Experts Warn – Security Problems Inside The Blockchain Technology

Bildergebnis für blockchain

 

Awareness of blockchain has soared in recent years with the emergence of cryptocurrencies, but the technology has existed for much longer. The linking of blocks, containing cryptographic functions of transactions and data, means that tampering with their contents becomes increasingly difficult as the chain grows – this concept was exploited for document timestamping applications more than a decade before cryptocurrencies became reality. In many implementations, blocks are confirmed by, and stored at, many nodes in different locations, providing a high degree of data integrity. There are, however, many challenges for applying blockchain technologies in tactical networks, particularly due to the constraints of the platforms, the limited bandwidth available among them, and the impact of network partitioning. In this report, the development and principles of blockchains are presented, along with an overview of their weaknesses and vulnerabilities. There is a huge level of interest in this technology across many sectors, and this is reflected in the breadth of the referenced material. Weaknesses in design and implementation can make blockchains vulnerable to attack, and their interfaces are particularly at risk. A range of possible applications in tactical networks is explored, from supply chain management, to network management and application data immutability. Finally, a simple blockchain architecture for mobile tactical networks is developed, to illustrate the potential and challenges of this technology. Overall, it is clear that blockchain technology provides a potential avenue for solving some problems in the tactical network context, but it is not yet clear whether it is the best such solution.

The key feature of blockchain technology is data integrity in a trustless environment: transaction or data records included on the blockchain are timestamped, cryptographically protected and stored by many distributed nodes, reducing the risk of total loss. For a sufficiently long blockchain, with a large number of nodes, the records can be considered immutable, in the sense that any tampering will be evident. This integrity can be exploited in different ways to enhance the robustness and resilience of tactical networks, and some of these are discussed in Section 5.1.

Smart contracts, described in Section 3.2, also provide opportunities for robust resource management in tactical networks, particularly in complex operational conditions where many users interact in the electromagnetic (EM) spectrum. Possible applications of blockchain to resource management are discussed in Section 5.2.

Tactical environments pose particular challenges for the introduction of blockchain technology, as devices are constrained in size, weight and power, and there are physical limitations on node connectivity. These challenges are considered in Section 5.3.

An example architecture for applying blockchain technology to support tactical operations is described in Section 5.4, taking into account the opportunities and challenges outlined thus far.

In this section, network nodes are considered to be the devices or platforms connected to the blockchain network; these are not (just) the radio interfaces themselves, but may be auxiliary equipment such as biometric devices, weapons or communication platforms.

5.4 Example tactical blockchain architecture

Based on the preceding, we propose an example architecture for a tactical blockchain system. The scenario we consider consists of a unit of dismounted soldiers, each carrying several devices connected on a personal network: a weapon, a radio, a camera, a radio frequency (RF) sensor and a computer (similar to a smart phone), sharing a battery and a memory drive such as a flash card. The soldier is also considered a network component, as they are a source and sink of data, and their identity is confirmed using a networked biometric sensor such as a fingerprint or iris scanner. The other devices may be authenticated using a radio frequency identification (RFID) chip or imaging as described in Section 5.1.4; authentication will only be required if the networked component has been disconnected from the personal network and attempts to rejoin.

We assume that the weapon tracks the ammunition it uses, and records the amount remaining. The camera may be continually recording, but to limit memory usage, only a few seconds before and after the weapon is fired are retained. C2 and other messages, either digital voice or data to and from the computer, all passed via the radio, are recorded for post-action analysis. SA in the form of RF sensor data is sampled periodically, and transferred via the radio to other soldiers in the unit and recorded locally. These different sources of data all use the computer’s memory for storage; both the memory and battery usage are tracked.

We use blockchains to provide authentication and identification management for the soldiers and devices engaged in the operation, an auditing function to track cyber SA and C2, resource usage tracking, and a policy management function, which is used to support resource loading decisions across the unit. As noted in Section 5.3.6, the longer the blockchain, the stronger it is, so all these functions use the same blockchain within their cluster (Section 5.4.1).

This is a simplified scenario, intended to give insight into the potential application of blockchain technology in tactical networks. Note that, as discussed in Section 6, the fact that this technology might be used to address these problems does not mean it is the best choice. Note also that the exchange of transactions and blocks among the users is assumed to be secure.

