Researchers collaborate across disciplines at RAND to evaluate terrorist, military, nuclear, cyber, and other threats to U.S. national security — identifying emerging threats, scrutinizing known risks, and evaluating potential strategic and tactical responses. Recent studies have included examinations of al Qaeda, the Afghan insurgency, and Iran’s nuclear capabilities.
Details a prototype computational model that seeks to explain, as a function of contributing factors, the extent of public support for insurgency and its use of terrorism. The model is believed to be reusable and suitable for composition.
To meet complex security challenges in the future, the Department of Homeland Security must develop integrated plans that set priorities, direct resources to programs and activities to achieve outcomes consistent with these priorities, and conduct evaluations to ensure these outcomes are realized.
Testimony presented before the House Foreign Affairs Committee, Subcommittee on Europe, Eurasia, and Emerging Threats on March 21, 2013.
The U.S., while worried about a "9/11 in cyberspace," also ought to worry about what a "9/12 in cyberspace" would look like. The consequences of the reaction to a cyberattack could be more serious than the consequences of the original action itself.
Analysis of data on suicide attacks in Israel suggest that assessing sociocultural, political, economic, and demographic factors in addition to geospatial data enhances the ability to predict future suicide attack targets.
U.S. embassies shored up security in the wake of the 2012 attack on the U.S. consulate in Benghazi. Going forward, the security plan for the U.S. diplomatic presence abroad must include strategies to detect and prevent such attacks before they occur.
The Swedish Center for Asymmetric Threat Studies asked RAND to investigate cyber-security within national defence and security strategies. The report presents research findings and is of interest to cyber-security practitioners and policymakers.
This report provides an assessment of the validity of preference profiles and associated weights used in the Dutch National Risk Assessment. It also offers recommendations to incorporate public values using scientifically validated methods.
Among security considerations for diplomatic missions abroad is the amount and type of support provided by the host government, the method for acquiring knowledge of what is happening outside the embassy in the surrounding neighborhoods, and the actual structure of the buildings and layout of the diplomatic compound.
RAND analysts posit that federal budget deficit pressure may result in further Defense Department reductions, and suggest starting from a strategy basis in determining cuts, prioritizing challenges, and identifying where to accept more risk.
Questions the current common view of the North Korean missile program and seeks to better characterize the North Korean missile threat by comparing the available data on the North Korea missile program against several possible hypotheses.
Document submitted on August 24, 2012 as an addendum to testimony presented before the Senate Homeland Security and Governmental Affairs Committee on July 11, 2012.
This paper proposes a paradigm shift in how military intelligence is fused. The concept, behavioral intelligence analysis, provides a more complete picture of the complex counterinsurgency environment.
The United States confronts a more diverse terrorist threat in 2012 than it has in the past. Al Qaeda has exploited the turmoil created by the Arab uprisings to make tactical advances and open new fronts. In addition, several incidents in the past year suggest a resurgence of Iranian-sponsored terrorism.
While al Qaeda's capacity for large-scale attacks has been drastically reduced and the organization seriously weakened, the United States can expect to continue its battle with the terrorist group for many years to come.
National security implications and interconnections are explored among climate change, water scarcity, and pandemics, using examples of familiar and new policy approaches to inspire innovative thinking about threats to the global commons.
To improve understanding of China's investment patterns, the authors analyze recent and proposed Chinese investment in companies in the United States, Europe, Asia, and the rest of the world.
Document submitted on November 1, 2011 as an addendum to testimony presented before the House Armed Services Committee, Subcommittee on Emerging Threats and Capabilities, on June 22, 2011.
Former Taliban and other insurgents provide an invaluable source of information on their previous colleagues, and can ultimately cause momentum to shift toward counterinsurgent forces. Steps can be taken to increase the likelihood of reintegrating fighters into their communities.
We have greatly reduced al Qaeda's capacity for large-scale attacks, but the terrorist
campaign led by al Qaeda may go on for many years. It is fair to call it a war, without implying
that, like America’s past wars, it must have a finite ending.