{"id":33946,"date":"2018-11-13T17:30:25","date_gmt":"2018-11-13T22:30:25","guid":{"rendered":"https:\/\/digital.hbs.edu\/platform-rctom\/submission\/the-government-wants-you-to-hack-it\/"},"modified":"2018-11-13T17:30:25","modified_gmt":"2018-11-13T22:30:25","slug":"the-government-wants-youto-hack-it","status":"publish","type":"hck-submission","link":"https:\/\/d3.harvard.edu\/platform-rctom\/submission\/the-government-wants-youto-hack-it\/","title":{"rendered":"The government wants you\u2026to hack it?"},"content":{"rendered":"
As personalized data and digital IP become competitive advantages for companies across all industries, security breaches have grown more frequent and costly (increasing 27% and 23%, respectively, within the last year1<\/sup>), resulting in catastrophic reputation and financial consequences.<\/p>\n Traditionally, computer\/ network security was handled in-house, with teams of developers, researchers, and QA personnel carefully testing a system to discover and repair exploitable flaws. However, as digital attacks have become more sophisticated, they have outstripped the internal security capabilities of most companies. This need has given rise to \u2018bug bounties\u2019, contests where organizations sponsor prizes for the developer community to stress test their systems in order to find vulnerabilities (\u2018bugs\u2019). This use of open innovation to discover security flaws has been a “widely understood best practice in the private sector\u201d2<\/sup>, but recently, the federal government has also adopted this crowdsourcing approach to help secure its own systems. Government agencies, already facing a cybersecurity talent shortage3<\/sup>, have realized that the magnitude of the security problems requires them to utilize open innovation as a vital weapon to combat digital threats.<\/p>\n Cybersecurity efforts benefit greatly from distributed innovation. The field is moving too quickly for any individual or group to fully keep up with all of the developments, and open innovation provides the creativity, objectivity, and scale needed to attack these issues from multiple angles, supplementing the government\u2019s native security efforts. It enables the government to capitalize on the collective wisdom of the tech community, by leveraging participants with diverse expertise to strengthen their security development process.<\/p>\n In 2016, the Pentagon hosted the first \u2018Hack the Pentagon\u2019 program, inviting hackers to discover vulnerabilities in public facing Department of Defense websites. This was a landmark event for several reasons:<\/p>\n Since that program\u2019s successful resolution of 138 security issues, comparable contests have been conducted for the Army, the Air Force, and the Defense Travel System, all with similarly successful outcomes [Exhibit 1<\/strong>]. Not only have these events produced substantial technical results, but they have also won over the support of leaders within these organizations [Exhibit 3<\/strong>] who recognize both the intellectual value-add of these open source efforts, as well as financial benefits, noting \u201ca security audit and vulnerability assessment, [\u2026] would have cost us more than $1 million [compared to $150,000]\u201d5<\/sup>.<\/p>\n Longer term, these programs are growing rapidly, with bipartisan legislation in place to commence similar projects at the Department of Homeland Security6<\/sup> and the State Department7 <\/sup>[Exhibit 2<\/strong>], and more generalized recommendations being made through the Executive branch8<\/sup>. In parallel, this has also stimulated conversations on updating existing cybercrime legislation, such as the Computer Fraud and Abuse Act, which could empower the open source community by easing strict punishments for hacking-related actions. The Department of Justice has already recommended adoption of \u201cvulnerability disclosure policies\u201d (VDPs)9<\/sup>, which allow interested parties to find and report security risks without fear of civil penalties, and ensuring that government will work \u201copenly and in good faith with researchers\u201d10<\/sup>.<\/p>\n As cybersecurity evolves alongside technology, there are tremendous opportunities available to better utilize open innovation to tackle future security issues:<\/p>\n However, major questions still surround the role of open innovation in federal cybersecurity:<\/p>\n (796 words)<\/p>\n Exhibit 1:<\/strong><\/p>\n\n
\n
\n