America Needs a Blockchain Strategy ASAP – Foreign Policy

The news is rife with wild promises made by blockchain advocates and the exaggerated suspicions of its opponents. By enabling the creation of cryptocurrencies such as bitcoin, ether, and XRP, blockchains have made some people fabulously wealthy while also, at times, facilitating fraud and money laundering. Although the technology is still in its early stages, we can attest—not least, because one of us serves on the board of a financial technology company that developed one of these cryptocurrencies—that it has enormous potential.

But so far, little has been written about the blockchain’s potential uses in the national security space, where blockchain technology could be enormously useful. If mishandled, however, it could also pose dangers. To maximize the former and mitigate the latter, it would be wise for the United States to take advantage of its early technological lead before competitors inevitably catch up. Fortunately, there are myriad ways it could do so.

First, a brief introduction to the basic technology: The blockchain is a decentralized ledger distributed across a network of computers, or nodes, that records transactions in real time. It adds new and unique “blocks” to a “chain” after the transactions are verified through consensus across the network. In simple terms, if Bob pays Jen, each computer in the network will receive a detailed record of the transaction, with sensitive information encrypted, and will then verify that Bob has sufficient funds and hasn’t already spent them elsewhere. After being confirmed, the transaction is permanently added to a block of other verified transactions and attached to the end of the chain, making it unalterable, easy to trace, and exceedingly difficult to forge.

The blockchain is sometimes described as a “trustless” system. It eliminates the need for banks or other middlemen, because every node verifies and re-enforces each transaction, logging a history that is both public and immutable. It cuts costs for users and, in some cases, increases speed and efficiency. Although many blockchains (such as bitcoin and ethereum) currently can only process a fraction of the number of transactions per second that major credit card companies can, there are efforts underway in the industry to speed up the process. 

Blockchains could revolutionize sectors including financial services, health care, data storage, and corporate supply chain management. They also have important applications for national security.

Blockchains, for instance, could change supply chain management for defense contracting. One of the Defense Department’s chief concerns regarding new defense systems is that the components are manufactured all over the world, so it is possible that suppliers close to a foreign government could install undetectable backdoors for spying. Faulty microchips or skulking spyware are real risks in today’s opaque global supply chains. The blockchain’s accurate and detailed ledger could reduce these risks by tracking what each subcontractor supplies and ensuring that each component is traceable. For example, if a microchip is produced in China for a plane’s onboard computer, a Defense Department auditor could see who made it, when it was installed, and how it was modified. Each action would be added to the blockchain, providing a detailed, unalterable contract history.

Blockchains could also securely manage the identification of contractors and government employees. Anyone who has applied for a security clearance knows how cumbersome and paper-based the process is. With the blockchain, personal information gathered during a security screening could be verified, disaggregated, and encrypted, the inserted into a blockchain, after which the original data could be erased from all individual servers. Individuals would have greater control over who can access what aspects of their personal information by attaching permissions to specific elements of their encrypted digital ID. For example, an individual might allow a potential employer access to specific Social Security information, while providing only a driver’s license number to another. Because comprehensive personal data would no longer be stored in one central server, hacks like the one into the U.S. Office of Personnel Management in 2015 could become a thing of the past, and the blockchain would minimize the risks of identity theft and manipulation.

The government could also use blockchains to secure interagency communications and improve digital record-keeping. Rather than storing key information in a single agency’s archives, the blockchain would provide a decentralized database that many agencies could access. For example, in a multi-agency law enforcement sting, an FBI investigator could add new evidence to a joint blockchain, which is time-stamped, digitally signed, and instantaneously shared across all permissioned entities. Someone like leaker Chelsea Manning could easily have been prevented from gaining access to every State Department cable, because she clearly had no “need to know.” The blockchain eliminates the need to secure permission each time one agency requires access to data and makes transparent who accessed what.

In cybersecurity, the distributed and immutable nature of the blockchain would allow for rapid recognition of hacks and timely responses. Because each block in a chain is encrypted with its own unique identifier (or “hash”) along with that of the previous block, it is impossible to manipulate any one block without changing each subsequent block in the chain. To do this would require massive computing power and would be immediately evident to each node in the system. It is therefore much easier to detect an attack and quickly identify how data is being manipulated.

