Download

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 0.2 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.1 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Purchase

Purchase Print Copy

 FormatList Price Price
Add to Cart Paperback52 pages $20.00 $16.00 20% Web Discount

The imperative to monitor, suppress, attack, and ultimately eradicate international terrorist groups seeking to strike the United States, its citizens, its interests, and its allies is prompting significant changes in the demands placed on the armed forces of the United States. U.S. forces will often be called upon to assist foreign governments that wish to eradicate terrorist groups on their territory but lack the capabilities to do so on their own. In such cases, U.S. forces can strengthen the capabilities and will of host-government forces by providing training and equipment, disrupt terrorist activities, find and capture or kill terrorists, help to alienate terrorists from the populace, gather intelligence about terrorist networks and activities around the world, and protect friendly forces and bases. In effective counterterrorist activitiesThe imperative to monitor, suppress, attack, and ultimately eradicate international terrorist groups seeking to strike the United States, its citizens, its interests, and its allies is prompting significant changes in the demands placed on the armed forces of the United States. U.S. forces will often be called upon to assist foreign governments that wish to eradicate terrorist groups on their territory but lack the capabilities to do so on their own. In such cases, U.S. forces can strengthen the capabilities and will of host-government forces by providing training and equipment, disrupt terrorist activities, find and capture or kill terrorists, help to alienate terrorists from the populace, gather intelligence about terrorist networks and activities around the world, and protect friendly forces and bases. In effective counterterrorist activitie

Table of Contents

  • Chapter One

    Introduction

  • Chapter Two

    A "Generic" Operational Strategy: A Template for Planning

  • Chapter Three

    Toward New Concepts for Locating and Attacking Terrorists and Related Targets

  • Chapter Four

    The New "Steady State": Implications for Force Planning

Research conducted by

The research reported here was sponsored by the United States Air Force. The research was conducted in RAND's Project AIR FORCE.

This report is part of the RAND Corporation monograph report series. The monograph/report was a product of the RAND Corporation from 1993 to 2003. RAND monograph/reports presented major research findings that addressed the challenges facing the public and private sectors. They included executive summaries, technical documentation, and synthesis pieces.

Permission is given to duplicate this electronic document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. For information on reprint and linking permissions, please visit the RAND Permissions page.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.