Cyber and Data Sciences

Featured

RAND was at the forefront of early computing and data science. In the 1950s, we built computers to improve researchers' analytic and modeling capabilities. We also developed data communications technologies that were forerunners of the internet. Today, RAND experts recommend policies and best practices to support safe and secure technological innovation and adoption.

  • Blue and red cables transmitting data signals, image by Alexey Novikov/Adobe Stock

    Report

    Response Options to Cyberattacks on U.S. Government Networks

    Apr 29, 2022

    The United States has proved vulnerable to cyber incidents, and a lack of response has emboldened Russia and China to expand their cyber espionage activities. Have U.S. responses changed over time or affected adversary behavior? What lessons do these cases offer for future policymaking?

  • A Flight Commander Course student interacts with artificial intelligence in a live simulation on Joint Base McGuire-Dix-Lakehurst, New Jersey, September 27, 2019, images by A1C Ariel Owings/U.S. Air Force and Jamesteohart/Adobe Stock; design by Carol Ponce/RAND Corporation

    Report

    Exploring the Civil-Military Divide over Artificial Intelligence

    May 11, 2022

    Artificial intelligence is anticipated to be a key capability for enabling the U.S. military to maintain its dominance. How do software engineers and other technical staff in the industry view the defense community? Are they willing to contribute to AI-related projects for military use?

Explore Cyber and Data Sciences

  • A cache of guns and ammunition uncovered by U.S. federal investigators in the home of U.S. Coast Guard lieutenant Christopher Paul Hasson in Silver Spring, Maryland, February 20, 2019, photo by U.S. Attorney's Office Maryland/Reuters

    Commentary

    Overdue Overhaul: Security Clearance Reform in a Decade of Leakers, Spies, and Insider Threats

    With the legislative and executive branches seemingly on the same page regarding the need for changes to the security clearance and vetting system, long overdue reform appears to be within reach.

    Apr 15, 2019

  • Blog

    Cryptocurrency, Russian Social Media, Congestion Pricing: RAND Weekly Recap

    This weekly recap focuses on cryptocurrencies, Russian social media influence, congestion pricing, and more.

    Mar 29, 2019

  • Students building something together with tiles, photo by FatCamera/Getty Images

    Commentary

    How Do You Measure Social and Emotional Learning?

    As the desire to improve SEL for all students grows, it is increasingly important to measure its effectiveness. But the field has lacked an organized method of identifying, choosing, and using the best assessments to measure students' competencies. Two newly developed tools can help.

    Mar 28, 2019

  • Blog

    Christchurch, Brexit, China and Israel: RAND Weekly Recap

    This weekly recap focuses on the Christchurch shootings, how the UK can improve its post-Brexit prospects, China and Israel's evolving relationship, and more.

    Mar 22, 2019

  • Interior of autonomous car with ones and zeroes superimposed, photo by metamorworks/Getty Images

    Commentary

    Why AV Safety and Cybersecurity Need to Be Pursued in Tandem

    Safety and cybersecurity are generally pursued by separate teams within autonomous vehicle companies. A joint approach to standards could optimize safety and cybersecurity and reduce overall risks to autonomous vehicle operation.

    Mar 20, 2019

  • Imam Ibrahim Abdul Halim of the Linwood Mosque is embraced by Father Felimoun El-Baramoussy from the Coptic Church, in Christchurch, New Zealand March 18, 2019, photo by Edgar Su/Reuters

    Commentary

    The Christchurch Massacre Was Another Internet-Enabled Atrocity

    Terrorism has become an internet-enabled abuse—incited, propagated, and sometimes organized and concealed by online activity. Who should be held accountable for abusive content, the author or the publisher? And what role should the government play in regulating it?

    Mar 20, 2019

  • Blog

    AI Bias, Opioids, Afghanistan: RAND Weekly Recap

    This weekly recap focuses on the danger of artificial intelligence bias, infants with opioid withdrawal symptoms, peace talks in Afghanistan, and more.

    Mar 15, 2019

  • A man visits the Huawei Cyber Security Transparency Centre in Brussels, Belgium, March 5, 2019, photo by Yves Herman/Reuters

    Commentary

    Public Evidence of Huawei as a Cyber Threat May Be Elusive, but Restrictions Could Still Be Warranted

    Although a “smoking gun” of Huawei involvement in government-directed espionage remains elusive, the United States has compelling security and economic reasons to consider limiting the involvement of Chinese telecommunications companies in its domestic networks.

    Mar 7, 2019

  • Andrew Morral presents testimony before the House Appropriations Subcommittee on Labor, Health and Human Services, Education, and Related Agencies on March 7, 2019.

