The National Security Commission on Artificial Intelligence put out an open call for submissions about emerging technology's role in the global order. RAND researchers stepped up to the challenge and submitted a wide range of ideas.
This report presents a historical review of defense strategic planning, with a focus on the factors that have shaped defense planning scenarios and strategic analysis in the Department of Defense in an aim to improve scenario use in defense planning.
In this report, the authors summarize departmental views on the military officer career management policies examined in the two reports required by the 2018 National Defense Authorization Act and provide data to inform potential policy changes.
The 2018 National Defense Authorization Act required an evaluation of the Corporation for the Promotion of Rifle Practice and Firearms Safety and its Civilian Marksmanship Program. This report summarizes the RAND Arroyo Center evaluation.
Both Washington insiders and the general public may be inspired by Kathleen McCinnis's The Heart of War. The novel prompts readers to think more realistically about the Pentagon and its role in policymaking.
This Perspective summarizes an examination of the adequacy of the system for governing national security information secrecy. It finds the present secrecy paradigm failing and proposes major reforms in making, protecting, and releasing secrets.
The Office of Cost Assessment and Program Evaluation is required to perform a broad set of cost analysis duties related to major defense acquisition programs but does not always have the resources to fulfill its duties.
RAND Corporation researchers assessed the impact that certain remotely piloted aircraft (RPA) governed by the Missile Technology Control Regime (MTCR) have on U.S. national security interests. In this report, they document their findings.
The Law Enforcement Support Office program is efficient and effectively reuses excess Department of Defense property, but perceptions persist that the program contributes to the militarization of police.
The Department of Defense provides excess equipment—everything from desks to rifles to airplanes—at little or no cost to law enforcement agencies across America. This program is efficient and effective, but there are perceptions that it contributes to the militarization of police.
This report explores the history and politics behind the post-Cold War history of defense reviews to understand how they evolved, what they can and cannot accomplish, and how the services and the Department of Defense can maximize their future use.
Chairman of the Joint Chiefs of Staff Gen. Joe Dunford says that to fight and win 21st century wars, the department should find a way to globally integrate below the secretary of defense. To do so, the chairman's role would have to expand to allow him to advise the secretary on the allocation and transfer of forces for transregional, multi-functional, and multi-domain operations.
The National Defense Authorization Act for Fiscal Year 2017 called for a study of "the prevalence and impact of bid protests on DoD acquisitions," including the systematic collection and analysis of information on their characteristics and outcomes.
What does a secure U.S.-Mexico border look like? And what kind of security measures are needed? Despite investing billions of dollars since 9/11, it's still a struggle to measure how effective U.S. border security operations are.
This report analyzes the obstacles that the Department of Defense (DoD) faces in tracking security cooperation spending and provides recommendations for streamlining DoD's reporting process to meet new requirements for transparency.
RAND notes with regret the death of Zbigniew Brzezinski, former chair of the advisory board of RAND's Center for Middle East Public Policy and exemplary public servant who mastered both the strategic and operational details of national security policy.
The Leahy laws prohibit U.S. assistance to foreign security forces that have committed gross violations of human rights. This report analyzes the vetting process that helps the Department of Defense implement these laws and recommends improvements.
U.S. counterterrorism operations rely on authorizations from 2001 and 2002. This report surveys the debate over requirements for a new authorization, the terrorist challenge, purposes and key elements of such legislation, and congressional options.