Defend Boundary with Block Chain: Former US Vice President Adviser Calls for Action


nnnIn Washington, DC, the “Defense for Democracy Foundation” issued a new study note detailing how block-chain technology can prevent malicious tampering of hardware components from being applied to important national security infrastructures. And pointed out that national defense security depends entirely on the Department of Defense will not be able to support the United States in the global economic status. Combined with block-chain technology and artificial intelligence, can greatly compensate for the existing security security measures.n
nnTranslation: Annie_Xun
nSoon the new digital forensics will prevent hostile countries from destroying the equipment of the defense sector.n
nThe US Foundation for Defense of Democracies issued a new study note detailing how block-chain technology can prevent malicious tampering of hardware components from being applied to important national security infrastructures.n
nAlthough the Foundation’s Center for Sanctions and Illicit Finance issued a document to protect US defense, its principles apply to any country where supply chain transactions are large.n
nBy Samantha Ravich, former US Vice President Dick Cheney’s National Security Adviser and former US Defense Advanced Research Projects Agency (DARPA) project manager, Michael Hsieh, described that the use of “source-proven” hardware would threaten US “physical Safety”.n
n(Leveraging Blockchain Technology to Protect the National Security Industrial Base from Supply Chain Attacks): “Leveraging Blockchain Technology to Protect the National Security Industrial Base from Supply Chain Attacks”n
nn”The continued globalization of the manufacturing supply chain will continue to drive productivity-dominated global wide-ranging economic growth, but at the same time bring an urgent survival challenge to national security because of the complexity of the national security industrial base (NSIB) Production and assembly of the United States to rely on advanced technology, large-scale economic espionage activities. “n
nnThe memo is aimed at non-technical readers who describe that the chain-chain technology can change the legacy of acquiring international merchandise to identify the source of any commodity that NSIB uses.n
nIt is stated that the perpetrators of such threats are involved in the cyber-economic warfare, undermining hostile national economies and “weakening their political and military forces.” The so-called “strategic” attack is through hardware to destroy the country’s entire infrastructure, and its malicious purpose “is often carefully confused.”n
nn
nFog in the lightn
nAccording to the US-China Economic Security Review Commission and the Senate Armed Services Committee, the document specifically states that Afghanistan and other countries have this initiative.n
nThe author of the memo calls that to eliminate the ambiguity of high volume, standardization and lack of records, the supply chain data should be migrated to the block chain on a large scale, combined with artificial intelligence to constantly scan the crime.n
nFor example, the document cited the audit report of the Special Investor General of the Afghanistan Reconstruction, which revealed that despite the “blacklist”, a group of bomb makers still cooperated with supply chain contractors.n
n”Infected components are also likely to enter the domestic civil infrastructure because civilian firms are facing the same supply chain risk,” the authors write. “In a conflict, the weakness of the domestic economy will not only weaken domestic morale but also disrupt the main material support of the US military “n
nn”The easiest way to remove a known bad guy is to use a dynamic trading chart based on a block chain.”n
nnn
nCalled for actionn
nThe authors reaffirmed the policy recommendations of the Defense Science Board in April 2017, which did not mention block or distributed book technology, and gave their own suggestions and warnings.n
nFirst, it is recommended that you organize a “community” that is familiar with the technology and conduct small-scale trials; develop a “general contractor” that is willing to accept the “block-based chain-based payment system”; follow the contractor’s information to upgrade the privacy of the Federal Department of Federal Regulations Requirements (DFAR, Defense Federal Acquisition Regulations).n
nAt the end of the report, footnote refers to supply chain companies that support some of its chain areas, such as BlockVerify in the pharmaceutical sector, Everledger, Provenance in the diamond industry.n
nSecond, the author suggested “to cooperate with the industry to take legislative and regulatory initiatives.”n
nn
nRegulatory warningn
nThe recommendations in the footnotes include warnings that require US government agencies to protect citizens’ privacy laws that may equally apply to contractors using such supply chains.n
nn”To clarify possible conflicts in the interpretation of existing federal procurement regulations to ensure compliance with any pilot project”.n
nnThe author concludes:n
nn”Protecting the NSIB supply chain is a system engineering challenge for the new dimension. In fact, the current problem is to monitor business activities, and if you rely solely on the Department of Defense, you can only become the world’s 20th largest economy. Block chain technology is still new, the risk should not be overlooked, but also contains great potential, is particularly suitable for this complex single problem tool.n

Leave a Reply

Your email address will not be published. Required fields are marked *