Infrastructure

  • Multimedia

    Accountability in Cyberspace: The Problem of Attribution

    Recently, several cyber incidents with geopolitical implications have received high-profile press coverage. Identifying the responsible party behind malicious cyber incidents is a necessary prerequisite for holding these actors accountable, but there are many challenges that accompany cyber attribution.

    Jan 14, 2019

  • Defense Intelligence Agency director Lt. Gen. Robert Ashley, during the 2018 Department of Defense Intelligence Information System Worldwide Conference in Omaha, Nebraska, August 13, 2018

    Commentary

    Explaining the Defense Intelligence Agency's (DIA) Critical Role in National Security

    Despite its varied roles and responsibilities, the DIA can be boiled down to just two core missions: intelligence analysis and intelligence collection. Having a better understanding of these core missions could help to properly frame the agency’s value to the intelligence, military, and policymaking communities.

    Jan 11, 2019

  • After crossing from Mexico by jumping a border fence, migrants run next to a prototype of the border wall in Otay County, California, December 21, 2018

    Commentary

    What Border Walls Can and Cannot Accomplish

    States have been building walls since ancient times. Some were arguably quite successful, others less so. At the core of prudent policy lies a basic question: What can walls realistically accomplish?

    Jan 8, 2019

  • Periodical

    RAND Review: January-February 2019

    This issue spotlights (1) research on how faith-based organizations promote health and well-being in underserved communities and (2) the Pardee RAND Graduate School's new approach to policy and training the next generation of policy experts.

    Jan 7, 2019

  • Facebook CEO Mark Zuckerberg testifies before a House Energy and Commerce Committee hearing regarding the company's use and protection of user data on Capitol Hill in Washington, U.S., April 11, 2018

    Commentary

    Data Breaches Could Cause Users to Opt Out of Sharing Personal Data. Then What?

    As tech-based systems have become all but indispensable, many institutions might assume user data will be reliable, meaningful and, most of all, plentiful. But what if this data became unreliable, meaningless or even scarce?

    Dec 28, 2018

  • A train launched to operate on the Standard Gauge Railway line constructed by the China Road and Bridge Corporation and financed by Chinese government arrives at the Nairobi Terminus on the outskirts of Nairobi, Kenya, May 31, 2017

    Commentary

    The Good and Bad of the Trump Administration's New Africa Strategy

    The Trump administration's Africa strategy combines a turn away from counterterrorism as a priority, emphasis on trade, and working to help Africans solve their own problems, all of which could be opportunities for a more positive relationship. The implied prioritization of great power competition, however, suggests the real risk of a return to Cold War-era approach.

    Dec 20, 2018

  • Journal Article

    Economics of Vulnerability Disclosure

    This study serves as a follow up to the 2015 ENISA Good Practice Guide on Vulnerability Disclosure and seeks to provide a glimpse into the economics, costs, and incentives related to discovering and disclosing vulnerabilities.

    Dec 14, 2018

  • Report

    How can crowd behaviour modelling be used to prevent and respond to violence and antisocial behaviour at Qatar 2022?

    This case study explores the potential for crowd behaviour modelling to inform crowd management strategies to minimise the risk of violent or antisocial behaviour taking place during the 2022 FIFA World Cup, and to reduce harm if it does take place.

    Dec 11, 2018

  • World map with electronic circuits

    Commentary

    When Cyber Attacks Occur, Who Should Investigate?

    Data breaches and cyberattacks cross geopolitical boundaries, targeting individuals, corporations and governments. Creating a global body with a narrow focus on investigating and assigning responsibility for cyberattacks could be the first step to creating a digital world with accountability.

    Dec 6, 2018

  • Daniel holds 1-year-old Daniela, both from El Salvador, as a group of migrants from Central America en route to the United States crossed through the Suchiate River into Mexico, November 2, 2018

    Commentary

    America's Overwhelmed Immigration System

    The Trump administration's options to deal with the surge of asylum seekers arriving at the U.S. border appear to be limited. What policies could help address the problem?

    Dec 5, 2018

  • Work crews on boats gather to clean marshland impacted by oil from the Deepwater Horizon spill in the Barataria Bay of Louisiana, June 17, 2010.

    Commentary

    Overlapping Environmental Disasters Put a Strain on Gulf Communities

    For Gulf Coast residents, dealing with the impact of the Deepwater Horizon disaster is challenging enough. With the Taylor Energy spill, they may face an even more daunting recovery, one that could take decades. Acknowledging the extent and complexity of recovery is the first step toward supporting coastal communities to build their resilience in the face of overlapping disasters.

    Nov 29, 2018

  • Dried herbs, flowers and spices at the spice souq in Dubai, UAE

    Journal Article

    Food Security in the Gulf Cooperation Council

    This report characterizes food security in GCC countries, documents the strategies they have taken to facilitate domestic food production and imports, and considers these strategies under scenarios with high versus low risk of supply disruption.

    Nov 28, 2018

  • Journal Article

    Regulating Risks Within Complex Sociotechnical Systems: Evidence From Critical Infrastructure Cybersecurity Standards

    One of the first empirical studies of the effects of mandatory cybersecurity regulations for critical infrastructure.

    Nov 27, 2018

  • U.S. Marines install concertina wire along the top of the primary border wall at the port of entry next to Tijuana, Meico, in San Ysidro, San Diego, U.S., November 9, 2018

    Commentary

    The U.S. Military's Border Enforcement Role

    The Trump administration announced a deployment of at least 5,200 active-duty troops to the U.S.-Mexico border. Is a military response of this size needed to address the situation on the southern border?

    Nov 19, 2018

  • People cycling and jogging in Chicago by Michigan lake.

    Content

    Community Health and Environmental Policy

    The Community Health and Environmental Policy program focuses on such topics as infrastructure, science and technology, community design, community health promotion, migration and population dynamics, transportation, energy, and climate and the environment.

    Nov 1, 2018

  • Report

    Improving C2 and Situational Awareness for Operations in and Through the Information Environment

    Every military activity has informational aspects, but the information environment (IE) is not well integrated into military planning, doctrine, or processes. Better understanding of the IE will improve command and control and situational awareness.

    Nov 1, 2018

  • Research Brief

    Requirements for Better C2 and Situational Awareness of the Information Environment

    Every military activity has informational aspects, but the information environment (IE) is not well integrated into military planning, doctrine, or processes. Better understanding of the IE will improve command and control and situational awareness.

    Nov 1, 2018

  • Report

    Secrecy in U.S. National Security: Why a Paradigm Shift Is Needed

    This Perspective summarizes an examination of the adequacy of the system for governing national security information secrecy. It finds the present secrecy paradigm failing and proposes major reforms in making, protecting, and releasing secrets.

    Nov 1, 2018

  • The Security Operation Centre for Telstra, Australia's biggest telecoms firm, which is used to monitor, detect and respond to security incidents, including cyber attacks, in Sydney, Australia, August 24, 2017

    Commentary

    Financial Frameworks for Cybersecurity Are Failing

    Cybersecurity has become a team sport. But all participants on the field are playing without clear rules, without a team approach, and without knowing when to pass the ball or to whom.

    Oct 25, 2018

  • Journal Article

    The Trade in Small Arms and Light Weapons on the Dark Web: A Study

    A summary of the main findings and implications of the first empirical study investigating the scale and scope of arms trafficking on the dark web, illustrating the range of weapons traded, their market price and most common transit routes.

    Oct 24, 2018