In December 2016, RAND and the National Security College at The Australian National University partnered to facilitate a cyber security–focused 360º Discovery Exercise in Canberra.
An interdisciplinary exercise generated three overarching policy recommendations to improve cyber security in Australia: Create...
Zero-day vulnerabilities — software vulnerabilities for which no patch or fix has been publicly released — and their exploits are useful in cyber operations — whether by criminals, militaries, or governments — as well as in defensive and academic settings.
This report provides findings...
New technologies have changed the types of data that are routinely collected about citizens on a daily basis. For example, smart devices collect location and communication data, and fitness trackers and medical devices capture physiological and other data. As technology changes, new portable and connected...
In 2014, the Australian government announced the integration of the Australian Customs and Border Protection Service (ACBPS) and the Department of Immigration and Border Protection (DIBP) into a single government department, including the formation of the Australian Border Force (ABF).
The Islamic State in Iraq and Syria (ISIS), like no other terrorist organization before, has used Twitter and other social media channels to broadcast its message, inspire followers, and recruit new fighters. Though much less heralded, ISIS opponents have also taken to...
This report examines the governmental organizational structures used in three Australian-led interventions in the late 1990s and early 2000s in the Southwest Pacific regions: Bougainville, East Timor, and the Solomon Islands. Whole-of-government efforts requiring coordination across many parts of the Australian Government...
The Australian Department of Defence (ADoD) is undergoing a fundamental restructure, one aspect of which aims to ensure that it has a robust military capability acquisition process. A key component of this restructuring is the establishment of an internal contestability capability to review ADoD's requirements,...
This paper presents the results from exploratory primary research into the role of the internet in the radicalisation of 15 terrorists and extremists in the UK. In recent years, policymakers, practitioners and the academic community have begun to examine how the internet...
This paper provides assessments of some of the most promising technical tools for predictive policing, which is the use of analytical techniques to identify promising targets for police intervention with the goal of preventing crime, solving past crimes, and identifying potential offenders and victims....
This report examines whether and how furthering Internet freedom can empower civil society vis-à-vis public officials, make the government more accountable to its citizens, and integrate citizens into the policymaking process.
The Internet has become a new battleground between governments that...