
Error message
In order to filter by the "in queue" property, you need to add the Entityqueue: Queue relationship.-
County NewsNew ransomware called “WannaCry” recently crippled computers worldwide. The attack seizes up computers, preventing users from accessing files. It demands a payment if you ever want to see your files again. Malicious groups who create such malware have taken a liking to Bitcoin to receive those payments.Bitcoins: Some Basics about the CryptocurrencyMay 29, 2017May 29, 2017, 11:30 pm
-
County News Article
Bitcoins: Some Basics about the Cryptocurrency
New ransomware called “WannaCry” recently crippled computers worldwide. The attack seizes up computers, preventing users from accessing files. It demands a payment if you ever want to see your files again. Malicious groups who create such malware have taken a liking to Bitcoin to receive those payments.So, what exactly is Bitcoin? At its heart, it is a currency like the dollar and euro. It has value because people accept it as payment, as currency. But unlike those currencies, Bitcoin has many quirky features which enable it to work and makes it a popular choice to pay for goods and services ... or ransoms.
For starters, there are no physical Bitcoins – they exist entirely online. Bitcoin can be compared loosely to e-mail. Bitcoin “wallets” consist of a public address (think e-mail address) and a private key (like the password to your e-mail account). One can only spend money from an address if they have the private key.
Another strange feature of Bitcoin, lies in how it is controlled. It does not have any central authority like the Federal Reserve. Rather, it is governed by a democratic system of computers. The computers (called nodes) form a network that is collectively the structure Bitcoin operates on. These nodes are the backbone of Bitcoin, keeping a public ledger of payments called the blockchain. Nodes also perform many other critical functions behind the scenes, which allow Bitcoin to stay secure and decentralized.
The final piece of the puzzle for creators of ransomware is anonymity — transactions can be completely anonymous. This means Bitcoin users can easily receive their spoils, without having to worry about a paper trail or law enforcement.
In the case of WannaCry, there have already been tens of thousands of equivalent USD in payments, which by themselves are easily traceable.
But there is simply no way to identify who owns that Bitcoin wallet, until they are spent in some way. Even then, mixing services exist. These can be likened to pooling money together in a pot and drawing your share back out. The “clean” money drawn out cannot be traced back to any specific owner.Although Bitcoin is the payment of choice for online criminals, Bitcoin can be used for both nefarious and positive purposes, just like any other currency. Adoption is ever-increasing even on Wall Street, and it is gradually being folded into our current financial system.
Many companies already accept Bitcoin as a payment method. We are even seeing at tempts to create new financial instruments with a more traditional structure that closely follows Bitcoin’s value. Like any currency, Bitcoin’s value is determined by market forces.
The supply and demand at any moment will dictate which direction the price moves, and by how much.
However, Bitcoin’s similar ities as a currency end there. Unlike fiat currencies, Bitcoin does not have a central bank to enact monetary policies. It is laissez faire, and ultimately decided as a collective by those that participate in the Bitcoin network.
Bitcoin’s future certainly holds more growing pains. Although it is not quite as volatile as it used to be, it is still subject to extreme price swings when compared to conventional assets. As usage increases, bottlenecks are starting to occur in transaction speed.
There have even been attempts to regulate the network. Because Bitcoin is decentralized and largely esoteric, these attempts have failed outright.
But developers have been hard at work to solve the issues facing Bitcoin today.
Both scholars and hackers alike are continuously studying and improving the system infrastructure.
Like any new technology, it will take fine tuning over years to come before it reaches maturity. And with so many hands on-deck, the future of block chain technology looks brighter than ever.
P.S. On May 25, the value of 1 Bitcoin in USD was $2,263.72.
