Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Autonomous vehicles on a highway

    Commentary

    Ensuring Cybersecurity Is Vital for a Driverless Future

    Feb 12, 2018

    High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs.

  • Abstract motion speed light with night city background

    Report

    Speed and Security: Promises, Perils, and Paradoxes of Accelerating Everything

    May 1, 2018

    As new technologies and social dynamics shift society into hyperdrive, speed could catalyze security risks in areas such as transportation, communication, and health. How can policymakers devise strategies to adapt?

Explore Critical Infrastructure Protection

  • Report

    When Autonomous Vehicles Are Hacked, Who Is Liable?

    The arrival of autonomous vehicles (AVs) on the roads will require policymakers, industry, and the public to adapt to the risk of hackers attacking these vehicles. RAND researchers explored the civil liability issues related to hacked AVs.

    Jul 12, 2019

  • Smart car 3D rendering, photo by Production Perig/Adobe Stock

    Research Brief

    When an Autonomous Vehicle Is Hacked, Who Is Liable?

    Even if the likelihood is small, hacks on autonomous vehicles could lead to deaths, property destruction, ransomware attacks, or data theft. Several scenarios, such as a hacker disabling a car to demand ransom, illustrate the policy challenges facing the civil legal system, insurers, and others.

    Jul 12, 2019

  • Fishing boats departing from Shenjiawan port in Zhoushan, Zhejiang province towards the East China Sea fishing grounds, September 17, 2012, photo by Stringer/Reuters

    Report

    How the United States Can Compete in the Gray Zone

    America is entering a period of intensifying strategic competition with rivals like Russia and China. U.S. officials expect this to play out below the threshold of armed conflict, in the gray zone between peace and war. What policy options does the United States have to respond to gray zone threats?

    Jun 27, 2019

  • A portion of a city model glows red indicating a cyber threat to infrastructure at the DarkMatter booth during the Black Hat information security conference in Las Vegas, Nevada, July 26, 2017

    Commentary

    Fighting and Winning the Undeclared Cyber War

    Russia has executed deliberate intrusions into U.S. critical infrastructure since at least 2011. These systems have included government entities, commercial facilities, water resource plants, and aviation institutions. What actions or policies can the U.S. execute to improve security?

    Jun 24, 2019

  • NATO flag against a background of binary numbers, photo by robsonphoto/Adobe Stock

    Report

    Cyberspace as a Military Domain: Lessons for NATO

    In 2016, NATO identified cyberspace as a new operational domain. What steps has the alliance taken since then to bolster its cyber capabilities? And what are the greatest challenges that still lie ahead?

    Jun 20, 2019

  • Russian military vehicles are seen in eastern Ghouta near Douma, in Damascus, Syria, April 23, 2018, photo by Ali Hashisho/Reuters

    Research Brief

    The Outlook for Russia's Growing Military Power

    Russia's military forces have been improving since 2008, enabling operations in Crimea, eastern Ukraine, and Syria. How will Russian capabilities continue to develop over the next 20 years? And what will this mean for U.S.-Russian competition and for the U.S. Army?

    Jun 18, 2019

  • Report

    The Future of the Russian Military: Russia's Ground Combat Capabilities and Implications for U.S.-Russia Competition

    Researchers analyze societal, political, economic, and demographic factors that undergird Russian military power. They also make projections about how Russian ground combat capabilities will evolve in the future and how the U.S. Army can respond.

    Jun 18, 2019

  • Report

    Valuing Air Force Electric Power Resilience: A Framework for Mission-Level Investment Prioritization

    This report addresses the U.S. Air Force's need for a systematic way to value the risk to missions associated with electric power--related disruptions and accordingly set priorities among investments in power resilience.

    Jun 3, 2019

  • The Olympic torch of the Tokyo 2020 Olympic Games in Tokyo, Japan June 1, 2019, photo by Issei Kato/Reuters

    Commentary

    Japan Prepares for Olympic-Level Cybersecurity

    The world's attention will be fixed on Japan as it hosts the Rugby World Cup in September and the Tokyo Olympics in 2020. Japan's cyber defenses will need to be strong enough to keep attackers out and resilient enough to restore systems should things go wrong.

    Jun 3, 2019

  • Report

    Strategic Surveillance for Food Safety: Designing a surveillance approach and considerations for implementation

    The Food Standards Agency engaged RAND Europe to design an approach to strategic surveillance for the UK food system. The study team produced an end-to-end approach, identified implementation steps and considered their impact and feasibility.

