Securing America’s Infrastructure: Blockchain Solutions for Cyber and Physical Threats

May 7, 2025  

By: Jean-Philippe Beaudet 

Advanced Persistent Threats (APTs) are covert cyber-attacks where an attacker gains access to a computer network and remains undetected for an extended period of time, either lying in wait to attack at an opportune time in the future or manipulating the network undetected in the background for months or years. 

According to the Joint Cybersecurity Advisory – an international consortium of intelligence and security organizations – the past few years have seen significant nation-state-backed cyber-attacks against the United States:  

  • Chinese-affiliated Volt Typhoon, “has compromised the IT environments of multiple critical infrastructure organizations – primarily in Communications, Energy, Transportation Systems, and Water and Wastewater Systems (WWS) sectors.”1 
  • “Russian state-sponsored APTs have used sophisticated cyber capabilities to target a variety of U.S. and international critical infrastructure organizations, including those in the Defense Industrial Base as well as the Healthcare and Public Health, Energy, Telecommunications, and Government Facilities Sectors.”2 
  • “[Iranian Revolutionary Guard Corps]-affiliated APTs are actively targeting programmable logic controllers (PLCs). These PLCs are commonly used in the WWS Sector and other industries including, but not limited to, energy, food and beverage manufacturing, and healthcare.”3 

Securing critical physical infrastructure and the software it utilizes is a central concern for U.S. national security professionals because these systems underpin every critical service we rely upon for our livelihood and survival. Blockchain technology offers innovative solutions to enhance security, ensure operational integrity, and mitigate risks to these vital assets.  

Immutable Audit Trails for Infrastructure Monitoring  

Blockchain’s decentralized and immutable ledger provides a secure solution for monitoring physical infrastructure. Every operation, system update, and status change can be permanently recorded on the blockchain, allowing stakeholders to audit infrastructure activity in real-time. This transparency ensures that tampering or malicious attempts to compromise critical systems—whether through physical effects or non-kinetic cyber-intrusions—are instantly detectable. Unauthorized changes or anomalies can trigger immediate alerts, empowering operators to react swiftly to mitigate damage and prevent wider-scale disruptions.  

Securing Operational Technology with Decentralized Control  

Operational Technology (OT) systems, such as those controlling power grids, water treatment facilities, and transportation networks, are critical to our national infrastructure. Centralized OT systems are vulnerable single points of failure, where cyber-attacks or insider threats at one entry point could compromise entire networks. Distributing these nodes through a blockchain network significantly reduces the risk of system compromise. This decentralization adds resilience by making it exceedingly difficult for adversaries to launch successful attacks on large-scale infrastructure.  

Strengthening Supply Chain Integrity  

The physical components of critical infrastructure – from transformers in power grids to sensors in water treatment plants – often pass through complex global supply chains before reaching their destination. Blockchain technology paired with Internet of Things (IoT) monitoring provides end-to-end visibility of each component’s journey, ensuring that only verified, authenticated, and untampered-with materials are used in infrastructure systems. By securely recording every transaction and transfer on an immutable ledger, blockchain greatly diminishes the risk of counterfeit or compromised parts being introduced into critical infrastructure, reducing the ability of adversaries to exploit systemic vulnerabilities.  

Implementation of blockchains in service of protecting our critical infrastructure is perhaps one of the most important and efficacious uses cases to date for the technology and we strongly support research, investment, and implementation of them to safeguard U.S. national security.  

The Digital Chamber will continue to collaborate with policymakers, researchers, and industry leaders to advance the integration of blockchain into our nation’s physical infrastructure, protecting the services and resources our citizens depend on. 

About The Digital Chamber

The Digital Chamber is the world’s leading trade association representing blockchain and digital asset businesses. Founded in 2014, the organization has been instrumental in shaping policy, educating lawmakers, and driving regulatory clarity to support the responsible growth of the digital asset industry. For more information, visit www.digitalchamber.org.

