The Pentagon sees Bitcoin block chain technology as a network security defense system


nnnIn the United States Washington, a nonprofit organization, “Defending Democracy Foundation” recently released a chain-related research, said the United States rely on foreign supply chain, so the ability to resist external risks is low. In order to deal with possible security threats, you can use the center of the block chain technology to ensure that the system can not attack. The US Department of Defense Advanced Research Projects Agency, which helps create the Internet, is also testing the impact of block chain technology on national defense.n
nnTranslation: Annie_Xun
nInvolving the terrorists, drug trade, money laundering, gray online currency Bitcoin may soon be the US Pentagon as the US military technology, communications and procurement of defense forces.n
nIndependent analysts said that the core of the technology core chain of Bitcoin can significantly improve US military security, prevent large-scale hacking, tampering and hijacking vehicles, aircraft and satellites through the Internet.n
nIn particular, US defense analysts are alert to China’s commercial transaction intelligence gathering, has increasingly become a threat to US national security, US military personnel, national security policy makers and important infrastructure agencies gradually become the target.n
n”Our reliance on foreign supply chains is the fact that policymakers must acknowledge in an increasingly open global economy,” said the authors in a recent study published in the Foundation for Defense of Democracies in Washington, “n
nIn response to the threat, the military began to test the block-chain technology, which is actually stored in the large user group backup file to the center of the digital accounting system or database.n
nInvestors took note of the US military’s interest in block chain technology. Analysts said last year, the market for block-chain technology suppliers reached $ 75 billion. 2019 forecast will reach $ 108 billion.n
nBlock chain security key: any changes to the database immediately sent to the user, to create a safe and stable record. All users hold data backup, even if some users are attacked, the entire database is safe.n
nThe tamper-resistant centering feature makes the block chain more and more popular, beyond the original support for Bitcoin digital trading functions. For example, many cutting-edge financial firms have used block-chain acceleration processes to reduce costs without compromising security.n
nIn Estonia, video source Pioneer Skype’s birthplace, officials have used block chains to track domestic health records. Russia is in the test block chain with the general support for economic integration.n
nThe Pentagon and the NATO Alliance have begun to act cautiously, but in recent months they have been actively developing military-related app and exploring the functionality of the block chain. NATO is considering using this technology to improve the efficiency of traditional processes such as logistics, purchasing, and finance.n
nn
nDARPA boostn
nThe Defense Advanced Research Projects Agency (DARPA) has been the world’s most innovative engineer. A few decades ago DARPA helped create the internet. Now engineers begin to test the block chain, used to create a secure departmental communications service, and ultimately for military operations. They have publicly solicited the best recommended service implementation program.n
nDARPA writes that “if most of the defense sector back-end infrastructure can be centrally, smart files and contracts can be sent and received securely in real time, reducing the likelihood of hacking, reducing the unnecessary delay in the back-end communications of the Department of Defense.”n
nDARPA is also trying to exploit the block chain to develop code that can not be attacked because the block chain provides hacker intelligence to attack the security database.n
nn”Protecting the Democratic Foundation” Memorandum “Leveraging Blockchain Technology to Protect the National Security Industrial Base” by Michael Hsieh and Samantha Ravich. Detailing the external forces attack or penetrate the US security industry base of a large number of scenes.n
nnThese bases include the research and design of military weapons systems, subsystems and components, the US military’s infrastructure, nuclear forces and important national industries.n
nThe author wrote:n
nn”The protection of the national security industrial base supply chain is not in contact with the dimensions of the system engineering challenges.In fact, the current problem is the jurisdiction of commercial activities, if only rely on the Department of Defense, it is necessary to fall to the global economic ranking of 20″.n
nnThe author said that the block chain has a lot of application potential.n
nn”Although this is a new technology, with no small risk, but also with amazing potential, as a special tool for a variety of complex large-scale problems.”n
nnFor example, the memo quoted an audit case study on the monitoring of US reconstruction in Afghanistan. The audit found that the construction of the Parwan Justice Center in Afghanistan was infiltrated by a bomb manufacturing agency that “actually entered the construction site in two days.”n
nMemorandum suggests that block-based systems can include these people in a blacklist to prevent this from happening.n

Leave a Reply

Your email address will not be published. Required fields are marked *