RAND conducts a broad array of national security research for the U.S. Department of Defense and allied ministries of defense. RAND's three U.S. federally funded research and development centers (FFRDCs) explore topics from acquisition and technology to personnel and readiness.
In this paper, we use longitudinal individual-level administrative data from 1999 to 2008 and find that an additional month in deployment increases the divorce hazard of military families, with females being more affected.
Federal support for health security research is heavily weighted toward preparing for bioterrorism and other biological threats, providing significantly less funding for challenges such as monster storms or attacks with conventional bombs.
This study reveals that it is challenging to compare the experience of different armed forces due to their unique context and in particular the variety in their ethnic minority integration policies.
Since military operations began in Afghanistan and Iraq, lengthy deployments have led to concerns about the vulnerability of military marriages.
Recent advances in GPS data processing have demonstrated that ground-based GPS receivers are capable of detecting ionospheric TEC perturbations caused by surface-generated Rayleigh, acoustic and gravity waves.
This study explored challenges, facilitators, and progress of Peer Specialist implementation from a stakeholder group involved in their management.
Efforts to maintain and increase veteran participation in the mental health and substance-use services offered by Veterans Affairs should be informed by individuals' characteristics, such as younger age and better physical health relative to other veterans.
Cyberspace has become the new high ground of warfare, the one domain to rule them all and in the ether bind them, which, as this essay will argue, is the wrong way to view cyberspace and what militaries can do by operating within it.
For at least a century, US grand strategy has had five principle goals. It is in how they are pursued that foreign policy changes from one era to the next.
As Stuxnet and its like have proved, a determined attacker does not require an Internet connection to implant a worm or a virus, and a network's weaknesses can be exposed quite by accident. Cyber defense is difficult, in large part because a cyber attack is not always obvious.
Fee-for-service vs limited-budget worlds. Efficient care isn't necessarily less expensive care.
The United States is rapidly approaching a critical juncture in its policy towards Syria.
Homeless veterans are a vulnerable population, with high mortality and morbidity rates. Evidence-based practices for homelessness have been challenging to implement.
Veterans being treated for depression were more likely to become employed, and remain employed when their depression status improved, highlighting the need to prevent socioeconomic deterioration among working-aged veterans of Operation Enduring Freedom and Operation Iraqi Freedom.
Given the threats it faces, from nuclear-armed autocracies to terrorists, the United States cannot afford to scale back its military.
Counterinsurgents are more successful in campaigns in which they decapitate the insurgent leadership than in those in which they do not, regardless of the group's aims or ideology.
This article enumerates challenges facing efforts to inform, influence, and persuade in pursuit of national policy objectives first for the U.S. government in general, and then specific to the Department of Defense.
The relationship between leadership decapitation and campaign success holds across different types of insurgencies.
Stabilizing Afghanistan is the only policy option that will secure the full range of our interests in South Asia. There are no practical alternatives.
Examines the dichotomy of defence industrial policy.