Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • A K-9 police unit keeps watch as passengers make their way through Ronald Reagan Washington National Airport, photo by Kevin Lamarque/Reuters

    Commentary

    Improving Domestic Security to Combat Today's Terrorist Threats

    Jan 30, 2015

    Today, the U.S. confronts a multilayered terrorist threat and the recent spate of attacks in Europe underscores the necessity for ensuring that intelligence keeps up with it. Intelligence services must continue to prevent terrorist assaults dispatched from abroad, head off new shoe and underwear bombers, intercept individuals returning from jihadist fronts with terrorist intentions, while at the same time uncovering and thwarting homegrown plots.

  • AP367654238051-1

    Report

    Lessons Learned from Implementing Infrastructure Resilience Guidelines

    Dec 9, 2014

    The Presidential Hurricane Sandy Rebuilding Task Force developed guidelines to ensure that federal agencies incorporate key principles of resilience into their formulation, evaluation, and prioritization of infrastructure investments related to Sandy rebuilding. An initial assessment of the implementation of the guidelines identifies opportunities and challenges.

Explore Critical Infrastructure Protection

  • Identify theft illustration

    Commentary

    U.S. Needs a New Electronic Identity-Protection Strategy to Prevent 'Hybrid Warfare' Attacks

    The U.S. government needs to develop a strategy to protect its citizens that includes a unique identifying number or code and a method for protecting these identity keys in online transactions.

    Jul 6, 2015

  • Network hub and cable

    Testimony

    Strategies for Defending U.S. Government Networks in Cyberspace

    Hackers, including state and non-state actors, are continuing to find opportunities to penetrate U.S. government networks. Defending these networks will require a systems approach.

    Jun 24, 2015

  • Service members train with the Shadow remotely piloted aircraft system, Feb. 6, 2014

    Report

    Air National Guard Remotely Piloted Aircraft and Domestic Missions: Opportunities and Challenges

    This report is intended to help guide discussion of the utility of Air National Guard remotely piloted aircraft (RPA) in domestic missions, and it explores the policy and operational constraints that Air National Guard RPAs face.

    Jun 22, 2015

  • A Tunisian holds up a flag during celebrations marking the fourth anniversary of Tunisia's revolution, Tunis, January 14, 2015

    Commentary

    Tunisia in the Crosshairs

    The open-ended nature of the Islamic State group's threat against Tunisair suggests that it intends to target Tunisia for the long haul. The United States should counter the threats with steadfast and sustained cooperation and assistance.

    Jun 22, 2015

  • TSA Acting Administrator Melvin Carraway meets with TSA officers at New Orleans International Airport the day after a man attacked security agents and later died in the hospital where he was being treated for gunshot wounds

    Commentary

    TSA Flunked Its Security Test Big Time — Now What?

    We have to accept that humans, no matter how well-trained they are or how dedicated they are to their mission, are just not very good at maintaining laser-like focus while performing repetitive tasks. That does not mean airport security can ever be completely given over to machines.

    Jun 15, 2015

  • Report

    Issues with Access to Acquisition Data and Information in the Department of Defense: Policy and Practice

    This report identifies the problems and challenges associated with sharing unclassified information within the U.S. Department of Defense and investigates the role of policies and practices associated with such sharing.

    Jun 12, 2015

  • Report

    Issues with Access to Acquisition Data and Information in the Department of Defense: Executive Summary

    This report identifies the problems and challenges associated with sharing unclassified information within the U.S. Department of Defense and investigates the role of policies and practices associated with such sharing.

    Jun 12, 2015

  • News Release

    Companies Are Making Cybersecurity a Greater Priority, but Hackers Still May Be Gaining

    While worldwide spending on cybersecurity is close to $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

    Jun 10, 2015

  • An information security illustration superimposed over a businesswoman holding a tablet

    Report

    Companies Are Prioritizing Cybersecurity, but Hackers Still May Be Gaining

    While spending on cybersecurity is $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

    Jun 10, 2015

  • A TSA arm patch and shield at Los Angeles International Airport, California, February 20, 2014

    Commentary

    Are Airport Security Screeners Looking for the Wrong Things?

