally favorable reactions to AWALP and remained extremely positive about the course three months after graduation. Results indicate few needs for improvement in the course; the most important area to address is challenges in applying concepts on the job because of the command climate and entrenched leadership. Recommendations for ongoing evaluation focus on obtaining additional measures of adaptive performance, particularly to establish the impact of AWALP on subsequent job performance. The current success of AWALP suggests that its approach to training might be usefully expanded in the Army, and the authors discuss strategies to achieve broader dissemination. Finally, the authors describe how the methods used in this study might be applied to evaluating related training in other contexts
    Abstract: The Asymmetric Warfare Group offers the Asymmetric Warfare Adaptive Leader Program (AWALP)--a 10-day course designed to enhance adaptive performance in leaders and promote innovative solutions in training in support of unified land operations. This report describes results of a systematic evaluation of AWALP, offers recommendations to improve the course, and provides recommendations for ongoing evaluation of AWALP and other courses or events that address adaptive performance and acquisition of other intangible skills. The study used a pretest-posttest design and collected data from 104 students who participated in AWALP. Results show substantial improvement in training outcomes, including students' self-efficacy for being adaptive and leading adaptive teams and knowledge of course concepts. Graduates also reported that they were applying course concepts on the job after returning to their units. In addition, students had exceptionally favorable reactions to AWALP and remained extremely positive about the course three months after graduation. Results indicate few needs for improvement in the course; the most important area to address is challenges in applying concepts on the job because of the command climate and entrenched leadership. Recommendations for ongoing evaluation focus on obtaining additional measures of adaptive performance, particularly to establish the impact of AWALP on subsequent job performance. The current success of AWALP suggests that its approach to training might be usefully expanded in the Army, and the authors discuss strategies to achieve broader dissemination. Finally, the authors describe how the methods used in this study might be applied to evaluating related training in other contexts
    Note: "RR-504-A."--Back cover , Includes bibliographical references (pages 125-133)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833087751 , 0833089412 , 0833087754 , 9780833089410
    Language: English
    Pages: 1 Online-Ressource (xxiv, 142 pages)
    Keywords: United States ; United States ; Irregular warfare ; Afghan War, 2001- ; Strategy ; Iraq War, 2003-2011 ; Irregular warfare ; Afghan War, 2001- ; Strategy ; Iraq War, 2003-2011 ; Military & Naval Science ; Law, Politics & Government ; POLITICAL SCIENCE ; Security (National & International) ; Iraq ; Irregular warfare ; Afghan War (2001- ) ; Strategy ; Iraq War (2003-2011) ; Military Science - General ; United States ; Electronic books
    Abstract: This report contributes to the ongoing debate about the lessons from the past 13 years of war and the requirements for addressing future conflicts. It addresses a particular disconnect in the current debate on the future of national security strategy and the role of landpower caused by an inadequate examination of the national level of strategy made by the U.S. government. The disconnect exists because there has been no systematic effort to collect and analyze insights from those who have been actively engaged in making policy and strategy from 2001 to 2014. A RAND Arroyo Center workshop provided a mechanism for eliciting insights from policymakers and academic experts involved in the formation of national-level strategy and its implementation over the past 13 years. This study analyzes and develops those insights in the context of the debate on future national security strategy. It applies those insights to the future operating environment, which will include irregular and hybrid threats, and identifies critical requirements for land forces and special operations forces to operate successfully in conjunction with other joint, interagency, and multinational partners
    Abstract: This report contributes to the ongoing debate about the lessons from the past 13 years of war and the requirements for addressing future conflicts. It addresses a particular disconnect in the current debate on the future of national security strategy and the role of landpower caused by an inadequate examination of the national level of strategy made by the U.S. government. The disconnect exists because there has been no systematic effort to collect and analyze insights from those who have been actively engaged in making policy and strategy from 2001 to 2014. A RAND Arroyo Center workshop provided a mechanism for eliciting insights from policymakers and academic experts involved in the formation of national-level strategy and its implementation over the past 13 years. This study analyzes and develops those insights in the context of the debate on future national security strategy. It applies those insights to the future operating environment, which will include irregular and hybrid threats, and identifies critical requirements for land forces and special operations forces to operate successfully in conjunction with other joint, interagency, and multinational partners
    Note: "RAND Arroyo Center , "This research was ... conducted within RAND Arroyo Center's Strategy, Doctrine, and Resources Program"--Preface , Includes bibliographical references (pages 125-142)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9780833082114 , 0833084704 , 0833082116 , 9780833084705
    Language: English
    Pages: 1 Online-Ressource (xxi, 167 pages)
    Series Statement: Rand Corporation research report series RR-382-OSD
    Parallel Title: Print version Connable, Ben Modeling, simulation, and operations analysis in Afghanistan and Iraq
    Keywords: Soldiers Protection ; Simulation methods ; Evaluation ; Logistics Simulation methods ; Evaluation ; Military planning Simulation methods ; Evaluation ; Decision making Simulation methods ; Evaluation ; Operations research ; Counterinsurgency Simulation methods ; Evaluation ; Irregular warfare Simulation methods ; Evaluation ; Soldiers ; Logistics ; Military planning ; Decision making ; Operations research ; Counterinsurgency ; Irregular warfare ; COMPUTERS ; Data Modeling & Design ; Operations research ; Military Science - General ; Military & Naval Science ; Law, Politics & Government ; United States ; Electronic book
    Abstract: RAND conducted a lessons learned examination of operations analysis, modeling, and simulation in support of Operation Enduring Freedom and Operation Iraqi Freedom. This report identifies ways in which analysts have attempted to support commanders' decisions in counterinsurgency and irregular warfare, describes many of the models and tools they employed, provides insight into the challenges they faced, and suggests ways in which the application of modeling, simulation, and analysis might be improved for current and future operations. RAND identified four broad categories of decisions: force protection, logistics, campaign assessment, and force structuring. Modeling, simulation, and analysis were most effective in supporting force protection and logistics decisions, and least effective in supporting campaign assessment and force structuring
    Abstract: RAND conducted a lessons learned examination of operations analysis, modeling, and simulation in support of Operation Enduring Freedom and Operation Iraqi Freedom. This report identifies ways in which analysts have attempted to support commanders' decisions in counterinsurgency and irregular warfare, describes many of the models and tools they employed, provides insight into the challenges they faced, and suggests ways in which the application of modeling, simulation, and analysis might be improved for current and future operations. RAND identified four broad categories of decisions: force protection, logistics, campaign assessment, and force structuring. Modeling, simulation, and analysis were most effective in supporting force protection and logistics decisions, and least effective in supporting campaign assessment and force structuring
