Menu
US DoD to invite security experts to Hack the Pentagon

US DoD to invite security experts to Hack the Pentagon

The cyber bug bounty program is a first for the federal government, but you'll need to undergo a background check

The U.S. Department of Defense plans to ask computer security experts to Hack the Pentagon as part of a push to improve its cyber defenses.

The initiative is similar to the bug bounty programs run by commercial software companies seeking to reward hackers who report security vulnerabilities in code. The DOD says it's the first cyber bug bounty program in the history of the federal government.

The DOD program, which will launch in April, will ask participants to examine its public Web pages, searching out vulnerabilities and attack launching points.

But the program will only go that far. The DOD's classified networks will be off-limits to the participants, and they won't be free to launch actual attacks on any of the department's public-facing sites.

The Pentagon will recruit participants through crowdsourcing websites, and they'll be required to register and submit to a background check. Once approved, they'll have access to a system chosen by the DOD for a predetermined amount of time.

Participants could be eligible for "monetary awards and other recognition," the DOD said.

Secretary of Defense Ash Carter has spoken a lot about the need for his department to work more closely with Silicon Valley and emulate some of the ways in which tech start-ups operate and innovate.

The Hack the Pentagon program is a product of just such an initiative: the Defense Digital Service, a small team of engineers, affiliated with the U.S. Digital Service, that seeks to improve the DOD's technological agility. Carter launched the Defense Digital Service last November.

“I am always challenging our people to think outside the five-sided box that is the Pentagon,” he said in a statement. “Inviting responsible hackers to test our cybersecurity certainly meets that test."

The Pentagon said it would offer more details about the program and how to apply in the coming weeks.


Follow Us

Join the newsletter!

Error: Please check your email address.

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments