Fighting

Featured

RAND researchers examine military and national security issues across a broad spectrum — from political dissent and military training to tactical operations and reconstruction efforts — and take a long-term, global perspective. Terrorism, types of warfare, and international intervention are among the many topics RAND explores.

  • Chinese People's Liberation Army Navy recruits chant slogan during a parade

    Report

    Sustaining U.S. Leadership in the Asia-Pacific Region

    Feb 23, 2015

    While the U.S. has been occupied with recent military operations, other potential adversaries have been advancing their own military capabilities. A debate over the appropriate set of responses — strategic, operational, and technical — has begun.

  • drone-myth1

    Commentary

    Armed Drone Myth 1: They Will Transform How War Is Waged Globally

    Feb 17, 2015

    Long-range military drones are fundamentally misunderstood. Their champions wrongly contend they are revolutionizing warfare, while critics fear their spread would greatly increase the threat that China, terrorists, and others pose.

Explore Warfare and Military Operations

  • Armored vehicles of Iraqi security forces with militias known as Hashid Shaabi passing smoke arising from a clash with Islamic State militants in the town of al-Alam, March 10, 2015

    Commentary

    Means Matter: Competent Ground Forces and the Fight Against ISIL

    If Iraqi security forces are incapable of defeating ISIL in the cities where they have gone to ground, then the only reliable means available are U.S. ground combat forces. The U.S. Army and Marine Corps have all the skills in joint combined arms warfare that the ISF lacks.

    Mar 19, 2015

  • PLA soldiers march ahead of the opening session of the Chinese People's Political Consultative Conference at Tiananmen Sqaure in Beijing, March 3, 2015

    Commentary

    China's Incomplete Military Transformation

    Although the People's Liberation Army has made impressive progress over the past 20 years, it still suffers from a number of potentially serious problems. Understanding its weaknesses — particularly what PLA officers themselves see as the most important shortcomings — is just as critical as studying its strengths.

    Mar 18, 2015

  • Testimony

    Containing Middle East Terror: Measures to Reduce the Threat Posed By Foreign Fighters Returning from Syria and Iraq

    Testimony presented before the House Homeland Security Committee, Subcommittee on Border and Maritime Security on March 17, 2015.

    Mar 17, 2015

  • Eye and technology display

    Report

    Training Cyber Warriors: Lessons from Defense Language Training

    To ensure the U.S. Department of Defense has sufficient numbers of skilled cyber workers, it may need to develop additional training approaches as it plans for broader recruiting and workforce management. Examining how DoD handles foreign language training yields lessons that could be applied to cyber training.

    Mar 16, 2015

  • A soldier stands outside La Terrasse restaurant where militants killed five people in a gun attack in Bamako, Mali, March 7, 2015

    Commentary

    Help Malians Fight Back

    The March 7 terrorist attack that killed five people in a nightclub in Bamako, Mali, underscores the importance of international support for the West African country, which has become another front in the struggle against Islamist radicalism.

    Mar 13, 2015

  • Militant Islamist fighters ride horses in a military parade along the streets of Syria's northern Raqqa province, June 30, 2014

    Testimony

    The Threat Posed by Foreign Fighters Returning from Syria and Iraq

    An estimated 3,400 foreign fighters have come from Europe and other Western countries to join jihadist fronts in Syria and Iraq. What is the threat posed by these Western fighters? And how can the U.S. better identify and intercept returning foreign fighters from countries covered by the Visa Waiver Program?

    Mar 12, 2015

  • A man accesses data from a computer

    Testimony

    Sharing Information About Threats Is Not a Cybersecurity Panacea

    Information-sharing—specifically, threat-centric information-sharing—has dominated recent discussions on improving cybersecurity, but it is not a silver bullet. Its usefulness is tied to certain assumptions about attacks, and while it should be encouraged, it addresses only one facet of a very complex space.

    Mar 4, 2015

  • French special intervention police conduct a house-to-house search in Longpont, northeast of Paris, January 8, 2015

    Commentary

    Different Countries, Different Ways of Countering Terrorism

    France and the United States follow different approaches in dealing with terrorist suspects. This divergence reflects differences in the threat, historical experience, law, available resources, and public attitudes. France faces a more serious terrorist threat than the U.S. does.