    Note: "Prepared for the Office of the Secretary of Defense, Cost Assessment and Program Evaluation , "National Defense Research Institute , Includes bibliographical references (pages 137-167)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833085641 , 0833090003 , 0833085646 , 9780833090003
    Language: English
    Pages: 1 Online-Ressource (xxii, 97 pages)
    Parallel Title: Erscheint auch als Osburg, Jan Assessing locally focused stability operations
    Keywords: Counterinsurgency ; Counterinsurgency ; United States ; Military & Naval Science ; Law, Politics & Government ; Armed Forces ; Stability operations ; Military Science - General ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; United States Armed Forces ; Stability operations ; United States ; Electronic books
    Abstract: This report describes how the Army and other services can better measure and assess the progress and outcomes of locally focused stability operations (LFSO), which are defined as the missions, tasks, and activities that build security, governance, and development by, with, and through the directly affected community, in order to increase stability at the local level. A number of issues related to assessing LFSO are identified, along with foundational challenges that include an inherently complex operational environment, limited doctrinal guidance, competing visions of stability, untested assumptions, and redundant or excessive reporting requirements. The report offers solutions to these and other challenges, and provides concrete recommendations and implementation-related guidance for designing and conducting assessments of LFSO. The report concludes with an assessment plan for a notional African LFSO scenario that illustrates the practical application of those insights
    Abstract: This report describes how the Army and other services can better measure and assess the progress and outcomes of locally focused stability operations (LFSO), which are defined as the missions, tasks, and activities that build security, governance, and development by, with, and through the directly affected community, in order to increase stability at the local level. A number of issues related to assessing LFSO are identified, along with foundational challenges that include an inherently complex operational environment, limited doctrinal guidance, competing visions of stability, untested assumptions, and redundant or excessive reporting requirements. The report offers solutions to these and other challenges, and provides concrete recommendations and implementation-related guidance for designing and conducting assessments of LFSO. The report concludes with an assessment plan for a notional African LFSO scenario that illustrates the practical application of those insights
    Note: "RAND Arroyo Center , "This research was sponsored by the Army's Asymmetric Warfare Group and was conducted within RAND Arroyo Center's Force Development and Technology Program"--Preface , Includes bibliographical references (pages 93-97)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9780833083869 , 0833083872 , 0833083864 , 9780833083876
    Language: English
    Pages: 1 Online-Ressource (31 pages)
    Parallel Title: Print version Jackson, Brian A., 1972- How do we know what information sharing is really worth?
    Keywords: Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information Access control ; Terrorism Prevention ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Intelligence service ; Information policy ; Communication in law enforcement ; Government information ; Terrorism ; Domestic intelligence ; Exchange of government information ; Selective dissemination of information ; Terrorism ; Prevention ; United States ; COMPUTERS ; Internet ; Security ; Communication in law enforcement ; Domestic intelligence ; Exchange of government information ; Government information ; Access control ; Information policy ; Intelligence service ; Electronic books
    Abstract: Since the terrorist attacks of September 11, 2001, the sharing of intelligence and law enforcement information has been a central part of U.S. domestic security efforts. Though much of the public debate about such sharing focuses on addressing the threat of terrorism, organizations at all levels of government routinely share varied types of information through multiagency information systems, collaborative groups, and other links. Given resource constraints, there are concerns about the effectiveness of information-sharing and fusion activities and, therefore, their value relative to the public funds invested in them. Solid methods for evaluating these efforts are lacking, however, limiting the ability to make informed policy decisions. Drawing on a substantial literature review and synthesis, this report lays out the challenges of evaluating information-sharing efforts that frequently seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts going forward
    Note: "RAND Homeland Security and Defense Center , "This research was conducted within the RAND Homeland Security and Defense Center ... a joint center of two research divisions: RAND Justice, Infrastructure, and Environment, and the RAND National Security Research Division"--Back cover , "RAND Corporation research report series."--Web Page (PDF) , "RR-380-OSD"--Page 31 , Caption title , Includes bibliographical references (pages 27-30)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9780833080547 , 0833083414 , 0833080547 , 9780833083418
    Language: English
    Pages: 1 Online-Ressource (xlii, 286 pages)
    Additional Information: Paths to victory: detailed insurgency case studies
    Series Statement: Rand Corporation research report series RR-291/1-OSD
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- Paths to victory
    Keywords: Counterinsurgency Research ; Counterinsurgency Case studies ; Counterinsurgency ; Counterinsurgency ; Military & Naval Science ; Case studies ; Law, Politics & Government ; Military Science - General ; Counterinsurgency ; Counterinsurgency ; Research ; POLITICAL SCIENCE ; Security (National & International) ; Electronic books
    Abstract: When a country is threatened by an insurgency, what efforts give its government the best chance of prevailing? Contemporary discourse on this subject is voluminous and often contentious. Advice for the counterinsurgent is often based on little more than common sense, a general understanding of history, or a handful of detailed examples, instead of a solid, systematically collected body of historical evidence. A 2010 RAND study challenged this trend with rigorous analyses of all 30 insurgencies that started and ended between 1978 and 2008. This update to that original study expanded the data set, adding 41 new cases and comparing all 71 insurgencies begun and completed worldwide since World War II. With many more cases to compare, the study was able to more rigorously test the previous findings and address critical questions that the earlier study could not. For example, it could examine the approaches that led counterinsurgency forces to prevail when an external actor was involved in the conflict. It was also able to address questions about timing and duration, such as which factors affect the duration of insurgencies and the durability of the resulting peace, as well as how long historical counterinsurgency forces had to engage in effective practices before they won
    Abstract: When a country is threatened by an insurgency, what efforts give its government the best chance of prevailing? Contemporary discourse on this subject is voluminous and often contentious. Advice for the counterinsurgent is often based on little more than common sense, a general understanding of history, or a handful of detailed examples, instead of a solid, systematically collected body of historical evidence. A 2010 RAND study challenged this trend with rigorous analyses of all 30 insurgencies that started and ended between 1978 and 2008. This update to that original study expanded the data set, adding 41 new cases and comparing all 71 insurgencies begun and completed worldwide since World War II. With many more cases to compare, the study was able to more rigorously test the previous findings and address critical questions that the earlier study could not. For example, it could examine the approaches that led counterinsurgency forces to prevail when an external actor was involved in the conflict. It was also able to address questions about timing and duration, such as which factors affect the duration of insurgencies and the durability of the resulting peace, as well as how long historical counterinsurgency forces had to engage in effective practices before they won
