Blockchain’s Role in Blocking Fraud

Blockchain technology has gained traction across the U.S. government as a practical tool for multiple diverse purposes. From streamlining procurement to preventing fraud, agencies are increasingly exploring how blockchain can enhance transparency, security, and efficiency in federal operations. However, with innovation comes risk. The government is also looking into how to ensure the technology is not misused to conceal illicit activity, commit fraud, or obscure accountability.

Fraud Prevention

Since every transaction in a blockchain is recorded permanently, malicious actions are traceable, which increases accountability. Each transaction is unique and chronologically linked, meaning a record cannot be copied, altered, or duplicated without triggering detection. This level of traceability allows governments to confirm that payments are going to the intended recipients. For foreign aid, payments can be tracked not just to the intended country but as they continue on from there. In terms of domestic benefits, blockchain can verify the identities of welfare recipients, while simultaneously confirming their eligibility. Continue reading

Blockchain on Your Block

Beyond its use for cryptocurrency, Blockchain is proving to be a valuable technology to help modernize government service delivery. The key quality of blockchain is its ability to record transactions immutably. Managing transactions is a key function of state and local governments, and as such, they are looking for ways to incorporate blockchain as part of their digital modernization processes.

The decentralization of blockchain provides a level of transparency and accountability not typically associated with government. It can give citizens more control over their data and let them more easily check the status of requests they've made of their state and local governments. Continue reading

Beyond Facial Recognition: Growing Applications of Biometrics in Government

Biometrics are more than facial recognition. Biometrics include all types of biological markers that can be used for identification. Fingerprints pre-date the use of facial recognition and today the practice continues to evolve to use other biological data for a wide variety of use cases.

Tapping into wearable data for first responder safety

The Department of Homeland Security recently funded several startups that have developed innovative monitoring technologies that can be used to protect the health, safety and mental well being of police officers, firefighters, and other emergency responders. These solutions include: Continue reading

Defining the Value of Digital Assets

Digital assets are more than just bitcoin and they are having an incredible impact on how legitimate and illegitimate transactions are conducted. Breaking it down to a simple level there are three basic forms of digital assets:

  • Digital currency is the electronic form of traditional currency. It is what is stored in a digital wallet, transmitted electronically and then turned into actual cash when withdrawn from a bank or ATM.
  • Cryptocurrency is the encrypted form of digital currency that uses blockchain technology to move it around. Cryptocurrency does not require a financial institution to verify the transaction.
  • Non-fungible tokens (NFTs) are a one-of-a-kind digital asset that represents a real-world item such as photos, music, videos and trading cards.

Unfortunately, as with any new technology, bad actors are finding ways to exploit these assets while the rest of the world is still trying to fully understand them. Continue reading

Strengthening Cyber Resilience With Collaboration

Today's organizations know that stopping 100% of cyber-attacks is not a realistic goal. Rather, the focus has shifted to cyber resilience, "the ability to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber resources."

A critical pillar in becoming resilient is communication and collaboration. The Cyber EO focused on improving the nation's cybersecurity and highlighted the need to improve collaboration with threat intelligence sharing between public and private organizations as well as the creation of cross-government cyber boards. In recent months, key strides have been made in facilitating information sharing around cyber best practices, resource availability, as well as process and policy. Continue reading