Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (5)
  • Rand Corporation National Security Research Division  (5)
  • TECHNOLOGY & ENGINEERING ; Military Science  (5)
  • 1
    ISBN: 9780833085313 , 0833089978 , 083308531X , 9780833089977
    Language: English
    Pages: 1 Online-Ressource (xxii, 94 pages)
    Parallel Title: Erscheint auch als Rostker, Bernard Building toward an unmanned aircraft system training strategy
    Keywords: Drone aircraft ; Drone aircraft pilots Training of ; Drone aircraft ; Drone aircraft pilots ; Air Forces ; TECHNOLOGY & ENGINEERING ; Military Science ; Drone aircraft ; Military & Naval Science ; Law, Politics & Government ; United States ; Electronic book
    Note: "RAND National Defense Research Institute , "The research was conducted within the Forces and Resources Policy Center of the RAND National Research Institute (NDRI)"--Preface , Includes bibliographical references (pages 91-94) , Online version: Building toward an unmanned aircraft system training strategy
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9780833084941 , 0833085700 , 0833084941 , 9780833085702
    Language: English
    Pages: 1 Online-Ressource (xviii, 84 pages)
    Parallel Title: Print version Gonzales, Daniel Improving interagency information sharing using technology demonstrations
    Keywords: United States ; United States ; Civil-military relations ; Drug control Technological innovations ; Drug traffic Prevention ; Border security ; Interagency coordination ; Information networks Management ; Military law ; Civil-military relations ; Drug control ; Drug traffic ; Border security ; Interagency coordination ; Information networks ; Military law ; Information networks ; Management ; Interagency coordination ; Military law ; Law - U.S ; Law, Politics & Government ; Military Law - U.S ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; Border security ; Civil-military relations ; United States ; Drug control ; Technological innovations ; Electronic books
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
    Abstract: The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
    Note: "RR551-OSD"--Page 4 of cover , "RAND National Security Research Division , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 81-84)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corporation
    ISBN: 9780833080707 , 0833080709
    Language: English
    Pages: 1 Online-Ressource (ix, 40 pages)
    Series Statement: Research reports
    Keywords: Nuclear weapons Forecasting ; Nuclear weapons Government policy ; Forecasting ; Nuclear weapons ; Nuclear weapons ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Middle East ; General ; Nuclear weapons ; Forecasting ; Politics and government ; Forecasting ; Iran ; Iran Politics and government ; Forecasting ; Iran Foreign relations ; Forecasting ; Iran ; Iran ; Electronic books
    Abstract: This report explores how a nuclear-armed Iran would behave, if it would act aggressively, and what this would entail for the United States and its main regional allies, including the Gulf Cooperation Council (GCC) and Israel. The Islamic Republic seeks to undermine what it perceives to be the American-dominated order in the Middle East and to deter a U.S. and/or Israeli military attack, but it does not have territorial ambitions and does not seek to invade, conquer, or occupy other nations. Nuclear arms are unlikely to change its fundamental interests and strategies. Rather, they would probably reinforce Iran's traditional national security objectives. The ideological beliefs of the Iranian political elite will not shape the country's nuclear decisionmaking. The regional geopolitical environment and Iran's political, military, and economic capabilities will have a greater bearing on Iranian calculations. It is very unlikely that Iran would use nuclear weapons against another Muslim state or against Israel, given the latter's overwhelming conventional and nuclear military superiority. Further, the Iranian government does not use terrorism for ideological reasons. Instead, Iran's support for terrorism is motivated by cost and benefit calculations, with the aims of maintaining deterrence and preserving or expanding its influence in the Middle East. An inadvertent or accidental nuclear exchange between Israel and Iran is a dangerous possibility, but there is not much evidence to suggest that rogue elements could have easy access to Iranian nuclear weapons
