Feeds

DARPA balloon-hunt compo: Stand by for skulduggery

We may never be told the winners' methods

Seven Steps to Software Security

The DARPA Network Challenge - a race to find ten large red balloons to be flown at undisclosed locations in the USA this Saturday - is beginning to take shape, with competing teams trying to marshal the legions of crowdsourced operatives necessary for a win. Meanwhile rules and details have been modified in an attempt to prevent some of the more obvious stratagems.

The contest was announced in October to celebrate DARPA's preferred 40th-anniversary-of-the-internet date. It offers a $40k prize to the individual who can first report the locations (accurate to within a mile radius) of the ten 8-foot red balloons which DARPA will fly this Saturday throughout daylight hours. All are to be located in publicly-acessible places within view of roads or highways.

The design of the compo - limited prize money, quite small balloons, all located in areas where they will be seen by ordinary members of the US population - points to crowdsourcing/social networking as the area DARPA is interested in, and indeed the agency's chief Regina Dugan has said:

"The DARPA Network Challenge explores the unprecedented ability of the Internet to bring people together to solve tough problems.”

Various strategies for bringing people together have been proposed. Some organisers, obviously enough, have promised to share the reward with those first to report correct locations - some are even promising to take no cash for themselves, perhaps theorising that the fame of a win will be worth having on its own. Others have stated that the cash will be given to named charities, or even spent "in one way or another... to help promote peace". Others offer payouts for recruiters of spotters. Yet another team promises, if it wins, to spend the entire $40k on making a "giant flying cupcake built entirely out of balloons!"

Meanwhile DARPA has tweaked the contest rules somewhat, introducing various provisions designed to thwart some obvious ploys. Originally a location had only to be accurate to within a second of arc, meaning that each submitted entry would cover a box on the map; this has now been reduced slightly to a mile and changed to a circular radius, making it harder to reliably blanket big areas using lots of submissions. The registration and submission process has also been "designed to prevent automated approaches designed to systematically guess the correct locations", too.

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Beancounters tell NASA it's too poor to fly planned mega-rocket
Space Launch System would need another $400m and a lot of time
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
Bad back? Show some spine and stop popping paracetamol
Study finds common pain-killer doesn't reduce pain or shorten recovery
World Solar Challenge contender claims new speed record
One charge sees Sunswift travel 500kms at over 100 km/h
Vote now for LOHAN's stirring mission patch motto
Does the shed actually know no bounds, or what?
SMELL YOU LATER, LOSERS – Dumbo tells rats, dogs... humans
Junk in the trunk? That's what people have
All those new '5G standards'? Here's the science they rely on
Radio professor tells us how wireless will get faster in the real world
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.