Blockchain For US Border Security

The US Department of Homeland Security (DHS) is supporting a technology that integrates blockchain with existing solutions for border security applications. Blockchain is a technology that is highly resistant to data modification. 

Transactions in a blockchain network are recorded as blocks of information in a chronological chain of data. Each chain is copied and kept synchronised across multiple nodes, or computers, making the system highly resilient to attacks or data loss. Data can be added to a blockchain, but no information in it can be modified retroactively or deleted without alerting users.

DHS Science and Technology Directorate (S&T) has awarded $192,380 to a startup named Factom to begin beta testing of a capability that uses blockchain technology to secure Internet of Things (IoT) data. This award is part of the fourth and final phase of S&T’s Silicon Valley Innovation Program (SVIP).

The project combines blockchain technology with critical infrastructure, such as sensors and cameras, to protect the integrity and authenticity of data collected by these devices. 

The capabilities developed by this project integrate with existing IoT devices and does not require the creation of blockchain-specific technology, according to dhs.gov.

Anil John, S&T Identity Management Research and Development Program Manager, said: “In Phase IV, Factom will deploy this technology in a realistic field environment with Customs and Border Protection (CBP) to understand its operational impacts.”

The final phase of the project will include the testing of the technology in an outside environment with limited Internet connectivity and in varied weather conditions to mimic the conditions under which US Border Patrol agents operate. 

The company’s goal is to demonstrate how IoT devices can maintain a high standard of reliability while eliminating the ability to spoof, modify or disrupt data from ground sensors and cameras.

The end objective is to produce a commercially viable product ready to enter the market.

I-HLS

You Might Also Read:

By 2020 US Immigration Will Be Digitised:

Terrorism Prevention & Border Protection – New Face Recognition Platform:

 

« Crypto-Mining For Cyber Criminals
Russia Faces US Request To Extradite Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Intelligence-sec

Intelligence-sec

Intelligence-Sec is a fully integrated Conferences and Exhibitions Company managing and producing topical events for the security industry.

Genua

Genua

Genua is a specialist in IT security services and solutions ranging from network and infrastructure security to encrypted comms and industrial automation.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Sepio Cyber

Sepio Cyber

Sepio is the leading asset risk management platform that operates on asset existence rather than activity.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

6point6

6point6

6point6 is a technology consultancy with strong expertise in digital transformation, emerging technology and cyber security.

VirtualArmour

VirtualArmour

VirtualArmour is a managed security services provider with global reach and local attitude.

Sollensys

Sollensys

Sollensys is a leader in commercial blockchain applications. Our flagship product, The Blockchain Archive Server™ is the best defense against the devastating financial loss that ransomware causes.

Etisalat and (e&)

Etisalat and (e&)

Etisalat Group is one of the world’s leading telecom groups in emerging markets.

Insight Enterprises

Insight Enterprises

Insight is a leading solutions integrator, helping you navigate today’s ever-changing business environment with teams of technical experts and decades of industry experience.

Zeta Sky

Zeta Sky

Zeta Sky offers a full range of IT and cyber-security services for your business.

GovSky

GovSky

GovSky streamlines CMMC compliance, saving time and significantly reducing cost.

Meta 1st

Meta 1st

Meta 1st are a progressive SAAS enterprise, dedicated to harnessing the power of AI to address the most critical vulnerabilities in the world of cybersecurity: the Human Layer.