High-Trust Digital Identity for National Security

March 13, 2025  

By: Jean-Philippe Beaudet 

Digital identity systems are becoming increasingly common worldwide, with over 90% of countries storing identification information digitally. Among these, 67% support in-person digital identity verification or authentication, and nearly 40% issue digital IDs capable of remote authentication for online services and transactions.1 These digital IDs are used to provide services to citizens, track individuals who may pose security risks, and prevent identity theft and fraud. 

Unfortunately, despite the advanced countermeasures designed to prevent counterfeiting and fraud, fake IDs — both physical and digital — continue to circulate widely, particularly on American college campuses. Meanwhile, stolen documentation complicates efforts to secure U.S. borders against illegal migration, not to mention the financial burden on Americans. Identity theft cost Americans over $43 billion in 2022 alone. Blockchain Identity Credentials (BICs) offer enhanced security and data fidelity to protect Personally Identifiable Information (PII) from theft and fraud. According to the University of Texas at Austin’s Center on Identity, BICs could have prevented an estimated $1.59 billion in fraud and identity theft cases between 2000 and 2020.2 

Preventing Identity Fraud with Immutable Records 

Blockchain’s immutable decentralized ledger is a natural solution to the growing challenge of identity fraud. Once an identity is recorded on the blockchain, it cannot be altered or manipulated without detection. Each transaction involving a user’s digital identity – whether authentication for government services, financial institutions, or healthcare systems – can be securely logged, ensuring the integrity of their personal data. This capability drastically reduces the risk of counterfeit documents or the use of stolen credentials, strengthening border security and making it harder for adversaries to exploit weak points in identity verification systems. 

Securing National Identity Databases 

Traditional identity databases are prime targets for hackers, with breaches of government and corporate systems often resulting in massive leaks of sensitive personal information. In August 2024, a breach of National Public Data systems exposed an estimated 2.9 billion records, including names, addresses, and Social Security numbers.3 BICs reduce this risk by spreading control of personal data across multiple points, rather than storing it in one central system. Using cryptographic keys, only authorized entities can access this information, making it far more difficult for hackers to steal data. This approach makes BICs powerful tools for protecting national databases, securing citizens’ identities, and defending against cyber espionage and digital terrorism. 

Empowering Citizens with User-Owned Identities 

One of the most significant advantages of using BICs is the built-in concept of user-owned identity, which gives individuals full control over their personal data. Rather than disclosing entire documents, citizens can selectively share specific pieces of personally identifiable information (PII) as credentials for bespoke purposes—for example, proving they are old enough to buy alcohol without revealing their exact birthdate or home address. This approach enhances privacy while still providing governments and other entities with the verifiable data they need for security checks. By limiting the exposure of sensitive information, self-sovereign identity systems reduce the risk of identity theft and minimize unnecessary data collection. 

Enhancing Border Security and Immigration Control 

Blockchain Identity Credentials can significantly improve the efficiency and security of border control, customs, and immigration processes. By leveraging BICs to authenticate digital IDs in real-time, customs and immigration officials can instantly verify the legitimacy of travel documents and visas, reducing wait times and improving the detection of fraudulent credentials. BICs also enable better tracking of individuals of interest—such as those on watchlists or with criminal histories—while maintaining transparency and accountability. By streamlining identity verification, blockchain enhances immigration control and strengthens national borders against security threats. 

The Digital Chamber will continue to collaborate with policymakers, researchers, and industry leaders to advance the integration of blockchain into identity management systems to foster innovation and protect the identities and safety of U.S. citizens. 

