National Security Implications of Virtual Currency Examining the Potential for Non-state Actor Deployment

This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. This report should be of interest to policymakers interested in techno...

Full description

Saved in:
Bibliographic Details
Main Author: Baron, Joshua (auth)
Other Authors: O'Mahony, Angela (auth), Manheim, David (auth), Dion-Schwarz, Cynthia (auth)
Format: Electronic Book Chapter
Language:English
Published: RAND Corporation 2015
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000naaaa2200000uu 4500
001 doab_20_500_12854_115584
005 20231005
003 oapen
006 m o d
007 cr|mn|---annan
008 20231005s2015 xx |||||o ||| 0|eng d
020 |a j.ctt19rmd78 
020 |a 9780833093691 
020 |a 9780833091833 
040 |a oapen  |c oapen 
024 7 |a 10.7249/j.ctt19rmd78  |c doi 
041 0 |a eng 
042 |a dc 
072 7 |a UB  |2 bicssc 
072 7 |a UR  |2 bicssc 
072 7 |a UBW  |2 bicssc 
072 7 |a JPWL  |2 bicssc 
072 7 |a TJK  |2 bicssc 
100 1 |a Baron, Joshua  |4 auth 
700 1 |a O'Mahony, Angela  |4 auth 
700 1 |a Manheim, David  |4 auth 
700 1 |a Dion-Schwarz, Cynthia  |4 auth 
245 1 0 |a National Security Implications of Virtual Currency  |b Examining the Potential for Non-state Actor Deployment 
260 |b RAND Corporation  |c 2015 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a This report examines the feasibility for non-state actors, including terrorist and insurgent groups, to increase their political and/or economic power by deploying a virtual currency (VC) for use in regular economic transactions. This report should be of interest to policymakers interested in technology, counterterrorism, and intelligence and law enforcement issues, as well as for VC and cybersecurity researchers. 
540 |a All rights reserved  |4 http://oapen.org/content/about-rights 
546 |a English 
650 7 |a Information technology: general issues  |2 bicssc 
650 7 |a Computer security  |2 bicssc 
650 7 |a Internet: general works  |2 bicssc 
650 7 |a Terrorism, armed struggle  |2 bicssc 
650 7 |a Communications engineering / telecommunications  |2 bicssc 
653 |a Technology 
653 |a Political Science 
856 4 0 |a www.oapen.org  |u https://www.jstor.org/stable/10.7249/j.ctt19rmd78  |7 0  |z DOAB: download the publication 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/115584  |7 0  |z DOAB: description of the publication