Feeds

Crack GCHQ's code and become the next James Bond

Signals snoopers' challenge to wannabe spooks

Top three mobile application threats

GCHQ has launched a code-breaker challenge as part of its attempts to unearth fresh talent from unconventional sources.

The signals intelligence agency's ‘canyoucrackit’ challenge invites would-be codebreakers to crack a visual code at canyoucrackit.co.uk. The campaign will be supported in social media channels, including blogs and forums.

GCHQ traditionally recruits graduates but it is also keen to employ talented self-taught codebreakers and those with an interest in ethical hacking too, an audience traditional recruitment schemes and advertising campaigns might miss. The agency has no interest in recruiting anyone who has even dabbled in criminal hacking.

Individuals simply with an interest in puzzle-solving or cryptography but no interest in working for GCHQ are also being encouraged to attempt to crack the code, as a statement by GCHQ explains.

The challenge is anonymous, GCHQ is not named as the source of the challenge, in order that applying for a career in the department is not the primary reason for the participant to engage.

The desired result of the campaign is to reach those people with the right skills and mindset, and to encourage them to find out more about a career with GCHQ.  Cracking the code is not an assessment, rather a way to connect potential applicants with GCHQ as an employer. There is a level of difficulty to crack the code, but once the code is cracked, wide dissemination of the solution is anticipated in online communities. The discussion this promotes should raise additional interest in GCHQ as an employer and generate future recruitment enquiries.

Anyone applying who has hacked illegally will not be eligible to continue in the recruitment process.

The code breaker challenge is occurring against the backdrop of the UK’s new Cyber Security Strategy, published last week, which gives the signal's intelligence agency a greater than ever role (and budget) to defend both businesses and consumers against cyber threats. Recruitment agency TMP Worldwide is working with GCHQ on the canyoucrackit challenge.

The first phase of the challenge involves making sense of 15x10 grid of what might appear to hexadecimal (base 16) number pairs. Would-be codebreakers have just over 10 days left to come up with a keyword, which will probably allow access to an even more fiendishly difficult puzzler. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.