Critical Infrastructure Protection


Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Hands typing with visual of computer code, photo by supershabashnyiv/Getty Images


    Equifax and the Data-Breach Era: How Worried Should We Be?

    Oct 26, 2017

    Large-scale data breaches like those of Equifax and OPM compromised the personal data of millions of people. What can be done to improve the response to such breaches? In this October 26th congressional briefing, Lillian Ablon and Sina Beaghley address victim and lawmaker reactions, national security implications, and considerations for policymakers.

  • An aerial photo of a flood-affected area of northern Colorado along the Big Thompson River which has been declared a federal disaster area in September 2013, photo by Capt. Darin Overstreet/U.S. Air National Guard/Handout via Reuters


    Climate Change May Increase Future Exposure of U.S. Infrastructure to Natural Hazards

    Jul 12, 2016

    Exposure to natural hazards such as flooding, drought, and wildfires is projected to be larger and more uncertain in the future due to the effects of sea level rise and changes in temperature and precipitation patterns.

Explore Critical Infrastructure Protection

  • Graphic of digital integrated network technology


    A Close Look at Data Thieves

    What do cyber attackers do with the data they steal? And how do they monetize it? Grouping hackers by their goals, motivations, and capabilities can shed light on these questions.

    Mar 15, 2018

  • Cyber grenade


    Getting Ready to Fight the Next (Cyber) War

    Nation-states and their proxies are regularly spying and attacking in cyberspace across national borders. Western societies that are being targeted should do three things: Be less vulnerable, be able to recognize and mitigate the impact of attacks faster, and be prepared to respond in kind to all levels of offense.

    Mar 3, 2018

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • Autonomous vehicles on a highway


    Ensuring Cybersecurity Is Vital for a Driverless Future

    High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs.

    Feb 12, 2018

  • Opening Ceremony of the 2018 Winter Olympics in Pyeongchang, South Korea, February 9, 2018


    Why the 2018 Winter Olympics Are the Perfect Storm for Cyberattacks

    The Olympic Games could invite the most severe cyber threats to a major sporting event in recent years. The location of the Games and increased connectivity, both among the public and infrastructure, make them a prime target for cyberattacks.

    Feb 12, 2018

  • Water tank in M'bwetu Village, Malawai

    Journal Article

    Examining the Food-Energy-Water and Conflict Nexus

    This article provides an in-depth review of the interactions between insecurity and conflict within the component sectors of the FEW nexus.

    Jan 30, 2018

  • People speak through the U.S.-Mexico border wall at Border Field State Park in San Diego, California, November 18, 2017


    Prioritizing Security at the U.S. Border with Mexico

    As debate on border security continues, policymakers would be wise to look beyond the heated rhetoric to clearly identify priorities and make informed decisions about how best to deploy finite resources to get the strongest security for the investment.

    Jan 29, 2018

  • Brochure

    Spotlight on 2017

    RAND Europe's annual review, Spotlight on 2017, features some of the objective research and analysis we do to help policy and decision makers keep pace with an ever-changing world.

    Jan 29, 2018

  • Shiny gold Bitcoin coin with gun on black background


    Bitcoin and the Dark Web: The New Terrorist Threat?

    Bitcoin has become the prominent currency of the dark web, which is often used to buy illegal goods, such as weapons and drugs. Anecdotal evidence suggests terrorists are using cryptocurrency and the dark web, but further investigation is needed.

    Jan 22, 2018

  • A French gendarme stands guard near a line of lorries as migrants wait in bushes in the hopes of boarding a truck to make their way across the Channel to Britain, near Calais, France, Janaury 21, 2016


    Is Macron Set to 'Take Back Control' of UK-France Border After Brexit?

    As French President Emmanuel Macron arrives in London for the 35th UK-France Summit, there is growing French discomfort with arrangements at the UK-France border. The UK's decision to leave the European Union has added new urgency to this already fraught debate.

    Jan 17, 2018

  • A security lock symbol on computer circuit board


    Law Enforcement Cyber Center: Final Technical Report

    Cybercrime is a challenge for local and state law enforcement. The Law Enforcement Cyber Center (LECC) was established to provide a resource to combat cybercrime. This report summarizes the LECC's activities and provides recommendations.

    Jan 15, 2018

  • Report

    Estimating the Global Cost of Cyber Risk: Methodology and Examples

    This report shares a transparent and adaptable methodology for estimating present and future global costs of cyber risk. The report has a companion Excel-based modeling and simulation platform that allows users to alter assumptions.

    Jan 15, 2018

  • A composite image with hands on a keyboard and a padlock surrounded by a visualisation of a computer network


    Estimating the Global Cost of Cyber Risk Calculator

    This Excel-based modeling and simulation tool estimates present and future global costs of cyber attacks and incidents. Users can also alter assumptions to investigate a wide variety of research questions.

    Jan 15, 2018

  • Government agents tracking cybercrime


    How the Pentagon Should Deter Cyber Attacks

    Foreign hackers are not afraid to launch attacks on the United States in cyberspace that they would not dare risk in a real theater of war. As cyber aggression gets worse and more brazen, the U.S. must figure out how to deter foreign actors in cyberspace as effectively as it does in nuclear and conventional warfare.

    Jan 10, 2018

  • Conceptual image of human voice


    Fake Voices Will Become Worryingly Accurate

    New technology can convincingly fake the human voice and create security nightmares. Considering the widespread distrust of the media, institutions, and expert gatekeepers, audio fakery could start wars.

    Jan 8, 2018

  • Report

    Gaming Space: A Game-Theoretic Methodology for Assessing the Deterrent Value of Space Control Options

    This report introduces and explains a game-theoretic methodology to help decisionmakers assess the potential effects of alternative approaches to space control.

    Jan 5, 2018

  • Tool

    Defensive Space Analysis Tool (DSPAT): Version 2.0

    This manual explains how to use the Defensive Space Analysis Tool (DSPAT), which was developed to compare alternative approaches to space control in terms of their mission effectiveness, feasibility, escalation risk, and political cost.

    Jan 5, 2018

  • The new Smart concept autonomous car Vision EQ fortwo model is presented during the Frankfurt Motor Show (IAA) in Frankfurt, Germany, September 12, 2017


    Autonomous Vehicles: Terrorist Threat or Security Opportunity?

    Terrorist groups that track developments in technology could be considering using self-driving cars in place of suicide bombers or for ramming attacks. But autonomous vehicle capabilities offer a range of potential benefits to law enforcement and security operations, too.

    Jan 3, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017


    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • The border fence between United States and Mexico


    The Big Border Security Question

    What does a secure U.S.-Mexico border look like? And what kind of security measures are needed? Despite investing billions of dollars since 9/11, it's still a struggle to measure how effective U.S. border security operations are.

    Dec 9, 2017

  • Topic Synonyms:
  • CIP