    Multimedia

    Reducing Disagreements on Gun Policy Through Scientific Research and an Improved Data Infrastructure

    An overview of testimony by Andrew R. Morral presented before the House Appropriations Subcommittee on Labor, Health and Human Services, Education, and Related Agencies on March 7, 2019.

    Mar 7, 2019

  • School children stretching up at lesson, photo by mediaphotos/Getty Images

    Commentary

    Measuring Social-Emotional Skills, Carefully

    In the often-fraught debate over education policy, there is growing agreement that educators should pay close attention to the development of the social and emotional skills that allow students to persevere when working on difficult tasks, regulate emotions, and work effectively in teams. But measuring such skills remains a significant challenge.

    Feb 28, 2019

  • Cyborg head using artificial intelligence to create digital interface 3D rendering, image by sdecoret/Adobe Stock

    Q&A

    The Promise and Perils of AI: Q&A with Douglas Yeung

    Douglas Yeung, a social psychologist at RAND, discusses how any technology reflects the values, norms, and biases of its creators. Bias in artificial intelligence could have unintended consequences. He also warns that cyber attackers could deliberately introduce bias into AI systems.

    Feb 27, 2019

  • Young Asian woman looking at an eye scanner image, photo by Photographer is my life/Getty Images

    Commentary

    Biology, in the Language of the People

    As technology and the ability to gather ever-growing amounts of data move further into the realms of biology and human performance, communication and transparency become increasingly important. Experts should consider whether they are using the words, examples, and models that connect with a broad audience most effectively.

    Feb 21, 2019

  • Elizebeth Smith Friedman, United States Government image

    Commentary

    Book Review: 'The Woman Who Smashed Codes' by Jason Fagone

    'The Woman Who Smashed Codes' by Jason Fagone is the story of Elizebeth Friedman, the mother of modern cryptoanalysis and cryptography. She broke coded messages of organized crime, broke the Nazi Enigma cryptography machine, and deciphered, mapped, and monitored Nazi activities in South America, though it is her husband William who often gets credit.

    Feb 19, 2019

  • Blog

    Shutdown, Hezbollah, Border Wall: RAND Weekly Recap

    This weekly recap focuses on Americans' financial fragility, Hezbollah in Venezuela, assessing the effectiveness of a border wall, and more.

    Feb 15, 2019

  • Hawaii Air National Guardsmen evaluate network vulnerabilities during the Po’oihe 2015 Cyber Security Exercise at the University of Hawaii Manoa Campus, Honolulu, HI, June 4, 2015, photo by Airman 1st Class Robert Cabuco/Hawaii Air National Guard

    Commentary

    Developing an Objective, Repeatable Scoring System for a Vulnerability Equities Process

    If governments seek to create an objective framework for decision making about whether or when to disclose software vulnerabilities, what might that look like? What questions should be included, how should they influence the outcome and how can one interpret the results?

    Feb 5, 2019

  • A helicopter co-pilot reads a map en route to Playas Training Area, New Mexico during exercise Angel Thunder 2013, photo by Stocktrek Images/Getty Images

    Commentary

    America's National Defense Strategy and the Paradox of Technology

    The need for the military to make greater investments in technology is difficult if not impossible to separate from the risks posed by an increasing military reliance on this technology. Striking a balance between the two won't be easy.

    Feb 4, 2019

  • Blog

    Korea, Climate, AI in the Classroom: RAND Weekly Recap

    This weekly recap focuses on four problems on the Korean Peninsula, triaging climate change, using artificial intelligence in the classroom, and more.

    Jan 25, 2019

  • Blog

    Federal Workers, Afghanistan, Sectarianism: RAND Weekly Recap

    This weekly recap focuses on the critical roles of federal workers, withdrawing from Afghanistan, countering sectarianism in the Middle East, and more.

    Jan 18, 2019

  • Accountability in Cyberspace: The Problem of Attribution

    Multimedia

    How to Achieve Accountability in Cyberspace

    Identifying the responsible party behind malicious cyber incidents is necessary for holding bad actors accountable. But there are many challenges that accompany cyber attribution. Creating an independent, global organization that investigates and publicly assigns blame for major hacks could help.

    Jan 14, 2019

  • Artificial eye looking through greenery

    Commentary

    Does the United States Face an AI Ethics Gap?

    Instead of worrying about an artificial intelligence “ethics gap,” U.S. policymakers and the military community could embrace a leadership role in AI ethics. This may help ensure that the AI arms race doesn't become a race to the bottom.

    Jan 11, 2019