Listing 11 - 20 of 20 << page
of 2
>>
Sort by

Book
Developing, Disseminating, and Assessing Command Narrative: Anchoring Command Efforts on a Coherent Story
Authors: --- --- --- --- --- et al.
Year: 2021 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the contemporary era marked by informational competition, one of the most important activities of a strategic or operational command is the development, presentation, and support of the command's narratives. Drawing on the scientific literature and lessons learned from the joint force, the authors of this report describe best practices for the effective use of command narrative. While this research is primarily aimed at the geographic combatant commands, it should be of interest to any military command that needs to ensure that words and actions from the command are in harmony and support operational goals. To make the recommendations of the study as accessible as possible to practitioners, the project produced not only this report but also a four-page quick reference Smart Guide that provides definitions, summary guidance for developing a narrative, and a checklist for assessing the quality of the output of the narrative development process.

Keywords


Book
Detecting conspiracy theories on social media : improving machine learning to detect and understand online conspiracy theories
Authors: --- --- --- --- --- et al.
Year: 2021 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Conspiracy theories circulated online via social media contribute to a shift in public discourse away from facts and analysis and can contribute to direct public harm. Social media platforms face a difficult technical and policy challenge in trying to mitigate harm from online conspiracy theory language. As part of Google's Jigsaw unit's effort to confront emerging threats and incubate new technology to help create a safer world, RAND researchers conducted a modeling effort to improve machine-learning (ML) technology for detecting conspiracy theory language. They developed a hybrid model using linguistic and rhetorical theory to boost performance. They also aimed to synthesize existing research on conspiracy theories using new insight from this improved modeling effort. This report describes the results of that effort and offers recommendations to counter the effects of conspiracy theories that are spread online.


Book
China's AI Exports: Developing a Tool to Track Chinese Development Finance in the Global South — Technical Documentation
Authors: --- --- --- --- --- et al.
Year: 2023 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

With average annual commitments reaching

Keywords


Book
Considerations for integrating women into closed occupations in U.S. special operations forces
Authors: --- --- --- --- --- et al.
ISBN: 9780833093462 0833093460 9780833092670 0833092677 Year: 2016 Publisher: Santa Monica : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"The elimination of the Direct Ground Combat Definition and Assignment Rule has opened to women some 15,500 special operations forces (SOF) positions. A RAND study helped to inform that decision and provides insight into the key factors surrounding the integration of women into SOF. The integration of women raises issues pertinent to the effectiveness of SOF teams, in terms of physical standards and ensuring readiness, cohesion, and morale. This report assesses potential challenges to the integration of women into SOF for unit cohesion and provides analytical support in validating SOF occupational standards for positions controlled by U.S. Special Operations Command. The report summarizes the history of integration of women into the U.S. armed forces, reviews the current state of knowledge about cohesion in small units, and discusses the application of gender-neutral standards to SOF. The report identifies widely agreed-on professional standards for the validation of physically demanding occupations and assists SOF service components with the application of these standards to SOF occupations. The report also discusses the primary data -- a survey of SOF personnel and a series of focus group discussions -- collected by the research team regarding the potential challenges to the integration of women into SOF. The report then presents recommendations regarding the implementation process of integrating women into SOF"--Back cover.

