Critical Infrastructure Protection

Featured

Every nation has an obligation to protect essential government, financial, energy, transportation, and other critical infrastructure operations against terrorist activities and natural disasters. RAND addresses homeland security and critical infrastructure needs through objective research that assists national, state, and local agencies in preventing and mitigating terrorist activities, as well as in improving disaster preparedness, response, and recovery.

  • Sign that says Fort Bragg, Home of the Airborne and Special Operations Forces, photo by U.S. Army

    Report

    How to Protect Army Installations from Emerging Threats

    Nov 10, 2020

    Emerging technologies such as drones, 5G communications, smart city systems, and the use of social media disinformation by adversaries all pose potential threats to U.S. Army bases. A new framework can help assess possible solutions and the resources required to defend against these threats.

  • Cyber warfare operators monitor cyber attacks at Warfield Air National Guard Base, Middle River, MD, December 2, 2017, photo by J.M. Eddins Jr./U.S. Air Force

    Commentary

    How the Military Might Expand Its Cyber Skills

    Apr 22, 2021

    The U.S. military will need to improve its software fluency if it wants to be dominant on the battlefields of the future. Ensuring that future leaders in the military develop cyber skills and the ability to interface with technical experts may be increasingly important.

Explore Critical Infrastructure Protection

  • Image by Alyson Youngblood/RAND Corporation

    Blog

    Most Popular RAND Blog Commentary of 2019

    Terrorism. The humanitarian crisis at the border. How to engage friends and foes on the world stage. Here are the top 10 commentaries that readers engaged with most on The RAND Blog in 2019.

    Dec 23, 2019

  • Montage of best RAND videos of 2019, image by Alyson Youngblood/RAND Corporation

    Multimedia

    Best RAND Videos of 2019

    At RAND, we examine complex issues in dozens of policy areas. And when our researchers aren't busy coming up with solutions to some of the world's biggest problems, sometimes they step in front of the camera to highlight their findings. Here are our top videos of 2019.

    Dec 20, 2019

  • Debra Knopman discusses current and historical spending on infrastructure.

    Multimedia

    Built to Last: Planning and Funding Resilient Infrastructure

    Debra Knopman and Sarah Weilant discuss current and historical congressional spending on infrastructure, four key elements for building resilience into transportation projects, and recommendations for policymakers.

    Dec 6, 2019

  • Report

    Report

    Insights into global food system risks and opportunities and their implications for the FSA

    RAND Europe identified global food system risks and opportunities and drew out key implications to 2030 for the UK Food Standards Agency. The study is a test of an approach that the FSA could implement to enable ongoing horizon scanning capabilities.

    Nov 15, 2019

  • U.S. Marines with 1st Tank Battalion, 1st Marine Division participate in a field exercise (FEX) at Marine Corps Air Ground Combat Center Twentynine Palms, California, Oct. 22, 2019, photo by Sgt. Miguel A. Rosales/U.S. Marine Corps

    Commentary

    First, Manage Security Threats to Machine Learning

    Deception is as old as warfare itself. Until now, the targets of deception operations have been humans. But the introduction of machine learning and artificial intelligence opens up a whole new world of opportunities to deceive by targeting machines.

    Nov 4, 2019

  • Blog

    White Supremacist Terrorism, Wildfires, the Dark Web: RAND Weekly Recap

    This weekly recap focuses on violent white supremacy, power outages to prevent wildfires, how to catch criminals on the dark web, and more.

    Nov 1, 2019

  • Cybercrime concept of handcuffs icon on a digital background, photo by blackboard/Adobe Stock

    Report

    What Could Help Law Enforcement Deal with Crime on the Dark Web?

    Crime in traditional online forums often leaves a trail of data that can be followed. But on the dark web, the process of collecting those data and turning them into evidence can be difficult. A panel of law enforcement practitioners and researchers identified ways to address this challenge.

    Oct 29, 2019

  • Illustration of a large gavel crashing down on self-driving cars, illustration by Chris Philpot

    Essay

    Who's Responsible When Your Car Gets Hacked?

    Cars are becoming "fast, heavy artificial intelligences on wheels," a RAND report cautions, and that means they're becoming vulnerable. Potentially billions of dollars ride on the question of who has the legal responsibility to keep hackers from grabbing the wheel or cutting the brakes.

