Cybersecurity

Featured

Technology allows individuals and organizations access to more comprehensive and diverse information, but this access requires that electronic information, networks, data repositories, and data transmissions be adequately safeguarded. RAND has developed a large body of research focused on recognizing the potential threats to information security and data integrity, as well as implications for personal and institutional privacy.

Explore Cybersecurity

  • Montage of best RAND videos of 2019, image by Alyson Youngblood/RAND Corporation

    Multimedia

    Best RAND Videos of 2019

    At RAND, we examine complex issues in dozens of policy areas. And when our researchers aren't busy coming up with solutions to some of the world's biggest problems, sometimes they step in front of the camera to highlight their findings. Here are our top videos of 2019.

    Dec 20, 2019

  • U.S. Marines with 1st Tank Battalion, 1st Marine Division participate in a field exercise (FEX) at Marine Corps Air Ground Combat Center Twentynine Palms, California, Oct. 22, 2019, photo by Sgt. Miguel A. Rosales/U.S. Marine Corps

    Commentary

    First, Manage Security Threats to Machine Learning

    Deception is as old as warfare itself. Until now, the targets of deception operations have been humans. But the introduction of machine learning and artificial intelligence opens up a whole new world of opportunities to deceive by targeting machines.

    Nov 4, 2019

  • Blog

    White Supremacist Terrorism, Wildfires, the Dark Web: RAND Weekly Recap

    This weekly recap focuses on violent white supremacy, power outages to prevent wildfires, how to catch criminals on the dark web, and more.

    Nov 1, 2019

  • Cybercrime concept of handcuffs icon on a digital background, photo by blackboard/Adobe Stock

    Report

    What Could Help Law Enforcement Deal with Crime on the Dark Web?

    Crime in traditional online forums often leaves a trail of data that can be followed. But on the dark web, the process of collecting those data and turning them into evidence can be difficult. A panel of law enforcement practitioners and researchers identified ways to address this challenge.

    Oct 29, 2019

  • Illustration of a large gavel crashing down on self-driving cars, illustration by Chris Philpot

    Essay

    Who's Responsible When Your Car Gets Hacked?

    Cars are becoming "fast, heavy artificial intelligences on wheels," a RAND report cautions, and that means they're becoming vulnerable. Potentially billions of dollars ride on the question of who has the legal responsibility to keep hackers from grabbing the wheel or cutting the brakes.

    Oct 23, 2019

  • Digital concept of a brain, photo by Vertigo3d/Getty Images

    Commentary

    Our Future Lies in Making AI Robust and Verifiable

    We are hurtling towards a future in which AI is omnipresent. This AI-enabled future is blinding in its possibilities for prosperity, security, and well-being. Yet, it is also crippling in its fragility. What might it take for it all to come to a screeching halt?

    Oct 22, 2019

  • Report

    Report

    Literature on Personnel Vetting Processes and Procedures: Annotated Selected Bibliography

    To help inform the U.S. government in its efforts to improve the vetting processes for public trust and national security positions and protect its assets and information, the authors assembled a selected bibliography of relevant literature.

    Oct 14, 2019

  • Blog

    Virtual Societal Warfare, Iran, Opioids: RAND Weekly Recap

    This weekly recap focuses on the risk of virtual societal welfare, Iran's domestic debates, federal policy options for supervised consumption sites, and more.

    Oct 11, 2019

  • Concept of artificial intelligence winning at chess, photo by JohnDWilliams/Getty Images

    Report

    The Emerging Risk of Virtual Societal Warfare

    Living in an information society opens unprecedented opportunities for hostile rivals to cause disruption, delay, inefficiency, and harm. Social manipulation techniques are evolving beyond disinformation and cyberattacks on infrastructure sites. How can democracies protect themselves?

    Oct 9, 2019

  • The entrance to Lakhta-2 business center, which reportedly houses news organizations and internet research companies known for trolling on social media, in St. Petersburg, Russia, February 20, 2018, photo by Anton Vaganov/Reuters

    Commentary

    What Translation Troubles Can Tell Us About Russian Information Warfare

    Russian information warfare has attracted significant international attention since 2014. But little research has focused on its apparent shortcomings. Most notable are the confusing translation mistakes that undermine Moscow's attempts at covert influence efforts.

    Oct 4, 2019

  • Blog

    E-Cigarettes, 'Stand Your Ground,' Cyber Coercion: RAND Weekly Recap

    This weekly recap focuses on the planned federal ban on flavored e-cigarettes, “stand your ground” laws, understanding cyber coercion, and more.

    Sep 20, 2019

  • World map in red pixels on a dark background, photo by Lidiia Moor/Getty Images

    Report

    Are States Using Cyber Operations to Coerce Others?

    Cyber operations have become another tool of statecraft. But have any cyber operations sponsored by Russia, China, Iran, or North Korea met the definition of cyber coercion? If so, how? And what should the United States do to respond?

    Sep 17, 2019

  • Blog

    Social Manipulation, Boko Haram, Citizen Scientists: RAND Weekly Recap

    This weekly recap looks at hostile social manipulation, stopping the next Boko Haram, a citizen-science success story, and more.

    Sep 6, 2019

  • News Release

    News Release

    Hostile Social Manipulation by Russia and China a Growing but Poorly Understood Threat

    With the role of information warfare in global strategic competition becoming much more apparent, a new RAND Corporation report delves into better defining and understanding the challenge facing the United States by focusing on the hostile social manipulation activities of the two leading users of such techniques: Russia and China.

    Sep 4, 2019

  • Journal Article

    Journal Article

    Cybersecurity: A State-of-The-Art Review

    This study examines the current state-of-the-art in the field of cybersecurity, reporting on the methods and analysis undertaken to assess this area. It also provides research questions for the NCTV to consider for their research agenda.

    Sep 4, 2019

  • Illustration of a network, security information, and AI technology, image by issaronow/Adobe Stock

    Report

    'Hostile Social Manipulation' Is a Growing Threat to the United States

    Hostile social manipulation includes social media campaigns, sophisticated forgeries, and spreading rumors and conspiracy theories. As these techniques are used by Russia and China, Washington should invest more resources to understand and counter them.

    Sep 3, 2019

  • The U.S. Navy's guided-missile destroyer USS William P. Lawrence transits international waters of the South China Sea with ships from India, Japan, and the Philippines, May 5, 2019, photo by Japan Maritime Self-Defense Force

    Report

    The Thickening Web of Asian Security Cooperation

    Key U.S. allies and partners in the Indo-Pacific have been strengthening their defense ties with regional actors over the past two decades. To what extent is this a response to the perceived threat of a rising, assertive China? And how will these new commitments affect the United States?

    Aug 29, 2019

  • Research Brief

    Research Brief

    Assessing the Use of Data Analytics in Department of Defense Acquisition

    This research brief addresses congressional concerns about the use of data analysis, measurement, and other evaluation-related methods in U.S. Department of Defense acquisition programs and decisionmaking.

    Aug 13, 2019

  • Report

    Report

    Assessing Department of Defense Use of Data Analytics and Enabling Data Management to Improve Acquisition Outcomes

    Congress asked about acquisition data analytics in the Department of Defense. This report identifies and measures capabilities and recent progress. Barriers to improvement include a culture against data sharing due to security and burden concerns.

    Aug 13, 2019

  • Blog

    Data Breaches, Correctional Security, Fentanyl: RAND Weekly Recap

    This weekly recap focuses on how consumers respond to data breaches, new security challenges facing correctional institutions, how fentanyl is changing the opioid crisis, and more.

    Aug 2, 2019