If you can hack the Pentagon, the DOD would like to give you money

Before you go, we thought you'd like these...
Before you go close icon

If You Can Hack the Pentagon, the DOD Would Like to Give You Money

If you want to hack into secure government information, now is your chance.

April 18 marks day one of the U.S. Department of Defense's pilot program, "Hack the Pentagon." For the first time, the government is offering hackers money to find vulnerabilities within the DOD.

RELATED: National cybersecurity facility in Virginia

31 PHOTOS
National Cybersecurity and Communications Integration Center - Arlington, Virginia - cybercrime
See Gallery
If you can hack the Pentagon, the DOD would like to give you money
WASHINGTON, DC - MAY 11: Admiral Michael Rogers, commander of U.S. Cyber Command and director of the National Security Agency, speaks at George Washington University May 11, 2015 in Washington, DC. The George Washington University's Center for Cyber and Homeland Security held a discussion on the state of cybersecurity threats to the United States. (Photo by Win McNamee/Getty Images)
WASHINGTON, DC - APRIL 02: National Security Agency Director and U.S. Cyber command Commander Admiral Michael Rogers takes questions during his keynote address to the Armed Forces Communications and Electronics Association's sixth annual Cybersecurity Technology Summit at the Capitol Hilton April 2, 2015 in Washington, DC. Taking questions submitted via email from an iPad, Rogers talked about intergovernmental information sharing, private-public partnerships and the new focus on recruitment among people as young as high school students. (Photo by Chip Somodevilla/Getty Images)
WASHINGTON, DC - MAY 11: Admiral Michael Rogers, commander of U.S. Cyber Command and director of the National Security Agency, speaks at George Washington University May 11, 2015 in Washington, DC. The George Washington University's Center for Cyber and Homeland Security held a discussion on the state of cybersecurity threats to the United States. (Photo by Win McNamee/Getty Images)
President Barack Obama waves as he walks down the stair of Air Force One upon his arrival at San Francisco International Airport, Thursday, Feb. 12, 2015, in San Francisco. The President will travel to Palo Alto, Calif., to deliver remarks at the White House Summit on Cybersecurity and Consumer Protection at Stanford University on Friday. (AP Photo/Ben Margot)
President Barack Obama, left, waves upon his arrival at San Francisco International Airport with San Francisco Mayor Ed Lee, right, Thursday, Feb. 12, 2015, in San Francisco. The President will travel to Palo Alto, Calif., to deliver remarks at the White House Summit on Cybersecurity and Consumer Protection at Stanford University on Friday. (AP Photo/Ben Margot)
ARLINGTON, VA - JANUARY 13: U.S. President Barack Obama delivers remarks at the National Cybersecurity and Communications Integration Center (NCCIC) on January 13, 2015 in Arlington, Virginia. President Obama discussed efforts to improve the government's ability to collaborate with industry to combat cyber threats. (Photo by Kristoffer Tripplaar-Pool/Getty Images)
ARLINGTON, VA - JANUARY 13: U.S. President Barack Obama delivers remarks at the National Cybersecurity and Communications Integration Center (NCCIC) on January 13, 2015 in Arlington, Virginia. President Obama discussed efforts to improve the government's ability to collaborate with industry to combat cyber threats. (Photo by Kristoffer Tripplaar-Pool/Getty Images)
US President Barack Obama speaks about cybersecurity alongside Secretary of Homeland Security Jeh Johnson (L) as he visits the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. AFP PHOTO / SAUL LOEB (Photo credit should read SAUL LOEB/AFP/Getty Images)
ARLINGTON, VA - JANUARY 13: U.S. President Barack Obama delivers remarks at the National Cybersecurity and Communications Integration Center (NCCIC) on January 13, 2015 in Arlington, Virginia. President Obama discussed efforts to improve the government's ability to collaborate with industry to combat cyber threats. He is joined by Secretary of Homeland Security Secretary Jeh Johnson. (Photo by Kristoffer Tripplaar-Pool/Getty Images)
WASHINGTON, DC - JANUARY 16: (CHINA OUT, SOUTH KOREA OUT) U.S. President Barack Obama speaks during a joint news conference with British Prime Minister David Cameron at the East Room of the White House January 16, 2015 in Washington, DC. The two leaders had an Oval Office meeting earlier discussing bilateral issues including economic growth, international trade, cybersecurity, Iran, ISIL, counterterrorism, Ebola, and Russias actions in Ukraine. (Photo by The Asahi Shimbun via Getty Images)
