Cyber and Data Sciences

Featured

RAND was at the forefront of early computing and data science. In the 1950s, we built computers to improve researchers' analytic and modeling capabilities. We also developed data communications technologies that were forerunners of the internet. Today, RAND experts recommend policies and best practices to support safe and secure technological innovation and adoption.

  • Newspapers and social media terms in LED display, photos by artisteer/Getty Images and phive2015/Adobe Stock

    Research Brief

    Facts vs. Opinions: How the News Is Changing in the Digital Age

    May 14, 2019

    Technology has transformed how people get information. But it has also affected the way that information is produced, shared, and disseminated. How much has news reporting actually changed over the last three decades?

  • Mock Bitcoins are displayed in Berlin, January 7, 2014, photo by Pawel Kopczynski/Reuters

    Report

    Terrorist Use of Cryptocurrencies

    Mar 27, 2019

    Counterterrorism finance strategies have reduced terrorist access to official currencies. Will terrorist groups therefore increase their use of digital cryptocurrencies? New ones have emerged, including some that claim to be more private and secure than Bitcoin, but they also have limitations that make them less viable.

Explore Cyber and Data Sciences

  • Report

    Issues with Access to Acquisition Data and Information in the Department of Defense: Considerations for Implementing the Controlled Unclassified Information Reform Program

    This report provides a closer look at the current state of the Controlled Unclassified Information (CUI) program as well as how the new CUI rules might affect DoD acquisition data management.

    Jan 24, 2018

  • Shiny gold Bitcoin coin with gun on black background

    Commentary

    Bitcoin and the Dark Web: The New Terrorist Threat?

    Bitcoin has become the prominent currency of the dark web, which is often used to buy illegal goods, such as weapons and drugs. Anecdotal evidence suggests terrorists are using cryptocurrency and the dark web, but further investigation is needed.

    Jan 22, 2018

  • Multimedia

    Exploring "Truth Decay"

    In this Call with the Experts, RAND president and CEO Michael Rich and political scientist Jennifer Kavanagh discuss the causes and consequences of Truth Decay, and how they compare with previous eras in U.S. history.

    Jan 17, 2018

  • Torn American flag waving in the wind on a cloudy day

    Commentary

    The Diminishing Role of Facts in American Public Life

    Without agreement about objective facts and a common understanding of and respect for data and analytical interpretations of those data, it becomes nearly impossible to have the types of meaningful policy debates that form the foundation of democracy.

    Jan 17, 2018

  • News Release

    Declining Trust in Facts, Institutions Imposes Real-World Costs on U.S. Society

    Americans' reliance on facts to discuss public issues has declined significantly in the past two decades, leading to political paralysis and collapse of civil discourse. This phenomenon, referred to as “Truth Decay,” is defined by increasing disagreement about facts, a blurring between opinion and fact, an increase in the relative volume of opinion and personal experience over fact, and declining trust in formerly respected sources of factual information.

    Jan 16, 2018

  • A row of people on their mobile phones

    Research Brief

    Truth Decay: A Threat to Policymaking and Democracy

    The line between fact and fiction in American public life is blurring. This “Truth Decay” phenomenon affects democracy and political and civil discourse, driving wedges between policymakers and neighbors alike. But research and analysis can serve as a launching point to rein Truth Decay in.

    Jan 16, 2018

  • The words Truth Decay over a fading American flag painted on wood

    Report

    Declining Trust in Facts and Institutions Imposes Costs on Society

    “Truth Decay” is the diminishing reliance on facts and analysis in American public life. It has many damaging consequences: the erosion of civil discourse, political paralysis, alienation and disengagement from political and civic institutions, and uncertainty over U.S. policy.

    Jan 16, 2018

  • A composite image with hands on a keyboard and a padlock surrounded by a visualisation of a computer network

    Tool

    Estimating the Global Cost of Cyber Risk Calculator

    This Excel-based modeling and simulation tool estimates present and future global costs of cyber attacks and incidents. Users can also alter assumptions to investigate a wide variety of research questions.

    Jan 15, 2018

  • Report

    Estimating the Global Cost of Cyber Risk: Methodology and Examples

    This report shares a transparent and adaptable methodology for estimating present and future global costs of cyber risk. The report has a companion Excel-based modeling and simulation platform that allows users to alter assumptions.

    Jan 15, 2018

  • A security lock symbol on computer circuit board

    Report

    Law Enforcement Cyber Center: Final Technical Report

    Cybercrime is a challenge for local and state law enforcement. The Law Enforcement Cyber Center (LECC) was established to provide a resource to combat cybercrime. This report summarizes the LECC's activities and provides recommendations.

    Jan 15, 2018

  • Government agents tracking cybercrime

    Commentary

    How the Pentagon Should Deter Cyber Attacks

    Foreign hackers are not afraid to launch attacks on the United States in cyberspace that they would not dare risk in a real theater of war. As cyber aggression gets worse and more brazen, the U.S. must figure out how to deter foreign actors in cyberspace as effectively as it does in nuclear and conventional warfare.

    Jan 10, 2018

  • Conceptual image of human voice

    Commentary

    Fake Voices Will Become Worryingly Accurate

    New technology can convincingly fake the human voice and create security nightmares. Considering the widespread distrust of the media, institutions, and expert gatekeepers, audio fakery could start wars.

    Jan 8, 2018

  • Mert Davies' briefcase in the 1960s

    Blog

    Mert Davies: All-Star Pioneer of the Cosmos

    Merton Davies spent his early years using satellite imagery to spy on terrestrial targets. His work led to the first successful reconnaissance satellite, Corona. Later, he used deep-space photographs to map the planets in our solar system.

    Jan 5, 2018

  • Tool

    Defensive Space Analysis Tool (DSPAT): Version 2.0

    This manual explains how to use the Defensive Space Analysis Tool (DSPAT), which was developed to compare alternative approaches to space control in terms of their mission effectiveness, feasibility, escalation risk, and political cost.

    Jan 5, 2018

  • Report

    Gaming Space: A Game-Theoretic Methodology for Assessing the Deterrent Value of Space Control Options

    This report introduces and explains a game-theoretic methodology to help decisionmakers assess the potential effects of alternative approaches to space control.

    Jan 5, 2018

  • The new Smart concept autonomous car Vision EQ fortwo model is presented during the Frankfurt Motor Show (IAA) in Frankfurt, Germany, September 12, 2017

    Commentary

    Autonomous Vehicles: Terrorist Threat or Security Opportunity?

    Terrorist groups that track developments in technology could be considering using self-driving cars in place of suicide bombers or for ramming attacks. But autonomous vehicle capabilities offer a range of potential benefits to law enforcement and security operations, too.

    Jan 3, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017

    Commentary

    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • Journal Article

    Collaborative Targeted Learning Using Regression Shrinkage

    While the underlying theory of collaborative targeted minimum loss-based estimation is quite general, current implementations involve greedy stepwise selection of covariates into the exposure model.

    Dec 15, 2017

  • Journal Article

    Core Components for a Clinically Integrated mHealth App for Asthma Symptom Monitoring

    Smartphone-based health apps - using patient reported outcomes - can help asthma patients monitor symptoms between doctor visits.

    Dec 15, 2017

  • Data sharing and privacy concept

    Commentary

    Collaboration Is the Best Strategy to Combat Population Health Concerns

    The greatest opportunities to improve health happen pretty much everywhere but the doctor's office. Collaborative programming that merges strategies from housing, education, or labor could make a big difference.

    Dec 14, 2017