DARPA Questions and Plans

DARPA Heilmeier Questions & Answers

 
DARPA Questions

What are you doing?

We create data that is only valuable to our network and our users. We prove who or what everyone or every internet of thing device is before allowing access or the exchange of data or instructions which is essential for securing the chain of command, securing remote access and maintaining the secure remote control of our nation’s sixteen critical infrastructure sectors, internet of thing devices, robots, drones, and unmanned spacecraft. Then we use AES 256 encryption to temporarily protect everything we send, use, and store just to waste our adversary’s money, time, and effort decrypting what we have already permanently protected.

How is it done now and what are the limits and consequences of doing nothing and why are improvements needed?

The world creates data that is valuable to us and others presenting an ever-expanding attack surface that encryption cannot completely protect now and will fail to protect at all when destroyed by the quantum computers that are coming. When an encryption replacement fails, we move to the next form of encryption that eventually fails continuing an endless cycle of encryption failure that perpetually costs us money and exposes our data with each failure. Replacing what we value with a once used token permanently protects our users and breaks them free of both this endless cycle of encryption failure and from the costs of defending an ever-expanding attack surface.

Not knowing who or what we are dealing with leaves remote access and maintaining remote control open to anonymous web criminals and encryption only offers us a temporary fix. Our defenses must be right 100% of the time and our adversaries need only be right once. When encryption fails, we are most vulnerable.

What is new and why will it succeed?

Replacing what makes our data valuable to others with a once used token permanently protects that information because it never gets into the data we create. Creating data that is safe from the start and only useful to our users is new. The fact that it is already beyond quantum proof is why it will succeed. Encryption temporarily protects everything. We permanently protect what you value the most. The best protection strategy to succeed is to deploy them both.

Reciprocal authentication mathematically proves who everyone and every IOT is to each other before allowing user to user access or the exchange of data or instructions protecting all parties which is new and its basis in math is why it will succeed. Authenticating the data source AI learns from and the source of data an AI process is given to apply what it has learned helps authenticate the AI outcomes and provides another logical reason for success. Authenticating the source of the data used to provide remote access and instructions for maintaining remote control impacts the security of our nation’s critical infrastructure and the operations of all our internet of things devices.

Why will it be successful Who Cares?

It is not the technology that will make this succeed, it is the superior strategy that wins No one can hide all the data all the time in the ever-expanding attack surface we are generating now and when quantum computers destroy our current encryption protections, no one will be able to protect unauthorized copies of what we encrypted in the past or unauthorized copies of any new forms of encryption in the future after they fail.

The data our tech creates has no value to anyone else ever and presents no ever-growing attack surface that we must spend resources defending. Knowing who we are dealing with gives us the opportunity to hold everyone we do deal with accountable for their actions.

Everyone living in this digital world that cares about their personal security and the security of the nation’s digital assets that we depend on to safely provide utilities, transportation, manufacturing, commerce, financial, and communication services will be impacted with each of these encryption failures that our technologies avoid

Our warfighters must be prepared to defend the homeland by successfully engaging our enemies on land, sea, air, space and now in cyberspace where every civilian is exposed to front line consequences. When every citizen is a potential cyber war casualty the best strategy is to give them the tools to defend themselves by making them a fully equipped and capable cyber warfighter. Future conflicts will most likely begin with stealth cyber-attacks designed to obscure the attacker, damage critical infrastructure, incite chaos, and maximize the fog of war advantage for the instigator. Our token and reciprocal authentication technologies offer the only 100% of the time defense for both our civilian, military, and critical infrastructure information systems.

If successful, what difference will it make to national security?

The nation is not secure now. Every form of encryption will eventually fail revealing what we once tried to hide. Hostile actors are currently seeking to acquire the technologies needed to go around today’s critical infrastructure protections as fast as we find new ways to try to prevent them. Unfortunately, we must be right 100% of the time and they need only be right once to cause us serious harm.

Creating data that is safe from the start is a game changer. We are always right 100% of the time and there is nothing of value 0% for them to find in what we are creating. Replacing private sector identity and financial information permanently protects our identities and payment details because we never put them at risk in the data we create and applying these technologies to all government divisions will afford the people’s data the same protection. Then proving who everyone and every IOT device is to each other before exposing anyone or any data or instructions prevents unknown bad actors from hiding behind the anonymity of today’s world wide web and attacking us personally or collectively through our government data or our nation’s critical infrastructure.

What are the risks?

Not moving fast enough and not convincing enough people that we all must change and that our technologies’ permanent solutions are far better than either doing nothing, delaying, or just going with one of the temporary NIST options. The fresher the data is the more valuable meaning that the faster we start permanently protecting our data the better off we all will be.

