RAND was at the forefront of early computer science and information technology innovations, building computers in the 1950s to improve our researchers' analysis and modeling capabilities and developing data communications technologies that were the forerunner of the Internet. Today, RAND researchers recommend policies and best practices to support continued technological innovation and adoption around the world.
Willis Ware, a RAND Corporation engineer who in the 1960s predicted the ubiquity of the personal computer, the ways it would propel people into lives of perpetual change, and the perils it would pose for personal privacy, has died. He was 93.
Willis Ware, a RAND Corporation engineer who in the 1960s predicted the ubiquity of the personal computer, the ways it would propel people into lives of perpetual change, and the perils it would pose for personal privacy, has died. He was 93. Much of Ware's research focused on the use of computer technology by both the military and society at large, forecasting in the 1960s that “a small computer may conceivably become another appliance in the home.”
The U.S. should make two key reforms. First, the over-designation of material as classified makes it is harder to protect the few real secrets; this must be change. Second, the FISA court must become a gatekeeper for NSA access to communications data.
Predictive policing is not an end-all solution, but rather a tool that must be used in concert with other policing resources as part of a broader anti-crime effort. Used properly, predictive policing can predict the risk of future events, but not the events themselves.
Reports earlier this year that the U.S. Department of Defense leased a Chinese satellite to support military operations in Africa sparked concern that the arrangement could compromise control over U.S. military communications, or, worse, allow Chinese intelligence gatherers access to privileged military data.
Using data mining techniques, this paper provides a bibliometric assessment of mental health research (MHR) outputs from 1980 to 2011.
A ground-breaking new report on the use of the Internet in 15 cases of terrorism and extremism provides primary data on how the Internet is used by individuals in the process of their radicalization. The study yields recommendations for framing policy responses to the use of the Internet in radicalization.
The Internet of Things builds out from today’s Internet by creating a pervasive and self-organising network of connected, identifiable and addressable physical objects through the use of embedded chips. Several actions could inform a consistent European policy stance.
RAND Project AIR FORCE identified key conditions to aid the success of business transformation enabled by enterprise resource planning systems, challenges the Air Force must address to achieve them, and options for overcoming these challenges.
People are wondering how much America is, or should be, sacrificing privacy and civil liberties for the sake of homeland security. A RAND Policy Forum on October 24, 2013 will discuss where to draw the proper lines between privacy, security, and liberty.
At this October 2013 event, Henry Willis, director of the RAND Homeland Security and Defense Center, moderated a panel discussion on U.S. efforts to strike a balance among privacy, security, and liberty.
A new approach to measuring research and innovation performance uses patents by examining the trends in patent filings over time within organizations and within technology classes.
Predictive policing is the use of analytical techniques to prevent crime or solve past crimes. An assessment of some of the most promising technical tools and tactical approaches offers recommendations for police and developers.
The Army has developed an impressive capacity to adapt to emerging requirements by providing units with new capabilities rapidly and flexibly. While the readiness reporting system still works as originally intended, however, the current readiness reporting system captures only a portion of the adaptations readily seen in recent years.
By default, browsers generally are set to automatically allow online tracking, but there may be a better way to make sure consumers decide whether or not they want to allow advertisers to sniff at their digital footprints, writes Steven Isley.
Predictive policing methods fall into four general categories: methods for predicting crimes, predicting offenders, predicting perpetrators' identities, and predicting victims of crime. These methods are not equivalent to a crystal ball, but they can enhance proactive policing and improve intervention strategies.
The Department of Defense faces strategic obstacles in stemming disclosures. Media leaks have many causes but few feasible and effective solutions. There is a longstanding organizational culture in DoD that treats leaking classified information to the media as nearly risk-free, which suggests to some that the behavior is acceptable.
A review some of the provisions of the European Commission's 2013 proposals for a Network and Information Security Directive highlights specific concerns, including the relationship of incident notification achieving the outcomes of the directive, potential for overlapping regulation and definitions of covered entities.
The RAND Corporation has developed a new web registry that aims to increase transparency in the performance and reporting of studies of the impacts of programs, minimizing concerns over several well-known types of bias in research or reporting.
Domestic intelligence in the United States is an activity with a history, and efforts to consider future policy on this issue need to take that history into account, writes Brian Jackson. Public acceptability must be part of the calculus in devising oversight and control of intelligence efforts.