Cyber Warfare

Featured

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. RAND research provides recommendations to military and civilian decisionmakers on methods of defending against the damaging effects of cyber warfare on a nation's digital infrastructure.

  • Concept of artificial intelligence winning at chess, photo by JohnDWilliams/Getty Images

    Report

    The Emerging Risk of Virtual Societal Warfare

    Oct 9, 2019

    Living in an information society opens unprecedented opportunities for hostile rivals to cause disruption, delay, inefficiency, and harm. Social manipulation techniques are evolving beyond disinformation and cyberattacks on infrastructure sites. How can democracies protect themselves?

  • The entrance to Lakhta-2 business center, which reportedly houses news organizations and internet research companies known for trolling on social media, in St. Petersburg, Russia, February 20, 2018, photo by Anton Vaganov/Reuters

    Commentary

    What Translation Troubles Can Tell Us About Russian Information Warfare

    Oct 4, 2019

    Russian information warfare has attracted significant international attention since 2014. But little research has focused on its apparent shortcomings. Most notable are the confusing translation mistakes that undermine Moscow's attempts at covert influence efforts.

Explore Cyber Warfare

  • computer image with lock

    Project

    Cybersecurity: Examining Challenges for the Future

    Cyberspace is increasingly important for economic growth, openness, and democracy, but poor cybersecurity can make governments, businesses, and individuals open to cyber attack and cyber crime. RAND Europe conducts a range of research on the topic to advise policymakers.

    Feb 29, 2012

  • Journal Article

    Journal Article

    Cyberspace Is Not a Warfighting Domain

    Cyberspace has become the new high ground of warfare, the one domain to rule them all and in the ether bind them, which, as this essay will argue, is the wrong way to view cyberspace and what militaries can do by operating within it.

    Jan 1, 2012

  • Journal Article

    Journal Article

    Cyber Policy: Institutional Struggle in a Transformed World

    When it comes to cyber security, the world today is not the future that U.S. policy promised when cyber security first appeared on the national agenda well over a decade ago.

    Jan 1, 2012

  • An exercise at the Joint Cyber Control Center

    Journal Article

    Toward a U.S. Army Cyber Security Culture

    This article defines and explores the concept of cyber security culture within the context of the U.S. Army.

    Sep 1, 2011

  • Commentary

    Commentary

    Could Bin Laden's Death Prompt a Cyber Attack?

    A truly monumental attack that could cripple key U.S. computer systems — something akin to the Stuxnet worms attack on Iran's nuclear infrastructure, for example — would take many months of planning, significant expertise, and a great deal of money to pull off, writes Isaac Porche.

    May 6, 2011

  • Testimony

    Testimony

    Chinese Use of Cyberwar as an Anti-Access Strategy: Two Scenarios

    Testimony presented before the U.S. China Economic and Security Review Commission on January 27, 2011.

    Jan 27, 2011

  • Commentary

    Commentary

    Stuxnet Is the World's Problem

    The highly sophisticated Stuxnet computer worm suspected of sending Iran's nuclear centrifuges into self-destruction mode forces a difficult debate on whether longstanding firewalls in our country's democracy should be breached for the sake of national security, writes Isaac Porche.

    Dec 9, 2010

  • Report

    Report

    RAND Project AIR FORCE Annual Report 2010

    This annual report describes selected RAND Project AIR FORCE research during 2010 in the areas of strategy and doctrine; force modernization and employment; manpower, personnel, and training; and resource management.

    Nov 5, 2010

  • Report

    Report

    Air Force Cyber Command (Provisional) Decision Support

    This monograph addresses objectives, missions, tasks, and capabilities for the Air Force's new organization to address cyberspace issues (currently 24th Air Force), applying ''to fly and fight'' to cyberspace.

    Feb 24, 2010

  • Report

    Report

    Human Capital Management for the USAF Cyber Force

    Identifies and analyzes the human capital management issues associated with the creation of a formal organization dedicated to cyberspace capabilities within the U.S. Air Force.

    Feb 22, 2010

  • Journal Article

    Journal Article

    Security, at What Cost?

    Much of the current debate concerning civil liberties and security is adversarial, and little robust research data informs these arguments.This paper outlines the results of a study that attempts to objectively understand the real privacy, liberty and security trade-offs made by individuals, so that policymakers can be better informed about the preferences of individuals with regard to these important issues.

    Dec 31, 2009

  • News Release

    News Release

    U.S. Must Focus on Protecting Critical Computer Networks from Cyber Attack

    Because it will be difficult to prevent cyber attacks on critical civilian and military computer networks by threatening to punish attackers, the United States must focus its efforts on defending these networks from cyber attack.

    Oct 8, 2009

  • computer programming code

    Report

    Cyberdeterrence and Cyberwar

    Because it will be difficult to prevent cyber attacks on critical civilian and military computer networks by threatening to punish attackers, the United States must focus its efforts on defending these networks from cyber attack.

    Sep 10, 2009

  • Computer password screen

    Commentary

    The Cracks in Data Privacy

    In the future, the EU will inevitably have to adjust its system of rules to cope with the evolving uses of personal data, globalization and international data flows, write Neil Robinson and Lorenzo Valeri.

    May 19, 2009

  • News Release

    News Release

    Computer-Based Crime to Be Focus of Silicon Valley Forum

    Security experts from the technology industry, law enforcement and academia will outline what is needed to better measure and understand the effect of computer-based crime in the United States during a public forum Sept. 25 in Silicon Valley.

    Sep 13, 2007

  • Commercial Book

    Commercial Book

    Conquest in Cyberspace: National Security and Information Warfare

    Explores the potential for and limitations to information warfare, including its use in weapons systems and in command-and-control operations as well as in the generation of ''noise'' and how far ''friendly conquest'' in cyberspace extends.

    May 12, 2007

  • News Release

    News Release

    RAND Launches National Computer Security Survey for Departments of Justice and Homeland Security

    On behalf of the U.S. Departments of Justice and Homeland Security, the RAND Corporation is fielding the first national survey to measure the impact of cybercrime on American businesses.

    May 2, 2006

  • Journal Article

    Journal Article

    Canada Aims to Close the USA's Electron Backdoor

    The threat of crossborder cyberattacks into the USA is focusing attention on the electronic security of its northern neighbour.

    Dec 31, 2001

  • Cyber terrorist

    Report

    Networks and Netwars

    The concepts of cyberwar and netwar encompass a new spectrum of conflict emerging in the wake of the information revolution. To confront this type of conflict, it is crucial for governments, military, and law enforcement to begin networking themselves.

    Jan 1, 2001

  • Report

    Report

    The Zapatista "Social Netwar" in Mexico

    The Zapatista movement in Mexico is a seminal case of a new mode of conflict -- netwar -- in which the protagonists depend on using network forms of organization, doctrine, strategy, and technology.

    Jan 1, 1998