Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • A K-9 police unit keeps watch as passengers make their way through Ronald Reagan Washington National Airport, photo by Kevin Lamarque/Reuters

    Commentary

    Improving Domestic Security to Combat Today's Terrorist Threats

    Jan 30, 2015

    Today, the U.S. confronts a multilayered terrorist threat and the recent spate of attacks in Europe underscores the necessity for ensuring that intelligence keeps up with it. Intelligence services must continue to prevent terrorist assaults dispatched from abroad, head off new shoe and underwear bombers, intercept individuals returning from jihadist fronts with terrorist intentions, while at the same time uncovering and thwarting homegrown plots.

  • AP367654238051-1

    Report

    Lessons Learned from Implementing Infrastructure Resilience Guidelines

    Dec 9, 2014

    The Presidential Hurricane Sandy Rebuilding Task Force developed guidelines to ensure that federal agencies incorporate key principles of resilience into their formulation, evaluation, and prioritization of infrastructure investments related to Sandy rebuilding. An initial assessment of the implementation of the guidelines identifies opportunities and challenges.

Explore Critical Infrastructure Protection

  • Travelers wait in line at a security checkpoint at La Guardia Airport in New York City, November 25, 2015

    Commentary

    Out of Line: How to Better Protect Airports from Terrorist Attacks

    In airport security, it's not the size of a potential terrorist bomb that matters most, it's where it detonates. Fortunately, new technologies may present opportunities to get travelers out of line and keep them safe.

    May 2, 2016

  • Tool

    Developing the Pardee RAND Food-Energy-Water Security Index: Toward a Global Standardized, Quantitative, and Transparent Resource Assessment

    To provide information to agencies and efforts focused on food, water, and energy resources, the RAND Corporation developed the Pardee RAND Food-Energy-Water Security Index. This report serves as the technical documentation for the index.

    Apr 28, 2016

  • Journal Article

    Good Practice Guide on Vulnerability Disclosure: From Challenges to Recommendations

    Vulnerabilities are 'flaws' or 'mistakes' in computer-based systems that may be exploited to compromise the network and information security of affected systems.

    Apr 27, 2016

  • Artist Ana Teresa Fernandez and members of cultural organization Border/Arte paint the fence between Mexico and the U.S. to give it the illusion of transparency in Ciudad Juarez, Mexico, April 9, 2016

    Commentary

    Walls Won't Keep Us Safe

    Experience along the U.S. southern border demonstrates that even with fortifications, a wall provides only modest capacity to stop illegal crossings. More emphasis should be placed on expanding border security beyond the physical dimension.

    Apr 15, 2016

  • News Release

    One-Fourth of American Adults Notified of Data Breach in Past Year; Few Consumers Penalize Hacked Companies

    About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.

    Apr 13, 2016

  • Woman typing into a laptop

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

    Apr 13, 2016

  • Infographic

    Data Theft Victims, and Their Response to Breach Notifications

    This infographic highlights the results of a study of consumer attitudes toward data breaches, notifications of those breaches, and company responses to such events.

    Apr 13, 2016

  • View to an operating room through an office window

    Commentary

    Ransomware Hackers Are Coming for Your Health Records

    Cyber criminals may be preying on hospitals because cyber protection measures likely have not kept pace with electronic data collection and because hospitals typically do not have backup systems and databases in place, even though such attacks can strain health care systems and potentially put patients' lives at risk.

    Apr 11, 2016

  • Transportation soldiers and civilian harbormasters move cargo containers onto awaiting vessels in a training exercise at Joint Base Langley-Eustis

    Commentary

    Ten Years After the Safe Port Act, Are America's Ports Secure?

    The economic importance and visibility of America's ports make them attractive terrorism targets. Port security has improved, but many of the threats that motivated the Safe Ports Act in 2006 remain, and new dangers have emerged, including cyber threats.

    Apr 6, 2016

  • Journal Article

    Trade-off Across Privacy, Security and Surveillance in the Case of Metro Travel in Europe

    Focusing on train/metro travel we investigate whether Europeans perceive similar security and privacy issues as have been raised in recent discussions about surveillance.

