{"id":28762,"date":"2014-04-24T07:34:23","date_gmt":"2014-04-24T07:34:23","guid":{"rendered":"http:\/\/ci027cfe77a0122697"},"modified":"2014-04-24T07:34:23","modified_gmt":"2014-04-24T07:34:23","slug":"u-s-navy-preparing-bitcoin-battalion-1398324863","status":"publish","type":"post","link":"https:\/\/bitcoinmagazine.com\/culture\/u-s-navy-preparing-bitcoin-battalion-1398324863","title":{"rendered":"U.S. Navy Preparing Bitcoin Battalion"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><figure><img decoding=\"async\" src=\"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/11\/us-navy-preparing-bitcoin-battalion.jpg\" title=\"\"><\/figure>\n<h2>Bitcoin Battalion<\/h2>\n<p>Back in December we <a href=\"https:\/\/bitcoinmagazine.com\/articles\/u-s-air-force-building-bitcoin-payment-gateway-1386005214\">reported<\/a> that the United States Air Force has quietly been working on a Bitcoin payment gateway otherwise known as a \u201csnack machine\u201d (yes you read that correctly). We also discussed that \u201ccurrency is like another class of supply, a commodity required to execute the battle.\u201d<\/p>\n<p>Recently, United States <a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/Programs\/Pages\/ukraine.aspx\" target=\"_blank\" rel=\"noopener\">sanctions<\/a> against the Kremlin for annexing Ukraine resulted in MasterCard and Visa suspending certain types of transactions in Russia (apparently due to the <a href=\"https:\/\/www.exportlawblog.com\/archives\/tag\/ofac-guidance\" target=\"_blank\" rel=\"noopener\">OFAC 50 rule<\/a>). OFAC or Office of Foreign Assets Control under the Department of U.S. Treasury maintains a list of different sanctions programs that it administers <a href=\"https:\/\/www.treasury.gov\/resource-center\/sanctions\/Programs\/Pages\/Programs.aspx\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<p>It has been <a href=\"https:\/\/www.reuters.com\/article\/ukraine-crisis-sanctions-smpbank\/russian-bank-smp-says-visa-mastercard-resume-services-idUSL5N0MK05G20140323\" target=\"_blank\" rel=\"noopener\">reported<\/a> that Visa did resume services with some Russian banks. I found an <a href=\"https:\/\/www.sec.gov\/Archives\/edgar\/data\/1403161\/000119312507169554\/ds4a.htm\" target=\"_blank\" rel=\"noopener\">old SEC filing<\/a> that may (or may not) shed some light how Visa is able to continue its relationship with certain banks under sanction:<\/p>\n<blockquote>\n<p>\u201c\u2026OFAC restricts financial dealings with Cuba, Iran, Myanmar and Sudan, as well as financial dealings with certain parties, such as identified money laundering fronts for terrorists or narcotics traffickers. While we prohibit financial institutions that are domiciled in those countries or are restricted parties from being Visa members, many Visa International members are non-U.S. financial institutions, and thus are not subject to OFAC restrictions. Accordingly, our payments system may be used for transactions in or involving countries or parties subject to OFAC-administered sanctions\u2026\u201d<\/p>\n<\/blockquote>\n<p>In any case, President Vladimir Putin now supports <a href=\"https:\/\/www.nasdaq.com\/news\/\" target=\"_blank\" rel=\"noopener\">plans<\/a> for Russia to create its own national payment system. Headlines such as \u201cRussia Reconsiders Bitcoin?\u201dhave begun to sprout up and this week Russia will be hosting its <a href=\"https:\/\/globalvoices.org\/2014\/04\/12\/russia-reconsiders-bitcoin\/\" target=\"_blank\" rel=\"noopener\">first Bitcoin conference.