    May 13, 2019

  • Motion blur. Abstract technology and cyber space environment, photo by Quardia/Getty Images

    Commentary

    Three 'New Rules' Worth Considering for the Internet

    Facebook's Mark Zuckerberg has called for new internet regulation starting in four areas: harmful content, election integrity, privacy, and data portability. But why stop there? His proposal could be expanded to include much more: security-by-design, net worthiness, and updated internet business models.

    May 10, 2019

  • Journal Article

    Understanding Cyber Collateral Damage

    We leverage existing collateral damage methodologies in order to explore methods for assessing collateral damage from cyber incidents.

    May 2, 2019

  • Asylum seeking migrant families from Central America in a field after crossing the Rio Grande river into the U.S. from Mexico in Penitas, Texas, March 31, 2019, photo by Adrees Latif/Reuters

    Commentary

    Common Sense Solutions to the Border Crisis

    After years of declines, apprehensions of undocumented immigrants at the U.S.–Mexico border are set for their largest year-on-year increase in history. There is, in fact, a humanitarian crisis on the border. How did this come about? More importantly, what can be done to address it?

    May 2, 2019

  • An illustration of chain links represented in binary code, photo by denisismagilov / Adobe Stock

    Journal Article

    Content Analysis of Cyber Insurance Policies: How Do Carriers Price Cyber Risk?

    Thousands of data breaches occur each year with some costing millions of dollars. Consequently, cyber insurance has grown rapidly in the past decade. In this research, we conduct the first rigorous qualitative study of actual insurance policies.

    Apr 30, 2019

  • Russian President Vladimir Putin chairs a meeting with members of the Security Council at the Kremlin in Moscow, Russia, April 5, 2019, photo by Sputnik/Kremlin/Alexei Druzhinin via Reuters

    Commentary

    Mueller Report May Result in Russian Sanctions but Not Better Behavior

    The Mueller report could help mobilize political pressure in the United States for a stronger posture toward Russian activities that harm American and allied interests. But the Kremlin will likely still see propaganda, disinformation, and subterfuge as useful tools to undermine America's values and cohesion.

    Apr 26, 2019

  • News Release

    Human Smuggling Via Central America Generates Hundreds of Millions of Dollars, but Transnational Criminal Groups May ...

    The smuggling of unlawful migrants from the Northern Triangle region of Central America—Guatemala, Honduras and El Salvador—to the United States generated between $200 million and $2.3 billion for human smugglers in 2017. The wide range reflects uncertainty about the number of migrants that travel northward, their use of smugglers and the fees they pay.

    Apr 22, 2019

  • Central America on a globe, photo by Bobtokyoharris/Getty Images

    Research Brief

    Human Smuggling Operations from Central America to the United States

    Smuggling unlawful migrants from Central America to the United States generated between $200 million and $2.3 billion for human smugglers in 2017. The wide range reflects uncertainty about the number of migrants, their use of smugglers, and the fees they pay. Transnational criminal organizations are only one type of actor involved.

    Apr 21, 2019

  • Report

    Human Smuggling and Associated Revenues: What Do or Can We Know About Routes from Central America to the United States?

    The authors examine the structure, operations, and financing of actors that engage in human smuggling along routes from Central America to the United States and develop a preliminary estimate of revenues associated with human smuggling.

    Apr 21, 2019

  • A cache of guns and ammunition uncovered by U.S. federal investigators in the home of U.S. Coast Guard lieutenant Christopher Paul Hasson in Silver Spring, Maryland, February 20, 2019, photo by U.S. Attorney's Office Maryland/Reuters

    Commentary

    Overdue Overhaul: Security Clearance Reform in a Decade of Leakers, Spies, and Insider Threats

    With the legislative and executive branches seemingly on the same page regarding the need for changes to the security clearance and vetting system, long overdue reform appears to be within reach.

    Apr 15, 2019

  • Mock Bitcoins are displayed in Berlin, January 7, 2014, photo by Pawel Kopczynski/Reuters

    Report

    Terrorist Use of Cryptocurrencies

    Counterterrorism finance strategies have reduced terrorist access to official currencies. Will terrorist groups therefore increase their use of digital cryptocurrencies? New ones have emerged, including some that claim to be more private and secure than Bitcoin, but they also have limitations that make them less viable.

    Mar 27, 2019

  • Topic Synonyms:
  • CIP