recommended reading

Take the DARPA challenge and win $40,000

On Thursday, mysterious signs began popping up in metropolitan areas nationwide, accompanied by a challenge from the Defense Advanced Research Projects Agency: Be the first person to track down and report the square quick response codes on all the signs across the country and win $40,000.

The signs displaying the codes, also known as QR codes, are to remain in prominent public spaces until 3 p.m. Sunday, Feb. 26. For a chance to win the promised $40,000, prospective participants (sorry federal workers, you're not eligible to play) need only a cellphone and an online social network.

DARPA's unannounced contest, a successor to its similarly themed 2009 nationwide balloon hunt, is intended to study how people use social media during times of crisis.

The contest, which DARPA is calling the Cash for Locating and Identifying QR Codes Quest, will remain open until 12 p.m. on March 8, 11 days after the codes are taken down. At that time, the individual who first submitted all the codes will be declared the winner. If all the codes are not found, then the person who submitted the most will receive a prorated amount of the prize money, according to Jay Schnitzer, director of the Defense Sciences Office at DARPA.

Participants are encouraged to form groups to share code locations with each other and split the prize. The project "seeks to understand how to leverage social media for time-sensitive humanitarian assistance problems," he said.

Federal employees, DARPA contractors and their dependents are prohibited from playing "to avoid the appearance of unfairness and to ensure compliance with all applicable government ethics requirements for federal employees," Schnitzer said.

The winners will be announced the week of March 12.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.