Using Blockchain Against Counterfeit & Forgery

The US Department of Homeland Security (DHS) has been pushing for the adoption of blockchain technology in order to enhance the agency’s ability to deal with counterfeiting and forgery.

The department is investing $140,000 into developing a compatibility standard for the division’s different blockchain and data formats spread across the agency. US Citizenship and Immigration Services, Transport Security Administration, and US Customs and Border Protection all have data that can be secured through the use of a blockchain.

These agencies are the administrators for data, including supply chain security, immigration status, and employment eligibility across the US. By using a blockchain, agencies can issue digital credentials which would be practically impossible to duplicate or forge.The system of distributed ledgering that the blockchain system is built upon is useful for issuing expiable credentials.

Blockchain’s ‘smart contract’ allows the automatic revocation of a license after a certain time arrives and prerequisites to renew the credentials are not met, according to cloudwedge.com.

Due  the use of multiple nodes to keep the data current, it is nearly impossible for a malicious user to manipulate the data. Since these nodes will be spread around numerous agencies, the difficulty increases exponentially. The current DHS systems have heavy paper-usage and are outdated compared with methods used by other enforcement agencies.

The digital identity form Danube Tech has the task of developing a system that integrates the blockchain capabilities and other data collection and storage systems from these departments unto something the DHS can use through an embedded API.

FedScoop:      I-HLS:          US Homeland Security:

You Might Also Read:

Buy A Dark Web Passport Scan For $15:

 

« Incompatible: Privacy & The Internet of Things
Warning For Pilots To Counter Airborne Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IEEE Computer Society

IEEE Computer Society

The IEEE Computer Society is the world's leading membership organization dedicated to computer science and technology.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

TestFort

TestFort

TestFort QA Lab is a specialized software testing company offering independent quality assurance and software testing services.

Integrity360

Integrity360

Integrity360 provide fully managed IT security services as well as security testing, integration, GRC and incident handling services.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

Shinobi Cyber

Shinobi Cyber

Shinobi Defense System is an integrated security system that absolutely secures information with smart, automatic encryption and protects your endpoints by stopping any unauthorized actions.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

GitGuardian

GitGuardian

Enable developers, ops, security and compliance professionals to enforce security policies across public and private code, and other data sources as well

Intercast Global

Intercast Global

Intercast's mission is to be a strategic resource to our clients in Risk Reduction. We are a global leader in cyber security staffing and consulting to the enterprise.

SafeGuard Cyber

SafeGuard Cyber

The SafeGuard Cyber SaaS platform empowers enterprises to adopt the social and digital channels they need to reach customers, while reducing digital risk and staying secure and compliant.

Berezha Security Group (BSG)

Berezha Security Group (BSG)

BSG is a cybersecurity consulting firm specializing in all aspects of application security and penetration testing.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Veriti

Veriti

Veriti is a unified security posture management platform that integrates with your security solutions and proactively identifies and remediates potential risks and misconfigurations.

Sidcon International Consulting Company

Sidcon International Consulting Company

SIDCON International Consulting Company has been providing consulting services since 2002 for private and public organizations in Ukraine and other countries.