WorldCat Identities

International Security and Defense Policy Center

Works: 288 works in 467 publications in 1 language and 20,822 library holdings
Genres: Conference papers and proceedings  Case studies  History 
Roles: Other
Classifications: UA12, 355.0320973
Publication Timeline
Most widely held works by International Security and Defense Policy Center
The battle behind the wire : U.S. prisoner and detainee operations from World War II to Iraq( )

8 editions published between 2010 and 2011 in English and held by 2,119 WorldCat member libraries worldwide

Although prisoner of war and detainee operations ultimately tend to become quite extensive, military planners and policymakers have repeatedly treated such operations as an afterthought. In reality, such operations can be a central part of the successful prosecution of a conflict. Determining how to gain knowledge from, hold, question, influence, and release captured adversaries can be an important component of military strategy and doctrine, both during the conflict and in reconstruction afterward. This monograph finds parallels in U.S. prisoner and detainee operations in World War II, Korea, Vietnam, and Iraq: underestimation of the number to be held, hasty scrambling for resources to meet operational needs, and inadequate doctrine and policy. During the later phases of military operations, an attempt is often made to educate prisoners and detainees and influence their social and political values. The results of a survey by RAND researchers of Iraq detainees contravene many assumptions that had been guiding decisions related to detainee operations. The survey found that local and personal motives, along with nationalism, were more prevalent than religious ones and that detainees were often economic opportunists rather than illiterates seeking economic subsistence through the insurgency. Recommendations include that detailed doctrine should be in place prior to detention and that detainees should be surveyed when first detained
Securing tyrants or fostering reform? : U.S. internal security assistance to repressive and transitioning regimes by Seth G Jones( )

10 editions published in 2006 in English and held by 2,097 WorldCat member libraries worldwide

This study examines the results of U.S. assistance to the internal security forces of four repressive states: El Salvador, Uzbekistan, Afghanistan, and Pakistan. Efforts to improve the security, human rights, and accountability of security forces appear more likely to succeed in states transitioning from repressive to democratic systems. In addition, several factors are critical for success: the duration of assistance, viability of the justice system, and support and buy-in from the local government (including key ministries)
Occupying Iraq : a history of the Coalition Provisional Authority by Coalition Provisional Authority( )

8 editions published in 2009 in English and held by 2,019 WorldCat member libraries worldwide

"The American engagement in Iraq has been looked at from many perspectives: the flawed intelligence that provided the war's rationale, the failed effort to secure an international mandate, the rapid success of the invasion, and the long ensuing counterinsurgency campaign. This book focuses on the activities of the Coalition Provisional Authority and its administrator, L. Paul Bremer, who governed Iraq from May 2003 to June of the following year. It is based on interviews with many of those responsible for setting and implementing occupation policy, on the memoirs of American and Iraqi officials who have since left office, on journalists' accounts of the period, and on nearly 100,000 never-before-released CPA documents. The book recounts and evaluates the efforts of the United States and its coalition partners to restore public services, reform the judicial and penal systems, fight corruption, revitalize the economy, and create the basis for representative government. It also addresses the occupation's most striking failure: the inability of the United States and its coalition partners to protect the Iraqi people from the criminals and extremists in their midst."--Page 4 of cover
The Royal Navy's new-generation Type 45 destroyer : acquisition options and implications by J. L Birkler( )

4 editions published in 2002 in English and held by 1,412 WorldCat member libraries worldwide

In 2001, RAND helped the United Kingdom_s Ministry of Defence (MOD) evaluate different acquisition strategies that it might use to acquire the new-generation Type 45 destroyer. RAND_s analyses helped in determining whether the MOD should have the Type 45 built by one company or two, whether it should compete the 12 ships in the class or directly allocate work to specific shipbuilders, and whether companies producing the Type 45 should construct the destroyer in its entirety in one shipyard or from blocks produced in several shipyards
Libya after Qaddafi : lessons and implications for the future by Christopher S Chivvis( )

5 editions published in 2014 in English and held by 1,372 WorldCat member libraries worldwide