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Companion publication to: Paths to victory: detailed insurgency case studies , Includes bibliographical references (pages 277-286)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780833082091 , 0833083465 , 0833082094 , 9780833083463
    Language: English
    Pages: 1 Online-Ressource (19 pages)
    Series Statement: Rand Corporation research report series RR-415-OSD
    Keywords: Qaeda in the Islamic Maghreb ; Qaeda in the Islamic Maghreb ; Terrorism ; Terrorism ; Terrorism ; North Africa ; Qaeda in the Islamic Maghreb ; HISTORY ; Africa ; North ; Electronic books
    Abstract: Since the 9/11 attacks, America's understanding of Al Qaeda has evolved along with the organization itself. In recent years attention to Al Qaeda's so called "affiliates" in Iraq, Yemen, Somalia, and most recently Syria has overtaken concern about Al Qaeda's core in Pakistan. The North African terrorist organization Al Qaeda in the Islamic Maghreb (AQIM) is one such affiliate. Many Americans first became familiar with AQIM when media reports linked it loosely to the attacks on the U.S. diplomatic compounds in Benghazi, Libya on 9/11/12 that killed U.S. Ambassador to Libya Chris Stevens. The horrific hostage crisis at an Algerian gas facility in January 2013, which was far more closely linked to the group, further increased concern about the threat it posed and played into anxieties about what many viewed as a resurgent Al Qaeda threat. This assessment of the threat from AQIM is based on an analysis of available open-source documentation. The authors find that although AQIM is a serious regional problem, its similarity to the Al Qaeda of Osama Bin Laden should not be exaggerated, as AQIM does not currently seem bent on global jihad. In most situations, the wisest policy responses to the AQIM threat will focus on supporting local actors and U.S. allies in Europe
    Abstract: Since the 9/11 attacks, America's understanding of Al Qaeda has evolved along with the organization itself. In recent years attention to Al Qaeda's so called "affiliates" in Iraq, Yemen, Somalia, and most recently Syria has overtaken concern about Al Qaeda's core in Pakistan. The North African terrorist organization Al Qaeda in the Islamic Maghreb (AQIM) is one such affiliate. Many Americans first became familiar with AQIM when media reports linked it loosely to the attacks on the U.S. diplomatic compounds in Benghazi, Libya on 9/11/12 that killed U.S. Ambassador to Libya Chris Stevens. The horrific hostage crisis at an Algerian gas facility in January 2013, which was far more closely linked to the group, further increased concern about the threat it posed and played into anxieties about what many viewed as a resurgent Al Qaeda threat. This assessment of the threat from AQIM is based on an analysis of available open-source documentation. The authors find that although AQIM is a serious regional problem, its similarity to the Al Qaeda of Osama Bin Laden should not be exaggerated, as AQIM does not currently seem bent on global jihad. In most situations, the wisest policy responses to the AQIM threat will focus on supporting local actors and U.S. allies in Europe
    Note: Includes bibliographical references (pages 17-19)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833081766 , 0833083643 , 0833081764 , 9780833083647
    Language: English
    Pages: 1 Online-Ressource (x, 25 pages)
    Keywords: Counterinsurgency ; Counterinsurgency Case studies ; Counterinsurgency ; Counterinsurgency ; Afghanistan ; Military Science - General ; Case studies ; Military & Naval Science ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Law, Politics & Government ; Electronic books
    Abstract: The RAND report Paths to Victory: Lessons from Modern Insurgencies added 41 new cases to a previously studied set of 30 insurgencies, examining the 71 insurgencies begun and completed worldwide between World War II and 2008 to analyze correlates of success in counterinsurgency (COIN). A key finding of this research was that a case's score on a scorecard of 15 equally weighted good and 11 equally weighted bad COIN factors and practices perfectly discriminated the outcomes of the cases analyzed. That is, the balance of good and bad factors and practices correlated with either a COIN win (insurgency loss) or a COIN loss (insurgency win) in the overall case. Using the scorecard approach as its foundation, a RAND study sought to apply the findings to the case of Afghanistan in early 2013. The effort involved an expert elicitation, or Delphi exercise, in which experts were asked to make "worst-case" assessments of the factors to complete the scorecard for ongoing operations in Afghanistan. The consensus results revealed that early 2013 Afghanistan ranks among the historical COIN winners, but its score is equal to those of the lowest-scoring historical wins. This tenuous position points to several areas in need of improvement, but particularly the need to disrupt the flow of insurgent support and the need for the Afghan government and Afghan security forces to better demonstrate their commitment and motivation. Afghanistan in early 2011 scored in the middle of the historical record in terms of COIN wins and losses, suggesting an overall improvement in COIN progress in that conflict by early 2013. However, conditions may change as coalition forces prepare to hand over responsibility for the country's security to the Afghan government and Afghan security forces in 2014
    Abstract: The RAND report Paths to Victory: Lessons from Modern Insurgencies added 41 new cases to a previously studied set of 30 insurgencies, examining the 71 insurgencies begun and completed worldwide between World War II and 2008 to analyze correlates of success in counterinsurgency (COIN). A key finding of this research was that a case's score on a scorecard of 15 equally weighted good and 11 equally weighted bad COIN factors and practices perfectly discriminated the outcomes of the cases analyzed. That is, the balance of good and bad factors and practices correlated with either a COIN win (insurgency loss) or a COIN loss (insurgency win) in the overall case. Using the scorecard approach as its foundation, a RAND study sought to apply the findings to the case of Afghanistan in early 2013. The effort involved an expert elicitation, or Delphi exercise, in which experts were asked to make "worst-case" assessments of the factors to complete the scorecard for ongoing operations in Afghanistan. The consensus results revealed that early 2013 Afghanistan ranks among the historical COIN winners, but its score is equal to those of the lowest-scoring historical wins. This tenuous position points to several areas in need of improvement, but particularly the need to disrupt the flow of insurgent support and the need for the Afghan government and Afghan security forces to better demonstrate their commitment and motivation. Afghanistan in early 2011 scored in the middle of the historical record in terms of COIN wins and losses, suggesting an overall improvement in COIN progress in that conflict by early 2013. However, conditions may change as coalition forces prepare to hand over responsibility for the country's security to the Afghan government and Afghan security forces in 2014
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (page 25)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9780833081094 , 0833083422 , 0833081098 , 9780833083425
    Language: English
    Pages: 1 Online-Ressource (xxxvii, 468 pages)
    Additional Information: Paths to victory: lessons from modern insurgencies
    Series Statement: Rand Corporation research report series RR-291/2-OSD
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- Paths to victory
    Keywords: Insurgency Case studies ; Insurgency ; Case studies ; POLITICAL SCIENCE ; Security (National & International) ; Military Science - General ; Military & Naval Science ; Law, Politics & Government ; Insurgency ; Electronic books
