Blockchain is Boosting Cybersecurity with Message Encryption and Crucial Alert Systems
Blockchain for Security Sector
Blockchain has become quite popular across various industries and agencies. For instance, governments, law enforcement agencies, and even the military have embraced blockchain technology and distributed ledger technology as mechanisms that help them achieve their goals.
One of the latest adoption of blockchain technology is by Israel’s security regulator, which introduced a messaging system powered by blockchain that ensures authenticity of communication for data protection purposes. Here are a few other areas that are utilizing blockchain technology:
In the area of blockchain cybersecurity, perhaps the best place to start is with NATO’s Communications and Information Agency adoption of invited proposals concerning blockchain applications for areas including logistics and procurement. Likewise, the US Defense Advanced Research Project Agency (DARPA) also started looking into blockchain around the same time by announcing that it would accept bids from contractors able to
“Create a secure messaging transaction platform that separates the message creation, from the transfer (transport) and reception of the message using a decentralized messaging backbone to allow anyone anywhere the ability to send a secure message or conduct other transactions across multiple channels traceable in a decentralized ledger.”
In the United Kingdom, the Defense Science and Technology Laboratory, which is part of the UK Ministry of Defense, has partnered with a domestic consultancy firm to work on a project that can improve integrity of data produced by network sensors. Reuters also reported that the British Justice Ministry considered implementing a blockchain system to prevent tampering of evidence.
In Australia, its intelligence agency and the Australian Criminal Intelligence Commission gathered their resources last year to fund the HoustonKemp, a Singapore-based contractor. The funding would help build a blockchain system that advances similar goals, such as securely storing, recording, and sharing intelligence evidence by investigators.
When it comes to private entities, they too are joining in. For instance, recently IBM registered a patent for network security that is dependent upon a distributed network of monitors to identify and track breaches in systems’ defense. The design will be able to prevent sophisticated attacks.
Another private project is the development of the Blockchain Evidence Locker, which recently came on the market. The product, created by Leonovous, a Canadian firm, maintains a detailed and cryptographically secure chain of custody record for digital evidence stored by security agencies.
Blockchain technology can also track transactions. One of the most popular developments in this field is by Chainalysis. The firm’s software has helped with multiple investigations by the US Department of Justice and other agencies. Further, the firm has successfully raised millions of dollars to grow its operations from one blockchain to more cryptocurrencies.
Another example is Elliptic, a London-based firm that has developed tools allowing crypto exchanges or other interested parties to identify suspicious transactions by red flagging them. The firm’s solutions are focused on preventing criminals at the point where they are about to cash the stolen funds.
Bitfury Group, a well-known platform, has also created a set of crypto-related products and services. The platform’s software, called Crystal, provides a detailed look into transactions on the Bitcoin blockchain, such as advanced mapping and grouping tools and qualified assessments concerning the chances that a transaction is illegal.
Also in this field is the creation of the Blockchain Alliance, which is a coalition of companies that are interested in providing “a forum for open dialogue between industry and law enforcement and regulatory agencies” while combating crimes that use public blockchain infrastructure.
Lastly, there are various military applications in development for fields such as military logistics, cyber defense, and resilient communications. A prominent example is DARPA’s spending of $1.8 million to software companies Galois for its blockchain application Guardtime.
The application is a keyless signature infrastructure that features an code that cannot be hacked, but that can be deployed to improve security in critical weapon systems. The underlying technique is a mathematical mechanism called formal verification.
Some military groups and platforms are also looking at using the Internet of Things (IoT) for combat tactics such as swarms of drones that could share data in a decentralized manner. Further, there is also the concept of the decentralization of command in complex fire systems, like those operated by battleships.