There are, of course, some obstacles and potential downsides to the use of blockchains in the world of national security. Even more than with other groundbreaking technologies, blockchains are still an internationally ungoverned space. Where academic researchers largely from the United States dominated the early days of the internet, blockchains are truly cross-border, with millions around the world participating. Fraudulent initial coin offerings and other get rich quick schemes have already created confusion and could even hamper further innovation.

While the blockchain is encrypted, it is vulnerable where it meets the real world, and human error can occur. A blockchain ledger is still only as safe as the hardware security modules protecting its digital access keys. Hacks of cryptocurrency exchanges have become common, and up to one-third of all bitcoins are thought to be missing. A hack on a single node will not compromise a widely distributed system, but if the network is concentrated within a few large mining operations, another ethereum heist could occur. To strengthen network security and be deployable at scale—as in the case of a government agency—industry leaders should coordinate and develop a more comprehensive blockchain security architecture. Adding to the confusion, the largest blockchains can be very slow and insecure, so companies are creating increasing numbers of private blockchains. This leads to a proliferation of isolated networks and incompatible technologies.

The U.S. government does not need to wait for these uncertainties to be resolved to make blockchain a useful tool for national security. Although the government would stifle innovation if it rushed to regulate quality standards for blockchains, but it would be wise to help the best technologies win by investing in them and encouraging defense contractors to build on the most stable, secure, and speedy platforms. The government can also discourage contractors from building on inefficient and less secure “proof of work” blockchains that use vast amounts of energy and have negative impacts on the environment.

The government should also promote active competition and emphasize the public use aspects of blockchain through small investments and grants. DARPA has already begun contracting start-ups to research the applicability of blockchain technology for secure weapons data storage and encrypted communications. DIUx, the Pentagon’s tech incubator, and the CIA-founded In-Q-Tel should follow suit. Promising programs have also begun at the state level. For example, Delaware contracted start-ups to develop a blockchain for contracts and securely storing archival records. These partnerships help distribute the cost of research and development, and they strengthen ties between federal agencies and Silicon Valley’s best and brightest. They also help build the public’s trust in the blockchain.

In addition, the government can coax the industry to adopt quality standards and best practices. A federal “regulatory sandbox” would allow companies to test their technologies in a controlled setting while government regulators ascertain a proper regulatory framework. Canada launched such a sandbox in 2017, which provided limited-time registrations for blockchain companies while ensuring consumer privacy and other protections.

If the United States stalls too long, rival governments that invest heavily in blockchain research and development may co-opt the industry and set their own standards. Lichtenstein and Malta are early movers in establishing legal frameworks for blockchain. In July, Malta passed three laws that established internal governance requirements and certification procedures to better protect both consumers and businesses. While no one is concerned about Malta and Lichtenstein, it would be unhelpful if China, Russia, or other governments antagonistic to the United States determined the standards in this critical new technology. That’s why U.S. businesses and lawmakers must work quickly to maintain a leading role in blockchain technology.

Be the first to comment

Leave a Reply

Your email address will not be published.


Privacy Policy is committed to safeguarding your privacy. Contact us at if you have any questions or problems regarding the use of your Personal Data and we will gladly assist you.

By using this site or/and our services, you consent to the Processing of your Personal Data as described in this Privacy Policy.

Table of Contents

  1. Definitions used in this Policy
  2. Data protection principles we follow
  3. What rights do you have regarding your Personal Data
  4. What Personal Data we gather about you
  5. How we use your Personal Data
  6. Who else has access to your Personal Data
  7. How we secure your data
  8. Information about cookies
  9. Contact information


Personal Data – any information relating to an identified or identifiable natural person.
Processing – any operation or set of operations which is performed on Personal Data or on sets of Personal Data.
Data subject – a natural person whose Personal Data is being Processed.
Child – a natural person under 16 years of age.
We/us (either capitalized or not)

Data Protection Principles

We promise to follow the following data protection principles:

  • Processing is lawful, fair, transparent. Our Processing activities have lawful grounds. We always consider your rights before Processing Personal Data. We will provide you information regarding Processing upon request.
  • Processing is limited to the purpose. Our Processing activities fit the purpose for which Personal Data was gathered.
  • Processing is done with minimal data. We only gather and Process the minimal amount of Personal Data required for any purpose.
  • Processing is limited with a time period. We will not store your personal data for longer than needed.
  • We will do our best to ensure the accuracy of data.
  • We will do our best to ensure the integrity and confidentiality of data.

