The Internet

Featured

  • An illustration depicting the difference between light and darkness, image by Alyson Youngblood/RAND Corporation

    Blog

    What You Can Do to Help Stop Truth Decay

    Mar 29, 2022

    Truth Decay, the diminishing role of facts in American public life, isn't a problem that any one person can fix. But there are simple steps that individuals can take to help counter it.

  • Man thinking at his laptop, photo by Shannon Fagan/Getty Images

    Essay

    How to Avoid Extremism on Social Media

    May 3, 2022

    Extremist groups have been trolling the internet for decades, and they have learned to temper their words and disguise their intentions. A new scorecard can help users—or parents, or advertisers, or the social media companies themselves—understand when they might be interacting with extremist content.

Explore The Internet

  • Report

    Report

    An Exploratory Examination of Agent-Based Modeling for the Study of Social Movements

    The authors of this report explore the use of agent-based modeling as a method for studying the effects of information and communications technologies on the formation, maintenance, and dissolution of social movements over time.

    Aug 16, 2022

  • An inside look at an ion trap within Quantinuum's quantum computer, which processes data using trapped-ion technology, Broomfield, Colorado, December 6, 2021, photo by Quantinuum/Handout via Reuters

    Commentary

    Hack Post-Quantum Cryptography Now So That Bad Actors Don't Do It Later

    The U.S. government should consider offering a public cash bounty to anyone who can crack the new forms of encryption that are being rolled out to defend against quantum computers. If a bounty helps catch a vulnerability before it's deployed, then the modest cost of the bounty could prevent much higher costs down the line.

    Jul 28, 2022

  • Blog

    Abortion Misinformation, Deepfakes, Environmental Racism: RAND Weekly Recap

    This weekly recap focuses on abortion misinformation in a post-Roe world, the threat of deepfakes, environmental hazards in historically redlined communities, and more.

    Jul 8, 2022

  • aerial view of a city with forced perspective and blurring

    Report

    Identifying Critical IT Products and Services

    Researchers have identified the software and businesses that provide critical information technology products and services and developed a framework to continue this analysis as technology evolves. They assessed both software risk and business risk.

    Jul 6, 2022

  • A green wireframe model covers an actor's lower face during the creation of a synthetic facial reanimation video, aka a deepfake, in London, Britain, February 12, 2019, photo by Reuters TV

    Report

    The Threat of Deepfakes

    Various AI technologies are ripe for use in disinformation campaigns. Deepfake videos represent an obvious threat, but voice cloning, deepfake images, and generative text also merit concern. And websites now offer access to deepfake services.

    Jul 6, 2022

  • Report

    Report

    Planning for Significant Cyber Incidents: An Introduction for Decisionmakers

    This report describes contingency planning for a significant cyber incident, focusing on the importance of planning, the process of developing a plan, and options for operationalizing it. It summarizes a companion how-to guide by the same authors.

    Jun 27, 2022

  • Illustration of network connections over Earth, image by Anton Balazh/Adobe Stock

    Report

    Russia's Information Warfare with the West

    Popular portrayals of the Russian disinformation machine imply an organized and well-resourced operation, but evidence suggests that it is neither. Nonetheless, Russian social media activity can be harmful to U.S. interests and is likely to evolve.

    Jun 7, 2022

  • Blog

    Gun Policy, China and Taiwan, Russian Propaganda: RAND Weekly Recap

    This weekly recap focuses on reducing America's unacceptably high rates of gun violence, what would happen if China “quarantines” Taiwan, and Russia's “firehose of falsehood.”

    May 27, 2022

  • A still from a powerful animated video created by RAND artists-in-residence Juan Delcan and Valentina Izaguirre, known as V+J, to show how Russian propaganda spreads—and how it can influence its audience by entertaining, confusing, and overwhelming them.

    Project

    Russia's Propaganda Model

    RAND artists-in-residence Juan Delcan and Valentina Izaguirre, known as V+J, created a powerful animated video to show how Russian propaganda spreads—and how it can influence its audience by entertaining, confusing, and overwhelming them.

    May 24, 2022

  • Blog

    Extremism Online, Russia's Military, Preventing Police Killings: RAND Weekly Recap

    This weekly recap focuses on the internet's role in stoking extremism and hate, how Russia has failed its military personnel, a research roadmap to help prevent police killings in the United States, and more.

    May 20, 2022

  • Inmate Marvin Worthy uses his JPay tablet device inside the East Jersey State Prison in Rahway, New Jersey, July 12, 2018, photo by Brendan McDermid/Reuters

    Report

    Leveraging Technology to Support Prisoner Reentry

    How can technology help ease the transition from jails or prisons back into the community—and ensure better outcomes for individuals who have been incarcerated?

    May 3, 2022

  • The U.S. Capitol at sunset on the eve of the first anniversary of the January 6, 2021 attack on the building, in Washington, January 5, 2022, photo by Elizabeth Frantz/Reuters

    Testimony

    Extremist Use of Online Spaces

    Extremist content can be found in all corners of the internet. How do the characteristics of online spaces contribute to individual radicalization? And how may the internet have helped foster conditions that contributed to the January 6 attack on the U.S. Capitol?

    Apr 27, 2022

  • Blog

    Russian Mercenaries, Online Extremism, the Commercial Space Market: RAND Weekly Recap

    This weekly recap focuses on Russia's use of mercenaries, understanding how extremist movements operate online, trends in the commercial space market, and more.

    Apr 15, 2022

  • Illustration of online extremists by Jessica Arana/RAND Corporation from Sean Rayford/Alamy; dem10/Getty Images; sestovic/Getty Images; Dilok Klaisataporn/Getty Images; Comstock/Getty Images

    Report

    How Extremism Operates Online

    Extremist groups use internet-based tools for financing, networking and coordination, recruitment and radicalization, inter- and intra-group knowledge transfer, and mobilization to action. How do internet users engage with these efforts? And can the internet be leveraged to counter extremism?

    Apr 12, 2022

  • A biohazard warning symbol and social media icons over a city, images by petrovv and soulcld/Getty Images; design by Rick Penn-Kraus/RAND Corporation

    Report

    Social Media Can Provide Insights About Chemical Weapons Incidents

    Social media can be collected instantly, can tap into a massive pool of observers, and is remotely accessible. Researchers developed a new approach for analyzing social media data to derive insights about chemical incidents. They used chemical weapons employment in Syria as a test case.

    Mar 21, 2022

  • An application that helps Lithuanians to call Russians to discuss the war in Ukraine in an effort to help end the war, in Vilnius, Lithuania, March 9, 2022, photo by Janis Laizans/Reuters

    Commentary

    Keeping Russians Informed About Ukraine Could Help End This War

    Russia has taken increasingly aggressive actions to restrict access of information about the war in Ukraine. Ensuring that the Russian people know the truth about what their government is doing in Ukraine could bring this war to an end soon rather than later.

    Mar 14, 2022

  • Journal Article

    Journal Article

    It's Getting Harder to Do: Countering Terrorist Use of the Internet

    Terrorists continue to use the Internet to plan, train, recruit, and execute terrorist attacks. This book chapter examines how terrorist Internet use has changed over time and new social media platforms make terrorism investigations harder to do.

    Mar 9, 2022

  • Journal Article

    Journal Article

    Conspiracy Theories Have Much in Common. Their Differences May Hold the Key to Identifying When They Turn Violent.

    RAND/Google collaboration to improve machine learning models to detect and understand the rhetorical functions of conspiracy theories over social media.

    Dec 22, 2021