Blockchain For US Border Security

The US Department of Homeland Security (DHS) is supporting a technology that integrates blockchain with existing solutions for border security applications. Blockchain is a technology that is highly resistant to data modification. 

Transactions in a blockchain network are recorded as blocks of information in a chronological chain of data. Each chain is copied and kept synchronised across multiple nodes, or computers, making the system highly resilient to attacks or data loss. Data can be added to a blockchain, but no information in it can be modified retroactively or deleted without alerting users.

DHS Science and Technology Directorate (S&T) has awarded $192,380 to a startup named Factom to begin beta testing of a capability that uses blockchain technology to secure Internet of Things (IoT) data. This award is part of the fourth and final phase of S&T’s Silicon Valley Innovation Program (SVIP).

The project combines blockchain technology with critical infrastructure, such as sensors and cameras, to protect the integrity and authenticity of data collected by these devices. 

The capabilities developed by this project integrate with existing IoT devices and does not require the creation of blockchain-specific technology, according to dhs.gov.

Anil John, S&T Identity Management Research and Development Program Manager, said: “In Phase IV, Factom will deploy this technology in a realistic field environment with Customs and Border Protection (CBP) to understand its operational impacts.”

The final phase of the project will include the testing of the technology in an outside environment with limited Internet connectivity and in varied weather conditions to mimic the conditions under which US Border Patrol agents operate. 

The company’s goal is to demonstrate how IoT devices can maintain a high standard of reliability while eliminating the ability to spoof, modify or disrupt data from ground sensors and cameras.

The end objective is to produce a commercially viable product ready to enter the market.

I-HLS

You Might Also Read:

By 2020 US Immigration Will Be Digitised:

Terrorism Prevention & Border Protection – New Face Recognition Platform:

 

« Crypto-Mining For Cyber Criminals
Russia Faces US Request To Extradite Snowden »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cambray Solutions

Cambray Solutions

Cambray Solutions specializes in locating and securing technical professionals, managers, and executives.

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA)

Cyber Conflict Studies Association (CCSA) is a non-profit organization dedicated to leading a diversified research agenda in the field of cyber conflict.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Logscape

Logscape

Logscape provides a big data analytical tool for log file analysis and operational analytics.

Openminded (OPMD)

Openminded (OPMD)

Openminded is a French security and network services company.

TechCERT

TechCERT

TechCERT is Sri Lanka’s first and largest Computer Emergency Readiness Team (CERT).

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

Touchstone Security

Touchstone Security

Touchstone Security is a company with a passion for technology, a hyper-focus on cybersecurity, and a special affinity for cloud technology.

Nisos

Nisos

Nisos provides unrivaled protection of your reputation and assets through the practice of Active Defense.

Think|Stack

Think|Stack

Think|Stack is a managed IT services company specializing in cloud and cybersecurity with human-centered design.

Esprinet

Esprinet

The Esprinet Group is an enabler of the technology ecosystem: a team of people who promote access to technology through an extensive network of professional resellers.

ZEUSS

ZEUSS

ZEUSS is a diversified data center, cybersecurity, and green energy company.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Acumen

Acumen

Acumen's cyber security engineers protect your critical systems, in critical moments. We are here when you need us most.

Blackmere Consulting

Blackmere Consulting

Blackmere Consulting is a Nationwide Technical and Executive Recruiting firm dedicated to Cyber Security and Information Technology.

Cynclair

Cynclair

Cybersecurity is a complex beast. And we're the beast-tamers. Our team thrives on deciphering the latest threats, building cutting-edge defenses, and making your digital world much safer.