In a Quartz article, DARPA’s program manager behind the blockchain effort, Timothy Booher, offers this analogy: “Instead of trying to make the walls of a castle as tall as possible to prevent an intruder from getting in, it’s more important to know if anyone has been inside the castle, and what they’re doing there.”
In DARPA’s use cases, blockchain technology could create important intelligence around whether a hacker has modified something in a database, or if they are intruding and surveilling a particular military system. As it is difficult to keep out every single hostile player, data integrity — the ability to track if information has been viewed or modified — may be more important. The blockchain operates as a decentralized ledger that timestamps any change that occurs, offering a way for these agencies to quickly know who has infiltrated the system and what they did within it. As a result of its distributed nature and instantaneous recording, the blockchain is vastly more resistant to tampering than centralized systems. This could alert military and intelligence authorities if a hacker is surveying a particular military system or has made modifications, without allowing the actor to cover their tracks.
The notion of the U.S. military using a blockchain to secure crucial data may create another boom in its value outside of fintech. To date, investors have added over $1.4 billion to blockchain in 2016 according to PwC Expert. The prospect could also spark a boom in uses of the technology outside of finance. Information security represents a huge new market for blockchain technology vendors, accounting for $75 billion in spending last year, and projected to hit $108 billion in 2019, according to forecasts by market research firm Gartner.
Blockchain technology still has hurdles in reaching the magic that it promises, with performance kinks still being ironed out. However, the approach poses obvious advantages for traditional security software, which leaves a lag in the time it takes to detect a hacker. Most invaders spend 150 days on a network before they are discovered, according to Cybersecurity Ventures.
DARPA’s hedging ushers in an enormous step forward in cybersecurity infrastructure.