<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">

     <title>RAND Research Topic: Domestic Intelligence</title>
     <link rel="self" href="https://www.rand.org/topics/domestic-intelligence.xml"/>
     <updated>2017-07-11T13:29:17Z</updated>
     <link rel="alternate" type="text/html" hreflang="en" href="https://www.rand.org/topics/domestic-intelligence.html" />
     <rights>Copyright (c) 2017, The RAND Corporation</rights>
     <author>
       <name>RAND Corporation</name>
     </author>
     <id>https://www.rand.org/topics/domestic-intelligence.html</id>
 
 <entry>
   <title type="html">U.S. National Security Decisionmaking Processes Need Trimming</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/news/press/2016/04/05.html</id>
   <published>Apr 5, 2016</published>
   <updated>Apr 5, 2016</updated>
   <summary type="html">Increasing the effectiveness and efficiency of the National Security Council is necessary as the country contends with many more state and nonstate actors, around-the-clock public scrutiny, and exploding nontraditional threats.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/news/press/2016/04/05.html" />
   
 </entry>
 
 <entry>
   <title type="html">U.S. National Security Decisionmaking Processes Need Streamlining</title>
   <author>
   	<name>Charles P. Ries</name>
   	</author>  
   <id>https://www.rand.org/pubs/perspectives/PE192.html</id>
   <published>Apr 5, 2016</published>
   <updated>Apr 5, 2016</updated>
   <summary type="html">The U.S. national security system faces a range of management challenges. A leaner, more focused national security decisionmaking system can help the United States succeed in a period of tumultuous change.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/perspectives/PE192.html" />
   
 </entry>
 
 <entry>
   <title type="html">The RAND Intelligence Policy Center</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/nsrd/ndri/centers/intel.html</id>
   <published>Jan 1, 2016</published>
   <updated>Jan 1, 2016</updated>
   <summary type="html">The RAND Intelligence Policy Center (IPC) assists the U.S. Department of Defense as it confronts today&apos;s rapidly evolving intelligence environment. The Center&apos;s research provides a strong foundation on foreign political, cultural, and military developments.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/nsrd/ndri/centers/intel.html" />
   
 </entry>
 
 <entry>
   <title type="html">How Do We Know What Information Sharing Is Really Worth?</title>
   <author>
   	<name>Brian A. Jackson</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_reports/RR380.html</id>
   <published>Jun 18, 2014</published>
   <updated>Jun 18, 2014</updated>
   <summary type="html">This report discusses the challenges of evaluating information-sharing efforts that seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_reports/RR380.html" />
   
 </entry>
 
 <entry>
   <title type="html">Identifying Enemies Among Us: Evolving Terrorist Threats and the Continuing Challenges of Domestic Intelligence Collection and Information Sharing</title>
   <author>
   	<name>Brian Michael Jenkins; Andrew Liepman; Henry H. Willis</name>
   	</author>  
   <id>https://www.rand.org/pubs/conf_proceedings/CF317.html</id>
   <published>Jan 13, 2014</published>
   <updated>Jan 13, 2014</updated>
   <summary type="html">Officials, practitioners, and counterterrorism experts gathered this year to examine domestic intelligence and information sharing as they relate to terrorist threats.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/conf_proceedings/CF317.html" />
   
 </entry>
 
 <entry>
   <title type="html">Evaluation of the implementation of the Europol Council Decision and of Europol&amp;rsquo;s activities</title>
   <author>
   	<name>Emma Disley; Barrie Irving; William Hughes; Bhanu Patruni</name>
   	</author>  
   <id>https://www.rand.org/pubs/technical_reports/TR1264.html</id>
   <published>Jul 25, 2012</published>
   <updated>Jul 25, 2012</updated>
   <summary type="html">This report sets out findings from a wide-ranging evaluation of Europol -- the European Police Office. It examines Europol&apos;s capabilities, legal basis and activities, highlighting potential areas for reform in the forthcoming Europol Regulation.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/technical_reports/TR1264.html" />
   
 </entry>
 
 <entry>
   <title type="html">Qualitative Comparative Analysis of 30 Insurgencies, 1978-2008</title>
   <author>
   	<name>Christopher Paul; Colin P. Clarke; Beth Grill</name>
   	</author>  
   <id>https://www.rand.org/pubs/external_publications/EP51061.html</id>
   <published>Jan 1, 2012</published>
   <updated>Jan 1, 2012</updated>
   <summary type="html">Using Charles Ragin&apos;s Qualitative Comparative Analysis (QCA) to quantitatively test the performance of 20 distinct counterinsurgency (COIN) approaches against the historical record, this article provides useful recommendations for US engagement in and support for COIN operations.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/external_publications/EP51061.html" />
   