    Apr 6, 2016

  • A self-driving vehicle travels on the road during a demonstration in Singapore, October 12, 2015

    Commentary

    The Police Could Be Controlling Your Self-Driving Car

    As self-driving cars become widespread, one of the biggest issues will be the rules under which public infrastructures and public safety officers may be empowered to override how autonomous vehicles are controlled.

    Apr 4, 2016

  • U.S. sailors assigned to Navy Cyber Defense Operations Command monitor, analyze, detect, and respond to unauthorized activity within U.S. Navy information systems and networks

    Commentary

    The Online Fight Against ISIS

    To prevail against ISIS in cyberspace, the United States and its cyber soldiers will have to be capable of reacting quickly, while being guided by an overarching strategy. Secretary of Defense Carter urged U.S. Cyber Command to intensify the fight against ISIS but it would also be wise to recruit civilian volunteers.

    Apr 1, 2016

  • A senior airman working in defensive cyber operations at Peterson Air Force Base in Colorado Springs, Colorado

    Commentary

    Rather Than Fearing 'Cyber 9/11,' Prepare for 'Cyber Katrina'

    The United States needs a smooth, well-functioning mutual aid system for cybersecurity that provides all of the hard-won benefits of the nation's system for hurricanes and other emergencies.

    Mar 30, 2016

  • U.S. President Barack Obama shakes hands with Chinese President Xi Jinping at the start of the climate summit in Paris, November 30, 2015

    Report

    Getting to Yes with China in Cyberspace

    The tensions that divide the United States and China apply just as much to cyberspace as to relations in the physical world. Can the two countries achieve meaningful outcomes through formal negotiations over cyber norms and rules?

    Mar 22, 2016

  • An NYPD officer stands across the street from the Apple Store on 5th Ave. in New York, March 11, 2016

    Commentary

    The False Choice at the Core of the Apple-FBI Standoff

    The Apple-FBI case should spark a broader debate among technology companies concerning their role in maintaining the privacy and security balance. A starting point should be to recognize that the majority of cyberattacks are related to phishing—and a user's action—not to whether a device can be secured.

    Mar 21, 2016

  • Two teens using laptops

    Commentary

    The Military Should Increase Efforts to Find and Enlist Young Hackers

    Some notorious cyberattacks have been carried out by computer-savvy teens. They don't all have criminal intentions, they just have a particular aptitude for writing code and operating in cyberspace. The U.S. military should consider embracing and cultivating this pool of talent.

    Mar 10, 2016

  • Three young people on smartphones

    Report

    Attitudes Toward Local and National Government Expressed Over Chinese Social Media

    How can social media provide perspective on how the Chinese public feels about domestic political issues, such as the environment, food safety, and local versus national government?

    Mar 4, 2016

  • Service members and civilians conduct simulated cyberattack scenarios during Cyber Guard 2015

    Commentary

    In Greater Alignment: Public and Policymakers on Cyber

    For the first time, Gallup included cyberterrorism in its annual survey of Americans' concerns about threats to U.S. interests, and 73 percent of respondents said they felt it was a critical threat. The survey results come amid a flurry of activity on the issue on Capitol Hill and at the White House.

    Feb 29, 2016

  • Information safety graphic design

    Project

    Exploring Investment in Cybersecurity

    The digital dependence in developed countries has led to a situation where security vulnerabilities and security incidents potentially come accompanied by serious consequences. With this in mind, RAND Europe investigated why, where and how organisations in critical infrastructure sectors invest in cybersecurity.

    Feb 29, 2016

  • Pieces of an iPhone are seen on a repair store counter in New York City, February 17, 2016

    Commentary

    The Cost of Security in the iPhone Era

    As the security on the iPhone better protects users from criminals, it also excels at keeping law enforcement from accessing the data. The dispute between the FBI and Apple over unlocking the iPhone of one of the San Bernardino attackers continues but the real debate is about whether society wants legislation that weakens iPhone security for law enforcement.

    Feb 26, 2016

  • Topic Synonyms:
  • CIP