by
Jackson, Brian A., 1972-
Call Number
355.033573 22
Publication Date
2009
Summary
"Concerns about how terrorists might attack in the future are central to the design of security efforts to protect both individual targets and the nation overall. In thinking about emerging threats, security planners are confronted by a panoply of possible future scenarios coming from sources ranging from the terrorists themselves to red-team brainstorming efforts to explore ways adversaries might attack in the future. This paper explores an approach to assessing emerging and/or novel threats and deciding whether, or how much, they should concern security planners by asking two questions: (1) Are some of the novel threats 'niche threats' that should be addressed within existing security efforts? (2) Which of the remaining threats are attackers most likely to execute successfully and should therefore be of greater concern for security planners? If threats can reasonably be considered niche threats, they can be prudently addressed in the context of existing security activities. If threats are unusual enough, suggest significant new vulnerabilities, or their probability or consequences means they cannot be considered lesser included cases within other threats, prioritizing them based on their ease of execution provides a guide for which threats merit the greatest concern and most security attention. This preserves the opportunity to learn from new threats yet prevents security planners from being pulled in many directions simultaneously by attempting to respond to every threat at once."--Page 4 of cover.
Format:
Electronic Resources
Relevance:
2.3705
by
Davis, Lynn E. (Lynn Etheridge), 1943-
Call Number
355.033573 23
Publication Date
2013
Format:
Electronic Resources
Relevance:
2.2205
View Other Search Results
by
Brennan, Richard, 1954-
Call Number
355.450973 21
Publication Date
2002
Summary
RAND Arroyo Center has analyzed US Army Training and Doctrine Command's programme of homeland security games, seminars, and workshops. The issues raised here highlight emerging threats and vulnerabilities to the physical security of the USA.
Format:
Electronic Resources
Relevance:
0.3015
by
Kent, Glenn A., 1915-
Call Number
355.033073 22
Publication Date
2008
Summary
"Lieutenant General Glenn A. Kent was a uniquely acute analyst and developer of American defense policy in the second half of the twentieth century. His 33-year career in the Air Force was followed by more than 20 years as one of the leading analysts at RAND. This volume is not a memoir in the normal sense but rather a summary of the dozens of national security issues in which Glenn was personally engaged over the course of his career. These issues included creating the single integrated operational plan (SIOP), leading DoD's official assessment of strategic defenses in the 1960s, developing and analyzing strategic nuclear arms control agreements, helping to bring new weapon systems to life, and many others. Each vignette describes the analytical frameworks and, where appropriate, the mathematical formulas and charts that Glenn developed and applied to gain insights into the issue at hand. The author also relates his roles in much of the bureaucratic pulling and hauling that occurred as issues were addressed within the government."--Publisher's website.
Format:
Electronic Resources
Relevance:
0.2589
by
Emmerichs, Robert M.
Call Number
355.610973 22
Publication Date
2004
Summary
Workforce planning is an activity intended to ensure that investment in human capital results in the timely capability to effectively carry out an organization's strategic intent. This report examines the purposes of workforce planning, identifies key factors contributing to successful workforce planning, and describes a RAND-developed process for conducting workforce planning.
Format:
Electronic Resources
Relevance:
0.2490
by
Mulvenon, James C., 1970-
Call Number
355.033551 22
Publication Date
2006
Summary
Over the past decade, Chinese military strategists have keenly observed changes in U.S. national strategy and military transformation. The acceleration of its own military modernization suggests that China is not dissuaded by U.S. military prowess but instead is driven by a range of strategic and military motivations to keep pace. This report examines the constraints, facilitators, and potential options for Chinese responses to U.S. transformation efforts, especially with respect to whether Taiwan moves toward or away from formal independence. The authors focus on four areas of counter-transformation options that China may pursue (which most likely would include all or portions of each strategy): Conventional Modernization "Plus"; Subversion, Sabotage, and Information Operations; Missile-Centric Strategies; and Chinese Network-Centric Warfare. The path China takes will depend on its key national security goals and the political and economic context within which these goals are pursued. That said, the authors offer possible U.S. counterresponses to such courses of action (e.g., planning defensive measures, augmentation of network-centric platforms) and emphasize that the ultimate "victor" of transformation will be that nation with the best combination of surprise, error control, fortune, and highly trained people.
