Threat Assessment

Featured

Researchers collaborate across disciplines at RAND to evaluate terrorist, military, nuclear, cyber, and other threats to U.S. national security—identifying emerging threats, scrutinizing known risks, and evaluating potential strategic and tactical responses. Recent studies have included examinations of ISIS, Iran's nuclear capabilities, and insider threats.

  • Connected dotted lines representing a network, image by liuzishan/Getty Images

    Report

    New Model Helps Predict Cyber Threats and Improve Resilience

    May 11, 2021

    Today's evolving cyber threats require a tailored and targeted approach to cybersecurity. Current defenses focus on managing threats after a network has been breached. RAND's Scalable Warning and Resilience Model (SWARM) can help defenders proactively protect their systems through early warning of cyber incidents before they occur.

  • Woman interviewing for a job, photo by fizkes/Getty Images

    Report

    Updating Personnel Vetting and Security Clearance Guidelines for Future Generations

    Mar 11, 2021

    The United States could face challenges with recruiting and retaining younger generations into positions that require a security clearance. What trends and social changes might the federal government consider when updating personnel vetting guidelines?

Explore Threat Assessment

  • The al-Hol displacement camp in Hasaka governorate, Syria, holds thousands of detainees linked to ISIS, April 2, 2019, photo by Ali Hashisho/Reuters

    Commentary

    The Terrorist Threat Posed by Neglect and Indifference

    Western countries have seemingly washed their hands when it comes to the aftermath of ISIS. By ignoring the threat and leaving it to the Iraqis and Syrian Kurds to deal with European citizens in detention camps, Western nations are helping the terrorists' ideology persist.

    Sep 23, 2019

  • Al Qaeda-linked Nusra Front fighters carry weapons on the back of pick-up trucks in Arsal, eastern Bekaa Valley, Lebanon, December 1, 2015, photo by Stringer/Reuters

    Commentary

    Al Qaeda Is Ready to Attack You Again

    As al Qaeda continues to evolve, one of the most pressing questions is to what extent the group is still focused on attacking the West. Does the absence of spectacular attacks attributed to al Qaeda since 9/11 represent a lack of capability or merely a shift in priorities?

    Sep 5, 2019

  • A young boy waves a black flag inscribed with Islamic verses at a rally of Tunisian Salafi Islamists in the central town of Kairouan, May 20, 2012, photo by Anis Mili/Reuters

    Report

    What Will Drive the Next Generation of Salafi-Jihadis?

    Continued economic stagnation and a high youth unemployment rate, exacerbated by the Muslim youth bulge, could lead to failed expectations and spur radicalization among disenchanted Gen Z Muslims. And this cohort's familiarity with the internet could foreshadow an adaptive, tech-savvy terrorist threat.

    Aug 22, 2019

  • Armed fighters over a background of Syrian, Iraqi, and U.S. currencies and gold ingots, photos by zabelin, Cimmerian, Vitoria Holdings LLC, and johan10/Getty Images

    Report

    U.S. Efforts Are Essential to Counter an Islamic State Comeback

    The Islamic State can no longer rely on local funding sources as it did when it controlled territory. But as an insurgency, its expenses are far lower. With revenue from criminal activities and the cash it hoarded, the group will survive as a clandestine terrorist movement. Counterfinance, intelligence, and possibly military action will be needed.

    Aug 8, 2019

  • Diagram of an insider threat under a magnifying glass, image by Andrea Danti/Adobe Stock

    Report

    Continuous Evaluation Approaches for Insider Threats

    Insiders could cause harm to the United States, maliciously or unintentionally. This threat isn't new, but it's likely to increase in the near term. Continuous evaluation approaches to detecting insider threats could be more effective and less costly than the current security clearance system.

    Aug 5, 2019

  • Report

    Report

    A U.S. Option Playbook for Contingency Planning to Reclaim Scarborough Shoal

    In this paper, the author proposes a graduated menu of response options for the United States to consider in the event that China undertakes irreversible actions to alter the status quo of Scarborough Shoal.

    Jun 27, 2019

  • Bomb blasts and artillery fire thundered across Baghdad as U.S. forces tightened their grip on the capital's fringes and brought up more troops, April 6, 2003, photo by Faleh Kheiber/Reuters

    Commentary

    Changing the Way America Goes to War

    America's vast power, and the weakness of most of its enemies, has allowed it to get away with a striking absence of deliberative judgment when deciding on war, as the Iraq case makes clear. But that free pass is coming to an end. It's time for the United States to rethink the way it decides on wars of choice.

    Jun 25, 2019

  • A portion of a city model glows red indicating a cyber threat to infrastructure at the DarkMatter booth during the Black Hat information security conference in Las Vegas, Nevada, July 26, 2017

    Commentary

    Fighting and Winning the Undeclared Cyber War

    Russia has executed deliberate intrusions into U.S. critical infrastructure since at least 2011. These systems have included government entities, commercial facilities, water resource plants, and aviation institutions. What actions or policies can the U.S. execute to improve security?

