Hoover Press : Cyber DP5 HPCYBEAPX2 06-09-:1 18:47:03 rev1 page 271 APPENDIX 2 December 1999 Conference Participants drew c. arena Former Senior Counsel to the Assistant Attorney General, U.S. Department of Justice; former Counselor for Criminal Justice Matters at the U.S. Mission to the European Union (EU) in Brussels, Belgium. Now retired from over twenty years of federal government service, he has served as the Attorney General’s senior representative in Europe for multilateral affairs and has been responsible for Justice Department relations with the EU, the Council of Europe, the United Nations Commission on Criminal Justice, and the G-8’s Senior Experts Group on Organized Crime. He has worked extensively with all these organizations on issues relating to cyber crime. joseph betser Project Leader, Business Development and Program Man- agement, Aerospace Corporation, El Segundo, California. He has served as a Defense Advanced Research Projects Agency (DARPA) Principal Investi- gator for a number of network management and information assurance pro- jects and led activities in the growing commercial satellite network business, as well as in Department of Defense space architecture planning, and Battle Awareness and Data Dissemination (BADD). He also led the CalREN (Cal- ifornia Research and Education Network) ATM Research Consortium (ARC), among the first ATM networks in Southern California, consisting of eleven premier university and research organizations. caspar bowden Director, Foundation for Information Policy Research (FIPR), London, United Kingdom (http://www.fipr.org),an independent non- profit organization that studies the interaction between information technol- ogy and society, identifies technical developments with significant social im- pact, and commissions research into public policy alternatives. He is the co- organizer of the Scrambling for Safety public conferences on U.K. cryptog- raphy policy. He was formerly an e-commerce and Internet security consul- tant, senior researcher of an option-arbitrage trading firm, a financial strat- Hoover Press : Cyber DP5 HPCYBEAPX2 06-09-:1 18:47:03 rev1 page 272 272 Appendix 2 egist with Goldman Sachs, and chief algorithm designer for a virtual reality software house. susan brenner Associate Dean and Professor, University of Dayton School of Law, Dayton, Ohio. The author of numerous publications, she counts cyber crime among her many and diverse interests. In particular, her “Cybercrimes Seminar,” featured in a story broadcast by “NBC Nightly News,” is a law school seminar taught entirely online, the output of which includes the “Model State Computer Crimes Code” (http://www. cybercimes.net). alan b. carroll Supervisory Special Agent (SSA), National Infrastruc- ture Protection Center (NIPC), U.S. Federal Bureau of Investigation (FBI). During his long career in law enforcement, he has specialized in undercover narcotics investigations, as well as bank robbery, kidnapping, and extortion cases. In addition, he has most recently worked in the areas of violent crimes, white-collar crimes, domestic terrorism, and foreign counterintelligence in- vestigations. george c. c. chen Principal, Law Firm of Tsai, Lee & Chen, Taipei, Taiwan; former Director of the Science and Technology Law Center, Institute for Information Industry. He has some twenty years of professional experi- ence, having practiced law at a number of firms in Sydney, Taipei, and To- ronto; served as an arbitrator for the Commercial Arbitration Association of Taiwan; and taught computer law and international trade law at Tunghai University. He has published extensively in the field of intellectual property law. william r. cheswick Member, Technical Staff, Lucent Technologies, Murray Hill, New Jersey. He has worked in the area of operating system security for nearly thirty years. His experience includes various positions in system management, consulting, software development,and communications design and installation at Temple University, LaSalle College, the Harvard Business School, Manhattan College, and the New Jersey Institute of Tech- nology. He has specialized in firewalls, network security, PC viruses, mailers, and interactive science exhibits, co-authoring in 1994 the first full book on Internet security in 1994 (with Steven M. Bellovin), Firewalls and Internet Security: Repelling the Wily Hacker (Reading, Mass.: Addison-Wesley, 1994). k. c. claffy Research Scientist, San Diego Supercomputer Center (SDSC)/ Hoover Press : Cyber DP5 HPCYBEAPX2 06-09-:1 18:47:03 rev1 page 273 Conference Participants 273 Principal Investigator, Cooperative Association for Internet Data Analysis (CAIDA), University of California, San Diego (UCSD), La Jolla. The recipient of numerous grants and awards, she has extensive publications to her credit in her fields