Both Washington insiders and the general public may be inspired by Kathleen McCinnis's The Heart of War. The novel prompts readers to think more realistically about the Pentagon and its role in policymaking.
This Perspective summarizes an examination of the adequacy of the system for governing national security information secrecy. It finds the present secrecy paradigm failing and proposes major reforms in making, protecting, and releasing secrets.
The Office of Cost Assessment and Program Evaluation is required to perform a broad set of cost analysis duties related to major defense acquisition programs but does not always have the resources to fulfill its duties.
RAND Corporation researchers assessed the impact that certain remotely piloted aircraft (RPA) governed by the Missile Technology Control Regime (MTCR) have on U.S. national security interests. In this report, they document their findings.
The Law Enforcement Support Office program is efficient and effectively reuses excess Department of Defense property, but perceptions persist that the program contributes to the militarization of police.
The Department of Defense provides excess equipment—everything from desks to rifles to airplanes—at little or no cost to law enforcement agencies across America. This program is efficient and effective, but there are perceptions that it contributes to the militarization of police.
This report explores the history and politics behind the post-Cold War history of defense reviews to understand how they evolved, what they can and cannot accomplish, and how the services and the Department of Defense can maximize their future use.
Chairman of the Joint Chiefs of Staff Gen. Joe Dunford says that to fight and win 21st century wars, the department should find a way to globally integrate below the secretary of defense. To do so, the chairman's role would have to expand to allow him to advise the secretary on the allocation and transfer of forces for transregional, multi-functional, and multi-domain operations.
The National Defense Authorization Act for Fiscal Year 2017 called for a study of "the prevalence and impact of bid protests on DoD acquisitions," including the systematic collection and analysis of information on their characteristics and outcomes.
What does a secure U.S.-Mexico border look like? And what kind of security measures are needed? Despite investing billions of dollars since 9/11, it's still a struggle to measure how effective U.S. border security operations are.
This report analyzes the obstacles that the Department of Defense (DoD) faces in tracking security cooperation spending and provides recommendations for streamlining DoD's reporting process to meet new requirements for transparency.
RAND notes with regret the death of Zbigniew Brzezinski, former chair of the advisory board of RAND's Center for Middle East Public Policy and exemplary public servant who mastered both the strategic and operational details of national security policy.
The Leahy laws prohibit U.S. assistance to foreign security forces that have committed gross violations of human rights. This report analyzes the vetting process that helps the Department of Defense implement these laws and recommends improvements.
U.S. counterterrorism operations rely on authorizations from 2001 and 2002. This report surveys the debate over requirements for a new authorization, the terrorist challenge, purposes and key elements of such legislation, and congressional options.
RAND researchers reviewed previous research, conducted informational discussions with employment program managers, and identified ways to improve efforts to provide federal job placement and related employment services for reserve component members.
There are 40 federal programs, resources, and offices that provide job placement assistance that can be accessed by reserve component members. There is potential overlap among the programs and clearer guidance on how to navigate them is needed.
The proliferation of legislative authorities for the Department of Defense since September 11, 2001 has created an unwieldy catalog of statutes which generate challenges to DoD security cooperation activities. A new framework and options to streamline the authorities can help DoD's security cooperation efforts.
The existing authorization given to the U.S. military to conduct counterterrorism operations is ill suited to defeat international terrorist organizations such as al Qaeda and the Islamic State of Iraq and the Levant.
The authors examine the Joint Precision Approach and Landing System Inc. 1A Nunn-McCurdy breach and document a methodology that can assess and summarize the overall performance of an acquisition portfolio at a point in time and over several years.
Congress continues to express concerns about weapon system cost growth and is considering multiple acquisition reform proposals for the National Defense Authorization Act. One proposal would hold program managers accountable via a “performance agreement” for key parameters that must be met.