New ransomware called “WannaCry” recently crippled computers worldwide. The attack seizes up computers, preventing users from accessing files. It demands a payment if you ever want to see your files again. Malicious groups who create such malware have taken a liking to Bitcoin to receive those payments. So, what exactly is Bitcoin? At its heart, it is a currency like the dollar and euro. It has value because people accept it as payment, as currency. But unlike those currencies, Bitcoin has many quirky features which enable it to work and makes it a popular choice to pay for goods and services ... or ransoms. For starters, there are no physical Bitcoins – they exist entirely online. Bitcoin can be compared loosely to e-mail. Bitcoin “wallets” consist of a public address (think e-mail address) and a private key (like the password to your e-mail account). One can only spend money from an address if they have the private key. Another strange feature of Bitcoin, lies in how it is controlled. It does not have any central authority like the Federal Reserve. Rather, it is governed by a democratic system of computers. The computers (called nodes) form a network that is collectively the structure Bitcoin operates on. These nodes are the backbone of Bitcoin, keeping a public ledger of payments called the blockchain. Nodes also perform many other critical functions behind the scenes, which allow Bitcoin to stay secure and decentralized. The final piece of the puzzle for creators of ransomware is anonymity — transactions can be completely anonymous. This means Bitcoin users can easily receive their spoils, without having to worry about a paper trail or law enforcement. In the case of WannaCry, there have already been tens of thousands of equivalent USD in payments, which by themselves are easily traceable. But there is simply no way to identify who owns that Bitcoin wallet, until they are spent in some way. Even then, mixing services exist. These can be likened to pooling money together in a pot and drawing your share back out. The “clean” money drawn out cannot be traced back to any specific owner. Although Bitcoin is the payment of choice for online criminals, Bitcoin can be used for both nefarious and positive purposes, just like any other currency. Adoption is ever-increasing even on Wall Street, and it is gradually being folded into our current financial system. Many companies already accept Bitcoin as a payment method. We are even seeing at tempts to create new financial instruments with a more traditional structure that closely follows Bitcoin’s value. Like any currency, Bitcoin’s value is determined by market forces. The supply and demand at any moment will dictate which direction the price moves, and by how much. However, Bitcoin’s similar ities as a currency end there. Unlike fiat currencies, Bitcoin does not have a central bank to enact monetary policies. It is laissez faire, and ultimately decided as a collective by those that participate in the Bitcoin network. Bitcoin’s future certainly holds more growing pains. Although it is not quite as volatile as it used to be, it is still subject to extreme price swings when compared to conventional assets. As usage increases, bottlenecks are starting to occur in transaction speed. There have even been attempts to regulate the network. Because Bitcoin is decentralized and largely esoteric, these attempts have failed outright. But developers have been hard at work to solve the issues facing Bitcoin today. Both scholars and hackers alike are continuously studying and improving the system infrastructure. Like any new technology, it will take fine tuning over years to come before it reaches maturity. And with so many hands on-deck, the future of block chain technology looks brighter than ever. P.S. On May 25, the value of 1 Bitcoin in USD was $2,263.72.2017-05-29County News Article2018-06-01
New ransomware called “WannaCry” recently crippled computers worldwide. The attack seizes up computers, preventing users from accessing files. It demands a payment if you ever want to see your files again. Malicious groups who create such malware have taken a liking to Bitcoin to receive those payments.
So, what exactly is Bitcoin? At its heart, it is a currency like the dollar and euro. It has value because people accept it as payment, as currency. But unlike those currencies, Bitcoin has many quirky features which enable it to work and makes it a popular choice to pay for goods and services ... or ransoms.
For starters, there are no physical Bitcoins – they exist entirely online. Bitcoin can be compared loosely to e-mail. Bitcoin “wallets” consist of a public address (think e-mail address) and a private key (like the password to your e-mail account). One can only spend money from an address if they have the private key.
Another strange feature of Bitcoin, lies in how it is controlled. It does not have any central authority like the Federal Reserve. Rather, it is governed by a democratic system of computers. The computers (called nodes) form a network that is collectively the structure Bitcoin operates on. These nodes are the backbone of Bitcoin, keeping a public ledger of payments called the blockchain. Nodes also perform many other critical functions behind the scenes, which allow Bitcoin to stay secure and decentralized.
