Cyber Warfare

Featured

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. RAND research provides recommendations to military and civilian decisionmakers on methods of defending against the damaging effects of cyber warfare on a nation's digital infrastructure.

Explore Cyber Warfare

  • Binary code and laptops

    Commentary

    A Matter of Degree: Who Can Authorize a Cyberattack?

    Understanding when the United States should engage in cyberwar and who should approve cyberattacks requires understanding that cyberwar has multiple personalities: operational, strategic, and that great gray area in-between, writes Martin Libicki.

    Jan 8, 2013

  • Report

    Report

    Cybercrises Can Be Managed with Multiple Strategies

    The chances are growing that the United States will find itself in a crisis in cyberspace. Such crises can be managed by taking steps to reduce the incentives for other states to step into crisis, by controlling the narrative, understanding the stability parameters of the crises, and trying to manage escalation if conflicts arise from crises.

    Jan 3, 2013

  • Report

    Report

    Rapid Acquisition and Fielding for Information Assurance and Cyber Security in the Navy

    The U.S. Navy requires an agile, adaptable acquisition process that can field new IT capabilities and services quickly. Successful rapid acquisition programs in the Army, Air Force, and Marine Corps offer lessons for the Navy as it develops its own streamlined processes for computer network defense and similar program areas.

    Dec 21, 2012

  • digital globe

    Commentary

    Cyber Operations Can Supplement a War, but They Cannot Be the War

    The U.S. military, with its high-tech systems, must protect itself from cyber threats with much the same careful management that protects it against vulnerabilities associated with, say, explosives. But there can be no choice between boots on the ground and fingers on a keyboard, writes Martin Libicki.

    Dec 19, 2012

  • Multimedia

    Threats: Cyber Warfare

    In this conference call, RAND senior management scientist Martin Libicki discusses cyber threats—including the declaration of cyber war by "hacktivist" group Anonymous against Israel—with RAND media relations director Jeffrey Hiday.

    Dec 6, 2012

  • Admiral Dennis Blair at RAND's Politics Aside event

    Blog

    Admiral Blair: Middle East Most Serious Threat to U.S.

    Admiral Dennis Blair, former National Intelligence director, discusses how the government gathers and uses intelligence on issues including Iran, cyber warfare, and the Arab Spring. Blair spoke with Reuters Editor-at-Large Sir Harold Evans during the RAND's Politics Aside event.

    Nov 21, 2012

  • U.S. Army Computer Crimes Investigative Unit agent

    Journal Article

    An Enemy Without Boundaries

    As Stuxnet and its like have proved, a determined attacker does not require an Internet connection to implant a worm or a virus, and a network's weaknesses can be exposed quite by accident. Cyber defense is difficult, in large part because a cyber attack is not always obvious.

    Oct 1, 2012

  • A hacker at his computer desk

    Commentary

    Setting International Norms on Cyberwar Might Beat a Treaty

    Restricting cyberweapon development could be harmful inasmuch as its core activity is the discovery of vulnerabilities in software—the very activity also required to bulletproof software against attacks from criminal hackers, writes Martin Libicki.

    Jun 11, 2012

  • Congressional Briefing Podcast

    Multimedia

    Information Sharing for Cyber-Security: Evidence from Europe

    In this May 2012 Congressional Briefing, Neil Robinson presented evidence from empirical studies conducted in Europe regarding cyber-security and information exchange, specifically between organizations such as information sharing and analysis centers, computer emergency response teams, and cyber-crime police.

    May 7, 2012

  • Journal Article

    Journal Article

    Cyberspace Is Not a Warfighting Domain

    Cyberspace has become the new high ground of warfare, the one domain to rule them all and in the ether bind them, which, as this essay will argue, is the wrong way to view cyberspace and what militaries can do by operating within it.

    Jan 1, 2012

  • Journal Article

    Journal Article

    Cyber Policy: Institutional Struggle in a Transformed World

    When it comes to cyber security, the world today is not the future that U.S. policy promised when cyber security first appeared on the national agenda well over a decade ago.

    Jan 1, 2012

  • An exercise at the Joint Cyber Control Center

    Journal Article

    Toward a U.S. Army Cyber Security Culture

    This article defines and explores the concept of cyber security culture within the context of the U.S. Army.

    Sep 1, 2011

  • Commentary

    Commentary

    Could Bin Laden's Death Prompt a Cyber Attack?

    A truly monumental attack that could cripple key U.S. computer systems — something akin to the Stuxnet worms attack on Iran's nuclear infrastructure, for example — would take many months of planning, significant expertise, and a great deal of money to pull off, writes Isaac Porche.

    May 6, 2011

  • Testimony

    Testimony

    Chinese Use of Cyberwar as an Anti-Access Strategy: Two Scenarios

    Testimony presented before the U.S. China Economic and Security Review Commission on January 27, 2011.

    Jan 27, 2011

  • Commentary

    Commentary

    Stuxnet Is the World's Problem

    The highly sophisticated Stuxnet computer worm suspected of sending Iran's nuclear centrifuges into self-destruction mode forces a difficult debate on whether longstanding firewalls in our country's democracy should be breached for the sake of national security, writes Isaac Porche.

    Dec 9, 2010

  • Report

    Report

    RAND Project AIR FORCE Annual Report 2010

    This annual report describes selected RAND Project AIR FORCE research during 2010 in the areas of strategy and doctrine; force modernization and employment; manpower, personnel, and training; and resource management.

    Nov 5, 2010

  • Report

    Report

    Air Force Cyber Command (Provisional) Decision Support

    This monograph addresses objectives, missions, tasks, and capabilities for the Air Force's new organization to address cyberspace issues (currently 24th Air Force), applying ''to fly and fight'' to cyberspace.

    Feb 24, 2010

  • Report

    Report

    Human Capital Management for the USAF Cyber Force

    Identifies and analyzes the human capital management issues associated with the creation of a formal organization dedicated to cyberspace capabilities within the U.S. Air Force.

    Feb 22, 2010

  • Journal Article

    Journal Article

    Security, at What Cost?

    Much of the current debate concerning civil liberties and security is adversarial, and little robust research data informs these arguments.This paper outlines the results of a study that attempts to objectively understand the real privacy, liberty and security trade-offs made by individuals, so that policymakers can be better informed about the preferences of individuals with regard to these important issues.

    Jan 1, 2010

  • News Release

    News Release

    U.S. Must Focus on Protecting Critical Computer Networks from Cyber Attack

    Because it will be difficult to prevent cyber attacks on critical civilian and military computer networks by threatening to punish attackers, the United States must focus its efforts on defending these networks from cyber attack.

    Oct 8, 2009