    Abstract: Detailed overviews of 41 insurgency cases. UK in Palestine, 1944-1947 -- Greece, 1945-1949 -- Indochina, 1946-1954 -- Philippines (Huk Rebellion), 1946-1956 -- Colombia ("La Violencia"), 1948-1958 -- Malaya, 1948-1955 -- Kenya, 1952-1956 -- Algerian Independence, 1954-1962 -- Cyprus, 1955-1959 -- Cuba, 1956-1959 -- Oman (Imamate Uprising), 1957-1959 -- Indonesia (Darul Islam), 1958-1962 -- Tibet, 1956-1974 -- Guatemala, 1960-1996 -- Laos, 1959-1975 -- Namibia, 1960-1989 -- South Africa, 1960-1990 -- South Vietnam, 1960-1975 -- Eritrea, 1961-1991 -- Iraqi Kurdistan, 1961-1975 -- Angolan Independence, 1961-1974 -- Guinea-Bissau, 1962-1974 -- Mozambican Independence, 1962-1974 -- Yemen, 1962-1970 -- Uruguay, 1963-1972 -- Oman (Dhofar Rebellion), 1965-1975 -- Zimbabwe/Rhodesia, 1965-1980 -- Argentina, 1969-1979 -- Cambodia, 1967-1975 -- Northern Ireland, 1969-1999 -- Jordan, 1970-1971 -- Bangladesh, 1971 -- Philippines (MNLF), 1971-1996 -- Baluchistan, 1973-1978 -- Angola (UNITA), 1975-2002 -- Indonesia (East Timor), 1975-2000 -- Lebanese Civil War, 1975-1990 -- Western Sahara, 1975-1991 -- Indonesia (Aceh), 1976-2005 -- Mozambique (RENAMO), 1976-1995 -- Sri Lanka, 1976-2009
    Abstract: Detailed overviews of 41 insurgency cases. UK in Palestine, 1944-1947 -- Greece, 1945-1949 -- Indochina, 1946-1954 -- Philippines (Huk Rebellion), 1946-1956 -- Colombia ("La Violencia"), 1948-1958 -- Malaya, 1948-1955 -- Kenya, 1952-1956 -- Algerian Independence, 1954-1962 -- Cyprus, 1955-1959 -- Cuba, 1956-1959 -- Oman (Imamate Uprising), 1957-1959 -- Indonesia (Darul Islam), 1958-1962 -- Tibet, 1956-1974 -- Guatemala, 1960-1996 -- Laos, 1959-1975 -- Namibia, 1960-1989 -- South Africa, 1960-1990 -- South Vietnam, 1960-1975 -- Eritrea, 1961-1991 -- Iraqi Kurdistan, 1961-1975 -- Angolan Independence, 1961-1974 -- Guinea-Bissau, 1962-1974 -- Mozambican Independence, 1962-1974 -- Yemen, 1962-1970 -- Uruguay, 1963-1972 -- Oman (Dhofar Rebellion), 1965-1975 -- Zimbabwe/Rhodesia, 1965-1980 -- Argentina, 1969-1979 -- Cambodia, 1967-1975 -- Northern Ireland, 1969-1999 -- Jordan, 1970-1971 -- Bangladesh, 1971 -- Philippines (MNLF), 1971-1996 -- Baluchistan, 1973-1978 -- Angola (UNITA), 1975-2002 -- Indonesia (East Timor), 1975-2000 -- Lebanese Civil War, 1975-1990 -- Western Sahara, 1975-1991 -- Indonesia (Aceh), 1976-2005 -- Mozambique (RENAMO), 1976-1995 -- Sri Lanka, 1976-2009
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Companion publication to: Paths to victory: lessons from modern insurgencies , Includes bibliographical references (pages 441-468)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833080929 , 0833083368 , 083308092X , 9780833083364
    Language: English
    Pages: 1 Online-Ressource (xliii, 258 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Violence Forecasting ; Criminal behavior Research ; Methodology ; Terrorists Psychology ; Terrorists Social conditions ; Criminal behavior, Prediction of ; Terrorism Prevention ; Violence ; Criminal behavior ; Terrorists ; Terrorists ; Criminal behavior, Prediction of ; Terrorism ; Behavioral Research ; Behavioral Sciences ; Crime ; Criminology ; Disciplines and Occupations ; Natural Science Disciplines ; Psychiatry and Psychology ; Research ; Science ; Social Problems ; Social Sciences ; Sociology ; Terrorism ; Violence ; Anthropology, Education, Sociology and Social Phenomena ; Behavioral Disciplines and Activities ; Criminal behavior, Prediction of ; Social Welfare & Social Work ; Social Sciences ; SOCIAL SCIENCE ; Criminology ; Criminology, Penology & Juvenile Delinquency ; Terrorists ; Psychology ; Criminal behavior ; Research ; Methodology ; Terrorism ; Prevention ; Violence ; Forecasting ; Electronic books
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Abstract: Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
    Note: "RAND National Security Research Division , "The research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , Includes bibliographical references (pages 225-258)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833079091 , 0833081985 , 0833079093 , 9780833081988
    Language: English
    Pages: 1 Online-Ressource (xxxiv, 134 pages)
    Series Statement: RAND Corporation research report series RR172
    Parallel Title: Erscheint auch als Straus, Susan G Enhancing critical thinking skills for Army leaders using blended-learning methods
    Keywords: United States Officers ; Training of ; United States ; Distance education Computer-assisted instruction ; Military education Technological innovations ; Blended learning ; Distance education ; Military education ; Blended learning ; Armed Forces ; Officers ; Training of ; Blended learning ; Distance education ; Computer-assisted instruction ; Military education ; Technological innovations ; Military & Naval Science ; Law, Politics & Government ; Military Science - General ; United States ; United States ; LAW ; Torts ; Electronic books
    Abstract: The U.S. Army's Command and General Staff School offers its Advanced Operations Course (AOC) for junior field-grade officers using both traditional resident instruction and a model referred to as blended distributed learning (BDL). The BDL course lasts 12 months and uses a variety of information and communication technologies to support synchronous and asynchronous collaboration among students and instructors entirely at a distance, with most students completing the course on discretionary time. This report assesses the effectiveness of AOC-BDL based on student and graduate surveys and identifies best practices for BDL from empirical research and case studies. Results show that the course has a number of strengths and that students were generally satisfied with the course. However, student responses also suggest that improvements are needed to support computer-supported cooperative learning and collaboration in distributed teams, particularly for instruction and collaboration on complex tasks. Furthermore, while students were satisfied with instruction for some operational topics, their responses may indicate needs for improvement in instruction of critical field-grade competencies, such as the military decision making process, problem solving, and communication skills, and in teaching leadership skills corresponding to a range of operational environments. Case studies and the research literature point to a number of best practices and options for improvement. Adding a resident segment may offer the greatest potential for improvement but may not be feasible in this context. Alternatives for improvement include modifying the composition of student teams to alleviate coordination challenges, moving the course delivery platform to a dotcom to improve technology reliability and functionality, and addressing policy to ensure that the chain of command and employers provided dedicated time for students to work on the course
    Abstract: The U.S. Army's Command and General Staff School offers its Advanced Operations Course (AOC) for junior field-grade officers using both traditional resident instruction and a model referred to as blended distributed learning (BDL). The BDL course lasts 12 months and uses a variety of information and communication technologies to support synchronous and asynchronous collaboration among students and instructors entirely at a distance, with most students completing the course on discretionary time. This report assesses the effectiveness of AOC-BDL based on student and graduate surveys and identifies best practices for BDL from empirical research and case studies. Results show that the course has a number of strengths and that students were generally satisfied with the course. However, student responses also suggest that improvements are needed to support computer-supported cooperative learning and collaboration in distributed teams, particularly for instruction and collaboration on complex tasks. Furthermore, while students were satisfied with instruction for some operational topics, their responses may indicate needs for improvement in instruction of critical field-grade competencies, such as the military decision making process, problem solving, and communication skills, and in teaching leadership skills corresponding to a range of operational environments. Case studies and the research literature point to a number of best practices and options for improvement. Adding a resident segment may offer the greatest potential for improvement but may not be feasible in this context. Alternatives for improvement include modifying the composition of student teams to alleviate coordination challenges, moving the course delivery platform to a dotcom to improve technology reliability and functionality, and addressing policy to ensure that the chain of command and employers provided dedicated time for students to work on the course
