Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This report details the entities involved in North Korea's sanctions evasion activities and sanctions evasion techniques in the areas of hard-currency generation, restricted and dual-use technology acquisition, covert transport, and covert finance.
The authors examine issues relating to the identification of requirements for Intelligence Mission Data and intelligence production for the Acquisition Intelligence Requirements Task Force.
Mosaic Warfare envisions more fractionated, heterogeneous forces, dynamically composed on tactical timelines. In this report, the authors present insights from a policy game to assess alternative governance models for acquiring a Mosaic force.
The authors of this report consider the exposure of Department of the Air Force (DAF) installations to flooding, high winds, and wildfires?hazards that have affected DAF installations in the recent past.
Readiness is integral to national security, and key to its management is its measurement. The authors show how artificial intelligence can improve the detail and accuracy of the U.S. military's readiness reports.
This report describes the most common types of behaviors that occur during active-component soldiers' most serious sexual harassment and gender discrimination experiences, characteristics of (alleged) perpetrators, and times and places in which these occur.
What is Russia's declared grand strategy? How do its actions and resource decisions match its declarations? The authors of this report offer answers to these questions and suggest implications for U.S. policymakers.
This report assesses whether and how the U.S. military might utilize unpredictability in force employment, posture, and operations to deter adversaries and identifies the possible risks and costs of such approaches.
The increasing frequency and intensity of information aggression targeting the United States and its European allies demands more thorough consideration of concepts and practices for protecting against, resisting, and mitigating the effects of psychological manipulation and influence. Russia in particular appears to use messaging and intimidation as part of its efforts to influence multiple actors and countries, including the United States and its European allies. Unfortunately, concepts and practices for understanding and resisting the potential effects of efforts conducted by Russia and its agents are few. To address this, United States European Command (USEUCOM) asked the RAND Corporation to identify strategies for defending against the effects of Russia's efforts to manipulate and inappropriately influence troops, government decisionmaking, and civilians. The authors describe apparent efforts conducted by Russia and its agents involving the use of information to shape Russia's operating environment, focusing on the European context; review and apply existing research on influence and manipulation to these efforts; and draw from existing practice to describe possible defensive approaches for USEUCOM and its various partners to consider using when defending against these actions. The framework the authors apply offers a way to conceptualize the objectives, tactics, and tools of Russian information efforts in Europe.
The authors describe an unconstrained ?clean sheet? approach to space acquisition for the U.S. Space Force designed around the unique mission and calling of the new service.
The authors develop methods for assessing the impact of deploying artificial intelligence (AI) systems to support intelligence missions.
The formal decisions, documents, and events that established the roles, missions, and functions (RMF) of the U.S. Department of Defense (DoD) and the military services in the early postwar years are over 70 years old. Although the foundational documents and agreements have been modified, the original division of labor among the services remains largely unchanged, and a fundamental reassessment of RMF may be in order. At least two services-the U.S. Air Force (USAF) and the U.S. Army-envision themselves as the principal integrator of All-Domain Operations. Additionally, the creation of the U.S. Space Force (USSF) raises RMF issues both within the Department of the Air Force (DAF) and across the services. In this report, the authors identify RMF disputes that have endured as problems for the USAF, some factors associated with major RMF events, and reasons why reform efforts have often failed. The authors have crafted a framework for analyzing the RMF implications of strategic-level guidance, such as the 2018 National Defense Strategy, emerging operational concepts, and the creation of the USSF. The key question for USAF leaders is whether the existing framework is fundamentally sound (requiring only modest adjustments), whether it should be replaced by another agreement that would recast RMF assignments, or whether narrowly defined responsibilities are a hindrance to agility and innovation and should be scrapped entirely. The authors present their findings and recommendations, considering how the vision that USAF leaders choose for the service's future will influence the relative attractiveness of possible courses of action.
In 2016, Congress directed the U.S. Coast Guard to establish the Great Lakes National Center of Expertise for Oil Spill Preparedness and Response. This report makes recommendations for the center, its staffing, potential partnerships, and location.
