Ep 12: Using Blockchain to Ensure Battle Network Integrity-Part 1 of 2
November 11. 2020
powered by Sounder
This is the first episode taken from my conversation with Michael Lewellen, a subject matter expert on blockchain technology. Michael is the president of Tarski Technologies, and a guest lecturer at the University of Texas at Dallas.
The key driver of the Pentagon’s many efforts to harness commercial innovation for its military systems is the growing threat from China. Christian Brose, a former senior staff member of the Senate Arms Services Committee, writes in his book “The Kill Chain,” that “China has devised strategies not to beat America at its own game but to play a different game—to win by denying the US military the opportunity to project power, fight in its traditional ways, and achieve its goals. China has rapidly developed arsenals of advanced weapons intended to break apart US battle networks, destroy the US military’s traditional platforms, and shatter its ability to close the kill chain. ”
A battle network can be broken apart in many ways. But one of the more effective and nefarious methods is to exploit weaknesses relating to the identity of the participants in the network so that a bad actor can masquerade as a good actor. One technique for attenuating this class of attack is to integrate blockchain technology within the battle network.
In this first episode of a two episode series, Michael and I discuss what blockchain is, some of its commercial use cases, and its potential value for ensuring the integrity of battlefield communications.
In the second episode, we speculate on how the Air Force may be planning on using blockchain technology, based on the recent announcement of a SBIR contract in June of 2020.
Participant emails: email@example.com and firstname.lastname@example.org
Original music by Josh Goode Music. Email: email@example.com