Cyber and Data Sciences

Featured

RAND was at the forefront of early computing and data science. In the 1950s, we built computers to improve researchers' analytic and modeling capabilities. We also developed data communications technologies that were forerunners of the internet. Today, RAND experts recommend policies and best practices to support safe and secure technological innovation and adoption.

  • Newspapers and social media terms in LED display, photos by artisteer/Getty Images and phive2015/Adobe Stock

    Research Brief

    Facts vs. Opinions: How the News Is Changing in the Digital Age

    May 14, 2019

    Technology has transformed how people get information. But it has also affected the way that information is produced, shared, and disseminated. How much has news reporting actually changed over the last three decades?

  • Mock Bitcoins are displayed in Berlin, January 7, 2014, photo by Pawel Kopczynski/Reuters

    Report

    Terrorist Use of Cryptocurrencies

    Mar 27, 2019

    Counterterrorism finance strategies have reduced terrorist access to official currencies. Will terrorist groups therefore increase their use of digital cryptocurrencies? New ones have emerged, including some that claim to be more private and secure than Bitcoin, but they also have limitations that make them less viable.

Explore Cyber and Data Sciences

  • Journal Article

    Accounting for Misclassification in Electronic Health Records-derived Exposures Using Generalized Linear Finite Mixture Models

    Exposures derived from EHRs may be misclassified, leading to biased estimates of their association with outcomes of interest: finite mixture models can correct biases with no loss of efficiency.

    Dec 7, 2017

  • Testimony

    Federal Research and Development for Agricultural Biodefense: Addendum

    Document submitted December 5, 2017, as an addendum to testimony presented before the House Science, Space, and Technology Committee, Subcommittee on Research and Technology on November 2, 2017.

    Dec 6, 2017

  • Robots working in a factory

    Report

    The Risks of AI to Security and the Future of Work

    As artificial intelligence (AI) becomes more prevalent in the domains of security and employment, what are the policy implications? What effects might AI have on cybersecurity, criminal and civil justice, and labor market patterns?

    Dec 6, 2017

  • A man using a radio transceiver

    Report

    Signals Intelligence for Anyone

    Signals intelligence (SIGINT) is intelligence gathered from communications, electronics, or foreign instrumentation. This has traditionally been considered a governmental function. But new technologies are changing that. Now private citizens can conduct SIGINT activities.

    Dec 5, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Blockchain cryptocurrency financial technology concept with binary code

    Commentary

    Blockchain: Should We Believe the Hype?

    Industry, governments and academics are all speculating on the ways in which blockchain could revolutionize everything from finance to the music industry. Now is the time for policymakers and industry to take note and find out what blockchain could offer.

    Nov 30, 2017

  • Report

    Robust and Resilient Logistics Operations in a Degraded Information Environment

    The U.S. Air Force asked RAND Project AIR FORCE to examine how tactics, techniques, and procedures should change to improve an airman's ability to detect, evaluate, and mitigate significant corruption of logistics data.

    Nov 22, 2017

  • Report

    The U.S.-Japan Alliance and Deterring Gray Zone Coercion in the Maritime, Cyber, and Space Domains

    China is trying to change the status quo in the Indo-Pacific through gray zone coercion -- actions below the threshold that would trigger a military response. This report focuses on deterring such coercion in the maritime, cyber, and space domains.

    Nov 20, 2017

  • Computer hacker with magnifying glass

    Commentary

    It's Time for the International Community to Get Serious About Vulnerability Equities

    Multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It’s time for the international community to get serious about vulnerability equities.

    Nov 15, 2017

  • Report

    The Creation of the PLA Strategic Support Force and Its Implications for Chinese Military Space Operations

    This report explores the missions and organization of China's Strategic Support Force, created in 2015 to develop and employ space capabilities, in particular launch and operation of satellites to provide C4ISR capabilities for joint operations.

    Nov 10, 2017

  • Tool

    Interfacing Force-on-Force and Communications Models: MANA and JNE

    This report documents an interface between an agent-based force-on-force simulation and a network simulation for the U.S. Army's Cyber Center of Excellence, Capabilities Development and Integration Directorate (CDID), Cyber Battle Lab.

    Nov 8, 2017

  • Congressman Adam Schiff speaks at a House Intelligence Committee meeting about Russian use of social media to influence U.S. elections, Washington, D.C., November 1, 2017

    Commentary

    Covert Influence Is the New Money Laundering

    Anti-money laundering laws provide lessons for combating covert influence operations, such as Russian meddling in the U.S. election. These laws could be adapted for online media models that do not require users to be paid customers.

    Nov 6, 2017

  • Trading information about Equifax and the company logo are displayed on a screen on the floor of the New York Stock Exchange, September 8, 2017

    Commentary

    The Equifax Breach: Yawn, or Yikes?

    In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.

    Nov 3, 2017

  • Agricultural farm land is seen in the Imperial Valley near El Centro, California, May 31, 2015

    Testimony

    Agriculture Security in America

    The United States has made progress in developing systems to safeguard the nation's agriculture. But threats persist because of socioeconomic, environmental, and ecological factors.

    Nov 2, 2017

  • Report

    National Guard Youth ChalleNGe: Program Progress in 2015–2016

    National Guard Youth ChalleNGe is a residential, quasi-military program for young people at risk of dropping out of high school. This report provides information on recent ChalleNGe participants and develops metrics of program success.

    Nov 1, 2017

  • Hands typing with visual of computer code

    Multimedia

    Equifax and the Data-Breach Era: How Worried Should We Be?

    Large-scale data breaches like those of Equifax and OPM compromised the personal data of millions of people. What can be done to improve the response to such breaches? In this October 26th congressional briefing, Lillian Ablon and Sina Beaghley address victim and lawmaker reactions, national security implications, and considerations for policymakers.

    Oct 26, 2017

  • Robots working with cardboard boxes on a conveyer belt

    Commentary

    AI's Promise and Risks

    Artificial intelligence seems to be advancing faster than efforts to understand its potential consequences, good and bad. And discussions about AI often veer toward extremes. More balanced, rigorous analysis is needed to help shape policies that mitigate AI's risks and maximize its benefits.

    Oct 24, 2017

  • Periodical

    RAND Review: November-December 2017

    This issue highlights recent RAND research on post-9/11 military caregivers; RAND-Lex, a computer program built at RAND that can analyze huge data sets of text; and the implications of climate change on Arctic cooperation.

    Oct 19, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Understanding the landscape of Distributed Ledger Technologies/Blockchain: Challenges, opportunities, and the prospects for standards

    This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.

    Oct 18, 2017