You are here

Blockchain Applications for Homeland Security Missions

Description:

TECHNOLOGY AREAS: Identity, encryption, authentication, cyber security, internet of things, and data analytics

OBJECTIVE: Design and prototype an ecosystem that applies blockchain technology to significantly improve DHS analytics, missions, and operations. Proposed solutions should be focused on new applications of blockchain technology and not focused purely on the analysis and characterization of Bitcoin or other cryptocurrency transactions.

DESCRIPTION: Blockchain technologies potentially offer a very flexible, low cost, and secure means of implementing data analytics architectures. In the virtual currency world, blockchains are distributed ledgers that keep track of all transactions authenticated by thousands of independent users’ machines. This process, called mining, inherently makes the ledger extremely difficult and expensive to hack. The use of machines to authenticate transactions makes authentication more cost effective. Virtual currencies like bitcoin have a governing body that manages and updates the algorithms for transactions and rules for user participation.

Numerous entities – banks, technology companies, etc. – are exploring blockchain applications for the future. DHS can benefit from solutions that offer this level of flexibility, security, accountability and cost. To maximize cost savings and effectiveness, blockchain applications should operate in a limited trust environment, which emphasizes need for decentralized rules, decentralized transactions, traceability, and defined ownership.

Use cases may include, but are not limited to crypto-certified transactions involving users and devices for the internet-of-things applications (IoT) such as encrypted data transactions and analytics for first responders; information sharing and analysis between state, local, and federal law enforcement; and third parties’ involvement, perhaps in applications that improve security and experiences for the traveling public, or that improve bio-threat awareness. Proposers may define relevant use cases and architectural concepts where there is a significant value proposition for the homeland security enterprise.

Proposed solutions can involve open environment blockchain applications such as cryptocurrencies, where anyone can participate, and closed-permissions based environments. Regardless of the architecture, privacy is an important DHS priority for use cases that might involve any personally identifiable information (e.g., biographical, biometric). National computer and network security policies and standards are also important considerations. For scalability, solutions must also consider speed of analysis and any transaction validation capabilities.

PHASE I: Design an application ecosystem, analytics methodology and approach for applying blockchain technology to significantly improve or enable homeland security applications and use cases. Produce an architecture that leverages existing or creates algorithms and computational techniques; show how components and services function in the ecosystem; and develop an approach for building and maintaining this ecosystem. Demonstrate or discuss implementation feasibility with respect to: concept of operations, governance, algorithms, costs, and security. Identify risks to privacy, security, and technology and develop risk mitigation strategies.

PHASE II: Prototype the ecosystem(s), including purchasing or making equipment needed. Implement and refine system modules and algorithms. Demonstrate prototype(s) and algorithms in a laboratory environment with data that reflects proposed homeland security applications and use cases. Demonstrate general core capabilities by developing and demonstrating multiple but disparate applications from the same core product capabilities. Refine the architecture and technical approach based on feedback from the government and marketplace as appropriate for selected applications. Demonstrate improvements after refinements and feedback. Initiate transition/commercialization options that leverage the strengths of demonstrated results, market demand and homeland security value propositions.

PHASE III: Deploy the first version products for operational testing, verification and validation for specific homeland security use cases. Fully implement transition options for use by DHS Components, the homeland security enterprise or related dual use commercial opportunities.

REFERENCES:

1) https://www.cryptocoinsnews.com/mit-digital-currency-initiative-leader-government-officials-lets-get-open-data-2-0-moving/

2) http://www.coindesk.com/block-chain-aid-fight-free-speech/

3) http://www.coindesk.com/blockchain-rise-networked-trust/

4) http://www.coindesk.com/ibm-reveals-proof-concept-blockchain-powered-internet-things/

5) http://www-01.ibm.com/common/ssi/cgi-bin/ssialias?infotype=PM&subtype=XB&htmlfid=GBE03620USEN

6) http://www.coindesk.com/four-genuine-blockchain-use-cases/

7) http://www.coindesk.com/8-banking-giants-bitcoin-blockchain/

8) http://www.technologyreview.com/news/539171/why-nasdaq-is-betting-on-bitcoins-blockchain/

KEY WORDS: Identity, encryption, authentication, cyber security, internet of things, and data analytics

US Flag An Official Website of the United States Government