A specialist works at the National Cybersecurity and Communications Integration Center (NCCIC) in Arlington, Va., Tuesday, Sept. 9, 2014. Ground zero in the nation’s fight against cybercrime hides in plain sight, in a nondescript suburban office building with no government seals or signs. Ground zero in the nation’s fight against cybercrime hides in plain sight, in a nondescript suburban office building with no government seals or signs. Only after passing a low-key receptionist stationed on the seventh floor does one see the metal detectors, personal cellphone lockers and a series of heavy doors marked “classified” _ all leading to the auditorium-sized National Cybersecurity and Communications Integration Center. (AP Photo/Manuel Balce Ceneta)
Specialists work at the National Cybersecurity and Communications Integration Center (NCCIC) in Arlington, Va., Tuesday, Sept. 9, 2014. Ground zero in the nation’s fight against cybercrime hides in plain sight, in a nondescript suburban office building with no government seals or signs. Only after passing a low-key receptionist stationed on the seventh floor does one see the metal detectors, personal cellphone lockers and a series of heavy doors marked “classified” _ all leading to the auditorium-sized National Cybersecurity and Communications Integration Center. (AP Photo/Manuel Balce Ceneta)
In this Sept. 24, 2010, file photo the National Cybersecurity & Communications Integration Center (NCCIC) prepares for the Cyber Storm III exercise at its operations center in Arlington, Va. It will take several more years for the government to install high-tech systems capable of detecting and blocking computer intrusions, giving hackers more time to figure out how to breach networks and steal sensitive data. The government's computer security weaknesses were laid bare with the WikiLeaks release. (AP Photo/J. Scott Applewhite, File)
Specialists work at the National Cybersecurity and Communications Integration Center (NCCIC) in Arlington, Va., Tuesday, Sept. 9, 2014. Ground zero in the nation’s fight against cybercrime hides in plain sight, in a nondescript suburban office building with no government seals or signs. Ground zero in the nation’s fight against cybercrime hides in plain sight, in a nondescript suburban office building with no government seals or signs. Only after passing a low-key receptionist stationed on the seventh floor does one see the metal detectors, personal cellphone lockers and a series of heavy doors marked “classified” _ all leading to the auditorium-sized National Cybersecurity and Communications Integration Center. (AP Photo/Manuel Balce Ceneta)
A specialist works at the National Cybersecurity and Communications Integration Center (NCCIC) in Arlington, Va., Tuesday, Sept. 9, 2014. Ground zero in the nation’s fight against cybercrime hides in plain sight, in a nondescript suburban office building with no government seals or signs. Only after passing a low-key receptionist stationed on the seventh floor does one see the metal detectors, personal cellphone lockers and a series of heavy doors marked “classified” _ all leading to the auditorium-sized National Cybersecurity and Communications Integration Center. (AP Photo/Manuel Balce Ceneta)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Director of control Systems Security Sean Paul McGurk speaks at the National Cybersecurity & Communications Integration Center (NCCIC) as they prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
ARLINGTON, VA - OCTOBER 30: Staff members attend an event where Homeland Security Secretary Janet Napolitano delivered remarks at the opening ceremony of the new U.S. Computer Emergency Readiness Team/National Cybersecurity and Communications Integration Center facility October 30, 2009 in Arlington, Virginia. The center is designed to help protect the technical infrastructure of the United States. (Photo by Win McNamee/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Director of Control Systems Security Sean Paul McGurk speaks at the National Cybersecurity & Communications Integration Center (NCCIC) as they prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
ARLINGTON, VA - OCTOBER 30: Staff members attend an event where Homeland Security Secretary Janet Napolitano delivered remarks at the opening ceremony of the new U.S. Computer Emergency Readiness Team/National Cybersecurity and Communications Integration Center facility October 30, 2009 in Arlington, Virginia. The center is designed to help protect the technical infrastructure of the United States. (Photo by Win McNamee/Getty Images)
TO GO WITH AFP STORY US-GOVERNMENT-COMPUTER-SECURITY-INTERNET BY CHRIS LEFKOW Analyists at the National Cybersecurity & Communications Integration Center (NCCIC) prepare for Cyber Storm III during a media session at their headquarters in Arlington, VA, September 24, 2010. Cyber Storm III is NCCIC's capstone national-level cybersecurity exercise. AFP PHOTO/Jim WATSON (Photo credit should read JIM WATSON/AFP/Getty Images)
of
SEE ALL
BACK TO SLIDE
SHOW CAPTION +
HIDE CAPTION

