The Internet

  • An Iraqi military HMMWV drives past an Islamic State sign in eastern Mosul after they captured it from IS

    Commentary

    The Islamic State May Be Failing, but Its Strategic Communications Legacy Is Here to Stay

    The Islamic State's caliphate is collapsing but its legacy will live on virtually because of its information operations. The scale of the menace presented by the group today pales in comparison to other global challenges, yet it manages to dominate and terrorize the public mind.

    Aug 17, 2017

  • Digital devices on a map of Australia

    Report

    Australia's Cyber Security Policy Options

    An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.

    Aug 7, 2017

  • Report

    Civic Engagement: How Can Digital Technology Encourage Greater Engagement in Civil Society?

    This Perspective explores the potential impacts that digital technologies may have on the nature of civic engagement and political processes, providing an overview of the opportunities and risks associated with the use of these technologies.

    Aug 7, 2017

  • Report

    The RAND American Life Panel: Technical Description

    This document provides a detailed description of the RAND American Life Panel methodology related to sample recruitment, sample retention, and weighting and should be of use for users of the panel and as general reference material.

    Jul 26, 2017

  • Computer hacker working on laptop late at night in office

    Commentary

    Connect, Buy-Now, Fire: How the Dark Web Allows Criminals to Buy Weapons—Anonymously

    Despite its small size compared to the offline market, the ability of the dark web to anonymously arm individuals of all backgrounds needs to be taken seriously. Its potential impact on international security is significant.

    Jul 25, 2017

  • Laptop and cursor with a gun icon pattern

    Project

    International Arms Trade on the Dark Web

    RAND Europe was commissioned by the Economic and Social Research Council to explore the European illegal arms trade, with focus on the role played by the hidden web in fuelling and/or facilitating such trade.

    Jul 20, 2017

  • News Release

    US Weapons Main Source of Illegal Arms Trade on the Dark Web

    The illegal sales on the dark web of firearms, weapons, explosives, and banned digital guides on homemade products present challenges for law enforcement agencies and national governments. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect.

    Jul 19, 2017

  • A laptop computer, a 9mm handgun, and bullets

    Report

    U.S. Weapons Are the Main Source of Illegal Arms on the Dark Web

    The dark web enables an illicit market for firearms, explosives, and ammunition. This can anonymously arm criminals, terrorists, and others. Sixty percent of the arms for sale are from the United States.

    Jul 19, 2017

  • A pedestrian looks at floral tributes for the victims of the attack on London Bridge and Borough Market, June 6, 2017

    Commentary

    Why Aren't There More Terrorist Attacks Like the One in London?

    The number of attacks like the one on London Bridge are low because jihadist ideologies have failed to gain traction in most Muslim countries, and it's difficult to recruit people remotely. Supporting violence and participating in it are two different things.

    Jun 7, 2017

  • A man holds a laptop computer as cyber code is projected on him

    Report

    Could Stateless Attribution Promote International Cyber Accountability?

    The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?

    Jun 2, 2017

  • The word truth in fading black paint

    Q&A

    How RAND Is Responding to Truth Decay

    RAND's Michael Rich and Jennifer Kavanagh explain what “truth decay” is and discuss how ongoing RAND research could help counter it.

    May 5, 2017

  • Man using credit card and smartphone

    Report

    Helping Law Enforcement Use Data from Mobile Applications: A Guide to the Prototype Mobile Information and Knowledge Ecosystem (MIKE) Tool

    Mobile devices automatically and unobtrusively collect data about their users. This report documents a prototype tool created to help interested stakeholders better understand this mobile app ecosystem, and its use by law enforcement.

    Apr 28, 2017

  • Russian President Vladimir Putin is reflected in the glasses of a cadet watching Putin on TV at a military school outside Rostov-on-Don, Russia, December 20, 2012

    Testimony

    The Need for Cognitive Security

    The United States needs a strategy to counter information operations conducted by Russia and other adversaries. The rapid evolution of technology complicates this challenge.

    Apr 27, 2017

  • News Release

    Islamic State Control of People Down 83% in Iraq and 56% in Syria from Peak Levels

    The Islamic State has lost substantial control of territory and people but still conducts and inspires attacks around the world. The U.S. should pursue a light rollback strategy that relies on local forces backed by U.S. special operations forces, intelligence assets, and airpower.

    Apr 20, 2017

  • Iraqi forces advance against Islamic State militants in western Mosul, Iraq, March 6, 2017

    Report

    Rolling Back the Islamic State

    The Islamic State has lost substantial control of territory and people. But the group still conducts and inspires attacks around the world. The United States should pursue a light rollback strategy that relies on local forces backed by U.S. special operations troops, intelligence assets, and airpower.

    Apr 20, 2017

  • A coder types on laptop keyboard

    Commentary

    Reining in Internet Abuse

    The internet is being used for harmful, unethical, and illegal purposes. Examples include incitement and recruitment by terrorists, cyber bullying, and malicious fake news. Americans say they are unhappy with the tone of the online discourse, but are reluctant to consider potential remedies.

    Mar 23, 2017

  • News Release

    RAND Study Examines 200 Real-World 'Zero-Day' Software Vulnerabilities

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

    Mar 9, 2017

  • Composite image of binary code on a sunset over water

    Report

    The Life and Times of Zero-Day Software Vulnerabilities

    Zero-day software vulnerabilities—security holes that developers haven't fixed or aren't aware of—can lurk undetected for years. They are useful in cyber operations and in defensive and academic settings. Whether to disclose or stockpile them is an ongoing debate.

    Mar 9, 2017

  • U.S. Army soldiers take part in a multi-service exercise on cyber capabilities at Ford Gordon in Augusta, Georgia, June 10, 2014

    Testimony

    Effective Cyberdeterrence Takes More Than Offensive Capability

    A successful cyberdeterrence posture has many prerequisites. These include attributing attacks to the correct party, thresholds for what merits retaliation, credibility, and offensive capability. For the United States, capability is the least in doubt.

    Mar 1, 2017

  • Brochure

    Spotlight on 2016

    Spotlight, RAND Europe's annual review, features ways that our objective research and analysis expanded perspectives in 2016 to provide policy and decision makers the evidence and facts during a year of highly charged political debates.

    Feb 1, 2017