Homeland Security

  • Brian Michael Jenkins at the One Night with RAND event on November 8, 2018

    Blog

    Reflecting on the Past to Counter Future Terrorism

    One Night with RAND brought together leaders in business, government, academia, and philanthropy to pay tribute to Brian Michael Jenkins and mark his 50-year affiliation with RAND and his substantial body of research on terrorism. Jenkins and other experts discussed the evolution of terrorism and strategies for countering it in the future.

    Nov 14, 2018

  • Report

    Improving C2 and Situational Awareness for Operations in and Through the Information Environment

    Every military activity has informational aspects, but the information environment (IE) is not well integrated into military planning, doctrine, or processes. Better understanding of the IE will improve command and control and situational awareness.

    Nov 1, 2018

  • Report

    Secrecy in U.S. National Security: Why a Paradigm Shift Is Needed

    This Perspective summarizes an examination of the adequacy of the system for governing national security information secrecy. It finds the present secrecy paradigm failing and proposes major reforms in making, protecting, and releasing secrets.

    Nov 1, 2018

  • Research Brief

    Requirements for Better C2 and Situational Awareness of the Information Environment

    Every military activity has informational aspects, but the information environment (IE) is not well integrated into military planning, doctrine, or processes. Better understanding of the IE will improve command and control and situational awareness.

    Nov 1, 2018

  • Refugees and migrants try to warm themselves up, Indjija, Serbia, October 5, 2016

    Commentary

    In Refugee Vetting, How Good Is Good Enough?

    A security policy that depends too heavily on vetting, and expects it to be foolproof, is likely to fall short. A better security standard the administration could consider is not whether vetting failures ever occur, but rather whether they pose an acceptable risk to the United States.

    Nov 1, 2018

  • Report

    Evaluating interventions that prevent or counter violent extremism: A practical guide

    This document provides an overview of data collection methods and evaluation designs suitable for evaluating interventions and programmes designed to prevent and counter violent extremism and radicalisation.

    Oct 30, 2018

  • Cameroonian President Paul Biya casts his ballot while his wife Chantal Biya watches at a polling station during the presidential election in Yaounde, Cameroon October 7, 2018

    Commentary

    Cameroon's Days as Reliable U.S. Partner May Be Numbered

    The Cameroonian government is becoming more authoritarian under President Paul Biya. His re-election could be bad news for Cameroon and the region, but also for the United States.

    Oct 26, 2018

  • The Security Operation Centre for Telstra, Australia's biggest telecoms firm, which is used to monitor, detect and respond to security incidents, including cyber attacks, in Sydney, Australia, August 24, 2017

    Commentary

    Financial Frameworks for Cybersecurity Are Failing

    Cybersecurity has become a team sport with all participants on the field, but playing without clear rules, without a team approach, and without knowing when to pass the ball or to whom. It's the collective responsibility of consumers, technology companies, government officials, and schools.

    Oct 25, 2018

  • Journal Article

    The Trade in Small Arms and Light Weapons on the Dark Web: A Study

    A summary of the main findings and implications of the first empirical study investigating the scale and scope of arms trafficking on the dark web, illustrating the range of weapons traded, their market price and most common transit routes.

    Oct 24, 2018

  • Report

    Counterterrorism evaluation: Taking stock and looking ahead

    This report presents the results of a study investigating how evaluations of counterterrorism and preventing and countering violent extremism policies were designed and conducted over the last five years and what practical lessons can be drawn.

    Oct 24, 2018

  • Processor pins of a microchip

    Commentary

    Examining the Weak Spots in Tech's Supply Chain Armor

    When an attack on the supply chain occurs, manufacturers and purchasers should be better positioned to respond and recover. Even the simplest devices can rely on parts from multiple suppliers, which may have their own suppliers and so on. But every supplier, no matter how small, represents a potential weak link in the chain.

