The Internet

Featured

  • Cyber Security Threats

    Multimedia

    Strategies for Minimizing Cybersecurity Risks

    Feb 24, 2021

    RAND senior international/defense researcher Quentin Hodgson presents strategies for minimizing cybersecurity risks that can be implemented at individual, organizational, national, and international levels.

  • SpaceX Starlink mission, <a href="https://www.flickr.com/photos/spacex/47926144123/">photo</a> by SpaceX/ <a href="https://creativecommons.org/licenses/by-nc/2.0/">CC BY 2.0</a>

    Commentary

    Satellite Internet Services—Fostering the Dictator's Dilemma?

    Apr 12, 2021

    The ability to provide relatively low cost internet access outside of government control is both a challenge for authoritarian states and an opportunity for democracies. What are low-altitude, low-latency satellites and why are authoritarian states so concerned?

Explore The Internet

  • Social network icons focused on Africa section of world map, overlaid on photo of hand holding a mobile phone, photo by Igor/Adobe Stock

    Journal Article

    Social Media in Africa: A Double-Edged Sword for Security and Development: Research Brief

    The United Nations Development Programme commissioned RAND Europe to explore social media use and its links to online radicalisation in Africa. The study analysed the social media use of three Islamist terrorist groups across seven countries.

    Nov 5, 2018

  • Journal Article

    Journal Article

    Social Media in Africa: A Double-Edged Sword for Security and Development

    The United Nations Development Programme commissioned RAND Europe to explore social media use and its links to online radicalisation in Africa. The study analysed the social media use of three Islamist terrorist groups across seven countries.

    Nov 5, 2018

  • Journal Article

    Journal Article

    Social Media in Africa: A Double-Edged Sword for Security and Development

    The United Nations Development Programme commissioned RAND Europe to explore social media use and its links to online radicalisation in Africa. The study analysed the social media use of three Islamist terrorist groups across seven countries.

    Nov 5, 2018

  • Journal Article

    Journal Article

    Social Media in Africa: A Double-Edged Sword for Security and Development: Technical Annex

    An annex of supporting information for the report, containing thematic content in relation to the countries examined and the three case study terrorist groups analysed, alongside content relating to the Twitter data analysis and interviews conducted.

    Nov 5, 2018

  • The Security Operation Centre for Telstra, Australia's biggest telecoms firm, which is used to monitor, detect and respond to security incidents, including cyber attacks, in Sydney, Australia, August 24, 2017

    Commentary

    Financial Frameworks for Cybersecurity Are Failing

    Cybersecurity has become a team sport. But all participants on the field are playing without clear rules, without a team approach, and without knowing when to pass the ball or to whom.

    Oct 25, 2018

  • Journal Article

    Journal Article

    The Trade in Small Arms and Light Weapons on the Dark Web: A Study

    A summary of the main findings and implications of the first empirical study investigating the scale and scope of arms trafficking on the dark web, illustrating the range of weapons traded, their market price and most common transit routes.

    Oct 24, 2018

  • Woman's eye with technology of security concept

    Commentary

    The Perils of Connecting Our Bodies to the Internet

    High-tech health care solutions are part of an emerging sector of medical technologies that monitor personal health data by essentially connecting your body to the Internet. As smart devices in health care evolve, the line between human and machine is blurring, and creating new concerns about consumer safety and privacy rights.

    Oct 15, 2018

  • Cybersecurity locks illustration superimposed over a photo of Tokyo at night

    Report

    Preparing for Cybersecurity Threats to the 2020 Olympics

    The Olympic Games are an attractive target for hackers. An examination of Japan's cybersecurity threat landscape and lessons from past events can help planners reduce cybersecurity risks in advance of the 2020 Tokyo Games.

    Oct 4, 2018

  • Report

    Report

    An Evaluation of New Mexico's Online Intake System for Civil Legal Aid

    This report describes an evaluation of the online intake system for civil legal aid that New Mexico implemented in April 2016 to better assess the effects online intake systems might have in practice.

