ForgotPassword?
Sign Up
Search this Topic:
Posts: 27156
Mar 3 16 7:47 AM
Hacking the Pentagon is a commonly seen feat in action movies, but among actual, real-life hackers who don't want to end in jail, it's known as something you just don't do. That changes today, with a new initiative from the U.S. Defense Department that will ask "vetted" security experts to test the cybersecurity of the Pentagon, Reuters reported Wednesday.The initiative, led by the Pentagon's Defense Digital Service (DDS) and called "Hack the Pentagon," will be similar to other "bug bounty" contests, often designed by large companies in order to have their security tested. Google, for example, has offered a bounty for anyone who can hack its Chrome browser at the annual Pwn2Own hacking contest for years. Pentagon expects thousands of qualified participants to join the initiative. The U.S. military has its own internal teams performing security checks, but having more brains working on a problem is probably a good thing.
Hacking the Pentagon is a commonly seen feat in action movies, but among actual, real-life hackers who don't want to end in jail, it's known as something you just don't do.
That changes today, with a new initiative from the U.S. Defense Department that will ask "vetted" security experts to test the cybersecurity of the Pentagon, Reuters reported Wednesday.
The initiative, led by the Pentagon's Defense Digital Service (DDS) and called "Hack the Pentagon," will be similar to other "bug bounty" contests, often designed by large companies in order to have their security tested. Google, for example, has offered a bounty for anyone who can hack its Chrome browser at the annual Pwn2Own hacking contest for years.
Pentagon expects thousands of qualified participants to join the initiative. The U.S. military has its own internal teams performing security checks, but having more brains working on a problem is probably a good thing.
FBI Director James B. Comey told lawmakers Tuesday that his agents have “engaged all parts of the U.S. government” to try to get into San Bernardino shooter Syed Rizwan Farook’s work iPhone -- with nothing to show for it. The comment counters public speculation about whether the agency had asked cybersecurity forces at the NSA, CIA and the Pentagon to help circumvent a passcode and other security features of the terrorist’s iPhone 5c. Comey didn’t name agencies, but noted that all options have been exhausted, including assessing a flood of email suggestions from the public. There’s no way to get a complete copy of the data on the passcode-locked iPhone 5c running the iOS 9 operating system without Apple’s help, Comey said.Federal prosecutors had said in another iPhone-unlocking case that investigators don’t have an obligation to consult with other agencies. The comment prompted a critical response from the judge in a ruling issued against the government Monday.
The comment counters public speculation about whether the agency had asked cybersecurity forces at the NSA, CIA and the Pentagon to help circumvent a passcode and other security features of the terrorist’s iPhone 5c.
Comey didn’t name agencies, but noted that all options have been exhausted, including assessing a flood of email suggestions from the public. There’s no way to get a complete copy of the data on the passcode-locked iPhone 5c running the iOS 9 operating system without Apple’s help, Comey said.
Federal prosecutors had said in another iPhone-unlocking case that investigators don’t have an obligation to consult with other agencies. The comment prompted a critical response from the judge in a ruling issued against the government Monday.
Read more @ http://www.latimes.com/business/technology/la-fi-tn-apple-fbi-hackers-cia-nsa-20160301-story.html?utm_source=fark&utm_medium=website&utm_content=link
"What lies behind us and what lies before us are small matters compared to what lies within us." ~ Ralph Waldo Emerson ~
Interact