  1. Metz, A., Casher, C., and Clark, J. 2024. ID4D Global Dataset Volume 2: Digital Identification Progress and Gaps. Washington, DC: World Bank. License: Creative Commons Attribution CC BY 3.0 IGO.
  2. How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft. R. Nokhbeh Zaeem, K. Suzanne Barber, UT CID Report #20-14, July, 2020. Pp 9-11.
  3. Emily DeLetter, Social Security Hack Exposes 2.9 Billion Records in National Public Data Breach. USA Today. August 15, 2024. https://www.usatoday.com/story/tech/2024/08/15/social-security-hack-national-public-data-breach/74807903007/

About The Digital Chamber

The Digital Chamber is the world’s leading trade association representing blockchain and digital asset businesses. Founded in 2014, the organization has been instrumental in shaping policy, educating lawmakers, and driving regulatory clarity to support the responsible growth of the digital asset industry. For more information, visit www.digitalchamber.org.

Blockchain and AI: Securing the Future of National Defense

By: Jean-Philippe Beaudet

March 10, 2025  

Artificial intelligence (AI) has quickly cemented itself into the national security discussion and will remain a key focus area where the U.S. must maintain dominance in ingenuity and development. While U.S. adversaries execute AI-enhanced cyber-attacks and deploy fully autonomous weapons systems, more subtle threats from AI likewise hold drastic implications for American national security. Blockchain-based decentralized AI solutions are the most promising options for our developing national AI ecosystem.  

AI is increasingly integrated into software across all industries, from home thermostats and map apps on every phone to the industrial control systems that monitor tank pressure in nuclear reactors and prevent meltdowns. Alongside this growing reach, the machine learning models that ‘teach’ AI are opaque, vulnerable, and their operation requires enormous amounts of energy and computation. The decentralized, open, and immutable nature of blockchain technology offers solutions to these key challenges.   

Shining Light Into AI’s Black Box   

Decentralized AI (DeAI) – (i.e. models rooted in and built on blockchain networks) provides an alternative to the opaque nature of traditional AI, whose learning processes, disturbingly, the world’s best computing experts cannot fully explain. By basing AI models on blockchains throughout AI model construction, every decision, training step, and data point involved in AI processes can be recorded transparently. This allows stakeholders to audit and verify how AI models learn and make decisions, ensuring we understand the possibilities and vulnerabilities of this technology as both we and our adversaries deploy it in the national security context. After all, if AI is guiding our missiles or identifying the targets, we should endeavor to understand how and why it is reaching its conclusions.  

Data Integrity and Poisoning Defense   

Blockchain’s immutable and transparent ledger ensures that data used in AI models remains tamper-proof and trustworthy. Since each data point is securely recorded and distributed across the network, any attempt to alter or corrupt the data is easily detectable. This feature defends against “model poisoning” attacks, where adversaries insert malicious or biased data to manipulate an AI’s learning process. Blockchain safeguards the integrity of the data-feeding AI models, preventing unauthorized changes and ensuring the reliability and accuracy of AI outputs critical to national security.   

Decentralized Computing and Energy Demands   

AI requires extreme amounts of computing power and energy to function effectively. Relying on centralized data centers to handle the computing and power demand can create cooling, physical security, local grid capacity, cybersecurity, and service delay issues for distributors. DeAI allows networks to pool, distribute, and redirect resources as necessary to meet these increased demands. This is exactly why major cloud computing providers have dispersed their data centers worldwide – but this dispersed, centralized AI infrastructure introduces single points of failure that threaten our national security and economic dynamism. For example, if a major cyber-attack disabled Amazon Web Services (AWS), the leading global cloud service provider, 34% of the globe’s cloud computing would fail, costing U.S. businesses an estimated $11.4 billion per day.1 This type of centralized digital infrastructure is far less resilient than the decentralized alternatives blockchain technologies enable.  

By leveraging blockchain’s immutable and distributed nature the U.S. can mitigate AI’s black-box risks, defend against adversarial manipulation, and create a more robust computational backbone for our nation’s AI-driven security applications. A decentralized approach ensures that America’s AI ecosystem remains resilient, verifiable, and resistant to the single points of failure that threaten centralized architectures. In an era where technological superiority dictates geopolitical power, embracing blockchain-based AI is not just an option—it is a necessity. 

