Using Blockchain Against Counterfeit & Forgery

The US Department of Homeland Security (DHS) has been pushing for the adoption of blockchain technology in order to enhance the agency’s ability to deal with counterfeiting and forgery.

The department is investing $140,000 into developing a compatibility standard for the division’s different blockchain and data formats spread across the agency. US Citizenship and Immigration Services, Transport Security Administration, and US Customs and Border Protection all have data that can be secured through the use of a blockchain.

These agencies are the administrators for data, including supply chain security, immigration status, and employment eligibility across the US. By using a blockchain, agencies can issue digital credentials which would be practically impossible to duplicate or forge.The system of distributed ledgering that the blockchain system is built upon is useful for issuing expiable credentials.

Blockchain’s ‘smart contract’ allows the automatic revocation of a license after a certain time arrives and prerequisites to renew the credentials are not met, according to cloudwedge.com.

Due  the use of multiple nodes to keep the data current, it is nearly impossible for a malicious user to manipulate the data. Since these nodes will be spread around numerous agencies, the difficulty increases exponentially. The current DHS systems have heavy paper-usage and are outdated compared with methods used by other enforcement agencies.

The digital identity form Danube Tech has the task of developing a system that integrates the blockchain capabilities and other data collection and storage systems from these departments unto something the DHS can use through an embedded API.

FedScoop:      I-HLS:          US Homeland Security:

You Might Also Read:

Buy A Dark Web Passport Scan For $15:

 

« Incompatible: Privacy & The Internet of Things
Warning For Pilots To Counter Airborne Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

FDM Group

FDM Group

FDM Group is an international Professional services company with a focus on IT. Services offered include Software Testing, and Information Security with a focus on operational security and compliance.

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

National Cyber League (NCL)

National Cyber League (NCL)

The NCL provides a virtual training ground for participants to develop, practice, and validate their cybersecurity knowledge and skills.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

Trustlook

Trustlook

Trustlook's SECUREai engine delivers the performance and scalability needed to provide total threat protection against malware and other forms of attack.

CYSEC NG

CYSEC NG

Cyber Security Challenge Nigeria Initiative (CYSEC NG) is the first, and largest offensive premier Cyber Conference and Hacking event in Africa.

ShieldIOT

ShieldIOT

ShieldIOT delivers a complete AI-powered security solution across any IoT device, application and network.

IoTsploit

IoTsploit

IoTsploit provides 20/20 visibility of network connections, protecting critical infrastructure assets from IoT vulnerabilities.

Radically Open Security

Radically Open Security

Radically Open Security is the world's first not-for-profit computer security consultancy company.

UPX Technologies

UPX Technologies

UPX Technologies is one of the largest digital security centers in Brazil providing full protection for data, networks and content.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute - Northern Michigan University

Upper Peninsula Cybersecurity Institute at Northern Michigan University offers non-degree and industry credentials relevant to emerging careers in cybersecurity.

Lightspin

Lightspin

Lightspin is a contextual cloud security platform that continuously visualizes, detects, prioritized, and prevents any threat to your cloud stack.

Neptune Cyber

Neptune Cyber

Neptune is a cyber security company that works exclusively in the marine sector. Our team combines experts in shipbuilding, maintenance and operations and cyber security testing and design.

Ermes

Ermes

Ermes – Intelligent Web Protection provides companies with a solution that effectively secures them against web threats.

AUCloud

AUCloud

AUCloud is a leading Australian cyber security and secure cloud provider, specialising in supporting businesses and Governments with the latest cloud infrastructure.