Home  |  Top News  |  Most Popular  |  Video  |  Multimedia  |  News Feeds  |  Feedback
  Medicine  |  Nature & Earth  |  Biology  |  Technology & Engineering  |  Space & Planetary  |  Psychology  |  Physics & Chemistry  |  Economics  |  Archaeology
Top > Technology & Engineering > DARPA Offers Up to $50,000… >
DARPA Offers Up to $50,000 Prize for Shredder Challenge

Published: October 30, 2011.
By DARPA
http://www.darpa.mil

Today’s troops often confiscate the remnants of destroyed documents in war zones, but reconstructing them is a daunting task. DARPA’s Shredder Challenge calls upon computer scientists, puzzle enthusiasts and anyone else who likes solving complex problems to compete for up to $50,000 by piecing together a series of shredded documents. The goal is to identify and assess potential capabilities that could be used by our warfighters operating in war zones, but might also create vulnerabilities to sensitive information that is protected through our own shredding practices throughout the U.S. national security community.

Presently, a variety of techniques exist for reconstructing shredded documents including manual assembly, fully automated (computerized) algorithms and hybrid operator-assisted approaches. DARPA hopes to gain new insight into which of these or other innovative techniques are quicker and more efficient, and, whether the wide availability of high resolution photography, communication and crowd-sourcing strategies offer unexpected advances.

“The ability to reconstruct shredded documents will potentially yield information that may save lives or offer critical information about an adversary’s plans,” said Mr. Dan Kaufman, Director of DARPA’s Information Innovation Office. “Currently, this process is much too slow and too labor-intensive, particularly if the documents are handwritten. We are looking to the Shredder Challenge to generate some leap-ahead thinking in this area.”

The Shredder Challenge is composed of five separate problems in which the number of documents, subject matter and the method of shredding is varied to present challenges of increasing difficulty. To complete each problem, participants are called upon to provide answers to puzzles embedded in the content of reconstructed documents. The overall prize awarded depends on the number and difficulty of problems solved.

Registration is open to all eligible parties at www.shredderchallenge.com, which provides detailed rules and images of the shredded documents for the five problems. The twitter hashtag for this event is #shredderchallenge. Participants are encouraged to build teams using the event forum and to monitor www.twitter.com/darpa_news for the latest news updates.



Translate this page: Chinese French German Italian Japanese Korean Portuguese Russian Spanish


Disclaimer: The views expressed in this article are those of the authors and do not necessarily reflect the official policy or position of the ScienceNewsline.
Related »

Bios 
12/22/11 
Protecting Computers at Start-up: New NIST Guidelines
By National Institute of Standards and Technology (NIST)
A new draft computer security publication from the National Institute of Standards and Technology (NIST) provides guidance for vendors and security professionals as they work to protect personal computers …
Manufacturers 
5/12/11 
Build Safety into the Very Beginning of the Computer System
By National Institute of Standards and Technology (NIST)
A new publication from the National Institute of Standards and Technology (NIST) provides guidelines to secure the earliest stages of the computer boot process. Commonly known as the Basic …
Security 
3/17/11 
2 New SCAP Documents Help Improve Automating Computer Security Management
By National Institute of Standards and Technology (NIST)
It's increasingly difficult to keep up with all the vulnerabilities present in today's highly complex operating systems and applications. Attackers constantly search for and exploit these vulnerabilities to commit …
Host 
1/7/13 

Computer Scientists Find Vulnerabilities in Cisco VoIP Phones
By Columbia University
Low 
11/3/11 
The Perfect Clone: Researchers Hack RFID Smartcards
By Ruhr-University Bochum
Professional safecrackers use a stethoscope to find the correct combination by listening to the clicks of the lock. Researchers at the Ruhr-University Bochum have now demonstrated how to bypass …
More » 

Most Popular - Technology »
SECURITY »
Airport Security Officers at TSA Gaining Insight from Sandia Human Behavior Studies
MOLECULE »
Progress Made in Developing Nanoscale Electronics
COMPOSITE »
Mantis Shrimp Stronger Than Airplanes
SOLAR »
Like a Hall of Mirrors, Nanostructures Trap Photons Inside Ultrathin Solar Cells
In the quest to make sun power more competitive, researchers are designing ultrathin solar cells that cut material costs. At the same time they're keeping these thin cells efficient …
DATA »
Carnegie Mellon System Lets iPad Users Explore Data with Their Fingers
ScienceNewsline  |  About  |  Privacy Policy  |  Feedback  |  Mobile  |  Japanese
The selection and placement of stories are determined automatically by a computer program. All contents are copyright of their owners except U.S. Government works. U.S. Government works are assumed to be in the public domain unless otherwise noted. Everything else copyright ScienceNewsline.