What Role Can Land-Based, Multi-Domain Anti-Access/Area Denial Forces Play in Deterring or Defeating Aggression?
This report examines the role that land-based, multi-domain anti-access/area denial forces can play in helping the U.S. and its allies and partners deter or defeat aggression in the western Pacific, European littoral areas, and the Persian Gulf.
May 22, 2017
RAND researchers explore the feasibility of Australia sustaining a domestic naval shipbuilding industry compared with buying ships from foreign shipbuilders. The authors outline the complex consequences and trade-offs of both options.
Apr 15, 2015
Reviews and assesses the operational and technical history of the Afghan Mission Network, the primary network for the International Security Assistance Force in Afghanistan, and identifies lessons learned for future coalition networks.
Mar 28, 2014
To reduce costs and take advantage of commercial technology, the U.S. Navy is pursuing open-architecture software and other improvements to its Aegis combat system. This report examines the potential benefits and challenges of this new approach.
May 3, 2013
This report investigates how the Office of Border Patrol could employ pattern and trend analysis and systematic randomness to increase interdiction rates and mitigate smuggler adaptation.
Mar 27, 2012
To design a new naval submarine domestically, Australia's industry and Government will need about 1,000 skilled draftsmen and engineers. Cultivating this workforce could take 15-20 years; partnering with foreign designers could expedite the process.
Dec 22, 2011
Australia's Submarine Design Capabilities and Capacities: Challenges and Options for the Future Submarine
Assesses the domestic engineering and design skills that Australian industry and government will need to design a new submarine, identifies the skills they currently possess, and evaluates how best to fill any gaps between the two.
Dec 15, 2011
Focusing on three missions -- illegal drug control, counterterrorism, and illegal migration -- this report recommends ways to measure performance of U.S. border-security efforts in terms of interdiction, deterrence, and exploiting networked intelligence.
Jun 23, 2010
Applies behavioral decision theory to develop hypotheses about how users choose passwords, and uses those hypotheses to suggest novel ways to help users choose passwords that are both memorable and secure.
Jun 26, 2009