The Internet

Featured

  • Graphic depicting quantum computing, design by Alyson Youngblood/RAND Corporation

    Article

    Quantum Computers Will Break the Internet, but Only If We Let Them

    Apr 8, 2020

    Quantum computers are expected to be powerful enough to break the current cryptography that protects all digital communications. But this scenario is preventable if policymakers take actions now to minimize the harm that quantum computers may cause.

  • Woman using smartphone

    Tool

    What's Being Done to Fight Disinformation Online

    Nov 12, 2019

    With the rise of the internet and social media, false or intentionally misleading information can spread further and faster than ever before. What tools exist to fight disinformation online?

Explore The Internet

  • Spider web

    Report

    Growth of the Online Illicit Drugs Trade

    Silk Road was the first major online marketplace for illegal goods on the hidden web. Since the FBI took it down in 2013, copycats have filled the void. Transactions for illicit drugs on cryptomarkets have tripled and revenues have doubled.

    Aug 5, 2016

  • Guo Shengkun, China's Minister of Public Security, speaks during the Second U.S.-China High-Level Joint Dialogue on Cybercrime and Related Issues in Beijing, China, June 14, 2016

    Commentary

    The U.S.-China Cyber Agreement: A Good First Step

    The 2015 U.S.-China cyber agreement is a potentially important first step toward addressing the problem of Chinese espionage. But it is by no means a final step.

    Aug 1, 2016

  • Russian President Vladimir Putin speaks with journalists after a live broadcast nationwide call-in, Moscow, April 14, 2016

    Report

    Russia's “Firehose of Falsehood” Propaganda Model

    Russia's propaganda model is high-volume and multichannel, and it disseminates messages without regard for the truth. It is rapid, continuous, and repetitive, and it does not commit to consistency.

    Jul 11, 2016

  • Eyeball on a laptop computer screen

    Essay

    The Digital Underworld: What You Need to Know

    A growing threat is emanating from a digital underworld where hackers sell their services like mercenaries and credit-card numbers can be had for pennies on the dollar.

    Jun 24, 2016

  • Hands on a keyboard in a dark room

    Commentary

    Cyberterrorism and the Role of Silicon Valley

    As national security and war are being redefined for the digital age, Silicon Valley will need to be on the front line of counterterrorism. Its inventors and entrepreneurs are driving the information revolution, and they must figure out how to protect vital systems against malevolent intrusions.

    Jun 13, 2016

  • Illustration of data encryption

    Blog

    RAND's Lillian Ablon Presents 'Lessons from a Hacker'

    Lillian Ablon, a cybersecurity and emerging technologies researcher, spoke at a RAND Policy Circle Conversation on the world's expanding cyber vulnerability, those who are out there to take advantage of those vulnerabilities, as well as consumer attitudes toward breaches.

    Jun 1, 2016

  • Congressional Briefing Podcast

    Multimedia

    Getting to Yes with China in Cyberspace: Is It Possible?

    In this May 2016 congressional briefing, RAND experts Scott W. Harold and Martin Libicki discuss the differing perspectives and interests of the United States and China in cyberspace.

    May 2, 2016

  • Cloud computing and lightning

    Commentary

    Cloud Computing: Can Data Localization Threaten Future Growth?

    A growing number of constraints have been imposed around the world on information in the cloud, fueling concerns that the Internet—the economic engine of the information age—may become hopelessly fragmented.

    Apr 29, 2016

  • News Release

    One-Fourth of American Adults Notified of Data Breach in Past Year; Few Consumers Penalize Hacked Companies

    About a quarter of American adults reported that they were notified about their personal information being part of a data breach in the previous year, but only 11 percent of those who have ever been notified say they stopped doing business with the hacked company afterwards.

    Apr 13, 2016

  • Infographic

    Data Theft Victims, and Their Response to Breach Notifications

    This infographic highlights the results of a study of consumer attitudes toward data breaches, notifications of those breaches, and company responses to such events.

    Apr 13, 2016

  • Woman typing into a laptop

    Report

    Few Consumers Penalize Hacked Companies for Data Breaches

    About a quarter of American adults surveyed reported that they received a data breach notification in the past year, but 77 percent of them were highly satisfied with the company's post-breach response. Only 11 percent of respondents stopped dealing with the company afterwards.

    Apr 13, 2016

  • U.S. sailors assigned to Navy Cyber Defense Operations Command monitor, analyze, detect, and respond to unauthorized activity within U.S. Navy information systems and networks

    Commentary

    The Online Fight Against ISIS

    To prevail against ISIS in cyberspace, the United States and its cyber soldiers will have to be capable of reacting quickly, while being guided by an overarching strategy. Secretary of Defense Carter urged U.S. Cyber Command to intensify the fight against ISIS but it would also be wise to recruit civilian volunteers.

    Apr 1, 2016

  • U.S. President Barack Obama shakes hands with Chinese President Xi Jinping at the start of the climate summit in Paris, November 30, 2015

    Report

    Getting to Yes with China in Cyberspace

    The tensions that divide the United States and China apply just as much to cyberspace as to relations in the physical world. Can the two countries achieve meaningful outcomes through formal negotiations over cyber norms and rules?

    Mar 22, 2016

  • Report

    Evaluation of CalMHSA Student Mental Health Online Resources

    Analysis of visitors to CalMHSA-funded student mental health websites shows that visitors at educational institutions comprised the largest audience segment and promotional campaigns likely increased traffic.

    Mar 14, 2016

  • Women gather by a memorial for the victims of the March 11, 2004 train bombings at Atocha station, in Madrid

    Commentary

    Fighting Terrorism and Radicalisation in Europe

    Since the terrorist attack in Madrid 12 years ago, the threat of terrorism has not diminished. But counter-terrorism efforts have become more sophisticated across Europe, taking aim at the root causes of terrorism before actual attacks take place.

    Mar 11, 2016

  • A fish-eye view of a rack of computers

    Report

    Using Big Data to Identify the Concerns of Potential Army Recruits

    How has interest in military careers evolved over time and by geographic location? And what are potential recruits' biggest concerns related to the Army? Anonymous data from Internet searches can provide insight.

    Mar 9, 2016

  • Three young people on smartphones

    Report

    Attitudes Toward Local and National Government Expressed Over Chinese Social Media

    How can social media provide perspective on how the Chinese public feels about domestic political issues, such as the environment, food safety, and local versus national government?

    Mar 4, 2016

  • Pieces of an iPhone are seen on a repair store counter in New York City, February 17, 2016

    Commentary

    The Cost of Security in the iPhone Era

    As the security on the iPhone better protects users from criminals, it also excels at keeping law enforcement from accessing the data. The dispute between the FBI and Apple over unlocking the iPhone of one of the San Bernardino attackers continues but the real debate is about whether society wants legislation that weakens iPhone security for law enforcement.

    Feb 26, 2016

  • Cybersecurity "leak"

    Multimedia

    Emerging Cyber Threats and Implications

    Cyberspace is expanding, becoming more vulnerable, and hosting increasingly vast amounts of data. Compounding this challenge is the growing number of bad actors seeking to exploit cyberspace. What steps can be taken to help mitigate emerging threats and improve U.S. cybersecurity?

    Feb 25, 2016

  • Group of friends holding their smart phones

    Commentary

    How You Can Be Cybersecurity's Strongest Asset

    Technology is thoroughly embedded within the average person's life but security is not emphasized to the general user. Teaching the importance of security early on and continually bringing awareness to the public could help temper technology-based attacks.

    Feb 18, 2016