Browse Results What Download Format Should I Choose?

Showing 1 through 11 of 11 results

Adjusting to Global Economic Change: The Dangerous Road Ahead

by Robert A. Levine David R. Frelinger James T. Bartis

The author combines macroeconomic history since the Great Depression with a brief exposition of economic theory that stems from and explains that history, and explores how that experience may apply to the present economic crisis. He warns that we may again be headed for stagflation and makes suggestions for escaping the worst effects of the crisis.

Byting Back: Regaining Information Superiority Against 21st-Century Insurgents

by Raymond Smith David C. Gompert David R. Frelinger Martin C. Libicki

U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be made tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today?'s military and intelligence networks-being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters-hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that.

Chinese Responses to U.S. Military Transformation and Implications for the Department of Defense

by Michael S. Chase James C. Mulvenon David C. Gompert David R. Frelinger Murray Scot Tanner

For the past decade, Chinese military strategists have keenly observed the changes in U.S. national strategy and military transformation. This report examines the constraints, facilitators, and potential options for Chinese responses to U.S. transformation efforts and offers possible U.S. counterresponses (particularly in light of whether Taiwan moves toward or away from formal independence).

Emerging Threats and Security Planning

by Charles J. Bushman Brian A. Jackson David R. Frelinger Henry H. Willis

Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. This paper explores an approach for assessing novel or emerging threats and prioritizing which merit specific security attention and which can be addressed as part of existing security efforts.

Evaluating Novel Threats to the Homeland

by Brian A. Jackson Robert W. Button Michael J. Lostumbo David R. Frelinger

Changes in technology and adversary behavior will invariably produce new threats that must be assessed by defense and homeland security planners. An example of such a novel threat is the use of cruise missiles or unmanned aerial vehicles (UAVs) by terrorist groups. Individual threats cannot be assessed in isolation, however, since adversaries always have many options for staging attacks. To examine this threat, RAND utilized a ?red analysis of alternatives? approach, wherein the benefits, costs, and risks of different options are considered from the point of view of a potential adversary. For several types of attacks, the suitability of these systems was compared against other options. This approach can help defense planners understand how the capabilities that different attack modes provide address key adversary operational problems. Given the insights this analysis produced about when these systems would likely be preferred by an attacker, RAND explored defensive options to address the threat. UAVs and cruise missiles represent a ?niche threat? within a larger threat context; therefore, defenses were sought that provide common protection against both this and other asymmetric threats. The monograph concludes with a discussion of cross-cutting lessons about this threat and the assessment of novel threats in general.

An Executive Perspective on Workforce Planning

by Robert M. Emmerichs John Arquilla Donna Fossum Albert A. Robbert Cheryl Y. Marcum David R. Frelinger

Workforce planning is an activity intended to ensure that investment in human capital results in the timely capability to effectively carry out an organization's strategic intent. This report examines how corporate executives can provide guidance from the top of the organization to the business units that actually carry out the organization's activities so that the strategic is successfully realized.

Mapping the Risks

by David R. Frelinger Beth E. Lachman Alexander C. Hou John C. Baker Kevin M. O'Connell

Following the attacks of September 11, 2001, many agencies within the federal government began restricting some of their publicly available geospatial data and information from such sources as the World Wide Web. As time passes, however, decisionmakers have begun to ask whether and how such information specifically helps potential attackers, including terrorists, to select U.S. homeland sites and prepare for better attacks. The research detailed in this book aims to assist decisionmakers tasked with the responsibility of choosing which geospatial information to make available and which to restrict.

Overseas Basing of U.S. Military Forces: An Assessment of Relative Costs and Strategic Benefits

by Michael J. Lostumbo Michael J. Mcnerney Eric Peltz Derek Eaton David R. Frelinger Victoria A. Greenfield John Halliday Patrick Mills Bruce R. Nardulli Stacie L. Pettyjohn Jerry M. Sollinger Stephen M. Worman

This independent assessment is a comprehensive study of the strategic benefits, risks, and costs of U. S. military presence overseas. The report provides policymakers a way to evaluate the range of strategic benefits and costs that follow from revising the U. S. overseas military presence by characterizing how this presence contributes to assurance, deterrence, responsiveness, and security cooperation goals.

Stealing the Sword: Limiting Terrorist Use of Advanced Conventional Weapons

by James Bonomo David R. Frelinger Giacomo Bergamo Brian A. Jackson

Examines how terrorists make technology choices and how the United States can discourage terrorists' use of advanced conventional weapons. Concludes that the United States should urgently start discussions with key producer nations and also decide on an architecture needed to impose technical controls on new mortar systems that should enter development soon.

Thinking About America's Defense

by Glenn A. Kent David R. Frelinger

Lieutenant General Glenn A. Kent was a uniquely acute analyst and developerof American defense policy in the second half of the twentieth century. His33-year career in the Air Force was followed by more than 20 years as one ofthe leading analysts at RAND. This volume is not a memoir in the normalsense but rather a summary of the dozens of national security issues inwhich Glenn was personally engaged over the course of his career. Theseissues included creating the single integrated operational plan (SIOP),leading DoD's official assessment of strategic defenses in the 1960s,developing and analyzing strategic nuclear arms control agreements, helpingto bring new weapon systems to life, and many others. Each vignettedescribes the analytical frameworks and, where appropriate, the mathematicalformulas and charts that Glenn developed and applied to gain insights intothe issue at hand. The author also relates his roles in much of thebureaucratic pulling and hauling that occurred as issues were addressedwithin the government.

Underkill: Scalable Capabilities for Military Operations amid Populations

by John Gordon David C. Gompert David R. Frelinger Stuart E. Johnson Martin C. Libicki

The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly force against them can harm and alienate the very people whose cooperation U.S. forces are trying to earn. To solve this problem, a new RAND study proposes a "continuum of force"--a suite of capabilities that includes sound, light, lasers, cell phones, and video cameras. These technologies are available but have received insufficient attention.

Showing 1 through 11 of 11 results

Help

Select your download format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. For more details, visit the Formats page under the Getting Started tab.

See and hear words read aloud
  • DAISY Text - See words on the screen and hear words being read aloud with the text-to-speech voice installed on your reading tool. Navigate by page, chapter, section, and more. Can also be used in audio-only mode. Compatible with many reading tools, including Bookshare’s free reading tools.
  • DAISY Text with Images - Similar to DAISY Text with the addition of images within the Text. Your reading tool must support images.
  • Read Now with Bookshare Web Reader - Read and see images directly from your Internet browser without downloading! Text-to-speech voicing and word highlighting are available on Google Chrome (extension installation required). Other browsers can be used with limited features. Learn more
Listen to books with audio only
  • DAISY Audio - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate by page, chapter, section, and more. Must be used with a DAISY Audio compatible reading tool.
  • MP3 - Listen to books in audio-only mode with the high-quality Kendra voice by Ivona pre-installed. Navigate using tracks. Can be used with any MP3 player.
Read in Braille
  • BRF (Braille Ready Format) - Read with any BRF compatible refreshable braille display; navigate using the search or find feature.
  • DAISY Text - Read with any DAISY 3.0 compatible refreshable braille display, navigate by page, chapter, section, and more.
  • Embossed Braille - Use Bookshare’s DAISY Text or BRF formats to generate embossed braille.