Military Technology

Featured

Cost growth in the development and fielding of technologically advanced weapon systems has become a major economic burden for many nations and is expected to be an enduring and prevalent problem. RAND research has provided cost analyses and recommendations to help policymakers and military leaders develop improved cost-estimating tools and formulate policies that mitigate cost growth in military technology acquisition practices.

  • Cyber warfare specialists engage in weekend training at Warfield Air National Guard Base in Middle River, Maryland, June 3, 2017, photo by J.M. Eddins Jr./U.S. Air Force

    Report

    The Defense Industrial Base Needs a Cyber Protection Program

    Mar 30, 2020

    The unclassified networks of defense industrial base firms have become a target for adversaries seeking to steal sensitive data, trade secrets, and intellectual property. How can the U.S. Department of Defense better secure these networks?

  • A Skyborg conceptual design for a low-cost attritable unmanned combat aerial vehicle (UCAV), image by Air Force Research Laboratory

    Report

    Military Applications of AI Raise Ethical Concerns

    Apr 28, 2020

    Artificial intelligence offers great promise for national defense. For example, a growing number of robotic vehicles and autonomous weapons can operate in areas too hazardous for soldiers. But what are the ethical implications of using AI in war or even to enhance security in peacetime?

Explore Military Technology

  • Report

    Report

    Innovation Models: Enabling new defence solutions and enhanced benefits from science and technology

    The UK Ministry of Defence (MOD) commissioned RAND Europe to conduct a study of innovation models and make recommendations on changes the MOD could make to better harness and absorb innovation from external sources.

    Mar 4, 2015

  • Research Brief

    Research Brief

    Innovation models for defence

    The UK Ministry of Defence (MOD) commissioned RAND Europe to conduct a study of innovation models and make recommendations on changes the MOD could make to better harness and absorb innovation from external sources.

    Mar 4, 2015

  • MQ-9 Reaper unmanned aerial attack vehicle in flight

    Multimedia

    The Use of Long-Range Armed Drones: Fact v. Myth

    In this March 2015 Congressional Briefing, a panel of RAND experts discuss the effect of armed drones on global warfare, whether U.S. policy on armed drones shapes the way other nations deploy them, and the sale of armed drones to allies.

    Mar 3, 2015

  • An MQ-9 Reaper sits on a ramp in Afghanistan

    Commentary

    Armed Drone Myth 3: Global Proliferation Demands Blanket Restrictions on Sales

    More than 70 countries have acquired drones of different classes and for different purposes. However, the number of countries actually developing “armed” drones is far smaller. And smaller still is the number of those countries developing long-range armed systems.

    Feb 19, 2015

  • Illustration of idea, solution, and money

    Commentary

    Managing Technology in an Unmanageable World

    The need for purposeful and focused R&D in the U.S. has never been greater, but technology is advancing so quickly that the structures available to manage it have not kept pace. A comprehensive examination of the technological landscape is needed to help the government take a more holistic approach to investing in and regulating technologies.

    Feb 19, 2015

  • An MQ-9 Reaper sits on the flightline at Creech Air Force Base, NV

    Commentary

    Armed Drone Myth 1: They Will Transform How War Is Waged Globally

    Long-range military drones are fundamentally misunderstood. Their champions wrongly contend they are revolutionizing warfare, while critics fear their spread would greatly increase the threat that China, terrorists, and others pose.

    Feb 17, 2015

  • An MQ-1 Predator unmanned aerial vehicle at Balad Air Base, Iraq

    Project

    Dispelling Myths About Armed Drones

    Armed drones have raised hopes among some for a transformational weapon to use against U.S. adversaries, and raised concerns among others about proliferation and misuse. However, drones are fundamentally misunderstood; many of the myths about them can be dispelled.

    Feb 16, 2015

  • People holding mobile phones are silhouetted against a backdrop projected with the Twitter logo

    Commentary

    Decoding the Breach: The Truth About the CENTCOM Hack

    When ISIS hackers hijacked the Twitter account of U.S. Central Command on Jan. 12, they falsely claimed that they had hacked into U.S. military computers. While the incident was embarrassing, it was not concerning in operational military terms. It was, however, damaging to the counterinsurgency against ISIS.