In September 2019, the U.S. Department of Homeland Security (DHS) released Strategic Framework for Countering Terrorism and Targeted Violence, which calls for better data resources to support DHS efforts to understand and prevent terrorism and targeted violence. This report provides an independent review of DHS needs, existing prominent databases, the alignment of existing databases with DHS data needs, and the quality of prominent databases on terrorism and targeted violence. Results indicate that DHS data needs are broad and complex and that many can be addressed by available unclassified databases. However, several gaps remain. Results also show that the current databases are of sufficient quality for DHS analytic needs but that a gap exists in quality assurance practices in that they are applied inconsistently across the field. Finally, the study shows that many of the available databases were developed to respond to the threat and policy environments in which they were created and that evolving strategic needs and emerging issues could require new definitions, significant updates, and, potentially, new construction of databases to meet DHS needs.
Researchers sought to identify the root causes of underrepresentation for women and members of racial/ethnic minority groups in the U.S. Coast Guard, as well as facilitators of and barriers to increasing diversity, equity, and inclusion.
There are 30 million refugees around the world. Humanitarian agencies aim for one of three durable solutions for them: voluntary repatriation, local integration, and resettlement, with repatriation being the preferred solution. However, the authors find that only one-third of refugees return home after ten years. Returns have not kept pace with new displacement. The status quo is a growing global population of displaced people living in limbo without full citizenship rights, and with their host countries experiencing ever-greater political and economic strains of hosting them. The need to find new solutions to facilitate safe refugee return has become more urgent. The authors aim to address this need by examining barriers to, and facilitators of, the safe and sustained return of refugees. The authors examined evidence from the literature about refugee returns; conducted interviews with global experts; examined cross-national data trends from 53 cases; and conducted case studies of refugee returns in the Western Balkan countries of Bosnia and Herzegovina and Kosovo, as well as the Kurdistan Region-Iraq, involving focus groups with returned refugees. The authors found that, despite the intent of global humanitarian and development communities, most refugees are unable to return or find another durable solution even after decades of displacement. The authors offer recommendations to governments, donors, and international organizations, recommending that the three durable solutions be pursued in combination with, and accompanied by, efforts to develop a greater menu of interim solutions with robust international support to promote the well-being of refugees and their host communities.
This document presents the full ruleset for the Information Warfighter Exercise Wargame, which is used by the Marine Corps to provide training for aspects of operations in the information environment.
In this report, the authors examine labor demand and supply for seven U.S. Department of Defense cyber work roles to help determine whether pay adjustments are necessary to support the recruitment and retention of critical personnel.
The Military Health System needs an agile, resilient, and global network of treatment and storage facilities and transportation assets, as well as knowledge of gaps and risks that could hinder effective medical support for future combat operations.
Media literacy (ML) education has emerged as a promising approach to slow Truth Decay, described as the diminishing role of facts, data, and analysis in political and civil discourse. However, teachers report a lack of guidance about implementing ML education, and rigorous research about what kinds of ML education work best remains limited. To address these gaps, this report presents a framework for implementing and evaluating ML educational efforts.
The Department of the Air Force is revamping the way it manages officer development and promotion. The Air Force Personnel Policy Simulation Tool models the effects of personnel policy changes to identify potentially adverse consequences.
Disinformation campaigns on social media pose a nuanced threat to the United States, but the response remains ad hoc and uncoordinated. This series overview presents ways to better prepare for this new age of information warfare.
The authors identify key Chinese practices and the supporting infrastructure and conditions that successful social media disinformation campaigns require, concluding that China is using Taiwan as a test bed for developing attack vectors.
Professional military education is a complex system that accommodates thousands of Air Force officers yearly. The Air Force needs to rebalance the assignment of students to Air University and to other PME or fellowship programs outside the Air Force.
The authors examine U.S. Air Force efforts to develop a capability to carry out a Joint Task Force Headquarters (JTF HQ) mission. The findings will be relevant to anyone interested in Air Force efforts to stand up a JTF HQ.
To help the Kingdom of Saudi Arabia develop its private sector and generate quality employment for Saudi citizens, the authors of this report assess the potential for Saudi Arabia to develop a specific industry: food manufacturing.
The authors examine U.S. Air Force civilian compensation for hard-to-fill and mission critical occupations, comparing it with other federal agencies and the private sector and providing recommendations for recruiting and retaining civilian talent.
This report evaluates and models proposals for an insurance-based program to provide businesses with resources to maintain payroll and benefits and cover ongoing operating expenses during a pandemic.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.