But it's not a free-for-all. To legally break into the Pentagon's data files, you have to register for the program through HackerOne and meet the eligibility requirements. So if you live in a country that's under U.S. trade sanctions or if you're on the list that bans you from doing business with Americans -- your hacking services are not welcome.

Eligible hackers have until May 12 to try to break into the Pentagon's defenses. Those who find a bug or vulnerability will get paid from the program's $150,000 funding pool.

RELATED: Notable data breaches over time

8 PHOTOS
Notable Data Breaches
See Gallery
If you can hack the Pentagon, the DOD would like to give you money
LONDON, ENGLAND - AUGUST 19: A detail of the Ashley Madison website on August 19, 2015 in London, England. Hackers who stole customer information from the cheating site AshleyMadison.com dumped 9.7 gigabytes of data to the dark web on Tuesday fulfilling a threat to release sensitive information including account details, log-ins and credit card details, if Avid Life Media, the owner of the website didn't take Ashley Madison.com offline permanently. (Photo by Carl Court/Getty Images)
The Homeland Security Department headquarters in northwest Washington, Friday, June 5, 2015. China-based hackers are suspected once again of breaking into U.S. government computer networks, and the entire federal workforce could be at risk this time. The Department of Homeland Security said in a statement that data from the Office of Personnel Management _ the human resources department for the federal government _ and the Interior Department had been compromised. (AP Photo/Susan Walsh)
FILE - In this Feb. 5, 2015 file photo, the Anthem logo hangs at the health insurer's corporate headquarters in Indianapolis. Insurers aren't required to encrypt consumers' data under a 1990s federal law that remains the foundation for health care privacy in the Internet age _ a striking omission in light of the cyberattack against Anthem, the nation's second-largest health insurer. (AP Photo/Michael Conroy, File)
Sony Pictures Entertainment headquarters in Culver City, Calif. on Tuesday, Dec. 2, 2014. The FBI has confirmed it is investigating a recent hacking attack at Sony Pictures Entertainment, which caused major internal computer problems at the film studio last week. (AP Photo/Nick Ut)
FILE - In this file photo made Oct. 6, 2009, employee John Abou Nasr pushes shopping carts in the parking lot of a Home Depot in Methuen, Mass. Home Depot's data breach could wind up being among the largest ever for a retailer, but that may not matter to its millions of customers. (AP Photo/Elise Amendola, File)
Shoppers arrive at a Target store in Los Angeles on Thursday, Dec. 19, 2013. Target says that about 40 million credit and debit card accounts may have been affected by a data breach that occurred just as the holiday shopping season shifted into high gear. (AP Photo/Damian Dovarganes)
Graphic shows details of recent notable data breaches by organization; 3c x 7 inches; 146 mm x 177 mm;
of
SEE ALL
BACK TO SLIDE
SHOW CAPTION +
HIDE CAPTION

Read Full Story

Sign up for Breaking News by AOL to get the latest breaking news alerts and updates delivered straight to your inbox.

Subscribe to our other newsletters

Emails may offer personalized content or ads. Learn more. You may unsubscribe any time.

From Our Partners