The Internet

  • Supporters of Lebanon's Hezbollah leader Sayyed Hassan Nasrallah listen to him via a screen during a rally marking the 11th anniversary of the end of Hezbollah's 2006 war with Israel, in Khiam, Lebanon, August 13, 2017

    Commentary

    How Hezbollah Came to Dominate Information Warfare

    Hezbollah's information warfare portfolio includes newspapers, social media outlets, television programming, and a major internet presence. Its websites reflect the group's diverse agenda and aim to be multi-generational in their approach, offering information about social services as well as a video game to engage youth.

    Sep 19, 2017

  • A man uses an Apple Watch to demonstrate the mobile payment service Apple Pay at a cafe in Moscow, Russia, October 3, 2016

    Report

    Digital Technology and the Future of Commerce

    Advances in digital technology can connect businesses and consumers, develop new and niche markets, and commodify new activities. As the exchange of goods and services evolves, what are the societal impacts?

    Aug 30, 2017

  • Two girls on a couch watching TV while eating popcorn

    Blog

    How RAND Helped Cable TV Spread Far and Wide

    In the late 1960s and early '70s, RAND released a series of reports about cable television — the technology, federal and state regulation, and its use in education. The researchers' interactive vision for cable TV was a lot like the internet.

    Aug 25, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017

  • An Iraqi military HMMWV drives past an Islamic State sign in eastern Mosul after they captured it from IS

    Commentary

    The Islamic State May Be Failing, but Its Strategic Communications Legacy Is Here to Stay

    The Islamic State's caliphate is collapsing but its legacy will live on virtually because of its information operations. The scale of the menace presented by the group today pales in comparison to other global challenges, yet it manages to dominate and terrorize the public mind.

    Aug 17, 2017

  • Digital devices on a map of Australia

    Report

    Australia's Cyber Security Policy Options

    An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.

    Aug 7, 2017

  • Report

    Civic Engagement: How Can Digital Technology Encourage Greater Engagement in Civil Society?

    This Perspective explores the potential impacts that digital technologies may have on the nature of civic engagement and political processes, providing an overview of the opportunities and risks associated with the use of these technologies.

    Aug 7, 2017

  • Report

    The RAND American Life Panel: Technical Description

    This document provides a detailed description of the RAND American Life Panel methodology related to sample recruitment, sample retention, and weighting and should be of use for users of the panel and as general reference material.

    Jul 26, 2017

  • Computer hacker working on laptop late at night in office

    Commentary

    Connect, Buy-Now, Fire: How the Dark Web Allows Criminals to Buy Weapons—Anonymously

    Despite its small size compared to the offline market, the ability of the dark web to anonymously arm individuals of all backgrounds needs to be taken seriously. Its potential impact on international security is significant.

    Jul 25, 2017

  • Laptop and cursor with a gun icon pattern

    Project

    International Arms Trade on the Dark Web

    RAND Europe was commissioned by the Economic and Social Research Council to explore the European illegal arms trade, with focus on the role played by the hidden web in fuelling and/or facilitating such trade.

    Jul 20, 2017

  • News Release

    US Weapons Main Source of Illegal Arms Trade on the Dark Web

    The illegal sales on the dark web of firearms, weapons, explosives, and banned digital guides on homemade products present challenges for law enforcement agencies and national governments. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect.

    Jul 19, 2017

  • A laptop computer, a 9mm handgun, and bullets

    Report

    U.S. Weapons Are the Main Source of Illegal Arms on the Dark Web

    The dark web enables an illicit market for firearms, explosives, and ammunition. This can anonymously arm criminals, terrorists, and others. Sixty percent of the arms for sale are from the United States.

    Jul 19, 2017

  • A pedestrian looks at floral tributes for the victims of the attack on London Bridge and Borough Market, June 6, 2017

    Commentary

    Why Aren't There More Terrorist Attacks Like the One in London?

    The number of attacks like the one on London Bridge are low because jihadist ideologies have failed to gain traction in most Muslim countries, and it's difficult to recruit people remotely. Supporting violence and participating in it are two different things.

    Jun 7, 2017

  • A man holds a laptop computer as cyber code is projected on him

    Report

    Could Stateless Attribution Promote International Cyber Accountability?

    The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?

    Jun 2, 2017

  • The word truth in fading black paint

    Q&A

    How RAND Is Responding to Truth Decay

    RAND's Michael Rich and Jennifer Kavanagh explain what “truth decay” is and discuss how ongoing RAND research could help counter it.

    May 5, 2017

  • Man using credit card and smartphone

    Report

    Helping Law Enforcement Use Data from Mobile Applications: A Guide to the Prototype Mobile Information and Knowledge Ecosystem (MIKE) Tool

    Mobile devices automatically and unobtrusively collect data about their users. This report documents a prototype tool created to help interested stakeholders better understand this mobile app ecosystem, and its use by law enforcement.

    Apr 28, 2017

  • Russian President Vladimir Putin is reflected in the glasses of a cadet watching Putin on TV at a military school outside Rostov-on-Don, Russia, December 20, 2012

    Testimony

    The Need for Cognitive Security

    The United States needs a strategy to counter information operations conducted by Russia and other adversaries. The rapid evolution of technology complicates this challenge.

    Apr 27, 2017

  • News Release

    Islamic State Control of People Down 83% in Iraq and 56% in Syria from Peak Levels

    The Islamic State has lost substantial control of territory and people but still conducts and inspires attacks around the world. The U.S. should pursue a light rollback strategy that relies on local forces backed by U.S. special operations forces, intelligence assets, and airpower.

    Apr 20, 2017

  • Iraqi forces advance against Islamic State militants in western Mosul, Iraq, March 6, 2017

    Report

    Rolling Back the Islamic State

    The Islamic State has lost substantial control of territory and people. But the group still conducts and inspires attacks around the world. The United States should pursue a light rollback strategy that relies on local forces backed by U.S. special operations troops, intelligence assets, and airpower.

    Apr 20, 2017

  • A coder types on laptop keyboard

    Commentary

    Reining in Internet Abuse

    The internet is being used for harmful, unethical, and illegal purposes. Examples include incitement and recruitment by terrorists, cyber bullying, and malicious fake news. Americans say they are unhappy with the tone of the online discourse, but are reluctant to consider potential remedies.

    Mar 23, 2017