<\/a><\/p>\n<h2>US Army War College<\/h2>\n<p>This should come to no surprise to those who read <a href=\"https:\/\/www.csis.org\/people\/juan-c-zarate\" target=\"_blank\" rel=\"noopener\">Juan C. Zarate\u2019s<\/a><a href=\"http:\/\/strategicstudiesinstitute.army.mil\/pubs\/parameters\/issues\/Winter_2013\/9_Zarate.pdf\" target=\"_blank\" rel=\"noopener\">\u201cConflict by Other Means: The Coming Financial Wars\u201d<\/a> (PDF) published by the US Army War College Strategic Studies Institute Quarterly Parameters in its <a href=\"http:\/\/strategicstudiesinstitute.army.mil\/pubs\/parameters\/\" target=\"_blank\" rel=\"noopener\">Winter 2013-14 Issue<\/a>. Mr. Zarate has been called \u201ca chief architect of modern financial warfare\u201d and is a Senior Adviser for the Transnational Threats Project and Homeland Security and Counterterrorism Program, CSIS Senior National Security Consultant and Analyst for CBS News. Mr. Zarate also authored the memoir \u201c<a href=\"https:\/\/www.washingtonpost.com\/opinions\/treasurys-war-the-unleashing-of-a-new-era-of-financial-warfare-by-juan-c-zarate\/2013\/09\/27\/f33809b0-08ff-11e3-9941-6711ed662e71_story.html\" target=\"_blank\" rel=\"noopener\">Treasury\u2019s War: The Unleashing of a New Era of Financial Warfare<\/a>\u201d published by PublicAffairs.<\/p>\n<p>In \u201cConflict by Other Means: The Coming Financial Wars\u201d, Zarate writes that:<\/p>\n<blockquote>\n<p>\u201cCountries such as Russia and China will continue to challenge the dominance of the US-led international system and the dollar itself. If such attacks succeed, they could weaken the ability of the United States to affect or move private sector decision making in line with national security interests, regardless of what other governments do.\u201d<\/p>\n<\/blockquote>\n<p>and further:<\/p>\n<blockquote>\n<p>\u201cThe domain of financial warfare will no longer remain the sole province of American power. A wide array of state and nonstate actors may step up to wield economic power and influence in the twenty-first century.\u201d<\/p>\n<\/blockquote>\n<p>He discusses \u201cChallenges to U.S. Financial Power\u201d such as nontraditional currencies, Local Exchange Trading Systems (LETS), Community Exchange System (CES), bartering (e.g. ITEX) and of course Bitcoin:<\/p>\n<blockquote>\n<p>\u201c{Bad} actors have new digital tools {such as} bitcoin (BTC) \u2026a digital currency \u2026{which}\u2026 uses cryptography rather than central authorities to issue and transfer money. The result is that transactions are cheap, accounts cannot be frozen (unless users keep bitcoins in a separate third-party online wallet service), and there are no prerequisites or arbitrary limits for use\u2026\u201d<\/p>\n<\/blockquote>\n<h2>The Navy<\/h2>\n<p><em>\u201cRadical connectivity is blurring national lines and facilitating the transfer of virtual currency between otherwise disparate non-state actors.\u201d<\/em><\/p>\n<p>On March 19th (as amended April 10th), interested vendors began bidding on a <a href=\"https:\/\/www.bids.tswg.gov\/tswg\/bids.nsf\/Start?ReadForm&amp;9JBVJ7\" target=\"_blank\" rel=\"noopener\">Broad Agency Announcement (BAA)<\/a> project for the Technical Support Working Group (TSSWG) Combating Terrorism Technical Support Office (CTTSO) for the Navy Engineering Logistics Office of the Department of the Navy.<\/p>\n<p>Federal Business Opportunities (FBO) <a href=\"https:\/\/www.fbo.gov\/index?s=opportunity&amp;mode=form&amp;id=dde16c3287e01f9c4e23cef3e1593b83&amp;tab=core&amp;_cview=1\" target=\"_blank\" rel=\"noopener\">posting of Solicitation Number N41756-14-Q-3272<\/a> includes the keyword \u201cbitcoin.\u201d The BAA Includes \u201cR3861: Counter Threat Finance\u201d and \u201cR3830 Methods and Means to Systematically Discern and Display \u2018Precursors of Instability\u2019 In The Dark Web.\u201d These were introduced on January 30th in the unclassifiedPowerPoint presentationand corresponding \u201c<a href=\"https:\/\/www.bids.tswg.gov\/TSWG\/bids.nsf\/EEA9103328C2985885257C71005022CA\/$FILE\/APBIBook2014_PRINT.pdf\" target=\"_blank\" rel=\"noopener\">Advance Planning Briefing for Industry<\/a>\u201d (PDF) as part of a \u201cIrregular Warfare and Evolving Threats Mission\u201d which includes \u201coperational assessment, concept development, and independent validation of unique prototype capabilities to identify, confront, and defeat evolving threats.