Intelligence Community

Featured

The intelligence community comprises the many agencies and organizations responsible for intelligence gathering, analysis, and other activities that affect foreign policy and national security. RAND conducts research, develops tools, and provides recommendations to U.S. and allied decisionmakers to support their efforts at gathering and interpreting high-quality information.

  • 130912-M-HF949-004

    Blog

    Do U.S. Raids in Libya, Somalia Signal a Shift in Terror Strategy?

    Oct 10, 2013

    The raids that the United States conducted over the weekend in Libya and Somalia could signal a new focus in Washington on capturing terrorist suspects and gathering intelligence rather than relying on drone strikes. RAND experts Linda Robinson, Angel Rabasa, and Seth Jones comment.

Explore Intelligence Community

  • A hostage runs toward a police officer outside Lindt cafe, where other hostages are being held, in Martin Place, Sydney, December 15, 2014

    Blog

    Could the Sydney Café Siege Happen Elsewhere?

    As the world mourns those lost in the Sydney café siege, investigations have begun examining the efficacy of Australia's anti-terrorism measures and details about the background and motives of the gunman. At the same time, terrorism experts are reflecting on where else such an attack could emerge.

    Dec 17, 2014

  • Senate Intelligence Committee Chairwoman Dianne Feinstein (L) discusses a report on the CIA's anti-terrorism tactics on the floor of the U.S. Senate as Senators Debbie Stabenow (rear) and Patty Murray look on, Washington, December 9, 2014

    Commentary

    Why the Senate Intelligence Committee and the CIA May Both Be Right

    Given that many questions of fact regarding the CIA's program of enhanced interrogation techniques can probably never be conclusively answered, the real issue comes down to a value judgment: whether inflicting physical pain on prisoners is an acceptable means of reducing the risk of terrorist attacks.

    Dec 12, 2014

  • News Release

    China and U.S. Can Reduce the Risk of War by Learning from History's Blunders

    The history of wars caused by misjudgments reveals that leaders relied on cognitive models, or simplified representations of their worlds, that were seriously at odds with objective reality. China and the U.S. could learn from historical strategic blunders regarding war and peace, and four examples of decisions that turned out well.

    Dec 2, 2014

  • World War II soldiers

    Report

    China and U.S. Can Reduce the Risk of War by Learning from History's Blunders

    The history of wars caused by misjudgments reveals that leaders relied on cognitive models, or simplified representations of their worlds, that were seriously at odds with objective reality. China and the U.S. could learn from historical strategic blunders regarding war and peace, and four examples of decisions that turned out well.

    Dec 2, 2014

  • Militant Islamist fighters parade along the streets of Syria's northern Raqqa province

    Commentary

    When Jihadis Come Marching Home

    The existing pool of determined jihadists in America is very small and lacks training and experience, which fighting in Syria and Iraq would provide. Returning jihadi veterans would be more formidable adversaries. Still, the threat appears manageable using current U.S. laws and existing resources.

    Nov 19, 2014

  • A masked man speaking in what is believed to be a North American accent in a video that Islamic State militants released in September

    Report

    When Jihadis Come Marching Home

    Although the numbers of Westerners slipping off to join the jihadist fronts in Syria and Iraq are murky, U.S. counterterrorism officials believe that those fighters pose a clear and present danger to American security.

    Nov 18, 2014

  • Richard Danzig, Adm. Michael S. Rogers, and Michael E. Leiter at RAND's Politics Aside 2014

    Blog

    Setting Standards for Cyber Security

    Developing international norms and standards about appropriate cyber security activity by nations, groups, and even individuals is key to governing online activity in the future, said NSA Director Adm. Michael S. Rogers during a panel discussion at RAND's Politics Aside event.

    Nov 14, 2014

  • Report

    RAND NSRD Annual Report 2013-2014

    Surveys the work of the RAND National Security Research Division from April 2013 through June 2014.