of specialization: symbolic systems, and computer science and engineering. Her professional experience also includes positions at the Sony Computer Science Laboratory in Tokyo, Japan; the U.S. Federal Reserve Board; AT&T Bell Laboratories; and Harry Diamond Laboratories. mariano-florentino cue´llar Law Clerk to the Honorable Judge Mary M. Schroeder, U.S. Court of Appeals for the Ninth Circuit. A member of the Bar of the State of California, from 1997 to 1999 he served as Senior Adviser to the Under Secretary for Enforcement, U.S. Department of the Treasury. While in Washington, D.C., he co-chaired the Initiatives Subcom- mittee of the Attorney General’s Council on White Collar Crime. He has also worked at the President’s Council of Economic Advisers and the American Bar Foundation. He holds a Ph.D. in political sciencefrom Stanford University and a J.D. from Yale Law School. dorothy e. denning Professor, Department of Computer Science, Georgetown University, Washington, D.C. She has over thirty-two years of professional experience, twenty-four in universities (including Purdue Uni- versity, the University of Rochester, and the University of Michigan) and eight in industry (including work at the Systems Research Center at Digital Equip- ment Corporation and the Computer Science Laboratory at SRI Interna- tional), working mainly in the areas of information warfare and security and the impact of information technology on society. She has written over 100 articles and is the author of such books as: Information Warfare and Security (New York: ACM Press; Reading, Mass.: Addison-Wesley, 1999), Internet Besieged: Countering Cyberspace Scofflaws (New York: ACM Press; Read- ing, Mass.: Addison-Wesley, 1998), and Cryptography and Data Security (Reading, Mass.: Addison-Wesley, 1982). whitfield diffie Distinguished Engineer, Sun Microsystems. He is best known for his 1975 discovery of the concept of public key cryptography. He has occupied the position of Distinguished Engineer at Sun since 1991 and, since 1993, has worked largely on public policy aspects of cryptography. His opposition to limitations on the business and personal use of cryptography has been the subject of articles in the New York Times Magazine, Wired, Omni, and Discover, and he is the author, with Susan Landau, of Privacy on Hoover Press : Cyber DP5 HPCYBEAPX2 06-09-:1 18:47:03 rev1 page 274 274 Appendix 2 the Line: The Politics of Wiretapping and Encryption (Cambridge, Mass.: MIT Press, 1998). ekaterina a. drozdova Doctoral Candidate, Department of Informa- tion Systems, Stern School of Business, New York University; former Resear- cher, Consortium for Research on Information Security and Policy (CRISP), Stanford University; Center for International Security and Cooperation (CI- SAC), Stanford University. She holds a master’s degree in international policy studies from Stanford and has experience in information technology consult- ing in the Silicon Valley. She has conducted an in-depth survey and analysis of national laws in fifty countries to determine the extent of international consensus against cyber crime, and has published on the impact of the Internet on human rights. david d. elliott Member, Executive Committee, Consortium for Re- search on Information Security and Policy (CRISP), Stanford University; Con- sulting Professor, Center for International Security and Cooperation (CI- SAC), Stanford University; former senior staff member, U.S. National Security Council. A physicist, he has served in senior positions in government and the defense industry, including supervising the SRI International’s Stra- tegic Study Center and, as Senior Vice President, overseeing strategic planning at Science Applications International Corporation (SAIC). He has a Ph.D. in high-energy physics from the California Institute of Technology. michael erlinger Co-Chairman, Intrusion Detection Working Group, Internet Engineering Task Force (IETF); Professor of Computer Science, Har- vey Mudd College, Claremont, California. He has practical experience in managing industrial computer networks both as an employee and as a con- sultant to various aerospace firms. At IETF, he is developing protocols for the communication of intrusion information. He was formerly chair of the IETF Remote Network Monitoring Working Group, which developed the SNMP-based RMON MIB (RFC 1271) and the Token Ring extensions to RMON (RFC 1513), both of which have gained wide marketplace accep- tance. george l. fisher Professor, Stanford Law School. An award-winning teacher and acknowledged expert in the fields of evidence and criminal law and procedure, he has been an Assistant Attorney General and Assistant District Attorney in the State of Massachusetts. He has also served
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages13 Page
-
File Size-