Chemical Splash and Spray Attacks Potential Tactic for Violent Extremists in Homeland

Chemical Splash and Spray Attacks Potential Tactic for Violent Extremists in Homeland

We evaluate that fear based oppressors likely view strategies including tossing or showering acids and an assortment of compound fluids, henceforth alluded to as a synthetic shower and sprinkle assault (CSSA), as a feasible strategy to cause damage and disturb basic framework, in light of open source revealing depicting psychological militant online networking posts and fear monger and brutal radical utilization of this strategy abroad. An examination of few episodes portrayed in media announcing uncovered that CSSAs are regularly utilized by criminal performing artists to facilitate criminal exercises and by fierce radical gatherings abroad to make fear, scare, rebuff, and distort people and gatherings that oppose their control or belief system in their general vicinity of operations; the strategy, in any case, has once in a while been operationalized by on-screen characters in the Country. We note, in any case, that homegrown savage radicals (HVEs) and solitary guilty parties likely would discover this strategy engaging and could without much of a stretch adjust it to the Country, as it requires no particular specialized ability and the materials regularly connected with criminal assault are typically unregulated and generally accessible.

(U//FOUO) We evaluate that revolutionary fanatics, other residential fear based oppressors (DTs), and criminal on-screen characters are the probably US-based brutal radicals to utilize CSSAs in light of our examination of over a significant time span DT utilization of this strategy and on open source revealing of unaffiliated criminal performing artists utilizing acids, harmful mechanical chemicals, and other substance crippling specialists in assaults in the Country. They have utilized CSSA strategies against law requirement, foundations, ideological adversaries, dissenters, and mass get-togethers, particularly those related with political or social causes, in light of an assortment of open source announcing. These performing artists once in a while utilized CSSAs to cause fatalities, however past episodes have exhibited that household CSSAs can cause critical substantial damage and upset law authorization and specialist on call operations.

(U//FOUO) While remote psychological oppressor associations (FTO) and brutal fanatic gatherings have operationalized CSSA abroad and have made late calls for such assaults in the Country, we need particular data demonstrating that HVEs or solitary guilty parties would be open to this strategy or would look to fuse CSSAs into assaults inside the Assembled States; we survey, in any case, that huge numbers of the variables likely driving criminal utilization of CSSAs, for example, the capacity to hurt people, cause framework disturbance, perhaps sidestep catch following an assault, or potentially execute rehash assaults—likely would likewise make this strategy appealing to fear based oppressors, particularly fierce radicals lacking preparing, and the entrance or want to utilize explosives or guns.

(U//FOUO) Solid acids and burning chemicals are much of the time utilized as a part of CSSAs, however we evaluate aggressors are similarly prone to pick other monetarily accessible chemicals, for example, pepper splash, blanch, alkali, solvents, and other bothering, putrid, or poisonous mechanical chemicals, in view of the assortment of materials utilized for CSSAs locally and abroad. Specialists on call treating casualties of CSSAs may confront auxiliary dermal and inward breath dangers relying upon the kind of chemicals utilized.

(U) ISIS Desires CSSA in the Country While Rough Radical Operationalize the Strategy Abroad

(U//FOUO) We evaluate that fear mongers likely view strategies including tossing or showering acids and an assortment of compound fluids, in the future called synthetic splash and sprinkle assaults (CSSAs), as a suitable strategy to cause damage and upset basic foundation, based on open source announcing portraying psychological oppressor online networking posts and fear monger and fierce radical utilization of this strategy abroad. An investigation of few episodes portrayed in media detailing uncovered that CSSAs are regularly utilized by criminal on-screen characters to encourage criminal exercises and by fierce radical gatherings abroad to make fear, threaten, rebuff, and distort people and gatherings that oppose their control or philosophy in their general vicinity of operations; the strategy, in any case, has seldom been operationalized by performing artists ihowever, that HVEs and solitary guilty parties likely would discover this strategy engaging and could without much of a stretch adjust it to the Country, as it requires no particular specialized aptitude and the materials frequently connected with criminal assault are normally unregulated and broadly accessible.

» (U//FOUO) The Islamic State in Iraq and slag Sham (ISIS)- connected “Solitary Mujihad” station on the Europe-based informing application Wire, starting late 2017, asked US-based ISIS-supporters to assault “unbelievers” with sulfuric corrosive on open transportation.

» (U) Rough fanatics partnered with ISIS in Iraq and Syria, since in any event mid 2015, were purportedly spreading or tossing corrosive in the characteristics of ladies from the Iraq-based Yazidi religious minority and Kurdish ladies who declined to be sex slaves or submit to constrained relational unions, as indicated by open source announcing. Moreover, ISIS-partnered vicious fanatics freely tormented and executed adversaries, deceivers, and those they regarded n the Country. We note, in any case, that HVEs and solitary wrongdoers likely would discover this strategy engaging and could without much of a stretch adjust it to the Country, as it requires no particular specialized mastery and the materials frequently connected with criminal assault are typically unregulated and generally accessible.

