Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • A K-9 police unit keeps watch as passengers make their way through Ronald Reagan Washington National Airport, photo by Kevin Lamarque/Reuters

    Commentary

    Improving Domestic Security to Combat Today's Terrorist Threats

    Jan 30, 2015

    Today, the U.S. confronts a multilayered terrorist threat and the recent spate of attacks in Europe underscores the necessity for ensuring that intelligence keeps up with it. Intelligence services must continue to prevent terrorist assaults dispatched from abroad, head off new shoe and underwear bombers, intercept individuals returning from jihadist fronts with terrorist intentions, while at the same time uncovering and thwarting homegrown plots.

  • AP367654238051-1

    Report

    Lessons Learned from Implementing Infrastructure Resilience Guidelines

    Dec 9, 2014

    The Presidential Hurricane Sandy Rebuilding Task Force developed guidelines to ensure that federal agencies incorporate key principles of resilience into their formulation, evaluation, and prioritization of infrastructure investments related to Sandy rebuilding. An initial assessment of the implementation of the guidelines identifies opportunities and challenges.

Explore Critical Infrastructure Protection

  • Periodical

    RAND Review: July-August 2016

    This issue highlights the stress of military deployments and resilience of military families; RAND research on cybercrime, network defense, and data breaches; the 40th anniversary of RAND's landmark Health Insurance Experiment; and more.

    Jun 27, 2016

  • Eyeball on a laptop computer screen

    Essay

    The Digital Underworld: What You Need to Know

    A growing threat is emanating from a digital underworld where hackers sell their services like mercenaries and credit-card numbers can be had for pennies on the dollar.

    Jun 24, 2016

  • Hands on a keyboard in a dark room

    Commentary

    Cyberterrorism and the Role of Silicon Valley

    As national security and war are being redefined for the digital age, Silicon Valley will need to be on the front line of counterterrorism. Its inventors and entrepreneurs are driving the information revolution, and they must figure out how to protect vital systems against malevolent intrusions.

    Jun 13, 2016

  • Children hold up letters spelling the word 'peace' during a day of activities and prayers at the Zaitoune historic church in old Damascus, Syria, June 1, 2016

    Report

    Decentralization of Governance Could Help Syria

    With the international community trying to bring peace to Syria, decentralization of governance could be part of the solution. Devolution of authority to localities could help lower the stakes of the conflict and provide security to Syrians who have lost trust in the state.

    Jun 7, 2016

  • Illustration of data encryption

    Blog

    RAND's Lillian Ablon Presents 'Lessons from a Hacker'

    Lillian Ablon, a cybersecurity and emerging technologies researcher, spoke at a RAND Policy Circle Conversation on the world's expanding cyber vulnerability, those who are out there to take advantage of those vulnerabilities, as well as consumer attitudes toward breaches.

    Jun 1, 2016

  • A boy takes pictures at Narita International airport in Narita, Japan, March 25, 2016

    Commentary

    Terrorism Shouldn't Affect Travel Plans

    Evidence suggests that the threat of terrorism need not affect individuals' behavior and travel decisions, not even in the wake of attacks such as those in Brussels and Paris.

    May 21, 2016

  • Paramedics helping a patient

    Commentary

    Privacy Preferences for Healthcare Records and Information Across Europe

    The general public has a more nuanced preference for the privacy of electronic health records than previously thought. Survey respondents said that they would not be averse to individuals involved in the health and rescue professions having access to their basic health information.

    May 11, 2016

  • Travelers wait in line at a security checkpoint at La Guardia Airport in New York City, November 25, 2015

    Commentary

    Out of Line: How to Better Protect Airports from Terrorist Attacks

    In airport security, it's not the size of a potential terrorist bomb that matters most, it's where it detonates. Fortunately, new technologies may present opportunities to get travelers out of line and keep them safe.

    May 2, 2016

  • congressional-podcast-teaser-highres

    Multimedia

    Getting to Yes with China in Cyberspace: Is It Possible?

    In this May 2016 congressional briefing, RAND experts Scott W. Harold and Martin Libicki discuss the differing perspectives and interests of the United States and China in cyberspace.

    May 2, 2016

  • Tool

    Developing the Pardee RAND Food-Energy-Water Security Index: Toward a Global Standardized, Quantitative, and Transparent Resource Assessment

    To provide information to agencies and efforts focused on food, water, and energy resources, the RAND Corporation developed the Pardee RAND Food-Energy-Water Security Index. This report serves as the technical documentation for the index.

    Apr 28, 2016

  • Journal Article

    Good Practice Guide on Vulnerability Disclosure: From Challenges to Recommendations

    Vulnerabilities are 'flaws' or 'mistakes' in computer-based systems that may be exploited to compromise the network and information security of affected systems.

    Apr 27, 2016

  • Artist Ana Teresa Fernandez and members of cultural organization Border/Arte paint the fence between Mexico and the U.S. to give it the illusion of transparency in Ciudad Juarez, Mexico, April 9, 2016

    Commentary

    Walls Won't Keep Us Safe

    Experience along the U.S. southern border demonstrates that even with fortifications, a wall provides only modest capacity to stop illegal crossings. More emphasis should be placed on expanding border security beyond the physical dimension.

    Apr 15, 2016

  • News Release

    One-Fourth of American Adults Notified of Data Breach in Past Year; Few Consumers Penalize Hacked Companies

    About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.

    Apr 14, 2016

  • Infographic

    Data Theft Victims, and Their Response to Breach Notifications

    This infographic highlights the results of a study of consumer attitudes toward data breaches, notifications of those breaches, and company responses to such events.

    Apr 14, 2016

  • Woman typing into a laptop

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

    Apr 14, 2016

  • View to an operating room through an office window

    Commentary

    Ransomware Hackers Are Coming for Your Health Records

    Cyber criminals may be preying on hospitals because cyber protection measures likely have not kept pace with electronic data collection and because hospitals typically do not have backup systems and databases in place, even though such attacks can strain health care systems and potentially put patients' lives at risk.

    Apr 11, 2016

  • Transportation soldiers and civilian harbormasters move cargo containers onto awaiting vessels in a training exercise at Joint Base Langley-Eustis

    Commentary

    Ten Years After the Safe Port Act, Are America's Ports Secure?

    The economic importance and visibility of America's ports make them attractive terrorism targets. Port security has improved, but many of the threats that motivated the Safe Ports Act in 2006 remain, and new dangers have emerged, including cyber threats.

    Apr 6, 2016

  • Journal Article

    Trade-off Across Privacy, Security and Surveillance in the Case of Metro Travel in Europe

    Focusing on train/metro travel we investigate whether Europeans perceive similar security and privacy issues as have been raised in recent discussions about surveillance.

    Apr 6, 2016

  • A self-driving vehicle travels on the road during a demonstration in Singapore, October 12, 2015

    Commentary

    The Police Could Be Controlling Your Self-Driving Car

    As self-driving cars become widespread, one of the biggest issues will be the rules under which public infrastructures and public safety officers may be empowered to override how autonomous vehicles are controlled.

    Apr 4, 2016

  • U.S. sailors assigned to Navy Cyber Defense Operations Command monitor, analyze, detect, and respond to unauthorized activity within U.S. Navy information systems and networks

    Commentary

    The Online Fight Against ISIS

    To prevail against ISIS in cyberspace, the United States and its cyber soldiers will have to be capable of reacting quickly, while being guided by an overarching strategy. Secretary of Defense Carter urged U.S. Cyber Command to intensify the fight against ISIS but it would also be wise to recruit civilian volunteers.

    Apr 1, 2016

  • Topic Synonyms:
  • CIP