Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • A K-9 police unit keeps watch as passengers make their way through Ronald Reagan Washington National Airport, photo by Kevin Lamarque/Reuters

    Commentary

    Improving Domestic Security to Combat Today's Terrorist Threats

    Jan 30, 2015

    Today, the U.S. confronts a multilayered terrorist threat and the recent spate of attacks in Europe underscores the necessity for ensuring that intelligence keeps up with it. Intelligence services must continue to prevent terrorist assaults dispatched from abroad, head off new shoe and underwear bombers, intercept individuals returning from jihadist fronts with terrorist intentions, while at the same time uncovering and thwarting homegrown plots.

  • AP367654238051-1

    Report

    Lessons Learned from Implementing Infrastructure Resilience Guidelines

    Dec 9, 2014

    The Presidential Hurricane Sandy Rebuilding Task Force developed guidelines to ensure that federal agencies incorporate key principles of resilience into their formulation, evaluation, and prioritization of infrastructure investments related to Sandy rebuilding. An initial assessment of the implementation of the guidelines identifies opportunities and challenges.

Explore Critical Infrastructure Protection

  • Global internet security illustration

    Project

    Developing a Toolbox for the Global Cyber Security Capacity Centre Maturity Model

    The Cyber Security Capability Maturity Model allows organisations to map and assess maturity to achieve a healthy and resilient national cyber ecosystem. A new toolbox will aim to help policymakers identify priority areas for intervention to strengthen cyber capabilities.

    Aug 16, 2016

  • Aerial view of the Coronado Bridge, which connects San Diego and Coronado, at dusk

    Commentary

    Infrastructure Design Must Change with Climate

    Failure to plan for climate change in infrastructure design poses a real threat to public safety and the ability to meet environmental quality goals. Engineers need to work with scientists and risk analysts to understand climate projections and how to incorporate the information into their designs.

    Aug 12, 2016

  • Guo Shengkun, China's Minister of Public Security, speaks during the Second U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues in Beijing, China, June 14, 2016

    Commentary

    The U.S.-China Cyber Agreement: A Good First Step

    China's apparent compliance with the cyber agreement might represent little more than a temporary shift in tactics. The U.S. should make clear that indictments may once again be sought if Chinese hackers resume cyber espionage against U.S. firms.

    Aug 1, 2016

  • Massive unclassified paper shred and uniform drop-off bins help prevent OPSEC violations

    Commentary

    Keeping Up with the Policymakers: The Unclassified Tearline

    Unclassified tearlines could convey the bottom line and potential implications of a classified story in unclassified terms, while obscuring sensitive sources and methods. There are good reasons to build them into the business process and culture of intelligence agencies.

    Jul 28, 2016

  • Report

    Characterizing National Exposures to Infrastructure from Natural Disasters: Data and Methods Documentation

    This report serves as the technical documentation and reference document for the data, methods, and analytic approach used in the analysis of national exposures to infrastructure from natural disasters.

    Jul 12, 2016

  • An aerial photo of a flood-affected area of northern Colorado along the Big Thompson River which has been declared a federal disaster area in September 2013

    Report

    Climate Change May Increase Future Exposure of U.S. Infrastructure to Natural Hazards

    Exposure to natural hazards such as flooding, drought, and wildfires is projected to be larger and more uncertain in the future because of the effects of sea level rise and changes in temperature and precipitation patterns.

    Jul 12, 2016

  • Periodical

    RAND Review: July-August 2016

    This issue highlights the stress of military deployments and resilience of military families; RAND research on cybercrime, network defense, and data breaches; the 40th anniversary of RAND's landmark Health Insurance Experiment; and more.

    Jun 27, 2016

  • Eyeball on a laptop computer screen

    Essay

    The Digital Underworld: What You Need to Know

    A growing threat is emanating from a digital underworld where hackers sell their services like mercenaries and credit-card numbers can be had for pennies on the dollar.