According to NIST it took more than twenty years for everyone back in the 70’s to upgrade their tech to overcome that decryption event and we have so much more data, so many more devices to protect today and we won’t get twenty years to make this transition.

How long will it take?

Our token tech, reciprocal authentication, and auto generative symmetric encryption are already patented and a proof of concept for all three technologies is in the communication platform we are testing. The marketplace can be built in 6 months. We need upwards of 90% of our economy permanently protected to even be close to a successful outcome and in today’s political climate getting more than 50% almost guarantees the other 50% will be dead set against it. Exposing more than 10% of our nation’s economy and critical infrastructure assets would be disastrous for us all.

What will it cost?

The main cost item for our technologies is getting the independent NIST lab testing of our tech that is required before any part of our federal government can adopt our cyber solutions over NIST’s current temporary fixes. That is why I am so interested in an STTR because I already need a federal lab. The 6 months of marketplace programming can be done with about $60,000 using my current programming crew. I do not know how much a NIST approved Lab would cost to validate our patent claims. The communication platform we built with these technologies derisks this project for DARPA and the conclusion of our marketplace that encompasses all the different industry requirements elaborates on that proof of concept for any DARPA implementation.

NIST is saying that to transition from asymmetric encryption to the NIST quantum resistant alternative encryption methods might cost us $189 billion and then it will cost us something again when each of the NIST alternative fail in the future. I do not think NIST has suggested any financial upside to any of their alternatives. We expect the costs of fully implementing our technologies will be offset by the financial benefits of sharing our marketplace commissions with our buyers, sellers, the CPAs working with us and the third-party software developers building secure versions of META, Google, Tik Tok and similar popular internet programming. Traditional marketing and advertising spend in 2024 was $552 billion and we plan on charging each industry what they traditionally spend and then give back 40% for our buyers and sellers to share, 10% to reward the CPAs helping us make these business relationships work and 10% to third party software developers for providing secure versions of the internet’s most popular programs that conform to our buyer’s data ownership and control policies. Whatever the cost these benefits plus the permanent security should more than cover them in a few years.

How to test midterms, and finals?

Testing the data recorded off our communication platform now to make sure it is void of ID and payment details and then the data as reidentified at our user’s final destinations provides a scalable proof of concept. If that checks out why wouldn’t the marketplace built with the same tech or adapted for government not provide the same results. Our communication platform is the proof of concept for all three of our technologies that DARPA needs to derisk this project. Getting around NIST’s dependance on encryption is the real challenge.

The Plan

The Plan

Phase I

The marketplace and communication platform built with our technologies was designed to secure and record the digital interactions between individuals, business entities and divisions of government. Other than providing software development Integration (SDI) kits for business entities and government divisions to establish the connections between our network and their proprietary information systems, our technologies are not deployed within the proprietary systems of our business and government participants in this first phase.

Phase II

Working through our business entity’s CPAs and our government division’s accountants to arrange with either our third-party software developers or their own IT specialists we intend to license our technologies so they can customize our capabilities to address their organization’s requirements to keep their secrets safe with our technologies. Building out one entity within a particular industry should provide a rough security template for every other entity within that industry and offer a crude version to start redesigning for several other industry or government types. The idea is the more we customize our solutions the more templates we will have to adapt to other solution types. Overhauling every business entity’s and government division’s proprietary information system to internalize our permanent security solutions and to deliver the economic benefits of our technologies and of operating at marketplace scale is the objectives of phase II.

We have characterized our networks relationship with our participants as the monkey in the middle. When the participants are any combination of individuals and business entities, think of that network as the private sector monkey in the middle. We need to establish a distinct all-government monkey in the middle network to provide a separate secure link between all-government divisions and to be able to pass individual and business interactions with these government divisions.

In any large organization where we have siloed stores of data locked away in traditional emails, texts, snail mail, written notes, voice mails deposited between accounting, sales, and service departments with no way to share any of this information securely or otherwise the old saying that the left hand does not know what the right hand is doing is often very true and dangerous. This flaw in our national defense was one of the major takeaways from the 911 Commission. The all-government monkey in the middle spanning every division from the white house down to the local dog catcher’s office makes it possible for every right hand to securely know what every left hand needs to know in near real time to make actionable intelligence capabilities possible without revealing any personally identifiable information in violation of any privacy laws. The accountants and IT personnel designing the all-government and each division’s information system need to learn from the participants involved what information needs to be gathered, who to send it to and what are the triggers that initiate the collection of this data and the automation of these actionable intelligence capabilities.

Standing up an all-government network between our private sector network and every division of government at all levels helps to keep what must remain government secrets while facilitating the sharing of what other hands need to know and sometimes that includes the entire private sector as is the case in most emergency public service announcements such as a tornado warning.

Sign up for a free trial of our enhanced communication services at hiddin.net