Cover
Title Page
Copyright
Preface
Contents
Tables
Summary
Acknowledgments
Abbreviations
CHAPTER ONE: Introduction
Methodology
Organization of This Report
CHAPTER TWO: How Terrorist Groups Use Money
Receipt
Management and Transfer
Spending
Terrorist Organizations’ Current and Future Needs for Cryptocurrency
Conclusion
CHAPTER THREE: Limitations of Current Cryptocurrency Systems for Terrorist Use
Anonymity
Usability
Security
Acceptance
Reliability
Implications of the Properties of Cryptocurrencies
Conclusion
CHAPTER FOUR: Cyberattacks on Cryptocurrency
Classification of Attacks Against Cryptocurrency Use
Usefulness of Different Attack Types Against Terrorist Organizations
Differences in Vulnerabilities for More Sophisticated Cryptocurrencies
Conclusion
Factors Increasing the Viability of Cryptocurrency Use
Factors Decreasing the Viability of Cryptocurrency Use
Conclusion
CHAPTER SIX: Conclusions
APPENDIX: Cryptocurrencies: A Short Primer
Bibliography