Moscow's form of information warfare targeting the West has attracted significant international attention since 2014, especially through its reinvigorated military intelligence branch. Nonetheless, little research has focused on these campaigns' apparent shortcomings. Most notable among operational errors are the confusing translation mistakes that undermine attempts at covert influence efforts.
Senior political scientist Jennifer Kavanagh helps lead RAND's work on Truth Decay, the diminishing role of facts and analysis in American public life. In this interview, she discusses her latest research on how news presentation has changed over time and across platforms.
The world's attention will be fixed on Japan as it hosts the Rugby World Cup in September and the Tokyo Olympics in 2020. Japan's cyber defenses will need to be strong enough to keep attackers out and resilient enough to restore systems should things go wrong.
Facebook's Mark Zuckerberg has called for new internet regulation starting in four areas: harmful content, election integrity, privacy, and data portability. But why stop there? His proposal could be expanded to include much more: security-by-design, net worthiness, and updated internet business models.
As space becomes more congested with satellites, the need for every nation to actively participate in the space safety coordination system grows. Most spacefaring countries participate, but a few countries do not—notably, Russia and China. That creates greater potential for collisions and hazards from debris.
Terrorism has become an internet-enabled abuse—incited, propagated, and sometimes organized and concealed by online activity. Who should be held accountable for abusive content, the author or the publisher? And what role should the government play in regulating it?
Although a “smoking gun” of Huawei involvement in government-directed espionage remains elusive, the United States has compelling security and economic reasons to consider limiting the involvement of Chinese telecommunications companies in its domestic networks.
Dozens of technologies with the power to transform human life, from 3D printing to cognitive implants, could become as ordinary as a cellphone by 2040. Society will have to adapt, on the fly, in ways it never has. The speed of life itself could pose a security challenge.
As tech-based systems have become all but indispensable, many institutions might assume user data will be reliable, meaningful and, most of all, plentiful. But what if this data became unreliable, meaningless, or even scarce?
The importance of social media in projecting violent extremist propaganda and recruiting foreign fighters is well documented. As ISIS attempts to regroup and recuperate, investigating its strategic use of information and communication technologies in its communication with civilians could be important to understanding the group's plans to regain territorial control.
Data breaches and cyberattacks cross geopolitical boundaries, targeting individuals, corporations and governments. Creating a global body with a narrow focus on investigating and assigning responsibility for cyberattacks could be the first step to creating a digital world with accountability.