Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Sign that says Fort Bragg, Home of the Airborne and Special Operations Forces, photo by U.S. Army

    Report

    How to Protect Army Installations from Emerging Threats

    Nov 10, 2020

    Emerging technologies such as drones, 5G communications, smart city systems, and the use of social media disinformation by adversaries all pose potential threats to U.S. Army bases. A new framework can help assess possible solutions and the resources required to defend against these threats.

  • Cyber warfare operators monitor cyber attacks at Warfield Air National Guard Base, Middle River, MD, December 2, 2017, photo by J.M. Eddins Jr./U.S. Air Force

    Commentary

    How the Military Might Expand Its Cyber Skills

    Apr 22, 2021

    The U.S. military will need to improve its software fluency if it wants to be dominant on the battlefields of the future. Ensuring that future leaders in the military develop cyber skills and the ability to interface with technical experts may be increasingly important.

Explore Critical Infrastructure Protection

  • Migrants at the Anti-Illegal Immigration Authority in Tripoli, Libya, September 10, 2017

    Commentary

    Addressing Europe's Migrant Crisis Takes More Than Stopping the Boats from Libya

    Treating migration from Libya as a border security issue has reduced migration across the Mediterranean. But efforts to keep migrants in Libya are fraught with risks, exacerbate a massive human rights problem, and do not address Libya's long-term economic and political stabilization.

    Sep 25, 2017

  • Woman using smartphone and laptop with icon graphic cyber security network of connected devices and personal data security

    Commentary

    How to Help Small Businesses Deal with Cyber Threats

    Small businesses are especially vulnerable to cyber threats. What can be done to provide small businesses the security to continue to prosper, while enhancing America's cybersecurity workforce and making the economy more secure?

    Sep 15, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017

  • Digital devices on a map of Australia

    Report

    Australia's Cyber Security Policy Options

    An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.

    Aug 7, 2017

  • The U.S. Capitol building illuminated at night in Washington, D.C.

    Blog

    RAND's Summer Reading List for Congress

    Hill staffers can make the most of the Congressional recess with this list of must-read research and commentary on the policy issues they will be addressing this fall.

    Aug 4, 2017

  • Girl Scouts compete in the Mission Ocean Challenge during the USS California Science Experience at Naval Surface Warfare Center, November 6, 2010

    Commentary

    Cybersecurity Badge: One Big Step for Girl Scouts, Potentially Giant Leap for Women

    The Girl Scouts will start offering 18 cybersecurity badges next year. In addition to exposing girls to cyber concepts and challenges, this could encourage them to pursue cybersecurity or other STEM careers in which women are underrepresented.

    Aug 3, 2017

  • Journal Article

    Journal Article

    Impact Assessment of Specific Measures Aimed at Increasing Transparency and Engagement in EFSA Risk Assessment Process

    The main objective of the study was to assess the impact of a set of measures identified by EFSA to promote trust and confidence in EFSA's risk assessment process.

    Aug 1, 2017

  • Computer hacker working on laptop late at night in office

    Commentary

    Connect, Buy-Now, Fire: How the Dark Web Allows Criminals to Buy Weapons—Anonymously

    Despite its small size compared to the offline market, the ability of the dark web to anonymously arm individuals of all backgrounds needs to be taken seriously. Its potential impact on international security is significant.

    Jul 25, 2017

  • Russian President Vladimir Putin speaks during a news conference after the G20 summit in Hamburg, Germany, July 8, 2017

    Commentary

    Russian Information Warfare: A Reality That Needs a Response

    For the last three decades, Russia has exploited its growing capabilities in cyberspace to spy on, influence, and punish others. The West will continue to struggle to hold Moscow accountable, in part because international law falls far short of fully defining the rules or resolving conflicts.

    Jul 21, 2017

  • News Release

    News Release

    US Weapons Main Source of Illegal Arms Trade on the Dark Web

    The illegal sales on the dark web of firearms, weapons, explosives, and banned digital guides on homemade products present challenges for law enforcement agencies and national governments. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect.

