G2TT
来源类型Research Reports
规范类型报告
DOIhttps://doi.org/10.7249/RR1231
ISBN9780833091833
来源IDRR-1231-OSD
National Security Implications of Virtual Currency: Examining the Potential for Non-state Actor Deployment
Joshua Baron; Angela O'Mahony; David Manheim; Cynthia Dion-Schwarz
发表日期2015
出版年2015
页码96
语种英语
结论

Non-State Actors Can Use VCs to Disrupt Sovereignty and Increase Political and/or Economic Power, but Unlikely to Use Established VC; Many Challenges Posed by Creation of VCs

  • VC deployments are attractive in developing countries and in countries undergoing internal turmoil, where the existing financial infrastructure is either insufficient or weakened.
  • The rapid deployment of a VC over a large geographic area would likely be less complicated than deploying more common currencies, such as those based on commodities or paper-based currencies.
  • A non-state actor's VC (including Bitcoin-like currencies) would likely be vulnerable to cyber attack by a sophisticated adversary; more generally, creating new, usable yet reliable VC may pose great challenges, particularly for a non-state actor without technical sophistication.
  • Promoting adoption of VCs among population is difficult due to newness, lack of legitimacy, and familiarity with physical tangibility of currency.
  • Deployment of a VC by non-state actors, such terrorist organizations, insurgent groups, drug cartels, and other criminal organizations, would be easier if supported by a nation-state with advanced cyber expertise.
  • Despite numerous hurdles, trends indicate a future in which VCs could be deployed by non-state actors or other organizations.

VCs Are Vulnerable to Attacks, Especially by a Technologically Sophisticated Adversary

  • It would be difficult for a non-state actor to structurally design a VC that would be both resilient to attack and usable by all persons in the non-state actor's geographic area of influence.
  • Unsophisticated attacks are possible by governments, other non-state actors, and users of another VC; more sophisticated attackers could target services that are more centralized, even for decentralized VCs, such as digital wallets and, if applicable, mining pools.

Development and Implementation of VCs Could Add to Security-Related Technological Developments That Could Aid Non-State Actors

  • VCs demonstrate a resilient means of storing data in a highly distributed fashion that is very hard to corrupt; possible implications of this include information dissemination (blogs, social media, forums, news websites) that is eventually completely resilient to nation-state interference.
  • The need to develop security mechanisms for VCs could encourage the development of advanced cryptographic techniques, such as secure multiparty computation, which seeks to perform distributed computation while preserving the confidentiality of inputs and outputs in the presence of malicious activity.
  • VCs represent the latest step toward decentralized cyber services. In particular, the historical trend suggests the development of a resilient public cyber key terrain, which this report defines as the ability of unsophisticated cyber actors to have persistent, assured access to cyber services regardless of whether a highly sophisticated state actor opposes their use. This has implications for national firewalls, access to extremist rhetoric, the feasibility of nation-state cyber attacks, and the ability to maintain uninterruptible and anonymous encrypted links.
摘要
  • The Department of Defense should be aware of the following: (1) VCs are an increasingly technologically feasible tool for non-state actors to deploy in order to increase their political and/or economic power; (2) efforts to destabilize confidence in a new VC are effective, while popular sentiment is still untrusting of VCs for common transactions; (3) VCs are just like any other service in cyberspace, and methods to successfully attack them are not meaningfully different than for any other cyberspace operation; (4) decentralization affords more, though not total, resilience to disruptions from cyber attacks; (5) the trend toward decentralized cyber service will only make it easier for unsophisticated cyber actors to have increasingly resilient access to cyber services, which is a two-way street that could enable unprecedented global access to information and communication services that, at its core, is agnostic to the national security interests of the United States.
主题Banking and Financial Services ; Critical Infrastructure Protection ; Cyber and Data Sciences ; Cybercrime ; Cybersecurity ; Databases and Data Collection ; Analysis ; and Processing ; Electronic Commerce ; Information Privacy ; The Internet ; Terrorism Financing
URLhttps://www.rand.org/pubs/research_reports/RR1231.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/107947
推荐引用方式
GB/T 7714
Joshua Baron,Angela O'Mahony,David Manheim,et al. National Security Implications of Virtual Currency: Examining the Potential for Non-state Actor Deployment. 2015.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
x1495316199011.jpg(8KB)智库出版物 限制开放CC BY-NC-SA浏览
RAND_RR1231.pdf(753KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Joshua Baron]的文章
[Angela O'Mahony]的文章
[David Manheim]的文章
百度学术
百度学术中相似的文章
[Joshua Baron]的文章
[Angela O'Mahony]的文章
[David Manheim]的文章
必应学术
必应学术中相似的文章
[Joshua Baron]的文章
[Angela O'Mahony]的文章
[David Manheim]的文章
相关权益政策
暂无数据
收藏/分享
文件名: x1495316199011.jpg
格式: JPEG
文件名: RAND_RR1231.pdf
格式: Adobe PDF

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。