    Sep 28, 2018

  • Testimony

    Testimony

    Russian Social Media Influence: Understanding Russian Propaganda in Eastern Europe: Addendum

    Document submitted August 30, 2018, as an addendum to testimony before the Senate Select Committee on Intelligence on August 1, 2018.

    Aug 31, 2018

  • The Facebook logo is pictured during the Viva Tech start-up and technology summit in Paris, France, May 25, 2018

    Commentary

    Freedom of the Internet 'Press'

    The First Amendment enables companies such as Facebook to publish what they choose. Arguing against this right could lead to government regulation over digital media. It could also further degrade the reliability of online information.

    Aug 10, 2018

  • RAND researcher Anna Elizabeth 'Nancy' Nimitz, September 1, 1958

    Content

    A Brief History of RAND

    RAND was incorporated as a nonprofit corporation in 1948. From its early years to the present, RAND research is characterized by its objectivity and nonpartisanship, its quality and scientific rigor, and its dedication to improving policymaking on the most pressing issues of the day.

    Aug 3, 2018

  • Report

    Report

    Developing Cybersecurity Capacity: A proof-of-concept implementation guide

    This document is a proof-of-concept operational toolbox designed to facilitate the development of national-level cybersecurity capacity building programmes and of holistic policy and investment strategies to tackle challenges in the cyber domain.

    Aug 2, 2018

  • Vehicles of Russian state-controlled broadcaster Russia Today are seen near Red Square in Moscow, Russia, June 15, 2018

    Testimony

    Russia's Social Media Influence in Eastern Europe

    Russia is engaged in an active, worldwide propaganda campaign, but it is particularly interested in targeting its western border. What can the United States and allied governments do to limit Russian influence in the region?

    Aug 1, 2018

  • Social network illustration superimposed over a city at night

    Report

    How Police Could Use Social Media and Social Network Analysis

    Social media and social network analysis could help law enforcement monitor for safety threats, identify those at high risk for involvement in violence, and investigate crimes and crime networks. But computer security, privacy, and civil rights protections must be in place before using these tools.

    Jul 18, 2018

  • A group of colleagues using their smart phones in synchronicity.

    Multimedia

    Protecting Consumer Data: Considerations for Congress

    Should consumers be in charge of self-regulating the data they share and how companies use it? What policy opportunities could Congress consider to better protect consumer data? In this RAND Congressional briefing, Rebecca Balebako and John Davis discuss the benefits and risks of data sharing, opportunities for protecting privacy at both the personal and industry level, and current U.S. laws and how they compare to European laws.

    Jun 8, 2018

  • Clockwise from top left: RAND's JOHNNIAC mainframe computer, the RAND Tablet, a mobile phone, and an autonomous vehicle

    Essay

    70 Years of Innovation at RAND

    Seventy years ago, a group of researchers established the independent RAND Corporation. From the first satellite design, to helping ensure GPS as a public good, to laying the groundwork for the internet, RAND has been making a difference ever since.

    May 9, 2018

  • Malware or virus inside microchip on electronic circuit

    Commentary

    What Do Meltdown, Spectre, and RyzenFall Mean for the Future of Cybersecurity?

    Unlike most previous cyber threats, a new wave of vulnerabilities attack a computer's hardware, rather than its software. What does this mean for cybersecurity as a whole?

    May 3, 2018

  • A tablet displaying a voting website

    Commentary

    E-enabled Elections: The Future of Overseas Voting in Europe?

    Interest in technological solutions for elections is at an all-time high, but there are only a few mature online voting systems to learn from. Countries seeking to pilot e-enabled elections can learn from Estonia and others, but should also learn from those that never made it to full implementation.

    Apr 26, 2018

  • Server room data center with icon representing cloud storage

    Report

    Identifying Law Enforcement Needs for Access to Digital Evidence in Remote Data Centers

    Researchers discuss the challenge of accessing data in remote data centers, summarize the discussion of an expert panel, and provide a list of needs identified and prioritized by the panel to inform concerned communities and stakeholders.

    Apr 23, 2018