Format:
Electronic Resources
Relevance:
0.2411
by
Birkler, J. L., 1944-
Call Number
355.033273 21
Publication Date
1998
Summary
The process of modernizing U.S. military forces is the focus of this report. This process requires reinvigorating concept development efforts, thinking broadly about alternatives, and pursuing concept development before decisions are made about which services, which platforms, or which technologies are best suited for accomplishing current or new military tasks. In February and March 1996, RAND convened a concept options group (COG), which included broadly knowledgeable technologists drawn from a variety of scientific and engineering backgrounds, experienced military operators, and senior analysts and planners. By focusing on two specific military tasks, the COG considered options for using technologies that could enable U.S. forces to perform an existing military mission better, perform it differently, or gain a new capability. This report presents highlights from the COG discussions as well as some suggestions for convening future COGs.
Format:
Electronic Resources
Relevance:
0.2212
by
Emmerichs, Robert M.
Call Number
355.6212 22
Publication Date
2004
Summary
Workforce planning is an activity intended to ensure that investment in human capital results in the timely capability to effectively carry out an organization's strategic intent. This report examines how corporate executives can provide guidance from the top of the organization to the business units that actually carry out the organization's activities so that the strategic is successfully realized.
Format:
Electronic Resources
Relevance:
0.2156
by
Hosek, James R.
Call Number
355.2230973 21
Publication Date
1998
Summary
Manpower constitutes a vital element of the nation's defense capability, one that must be sustained if tomorrow's force is to be ready for the wide set of contingencies currently envisioned in the post-Cold War world. The authors focus on a key aspect of this concern: the effect of recent personnel tempo, or perstempo, on reenlistment. They develop several new measures of perstempo as well as construct a theoretical model of retention that encompasses the effects of perstempo. They report that limited episodes of long separation or hostile duty positively affect the decision to stay by first-term or early-career service members. However, more extensive duty, especially if it is hostile, can reduce this positive effect; in some cases, long or hazardous duty reduces reenlistment below what it would have been in the absence of such duty. The authors also recommend new methods of data collection and analysis, and propose future studies that would enhance retention.
Format:
Electronic Resources
Relevance:
0.2056
by
Johnson, David E. (David Eugene), 1950-
Call Number
355.684 22
Publication Date
2009
Summary
"The difficult and continually evolving operations in Iraq and Afghanistan show the complexities of what is now termed irregular warfare and highlight the need for new approaches to the security challenges with which the United States is now contending and will likely confront in the future. The research reported in this monograph focused on answering a rather straightforward, but thus far largely unanswered, question: What can the U.S. military learn from other militaries about how better to prepare for full-spectrum operations and deployments? To this end, RAND was asked by the OSD for Personnel and Readiness to examine the militaries of China, France, the UK, India, and Israel."--Page xiii.
Format:
Electronic Resources
Relevance:
0.1968
by
Samaras, Constantine.
Call Number
355.70681 23
Publication Date
2013
Summary
Key findings -- Acknowledgments -- Glossary -- Introduction -- Legislative background on life-cycle cost analysis for military construction -- Study motivation and research approach -- Outline of this report -- DoD facility development, construction and operating process and barriers to -- Life-cycle cost-effectiveness -- Incentives and barriers to life-cycle cost-effectiveness at each step of the military -- Construction process -- Role of building codes in determining construction material -- The role of the international building code and building types -- Tradeoffs between annual O & M costs and initial capital costs -- Conclusions and observations -- DoD is currently incorporating life-cycle costing in many aspects of the MILCON -- Process -- Challenges in obtaining life-cycle cost effective facilities -- Observations and potential improvements -- Appendix A: RAND interview protocol used in this research -- Appendix B: Navy MILCON team planning and programming process diagram -- Appendix C: Sample U.S. Army DD Form 1391, from USACE.
Format:
Electronic Resources
Relevance:
0.1705
Limit Search Results