Crime

Featured

Crime and its impact on public safety, public health, and economics are universal concerns. RAND research has informed criminal justice policy development at local, state, and national levels in the United States and Europe, particularly in the areas of juvenile crime, violence, and substance abuse, and has explored a range of topics from the drug trade and "insider" crimes to sexual assault and the cost-effectiveness of crime prevention.

  • Social network illustration superimposed over a city at night

    Report

    How Police Could Use Social Media and Social Network Analysis

    Jul 18, 2018

    Social media and social network analysis could help law enforcement monitor for safety threats, identify those at high risk for involvement in violence, and investigate crimes and crime networks. But computer security, privacy, and civil rights protections must be in place before using these tools.

  • Gun and bullets

    Essay

    More Research Could Help Prevent Gun Violence in America

    Jul 10, 2018

    Both sides of the gun policy debate agree on what the objectives of any policy should be. But they disagree over which policies would best achieve those goals. Current evidence for or against most gun proposals is weak, contradictory, or nonexistent. Only research can show what does—and doesn't—work.

Explore Crime

  • Conceptual image of human voice

    Commentary

    Fake Voices Will Become Worryingly Accurate

    New technology can convincingly fake the human voice and create security nightmares. Considering the widespread distrust of the media, institutions, and expert gatekeepers, audio fakery could start wars.

    Jan 8, 2018

  • Journal Article

    Journal Article

    Development of New Quality Measures for Hospital-Based Care of Suicidal Youth

    Four new quality measures will assess key dimensions of care for suicidal youth.

    Jan 4, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017

    Commentary

    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • Close up of little boy jumping on a chalk hopscotch outline

    Project

    Policy Options for Improving Child Welfare

    Every year, about 3 million children in the U.S. face abuse or neglect. Expanding prevention and treatment services in the child welfare system could improve the lives of children and reduce lifetime expenses by 3 to 7 percent.

    Dec 11, 2017

  • A composite image of business people meeting around a table and symbols representing concepts related to compensation.

    Report

    Emerging Trends in Compensation for Widespread Losses

    These conference proceedings explore emerging trends in compensation for widespread loss events, including regulators' changing roles, the impact of liens, and claim aggregation.

    Dec 4, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Crude oil spill on a beach

    Report

    Assigning Responsibility Following a Catastrophe: Alternatives to Relying Solely on Traditional Civil Litigation

    This report reviews various alternatives to relying exclusively on traditional civil litigation to assign responsibility for the human causes of a catastrophe and to determine the types of losses that a designated responsible party must reimburse.

    Nov 28, 2017

  • :rel:d:bm:GF2E63H1U4N01

    Report

    How to Reduce Mortality in Correctional Facilities

    Inmates disproportionately suffer from a variety of health conditions, compared with the general population. Some in-custody deaths are inevitable; for example, elderly inmates may die of old age. But certain types of death are highly preventable.

    Nov 27, 2017

  • Computer hacker with magnifying glass

    Commentary

    It's Time for the International Community to Get Serious About Vulnerability Equities

    Multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It’s time for the international community to get serious about vulnerability equities.

    Nov 15, 2017

  • Congressman Adam Schiff speaks at a House Intelligence Committee meeting about Russian use of social media to influence U.S. elections, Washington, D.C., November 1, 2017

    Commentary

    Covert Influence Is the New Money Laundering

    Anti-money laundering laws provide lessons for combating covert influence operations, such as Russian meddling in the U.S. election. These laws could be adapted for online media models that do not require users to be paid customers.

    Nov 6, 2017

  • Hands typing with visual of computer code

    Multimedia

    Equifax and the Data-Breach Era: How Worried Should We Be?

    Large-scale data breaches like those of Equifax and OPM compromised the personal data of millions of people. What can be done to improve the response to such breaches? In this October 26th congressional briefing, Lillian Ablon and Sina Beaghley address victim and lawmaker reactions, national security implications, and considerations for policymakers.

    Oct 26, 2017

  • A person's hand writing a checklist

    Commentary

    Checklist of Best Practices Developed to Guide Development of Suicide Prevention Campaigns

    Is your crisis line’s suicide-prevention communications effort working well enough? What should you be doing differently? Some help is available through a checklist published earlier this year.

    Oct 25, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Scales of justice in front of computer monitors with code

    Commentary

    The Intersection of Algorithms and an Individual's Rights

    Data collection, and our reliance on it, have evolved extremely rapidly. The resulting algorithms have proved invaluable for organizing, evaluating and utilizing information. How do individuals' rights come in to play, when data about their lives is compiled to create algorithms, and the resulting tools are applied to judge them?

    Sep 29, 2017

  • Suspected former Islamic State (IS) fighters Ayoub B. (R) and Ebrahim Hadj B. (L), hide their faces as they wait for the start of their trial in a courtroom in Calle, Germany November 30, 2015

    Commentary

    How Will Authorities Know When Foreign Fighters Have Returned?

    As the Islamic State's territory shrinks and its prestige declines, militants will try to find their way home. Many foreign fighters began as criminals, and many might turn to crime on their return. One of the most productive ways to identify and disrupt returning fighters is to focus on the criminal underworld.

    Sep 25, 2017

  • Woman using smartphone and laptop with icon graphic cyber security network of connected devices and personal data security

    Commentary

    How to Help Small Businesses Deal with Cyber Threats

    Small businesses are especially vulnerable to cyber threats. What can be done to provide small businesses the security to continue to prosper, while enhancing America's cybersecurity workforce and making the economy more secure?

    Sep 15, 2017

  • Journal Article

    Journal Article

    Primary Care Providers with More Experience and Stronger Self-Efficacy Beliefs Regarding Women Veterans Screen More Frequently for Interpersonal Violence

    Some primary care provider experiences and beliefs regarding women's health care influence rates of screening for military sexual trauma (MST) and/or intimate partner violence (IPV) .

    Sep 6, 2017

  • Journal Article

    Journal Article

    Age Differences in Death and Suicidal Ideation in Anxious Primary Care Patients

    One in three older adults with anxiety reported feeling like they were better off dead, which underscores the importance of assessing for suicidality in this population during primary care visits.

    Aug 31, 2017

  • Hezbollah fighters stand near military tanks in Western Qalamoun, Syria August 23, 2017

    Commentary

    Hezbollah Has Been Active in America for Decades

    Hezbollah has been active inside the United States for decades, engaging in a range of activities that include fundraising and money laundering. The U.S. and its allies should continue to combat the financing of terrorism and take action against the funding of terrorist groups on U.S. soil.

    Aug 28, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017