Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Sign that says Fort Bragg, Home of the Airborne and Special Operations Forces, photo by U.S. Army

    Report

    How to Protect Army Installations from Emerging Threats

    Nov 10, 2020

    Emerging technologies such as drones, 5G communications, smart city systems, and the use of social media disinformation by adversaries all pose potential threats to U.S. Army bases. A new framework can help assess possible solutions and the resources required to defend against these threats.

  • Cyber warfare operators monitor cyber attacks at Warfield Air National Guard Base, Middle River, MD, December 2, 2017, photo by J.M. Eddins Jr./U.S. Air Force

    Commentary

    How the Military Might Expand Its Cyber Skills

    Apr 22, 2021

    The U.S. military will need to improve its software fluency if it wants to be dominant on the battlefields of the future. Ensuring that future leaders in the military develop cyber skills and the ability to interface with technical experts may be increasingly important.

Explore Critical Infrastructure Protection

  • Red world map with areas circled, illustration by traffic_analyzer/Getty Images

    Report

    Competition and Restraint in Cyberspace

    Recent years have seen a mounting concern in the United States over foreign efforts to harm election security or legitimacy through cyber means, an increase in cyber espionage, and attacks of growing sophistication. How could international norms help constrain such destabilizing behavior in cyberspace?

    Mar 4, 2022

  • An aerial view of Lake Hodges hydroelectric dam in Southern California. Photo by AutumnSkyPhotography / Getty Images

    Report

    Equity Metrics for Climate Adaptation in the Electricity Sector

    Social equity has become a key concern among public agencies. The authors developed an illustrative set of context-specific equity metrics that Southern California Edison could build on and incorporate into its ongoing work toward climate adaptation.

    Feb 17, 2022

  • Blog

    RAND Commentary Highlights of 2021

    Vaccine rollouts, an attack on the U.S. Capitol, massive ransomware attacks, the withdrawal from Afghanistan, record numbers of job openings and people quitting, and more. RAND researchers weighed in on all these topics and more.

    Dec 21, 2021

  • Tech. Sgt. Rosa Valdes and Staff Sgt. Rebecca Toland, non-destructive inspection technicians from the 140th Maintenance Squadron, perform an inspection of the 446 bulkhead on a block-30 F-16 Fighting Falcon aircraft. The 446 bulkhead is aft fuselage structure of the F-16 aircraft that supports the tail structure and recent tests have indicated an increased amount of stress cracks in this area, photo by Senior Master Sgt. John Rohrer/U.S. Air National Guard

    Report

    Wing-Level Mission Assurance for a Cyber-Contested Environment

    The authors offer ways to help wings assure their missions despite cyber attacks, focusing on how wings can maintain situational awareness, defend their systems, and respond to and recover from attacks to survive and operate when under cyber attack.

    Dec 9, 2021

  • A woman with a smartphone is seen in front of social media logos, May 25, 2021, photo by Dado Ruvic/Reuters

    Report

    Understanding the Online Extremist Ecosystem

    By the early 2010s, it was clear that the internet provided white supremacists and other extremists a tool to operationalize their hateful ideas and cause real-world harms. How can the average user understand their risk of exposure to extremist content and make informed decisions about the platforms they use?

    Dec 2, 2021

  • Brochure

    Brochure

    Cybersecurity

    This brochure describes RAND Corporation research and analysis in this area, with examples from such diverse areas as organizational planning and implementation and cybersecurity workforce recruitment, retention, and management.

    Nov 30, 2021

  • Brochure

    Brochure

    Immigration Policy and Border Security

    A collection of RAND's interdisciplinary work on immigration and on managing the U.S. border.

    Nov 30, 2021

  • An eighteen-wheeler entering one of the main shipping container corridors at the Port of Houston in Houston, Texas, October 12th, 2021, photo by Reginald Mathalone/NurPhoto/Reuters

    Commentary

    Supply Chain Disruptions: The Risks and Consequences

    With interdependence comes risk, and in the case of supply chains, these risks often are not fully appreciated. A systematic effort, cutting across agencies and public and private sectors, could be one way to ensure that vulnerabilities are understood and mitigated.

    Nov 15, 2021

  • The Baltic Way demonstration on the Riga-Bauska highway, near Kekava, Latvia, August 23, 1989, photo by Uldis Pinka/CC-BY-SA

    Report

    Civilian Resilience in the Baltic States

    Estonia, Latvia, and Lithuania have a history of resistance to foreign occupation. If the countries were occupied today, civilians could play a powerful role in their defense. They could impose costs on the occupier, deny consolidation, reduce capacity for repression, secure allied support, and expand popular support.

