skip to main content
Article Podcast Report Summary Quick Look Quick Look Video Newsfeed triangle plus sign dropdown arrow Case Study All Search Facebook LinkedIn YouTube Bluesky Threads Instagram Right Arrow Press Release External Report Open Quote

Search Results

Your search for Assessment found 229 results.

Philadelphia PD Response to Civil Unrest
/analyses/2020/12/philadelphia-pd-response-to-civil-unrest
This after-action report provides an independent review of the Philadelphia Police Department’s (PPD) response to the mass demonstrations and civil unrest that occurred in the city from May 30 – June 15, 2020. While the findings contained in the report speak to this specific timeframe, the review team acknowledges that the response in Philadelphia (also referred to as “the City”) was not unlike the law enforcement response to similar events that occurred both nationally and globally. We provide this preface as a means to better understand the Philadelphia response within a national context, and also to provide a summary of key reforms initiated by the city and PPD since the start of our review in July 2020. These reforms represent the commitment of the City’s leadership and the PPD to initiate, implement and sustain organizational reform efforts concerning the management of First Amendment demonstrations, police use of force, and other resources needed to better prepare officers to meet their public safety mission.
that “the Department’s commitment to reform must include an assessment of how police responded to the very protests that called for change.” She also pledged to make public a final comprehensive report. The City
DoD Function Codes
/analyses/2019/04/dod-function-codes
Department of Defense (DoD) function codes identify the type of work performed by all activities in the defense infrastructure and operating forces.
/centers-and-divisions/cna/rfr/marine-corps-and-defense-workforce-program Approved for public release: distribution unlimited. 268 DRM-2019-U-019326-Final Jen Atkin Assessment of Currency
Use of Safety Equipment in Correctional Facilities
/analyses/2019/04/use-of-safety-equipment-in-correctional-facilities
This study of prison safety equipment in 7 facilities and assaults and injuries finds correctional officer safety depends on training, attitude, and equipment.
empirical assessment to substantiate the officials’ views. As described in detail below, CNA’s proposed study builds on the GAO study. We propose conducting a further exploratory study to objectively
Promoting Civilian Protection during Security Assistance
/analyses/2019/05/promoting-civilian-protection-during-security-assistance
For four years, the United States provided the Saudi-led coalition with military equipment and assistance used in its campaign in Yemen. During that time, the US has wrestled with and debated both the legality and wisdom of its support. After four years of conflict in Yemen, the US should be asking: what lessons can be learned from four years of support to the Saudi-led coalition? In light of the significant civilian protection concerns seen in Yemen, is there a way to get better outcomes from security assistance activities? This report aims to answer those questions. We analyze US support to the Saudi-led coalition and identify two gaps in policy and information, respectively. We also examine the timely issue of better protecting health care in the midst of armed conflict. In this report, we provide a policy framework for including civilian protection considerations as part of security assistance.
framework for advancing civilian protection in security assistance includes the following functions: Assessment of partner capabilities and risks. This includes analysis of the professionalism
Proxy Warfare
/analyses/2019/07/proxy-warfare
Proxy warfare—that is, conflict in which a “major power instigates or plays a major role in supporting and directing to a conflict but does only a small portion of the actual fighting itself”—is receiving new attention from policymakers, analysts, and practitioners. This study uses a series of four case studies on US involvement in proxy war (the “Secret War” in Laos, the Contras in Central America, the African Union Mission in Somalia, and the Syrian Defense Forces) to develop a set of key themes. These themes, in turn, form the basis of a set of rules of thumb to guide senior decisionmakers as they contemplate the future use of proxy forces. Finally, this report discusses implications for U.S. Special Operations Forces, which are likely to play an increasingly important role in supporting U.S. proxies.
, and for developing policies and programs that will promote US national interests abroad. This report contributes to such an assessment. First, we present a series of four case studies: two on current proxy
Opioid Data Initiative
/analyses/2018/12/opioid-data-initiative
Opioid use disorder is a major public health and public safety crisis in communities across the U.S. Many local jurisdictions have begun using data to more effectively and efficiently target resources and expertise, while also forming multidisciplinary partnerships to improve coordination of response efforts. This study examined how local jurisdictions use data at the policy, operational, and program assessment levels, and explored potential barriers and promising practices to facilitate data sharing among stakeholders. The study team developed and administered an online survey and conducted semi-structured interviews with stakeholders from 11 jurisdictions. Our findings indicate that data-driven approaches to fighting the opioid epidemic are common and used primarily to improve situational awareness and understanding of the epidemic, target resources effectively, and destigmatize opioid use disorder. Key barriers to sharing data among stakeholders include concerns about the timeliness and accuracy of data, resource constraints, and legal protections on sharing health related information.
Opioid Data Initiative Opioid Data Initiative Opioid use disorder is a major public health and public safety crisis in communities across the U.S. Many local jurisdictions have begun using data to more effectively and efficiently target resources and expertise, while also forming multidisciplinary partnerships to improve coordination of response efforts. This study examined how local jurisdictions use data at the policy, operational, and program assessment levels, and explored potential barriers and promising practices to facilitate data sharing among stakeholders. The study team developed
The CNA Supply Chain Operational Engagement (CNA SCOPE™) Method
/quick-looks/2025/08/the-cna-supply-chain-operational-engagement-method
CNA has developed a methodology to characterize lifeline commodity networks to inform both public and private sector decision-makers.
” of nodes, links, players, and interdependencies involved in that flow, and targeted assessment to meet the lifeline commodity needs of a dense, urban population. /quick-looks/2025/08
BTAM: Barriers to Continuity of Care
/quick-looks/2025/04/btam-barriers-to-continuity-of-care
BTAM is a community-based process that requires partners to work together to identify, assess, and manage threats
BTAM: Barriers to Continuity of Care BTAM is a community-based process that requires partners to work together to identify, assess, and manage threats Behavioral threat assessment and management (BTAM) is a community-based process that requires partners to work together to identify, assess, and manage threats. In a 2015 report, the FBI identified 11 key contributors to the BTAM process: law enforcement, prosecutors, schools, social services, health care systems and providers, lawmakers, courts, probation and parole officers, employers, parents and immediate family, and bystanders
BTAM: A Deep Bench of Resources
/quick-looks/2025/03/btam-a-deep-bench-of-resources
In June 2019, the Colorado Department of Public Safety hosted the Colorado Preventing Targeted Violence Summit.
suggests that successful intervention—that is, successful behavioral threat assessment and management (BTAM)—requires a team with a deep bench. Core players will be involved in most cases
Hacking and Firewalls Under Siege: Russia’s Cyber Industry During the War on Ukraine
/analyses/2025/08/hacking-and-firewalls-under-siege-russias-cyber-industry-during-the-war-on-ukraine
This paper examines how Russian cybersecurity firms are supporting the Russian government and adapted to the new environment in the wake of the Russia-Ukraine War.
their sales pitches and successes teach the United States and the West? What would a more analytically robust, comprehensive assessment of possible Russian private company support for the Kremlin