Keywords

Women in combat --- Special operations (Military science) --- Special forces (Military science) --- E-books --- Unconventional warfare --- Military art and science --- Raids (Military science) --- Combat --- Women soldiers --- United States. --- AB --- ABSh --- Ameerika Ühendriigid --- America (Republic) --- Amerika Birlăshmish Shtatlary --- Amerika Birlăşmi Ştatları --- Amerika Birlăşmiş Ştatları --- Amerika ka Kelenyalen Jamanaw --- Amerika Qūrama Shtattary --- Amerika Qŭshma Shtatlari --- Amerika Qushma Shtattary --- Amerika (Republic) --- Amerikai Egyesült Államok --- Amerikanʹ Veĭtʹsėndi͡avks Shtattn --- Amerikări Pĕrleshu̇llĕ Shtatsem --- Amerikas Forenede Stater --- Amerikayi Miatsʻyal Nahangner --- Ameriketako Estatu Batuak --- Amirika Carékat --- AQSh --- Ar. ha-B. --- Arhab --- Artsot ha-Berit --- Artzois Ha'bris --- Bí-kok --- Ē.P.A. --- EE.UU. --- Egyesült Államok --- ĒPA --- Estados Unidos --- Estados Unidos da América do Norte --- Estados Unidos de América --- Estaos Xuníos --- Estaos Xuníos d'América --- Estatos Unitos --- Estatos Unitos d'America --- Estats Units d'Amèrica --- Ètats-Unis d'Amèrica --- États-Unis d'Amérique --- Fareyniḳṭe Shṭaṭn --- Feriene Steaten --- Feriene Steaten fan Amearika --- Forente stater --- FS --- Hēnomenai Politeiai Amerikēs --- Hēnōmenes Politeies tēs Amerikēs --- Hiwsisayin Amerikayi Miatsʻeal Tērutʻiwnkʻ --- Istadus Unidus --- Jungtinės Amerikos valstybės --- Mei guo --- Mei-kuo --- Meiguo --- Mî-koet --- Miatsʻyal Nahangner --- Miguk --- Na Stàitean Aonaichte --- NSA --- S.U.A. --- SAD --- Saharat ʻAmērik --- SASht --- Severo-Amerikanskie Shtaty --- Severo-Amerikanskie Soedinennye Shtaty --- Si͡evero-Amerikanskīe Soedinennye Shtaty --- Sjedinjene Američke Države --- Soedinennye Shtaty Ameriki --- Soedinennye Shtaty Severnoĭ Ameriki --- Soedinennye Shtaty Si͡evernoĭ Ameriki --- Spojené obce severoamerick --- Spojené staty americk --- SShA --- Stadoù-Unanet Amerika --- Stáit Aontaithe Mheirice --- Stany Zjednoczone --- Stati Uniti --- Stati Uniti d'America --- Stâts Unîts --- Stâts Unîts di Americhe --- Steatyn Unnaneysit --- Steatyn Unnaneysit America --- SUA --- Sŭedineni amerikanski shtati --- Sŭedinenite shtati --- Tetã peteĩ reko Amérikagua --- U.S. --- U.S.A. --- United States of America --- Unol Daleithiau --- Unol Daleithiau America --- Unuiĝintaj Ŝtatoj de Ameriko --- US --- USA --- Usono --- Vaeinigte Staatn --- Vaeinigte Staatn vo Amerika --- Vereinigte Staaten --- Vereinigte Staaten von Amerika --- Verenigde State van Amerika --- Verenigde Staten --- VS --- VSA --- Wááshindoon Bikéyah Ałhidadiidzooígí --- Wilāyāt al-Muttaḥidah --- Wilāyāt al-Muttaḥidah al-Amirīkīyah --- Wilāyāt al-Muttaḥidah al-Amrīkīyah --- Yhdysvallat --- Yunaeted Stet --- Yunaeted Stet blong Amerika --- ZDA --- Združene države Amerike --- Zʹi͡ednani Derz͡havy Ameryky --- Zjadnośone staty Ameriki --- Zluchanyi͡a Shtaty Ameryki --- Zlucheni Derz͡havy --- ZSA


Book
Insights from the Bin Laden Archive: Inventory of research and knowledge and initial assessment and characterisation of the Bin Laden Archive
Authors: --- --- --- --- --- et al.
Year: 2021 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

In 2017, the United States Central Intelligence Agency (CIA) disclosed approximately 470,000 files recovered in Abbottabad, Pakistan, during the 2011 raid on Osama Bin Laden's compound. According to the CIA, this collection — the Bin Laden Archive — comprises a wide array of original files from devices collected during the Abbottabad raid that are presumed to have belonged to Osama Bin Laden and other occupants of the compound. Despite the potential insights that this archive stands to offer, limited research into its data and materials has been published to date in the public domain. More broadly, publicly available research conducted so far has entailed a qualitative review of only a selected number of files and documents. In December 2018, the Research and Documentation Centre (Wetenschappelijk Onderzoek- en Documentatiecentrum, WODC) of the Dutch Ministry of Justice and Security (Ministerie van Justitie en Veiligheid) commissioned RAND Europe to conduct a study aiming to (1) inventory current knowledge on Al Qa'ida and completed and ongoing research on the Bin Laden Archive and (2) conduct an initial assessment and characterisation of the Bin Laden Archive.

Keywords


Book
Air Force sexual assault situations, settings, and offender behaviors

Loading...
Export citation

Choose an application

Bookmark

Abstract

"To assist Air Force efforts to prevent and respond to sexual assault, this report focuses on providing a better understanding of sexual assaults committed by airmen, including suspect characteristics and behaviors, the suspect's relationship to the victim, victim characteristics, the settings and circumstances of sexual assaults, and behavior and justifications following sexual assaults. To do so, the researchers analyzed investigation and court-martial records from closed cases of convicted and other alleged Air Force sexual assault offenders. The cases included offenders who took advantage of norms of group socializing with alcohol, trust in fellow airmen, and responsible drinking and driving to create situations that facilitate sexual assault. Some victims and suspects were confused about whether certain behaviors constitute sexual assault, such as first attempts to initiate sexual activities with dates or friends, unwanted acts that followed consensual sexual behavior, or actions of highly intoxicated individuals. Notably, although far less common, reported offenders who sexually assaulted their spouses had typically also harmed others, tended to have behavioral and emotional problems, and had previously caught the attention of Air Force authorities. After a sexual assault, offenders may apologize and attempt to persuade the victim or others to forgive them and not report them to authorities. This report concludes by describing how these sexual assault data complement other sources and by providing recommendations related to the themes identified in this analysis."--Publisher's description.


