Terrorism and Homeland Security

Featured

RAND is a world leader in research on terrorism, counterterrorism, counterinsurgency, disaster management, and homeland security—topics that affect a wide variety of policy areas and challenge individuals and nations worldwide.

  • People fleeing violence in ISIS-controlled al-Bab, Syria arrive in the town's rebel-held outskirts, February 3, 2017, photo by Khalil Ashawi/Reuters

    Report

    Finding a Way Forward in Syria

    Feb 8, 2017

    After six years of fighting in Syria, the odds of removing the Assad regime are worse than ever. But the new U.S. administration could help de-escalate the conflict by focusing on a realistic outcome: a decentralized Syria with agreed regional zones backed by external powers.

  • Members of the NYPD's Counterterrorism Bureau stand watch at the Union Square Holiday Market in Manhattan, December 20, 2016, photo by Andrew Kelly/Reuters

    Commentary

    Taking the 'Terror' Out of Terrorism Requires Outsmarting Fear

    Mar 16, 2017

    Terrorism aims to create terror. Building an effective counterterror strategy could help society understand how terrorism works, then work together toward a psychologically more resilient and less vulnerable mindset.

Explore Terrorism and Homeland Security

  • Testimony

    Perspective on 2015 DoD Cyber Strategy: Addendum

    Document submitted on February 23, 2016 as an addendum to testimony presented before the House Armed Services Committee on September 29, 2015.

    Feb 26, 2016

  • Events @ RAND Audio Podcast

    Multimedia

    Syrian Refugees: Humanitarian and Security Perspectives

    The U.S. and other Western countries have vowed to admit more Syrian refugees, but terrorist attacks in San Bernardino, Paris, Cologne, and Jakarta are fueling community anxieties. In this RAND Policy Circle briefing, experts address what countries are doing to help abate the humanitarian crisis and ongoing efforts to counter the terrorist threat.

    Feb 25, 2016

  • Russian news agencies reported that President Putin said the ceasefire in Syria is a real step towards halting the bloodshed and may become an example of action against terrorism, February 22, 2016

    Commentary

    How to Bog Down Putin in Syria

    The lessons from the nearly 200 insurgencies that have taken place since World War II suggest that Russian aid probably will fail to turn the tide in Syria. The Assad regime still faces serious challenges, not the least of which is a lack of legitimacy among the Syrian people.

    Feb 25, 2016

  • Cybersecurity "leak"

    Multimedia

    Emerging Cyber Threats and Implications

    Cyberspace is expanding, becoming more vulnerable, and hosting increasingly vast amounts of data. Compounding this challenge is the growing number of bad actors seeking to exploit cyberspace. What steps can be taken to help mitigate emerging threats and improve U.S. cybersecurity?

    Feb 25, 2016

  • Joint naval special warfare training at Stennis Space Center

    Report

    What Are the Advantages and Risks of Special Warfare?

    Special warfare provides policymakers with an additional option that can help secure U.S. interests and manage risks. It can stabilize a friendly state or destabilize a hostile regime by operating through and with local state or non-state partners, rather than through unilateral U.S. action.

    Feb 23, 2016

  • Cars stranded in flood waters from Hurricane Irene in lower Manhattan, August 28, 2011

    Commentary

    Why Engineers Need to Be Thinking About Climate Change

    As sea levels rise and extreme weather events become more common, evacuation routes in coastal areas will become more important. Transportation engineers need to be more proactive as they try to anticipate damage to pavement, bridges, and culverts.

    Feb 22, 2016

  • German police found traces of radiation in Hamburg locations linked to a Russian businessman who had met the murdered ex-spy Alexander Litvinenko on the day he fell ill

    Commentary

    Russia on the Horns of a Nuclear Dilemma

    While the murder of Alexander Litvinenko is a human tragedy, broader concerns about the lowering of WMD norms and violations of international law should be addressed. The use of radioactive matter to kill him represents a serious breach of international agreements.

    Feb 19, 2016

  • Group of friends holding their smart phones

    Commentary

    How You Can Be Cybersecurity's Strongest Asset

    Technology is thoroughly embedded within the average person's life but security is not emphasized to the general user. Teaching the importance of security early on and continually bringing awareness to the public could help temper technology-based attacks.

    Feb 18, 2016

  • A civil defence member works at a site after airstrikes by pro-Syrian government forces in the rebel held Douma neighborhood of Damascus, Syria, February 14, 2016

    Commentary

    Is a Syria Truce in Putin's Best Interest?