    Nov 1, 2021

  • Close view of a quantum computer, photo by Bartek Wróblewski/Adobe Stock

    Report

    Commercial and Military Applications of Quantum Technology

    There are three main categories of quantum technology: quantum sensing, quantum communication, and quantum computing. How—and when—might these technologies affect national security? And which countries lead in developing them?

    Oct 28, 2021

  • Journal Article

    Journal Article

    Disaster Risk Creation and Cascading Disasters Within Large Technological Systems: COVID-19 and the 2021 Texas Blackouts

    Here we describe the 2021 Texas blackouts during the COVID-19 pandemic through the lens of disaster risk creation and cascading disaster, showing how risk emerges and propagates across large technological systems.

    Oct 15, 2021

  • An isometric graphic illustration the supply chain for Internet of Things products.

    Multimedia

    Unraveling the Gordian Knot: Considering Supply Chain Resiliency

    An overview of testimony by Caolionn O'Connell presented before a House Energy and Commerce Subcommittee on Consumer Protection and Commerce on October 14, 2021.

    Oct 14, 2021

  • Brochure

    Brochure

    Select RAND Research on the Information Environment: 2014-2020

    This volume is an important resource for anyone who is interested in gaining an informed understanding of operations in the information environment.

    Oct 7, 2021

  • U.S. Air Force Senior Airman Rose Li, right, hands a notebook to Airman 1st Class Eric Gardella, both 86th Communications Squadron wing cyber readiness technicians, while monitoring malicious network activity during exercise Tacet Venari at Ramstein Air Base, Germany, July 2, 2020, photo by Staff Sgt. Devin Boyer/U.S. Air Force

    Report

    Improving U.S. Air Force Training and Development in the Cyber Field

    The U.S. Air Force has been looking for ways to revamp the training of its offensive and defensive cyberwarfare workforce to develop the best fighting force possible. Is the training and development process that exists now working well for the cyber workforce? Is there a need for improvement?

    Sep 29, 2021

  • Staff Sgt. Alex Garviria, 721st Communication Squadron senior systems controller, and 2nd Lt. Rachel James, 721st CS crew commander, work in the Global Strategic Warning and Space Surveillance System Center at Cheyenne Mountain Air Force Station, Colo., Sept. 2, 2014, photo by Airman 1st Class Krystal Ardrey/U.S. Air Force

    Report

    Attracting and Retaining Enlisted and Civilian Personnel to Build the Best Cyber Workforce

    In addition to revamping the training of its offensive and defensive cyber operators, the U.S. Air Force has also sought to better understand some of the drivers of attraction to and retention in the cyber field. What could the Air Force do to attract and retain the best personnel?

    Sep 29, 2021

  • Two men looking at a mobile phone, photo by Muhammad Faiz Zulkeflee/Unsplash

    Journal Article

    Written Evidence Submitted by RAND Europe: TFP0036 Tech and the Future of UK Foreign Policy

    This document is RAND Europe's submission to the UK Parliament's call for evidence on how the Foreign, Commonwealth and Development Office could support the UK's response to the opportunities and challenges presented by new and emerging technologies.

    Sep 21, 2021

  • Research Brief

    Research Brief

    The Growing Exposure of Air Force Installations to Natural Disasters

    Some Department of the Air Force installations face high levels of exposure to flooding, wildfires, or high winds. Twenty installations have areas with high or very high wildfire potential.

    Sep 16, 2021

  • A group of people displayed over a map showing digital connections, image by metamorworks/Getty Images

    Commentary

    The Implications for Human Rights in the Digital Age

    As society relies more and more on digital technologies, there are growing implications for human rights and individuals' fundamental freedoms—both positive and negative.

    Sep 3, 2021

  • Tool

    Tool

    The Information Warfighter Exercise Wargame: Rulebook

    This document presents the full ruleset for the Information Warfighter Exercise Wargame, which is used by the Marine Corps to provide training for aspects of operations in the information environment.

    Aug 24, 2021

  • Blog

    Defunding Prisons, Preventing Cyberattacks, Promoting COVID-19 Vaccinations: RAND Weekly Recap

    This weekly recap focuses on defunding prisons, how to deter ransomware attacks, overcoming barriers to COVID-19 vaccination, and more.

    Aug 13, 2021

  • Topic Synonyms:
  • CIP