CIP

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Tinker Air Force Base Computing Center

    Report

    Cost Considerations in Cloud Computing

    By examining cost drivers for several data management approaches, RAND identified considerations that can help guide analysts until the Department of Defense develops official guidance for cost analysis of cloud and data centers.

    Oct 2, 2014

  • Graphic design with blue globe

    Project

    Examining the EU's Information Security and Data Protection Frameworks

    Has Brussels put its own house in order when it comes to information security and data privacy? RAND Europe research suggests that the EU institutions and agencies should review the rules that govern their information security and data privacy procedures if they want to be ahead of the ICT innovation curve.

    Sep 22, 2014

  • Testimony

    Strategic Planning for Border Security: Addendum

    Document submitted on September 18, 2014 as an addendum to testimony presented before the House Science, Space, and Technology Committee, Subcommittee on Research and Technology and Subcommittee on Oversight on July 31, 2014.

    Sep 18, 2014

  • Oscar-winning actress Jennifer Lawrence has contacted authorities to investigate who stole and posted nude images of her online, part of a reported mass hacking of celebrities' intimate photos

    Blog

    Hackerazzi: How Naked Celebrities Might Make the Cloud Safer

    Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.

    Sep 8, 2014

  • Two boys sitting on a couch playing video games, photo by Sean Davis/Fotolia

    Report

    Living Room Connected Devices: Opportunities, Security Challenges, and Privacy Implications

    The "Internet-connected living room" poses security and privacy implications for industry and consumers, offering potential benefits as well as threats associated with the technical capabilities of living room connected devices.

    Sep 2, 2014

  • Report

    Ramifications of DARPA's Programming Computation on Encrypted Data Program

    RAND was asked to evaluate whether the Programming Computation on Encrypted Data program -- which expands the knowledge base of the global cryptographic community -- is likely to provide more benefits to the United States than it does to its global rivals.

    Aug 25, 2014

  • Report

    RAND Review: Vol. 38, No. 2, Summer 2014

    The cover story discusses the rising wave of cybercrime and possible responses to it, while other features highlight research on medical innovation and U.S. security cooperation, plus public policy insights from Victor Hugo.

    Aug 7, 2014

  • A sheriff walks toward the cyber horizon.

    Periodical

    RAND Review Takes Measure of Cybercrime, Medical Innovation, U.S. Security Cooperation

    Stories in RAND's flagship magazine discuss the duel between cybercrime and the law, the gamble of medical innovation, and the fruits of U.S. security cooperation.

    Aug 7, 2014

  • A sheriff walks toward the cyber horizon.

    Periodical

    Wild Wild Web: For Now, Cybercrime Has the Upper Hand in Its Duel with the Law

    The Internet has become a vast untamed territory for cybercriminals. But there are ways that private companies, defense contractors, law enforcement, and other government agencies can minimize the harmful influence of cyber black markets.

    Aug 7, 2014

  • U.S. Capitol building with summer flowers

    Blog

    Summer Reading for Congress

    No matter how policymakers spend their break—meeting with home-state constituents, traveling abroad with congressional delegations, or spending time with family—this summer reading list contains policy ideas that can help them hit the ground running when they return.

    Jul 31, 2014

  • Chain link fence protecting American border

    Testimony

    Getting Smarter About Border Security Strategy, Data, and Technology Infrastructure

    There is no single solution for border security challenges. However, a network of mutually reinforcing and even redundant layers of defenses can enable the U.S. to better control its borders.

    Jul 31, 2014

  • Airline passengers wait in line before passing through a TSA checkpoint at LAX

    Blog

    TSA's Cellphone Rule Part of Deadly Race

    While placing explosives inside a cellphone is plausible, it is almost impossible to do so with iPhones without rendering them non-functional, which is why the TSA is now checking cell phones are actually working.

    Jul 29, 2014

  • car interior with a dashboard computer

    Blog

    Sounding the Car Alarm on Hackers

    Security protections on vehicles have not kept pace with systems that control safety features, navigation capabilities, and wireless communication functions. Onboard computer networks will likely become much more attractive to hackers.

    Jun 30, 2014

  • Report

    How Do We Know What Information Sharing Is Really Worth? Exploring Methodologies to Measure the Value of Information Sharing and Fusion Efforts

    This report discusses the challenges of evaluating information-sharing efforts that seek to achieve multiple goals simultaneously; reviews past evaluations of information-sharing programs; and lays out a path to improving the evaluation of such efforts.

    Jun 18, 2014

  • News Release

    Shortage of Cybersecurity Professionals Poses Risk to National Security

    The nationwide shortage of cybersecurity professionals -- particularly for positions within the federal government -- creates risks for national and homeland security.

    Jun 17, 2014

  • two men working in a bright office

    Report

    Shortage of Cybersecurity Professionals Poses Risk to National Security

    Demand for trained cybersecurity professionals who work to protect organizations from cybercrime is high nationwide, but the shortage is particularly severe in the federal government, which does not offer salaries as high as the private sector.

    Jun 17, 2014

  • Officer Eric Darnsteadt from the U.S. Customs and Border Protection service inspects shipping containers arriving at Port Newark with a truck-mounted X-ray machine

    Blog

    Securing America's Ports by Better Measuring Capabilities

    Funding for improving U.S. port security has declined from $389 million in 2008 to $100 million in 2014. This makes it more important than ever to ensure the highest possible return on investment from grant funding.

    Jun 13, 2014

  • Customs and Border Protection officer Ballard inspects a motorist's passport at the San Ysidro border crossing between Mexico and the U.S. in San Ysidro, California

    Blog

    Saving Money by Using Advanced DoD Sensors on the U.S. Border

    There is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual counterdrug operation as long as a valid request for support is made by an appropriate law enforcement official and no personally identifiable or private information on U.S. citizens is collected.

    Jun 6, 2014

  • A Station Ft. Lauderdale crew detains an unknown vessel during an excercise that tested new communication and tracking technologies in the Port Everglades

    Testimony

    Securing America's Ports

    America's ports could be made more secure by improving the evaluation of port security programs; increasing the reliance on local risk assessments when awarding port security grants; and reconsidering the 100 percent container inspection mandate.

    Jun 4, 2014

  • satellite image courtesy of NOAA

    Report

    A Safe Way to Implement a Database of Satellite Anomalies

    Satellite anomalies are malfunctions caused by solar particles, cosmic rays, or even space debris. A shared database could help identify solutions to prolong the lifetime of spacecraft that experience problems, and could be implemented in a way that would protect the privacy of the satellite operators.

    Jun 2, 2014

  • Topic Synonyms:
  • CIP