Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Hands typing with visual of computer code

    Multimedia

    Equifax and the Data-Breach Era: How Worried Should We Be?

    Oct 26, 2017

    Large-scale data breaches like those of Equifax and OPM compromised the personal data of millions of people. What can be done to improve the response to such breaches? In this October 26th congressional briefing, Lillian Ablon and Sina Beaghley address victim and lawmaker reactions, national security implications, and considerations for policymakers.

  • An aerial photo of a flood-affected area of northern Colorado along the Big Thompson River which has been declared a federal disaster area in September 2013

    Report

    Climate Change May Increase Future Exposure of U.S. Infrastructure to Natural Hazards

    Jul 12, 2016

    Exposure to natural hazards such as flooding, drought, and wildfires is projected to be larger and more uncertain in the future due to the effects of sea level rise and changes in temperature and precipitation patterns.

Explore Critical Infrastructure Protection

  • Migrants from Central America enter the United States Border and Customs facility, where they are expected to apply for asylum, in Tijuana, Mexico, May 4, 2018

    Commentary

    New Border Policy Could Have Unintended Consequences

    The Trump administration has announced significant policy changes to deter migrants from coming to America. These changes will likely have a significant impact on border operations and the federal court system. But it's less clear whether they will have the intended impact of reducing illegal immigration.

    May 21, 2018

  • Report

    Managing International Borders: Balancing Security with the Licit Flow of People and Goods

    This Perspective builds on global best practices and lessons learned from other established border management solutions and proposes opportunities to strengthen security while improving the flow of travelers and goods.

    May 9, 2018

  • Malware or virus inside microchip on electronic circuit

    Commentary

    What Do Meltdown, Spectre, and RyzenFall Mean for the Future of Cybersecurity?

    Unlike most previous cyber threats, a new wave of vulnerabilities attack a computer's hardware, rather than its software. What does this mean for cybersecurity as a whole?

    May 3, 2018

  • Abstract motion speed light with night city background

    Report

    Speed and Security: Promises, Perils, and Paradoxes of Accelerating Everything

    As new technologies and social dynamics shift society into hyperdrive, speed could catalyze security risks in areas such as transportation, communication, and health. How can policymakers devise strategies to adapt?

    May 1, 2018

  • Periodical

    RAND Review: May-June 2018

    This issue features research on preventing child abuse and neglect and improving outcomes for children in the U.S. child-welfare system; a look back on RAND's 70 years of innovation; and an exploration of the human side of artificial intelligence.

    Apr 30, 2018

  • Report

    Moving to the Unclassified: How the Intelligence Community Can Work from Unclassified Facilities

    This report provides analysis and recommendations for intelligence agencies on how to conduct work outside classified facilities by identifying policy, legal, technology, security, financial, and cultural considerations.

    Apr 23, 2018

  • Dad works from home, holding baby on his lap

    Report

    How Can Government Agencies Benefit When Employees Engage in Telework?

    A review of telework practices in government agencies finds similarities across successful telework programs regarding compliance with federal and organizational policies, technological accommodations, return on investment, performance management tools, and training.

    Apr 23, 2018

  • Server room data center with icon representing cloud storage

    Report

    Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

    Researchers discuss the challenge of accessing data in remote data centers, summarize the discussion of an expert panel, and provide a list of needs identified and prioritized by the panel to inform concerned communities and stakeholders.

    Apr 23, 2018

  • An officer with Schertz Police Department holds a FedEx truck from entering the scene of a blast at a FedEx facility in Schertz, Texas, U.S., March 20, 2018

    Commentary

    Austin Bombings Highlight a Potential Vulnerability in the Mail Delivery System

    USPS is better than private couriers at identifying and detecting suspicious packages. Given that they are increasingly handling "last mile" delivery, how can private mail delivery offices better detect and safely handle suspicious mail?

    Apr 17, 2018

  • Passengers walks past sign prior to immigration control

    Commentary

    European Security Cooperation Should Remain Comprehensive—Especially After Brexit

    During Brexit negotiations, it could be tempting for the UK and EU to use certain security structures as 'bargaining chips'. However, it is in no one's interests for both sides to adopt a 'zero-sum' approach to security discussions.

    Mar 28, 2018

  • Padlock generated from a particle vortex

    Multimedia

    Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data

    An overview of testimony by Lillian Ablon presented before the House Financial Services Committee, Subcommittee on Terrorism and Illicit Finance.

    Mar 15, 2018

  • Graphic of digital integrated network technology

    Testimony

    A Close Look at Data Thieves

    What do cyberattackers do with the data they steal? And how do they monetize it? Grouping hackers by their goals, motivations, and capabilities can shed light on these questions.

    Mar 15, 2018

  • Cyber grenade

    Commentary

    Getting Ready to Fight the Next (Cyber) War

    Nation-states and their proxies are regularly spying and attacking in cyberspace across national borders. Western societies that are being targeted should do three things: Be less vulnerable, be able to recognize and mitigate the impact of attacks faster, and be prepared to respond in kind to all levels of offense.

    Mar 3, 2018

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • Opening Ceremony of the 2018 Winter Olympics in Pyeongchang, South Korea, February 9, 2018

    Commentary

    Why the 2018 Winter Olympics Are the Perfect Storm for Cyberattacks

    The Olympic Games could invite the most severe cyber threats to a major sporting event in recent years. The location of the Games and increased connectivity, both among the public and infrastructure, make them a prime target for cyberattacks.

    Feb 12, 2018

  • Autonomous vehicles on a highway

    Commentary

    Ensuring Cybersecurity Is Vital for a Driverless Future

    High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs.

    Feb 12, 2018

  • Water tank in M'bwetu Village, Malawai

    Journal Article

    Examining the Food-Energy-Water and Conflict Nexus

    This article provides an in-depth review of the interactions between insecurity and conflict within the component sectors of the FEW nexus.

    Jan 30, 2018

  • People speak through the U.S.-Mexico border wall at Border Field State Park in San Diego, California, November 18, 2017

    Commentary

    Prioritizing Security at the U.S. Border with Mexico

    As debate on border security continues, policymakers would be wise to look beyond the heated rhetoric to clearly identify priorities and make informed decisions about how best to deploy finite resources to get the strongest security for the investment.

    Jan 29, 2018

  • Brochure

    Spotlight on 2017

    RAND Europe's annual review, Spotlight on 2017, features some of the objective research and analysis we do to help policy and decision makers keep pace with an ever-changing world.

    Jan 29, 2018

  • Shiny gold Bitcoin coin with gun on black background

    Commentary

    Bitcoin and the Dark Web: The New Terrorist Threat?

    Bitcoin has become the prominent currency of the dark web, which is often used to buy illegal goods, such as weapons and drugs. Anecdotal evidence suggests terrorists are using cryptocurrency and the dark web, but further investigation is needed.

    Jan 22, 2018

  • Topic Synonyms:
  • CIP