Download eBook for Free

Full Document

FormatFile SizeNotes
PDF file 0.5 MB Best for desktop computers.

Use Adobe Acrobat Reader version 10 or higher for the best experience.

ePub file 0.9 MB Best for mobile devices.

On desktop computers and some mobile devices, you may need to download an eBook reader to view ePub files. Calibre is an example of a free and open source e-book library management application.

mobi file 2.2 MB Best for Kindle 1-3.

On desktop computers and some mobile devices, you may need to download an eBook reader to view mobi files. Amazon Kindle is the most popular reader for mobi files.

حرية استخدام برمجيات الإنترنت والأنشطة المحظورة- دعم حقوق الإنسان دون تمكين المجرمين

Arabic language version

FormatFile SizeNotes
PDF file 0.9 MB

Use Adobe Acrobat Reader version 10 or higher for the best experience.


Purchase Print Copy

 Format Price
Add to Cart Paperback84 pages $15.00

Research Questions

  1. To what extent can the Internet freedom tools funded by DRL be used for illicit purposes?
  2. Has DRL funding for Internet freedom tools increased the potential for illicit use of these technologies?
  3. What safeguards exist for Internet freedom tools to deter illicit use?

The State Department's Bureau of Democracy, Human Rights, and Labor (DRL), as part of its broader effort to protect and advance political and economic freedoms and human rights, champions the United States' strategy for cyberspace to advocate for fundamental freedoms of speech and association through cyberspace; empower civil society actors, human rights activists, and journalists in their use of digital media; and encourage governments to limit neither the freedom of expression nor the free flow of information.

To this end, DRL funds the development of many cyber security and privacy software programs. However, there are trade-offs associated with any such investment. On one hand, security and privacy tools can provide safe, reliable, and anonymous Internet access to people who would otherwise be censored, filtered, or punished for communicating electronically. On the other hand, these tools could also be used to conceal or commit illegal activity. This report examines the portfolio of tools funded by DRL that help support Internet freedom and assesses the impact of these tools in promoting U.S. interests.

First, we note the benefits of these tools in promoting DRL's mission of Internet freedom across the world. Second, we examine their potential for, and examples of, their illicit use. Third, we consider the ability of comparable tools, not funded by the DRL, to be used for such purposes. And fourth, we examine safeguards and design and service models that could limit or restrict the use of the technologies for illicit purposes.

The report concludes that DRL's support for Internet freedom tools has not made them more likely to be used for illicit purposes, relative to alternative technologies not funded by DRL.

Key Findings

There is little reported evidence that the Internet freedom tools funded by DRL assist illicit activities in a material way, vis-à-vis tools that predated or were developed without DRL funding.

  • Conversely, DRL-funded tools can and do provide crucial capabilities to netizens (non-criminal users of the Internet) — specifically human rights activists — either because they are freely available, easy to use, marketed and available to human rights supporters, or because they operate in the user's native language. Further, given the wealth and diversity of other privacy, security, and social media tools and technologies, there exist numerous alternatives that would likely be more suitable for criminal activity, either because of reduced surveillance and law enforcement capabilities, fewer restrictions on their availability, or because they are custom built by criminals to suit their own needs.

The development of Internet freedom tools and technologies is a worthwhile endeavor.

  • Such tools provide a material capability to netizens and human rights activists that they may otherwise not have, while criminals and others who seek to use such technologies for illicit purposes have alternatives available that offer capabilities equal or even preferable to those offered by DRL-funded tools.

This research was conducted within the International Security and Defense Policy Center of the RAND National Security Research Division (NSRD) for the U.S. Department of State, Bureau of Democracy, Human Rights, and Labor, at the request of the U.S. Congress.

This report is part of the RAND research report series. RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors. All RAND reports undergo rigorous peer review to ensure high standards for research quality and objectivity.

This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited; linking directly to this product page is encouraged. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial purposes. For information on reprint and reuse permissions, please visit

RAND is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors.