Cover: Integrating the Full Range of Security Cooperation Programs into Air Force Planning

Integrating the Full Range of Security Cooperation Programs into Air Force Planning

An Analytic Primer

Published Sep 29, 2011

by Jennifer D. P. Moroney, Joe Hogler, Lianne Kennedy-Boudali, Stephanie Pezard

Download

Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 1.1 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Summary Only

FormatFile SizeNotes
PDF file 0.1 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.

Download Support Files

Access Database

The Security Cooperation Programs database contains information on approximately 100 U.S. government security cooperation programs (Titles 10, 22, 32, 50), including objective, authorities, geographical focus, resources, and point of contact information. The Access database is searchable in boolean style by PURPOSE (e.g., counterterrorism, border security, interoperability) and ACTIVITY (e.g., training, exercise, military-to-military, workshop) and will be useful for U.S. Air Force, Department of Defense, and U.S. government security cooperation planners and resource managers.

FormatFile SizeNotes
zip file 0.2 MB

The file(s) provided above are ZIP-formatted archives, which most modern systems can natively unpack. If your computer does not unpack the archive when you double-click it, you may need to use a separate decompression program such as UnZip.

Purchase

Purchase Print Copy

 Format Price
Add to Cart Paperback196 pages $34.50

The Air Force and other Department of Defense entities conduct a host of security cooperation activities with partner air forces. Many programs are available for use when working with partner countries in a variety of contexts. However, there is currently no process for systematically tracking all these programs and activities. This report supplies Air Force planners with more-accessible information about resources for security cooperation, the rules that govern their use, and their application methods. It does so via an analytical construct created to illustrate how these resources can be employed in partner countries with varying degrees of capability, capacity, and willingness to work with the United States. The authors present an illustrative vignette to demonstrate how this construct may be used in a situation that requires a security cooperation plan. A set of program pages is also included to help security cooperation planners determine the key components of a security cooperation plan: the partner countries to be addressed by the plan, the programs to be used, the types of activities to be conducted through those programs, and program funding information.

Research conducted by

The research reported here was sponsored by the United States Air Force and conducted by RAND Project AIR FORCE.

This report is part of the RAND technical report series. RAND technical reports may include research findings on a specific topic that is limited in scope or intended for a narrow audience; present discussions of the methodology employed in research; provide literature reviews, survey instruments, modeling exercises, guidelines for practitioners and research professionals, and supporting documentation; or deliver preliminary findings. All RAND reports undergo rigorous peer review to ensure that they meet high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit www.rand.org/pubs/permissions.

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.