NATO & Pentagon Want Bitcoin Technology

Blockchain technology, the backbone of bitcoin, has a lot of applications. Finance firms want to use to cut down on administrative costs and trade faster. Estonia is using to securely track health records. Now it’s the military’s turn.

Both the US Department of Defense (DoD) and NATO have put out requests for military-related apps built on Blockchain, a decentralized digital ledger system. The ledger is stored in multiple copies across a large group and changes are sent out to all of them immediately, using a mathematical protocol that makes the ledger tamper-proof. That creates an immutable record of the information, and since everyone has a copy of the data, records are still safe even if a few people are hacked.

The two are looking at different implementations. The DoD’s Defense Advanced Research Projects Agency, or DARPA, wants to use Blockchain to create a secure messaging service. The group recently put out a public request for pitches on the project, and wants a web or native messaging app to help secure communications between different departments and even potentially troops in combat. NATO is looking at more traditional uses—using Blockchain to make military logistics, procurement, and finance more efficient.

Blockchain can be faster than traditional messaging and data transfer systems, and more importantly, its decentralized nature makes it less appealing for hackers. If “significant portions of the DoD back office infrastructure can be decentralized,” DARPA writes, “‘smart documents and contracts’ can be instantly and securely sent and received thereby reducing exposure to hackers and reducing needless delays in DoD back office correspondence.”

Blockchain is the new Google

At its core, the Blockchain is a technology that permanently records transactions in a way that cannot be later erased but can only be sequentially updated, in essence keeping a never-ending historical trail. This seemingly simple functional description has gargantuan implications. It is making us rethink the old ways of creating transactions, storing data, and moving assets, and that’s only the beginning.

The Blockchain cannot be described just as a revolution. It is a tsunami-like phenomenon, slowly advancing and gradually enveloping everything along its way by the force of its progression. Plainly, it is the second significant overlay on top of the Internet, just as the Web was that first layer back in 1990. That new layer is mostly about trust, so we could call it the trust layer.

Blockchains are enormous catalysts for change that affect governance, ways of life, traditional corporate models, society and global institutions. Blockchain infiltration will be met with resistance, because it is an extreme change.

The Blockchain is part of the history of the Internet. It is at the same level as the World Wide Web in terms of importance, and arguably might give us back the Internet, in the way it was supposed to be: more decentralized, more open, more secure, more private, more equitable, and more accessible. Ironically, many Blockchain applications also have a shot at replacing legacy Web applications, at the same time as they will replace legacy businesses that cannot loosen their grips on heavy-handed centrally enforced trust functions.

No matter how it unfolds, the Blockchains history will continue to be written for a very long time, just as the history of the Web continued to be written well after its initial invention. But here’s what will make the Blockchains future even more interesting: you are part of it.

DefenseOne:

« Did N. Korea Hack S. Korea’s Key Defense Contractor?
Four Threats To Aviation Security – and Four Responses »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Zertificon Solutions

Zertificon Solutions

Zertificon is a leader in professional email encryption and data security.

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity

Rohde & Schwarz Cybersecurity provide solutions for Secure Networks, Secure Communications, Network Analysis, and Endpoint Security.

IABG

IABG

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies.

Leibniz-Rechenzentrum (LRZ)

Leibniz-Rechenzentrum (LRZ)

The LRZ supports ground-breaking research and teaching in a wide range of scientific disciplines including information security and data protection.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

RIGCERT

RIGCERT

RIGCERT provides training, audit and certification services for multiple fields including Information Security.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

Parameter Security

Parameter Security

Parameter Security is a provider of ethical hacking and information security services.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

Laneden

Laneden

Laneden specialise in helping organisations identify security concerns and quantify the risks you may have across your assets, using Penetration Testing, Threat Simulation and Compliance Testing.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.

Clutch Security

Clutch Security

Clutch Security are on a mission to secure all Non-Human Identities. Everywhere.

Cyscomply

Cyscomply

Cyscomply is an AI-powered self-assessment platform to identify gaps, benchmark against global standards and take the right action. You can assess against NIST CSF, DORA, ISO 27001, NIST 800-171.