Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Sign that says Fort Bragg, Home of the Airborne and Special Operations Forces, photo by U.S. Army

    Report

    How to Protect Army Installations from Emerging Threats

    Nov 10, 2020

    Emerging technologies such as drones, 5G communications, smart city systems, and the use of social media disinformation by adversaries all pose potential threats to U.S. Army bases. A new framework can help assess possible solutions and the resources required to defend against these threats.

  • Cyber warfare operators monitor cyber attacks at Warfield Air National Guard Base, Middle River, MD, December 2, 2017, photo by J.M. Eddins Jr./U.S. Air Force

    Commentary

    How the Military Might Expand Its Cyber Skills

    Apr 22, 2021

    The U.S. military will need to improve its software fluency if it wants to be dominant on the battlefields of the future. Ensuring that future leaders in the military develop cyber skills and the ability to interface with technical experts may be increasingly important.

Explore Critical Infrastructure Protection

  • Server room data center with icon representing cloud storage

    Report

    Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

    Researchers discuss the challenge of accessing data in remote data centers, summarize the discussion of an expert panel, and provide a list of needs identified and prioritized by the panel to inform concerned communities and stakeholders.

    Apr 23, 2018

  • desks, viewed from above

    Report

    Can the Intelligence Community Work from Home?

    Remote-work programs for U.S. intelligence agencies have several advantages, including flexibility during a pandemic or other crisis. What policy, legal, technology, security, financial, and cultural issues need to be considered when making this shift?

    Apr 23, 2018

  • Dad works from home, holding baby on his lap

    Report

    How Can Government Agencies Benefit When Employees Engage in Telework?

    A review of telework practices in government agencies finds similarities across successful telework programs regarding compliance with federal and organizational policies, technological accommodations, return on investment, performance management tools, and training.

    Apr 23, 2018

  • An officer with Schertz Police Department holds a FedEx truck from entering the scene of a blast at a FedEx facility in Schertz, Texas, U.S., March 20, 2018

    Commentary

    Austin Bombings Highlight a Potential Vulnerability in the Mail Delivery System

    USPS is better than private couriers at identifying and detecting suspicious packages. Given that they are increasingly handling "last mile" delivery, how can private mail delivery offices better detect and safely handle suspicious mail?

    Apr 17, 2018

  • Passengers walks past sign prior to immigration control

    Commentary

    European Security Cooperation Should Remain Comprehensive—Especially After Brexit

    During Brexit negotiations, it could be tempting for the UK and EU to use certain security structures as 'bargaining chips'. However, it is in no one's interests for both sides to adopt a 'zero-sum' approach to security discussions.

    Mar 28, 2018

  • Padlock generated from a particle vortex

    Multimedia

    Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data

    An overview of testimony by Lillian Ablon presented before the House Financial Services Committee, Subcommittee on Terrorism and Illicit Finance.

    Mar 15, 2018

  • Graphic of digital integrated network technology

    Testimony

    A Close Look at Data Thieves

    What do cyberattackers do with the data they steal? And how do they monetize it? Grouping hackers by their goals, motivations, and capabilities can shed light on these questions.

    Mar 15, 2018

  • Cyber grenade

    Commentary

    Getting Ready to Fight the Next (Cyber) War

    Nation-states and their proxies are regularly spying and attacking in cyberspace across national borders. Western societies that are being targeted should do three things: Be less vulnerable, be able to recognize and mitigate the impact of attacks faster, and be prepared to respond in kind to all levels of offense.

    Mar 3, 2018

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • Opening Ceremony of the 2018 Winter Olympics in Pyeongchang, South Korea, February 9, 2018

    Commentary

    Why the 2018 Winter Olympics Are the Perfect Storm for Cyberattacks

    The Olympic Games could invite the most severe cyber threats to a major sporting event in recent years. The location of the Games and increased connectivity, both among the public and infrastructure, make them a prime target for cyberattacks.

    Feb 12, 2018

  • Autonomous vehicles on a highway

    Commentary

    Ensuring Cybersecurity Is Vital for a Driverless Future

    High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs.

    Feb 12, 2018

  • Water tank in M'bwetu Village, Malawai

    Journal Article

    Examining the Food-Energy-Water and Conflict Nexus

    This article provides an in-depth review of the interactions between insecurity and conflict within the component sectors of the FEW nexus.

    Jan 30, 2018

  • Brochure

    Spotlight on 2017

    RAND Europe's annual review, Spotlight on 2017, features some of the objective research and analysis we do to help policy and decision makers keep pace with an ever-changing world.

    Jan 29, 2018

  • People speak through the U.S.-Mexico border wall at Border Field State Park in San Diego, California, November 18, 2017

    Commentary

    Prioritizing Security at the U.S. Border with Mexico

    As debate on border security continues, policymakers would be wise to look beyond the heated rhetoric to clearly identify priorities and make informed decisions about how best to deploy finite resources to get the strongest security for the investment.

    Jan 29, 2018

  • Shiny gold Bitcoin coin with gun on black background

    Commentary

    Bitcoin and the Dark Web: The New Terrorist Threat?

    Bitcoin has become the prominent currency of the dark web, which is often used to buy illegal goods, such as weapons and drugs. Anecdotal evidence suggests terrorists are using cryptocurrency and the dark web, but further investigation is needed.

    Jan 22, 2018

  • A French gendarme stands guard near a line of lorries as migrants wait in bushes in the hopes of boarding a truck to make their way across the Channel to Britain, near Calais, France, Janaury 21, 2016

    Commentary

    Is Macron Set to 'Take Back Control' of UK-France Border After Brexit?

    As French President Emmanuel Macron arrives in London for the 35th UK-France Summit, there is growing French discomfort with arrangements at the UK-France border. The UK's decision to leave the European Union has added new urgency to this already fraught debate.

    Jan 17, 2018

  • A composite image with hands on a keyboard and a padlock surrounded by a visualisation of a computer network

    Tool

    Estimating the Global Cost of Cyber Risk Calculator

    This Excel-based modeling and simulation tool estimates present and future global costs of cyber attacks and incidents. Users can also alter assumptions to investigate a wide variety of research questions.

    Jan 15, 2018

  • A security lock symbol on computer circuit board

    Report

    Law Enforcement Cyber Center: Final Technical Report

    Cybercrime is a challenge for local and state law enforcement. The Law Enforcement Cyber Center (LECC) was established to provide a resource to combat cybercrime. This report summarizes the LECC's activities and provides recommendations.

    Jan 15, 2018

  • Report

    Report

    Estimating the Global Cost of Cyber Risk: Methodology and Examples

    This report shares a transparent and adaptable methodology for estimating present and future global costs of cyber risk. The report has a companion Excel-based modeling and simulation platform that allows users to alter assumptions.

    Jan 15, 2018

  • Government agents tracking cybercrime

    Commentary

    How the Pentagon Should Deter Cyber Attacks

    Foreign hackers are not afraid to launch attacks on the United States in cyberspace that they would not dare risk in a real theater of war. As cyber aggression gets worse and more brazen, the U.S. must figure out how to deter foreign actors in cyberspace as effectively as it does in nuclear and conventional warfare.

    Jan 10, 2018

  • Topic Synonyms:
  • CIP