Daniel Gonzales

Photo of Daniel Gonzales
Senior Scientist; Professor, Pardee RAND Graduate School
Washington Office


Ph.D. in theoretical physics, Massachusetts Institute of Technology; B.S. in physics, Stanford University

Media Resources

This researcher is available for interviews.

To arrange an interview, contact the RAND Office of Media Relations at (310) 451-6913, or email media@rand.org.

More Experts


Daniel Gonzales is a senior scientist at the RAND Corporation and a professor at the Pardee RAND Graduate School. His research expertise centers on command and control (C2), communications, and intelligence systems; electronic warfare (EW), cyber security, digital forensics, and biometrics. He has examined technical and policy issues for such systems for the Department of Defense (DoD), the Department of Homeland Security (DHS), National Institutes of Justice (NIJ) and the Intelligence Community (IC).

Gonzales works on C2, communications, and EW issues for the U.S. Army and Navy. He has examined legal strategies for protecting defense contractors from economic coercion and cyber attack and methods for improving the cybersecurity of defense contractors. 

For the IC he has examined cyber security issues, developed relevant prototypes, and tested relevant systems. For DHS he has examined the geo-targeting capabilities of the wireless emergency alert (WEA) system, cloud computing cyber security, and the use of biometrics in person centric identity operations. He is lead author of several academic, DHS, and RAND publications, including Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds (Transactions in Cloud Computing, IEEE) and the DHS Wireless Emergency Alert Penetration Strategy (DHS, 2014).  He received his Ph.D. in theoretical physics from the Massachusetts Institute of Technology, and his B.S. in physics from Stanford University.

Recent Projects

  • Cyber security of cloud computing systems
  • Mission command in contested environments
  • Satellite communications bandwidth needs for Army logistics networks
  • Person Centric Identity Strategy
  • Operational Effectiveness of Advanced Ship Defense Systems

Selected Publications

Gonzales, D., et al., "Cloud-Trust - a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds," IEEE Transactions in Cloud Computing, 99

Gonzales, D., Gulden, T., Strong, A., Hoyle, W., Cost-Benefit Analysis of Proposed California Oil and Gas Refinery Regulations, RAND Corp. (RR-1421), 2016


  • Tourists and locals enjoy Ko'Olina beach on the island of Oahu, Hawaii, July, 29, 2013

    Deadly Delay: Every Second Counts in Missile Defense

    The false alarm about a ballistic missile attack on Hawaii raises important questions. How much warning time would the public get before a missile hit? And how should the system be improved?

    Jan 24, 2018 The Hill

  • Identify theft illustration

    U.S. Needs a New Electronic Identity-Protection Strategy to Prevent 'Hybrid Warfare' Attacks

    The U.S. government needs to develop a strategy to protect its citizens that includes a unique identifying number or code and a method for protecting these identity keys in online transactions.

    Jul 6, 2015 The RAND Blog

  • Illustrated photo of a person typing on a computer keyboard

    Preventing Cyber Attacks: Sharing Information About Tor

    While Tor has many benefits, it is also used to hide criminal activity online such as the recent cyber attacks against JPMorgan Chase and Sony Pictures. The U.S. government should share the IP addresses of Tor network nodes with U.S. critical infrastructure and financial firms so that future cyber attacks could be prevented.

    Dec 17, 2014 The RAND Blog

  • Customs and Border Protection officer Ballard inspects a motorist's passport at the San Ysidro border crossing between Mexico and the U.S. in San Ysidro, California

    Saving Money by Using Advanced DoD Sensors on the U.S. Border

    There is no legal reason why a DoD sensor should be excluded from use in an interagency technology demonstration or in an actual counterdrug operation as long as a valid request for support is made by an appropriate law enforcement official and no personally identifiable or private information on U.S. citizens is collected.

    Jun 6, 2014

  • Pro-Russian armed men level automatic rifles near the local police headquarters in Luhansk, eastern Ukraine, April 29, 2014

    Exposing Russia's Covert Actions

    It is paramount that U.S. and European officials and the people of Ukraine understand the true situation on the ground and the extent of covert Russian operations in eastern Ukraine.

    Apr 29, 2014 U.S. News & World Report

  • Can You Hear Libya Now?

    The U.S. and its allies could help Libyans communicate with the outside world by deploying cellphone base stations on aircraft or tethered balloons, write Dan Gonzales and Sarah Harting.

    Mar 5, 2011 New York Times