G2TT
来源类型Report
规范类型报告
DOIhttps://doi.org/10.7249/RR1231
来源IDRR-1231-OSD
National Security Implications of Virtual Currency: Examining the Potential for Non-state Actor Deployment
Joshua Baron; Angela O'Mahony; David Manheim; Cynthia Dion-Schwarz
发表日期2015-12-16
出版年2015
语种英语
结论

Non-State Actors Can Use VCs to Disrupt Sovereignty and Increase Political and/or Economic Power, but Unlikely to Use Established VC; Many Challenges Posed by Creation of VCs

  • VC deployments are attractive in developing countries and in countries undergoing internal turmoil, where the existing financial infrastructure is either insufficient or weakened.
  • The rapid deployment of a VC over a large geographic area would likely be less complicated than deploying more common currencies, such as those based on commodities or paper-based currencies.
  • A non-state actor's VC (including Bitcoin-like currencies) would likely be vulnerable to cyber attack by a sophisticated adversary; more generally, creating new, usable yet reliable VC may pose great challenges, particularly for a non-state actor without technical sophistication.
  • Promoting adoption of VCs among population is difficult due to newness, lack of legitimacy, and familiarity with physical tangibility of currency.
  • Deployment of a VC by non-state actors, such terrorist organizations, insurgent groups, drug cartels, and other criminal organizations, would be easier if supported by a nation-state with advanced cyber expertise.
  • Despite numerous hurdles, trends indicate a future in which VCs could be deployed by non-state actors or other organizations.

VCs Are Vulnerable to Attacks, Especially by a Technologically Sophisticated Adversary

  • It would be difficult for a non-state actor to structurally design a VC that would be both resilient to attack and usable by all persons in the non-state actor's geographic area of influence.
  • Unsophisticated attacks are possible by governments, other non-state actors, and users of another VC; more sophisticated attackers could target services that are more centralized, even for decentralized VCs, such as digital wallets and, if applicable, mining pools.

Development and Implementation of VCs Could Add to Security-Related Technological Developments That Could Aid Non-State Actors

  • VCs demonstrate a resilient means of storing data in a highly distributed fashion that is very hard to corrupt; possible implications of this include information dissemination (blogs, social media, forums, news websites) that is eventually completely resilient to nation-state interference.
  • The need to develop security mechanisms for VCs could encourage the development of advanced cryptographic techniques, such as secure multiparty computation, which seeks to perform distributed computation while preserving the confidentiality of inputs and outputs in the presence of malicious activity.
  • VCs represent the latest step toward decentralized cyber services. In particular, the historical trend suggests the development of a resilient public cyber key terrain, which this report defines as the ability of unsophisticated cyber actors to have persistent, assured access to cyber services regardless of whether a highly sophisticated state actor opposes their use. This has implications for national firewalls, access to extremist rhetoric, the feasibility of nation-state cyber attacks, and the ability to maintain uninterruptible and anonymous encrypted links.
摘要

This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. A VC, such as Bitcoin, is a digital representation of value that can be transferred, stored, or traded electronically and that is neither issued by a central bank or public authority, nor necessarily attached to a fiat currency (dollars, euros, etc.), but is accepted by people as a means of payment. We addressed the following research questions from both the technological and political-economic perspectives: (1) Why would a non-state actor deploy a VC? That is, what political and/or economic utility is there to gain? How might this non-state actor go about such a deployment? What challenges would it have to overcome? (2) How might a government or organization successfully technologically disrupt a VC deployment by a non-state actor, and what degree of cyber sophistication would be required? (3) What additional capabilities become possible when the technologies underlying the development and implementation of VCs are used for purposes broader than currency? This report should be of interest to policymakers interested in technology, counterterrorism, and intelligence and law enforcement issues, as well as for VC and cybersecurity researchers.

目录 National Security Implications of Virtual Currency: Examining the Potential for Non-state Actor Deployment | RAND
主题Banking and Financial Services ; Crime ; Critical Infrastructure Protection ; Cyber and Data Sciences ; Cybercrime ; Cybersecurity ; Data Privacy ; Data Science ; Electronic Commerce ; Health Information Privacy ; The Internet ; Terrorism Financing ; Transportation Security
URLhttps://www.rand.org/pubs/research_reports/RR1231.html
来源智库RAND Corporation (United States)
引用统计
资源类型智库出版物
条目标识符http://119.78.100.153/handle/2XGU8XDN/522920
推荐引用方式
GB/T 7714
Joshua Baron,Angela O'Mahony,David Manheim,et al. National Security Implications of Virtual Currency: Examining the Potential for Non-state Actor Deployment. 2015.
条目包含的文件
文件名称/大小 资源类型 版本类型 开放类型 使用许可
RAND_RR1231.pdf(735KB)智库出版物 限制开放CC BY-NC-SA浏览
x1495316199011.jpg.p(4KB)智库出版物 限制开放CC BY-NC-SA浏览
个性服务
推荐该条目
保存到收藏夹
导出为Endnote文件
谷歌学术
谷歌学术中相似的文章
[Joshua Baron]的文章
[Angela O'Mahony]的文章
[David Manheim]的文章
百度学术
百度学术中相似的文章
[Joshua Baron]的文章
[Angela O'Mahony]的文章
[David Manheim]的文章
必应学术
必应学术中相似的文章
[Joshua Baron]的文章
[Angela O'Mahony]的文章
[David Manheim]的文章
相关权益政策
暂无数据
收藏/分享
文件名: RAND_RR1231.pdf
格式: Adobe PDF
文件名: x1495316199011.jpg.pagespeed.ic.fun22l63Mn.jpg
格式: JPEG

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。