Data Subject’s rights

The Data Subject has the following rights:

  1. Right to information – meaning you have to right to know whether your Personal Data is being processed; what data is gathered, from where it is obtained and why and by whom it is processed.
  2. Right to access – meaning you have the right to access the data collected from/about you. This includes your right to request and obtain a copy of your Personal Data gathered.
  3. Right to rectification – meaning you have the right to request rectification or erasure of your Personal Data that is inaccurate or incomplete.
  4. Right to erasure – meaning in certain circumstances you can request for your Personal Data to be erased from our records.
  5. Right to restrict processing – meaning where certain conditions apply, you have the right to restrict the Processing of your Personal Data.
  6. Right to object to processing – meaning in certain cases you have the right to object to Processing of your Personal Data, for example in the case of direct marketing.
  7. Right to object to automated Processing – meaning you have the right to object to automated Processing, including profiling; and not to be subject to a decision based solely on automated Processing. This right you can exercise whenever there is an outcome of the profiling that produces legal effects concerning or significantly affecting you.
  8. Right to data portability – you have the right to obtain your Personal Data in a machine-readable format or if it is feasible, as a direct transfer from one Processor to another.
  9. Right to lodge a complaint – in the event that we refuse your request under the Rights of Access, we will provide you with a reason as to why. If you are not satisfied with the way your request has been handled please contact us.
  10. Right for the help of supervisory authority – meaning you have the right for the help of a supervisory authority and the right for other legal remedies such as claiming damages.
  11. Right to withdraw consent – you have the right withdraw any given consent for Processing of your Personal Data.

Data we gather

Information you have provided us with
This might be your e-mail address, name, billing address, home address etc – mainly information that is necessary for delivering you a product/service or to enhance your customer experience with us. We save the information you provide us with in order for you to comment or perform other activities on the website. This information includes, for example, your name and e-mail address.

Information automatically collected about you
This includes information that is automatically stored by cookies and other session tools. For example, your shopping cart information, your IP address, your shopping history (if there is any) etc. This information is used to improve your customer experience. When you use our services or look at the contents of our website, your activities may be logged.

Information from our partners
We gather information from our trusted partners with confirmation that they have legal grounds to share that information with us. This is either information you have provided them directly with or that they have gathered about you on other legal grounds. See the list of our partners here.

Publicly available information
We might gather information about you that is publicly available.

How we use your Personal Data

We use your Personal Data in order to:

  • provide our service to you. This includes for example registering your account; providing you with other products and services that you have requested; providing you with promotional items at your request and communicating with you in relation to those products and services; communicating and interacting with you; and notifying you of changes to any services.
  • enhance your customer experience;
  • fulfil an obligation under law or contract;

We use your Personal Data on legitimate grounds and/or with your Consent.

On the grounds of entering into a contract or fulfilling contractual obligations, we Process your Personal Data for the following purposes:

  • to identify you;
  • to provide you a service or to send/offer you a product;
  • to communicate either for sales or invoicing;

On the ground of legitimate interest, we Process your Personal Data for the following purposes:

  • to send you personalized offers* (from us and/or our carefully selected partners);
  • to administer and analyse our client base (purchasing behaviour and history) in order to improve the quality, variety, and availability of products/ services offered/provided;
  • to conduct questionnaires concerning client satisfaction;

As long as you have not informed us otherwise, we consider offering you products/services that are similar or same to your purchasing history/browsing behaviour to be our legitimate interest.