    Jun 24, 2019

  • The Olympic torch of the Tokyo 2020 Olympic Games in Tokyo, Japan June 1, 2019, photo by Issei Kato/Reuters

    Commentary

    Japan Prepares for Olympic-Level Cybersecurity

    The world's attention will be fixed on Japan as it hosts the Rugby World Cup in September and the Tokyo Olympics in 2020. Japan's cyber defenses will need to be strong enough to keep attackers out and resilient enough to restore systems should things go wrong.

    Jun 3, 2019

  • Members of the Syrian Democratic Forces with a captured ISIS flag in Raqqa, Syria, August 14, 2017, photo by Zohra Bensemra/Reuters

    Commentary

    Baghdadi Resurfaces: What It Means for ISIS's Global Terror Campaign

    With last week's release of a video of Abu Bakr Baghdadi, ISIS showed that it's still got some life left—literally. The most important message to take away from the Baghdadi video may be that the Islamic State does not need territory to survive and even thrive.

    May 6, 2019

  • Brian Jackson discusses terrorism prevention strategies for the federal government, the nature of the homeland terrorist threat, past and current terrorism prevention policies, and gives recommendations for policymakers in this Congressional Briefing.

    Multimedia

    How Do We Prevent the Next Homegrown Terrorist?

    What is the right terrorism prevention strategy for the federal government? Brian Jackson discusses the nature of the homeland terrorist threat, past and current terrorism prevention policies, and gives recommendations for policymakers.

    May 3, 2019

  • A bearded man appearing to be Islamic State leader Abu Bakr al-Baghdadi speaks in a video released April 29, 2019, photo by Islamic State Group/Al Furqan Media Network/Reuters TV

    Commentary

    What the Baghdadi Video Means

    For the first time in five years, Abu Bakr al-Baghdadi, the reclusive leader of ISIS, appeared on video. Why did he suddenly feel the need to show his face and speak to his followers? The answer concerns how recent events intersect with ISIS's long-term needs.

    Apr 30, 2019

  • Russian President Vladimir Putin and Chinese President Xi Jinping meet on the sidelines of the G20 leaders summit in Buenos Aires, Argentina, December 1, 2018, photo by Sputnik/Mikhail Klimentyev/Kremlin via Reuters

    Commentary

    A Warming Trend in China–Russia Relations

    The China–Russia relationship is indeed growing across military, economic, and political dimensions. But it is still more anchored in shared grievances than in common visions. Both countries contest U.S. interests, but in different ways. Washington should treat them as separate strategic challenges.

    Apr 18, 2019

  • Blog

    ISIS, Women's Day, Army Privates: RAND Weekly Recap

    This weekly recap focuses on what to do about ISIS detainees, stories from the Army's junior ranks, International Women's Day, and more.

    Mar 8, 2019

  • Kathryn Bouskill, a social scientist at RAND, photo by Diane Baldwin/RAND Corporation

    Essay

    What the Speed of Life Means for Security and Society

    Dozens of technologies with the power to transform human life, from 3D printing to cognitive implants, could become as ordinary as a cellphone by 2040. Society will have to adapt, on the fly, in ways it never has. The speed of life itself could pose a security challenge.

    Mar 6, 2019

  • Man in handcuffs sits at a table with scales of justice, photo by djedzura/Getty Images

    Commentary

    Leaving ISIS Detainees in the Desert Doesn't Serve U.S. Interests

    Leaving ISIS detainees in the desert may sound like an apt punishment, but it's dangerous. Repatriation and prosecution could help ensure ISIS volunteers don't scatter to other jihadist fronts.

    Mar 5, 2019

  • People arrive at Al Hidayah, a youth camp at Warwick University in Coventry, central England, August 9, 2009, photo by Kieran Doherty/Reuters

    Commentary

    To Ensure Deradicalisation Programmes Are Effective, Better Evaluation Practices Must First Be Implemented

    Given the increasing number of ISIS foreign fighters seeking re-entry into the UK, a better understanding of deradicalisation programs is essential. More robust and transparent evaluation processes for intervention programmes should be implemented before confidence in their effectiveness can be established.

    Mar 4, 2019

  • World map with exclamation points for epicenters for terrorist attack, photo by Infadel/Getty Images

    Commentary

    A New Framework for Evaluating Counter Violent Extremism Projects

    Gathering evidence in the area of counter violent extremism (CVE) is vital, given the increasing role for CVE interventions in the political and security environment. Evaluations of these interventions can play a role in growing this knowledge, by helping the CVE field itself to develop.

    Feb 15, 2019

  • News Release

    News Release

    Terrorism Prevention Programs Need Strengthening If They Are to Be Effective

    National capabilities for terrorism prevention, which refers to options other than traditional law-enforcement action to respond to the risk of individual radicalization to violence, are relatively limited. Most rely on local or non-government efforts, and only a subset receive federal support.

    Feb 14, 2019

  • A woman speaking in a community meeting, photo by Hero Images/Getty Images

    Research Brief

    How to Strengthen Terrorism Prevention Efforts

    Shortfalls in national terrorism prevention efforts have come not only from limited programmatic focus and resource investment, but also from critics seeking to constrain or halt such efforts. The most effective path for the U.S. government would be to support state, local, nongovernmental, and private terrorism prevention efforts rather than building capabilities itself.

    Feb 14, 2019