Cybercrime

Featured

A wide range of computer security threats exists—including faulty software, password trafficking and fraud, and hostile groups intending to inflict damage—and awareness of these threats varies. RAND has conducted research to measure and increase understanding of the impact of cybercrime on businesses and governments and has addressed such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and actions that can be taken in the face of cyberattack.

  • Illustration of a large gavel crashing down on self-driving cars, illustration by Chris Philpot

    Essay

    Who's Responsible When Your Car Gets Hacked?

    Oct 23, 2019

    Cars are becoming "fast, heavy artificial intelligences on wheels," a RAND report cautions, and that means they're becoming vulnerable. Potentially billions of dollars ride on the question of who has the legal responsibility to keep hackers from grabbing the wheel or cutting the brakes.

  • Cybercrime concept of handcuffs icon on a digital background, photo by blackboard/Adobe Stock

    Report

    What Could Help Law Enforcement Deal with Crime on the Dark Web?

    Oct 29, 2019

    Crime in traditional online forums often leaves a trail of data that can be followed. But on the dark web, the process of collecting those data and turning them into evidence can be difficult. A panel of law enforcement practitioners and researchers identified ways to address this challenge.

Explore Cybercrime

  • North Korean leader Kim Jong-un guides a takeoff and landing drill on a highway airfield in this undated photo released by North Korea's Korean Central News Agency in Pyongyang, October 19, 2014

    Commentary

    How Should the U.S. Respond to the Sony Hack?

    North Korea is likely testing the United States and its cyber community to see where vulnerabilities may exist. So this is not just an issue of how Sony Pictures responds—this is an issue of how the United States responds.

    Dec 11, 2014

  • Oscar-winning actress Jennifer Lawrence has contacted authorities to investigate who stole and posted nude images of her online, part of a reported mass hacking of celebrities' intimate photos

    Commentary

    Hackerazzi: How Naked Celebrities Might Make the Cloud Safer

    Despite data breach after data breach that lays bare the personal information of millions of people, leading to only incremental changes by the hacked company, it seems it only takes a handful of celebrity nude selfies to bring issues like cloud security and multi-factor authentication to the fore causing immediate changes.

    Sep 8, 2014

  • Man in living room with smart television

    Commentary

    Are You Sitting Comfortably? Understanding the Security and Privacy Implications of the Internet-Connected Living Room

    The modern living room contains a range of Internet-connected devices. This increased connectivity comes with privacy and security concerns, threats to consumers, and challenges for industry.

    Sep 3, 2014

  • Two boys sitting on a couch playing video games, photo by Sean Davis/Fotolia

    Report

    Living Room Connected Devices: Opportunities, Security Challenges, and Privacy Implications

    The "Internet-connected living room" poses security and privacy implications for industry and consumers, offering potential benefits as well as threats associated with the technical capabilities of living room connected devices.

    Sep 2, 2014

  • Astronomical observatory

    Periodical

    RAND Review: Vol. 38, No. 2, Summer 2014

    The cover story discusses the rising wave of cybercrime and possible responses to it, while other features highlight research on medical innovation and U.S. security cooperation, plus public policy insights from Victor Hugo.

    Aug 7, 2014

  • car interior with a dashboard computer

    Commentary

    Sounding the Car Alarm on Hackers

    Security protections on vehicles have not kept pace with systems that control safety features, navigation capabilities, and wireless communication functions. Onboard computer networks will likely become much more attractive to hackers.

    Jun 30, 2014

  • two men working in a bright office

    Report

    Shortage of Cybersecurity Professionals Poses Risk to National Security

    Demand for trained cybersecurity professionals who work to protect organizations from cybercrime is high nationwide, but the shortage is particularly severe in the federal government, which does not offer salaries as high as the private sector.

    Jun 17, 2014

  • News Release

    Shortage of Cybersecurity Professionals Poses Risk to National Security

    The nationwide shortage of cybersecurity professionals -- particularly for positions within the federal government -- creates risks for national and homeland security.

