The Internet

Featured

  • A green wireframe model covers an actor's lower face during the creation of a synthetic facial reanimation video, aka a deepfake, in London, Britain, February 12, 2019, photo by Reuters TV

    Report

    The Threat of Deepfakes

    Various AI technologies are ripe for use in disinformation campaigns. Deepfake videos represent an obvious threat, but voice cloning, deepfake images, and generative text also merit concern. And websites now offer access to deepfake services.

    Jul 6, 2022

  • Man thinking at his laptop, photo by Shannon Fagan/Getty Images

    Essay

    How to Avoid Extremism on Social Media

    Extremist groups have been trolling the internet for decades, and they have learned to temper their words and disguise their intentions. A new scorecard can help users—or parents, or advertisers, or the social media companies themselves—understand when they might be interacting with extremist content.

    May 3, 2022

Explore The Internet

  • Testimony

    Testimony

    Strategies for Defending U.S. Government Networks in Cyberspace: Addendum

    Document submitted on July 31, 2015 as an addendum to testimony presented before the House Homeland Security Committee, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies on June 24, 2015.

    Aug 3, 2015

  • World map, connected people icons, and binary code

    Commentary

    War on the Web

    While the U.S. Cyber Command is preparing the nation's defenses for the coming ramp-up in cyberwarfare-like attacks, the messages spread instantly by hordes of attackers through social media may not be receiving the attention they deserve.

    Jul 23, 2015

  • Identify theft illustration

    Commentary

    U.S. Needs a New Electronic Identity-Protection Strategy to Prevent 'Hybrid Warfare' Attacks

    The U.S. government needs to develop a strategy to protect its citizens that includes a unique identifying number or code and a method for protecting these identity keys in online transactions.

    Jul 6, 2015

  • News Release

    News Release

    Internet Freedom Software Tools Developed by the United States Do Not Facilitate Cybercrime

    Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are numerous alternative technologies that are better suited.

    Jun 30, 2015

  • A smartphone is used to photograph a Red Shirt rally in Bangkok, Thailand

    Report

    Internet Freedom Software Tools Do Not Facilitate Cybercrime

    Software tools created by the U.S. State Department to encourage the free flow of information online and on mobile phone networks are not likely to be used by criminals to pursue illegal activities. While some have the potential to be used for illicit purposes, there are alternative technologies that are better suited.

    Jun 30, 2015

  • Network hub and cable

    Testimony

    Strategies for Defending U.S. Government Networks in Cyberspace

    Hackers, including state and non-state actors, are continuing to find opportunities to penetrate U.S. government networks. Defending these networks will require a systems approach.

    Jun 24, 2015

  • News Release

    News Release

    Companies Are Making Cybersecurity a Greater Priority, but Hackers Still May Be Gaining

    While worldwide spending on cybersecurity is close to $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

    Jun 10, 2015

  • An information security illustration superimposed over a businesswoman holding a tablet

    Report

    Companies Are Prioritizing Cybersecurity, but Hackers Still May Be Gaining

    While spending on cybersecurity is $70 billion a year and growing, many chief information security officers believe that hackers may gain the upper hand in two to five years, requiring a continual cycle of development and implementation of stronger and more innovative defensive measures.

    Jun 10, 2015

  • Man wearing camouflage using a laptop

    Commentary

    Social Media as a Tool for Reaching Veterans in Need of Mental Health Care

    Reaching veterans to learn more about their mental health care seeking poses a conundrum. They are typically recruited for studies in clinical settings, so those who are not seeking care are not represented. Facebook may be a viable method to reach them.

    Jun 9, 2015

  • NYPD officers interact with pedestrians in Central Park, Manhattan, May 22, 2011

    Report

    Strengthening Trust Between Police and the Public

    Amid recent tensions between law enforcement and the public, three key questions must be answered to build the foundation for long-lasting mutual trust, especially given technological changes that are increasing transparency.

    May 1, 2015

  • Hand touching tablet behind social media diagram and map

    Commentary

    The Clash of Internet Civilizations: Why Neither Side Should Prevail

    The debate over net neutrality pits two opposing philosophies against each other — one pushing for the continued evolution of the Internet as an open information superhighway, the other asserting that the Internet's evolution needs to take more account of the many ways it is and will be used.

    Apr 10, 2015

  • Man on laptop at night

    Report

    Problematic Internet Use and Well-Being: Recommendations for the Air Force

    Problematic Internet use (PIU) is a mental health issue that can have serious consequences. With an estimated 6 percent of Airmen suffering from PIU, what can the U.S. Air Force do to help with treatment and prevention?

    Mar 20, 2015

  • News Release

    News Release

    The Costs of Mobile 'Not-Spots'

    Rural areas lacking a mobile phone signal (“not-spots”) experience a negative impact on businesses of all sizes, and could suffer detrimental effects to the long-term sustainability of communities. Residents and visitors would be willing to pay for better mobile coverage.

    Mar 12, 2015

  • Man on a bench in countryside using mobile

    Report

    The Costs of Mobile “Not-Spots”

    Rural areas lacking a mobile phone signal (“not-spots”) experience a negative impact on businesses of all sizes, and could suffer detrimental effects to the long-term sustainability of communities. Residents and visitors would be willing to pay for better mobile coverage.

    Mar 12, 2015

  • Farmer using a smartphone and tablet PC while standing in his field

    Report

    Estimating the value of mobile telephony in mobile network not-spots: Summary

    This study uses stated preference discrete choice experiments to quantify the value that residents and businesses in not-spot areas and local visitors and tourists to these areas are willing to pay for mobile phone coverage.

    Mar 12, 2015

  • Group of young students studying in the classroom with a laptop

    Report

    Education, Technology and Connectedness: Global Societal Trends to 2030

    The spread of technology and its relationship to education will transform the education and power of citizens, forming a significant societal challenge for the European Union in the coming decades.

    Feb 12, 2015

  • Brochure

    Brochure

    Spotlight on 2014

    Spotlight 2014 is RAND Europe’s annual review. We present our research to support policymaking in four areas of transformation: harnessing the power of ICT, safeguarding society, building healthier communities and innovating for efficiency.

    Jan 27, 2015

  • Report

    Report

    Public Perception of Security and Privacy: Results of the comprehensive analysis of PACT's pan-European Survey

    This study reports public preferences for security, surveillance and privacy across 27 European Member States measured using a stated preference survey. It focuses on three real life contexts: metro travel, internet use and health records.

    Jan 27, 2015

  • Service members working in the Global Strategic Warning and Space Surveillance System Center

    Commentary

    Put a Cybercop on the Beat

    What remains vitally needed is legislation that would grant at least one capable government organization the authority to track cyber-intruders and -criminals with the same freedom and speed of maneuver that these adversaries enjoy, while protecting the civil liberties and freedoms that allowed the establishment of the Internet.

    Jan 22, 2015

  • Horizon over the water, sunrise or sunset

    Project

    Foresight and Optimisation in Horizon 2020

    As digital technology becomes more relevant in diverse aspects of our economy and society, it is important to anticipate changes in technology and how we use it. This understanding is particularly important for Horizon 2020, the EU’s 7-year research and innovation funding programme.

    Jan 12, 2015