With billions of computers in existence, cyberspace, 'the virtual world created when they are con...
Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topi...
With billions of computers in existence, cyberspace, 'the virtual world created when they are con...
The Department of Defense has been successfully exploiting rapidly developing advances in informa...
Libicki et al. argue that information collection requirements and systems for counterinsurgency a...
Compares a quantitative and qualitative analysis of insurgency case studies with lessons from ins...
The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly f...
What is the impact of demographics on the prospective production of military power and the causes...
In 2008, RAND carried out a survey of conditions in Anbar Province, once one of Iraq1s most viole...
RAND was asked to evaluate whether the Programming Computation on Encrypted Data program--which e...
This study explores U.S. policy options for managing cyberspace relations with China via agreemen...
The chances are growing that the United States will find itself in a crisis in cyberspace--the es...