 </entry>
 
 <entry>
   <title type="html">Local Law Enforcement&apos;s Counterterrorism Initiatives Have Evolved into All-Hazards Strategies</title>
   <author>
   	<name>Lois M. Davis; Michael Pollard; Kevin Ward; Jeremy M. Wilson; Danielle M. Varda; Lydia Hansell; Paul S. Steinberg</name>
   	</author>  
   <id>https://www.rand.org/pubs/monographs/MG1031.html</id>
   <published>Oct 28, 2010</published>
   <updated>Oct 28, 2010</updated>
   <summary type="html">Law enforcement agencies in areas where terrorist threats are considered to be high have expanded their focus beyond traditional crime prevention and investigation to include counterterrorism and homeland security operations.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/monographs/MG1031.html" />
   
 </entry>
 
 <entry>
   <title type="html">Local Law Enforcement&apos;s Counterterrorism Initiatives Have Evolved into All-Hazards Strategies</title>
   <author>
   	<name>RAND Corporation</name>
   	</author>  
   <id>https://www.rand.org/news/press/2010/10/28.html</id>
   <published>Oct 28, 2010</published>
   <updated>Oct 28, 2010</updated>
   <summary type="html">Law enforcement agencies in areas where terrorist threats are considered to be high have expanded their focus beyond traditional crime prevention and investigation to include counterterrorism and homeland security operations.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/news/press/2010/10/28.html" />
   
 </entry>
 
 <entry>
   <title type="html">Building on Clues</title>
   <author>
   	<name>Kevin J. Strom; John S. Hollywood; Mark Pope; Garth Weintraub; Crystal Daye; Don Gemeinhardt</name>
   	</author>  
   <id>https://www.rand.org/pubs/external_publications/EP201000179.html</id>
   <published>Oct 1, 2010</published>
   <updated>Oct 1, 2010</updated>
   <summary type="html">This report examines open-source material on 86 foiled and executed terrorist plots against U.S. targets from 1999 to 2009 to determine the types of information and activities that led to (or could have led to) their discovery.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/external_publications/EP201000179.html" />
   
 </entry>
 
 <entry>
   <title type="html">Would-Be Warriors: Incidents of Jihadist Terrorist Radicalization in the United States Since September 11, 2001</title>
   <author>
   	<name>Brian Michael Jenkins</name>
   	</author>  
   <id>https://www.rand.org/pubs/occasional_papers/OP292.html</id>
   <published>May 5, 2010</published>
   <updated>May 5, 2010</updated>
   <summary type="html">Intelligence collection by law enforcement and lack of community support have limited radicalization and recruitment to jihadist terrorism in the United States to 46 cases since 9/11, although 2009 saw a sharp increase in the number of cases.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/occasional_papers/OP292.html" />
   
 </entry>
 
 <entry>
   <title type="html">A Delicate Balance: Portfolio Analysis and Management for Intelligence Information Dissemination Programs</title>
   <author>
   	<name>Eric Landree; Richard Silberglitt; Brian G. Chow; Lance Sherry; Michael S. Tseng</name>
   	</author>  
   <id>https://www.rand.org/pubs/monographs/MG939.html</id>
   <published>Dec 15, 2009</published>
   <updated>Dec 15, 2009</updated>
   <summary type="html">An application of RAND&apos;s PortMan portfolio analysis and Delphi methods for the National Security Agency (NSA) that enables allocation of research and development (R&amp;D) and operations and maintenance (O&amp;M) resources according to value, risk, and cost.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/monographs/MG939.html" />
   
 </entry>
 
 <entry>
   <title type="html">Considering the Creation of a Domestic Intelligence Agency in the United States: Lessons from the Experiences of Australia, Canada, France, Germany, and the United Kingdom</title>
   <author>
   	<name>Brian A. Jackson; Peter Chalk; Richard Warnes; Lindsay Clutterbuck; Aidan Kirby Winn</name>
   	</author>  
   <id>https://www.rand.org/pubs/monographs/MG805.html</id>
   <published>Feb 19, 2009</published>
   <updated>Feb 19, 2009</updated>
   <summary type="html">With terrorism still prominent on the U.S. agenda, whether the country&#8217;s prevention efforts match the threat the United States faces continues to be central in policy debate. One element of this debate is questioning whether the United States should create a dedicated domestic intelligence agency. Case studies of five other democracies provide lessons and common themes that may help policymakers decide.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/monographs/MG805.html" />
   