    Oct 8, 2014

  • Some of the ultrastructural morphology displayed by an Ebola virus virion in an undated handout colorized transmission electron micrograph (TEM)

    Commentary

    Ebola: The Faceless National Security Threat

    The rapid, uncontrolled spread of aggressive diseases such as Ebola is often a matter of national security. U.S. intelligence professionals must establish relevant information collection and dissemination mechanisms to deal with such contingencies.

    Sep 10, 2014

  • Brian Michael Jenkins (left), with Seth Jones (middle) and Andrew Liepman (right), speaking about al Qaeda at RAND's Santa Monica headquarters, 2013

    Announcement

    Brian Michael Jenkins Joins Elite Panel on Domestic Intelligence Gathering

    Brian Michael Jenkins, senior adviser to the RAND president and an expert on transportation security and terrorism, has joined the “Blue Ribbon Panel,” which will preside over work by a Business Executives for National Security task force to determine whether post-9/11 reforms have kept pace with evolving threats to homeland security.

    Aug 26, 2014

  • Smoke rises during clashes between Kurdish peshmerga troops and militants of the Islamic State, formerly known as ISIL, on the outskirts of Sinjar, August 5, 2014

    Commentary

    Disrupting Terrorist Safe Havens

    Disrupting the terrorist safe havens in Syria and Iraq would require a balanced approach that makes the business of terrorist planning and training difficult without entangling U.S. forces in new conflicts and angering the very populations the United States seeks to assist.

    Aug 18, 2014

  • Line handlers await the arrival of the Virginia class attack submarine USS Hartford

    Commentary

    How Do We Deal with a Flood of Data?

    Despite the battle-tested value of intelligence, surveillance, and reconnaissance (ISR) systems, the amount of data they generate has become overwhelming to Navy analysts. If the Navy does not change the way it processes information, it will reach an ISR “tipping point”—as soon as 2016.

    Jun 23, 2014

  • Report

    How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts

    This report discusses the challenges of evaluating information-sharing efforts that seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts.

    Jun 18, 2014

  • News Release

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. Cloud strategies offer promising options.

    May 5, 2014

  • The search for missing Malaysia Airlines Flight 370 resumed even as senior Australian officials warned that bad weather and a lack of reliable information were seriously impeding efforts.

    Commentary

    Why 'Big Data' Can't Find the Missing Malaysian Plane

    The failure to find the missing aircraft demonstrates anew the serious gaps in data coordination and challenges public assumptions about the thoroughness and simplicity of searching the world's data for answers.

    May 1, 2014

  • intelligence specialist monitors automatic identification systems aboard the aircraft carrier USS George H.W. Bush

    Report

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. “Cloud” strategies offer promising options.

    May 1, 2014

  • Al-Qaeda fighters celebrate on vehicles taken from Iraqi security forces, on a main street in Fallujah, west of Baghdad

    Report

    Current Infighting Will Test al Qaeda's Brand

    Replacing one big al Qaeda with many smaller ones does not reduce the total number of terrorists but may reduce their overall strategic capability. For the U.S., the biggest opportunities may lie in countering al Qaeda's future recruitment and capitalizing on new sources of intelligence.

    Apr 23, 2014

  • Report

    Lessons Learned from the Afghan Mission Network: Developing a Coalition Contingency Network

    Reviews and assesses the operational and technical history of the Afghan Mission Network, the primary network for the International Security Assistance Force in Afghanistan, and identifies lessons learned for future coalition networks.

    Mar 28, 2014

  • Report

    Handling ethical problems in counterterrorism: An inventory of methods to support ethical decisionmaking

    This study provides an inventory of methods to support ethical decision-making in counterterrorism. It draws on expertise from the counterterrorism field as well as other public sectors, including healthcare, social work, policing and intelligence.

    Feb 12, 2014

  • Research Brief

    The Utility of Modeling and Analysis in the Iraq and Afghanistan Wars

    RAND examined the utility of operations analysis, modeling, and simulation for supporting decisionmaking in counterinsurgency and irregular warfare, with the focus on Operation Enduring Freedom and Operation Iraqi Freedom.

    Feb 10, 2014