Jeff Moss (hacker)

Last updated
Jeff Moss
Dark Tangent (7546598054).jpg
Moss at DEF CON, 2012
Born
Jeff Moss

(1975-01-01) January 1, 1975 (age 49)
California, U.S.
Alma mater Gonzaga University, Criminal Justice (BA 1990)
Occupation(s) computer security, internet security expert
Known forFounder of the Black Hat and DEF CON computer hacker conferences
Website www.defcon.org

Jeff Moss (born January 1, 1975), also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.

Contents

Early life and education

Moss received his first computer at the age of 10. [1] He became fascinated because he wasn't old enough to drive a car or vote, but he could engage in adult conversation with people all over the country.

Moss graduated from Gonzaga University with a BA in Criminal Justice. He worked for Ernst & Young, LLP in their Information System Security division and was a director at Secure Computing Corporation where he helped establish the Professional Services Department in the United States, Asia, and Australia. [2]

Security conferences

In 1993 he created the first DEF CON hacker convention, based around a party for members of a Fido hacking network in Canada. [3] It slowly grew, and by 1999 was attracting major attention.

In 1997 he created Black Hat Briefings computer security conference that brings together a variety of people interested in information security. He sold Black Hat in 2005 to CMP Media, a subsidiary of UK-based United Business Media, for a reported $13.9 million USD. [4] DEF CON was not included in the sale.

In 2018 Jeff launched the first DEF CON hacker convention outside of the United States. Holding the same name DEF CON China was hosted in Beijing, China and Co-Hosted by Baidu. [5] The first year of DEF CON China was labeled a [Beta] year, and in 2019 they formalized the conference with DEF CON China 1.0 [6]

Later career

Moss is a member and regular attendee of the Washington D.C. based Council on Foreign Relations (CFR), an independent, nonpartisan membership organization, think tank, and publisher.

In 2009 Moss was sworn into the Homeland Security Advisory Council of the Barack Obama administration. [7]

On April 28 2011 Jeff Moss was appointed ICANN Chief Security Officer. [8]

In July 2012, Secretary Janet Napolitano directed the Homeland Security Advisory Council to form the Task Force on CyberSkills in response to the increasing demand for the best and brightest in the cybersecurity field across industry, academia and government. The Task Force, co-chaired by Jeff Moss and Alan Paller, conducted extensive interviews with experts from government, the private sector, and academia in developing its recommendations to grow the advanced technical skills of the DHS cybersecurity workforce and expand the national pipeline of men and women with these cybersecurity skills. On October 1, the HSAC unanimously approved sending the Task Force recommendations to the Secretary.

In October 2013, Jeff announced that he would be stepping down from his position at ICANN at the end of 2013.

In 2013, Jeff was appointed as a Nonresident Senior Fellow at the Atlantic Council, associated with the Cyber Statecraft Initiative, within the Brent Scowcroft Center on International Security. [9]

In 2014, Jeff joined the Georgetown University School of Law School Cybersecurity Advisory Committee.

18 March 2016, Richemont announces his nomination for election to the Board of Directors. [10]

In 2017, Jeff was named a Commissioner at the Global Commission on the Stability of Cyberspace (GCSC). [11] The GCSC is composed of 24 prominent independent Commissioners representing a wide range of geographic regions as well as government, industry, technical and civil society stakeholders with legitimacy to speak on different aspects of cyberspace. The Commission's stated aim is to develop proposals for norms and policies to enhance international security and stability and guide responsible state and non-state behavior in cyberspace.

In 2017, Jeff spearheaded the creation of the DEF CON Voting Machine Village. Debuting at DEF CON 25, the Voting Machine Village allowed hackers to test the security of electronic voting machines, including several models still in active use in the US. The machines were all compromised over the course of the conference by DEF CON attendees, some within hours of the village's opening. The resulting media coverage of the vulnerability of all tested machines sparked a national conversation and inspired legislation in Virginia.

