The Technological Revolution in the Service of U.S. National Security


The White House Office of Science and Technology Policy defines key national security technologies

In recent days, the White House Office of Science and Technology Policy has released a document identifying Critical and Emerging Technologies (CET) essential for the national security of the United States. The list of these innovations includes distributed ledgers, digital assets, and digital identity, among others.

Cultural intelligence and digital technologies lead the Office’s classification list

According to the published document, cultural intelligence holds a significant position on the list of 18 categories deemed crucial for national security. Meanwhile, digital technologies have been classified under “Data Privacy Technologies, Data Security, and Cybersecurity,” encompassing innovations in digital payments as well.

From ‘financial technologies’ to ‘data privacy technologies’

It is worth noting that two years ago, the Office published a similar list where the mentioned technologies were referred to as ‘financial technologies.’ The current change in terminology seems to reflect the technological evolution and shifting priorities in the national security domain.

A critical view on blockchain technology

The White House Council of Economic Advisers criticized blockchain technology last year, stating that distributed ledgers are not particularly innovative or useful. This stance is surprising considering the growing global interest in blockchain.

The digital dollar project in the USA

The Office of Science and Technology Policy has previously been engaged with digital technologies and, this year, discussed design options for the digital dollar – the concept of a central bank digital currency (CBDC). However, the introduction of a retail CBDC in the United States faces resistance in Congress, especially from Republicans and some Democrats concerned about its impact on bank lending.

Given the current technological and governmental policy changes, it is crucial to monitor how key national security technologies evolve and the challenges that arise during their implementation process.