- Herbert Hugh Thompson
Dr. Herbert Hugh Thompson is an application security consultant.
Thompson received his
Ph.D. in Applied Mathematics fromFlorida Institute of Technology . [ [http://www.nnjtg.org/Thompson_bio.html Northern New Jersey Telecom] ] and holds aCISSP certificate. [ [http://www.cissps.com/ CISSPS official site] ] He was anadjunct professor at Florida Tech inMelbourne, Florida and worked for Security Innovation, Inc., where he gained experience training security testers andsoftware developer s for well-known software companies includingMicrosoft ,Cisco ,IBM ,VISA ,Hewlett Packard ,Symantec ,ING and SAP. [ [http://www.securityinnovation.com/company/releases/pr-hugh-pdc.shtml Security Innovation company release] ]In 2006, Thompson assisted in four hack tests for the nonprofit election watchdog group
Black Box Voting [ [http://www.blackboxvoting.org Black Box Voting site containing Thompson and Hursti projects] ] . Two of his tests involved altering election results reports on the Diebold GEMS central tally machines. Thompson also assistedHarri Hursti in the Black Box Voting projects inLeon County, Florida andEmery County, Utah . Thompson's GEMS central tabulator hack was achieved by inserting a Visual Basic script onto the GEMS server machine at election headquarters. Both the Visual Basic script hack by Thompson and the memory card hack byHursti Hack can be seen in HBO's "Hacking Democracy " where Hursti and Thompson hacked in to Diebold Election Systems's voting machines and central tabulator system in Leon County, Florida proving its vulnerability. [ [http://www.hbo.com/docs/programs/hackingdemocracy/ HBO's documetary "Hacking Democracy"] ]Thompson has also been featured on "The Red Tape Chronicles" on
MSNBC [ [http://redtape.msnbc.com/2006/11/post.html MSNBC Red Tape Chronicles] ] and on CNN'sLou Dobbs [ [http://transcripts.cnn.com/TRANSCRIPTS/0610/31/ldt.01.html CNN transcripts] ]ee also
Publications
*“How to Break Software Security: Effective Techniques for Security Testing” (2004, Addison Wellesley)
*“The Software Vulnerability Guide.” (2005, Charles River Media)
*Protecting the Business: Software Security Compliance (2008, John Wiley & Sons)References
Wikimedia Foundation. 2010.