The Internet

  • Server room data center with icon representing cloud storage

    Report

    Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

    Researchers discuss the challenge of accessing data in remote data centers, summarize the discussion of an expert panel, and provide a list of needs identified and prioritized by the panel to inform concerned communities and stakeholders.

    Apr 23, 2018

  • News Release

    RAND Identifies New Strategies for Countering Russian Social Media Influence in Eastern Europe

    Russia is waging a social media campaign in the Baltics, Ukraine and nearby states to sow dissent against neighboring governments, as well as NATO and the European Union.

    Apr 12, 2018

  • A dark Russian sky with a binary code background

    Report

    How to Counter Russian Social Media Influence in Eastern Europe

    Russia uses social media in nearby states to sow dissent against neighboring governments and NATO. Options for countering the Kremlin's campaign include tracking and blocking propaganda more quickly and offering alternative content to help displace the Russian narrative.

    Apr 12, 2018

  • A scales of justice in a courtroom with jury seats in the background

    Report

    Strategies to Mitigate the Impact of Electronic Communication and Electronic Devices on the Right to a Fair Trial

    In this report, an expert panel identifies ways that electronic communication can impact the right to a fair trial and recommends strategies to protect witnesses from intimidation and jurors from compromising their independence.

    Apr 10, 2018

  • A man tests Estonia's internet voting system in Tallinn, February 19, 2007

    Commentary

    Online Voting: The Solution to Declining Political Engagement?

    The potential benefits of online voting merit a conversation across Europe about its increased use in elections, but the evidence is mixed on whether online voting actually helps to increase voter turnout.

    Mar 23, 2018

  • Paul Baran presents his work at a RAND Alumni Association breakfast on July 25, 2009

    Content

    Paul Baran and the Origins of the Internet

    RAND researcher Paul Baran developed a solution that has evolved into one of the major technological innovations of our time.

    Mar 22, 2018

  • Graphic of digital integrated network technology

    Testimony

    A Close Look at Data Thieves

    What do cyberattackers do with the data they steal? And how do they monetize it? Grouping hackers by their goals, motivations, and capabilities can shed light on these questions.

    Mar 15, 2018

  • Brochure

    A focus on cybersecurity

    Cybersecurity has risen to become a prominent issue of national and global security for governments and international organisations worldwide. A focus on cybersecurity looks at the issues and details RAND Europe's expertise and work in the area.

    Feb 15, 2018

  • Brochure

    Spotlight on 2017

    RAND Europe's annual review, Spotlight on 2017, features some of the objective research and analysis we do to help policy and decision makers keep pace with an ever-changing world.

    Jan 29, 2018

  • Shiny gold Bitcoin coin with gun on black background

    Commentary

    Bitcoin and the Dark Web: The New Terrorist Threat?

    Bitcoin has become the prominent currency of the dark web, which is often used to buy illegal goods, such as weapons and drugs. Anecdotal evidence suggests terrorists are using cryptocurrency and the dark web, but further investigation is needed.

    Jan 22, 2018

  • A child poses with a Lego Boost set, a predicted top seller this Christmas, at the Hamleys toy store in London, Britain, October 12, 2017

    Commentary

    Smart Toys May Pose Risks

    Parents shouldn't avoid buying smart toys during the holidays, particularly if these devices top children's Christmas lists. But parents should definitely be wary of the security and privacy risks that smart toys can pose.

    Dec 21, 2017

  • Criminal hiding behind a mask on computer screen asking the owner for money

    Commentary

    The WannaCry Cyber Attack Could Be the First of Many If the NHS Takes No Action

    In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.

    Dec 1, 2017

  • Blockchain cryptocurrency financial technology concept with binary code

    Commentary

    Blockchain: Should We Believe the Hype?

    Industry, governments and academics are all speculating on the ways in which blockchain could revolutionize everything from finance to the music industry. Now is the time for policymakers and industry to take note and find out what blockchain could offer.

    Nov 30, 2017

  • Computer hacker with magnifying glass

    Commentary

    It's Time for the International Community to Get Serious About Vulnerability Equities

    Multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It’s time for the international community to get serious about vulnerability equities.

    Nov 15, 2017

  • Congressman Adam Schiff speaks at a House Intelligence Committee meeting about Russian use of social media to influence U.S. elections, Washington, D.C., November 1, 2017

    Commentary

    Covert Influence Is the New Money Laundering

    Anti-money laundering laws provide lessons for combating covert influence operations, such as Russian meddling in the U.S. election. These laws could be adapted for online media models that do not require users to be paid customers.

    Nov 6, 2017

  • Trading information about Equifax and the company logo are displayed on a screen on the floor of the New York Stock Exchange, September 8, 2017

    Commentary

    The Equifax Breach: Yawn, or Yikes?

    In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.

    Nov 3, 2017

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Understanding the landscape of Distributed Ledger Technologies/Blockchain: Challenges, opportunities, and the prospects for standards

    This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.

    Oct 18, 2017

  • Report

    Civic engagement: How can digital technologies underpin citizen-powered democracy?

    The report provides an overview of an expert consultation on how digital technologies can be used to support citizen-powered democracy. It identifies key opportunities, risks and aspirations, as well as emerging ideas for delivering on this vision.

    Oct 11, 2017

  • Report

    Digital currency: Transacting and value exchange in the digital age

    The report gives an overview of expert discussions on trends in the use of digital transaction platforms and cryptocurrencies, and the implications for the wider economic, financial and social landscape.

    Oct 11, 2017