    An investigation revealed that the TSA has failed in contraband testing, at a 95 percent rate. This shouldn't be perceived as an indictment of TSA workers. But it may be an indictment of the particular assignments they've been given.

    Jun 4, 2015

  • Report

    Ensuring U.S. Air Force Operations During Cyber Attacks Against Combat Support Systems: Guidance for Where to Focus Mitigation Efforts

    RAND researchers developed a process for prioritizing functions and information systems in assessing mission assurance under cyber attack, a challenge due to the number of systems, range of vulnerabilities, and variety of combat support functions.

    May 29, 2015

  • Report

    RAND Review: May-June 2015

    This issue of RAND Review reports on smart-grid technologies, the nuclear deal with Iran, the education crisis among Syrian children, diversity in the biomedical scientific workforce, and recent philanthropic gifts to RAND.

    May 4, 2015

  • Report

    Measuring the Resilience of Energy Distribution Systems

    Researchers develop a framework for measuring the resilience of energy distribution systems and summarize the state of metrics for resilience of the electric power, refined oil, and natural gas distribution systems.

    Apr 24, 2015

  • Hand touching tablet behind social media diagram and map

    Commentary

    The Clash of Internet Civilizations: Why Neither Side Should Prevail

    The debate over net neutrality pits two opposing philosophies against each other — one pushing for the continued evolution of the Internet as an open information superhighway, the other asserting that the Internet's evolution needs to take more account of the many ways it is and will be used.

    Apr 10, 2015

  • Eye and technology display

    Report

    Training Cyber Warriors: Lessons from Defense Language Training

    To ensure the U.S. Department of Defense has sufficient numbers of skilled cyber workers, it may need to develop additional training approaches as it plans for broader recruiting and workforce management. Examining how DoD handles foreign language training yields lessons that could be applied to cyber training.

    Mar 16, 2015

  • A man accesses data from a computer

    Testimony

    Sharing Information About Threats Is Not a Cybersecurity Panacea

    Information-sharing—specifically, threat-centric information-sharing—has dominated recent discussions on improving cybersecurity, but it is not a silver bullet. Its usefulness is tied to certain assumptions about attacks, and while it should be encouraged, it addresses only one facet of a very complex space.

    Mar 4, 2015

  • Flood waters from Hurricane Isaac partially submerge homes in Lafitte, Louisiana neighborhoods in August 2012

    Commentary

    Future of Coastal Flooding

    President Obama's executive order that directs federal agencies to plan and build for higher flood levels as they construct new projects in flood-prone regions will affect hundreds of billions of dollars of future public works projects. In an ideal world, planners would estimate the benefits and costs for each project, taking into account everything from the details of the local landscape to the potential for adaptive responses over time.

    Feb 25, 2015

  • Report

    Building the Guatemalan Interagency Task Force Tecún Umán: Lessons Identified

    USSOUTHCOM intends to use the Interagency Task Force (IATF) Tecún Umán as a model for new counternarcotics units in Guatemala. This report describes lessons learned from the IATF and provides recommendations for resolving challenges.

    Feb 9, 2015

  • People holding mobile phones are silhouetted against a backdrop projected with the Twitter logo

    Commentary

    Decoding the Breach: The Truth About the CENTCOM Hack

    When ISIS hackers hijacked the Twitter account of U.S. Central Command on Jan. 12, they falsely claimed that they had hacked into U.S. military computers. While the incident was embarrassing, it was not concerning in operational military terms. It was, however, damaging to the counterinsurgency against ISIS.

    Feb 3, 2015

  • A K-9 police unit keeps watch as passengers make their way through Ronald Reagan Washington National Airport

    Commentary

    Improving Domestic Security to Combat Today's Terrorist Threats

    Today, the U.S. confronts a multilayered terrorist threat and the recent spate of attacks in Europe underscores the necessity for ensuring that intelligence keeps up with it. Intelligence services must continue to prevent terrorist assaults dispatched from abroad, head off new shoe and underwear bombers, intercept individuals returning from jihadist fronts with terrorist intentions, while at the same time uncovering and thwarting homegrown plots.

    Jan 30, 2015

  • Topic Synonyms:
  • CIP