 </entry>
 
 <entry>
   <title type="html">Film Piracy, Organized Crime, and Terrorism</title>
   <author>
   	<name>Gregory F. Treverton; Carl F. Matthies; Karla J. Cunningham; Jeremiah Goulka; Greg Ridgeway; Anny Wong</name>
   	</author>  
   <id>https://www.rand.org/pubs/monographs/MG742.html</id>
   <published>Jan 14, 2009</published>
   <updated>Jan 14, 2009</updated>
   <summary type="html">The involvement of organized crime and terrorist groups worldwide in counterfeiting products to finance their activities, with case studies of film piracy as an illustrative example.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/monographs/MG742.html" />
   
 </entry>
 
 <entry>
   <title type="html">How Terrorist Groups End: Implications for Countering al Qa&apos;ida</title>
   <author>
   	<name>Seth G. Jones; Martin C. Libicki</name>
   	</author>  
   <id>https://www.rand.org/pubs/research_briefs/RB9351.html</id>
   <published>Jun 30, 2008</published>
   <updated>Jun 30, 2008</updated>
   <summary type="html">This research brief describes an analysis of how terrorist groups end. The evidence since 1968 indicates that most groups have ceased to exist as a result of police and intelligence actions or of political accommodations, not military efforts.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/research_briefs/RB9351.html" />
   
 </entry>
 
 <entry>
   <title type="html">The Next Steps in Reshaping Intelligence</title>
   <author>
   	<name>Gregory F. Treverton</name>
   	</author>  
   <id>https://www.rand.org/pubs/occasional_papers/OP152.html</id>
   <published>Oct 24, 2005</published>
   <updated>Oct 24, 2005</updated>
   <summary type="html">Lays out the next steps for reshaping U.S. intelligence.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/occasional_papers/OP152.html" />
   
 </entry>
 
 <entry>
   <title type="html">DoD Biometric Conformity Assessment Initiative</title>
   <author>
   	<name>John D. Woodward; Sam Cava</name>
   	</author>  
   <id>https://www.rand.org/pubs/reprints/RP1182.html</id>
   <published>Jan 1, 2005</published>
   <updated>Jan 1, 2005</updated>
   <summary type="html">Provides an overview of the Department of Defense (DoD) Biometric Conformity Assessment Initiative, a strategic plan to ensure that DoD&apos;s biometric products are interoperable.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/reprints/RP1182.html" />
   
 </entry>
 
 <entry>
   <title type="html">Using Biometrics to Achieve Identity Dominance in the Global War on Terrorism</title>
   <author>
   	<name>John D. Woodward</name>
   	</author>  
   <id>https://www.rand.org/pubs/reprints/RP1194.html</id>
   <published>Jan 1, 2005</published>
   <updated>Jan 1, 2005</updated>
   <summary type="html">Shows how biometric technology can be used to achieve identity dominance in the global war on terrorism and to meet the requirements of force protection, actionable intelligence, and law enforcement.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/reprints/RP1194.html" />
   
 </entry>
 
 <entry>
   <title type="html">How Do You Know Friend From Foe?: DoD&amp;rsquo;s Automated Biometric Identification System</title>
   <author>
   	<name>John D. Woodward</name>
   	</author>  
   <id>https://www.rand.org/pubs/reprints/RP1183.html</id>
   <published>Jan 1, 2004</published>
   <updated>Jan 1, 2004</updated>
   <summary type="html">Explains a system used by the U.S. Department of Defense that allows biometric data gathered by U.S. military forces abroad to be searched in various U.S. databases in order to identify national security threats.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/reprints/RP1183.html" />
   
 </entry>
 
 <entry>
   <title type="html">To Repair or To Rebuild?: Analyzing Personnel Security Research Agendas</title>
   <author>
   	<name>Carl H. Builder; Victor G. Jackson; S. Rae Starr</name>
   	</author>  
   <id>https://www.rand.org/pubs/reports/R3652.html</id>
   <published>Sep 1, 1988</published>
   <updated>Sep 1, 1988</updated>
   <summary type="html">This report presents an evaluation of the initial research agenda of the Defense Personnel Security Research and Education Center (PERSEREC), with a proposal for new research on the personnel security problem and objectives and strategy for the Department of Defense (DOD) Personnel Security Program.</summary>
   <link rel="alternate" type="text/xhtml" hreflang="en" title="Read More" href="https://www.rand.org/pubs/reports/R3652.html" />
   
 </entry>
 
 </feed>