The final piece of the puzzle for creators of ransomware is anonymity — transactions can be completely anonymous. This means Bitcoin users can easily receive their spoils, without having to worry about a paper trail or law enforcement.
In the case of WannaCry, there have already been tens of thousands of equivalent USD in payments, which by themselves are easily traceable.
But there is simply no way to identify who owns that Bitcoin wallet, until they are spent in some way. Even then, mixing services exist. These can be likened to pooling money together in a pot and drawing your share back out. The “clean” money drawn out cannot be traced back to any specific owner.
Although Bitcoin is the payment of choice for online criminals, Bitcoin can be used for both nefarious and positive purposes, just like any other currency. Adoption is ever-increasing even on Wall Street, and it is gradually being folded into our current financial system.
Many companies already accept Bitcoin as a payment method. We are even seeing at tempts to create new financial instruments with a more traditional structure that closely follows Bitcoin’s value. Like any currency, Bitcoin’s value is determined by market forces.
The supply and demand at any moment will dictate which direction the price moves, and by how much.
However, Bitcoin’s similar ities as a currency end there. Unlike fiat currencies, Bitcoin does not have a central bank to enact monetary policies. It is laissez faire, and ultimately decided as a collective by those that participate in the Bitcoin network.
Bitcoin’s future certainly holds more growing pains. Although it is not quite as volatile as it used to be, it is still subject to extreme price swings when compared to conventional assets. As usage increases, bottlenecks are starting to occur in transaction speed.
There have even been attempts to regulate the network. Because Bitcoin is decentralized and largely esoteric, these attempts have failed outright.
But developers have been hard at work to solve the issues facing Bitcoin today.
Both scholars and hackers alike are continuously studying and improving the system infrastructure.
Like any new technology, it will take fine tuning over years to come before it reaches maturity. And with so many hands on-deck, the future of block chain technology looks brighter than ever.
P.S. On May 25, the value of 1 Bitcoin in USD was $2,263.72.

About Tadas Pack (Full Bio)
Research Assistant
Tadas Pack is a Research Assistant with the Counties Futures Lab. He works primarily with the data behind county explorer, but also focuses on data for various research projects. Tadas holds a Bachelor of Science in Economics from University of Maryland, College Park.More from Tadas Pack
-
Blog
Bipartisan legislation reintroduced to fund Next Generation 911 systems
On March 24, Reps. Anna Eshoo (D-Calif.) and Richard Hudson (R-N.C.) reintroduced the Next Generation 9-1-1 Act of 2023 with the goal of modernizing aging 911 systems across the nation to Next-Generation 911 technology. -
Webinar
Whole-of-State 2.0: A Tale of Two States and Counties
Mar. 9, 2023 , 1:00 pm – 2:00 pmUnable to attend? Watch the recording below. No matter where you are in your cybersecurity journey - you've probably heard of Whole-of-State. What does this mean for your jurisdiction? -
Webinar
NACo Cyberattack Simulation: Election Disruptions
Feb. 27, 2023 – Mar. 3, 2023Presented by the NACo County Tech Xchange and Professional Development Academy -
Webinar
Executive Perspectives on Preparing for an ERP Replacement Project
Feb. 22, 2023 , 3:00 pm – 4:00 pmUnable to attend? Watch the recording below. -
County News
‘When we’re not connected, we’re not safe,’ because buildings block radio
In a room packed with about 100 conference attendees, Guilford County, N.C. Commissioner Alan Perdue gave a powerful presentation Saturday morning on the importance of clear communication among emergency responders. -
-
Webinar
NACo Cyberattack Simulation: Internet of Things
June 12, 2023 – June 16, 2023Presented by the NACo County Tech Xchange and Professional Development Academy06121:00 pm<p><em>Presented by the NACo County Tech Xchange and Professional Development Academy</em></p>
-
Webinar
NACo Cyberattack Simulation: Ransomware
September 11, 2023 – September 15, 2023Presented by the NACo County Tech Xchange and Professional Development Academy09111:00 pm<p><em>Presented by the NACo County Tech Xchange and Professional Development Academy</em></p>
