Infrastructure

  • Report

    How can crowd behaviour modelling be used to prevent and respond to violence and antisocial behaviour at Qatar 2022?

    This case study explores the potential for crowd behaviour modelling to inform crowd management strategies to minimise the risk of violent or antisocial behaviour taking place during the 2022 FIFA World Cup, and to reduce harm if it does take place.

    Dec 11, 2018

  • World map with electronic circuits

    Commentary

    When Cyber Attacks Occur, Who Should Investigate?

    Data breaches and cyberattacks cross geopolitical boundaries, targeting individuals, corporations and governments. Creating a global body with a narrow focus on investigating and assigning responsibility for cyberattacks could be the first step to creating a digital world with accountability.

    Dec 6, 2018

  • Daniel holds 1-year-old Daniela, both from El Salvador, as a group of migrants from Central America en route to the United States crossed through the Suchiate River into Mexico, November 2, 2018

    Commentary

    America's Overwhelmed Immigration System

    The Trump administration's options to deal with the surge of asylum seekers arriving at the U.S. border appear to be limited. What policies could help address the problem?

    Dec 5, 2018

  • Work crews on boats gather to clean marshland impacted by oil from the Deepwater Horizon spill in the Barataria Bay of Louisiana, June 17, 2010.

    Commentary

    Overlapping Environmental Disasters Put a Strain on Gulf Communities

    For Gulf Coast residents, dealing with the impact of the Deepwater Horizon disaster is challenging enough. With the Taylor Energy spill, they may face an even more daunting recovery, one that could take decades. Acknowledging the extent and complexity of recovery is the first step toward supporting coastal communities to build their resilience in the face of overlapping disasters.

    Nov 29, 2018

  • Dried herbs, flowers and spices at the spice souq in Dubai, UAE

    Journal Article

    Food Security in the Gulf Cooperation Council

    This report characterizes food security in GCC countries, documents the strategies they have taken to facilitate domestic food production and imports, and considers these strategies under scenarios with high versus low risk of supply disruption.

    Nov 28, 2018

  • Journal Article

    Regulating Risks Within Complex Sociotechnical Systems: Evidence From Critical Infrastructure Cybersecurity Standards

    One of the first empirical studies of the effects of mandatory cybersecurity regulations for critical infrastructure.

    Nov 27, 2018

  • U.S. Marines install concertina wire along the top of the primary border wall at the port of entry next to Tijuana, Meico, in San Ysidro, San Diego, U.S., November 9, 2018

    Commentary

    The U.S. Military's Border Enforcement Role

    The Trump administration announced a deployment of at least 5,200 active-duty troops to the U.S.-Mexico border. Is a military response of this size needed to address the situation on the southern border?

    Nov 19, 2018

  • Report

    Secrecy in U.S. National Security: Why a Paradigm Shift Is Needed

    This Perspective summarizes an examination of the adequacy of the system for governing national security information secrecy. It finds the present secrecy paradigm failing and proposes major reforms in making, protecting, and releasing secrets.

    Nov 1, 2018

  • Research Brief

    Requirements for Better C2 and Situational Awareness of the Information Environment

    Every military activity has informational aspects, but the information environment (IE) is not well integrated into military planning, doctrine, or processes. Better understanding of the IE will improve command and control and situational awareness.

    Nov 1, 2018

  • Report

    Improving C2 and Situational Awareness for Operations in and Through the Information Environment

    Every military activity has informational aspects, but the information environment (IE) is not well integrated into military planning, doctrine, or processes. Better understanding of the IE will improve command and control and situational awareness.

    Nov 1, 2018

  • People cycling and jogging in Chicago by Michigan lake.

    Content

    Community Health and Environmental Policy

    The Community Health and Environmental Policy program focuses on such topics as infrastructure, science and technology, community design, community health promotion, migration and population dynamics, transportation, energy, and climate and the environment.

    Oct 31, 2018

  • The Security Operation Centre for Telstra, Australia's biggest telecoms firm, which is used to monitor, detect and respond to security incidents, including cyber attacks, in Sydney, Australia, August 24, 2017

    Commentary

    Financial Frameworks for Cybersecurity Are Failing

    Cybersecurity has become a team sport. But all participants on the field are playing without clear rules, without a team approach, and without knowing when to pass the ball or to whom.

    Oct 25, 2018

  • Journal Article

    The Trade in Small Arms and Light Weapons on the Dark Web: A Study

    A summary of the main findings and implications of the first empirical study investigating the scale and scope of arms trafficking on the dark web, illustrating the range of weapons traded, their market price and most common transit routes.

    Oct 24, 2018

  • Tool

    Survey of Trauma, Resilience, and Opportunity Among Neighborhoods in the Gulf (STRONG) Codebook

    This report describes the measures in the Survey of Trauma, Resilience, and Opportunity Among Neighborhoods in the Gulf (STRONG), which assesses the health and well-being of Gulf Coast residents five years after the 2010 Deepwater Horizon oil spill.

    Oct 23, 2018

  • Processor pins of a microchip

    Commentary

    Examining the Weak Spots in Tech's Supply Chain Armor

    When an attack on the supply chain occurs, manufacturers and purchasers should be better positioned to respond and recover. Even the simplest devices can rely on parts from multiple suppliers, which may have their own suppliers and so on. But every supplier, no matter how small, represents a potential weak link in the chain.

    Oct 16, 2018

  • Participants speak during a coffee break at Africa Endeavor 2018 in Santa Maria, Sal, Cabo Verde

    Commentary

    Partner Capacity-Building's Next Phase—Embracing Civil Works?

    The way ahead for civil works capacity-building is not without its challenges. But in places that are plagued by extremist violence and irregular warfare, fostering civil society's trust and confidence isn't just an added benefit. It could instead be a targeted outcome.

    Oct 16, 2018

  • Cybersecurity locks illustration superimposed over a photo of Tokyo at night

    Report

    Preparing for Cybersecurity Threats to the 2020 Olympics

    The Olympic Games are an attractive target for hackers. An examination of Japan's cybersecurity threat landscape and lessons from past events can help planners reduce cybersecurity risks in advance of the 2020 Tokyo Games.

    Oct 4, 2018

  • Hacker on a laptop

    Commentary

    Have a Victim Response Plan for Data Breaches

    In a large data breach, there could be a real risk to victims' financial or personal security. Though responsible organizations should do everything in their power to ensure data is protected in the first place, they also should prepare a plan to ensure prompt victim response.

    Oct 2, 2018

  • A Palestinian woman drags a cart loaded with water containers after filling them from a public tap in the city of Rafah in the southern Gaza Strip, February 28, 2017

    Report

    How to Solve the Water Crisis in Gaza

    Gaza has long had water and sanitation challenges, but today it's in a state of emergency. The crisis could be resolved through greater investment in water and power infrastructure as well as more water or electricity purchases. But political complications and other barriers remain.

    Sep 26, 2018

  • Marines unload from an MV-22B Osprey at Al Asad Air Base, Iraq, June 4, 2018

    Report

    Preparing for Post-ISIL Access Challenges

    As the conflict against ISIL enters a new phase, a stronger basing posture against adversary networks in and around Syria and the Sinai Peninsula is needed. U.S. Central Command must plan for the possibility of losing access to Iraqi bases and airspace. An interactive tool can help identify robust basing options.

    Sep 10, 2018