Jeff Moss | |
---|---|
Born | Jeff Moss January 1, 1975 California, U.S. |
Alma mater | Gonzaga University, Criminal Justice (BA 1990) |
Occupation(s) | computer security, internet security expert |
Known for | Founder of the Black Hat and DEF CON computer hacker conferences |
Website | www |
Jeff Moss (born January 1, 1975), also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.
Moss received his first computer at the age of 10. [1] He became fascinated because he wasn't old enough to drive a car or vote, but he could engage in adult conversation with people all over the country.
Moss graduated from Gonzaga University with a BA in Criminal Justice. He worked for Ernst & Young, LLP in their Information System Security division and was a director at Secure Computing Corporation where he helped establish the Professional Services Department in the United States, Asia, and Australia. [2]
In 1993 he created the first DEF CON hacker convention, based around a party for members of a Fido hacking network in Canada. [3] It slowly grew, and by 1999 was attracting major attention.
In 1997 he created Black Hat Briefings computer security conference that brings together a variety of people interested in information security. He sold Black Hat in 2005 to CMP Media, a subsidiary of UK-based United Business Media, for a reported $13.9 million USD. [4] DEF CON was not included in the sale.
In 2018 Jeff launched the first DEF CON hacker convention outside of the United States. Holding the same name DEF CON China was hosted in Beijing, China and co-hosted by Baidu. [5] The first year of DEF CON China was labeled a [Beta] year, and in 2019 they formalized the conference with DEF CON China 1.0. [6]
Moss is a member and regular attendee of the Washington D.C. based Council on Foreign Relations (CFR), an independent, nonpartisan membership organization, think tank, and publisher.
In 2009 Moss was sworn into the Homeland Security Advisory Council of the Barack Obama administration. [7]
On April 28 2011 Jeff Moss was appointed ICANN Chief Security Officer. [8]
In July 2012, Secretary Janet Napolitano directed the Homeland Security Advisory Council to form the Task Force on CyberSkills in response to the increasing demand for the best and brightest in the cybersecurity field across industry, academia and government. The Task Force, co-chaired by Jeff Moss and Alan Paller, conducted extensive interviews with experts from government, the private sector, and academia in developing its recommendations to grow the advanced technical skills of the DHS cybersecurity workforce and expand the national pipeline of men and women with these cybersecurity skills. On October 1, the HSAC unanimously approved sending the Task Force recommendations to the Secretary.
In October 2013, Jeff announced that he would be stepping down from his position at ICANN at the end of 2013.
In 2013, Jeff was appointed as a Nonresident Senior Fellow at the Atlantic Council, associated with the Cyber Statecraft Initiative, within the Brent Scowcroft Center on International Security. [9]
In 2014, Jeff joined the Georgetown University School of Law School Cybersecurity Advisory Committee.
18 March 2016, Richemont announces his nomination for election to the Board of Directors. [10]
In 2017, Jeff was named a Commissioner at the Global Commission on the Stability of Cyberspace (GCSC). [11] The GCSC is composed of 24 prominent independent Commissioners representing a wide range of geographic regions as well as government, industry, technical and civil society stakeholders with legitimacy to speak on different aspects of cyberspace. The Commission's stated aim is to develop proposals for norms and policies to enhance international security and stability and guide responsible state and non-state behavior in cyberspace.
In 2017, Jeff spearheaded the creation of the DEF CON Voting Machine Village. Debuting at DEF CON 25, the Voting Machine Village allowed hackers to test the security of electronic voting machines, including several models still in active use in the US. The machines were all compromised over the course of the conference by DEF CON attendees, some within hours of the village's opening. The resulting media coverage of the vulnerability of all tested machines sparked a national conversation and inspired legislation in Virginia.
In September 2017, the Voting Machine Village produced "DEF CON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in US Election Equipment, Databases and Infrastructure" summarizing its findings. The findings were publicly released at an event sponsored by the Atlantic Council [12] and the paper went on to win an O'Reilly Defender Research Award. [13]
In March 2018, the DEF CON Voting Machine Hacking Village was awarded a Cybersecurity Excellence Award. The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan. [14]
In December 2021, Moss was appointed as one of twenty-three members of a newly formed US DHS CISA cybersecurity advisory council. Other notable members include Alex Stamos, Steve Adler, Bobby Chesney, Thomas Fanning, Vijaya Gadde, Patrick Gallagher, and Alicia Tate-Nadeau. [15] [16] [17]
Moss is currently based in Seattle, where he works as a security consultant for a company that is hired to test other companies' computer systems. [18] He has been interviewed on issues including the internet situation between the United States and China, [19] spoofing[ which? ] and other e-mail threats [18] and the employment of hackers in a professional capacity, [20] including in law enforcement. [21]
Moss was an Executive Producer on DEFCON: The Documentary (2013). [22] The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences. He was also a cast member in the film Code 2600. [23] Moss also works with the technical consulting team for the television series Mr. Robot .
DEF CON was portrayed in The X-Files episode "Three of a Kind" featuring an appearance by the Lone Gunmen. DEF CON was portrayed as a United States government-sponsored convention instead of a civilian convention.
Actor Will Smith visited DEF CON 21 to watch a talk by Apollo Robbins, the gentleman thief, and to study the DEF CON culture for an upcoming movie role. [24]
DEF CON is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions. Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.
Peiter C. Zatko, better known as Mudge, is an American network security expert, open source programmer, writer, and hacker. He is currently the chief information officer of DARPA. He was the most prominent member of the high-profile hacker think tank the L0pht as well as the computer and culture hacking cooperative the Cult of the Dead Cow.
