Welcome to the Homeland Security and Defense Center
The Homeland Security and Defense Center conducts analysis to prepare and protect communities and critical infrastructure from natural disasters and terrorism. Center projects examine a wide range of risk management problems including coastal and border security, emergency preparedness and response, defense support to civil authorities, transportation security, domestic intelligence programs, technology acquisition, and related topics.
Center clients include the Department of Homeland Security, Department of Defense, the Department of Justice, and other organizations charged with security and disaster preparedness, response and recovery.
The Homeland Security and Defense Center is a joint center of the RAND National Security Research Division and RAND Justice, Infrastructure, and Environment.
Recent Publications and Blog Posts
In airport security, it's not the size of a potential terrorist bomb that matters most, it's where it detonates. Fortunately, new technologies may present opportunities to get travelers out of line and keep them safe.
The expanding role of U.S. states in immigration policy raises questions about the consequences of state-level action. A cost-benefit framework identifies the economic and fiscal impacts of state-level immigration policies and how different stakeholders would be affected.
When defending an organization, cybersecurity professionals must choose from a large set of defensive measures while operating with a limited set of resources. What is the menu of actions for defending against an attack? And how can defenders navigate the selection process?
The best chance for peace in Syria is for external parties to persuade stakeholders to accept a ceasefire, with further negotiations on a political settlement to follow later. The alternative is the indefinite continuation or even escalation of a devastating war.
Layered security is key to modern aviation security, but the pieces of a multi-layered defense system may not combine as straightforwardly as expected. When considering the behavior of an adaptive attacker, assessing the effectiveness of layered security becomes even more complex.