Blockchain For US Border Security

The US Department of Homeland Security (DHS) is supporting a technology that integrates blockchain with existing solutions for border security applications. Blockchain is a technology that is highly resistant to data modification. 

Transactions in a blockchain network are recorded as blocks of information in a chronological chain of data. Each chain is copied and kept synchronised across multiple nodes, or computers, making the system highly resilient to attacks or data loss. Data can be added to a blockchain, but no information in it can be modified retroactively or deleted without alerting users.

DHS Science and Technology Directorate (S&T) has awarded $192,380 to a startup named Factom to begin beta testing of a capability that uses blockchain technology to secure Internet of Things (IoT) data. This award is part of the fourth and final phase of S&T’s Silicon Valley Innovation Program (SVIP).

The project combines blockchain technology with critical infrastructure, such as sensors and cameras, to protect the integrity and authenticity of data collected by these devices. 

The capabilities developed by this project integrate with existing IoT devices and does not require the creation of blockchain-specific technology, according to dhs.gov.

Anil John, S&T Identity Management Research and Development Program Manager, said: “In Phase IV, Factom will deploy this technology in a realistic field environment with Customs and Border Protection (CBP) to understand its operational impacts.”

The final phase of the project will include the testing of the technology in an outside environment with limited Internet connectivity and in varied weather conditions to mimic the conditions under which US Border Patrol agents operate. 

The company’s goal is to demonstrate how IoT devices can maintain a high standard of reliability while eliminating the ability to spoof, modify or disrupt data from ground sensors and cameras.

The end objective is to produce a commercially viable product ready to enter the market.

I-HLS

You Might Also Read:

By 2020 US Immigration Will Be Digitised:

Terrorism Prevention & Border Protection – New Face Recognition Platform:

 

« Crypto-Mining For Cyber Criminals
Russia Faces US Request To Extradite Snowden »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

InteliSecure

InteliSecure

InteliSecure offer Professional Services, Security Assessments and Managed Services for data and threat protection.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

The Open Group

The Open Group

The Open Group: Leading the development of open, vendor-neutral IT standards and certifications.

Seqrite

Seqrite

Seqrite offers a highly advanced range of enterprise and IT security solutions to protect your organization's most critical data.

Haventec

Haventec

Haventec’s internationally patented technologies reduce cyber risk and enable pervasive trust services with a decentralised approach to authentication.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Industrial Cybersecurity Center (CCI)

Industrial Cybersecurity Center (CCI)

CCI is the first center of its kind that comes from industry without subsidies, independent and non-profit, to promote and contribute to the improvement of Industrial Cybersecurity.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

StackHawk

StackHawk

StackHawk is built to help dev teams ship secure code. Find and fix bugs early before they become vulnerabilities in production.

AML Global Solutions (AMLGS)

AML Global Solutions (AMLGS)

AMLGS delivers Financial Crime prevention training programmes and consultancy services encompassing Anti-Money Laundering (AML), Counter Terrorism Financing (CTF), Bribery & Corruption and Fraud.

BATM Advanced Communications

BATM Advanced Communications

BATM Advanced Communications is a leading provider of real-time technologies for networking and cyber security solutions.

Astreya

Astreya

Astreya is the leading IT solutions provider for some of the world's most recognizable and innovative organizations.

Heritage Cyber World

Heritage Cyber World

Heritage Cyber World is a one stop solution for all your security needs that brings together a team of security experts and analysts to deliver high-class security services.

Night Lion Security

Night Lion Security

Night Lion Security provides discreet and bespoke investigation and incident response recovery services.