Download

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 5.5 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.2 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Purchase

Purchase Print Copy

 FormatList Price Price
Add to Cart Paperback158 pages $39.50 $31.60 20% Web Discount

Effective civilian relief, reconstruction, and development work can help convince people to support their government against insurgency. Knowing this, insurgents will target such work, threatening both those who perform it and those who benefit from it. Too often, the result is a postponement of efforts to improve government and serve the population until contested territory has been cleared of insurgents. This can lead to excessive reliance on force to defeat insurgents — delaying or even preventing success. A RAND team with combined security and development expertise set out to learn how civilian counterinsurgency (civil COIN) (essential human services, political reform, physical reconstruction, economic development, and indigenous capacity-building) could be conducted more safely in the face of active insurgency, when it can do the most good. The authors propose the following to improve the security of civil COIN under fire: a concept for setting priorities among civil COIN measures; a way to allocate security forces optimally among various civil COIN activities, as well as between them and other COIN security missions (e.g., direct operations against insurgents); new, integrated concepts of operation (ICONOPS) that military and civilian leaders could employ during COIN campaigns to manage risk and produce best results for COIN as a whole; and general requirements for capabilities and corresponding investments to secure civil COIN, derived from ICONOPS.

Table of Contents

  • Chapter One

    Introduction

  • Chapter Two

    Three Cases

  • Chapter Three

    Integrated Analysis, Integrated Approach

  • Chapter Four

    Security Requirements

  • Chapter Five

    Conclusions

The research described in this report was prepared for the Office of the Secretary of Defense (OSD). The research was conducted in the RAND National Defense Research Institute, a federally funded research and development center sponsored by the OSD, the Joint Staff, the Unified Combatant Commands, the Department of the Navy, the Marine Corps, the defense agencies, and the defense Intelligence Community.

This report is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND monographs undergo rigorous peer review to ensure high standards for research quality and objectivity.

Permission is given to duplicate this electronic document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. For information on reprint and linking permissions, please visit the RAND Permissions page.

The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.