    Mar 2, 2015

  • The new issue of satirical French weekly Charlie Hebdo titled 'C'est Reparti' ('Here we go again') in Nice, February 25, 2015

    Commentary

    Predicting the 'Dangerousness' of Potential Terrorists

    Predicting 'dangerousness' of potential terrorists is a hit-and-miss endeavor. Unless someone is waving a gun, it is extremely difficult. Even with direct access to the subject, parole boards, suicide prevention units, and even trained clinicians get it wrong.

    Mar 2, 2015

  • A Paris crowd displaying the portraits of five of the people killed during the attack at Charlie Hebdo on January 7, 2015

    Commentary

    Attempting to Understand the Paris Attacks

    The investigation will eventually fill in some of the gaps in our knowledge of the events leading up to the attacks in Paris, but some questions will remain unanswered. Embedded in the unknowns are some of the chronic dilemmas faced by counterterrorist authorities everywhere.

    Feb 26, 2015

  • French, British, and EU flags

    Report

    Crisis and conflict prevention strategies: An international comparison

    This report is a translated excerpt from a 2012 report, focusing on conflict prevention approaches in four national cases: France, the United Kingdom, the United States and Germany.

    Feb 25, 2015

  • Chinese People's Liberation Army Navy recruits chant slogan during a parade

    Report

    Sustaining U.S. Leadership in the Asia-Pacific Region

    While the U.S. has been occupied with recent military operations, other potential adversaries have been advancing their own military capabilities. A debate over the appropriate set of responses — strategic, operational, and technical — has begun.

    Feb 23, 2015

  • U.S. President Barack Obama speaks during the White House Summit on Countering Violent Extremism February 19, 2015

    Commentary

    Tackling Radicalization Before It Begins

    Why not turn the question of violent extremism inside out and develop programs that reinforce non-radicalization? That is, rather than eliminating drivers, focus instead on strengthening the factors that inhibit violent extremism.

    Feb 23, 2015

  • Libyan Police prepare during the start of a security plan to increase security in Tripoli, February 9, 2015

    Commentary

    Somalia on the Mediterranean

    Libya is as vulnerable to further inroads by ISIS now as Syria was a year ago. What can the United States and its allies do to stop the hemorrhaging? Many options have been debated, but none look very promising.

    Feb 19, 2015

  • Journal Article

    Integrating Apples, Oranges, Pianos, Volkswagens, and Skyscrapers: On the Relationships Between Information-Related Capabilities and Other Lines of Operation

    This article describes the various possible relationships between IRCs and the capabilities of other lines of operation.

    Feb 17, 2015

  • An MQ-9 Reaper sits on the flightline at Creech Air Force Base, NV

    Commentary

    Armed Drone Myth 1: They Will Transform How War Is Waged Globally

    Long-range military drones are fundamentally misunderstood. Their champions wrongly contend they are revolutionizing warfare, while critics fear their spread would greatly increase the threat that China, terrorists, and others pose.

    Feb 17, 2015

  • News Release

    China's Military Modernization Efforts Fall Short; Significant Weaknesses Remain

    Although the drive by the People's Republic of China to modernize its military has been underway for more than two decades, significant weaknesses remain in two broad categories: institutional and combat capabilities.

    Feb 16, 2015

  • Journal Article

    Foundations for Assessment: The Hierarchy of Evaluation and the Importance of Articulating a Theory of Change

    There is currently a great deal of attention to assessment in a range of defense communities. Two foundational elements for planning and conducting assessments can benefit these communities: explicit theories of change and a hierarchy for evaluation.

    Feb 16, 2015

  • Chinese airborne troops parachute in an amphibious landing drill during the Sino-Russian 'Peace Mission 2005' joint military exercise, held in China's Shandong Peninsula in 2005

    Report

    China's Incomplete Military Transformation

    The People's Liberation Army (PLA) is keenly aware of its many weaknesses and is vigorously striving to correct them. Although it is only natural to focus on the PLA's growing capabilities, understanding its weaknesses — and its self-assessments — is no less important.

    Feb 13, 2015

  • Binary code with 'password' in red

    Commentary

    Cyberattacks Are a Nuisance, Not Terrorism

    The United States needs to consider both the risk of further attacks like the Sony breach and also further ill-considered reactions that may arise if the problem of insecurity in cyberspace is shoved into the counterterrorism paradigm.

    Feb 9, 2015