Narrow your search

Library

Vlaams Parlement (9)


Resource type

book (9)


Language

English (9)


Year
From To Submit

2023 (6)

2022 (1)

2021 (2)

Listing 1 - 9 of 9
Sort by

Book
Countering violent nonstate actor financing : revenue sources, financing strategies, and tools of disruption
Authors: --- ---
Year: 2023 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Violent nonstate actors (VNSAs) obtain money from multiple sources, both licit (e.g., donations and legitimate businesses) and illicit (e.g., extortion, smuggling, theft). They use that money to pay, equip, and sustain their fighters and to provide services to local populations, which can help build support for the groups, allowing them to extract resources, gain safe havens, and challenge state authority and territorial control. In this way, financial resources can prolong conflicts and undermine stabilization efforts after the fighting ends. Countering VNSA financing plays a critical role in degrading such organizations. Various means are available to disrupt financing. These include kinetic means, such as destroying resources or neutralizing leadership, and nonkinetic means, such as targeted financial sanctions and legal remedies. The counter–threat financing (CTF) tools that work best for transnational groups may not work as well for national ones, and some tools may prove counterproductive in certain situations. Which tools to use in a given case is not always obvious. The authors draw lessons from efforts against five VNSA groups to discover, in each case, how they financed their activities and for what purposes, as well as which methods to counter this financing worked best and which were counterproductive. The authors then consider what the U.S. Army can do to support counter–terrorism financing efforts.


Book
Understanding and Reducing the Ability of Violent Nonstate Actors to Adapt to Change
Authors: --- --- --- --- --- et al.
Year: 2022 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

Violent nonstate actors (VNSAs) - terrorist groups, drug trafficking organizations, and others - are increasingly part of the environment in which the Army and other government forces operate. Such organizations pose durable and direct threats to U.S. security interests. The capacity of VNSAs to wage war, inflict violence, and engage in vast transnational criminal activity make them a persistent danger. Countering these organizations is difficult because they are generally flexible and structured in ways that facilitate their ability to adapt to changes occurring within their operational environments and, in some cases, beyond. This report summarizes research into how VNSAs adapt to changes in their operational environments and provides recommendations on how the Army might anticipate such adaptations and mitigate them before they occur. The authors have drawn from a series of historical case studies and relevant literature to offer insights on the most common VNSA adaptations and means of detecting and mitigating each. Among other observations, the authors note that VNSAs reach their peak adaptive capacity within the first five years of their existence but that not all VNSAs have the same level of adaptive capacity.

Keywords


Book
In the Wreckage of ISIS: An Examination of Challenges Confronting Detained and Displaced Populations in Northeastern Syria
Authors: --- --- ---
Year: 2023 Publisher: RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

The territorial defeat of the Islamic State of Iraq and Syria (ISIS) left millions of Iraqi and Syrian civilians displaced, along with the families of Syrian, Iraqi, and foreign ISIS fighters. A significant share of the families of ISIS fighters resides in two internally displaced person camps located in northeastern Syria, al-Hol and Roj, intermingled with Syrian and Iraqi civilians. There are open questions about the futures of the residents of these camps and the implications of housing innocent, displaced residents alongside or adjacent to the families of ISIS fighters. One of the most significant challenges of this arrangement is the need to limit the spread of extremist ideology and ISIS recruitment among the children of ISIS fighters' families and other civilians. In this report, the authors examine the humanitarian and security conditions in these camps, address the potential impact on ISIS recruitment, and highlight critical challenges in the need to return these displaced residents to their home communities and countries. They also offer recommendations to improve living conditions in al-Hol and Roj, address the legal and judicial conundrums facing foreigners living in the camps, and mitigate the threat of radicalization from the residents within the camps.

Keywords


Book
Defense planning implications of climate change for U.S. Central Command

Loading...
Export citation

Choose an application

Bookmark

Abstract

Over the coming decades, stressors from climate change will become more intense and more frequent in the U.S. Central Command (CENTCOM) area of responsibility (AOR). This development will likely contribute to CENTCOM's broader shift from a warfighting-focused command to a command that will have to reprioritize and balance how it responds to and conducts both traditional and nontraditional security missions. This report addresses how CENTCOM planners can use operations, activities, and investments to prevent — or mitigate the intensity of — climate-related conflict. Climate change, along with other transnational threats, is often discussed as part of a broader concept known as nontraditional security. Many of the threats that are part of the nontraditional security concept, such as infectious disease and large-scale migration, are exacerbated by climate change. This report examines which traditional military tools can be applied to this nontraditional security threat and which new tools can be developed to address the implications of climate change for CENTCOM. The aim of this report is to help CENTCOM planners prepare for a future security environment that is affected by climate change. Even with preventive action, the command will face additional requirements from climate stress. To provide context for resource prioritization discussions, this report presents an analysis of the frequency and the conditions under which the United States has traditionally intervened militarily in the CENTCOM theater and rough order of magnitude costs of interventions by type. This report is the fifth and final in a series focused on climate change and the security environment.


