The Internet

Featured

  • Capt. Sarah Miller and Tech. Sgt. Carrol Brewster discuss options in response to a staged cyber attack during filming of a scene for an AFRC mission video at Joint Base San Antonio-Lackland, Texas, June 1, 2019, photo by Maj. Christopher Vasquez/U.S. Air Force

    Report

    Combating Foreign Disinformation on Social Media

    Jul 19, 2021

    Disinformation campaigns on social media pose a nuanced threat. But much of the U.S. response remains ad hoc and uncoordinated. It's unclear who has the edge moving forward, because disinformation techniques and countermeasures are evolving simultaneously.

  • SpaceX Starlink mission, <a href="https://www.flickr.com/photos/spacex/47926144123/">photo</a> by SpaceX/ <a href="https://creativecommons.org/licenses/by-nc/2.0/">CC BY 2.0</a>

    Commentary

    Satellite Internet Services—Fostering the Dictator's Dilemma?

    Apr 12, 2021

    The ability to provide relatively low cost internet access outside of government control is both a challenge for authoritarian states and an opportunity for democracies. What are low-altitude, low-latency satellites and why are authoritarian states so concerned?

Explore The Internet

  • Credit cards, a chain, an open padlock, and a computer keyboard are visible next to the Equifax logo

    Commentary

    Equifax and the Data-Breach Era

    The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?

    Oct 18, 2017

  • Report

    Report

    Understanding the landscape of Distributed Ledger Technologies/Blockchain: Challenges, opportunities, and the prospects for standards

    This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.

    Oct 18, 2017

  • Report

    Report

    Civic engagement: How can digital technologies underpin citizen-powered democracy?

    The report provides an overview of an expert consultation on how digital technologies can be used to support citizen-powered democracy. It identifies key opportunities, risks and aspirations, as well as emerging ideas for delivering on this vision.

    Oct 11, 2017

  • Report

    Report

    Digital currency: Transacting and value exchange in the digital age

    The report gives an overview of expert discussions on trends in the use of digital transaction platforms and cryptocurrencies, and the implications for the wider economic, financial and social landscape.

    Oct 11, 2017

  • Report

    Report

    Open science: The citizen's role in and contribution to research

    The report summarises the conclusions of an expert consultation exploring how citizens are increasingly becoming involved in scientific research. It investigates the benefits and challenges that citizen science poses for different stakeholders.

    Oct 11, 2017

  • Supporters of Lebanon's Hezbollah leader Sayyed Hassan Nasrallah listen to him via a screen during a rally marking the 11th anniversary of the end of Hezbollah's 2006 war with Israel, in Khiam, Lebanon, August 13, 2017

    Commentary

    How Hezbollah Came to Dominate Information Warfare

    Hezbollah's information warfare portfolio includes newspapers, social media outlets, television programming, and a major internet presence. Its websites reflect the group's diverse agenda and aim to be multi-generational in their approach, offering information about social services as well as a video game to engage youth.

    Sep 19, 2017

  • A man uses an Apple Watch to demonstrate the mobile payment service Apple Pay at a cafe in Moscow, Russia, October 3, 2016

    Report

    Digital Technology and the Future of Commerce

    Advances in digital technology can connect businesses and consumers, develop new and niche markets, and commodify new activities. As the exchange of goods and services evolves, what are the societal impacts?

    Aug 30, 2017

  • Two girls on a couch watching TV while eating popcorn

    Blog

    How RAND Helped Cable TV Spread Far and Wide

    In the late 1960s and early '70s, RAND released a series of reports about cable television — the technology, federal and state regulation, and its use in education. The researchers' interactive vision for cable TV was a lot like the internet.

    Aug 25, 2017

  • Hacked internet of things

    Commentary

    Gaming Policy in Cyberspace

    Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.

    Aug 23, 2017

  • An Iraqi military HMMWV drives past an Islamic State sign in eastern Mosul after they captured it from IS

    Commentary

    The Islamic State May Be Failing, but Its Strategic Communications Legacy Is Here to Stay

    The Islamic State's caliphate is collapsing but its legacy will live on virtually because of its information operations. The scale of the menace presented by the group today pales in comparison to other global challenges, yet it manages to dominate and terrorize the public mind.

    Aug 17, 2017

  • Digital devices on a map of Australia

    Report

    Australia's Cyber Security Policy Options

    An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.

    Aug 7, 2017

  • Report

    Report

    Civic Engagement: How Can Digital Technology Encourage Greater Engagement in Civil Society?

    This Perspective explores the potential impacts that digital technologies may have on the nature of civic engagement and political processes, providing an overview of the opportunities and risks associated with the use of these technologies.

    Aug 7, 2017

  • Report

    Report

    The RAND American Life Panel: Technical Description

    This document provides a detailed description of the RAND American Life Panel methodology related to sample recruitment, sample retention, and weighting and should be of use for users of the panel and as general reference material.

    Jul 26, 2017

  • Computer hacker working on laptop late at night in office

    Commentary

    Connect, Buy-Now, Fire: How the Dark Web Allows Criminals to Buy Weapons—Anonymously

    Despite its small size compared to the offline market, the ability of the dark web to anonymously arm individuals of all backgrounds needs to be taken seriously. Its potential impact on international security is significant.

    Jul 25, 2017

  • News Release

    News Release

    US Weapons Main Source of Illegal Arms Trade on the Dark Web

    The illegal sales on the dark web of firearms, weapons, explosives, and banned digital guides on homemade products present challenges for law enforcement agencies and national governments. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect.

    Jul 19, 2017

  • A laptop computer, a 9mm handgun, and bullets

    Report

    U.S. Weapons Are the Main Source of Illegal Arms on the Dark Web

    Sixty percent of weapons on sale on the dark web come from the United States. This illicit market for firearms, explosives, and ammunition can anonymously arm criminals, terrorists, and others.

    Jul 19, 2017

  • A pedestrian looks at floral tributes for the victims of the attack on London Bridge and Borough Market, June 6, 2017

    Commentary

    Why Aren't There More Terrorist Attacks Like the One in London?

    The number of attacks like the one on London Bridge are low because jihadist ideologies have failed to gain traction in most Muslim countries, and it's difficult to recruit people remotely. Supporting violence and participating in it are two different things.

    Jun 7, 2017

  • A man holds a laptop computer as cyber code is projected on him

    Report

    Could Stateless Attribution Promote International Cyber Accountability?

    The public may respond to government claims about who is behind a cyberattack with suspicion and confusion. Could an independent, global organization for cyber attribution help?

    Jun 2, 2017

  • Blockchain vector background with various icons

    Journal Article

    Distributed Ledger Technologies/Blockchain: Challenges, Opportunities and the Prospects for Standards

    An overview of the current landscape of DLT/Blockchain developments and the issues that are central to the development of DLT/Blockchain.

    May 11, 2017

  • The word truth in fading black paint

    Q&A

    How RAND Is Responding to Truth Decay

    RAND's Michael Rich and Jennifer Kavanagh explain what “Truth Decay” is and discuss how ongoing RAND research could help counter it.

    May 5, 2017