Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This report explores how machine learning can be leveraged to enable military decisionmaking at the operational level of competition and conflict as a collaboration between machine learning tools and human analysts.
The authors examine the evolution of individual augmentation--from a stopgap to standard practice--and the effects on the Navy Reserve in terms of readiness and deployment times, specifically relating to anti-terror operations and the 2019 pandemic.
Using the principles of necessity, effectiveness, and proportionality, the authors develop a framework for evaluating influence operations with an initial screening, conducting a full ethical risk assessment, and preparing a justification statement.
The authors apply the concept of selective overmatch to reevaluate current U.S. cyber operations in light of competition and possible conflict with China and show how this framework can provide a roadmap for U.S. Cyber Command's future operations.
This report provides policymakers and developers of machine learning algorithms with a framework and tools to produce algorithms that are consistent with the U.S. Department of Defense's equity priorities.
Motivated by the future threat to air force command and control networks and forces, the authors identify the demands of future conflicts and consider alternative options for the design of wing-level command and control elements.
The authors of this report examine what streamlining techniques are being used to accelerate U.S. Space Force acquisition, the risks associated with those techniques, their potential impact on mission assurance, and the possible mitigations.
This report identifies approaches to expanding the Air Force's Task Force True North program, which seeks to provide prevention and treatment programs to airmen in need by embedding health care providers directly into units.
Using a framework of 17 indicators, the authors assess and rank potential host nations for Chinese overseas basing and access. They recommend steps to better understand China's overseas plans and to prioritize risks to U.S. forces.
The authors examine three case studies among the United States' competitors to help anticipate what Chinese overseas access and basing might look like in the 2030s while assessing U.S. risks and opportunities posed by Chinese military expansion.
A detailed enumeration of activities, a synthesis of expert consensus on challenges to gray zone competition, and a dynamic menu of solutions can enhance the U.S. competitive position in the gray zone and beyond.
The purpose of this report is to assist Department of Defense decisionmakers called upon to respond to adverse economic shocks by identifying opportunities for improving analysis of shocks and their effects on U.S. defense postures.
The authors analyze how statutes, personnel policies, and resource policies constrain how Air Reserve Component personnel are utilized to perform frequent or long-term active component operational requirements.
In this report, RAND researchers present practical knowledge to inform law enforcement agencies about available broadband options and opportunities, governance issues, funding options, costs, and barriers to implementation.
The zero-based review (ZBR) process described in this report constitutes a transparent, repeatable process with which the U.S. Department of Defense (DoD) can conduct future ZBRs across the DoD cyber enterprise.
Outlining a new approach to the role of the United States in the Middle East, the authors consider a broad range of U.S. security interests and recommend integrated, proactive measures to protect those interests and reduce conflict in the region.
This report, which outlines four battles within Operation Inherent Resolve (OIR) and reviews U.S. ground force contributions to those battles, is intended to address gaps both in analysis and in the common understanding of OIR.
In this report, researchers describe fifth-generation (5G) security and identify where the United States has security advantages or disadvantages relative to China in the 5G competition and how to preserve those advantages.
Information confrontation, with historical roots in Russian (and Soviet) military thinking, is an important element of Russian military strategy. The Ukrainian experience offers insights into Russia's present-day and future use of information confrontation and hybrid warfare.
This report describes gender-based/sexual and race/ethnicity-based harassment and discrimination at the Federal Emergency Management Agency. About one in five employees experienced at least one civil rights violation in the year preceding the survey.
Researchers from the Homeland Security Operational Analysis Center have developed a methodology for understanding and prioritizing cybersecurity risk in election infrastructure to assist state and local election officials.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.