    Oct 23, 2019

  • Digital concept of a brain, photo by Vertigo3d/Getty Images

    Commentary

    Our Future Lies in Making AI Robust and Verifiable

    We are hurtling towards a future in which AI is omnipresent. This AI-enabled future is blinding in its possibilities for prosperity, security, and well-being. Yet, it is also crippling in its fragility. What might it take for it all to come to a screeching halt?

    Oct 22, 2019

  • Person pointing at a public transit map, photo by Rawpixel/Getty Images

    Report

    Incorporating Resilience into Transportation Planning

    A resilient transportation system is one in which critical assets are not exposed to hazards or, if they are, there is sufficient capacity to mitigate the negative effects. How can transportation planners better incorporate resilience into their decisionmaking?

    Oct 16, 2019

  • Journal Article

    National Trends in Food Insecurity and Congregation-Based Food Provision Between 1998 and 2012

    The objective of this study is to investigate the extent to which congregation-based food provision fluctuated with national food insecurity prevalence for the overall population, and for subgroups vulnerable to this condition.

    Oct 15, 2019

  • Report

    Report

    Literature on Personnel Vetting Processes and Procedures: Annotated Selected Bibliography

    To help inform the U.S. government in its efforts to improve the vetting processes for public trust and national security positions and protect its assets and information, the authors assembled a selected bibliography of relevant literature.

    Oct 14, 2019

  • Blog

    Virtual Societal Warfare, Iran, Opioids: RAND Weekly Recap

    This weekly recap focuses on the risk of virtual societal welfare, Iran's domestic debates, federal policy options for supervised consumption sites, and more.

    Oct 11, 2019

  • Concept of artificial intelligence winning at chess, photo by JohnDWilliams/Getty Images

    Report

    The Emerging Risk of Virtual Societal Warfare

    Living in an information society opens unprecedented opportunities for hostile rivals to cause disruption, delay, inefficiency, and harm. Social manipulation techniques are evolving beyond disinformation and cyberattacks on infrastructure sites. How can democracies protect themselves?

    Oct 9, 2019

  • The entrance to Lakhta-2 business center, which reportedly houses news organizations and internet research companies known for trolling on social media, in St. Petersburg, Russia, February 20, 2018, photo by Anton Vaganov/Reuters

    Commentary

    What Translation Troubles Can Tell Us About Russian Information Warfare

    Russian information warfare has attracted significant international attention since 2014. But little research has focused on its apparent shortcomings. Most notable are the confusing translation mistakes that undermine Moscow's attempts at covert influence efforts.

    Oct 4, 2019

  • Blog

    E-Cigarettes, 'Stand Your Ground,' Cyber Coercion: RAND Weekly Recap

    This weekly recap focuses on the planned federal ban on flavored e-cigarettes, “stand your ground” laws, understanding cyber coercion, and more.

    Sep 20, 2019

  • World map in red pixels on a dark background, photo by Lidiia Moor/Getty Images

    Report

    Are States Using Cyber Operations to Coerce Others?

    Cyber operations have become another tool of statecraft. But have any cyber operations sponsored by Russia, China, Iran, or North Korea met the definition of cyber coercion? If so, how? And what should the United States do to respond?

    Sep 17, 2019

  • Report

    Characterization of the Synthetic Opioid Threat Profile to Inform Inspection and Detection Solutions

    The opioid overdose crisis has accelerated in recent years because of the arrival of potent synthetic opioids, such as fentanyl and related substances. Analysis of regional trends can help inform decisions about how and where to deploy law enforcement interventions.

    Sep 9, 2019

  • Blog

    Social Manipulation, Boko Haram, Citizen Scientists: RAND Weekly Recap

    This weekly recap looks at hostile social manipulation, stopping the next Boko Haram, a citizen-science success story, and more.

    Sep 6, 2019

  • News Release

    News Release

    Hostile Social Manipulation by Russia and China a Growing but Poorly Understood Threat

    With the role of information warfare in global strategic competition becoming much more apparent, a new RAND Corporation report delves into better defining and understanding the challenge facing the United States by focusing on the hostile social manipulation activities of the two leading users of such techniques: Russia and China.

    Sep 4, 2019

  • Topic Synonyms:
  • CIP