“Hack The Pentagon” Program

ash-carter_DoD_hack_the_pentagonDefence Secretary Ash Carter gestures during a news conference at the Pentagon. The Pentagon is looking for a few good computer hackers.

The Pentagon is looking for a few good computer hackers.

Screened high-tech specialists will be brought in to try to breach the Defence Department’s public Internet pages in a pilot program aimed at finding and fixing cybersecurity vulnerabilities.

According to the Pentagon, it is the first time the federal government has undertaken a program with outsiders attempting to breach the networks. Large companies have done similar things.

Defence officials laid out the broad outlines of the plan Wednesday, but had few details on how it will work, what Pentagon systems would be tested and how the hackers would be compensated.

Called “Hack the Pentagon,” the program will begin next month. Department officials and lawyers still must work through a number of legal issues involving the authorization of so-called “white-hat hackers” to breach active Pentagon websites.

Defence secretary Ash Carter said he will be “inviting responsible hackers to test our cybersecurity,” adding that he believes the program will “strengthen our digital defenses and ultimately enhance our national security.”

Speaking at a tech industry event in San Francisco, Carter said the idea came from Silicon Valley, where tech companies offer financial rewards or bounties for finding vulnerabilities.

We’re trying to adopt what is a best practice,” he said. “It’s a way of crowdsourcing the expertise and having access to good people. … You’d much rather find the vulnerabilities in your networks in that way– rather than wait for malicious hackers to steal information or compromise a system.

Defence Department systems get probed and attacked millions of times a day, officials say.

The new program is being led by the Defence Digital Service, which was created by Carter last November.

Officials said the pilot program will involve public networks or websites that do not have any sensitive information or personal employee data on them.

It is being called a “bounty” program and Carter said the hackers would get some kind of reward, beyond the distinction of having beached the world’s greatest military’s systems. But he didn’t provide details.

About Deepak Devanand

Seeker of knowledge
This entry was posted in Security, Uncategorized, WebApp Security and tagged , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s