Rod Beckstrom is an American author, high-tech entrepreneur, and former CEO and President of ICANN. He previously served as Director of the National Cybersecurity Center.
Pavan Duggal is an advocate practicing in the Supreme Court of India, specialized in the field of Cyberlaw, Cybercrime Law, Cybersecurity Law, and Artificial Intelligence Law. He is a member of NomCom Committee on Multilingual Internet Names Consortium (MINC).
A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts. Common activities at hacker conventions may include:
Jeffrey Carr is a cybersecurity author, researcher, entrepreneur and consultant, who focuses on cyber warfare.
The Cybersecurity Information Sharing Act is a United States federal law designed to "improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes". The law allows the sharing of Internet traffic information between the U.S. government and technology and manufacturing companies. The bill was introduced in the U.S. Senate on July 10, 2014, and passed in the Senate on October 27, 2015. Opponents question CISA's value, believing it will move responsibility from private businesses to the government, thereby increasing vulnerability of personal private information, as well as dispersing personal private information across seven government agencies, including the NSA and local police.
Iftach Ian Amit is an Israeli Hacker/computer security researcher and practitioner. He is one of the co-founders of the Tel Aviv DEF CON Group DC9723, the Penetration Testing Execution Standard, and presented at hacker conventions such as DEF CON, Black Hat, BlueHat, RSA Conference. He has been named SC Magazine's top experts and featured at Narratively's cover piece on Attack of the Superhackers and is frequently quoted and interviewed
Cris Thomas is an American cybersecurity researcher, white hat hacker, and award winning best selling author. A founding member and researcher at the high-profile hacker security think tank L0pht Heavy Industries, Thomas was one of seven L0pht members who testified before the U.S. Senate Committee on Governmental Affairs (1998) on the topic of government and homeland computer security, specifically warning of internet vulnerabilities and claiming that the group could "take down the internet within 30 minutes".
Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases.
Alex Stamos is an American computer scientist and adjunct professor at Stanford University's Center for International Security and Cooperation. He is the former chief security officer (CSO) at Facebook. His planned departure from the company, following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, was reported in March 2018.
Robert E. Joyce is an American cybersecurity official who served as special assistant to the President and Cybersecurity Coordinator on the U.S. National Security Council. He also began serving as White House Homeland Security Adviser to President Donald Trump on an acting basis after the resignation of Tom Bossert from April 10, 2018, to May 31, 2018. He completed his detail to the White House in May 2018 and returned to the National Security Agency, where he served as the Senior Advisor to the Director NSA for Cyber Security Strategy, until July 2019 when he went to London and served in the US Embassy as the NSA's senior cryptologic representative to the UK. Joyce previously performed as acting Deputy Homeland Security Advisor since October 13, 2017. On January 15, 2021, the NSA announced that Joyce would replace Anne Neuberger as its Director of Cybersecurity.
The Cybersecurity and Infrastructure Security Agency (CISA) is a component of the United States Department of Homeland Security (DHS) responsible for cybersecurity and infrastructure protection across all levels of government, coordinating cybersecurity programs with U.S. states, and improving the government's cybersecurity protections against private and nation-state hackers.
Jacob H. Braun is an American politician, cyber and national security expert. He was appointed by President Joseph Biden as the U.S. Department of Homeland Security (DHS) Secretary's Senior Advisor to the Management Directorate. Braun is also a lecturer at the University of Chicago’s Harris School of Public Policy Studies where he teaches courses on cyber policy and election security. He previously served as the Executive Director for the University of Chicago Harris Cyber Policy Initiative (CPI).
Jack Cable is an American computer security researcher and software developer who currently serves as a Senior Technical Advisor at the Cybersecurity and Infrastructure Security Agency. He is best known for his participation in bug bounty programs, including placing first in the U.S. Department of Defense's Hack the Air Force challenge. Cable began working for the Pentagon's Defense Digital Service in the summer of 2018.
The Cyber Safety Review Board was established by United States Secretary of Homeland Security Alejandro Mayorkas on February 3, 2022. Modeled after the National Transportation Safety Board, the Board reviews significant cybersecurity incidents and issues reports. President Joe Biden directed the Board's creation through Section 5 of Executive Order 14028, issued on May 12, 2021.
The Global Commission on the Stability of Cyberspace was a multistakeholder Internet governance organization, dedicated to the creation of diplomatic norms of governmental non-aggression in cyberspace. It operated for three years, from 2017 through 2019, and produced the diplomatic norm for which it was chartered and seven others.
Capture the Flag (CTF) in computer security is an exercise in which participants attempt to find text strings, called "flags", which are secretly hidden in purposefully-vulnerable programs or websites. They can be used for both competitive or educational purposes. In two main variations of CTFs, participants either steal flags from other participants or from organizers. A mixed competition combines these two styles. Competitions can include hiding flags in hardware devices, they can be both online or in-person, and can be advanced or entry-level. The game is inspired by the traditional outdoor sport of the same name.CTFs are used as a tool for developing and refining cybersecurity skills, making them popular in both professional and academic settings
Operational collaboration is a cyber resilience framework that leverages public-private partnerships to reduce the risk of cyber threats and the impact of cyberattacks on United States cyberspace. This operational collaboration framework for cyber is similar to the Federal Emergency Management Agency (FEMA)'s National Preparedness System which is used to coordinate responses to natural disasters, terrorism, chemical and biological events in the physical world.
Kyle Hanslovan is an American engineer and information technology security analyst who served as a US Air Force Cyber Technical Sergeant.