Communication Technology

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • Brochure

    Spotlight on 2017

    RAND Europe's annual review, Spotlight on 2017, features some of the objective research and analysis we do to help policy and decision makers keep pace with an ever-changing world.

    Jan 29, 2018

  • Tourists and locals enjoy Ko'Olina beach on the island of Oahu, Hawaii, July, 29, 2013

    Commentary

    Every Second Counts with Missile Alerts

    The false alarm about a ballistic missile attack on Hawaii raises important questions. How much warning time would the public get before a missile hit? And how should the system be improved?

    Jan 24, 2018

  • Shiny gold Bitcoin coin with gun on black background

    Commentary

    Bitcoin and the Dark Web: The New Terrorist Threat?

    Bitcoin has become the prominent currency of the dark web, which is often used to buy illegal goods, such as weapons and drugs. Anecdotal evidence suggests terrorists are using cryptocurrency and the dark web, but further investigation is needed.

    Jan 22, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017

    Commentary

    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • A man using a radio transceiver

    Report

    Signals Intelligence for Anyone

    Signals intelligence (SIGINT) is intelligence gathered from communications, electronics, or foreign instrumentation. This has traditionally been considered a governmental function. But new technologies are changing that. Now private citizens can conduct SIGINT activities.

    Dec 5, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Blockchain cryptocurrency financial technology concept with binary code

    Commentary

    Blockchain: Should We Believe the Hype?

    Industry, governments and academics are all speculating on the ways in which blockchain could revolutionize everything from finance to the music industry. Now is the time for policymakers and industry to take note and find out what blockchain could offer.

    Nov 30, 2017

  • Computer hacker with magnifying glass

    Commentary

    It's Time for the International Community to Get Serious About Vulnerability Equities

    Multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It’s time for the international community to get serious about vulnerability equities.

    Nov 15, 2017

  • Tool

    Interfacing Force-on-Force and Communications Models: MANA and JNE

    This report documents an interface between an agent-based force-on-force simulation and a network simulation for the U.S. Army's Cyber Center of Excellence, Capabilities Development and Integration Directorate (CDID), Cyber Battle Lab.

    Nov 8, 2017

  • Congressman Adam Schiff speaks at a House Intelligence Committee meeting about Russian use of social media to influence U.S. elections, Washington, D.C., November 1, 2017

    Commentary

    Covert Influence Is the New Money Laundering

    Anti-money laundering laws provide lessons for combating covert influence operations, such as Russian meddling in the U.S. election. These laws could be adapted for online media models that do not require users to be paid customers.

    Nov 6, 2017

  • Trading information about Equifax and the company logo are displayed on a screen on the floor of the New York Stock Exchange, September 8, 2017

    Commentary

    The Equifax Breach: Yawn, or Yikes?

    In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.

    Nov 3, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Understanding the landscape of Distributed Ledger Technologies/Blockchain: Challenges, opportunities, and the prospects for standards

    This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.

    Oct 18, 2017

  • Report

    Open science: The citizen's role in and contribution to research

    The report summarises the conclusions of an expert consultation exploring how citizens are increasingly becoming involved in scientific research. It investigates the benefits and challenges that citizen science poses for different stakeholders.

    Oct 11, 2017

  • Report

    Digital currency: Transacting and value exchange in the digital age

    The report gives an overview of expert discussions on trends in the use of digital transaction platforms and cryptocurrencies, and the implications for the wider economic, financial and social landscape.

    Oct 11, 2017

  • Report

    Building our Connected Society: Findings from the 2017 Thought Leadership programme

    This report summarises the key themes that emerged from four thought leadership sessions on the UK's connected society, along with recommended actions moving forward for the UK government, industries, the third sector and the public.

    Oct 11, 2017

  • Report

    Civic engagement: How can digital technologies underpin citizen-powered democracy?

    The report provides an overview of an expert consultation on how digital technologies can be used to support citizen-powered democracy. It identifies key opportunities, risks and aspirations, as well as emerging ideas for delivering on this vision.

    Oct 11, 2017

  • Journal Article

    Evaluation of Telephone First Approach to Demand Management in English General Practice: Observational Study

    For clinicians, this study provides clear evidence that a considerable part of patient workload can be dealt with through phone consultations.

    Oct 6, 2017

  • Supporters of Lebanon's Hezbollah leader Sayyed Hassan Nasrallah listen to him via a screen during a rally marking the 11th anniversary of the end of Hezbollah's 2006 war with Israel, in Khiam, Lebanon, August 13, 2017

    Commentary

    How Hezbollah Came to Dominate Information Warfare

    Hezbollah's information warfare portfolio includes newspapers, social media outlets, television programming, and a major internet presence. Its websites reflect the group's diverse agenda and aim to be multi-generational in their approach, offering information about social services as well as a video game to engage youth.

    Sep 19, 2017