Intelligence Gathering

The act of collecting intelligence about individuals, groups, or states of interest has come under increasing scrutiny since September 11, 2001. RAND has examined how nations successfully collect intelligence, how the U.S. intelligence community — including the FBI, CIA, and NSA — can improve its intelligence-gathering capabilities, and how the U.S. military can make better use of its limited land-, sea-, and air-based intelligence collection assets in the rapidly changing battlefields of the future.

  • Line handlers await the arrival of the Virginia class attack submarine USS Hartford

    Blog

    How Do We Deal with a Flood of Data?

    Despite the battle-tested value of intelligence, surveillance, and reconnaissance (ISR) systems, the amount of data they generate has become overwhelming to Navy analysts. If the Navy does not change the way it processes information, it will reach an ISR “tipping point”—as soon as 2016.

    Jun 23, 2014

  • News Release

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. Cloud strategies offer promising options.

    May 5, 2014

  • The search for missing Malaysia Airlines Flight 370 resumed even as senior Australian officials warned that bad weather and a lack of reliable information were seriously impeding efforts.

    Blog

    Why 'Big Data' Can't Find the Missing Malaysian Plane

    The failure to find the missing aircraft demonstrates anew the serious gaps in data coordination and challenges public assumptions about the thoroughness and simplicity of searching the world's data for answers.

    May 1, 2014

  • intelligence specialist monitors automatic identification systems aboard the aircraft carrier USS George H.W. Bush

    Report

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. “Cloud” strategies offer promising options.

    May 1, 2014

  • Fotolia_1552939_Subscription_Monthly_XL

    Blog

    The Real Homeland Security Issues for 2014

    Americans should be able to discuss the terrorist threat and how best to meet it, how much of the country’s precious resources should be devoted to homeland security, and the impact intelligence efforts can have on personal privacy and freedom.

    Feb 5, 2014

  • Member of the protest group, Code Pink, protests against U.S. President Obama and the NSA before his arrival at the DOJ in Washington, January 17, 2014

    Blog

    The Facts About the Metadata 'Menace'

    Metadata from a phone call include information such as the direction (who called whom), length, date and time. The program does not record the location or the name associated with a call. No one is listening to the call and no content is recorded.

    Jan 26, 2014

  • A protester during a rally against mass surveillance near the U.S. Capitol

    Blog

    After NSA Spying Revelations, US Must Reform Rules on Secrecy and Data

    The U.S. should make two key reforms. First, the over-designation of material as classified makes it is harder to protect the few real secrets; this must be change. Second, the FISA court must become a gatekeeper for NSA access to communications data.

    Nov 14, 2013

  • People hold posters of senior al Qaeda figure Abu Anas al-Liby during a demonstration over his capture by U.S. authorities

    Blog

    How War on Terrorism Has Evolved

    Special operations to capture terrorists are more dangerous than drone strikes, and nimble terrorist adversaries will develop countermeasures to make them even more difficult. But they are politically more acceptable and offer opportunities for intelligence and the visible delivery of justice.

    Oct 24, 2013

  • U.S. marines during a live-fire exercise on the flight deck of the amphibious transport dock ship USS San Antonio

    Blog

    Do U.S. Raids in Libya, Somalia Signal a Shift in Terror Strategy?

    The raids that the United States conducted over the weekend in Libya and Somalia could signal a new focus in Washington on capturing terrorist suspects and gathering intelligence rather than relying on drone strikes. RAND experts Linda Robinson, Angel Rabasa, and Seth Jones comment.

    Oct 10, 2013

  • red_light_camera_9663344643_b3609779b4_h

    Blog

    Needed: Sustainable Spying Oversight

    Domestic intelligence in the United States is an activity with a history, and efforts to consider future policy on this issue need to take that history into account, writes Brian Jackson. Public acceptability must be part of the calculus in devising oversight and control of intelligence efforts.

    Sep 18, 2013

  • U.S. consulate in Lahore, Pakistan

    Blog

    Building a More Secure American Embassy

    The recent decision to close 19 U.S. embassies and consulates in the Middle East and Africa because of intelligence indicating terrorist planning for unspecific attacks underscores the need to continue focusing attention and resources on the danger al-Qaida and its affiliates pose to the United States and its allies.

    Sep 5, 2013

  • Report

    Increasing Flexibility and Agility at the National Reconnaissance Office: Lessons from Modular Design, Occupational Surprise, and Commercial Research and Development Processes

    To help the National Reconnaissance Office (NRO) become more flexible and agile in an increasingly uncertain world, RAND researched whether the NRO might benefit from building modular satellites and examined how professionals respond to surprise.

    Aug 14, 2013

  • Supporters of Edward Snowden

    Blog

    What Did Edward Snowden Get Wrong? Everything

    Unfortunately, during the Snowden affair, many news outlets have spent more time examining ways the government could abuse the information it has access to while giving scant mention to the lengths to which the intelligence community goes to protect privacy, writes Andrew Liepman.

    Aug 12, 2013

  • Edward Snowden

    Blog

    The Snowden Affair: Questions and Answers with Olga Oliker

    There is an element of hypocrisy in Russian officials and pundits lauding Snowden as a human rights hero for his actions, says Olga Oliker, when Russia itself has a terrible record on free political speech.

    Aug 7, 2013

  • A crew member from Station Boston conducts security zones in the Boston Harbor

    Blog

    The Day After: How Will the Boston Marathon Bombing Change the Way America Fights Terrorism?

    The risk of overreaching in the name of homeland security is great. But the best and most likely outcome of this latest attack would be a measured security response built around Americans engaging anew in their own security, writes Brian Michael Jenkins.

    Apr 19, 2013

  • Testimony

    Benghazi and Beyond: What Went Wrong on Sept. 11, 2012 and How to Prevent it from Happening Again

    Among security considerations for diplomatic missions abroad is the amount and type of support provided by the host government, the method for acquiring knowledge of what is happening outside the embassy in the surrounding neighborhoods, and the actual structure of the buildings and layout of the diplomatic compound.

    Nov 15, 2012

  • News Release

    New Counterinsurgency Assessment Methods Are Needed to Better Inform Policymakers

    In counterinsurgency, or "COIN" operations, contextual assessment is proving to be a superior way to gauge success or failure. Ben Connable discusses his report Embracing the Fog of War, and how the Department of Defense can better use contributions from commanders on the ground to assess the results of COIN operations.

    May 3, 2012

  • Report

    New Counterinsurgency Assessment Methods Are Needed to Better Inform Policymakers

    The U.S. Department of Defense will receive more detailed, transparent, and credible assessments of its counterinsurgency campaigns by replacing its top-down approach with a bottom-up method driven by contextual, narrative reporting provided by commanders on the ground.

    Apr 13, 2012

  • sad soldier

    Research Brief

    Improving Counterinsurgency Campaign Assessment: The Importance of Transparency in the Fog of War

    Current processes used by the U.S. military do not provide accurate assessments of counterinsurgency campaigns. A new process that adds transparency and context to assessments would make them more credible and useful at all levels of decisionmaking.

    Apr 13, 2012

  • Report

    Reducing Attrition in Selected Air Force Training Pipelines

    The Air Force has a continuing interest in reducing high attrition and training-block failure (washback) rates, as both increase training and recruiting costs. This report describes research into these issues for nine career fields.

    Feb 2, 2012