ProtectedBy.AI Is Awarded DoD Contract to Develop Innovative Tools to Combat Criminal Cryptocurrency TransactionsProtectedBy.AI Is Awarded DoD Contract to Develop Innovative Tools to Combat Criminal Cryptocurrency Transactions
Company will develop a prototype solution that will research, analyze, and identify transactions within blockchain records.
August 10, 2021
ProtectedBy.AI has received an award worth up to $7.6 million through the Consortium Management Group, Inc., on behalf of the Consortium for Command, Control and Communications in Cyberspace (C5) to support the Irregular Warfare Technical Support Directorate (IWTSD) and their Counter Threat Finance (CTF) program. The award is to develop a prototype solution that will research, analyze, and identify transactions within blockchain records.
Cryptocurrencies and other blockchain-based virtual assets have unique characteristics that can frustrate financial investigations. Crimes are often conducted behind the veil of technologies that were purposefully developed to obscure the identity of the underlying transactors. This can impede law enforcement agencies’ abilities to detect, trace and prosecute offenses by depriving investigators of one of the most powerful tools in their arsenal: The ability to “follow the money.”
The anonymity inherit to cryptocurrency is increasingly being used to facilitate unlawful transactions and enable crimes including narcotrafficking, human trafficking, extortion, corruption and ransomware. Cryptocurrency is likewise providing criminals with a way to effectively circumvent Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) banking laws and regulations.
The IWTSD identifies and develops capabilities for irregular warfare for numerous adversaries for the Department of Defense (DoD), Special Forces and Department of Homeland Security (DHS).
C5 is a consortium composed of leading companies and institutions in the Command, Control, Communications, Computers. Intelligence, Surveillance and Reconnaissance (C4ISR) and cyber technology sectors. C5 accelerates the development and deployment of new capabilities to the warfighter through the use of Other Transaction Authority. C5 gives members an innovative and commonsense acquisition mechanism for development of new technologies and products to meet government customer requirements.
ProtectedBy.AI develops software solutions that are at the intersection of Cybersecurity, Artificial Intelligence, Blockchain, Intelligence Analysis, and Socio-Cognitive Psychology for the purpose of protecting People, Property, Places, & Profits. Their products focus on Cybersecurity, Intelligence Analysis and providing their clients with the data-driven insights they need to succeed.
Effort sponsored by the U.S. Government under Other Transaction number W15QKN-17-9-5555 between the Consortium Management Group, Inc., and the Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation thereon.
The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the U.S. Government.
The mission of Consortium Management Group, Inc. on behalf of Consortium for Command, Control, and Communications in Cyberspace (C5) is to speed development of technologies to improve U.S. Government capabilities required to sustain U.S. military supremacy in weapon systems information technologies.
ProtectedBy.AI develops solutions that augment human intelligence that protect and advance the economic and security objectives of companies and countries. With a team of experts that have developed and delivered leading-edge solutions for a wide range of organizations, including the Department of Homeland Security, the Central Intelligence Agency (CIA), and the United States Department of Defense, ProtectedBy.AI provides cutting-edge, cost-effective solutions that are at the intersection of technology and psychology.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Modernize your Security Operations with Human-Machine Intelligence
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums