Cyber Warfare

Featured

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. RAND research provides recommendations to military and civilian decisionmakers on methods of defending against the damaging effects of cyber warfare on a nation's digital infrastructure.

  • World map, photo by nadla/Getty Images

    Commentary

    Why It's So Hard to Stop a Cyberattack — and Even Harder to Fight Back

    Mar 30, 2017

    Cyber weapons attack the underlying network or computer systems. The possibility of unexpected effects in the cyber world is therefore greater than in conventional warfare. Not knowing if the effects were intentional complicates the response.

  • Composite image of binary code on a sunset over water by Eileen Delson La Russo/RAND, adapted from images by Agil_Leonardo, Matejmo, and Byakkaya/Getty Images

    Report

    The Life and Times of Zero-Day Software Vulnerabilities

    Mar 9, 2017

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

Explore Cyber Warfare

  • Journal Article

    Security, at What Cost?

    Much of the current debate concerning civil liberties and security is adversarial, and little robust research data informs these arguments.This paper outlines the results of a study that attempts to objectively understand the real privacy, liberty and security trade-offs made by individuals, so that policymakers can be better informed about the preferences of individuals with regard to these important issues.

    Jan 1, 2010

  • News Release

    U.S. Must Focus on Protecting Critical Computer Networks from Cyber Attack

    Because it will be difficult to prevent cyber attacks on critical civilian and military computer networks by threatening to punish attackers, the United States must focus its efforts on defending these networks from cyber attack.

    Oct 8, 2009

  • computer programming code

    Report

    Cyberdeterrence and Cyberwar

    Because it will be difficult to prevent cyber attacks on critical civilian and military computer networks by threatening to punish attackers, the United States must focus its efforts on defending these networks from cyber attack.

    Sep 10, 2009

  • Commentary

    The Cracks in Data Privacy

    In the future, the EU will inevitably have to adjust its system of rules to cope with the evolving uses of personal data, globalization and international data flows, write Neil Robinson and Lorenzo Valeri.

    May 19, 2009

  • News Release

    Computer-Based Crime to Be Focus of Silicon Valley Forum

    Security experts from the technology industry, law enforcement and academia will outline what is needed to better measure and understand the effect of computer-based crime in the United States during a public forum Sept. 25 in Silicon Valley.

    Sep 13, 2007

  • Commercial Book

    Conquest in Cyberspace: National Security and Information Warfare

    Explores the potential for and limitations to information warfare, including its use in weapons systems and in command-and-control operations as well as in the generation of ''noise'' and how far ''friendly conquest'' in cyberspace extends.

    May 12, 2007

  • News Release

    RAND Launches National Computer Security Survey for Departments of Justice and Homeland Security

    On behalf of the U.S. Departments of Justice and Homeland Security, the RAND Corporation is fielding the first national survey to measure the impact of cybercrime on American businesses.

    May 2, 2006

  • Cyber terrorist

    Report

    Networks and Netwars

    The concepts of cyberwar and netwar encompass a new spectrum of conflict emerging in the wake of the information revolution. To confront this type of conflict, it is crucial for governments, military, and law enforcement to begin networking themselves.

    Jan 1, 2001

  • Report

    The Zapatista "Social Netwar" in Mexico

    The Zapatista movement in Mexico is a seminal case of a new mode of conflict -- netwar -- in which the protagonists depend on using network forms of organization, doctrine, strategy, and technology.

    Jan 1, 1998

  • Report

    Security in Cyberspace: Challenges for Society: Proceedings of an International Conference

    Topics covered include the magnitude of the cyberspace security threat and the threat's consequences; impediments to improved security in cyberspace and what must be done to remove them; ...

    Jan 1, 1996

  • Report

    The Advent Of Netwar

    This report examines how netwar, due to the evolution of societies according to a framework presented by the authors, may be the dominant mode of societal conflict in the 21st century.

    Jan 1, 1996

  • Content

    Lillian Ablon

    Information Scientist; Professor, Pardee RAND Graduate School
    Education M.S. in mathematics, Johns Hopkins University; B.A. in mathematics, University of California, Berkeley

  • Content

    Brien Alkire

    Senior Researcher; Professor, Pardee RAND Graduate School
    Education Ph.D. in electrical engineering, University of California, Los Angeles

  • Content

    Sina Beaghley

    Senior International/Defense Policy Researcher
    Education M.A. in international affairs/international security, George Washington University; B.A. in political science/media communications, University of San Diego

  • Content

    Elizabeth Bodine-Baron

    Engineer; Director, RAND Center for Applied Network Analysis and System Science
    Education Ph.D., M.S. in electrical engineering, California Institute of Technology; B.S. in electrical engineering, University of Texas at Austin; B.A. in liberal arts, University of Texas at Austin

  • Content

    Benjamin Adam Boudreaux

    Policy Analyst; Professor, Pardee RAND Graduate School
    Education Ph.D. in philosophy, University of California at Berkeley; M.S.F.S. in international security studies, Georgetown University; B.A. in economics, New York University

  • Content

    John S. Davis, II

    Senior Information Scientist; Professor, Pardee RAND Graduate School; Co-Director, Center for Scalable Computing and Analysis
    Education B.S. in electrical engineering, Howard University; Ph.D. in electrical engineering, University of California, Berkeley

  • Content

    Cynthia Dion-Schwarz

    Manager, Cyber and Data Sciences Programs (NSRD); Senior Scientist
    Education Ph.D. in physics, University of Maryland; B.S. in physics, George Mason University

  • Content

    Paul Dreyer

    Mathematician; Professor, Pardee RAND Graduate School
    Education Ph.D. in mathematics, Rutgers University; B.S. in mathematics and history, Duke University

  • Content

    Richard Flint

    Research Assistant
    Education M.Sci. in physics, Imperial College London; MA in terrorism, security and society, Kings College London