If you have any questions, please reach out to Policy@digitalchamber.org

Who We Are 

The Digital Chamber (TDC) advocates for national and international standards that leverage blockchain’s inherent strengths to mitigate AI’s greatest risks and unleash AI’s economic dynamism. 

Citations 

1. Parametrix Insurance, “Cloud Outage and the Fortune 500”, 2023.

Cybersecurity, Critical Infrastructure and Blockchain Solutions

The Problem: 

U.S. critical infrastructure—like transportation, communication, health, water, and energy—is the backbone of the country’s economy. Yet, it remains increasingly vulnerable to cybersecurity disruptions from adversaries. 

Furthermore, FBI Director Christopher Wray warned earlier this year that “China’s hackers are targeting American civilian critical infrastructure, pre-positioning to cause real-world harmto American citizens and communities in the event of conflict.”1 China is only one of several nation-states undermining U.S. cyber defenses, but Chinese advanced persistent threats (APTs) consistently rank among the most capable and intrusive. In December 2023, U.S. investigators discovered that hackers known as Volt Typhoon, affiliated with the Chinese People’s Liberation Army, had launched cyberattacks against government offices and infrastructure. These attacks aimed to gather intelligence, monitor citizens, and prepare to disable or degrade systems’ performance in future operations targeting the U.S. and its partners. Evidence suggests these APTs may have been active within U.S. networks since 2019. 

Most recently, hackers breached the networks of the largest water utility company in the U.S. that provides drinking and wastewater services to more than 14 million people in 14 states and 18 military installations.2 One can only imagine how our adversaries could exacerbate national emergencies and disasters by degrading these critical systems in times of greatest need and vulnerability. 

The Solution: 

Blockchain technology can help mitigate some of these risks; they are inherently secure, and offer several key advantages that can bolster American cybersecurity capabilities: 

  • Decentralization – Unlike traditionally centralized databases, blockchains operate on a distributed network of nodes. This decentralized architecture eliminates single points of failure, making it significantly more challenging for attackers to disrupt or compromise the entire network. 
  • Immutable Ledgers – Blockchain employs cryptographic hash functions to secure transactions. Each block in the chain contains a hash of the previous block, creating a cryptographic linkage that ensures immutability. This property ensures a permanent, auditable record that is highly resistant to tampering. This is especially important in cybersecurity, where edges and nodes in a network can hold and communicate threat profiles and defensive resources more efficiently than regular, distributed updates pushed out by centralized entities.
  • Enhanced Transparency and Trust – A blockchain is a distributed, shared ledger where all participants can observe and verify transactions, fostering trust and facilitating identification and mitigation of anomalies or fraudulent activity. 
     

What is to be done? 

U.S. allies and adversaries have either developed or are currently developing robust and progressive national blockchain strategies to leverage the high security, high fidelity, and low latency the technology offers. The U.S. government has consistently acknowledged the importance of blockchain technology and the need for policy development to support its secure deployment. For instance, the National Institute of Standards and Technology (NIST) Cybersecurity Framework highlights the importance of incorporating blockchain into cybersecurity strategies.3 Additionally, Executive Order 14028, Improving the Nation’s Cybersecurity, underscores the need for enhanced cybersecurity measures and encourages the exploration of blockchain technologies to strengthen the nation’s cybersecurity posture. 

However, many U.S. policymakers have ignored the seriousness of the threat posed in cyberspace and the possibilities of blockchain to mitigate those threats.  

The Digital Chamber (TDC) recommends that the U.S. government engage the blockchain industry and support its holistic development via an increase in strategic investment and research through agencies like the National Science Foundation, In-Q-Tel, Defense Advanced Research Projects Agency (DARPA), NIST, the Department of Homeland Security, the Department of Defense, and others. 

It is vital for U.S. national security interests to lead in advanced computing and blockchain innovation, to ensure networks are safe, information remains secure, and the U.S. can respond effectively to emerging threats. 