    Note: Includes bibliographical references (pages 127-134)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833079190 , 0833083201
    Language: English
    Pages: 1 Online-Ressource (xxi, 88 pages)
    DDC: 303.6/2501
    Keywords: Terrorism ; Terrorism ; Insurgency ; Electronic books
    Abstract: Introduction -- Specifying the Model -- Implementation in a High-Level Language -- Looking Ahead to Exploratory Analysis Under Uncertainty -- Using the Model for Knowledge Elicitation, Discussion, and Diagnosis -- Appendix A: Primer on Factor Trees (a reprint) -- Appendix B: Verification and Validation -- Appendix C: Eliciting Factor Values -- Appendix D: Mathematics for "And" and "Or" Relationships
    URL: Volltext  (Kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corporation
    ISBN: 9780833069122 , 083308321X , 0833069128 , 9780833083210
    Language: English
    Pages: 1 Online-Ressource (xxiv, 100 pages)
    Series Statement: Technical report
    Keywords: United States Vocational guidance ; United States ; Armed Forces Training of ; Military readiness ; Military education ; Armed Forces ; Military readiness ; Military education ; Armed Forces ; Vocational guidance ; Military education ; Military readiness ; Vocational guidance ; Military & Naval Science ; Law, Politics & Government ; Military Science - General ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; Armed Forces ; Operational readiness ; United States Armed Forces ; Operational readiness ; United States Armed Forces ; Vocational guidance ; United States ; United States ; Electronic books
    Abstract: Every uniformed service member, whether Active Component (AC) or Reserve Component (RC), must complete ancillary or general military training (GMT) requirements prescribed by his or her service. Individual services direct some topics, and some are stipulated by the U.S. Department of Defense (DoD). DoD has identified a need to reduce cyclic mandatory training requirements (especially for the RCs), thus reducing the training burden on the services and making the most of available training time. The RAND National Defense Research Institute was asked to examine the services' mandatory military training requirements and examine options to standardize requirements and reduce the training burden. This report responds to that request by providing a common definition of GMT and examining both the guidance that directs GMT completion and the services' approaches to conducting GMT. The authors identified GMT requirements directed by law and policy and interviewed service AC and RC subject-matter experts
    Abstract: Every uniformed service member, whether Active Component (AC) or Reserve Component (RC), must complete ancillary or general military training (GMT) requirements prescribed by his or her service. Individual services direct some topics, and some are stipulated by the U.S. Department of Defense (DoD). DoD has identified a need to reduce cyclic mandatory training requirements (especially for the RCs), thus reducing the training burden on the services and making the most of available training time. The RAND National Defense Research Institute was asked to examine the services' mandatory military training requirements and examine options to standardize requirements and reduce the training burden. This report responds to that request by providing a common definition of GMT and examining both the guidance that directs GMT completion and the services' approaches to conducting GMT. The authors identified GMT requirements directed by law and policy and interviewed service AC and RC subject-matter experts
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 93-100)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    ISBN: 9780833076526 , 0833079700 , 0833076523 , 9780833079701
    Language: English
    Pages: 1 Online-Ressource (xxv, 155 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Jackson, Brian A., 1972- Efficient aviation security
    Keywords: Terrorism Prevention ; Aeronautics Security measures ; Terrorism ; Aeronautics ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Terrorism ; Prevention ; Aeronautics ; Security measures ; United States ; Electronic books
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Abstract: In the decade since the September 11, 2001, terrorist attacks, aviation security has remained a policy area at the forefront of the national policy agenda. Al-Qa'ida has maintained its focus on the U.S. aviation system, and a number of attempted attacks on aircraft have been thwarted in the succeeding years. Internationally, there have been successful attacks on aircraft and airports, and continued adaptation and innovation by terrorist groups has presented aviation planners with a shifting risk environment. The frequent adjustments and systematic tightening of security around the aviation system that have occurred since 9/11 have also put the collateral and intangible effects of security efforts into the national spotlight, with significant controversy about the intrusiveness of security, and have stimulated both analysis and debate about whether the benefits of new security measures outweigh their costs. This document seeks to contribute to the national debate on aviation security by examining a set of issues that are either overlooked or not well captured in analyses of the costs and benefits of security measures. Our effort is motivated by the position that the goal of aviation security is not just to reduce risk in the aviation system, but to do so efficiently, particularly in an era when fiscal constraints require difficult choices between spending resources on security or other important national priorities. We present a series of distinct analyses focused on tools and approaches we believed were missing and therefore hurting efforts to develop efficient security strategies, implement tactics, and get the best outcomes for the resources spent to ensure aviation security
    Note: "MG-1220-RC."--Page 4 of cover , "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780833076311 , 083307637X , 0833076310 , 9780833076373
    Language: English
    Pages: 1 Online-Ressource (xxvi, 180 pages)
    Series Statement: Rand Corporation monograph series MG-1180-TSF
    Parallel Title: Print version Reardon, Robert J Containing Iran
    Keywords: Nuclear weapons Government policy ; Nuclear nonproliferation Government policy ; Nuclear weapons ; Nuclear nonproliferation ; Nuclear weapons ; Nuclear nonproliferation ; Nuclear weapons ; Nuclear nonproliferation ; POLITICAL SCIENCE ; Security (National & International) ; Diplomatic relations ; Nuclear nonproliferation ; Nuclear nonproliferation ; Government policy ; Nuclear weapons ; Nuclear weapons ; Government policy ; Military & Naval Science ; Law, Politics & Government ; Military Science - General ; United States ; POLITICAL SCIENCE ; Government ; International ; Iran ; POLITICAL SCIENCE ; International Relations ; General ; United States Foreign relations ; Iran Foreign relations ; United States ; Iran ; Electronic books
    Abstract: "Iran's nuclear program is one of the most pressing foreign policy issues for the United States. An Iranian nuclear arsenal could further destabilize an already unsettled region and put important U.S. interests at risk. The United States has a strong interest in preventing such an outcome. There is no evidence that Iran has decided to acquire nuclear weapons. However, Iran does seem intent on acquiring the means to do so quickly. It is an open question whether the United States and its allies would be able to prevent Iran from crossing the nuclear threshold, if it so chose, at an acceptable cost. After almost a decade of concerted effort involving economic, diplomatic, and military sources of leverage, there has been little progress toward reversing or substantially slowing Iran's nuclear progress. Despite years of U.S. diplomatic efforts to stall that progress, the Iranians have succeeded in building an extensive enrichment program and likely possess the technical capacity to produce at least one nuclear weapon should they choose to do so. Coercion is unlikely to convince Iran to change course. This study assesses current U.S. policy options on the Iranian nuclear question. It suggests that U.S. goals can be met through patient and forward-looking policymaking. Specifically, the United States can begin to lay the groundwork for an effective containment policy while continuing efforts to forestall Iranian weaponization. A successful containment policy will promote long-term positive political change in Iran while avoiding counterproductive provocation."--Publisher's website