With your consent we Process your Personal Data for the following purposes:

  • to send you newsletters and campaign offers (from us and/or our carefully selected partners);
  • for other purposes we have asked your consent for;

We Process your Personal Data in order to fulfil obligation rising from law and/or use your Personal Data for options provided by law. We reserve the right to anonymise Personal Data gathered and to use any such data. We will use data outside the scope of this Policy only when it is anonymised. We save your billing information and other information gathered about you for as long as needed for accounting purposes or other obligations deriving from law, but not longer than 1 year.

We might process your Personal Data for additional purposes that are not mentioned here, but are compatible with the original purpose for which the data was gathered. To do this, we will ensure that:

  • the link between purposes, context and nature of Personal Data is suitable for further Processing;
  • the further Processing would not harm your interests and
  • there would be appropriate safeguard for Processing.

We will inform you of any further Processing and purposes.

Who else can access your Personal Data

We do not share your Personal Data with strangers. Personal Data about you is in some cases provided to our trusted partners in order to either make providing the service to you possible or to enhance your customer experience. We share your data with:

Our processing partners:


Our business partners:


Connected third parties:


We only work with Processing partners who are able to ensure adequate level of protection to your Personal Data. We disclose your Personal Data to third parties or public officials when we are legally obliged to do so. We might disclose your Personal Data to third parties if you have consented to it or if there are other legal grounds for it.

How we secure your data

We do our best to keep your Personal Data safe. We use safe protocols for communication and transferring data (such as HTTPS). We use anonymising and pseudonymising where suitable. We monitor our systems for possible vulnerabilities and attacks.

Even though we try our best we can not guarantee the security of information. However, we promise to notify suitable authorities of data breaches. We will also notify you if there is a threat to your rights or interests. We will do everything we reasonably can to prevent security breaches and to assist authorities should any breaches occur.

If you have an account with us, note that you have to keep your username and password secret.


We do not intend to collect or knowingly collect information from children. We do not target children with our services.

Cookies and other technologies we use

We use cookies and/or similar technologies to analyse customer behaviour, administer the website, track users’ movements, and to collect information about users. This is done in order to personalize and enhance your experience with us.

A cookie is a tiny text file stored on your computer. Cookies store information that is used to help make sites work. Only we can access the cookies created by our website. You can control your cookies at the browser level. Choosing to disable cookies may hinder your use of certain functions.

We use cookies for the following purposes:

  • Necessary cookies – these cookies are required for you to be able to use some important features on our website, such as logging in. These cookies don’t collect any personal information.
  • Functionality cookies – these cookies provide functionality that makes using our service more convenient and makes providing more personalised features possible. For example, they might remember your name and e-mail in comment forms so you don’t have to re-enter this information next time when commenting.
  • Analytics cookies – these cookies are used to track the use and performance of our website and services
  • Advertising cookies – these cookies are used to deliver advertisements that are relevant to you and to your interests. In addition, they are used to limit the number of times you see an advertisement. They are usually placed to the website by advertising networks with the website operator’s permission. These cookies remember that you have visited a website and this information is shared with other organisations such as advertisers. Often targeting or advertising cookies will be linked to site functionality provided by the other organisation.

You can remove cookies stored in your computer via your browser settings. Alternatively, you can control some 3rd party cookies by using a privacy enhancement platform such as or For more information about cookies, visit

We use Google Analytics to measure traffic on our website. Google has their own Privacy Policy which you can review here. If you’d like to opt out of tracking by Google Analytics, visit the Google Analytics opt-out page.

Read more about cookies on our Cookie Policy

Contact Information

email: [email protected]

Changes to this Privacy Policy

We reserve the right to make change to this Privacy Policy.

You can configure your Internet browser, by changing its options, to stop accepting cookies completely or to prompt you before accepting a cookie from the website you visit. If you do not accept cookies, however, you may not be able to use all portions of the WideBitcoin Websites or all functionality of the Services.

Please note that disabling these technologies may interfere with the performance and features of the Services.

You may also disable cookies on the WideBitcoin Sites by modifying your settings here:

Visitor comments may be checked through an automated spam detection service.

Last Update: May 25, 2018