In 2011, NATO and a number of Arab and other countries backed a rebel overthrow of longstanding Libyan dictator Muammar Qaddafi. When Qaddafi was killed in October, the intervening powers abruptly wrapped up military operations. A small United Nations mission was given responsibility for coordinating post-conflict stabilization support. The essential tasks of establishing security, building political and administrative institutions, and restarting the economy were left almost entirely up to Libya's new leaders. The results of this very limited international approach have been lackluster at best. Libya has fallen behind on a number of critical post-conflict fronts, jihadist groups have made inroads, and there is still a possibility that this newly freed nation could once again collapse into civil war. Although Libya's fate is ultimately in the hands of Libyans themselves, international actors could have done more to help and could still take steps to avert further deterioration of Libya itself as well as the broader region. This report is based on research and interviews with officials in Washington, London, Paris, Brussels, and Tripoli and draws on existing RAND work on post-conflict reconstruction. It explains the challenges that Libya faced after the war, assesses the steps taken to overcome them, draws implications for future post-conflict efforts, and sketches a way forward in Libya itself
Spillover from the conflict in Syria : an assessment of the factors that aid and impede the spread of violence by William Young( )

3 editions published in 2014 in English and held by 1,047 WorldCat member libraries worldwide

Introduction -- Review of the Literature Concerning Conflict Spillover -- Spillover of the Syrian Conflict into Turkey -- Spillover of the Syrian Conflict into Lebanon -- Spillover of the Syrian Conflict into Iraq -- Spillover of the Syrian Conflict into Jordan -- Conclusions and Recommendations
Libya's post-Qaddafi transition the nation-building challenge by Christopher S Chivvis( )

5 editions published in 2012 in English and held by 1,020 WorldCat member libraries worldwide

A year after Qaddafi's death, the light-footprint approach adopted for Libya's postwar transition is facing its most serious test. Security, the political transition, and economic development all present challenges. The security situation requires immediate attention and could worsen still. Until the militias are brought under state control, progress on other fronts will be very difficult to achieve. In most cases, the appropriate approach is a combination of incentives and broad-based negotiation between Tripoli and militia leaders. Only in extreme cases should the use of force be considered. On the political front, Libya and international actors deserve credit for the successful elections in July, but the political challenges ahead are significant. Libya still needs to write a constitution, and in doing so, it must determine the degree to which power is centralized in Tripoli and how to ensure inclusive yet stable governing institutions. Libya also needs to begin rethinking the management of its economy, and especially of its energy resources, to maximize the benefit to its citizens, reduce corruption, and enable private enterprise to flourish in other areas, such as tourism. Libya also needs sustained assistance, mainly technical in nature, from the countries that helped oust Qaddafi lest the transition run off the rails. Despite its role in helping topple Qaddafi, NATO is absent from Libya today. A greater role for the alliance is worth exploring, for example training Libyan security officials and forces and providing technical assistance for security-sector reform. An international Friends of Libya conference on assistance to Libya is warranted. Post-conflict transitions normally span years, and Libya's will be no different. Nevertheless, if current challenges are handled adroitly, Libya could still emerge as a positive force for democratic stability in North Africa and a valuable partner against al-Qaeda
From insurgency to stability by National Defense Research Institute (U. S.)( )

2 editions published in 2011 in English and held by 954 WorldCat member libraries worldwide

This monograph is the first of two volumes that examine how countries confronting insurgencies transition from a high level of violence to a more stable situation. It identifies the procedures and capabilities that the U.S. Department of Defense, other agencies of the U.S. government, U.S. allies and partners, and international organizations require in order to support the transition from counterinsurgency to stability and reconstruction operations. During counterinsurgency, the military takes primary responsibility for security and economic operations, but when the insurgency has been reduced to a level where the state is able to perform its basic functions, police and civilian government agencies take the lead in providing security and services to the population. Successful post-counterinsurgency operations can ensure that lasting peace and stability will follow, rather than a relapse into violence
Russian social media influence : understanding Russian propaganda in Eastern Europe by Todd C Helmus( )

4 editions published in 2018 in English and held by 692 WorldCat member libraries worldwide

"A RAND Corporation study examined Russian-language content on social media and the broader propaganda threat posed to the region of former Soviet states that include Estonia, Latvia, Lithuania, Ukraine, and, to a lesser extent, Moldova and Belarus. In addition to employing a state-funded multilingual television network, operating various Kremlin-supporting news websites, and working through several constellations of Russia-backed "civil society" organizations, Russia employs a sophisticated social media campaign that includes news tweets, nonattributed comments on web pages, troll and bot social media accounts, and fake hashtag and Twitter campaigns. Nowhere is this threat more tangible than in Ukraine, which has been an active propaganda battleground since the 2014 Ukrainian revolution. Other countries in the region look at Russia's actions and annexation of Crimea and recognize the need to pay careful attention to Russia's propaganda campaign. To conduct this study, RAND researchers employed a mixed-methods approach that used careful quantitative analysis of social media data to understand the scope of Russian social media campaigns combined with interviews with regional experts and U.S. and North Atlantic Treaty Organization security experts to understand the critical ingredients to countering this campaign."--Publisher's description
China and the international order by Michael J Mazarr( )

