National security implications of virtual currency : examining the potential for non-state actor deployment
"This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. A VC, such as Bitcoin, is a digital representation of value that...
Saved in:
: | |
---|---|
VerfasserIn: | |
TeilnehmendeR: | |
Place / Publishing House: | [Place of publication not identified] : RAND National Defense Research Institute, 2015 |
Year of Publication: | 2015 |
Language: | English |
Series: | Research report National security implications of virtual currency
|
Notes: | Bibliographic Level Mode of Issuance: Monograph |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628654004498 |
---|---|
ctrlnum |
(CKB)3710000000595157 (SSID)ssj0001622557 (PQKBManifestationID)16358975 (PQKBTitleCode)TC0001622557 (PQKBWorkID)14917791 (PQKB)11553645 (EXLCZ)993710000000595157 |
collection |
bib_alma |
record_format |
marc |
spelling |
Baron, Joshua William Author National security implications of virtual currency : examining the potential for non-state actor deployment National Security Implications of Virtual Currency [Place of publication not identified] RAND National Defense Research Institute 2015 text txt computer c online resource cr Research report National security implications of virtual currency Bibliographic Level Mode of Issuance: Monograph English "This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. A VC, such as Bitcoin, is a digital representation of value that can be transferred, stored, or traded electronically and that is neither issued by a central bank or public authority, nor necessarily attached to a fiat currency (dollars, euros, etc.), but is accepted by people as a means of payment. We addressed the following research questions from both the technological and political-economic perspectives: (1) Why would a non-state actor deploy a VC? That is, what political and/or economic utility is there to gain? How might this non-state actor go about such a deployment? What challenges would it have to overcome? (2) How might a government or organization successfully technologically disrupt a VC deployment by a non-state actor, and what degree of cyber sophistication would be required? (3) What additional capabilities become possible when the technologies underlying the development and implementation of VCs are used for purposes broader than currency?"--Page 4 of printed paper wrapper. Introduction -- The current state of virtual currencies -- Can virtual currencies increase political power? -- Technical challenges to virtual currency deployment -- Implications beyond currency -- Conclusions and future research -- Appendix. Rating cyber threat sophistication by tiers. Digital currency Political aspects National security Economic aspects Non-state actors (International relations) Finance Terrorism Banking HILCC Finance HILCC Business & Economics HILCC Dion-Schwarz, Cynthia Author Manheim, David, Contributor Manheim, David, Author O'Mahony, Angela Contributor O'Mahony, Angela Author United States Content Provider 0-8330-9183-2 |
language |
English |
format |
Book |
author |
Baron, Joshua William Dion-Schwarz, Cynthia Manheim, David, O'Mahony, Angela |
spellingShingle |
Baron, Joshua William Dion-Schwarz, Cynthia Manheim, David, O'Mahony, Angela National security implications of virtual currency : examining the potential for non-state actor deployment Research report National security implications of virtual currency Introduction -- The current state of virtual currencies -- Can virtual currencies increase political power? -- Technical challenges to virtual currency deployment -- Implications beyond currency -- Conclusions and future research -- Appendix. Rating cyber threat sophistication by tiers. |
author_facet |
Baron, Joshua William Dion-Schwarz, Cynthia Manheim, David, O'Mahony, Angela Dion-Schwarz, Cynthia Manheim, David, Manheim, David, O'Mahony, Angela O'Mahony, Angela United States United States |
author_variant |
j w b jw jwb c d s cds d m dm a o ao |
author_role |
VerfasserIn VerfasserIn VerfasserIn VerfasserIn |
author2 |
Dion-Schwarz, Cynthia Manheim, David, Manheim, David, O'Mahony, Angela O'Mahony, Angela United States |
author2_variant |
d m dm a o ao |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_corporate |
United States |
author_sort |
Baron, Joshua William |
title |
National security implications of virtual currency : examining the potential for non-state actor deployment |
title_full |
National security implications of virtual currency : examining the potential for non-state actor deployment |
title_fullStr |
National security implications of virtual currency : examining the potential for non-state actor deployment |
title_full_unstemmed |
National security implications of virtual currency : examining the potential for non-state actor deployment |
title_auth |
National security implications of virtual currency : examining the potential for non-state actor deployment |
title_alt |
National Security Implications of Virtual Currency |
title_new |
National security implications of virtual currency : examining the potential for non-state actor deployment |
title_sort |
national security implications of virtual currency : examining the potential for non-state actor deployment |
series |
Research report National security implications of virtual currency |
series2 |
Research report National security implications of virtual currency |
publisher |
RAND National Defense Research Institute |
publishDate |
2015 |
contents |
Introduction -- The current state of virtual currencies -- Can virtual currencies increase political power? -- Technical challenges to virtual currency deployment -- Implications beyond currency -- Conclusions and future research -- Appendix. Rating cyber threat sophistication by tiers. |
isbn |
0-8330-9369-X 0-8330-9183-2 |
callnumber-first |
H - Social Science |
callnumber-subject |
HG - Finance |
callnumber-label |
HG1710 |
callnumber-sort |