-
Webinar
NACo Cyberattack Simulation: Employee Management
December 4, 2023 – December 8, 2023Presented by the NACo County Tech Xchange and Professional Development Academy12041:00 pm<p><em>Presented by the NACo County Tech Xchange and Professional Development Academy</em></p>
-
Basic page
County Tech Xchange
The NACo County Tech Xchange is an online portal designed to connect county CIOs, IT Directors, CISOs, and other county IT leadership. This portal provides valuable resources in a central location that counties can use to improve their overall technology infrastructure.pagepagepage<table border="1" cellpadding="1" cellspacing="1" style="width:100%" summary="call-out transparent">
<tbody>
<tr> -
Basic page
TestIT: How Fast is Your Broadband
NACo has partnered with the Local Initiatives Support Corporation (LISC) and the Rural Community Assistance Partnership (RCAP) to develop a mobile app designed to identify areas with low or no connectivity to help ensure adequate funding for broadband infrastructure is provided across the country.pagepagepage<table border="1" cellpadding="1" cellspacing="1" style="width:100%" summary="call-out">
<tbody>
<tr>
<td> -
Basic page
Telecommunications & Technology Steering Committee
All matters pertaining to telecommunications and technology policy, including, but not limited to, the county role as a telecommunications regulator, service provider, and consumer, cable services technology and implementation, information technology development and implementation, information technology innovation, e-governance, and geo-spatial data collection and utilization.pagepagepage<p>All matters pertaining to telecommunications and technology policy, including, but not limited to, the county role as a telecommunications regulator, service provider, and consumer, cable services technology and implementation, info
-
Reports & Toolkits
Implementing Infrastructure Investments at the County Level: The Bipartisan Infrastructure Law (P.L. 117-58)
As intergovernmental partners, counties play a key role in ensuring the successful interpretation and implementation of the BILReports & Toolkitsdocument100710:00 amReports & Toolkits<table border="1" cellpadding="1" cellspacing="1" style="width:100%" summary="call-out transparent jump">
<tbody>
<tr>
<td>
Related Resources
-
Blog
Bipartisan legislation reintroduced to fund Next Generation 911 systems
On March 24, Reps. Anna Eshoo (D-Calif.) and Richard Hudson (R-N.C.) reintroduced the Next Generation 9-1-1 Act of 2023 with the goal of modernizing aging 911 systems across the nation to Next-Generation 911 technology. -
County News
‘When we’re not connected, we’re not safe,’ because buildings block radio
In a room packed with about 100 conference attendees, Guilford County, N.C. Commissioner Alan Perdue gave a powerful presentation Saturday morning on the importance of clear communication among emergency responders. -
County News
TikTok: It’s hip, it’s fun and it’s a security risk
What threat does TikTok pose to data security, and how should counties regulate its use on government-issued devices?
-
-
Reports & Toolkits
NACo Technology Guide for County Leaders: Workforce
The NACo County Technology Advisory Council, with input from the Tech Xchange and the NACo Workforce Advisory Board, has developed a guide on workforce retention and recruitment for technology workers. This guide provides an overview, along with benefits and questions to consider in the technology recruitment and retention process -
Policy Brief
Support the Deployment of Next Generation 911 Bill
Urge your Members of Congress to support legislation to provide funding for the deployment of Next Generation 9-1-1 and for other purposes. Introduced by Sen. Amy Klobuchar (D-Minn.) in the previous Congress, the legislation would provide for the establishment of Next Generation 9-1-1 and would vastly improve interoperability with regards to all emergency communication systems. The bill would also establish a Next Generation 9-1-1 cybersecurity center to coordinate with state, local and regional governments to detect and prevent cybersecurity intrusions related to Next Generation 9-1-1.
Related Events
More From
-
Implementing Infrastructure Investments at the County Level: The Bipartisan Infrastructure Law (P.L. 117-58)
As intergovernmental partners, counties play a key role in ensuring the successful interpretation and implementation of the BIL
Learn More