Cris Thomas (Space Rogue)
   HOME

TheInfoList



OR:

Cris Thomas (also known as ''Space Rogue'') is an American cybersecurity researcher,
white hat hacker A white hat (or a white-hat hacker, a whitehat) is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white-hat hackers aim to identify any vulnerabilit ...
, and award winning best selling author. A founding member and researcher at the high-profile
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
security
think tank A think tank, or public policy institute, is a research institute that performs research and advocacy concerning topics such as social policy, political strategy, economics, military, technology, and culture. Most think tanks are non-governme ...
L0pht Heavy Industries, Thomas was one of seven L0pht members who testified before the U.S. Senate Committee on Governmental Affairs (1998) on the topic of government and homeland computer security, specifically warning of internet vulnerabilities and claiming that the group could "take down the internet within 30 minutes". Subsequently, Thomas pursued a career in Cyber Security Research while also embracing a public advocacy role as a cyber security subject-matter expert (SME) and
pundit A pundit is a person who offers opinion in an authoritative manner on a particular subject area (typically politics, the social sciences, technology or sport), usually through the mass media. The term pundit describes both women and men, altho ...
. Granting interviews and contributing articles, Space Rogue's advocacy has served to educate and advise corporations, government, and the
Public In public relations and communication science, publics are groups of individual people, and the public (a.k.a. the general public) is the totality of such groupings. This is a different concept to the sociology, sociological concept of the ''Öf ...
about security concerns and relative risk in the areas of election integrity, cyber terrorism, technology, the anticipation of new risks associated with society's adoption of the
Internet of things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
, and balancing perspective (risk vs. hype).


