Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Autonomous vehicles on a highway

    Commentary

    Ensuring Cybersecurity Is Vital for a Driverless Future

    Feb 12, 2018

    High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs.

  • Abstract motion speed light with night city background

    Report

    Speed and Security: Promises, Perils, and Paradoxes of Accelerating Everything

    May 1, 2018

    As new technologies and social dynamics shift society into hyperdrive, speed could catalyze security risks in areas such as transportation, communication, and health. How can policymakers devise strategies to adapt?

Explore Critical Infrastructure Protection

  • Report

    Strategic Surveillance for Food Safety: Designing a surveillance approach and considerations for implementation

    The Food Standards Agency engaged RAND Europe to design an approach to strategic surveillance for the UK food system. The study team produced an end-to-end approach, identified implementation steps and considered their impact and feasibility.

    May 13, 2019

  • Motion blur. Abstract technology and cyber space environment, photo by Quardia/Getty Images

    Commentary

    Three 'New Rules' Worth Considering for the Internet

    Facebook's Mark Zuckerberg has called for new internet regulation starting in four areas: harmful content, election integrity, privacy, and data portability. His new rules could be expanded, as part of the follow-on discussion he calls for, to include several other necessary areas: security-by-design, net worthiness and updated internet business models.

    May 10, 2019

  • Asylum seeking migrant families from Central America in a field after crossing the Rio Grande river into the U.S. from Mexico in Penitas, Texas, March 31, 2019, photo by Adrees Latif/Reuters

    Commentary

    Common Sense Solutions to the Border Crisis

    After years of declines, apprehensions of undocumented immigrants at the U.S.–Mexico border are set for their largest year-on-year increase in history. There is, in fact, a humanitarian crisis on the border. How did this come about? More importantly, what can be done to address it?

    May 2, 2019

  • Journal Article

    Understanding Cyber Collateral Damage

    We leverage existing collateral damage methodologies in order to explore methods for assessing collateral damage from cyber incidents.

    May 2, 2019

  • An illustration of chain links represented in binary code, photo by denisismagilov / Adobe Stock

    Journal Article

    Content Analysis of Cyber Insurance Policies: How Do Carriers Price Cyber Risk?

    Thousands of data breaches occur each year with some costing millions of dollars. Consequently, cyber insurance has grown rapidly in the past decade. In this research, we conduct the first rigorous qualitative study of actual insurance policies.

    Apr 30, 2019

  • Russian President Vladimir Putin chairs a meeting with members of the Security Council at the Kremlin in Moscow, Russia, April 5, 2019, photo by Sputnik/Kremlin/Alexei Druzhinin via Reuters

    Commentary

    Mueller Report May Result in Russian Sanctions but Not Better Behavior

    The Mueller report could help mobilize political pressure in the United States for a stronger posture toward Russian activities that harm American and allied interests. But the Kremlin will likely still see propaganda, disinformation, and subterfuge as useful tools to undermine America's values and cohesion.

    Apr 26, 2019

  • News Release

    Human Smuggling Via Central America Generates Hundreds of Millions of Dollars, but Transnational Criminal Groups May ...

    The smuggling of unlawful migrants from the Northern Triangle region of Central America—Guatemala, Honduras and El Salvador—to the United States generated between $200 million and $2.3 billion for human smugglers in 2017. The wide range reflects uncertainty about the number of migrants that travel northward, their use of smugglers and the fees they pay.

    Apr 22, 2019

  • Report

    Human Smuggling and Associated Revenues: What Do or Can We Know About Routes from Central America to the United States?

    The authors examine the structure, operations, and financing of actors that engage in human smuggling along routes from Central America to the United States and develop a preliminary estimate of revenues associated with human smuggling.

    Apr 22, 2019

  • Central America on a globe, photo by Bobtokyoharris/Getty Images

    Research Brief

    Human Smuggling Operations from Central America to the United States

    Smuggling unlawful migrants from Central America to the United States generated between $200 million and $2.3 billion for human smugglers in 2017. The wide range reflects uncertainty about the number of migrants, their use of smugglers, and the fees they pay. Transnational criminal organizations are only one type of actor involved.

    Apr 22, 2019

  • A cache of guns and ammunition uncovered by U.S. federal investigators in the home of U.S. Coast Guard lieutenant Christopher Paul Hasson in Silver Spring, Maryland, February 20, 2019, photo by U.S. Attorney's Office Maryland/Reuters

    Commentary

    Overdue Overhaul: Security Clearance Reform in a Decade of Leakers, Spies, and Insider Threats

    With the legislative and executive branches seemingly on the same page regarding the need for changes to the security clearance and vetting system, long overdue reform appears to be within reach.

