During the pandemic, both Russia and China used authoritarian power over the media to manipulate the news. What can be done to better detect such propaganda campaigns—and guard against them in the future?
By the early 2010s, it was clear that the internet provided white supremacists and other extremists a tool to operationalize their hateful ideas and cause real-world harms. How can the average user understand their risk of exposure to extremist content and make informed decisions about the platforms they use?
In the UK, the National Health Service (NHS) was one of the organizations most severely affected by the WannaCry ransomware. The NHS and other public sector organizations need to improve their cybersecurity processes and quickly before a more severe cyber attack takes place.
Industry, governments and academics are all speculating on the ways in which blockchain could revolutionize everything from finance to the music industry. Now is the time for policymakers and industry to take note and find out what blockchain could offer.
Multiple countries around the world are likely discovering, retaining and exploiting zero-day vulnerabilities without a process to properly consider the trade-offs. This needs to change. It’s time for the international community to get serious about vulnerability equities.
Anti-money laundering laws provide lessons for combating covert influence operations, such as Russian meddling in the U.S. election. These laws could be adapted for online media models that do not require users to be paid customers.
In cases where personal information is exposed, such as the Equifax data breach, it is critical that consumers take steps to ensure their information is not abused. The simplest and perhaps the most effective way to enhance personal digital security is to protect account credentials using password management software.
The personal and financial data of almost 146 million U.S. consumers has been compromised by the Equifax breach, the latest in a long line of high-profile hacks. Do consumers worry enough about such breaches? And what options are available to Congress?
This report analyses the current landscape of Distributed Ledger Technologies (DLT) / Blockchain. The study examines the issues that are central to its development in conjunction with the potential role of standardization to support its growth.
The report provides an overview of an expert consultation on how digital technologies can be used to support citizen-powered democracy. It identifies key opportunities, risks and aspirations, as well as emerging ideas for delivering on this vision.
The report gives an overview of expert discussions on trends in the use of digital transaction platforms and cryptocurrencies, and the implications for the wider economic, financial and social landscape.
The report summarises the conclusions of an expert consultation exploring how citizens are increasingly becoming involved in scientific research. It investigates the benefits and challenges that citizen science poses for different stakeholders.
Hezbollah's information warfare portfolio includes newspapers, social media outlets, television programming, and a major internet presence. Its websites reflect the group's diverse agenda and aim to be multi-generational in their approach, offering information about social services as well as a video game to engage youth.
Advances in digital technology can connect businesses and consumers, develop new and niche markets, and commodify new activities. As the exchange of goods and services evolves, what are the societal impacts?
In the late 1960s and early '70s, RAND released a series of reports about cable television — the technology, federal and state regulation, and its use in education. The researchers' interactive vision for cable TV was a lot like the internet.
Hacked devices and intellectual property theft are a rich hunting ground for policy development. The challenge posed by Internet-connect devices is only getting worse as the number of online devices continues to grow.
The Islamic State's caliphate is collapsing but its legacy will live on virtually because of its information operations. The scale of the menace presented by the group today pales in comparison to other global challenges, yet it manages to dominate and terrorize the public mind.
An exercise with participants from government, industry, think tanks, academia, and the media explored opportunities to improve cyber security and inform Australia's strategy. Recommendations include creating and enforcing technology security standards, crafting international agreements to address challenges, and increasing awareness to keep users safe online.
This Perspective explores the potential impacts that digital technologies may have on the nature of civic engagement and political processes, providing an overview of the opportunities and risks associated with the use of these technologies.
This document provides a detailed description of the RAND American Life Panel methodology related to sample recruitment, sample retention, and weighting and should be of use for users of the panel and as general reference material.
Despite its small size compared to the offline market, the ability of the dark web to anonymously arm individuals of all backgrounds needs to be taken seriously. Its potential impact on international security is significant.
The illegal sales on the dark web of firearms, weapons, explosives, and banned digital guides on homemade products present challenges for law enforcement agencies and national governments. Its potential to anonymously arm criminals and terrorists, as well as vulnerable and fixated individuals, is the most dangerous aspect.