Career


Cyber Security

A founding member of the hacker think tank
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. ...
Heavy Industries, Thomas was the first of L0pht's members to leave following the merger of L0pht with
@Stake ATstake, Inc. (stylized as @stake) was a computer security professional services company in Cambridge, Massachusetts, United States. It was founded in 1999 by Battery Ventures (Tom Crotty, Sunil Dhaliwal, and Scott Tobin) and Ted Julian. Its initi ...
in 2000, and the last to reveal his true name. Thomas was one of seven L0pht members who testified before the U.S. Senate Committee on Governmental Affairs (1999). Testifying under his
internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
handle, Space Rogue, the testimony of Thomas and other
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. ...
members served to inform the government of current and future internet vulnerabilities to which federal and public channels were susceptible. The testimony marked the first time that persons not under federal
witness protection Witness protection is security provided to a threatened person providing testimonial evidence to the justice system, including defendants and other clients, before, during, and after trials, usually by police. While witnesses may only require p ...
were permitted to testify under assumed names. While at the
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. ...
Thomas created The Whacked Mac Archives and The Hacker News Network. In addition he released at least one security advisories detailing a flaw in FWB's Hard Disk Toolkit. Thomas continued a career in Cyber Security Research at
@Stake ATstake, Inc. (stylized as @stake) was a computer security professional services company in Cambridge, Massachusetts, United States. It was founded in 1999 by Battery Ventures (Tom Crotty, Sunil Dhaliwal, and Scott Tobin) and Ted Julian. Its initi ...
, Guardent, Trustwave (Spiderlabs), Tenable, and IBM (X-Force Red). Selected to serve as a panelist during a 2016
Atlantic Council The Atlantic Council is an American think tank in the field of international affairs, favoring Atlanticism, founded in 1961. It manages sixteen regional centers and functional programs related to international security and global economic prosp ...
''cyber risk'' discussion series, and a webinar speaker for the
National Science Foundation The U.S. National Science Foundation (NSF) is an Independent agencies of the United States government#Examples of independent agencies, independent agency of the Federal government of the United States, United States federal government that su ...
's WATCH series, Thomas has embraced a public advocacy role as a cyber security subject-matter expert (SME) and
pundit A pundit is a person who offers opinion in an authoritative manner on a particular subject area (typically politics, the social sciences, technology or sport), usually through the mass media. The term pundit describes both women and men, altho ...
, granting interviews and contributing
articles Article often refers to: * Article (grammar), a grammatical element used to indicate definiteness or indefiniteness * Article (publishing), a piece of nonfictional prose that is an independent part of a publication Article(s) may also refer to: ...
Article examples
*
*
*
to educate the public about security concerns and relative risk. Topics include election integrity, cyber terrorism, technology, password security, the anticipation of new risks associated with society's adoption of the
Internet of things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
, and balancing perspective (risk vs. hype). In response to a 2016 United States
Government Accountability Office The United States Government Accountability Office (GAO) is an independent, nonpartisan government agency within the legislative branch that provides auditing, evaluative, and investigative services for the United States Congress. It is the s ...
report revealing the nation's
nuclear weapons A nuclear weapon is an explosive device that derives its destructive force from nuclear reactions, either nuclear fission, fission (fission or atomic bomb) or a combination of fission and nuclear fusion, fusion reactions (thermonuclear weap ...
were under the control of computers that relied on outdated 8"
floppy disk A floppy disk or floppy diskette (casually referred to as a floppy, a diskette, or a disk) is a type of disk storage composed of a thin and flexible disk of a magnetic storage medium in a square or nearly square plastic enclosure lined with a ...
s, Thomas argued that the older computers, data storage systems,
programming languages A programming language is a system of notation for writing computer programs. Programming languages are described in terms of their syntax (form) and semantics (meaning), usually defined by a formal language. Languages usually provide features ...
, and lack of
internet The Internet (or internet) is the Global network, global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a internetworking, network of networks ...
connectivity would make it more difficult for
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
s to access the systems, effectively reducing the vulnerability of the weapon control systems to hacking. Following cyber security mega-breaches at
Target Target may refer to: Warfare and shooting * Shooting target, used in marksmanship training and various shooting sports ** Bullseye (target), the goal one for which one aims in many of these sports ** Aiming point, in field artille ...
,
Home Depot The Home Depot, Inc., often referred to as Home Depot, is an American multinational corporation, multinational home improvement retail corporation that sells tools, construction products, appliances, and services, including fuel and transportat ...
, and the
U.S. Office of Personnel Management The United States Office of Personnel Management (OPM) is an independent agency of the United States government that manages the United States federal civil service. The agency provides federal human resources policy, oversight, and support, and ...
, Thomas advocated for proactive implementation of basic security measures as the most effective means to thwart similar mega-threats. Bluntly stating that the gap between knowledge and implementation leaves companies and individuals at unnecessary risk, Thomas’ recommendation focused on simple measures that have been known for one to two decades, but which organizations have not implemented universally. Thomas had identified retail cyber security breaches, including that at
FAO Schwarz FAO Schwarz is an American toy brand and Toy store, retail chain. The company is known for its high-end toys, life-sized stuffed animals, Interactivity, interactive experiences, Product placement, brand integrations, and games. FAO Schwarz clai ...
, as early as 1999. In 2017, at the
Defcon The defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces. For security reasons, the U.S. military does not announce a DEFCON level to the public. The DEFCON system was developed by the Joint Chiefs of Sta ...
hacker conference Thomas assisted with escorting Rep. Will Hurd (R) and Rep. Jim Langevin (D) around the conference area through the various villages. At
Defcon The defense readiness condition (DEFCON) is an alert state used by the United States Armed Forces. For security reasons, the U.S. military does not announce a DEFCON level to the public. The DEFCON system was developed by the Joint Chiefs of Sta ...
27 in 2019 Thomas appeared on a panel with Rep. Langevin (D-RI), Rep. Lieu (D-CA), and former Rep. Jane Harman entitled "Hacking Congress: The Enemy of My Enemy Is My Friend." During the panel Thomas was quoted as saying “It’s up to us as a community to engage with those people…to educate them”, "But Congress doesn't work that way; it doesn't work at the 'speed of hack'. If you're going to engage with it, you need to recognize this is an incremental journey” and “it takes 20 years to go from hackers in Congress to Congress at DEF CON”.


The Whacked Mac Archives

The Whacked Mac Archives was an FTP download site managed by Thomas with the world's largest collection of Apple Macintosh hacking tools. The total size of all the tools on the site was 20MB. A CD copy of the contents of the FTP site was advertised for sale in
2600: The Hacker Quarterly ''2600: The Hacker Quarterly'' is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Intern ...
.


Hacker News Network

Serving as Editor-in-Chief, Thomas founded and managed
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. ...
's online newsletter and website, known as the Hacker News Network (or simply ''Hacker News'' or ''HNN''). Originally created to rapidly share discoveries about computer security, ''Hacker News'' also became a forum for users to post security alerts as vulnerabilities were identified. The publication grew, eventually supporting paid advertising and an audience that included technology journalists and companies with an interest in cybersecurity. The website can be seen in several background shots of the video "Solar Sunrise: Dawn of a New Threat" produced by the National Counterintelligence Center in 1999.Alt URL
/ref> After L0pht's merger with @Stake in 2000, the
Responsible disclosure In computer security, coordinated vulnerability disclosure (CVD, sometimes known as responsible disclosure) is a vulnerability disclosure model in which a vulnerability or an issue is disclosed to the public only after the responsible parties hav ...
-focused ''Hacker News Network'' was replaced with ''Security News Network''. Hacker News Network, after a decade offline, set for a launch on Jan. 11, 2010, with video reports about security, the last videos were published in 2011. ''Hacker News Network'' in 2018 redirects to spacerogue.net


