Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Hands typing with visual of computer code, photo by supershabashnyiv/Getty Images

    Multimedia

    Equifax and the Data-Breach Era: How Worried Should We Be?

    Oct 26, 2017

    Large-scale data breaches like those of Equifax and OPM compromised the personal data of millions of people. What can be done to improve the response to such breaches? In this October 26th congressional briefing, Lillian Ablon and Sina Beaghley address victim and lawmaker reactions, national security implications, and considerations for policymakers.

  • An aerial photo of a flood-affected area of northern Colorado along the Big Thompson River which has been declared a federal disaster area in September 2013, photo by Capt. Darin Overstreet/U.S. Air National Guard/Handout via Reuters

    Report

    Climate Change May Increase Future Exposure of U.S. Infrastructure to Natural Hazards

    Jul 12, 2016

    Exposure to natural hazards such as flooding, drought, and wildfires is projected to be larger and more uncertain in the future due to the effects of sea level rise and changes in temperature and precipitation patterns.

Explore Critical Infrastructure Protection

  • The border fence between United States and Mexico

    Commentary

    The Big Border Security Question

    What does a secure U.S.-Mexico border look like? And what kind of security measures are needed? Despite investing billions of dollars since 9/11, it's still a struggle to measure how effective U.S. border security operations are.

    Dec 9, 2017

  • Testimony

    Federal Research and Development for Agricultural Biodefense: Addendum

    Document submitted December 5, 2017, as an addendum to testimony presented before the House Science, Space, andTechnology Committee, Subcommittee on Research and Technology on November 2, 2017.

    Dec 6, 2017

  • Passengers wait to enter the xray machine as a man is scanned at an airport,

    Multimedia

    New TSA Administrator Discusses Global Aviation Security

    In this Events @ RAND podcast, TSA Administrator David Pekoske joins Brian Michael Jenkins for a discussion about the TSA's strategy and approach to operations in the face of evolving threats to transportation from terrorist groups and the individuals they inspire.

    Nov 29, 2017

  • Prototypes for a U.S. border wall are shown near completion behind the current border fence near Tijuana, Mexico, October 23, 2017

    Commentary

    Broken Border or Broken Policy?

    What does a secure land border look like? The U.S. government's inability to provide an answer has trapped America in a vicious cycle. Every decade, the perception that the U.S.-Mexico border isn't secure enough leads to big investments—with mixed results.

    Nov 17, 2017

  • Power plant operations at Eielson Air Force Base, Alaska

    Report

    Air Force Installation Energy Assurance: An Assessment Framework

    This report presents a framework that mission owners and civil engineers at Air Force installations can use to assess their level of energy assurance.

    Nov 6, 2017

  • Agricultural farm land is seen in the Imperial Valley near El Centro, California, May 31, 2015

    Testimony

    Agriculture Security in America

    The United States has made progress in developing systems to safeguard the nation's agriculture. But threats persist because of socioeconomic, environmental, and ecological factors.

    Nov 2, 2017

  • Periodical

    RAND Review: November-December 2017

    This issue highlights recent RAND research on post-9/11 military caregivers; RAND-Lex, a computer program built at RAND that can analyze huge data sets of text; and the implications of climate change on Arctic cooperation.

    Oct 19, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Building our Connected Society: Findings from the 2017 Thought Leadership programme

    This report summarises the key themes that emerged from four thought leadership sessions on the UK's connected society, along with recommended actions moving forward for the UK government, industries, the third sector and the public.

    Oct 11, 2017

  • Tool

    Roadmap to Succeed in the Open for the National Geospatial-Intelligence Agency's Human Development Directorate

    This tool provides the National Geospatial-Intelligence Agency's Human Development Directorate with a roadmap for how employees can overcome the hurdles to achieving the agency's missions outside of secure and classified environments.

    Sep 26, 2017

  • Migrants at the Anti-Illegal Immigration Authority in Tripoli, Libya, September 10, 2017

    Commentary

    Addressing Europe's Migrant Crisis Takes More Than Stopping the Boats from Libya

    Treating migration from Libya as a border security issue has reduced migration across the Mediterranean. But efforts to keep migrants in Libya are fraught with risks, exacerbate a massive human rights problem, and do not address Libya's long-term economic and political stabilization.

    Sep 25, 2017

  • Soldiers with U.S. Army Cyber Command take part in network defense training

    Report

    How the Army Can Retain Its Cyber Expertise

    Projected earnings for information security analysts with characteristics similar to those of enlisted soldiers are comparable with military pay. But retention efforts may be hampered by soldiers' perceptions of civilian opportunities.

    Sep 18, 2017

  • Woman using smartphone and laptop with icon graphic cyber security network of connected devices and personal data security

    Commentary

    How to Help Small Businesses Deal with Cyber Threats

    Small businesses are especially vulnerable to cyber threats. What can be done to provide small businesses the security to continue to prosper, while enhancing America's cybersecurity workforce and making the economy more secure?

    Sep 15, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017

  • Digital devices on a map of Australia

    Report

    Australia's Cyber Security Policy Options

    An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.

    Aug 7, 2017

  • Girl Scouts compete in the Mission Ocean Challenge during the USS California Science Experience at Naval Surface Warfare Center, November 6, 2010

    Commentary

    Cybersecurity Badge: One Big Step for Girl Scouts, Potentially Giant Leap for Women

    The Girl Scouts will start offering 18 cybersecurity badges next year. In addition to exposing girls to cyber concepts and challenges, this could encourage them to pursue cybersecurity or other STEM careers in which women are underrepresented.

    Aug 3, 2017

  • Journal Article

    Impact Assessment of Specific Measures Aimed at Increasing Transparency and Engagement in EFSA Risk Assessment Process

    The main objective of the study was to assess the impact of a set of measures identified by EFSA to promote trust and confidence in EFSA's risk assessment process.

    Aug 1, 2017

  • Russian President Vladimir Putin speaks during a news conference after the G20 summit in Hamburg, Germany, July 8, 2017

    Commentary

    Russian Information Warfare: A Reality That Needs a Response

    For the last three decades, Russia has exploited its growing capabilities in cyberspace to spy on, influence, and punish others. The West will continue to struggle to hold Moscow accountable, in part because international law falls far short of fully defining the rules or resolving conflicts.

    Jul 21, 2017

  • The Washington Monument on the National Mall in Washington, D.C.

    Commentary

    How to Harden America's Soft Targets

    The U.S. government must choose where to apply limited resources to defend soft targets. But it could expand its information-sharing efforts with other governments and local law enforcement. Broad intelligence sharing and more training could help identify potential attackers before they can execute their plans.

    Jul 5, 2017

  • Topic Synonyms:
  • CIP