Book
An analysis of alternative approaches to measuring multinational interoperability : early development of the Army Interoperability Measurement System (AIMS)
Authors: --- --- --- --- --- et al.
Year: 2021 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

The National Defense Strategy (NDS) emphasizes the need for U.S. forces to be interoperable with capable allies and partners. To support the NDS, the U.S. Army develops and executes doctrine and guidelines for how its units can achieve interoperability with partners. The Army identified a need to develop an overarching concept for interoperability that includes explicit links between current Army multinational interoperability doctrine and mission command doctrine. Concurrently, it wanted an enduring and standardized way to measure levels of interoperability achieved as a result of major training events. To that end, the Army asked RAND Arroyo Center to conduct an analysis of alternatives (AoA) of interoperability measurement systems. Researchers looked at eight different approaches, gathering and analyzing data from a review of materials provided by representatives for each approach and information from multiple rounds of interviews with representatives. No single approach addressed all dimensions identified as important for a future system, so a completely new approach was proposed, drawing on strengths and eliminating weaknesses from other approaches analyzed. The Army decided to develop a new system — the Army Interoperability Measurement System (AIMS), which includes a quantitative instrument for measuring interoperability levels, a qualitative component to enable capability gap analysis, an automated approach to connect and analyze the data, and exploitation panels that convene immediately following a training exercise. The authors document their AoA, present the supporting evidence for their measurement system recommendations, and details the early development of AIMS.


Book
A Review of U.S. Army Non-Materiel Capability-Development Processes
Authors: --- --- --- --- --- et al.
Year: 2021 Publisher: Santa Monica, Calif. RAND Corporation

Loading...
Export citation

Choose an application

Bookmark

Abstract

The U.S. Army is undertaking a significant reform to change the way it will fight in future wars. At the heart of this reform is a significant modernization enterprise. The reform consists of numerous changes to the combat-development enterprise⁠—notably, the establishment of Army Futures Command and subordinate cross-functional teams. In light of these institutional changes, U.S. Army Training and Doctrine Command (TRADOC) wants to identify issues and necessary process changes to improve how the Army implements non-materiel doctrine, organization, training, leadership and education, personnel, facilities, and policy (DOTLPF-P) solutions. Across the DOTLPF-P domains, the Army has, and follows, formal processes to make changes in each, and the Army appears to use all these processes frequently. Although the Army is making significant changes to these processes, many aspects of its current approach appear to be successful. However, when assessing the facilities domain, the authors identified unique challenges specific to modifying or constructing new facilities and developed subsequent recommendations in an effort to mitigate these challenges. In light of this assessment and the significant changes being made to the Army's acquisition process, the authors recommend that the Army maintain its current processes for the DOTLP-P domains while pursuing some specific recommendations for facilities, thereby driving further success of the modernization effort.

Keywords


Book
Proxy Warfare in Strategic Competition: Overarching Findings and Recommendations

Loading...
Export citation

Choose an application

Bookmark

Abstract

This report synthesizes the findings and recommendations from two companion reports on intrastate proxy wars: civil wars in which at least one local warring party receives material support from an external state. One of these companion reports examines motives and trends for great powers' use of proxy warfare in intrastate conflict, while the other examines the military implications of these wars. The authors conducted the research for these reports using a quantitative analysis of proxy wars since 1946, case studies on major powers that have sponsored surrogates in such conflicts, and case studies on the military implications of such conflicts. Looking forward, there are worrying indications that geopolitical factors may be driving countries, including Russia and Iran, to more frequent use of proxy warfare, and China might return to such forms of competition under certain circumstances. Ideology seems less likely to fuel proxy wars than it did during the Cold War, however, and China has a number of economic incentives to avoid such practices. The prospect of the increasing use of proxy warfare has a number of implications for U.S. defense policy. Violent nonstate actors supported by states tend to be much more lethal than those without state support. These enhanced capabilities appear to make them much more threatening to U.S. allies and partners, potentially forcing the United States to intervene on their behalf to protect them.

Keywords


Book
Proxy Warfare in Strategic Competition: Military Implications

Loading...
Export citation

Choose an application

Bookmark

Abstract

The authors examine the military implications of intrastate proxy wars: civil wars in which at least one local warring party receives material support from an external state. The research was conducted using a review of existing literature and case studies of four particularly relevant instances of proxy warfare, including the First and Second Indochina Wars, the 2014–early 2022 Donbas War, and the Houthi Rebellion. At the strategic level, the increased lethality of violent nonstate actors (VNSAs) complicates traditional models for responding to insurgencies and other forms of irregular warfare, while the risk of escalation forecloses potential options for responding to these challenges. At the operational level, state-supported VNSAs' combination of lethality and greater capacity for dispersion can impose multiple dilemmas on forces like those of the United States. These strategic and operational challenges have implications for U.S. Army doctrine, education and leader development, training, and potentially personnel and organization.

Keywords


Book
Proxy Warfare in Strategic Competition: State Motivations and Future Trends

Loading...
Export citation

Choose an application

Bookmark

Abstract

The authors used both quantitative analysis and case studies of China, Iran, and Russia to examine the causes and likely future trends in proxy wars: civil wars in which at least one local warring party receives material support from an external state. The purpose of the project was to provide insight into the determinants of state support for violent nonstate actors, assess the risks that third-party support poses to U.S. overseas contingency operations, and analyze policy options available to the United States to counter such foreign support. With the renewed focus in many regions on strategic competition, there seems to be a growing risk that states will feel increasingly threatened by their rivals and take greater steps to counteract these threats in the years to come. The case studies highlight how such an environment can often, though not always, lead to an increased interest in supporting proxy warfare. Of even greater concern is the fact that geopolitical drivers of proxy warfare can often be self-reinforcing. The states considered in the case studies were usually able to develop at least a rudimentary capability for proxy warfare very quickly, within a couple of years, often building on the capabilities of prior efforts or regimes. Beyond this baseline capability, however, a relatively lengthy period of learning and growth to better develop proxy warfare capabilities appears to be common.

Keywords

Listing 1 - 9 of 9
Sort by