<a href="http://www.washingtonpost.com/business/technology/darpa-appeals-to-hackers-for-cybersecurity-help/2011/11/09/gIQAsezl5M_story.html?tid=sm_twitter_washingtonpost">http://www.washingtonpost.com/business/technology/darpa-appeals-to-hackers-for-cybersecurity-help/2011/11/09/gIQAsezl5M_story.html?tid=sm_twitter_washingtonpost</a><br>

<br><h1>DARPA appeals to hackers for cybersecurity help</h1>
                        <div class="relative primary-slot padding-top img-border gallery-container photo-wrapper">
                                        <a href="http://www.washingtonpost.com/business/economy/when-hackers-attack/2011/06/09/AGJMEBOH_gallery.html"><img class="gallery-pic" src="http://www.washingtonpost.com/rf/image_606w/WashingtonPost/Content/Production/Blogs/faster-forward/Images/2011-06-16T163827Z_01_WAS459_RTRIDSP_3_USA-CYBERSECURITY-266.jpg"></a>
                                        <a href="http://www.washingtonpost.com/business/economy/when-hackers-attack/2011/06/09/AGJMEBOH_gallery.html"><span class="tool Gallery-play hide"></span></a>
                                </div>
                                <div href="http://www.washingtonpost.com/business/economy/when-hackers-attack/2011/06/09/AGJMEBOH_gallery.html" class="gallery-caption border-bottom relative">
                                        <span class="gallery-credit"></span>
                                        <p class="caption padding-left border-left"><a class="gallery-link" href="http://www.washingtonpost.com/business/economy/when-hackers-attack/2011/06/09/AGJMEBOH_gallery.html"><strong>View Photo Gallery —</strong>  These six companies have fallen victim to major cyber attacks in recent months.</a></p>


                                </div>
                        <div class="module article-toolbar relative border-bottom padding-top-8 padding-bottom-8  margin-bottom-20 ">
        
        
        <div class="article-toolbar-ad">
                
                <div id="slug_tooltile" style="display: none;">
                        
                </div>
                                
        </div>
        
</div>
<div class="module byline">
                                        <h3>
                                                By  <a href="http://www.washingtonpost.com/hayley-tsukayama/2011/03/25/AFwMAnXB_page.html" rel="author">Hayley Tsukayama</a>, <span class="timestamp updated processed">Published: November 9</span>
        </h3>
                                </div>
                        
                        
                                
                                
                                
                                
                                <p>The United States is facing a dire situation, according to former presidential counterrorism adviser Richard Clarke. In a <a href="http://www.wired.com/dangerroom/2011/11/darpa-hackers-cybersecurity">Wired report,</a>
 the publication quotes Clarke telling attendees at a “cyber colloquium”
 Monday that U.S. networks are “porous as a colander” and not equipped 
to deal with the challenges it faces on the cyberscurity front.</p>
                                                <p>The solution? The Defense Advanced Research Projects Agency 
(DARPA) is reaching out to hackers for help. DARPA spokesman Eric 
Mazzacone told Wired that the agency is looking to recruit “visionary 
hackers” to the agency to help it explore “more and better options” to 
protect the country against threats.</p>
                                
                                
                                <div id="article-side-rail" class="module article-side-rail left clearfix padding-right margin-top-7 margin-right-15"><div class="article-video border-top border-top padding-top padding-bottom margin-bottom photo-wrapper">

<br><div class="relative gallery-container">
                                                <a href="http://www.washingtonpost.com/business/economy/privacy-on-the-web/2011/06/17/AGjInzYH_gallery.html"><img class="gallery-pic" src="http://www.washingtonpost.com/rf/image_296w/2010-2019/WashingtonPost/2011/06/17/National-Economy/Images/google.jpg" alt=""></a>
                                                <a href="http://www.washingtonpost.com/business/economy/privacy-on-the-web/2011/06/17/AGjInzYH_gallery.html"><span class="tool Gallery-play hide"></span></a>
                                                </div>
                                        <div href="http://www.washingtonpost.com/business/economy/privacy-on-the-web/2011/06/17/AGjInzYH_gallery.html" class="gallery-caption border-bottom relative">
                                                <span class="gallery-credit"></span>
                                                <p class="caption padding-left border-left"><a class="gallery-link" href="http://www.washingtonpost.com/business/economy/privacy-on-the-web/2011/06/17/AGjInzYH_gallery.html"> 
In recent years, lawmakers and advocacy groups have made increased 
efforts to protects users’ privacy online. Here are some cases that 
helped stoke the debate about tracking and privacy on the Web.</a></p>
                                        </div>
                                </div>
                        
        <div id="slug_inline_bb" style="display: block;" class="left margin-right margin-bottom padding-top slug">
                
        </div>
        
        
        </div>

                                        
                                                <p>DARPA has already turned to<a href="http://www.washingtonpost.com/blogs/innovations/post/darpa-vs-uscis/2011/08/05/gIQAaVxnwI_blog.html"> respected hacker Peiter Zatko,</a>
 aka “Mudge,” as a program manager for its Strategic Technologies 
Office, but is clearly looking to get more insider expertise on the 
world of cybersecurity. In a blog post, Sophos’s Lisa Vaas said that 
it’s about time that the government moved to hire more security talent. 
“At risk are both trade and technology secrets as well as crucial 
infrastructure,” she wrote in her own plea to white hats. “SOS. We need 
you.”</p><p>Hackers are often the first to call attention to security or
 other flaws in closed systems, and can be smart and high-profile hires.
 For example, Facebook hired iPhone and PlayStation cracker George Hotz 
in June, and ICANN has had Jeff Moss, aka “The Dark Tangent” on the 
payroll since April 2011. </p><br>