\u201d<\/p>\n<p>Some may find it unusual that the Navy was one of the original developers of the Dark Web. <a href=\"https:\/\/www.torproject.org\/about\/overview.html.en#inception\" target=\"_blank\" rel=\"noopener\">However<\/a>, \u201cTor was originally designed, implemented, and deployed as a third-generation onion routing project of the <a href=\"https:\/\/www.nrl.navy.mil\/\" target=\"_blank\" rel=\"noopener\">United States Naval Research Laboratory<\/a>\u2026for protecting government communications\u2026\u201d and provided funding <a href=\"https:\/\/www.torproject.org\/about\/sponsors\/\" target=\"_blank\" rel=\"noopener\">from 2006 through 2010<\/a>. Though I don\u2019t find this any more unusual than the Internet itself starting out as a project from the (Defense) Advanced Research Projects Agency called ARPANET (see \u201cDARPA and the Internet Revolution\u201d [PDF]).<\/p>\n<p>The Dark Web has been part of Bitcoin\u2019s \u201czeitgeist\u201d since Adrien Chen of Gawker published his infamous piece on Silk Road on June 1st, 2011 \u201c<a href=\"https:\/\/gawker.com\/the-underground-website-where-you-can-buy-any-drug-imag-30818160\" target=\"_blank\" rel=\"noopener\">The Underground Website Where You Can Buy Any Drug Imaginable<\/a>.\u201d It would take another two years before Adam B. Levine of Let\u2019s Talk Bitcoin and I would <a href=\"https:\/\/letstalkbitcoin.com\/users-bitcoins-seized-by-dea\" target=\"_blank\" rel=\"noopener\">uncover<\/a> that the Drug Enforcement Agency appeared to have infiltrated the Silk Road marketplace.<\/p>\n<p>Early in Bitcoin\u2019s history it was possible to send bitcoin via IP address (e.g. 172.16.254.1) rather than public bitcoin address (e.g. 1BTCorgHwCg6u2YSAWKgS17qUad6kHmtQW). In November 2009 Satoshi <a href=\"https:\/\/bitcointalk.org\/index.php?topic=7.msg30#msg30\" target=\"_blank\" rel=\"noopener\">reposted a request<\/a> from a user to make Bitcoin anonymous and Satoshi discussed privacy and TOR in this regards:<\/p>\n<blockquote>\n<p>\u201cWhen you send to a bitcoin address, you don\u2019t connect to the recipient. You send the transaction to the network the same way you relay transactions. There\u2019s no distinction between a transaction you originated and one you received from another node that you\u2019re relaying in a broadcast. With a very small network though, someone might still figure it out by process of elimination. It\u2019ll be better when the network is larger.<\/p>\n<p>If you send by IP, the recipient sees you because you connect to their IP. You could use TOR to mask that.<\/p>\n<p>You could use TOR if you don\u2019t want anyone to know you\u2019re even using Bitcoin.<\/p>\n<p>Bitcoin is still very new and has not been independently analyzed. If you\u2019re serious about privacy, TOR is an advisable precaution.\u201d<\/p>\n<\/blockquote>\n<p>Privacy is discussed in the <a href=\"https:\/\/bitcoin.org\/bitcoin.pdf\" target=\"_blank\" rel=\"noopener\">original Bitcoin whitepaper<\/a> (section 10) which mentions how Bitcoin keeps public keys \u201canonymous.\u201d Satoshi likely used TOR when he announced Bitcoin, published the whitepaper and maintained his status as a Bitcoin developer because his identity is unknown which proves that someone who is skillful a genius probably could stay anonymous within Bitcoin.<\/p>\n<p>Bitcoin doesn\u2019t have a gatekeeper. Fundamentally no one needs to ask permission to use Bitcoin or run a Bitcoin client making most financial blockades or sanctions at their core ineffectual. If and how Bitcoin will be used in \u201cbattle\u201d is a dystopian future that remains to be seen. As the Navy notice observes, \u201cRadical connectivity is blurring national lines and facilitating the transfer of virtual currency between otherwise disparate non-state actors.