    Jul 19, 2017

  • A laptop computer, a 9mm handgun, and bullets

    Report

    U.S. Weapons Are the Main Source of Illegal Arms on the Dark Web

    Sixty percent of weapons on sale on the dark web come from the United States. This illicit market for firearms, explosives, and ammunition can anonymously arm criminals, terrorists, and others.

    Jul 19, 2017

  • The Washington Monument on the National Mall in Washington, D.C.

    Commentary

    How to Harden America's Soft Targets

    The U.S. government must choose where to apply limited resources to defend soft targets. But it could expand its information-sharing efforts with other governments and local law enforcement. Broad intelligence sharing and more training could help identify potential attackers before they can execute their plans.

    Jul 5, 2017

  • A man holds a laptop computer as cyber code is projected on him

    Report

    Could Stateless Attribution Promote International Cyber Accountability?

    The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?

    Jun 2, 2017

  • A student in the Army's first Cyber Basic Officer Leader Course uses a field computer to probe for a targeted wireless network signal during a field training exercise at Fort Gordon, Georgia, February 1, 2017

    Commentary

    What Happens After ISIS Goes Underground

    As the Islamic State in Iraq and Syria suffers defeats on the battlefield, it is expanding its cyber presence to continue to encourage attacks abroad. The more the group relies on cyberspace, the more likely it will expose important segments of its organization to detection and disruption.

    May 30, 2017

  • A young man is frustrated by the WannaCry ransomware attack

    Commentary

    WannaCry Virus: A Lesson in Global Unpreparedness

    The WannaCry ransomware attack provides important lessons about how to secure cyber networks. History indicates that other attacks will follow. Preparedness is crucial.

    May 22, 2017

  • Kampala street food vendor Monica Kayagi makes a recipe during the Superfoods Cook-Off in December 2016

    Commentary

    What Street Food Vendors in Uganda Need to Succeed

    Street vendors in Kampala, Uganda, would benefit from infrastructure development, food safety standards, rules of hygiene, and greater focus on healthy products. The city's growing population also would benefit from increased access to nutritious and affordable foods.

    May 16, 2017

  • A screen, showing Russian President Vladimir Putin's annual end-of-year news conference, is on display in Simferopol, Crimea, December 23, 2016.

    Commentary

    Russia in Action, Short of War

    The West needs to work more quickly and coordinate better to offset Russia's capabilities, aggressiveness, and success. Responding to Russia's hostile influence involves predicting Russia's targets, identifying the tools it's likely to use, and playing the long game rather than focusing on near-term events.

    May 9, 2017

  • Ugandan chefs display their creations at the first Superfoods Contest in December 2015

    Commentary

    A New Ugandan Cuisine: Showcasing Superfood Qualities of Millet and Sorghum

    The results of a series of cooking contests in Uganda to promote the use of drought-tolerant, nutritious traditional grains—millet and sorghum—signal that a new food trend may be on the horizon.

    May 9, 2017

  • Russian President Vladimir Putin is reflected in the glasses of a cadet watching Putin on TV at a military school outside Rostov-on-Don, Russia, December 20, 2012

    Testimony

    The Need for Cognitive Security

    The United States needs a strategy to counter information operations conducted by Russia and other adversaries. The rapid evolution of technology complicates this challenge.

    Apr 27, 2017

  • The 24-hour Operations Room inside GCHQ, Cheltenham, UK, November 17, 2015

    Commentary

    Five Eyes at 70: Where to from Here?

    The Five Eyes intelligence alliance of the U.S., Canada, Great Britain, Australia, and New Zealand began in the Cold War to meet the threat posed by the Soviet Union. Today, the nations' intelligence communities must contend with domestic terrorism and cyber threats while remaining ahead of Russia and China.

    Apr 21, 2017

  • Topic Synonyms:
  • CIP