Review of Security Cooperation Mechanisms Combatant Commands Utilize to Build Partner Capacity

Review of Security Cooperation Mechanisms Combatant Commands Utilize to Build Partner Capacity

Jennifer D. P. Moroney
David E. Thaler
Joe Hogler
Copyright Date: 2013
Published by: RAND Corporation
Pages: 228
  • Cite this Item
  • Book Info
    Review of Security Cooperation Mechanisms Combatant Commands Utilize to Build Partner Capacity
    Book Description:

    Security cooperation is an important instrument of the U.S. government for advancing national security objectives vis-à-vis allies and partner countries. This report characterizes security cooperation mechanisms for capacity-building, produces a detailed database of the mechanism elements, develops and applies a preliminary means of evaluating select mechanisms, and recommends ways to improve mechanism effectiveness and efficiency.

    eISBN: 978-0-8330-8465-1
    Subjects: Political Science, History

Table of Contents

  1. Front Matter
    (pp. i-ii)
  2. Preface
    (pp. iii-iv)
  3. Table of Contents
    (pp. v-viii)
  4. Figures
    (pp. ix-x)
  5. Tables
    (pp. xi-xii)
  6. Summary
    (pp. xiii-xxiv)
  7. Acknowledgments
    (pp. xxv-xxvi)
  8. Abbreviations
    (pp. xxvii-xxx)
  9. CHAPTER ONE Introduction
    (pp. 1-12)

    Security cooperation (SC) is an overarching term that defines “those activities conducted with allies and friendly nations to build relationships that promote specified U.S. interests, build allied and friendly nation capabilities for self-defense and coalition operations and supporting institutional capacity, [and] provide U.S. forces with peacetime and contingency access.”¹ Examples include training and combined exercises, operational meetings, contacts and exchanges, security assistance, medical and engineering team engagements, cooperative development, acquisition and technical interchanges, and scientific and technology collaboration. The Department of Defense (DoD) has a long history of conducting SC activities with partner countries for a variety of purposes, including...

  10. CHAPTER TWO Characterizing Security Cooperation Mechanisms
    (pp. 13-28)

    This chapter provides further clarity of the specific elements used in characterizing SC mechanisms. While mechanisms are a convenient way to think about how the various elements are organized, in practice, the way these elements are drawn together to create real BPC activities is much more of a patchwork. The RAND Security Cooperation Database contains information on all of these elements, and can give the user insights into what may be available to support specific objectives and priorities. But, as the chapter concludes, the realities of program funding, geographic restrictions, and other factors impose limitations on what can be done...

  11. CHAPTER THREE Analysis of Security Cooperation Mechanisms Employed by the Combatant Commands to Build Partner Capacity
    (pp. 29-58)

    This chapter presents RAND’s review of the SC mechanisms the CCMDs use to build partner capacity in their AORs. The aim of the analysis is to evaluate SC mechanisms’ contributions to the achievement of CCMD objectives regarding BPC drawn from OSD guidance, not to assess the performance of the CCMD or the ability of partner nations to receive and incorporate U.S. support. It is important to capture the experiences of SC professionals at the CCMDs—the planners, resource managers, and implementers—to better understand factors that contribute to or detract from the effectiveness and efficiency of existing SC mechanisms. From...

  12. CHAPTER FOUR Key Findings and Recommendations
    (pp. 59-70)

    This report provides an approach to capturing assessments of the variety of SC mechanisms available to the CCMDs to achieve their BPC objectives, and to considering the successes and limitations of the mechanisms in terms of their overall effectiveness and efficiency from the CCMD perspective. The first section of this chapter compares the areas of convergence and divergence among the four CCMDs to identify key trends, along with findings that apply specifically to just one CCMD. The second section returns to our original hypotheses to present the team’s overall findings relative to those hypotheses. The third provides the study team’s...

  13. APPENDIX A RAND Security Cooperation Database
    (pp. 71-172)
  14. APPENDIX B Justifications for Effectiveness and Efficiency Ratings
    (pp. 173-192)
  15. Bibliography
    (pp. 193-196)