1 edition published in 2018 in English and held by 663 WorldCat member libraries worldwide

The question of how China's rise will affect the post-World War II international order carries considerable significance for the future of global politics. This report evaluates the character and possible future of China's engagement with the postwar order. The resulting portrait is anything but straightforward: China's engagement with the order remains a complex, often contradictory work in progress. This report offers four major findings about the relationship of China to the international order. First, China's behavior over the past two decades does not mark it as an opponent or saboteur of the order, but rather as a conditional supporter. Since China undertook a policy of international engagement in the 1980s, the level and quality of its participation in the order rivals that of most other states. Second, looking forward, the posture China takes toward the institutions, norms, and rules of a shared order is now in significant flux; various outcomes--from continued qualified support to more-aggressive challenges--are possible. Third, partly because of this uncertainty, a strengthened and increasingly multilateral international order can provide a critical tool for the United States and other countries to shape and constrain rising Chinese power. Finally, modifications to the order on the margins in response to Chinese preferences pose less of a threat to a stable international system than a future in which China is alienated from that system. However, these modifications must be governed by strictly articulated end-points
Armed and dangerous? : UAVs and U.S. security by Lynn E Davis( )

5 editions published in 2014 in English and held by 605 WorldCat member libraries worldwide

Armed drones are making the headlines, especially in their role in targeted killings. In this report, RAND researchers stepped back and asked whether these weapons are transformative. The answer is no, though they offer significant capabilities to their users, especially in counterterrorism operations as has been the case for the United States. Will they proliferate? Yes, but upon a closer look at the types of systems, only a few rich countries will be in a position to develop the higher technology and longer range systems. U.S. adversaries and others will likely find weapons such as aircraft and air defenses more cost and militarily effective. Their proliferation will not create the kinds of global dangers that call for new arms control efforts, but the risks to regional stability cannot be dismissed entirely, as is the case of any conventional weapon. How the United States will use these weapons today and into the future will be important in shaping a broader set ofinternational norms that discourage their misuse by others
Using behavioral indicators to help detect potential violent acts : a review of the science base by Paul K Davis( )

4 editions published in 2013 in English and held by 604 WorldCat member libraries worldwide

Government organizations have put substantial effort into detecting and thwarting terrorist and insurgent attacks by observing suspicious behaviors of individuals at transportation checkpoints and elsewhere. This report reviews the scientific literature relating to observable, individual-level behavioral indicators that might-along with other information-help detect potential violent attacks. The report focuses on new or nontraditional technologies and methods, most of which exploit (1) data on communication patterns, (2) "pattern-of-life" data, and/or (3) data relating to body movement and physiological state. To help officials set priorities for special attention and investment, the report proposes an analytic framework for discussion and evaluation; it also urges investment in cost-effectiveness analysis and more vigorous, routine, and sustained efforts to measure real-world effectiveness of methods. One cross-cutting conclusion is that methods for behavioral observation are typically not reliable enough to stand alone; success in detection will depend on information fusion across types of behaviors and time. How to accomplish such fusion is understudied. Finally, because many aspects of using behavioral observations are highly controversial, both scientifically and because of privacy and civil-liberties concerns, the report sharpens the underlying perspectives and suggests ways to resolve some of the controversy while significantly mitigating problems that definitely exist
Counterinsurgency scorecard : Afghanistan in early 2013 relative to insurgencies since World War II by Christopher Paul( )

4 editions published in 2013 in English and held by 602 WorldCat member libraries worldwide

