Listing 1 - 6 of 6 |
Sort by
|
Choose an application
In this report, the authors examine Russian arms exports and the impact of sanctions designed to discourage third country purchases and raise the cost of future Russian malign interference in other nation-states. The authors draw from publicly available information compiled in a database to illustrate when U.S. diplomatic engagement or the prospect of U.S. sanctions has led third countries to reconsider importing Russian weapons. The data set used for this report contains 65 cases in 33 countries of Russian arms export negotiations and sales, beginning in July 2017 and ending in May 2021; these cases illustrate that, as U.S. officials acknowledge, the monetary value of lost Russian arms sales due to U.S. diplomatic efforts buttressed by the prospect of third-party sanctions is difficult to determine with precision. However, there are several examples of countries that clearly entertained purchasing Russian weapons and then, because of the chilling effect of possible sanctions, demurred and opted not to do so. Analysis of these cases indicates that diplomatic outreach to arms-buying countries will likely be most effective when it acknowledges the legacy of Russian arms exports; the desire to assert independence from Russia and/or the United States; and the availability of suitable, competitively priced alternatives to meet buyers' security needs. To better meet the objectives of the Countering America's Adversaries Through Sanctions Act (CAATSA), the United States must ensure that foreign officials and publics receive a narrative focused mainly on the harm caused by Russian malign behavior rather than the threat of U.S. sanctions.
Choose an application
Strategic competition is a long game between those with a vested interest in preserving the international order of rules and norms dating back to the post-World War II era and revisionist powers seeking to disrupt or reshape this order. The gray zone occupies a position with blurred boundaries on the spectrum from cooperation to competition and then conflict. Gray zone activities provide a strategic advantage for one competitor while complicating the response calculus of another. This is because competition in the gray zone is characterized by incrementalism, deception, and ambiguity, all of which make it difficult to decipher what is occurring, who is responsible, and how an action supports broader or longer-term interests. Competitors gain an advantage when they can harness all elements of national power-diplomatic, information, military, and economic-but success hinges on the effective use of the information environment, in particular. There is emerging consensus that the United States needs to reject the traditional notion that peace and war are dichotomous states. Competition today occurs in the space between. To mount an effective response to adversary activities in the gray zone, it is important to understand how adversaries leverage information, the ends that gray zone activities serve, and the capabilities and authorities needed to respond to them. This report offers a detailed enumeration of gray zone activities that support competition, a synthesis of expert consensus on challenges to gray zone competition, and a dynamic menu of solutions to enhance the U.S. competitive position in the gray zone and beyond.
Choose an application
Russia’s manipulation of Ukraine in the post-Soviet period, which culminated in a large-scale invasion in 2022, demonstrated that Russia was willing to resort to all means necessary to secure a regional sphere of influence that included Ukraine. But events could have turned out differently. Russia and Ukraine share historical, cultural, religious, and interpersonal ties. Russia in the early 1990s appeared to be on a path toward democratization and constructive relations with its neighbors and the rest of Europe. Many Ukrainians also saw their future as an independent country that was part of a greater Europe in some form. Given the alignment of national interests in the early days of the post–Cold War era, conflict appeared far from inevitable. How did things go so wrong? Using the concept of national identity as a starting point, RAND researchers developed a framework in an effort to illuminate the underlying causes of Russian manipulation, Ukrainian resistance, and the Russia-Ukraine war.
Political culture --- Nationalism --- Russo-Ukrainian War, 2014 --- -Russian Invasion of Ukraine, 2022. --- Group identity --- International Affairs --- Russia --- Ukraine --- Nationalisme --- Guerre russo-ukrainienne, 2014 --- -Invasion russe de l'Ukraine, 2022 --- -Identité collective --- Since 2014 --- Russia (Federation) --- Foreign relations --- Relations extérieures
Choose an application
In the contemporary era marked by informational competition, one of the most important activities of a strategic or operational command is the development, presentation, and support of the command's narratives. Drawing on the scientific literature and lessons learned from the joint force, the authors of this report describe best practices for the effective use of command narrative. While this research is primarily aimed at the geographic combatant commands, it should be of interest to any military command that needs to ensure that words and actions from the command are in harmony and support operational goals. To make the recommendations of the study as accessible as possible to practitioners, the project produced not only this report but also a four-page quick reference Smart Guide that provides definitions, summary guidance for developing a narrative, and a checklist for assessing the quality of the output of the narrative development process.
Choose an application
The Transportation Worker Identification Credential (TWIC®) is one of multiple measures that the Maritime Transportation Security Act (MTSA) introduced to enhance security at U.S. ports. Anyone with unescorted access to a secure area at an MTSA-regulated facility, vessel, or outer continental shelf (OCS) facility must have a TWIC. Congress established TWIC to help prevent transportation security incidents. TWIC's primary function is to establish that the holder has passed a Transportation Security Administration (TSA) security threat assessment (STA); the TWIC card can also serve as identification. Each secure area at each regulated location must maintain an access control program and verify three things at every access point: identity, presence and validity of the TWIC card, and whether the person has a business purpose at that facility. Currently, facilities are required only to conduct visual verification of the TWIC card, either at each time of entry or at time of enrollment into a facility physical access control system (PACS). A pending regulation, which we call the TWIC-reader rule, would require that any high-risk facility electronically inspect the card and, using biometrics, match it to the holder. The governing legislation requires that an assessment of TWIC determine the program's value in mitigating the risk of terrorism and crime at ports. The U.S. Department of Homeland Security commissioned the Homeland Security Operational Analysis Center to complete that comprehensive assessment. In this report, the authors establish factors that increase or decrease TWIC's security value and determine what TWIC's value would need to be to offset the costs of establishing further access control requirements for facilities.
Choose an application
A 2016 U.S. Coast Guard (USCG) regulation, "Transportation Worker Identification Credential (TWIC)-Reader Requirements," requires certain maritime facilities determined to be of high risk to use electronic and biometric access control programs in the facilities' secure areas. The final version of this rule, known as the final reader rule, has been delayed (from 2020) until May 8, 2023, for three categories of facilities that handle certain dangerous cargoes (CDCs) in bulk. The USCG asked the Homeland Security Operational Analysis Center to reestimate the population of such regulated facilities that could be subject to the final reader rule delay, develop an objective risk assessment model for these facilities, and conduct a cost-benefit analysis of the regulation. This report describes the researchers' analytical efforts to address these three research areas. Because there is no database of Maritime Transportation Security Act-regulated facilities that has all the requisite information about CDCs that facilities handle in bulk, the researchers resorted to other data sources, such as the U.S. Environmental Protection Agency's databases, an online survey, and interviews, to estimate the facility population. For the facility risk model, they used the modeling approach for assessing potential consequence included in the risk engine of the Cybersecurity and Infrastructure Security Agency's Chemical Facility Anti-Terrorism Standards (CFATS) program, harmonizing the TWIC and CFATS programs in consequence assessment. Because there was no credible estimate for the probability of a transportation security incident, the researchers used a break-even analysis to assess whether the final reader rule is cost-effective.
Identification cards --- Marine terminals --- Ports of entry --- Harbors --- Hazardous substances --- Terrorism --- Access control --- Management --- Security measures --- Transportation --- Prevention --- United States.
Listing 1 - 6 of 6 |
Sort by
|