    Jun 17, 2014

  • hands on a computer keyboard in a dark room

    Commentary

    The Hackers' Bazaar

    Today's cyber black markets have evolved into playgrounds of financially driven, highly organized and sophisticated groups, often connected with traditional crime organizations.

    Apr 11, 2014

  • An analyst looks at code in the malware lab of a cyber security defense lab at the Idaho National Laboratory

    Report

    Black Markets for Hackers Are Increasingly Sophisticated, Specialized, and Maturing

    Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.

    Mar 24, 2014

  • News Release

    Black Markets for Hackers Are Increasingly Sophisticated, Specialized and Maturing

    Black and gray markets for computer hacking tools, services, and byproducts such as stolen credit card numbers continue to expand, creating an increasing threat to businesses, governments, and individuals.

    Mar 24, 2014

  • digital globe

    Report

    Case Studies Explore Future Technology Landscapes

    Case studies explore a growing volume of primarily civil technology that can both potentially impact and be exploited as UK defense and security capabilities.

    Dec 5, 2013

  • President Barack Obama shakes hands with Jeh Johnson during an announcement for Johnson to be his nominee for Secretary of Homeland Security

    Commentary

    Challenges and Opportunities Ahead for New Homeland Security Secretary

    To ensure the Department of Homeland Security makes progress in the current constrained budget environment, its new secretary must put in place a strategic perspective to guide priorities for how to address the country's most pressing problems in disaster management, immigration reform, cybersecurity, violent extremism, and nuclear terrorism.

    Oct 24, 2013

  • Network defender working at the Air Force Space Command Network Operations & Security Center at Peterson Air Force Base in Colorado Springs

    Commentary

    Don't Buy the Cyberhype

    Although the risk of a debilitating cyberattack is real, the perception of that risk is far greater than it actually is, writes Martin Libicki. In fact, a major cyberattack of the kind intelligence officials fear has not taken place in the 21 years since the Internet became accessible to the public.

    Aug 16, 2013

  • server, datacenter, computer, network, room, interior, data, center, networking, rack, hosting, internet, web, framework, farm, workstation, render, pc, tower, cluster, database, business, security, technology, mainframe, equipment, white, processor, ethernet, storage, servers, industry, connection, row, firewall, hardware, service, infrastructure, system, information, domain, host, object, terminal, telecommunication, communication, black, net, connectivity, 3d

    Report

    Stocktaking Military Cyber Defense Capabilities in the European Union

    As the stakes of cyber threats rise, the EU needs to be able to provide a consistent level of cyber defense capability across member states. This stocktaking exercise aimed to inform further action at the EU and national level.

    Jun 3, 2013

  • close up of person using an ATM

    Commentary

    The Real Cyber Threat

    The fact is that the United States needs to gear up for the coming era of cyber threats — and start by ensuring its financial flank is not catastrophically compromised, writes Mark Sparkman.

    May 21, 2013

  • Globe and computer keyboard

    Commentary

    What Is an Act of Cyberwar? It's a Decision, Not a Conclusion

    Perhaps making war can persuade the attacker to stop. Yet, war also risks further disruption, great cost, as well as possible destruction and death—especially if matters escalate beyond cyberspace, writes Martin Libicki.

    Mar 4, 2013

  • digital globe with data orbits

    Commentary

    The European Cyber Security Strategy: Too Big to Fail?

    The European Cyber Security Strategy is remarkable because it tries to co-ordinate policy across three areas whose competences and mandates were formerly very separate: law enforcement, the 'Digital Agenda', and defence, security, and foreign policy, writes Neil Robinson.

    Feb 8, 2013

  • Commentary

    Opening of the European Cybercrime Centre — a Journey Begins

    While the opening of the EC3 at Europol, in line with our first-choice scenario, is very welcome, our study uncovered a range of risks that the EC3 will need to confront if it is to tackle cybercrime in a more coordinated and effective manner, writes Neil Robinson.

    Jan 11, 2013

  • Running a test in a U.S. Air Force cyber lab

    Blog

    A Cybercrisis Is Inevitable — and Manageable

    The United States can manage a cybercrisis by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise.

    Jan 9, 2013