The most recent iteration of the “Hack the Pentagon” program, which ended on Feb. 7, found numerous weaknesses in an internal DOD system for the first time, Bloomberg reported. California-based Synack Inc. was paid $4 million to conduct three years of “bug bounty” exercises to identify security lapses in DOD networks. In their first official attempt, the white hat hackers breached a file transfer system “within hours,” according to the Department Digital Service. The DOD uses the system to send “sensitive e-mails, documents, and images between networks, including classified ones,” according to Bloomberg. One of the exercise participants found that “parts of the system appeared to have been well designed,” but that “other parts were quite weak.” Throughout the exercise, the hired cyber security experts were working on a simulated version of the real DOD network, and Department officials said the problem spots were already being fixed.
Earlier this week, the People’s Republic of China confirmed it is halting its nuclear arms control talks with the U.S., in retaliation for the U.S. continuing to sell arms to Taiwan. The move reinforces a “pattern of behavior” from Beijing, experts say.