The RAND report Paths to Victory: Lessons from Modern Insurgencies added 41 new cases to a previously studied set of 30 insurgencies, examining the 71 insurgencies begun and completed worldwide between World War II and 2008 to analyze correlates of success in counterinsurgency (COIN). A key finding of this research was that a case's score on a scorecard of 15 equally weighted good and 11 equally weighted bad COIN factors and practices perfectly discriminated the outcomes of the cases analyzed. That is, the balance of good and bad factors and practices correlated with either a COIN win (insurgency loss) or a COIN loss (insurgency win) in the overall case. Using the scorecard approach as its foundation, a RAND study sought to apply the findings to the case of Afghanistan in early 2013. The effort involved an expert elicitation, or Delphi exercise, in which experts were asked to make "worst-case" assessments of the factors to complete the scorecard for ongoing operations in Afghanistan. The consensus results revealed that early 2013 Afghanistan ranks among the historical COIN winners, but its score is equal to those of the lowest-scoring historical wins. This tenuous position points to several areas in need of improvement, but particularly the need to disrupt the flow of insurgent support and the need for the Afghan government and Afghan security forces to better demonstrate their commitment and motivation. Afghanistan in early 2011 scored in the middle of the historical record in terms of COIN wins and losses, suggesting an overall improvement in COIN progress in that conflict by early 2013. However, conditions may change as coalition forces prepare to hand over responsibility for the country's security to the Afghan government and Afghan security forces in 2014
The Rand security cooperation prioritization and propensity matching tool by Christopher Paul( )

4 editions published in 2013 in English and held by 602 WorldCat member libraries worldwide

Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
Improving interagency information sharing using technology demonstrations : the legal basis for using new sensor technologies for counterdrug operations along the U.S. border by Daniel Gonzales( )

4 editions published in 2014 in English and held by 600 WorldCat member libraries worldwide

The Department of Defense (DoD) has developed new sensor technologies to support military forces operating in Iraq and Afghanistan. These new capabilities may be useful in counterdrug (CD) operations along the southern U.S. border. DoD has held technology demonstrations to test and demonstrate new technologies along the southern border--because the field conditions along the border closely resemble those in current military theaters of operation and because they can also reveal whether new technologies are useful for CD operations led by domestic law enforcement agencies. However, there are legal questions about whether such technology demonstrations fully comply with U.S. law and whether advanced DoD sensors can legally be used in domestic CD operations when they are operated by U.S. military forces. In this report, the authors examine federal law and DoD policy to answer these questions. Some parts of U.S. law mandate information sharing among federal departments and agencies for national security purposes and direct DoD to play a key role in domestic CD operations in support of U.S. law enforcement agencies, while other parts of the law place restrictions on when the U.S. military may participate in law enforcement operations. Reviewing relevant federal law and DoD policy, the authors conclude that there is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual CD operation as long as a valid request for support is made by an appropriate law enforcement official and so long as no personally identifiable or private information is collected. The authors recommend DoD policy on domestic CD operations be formally clarified and that an approval process should be established for technology demonstrations with a CD nexus
What works best when building partner capacity and under what circumstances? by Christopher Paul( )

5 editions published in 2012 in English and held by 582 WorldCat member libraries worldwide

The United States has a long history of helping other nations develop and improve their military and other security forces. However, changing economic realities and the ongoing reductions in overall defense spending related to the end of more than a decade of war will affect the funding available for these initiatives. How can the U.S. Department of Defense increase the effectiveness of its efforts to build partner capacity while also increasing the efficiency of those efforts? And what can the history of U.S. efforts to build partner capacity reveal about which approaches are likely to be more or less effective under different circumstances? To tackle these complex questions and form a base of evidence to inform policy discussions and investment decisions, a RAND study collected and compared 20 years of data on 29 historical case studies of U.S. involvement in building partner capacity. In the process, it tested a series of validating factors and hypotheses (many of which are rooted in "common knowledge") to determine how they stand up to real-world case examples of partner capacity building. The results reveal nuances in outcomes and context, pointing to solutions and recommendations to increase the effectiveness of current and future U.S. initiatives to forge better relationships, improve the security and stability of partner countries, and meet U.S. policy and security objectives worldwide
China's foreign aid and government-sponsored investment : scale, content, destinations, and implications by Charles Wolf( )

4 editions published in 2013 in English and held by 572 WorldCat member libraries worldwide

With the world⁰́₉s second largest economy, China has the capacity to engage in substantial programs of economic assistance and government-sponsored investments in 93 emerging-market countries. In the first decade of the 21st century, China has expanded and directed this capacity in these countries for both their benefit and for China⁰́₉s own benefit. Using several data sources and aggregation methods, RAND researchers built a large database, expanding upon prior Congressional Research Service data and enabling the programs to be more fully described and analyzed. Access to the database is available to interested readers who wish to request it from RAND. The RAND research assessed the scale, trends, and composition of these programs in the emerging-market economies of six regions: Africa, Latin America, the Middle East, South Asia, Central Asia, and East Asia. Finally, the research derived inferences and insights from the analysis that may enhance understanding of the programs and policies pertaining to them. In general, China⁰́₉s use of foreign aid and government-sponsored investment activities has burgeoned in recent years, with emphasis on building infrastructure and increasing supplies of natural resources (including energy resources and ferrous and nonferrous minerals). Loans that include substantial subsidies provide financing for many of these programs, but the loans are accompanied by rigorous debt-servicing conditions that distinguish China⁰́₉s foreign aid from the grant financing that characterizes development aid provided by the United States and other nations of the Organization for Economic Cooperation and Development
Imported oil and U.S. national security( Book )

