Daniel Gonzales

Photo of Daniel Gonzales
Senior Scientist
Washington Office


Ph.D. in theoretical physics, Massachusetts Institute of Technology; B.S. in physics, Stanford University

Media Resources

This researcher is available for interviews.

To arrange an interview, contact the RAND Office of Media Relations at (310) 451-6913, or email media@rand.org.

More Experts


Daniel Gonzales is a senior scientist at the RAND Corporation. His areas of expertise include command, control, and communications and intelligence (C3I) systems; information technology (IT); cloud computing, cyber security, electronic warfare (EW), and critical infrastructure. He has examined technical, policy, security, and safety issues for C3I, IT, and critical infrastructure systems for the Department of Defense (DoD), U.S. Army, U.S. Navy, U.S. Marine Corps, the Department of Homeland Security (DHS), and the state of California.

Gonzales has examined satellite communications, biometrics, tactical networks, cloud computing, mission command, and intelligence systems for the U.S. Army. For the Navy he has examined ship defense EW capabilities. For the DoD has has examined survival communications radios and networks, the legal basis for DoD interoperability policy, the military utility of new C3I systems, and legal basis for sharing intelligence and other information between DoD and DHS units along the U.S. border. For DHS he has examined the geo-targeting capabilities of the wireless emergency alert (WEA) system and the cyber security aspects of cloud computing systems. He is lead author on several academic, DHS, and RAND publications, including Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds (Transactions in Cloud Computing, IEEE), Wireless Emergency Alert Penetration Strategy (DHS, 2014), Improving Interagency Information Sharing Using Technology Demonstrations (2014), Networked Forces in Stability Operations: 101st Airborne Division, 3/2 and 1/25 Stryker Brigades in Northern Iraq (2007), and two network-centric operations case studies: Air-to-Air Combat With and Without Link 16 (2005) and The Stryker Brigade Combat Team (2005).

Gonzales received his Ph.D. in theoretical physics from the Massachusetts Institute of Technology.

Recent Projects

  • Remote access system monitoring
  • Cyber security of cloud computing systems
  • Army satellite communications bandwidth needs
  • DoD biometric matching system needs and system options
  • Wireless Emergency Alert (WEA) mobile penetration strategy


  • Identify theft illustration

    U.S. Needs a New Electronic Identity-Protection Strategy to Prevent 'Hybrid Warfare' Attacks

    The U.S. government needs to develop a strategy to protect its citizens that includes a unique identifying number or code and a method for protecting these identity keys in online transactions.

    Jul 6, 2015 The RAND Blog

  • Illustrated photo of a person typing on a computer keyboard

    Preventing Cyber Attacks: Sharing Information About Tor

    While Tor has many benefits, it is also used to hide criminal activity online such as the recent cyber attacks against JPMorgan Chase and Sony Pictures. The U.S. government should share the IP addresses of Tor network nodes with U.S. critical infrastructure and financial firms so that future cyber attacks could be prevented.

    Dec 17, 2014 The RAND Blog

  • Customs and Border Protection officer Ballard inspects a motorist's passport at the San Ysidro border crossing between Mexico and the U.S. in San Ysidro, California

    Saving Money by Using Advanced DoD Sensors on the U.S. Border

    There is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual counterdrug operation as long as a valid request for support is made by an appropriate law enforcement official and no personally identifiable or private information on U.S. citizens is collected.

    Jun 6, 2014

  • Pro-Russian armed men level automatic rifles near the local police headquarters in Luhansk, eastern Ukraine, April 29, 2014

    Exposing Russia's Covert Actions

    It is paramount that U.S. and European officials and the people of Ukraine understand the true situation on the ground and the extent of covert Russian operations in eastern Ukraine.

    Apr 29, 2014 U.S. News & World Report

  • Can You Hear Libya Now?

    The U.S. and its allies could help Libyans communicate with the outside world by deploying cellphone base stations on aircraft or tethered balloons, write Dan Gonzales and Sarah Harting.

    Mar 4, 2011 The New York Times