Warfare and Military Operations

RAND researchers examine military and national security issues across a broad spectrum — from political dissent and military training to tactical operations and reconstruction efforts — and take a long-term, global perspective. Terrorism, types of warfare, and international intervention are among the many topics RAND explores.

  • A man accesses data from a computer

    Testimony

    Sharing Information About Threats Is Not a Cybersecurity Panacea

    Information-sharing—specifically, threat-centric information-sharing—has dominated recent discussions on improving cybersecurity, but it is not a silver bullet. Its usefulness is tied to certain assumptions about attacks, and while it should be encouraged, it addresses only one facet of a very complex space.

    Mar 4, 2015

  • The new issue of satirical French weekly Charlie Hebdo titled 'C'est Reparti' ('Here we go again') in Nice, February 25, 2015

    Commentary

    Predicting the 'Dangerousness' of Potential Terrorists

    Predicting 'dangerousness' of potential terrorists is a hit-and-miss endeavor. Unless someone is waving a gun, it is extremely difficult. Even with direct access to the subject, parole boards, suicide prevention units, and even trained clinicians get it wrong.

    Mar 2, 2015

  • French special intervention police conduct a house-to-house search in Longpont, northeast of Paris, January 8, 2015

    Commentary

    Different Countries, Different Ways of Countering Terrorism

    France and the United States follow different approaches in dealing with terrorist suspects. This divergence reflects differences in the threat, historical experience, law, available resources, and public attitudes. France faces a more serious terrorist threat than the U.S. does.

    Mar 2, 2015

  • A Paris crowd displaying the portraits of five of the people killed during the attack at Charlie Hebdo on January 7, 2015

    Commentary

    Attempting to Understand the Paris Attacks

    The investigation will eventually fill in some of the gaps in our knowledge of the events leading up to the attacks in Paris, but some questions will remain unanswered. Embedded in the unknowns are some of the chronic dilemmas faced by counterterrorist authorities everywhere.

    Feb 26, 2015

  • French, British, and EU flags

    Report

    Crisis and conflict prevention strategies: An international comparison

    This report is a translated excerpt from a 2012 report, focusing on conflict prevention approaches in four national cases: France, the United Kingdom, the United States and Germany.

    Feb 25, 2015

  • U.S. President Barack Obama speaks during the White House Summit on Countering Violent Extremism February 19, 2015

    Commentary

    Tackling Radicalization Before It Begins

    Why not turn the question of violent extremism inside out and develop programs that reinforce non-radicalization? That is, rather than eliminating drivers, focus instead on strengthening the factors that inhibit violent extremism.

    Feb 23, 2015

  • Report

    Sustaining U.S. Leadership in the Asia-Pacific Region: Why a Strategy of Direct Defense Against Antiaccess and Area Denial Threats Is Desirable and Feasible

    This perspective is intended to contribute to the growing debate over how to respond to recent military advances of potential adversaries by examining a potentially effective and feasible overall military approach to the challenge -- direct defense.

    Feb 23, 2015

  • Libyan Police prepare during the start of a security plan to increase security in Tripoli, February 9, 2015

    Commentary

    Somalia on the Mediterranean

    Libya is as vulnerable to further inroads by ISIS now as Syria was a year ago. What can the United States and its allies do to stop the hemorrhaging? Many options have been debated, but none look very promising.

    Feb 19, 2015

  • An MQ-9 Reaper sits on the flightline at Creech Air Force Base, NV

    Commentary

    Armed Drone Myth 1: They Will Transform How War Is Waged Globally

    Long-range military drones are fundamentally misunderstood. Their champions wrongly contend they are revolutionizing warfare, while critics fear their spread would greatly increase the threat that China, terrorists, and others pose.

    Feb 17, 2015

  • Journal Article

    Integrating Apples, Oranges, Pianos, Volkswagens, and Skyscrapers: On the Relationships Between Information-Related Capabilities and Other Lines of Operation

    This article describes the various possible relationships between IRCs and the capabilities of other lines of operation.

