Blockchain in Defence: a Breakthrough?

Blockchain in Defence: a Breakthrough?

Food for thought September 2020 Blockchain in defence: a breakthrough? Written by Alessia Cornella, Linda Zamengo, AN EXPERTISE FORUM CONTRIBUTING TO EUROPEAN CONTRIBUTING TO FORUM AN EXPERTISE SINCE 1953 ARMIES INTEROPERABILITY European Army Interoperability Center Alexandre Delepierre, Georges Clementz This paper was drawn up by Alessia Cornella, Linda Zamengo, Alexandre Delepierre and Georges Clementz under the supervision and guidance of Mr Mario Blokken, Director of the Permanent Secretariat. This Food for Thought paper is a document that gives an initial reflection on the theme. The content is not reflecting the positions of the member states but consists of elements that can initiate and feed the discussions and analyses in the domain of the theme. All our studies are available on www.finabel.org TABLE OF CONTENT Introduction 2 Applications and functioning of blockchain technology 4 Developments in the blockchain technology in the military around the world 13 Challenges and limitations of blockchain: Costs associated with the technology, security loopholes 19 Conclusions and recommendations 23 Bibliography 24 INTRODUCTION lockchain is set to radically change time (ComputerWorld, 2019). In other words, our way of life in the coming dec- blockchain can be described as a global online ades. That is why many authors, like database, that anyone, anywhere in the world, Marc Andreessen, considered it “one with an internet connection, can use. As a con- of the most important technologies sequence, a blockchain doesn’t belong to anyone, since the advent of the Internet.” (Finance Train, and it stores information permanently across a B2019). Based on a peer-to-peer (P2P) topology, network of personal computers. Consequently, blockchain is a distributed ledger technology it can be seen as a revolutionary technology, that allows data to be stored globally on thou- thanks to its decentralised nature and its abil- sands of servers – while letting anyone on the ity to distribute information among its partic- network see everyone else's entries in near-real- ipants, in total transparency evenly. Blockchain in defence: a breakthrough? 2 Blockchain’s most popular application is Bit- The advent of blockchain technology has caused coin. Allegedly invented by the pseudony- a particular excitement across businesses and mous Satoshi Nakamoto, Bitcoin is a digi- governments. Many researchers remain scep- tal currency created and held electronically, tical about the advantages of blockchain for which can be sent to anyone, whether or not DoD operations, and some point out that they are known to the sender. Bitcoin relies the structure of the technology may impede on a ledger of transactions much like a bank them. The so-called “immutability” of data in maintains, but with copies of that ledger dis- a blockchain is guaranteed as long as the net- tributed among computers all over the world, work is big enough and the participation is automatically updating with every transaction. well distributed among the users. But as we Maintaining this distributed ledger requires shall see, this isn’t always the case, and the a lot of work, but it was no one’s job to do defence sector should be aware of it. If a user this work. Instead, the system pays out cryp- is infected in a permissionless network (a net- tocurrency to those who volunteer to do it. work which you can join without having to ask This allows for the maintenance of the decen- for permission), and other users are aware of tralised ledger – a ledger maintained not by it, they can easily ignore him and the blocks a single party, but by a network of people. he is attempting to post. But if data from a permissioned network owner or consortium The several advantages of the blockchain (such member is accessed, it will have more severe as its resilience, security and immutability), implications. If the owner or part of the con- mostly due to its decentralised nature, make sortium is compromised, so is the network. it particularly useful in defence. Indeed, this Blockchain isn’t as invulnerable as is often technology can be used both in operational thought, and we shall delve into its challenges and support roles, and the private blockchain and limits regarding its implementation in the is privileged in this field. Firstly, blockchain defence sector. represents a powerful tool to prevent cyber-at- tacks, whether this is on the battlefield, in intel- In this paper, we will examine how block- ligence, the defence industry, or government chain works and discuss its civilian and mili- defence departments. Secondly, blockchain tary uses. We shall see how numerous depart- technology can assist in managing defence ments of defence all over the world are working supply chains, which constantly accumulate on implementing blockchain technology for actors and complexity. Blockchain can ensure defence and security purposes. This paper shall the accuracy of identities and improve the also address in detail the developments within traceability of the materials (including sen- the