CyberSquirrel1 (CS1)

In 2013, Thomas created the project ''CyberSquirrel1'' as a
satirical Satire is a genre of the visual arts, visual, literature, literary, and performing arts, usually in the form of fiction and less frequently Nonfiction, non-fiction, in which vices, follies, abuses, and shortcomings are held up to ridicule, ...
demonstration of the relative risk of
Cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...
attacks on critical infrastructure elements such as the North American
electrical grid An electrical grid (or electricity network) is an interconnected network for electricity delivery from producers to consumers. Electrical grids consist of power stations, electrical substations to step voltage up or down, electric power tran ...
. Started as a
Twitter Twitter, officially known as X since 2023, is an American microblogging and social networking service. It is one of the world's largest social media platforms and one of the most-visited websites. Users can share short text messages, image ...
feed, the CyberSquirrel1 project expanded to include a full website and ''CyberSquirrel Tracking Map''; as the dataset grew, Attrition.org's Brian Martin (alias “Jared E. Richo” a/k/a ''Jericho'') joined the project in 2014. CyberSquirrel1's results disrupted public perception regarding the prevalence of nation-based hacking cyberwarfare attacks, concluding that damage due to cyberwarfare (for example,
Stuxnet Stuxnet is a Malware, malicious computer worm first uncovered on June 17, 2010, and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsibl ...
) was "tiny compared to the ''cyber-threat'' caused by animals", referring to electrical disruptions caused by squirrels. An archive containing the full data set and supporting material of the project was uploaded to th
Internet Archive
under the Creative Commons license on January 19, 2021.


Election Security

As the 2015-2016 alleged
Russian interference in the 2016 United States elections The Russian government conducted Foreign electoral intervention, foreign electoral interference in the 2016 United States elections with the goals of sabotaging the Hillary Clinton 2016 presidential campaign, presidential campaign of Hillar ...
unfolded, public and media interest in hacking and
hacker A hacker is a person skilled in information technology who achieves goals and solves problems by non-standard means. The term has become associated in popular culture with a security hackersomeone with knowledge of bug (computing), bugs or exp ...
s increased. Leading up to the 2016 election, Thomas was interviewed for mainstream media productions, including
CNBC CNBC is an American List of business news channels, business news channel owned by the NBCUniversal News Group, a unit of Comcast's NBCUniversal. The network broadcasts live business news and analysis programming during the morning, Day ...
's ''On the Money''. After the release of the Joint Analysis Report, Thomas called for expanded detail on
Indicators of Compromise Indicator of compromise (IoC) in computer forensics is an artifact observed on a computer network, network or in an operating system that, with high confidence, indicates a computer intrusion. Types of indication Typical IoCs are virus signature ...
in Federal Joint Analysis Reports, indicating that increased transparency and IP address reporting were instrumental for enhancing security. Prior to the 2018 election Thomas continued his advocacy speaking with
CBS News CBS News is the news division of the American television and radio broadcaster CBS. It is headquartered in New York City. CBS News television programs include ''CBS Evening News'', ''CBS Mornings'', news magazine programs ''CBS News Sunday Morn ...
and other outlets about securing our elections and the vulnerability of voting machines.


Books

In February 2023 Thomas released his first book, Space Rogue: How the Hackers Known as L0pht Changed the World. Written as a personal memoir, the book detailed his childhood growing up in Maine, how he discovered the online world of BBS’s and met the other members of the hacker collective
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. ...
Heavy Industries. The book covers how the L0pht released security vulnerability information, created L0phtcrack, gained media recognition, and testified in front of Congress in 1998. The book also covers the L0pht’s transition to the security consultancy
@Stake ATstake, Inc. (stylized as @stake) was a computer security professional services company in Cambridge, Massachusetts, United States. It was founded in 1999 by Battery Ventures (Tom Crotty, Sunil Dhaliwal, and Scott Tobin) and Ted Julian. Its initi ...
, and how the
L0pht L0pht Heavy Industries (pronounced "loft") was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area. The L0pht was one of the first viable hackerspaces in the US, and a pioneer of responsible disclosure. ...
’s impact still ripples throughout the information security industry today. The book spent several weeks in the Amazon top 10 in the Computer & Technology Biographies category and briefly hit number 1. The book was a finalist in the 2023 International Book Awards. and a winner of the 2023 National Indie Excellence Awards (NIEA).


References


External links


Cybersquirrel1 website & event tracking mapSpace Rogue (Cris Thomas) personal website
{{DEFAULTSORT:Thomas, Cris L0pht Living people American hackers Writers about computer security American computer scientists Year of birth missing (living people)