In September 2017, the Voting Machine Village produced "DEF CON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in US Election Equipment, Databases and Infrastructure" summarizing its findings. The findings were publicly released at an event sponsored by the Atlantic Council [12] and the paper went on to win an O'Reilly Defender Research Award. [13]

In March 2018, the DEF CON Voting Machine Hacking Village was awarded a Cybersecurity Excellence Award The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan.

In December 2021, Moss was appointed as one of twenty-three members of a newly formed US DHS CISA cybersecurity advisory council. Other notable members include Alex Stamos, Steve Adler, Bobby Chesney, Thomas Fanning, Vijaya Gadde, Patrick Gallagher, and Alicia Tate-Nadeau. [14] [15] [16]

Current position

Moss is currently based in Seattle, where he works as a security consultant for a company that is hired to test other companies' computer systems. [17] He has been interviewed on issues including the internet situation between the United States and China, [18] spoofing[ which? ] and other e-mail threats [17] and the employment of hackers in a professional capacity, [19] including in law enforcement. [20]

Recent speaking and participation

Jeff has presented at a wide range of venues, worldwide, either as a keynote speaker, individual, or as part of panel discussions and group deliberations. Examples include:

• Panelist, "Georgetown University, Institute for Law, Science and Global Security: International Engagement on Cyber" (PDF)., Washington D.C., USA, March 2014
• Keynote speaker, CODE BLUE Archived 2014-02-01 at the Wayback Machine , Tokyo, Japan, February 2014
• Keynote speaker, NANOG 60 North American Network Operators' Group, Atlanta, USA, February 2014
• Speaker, World Knowledge Forum, Seoul, South Korea, October 2013
Korean Cyber Summit, Seoul, South Korea, October 2013
New Yorker Festival, “Spy vs. Spy”, USA, October 2013
• Speaker, Special lecture on "Internet Governance" European Forum Alpbach, Austria, August 2013
• CFR Task Force Report, "Defending an Open, Global, Secure and Resilient Internet", USA, June 2013
• Panelist, RSA, "BYOD: Here Today, Here to Stay?", San Francisco, USA, February 2013
• Co-chair, DHS (HSAC) Cyberskills Task Force, USA, 2012
Security & Defence Agenda, Brussels, Belgium, Cyber Initiative, 2012
• Speaker, Russian Internet Governance Forum, Moscow, Russian Federation, 2012
World Economic Forum on East Asia, Bangkok, Thailand 2012
• 6th Annual Strategic Multi-Layer Assessment (SMA) Conference “A World in Transformation: Challenges and Opportunities”, USA, 2012
RSA, USA, 2012
XCon, Beijing, China, 2012
• NRO Cyber Conference for National Programs, USA, 2012
• NSA “Cyber Red Dawn” symposium, USA, 2012
West Point Senior Conference, USA, 2012
• Contributor NATO CCD COE National Cyber Security Framework Manual, 2012
• Co-Chair, DHS (HSAC) Community Resiliency Task Force, USA, 2011
• Georgetown University's Institute for Law, Science and Global Security 2nd annual conference on international engagement in cyberspace, USA, 2010
• Participated as “the Internet”, DHS Cyber Storm III exercise, USA, 2010
RSA, Core infrastructure security threat, USA, 2009
• Keynote speaker, inaugural CodeGate conference, Seoul, South Korea, 2008
Inaugural DeepSec, Vienna, Austria, 2007
• Panelist, Democracy, Terrorism and the Open Internet panel, Madrid, Spain, 2005

Film

Moss was an Executive Producer on DEFCON: The Documentary (2013). [21] The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences. He was also a cast member in the film Code 2600. [22] Moss also works with the technical consulting team for the television series Mr. Robot .

DEF CON was portrayed in The X-Files episode "Three of a Kind" featuring an appearance by the Lone Gunmen. DEF CON was portrayed as a United States government-sponsored convention instead of a civilian convention.

Actor Will Smith visited DEF CON 21 to watch a talk by Apollo Robbins, the gentleman thief, and to study the DEF CON culture for an upcoming movie role. [23]

Related Research Articles

DEF CON is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions. Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

<span class="mw-page-title-main">Peiter Zatko</span> American computer security expert

Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.

