GCHQ’s Cracking Good Idea That Failed The Test

The UK Government Communications Headquarters(GCHQ) has suffered a breach of its own secure systems. It’s not something that will threaten the border integrity of the nation but does pose questions about national attitudes.

As the government’s pivotal security department, GCHQ decided to recruit codebreakers to face the new challenges of cyberspace. As the organisation is taking its place at the forefront of the government’s plans for The UK Cyber Security Strategy, it decided the best form of unearthing talent was to launch a code hacking competition.

Christmas crackers

The site, which closes on 11 December, was supposed to be a new approach to recruiting eBonds, the geek equivalent of the shadowy agents in the James Bond mould that through stealth and social engineering managed to obtain, primarily, Soviet secrets during the cold war. Many of these spies have come in from the cold of Russian winters into the warmth of the doughnut that is GCHQ’s Cheltenham operations centre.

Riding on the crest of a wave of a £650 million investment to set up the National Cyber Security Programme, the plain-looking Can You Crack It? competition displays an array of 160 hexadecimal numbers, a code that leads the player to a keyword. Anyone who has examined code at the bare metal level will recognise the hex as a possible program – which it is but elements of it are fiendishly hidden.

Once the code is untangled and run, a keyword is revealed. Entering the keyword then reveals a “success” screen emblazoned with the GCHQ name and the question: “Could you use your skills and ingenuity to combat terrorism and cyber threats?”

The link on the success page leads to a third screen giving further details of how to apply.

OK, cracking the code is one way in but there are two others. Simply by entering a general Google site search (site:www.canyoucrackit.co.uk) will take you to the success screen. But why tax your brain – after all it’s just an advertising gimmick linked to GCHQ’s Facebook page to attract British-born geeks.

The easiest way to get to the application form screen is to go to GCHQ’s careers site click on Hot Jobs – Cyber Security Specialists which takes you straight to the job application screen. Or just click on the link I’ve just given you. Doh!

Source code

Yesterday Dr Gareth Owen at the University of Greenwich School of Engineering posted up videos of the three-stage solution to the puzzle.

One of the more amusing comments to come out of GCHQ is that cheats will be disqualified. Hang on a minute, we need people with a sense of fair play to combat terrorists, organised crime, and random mischievous hackers? Is that GCHQ’s message. GC cripes.

Surely, these “cheats” are the very people we need. Devious individuals who think like the wily people we are combating. If you want to catch a criminal you have to think like a criminal.

Anyone who sidestepped the problem to get to the answer is surely to be commended for their efficiency. As Walter Chrysler famously said, “Whenever there is a hard job to be done I assign it to a lazy man; he is sure to find an easy way of doing it.”

Similarly, GCHQ could have taken the easier path by looking at the current and past Cyber Security Challenge (CSC) competitors. This partially government-sponsored competition is geared towards finding people with the correct approach to security. Not security experts but individuals with the innate talent to become the cyber stars of the future.

The Challenge filters out people with the correct mix of paranoia, deviousness and lateral thinking that goes to make a good cyber security chief. The academic path into security often results in producing  mechanics who are good at applying rules, principles and products. You can lead a trainee to potter but you can’t make them think. The GCHQ will certainly get bums on the vacant seats it needs to hurriedly fill – but is the recruitment process as effective as the route the CSC’s year-long range of tests.

These tasks are devised by professional trainers and experienced staff from the industry. Maybe the spy bosses could persuade the CSC organisers to introduce a stronger cypher-breaking element thread to filter out some of the hidden talent who could be proactive rather than reactive in the cyber intelligence field.

Eric Doyle, ChannelBiz

Eric is a veteran British tech journalist, currently editing ChannelBiz for NetMediaEurope. With expertise in security, the channel, and Britain's startup culture, through his TechBritannia initiative

Recent Posts

The Sustainability of AI

While AI promises unparalleled efficiency, productivity, and innovation, questions regarding its environmental impact loom large.…

2 hours ago

Trump’s Truth Social Makes Successful Market Debut

Shares in Donald Trump’s social media company rose about 16 percent after first day of…

2 hours ago

Dutch PM Raises Cyber Espionage Case With China’s Xi

Beijing visit sees Dutch Prime Minister Mark Rutte discuss cyber espionage incident with Chinese President…

3 hours ago

Vodafone Germany Confirms 2,000 Job Losses, Amid European Restructuring

More downsizing at Vodafone after German operation announces 2,000 jobs will be axed, as automation…

20 hours ago

AI Poses ‘Jobs Apocalypse’, Warns Report

IPPR report warns AI could remove almost 8 million jobs in the United Kingdom, with…

20 hours ago

Europe’s Longest Hyperloop Test Track Opens

European Hyperloop Center in the Netherlands seeks to advance futuristic transport technology, despite US setbacks

21 hours ago