If you have any questions, please reach out to Policy@digitalchamber.org.

HFSC National Security Subcommittee: Ransomware Hearing

Hearing entitled: Held for Ransom: How Ransomware Endangers Our Financial System 

On April 16, 2024, the House Financial Services Subcommittee on National Security, Illicit Finance, and International Financial Institutions held a hearing to discuss the critical issue of ransomware and its implications for the security of our financial system.

Witnesses (testimony linked): 

Jacqueline Burns Koven: Head of Cyber Threat Intelligence, Chainalysis 

Daniel Sergile: Senior Consulting Director, Unit 42 by Palo Alto Networks 

Megan Stifel: Chief Strategy Officer, Institute for Security and Technology 

Kemba Eneas Walden: President, Paladin Global Institute 

Hearing Takeaway: 

While digital assets were not the central theme, they emerged as a key topic due to their role in ransomware economics. The hearing delved into ransomware’s operational intricacies, the alarming rise in payment values despite fewer incidents, and the challenge of ransomware as a service (RaaS) operating beyond U.S. jurisdiction. There was a general acknowledgment that ransomware is a national security issue requiring tight regulation, improved public-private cooperation, and resources to help small businesses strengthen their cyber defenses. The discussion highlighted the effectiveness of blockchain analytics in tracing ransom payments and the potential legislative actions to advance the fight against these cyber threats. 

Member Opening Statements: 

Vice Chair Elaine (R-CA) opened the hearing on ransomware, emphasizing the critical need for a comprehensive understanding of this growing cyber threat that has not been fully addressed since pandemic-related fraud hearings four years ago. She highlighted the vulnerability of all sectors to ransomware, which extorted over $1B in 2023 alone, and underscored the potential for even a single employee error to result in significant breaches. Kim pointed out the real-world impacts of such attacks in her district and beyond, stressing the ongoing threat and the use of AI by cybercriminals to exploit system vulnerabilities. She also touched upon geopolitical dimensions, noting Iran’s role in cyber operations against the U.S. and its allies. Kim called for enhanced congressional awareness and a unified effort to address the ransomware challenge, appreciating the bipartisan approach to tackling this critical national security issue. 

Ranking Member Joyce Beatty (D-OH) thanked the Chair for their collaborative efforts on financial issues and for convening the hearing on the escalating threat of ransomware, particularly highlighting its impact on small and medium-sized businesses and national security. She noted the dramatic rise in ransomware incidents, with the value of attacks increasing from $102 million in 2018 to $1.1 billion in 2023. Beatty stressed the need for bipartisan congressional action to enhance business preparedness and consumer protection and praised the Biden administration and Treasury agencies like FinCEN and OFAC for their efforts in combating these attacks through legislation and strategic initiatives to trace ransom payments. She emphasized supporting these agencies rather than undermining their efforts and expressed a commitment to collaborating across party lines to address this significant national security challenge. 

Witness Statements: 

Jacqueline Burns Koven from Chainalysis emphasized the pivotal role of blockchain technology in countering ransomware during her testimony. As Head of Cyber Threat Intelligence, she outlined how the tool facilitates tracking and disrupting ransomware operations on the blockchain, aiding policymakers and law enforcement. Koven debunked the myth that cryptocurrency transactions are anonymous, noting they are public and traceable. She cited significant successes such as the FBI’s Colonial Pipeline case, where Chainalysis’ data led to substantial seizures of bitcoin. Despite the increase in ransom demands, she noted a decrease in actual payments, suggesting greater difficulty for attackers to profit. Koven advocated for enhanced support from Congress to empower federal efforts with blockchain intelligence, emphasizing a collaborative, whole-of-government approach to sustain pressure on ransomware actors. 