    Abstract: "Iran's nuclear program is one of the most pressing foreign policy issues for the United States. An Iranian nuclear arsenal could further destabilize an already unsettled region and put important U.S. interests at risk. The United States has a strong interest in preventing such an outcome. There is no evidence that Iran has decided to acquire nuclear weapons. However, Iran does seem intent on acquiring the means to do so quickly. It is an open question whether the United States and its allies would be able to prevent Iran from crossing the nuclear threshold, if it so chose, at an acceptable cost. After almost a decade of concerted effort involving economic, diplomatic, and military sources of leverage, there has been little progress toward reversing or substantially slowing Iran's nuclear progress. Despite years of U.S. diplomatic efforts to stall that progress, the Iranians have succeeded in building an extensive enrichment program and likely possess the technical capacity to produce at least one nuclear weapon should they choose to do so. Coercion is unlikely to convince Iran to change course. This study assesses current U.S. policy options on the Iranian nuclear question. It suggests that U.S. goals can be met through patient and forward-looking policymaking. Specifically, the United States can begin to lay the groundwork for an effective containment policy while continuing efforts to forestall Iranian weaponization. A successful containment policy will promote long-term positive political change in Iran while avoiding counterproductive provocation."--Publisher's website
    Note: "Supported by the Stanton Foundation , Includes bibliographical references (pages 163-180)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780833076670 , 0833083600 , 0833076671 , 9780833083609
    Language: English
    Pages: 1 Online-Ressource (xxi, 61 pages)
    Series Statement: RAND Corporation technical report series TR-1192-OSD
    Parallel Title: Erscheint auch als Assessment of the ability of U.S. Department of Defense and the services to measure and track language and culture training and capabilities among general purpose forces
    Keywords: United States Personnel management ; Evaluation ; United States ; Cultural competence Government policy ; Evaluation ; Soldiers Education, Non-military ; Language and languages Study and teaching ; Military education Evaluation ; Cultural competence ; Soldiers ; Language and languages ; Military education ; Law, Politics & Government ; Military Science - General ; TECHNOLOGY & ENGINEERING ; Military Science ; Language and languages ; Study and teaching ; United States ; Military education ; Evaluation ; United States ; Personnel management ; Evaluation ; Soldiers ; Education, Non-military ; Military & Naval Science ; United States Armed Forces ; Officials and employees ; Education ; United States Armed Forces ; Personnel management ; Evaluation ; United States ; United States ; Electronic books
    Abstract: "The purpose of this research was to assess the ability of the U.S. Department of Defense (DoD) to measure and track language, regional expertise, and culture (LREC) capabilities and training among general purpose forces (GPF). The research tasks addressed four specific questions: 1. According to the best available data, what is the relevance of LREC training and capabilities to overall unit readiness and mission accomplishment? 2. How does DoD currently track the LREC training and capabilities of GPF? 3. Does this tracking adequately reflect unit readiness and the ability to accomplish missions? 4. If not, how can DoD improve tracking of LREC training and capabilities to adequately reflect unit readiness? To address these questions, the study team reviewed DoD policies and directives and the available academic literature, conducted interviews of practitioners and policymakers, and analyzed available survey data. This report presents the results of the study. This research should be of interest to policymakers interested in LREC skills and training, as well as those interested in readiness requirements."--Preface
    Abstract: "The purpose of this research was to assess the ability of the U.S. Department of Defense (DoD) to measure and track language, regional expertise, and culture (LREC) capabilities and training among general purpose forces (GPF). The research tasks addressed four specific questions: 1. According to the best available data, what is the relevance of LREC training and capabilities to overall unit readiness and mission accomplishment? 2. How does DoD currently track the LREC training and capabilities of GPF? 3. Does this tracking adequately reflect unit readiness and the ability to accomplish missions? 4. If not, how can DoD improve tracking of LREC training and capabilities to adequately reflect unit readiness? To address these questions, the study team reviewed DoD policies and directives and the available academic literature, conducted interviews of practitioners and policymakers, and analyzed available survey data. This report presents the results of the study. This research should be of interest to policymakers interested in LREC skills and training, as well as those interested in readiness requirements."--Preface
    Note: Includes bibliographical references (pages 57-61)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780833076854 , 0833079743 , 083307685X , 9780833079749
    Language: English
    Pages: 1 Online-Ressource (xxii, 146 pages)
    Series Statement: RAND Corporation monograph series MG1241
    Parallel Title: Print version Modeling terrorism risk to the air transportation system
    Keywords: United States Rules and practice ; Evaluation ; United States ; Terrorism Prevention ; Aeronautics Safety measures ; Evaluation ; Aeronautics, Commercial Security measures ; Evaluation ; Risk management Mathematical models ; Terrorism ; Aeronautics ; Aeronautics, Commercial ; Risk management ; Social Welfare & Social Work ; Social Sciences ; Criminology, Penology & Juvenile Delinquency ; United States ; POLITICAL SCIENCE ; Political Freedom ; Risk management ; Mathematical models ; Terrorism ; Prevention ; United States ; Electronic book
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Abstract: RAND evaluated a terrorism risk modeling tool developed by the Transportation Security Administration and Boeing to help guide program planning for aviation security. This tool, the Risk Management Analysis Tool, or RMAT, is used by TSA to estimate the terrorism risk-reduction benefits attributable to new and existing security programs, technologies, and procedures. RMAT simulates terrorist behavior and success in attacking vulnerabilities in the domestic commercial air transportation system, drawing on estimates of terrorist resources, capabilities, preferences, decision processes, intelligence collection, and operational planning. It describes how the layers of security protecting the air transportation system are likely to perform when confronted by more than 60 types of attacks, drawing on detailed blast and other physical modeling to understand the damage produced by different weapons and attacks, and calculating expected loss of life and the direct and indirect economic consequences of that damage. This report describes RAND's conclusions about the validity of RMAT for TSA's intended uses and its recommendations for how TSA should perform cost-benefit analyses of its security programs
    Note: At head of title: RAND Homeland Security and Defense Center , Includes bibliographical references (pages 135-146)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    [Santa Monica, Calif.] : Rand Corp
