Jun 18, 2018
Lone wolves or small groups could use technologies such as drones or AI for nefarious purposes. The threat is even greater when these technologies are used along with disinformation spread over social media.
This page offers an easy way for policymakers to access cybersecurity research and analysis that is relevant to current Congressional agendas. For additional information, to request documents, or to arrange a briefing, contact the RAND Office of Congressional Relations at email@example.com or (703) 413-1100 x5643.
RAND periodically sends alerts and newsletters to update Congress on highlights of recent work about cybersecurity.
Testimony presented before the House Financial Services Committee, Subcommittee on Terrorism and Illicit Finance, on March 15, 2018.
Testimony presented before the House Armed Services Committee on March 1, 2017.
Testimony presented before the House Homeland Security Committee, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies on February 25, 2016.
Testimony presented before the House Armed Services Committee on September 29, 2015.
Testimony presented before the House Homeland Security Committee, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies on March 4, 2015.
The Internet has fundamentally changed ways of doing business, including the operations of illegal markets. RAND Europe was commissioned to investigate the role of the Internet in facilitating the drugs trade, particularly in the Netherlands.
Discusses how the Air Force acquisition/life-cycle management community can improve cybersecurity throughout the life cycle of Air Force weapon systems.
Discussion about China's military modernization has focused on new weapon systems, with little comparative analysis of Chinese and U.S. military forces and development. This brief summarizes a RAND Project AIR FORCE study that seeks to fill this gap.
This research brief addresses key cybersecurity concerns, such as protecting critical products and services and ensuring that software will work. It identifies how organizations perceive the importance of cybersecurity in making investment decisions.