Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Sign that says Fort Bragg, Home of the Airborne and Special Operations Forces, photo by U.S. Army

    Report

    How to Protect Army Installations from Emerging Threats

    Nov 10, 2020

    Emerging technologies such as drones, 5G communications, smart city systems, and the use of social media disinformation by adversaries all pose potential threats to U.S. Army bases. A new framework can help assess possible solutions and the resources required to defend against these threats.

  • Cyber warfare operators monitor cyber attacks at Warfield Air National Guard Base, Middle River, MD, December 2, 2017, photo by J.M. Eddins Jr./U.S. Air Force

    Commentary

    How the Military Might Expand Its Cyber Skills

    Apr 22, 2021

    The U.S. military will need to improve its software fluency if it wants to be dominant on the battlefields of the future. Ensuring that future leaders in the military develop cyber skills and the ability to interface with technical experts may be increasingly important.

Explore Critical Infrastructure Protection

  • A self-driving car being developed by nuTonomy, a company creating software for autonomous vehicles, is guided down a street near their offices in Boston, Massachusetts, June 2, 2017

    Report

    Rethinking Insurance and Liability in the Transformative Age of Autonomous Vehicles

    What are the challenges and opportunities for the automobile insurance industry as autonomous vehicle technology becomes widely deployed? This workshop brought together industry stakeholders, regulators, and consumer representatives to focus on the implications of AV technology for insurance and liability regimes.

    Jun 8, 2018

  • Migrants from Central America enter the United States Border and Customs facility, where they are expected to apply for asylum, in Tijuana, Mexico, May 4, 2018

    Commentary

    New Border Policy Could Have Unintended Consequences

    The Trump administration has announced significant policy changes to deter migrants from coming to America. These changes will likely have a significant impact on border operations and the federal court system. But it's less clear whether they will have the intended impact of reducing illegal immigration.

    May 21, 2018

  • Report

    Report

    Managing International Borders: Balancing Security with the Licit Flow of People and Goods

    This Perspective builds on global best practices and lessons learned from other established border management solutions and proposes opportunities to strengthen security while improving the flow of travelers and goods.

    May 9, 2018

  • Malware or virus inside microchip on electronic circuit

    Commentary

    What Do Meltdown, Spectre, and RyzenFall Mean for the Future of Cybersecurity?

    Unlike most previous cyber threats, a new wave of vulnerabilities attack a computer's hardware, rather than its software. What does this mean for cybersecurity as a whole?

    May 3, 2018

  • Abstract motion speed light with night city background

    Report

    Speed and Security: Promises, Perils, and Paradoxes of Accelerating Everything

    As new technologies and social dynamics shift society into hyperdrive, speed could catalyze security risks in areas such as transportation, communication, and health. How can policymakers devise strategies to adapt?

    May 1, 2018

  • Periodical

    Periodical

    RAND Review: May-June 2018

    This issue features research on preventing child abuse and neglect and improving outcomes for children in the U.S. child-welfare system; a look back on RAND's 70 years of innovation; and an exploration of the human side of artificial intelligence.

    Apr 30, 2018

  • desks, viewed from above

    Report

    Can the Intelligence Community Work from Home?

    Remote-work programs for U.S. intelligence agencies have several advantages, including flexibility during a pandemic or other crisis. What policy, legal, technology, security, financial, and cultural issues need to be considered when making this shift?

    Apr 23, 2018

  • Server room data center with icon representing cloud storage

    Report

    Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

    Researchers discuss the challenge of accessing data in remote data centers, summarize the discussion of an expert panel, and provide a list of needs identified and prioritized by the panel to inform concerned communities and stakeholders.

    Apr 23, 2018

  • Dad works from home, holding baby on his lap

    Report

    How Can Government Agencies Benefit When Employees Engage in Telework?

    A review of telework practices in government agencies finds similarities across successful telework programs regarding compliance with federal and organizational policies, technological accommodations, return on investment, performance management tools, and training.

    Apr 23, 2018

  • An officer with Schertz Police Department holds a FedEx truck from entering the scene of a blast at a FedEx facility in Schertz, Texas, U.S., March 20, 2018

    Commentary

    Austin Bombings Highlight a Potential Vulnerability in the Mail Delivery System

    USPS is better than private couriers at identifying and detecting suspicious packages. Given that they are increasingly handling "last mile" delivery, how can private mail delivery offices better detect and safely handle suspicious mail?

    Apr 17, 2018

  • Passengers walks past sign prior to immigration control

    Commentary

    European Security Cooperation Should Remain Comprehensive—Especially After Brexit

    During Brexit negotiations, it could be tempting for the UK and EU to use certain security structures as 'bargaining chips'. However, it is in no one's interests for both sides to adopt a 'zero-sum' approach to security discussions.

    Mar 28, 2018

  • Padlock generated from a particle vortex

    Multimedia

    Data Thieves: The Motivations of Cyber Threat Actors and Their Use and Monetization of Stolen Data

    An overview of testimony by Lillian Ablon presented before the House Financial Services Committee, Subcommittee on Terrorism and Illicit Finance.

    Mar 15, 2018

  • Graphic of digital integrated network technology

    Testimony

    A Close Look at Data Thieves

    What do cyberattackers do with the data they steal? And how do they monetize it? Grouping hackers by their goals, motivations, and capabilities can shed light on these questions.

    Mar 15, 2018

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • Opening Ceremony of the 2018 Winter Olympics in Pyeongchang, South Korea, February 9, 2018

    Commentary

    Why the 2018 Winter Olympics Are the Perfect Storm for Cyberattacks

    The Olympic Games could invite the most severe cyber threats to a major sporting event in recent years. The location of the Games and increased connectivity, both among the public and infrastructure, make them a prime target for cyberattacks.

    Feb 12, 2018

  • Autonomous vehicles on a highway

    Commentary

    Ensuring Cybersecurity Is Vital for a Driverless Future

    High-profile accidents involving autonomous vehicles (AVs) have led to recent discussions about the physical safety of people. However, it could be argued that consumers and manufacturers should be equally, if not more, concerned about the potential cybersecurity vulnerabilities in AVs.

    Feb 12, 2018

  • Water tank in M'bwetu Village, Malawai

    Journal Article

    Examining the Food-Energy-Water and Conflict Nexus

    This article provides an in-depth review of the interactions between insecurity and conflict within the component sectors of the FEW nexus.

    Jan 30, 2018

  • People speak through the U.S.-Mexico border wall at Border Field State Park in San Diego, California, November 18, 2017

    Commentary

    Prioritizing Security at the U.S. Border with Mexico

    As debate on border security continues, policymakers would be wise to look beyond the heated rhetoric to clearly identify priorities and make informed decisions about how best to deploy finite resources to get the strongest security for the investment.

    Jan 29, 2018

  • Brochure

    Spotlight on 2017

    RAND Europe's annual review, Spotlight on 2017, features some of the objective research and analysis we do to help policy and decision makers keep pace with an ever-changing world.

    Jan 29, 2018

  • Shiny gold Bitcoin coin with gun on black background

    Commentary

    Bitcoin and the Dark Web: The New Terrorist Threat?

    Bitcoin has become the prominent currency of the dark web, which is often used to buy illegal goods, such as weapons and drugs. Anecdotal evidence suggests terrorists are using cryptocurrency and the dark web, but further investigation is needed.

    Jan 22, 2018

  • Topic Synonyms:
  • CIP