Jack Cable is a coder turned white-hat hacker, a leader in making government and industry more secure.

email | resume | blog | twitter | github

Jack Cable is a security researcher and student at Stanford University, currently a Security Architect at Krebs Stamos Group and a researcher with the Stanford Empirical Security Research Group. Jack also works as a hacker at the Defense Digital Service.

Before this, Jack served as an Election Security Technical Advisor at CISA, where he led the development and deployment of Crossfeed, a pilot to scan election assets nationwide.

Jack joined the Defense Digital Service out of high school, where he helped run the Hack the Pentagon bug bounty portfolio, advised on the next iteration of the DoD Vulnerability Disclosure Program, and built innovative cybersecurity assessment tools.

Jack is also a top-ranked bug bounty hunter, having identified over 350 vulnerabilities in companies including Google, Facebook, Uber, Yahoo, and the U.S. Department of Defense. He is ranked within the top 100 hackers all-time on HackerOne.

Some of my work:

Led development and deployment of CISA's first passive, opt-out vulnerability scanning program with Crossfeed, assessing all 50 states and over 2,500 counties ahead of the 2020 election.

Advised the IT-ISAC on rebuilding relationships between the hacker community and elections industry, leading to the adoption of the first vulnerability disclosure policies for voting machines.

Launched Ransomwhere, the first website to publicly track ransomware payments.

Discovered a temporary workaround to a nascent ransomware strain, saving 50 victims $27,000 and leading to recognition from the U.S. Secretary of Homeland Security.

Organized a sign-on letter reaffirming the crucial role of security research in response to a Supreme Court Amicus Brief, with over 50 signatories including Congressman Jim Langevin. The letter was cited in the petitioner's reply brief to the Court.

Helped organize the Hack the Marine Corps bug bounty program, which culminated in a briefing demonstrating the discovered vulnerabilities to thirty 3 and 4-star Marine generals.

Website design from Zakir Durumeric, with inspiration from Eric Mill.