main countries and powers that are cur- sitive ones like weapons), at each step from rently integrating blockchain into their armies, their source to their destination. such as China, Russia and the United States. Beyond that, we shall analyse how blockchain, Consequently, it will offer a better overview like any other new technology, still has its of the resources available and reveal inefficien- shortcomings. This leads us to the questions cies. Thirdly, blockchain technology is useful of whether blockchain has the potential to for strengthening the resilience of communi- be a real game-changer in military affairs if cations, within armies, departments of defence it has been investigated thoroughly enough, as well as in the defence industries. Finally, and whether sufficient funds have been allo- blockchain could also help secure personal cated to its optimisation. data confidentiality, 3D printing data, sol- diers registers or smart contracts. Blockchain in defence: a breakthrough? 3 APPLICATIONS AND FUNCTIONING OF BLOCKCHAIN TECHNOLOGY Since its advent in 2008, blockchain has been per- a 32-whole number called a nonce (a nonce is ceived as a groundbreaking technology. Accord- randomly generated when a block is created, ing to Schrepel (2018), a blockchain is “an and it then generates a block header hash); and a open and distributed ledger that can record – hash, which is a 256-bit number wedded to the manually or automatically – all sorts of trans- nonce. When the first block of a chain is cre- actions between users. Once they are recorded, ated, a nonce generates the cryptographic hash. these transactions are permanent and can be The data in the block is considered signed and seen by all users, which is one of the reasons forever tied to the nonce and hash unless it is why blockchain can be trusted. All users agree mined. Mining is the process of adding trans- to a certain set of procedures – called the pro- actions to the large distributed public ledger tocol – which sets the rules of the blockchain. of existing transactions. Once the protocol is determined, the blockchain operates under it, and no deviation from it is Another important concept in blockchain tech- in theory possible, which creates and enhances nology is decentralisation. No computer or trust” (Schrepel, 2018, pp. 288-289). To sum it organisation can own the chain. Instead, it is up, blockchain technology consists of digitally a ledger distributed via the nodes connected to signed and time-stamped data clusters that are the chain. Nodes can be any kind of electronic published and linked together like a chain. It device that maintains copies of the blockchain allows multiple users to post at the same time and keeps the network functioning. Every node through a secure algorithm in multiple cyber has its copy of the blockchain, and the network locations, without the risk of data manipu- must algorithmically approve any newly mined lation. There is only one version of the data, block for the chain to be updated, trusted and and all users have the same copy that they can verified. Since blockchains are transparent, every separately review. Thus, they can confirm the action in the ledger can be easily checked and authenticity of transactions without changing viewed. This is why blockchain is regarded as a past authenticated data. trust-based process, with digital signatures and keys to authorise the transactions and identify Very often, the analogy of a Google Document the participant. Once recorded to a chain, a is used to explain blockchain technology. When blockchain cannot be removed nor modified. It we create a document and share it with a group can only be added to the chain, which ensures of people, the document is distributed instead the data’s integrity. As a result, blockchain net- of copied or transferred. This creates a decen- works not only reduce the probability of com- tralised distribution chain that gives everyone promise but also impose significantly higher access to the document at the same time. No costs on an adversary to do so. one is locked out awaiting changes from another party, while all modifications to the document In simpler words, all network participants are being recorded in real-time, making changes have access to the distributed ledger and its completely transparent. immutable record of transactions. With this shared ledger, transactions are recorded only Regarding its technical functioning, block- once, eliminating the duplication of effort chain consists of three important concepts: that is typical of traditional business networks. blocks, nodes and miners. Every chain con- No participant can change or tamper with a sists of multiple blocks, and each block has transaction after it has been recorded to the three essential elements: the data in the block; shared ledger. Blockchain in defence: a breakthrough? 4 (FinDev Gateway; 2018) As a groundbreaking technology, blockchain has politically and architecturally decentralised (as different characteristics.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    28 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us