Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- The New Generation of Database
- Satellite Communications: Acquiring SATCOM in Tight Times
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Value of Health IT
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Cyber Command logo code cracked
Friday - 7/9/2010, 10:04am EDT
Senior Internet Editor
Nearly as soon as the internet started buzzing about a super secret code embedded in the new Cyber Command's logo come reports it's been cracked.
Sean-Paul Correll, a threat researcher with Panda Security, says the characters on the inner gold ring of the logo "represent the MD5 hash of the group's mission statement," reports ComputerWorld.
"Mr. Correll is correct...it's a MD5 hash," said Lt. Commander Steve Curry of the U.S. Navy, in an e-mail to the magazine.
An MD5 hash is software used for encryption.
Correll said it took him less than an hour to figure it out after a story about the code appeared on Wired's Danger Room blog.
Wired announced a contest in the blog for cracking the code, with the winner having their choice of a t-shirt or a pass to the International Spy Museum. In a follow up column, Wired announced Danger Room reader jemelehill as the winner, having been the first to post the solution in the story's comments.
In a Defense Department blog, Petty Officer 2nd Class Elliott Fabrizio said, "Well, I cracked the code, but you can keep my t-shirt. (Wired.com shirts aren't exactly babe magnets.)"
Comments posted to the Wired story included guesses like:
- "Soylent Green is people"
- "If you can read this, send your resume to firstname.lastname@example.org."
- "I'm sorry, Dave. I'm afraid I can't do that."
- "If the intelligence community is a family, think of us as the uncle no one talks about."
- "In God We Trust All Others We Monitor"
(Copyright 2010 by FederalNewsRadio.com. All Rights Reserved.)