HG 41710 B37 42015 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT baronjoshuawilliam nationalsecurityimplicationsofvirtualcurrencyexaminingthepotentialfornonstateactordeployment AT dionschwarzcynthia nationalsecurityimplicationsofvirtualcurrencyexaminingthepotentialfornonstateactordeployment AT manheimdavid nationalsecurityimplicationsofvirtualcurrencyexaminingthepotentialfornonstateactordeployment AT omahonyangela nationalsecurityimplicationsofvirtualcurrencyexaminingthepotentialfornonstateactordeployment AT unitedstates nationalsecurityimplicationsofvirtualcurrencyexaminingthepotentialfornonstateactordeployment AT baronjoshuawilliam nationalsecurityimplicationsofvirtualcurrency AT dionschwarzcynthia nationalsecurityimplicationsofvirtualcurrency AT manheimdavid nationalsecurityimplicationsofvirtualcurrency AT omahonyangela nationalsecurityimplicationsofvirtualcurrency AT unitedstates nationalsecurityimplicationsofvirtualcurrency |
status_str |
c |
ids_txt_mv |
(CKB)3710000000595157 (SSID)ssj0001622557 (PQKBManifestationID)16358975 (PQKBTitleCode)TC0001622557 (PQKBWorkID)14917791 (PQKB)11553645 (EXLCZ)993710000000595157 |
carrierType_str_mv |
cr |
is_hierarchy_title |
National security implications of virtual currency : examining the potential for non-state actor deployment |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1796653695061983233 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03280cam-a2200517zu-4500</leader><controlfield tag="001">993628654004498</controlfield><controlfield tag="005">20230717162851.0</controlfield><controlfield tag="008">160829s2015 xx o eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-9369-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)3710000000595157</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0001622557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)16358975</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0001622557</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)14917791</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11553645</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)993710000000595157</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">PQKB</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">HG1710.B37 2015</subfield></datafield><datafield tag="088" ind1=" " ind2=" "><subfield code="a">RR-1231-OSD</subfield></datafield><datafield tag="100" ind1=" " ind2=" "><subfield code="a">Baron, Joshua William</subfield><subfield code="e">Author</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">National security implications of virtual currency : examining the potential for non-state actor deployment</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">National Security Implications of Virtual Currency</subfield></datafield><datafield tag="264" ind1="3" ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">RAND National Defense Research Institute</subfield><subfield code="c">2015</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Research report National security implications of virtual currency</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Bibliographic Level Mode of Issuance: Monograph</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. A VC, such as Bitcoin, is a digital representation of value that can be transferred, stored, or traded electronically and that is neither issued by a central bank or public authority, nor necessarily attached to a fiat currency (dollars, euros, etc.), but is accepted by people as a means of payment. We addressed the following research questions from both the technological and political-economic perspectives: (1) Why would a non-state actor deploy a VC? That is, what political and/or economic utility is there to gain? How might this non-state actor go about such a deployment? What challenges would it have to overcome? (2) How might a government or organization successfully technologically disrupt a VC deployment by a non-state actor, and what degree of cyber sophistication would be required? (3) What additional capabilities become possible when the technologies underlying the development and implementation of VCs are used for purposes broader than currency?"--Page 4 of printed paper wrapper.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- The current state of virtual currencies -- Can virtual currencies increase political power? -- Technical challenges to virtual currency deployment -- Implications beyond currency -- Conclusions and future research -- Appendix. Rating cyber threat sophistication by tiers.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Digital currency</subfield><subfield code="x">Political aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">National security</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Non-state actors (International relations)</subfield><subfield code="x">Finance</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Banking</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Finance</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business & Economics</subfield><subfield code="2">HILCC</subfield></datafield><datafield tag="700" ind1=" " ind2=" "><subfield code="a">Dion-Schwarz, Cynthia</subfield><subfield code="e">Author</subfield></datafield><datafield tag="700" ind1=" " ind2=" "><subfield code="a">Manheim, David,</subfield><subfield code="e">Contributor</subfield></datafield><datafield tag="700" ind1=" " ind2=" "><subfield code="a">Manheim, David,</subfield><subfield code="e">Author</subfield></datafield><datafield tag="700" ind1=" " ind2=" "><subfield code="a">O'Mahony, Angela</subfield><subfield code="e">Contributor</subfield></datafield><datafield tag="700" ind1=" " ind2=" "><subfield code="a">O'Mahony, Angela</subfield><subfield code="e">Author</subfield></datafield><datafield tag="710" ind1="1" ind2=" "><subfield code="a">United States</subfield><subfield code="e">Content Provider</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-9183-2</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-10-30 04:11:01 Europe/Vienna</subfield><subfield code="d">00</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2016-02-14 09:39:21 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350533070004498&Force_direct=true</subfield><subfield code="Z">5350533070004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350533070004498</subfield></datafield></record></collection> |