Black Hat Briefings is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together a variety of people interested in information security ranging from non-technical individuals, executives, hackers, and security professionals. The conference takes place regularly in Las Vegas, Barcelona, London and Riyadh. The conference has also been hosted in Amsterdam, Tokyo, and Washington, D.C. in the past.

<span class="mw-page-title-main">Ivanti</span> American IT software company

Ivanti is an IT software company headquartered in South Jordan, Utah, United States. It produces software for IT Security, IT Service Management, IT Asset Management, Unified Endpoint Management, Identity Management and supply chain management. It was formed in January 2017 with the merger of LANDESK and HEAT Software, and later acquired Cherwell Software. The company became more widely known after several major security incidents related to the VPN hardware it sells.

<span class="mw-page-title-main">Rod Beckstrom</span> American writer

Rod Beckstrom is an American author, high-tech entrepreneur, and former CEO and President of ICANN. He previously served as Director of the National Cybersecurity Center.

<span class="mw-page-title-main">Pavan Duggal</span> Indian lawyer

Pavan Duggal is an advocate practising in the Supreme Court of India, specializing in the field of Cyberlaw, Cybercrime Law, Cybersecurity Law, and Artificial Intelligence Law. He is a member of NomCom Committee on Multilingual Internet Names Consortium (MINC).

<span class="mw-page-title-main">Computer security conference</span> Convention for individuals involved in computer security

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

Jeffrey Carr is a cybersecurity author, researcher, entrepreneur and consultant, who focuses on cyber warfare.

<span class="mw-page-title-main">Cybersecurity Information Sharing Act</span>

The Cybersecurity Information Sharing Act is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate on October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private businesses to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police.

<span class="mw-page-title-main">Iftach Ian Amit</span> Israeli Hacker

Iftach Ian Amit is an Israeli Hacker/computer security researcher and practitioner. He is one of the co-founders of the Tel Aviv DEF CON Group DC9723, the Penetration Testing Execution Standard, and presented at hacker conventions such as DEF CON, Black Hat, BlueHat, RSA Conference. He has been named SC Magazine's top experts and featured at Narratively's cover piece on Attack of the Superhackers and is frequently quoted and interviewed

<span class="mw-page-title-main">Cris Thomas</span> American cybersecurity researcher and hacker

Cris Thomas is an American cybersecurity researcher, white hat hacker, and award winning best selling author. A founding member and researcher at the high-profile hacker security think tank L0pht Heavy Industries, Thomas was one of seven L0pht members who testified before the U.S. Senate Committee on Governmental Affairs (1998) on the topic of government and homeland computer security, specifically warning of internet vulnerabilities and claiming that the group could "take down the internet within 30 minutes".

Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases.

<span class="mw-page-title-main">Alex Stamos</span> Greek American computer scientist

Alex Stamos is an American computer scientist and adjunct professor at Stanford University's Center for International Security and Cooperation. He is the former chief security officer (CSO) at Facebook. His planned departure from the company, following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, was reported in March 2018.

<span class="mw-page-title-main">Cybersecurity and Infrastructure Security Agency</span> Agency of the United States Department of Homeland Security

The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cybersecurity programs with U.S. states, and improving the government's cybersecurity protections against private and nation-state hackers.

<span class="mw-page-title-main">Jake Braun</span> American political, cyber and national security expert

Jacob H. Braun is an American politician, cyber and national security expert. He was appointed by President Joseph Biden as the U.S. Department of Homeland Security (DHS) Secretary's Senior Advisor to the Management Directorate. Braun is also a lecturer at the University of Chicago’s Harris School of Public Policy Studies where he teaches courses on cyber policy and election security. He previously served as the Executive Director for the University of Chicago Harris Cyber Policy Initiative (CPI).

