Using Blockchain Against Counterfeit & Forgery

The US Department of Homeland Security (DHS) has been pushing for the adoption of blockchain technology in order to enhance the agency’s ability to deal with counterfeiting and forgery.

The department is investing $140,000 into developing a compatibility standard for the division’s different blockchain and data formats spread across the agency. US Citizenship and Immigration Services, Transport Security Administration, and US Customs and Border Protection all have data that can be secured through the use of a blockchain.

These agencies are the administrators for data, including supply chain security, immigration status, and employment eligibility across the US. By using a blockchain, agencies can issue digital credentials which would be practically impossible to duplicate or forge.The system of distributed ledgering that the blockchain system is built upon is useful for issuing expiable credentials.

Blockchain’s ‘smart contract’ allows the automatic revocation of a license after a certain time arrives and prerequisites to renew the credentials are not met, according to cloudwedge.com.

Due  the use of multiple nodes to keep the data current, it is nearly impossible for a malicious user to manipulate the data. Since these nodes will be spread around numerous agencies, the difficulty increases exponentially. The current DHS systems have heavy paper-usage and are outdated compared with methods used by other enforcement agencies.

The digital identity form Danube Tech has the task of developing a system that integrates the blockchain capabilities and other data collection and storage systems from these departments unto something the DHS can use through an embedded API.

FedScoop:      I-HLS:          US Homeland Security:

You Might Also Read:

Buy A Dark Web Passport Scan For $15:

 

« Incompatible: Privacy & The Internet of Things
Warning For Pilots To Counter Airborne Hacking »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

Cifas

Cifas

Cifas are leaders in fraud prevention, working closely with UK law enforcement partners.

IABG

IABG

IABG offer independent, product-neutral consulting as well as technical and scientific services for the use of safety-relevant systems and technologies.

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

Identity Defined Security Alliance (IDSA)

Identity Defined Security Alliance (IDSA)

IDSA is a group of identity and security vendors, solution providers and practitioners that acts as an independent source of education and information on identity-centric security strategies.

Innovent Recycling

Innovent Recycling

Innovent Recycling provides a secure IT recycling & data destruction service to all types of organizations across the UK.

Global EPIC

Global EPIC

Global EPIC is an international cybersecurity initiative designed to combat growing world challenges by facilitating global collaboration in the field of cyber security.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Bechtle

Bechtle

Bechtle is one of Europe’s leading IT service providers offering a blend of direct IT product sales and extensive systems integration services.

Defentry

Defentry

Defentry have created an Ecosystem that lets our users easily monitor, train and resolve their digital security issues.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

Segra

Segra

Segra owns and operates one of the nation’s largest fiber networks and provides best-in-class broadband and data security solutions throughout the Southeast and Mid-Atlantic.

Issue53

Issue53

We empower organizations to thrive in the digital landscape. Strengthen your defenses, enhance resilience – Choose Issue53 for a secure and future-ready IT environment.

AuditBoard

AuditBoard

AuditBoard is the leading cloud-based platform transforming audit, risk, ESG, and InfoSec management.