"Who might face civil liability if autonomous vehicles (AVs) are hacked to steal data or inflict mayhem, injuries, and damage? How will the civil justice and insurance systems adjust to handle such claims? RAND researchers addressed these questions to help those in the automotive, technology, legal, and insurance industries prepare for the shifting roles and responsibilities that the era of AVs may bring."
"Supporting Human Rights Without Enabling Criminals Sasha Romanosky, Martin
C. Libicki, Zev Winkelman, Olesya Tkacheva. cation number] messaging on
BlackBerrys and even Apple iMessage.”5 Conversations with security and
Internet freedom experts concluded that criminals also use Skype, instant
messaging, Internet relay chat,6 Reddit, Facebook, encrypted email, and stolen
cell phones. A recent report further described black-market tech ..."
"The authors assess how the U.S. business community viewed Trump administration policies designed to counter China's anticompetitive economic behaviors and how to improve support from the business community in U.S. competition with China."
"Russia employs a sophisticated social media campaign against former Soviet states that includes news tweets, nonattributed comments on web pages, troll and bot social media accounts, and fake hashtag and Twitter campaigns. Nowhere is this threat more tangible than in Ukraine. Researchers analyzed social media data and conducted interviews with regional and security experts to understand the critical ingredients to countering this campai ..."
"This report describes commercial practices for cyber workforce management and organization, as determined from a literature review and interviews with reputable organizations that have similarities to the U.S. Air Force (USAF). These practices are applicable to USAF as it endeavors to improve the management of its cyber forces. The authors describe the basis for each practice, the benefits it conveys, and how it could be implemented by ..."
""In this report, several authors explore the concept of undergoverned spaces (UGS) and the concepts, challenges, and prospects for developing new approaches to long-term competition in open-ended or infinite games within the context of UGS."
"Thomas S. Szayna, Eric V. Larson, Angela O'Mahony, Sean Robson, Agnes
Gereben Schaefer, Miriam Matthews, J. Michael Polich, Lynsay Ayer, Derek
Eaton, William Marcellino, Lisa Miyashiro, Marek N. Posard, James Syme, Zev
Winkelman, Cameron Wright, Megan Zander-Cotugno, William Welser (IV). many
in the Middle East who do not support the Islamic State.3 While ISIS supporters
talk up themes of defending Islam, recruiting new fighters, p ..."
"This report examines the ongoing debate about the Islamic State in Iraq and Syria (ISIS) on Arabic Twitter to better understand the Twitter networks of ISIS supporters and opponents, using a mixed-methods analytic approach to identify and characterize in detail both support and opposition networks. The authors draw on community detection algorithms, lexical analysis to identify key themes and content, and social network analysis."
"Understanding Russian Propaganda in Eastern Europe Todd C. Helmus,
Elizabeth Bodine-Baron, Andrew Radin, Madeline Magnuson, Joshua
Mendelsohn, William Marcellino, Andriy Bega, Zev Winkelman. Ultimately ... One
U.S. official observed that it is a “great think tank” and suggested that the United
States would be well served to contribute U.S. analysts to the international body.
He suggested that ..."
"related term to refer to ISIS in at least 80 percent of their tweets (4 million tweets
with 67 million words), and the other was composed of all tweets from users who
employed Daesh or a related term to refer to the organization in at least 80
percent of their tweets (18 million tweets with 316 million words). Applying lexical
analysis methods such as log likelihood scores and collocates3 to test these two
corpora against each othe ..."
"Supporting Human Rights Without Enabling Criminals Sasha Romanosky, Martin
C. Libicki, Zev Winkelman, Olesya Tkacheva. http://pandora.nla.gov.au/pan/
10850/20110125–1520/ ... with Bernd Kreuss of TorChat,” Free Software
Foundation, August 26, 2013. As of June 9, 2015: https://www.fs.f.org/blogs/
licensing/interview-with-bernd-kreuss-of-torchat Joof, Modou S., “Internet Is Being
Used as a Platform for Nefarious and Satanic Purposes,” ..."
"The work featured four workstreams: (1) identifying and integrating disparate data sources to identify the most-critical vulnerabilities and software applications in the U.S. internet protocol space; (2) collecting original data to map the ..."