Book
Mapping White Identity Terrorism and Racially or Ethnically Motivated Violent Extremism : A Social Network Analysis of Online Activity.
Authors: --- --- --- --- --- et al.
Year: 2022 Publisher: Santa Monica : RAND Corporation, The,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Racially or ethnically motivated violent extremism (REMVE) and extremists (REMVEs) present some of the most pressing threats to the United States. REMVE also has been identified as the White identity terrorist movement (WITM). REMVEs are among the most lethal domestic violent extremists, and they are the most likely to commit mass-casualty attacks. These movements are characterized by a broad ideological orientation toward xenophobic, anti-Semitic, racist, and misogynistic sentiment. For this report, the authors reviewed the relevant literature on REMVE networks and collected and analyzed social media data from six social networks (Twitter, Reddit, Gab, Ruqqus, Telegram, and Stormfront) to produce a global network map of the digital REMVE space. That network map evaluates each network's construction, connectivity, geographic location, references to prominent organizations, and proclivity to violence. The authors also reviewed ten countries' experiences with REMVE to sketch out an understanding of the REMVE space in these countries and how REMVEs in those countries relate to those in the United States.


Book
Will to fight : analyzing, modeling, and simulating the will to fight of military units

Loading...
Export citation

Choose an application

Bookmark

Abstract

Will to fight may be the single most important factor in war. The U.S. military accepts this premise: War is a human contest of opposing, independent wills. The purpose of using force is to bend and break adversary will. But this fundamental concept is poorly integrated into practice. The United States and its allies incur steep costs when they fail to place will to fight at the fore, when they misinterpret will to fight because it is ill-defined, or when they ignore it entirely. This report defines will to fight and describes its importance to the outcomes of wars. It gives the U.S. and allied militaries a way to better integrate will to fight into doctrine, planning, training, education, intelligence analysis, and military adviser assessments. It provides (1) a flexible, scalable model of will to fight that can be applied to any ground combat unit and (2) an experimental simulation model.


Book
Monitoring social media : lessons for future Department of Defense social media analysis in support of information operations

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Social media analysis is playing an important and increasing role in advertising and academic research, but it also has significant potential to support military information operations by providing a window into the perspectives, thoughts, and communications of a wide range of relevant audiences. Although there are compelling national security reasons to field a social media analysis capability, the U.S. Department of Defense (DoD) must do so while navigating U.S. law and cultural norms and under conditions of great uncertainty. Existing legal and policy frameworks have not anticipated the rapid pace and global reach of modern communication networks, and questions of cost and implementation hinder the development of a robust social media analysis capability and the most fruitful applications for these analyses. To support DoD's assessment of the benefits, trade-offs, and implementation challenges that it will face as it expands its capacity for social media analysis, this report reviews the analytic approaches that will be most valuable for information operations, as well as legal, ethical, policy, technological, and training considerations. It also includes a set of recommendations to help DoD navigate this terrain while building a robust, effective social media analysis capability to support operations worldwide."--Publisher's description.


Book
China's AI exports : technology distribution and data safety

Loading...
Export citation

Choose an application

Bookmark

Abstract

In recent years, China's aspiration for global technology leadership has driven its significant investments in artificial intelligence (AI) for national security, economic growth, and societal well-being. Although there is increasing research and analysis on China's domestic AI development ecosystems and drivers, the details of China's development-financed AI exports remain elusive. Despite being the single-largest provider of foreign development assistance, Beijing does not participate in aid or debt transparency initiatives. To address this gap, researchers from the RAND Corporation and AidData jointly built a new database on China's AI export projects that are funded with official development financing: China's AI Exports Database (CAIED). CAIED uses data from multiple public databases and indexes related to China's global financing and recipient countries' electoral democracy, freedom, and data protection and privacy status. In this report, the authors analyze this quantitative dataset — adding qualitative country case studies based on interviews and social media analysis — to examine the distribution, technology, financing, and data safety aspects of China's AI exports.

Listing 11 - 20 of 20 << page
of 2
>>
Sort by