Cyber Warfare

Featured

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. RAND research provides recommendations to military and civilian decisionmakers on methods of defending against the damaging effects of cyber warfare on a nation's digital infrastructure.

  • Accountability in Cyberspace: The Problem of Attribution

    Multimedia

    How to Achieve Accountability in Cyberspace

    Jan 13, 2019

    Identifying the responsible party behind malicious cyber incidents is necessary for holding bad actors accountable. But there are many challenges that accompany cyber attribution. Creating an independent, global organization that investigates and publicly assigns blame for major hacks could help.

  • Cyber grenade

    Commentary

    Getting Ready to Fight the Next (Cyber) War

    Mar 3, 2018

    Nation-states and their proxies are regularly spying and attacking in cyberspace across national borders. Western societies that are being targeted should do three things: Be less vulnerable, be able to recognize and mitigate the impact of attacks faster, and be prepared to respond in kind to all levels of offense.

Explore Cyber Warfare

  • Journal Article

    Cyberspace Is Not a Warfighting Domain

    Cyberspace has become the new high ground of warfare, the one domain to rule them all and in the ether bind them, which, as this essay will argue, is the wrong way to view cyberspace and what militaries can do by operating within it.

    Jan 1, 2012

  • Journal Article

    Cyber Policy: Institutional Struggle in a Transformed World

    When it comes to cyber security, the world today is not the future that U.S. policy promised when cyber security first appeared on the national agenda well over a decade ago.

    Jan 1, 2012

  • An exercise at the Joint Cyber Control Center

    Journal Article

    Toward a U.S. Army Cyber Security Culture

    This article defines and explores the concept of cyber security culture within the context of the U.S. Army.

    Sep 1, 2011

  • Commentary

    Could Bin Laden's Death Prompt a Cyber Attack?

    A truly monumental attack that could cripple key U.S. computer systems — something akin to the Stuxnet worms attack on Iran's nuclear infrastructure, for example — would take many months of planning, significant expertise, and a great deal of money to pull off, writes Isaac Porche.

    May 6, 2011

  • Testimony

    Chinese Use of Cyberwar as an Anti-Access Strategy: Two Scenarios

    Testimony presented before the U.S. China Economic and Security Review Commission on January 27, 2011.

    Jan 27, 2011

  • Commentary

    Stuxnet Is the World's Problem

    The highly sophisticated Stuxnet computer worm suspected of sending Iran's nuclear centrifuges into self-destruction mode forces a difficult debate on whether longstanding firewalls in our country's democracy should be breached for the sake of national security, writes Isaac Porche.

    Dec 9, 2010

  • Report

    RAND Project AIR FORCE Annual Report 2010

    This annual report describes selected RAND Project AIR FORCE research during 2010 in the areas of strategy and doctrine; force modernization and employment; manpower, personnel, and training; and resource management.

    Nov 5, 2010

  • Report

    Air Force Cyber Command (Provisional) Decision Support

    This monograph addresses objectives, missions, tasks, and capabilities for the Air Force's new organization to address cyberspace issues (currently 24th Air Force), applying ''to fly and fight'' to cyberspace.

    Feb 24, 2010

  • Report

    Human Capital Management for the USAF Cyber Force

    Identifies and analyzes the human capital management issues associated with the creation of a formal organization dedicated to cyberspace capabilities within the U.S. Air Force.

    Feb 22, 2010

  • Journal Article

    Security, at What Cost?

    Much of the current debate concerning civil liberties and security is adversarial, and little robust research data informs these arguments.This paper outlines the results of a study that attempts to objectively understand the real privacy, liberty and security trade-offs made by individuals, so that policymakers can be better informed about the preferences of individuals with regard to these important issues.

    Dec 31, 2009

  • News Release

    U.S. Must Focus on Protecting Critical Computer Networks from Cyber Attack

    Because it will be difficult to prevent cyber attacks on critical civilian and military computer networks by threatening to punish attackers, the United States must focus its efforts on defending these networks from cyber attack.

    Oct 8, 2009

  • computer programming code

    Report

    Cyberdeterrence and Cyberwar

    Because it will be difficult to prevent cyber attacks on critical civilian and military computer networks by threatening to punish attackers, the United States must focus its efforts on defending these networks from cyber attack.

    Sep 10, 2009

  • Computer password screen

    Commentary

    The Cracks in Data Privacy

    In the future, the EU will inevitably have to adjust its system of rules to cope with the evolving uses of personal data, globalization and international data flows, write Neil Robinson and Lorenzo Valeri.

    May 19, 2009

  • News Release

    Computer-Based Crime to Be Focus of Silicon Valley Forum

    Security experts from the technology industry, law enforcement and academia will outline what is needed to better measure and understand the effect of computer-based crime in the United States during a public forum Sept. 25 in Silicon Valley.

    Sep 13, 2007

  • Commercial Book

    Conquest in Cyberspace: National Security and Information Warfare

    Explores the potential for and limitations to information warfare, including its use in weapons systems and in command-and-control operations as well as in the generation of ''noise'' and how far ''friendly conquest'' in cyberspace extends.

    May 12, 2007

  • News Release

    RAND Launches National Computer Security Survey for Departments of Justice and Homeland Security

    On behalf of the U.S. Departments of Justice and Homeland Security, the RAND Corporation is fielding the first national survey to measure the impact of cybercrime on American businesses.

    May 2, 2006

  • Journal Article

    Canada Aims to Close the USA's Electron Backdoor

    The threat of crossborder cyberattacks into the USA is focusing attention on the electronic security of its northern neighbour.

    Dec 31, 2001

  • Cyber terrorist

    Report

    Networks and Netwars

    The concepts of cyberwar and netwar encompass a new spectrum of conflict emerging in the wake of the information revolution. To confront this type of conflict, it is crucial for governments, military, and law enforcement to begin networking themselves.

    Jan 1, 2001

  • Report

    The Zapatista "Social Netwar" in Mexico

    The Zapatista movement in Mexico is a seminal case of a new mode of conflict -- netwar -- in which the protagonists depend on using network forms of organization, doctrine, strategy, and technology.

    Jan 1, 1998

  • Report

    The Advent Of Netwar

    This report examines how netwar, due to the evolution of societies according to a framework presented by the authors, may be the dominant mode of societal conflict in the 21st century.

    Jan 1, 1996