Intelligence Community

Featured

The intelligence community comprises the many agencies and organizations responsible for intelligence gathering, analysis, and other activities that affect foreign policy and national security. RAND conducts research, develops tools, and provides recommendations to U.S. and allied decisionmakers to support their efforts at gathering and interpreting high-quality information.

  • 130912-M-HF949-004

    Blog

    Do U.S. Raids in Libya, Somalia Signal a Shift in Terror Strategy?

    Oct 10, 2013

    The raids that the United States conducted over the weekend in Libya and Somalia could signal a new focus in Washington on capturing terrorist suspects and gathering intelligence rather than relying on drone strikes. RAND experts Linda Robinson, Angel Rabasa, and Seth Jones comment.

Explore Intelligence Community

  • Report

    Leveraging the Past to Prepare for the Future of Air Force Intelligence Analysis

    This report describes steps the U.S. Air Force can take to help ensure that it has the capability needed to provide intelligence analysis support to a broad range of service and combatant commander needs.

    Apr 27, 2016

  • Islamic Center of Murfreesboro, Tennessee

    Commentary

    Anti-Muslim Rhetoric Is a National Security Threat

    National security and counterterrorism experts agree that rhetoric that paints all Muslims as terrorists or terrorist sympathizers has a high chance of breeding future terrorists. And evidence suggests that such language can hamper U.S. efforts to stop terrorists before they strike and to capture them after attacks.

    Apr 13, 2016

  • News Release

    U.S. National Security Decisionmaking Processes Need Trimming

    Increasing the effectiveness and efficiency of the National Security Council is necessary as the country contends with many more state and nonstate actors, around-the-clock public scrutiny, and exploding nontraditional threats.

    Apr 5, 2016

  • U.S. President Barack Obama attends a meeting with the National Security Council at the State Department in Washington, February 25, 2016

    Report

    U.S. National Security Decisionmaking Processes Need Streamlining

    The U.S. national security system faces a range of management challenges. A leaner, more focused national security decisionmaking system can help the United States succeed in a period of tumultuous change.

    Apr 5, 2016

  • Police at the scene of a security operation in the Brussels suburb of Molenbeek in Belgium, March 18, 2016

    Commentary

    Europe's Terror Fight Far from Over

    Salah Abdeslam is suspected of being the logistics man for the November terrorist attacks in Paris. His capture may provide authorities with a window into the ISIS network in Europe.

    Mar 22, 2016

  • People gather around a memorial in Brussels, Belgium following terrorist bombings, March 22, 2016

    Commentary

    Terror Attacks in Brussels: Insights from RAND Experts

    RAND experts weigh in on the timing of the deadly bombings in Brussels, why the attack was inevitable, Salah Abdeslam's arrest, and more.

    Mar 22, 2016

  • Syrian refugees stand in line as they wait for aid packages at Al Zaatari refugee camp in Mafraq, Jordan, January 20, 2016

    Commentary

    Tracking Refugees with Biometrics: More Questions Than Answers

    Using biometrics in refugee crises is compelling because it gives individuals who have nothing proof of identity even without a government-issued credential like an ID card or passport. But who has rights to the U.N. biometrics database and what is its future?

    Mar 9, 2016

  • Journal Article

    'Beyond Procedural Justice': The Significance of Personal and Community Relationships in Countering Terrorist Recruitment

    The Procedural Justice Model has traditionally been associated with the fields of sociology and criminology as a means for those representing the criminal justice system, in particular the police, to interact and engage with local communities, build trust, develop legitimacy and establish institutional authority.

    Mar 9, 2016

  • U.S. Defense Secretary Ash Carter meets with Chinese Gen. Fan Changlong, vice chairman of China's Central Military Commission, at the Pentagon, June 11, 2015

    Commentary

    OPM Hack Poses Overlooked Counterintelligence Risk for Economic Espionage

    Since discovering the theft of personal data from an OPM database last spring, government officials have been preoccupied with assessing the risks to national security. But they must also address its potential to enable an adversary to steal valuable economic and commercial information.