Daniel Sergile from Palo Alto Networks discussed the evolution of ransomware into a significant operational risk across various sectors, emphasizing the increasing sophistication of extortion tactics, including AI-enhanced attacks. He identified vulnerabilities due to insufficient visibility across digital infrastructures and outdated IT systems, particularly in financial services. Sergile recommended strengthening cybersecurity through actions like enhancing incident response strategies, improving infrastructure visibility, leveraging AI, adopting zero-trust architectures, and prioritizing cloud security. He highlighted the importance of collaboration within cybersecurity forums like JCDC, the Ransomware Task Force, and FS-ISAC to enhance collective defense capabilities. Sergile’s testimony did not specifically mention cryptocurrency. 

Megan Stifel, Chief Strategy Officer at the Institute for Security and Technology highlighted the critical role of cryptocurrency in ransomware economies during her testimony. She discussed the Ransomware Task Force’s efforts, which led to a report with 48 recommendations—12 targeting financial services—stressing the need for strict regulation of the cryptocurrency sector to mitigate ransomware payments through compliance with KYC, AML, and CFT rules. Stifel emphasized that despite efforts following significant ransomware incidents substantial progress is needed, especially in the financial sector where cryptocurrency transactions facilitate these criminal activities. She proposed enhancing sector resilience, ensuring adequate resources for investigating financial abuses, and promoting cybersecurity best practices through collaboration between the government and private sectors. Stifel concluded by expressing readiness to continue addressing these urgent cybersecurity challenges. 

Kemba Walden of Paladin Global Institute emphasized the sophistication of ransomware attacks and the necessity for a multi-faceted approach to deter and disrupt these threats. Highlighting the Task Force’s work, she spoke about the importance of raising the cost and lowering the profitability of ransomware. Walden identified the critical moments when ransomware criminals are most vulnerable—during the ‘on and off ramps’ of cryptocurrency transactions where fiat currency and crypto are converted— and stressed the need for quick action between financial services and law enforcement to exploit these vulnerabilities. Concluding with a call to action, she urged for the full implementation of policy recommendations, including those that address legislative gaps in combating ransomware and its financial mechanisms. 

Questioning: 

Vice Chair Young Kim opened the questioning by asking Jacqueline Koven what role digital assets play in ransomware attacks and how law enforcement and congress can work to combat ransomware. Koven explained how bad actors are no longer putting their crypto address on display now. This is an Achilles heel for bad actors; once the address is found blockchain analytics can be used to trace everything and “law enforcement is able to understand the entire ransomware supply chain.” 

Responding to another Rep. Kim question, Megan Stifel emphasized AI’s role in ransomware evolution, while Daniel Sergile stressed foundational cyber hygiene for companies. 

Ranking Member Joyce Beatty addressed the vulnerability of small to medium-sized businesses to ransomware due to limited cyber defense resources. Stifel advocated for the use of grant programs, and Walden proposed tax incentives to promote cybersecurity practices among these businesses. 

Rep. Andy Barr (R-KY) highlighted the national security risk posed by the cybersecurity workforce shortage and queried the targeting pattern of ransomware attacks in relation to cybersecurity insurance holders. 

Rep. Maxine Waters (D-CA) discussed the potential effects of banning ransomware payments, with Walden cautioning that such a ban could severely impact small to medium-sized businesses and emphasized the need to fortify cyber defenses for critical infrastructure. 

Rep. Barry Loudermilk (R-GA) emphasized the importance of trust and public-private partnerships in the aftermath of incidents like the Colonial Pipeline disruption. 

Rep. Wiley Nickel (D-NC) echoed Koven’s remarks on the traceability of cryptocurrency in ransomware cases, with Koven underscoring the need for rapid law enforcement action to prevent fund laundering by bad actors that move quickly. Koven also stated that increased training and resources for law enforcement are needed. 

Nickel also asked why there has been a significant increase in ransomware payments. Walden noted a decrease in the number of ransomware payments but an increase in their average dollar value. 

Rep. Roger Williams (R-TX) questioned the evolution of ransomware and the legislative actions needed to keep pace. Sergile illustrated the use of AI in combatting threat actors, and Koven noted the increasing sophistication of ransomware, suggesting a need for involvement from multiple agencies. 

