Advertisement

Pentagon honors teen hacker for exposing department's online flaws

By Eric DuVall
Secretary of Defense Ashton B. Carter said Friday he was grateful to the hackers who helped the Pentagon identify potential security holes in five public defense websites. The Defense Department held the government's first-ever "bug bounty" to identify potential hacker targets. Photo by Billy Weeks/UPI
Secretary of Defense Ashton B. Carter said Friday he was grateful to the hackers who helped the Pentagon identify potential security holes in five public defense websites. The Defense Department held the government's first-ever "bug bounty" to identify potential hacker targets. Photo by Billy Weeks/UPI | License Photo

Subscribe | UPI Odd Newsletter

WASHINGTON, June 18 (UPI) -- An 18-year-old recent high school graduate was one of two people singled out by the Pentagon for hacking into its website and Defense Secretary Ashton Carter said he was thankful -- to the hackers.

Carter met with the teen, David Dworken, and another hacker, Craig Arendt, the two who identified the highest number of potential vulnerabilities in several Defense Department websites, including its main one, www.defense.gov.

Advertisement

The hackers were participating in the Pentagon's first "bug bounty," where it asked those with computer hacking capabilities to investigate five public websites and identify potential lapses in security where a nefarious hacker could do damage. If those participating identify a legitimate security breach, they earn a bounty.

"We know that state-sponsored actors and black-hat hackers want to challenge and exploit our networks," Carter said. "What we didn't fully appreciate before this pilot was how many white-hat hackers there are who want to make a difference -- hackers who want to help keep our people and nation safer."

More than 1,400 eligible hackers registered for the federal government's first "bug bounty" and identified 138 different potential security lapses.

Advertisement

The Pentagon said hiring a private firm to evaluate and fix potential security risks could have cost taxpayers more than $1 million, but by crowd-sourcing the work, it spent only $150,000 in bounty money, and to fix the security lapses combined.

None of the Pentagon websites included in the bounty were related to the department's classified or critical operations, officials said.

Latest Headlines