    Feb 1, 2016

  • An operations intelligence analyst

    Report

    Assessing Threats with Soft, Uncertain, and Conflicting Evidence

    Part of thwarting terrorist attacks is observing suspicious individuals over time with diverse means. These observations provide data that are often both complex and “soft.” How can analysts combine these data to form a realistic threat assessment?

    Feb 1, 2016

  • Members of the New York City Police Department's Critical Response Command anti-terrorism unit stand in formation on Randall's Island in New York City, November 16, 2015

    Commentary

    A Symbolic Purging of the NYPD Radicalization Report

    The NYPD's purging of its 2007 report on radicalization may give some satisfaction by symbolically breaking the connection between the current mayoral administration and the NYPD's previous intelligence and investigative efforts. But its significance seems questionable.

    Jan 26, 2016

  • Marina Litvinenko, widow of murdered ex-KGB agent Alexander Litvinenko, poses with a copy of The Litvinenko Inquiry Report with her son Anatoly during a news conference in London, Britain, January 21, 2016

    Commentary

    Troubling Truth Beneath Litvinenko Headlines

    Slipping radioactive material into a spy's tea in the middle of London may not sound like a CBRN attack, but it is, as the Owen report has confirmed. Hopefully, the report's release will help focus global attention on the growing threat posed by these devastating weapons.

    Jan 21, 2016

  • Closeup of a hand using a digital tablet

    Commentary

    Following Online Footprints to Catch Terrorists

    Millions of people leave behind online footprints each day, giving law enforcement and intelligence experts the chance to construct a profile of who is more likely to commit violence in the name of a murderous ideology.

    Dec 28, 2015

  • Journal Article

    Using Causal Models in Heterogeneous Information Fusion to Detect Terrorists

    We describe basic research that uses a causal, uncertainty-sensitive computational model rooted in qualitative social science to fuse disparate pieces of threat information.

    Dec 14, 2015

  • Soldiers from 7th Special Forces Group Airborne are suspended by a CH-47 Chinook helicopter during a training event Eglin Air Force Base, February 5, 2013

    Commentary

    ISIS vs Special Ops

    However critical to the fight against ISIS, using special operations forces for raids represents only half of the needed military adjustment. The other half is the effort to build indigenous forces capable of taking and holding territory in Iraq and Syria.

    Dec 8, 2015

  • Candles in the French national colours are placed near the Bataclan concert hall the morning after a series of deadly attacks in Paris, November 14, 2015

    Commentary

    Big Questions Facing France

    In Paris, the heavily armed terrorists reportedly struck at six locations, including restaurants, a football stadium, and a theater during a rock concert. It seems clear the killers must have had some confederates. That would mean some terrorists are still at large.

    Nov 14, 2015

  • Journal Article

    Assessing and Evaluating DoD Inform, Influence, and Persuade Efforts: Guidance for Practitioners

    This article aims to establish effective principles and best practices for the assessment of IIP efforts from across sectors and distill them for future application in DoD.

    Oct 22, 2015

  • A person looking at top secret files with a magnifying glass

    Commentary

    Defining a New Paradigm for Government Secrecy

    Technology has afforded the U.S. national security apparatus incredible capabilities, along with equally monumental challenges and risks. The government has the option to choose whether to adjust by taking a proactive approach or to allow external forces to determine the future of its secrets.

    Oct 13, 2015

  • U.S. soldiers take pictures of President Barack Obama at U.S. military base Yongsan Garrison in Seoul, South Korea, April 26, 2014

    Commentary

    Loose Clicks Sink Ships: When Social Media Meets Military Intelligence

    Social media updates can reveal military intelligence. But stopping a soldier from posting a geotagged tweet or Instagram photo presents challenges.

    Aug 14, 2015

  • Demonstrators hold up their signs during the Stop Watching Us: A Rally Against Mass Surveillance march near the U.S. Capitol in Washington, October 26, 2013

    Commentary

    The USA Freedom Act: The Definition of a Compromise

    The USA Freedom Act does not “balance” privacy and national security, nor is it clear that any legislation can credibly do so. There's no monolithic view of what such a balance should look like.

    May 29, 2015