Cyber and Data Sciences

Featured

RAND was at the forefront of early computing and data science. In the 1950s, we built computers to improve researchers' analytic and modeling capabilities. We also developed data communications technologies that were forerunners of the internet. Today, RAND experts recommend policies and best practices to support safe and secure technological innovation and adoption.

  • A green wireframe model covers an actor's lower face during the creation of a synthetic facial reanimation video, aka a deepfake, in London, Britain, February 12, 2019, photo by Reuters TV

    Report

    The Threat of Deepfakes

    Jul 6, 2022

    Various AI technologies are ripe for use in disinformation campaigns. Deepfake videos represent an obvious threat, but voice cloning, deepfake images, and generative text also merit concern. And websites now offer access to deepfake services.

  • An inside look at an ion trap within Quantinuum's quantum computer, which processes data using trapped-ion technology, Broomfield, Colorado, December 6, 2021, photo by Quantinuum/Handout via Reuters

    Commentary

    Hack Post-Quantum Cryptography Now So That Bad Actors Don't Do It Later

    Jul 28, 2022

    The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers. If a bounty helps catch a vulnerability before it's deployed, then the modest cost of the bounty could prevent much higher costs down the line.

Explore Cyber and Data Sciences

  • A coder types on laptop keyboard

    Commentary

    Reining in Internet Abuse

    The internet is being used for harmful, unethical, and illegal purposes. Examples include incitement and recruitment by terrorists, cyber bullying, and malicious fake news. Americans say they are unhappy with the tone of the online discourse, but are reluctant to consider potential remedies.

    Mar 23, 2017

  • News Release

    News Release

    RAND Study Examines 200 Real-World 'Zero-Day' Software Vulnerabilities

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

    Mar 9, 2017

  • News Release

    News Release

    Direct-to-Consumer Telehealth Prompts New Use of Medical Services; Not Likely to Decrease Health Spending

    Direct-to-consumer telehealth services—touted as a convenient and less-expensive way to get care for minor ailments—appear to prompt new use of medical services and thus may drive up medical spending rather than trim costs.

    Mar 6, 2017

  • A man being interviewed by police in dark interrogation room

    Commentary

    What Data Is the Government Keeping About You?

    Governments are amassing a wealth of data on citizens, a trend that will continue as technology advances. But with no reliable way to ensure that the data is accurate, risks abound. In the criminal justice system, for example, poor quality data could affect individual freedoms and employability.

    Mar 1, 2017

  • Cyber gavel illustration

    Commentary

    Does the Court System Know as Much About ESI as Your Teenager? It Should.

    Electronically stored information (ESI) from smart appliances, fitness trackers, and other devices is making its way into the U.S. court system. Judges and lawyers need to better understand this evidence so they can challenge it or rule on its admissibility in court.

    Feb 21, 2017

  • Doctor using a tablet computer

    Commentary

    Responsible e-Prescribing Needs e-Discontinuation

    Implementation of electronic prescribing has been a big success in health information technology. But most e-prescribing systems don't allow electronic cancellation of orders. Adding this feature could help reduce medication errors.

    Feb 7, 2017

  • Binary code bursts from phones held by a crowd of people with an overlay of glowing electronic numbers

    Commentary

    What Is the Adversary Likely to Do with the Clearance Records for 20 Million Americans?

    The state actor that hacked the Office of Personnel Management could use the stolen information to further its domestic control against dissidents, enhance its foreign intelligence, and improve its position in the global military and economic order.

    Jan 20, 2017

  • Man opening a black box with a light inside

    Commentary

    No Company Should Be Able to Keep You from Checking Your Government's Math

    Data and computer models are becoming more and more important for making policy decisions on everything from prison sentences to tax bills. But citizens should be able to “check the math” on decisions that affect them.

    Jan 18, 2017

  • News Release

    News Release

    Rise of Technology in Criminal Proceedings Poses Risk to Protecting Individuals' Rights

    Personal devices like fitness trackers and smartphones are likely to be used increasingly in criminal investigations. Such technology offers new tools to law enforcement, but raises unique issues regarding constitutional rights such as self-incrimination.

