GCHQ’s Cracking Good Idea That Failed The Test

The UK Government Communications Headquarters(GCHQ) has suffered a breach of its own secure systems. It’s not something that will threaten the border integrity of the nation but does pose questions about national attitudes.

As the government’s pivotal security department, GCHQ decided to recruit codebreakers to face the new challenges of cyberspace. As the organisation is taking its place at the forefront of the government’s plans for The UK Cyber Security Strategy, it decided the best form of unearthing talent was to launch a code hacking competition.

Christmas crackers

The site, which closes on 11 December, was supposed to be a new approach to recruiting eBonds, the geek equivalent of the shadowy agents in the James Bond mould that through stealth and social engineering managed to obtain, primarily, Soviet secrets during the cold war. Many of these spies have come in from the cold of Russian winters into the warmth of the doughnut that is GCHQ’s Cheltenham operations centre.

Riding on the crest of a wave of a £650 million investment to set up the National Cyber Security Programme, the plain-looking Can You Crack It? competition displays an array of 160 hexadecimal numbers, a code that leads the player to a keyword. Anyone who has examined code at the bare metal level will recognise the hex as a possible program – which it is but elements of it are fiendishly hidden.

Once the code is untangled and run, a keyword is revealed. Entering the keyword then reveals a “success” screen emblazoned with the GCHQ name and the question: “Could you use your skills and ingenuity to combat terrorism and cyber threats?”

The link on the success page leads to a third screen giving further details of how to apply.

OK, cracking the code is one way in but there are two others. Simply by entering a general Google site search (site:www.canyoucrackit.co.uk) will take you to the success screen. But why tax your brain – after all it’s just an advertising gimmick linked to GCHQ’s Facebook page to attract British-born geeks.

The easiest way to get to the application form screen is to go to GCHQ’s careers site click on Hot Jobs – Cyber Security Specialists which takes you straight to the job application screen. Or just click on the link I’ve just given you. Doh!

Source code

Yesterday Dr Gareth Owen at the University of Greenwich School of Engineering posted up videos of the three-stage solution to the puzzle.

One of the more amusing comments to come out of GCHQ is that cheats will be disqualified. Hang on a minute, we need people with a sense of fair play to combat terrorists, organised crime, and random mischievous hackers? Is that GCHQ’s message. GC cripes.

Surely, these “cheats” are the very people we need. Devious individuals who think like the wily people we are combating. If you want to catch a criminal you have to think like a criminal.

Anyone who sidestepped the problem to get to the answer is surely to be commended for their efficiency. As Walter Chrysler famously said, “Whenever there is a hard job to be done I assign it to a lazy man; he is sure to find an easy way of doing it.”

Similarly, GCHQ could have taken the easier path by looking at the current and past Cyber Security Challenge (CSC) competitors. This partially government-sponsored competition is geared towards finding people with the correct approach to security. Not security experts but individuals with the innate talent to become the cyber stars of the future.

The Challenge filters out people with the correct mix of paranoia, deviousness and lateral thinking that goes to make a good cyber security chief. The academic path into security often results in producing  mechanics who are good at applying rules, principles and products. You can lead a trainee to potter but you can’t make them think. The GCHQ will certainly get bums on the vacant seats it needs to hurriedly fill – but is the recruitment process as effective as the route the CSC’s year-long range of tests.

These tasks are devised by professional trainers and experienced staff from the industry. Maybe the spy bosses could persuade the CSC organisers to introduce a stronger cypher-breaking element thread to filter out some of the hidden talent who could be proactive rather than reactive in the cyber intelligence field.

Eric Doyle, ChannelBiz

Eric is a veteran British tech journalist, currently editing ChannelBiz for NetMediaEurope. With expertise in security, the channel, and Britain's startup culture, through his TechBritannia initiative

Recent Posts

Boeing Starliner Set For First Crewed Flight After Delays

Boeing Starliner space capsule set for first crewed flight into orbit after years of delays,…

4 hours ago

Google, DOJ Closing Arguments Clash Over Search ‘Monopoly’

Google clashes with US Justice Department in closing arguments as government argues Google used illegal…

12 hours ago

Stanford AI Scientist Working On ‘Spatial Intelligence’ Start-Up

Prominent Stanford University AI scientist Fei-Fei Li reportedly completes funding round for start-up based on…

13 hours ago

Apple Shares Surge Ahead Of New AI Hardware Launches

Apple shares surge on optimism that new AI-focused hardware launches will drive renewed sales, starting…

13 hours ago

Biden Vetoes Republican Measure In Row Over Contractors’ Unions

Biden vetoes Republican-backed measure amidst dispute over 'joint employer' status for contract workers, affecting tech…

14 hours ago

Lawyers Say Strict Child Controls In China Show TikTok Could Do Better

Lawyers in US social media addiction action say strict controls on Douyin in China show…

14 hours ago