    Feb 3, 2015

  • An exercise at the Joint Cyber Control Center

    Report

    The Other Quiet Professionals: Lessons for Future Cyber Forces from the Evolution of Special Forces

    Both special operations forces and cyber forces are small teams of highly skilled specialists, and both communities value skilled personnel above all else. What lessons can be drawn from a review of the commonalities, similarities, and differences between U.S. cyber forces and early U.S. special forces?

    Oct 3, 2014

  • Tinker Air Force Base Computing Center

    Report

    Cost Considerations in Cloud Computing

    Until the Department of Defense develops official guidance for cost analysis of cloud and data centers, examining cost drivers for several data management approaches can help guide DoD analysts.

    Oct 2, 2014

  • Report

    Report

    Designing Unmanned Systems with Greater Autonomy: Using a Federated, Partially Open Systems Architecture Approach

    Many current unmanned systems (UxSs) employ different communication systems and have limited autonomy, which limit information sharing with warfighters and other UxSs. This report identifies ways to address these limitations.

    Sep 17, 2014

  • Young woman texting in car

    Commentary

    What if Distracted Driving Was Safe?

    According to consumer research, the ability to consume media, write an email, or even sleep during transport is a key selling point for self-driving cars, which could be available in the near future. Autonomous vehicle technology could also produce a wide range of public benefits.

    Jul 1, 2014

  • Line handlers await the arrival of the Virginia class attack submarine USS Hartford

    Commentary

    How Do We Deal with a Flood of Data?

    Despite the battle-tested value of intelligence, surveillance, and reconnaissance (ISR) systems, the amount of data they generate has become overwhelming to Navy analysts. If the Navy does not change the way it processes information, it will reach an ISR “tipping point”—as soon as 2016.

    Jun 23, 2014

  • Customs and Border Protection officer Ballard inspects a motorist's passport at the San Ysidro border crossing between Mexico and the U.S. in San Ysidro, California

    Blog

    Saving Money by Using Advanced DoD Sensors on the U.S. Border

    There is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual counterdrug operation as long as a valid request for support is made by an appropriate law enforcement official and no personally identifiable or private information on U.S. citizens is collected.

    Jun 6, 2014

  • Report

    Report

    The Effectiveness of Remotely Piloted Aircraft in a Permissive Hunter-Killer Scenario

    This report analyzes the operational effectiveness of several new concepts for employing remotely piloted aircraft in a permissive hunter-killer mission.

    May 9, 2014

  • News Release

    News Release

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. Cloud strategies offer promising options.

    May 5, 2014

  • intelligence specialist monitors automatic identification systems aboard the aircraft carrier USS George H.W. Bush

    Report

    'Cloud' System Could Help Navy Analysts Consume Expanding Ocean of Data

    The Navy has a growing demand for intelligence to help Navy vessels avoid collisions, pinpoint targets, and perform other vital tasks. But the amount of data it may collect in the future is more than it can process today. “Cloud” strategies offer promising options.

    May 1, 2014

  • Report

    Report

    Prolonged Cycle Times and Schedule Growth in Defense Acquisition: A Literature Review

    This report summarizes a selection of the defense acquisition literature from the 1960s to the present on potential sources of prolonged acquisition cycle times and schedule growth, as well as potential opportunities for improvement.

    Apr 30, 2014

  • Brochure

    Brochure

    RAND Arroyo Center Annual Report 2013

    Describes RAND Arroyo Center's research activities in FY13 and summarizes noteworthy studies performed throughout the year.

    Apr 23, 2014

  • A U.S. Air Force MQ-1 Predator on its final approach to Indian Springs Auxiliary Field in Nevada

    Report

    Armed and Dangerous? UAVs and U.S. Security

    While armed drones are not truly transformative weapons, they do offer the United States some significant advantages, particularly against enemies that lack air defenses. How the United States uses these weapons today and into the future will be important in shaping a broader set of international norms that discourage their misuse by others.

    Apr 7, 2014