Extremist groups have been trolling the internet for decades, and they have learned to temper their words and disguise their intentions. A new scorecard can help users—or parents, or advertisers, or the social media companies themselves—understand when they might be interacting with extremist content.
Social media can be used to raise awareness of the Army among the public, but it's especially important for potential recruits and the adults who might influence them. An analysis of how people are engaging with GoArmy.com and the Army's Facebook and Twitter accounts suggests ways the Army could improve its outreach strategy.
Technology has transformed how people get information. But it has also affected the way that information is produced, shared, and disseminated. How much has the presentation of news actually changed over the last three decades?
In what ways has news reporting in print, on television, and online changed over the last 30 years? Overall, there has been a shift toward more-subjective reporting, but many of the changes have been subtle.
Facebook's Mark Zuckerberg has called for new internet regulation starting in four areas: harmful content, election integrity, privacy, and data portability. But why stop there? His proposal could be expanded to include much more: security-by-design, net worthiness, and updated internet business models.
Counterterrorism finance strategies have reduced terrorist access to official currencies. Will terrorist groups therefore increase their use of digital cryptocurrencies? New ones have emerged, including some that claim to be more private and secure than Bitcoin, but they also have limitations that make them less viable.
Terrorism has become an internet-enabled abuse—incited, propagated, and sometimes organized and concealed by online activity. Who should be held accountable for abusive content, the author or the publisher? And what role should the government play in regulating it?
Identifying the responsible party behind malicious cyber incidents is necessary for holding bad actors accountable. But there are many challenges that accompany cyber attribution. Creating an independent, global organization that investigates and publicly assigns blame for major hacks could help.
As tech-based systems have become all but indispensable, many institutions might assume user data will be reliable, meaningful and, most of all, plentiful. But what if this data became unreliable, meaningless, or even scarce?
Video technology is changing the ways that law enforcement works and interacts with the public. In this report, the authors explore some of the challenges posed and innovation needs in this emerging area.
The importance of social media in projecting violent extremist propaganda and recruiting foreign fighters is well documented. As ISIS attempts to regroup and recuperate, investigating its use of information and communication technologies could be important to understanding the group's plans to regain territorial control.
Efforts to counter violent extremism online have grown, but measuring their impact is complicated. An assessment of one such campaign finds that individuals searching for violent jihadist or far-right content clicked on ads that offered alternative narratives at a rate on par with industry standards.
Data breaches and cyberattacks cross geopolitical boundaries, targeting individuals, corporations and governments. Creating a global body with a narrow focus on investigating and assigning responsibility for cyberattacks could be the first step to creating a digital world with accountability.
Wireless communications play an important role in generating economic prosperity and opportunity, yet there are few empirically driven estimates on how WiFi contributes to the economy. RAND researchers filled this gap by estimating the potential economic value of the 5.9 GHz frequency band.