6 editions published in 2009 in English and held by 204 WorldCat member libraries worldwide

"In 2007, on a net basis, the United States imported 58 percent of the oil it consumed. This book critically evaluates commonly suggested links between these oil imports and U.S. national security. The major risk to the United States posed by reliance on oil is the economic costs of a major disruption in global oil supplies. On the other hand, the study found no evidence that oil exporters have been able to use embargoes or threats of embargoes to achieve key political and foreign policy goals. Oil revenues are irrelevant for terrorist groups' ability to launch attacks. The study also assesses the economic, political, and military costs and benefits of potential policies to alleviate challenges to U.S. national security linked to imported oil. Of these measures, the adoption of the following energy policies by the U.S. government would most effectively reduce the costs to U.S. national security of importing oil: (1) Support well-functioning oil markets and refrain from imposing price controls or rationing during times of severe disruptions in supply. (2) Initiate a high-level review of prohibitions on exploring and developing new oil fields in restricted areas in order to provide policymakers and stakeholders with up-to-date and unbiased information on both economic benefits and environmental risks from relaxing those restrictions. (3) Ensure that licensing and permitting procedures and environmental standards for developing and producing oil and oil substitutes are clear, efficient, balanced in addressing both costs and benefits, and transparent. (4) Impose an excise tax on oil to increase fuel economy and soften growth in demand for oil. (5) Provide more U.S. government funding for research on improving the efficiency with which the U.S. economy uses oil and competing forms of energy."--Page 4 of cover
China on the move : a Franco-American analysis of emerging Chinese strategic policies and their consequences for transatlantic relations( Book )

4 editions published in 2005 in English and held by 150 WorldCat member libraries worldwide

This volume is the product of a conference, jointly sponsored by the RAND Corporation and Centre Asie Ifri and summarizes the discussions at the conference, which was held in Paris in June 2003. The chapters in the report were written by researchers from both organizations and subsequently edited to produce a mutually acceptable consensus document. The resulting volume offers U.S. and French views of the evolution of Chinese national security policy and military capabilities in the next two decades. Its aim is to examine the issues through a U.S.-French prism and to facilitate analysis of how to develop U.S.-European cooperation on relations with China
Integrating instruments of power and influence in national security : starting the dialogue by Robert Edwards Hunter( Book )

2 editions published in 2006 in English and held by 117 WorldCat member libraries worldwide

In many areas where U.S. forces are deployed, the use of military power must take place in close coordination and cooperation with non-military instruments of power and influence. There is a clear need for new approaches to this situation on the part of the U.S. government-both civilian and military-as well as the private-sector and nongovernmental organizations. To respond to that need, the RAND Corporation, in cooperation with the American Academy of Diplomacy (AAD), is conducting a 15-month project on Integrating Instruments of Power and Influence in National Security. As part of this project, on March 21, 2006, the AAD and the American University School of International Service, in partnership with RAND, convened a one-day conference devoted to a dialogue on this subject at which two panels of current and former senior military officials and diplomats offered their distinct perspectives. This report summarizes the main results of that conference
moreShow More Titles
fewerShow Fewer Titles
Audience Level
Audience Level
  Kids General Special  
Audience level: 0.15 (from 0.01 for Imported o ... to 0.64 for China on t ...)

Occupying Iraq : a history of the Coalition Provisional Authority
Securing tyrants or fostering reform? : U.S. internal security assistance to repressive and transitioning regimesOccupying Iraq : a history of the Coalition Provisional AuthorityThe Royal Navy's new-generation Type 45 destroyer : acquisition options and implicationsImported oil and U.S. national securityIntegrating instruments of power and influence in national security : starting the dialogue
Alternative Names

ISDP (International Security and Defense Policy Center)


ISDPC (International Security and Defense Policy Center)

National Defense Research Institute (É.-U.). International Security and Defense Policy Center

National Defense Research Institute (U.S.). International Security and Defense Policy Center

RAND Corporation. International Security and Defense Policy Center

Rand Corporation National Security Research Division International Security and Defense Policy Center

English (92)