Alex Stamos

From Infogalactic: the planetary knowledge core
Jump to: navigation, search
Alex Stamos
File:Alex Stamos at Web Summit 2015 - Dublin, Ireland.jpg
Stamos at Web Summit 2015 in Dublin, Ireland
Born Los Angeles County
Occupation Chief security officer, computer scientist

Alex Stamos is a computer scientist and adjunct professor at Stanford University's Center for International Security and Cooperation.[1] He is the former chief security officer (CSO) at Facebook. His planned departure from the company, following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, was reported in March 2018.[2]

Early life

Stamos grew up in Fair Oaks, California and graduated from Bella Vista High School in 1997. Stamos attended the University of California, Berkeley, where he graduated in 2001 with a degree in EECS.[3]

Career

Stamos began his career at Loudcloud and, later, as a security consultant at @stake.[4]

iSEC Partners

In 2004, Stamos co-founded iSEC Partners, a security consulting firm, with Joel Wallenstrom, Himanshu Dwivedi, Jesse Burns and Scott Stender. During his time at iSEC Partners, Stamos was well known for his research publications on vulnerabilities in forensics software[5] and MacOS,[6] Operation Aurora,[7] and security ethics in the post-Snowden era.[8]

Stamos was an expert witness for a number of cases involving digital privacy, encryption, and free speech:

iSEC Partners was acquired by NCC Group in 2010.[13]

Artemis Internet

Following the acquisition of iSEC Partners by NCC Group, Stamos became the CTO of Artemis Internet, an internal startup at NCC Group. Artemis Internet petitioned ICANN to host a '.secure' gTLD on which all services would be required to meet minimum security standards[14] Artemis ultimately acquired the right to operate the '.trust' gTLD from Deutsche Post to launch its services.[15]

Stamos filed and received five patents for his work at Artemis Internet.[16]

Yahoo!

In 2014, Stamos joined Yahoo! as CSO.[17] While at Yahoo!, he testified to Congress on online advertising and its impact on computer security and data privacy.[18] He publicly challenged NSA Director Michael S. Rogers on the subject of encryption backdoors in February 2015 at a cybersecurity conference hosted by New America.[19][20] He resigned in June 2015 in response to a then-undisclosed program to scan incoming email on behalf of United States government intelligence agencies.[21]

Facebook

In 2015, Stamos joined Facebook as CSO. During his time at Facebook, Stamos co-authored a paper (with Jen Weedon and Will Nuland) on the use of social media to attack elections.[22] He later delivered a keynote address at the Black Hat Briefings in 2017 on the need to broaden the definition of security and diversify the cybersecurity industry.[23]

<templatestyles src="Template:Blockquote/styles.css" />

In reviewing the ads buys, we have found approximately $100,000 in ad spending from June of 2015 to May of 2017 — associated with roughly 3,000 ads — that was connected to about 470 inauthentic accounts and Pages in violation of our policies. Our analysis suggests these accounts and Pages were affiliated with one another and likely operated out of Russia.

— Alex Stamos, September 6, 2017, [24]

Following disagreement with other executives about how to address the Russian government's use of its platform to spread disinformation during the 2016 U.S. presidential election, he made plans in 2018 to leave the company[2] to take a research professorship at Stanford University.[25]

Stanford University

As of August 2019, Stanford University's Center for International Security and Cooperation lists Stamos as an adjunct professor, visiting scholar at the Hoover Institution, and director of the Stanford Internet Observatory.[1][26]

References

  1. 1.0 1.1 Lua error in package.lua at line 80: module 'strict' not found.
  2. 2.0 2.1 Lua error in package.lua at line 80: module 'strict' not found.
  3. Lua error in package.lua at line 80: module 'strict' not found.
  4. Lua error in package.lua at line 80: module 'strict' not found.
  5. Lua error in package.lua at line 80: module 'strict' not found.
  6. Lua error in package.lua at line 80: module 'strict' not found.
  7. Lua error in package.lua at line 80: module 'strict' not found.
  8. Lua error in package.lua at line 80: module 'strict' not found.
  9. Lua error in package.lua at line 80: module 'strict' not found.
  10. Lua error in package.lua at line 80: module 'strict' not found.
  11. Lua error in package.lua at line 80: module 'strict' not found.
  12. Lua error in package.lua at line 80: module 'strict' not found.
  13. Lua error in package.lua at line 80: module 'strict' not found.
  14. .Lua error in package.lua at line 80: module 'strict' not found.
  15. Lua error in package.lua at line 80: module 'strict' not found.
  16. Lua error in package.lua at line 80: module 'strict' not found.
  17. Lua error in package.lua at line 80: module 'strict' not found.
  18. Lua error in package.lua at line 80: module 'strict' not found.
  19. Lua error in package.lua at line 80: module 'strict' not found.
  20. Lua error in package.lua at line 80: module 'strict' not found.
  21. Lua error in package.lua at line 80: module 'strict' not found.
  22. Lua error in package.lua at line 80: module 'strict' not found.
  23. Lua error in package.lua at line 80: module 'strict' not found.
  24. Lua error in package.lua at line 80: module 'strict' not found.
  25. Lua error in package.lua at line 80: module 'strict' not found.
  26. Lua error in package.lua at line 80: module 'strict' not found.

Patents

  • U.S. Patent 9,083,727B1 Securing client connections, filed April 11, 2012, granted July 14, 2015
  • U.S. Patent 8,799,482B1 Domain policy specification and enforcement, filed April 11, 2012, granted August 5, 2014
  • U.S. Patent 9,106,661B1 Computing resource policy regime specification and verification, filed May 9, 2014, granted August 11, 2014
  • U.S. Patent 8,990,392B1 Assessing a computing resource for compliance with a computing resource policy regime specification, filed May 9, 2014, granted March 24, 2015
  • U.S. Patent 9,264,395B1 Discovery engine, filed May 9, 2014, granted February 16, 2016