» (U//FOUO) The Islamic State in Iraq and fiery debris Sham (ISIS)- connected “Solitary Mujihad” station on the Europe-based informing application Wire, starting late 2017, encouraged US-based ISIS-supporters to assault “unbelievers” with sulfuric corrosive on open transportation.

» (U) Savage fanatics associated with ISIS in Iraq and Syria, since at any rate mid 2015, were purportedly spreading or tossing corrosive in the characteristics of ladies from the Iraq-based Yazidi religious minority and Kurdish ladies who declined to be sex slaves or submit to constrained relational unions, as indicated by open source detailing. Moreover, ISIS-associated rough radicals freely tormented and executed foes, double crossers, and those they deemedDEPARTMENT OF Country SECURITY, Insight Combination Focuses

(U//FOUO) DHS Announcement: Substance Sprinkle and Splash Assaults Potential Strategy for Brutal Radicals in Country

December 18, 2017

Synthetic Sprinkle and Splash Assault: Uncommon yet Potential Strategy for Brutal Radicals in Country

Page Tally: 10 pages

Date: September 21, 2017

Confinement: For Official Utilize As it were

Starting Association: Branch of Country Security, Office of Knowledge and Appraisal

Record Compose: pdf

Document Estimate: 313,000 bytes

Document Hash (SHA-256): 1444CB27457B1F56A97A074AD2049034AC63AE457A88FB0F6013C7F480736D09

Download Document

(U//FOUO) We survey that fear based oppressors likely view strategies including tossing or showering acids and an assortment of synthetic fluids, henceforth alluded to as a concoction splash and sprinkle assault (CSSA), as a suitable strategy to cause damage and disturb basic framework, based on open source detailing portraying psychological militant online networking posts and psychological militant and savage fanatic utilization of this strategy abroad. An examination of few occurrences depicted in media announcing uncovered that CSSAs are ordinarily utilized by criminal performing artists to facilitate criminal exercises and by brutal radical gatherings abroad to make fear, scare, rebuff, and distort people and gatherings that oppose their control or belief system in their general vicinity of operations; the strategy, in any case, has once in a while been operationalized by on-screen characters in the Country. We note, in any case, that homegrown brutal radicals (HVEs) and solitary guilty parties likely would discover this strategy engaging and could undoubtedly adjust it to the Country, as it requires no particular specialized skill and the materials frequently connected with criminal assault are generally unregulated and broadly accessible.

(U//FOUO) We evaluate that rebel radicals, other household fear based oppressors (DTs), and criminal performing artists are the in all likelihood US-based rough fanatics to utilize CSSAs in light of our examination of at various times DT utilization of this strategy and on open source announcing of unaffiliated criminal on-screen characters utilizing acids, poisonous modern chemicals, and other concoction debilitating operators in assaults in the Country. They have utilized CSSA strategies against law authorization, establishments, ideological adversaries, nonconformists, and mass get-togethers, particularly those related with political or social causes, in light of an assortment of open source announcing. These performing artists seldom utilized CSSAs to cause fatalities, however past occurrences have exhibited that local CSSAs can cause huge real damage and upset law authorization and person on call operations.

(U//FOUO) While outside fear based oppressor associations (FTO) and brutal fanatic gatherings have operationalized CSSA abroad and have made late calls for such assaults in the Country, we need particular data showing that HVEs or solitary wrongdoers would be open to this strategy or would try to join CSSAs into assaults inside the Assembled States; we survey, be that as it may, that a significant number of the variables likely driving criminal utilization of CSSAs, for example, the capacity to hurt people, cause foundation interruption, conceivably dodge catch following an assault, and additionally execute rehash assaults—likely would likewise make this strategy appealing to psychological militants, particularly vicious radicals lacking preparing, and the entrance or want to utilize explosives or guns.

(U//FOUO) Solid acids and scathing chemicals are every now and again utilized as a part of CSSAs, however we evaluate assailants are similarly prone to pick other economically accessible chemicals, for example, pepper shower, fade, alkali, solvents, and other chafing, putrid, or lethal modern chemicals, in light of the assortment of materials utilized for CSSAs locally and abroad. People on call treating casualties of CSSAs may confront optional dermal and inward breath perils relying upon the kind of chemicals utilized.

(U)