<span class="mw-page-title-main">Ang Cui</span> American computer scientist

Ang Cui is an American cybersecurity researcher and entrepreneur. He is the founder and CEO of Red Balloon Security in New York City, a cybersecurity firm that develops new technologies to defend embedded systems against exploitation.

<span class="mw-page-title-main">Christopher Hadnagy</span> American author, hacker, and computer scientist

Christopher James Hadnagy is an American author and information technology security consultant. He is recognized for his contributions to the field of social engineering in information security.

<span class="mw-page-title-main">Jen Easterly</span> American government official

Jen Easterly is an American intelligence and former military official who is serving as the director of the Cybersecurity and Infrastructure Security Agency in the Biden administration. She was confirmed by a voice vote in the Senate on July 12, 2021.

<span class="mw-page-title-main">Capture the flag (cybersecurity)</span> Computer security exercise

Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called "flags", which are secretly hidden in purposefully-vulnerable programs or websites. They can be used for both competitive or educational purposes. In two main variations of CTFs, participants either steal flags from other participants or from organizers. A mixed competition combines these two styles. Competitions can include hiding flags in hardware devices, they can be both online or in-person, and can be advanced or entry-level. The game is inspired by the traditional outdoor sport of the same name.

References

  1. Sutter, John D. (2011-08-03). "Meet Dark Tangent, the hacker behind Black Hat and DEF CON". CNN . Retrieved 2014-08-10.
  2. "About Black Hat". 2012-04-25. Retrieved 2014-08-10.
  3. "About", defcon.org
  4. Naraine, Ryan (2005-11-16). "CMP Media Buys Black Hat". eWeek . Retrieved 2014-08-10.
  5. "DEF CON® China Hacking Conference".
  6. "DEF CON® China 1.0 Hacking Conference".
  7. Mills, Elinor (2009-06-05). "Hacker named to Homeland Security Advisory Council". CNET . Retrieved 2014-08-10.
  8. "Jeff Moss Appointed ICANN Chief Security Officer" (PDF). ICANN. 2011-04-28. Archived from the original (PDF) on 2014-08-12. Retrieved 2014-08-10.
  9. "Cyber Statecraft Initiative".
  10. "Results, reports & presentations".
  11. "Jeff Moss named Commissioner at Global Commission on the Stability of Cyberspace". Global Commission on the Stability of Cyberspace . Retrieved 2017-02-05.
  12. "DEF CON Hacking Warns Voting Machines Vulnerability, Oct 10 2017 | C-SPAN.org". C-SPAN.org. Retrieved 2017-12-08.
  13. "O'Reilly Security Conference in NYC 2017 Defender Awards". conferences.oreilly.com. Retrieved 2017-12-08.
  14. "CISA Names 23 Members to New Cybersecurity Advisory Committee". Department of Homeland Security. Retrieved 1 December 2021.
  15. Doubleday, Justin (1 December 2021). "CISA names big tech, financial execs and others to Cybersecurity Advisory Committee". Federal News Network. Retrieved 5 December 2021.
  16. Miller, Maggie (1 December 2021). "CISA announces members of team providing advice on cybersecurity threats".
  17. 1 2 Littman, Jonathan (1998-08-13). "Inside Jobs: Is there a Hacker in the Next Cubicle?". PC World . Retrieved 2014-08-10.
  18. Tang, Rose (2001-05-01). "China - U.S. Cyber War Escalates". CNN . Archived from the original on 2013-08-22. Retrieved 2014-08-10.
  19. Richard Thieme (1999-02-08). "Designing the Future". Forbes . Retrieved 2014-08-10.
  20. Hesseldahl, Arik (2000-08-02). "Law Enforcement Officials Recruit Hackers". Forbes. Retrieved 2014-08-10.
  21. DEFCON: The Documentary at IMDb OOjs UI icon edit-ltr-progressive.svg
  22. Code 2600 at IMDb OOjs UI icon edit-ltr-progressive.svg
  23. Constantin, Lucian (2013-08-05). "Will Smith makes unexpected appearance at Defcon hacker conference". techhive.com. Retrieved 2014-08-10.