{"id":83676,"date":"2016-12-05T12:00:38","date_gmt":"2016-12-05T12:00:38","guid":{"rendered":"https:\/\/www.transcend.org\/tms\/?p=83676"},"modified":"2016-11-28T18:55:29","modified_gmt":"2016-11-28T18:55:29","slug":"pentagon-looking-for-a-few-good-hackers","status":"publish","type":"post","link":"https:\/\/www.transcend.org\/tms\/2016\/12\/pentagon-looking-for-a-few-good-hackers\/","title":{"rendered":"Pentagon: Looking for a Few Good Hackers"},"content":{"rendered":"<div id=\"attachment_83677\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/11\/Secretary-of-Defense-Ashton-Carter-at-the-Pentagon.jpg\" ><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-83677\" class=\"wp-image-83677\" src=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/11\/Secretary-of-Defense-Ashton-Carter-at-the-Pentagon.jpg\" alt=\"Secretary of Defense Ashton Carter at the Pentagon last month. Credit Brendan Smialowski\/Agence France-Presse \u2014 Getty Images\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/11\/Secretary-of-Defense-Ashton-Carter-at-the-Pentagon.jpg 768w, https:\/\/www.transcend.org\/tms\/wp-content\/uploads\/2016\/11\/Secretary-of-Defense-Ashton-Carter-at-the-Pentagon-300x200.jpg 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><p id=\"caption-attachment-83677\" class=\"wp-caption-text\">Secretary of Defense Ashton Carter at the Pentagon last month.<br \/> Credit Brendan Smialowski\/Agence France-Presse \u2014 Getty Images<\/p><\/div>\n<p><em>28 Nov 2016 &#8211; <\/em>In June 2015, the Office of Personnel Management announced that foreign hackers <a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2015\/06\/05\/us\/breach-in-a-federal-computer-system-exposes-personnel-data.html\" >had stolen the personnel records<\/a> of millions of federal employees, one of the most damaging cyberattacks in history. Just weeks later, the office of the Joint Chiefs of Staff shut down its unclassified email system for several days after officials detected that it had been breached.<\/p>\n<p>These serious intrusions came months after a group affiliated with the Islamic State briefly commandeered<a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2015\/01\/13\/us\/isis-is-cited-in-hacking-of-central-commands-twitter-feed.html\" > the Central Command\u2019s Twitter account<\/a> and rebranded it as the \u201cCyber Caliphate.\u201d<\/p>\n<p>Given the enormity of the problem, one of the responses by the Department of Defense might seem befuddling. They\u2019ve asked hackers willing to play by strict rules to find vulnerabilities in some of the Pentagon\u2019s unclassified computer system.<\/p>\n<p>Well-intentioned computer security experts routinely scan the internet in search of vulnerabilities, which they often map out and report. Until now, doing that on Pentagon sites carried the considerable legal risk of running afoul of the Computer Fraud and Abuse Act.<\/p>\n<p>\u201cHack the Pentagon\u201d kicked off in April with a monthlong trial program that attracted 1,400 so-called white hackers to fiddle with Department of Defense websites on the hunt for weak points that could be exploited to steal data or jam systems. Those hackers spotted 138 weaknesses, according to the Pentagon, and were paid $75,000 in rewards.<\/p>\n<p>Encouraged by the results, the Defense Department last week <a target=\"_blank\" href=\"https:\/\/hackerone.com\/deptofdefense\" >announced a formal policy <\/a>permitting outside computer experts to test for vulnerabilities in the system and report them to the department. Secretary of Defense <a target=\"_blank\" href=\"http:\/\/www.defense.gov\/News\/News-Releases\/News-Release-View\/Article\/1009956\/dod-announces-digital-vulnerability-disclosure-policy-and-hack-the-army-kick-off\" >Ashton Carter called the initiative<\/a> \u201ca \u2018see something, say something\u2019 policy for the digital domain.\u201d Those hackers won\u2019t be paid for their reports, but officials hope they will do it out of a sense of duty.<\/p>\n<p>In addition, the department has started \u201cHack the Army,\u201d a program asking hackers who have been approved by the government to test the Army\u2019s recruiting websites for weaknesses.<\/p>\n<p>While these efforts represent just one aspect of the federal government\u2019s effort to protect secret data more rigorously, Mr. Carter deserves credit for championing an unconventional approach.<\/p>\n<p>\u201cHack the Pentagon\u201d and \u201cHack the Army\u201d allows defense officials to draw from a talent pool that includes people who would not ordinarily feel at home in the military\u2019s hierarchical culture. It may well turn into an unconventional recruitment pipeline for an organization that always benefits from outside perspectives and carefully calibrated disruption.<\/p>\n<p>________________________________<\/p>\n<p style=\"padding-left: 30px;\"><em>A version of this editorial appears in print on November 28, 2016, on page A20 of the New York edition with the headline: Pentagon: Looking for a Few Good Hackers.<\/em><\/p>\n<p><a target=\"_blank\" href=\"http:\/\/www.nytimes.com\/2016\/11\/28\/opinion\/pentagon-looking-for-a-few-good-hackers.html?em_pos=small&amp;emc=edit_ty_20161128&amp;nl=opinion-today&amp;nl_art=5&amp;nlid=77831807&amp;ref=headline&amp;te=1\" >Go to Original \u2013 nytimes.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The last thing the Pentagon would seem to need is more hackers. But Defense Department officials are inviting them in.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-83676","post","type-post","status-publish","format-standard","hentry","category-whistleblowing-surveillance"],"_links":{"self":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/83676","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/comments?post=83676"}],"version-history":[{"count":0,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/posts\/83676\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/media?parent=83676"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/categories?post=83676"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.transcend.org\/tms\/wp-json\/wp\/v2\/tags?post=83676"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}