Koven also analogized it to big game hunting as bad actors are increasingly more sophisticated. Koven flagged how nation state actors engaged in ransomware are being used to obfuscate national politically motivated activities like disruption and espionage and the important to involve multiple agencies because of this. 

Rep. Dean Phillips (D-MN) referred to the significant rise in ransom payments and the need for legal and investigative capacity investment. Stifel discussed the shortage of trained investigators, while Walden highlighted the necessity for enhanced government understanding of investigative tools like blockchain analysis. 

Rep. Zach Nunn (R-IA) inquired about the nature of “Ransomware as a Service” and brought up his Public and Private Ransomware Response Coordination Act, which aims to improve threat detection, information sharing, response time, and threat suppression. Stifel described RaaS operators utilizing services outside of U.S. jurisdiction, while Koven highlighted the impact of public-private partnerships citing how their collaborative work with law enforcement has resulted in freezing North Korean funds and the colonial pipeline resolution.  

Rep. Bill Foster (D-IL) continued to push his Digital ID legislation saying implementing Digital ID is the single most useful thing congress could do. This is the same Digital driver’s license idea he pushed for in last year’s July HFSC markup while Sergile replied that the Digital ID proposed may not be infallible.  

Rep. Dan Meuser (R-PA) focused on what makes certain companies targets for ransomware, with Stifel emphasizing the need for more support for small businesses. 

Rep. Monica De La Cruz (R-TX) wrapped up the questioning by supporting the idea of tax incentives for small businesses to enhance their cybersecurity measures, drawing from her personal experience as a business owner. 

Chamber Submits Letter Countering Crypto & Terrorism Narrative by Sen. Warren

In response to the misinformation in Senators Warren and Marshall and Representative Casten’s letter to the Biden Administration on crypto-financed terrorism, the Chamber wrote a letter to 280 Congressional staffers, including to all of the 102 co-signees and other relevant Members’ staffers.

The letter provides the full known context of crypto in financing terror and dispels the inaccurate conclusions derived from faulty analysis and methodology. The Chamber supports the proactive use of blockchain technology and related analytics to track, deter and apprehend terrorists and criminals. Mischaracterizing the use of blockchain and crypto in perpetrating heinous crimes does a disservice to the myriad American blockchain-based businesses striving to protect national security and grow our economy.

Chamber Opposes the Crypto-Asset National Security Enhancement Act of 2023 

July 19, 2023 – The Chamber of Digital Commerce opposes S.2355, the Crypto-Asset National Security Enhancement Act.  

The Chamber views it as an excessive and misguided approach to addressing security issues related to decentralized finance (DeFi) and Crypto Kiosks.  

Traditional financial systems have long been exploited for money laundering activities at a scale much larger than the nascent crypto sector. Therefore, while the digital asset industry welcomes strong, effective AML laws, it is crucial that these laws are proportionate and do not unfairly penalize the industry or inhibit innovation.  

“The Crypto-Asset National Security Enhancement Act of 2023 is a bad bill. As is, this bill is unworkable,” said Cody Carbone, Vice President of Policy at The Chamber. “We at The Chamber are committed to work with each individual bill sponsor to educate them so they can produce commonsense legal frameworks that protect consumers, U.S. national security, and deter bad actors without stifling innovation or infringing on privacy rights.” 

The Chamber maintains that the bill is technically unfeasible, excessively burdensome, and could potentially stifle the burgeoning digital asset industry in the U.S., harming not only the innovators in the field but also consumers seeking to leverage these emerging financial tools. 

A more balanced approach is to instead recognize and leverage the inherent transparency and programmability of blockchain systems, and work alongside industry experts to formulate a technologically sound, practical approach that supports both national security and the growth of the DeFi sector. 

**Chamber experts are available for comment.  

Contact press@digitalchamber.org to schedule an interview.**