Modern field guide to security and privacy

The technologist convincing the Pentagon to love hackers

Lisa Wiswell was the driving force behind the Defense Department's first-ever bug bounty program, which rewarded outside security researchers for finding vulnerabilities in its websites. Now, the Pentagon is expanding the effort.

|
Yuri Gripas/Reuters
Secretary of Defense Ash Carter (l.) and Chairman of the Joint Chiefs of Staff General Joseph F. Dunford during a Pentagon news conference in July.

Minutes after news of the Office of Personnel Management (OPM) hack broke last year, Lisa Wiswell started getting calls from hackers. 

Ms. Wiswell, chief of digital security for the Pentagon's Defense Digital Service, has long worked with independent security researchers, and considers ethical hackers allies in the country's fight against internet saboteurs. 

"All of the folks said, 'Listen, we don't want something like OPM to ever happen again. Just find a legal avenue for me to help,' " she recalls.

The overwhelming reaction from a community of people whose work has become critical for tech companies, banks, automakers, and utilities to secure computer systems and software compelled Wiswell to bring hackers into the Pentagon's fold.

And so earlier this year, Wiswell led the charge to launch the federal government’s first-ever bug bounty program, which rewards hackers for finding and reporting software bugs. 

Its ostensible aim was to help the Pentagon find vulnerabilities in its public websites, but Wiswell had a more subversive and wide-reaching goal in mind, too: Help change the image of hackers, who many inside the Pentagon associated only with criminal breaches and computer attacks. In doing so, she says, she wants to change US national security culture. 

It's beginning to work. The initial program was so successful that on Wednesday the Pentagon announced two new contracts worth $7 million to expand the bug bounty program, working with tech companies HackerOne and Synack to facilitate the expanded effort.

"Working with the external hacker community supplements the fantastic cybersecurity work that DoD is doing internally, said Marten Mickos, chief executive officer of HackerOne, in a press release. "No organization or government is so powerful that it does not need outside help identifying security issues."

More than 1,400 hackers signed up for the pilot bug bounty program – triple what Pentagon officials had anticipated. In the end, the Pentagon paid out $75,000  for more than 130  "legitimate, unique" vulnerabilities and saved DOD, by Defense Secretary Ash Carter’s estimates, millions of dollars. (The DOD paid $5 million over three years to one vendor, which found less than 10 vulnerabilities, for example.)

Hackers as patriots

What was equally striking to Wiswell was that these hackers were willing to forge ahead despite a robust chorus of voices within their own community who were against helping the Pentagon root out vulnerabilities, warning that the government was just looking for intelligence about the hacker community.

"There were pockets of folks saying, 'Don’t do it. Don’t sign up. They just want to collect your information and keep a list of hacker out there,'" says Wiswell.

When Wiswell and others on her team conducted exit interviews with the hackers who had taken part in the bug bounty, 9 out of 10 said they signed up because they felt like the US was asking them to serve.

"One said, 'I can’t even run a mile. I’m not cut out to be a soldier. But if the DOD asks me to help in an area I’m skilled in, I’m happy to do it,' " Wiswell recalls. "He found a lot of interesting vulnerabilities for us."

What they wanted in return was the modest request that the government not put them on some watch list. They also wanted to Pentagon to create clear parameters for hacking, so they wouldn’t wander into secure servers – known as "hack-cidents" – that could leave them vulnerable to, say, prosecution by the Department of Justice.

Wiswell understood their concerns.

"They wanted to know we weren't going to call up the DOJ and say, 'Here are some folks you might want to talk to,' " she says. "There were a number of things that were just really unclear. It’s a scary thing to conduct any sort of researching activities against DOD IP space at all, given the last 30 years of history."

The Defense Digital Service dutifully went to work building these parameters and, in turn, cultivating trust within the hacker community. "We didn’t even know their true identities," Wiswell says. "We just had user names."

Changing attitudes

The first bug bounty also proved to some skeptical Pentagon officials that the hackers "did what we asked them to do and nothing more," Wiswell says, adding that it helped her to make the case to expand the program.

Version two of the Pentagon's bug bounty program will be similar to the inaugural one, but will eventually invite hackers to go deeper into Pentagon systems. 

"DOD is a very interesting organization, because our mission-critical assets are networked and online, too," Wiswell says. "We want to make sure there aren’t vulnerabilities in more sensitive assets." 

To this end, the Pentagon will invite a "limited number" of "deep binary hackers" to take part, to help strengthen the security of "small, embedded systems" like thumb drives and phones, she adds. "Those might be something you'd care to hack." 

They are certainly Pentagon items that have proven highly vulnerable in the past. And going forward, it is possible that the Pentagon will push the boundaries of the bug bounties even further, into the classified realm.

"There are lots of laws when you're talking about hacking anything classified, but there's certainly potential in that space," Wiswell says. "I think that there are probably a lot of networked assets that touch classified systems that aren't classified themselves – and those might be interesting areas to start."

To accompany the bug bounty program, Wiswell's next priority is to put in place a "DOD vulnerability disclosure policy," which she describes as a sort of "see something, say something" for the digital realm. It is meant to be a protection for hackers to do just that: pointing out vulnerabilities in the Pentagon systems that they come across, without fear of retribution.

After all, the bug bounty program wasn't just about pointing to holes in the Pentagon’s public-facing sites, Wiswell says: It was also about getting the government to admit that it needs help from hackers.

"The bottom line is that code that goes unchecked for long periods of time is just vulnerable – that’s software development 101," she says. "So we’re publicly extending an olive branch."

Security Culture

This journalism empowers people to understand the bigger picture of cybersecurity as it connects to some of the most personal parts of their lives: their job, their education, the evolving digital culture around them, and the technology they use on a day-to-day basis. As part of the Monitor’s overarching commitment to chronicling human progress, we see these very human issues within cybersecurity to be critical and overlooked parts of the conversation.

This initiative is generously supported by

  • Northrop Grumman
  • ISC
You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to The technologist convincing the Pentagon to love hackers
Read this article in
https://www.csmonitor.com/World/Passcode/Security-culture/2016/1021/The-technologist-convincing-the-Pentagon-to-love-hackers
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe