Find Vulnerabilities in Military Networks By Participating Hack The Army Bug Bounty Program

As part of the ‘Hack the Army’ bug county competition, hackers are invited to discover cybersecurity vulnerabilities in the operating networks used for the US army.

In a program managed by The Defense Digital Service (DDS) and HackerOne, both military and civilian hackers are encouraged to uncover and reveal digital vulnerabilities in the US Department of the Army.

The goal is for computer security researchers to discover and report security weaknesses in military networks so that they can be patched before they are discovered and manipulated by malicious hackers. Civilian hackers who have successfully found legitimate security flaws may receive a financial reward.

“Bug bounty programs are a unique and effective force multiplier for safeguarding critical Army networks, systems and data, and build on the efforts of our Army and DoD security professionals,” said Brigadier General Adam C. Volant, U.S. Army Cyber Command Director of Operations.

“By crowdsourcing solutions with the help of the world’s best military and civilian ethical hackers, we complement our existing security measures and provide an additional means to identify and fix vulnerabilities. Hack the Army 3.0 builds upon the successes and lessons of our prior bug bounty programs,” he added.

It runs from 6th January 2021 until 17th February 2021 and is open to all military and civilian participants.

The Army’s Hack 3.0 is DDS’ 11th HackerOne and U.S. army bug bounty programs. Hack the Pentagon, the defense travel system and the air force were formerly part of initiatives.

“We are proud of our continued partnership with the Army to challenge the status quo in strengthening the security of military systems and shifting government culture by engaging ethical hackers to address vulnerabilities,” said Brett Goldstein, director of the Defense Digital Service.

It is an open invitation for all hackers of the world to participate in the Hack the Army 3.0 Bug bounty challenge by US military personnel.

“We’re calling on civilian and military hackers to show us what they’ve got in this bug bounty and to help train the future force,” Goldstein said.

Back to top button