Gaza's dire water, sanitation, and electricity challenges are complex and deeply intertwined. Even so, they could be addressed in the long term; current barriers to a policy solution are largely political.
The Olympic Games could invite the most severe cyber threats to a major sporting event in recent years. The location of the Games and increased connectivity, both among the public and infrastructure, make them a prime target for cyberattacks.
High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs.
This summary highlights findings from a comparative analysis of the four Quadrennial Defense Reviews conducted after 1997, identifying trends, implications, and recommendations for the Army and Defense Department to help improve future reviews.
This report presents a comparative historical analysis of the four Quadrennial Defense Reviews (QDRs) conducted after 1997 and identifies trends, implications, and recommendations for the Army and Defense Department to help improve future reviews.
As debate on border security continues, policymakers would be wise to look beyond the heated rhetoric to clearly identify priorities and make informed decisions about how best to deploy finite resources to get the strongest security for the investment.
Categorizing NGO disaster services as either "core"-critical to fulfilling an organizational mission-or "adaptive"-based on community needs during a disaster-will strengthen resilience-building efforts.
An infrastructure bill is on the agenda for Congress, but what problems would it fix? In this RAND Congressional Briefing, Debra Knopman discusses policies that promote and deter investment and maintenance of water and transportation infrastructure.
Bitcoin has become the prominent currency of the dark web, which is often used to buy illegal goods, such as weapons and drugs. Anecdotal evidence suggests terrorists are using cryptocurrency and the dark web, but further investigation is needed.
As French President Emmanuel Macron arrives in London for the 35th UK-France Summit, there is growing French discomfort with arrangements at the UK-France border. The UK's decision to leave the European Union has added new urgency to this already fraught debate.
A targeted approach could help the federal government address the root causes of infrastructure problems more effectively than a spending initiative that simply spreads money around with the hope that more spending might do some good.
This Excel-based modeling and simulation tool estimates present and future global costs of cyber attacks and incidents. Users can also alter assumptions to investigate a wide variety of research questions.
This report shares a transparent and adaptable methodology for estimating present and future global costs of cyber risk. The report has a companion Excel-based modeling and simulation platform that allows users to alter assumptions.
Cybercrime is a challenge for local and state law enforcement. The Law Enforcement Cyber Center (LECC) was established to provide a resource to combat cybercrime. This report summarizes the LECC's activities and provides recommendations.
Foreign hackers are not afraid to launch attacks on the United States in cyberspace that they would not dare risk in a real theater of war. As cyber aggression gets worse and more brazen, the U.S. must figure out how to deter foreign actors in cyberspace as effectively as it does in nuclear and conventional warfare.
New technology can convincingly fake the human voice and create security nightmares. Considering the widespread distrust of the media, institutions, and expert gatekeepers, audio fakery could start wars.