Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Autonomous vehicles on a highway

    Commentary

    Ensuring Cybersecurity Is Vital for a Driverless Future

    Feb 12, 2018

    High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs.

  • Abstract motion speed light with night city background

    Report

    Speed and Security: Promises, Perils, and Paradoxes of Accelerating Everything

    May 1, 2018

    As new technologies and social dynamics shift society into hyperdrive, speed could catalyze security risks in areas such as transportation, communication, and health. How can policymakers devise strategies to adapt?

Explore Critical Infrastructure Protection

  • Donald Trump holds up a photo of a border wall design in the Cabinet Room of the White House in Washington, D.C., January 11, 2019

    Commentary

    Terrorists on the Border and Government Secrecy

    Detailed information on how many would-be terrorists may have sought to cross the southern border is being withheld on the grounds that it is sensitive. The refusal of officials to offer a fuller explanation of the numbers illustrates how the continued expansion of secrecy in government is damaging the ability of the public to assess the risk and evaluate the response.

    Feb 13, 2019

  • U.S. Customs and Border Protection officials detain migrants from Central America after they crossed from Mexico, at the International Friendship Park in San Diego county, CA, January 16, 2019

    Commentary

    The Wall Is Not the Only Answer

    The president and Congress have just days to negotiate an agreement over border security, or the government may shut down once again. Until a bipartisan effort is made to reform U.S. immigration laws, policy options to address the incentives that cause people to risk their lives to come to the border to claim asylum will continue to be limited.

    Feb 8, 2019

  • Vice President Mike Pence and Speaker of the House Nancy Pelosi listen as President Donald Trump delivers his second State of the Union address in Washington, February 5, 2019

    Blog

    State of the Union: Insights from RAND

    To shed light on a wide range of topics that figured in President Trump's second State of the Union address, we've rounded up insights from some of RAND's objective and nonpartisan research, analysis, and expertise.

    Feb 6, 2019

  • Hawaii Air National Guardsmen evaluate network vulnerabilities during the Po’oihe 2015 Cyber Security Exercise at the University of Hawaii Manoa Campus Center Ballroom, June 4, 2015

    Commentary

    Developing an Objective, Repeatable Scoring System for a Vulnerability Equities Process

    If governments seek to create an objective framework for decision making about whether or when to disclose software vulnerabilities, what might that look like? What questions should be included, how should they influence the outcome and how can one interpret the results?

    Feb 5, 2019

  • A U.S. Border Patrol agent at the San Ysidro port of entry from Mexico in San Diego, California, November 9, 2018

    Commentary

    Shutdown Could Provide Opening for Adversaries to Corrupt Those Protecting the U.S. Homeland

    Every day that the government shutdown continues prolongs the financial hardship for those on the front lines protecting the United States and gives cartels and transnational criminal organizations an opening to try to corrupt the DHS ranks. As negotiations continue to stall, the Trump administration and Congress should consider taking steps to guard against this vulnerability.

    Jan 22, 2019

  • Fred Pardee attending a Pardee RAND Graduate School Board of Governors meeting on March 28, 2014

    Content

    Fred Pardee: Making a Difference

    Fred Pardee grew up in the shadow of World War II and has spent his life supporting the cause of human dignity and development around the world. He has given more than $22 million over his lifetime to RAND and the Pardee RAND Graduate School to support research on some of the world's most pressing problems.

    Jan 18, 2019

  • Accountability in Cyberspace: The Problem of Attribution

    Multimedia

    How to Achieve Accountability in Cyberspace

    Identifying the responsible party behind malicious cyber incidents is necessary for holding bad actors accountable. But there are many challenges that accompany cyber attribution. Creating an independent, global organization that investigates and publicly assigns blame for major hacks could help.

    Jan 14, 2019

  • After crossing from Mexico by jumping a border fence, migrants run next to a prototype of the border wall in Otay County, California, December 21, 2018

    Commentary

    What Border Walls Can and Cannot Accomplish

    States have been building walls since ancient times. Some were arguably quite successful, others less so. At the core of prudent policy lies a basic question: What can walls realistically accomplish?

