The Internet

  • Malware phishing data concept

    Commentary

    Social Engineering Explained: The Human Element in Cyberattacks

    The human element is the most unpredictable factor in cybersecurity. A social engineer aims to make people do what they want or give the social engineer information, often without the person considering the negative consequences.

    Oct 20, 2015

  • U.S. President Barack Obama and Chinese President Xi Jinping shake hands following a joint news conference in the Rose Garden at the White House in Washington September 25, 2015

    Commentary

    Define Acceptable Cyberspace Behavior

    While a U.S.-China cyberspace agreement is a welcome step, it also underscores the greater issues facing the United States and the international community in this largely ungoverned space. A precondition for securing U.S. networks should be the development of an overarching cyber doctrine that defines acceptable behavior and allows the U.S. to defend its networks against threats.

    Sep 27, 2015

  • Congressional Briefing Podcast

    Multimedia

    Lessons from a Hacker: Cyber Concepts for Policymakers

    In this September 14th congressional briefing, Lillian Ablon discusses the basics of cyber and information security and provides insights into some of the complexities of cybersecurity policymaking. Topics include why software vulnerabilities are significant, the components of cyber risk beyond the threat, motivations of various cyber threats actors, and what they exploit.

    Sep 14, 2015

  • Digital internet security concept

    Announcement

    RAND Hosts Cybersecurity Exercise

    The discussion of cybersecurity should not be trapped within narrow technical, national security, or legal stovepipes and should include an examination of economic, civil, and societal factors. With that goal in mind, RAND hosted an analytic exercise on cybersecurity.

    Sep 3, 2015

  • Research Brief

    Online privacy vs surveillance: Europeans' preferences on internet surveillance and security measures

    RAND Europe has collected evidence from one of the largest-ever surveys of citizens' views across Europe on security, surveillance and privacy issues in three scenarios: train travel, internet use (described here), and storage of health records.

    Aug 20, 2015

  • News Release

    Internet Technology Could Aid Police, Courts and Prisons; Resolving Privacy Issues Key to Future Use

    New Internet-based technology may aid criminal justice agencies through promising tools such as better criminal databases, remotely conducted trials, and electronic monitoring of parolees. But many of the developments raise issues related to civil rights, privacy, and cybersecurity that must be addressed.

    Aug 17, 2015

  • A police officer examining a fingerprint on a monitor

    Report

    Internet Technology Could Aid Police, Courts, and Prisons

    New Internet-based technology may aid criminal justice agencies through promising tools, such as better criminal databases, remotely conducted trials, and electronic monitoring of parolees. But many of the developments raise issues related to civil rights, privacy, and cybersecurity that must be addressed.

    Aug 17, 2015

  • Finger on a tablet

    Report

    CalMHSA Stigma and Discrimination Reduction Online Resources: Highlights from an Evaluation of Web Analytic Data

    Reports on an evaluation of online resources developed by the California Mental Health Services Authority's stigma and discrimination reduction initiative program partners and provides an overview of these resources and the use of partner websites.

    Aug 17, 2015

  • Testimony

    Strategies for Defending U.S. Government Networks in Cyberspace: Addendum

    Document submitted on July 31, 2015 as an addendum to testimony presented before the House Homeland Security Committee, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies on June 24, 2015.

    Aug 3, 2015

  • World map, connected people icons, and binary code

    Commentary

    War on the Web

    While the U.S. Cyber Command is preparing the nation's defenses for the coming ramp-up in cyberwarfare-like attacks, the messages spread instantly by hordes of attackers through social media may not be receiving the attention they deserve.

    Jul 23, 2015

  • Hand press on free trial button on virtual screen

    Project

    Examining Misleading Online Free Trials and Subscription Traps Experienced by European Consumers

    The European Commission has contracted GfK Belgium, RAND Europe, and time.lex to carry out a study on misleading online free trials and subscription traps experienced by consumers in Europe.

    Jul 23, 2015

  • Identify theft illustration

    Commentary

    U.S. Needs a New Electronic Identity-Protection Strategy to Prevent 'Hybrid Warfare' Attacks

    The U.S. government needs to develop a strategy to protect its citizens that includes a unique identifying number or code and a method for protecting these identity keys in online transactions.

    Jul 6, 2015

  • News Release

    Internet Freedom Software Tools Developed by the United States Do Not Facilitate Cybercrime

    Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are numerous alternative technologies that are better suited.

    Jun 30, 2015

  • A smartphone is used to photograph a Red Shirt rally in Bangkok, Thailand

    Report

    Internet Freedom Software Tools Do Not Facilitate Cybercrime

    Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are alternative technologies that are better suited.

    Jun 30, 2015

  • Network hub and cable

    Testimony

    Strategies for Defending U.S. Government Networks in Cyberspace

    Hackers, including state and non-state actors, are continuing to find opportunities to penetrate U.S. government networks. Defending these networks will require a systems approach.

    Jun 24, 2015

  • News Release

    Companies Are Making Cybersecurity a Greater Priority, but Hackers Still May Be Gaining

    While worldwide spending on cybersecurity is close to $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

    Jun 10, 2015

  • An information security illustration superimposed over a businesswoman holding a tablet

    Report

    Companies Are Prioritizing Cybersecurity, but Hackers Still May Be Gaining

    While spending on cybersecurity is $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

    Jun 10, 2015

  • Man wearing camouflage using a laptop

    Commentary

    Social Media as a Tool for Reaching Veterans in Need of Mental Health Care

    Reaching veterans to learn more about their mental health care seeking poses a conundrum. They are typically recruited for studies in clinical settings, so those who are not seeking care are not represented. Facebook may be a viable method to reach them.

    Jun 9, 2015

  • NYPD officers interact with pedestrians in Central Park, Manhattan, May 22, 2011

    Report

    Strengthening Trust Between Police and the Public

    Amid recent tensions between law enforcement and the public, three key questions must be answered to build the foundation for long-lasting mutual trust, especially given technological changes that are increasing transparency.

    May 1, 2015

  • Hand touching tablet behind social media diagram and map

    Commentary

    The Clash of Internet Civilizations: Why Neither Side Should Prevail

    The debate over net neutrality pits two opposing philosophies against each other — one pushing for the continued evolution of the Internet as an open information superhighway, the other asserting that the Internet's evolution needs to take more account of the many ways it is and will be used.

    Apr 10, 2015