    Feb 17, 2015

  • News Release

    China's Military Modernization Efforts Fall Short; Significant Weaknesses Remain

    Although the drive by the People's Republic of China to modernize its military has been underway for more than two decades, significant weaknesses remain in two broad categories: institutional and combat capabilities.

    Feb 16, 2015

  • Journal Article

    Foundations for Assessment: The Hierarchy of Evaluation and the Importance of Articulating a Theory of Change

    There is currently a great deal of attention to assessment in a range of defense communities. Two foundational elements for planning and conducting assessments can benefit these communities: explicit theories of change and a hierarchy for evaluation.

    Feb 16, 2015

  • Chinese airborne troops parachute in an amphibious landing drill during the Sino-Russian 'Peace Mission 2005' joint military exercise, held in China's Shandong Peninsula in 2005

    Report

    China's Incomplete Military Transformation

    The People's Liberation Army (PLA) is keenly aware of its many weaknesses and is vigorously striving to correct them. Although it is only natural to focus on the PLA's growing capabilities, understanding its weaknesses — and its self-assessments — is no less important.

    Feb 13, 2015

  • Binary code with 'password' in red

    Commentary

    Cyberattacks Are a Nuisance, Not Terrorism

    The United States needs to consider both the risk of further attacks like the Sony breach and also further ill-considered reactions that may arise if the problem of insecurity in cyberspace is shoved into the counterterrorism paradigm.

    Feb 9, 2015

  • U.S. President Barack Obama delivers his State of the Union address to a joint session of Congress in Washington, January 20, 2015

    Commentary

    The Pros and Cons of Obama's Restraint

    The signal achievement of the Obama foreign policy — fully on display in the new National Security Strategy — has been to avoid further missteps and lay the groundwork for progress by husbanding U.S. power, restoring the economic foundations of influence, and repairing the U.S. global image.

    Feb 6, 2015

  • People holding mobile phones are silhouetted against a backdrop projected with the Twitter logo

    Commentary

    Decoding the Breach: The Truth About the CENTCOM Hack

    When ISIS hackers hijacked the Twitter account of U.S. Central Command on Jan. 12, they falsely claimed that they had hacked into U.S. military computers. While the incident was embarrassing, it was not concerning in operational military terms. It was, however, damaging to the counterinsurgency against ISIS.

    Feb 3, 2015

  • Report

    The Days After a Deal with Iran: Implications for the Nuclear Nonproliferation Regime

    One of a series of RAND Perspectives on what the Middle East and U.S. policy might look like in "the days after a deal" with Iran, this Perspective examines a deal's implications for the nuclear nonproliferation regime.

    Feb 2, 2015

  • A C-130H Hercules landing in its new home in Southwest Asia in September 2014

    Report

    The Role of the USAF in the Days After a Deal with Iran

    The U.S. will face a complex set of policy issues and trade-offs in the aftermath of a nuclear agreement with Iran. The U.S. Air Force should see itself as having a role in informing senior-level policy discussions as to how its military posture in the region could be designed in support of alternative U.S. policies toward Iran.

    Feb 2, 2015

  • A K-9 police unit keeps watch as passengers make their way through Ronald Reagan Washington National Airport

    Commentary

    Improving Domestic Security to Combat Today's Terrorist Threats

    Today, the U.S. confronts a multilayered terrorist threat and the recent spate of attacks in Europe underscores the necessity for ensuring that intelligence keeps up with it. Intelligence services must continue to prevent terrorist assaults dispatched from abroad, head off new shoe and underwear bombers, intercept individuals returning from jihadist fronts with terrorist intentions, while at the same time uncovering and thwarting homegrown plots.

    Jan 30, 2015

  • Report

    Spotlight on 2014

    Spotlight 2014 is RAND Europe’s annual review. We present our research to support policymaking in four areas of transformation: harnessing the power of ICT, safeguarding society, building healthier communities and innovating for efficiency.

    Jan 27, 2015