    Jan 8, 2019

  • Periodical

    RAND Review: January-February 2019

    This issue spotlights (1) research on how faith-based organizations promote health and well-being in underserved communities and (2) the Pardee RAND Graduate School's new approach to policy and training the next generation of policy experts.

    Jan 7, 2019

  • Facebook CEO Mark Zuckerberg testifies before a House Energy and Commerce Committee hearing regarding the company's use and protection of user data on Capitol Hill in Washington, U.S., April 11, 2018

    Commentary

    Data Breaches Could Cause Users to Opt Out of Sharing Personal Data. Then What?

    As tech-based systems have become all but indispensable, many institutions might assume user data will be reliable, meaningful and, most of all, plentiful. But what if this data became unreliable, meaningless, or even scarce?

    Dec 28, 2018

  • Journal Article

    Economics of Vulnerability Disclosure

    This study serves as a follow up to the 2015 ENISA Good Practice Guide on Vulnerability Disclosure and seeks to provide a glimpse into the economics, costs, and incentives related to discovering and disclosing vulnerabilities.

    Dec 14, 2018

  • World map with electronic circuits

    Commentary

    When Cyber Attacks Occur, Who Should Investigate?

    Data breaches and cyberattacks cross geopolitical boundaries, targeting individuals, corporations and governments. Creating a global body with a narrow focus on investigating and assigning responsibility for cyberattacks could be the first step to creating a digital world with accountability.

    Dec 6, 2018

  • Daniel holds 1-year-old Daniela, both from El Salvador, as a group of migrants from Central America en route to the United States crossed through the Suchiate River into Mexico, November 2, 2018

    Commentary

    America's Overwhelmed Immigration System

    The Trump administration's options to deal with the surge of asylum seekers arriving at the U.S. border appear to be limited. What policies could help address the problem?

    Dec 5, 2018

  • Dried herbs, flowers and spices at the spice souq in Dubai, UAE

    Journal Article

    Food Security in the Gulf Cooperation Council

    This report characterizes food security in GCC countries, documents the strategies they have taken to facilitate domestic food production and imports, and considers these strategies under scenarios with high versus low risk of supply disruption.

    Nov 28, 2018

  • Journal Article

    Regulating Risks Within Complex Sociotechnical Systems: Evidence From Critical Infrastructure Cybersecurity Standards

    One of the first empirical studies of the effects of mandatory cybersecurity regulations for critical infrastructure.

    Nov 27, 2018

  • U.S. Marines install concertina wire along the top of the primary border wall at the port of entry next to Tijuana, Meico, in San Ysidro, San Diego, U.S., November 9, 2018

    Commentary

    The U.S. Military's Border Enforcement Role

    The Trump administration announced a deployment of at least 5,200 active-duty troops to the U.S.-Mexico border. Is a military response of this size needed to address the situation on the southern border?

    Nov 19, 2018

  • Report

    Improving C2 and Situational Awareness for Operations in and Through the Information Environment

    Every military activity has informational aspects, but the information environment (IE) is not well integrated into military planning, doctrine, or processes. Better understanding of the IE will improve command and control and situational awareness.

    Nov 1, 2018

  • Research Brief

    Requirements for Better C2 and Situational Awareness of the Information Environment

    Every military activity has informational aspects, but the information environment (IE) is not well integrated into military planning, doctrine, or processes. Better understanding of the IE will improve command and control and situational awareness.

    Nov 1, 2018

  • Report

    Secrecy in U.S. National Security: Why a Paradigm Shift Is Needed

    This Perspective summarizes an examination of the adequacy of the system for governing national security information secrecy. It finds the present secrecy paradigm failing and proposes major reforms in making, protecting, and releasing secrets.

    Nov 1, 2018

  • The Security Operation Centre for Telstra, Australia's biggest telecoms firm, which is used to monitor, detect and respond to security incidents, including cyber attacks, in Sydney, Australia, August 24, 2017

    Commentary

    Financial Frameworks for Cybersecurity Are Failing

    Cybersecurity has become a team sport. But all participants on the field are playing without clear rules, without a team approach, and without knowing when to pass the ball or to whom.

    Oct 25, 2018

  • Topic Synonyms:
  • CIP