\u201d<\/p>\n<div class=\"youtube-embed\" data-video_id=\"AWlB98ILyAo\"><iframe loading=\"lazy\" title=\"Bitcoin: The Promise and Risks of Alternative Currencies\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/AWlB98ILyAo?feature=oembed&#038;enablejsapi=1\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<p>Following are R3830 and R3861 their entirety:<\/p>\n<h3>BAA for CTTSO\/TSWG Support<\/h3>\n<p>Solicitation Number: N41756-14-Q-3272<\/p>\n<p>Agency: Department of the Navy<\/p>\n<p>Office: Navy Engineering Logistics Office<\/p>\n<p>Location: TSWG<\/p>\n<p><strong>R3861 COUNTER THREAT FINANCE<\/strong><\/p>\n<p>This requirement is for innovative materiel and non-materiel solutions to develop and\/or enhance new concepts and constructs for understanding the role of virtual currencies in threat finance. The world\u2019s population grew by more than a billion people between 2010 and 2013, and by 2020, the number of Internet users is expected to double. Radical connectivity is blurring national lines and facilitating the transfer of virtual currency between otherwise disparate non-state actors. The introduction of virtual currency will likely shape threat finance by increasing the opaqueness, transactional velocity, and overall efficiencies of terrorist attacks. This requirement will explore the unique and required skills necessary to understand and react to the rapidly evolving architecture of threat finance networks within a radically connected hybrid warfare context and will develop solutions to combat vulnerabilities posed by virtual currencies.<\/p>\n<p>The proposed solutions should consider, but are not limited to, the following:<\/p>\n<p>\u2022 Identify relevant case studies from the last 20 years and explore how various funding instruments supported the flow of funds in support of threat finance networks. Determine the extent to which the nature, trajectory, velocity, and decision making supporting funds flows change with the introduction of virtual currencies into the systems.<\/p>\n<ul>\n<li>Determine the types of \u201cred flags\u201d that have emerged during the introduction of virtual currencies. Determine how these warning signs are being incorporated into future efforts to track ongoing funds flows supporting threat finance based business models. Determine how virtual currencies might alter threat finance models and whether it is possible to predict changes in its architecture.<\/li>\n<li>Determine how this information might be used to model and test the flow of funds using virtual currency for use both in predicting future attacks and in developing and deploying disruptive strategies to prevent them.<\/li>\n<li>Determine what capabilities can be used to implement effective countermeasures to identify and mitigate terrorist threats supported by new payment systems and how these capabilities can be enhanced or developed.<\/li>\n<li>Develop beta test protocols for testing virtual currency risks under a range of scenarios.<\/li>\n<\/ul>\n<p><strong>R3830 METHODS AND MEANS TO SYSTEMATICALLY DISCERN AND DISPLAY<\/strong><strong>\u201cPRECURSORS OF INSTABILITY\u201d IN THE DARK WEB<\/strong><\/p>\n<p>U.S. national security organizations and commands lack the ability to discern, understand, monitor, and where possible, make mitigation decisions against adverse phenomena in the Dark Web, a region of the Internet where activities such as trafficking in drugs, weapons, humans, and chemical, biological, nuclear, and radiological technologies in support of disruptive, nefarious actions goes undetected. Current methods and means for discerning instability inordinately emphasize detection well after disparate phenomena have catalyzed into crisis, therefore forcing policymakers and commanders to react rather than allowing for predictive and proactive measures.<\/p>\n<p>The objective of this requirement is the development of an automated capability to intuitively visualize geographic and functional areas of latent and\/or emergent instability in the Dark Web. For the purposes of this requirement, the Dark Web includes sites that are not indexed by major search engines and which are accessed by using anonymizing software (e.g., onion domains). Discerning, then monitoring latent instability manifest in<\/p>\n<p>Dark Web precursors would enable the development of more nuanced, contextually appropriate and proactive theater-strategic policy reflected in: 1) more efficient and effective strategic communications and military information support operations (MISO), 2) enhanced military-to-military engagements, and 3) with an emphasis on UNCLASSIFIED, \u201cshare-able\u201d information\/knowledge, the creation of \u201cshared understanding\u201d amongst partners and allies leading to combined mitigation actions.