Communication Technology

  • Report

    The RAND American Life Panel: Technical Description

    This document provides a detailed description of the RAND American Life Panel methodology related to sample recruitment, sample retention, and weighting and should be of use for users of the panel and as general reference material.

    Jul 26, 2017

  • Computer hacker working on laptop late at night in office

    Commentary

    Connect, Buy-Now, Fire: How the Dark Web Allows Criminals to Buy Weapons—Anonymously

    Despite its small size compared to the offline market, the ability of the dark web to anonymously arm individuals of all backgrounds needs to be taken seriously. Its potential impact on international security is significant.

    Jul 25, 2017

  • Laptop and cursor with a gun icon pattern

    Project

    International Arms Trade on the Dark Web

    RAND Europe was commissioned by the Economic and Social Research Council to explore the European illegal arms trade, with focus on the role played by the hidden web in fuelling and/or facilitating such trade.

    Jul 20, 2017

  • News Release

    US Weapons Main Source of Illegal Arms Trade on the Dark Web

    The illegal sales on the dark web of firearms, weapons, explosives, and banned digital guides on homemade products present challenges for law enforcement agencies and national governments. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect.

    Jul 19, 2017

  • A laptop computer, a 9mm handgun, and bullets

    Report

    U.S. Weapons Are the Main Source of Illegal Arms on the Dark Web

    The dark web enables an illicit market for firearms, explosives, and ammunition. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect. Sixty percent of the arms for sale are from the United States.

    Jul 19, 2017

  • Project

    Digital Society Thought Leadership Programme

    RAND Europe is working in partnership with the Corsham Institute to design and deliver yearly Thought Leadership Programmes, at St George’s House, Windsor. The programmes explore the opportunities and challenges that digital technologies are creating within society.

    Jun 9, 2017

  • A pedestrian looks at floral tributes for the victims of the attack on London Bridge and Borough Market, June 6, 2017

    Commentary

    Why Aren't There More Terrorist Attacks Like the One in London?

    The number of attacks like the one on London Bridge are low because jihadist ideologies have failed to gain traction in most Muslim countries, and it's difficult to recruit people remotely. Supporting violence and participating in it are two different things.

    Jun 7, 2017

  • A man holds a laptop computer as cyber code is projected on him

    Report

    Could Stateless Attribution Promote International Cyber Accountability?

    The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?

    Jun 2, 2017

  • The word truth in fading black paint

    Q&A

    How RAND Is Responding to Truth Decay

    RAND's Michael Rich and Jennifer Kavanagh explain what “truth decay” is and discuss how ongoing RAND research could help counter it.

    May 5, 2017

  • Man using credit card and smartphone

    Report

    Helping Law Enforcement Use Data from Mobile Applications: A Guide to the Prototype Mobile Information and Knowledge Ecosystem (MIKE) Tool

    Mobile devices automatically and unobtrusively collect data about their users. This report documents a prototype tool created to help interested stakeholders better understand this mobile app ecosystem, and its use by law enforcement.

    Apr 28, 2017

  • Russian President Vladimir Putin is reflected in the glasses of a cadet watching Putin on TV at a military school outside Rostov-on-Don, Russia, December 20, 2012

    Testimony

    The Need for Cognitive Security

    The United States needs a strategy to counter information operations conducted by Russia and other adversaries. The rapid evolution of technology complicates this challenge.

    Apr 27, 2017

  • News Release

    Islamic State Control of People Down 83% in Iraq and 56% in Syria from Peak Levels

    The Islamic State has lost substantial control of territory and people but still conducts and inspires attacks around the world. The U.S. should pursue a light rollback strategy that relies on local forces backed by U.S. special operations forces, intelligence assets, and airpower.

    Apr 20, 2017

  • Iraqi forces advance against Islamic State militants in western Mosul, Iraq, March 6, 2017

    Report

    Rolling Back the Islamic State

    The Islamic State has lost substantial control of territory and people. But the group still conducts and inspires attacks around the world. The United States should pursue a light rollback strategy that relies on local forces backed by U.S. special operations troops, intelligence assets, and airpower.

    Apr 20, 2017

  • A coder types on laptop keyboard

    Commentary

    Reining in Internet Abuse

    The internet is being used for harmful, unethical, and illegal purposes. Examples include incitement and recruitment by terrorists, cyber bullying, and malicious fake news. Americans say they are unhappy with the tone of the online discourse, but are reluctant to consider potential remedies.

    Mar 23, 2017

  • News Release

    RAND Study Examines 200 Real-World 'Zero-Day' Software Vulnerabilities

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

    Mar 9, 2017

  • Composite image of binary code on a sunset over water

    Report

    The Life and Times of Zero-Day Software Vulnerabilities

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

    Mar 9, 2017

  • Report

    Needs, Effectiveness, and Gap Assessment for Key A-10C Missions: An Overview of Findings

    This report analyzes several missions assigned to the A-10C aircraft and the needs this mission set could generate over the next five years. It also assesses existing and planned forces' effectiveness and capability gaps in performing those missions.

    Mar 2, 2017

  • U.S. Army soldiers take part in a multi-service exercise on cyber capabilities at Ford Gordon in Augusta, Georgia, June 10, 2014

    Testimony

    Effective Cyberdeterrence Takes More Than Offensive Capability

    A successful cyberdeterrence posture has many prerequisites. These include attributing attacks to the correct party, thresholds for what merits retaliation, credibility, and offensive capability. For the United States, capability is the least in doubt.

    Mar 1, 2017

  • Brochure

    Spotlight on 2016

    Spotlight, RAND Europe's annual review, features ways that our objective research and analysis expanded perspectives in 2016 to provide policy and decision makers the evidence and facts during a year of highly charged political debates.

    Feb 1, 2017

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Dec 19, 2016