    Jan 10, 2017

  • President Barack Obama talks about cyber hacking during the U.S. presidential election as he holds his final news conference of the year at the White House in Washington, December 16, 2016

    Commentary

    How to Deter Foreign Cyberattacks on U.S. Elections

    Deterring future cyber-meddling in U.S. elections will require convincing adversaries — Russia and others — that any future such meddling will either be ineffective and/or too costly to be worthwhile.

    Jan 5, 2017

  • Russia's President Vladimir Putin (C), Foreign Minister Sergei Lavrov (L), and Defence Minister Sergei Shoigu attend a meeting at the Kremlin in Moscow, Russia December 29, 2016

    Commentary

    No Quick Fix with Russia

    A series of small steps is more likely to improve Western and Russian security than an attempt at a total reset. At the same time, sanctions against Russia over its actions in Ukraine, and NATO actions to reassure and protect allies, must continue.

    Jan 3, 2017

  • People protest as electors gather to cast their votes amid allegations of Russian hacking to try to influence the U.S. presidential election in Harrisburg, Pennsylvania, December 19, 2016

    Commentary

    Were Russian Hacks Really a Threat to American Democracy?

    The Russian attacks should be another wake up call about the relentless probing of America's digital assets by adversaries and the potential consequences of weak cyber defenses. But U.S. democracy appears to have survived safe and sound.

    Dec 30, 2016

  • A sailor opens a network monitoring program during an exercise at Marine Corps Air Station Miramar, California, August 22, 2016

    Commentary

    America's Cyber Security Dilemma — and a Way Out

    The United States should continue to pursue international cooperation in cyberspace, improve its ability to identify and expose the sources of attacks, and improve its oversight of the development and adoption of cyber-related technologies.

    Dec 22, 2016

  • Digital Tablet with stethoscope and brain scan

    Commentary

    Toward a Learning Behavioral Health Care System

    New technologies for capturing and sharing data have begun to transform the way providers practice medicine in the United States. Expanding these technologies to behavioral health care could enhance the delivery of services and improve outcomes for millions of Americans.

    Dec 20, 2016

  • A doctor and a patient holding a telehealth session involving x-ray results and a blood pressure reading

    Commentary

    Telehealth Alone Won't Increase Health Care Access for the Underserved

    Telehealth can bring care into communities that have limited access to providers or facilities. But it must be integrated into a well-functioning system that can address the added needs that telehealth generates.

    Dec 16, 2016

  • The lobby of the CIA Headquarters Building in Langley, Virginia

    Commentary

    How Can We Be Sure Putin Hacked the Democrats?

    Did Russia conduct an election cyber campaign against America? There is likely no smoking gun. But there is presumably a preponderance of technical evidence, intelligence, and benefits to Moscow that points in that direction.

    Dec 16, 2016

  • Events @ RAND Audio Podcast

    Multimedia

    What Is the Future of Artificial Intelligence?

    In this Events @ RAND podcast, a panel of experts discusses the role of AI in society, including its incredible promise and the pressing concerns it presents.

    Dec 14, 2016

  • Activists dressed as the artist Vincent van Gogh hold signs that say, "Don't listen to Russian propaganda," outside the Dutch embassy in Kiev, Ukraine, February 5, 2016

    Blog

    Insights on the Russian 'Firehose of Falsehood'

    A massive, ingenious, and concerning campaign of propaganda has been pumping westward for years, supporting the Russian agenda in Ukraine and Syria and likely trying to influence the U.S. presidential election.

    Dec 13, 2016

  • News Release

    News Release

    Twenty Percent of U.S. Households View Landline Telephones as an Important Communication Choice

    The predicted death of the household landline telephone in the United States may be premature. While most Americans like their cell phones, twenty percent of American households still think having a landline phone is important.

    Nov 17, 2016

  • Journalist Malcolm Gladwell and Houston Astros' General Manager Jeff Luhnow at RAND's Politics Aside event in Santa Monica, November 12, 2016

    Blog

    The Art of Data in Baseball

    The traditional baseball scout's keen eye is no longer deemed sufficient to rate talent, said Jeff Luhnow, general manager of the Houston Astros, at RAND's Politics Aside event. Analysts check curveball spin rates, computer-modeled swing mechanics, and even sleep habits.

    Nov 15, 2016