    Jun 24, 2016

  • Hands on a keyboard in a dark room

    Commentary

    Cyberterrorism and the Role of Silicon Valley

    As national security and war are being redefined for the digital age, Silicon Valley will need to be on the front line of counterterrorism. Its inventors and entrepreneurs are driving the information revolution, and they must figure out how to protect vital systems against malevolent intrusions.

    Jun 13, 2016

  • Children hold up letters spelling the word 'peace' during a day of activities and prayers at the Zaitoune historic church in old Damascus, Syria, June 1, 2016

    Report

    Decentralization of Governance Could Help Syria

    With the international community trying to bring peace to Syria, decentralization of governance could be part of the solution. Devolution of authority to localities could help lower the stakes of the conflict and provide security to Syrians who have lost trust in the state.

    Jun 7, 2016

  • Illustration of data encryption

    Blog

    RAND's Lillian Ablon Presents 'Lessons from a Hacker'

    Lillian Ablon, a cybersecurity and emerging technologies researcher, spoke at a RAND Policy Circle Conversation on the world's expanding cyber vulnerability, those who are out there to take advantage of those vulnerabilities, as well as consumer attitudes toward breaches.

    Jun 1, 2016

  • A boy takes pictures at Narita International airport in Narita, Japan, March 25, 2016

    Commentary

    Terrorism Shouldn't Affect Travel Plans

    Evidence suggests that the threat of terrorism need not affect individuals' behavior and travel decisions, not even in the wake of attacks such as those in Brussels and Paris.

    May 21, 2016

  • Paramedics helping a patient

    Commentary

    Privacy Preferences for Healthcare Records and Information Across Europe

    The general public has a more nuanced preference for the privacy of electronic health records than previously thought. Survey respondents said that they would not be averse to individuals involved in the health and rescue professions having access to their basic health information.

    May 11, 2016

  • Travelers wait in line at a security checkpoint at La Guardia Airport in New York City, November 25, 2015

    Commentary

    Out of Line: How to Better Protect Airports from Terrorist Attacks

    In airport security, it's not the size of a potential terrorist bomb that matters most, it's where it detonates. Fortunately, new technologies may present opportunities to get travelers out of line and keep them safe.

    May 2, 2016

  • Congressional Briefing Podcast

    Multimedia

    Getting to Yes with China in Cyberspace: Is It Possible?

    In this May 2016 congressional briefing, RAND experts Scott W. Harold and Martin Libicki discuss the differing perspectives and interests of the United States and China in cyberspace.

    May 2, 2016

  • Tool

    Developing the Pardee RAND Food-Energy-Water Security Index: Toward a Global Standardized, Quantitative, and Transparent Resource Assessment

    To provide information to agencies and efforts focused on food, water, and energy resources, the RAND Corporation developed the Pardee RAND Food-Energy-Water Security Index. This report serves as the technical documentation for the index.

    Apr 28, 2016

  • Journal Article

    Good Practice Guide on Vulnerability Disclosure: From Challenges to Recommendations

    Vulnerabilities are 'flaws' or 'mistakes' in computer-based systems that may be exploited to compromise the network and information security of affected systems.

    Apr 27, 2016

  • Artist Ana Teresa Fernandez and members of cultural organization Border/Arte paint the fence between Mexico and the U.S. to give it the illusion of transparency in Ciudad Juarez, Mexico, April 9, 2016

    Commentary

    Walls Won't Keep Us Safe

    Experience along the U.S. southern border demonstrates that even with fortifications, a wall provides only modest capacity to stop illegal crossings. More emphasis should be placed on expanding border security beyond the physical dimension.

    Apr 15, 2016

  • Infographic

    Data Theft Victims, and Their Response to Breach Notifications

    This infographic highlights the results of a study of consumer attitudes toward data breaches, notifications of those breaches, and company responses to such events.

    Apr 14, 2016

  • Woman typing into a laptop

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

    Apr 14, 2016

  • Topic Synonyms:
  • CIP