Listing 1 - 10 of 19 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
The story of Ireland's first female steeplejack - a hugely successful businesswoman, who is also a wife, mother and cancer survivor.
Steeple-jacks --- Businesswomen --- Collins O'Mahony, Angela,
Choose an application
Terrorism --- Insurgency --- Social Welfare & Social Work --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Public opinion --- Prevention --- Anti-terrorism --- Antiterrorism --- Counter-terrorism --- Counterterrorism --- Insurgent attacks --- Rebellions --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Civil war --- Political crimes and offenses --- Revolutions --- Government, Resistance to --- Internal security --- Direct action --- Subversive activities --- Political violence --- Terror
Choose an application
Recent U.S. national defense policies have focused on the importance of multinational interoperability to meeting U.S. defense goals. However, even with the attention given to interoperability, the Army is still not interoperable with whom it wants, when it wants. One reason for this, the authors argue, is that policymakers do not have a precise enough understanding of why more and better interoperability is needed. In many ways, "interoperability" is a buzzword often asserted as the solution to an unexplained problem. Or worse, as a tautological argument: The need to be interoperable hinges on the fact that, historically, military forces have been rather terrible at doing so. The authors of this report recount both their literature review and structured interviews with planners and leadership involved in multinational interoperability, focusing on describing the various benefits often ascribed to interoperability. They discuss the values of interoperability across multiple dimensions — shaping the strategic environment, increasing capabilities, and reducing resourcing demands. The authors also suggest strategies for realizing those benefits. The authors aim to clarify the benefits of interoperability and spur conversations so that future decisionmakers can better articulate the intended rationale for investing in interoperability and better weigh the benefits against the significant costs and risks that interoperability might entail.
Choose an application
"This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. A VC, such as Bitcoin, is a digital representation of value that can be transferred, stored, or traded electronically and that is neither issued by a central bank or public authority, nor necessarily attached to a fiat currency (dollars, euros, etc.), but is accepted by people as a means of payment. We addressed the following research questions from both the technological and political-economic perspectives: (1) Why would a non-state actor deploy a VC? That is, what political and/or economic utility is there to gain? How might this non-state actor go about such a deployment? What challenges would it have to overcome? (2) How might a government or organization successfully technologically disrupt a VC deployment by a non-state actor, and what degree of cyber sophistication would be required? (3) What additional capabilities become possible when the technologies underlying the development and implementation of VCs are used for purposes broader than currency?"--Page 4 of printed paper wrapper.
Electronic funds transfers --- National security --- Non-state actors (International relations) --- Terrorism --- Bitcoin --- Banking --- Finance --- Business & Economics --- Political aspects --- Economic aspects --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- NGAs (International relations) --- Non-governmental actors (International relations) --- Nongovernmental actors (International relations) --- Non-state entities (International relations) --- Nonstate entities (International relations) --- Nonstate actors (International relations) --- Digital cash --- Digital currency --- Digital money --- EFT (Electronic funds transfers) --- Electronic banking --- Electronic check clearing --- Electronic money systems --- Electronic payments systems --- Electronic transfer of funds --- Funds, Electronic transfers of --- Telebanking --- Transfers of funds, Electronic --- Virtual money --- Money --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Associations, institutions, etc. --- International relations --- Electronic data interchange --- Electronic benefits transfers --- Home banking services --- Cryptocurrencies --- Electronic currency --- Electronic money --- Virtual currency
Choose an application
Choose an application
"Security cooperation (SC) events should forge strong relationships with U.S. partners, help develop partners' military capabilities and ability to operate with U.S. forces, and facilitate access to foreign countries in the event of a contingency. This report examines U.S. Army SC processes in the Pacific Command area of responsibility to forge stronger links between strategic and tactical levels in the planning and execution of SC activities. Researchers developed a framework to link tactical- and operational-level SC activities with strategic goals and found ways to identify information requirements for units executing SC activities and improve evaluations. Researchers found that planning for SC events could be improved by providing additional clarity in the orders process and strengthened knowledge management to aid tactical planners. SC evaluations at the strategic level could be improved through better specifications of the linkages between SC events and expected outcomes and at the tactical level through process improvements in the conduct and dissemination of after-action reports."--
National security --- Military planning --- Military assistance, American --- Security, International. --- International cooperation --- Planning --- Evaluation. --- United States.
Choose an application
In strategic competition against competitors that can outspend the United States (either individually or collectively), it is important to understand not only the efficacy but also the efficiency of campaigning measures. Unfortunately, neither the efficacy nor efficiency of overseas military campaigning measures beneath the threshold of armed conflict is well understood. In this report, the authors seek to address this gap and provide the foundations of a strategic evaluation and decision-support tool to inform U.S. Department of Defense (DoD) campaign planning—more specifically, to assist in choosing overseas operations, activities, and investments in a logically linked and sequenced plan in support of specific strategy-aligned objectives. The authors break down campaigns into three sets of factors: overseas campaigning instruments (or inputs), campaigning outcomes, and contextual factors that are likely to influence the effectiveness of campaigning instruments. To uncover broad patterns among interactions between the United States and its competitors and allies and partners, the authors conducted statistical analyses on whether U.S. strategic objectives have been more or less likely to be achieved when the United States employs a given overseas campaigning tool. The authors then provide rough-order-of-magnitude (ROM) cost estimates for each overseas campaigning tool. The results suggest stark trade-offs between different U.S. strategic objectives and between the likelihood of realizing U.S. objectives and the need to operate within budget constraints. These trade-offs have important policy implications.
Choose an application
"U.S. Special Operations Command (USSOCOM) executes its mission through a synchronized network of people and technology that provides sustained, persistent, SOF-specific capabilities and capacities and increased persistent forward-deployed presence to support the geographic combatant commands in the execution of their theater campaign plans. Using a multipronged approach, RAND Corporation researchers identified three key operational challenges that forward-deployed personnel have encountered--unity of effort, continuity of effort, and administrative complexity -- and then assessed the extent to which persistent, networked, and distributed (PND) operations can mitigate these challenges. PND operations can address some of these challenges through enhanced theater special operations commands (TSOCs), increased forward-deployed personnel, and enhanced interagency and partner-country partnerships. As a critical element in PND operations, enhanced TSOCs have the potential to greatly improve SOF effectiveness. Some improvements accruing to enhanced TSOCs will stem directly from the higher personnel numbers assigned and the consequent removal of constraints on USSOCOM's ability to engage in the full range of planning and coordination activities. However, the assignment of appropriately trained staff to the TSOCs for extended periods of time is essential in order to ensure that all the gains of more-robust TSOCs are realized. Increased forward deployments also have the potential to enhance the impact of SOF activities. The effect can be substantial if the activities are coordinated with other U.S. efforts and build on prior SOF activities with partner forces"--Publisher's description.
Military planning --- Special forces (Military science) --- Special operations (Military science) --- Unified operations (Military science) --- U.S. Special Operations Command --- U.S. Special Operations Command. --- Operational readiness. --- 2000-2099 --- United States --- United States. --- Armed Forces --- Military policy
Listing 1 - 10 of 19 | << page >> |
Sort by
|