    Abstract: This report explores how a nuclear-armed Iran would behave, if it would act aggressively, and what this would entail for the United States and its main regional allies, including the Gulf Cooperation Council (GCC) and Israel. The Islamic Republic seeks to undermine what it perceives to be the American-dominated order in the Middle East and to deter a U.S. and/or Israeli military attack, but it does not have territorial ambitions and does not seek to invade, conquer, or occupy other nations. Nuclear arms are unlikely to change its fundamental interests and strategies. Rather, they would probably reinforce Iran's traditional national security objectives. The ideological beliefs of the Iranian political elite will not shape the country's nuclear decisionmaking. The regional geopolitical environment and Iran's political, military, and economic capabilities will have a greater bearing on Iranian calculations. It is very unlikely that Iran would use nuclear weapons against another Muslim state or against Israel, given the latter's overwhelming conventional and nuclear military superiority. Further, the Iranian government does not use terrorism for ideological reasons. Instead, Iran's support for terrorism is motivated by cost and benefit calculations, with the aims of maintaining deterrence and preserving or expanding its influence in the Middle East. An inadvertent or accidental nuclear exchange between Israel and Iran is a dangerous possibility, but there is not much evidence to suggest that rogue elements could have easy access to Iranian nuclear weapons
    Note: "National Security Research Division , Includes bibliographical references (pages 35-40)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9780833080608 , 0833084801 , 0833080601 , 9780833084804
    Language: English
    Pages: 1 Online-Ressource (44 pages)
    Keywords: United States Appropriations and expenditures ; United States Procurement ; Costs ; Evaluation ; Methodology ; United States ; United States ; Weapons systems Costs ; Forecasting ; Systems integration Risk assessment ; Methodology ; Weapons systems ; Systems integration ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; United States ; Expenditures, Public ; United States Armed Forces ; Weapons systems ; Costs ; Evaluation ; Methodology ; United States ; Electronic books
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Abstract: Implementing risk management principles to manage large defense acquisition programs is a priority for the U.S. defense acquisition community. To assist those decisionmakers responsible for identifying the risk associated with major weapons programs, RAND researchers developed a methodology and accompanying Excel, information-based risk tool (the ⁰́Assessor Tool⁰́₊). The Assessor Tool offers an Office of the Secretary of Defense (OSD)-level approach to the evaluation and measurement of system integration risk. That is, it is meant for assessors, such as OSD personnel, who may not be especially familiar with the specific program under evaluation but still may need to make judgments about the program⁰́₉s risk. It is based on a tractable and comprehensive set of questions that can help evaluate integration risk at each point in the acquisition process. More specifically, the tool enables users to see how well integration risk is being managed by providing a standards-based valuation of integration issues that can lead to cost growth, schedule growth, and program performance. The users⁰́₉ manual for the Assessor Tool is available in a companion document, An Excel Tool to Assess Acquisition Program Risk (by Lauren A. Fleishman-Mayer, Mark V. Arena, and Michael E. McMahon, TL-113-OSD, 2013). The Assessor Tool and its methodology may also be generalizable to an entire set of information-based risk assessment applications. Overall, the methodology and tool have many strengths, including being based on well-grounded theories, allowing for reproducibility and traceability, and the extensive flexibility to be used to evaluate risk for many different types of programs. To provide a benchmarking and validation of the risk scores calculated by the tool, future work could include the tool⁰́₉s validation by tracking its output against a program⁰́₉s performance
    Note: "This research was conducted within the Acquisition and Technology Policy Center of the RAND National Defense Research Institute"--Preface , "RAND National Security Research Division , Includes bibliographical references (pages 25-26) , Title from title screen (viewed on October 24, 2013)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9780833084590 , 0833084593
    Language: English
    Pages: 1 Online-Ressource (28 pages)
    Keywords: United States Appropriations and expenditures ; United States Procurement ; Costs ; Evaluation ; United States ; United States ; Weapons systems Costs ; Forecasting ; Systems integration Risk assessment ; Electronic spreadsheets Computer programs ; Weapons systems ; Systems integration ; Electronic spreadsheets ; Electronic spreadsheets ; Computer programs ; Expenditures, Public ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; United States ; United States Armed Forces ; Weapons systems ; Costs ; Evaluation ; United States ; Electronic books
    Note: "RAND National Security Research Division , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...