Blockchain For US Border Security

The US Department of Homeland Security (DHS) is supporting a technology that integrates blockchain with existing solutions for border security applications. Blockchain is a technology that is highly resistant to data modification. 

Transactions in a blockchain network are recorded as blocks of information in a chronological chain of data. Each chain is copied and kept synchronised across multiple nodes, or computers, making the system highly resilient to attacks or data loss. Data can be added to a blockchain, but no information in it can be modified retroactively or deleted without alerting users.

DHS Science and Technology Directorate (S&T) has awarded $192,380 to a startup named Factom to begin beta testing of a capability that uses blockchain technology to secure Internet of Things (IoT) data. This award is part of the fourth and final phase of S&T’s Silicon Valley Innovation Program (SVIP).

The project combines blockchain technology with critical infrastructure, such as sensors and cameras, to protect the integrity and authenticity of data collected by these devices. 

The capabilities developed by this project integrate with existing IoT devices and does not require the creation of blockchain-specific technology, according to dhs.gov.

Anil John, S&T Identity Management Research and Development Program Manager, said: “In Phase IV, Factom will deploy this technology in a realistic field environment with Customs and Border Protection (CBP) to understand its operational impacts.”

The final phase of the project will include the testing of the technology in an outside environment with limited Internet connectivity and in varied weather conditions to mimic the conditions under which US Border Patrol agents operate. 

The company’s goal is to demonstrate how IoT devices can maintain a high standard of reliability while eliminating the ability to spoof, modify or disrupt data from ground sensors and cameras.

The end objective is to produce a commercially viable product ready to enter the market.

I-HLS

You Might Also Read:

By 2020 US Immigration Will Be Digitised:

Terrorism Prevention & Border Protection – New Face Recognition Platform:

 

« Crypto-Mining For Cyber Criminals
Russia Faces US Request To Extradite Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Devo Technology

Devo Technology

Devo Security Operations is a next-gen cloud SIEM that enables you to gain complete visibility, reduce noise, and focus on the threats that matter most to the business.

Red Canary

Red Canary

Red Canary continuously monitors and analyzes your endpoints, users, and network activity in search of threatening behaviors, patterns, and signatures.

LEADS

LEADS

LEADS is considered as a leading ICT Solution Provider and an IT partner of choice in Bangladesh.

Imunisys

Imunisys

Imunisys - We are your company's immune system in an increasingly connected world.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

Tabidus Technology

Tabidus Technology

Tabidus Technology is a cybersecurity association that unites and provides the global protection options against cyber threats.

Dr Web

Dr Web

Since 1992 the Russian anti-virus Dr.Web has been helping companies to keep their digital assets protected and operate in a secure digital environment.

Byos

Byos

Byos provides visibility of devices across all networks, regardless of location, integrating with your existing security stack.

Spotit

Spotit

Spotit offers a wide-ranging portfolio of technologies and services, from consultancy, assessments and pentesting to the set up of completely new security and network infrastructures.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

McKinsey & Company

McKinsey & Company

McKinsey & Company is a global management consulting firm. We are trusted advisor to the world's leading businesses, governments, and institutions.