    ISBN: 9780833077363 , 0833077368 , 9780833077028 , 083307735X , 0833077023 , 9780833077356
    Language: English
    Pages: 1 Online-Ressource (11, [1] pages)
    Series Statement: Occasional paper OP-390-RC (2012)
    Parallel Title: Print version Jenkins, Brian Michael Aviation security
    DDC: 363.28760973
    Keywords: Aeronautics Safety measures ; Terrorism Prevention ; Aeronautics, Commercial Security measures ; Airline passenger security screening ; Airports Security measures ; Aeronautics ; Terrorism ; Aeronautics, Commercial ; Airline passenger security screening ; Airports ; TRANSPORTATION ; Aviation ; General ; BUSINESS & ECONOMICS ; Industries ; Transportation ; Aeronautics, Commercial ; Security measures ; Aeronautics ; Safety measures ; Airline passenger security screening ; Airports ; Security measures ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; Electronic books
    Abstract: "Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfort that we are pretty close to getting it right."--"Overview", p. [1]
    Abstract: "Aviation security is costly, controversial, and contentious; no other security measures directly affect such a large portion of the country's population. Because of the nature of the threat, aviation security is the most intrusive form of security, pushing hard on the frontier of civil liberties. And the threat is real: Terrorists remain obsessed with attacking airplanes. At the same time, passenger loads are increasing, while security budgets are likely to decline. Performance suffers. Meanwhile, public tolerance and cooperation are beginning to fray. But the Transportation Security Administration is often blamed for things beyond its control. And post-catastrophe reviews can push us in the wrong direction, usually resulting in new security measures rather than a reexamination of strategy. After 40 years of focus on tactical measures, it is time for a sweeping review of aviation security. Instead of forming the usual federal commission to undertake this task, several non-government research institutions could be selected to independently design an optimal aviation security system, beginning not with the four decades of accumulated security measures currently in place but with a clean slate. The competing models would be reviewed and the best ideas or combination of ideas would be put forward. Even if the results turn out to resemble what is already in place, at least the process offers some comfort that we are pretty close to getting it right."--"Overview", p. [1]
    Note: "RAND Homeland Security and Defense Center , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9780833058119 , 0833058118 , 9780833052483 , 0833058134 , 0833052489 , 9780833058133
    Language: English
    Pages: 1 Online-Ressource (19 pages)
    Series Statement: Occasional paper OP-337-OSD
    Parallel Title: Print version Counterinsurgency Scorecard
    Keywords: Counterinsurgency ; Counterinsurgency ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; COMPUTERS ; Data Modeling & Design ; Counterinsurgency ; Military & Naval Science ; Law - U.S ; Law, Politics & Government ; Law - U.S. - General ; Military Science - General ; Afghanistan ; Case studies ; Electronic books
    Abstract: The previously published RAND monograph, Victory Has a Thousand Fathers: Sources of Success in Counterinsurgency, used detailed case studies of the 30 insurgencies worldwide begun and completed between 1978 and 2008 to analyze correlates of success in counterinsurgency (COIN). A core finding was that a case's score on a scorecard of 15 equally weighted good and 12 equally weighted bad COIN factors and practices perfectly predicted the outcome of those 30 insurgencies. That is, the balance of good and bad factors and practices correlated with either a COIN win (insurgency loss) or a COIN loss (insurgency win) in the overall case. Using the scorecard approach as its foundation, a RAND project sought to extend the findings to the case of Afghanistan in early 2011. The effort involved an expert elicitation, or Delphi, exercise in which experts were asked to make "worst-case" assessments of the factors to complete the scorecard for ongoing operations in Afghanistan. The consensus results revealed that early 2011 Afghanistan scores in the middle of the historical record in terms of COIN wins and losses: its score was lower than that in the lowest-scoring historical COIN win but higher than that in the highest-scoring COIN loss. This suggests an uncertain outcome in Afghanistan, but the findings may help provide additional guidance as operations continue
    Note: Includes bibliographical references (page 19)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780833059635 , 0833059637
    Language: English
    Pages: 1 Online-Ressource (xiii, 100 pages)
    Series Statement: Technical report TR-923-ANT
    Parallel Title: Erscheint auch als Clutterbuck, Lindsay Exploring Patterns of Behaviour in Violent Jihadist Terrorists : An analysis of six significant terrorist conspiracies in the UK
    Keywords: Jihad ; Terrorists Social networks ; Terrorists Conduct of life ; Terrorists Case studies ; Jihad ; Terrorists ; Terrorists ; Terrorists ; Terrorism ; Terrorism Religious aspects ; Islam ; SOCIAL SCIENCE ; Reference ; POLITICAL SCIENCE ; Terrorism ; Jihad ; Terrorists ; SOCIAL SCIENCE ; Essays ; Case studies ; Terrorism ; Terrorism ; Religious aspects ; Islam ; Great Britain ; Electronic books
    Abstract: The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation
    Abstract: The aim of this research was to see whether the groups/cells and their 38 core individuals who had taken part in the six most serious terrorist conspiracies and attacks in the UK between 2004 and 2007, all of which were driven by the ideology of violent Jihadism as espoused by Al Qaeda, exhibited any specific types of behaviour. In each case the terrorists successfully launched or unsuccessfully attempted an attack, or were arrested and convicted of conspiring to carry out a terrorist attack. The research provides a detailed examination of the behaviours exhibited by violent Jihadist groups/cells and the individuals within them. The report outlines the history and background before examining the organisation, characteristics and behaviour of the groups/cells involved. It also examines individual behaviours carried out on behalf of the group/cell and individual behaviour more broadly. It demonstrates there are certain distinctive behavioural characteristics displayed with their planning, preparation and implementation of an act of terrorism. The six UK case studies show three categories of behaviours, from "radicalisation" into "transition to violent Jihad" and finally to "terrorist attack planning and preparation
    Note: "Prepared for the Airey Neave Trust , Includes bibliographical references (pages 57-62) , Title from PDF title page (viewed July 18, 2011)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 9780833052995 , 0833053051 , 0833052993 , 9780833053053
    Language: English
    Pages: 1 Online-Ressource (xli, 229 pages)
    Parallel Title: Print version From insurgency to stability
    Keywords: Counterinsurgency ; Peace-building ; Counterinsurgency ; Peace-building ; Political Science ; Counterinsurgency ; Military Science - General ; United States ; Military & Naval Science ; Law, Politics & Government ; HISTORY ; Military ; Strategy ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; Armed Forces ; Stability operations ; Political Theory of the State ; Peace-building ; United States Armed Forces ; Stability operations ; United States ; Electronic books
    Abstract: This monograph is the first of two volumes that examine how countries confronting insurgencies transition from a high level of violence to a more stable situation. It identifies the procedures and capabilities that the U.S. Department of Defense, other agencies of the U.S. government, U.S. allies and partners, and international organizations require in order to support the transition from counterinsurgency to stability and reconstruction operations. During counterinsurgency, the military takes primary responsibility for security and economic operations, but when the insurgency has been reduced to a level where the state is able to perform its basic functions, police and civilian government agencies take the lead in providing security and services to the population. Successful post-counterinsurgency operations can ensure that lasting peace and stability will follow, rather than a relapse into violence
