In airport security, it's not the size of a potential terrorist bomb that matters most, it's where it detonates. Fortunately, new technologies may present opportunities to get travelers out of line and keep them safe.
To provide information to agencies and efforts focused on food, water, and energy resources, the RAND Corporation developed the Pardee RAND Food-Energy-Water Security Index. This report serves as the technical documentation for the index.
This Cazier Initiative symposium aimed to identify important policy questions related to the present and future electric power grid system. The meeting brought together multiple stakeholder perspectives on the challenges, solutions, and implementation barriers associated with building a more robust, resilient, affordable, and clean electric power system. An intended outcome was to identify problems that could benefit from stakeholder-driven objective research.
The toolkit assists public health and emergency planners and nongovernmental organizations (NGOs) stakeholders in determining the capacity and capability of particular NGOs for disaster response and recovery.
Experience along the U.S. southern border demonstrates that even with fortifications, a wall provides only modest capacity to stop illegal crossings. More emphasis should be placed on expanding border security beyond the physical dimension.
About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.
About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.
Cyber criminals may be preying on hospitals because cyber protection measures likely have not kept pace with electronic data collection and because hospitals typically do not have backup systems and databases in place, even though such attacks can strain health care systems and potentially put patients' lives at risk.
The economic importance and visibility of America's ports make them attractive terrorism targets. Port security has improved, but many of the threats that motivated the Safe Ports Act in 2006 remain, and new dangers have emerged, including cyber threats.
This report assesses water management, partnerships, rights, and market trends and opportunities, and how Army installations can potentially use them to improve programs and investments in water and wastewater systems.
As self-driving cars become widespread, one of the biggest issues will be the rules under which public infrastructures and public safety officers may be empowered to override how autonomous vehicles are controlled.
To prevail against ISIS in cyberspace, the United States and its cyber soldiers will have to be capable of reacting quickly, while being guided by an overarching strategy. Secretary of Defense Carter urged U.S. Cyber Command to intensify the fight against ISIS but it would also be wise to recruit civilian volunteers.
The tensions that divide the United States and China apply just as much to cyberspace as to relations in the physical world. Can the two countries achieve meaningful outcomes through formal negotiations over cyber norms and rules?
Self-driving vehicles offer the promise of significant benefits to society, but raise several policy challenges, including the need to update insurance liability regulations and privacy concerns such as who will control the data generated by this technology.
The Apple-FBI case should spark a broader debate among technology companies concerning their role in maintaining the privacy and security balance. A starting point should be to recognize that the majority of cyberattacks are related to phishing—and a user's action—not to whether a device can be secured.