Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Concept of leaky software, data pouring out of pipe. Photo by the_lightwriter/Fotolia

    Commentary

    Digital Theft: The New Normal

    Oct 10, 2016

    Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.

  • An aerial photo of a flood-affected area of northern Colorado along the Big Thompson River which has been declared a federal disaster area in September 2013, photo by Capt. Darin Overstreet/U.S. Air National Guard/Handout via Reuters

    Report

    Climate Change May Increase Future Exposure of U.S. Infrastructure to Natural Hazards

    Jul 12, 2016

    Exposure to natural hazards such as flooding, drought, and wildfires is projected to be larger and more uncertain in the future due to the effects of sea level rise and changes in temperature and precipitation patterns.

Explore Critical Infrastructure Protection

  • Russian President Vladimir Putin speaks during a news conference after the G20 summit in Hamburg, Germany, July 8, 2017

    Commentary

    Russian Information Warfare: A Reality That Needs a Response

    For the last three decades, Russia has exploited its growing capabilities in cyberspace to spy on, influence, and punish others. The West will continue to struggle to hold Moscow accountable, in part because international law falls far short of fully defining the rules or resolving conflicts.

    Jul 21, 2017

  • The Washington Monument on the National Mall in Washington, D.C.

    Commentary

    How to Harden America's Soft Targets

    The U.S. government must choose where to apply limited resources to defend soft targets. But it could expand its information-sharing efforts with other governments and local law enforcement. Broad intelligence sharing and more training could help identify potential attackers before they can execute their plans.

    Jul 5, 2017

  • Peter Norton attending a Center for Global Risk and Security Advisory Board meeting in October 2008

    Content

    Peter Norton: Entrepreneur, Art Collector, and RAND Advisory Board Member

    When the Saudi kingdom hired RAND in the 1980s to advise its information technology industry on the best bets for future investment, RAND researchers consulted expert Peter Norton to back up their findings. Norton has supported RAND ever since.

    Jul 3, 2017

  • Report

    Cyber Power Potential of the Army's Reserve Component

    Describes the availability of personnel with cyber skills in the private sector and the number of Army reserve component soldiers available to support the Army's cyber mission needs.

    Jun 15, 2017

  • Global network and information connection

    Report

    Social Media Analysis Could Support Information Operations

    Social media analysis could provide a window into the perspectives and communications of adversaries and other key audiences. If DoD seeks to expand its capability in this area, it must navigate U.S. law, cultural norms, and other issues.

    Jun 14, 2017

  • A man holds a laptop computer as cyber code is projected on him

    Report

    Could Stateless Attribution Promote International Cyber Accountability?

    The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?

    Jun 2, 2017

  • A young man is frustrated by the WannaCry ransomware attack

    Commentary

    WannaCry Virus: A Lesson in Global Unpreparedness

    The WannaCry ransomware attack provides important lessons about how to secure cyber networks. History indicates that other attacks will follow. Preparedness is crucial.

    May 22, 2017

  • Kampala street food vendor Monica Kayagi makes a recipe during the Superfoods Cook-Off in December 2016

    Commentary

    What Street Food Vendors in Uganda Need to Succeed

    Street vendors in Kampala, Uganda, would benefit from infrastructure development, food safety standards, rules of hygiene, and greater focus on healthy products. The city's growing population also would benefit from increased access to nutritious and affordable foods.

    May 16, 2017

  • Ugandan chefs display their creations at the first Superfoods Contest in December 2015

    Commentary

    A New Ugandan Cuisine: Showcasing Superfood Qualities of Millet and Sorghum

    The results of a series of cooking contests in Uganda to promote the use of drought-tolerant, nutritious traditional grains—millet and sorghum—signal that a new food trend may be on the horizon.

    May 9, 2017

  • A screen, showing Russian President Vladimir Putin's annual end-of-year news conference, is on display in Simferopol, Crimea, December 23, 2016.

    Commentary

    Russia in Action, Short of War

    The West needs to work more quickly and coordinate better to offset Russia's capabilities, aggressiveness, and success. Responding to Russia's hostile influence involves predicting Russia's targets, identifying the tools it's likely to use, and playing the long game rather than focusing on near-term events.

    May 9, 2017

  • Russian President Vladimir Putin is reflected in the glasses of a cadet watching Putin on TV at a military school outside Rostov-on-Don, Russia, December 20, 2012

    Testimony

    The Need for Cognitive Security

    The United States needs a strategy to counter information operations conducted by Russia and other adversaries. The rapid evolution of technology complicates this challenge.

    Apr 27, 2017

  • The Indiana National Guard Computer Network Defense Team readies their workstations for the Cyber Shield 2016 exercise at Camp Atterbury, Indiana, April 20, 2016

    Commentary

    Reservists and the National Guard Offer Untapped Resources for Cybersecurity

    More than 100,000 personnel in the Army National Guard and the U.S. Army Reserve have some degree of cyber competence, including thousands with deep or mid-level expertise. They could help defend the cyber terrain on which America's national security, prosperity, and democracy depend.

    Apr 18, 2017

  • Journal Article

    Improving Logistics for Perishable Agricultural Products in the People's Republic of China

    This report highlights several areas in which policy changes can promote efficiency improvements in agricultural logistics in the PRC.

    Apr 11, 2017

  • World map

    Commentary

    Why It's So Hard to Stop a Cyberattack — and Even Harder to Fight Back

    Cyber weapons attack the underlying network or computer systems. The possibility of unexpected effects in the cyber world is therefore greater than in conventional warfare. Not knowing if the effects were intentional complicates the response.

    Mar 30, 2017

  • A man walks past the European Commission headquarters on which is displayed a banner celebrating 60 years after the signing of the Treaty of Rome, Brussels, Belgium, March 20, 2017

    Commentary

    Sixty Years Later European Integration Has Benefited EU Countries

    Sixty years after the Treaty of Rome, the EU is facing one of its most challenging periods. Closer ties and shared values across EU member states have provided social and economic benefits but any moves towards closer integration in Europe will fail to materialize in the absence of political will.

    Mar 28, 2017

  • Report

    Tactical Cyber: Building a Strategy for Cyber Support to Corps and Below

    This report proposes a strategy for tactical Army cyber operations, enumerating overarching goals, objectives, and associated activities. Instructive case studies are provided that support implementation of the strategy.

    Mar 28, 2017

  • Europol headquarters in The Hague, Netherlands

    Commentary

    How Will Defense and Security Be Affected by Brexit?

    Trade and migration issues have dominated Brexit discussions. But the UK's decision to leave the EU also creates challenges for security, deepening uncertainty at a time when little certainty exists.

    Mar 16, 2017

  • News Release

    RAND Study Examines 200 Real-World 'Zero-Day' Software Vulnerabilities

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

    Mar 9, 2017

  • Composite image of binary code on a sunset over water

    Report

    The Life and Times of Zero-Day Software Vulnerabilities

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

    Mar 9, 2017

  • Periodical

    RAND Review: March-April 2017

    This issue highlights RAND research on the significant toll that poor sleep takes on society; ways to maximize benefits of investments in electricity infrastructure; social determinants of health; and RAND's new office in the San Francisco Bay Area.

    Mar 7, 2017

  • Topic Synonyms:
  • CIP