    Oct 16, 2018

  • Participants speak during a coffee break at Africa Endeavor 2018 in Santa Maria, Sal, Cabo Verde

    Commentary

    Partner Capacity-Building's Next Phase—Embracing Civil Works?

    The way ahead for civil works capacity-building is not without its challenges. But in places that are plagued by extremist violence and irregular warfare, fostering civil society's trust and confidence isn't just an added benefit. It could instead be a targeted outcome.

    Oct 16, 2018

  • Journal Article

    Evaluation in an Emerging Field: Developing a Measurement Framework for the Field of Counter-Violent-Extremism

    This report seeks lessons from the evidence-based healthcare movement, which has a track record of using evaluation to develop practice, to consider what it might take to develop evaluation capacity in the emerging field of counter-violent-extremism.

    Oct 12, 2018

  • Japanese destroyer Inazuma test firing its 76-millimetre cannon in the Indian Ocean, September 27, 2018. Picture taken September 27, 2018

    Commentary

    Japan's Invisible Hand

    Shinzo Abe has cemented his position as Japan's prime minister for the next three years. Now he is expected to make a concerted push for revising the Constitution, which has not been amended since 1947. But the Japanese public is not convinced of the need to revise the Constitution, making his efforts likely to fail.

    Oct 10, 2018

  • Kurdish fighters from the People's Protection Units (YPG) run across a street in Raqqa, Syria, July 3, 2017

    Commentary

    The Power of Affiliates: Which ISIS Franchise Could Become the Most Capable?

    With ISIS's caliphate in ruins, one of its affiliates could grow to become even deadlier and more capable than the core organization was during its peak. And with franchise groups and affiliates across the globe, there's no shortage of contenders to supplant ISIS as the world's most dangerous terrorist group.

    Oct 9, 2018

  • Cybersecurity locks illustration superimposed over a photo of Tokyo at night

    Report

    Preparing for Cybersecurity Threats to the 2020 Olympics

    The Olympic Games are an attractive target for hackers. An examination of Japan's cybersecurity threat landscape and lessons from past events can help planners reduce cybersecurity risks in advance of the 2020 Tokyo Games.

    Oct 4, 2018

  • Journal Article

    Adaptation by Intelligent Adversaries to Defensive Measures: Framing Adaptation Options and Demonstrating Assessment of Attacker Preferences Using Proxy Intelligence Data

    Addressing adaptation by adversaries and its implications for security planning requires understanding the ways attackers can respond to new defensive measures. This paper demonstrates an analysis of such preferences using open source data.

    Oct 2, 2018

  • Hacker on a laptop

    Commentary

    Have a Victim Response Plan for Data Breaches

    In a large data breach, there could be a real risk to victims' financial or personal security. Though responsible organizations should do everything in their power to ensure data is protected in the first place, they also should prepare a plan to ensure prompt victim response.

    Oct 2, 2018

  • U.S. Air Force Airman Brittany Harris, 18th Civil Engineer Squadron Emergency Management Flight EM operations apprentice, and Senior Airman Isaiah Flemings, 18th Aerospace Medicine Squadron bioenvironmental engineering technician, enter a staged scene of a hazardous materials incident during a training exercise August 3, 2017, at Kadena Air Base, Japan

    Commentary

    Achieving the Trump Administration's National Biodefense Strategy

    The Trump administration recently published its National Biodefense Strategy, which says that managing the risk of biological threats is in the “vital interest” of the United States, however they might present. The document provides a solid foundation, but more may be required to fully realize its goals and objectives.

    Oct 2, 2018

  • Landing ships putting cargo ashore on Omaha Beach, mid-June, 1944

    Report

    What Shapes a Nation's Will to Fight?

    When considering threats from Russia and North Korea, it is natural to focus on military capabilities. But incorporating will to fight into the analysis of actual or potential conflicts will enhance strategic planning. A model that can be tailored and applied to various conflict scenarios can help U.S. leaders better understand and influence will to fight.

    Sep 20, 2018