<\/p>\n<p>Lastly, and most critically, the emphasis on identifying precursors to allow detection well left of crisis on a timeline where 1) commander\u2019s mitigation options are more numerous, 2) the risks of execution are relatively low, 3) coordinated interagency collaboration and action has the greatest probability of success, and 4) access to Dark Web information is relatively high (acknowledging that the Dark Web, by definition, is already obscured by security and technical systems and protocols).<\/p>\n<p>Proposed Specifications and Key Performance <\/p>\n<p>Parameters:<\/p>\n<p>Automated capabilities\/specifications:<\/p>\n<ul>\n<li>Ability to crawl a prepopulated list of Dark Web sites and gather information.<\/li>\n<li>Ability to discover new sites in the Dark Web as they materialize (some level of latency is permissible, but this must be specified).<\/li>\n<li>Ability to automatically group\/categorize observed potential threats\/activities for analysis\/visualization by geographic and\/or functional area.<\/li>\n<li>Ability to visualize trends over time with respect to the groupings\/categories referenced in the previous bullet in terms of their (1) frequency\/commonness and (2) threat intensity in a fashion that is intuitively usable\/interpretable by a military commander (i.e., an intelligent non-specialist).<\/li>\n<\/ul>\n<p>Manual capabilities\/specifications:<\/p>\n<ul>\n<li>Ability to manually adjust\/tweak sites crawled for information.<\/li>\n<li>Ability to manually adjust\/tweak categorization algorithms.<\/li>\n<li>Ability to search crawled information for specific strings.<\/li>\n<li>Ability to output data (to include metadata resulting from in-program analysis\u2014e.g., category names and measures of frequency\/commonness and threat intensity) in file formats amenable to analysis in other tools (e.g., PNNL\u2019s IN-SPIRE for thematic extraction, R for statistical analysis)<\/li>\n<\/ul>\n<p><em>Bitcoin Bomber Center Image Courtesy of <a href=\"https:\/\/www.bitcoinnotbombs.com\/\" target=\"_blank\" rel=\"noopener\">Bitcoin not Bombs<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bitcoin Battalion Back in December we reported that the United States Air Force has quietly been working on a Bitcoin payment gateway otherwise known as a \u201csnack machine\u201d (yes you read that correctly). We also discussed that \u201ccurrency is like another class of supply, a commodity required to execute the battle.\u201d Recently, United States sanctions [&hellip;]<\/p>\n","protected":false},"author":3594,"featured_media":28761,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[2005,444,3546],"class_list":{"0":"post-28762","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-culture","8":"tag-attacks","9":"tag-sanctions","10":"tag-solutions"},"author_data":{"id":3594,"name":"Brian Cohen","nicename":"brian-cohen","avatar_url":"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/12\/brian-cohen-promo-image-96x96.jpg"},"featured_image_url":"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/11\/us-navy-preparing-bitcoin-battalion.jpg","_links":{"self":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts\/28762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/users\/3594"}],"replies":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/comments?post=28762"}],"version-history":[{"count":0,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts\/28762\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/media\/28761"}],"wp:attachment":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/media?parent=28762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/categories?post=28762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/tags?post=28762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}