    Moscow remains ambivalent but the West and its Arab partners could improve cease-fire prospects in Syria. They will have to drive the peace process to maintain pressure for political accommodation and also do more to help the rebels they back avert a military imbalance.

    Feb 18, 2016

  • Tunisian soldiers participate in an exercise along the frontier with Libya in Sabkeht Alyun, Tunisia, February 6, 2016

    Commentary

    Use Force to Forge Peace in Libya

    Five years after the uprising against Qaddafi and the civil war that followed, Libya is now home to the second-largest and fastest-growing Islamic State group affiliate outside Iraq and Syria. The U.S. and its allies need to step in to help restore Libyan sovereignty.

    Feb 17, 2016

  • Congressional Briefing Podcast

    Multimedia

    Lessening the Risk of Refugee Radicalization

    In this February 2016 congressional briefing, senior political scientist Barbara H. Sude discusses historical examples of radicalization among refugee groups, factors that can increase the risk of radicalization, measures to reduce the risk, and considerations for policymakers and legislators.

    Feb 16, 2016

  • Man using a laptop and drinking tea

    Commentary

    How Willing Are People to Allow Access to Their Internet Browsing History If It Helps National Security?

    A survey of over 26,000 citizens across the EU found that even in the event of a national emergency or limiting access of individuals' Internet usage to law enforcement agencies, there was still a strong aversion to information being stored or accessed.

    Feb 15, 2016

  • Journal Article

    Investing in Cybersecurity

    This research examines why, how and how much organisations in critical infrastructure sectors invest in cybersecurity.

    Feb 11, 2016

  • Multimedia

    The Zika Virus: What We Know So Far

    The Zika virus, a mosquito-borne disease that may be linked to brain damage in infants, is emerging as a public health priority. In this Call with the Experts, RAND Senior Natural Scientist Melinda Moore answers questions about Zika and what can be done to prevent its spread.

    Feb 9, 2016

  • Libya Dawn fighters watch Islamic State militant positions near Sirte March 19, 2015

    Commentary

    The Three Challenges of Countering ISIS in Libya

    ISIS's expansion in Libya is a threat to the security of Libyans, to the region, and to Europe. U.S. and European cooperation to counter ISIS is essential and Libya is unlikely to ever be peaceful without outside military support.

    Feb 5, 2016

  • Estonia's Defence League volunteer soldiers attend training drill near Rabasaare, Estonia, September 12, 2015

    Report

    Unconventional Options for the Defense of the Baltic States

    Unconventional options from the Swiss defense strategy during the Cold War could benefit Estonia, Latvia, and Lithuania. These include training and equipping local defense units and preparing transportation infrastructure for demolition to prevent an invasion.

    Feb 5, 2016

  • U.S. Special Forces soldiers prepare to leave Haji Aslam village in Khakarez district, Kandahar province, Afghanistan, March 24, 2014

    Report

    A Counterinsurgency Win in Afghanistan?

    The 2015 counterinsurgency (COIN) effort in Afghanistan ranks among the low end of historical COIN winners. The Afghan government and security forces are capable of maintaining the current stalemate with the Taliban. This is the first step on the most promising path to peace: a negotiated settlement.

    Feb 4, 2016

  • U.S. Defense Secretary Ash Carter meets with Chinese Gen. Fan Changlong, vice chairman of China's Central Military Commission, at the Pentagon, June 11, 2015

    Commentary

    OPM Hack Poses Overlooked Counterintelligence Risk for Economic Espionage

    Since discovering the theft of personal data from an OPM database last spring, government officials have been preoccupied with assessing the risks to national security. But they must also address its potential to enable an adversary to steal valuable economic and commercial information.

    Feb 1, 2016

  • An operations intelligence analyst

    Report

    Assessing Threats with Soft, Uncertain, and Conflicting Evidence

    Part of thwarting terrorist attacks is observing suspicious individuals over time with diverse means. These observations provide data that are often both complex and “soft.” How can analysts combine these data to form a realistic threat assessment?

    Feb 1, 2016

  • Announcement

    Australian Foreign Minister and International Policy Experts Discuss Middle East Challenges During Meeting at RAND

    The RAND Corporation and the United States Studies Centre at the University of Sydney convened a distinguished group of Australian and American experts to discuss the challenges ahead in Middle East policy for both countries.

    Jan 29, 2016