Cyber Warfare

Featured

Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks. RAND research provides recommendations to military and civilian decisionmakers on methods of defending against the damaging effects of cyber warfare on a nation's digital infrastructure.

  • World map, photo by nadla/Getty Images

    Commentary

    Why It's So Hard to Stop a Cyberattack — and Even Harder to Fight Back

    Mar 30, 2017

    Cyber weapons attack the underlying network or computer systems. The possibility of unexpected effects in the cyber world is therefore greater than in conventional warfare. Not knowing if the effects were intentional complicates the response.

  • Composite image of binary code on a sunset over water by Eileen Delson La Russo/RAND, adapted from images by Agil_Leonardo, Matejmo, and Byakkaya/Getty Images

    Report

    The Life and Times of Zero-Day Software Vulnerabilities

    Mar 9, 2017

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

Explore Cyber Warfare

  • Periodical

    RAND Review: Summer 2013

    This RAND Review focuses on the harms and costs of sexual assault in the military and the barriers that still exist for servicemembers who report the crimes and seek psychological health care. Other stories address the prospects for minimalist international interventions, cyber threats and nations' responses to them, and the rising costs of dementia in the U.S.

  • Periodical

    Message from the Editor: Scourges

    The RAND Review Editor-in-Chief summarizes the Summer 2013 issue.

  • Periodical

    Old Madness, New Methods

    C lassic motivations for terrorism will endure in the information age. What will change will be the methods used by terrorists who avail themselves of newly expanded opportunities to disrupt and destroy their enemies, as revealed in "Networks, Netwar, and Information-Age Terrorism," one chapter in a forthcoming ...

  • Periodical

    That Wild, Wild Cyberspace Frontier

    Cyberspace, like the old West, is a lawless domain of limitless possibilities--for good but also for evil. As in a frontier town, everyone with links to the Internet is going to have to see to their own protection, at least until law and order catch up. A Russian hacker in St. Petersburg breaks into a Citibank ...

  • Periodical

    Information Warfare: A Two-Edged Sword

    Information war has no front line. Potential battlefields are anywhere networked systems allow access--oil and gas pipelines, for example, electric power grids, telephone switching networks. In sum, the U.S. homeland may no longer provide a sanctuary from outside attack. The sword of information-age technology ...

  • Periodical

    Perspective

    David C. Gompert How grave is the threat from cyberspace? Are those electrons really "10 feet tall" or is information war being oversold? We don't know. In particular, we don't know what groups, with what technical skills, might be able to manipulate or disrupt the flow of information on which our society ...

  • Periodical

    Cyberwar and Netwar: New Modes, Old Concepts, of Conflict

    John J. Arquilla and David F. Ronfeldt The information revolution is transforming warfare, contend the authors. No longer will massive, dug-in armies fight bloody attritional battles. Instead small, highly mobile forces, armed with real-time information from satellites and battlefield sensors, will strike ...