Cyber Warfare

Featured

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. RAND research provides recommendations to military and civilian decisionmakers on methods of defending against the damaging effects of cyber warfare on a nation's digital infrastructure.

  • World map, photo by nadla/Getty Images

    Commentary

    Why It's So Hard to Stop a Cyberattack — and Even Harder to Fight Back

    Mar 30, 2017

    Cyber weapons attack the underlying network or computer systems. The possibility of unexpected effects in the cyber world is therefore greater than in conventional warfare. Not knowing if the effects were intentional complicates the response.

  • Composite image of binary code on a sunset over water by Eileen Delson La Russo/RAND, adapted from images by Agil_Leonardo, Matejmo, and Byakkaya/Getty Images

    Report

    The Life and Times of Zero-Day Software Vulnerabilities

    Mar 9, 2017

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

Explore Cyber Warfare

  • Content

    Bilyana Lilly

    Assistant Policy Researcher; Ph.D. Candidate, Pardee RAND Graduate School
    Education M.Sc. in Russian and East European studies, University of Oxford; M.A. in international affairs, Graduate Institute of International and Development Studies (IHEID) Switzerland; B.A. in international politics and history, Jacobs University, Germany

  • Content

    Andrew J. Lohn

    Associate Engineer
    Education Ph.D. in electrical engineering, University of California Santa Cruz; B.Eng. in engineering physics, McMaster University

  • Content

    King Mallory

    Senior Researcher
    Education BA in Russian Language & Literature, Middlebury College

  • Content

    David Manheim

    Assistant Policy Researcher; Ph.D. Candidate, Pardee RAND Graduate School
    Education B.S. in mathematics, Lander College for Men

  • Content

    Lauren A. Mayer

    Policy Researcher
    Education Ph.D. in engineering and public policy, Carnegie Mellon University; M.Sc. in environmental sciences and engineering, University of North Carolina at Chapel Hill; B.Sc. in mathematics; environmental policy, American University

  • Content

    Bruce H. McClintock

    Adjunct Policy Analyst
    Education M.S. in aeronautical engineering, University of Florida; M.S. in airpower art and science, School of Advanced Airpower Studies; B.S. in astronautical engineering, United States Air Force Academy

  • Content

    Igor Mikolic-Torreira

    Senior Fellow
    Education Ph.D. in mathematics, California Institute of Technology; B.A. in mathematics, Sacred Heart University

  • Content

    Caolionn O'Connell

    Senior Physical Scientist
    Education B.A. in physics, Harvard University; Ph.D. in physics, Stanford University

  • Content

    Cordaye Ogletree

    Policy Analyst
    Education M.S. in public policy and management, Carnegie Mellon University

  • Content

    Isaac R. Porche III

    Director, Acquisition and Development Program, Homeland Security Operational Analysis Center; Senior Engineer
    Education Ph.D. in electrical engineering and computer science, University of Michigan; M.S. in electrical engineering and computer science, University of California, Berkeley; B.S. in electrical engineering, Southern University

  • Content

    Nathan Ryan

    Associate Analyst
    Education M.A. in advanced national security policy, Australian National University; B.A.S. in arts and sciences, University of Sydney

  • Content

    Lara Schmidt

    Director, Strategy, Policy, and Operations Program, Homeland Security Operational Analysis Center (HSOAC); Senior Statistician
    Education Ph.D. in statistics, American University; M.S. in mathematics, West Virginia University; B.S. in mathematics, Shepherd College

  • Content

    Erik Silfversten

    Analyst
    Education M.Sci. in international relations and global issues, University of Nottingham

  • Content

    Sarah Soliman

    Technical Analyst
    Education M.Phil. in technology policy, University of Cambridge; B.S. in computer engineering, West Virginia University; B.S. in biometric systems, West Virginia University

  • Content

    Danielle C. Tarraf

    Information Scientist
    Education Ph.D. in mechanical engineering (control theory), MIT; S.M. in mechanical engineering, MIT; B.E. in mechanical engineering, American University of Beirut

  • Content

    Bonnie Triezenberg

    Assistant Policy Researcher; Ph.D. Candidate, Pardee RAND Graduate School
    Education M.S. in systems science, University of California-Los Angeles; B.S. in aerospace engineering, University of Michigan

  • Content

    Zev Winkelman

    Director, Center for Corporate Ethics and Governance; Information Scientist; Core Faculty Member, Pardee RAND Graduate School
    Education Ph.D. in public policy, University of California, Berkeley; M.S. in forensic computing, City University of New York; B.S.E. in computer engineering, University of Michigan; B.G.S. in general studies, University of Michigan

  • Periodical

    RAND Review: Summer 2013

    This RAND Review focuses on the harms and costs of sexual assault in the military and the barriers that still exist for servicemembers who report the crimes and seek psychological health care. Other stories address the prospects for minimalist international interventions, cyber threats and nations' responses to them, and the rising costs of dementia in the U.S.

  • Periodical

    Message from the Editor: Scourges

    The RAND Review Editor-in-Chief summarizes the Summer 2013 issue.

  • Periodical

    Old Madness, New Methods

    C lassic motivations for terrorism will endure in the information age. What will change will be the methods used by terrorists who avail themselves of newly expanded opportunities to disrupt and destroy their enemies, as revealed in "Networks, Netwar, and Information-Age Terrorism," one chapter in a forthcoming ...