The Internet

Featured

  • A person looks at a COVID-19 news update on their cell phone, photo by svetikd/Getty Images

    Report

    Tracking News Manipulation by Malicious State Actors

    Nov 15, 2021

    During the pandemic, both Russia and China used authoritarian power over the media to manipulate the news. What can be done to better detect such propaganda campaigns—and guard against them in the future?

  • A woman with a smartphone is seen in front of social media logos, May 25, 2021, photo by Dado Ruvic/Reuters

    Report

    Understanding the Online Extremist Ecosystem

    Dec 2, 2021

    By the early 2010s, it was clear that the internet provided white supremacists and other extremists a tool to operationalize their hateful ideas and cause real-world harms. How can the average user understand their risk of exposure to extremist content and make informed decisions about the platforms they use?

Explore The Internet

  • Report

    Report

    Thought Leadership programme 2016: Key Findings

    Key findings from the 2016 Thought Leadership Programme, convened by Corsham Institute in conjunction with RAND Europe and St George's House exploring opportunities and challenges created by digital technologies in society.

    Oct 13, 2016

  • A 3D printed logo of Twitter and an Islamic State flag

    Commentary

    Fighting the Islamic State on Social Media

    Countering ISIL in the real world also requires countering its messaging online. It is critical that the U.S. and its international partners work with influential communities in the region that can more effectively and credibly counter the ISIL narrative.

    Oct 11, 2016

  • Concept of leaky software, data pouring out of pipe

    Commentary

    Digital Theft: The New Normal

    Absolute data breach prevention is not possible, so knowing what people want when it happens is important. Consumers and corporations alike should accept this risk as a “when,” not an “if,” and prepare for it.

    Oct 10, 2016

  • Report

    Report

    Social change and public engagement with policy and evidence

    This report offers an overview of emerging social trends which may affect public engagement with evidence and policy in Britain. It was produced to provide background for a workshop hosted by Sense about Science and the Nuffield Foundation.

    Oct 6, 2016

  • Research Brief

    Research Brief

    Accelerating the Internet of Things in the UK: Linking policy with practice

    Using insights from Internet of Things (IoT) implementations and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the IoT in the UK.

    Oct 4, 2016

  • Report

    Report

    Accelerating the Internet of Things in the UK: Using policy to support practice

    Using insights from businesses and informed users of technology, RAND Europe carried out a study to support a process for policy feedback that will inform the development and adoption of the Internet of Things in the UK.

    Oct 4, 2016

  • A police officer working on a computer in a patrol car

    Report

    Future Communications Technologies Could Strengthen Law Enforcement

    A workshop with 41 experts on both law enforcement operations and broadband technologies identified needs for technology initiatives and how law enforcement could best use future capabilities while mitigating potential risks.

    Sep 26, 2016

  • News Release

    News Release

    Cost of Cyber Incidents Not Large Compared with Other Business Losses; May Influence Responses by Businesses

    Data breaches have made headlines in recent years, exposing poor practices that put the personal information of millions of consumers at risk. But the cost of a typical cyber breach is much less than generally estimated, providing one possible explanation for why American companies do not invest more to improve computer security.

    Sep 20, 2016

  • A man counting pills on his laptop

    Commentary

    Dark Web Likely Isn't Fuelling International Drug Sales

    Vendors in the Netherlands have developed a fairly successful international trade of ecstasy-type drugs and stimulants from online markets, but it appears that most countries are selling illicit drugs within their own borders.

    Sep 19, 2016

  • Russian President Vladimir Putin signs a visitors' book at the former home of Russian writer Leo Tolstoy in Yasnaya Polyana, September 8, 2016

    Commentary

    Russian Propaganda Is Pervasive, and America Is Behind the Power Curve in Countering It

    Even as Washington pursues cooperation with Moscow on Syria and other issues, America should expose Russia's obsession with propaganda and disinformation.

    Sep 12, 2016

  • News Release

    News Release

    U.S. Social Media Strategy Can Weaken ISIS Influence on Twitter

    On Twitter, there are six times more ISIS opponents than supporters, but those who support ISIS are more active. U.S. officials could help ISIS opponents enhance the effectiveness and reach of their messaging by offering social media training.

    Aug 16, 2016

  • The ISIS hashtag is seen typed into a Twitter smartphone app, February 6, 2016

    Report

    Examining ISIS Support and Opposition on Twitter

    ISIS uses Twitter to inspire followers, recruit fighters, and spread its message. Its opponents use Twitter to denounce the group. An analysis of the communities opposed to ISIS suggests inroads for influence that the U.S. government's social media strategy should explore.

    Aug 16, 2016

  • News Release

    News Release

    Untangling the 'Dark Web': New Study Shows Steady Growth of the Online Illicit Drugs Trade

    The number of transactions for illicit drugs on cryptomarkets, which exist on the “dark web,” have tripled and revenues have doubled since 2013, when Silk Road 1.0 was shut down by the FBI.

    Aug 8, 2016

  • Research Brief

    Research Brief

    The role of the 'dark web' in the trade of illicit drugs

    The Internet has fundamentally changed ways of doing business, including the operations of illegal markets. RAND Europe was commissioned to investigate the role of the Internet in facilitating the drugs trade, particularly in the Netherlands.

    Aug 5, 2016

  • Spider web

    Report

    Growth of the Online Illicit Drugs Trade

    Silk Road was the first major online marketplace for illegal goods on the hidden web. Since the FBI took it down in 2013, copycats have filled the void. Transactions for illicit drugs on cryptomarkets have tripled and revenues have doubled.

    Aug 5, 2016

  • Guo Shengkun, China's Minister of Public Security, speaks during the Second U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues in Beijing, China, June 14, 2016

    Commentary

    The U.S.-China Cyber Agreement: A Good First Step

    The 2015 U.S.-China cyber agreement is a potentially important first step toward addressing the problem of Chinese espionage. But it is by no means a final step.

    Aug 1, 2016

  • Russian President Vladimir Putin speaks with journalists after a live broadcast nationwide call-in, Moscow, April 14, 2016

    Report

    Russia's “Firehose of Falsehood” Propaganda Model

    Russia's propaganda model is high-volume and multichannel, and it disseminates messages without regard for the truth. It is rapid, continuous, and repetitive, and it does not commit to consistency.

    Jul 11, 2016

  • Eyeball on a laptop computer screen

    Essay

    The Digital Underworld: What You Need to Know

    A growing threat is emanating from a digital underworld where hackers sell their services like mercenaries and credit-card numbers can be had for pennies on the dollar.

    Jun 24, 2016

  • Hands on a keyboard in a dark room

    Commentary

    Cyberterrorism and the Role of Silicon Valley

    As national security and war are being redefined for the digital age, Silicon Valley will need to be on the front line of counterterrorism. Its inventors and entrepreneurs are driving the information revolution, and they must figure out how to protect vital systems against malevolent intrusions.

    Jun 13, 2016

  • Illustration of data encryption

    Blog

    RAND's Lillian Ablon Presents 'Lessons from a Hacker'

    Lillian Ablon, a cybersecurity and emerging technologies researcher, spoke at a RAND Policy Circle Conversation on the world's expanding cyber vulnerability, those who are out there to take advantage of those vulnerabilities, as well as consumer attitudes toward breaches.

    Jun 1, 2016