    Apr 15, 2019

  • Mock Bitcoins are displayed in Berlin, January 7, 2014, photo by Pawel Kopczynski/Reuters

    Report

    Terrorist Use of Cryptocurrencies

    Counterterrorism finance strategies have reduced terrorist access to official currencies. Will terrorist groups therefore increase their use of digital cryptocurrencies? New ones have emerged, including some that claim to be more private and secure than Bitcoin, but they also have limitations that make them less viable.

    Mar 27, 2019

  • Department of Water and Power employees assess the damage from a broken 30-inch water main on Sunset Boulevard, next to the UCLA campus in the Westwood section of Los Angeles, July 30, 2014, photo by Lucy Nicholson/Reuters

    Commentary

    How Water Systems Can Learn From Smart Electric Grids

    As drought and population growth place increasing pressure on water supply, the need to save and efficiently manage Southern California's water resources becomes increasingly critical. A single information and communication technology platform could go a long way toward moving water utilities from reactive to proactive maintenance practices.

    Mar 22, 2019

  • Israeli Prime Minister Benjamin Netanyahu and Chinese President Xi Jinping shake hands ahead of their talks at Diaoyutai State Guesthouse in Beijing, China, March 21, 2017, photo by Etienne Oliveau/Reuters/Pool

    Report

    How Has the Israel-China Relationship Evolved?

    Since the early 2000s, relations between China and Israel have expanded in areas like diplomacy, trade, investment, construction, educational partnerships, scientific cooperation, and tourism. What challenges does the relationship pose for Israel and the United States?

    Mar 21, 2019

  • Interior of autonomous car with ones and zeroes superimposed, photo by metamorworks/Getty Images

    Commentary

    Why AV Safety and Cybersecurity Need to Be Pursued in Tandem

    Safety and cybersecurity are generally pursued by separate teams within autonomous vehicle companies. A joint approach to standards could optimize safety and cybersecurity and reduce overall risks to autonomous vehicle operation.

    Mar 20, 2019

  • A man visits the Huawei Cyber Security Transparency Centre in Brussels, Belgium, March 5, 2019, photo by Yves Herman/Reuters

    Commentary

    Public Evidence of Huawei as a Cyber Threat May Be Elusive, but Restrictions Could Still Be Warranted

    Although a “smoking gun” of Huawei involvement in government-directed espionage remains elusive, the United States has compelling security and economic reasons to consider limiting the involvement of Chinese telecommunications companies in its domestic networks.

    Mar 7, 2019

  • A stretch of Hadrian's Wall at Walton's Crags in Northumberland, England, photo by Gannet77/Getty Images

    Commentary

    Hadrian's Wall Was a Policy Statement; So Is Donald Trump's

    It's not clear if Hadrian's Wall was necessary to prevent Scottish fighters from invading the Roman Empire. Neither is it clear how effective Trump's wall would be at repelling undocumented immigration and smugglers. Hadrian's Wall may have been of symbolic value to those on both sides of it. Trump's could be, too.

    Mar 6, 2019

  • Cyborg head using artificial intelligence to create digital interface 3D rendering, image by sdecoret/Adobe Stock

    Q&A

    The Promise and Perils of AI: Q&A with Douglas Yeung

    Douglas Yeung, a social psychologist at RAND, discusses how any technology reflects the values, norms, and biases of its creators. Bias in artificial intelligence could have unintended consequences. He also warns that cyber attackers could deliberately introduce bias into AI systems.

    Feb 27, 2019

  • Journal Article

    LGA Cyber Security Stocktake: National-Level Report

    A cybersecurity stocktake of all 353 councils in England examined IT security, leadership, governance, partnerships, technology arrangements and training, offering recommendations on areas for improvement.

    Feb 22, 2019

  • Donald Trump holds up a photo of a border wall design in the Cabinet Room of the White House in Washington, D.C., January 11, 2019, photo by Leah Millis/Reuters

    Commentary

    Terrorists on the Border and Government Secrecy

    Detailed information on how many would-be terrorists may have sought to cross the southern border is being withheld on the grounds that it is sensitive. The refusal of officials to offer a fuller explanation of the numbers illustrates how the continued expansion of secrecy in government is damaging the ability of the public to assess the risk and evaluate the response.

    Feb 13, 2019

  • U.S. Customs and Border Protection officials detain migrants from Central America after they crossed from Mexico, at the International Friendship Park in San Diego county, CA, January 16, 2019, photo by Mohammed Salem/Reuters

    Commentary

    The Wall Is Not the Only Answer

    The president and Congress have just days to negotiate an agreement over border security, or the government may shut down once again. Until a bipartisan effort is made to reform U.S. immigration laws, policy options to address the incentives that cause people to risk their lives to come to the border to claim asylum will continue to be limited.

    Feb 8, 2019

  • Topic Synonyms:
  • CIP