    Abstract: This monograph is the first of two volumes that examine how countries confronting insurgencies transition from a high level of violence to a more stable situation. It identifies the procedures and capabilities that the U.S. Department of Defense, other agencies of the U.S. government, U.S. allies and partners, and international organizations require in order to support the transition from counterinsurgency to stability and reconstruction operations. During counterinsurgency, the military takes primary responsibility for security and economic operations, but when the insurgency has been reduced to a level where the state is able to perform its basic functions, police and civilian government agencies take the lead in providing security and services to the population. Successful post-counterinsurgency operations can ensure that lasting peace and stability will follow, rather than a relapse into violence
    Note: "This research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Title page verso , "RAND National Defense Research Institute , Includes bibliographical references (pages 209-229)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9780833049612 , 0833050788 , 9781282940536 , 1282940538 , 9780833050786 , 0833049615
    Language: English
    Pages: 1 Online-Ressource (xxx, 153 pages)
    Series Statement: Rand Corporation monograph series MG-964-OSD
    Parallel Title: Print version Paul, Christopher, 1971- Victory has a thousand fathers
    Keywords: Insurgency Case studies ; Counterinsurgency Case studies ; Insurgency ; Counterinsurgency ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Insurgency ; Military & Naval Science ; Law, Politics & Government ; Military Science - General ; TECHNOLOGY & ENGINEERING ; Military Science ; Case studies ; Electronic books
    Abstract: Insurgency has been the most prevalent form of armed conflict since at least 1949, as well as the subject of countless historical and contemporary studies. Contemporary discourse on the subject is voluminous and often contentious, but to date there has been a dearth of systematic evidence supporting the counterinsurgency (COIN) approaches, practices, and tenets that make for successful operations. Relying on a collection of the 30 most recent resolved insurgencies, along with a bank of factors that helped or hindered the COIN force in each case and in each phase of each case, several commonalities emerge. For instance, the data show that good COIN practices tend to "run in packs" and that the balance of selected good and bad practices perfectly predicts the outcome of a conflict. The importance of popular support is confirmed, but the ability to interdict tangible support (such as new personnel, materiel, and financing) is the single best predictor of COIN force success. Twenty distinct approaches to COIN are rigorously tested against the historical record, providing valuable lessons for U.S. engagement in and support for COIN operations
    Abstract: Insurgency has been the most prevalent form of armed conflict since at least 1949, as well as the subject of countless historical and contemporary studies. Contemporary discourse on the subject is voluminous and often contentious, but to date there has been a dearth of systematic evidence supporting the counterinsurgency (COIN) approaches, practices, and tenets that make for successful operations. Relying on a collection of the 30 most recent resolved insurgencies, along with a bank of factors that helped or hindered the COIN force in each case and in each phase of each case, several commonalities emerge. For instance, the data show that good COIN practices tend to "run in packs" and that the balance of selected good and bad practices perfectly predicts the outcome of a conflict. The importance of popular support is confirmed, but the ability to interdict tangible support (such as new personnel, materiel, and financing) is the single best predictor of COIN force success. Twenty distinct approaches to COIN are rigorously tested against the historical record, providing valuable lessons for U.S. engagement in and support for COIN operations
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    ISBN: 9780833051035 , 0833051121 , 0833051032 , 9780833051127
    Language: English
    Pages: 1 Online-Ressource (xli, 133 pages)
    Series Statement: Rand Corporation monograph series MG-1031-NIJ
    Parallel Title: Print version Long-term effects of law enforcement's post-9/11 focus on counterterrorism and homeland security
    Keywords: Civil defense ; National security ; Law enforcement ; Terrorism Prevention ; Police training Costs ; Civil defense ; National security ; Law enforcement ; Terrorism ; Police training ; Civil defense ; Law enforcement ; National security ; Terrorism ; Prevention ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Law Enforcement ; Electronic books
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Abstract: Since the 9/11 terrorist attacks, the need for increased counterterrorism (CT) and homeland security (HS) efforts at the federal, state, and local levels has taken the spotlight in public safety efforts. In the immediate aftermath of 9/11, many law enforcement agencies (LEAs) shifted more resources toward developing CT and HS capabilities, and the federal government continues to support these efforts with grants provided through the Department of Homeland Security. This monograph examines the long-term adjustments that large urban LEAs have made to accommodate the focus on CT and HS, as well as the advantages and challenges associated with it. The study relies primarily on in-depth case studies of five large urban LEAs, as well as a review of federal HS grant programs and a quantitative analysis of the potential costs associated with shifting law enforcement personnel from traditional policing to focus on HS and CT functions. Major trends among the five case study LEAs include the creation of specialized departments and units, as well as an increased emphasis on information-sharing, which, nationwide, has led to the creation of fusion centers that serve as formal hubs for regional information-sharing networks. LEAs' HS and CT efforts are also greatly influenced by the restrictions and requirements associated with federal HS grant funding. Finally, using cost-of-crime estimates, it is possible to partially quantify the costs associated with LEAs' shifting of personnel away from traditional crime prevention toward CT and HS -- there are also clear benefits associated with law enforcement's focus on CT and HS, but they are difficult to quantify, and this is posing a challenge for LEAs as the economic downturn puts pressure on public budgets
    Note: Includes bibliographical references (pages 121-133)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049766 , 0833049860 , 0833049763 , 9780833049865
    Language: English
    Pages: 1 Online-Ressource (xxi, 185 pages)
    Series Statement: Rand Corporation monograph series MG-982-RC
    Parallel Title: Print version Jones, Seth G., 1972- Counterinsurgency in Pakistan
    Keywords: Counterinsurgency ; Terrorism Prevention ; Counterinsurgency ; Terrorism ; Politics and government ; Terrorism ; Prevention ; counterinsurgency ; Pakistan ; HISTORY ; POLITICAL SCIENCE ; Terrorism ; Pakistan ; Counterinsurgency ; Pakistan Politics and government 1988- ; Pakistan ; Electronic books
    Abstract: This document examines the evolution of militancy in Pakistan, assesses Pakistan's efforts to counter militants, and offers a range of policy recommendations. It is based on detailed research in Pakistan and an examination of the quantitative and qualitative literatures on counterinsurgency and counterterrorism
    Abstract: This document examines the evolution of militancy in Pakistan, assesses Pakistan's efforts to counter militants, and offers a range of policy recommendations. It is based on detailed research in Pakistan and an examination of the quantitative and qualitative literatures on counterinsurgency and counterterrorism
    Note: Includes bibliographical references (pages 145-167) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...