Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.
A Biographies of Committee and Staff Fred H. Cate, chair is vice president for research, distinguished professor, C. Ben Dutton profes- sor of law, and adjunct professor of informatics and computing at Indiana University. He served as the founding director of IUâs Center for Applied Cybersecurity Research from 2003 to 2014, where he is now a senior fellow. Professor Cate has testiï¬ed before numerous congressional committees and speaks frequently before professional, industry, and government groups. He is a senior policy advisor to the Centre for Information Policy Leadership at Hunton & Williams LLP, and a member of the National Academiesâ Forum on Cyber Resilience. Previously, Professor Cate served as a member of the National Research Councilâs Committee on Technical and Privacy Dimensions of Information for Terrorism Prevention, the Department of Homeland Securityâs Cybersecurity Subcommittee, the National Security Agencyâs Privacy and Civil Liberties Panel, the OECDâs Panel of Experts on Health Information Infrastructure, Microsoftâs Trustworthy Computing Academic Advisory Board, Intelâs Privacy and Security External Advisory Board, the Federal Trade Commissionâs Advisory Commit- tee on Online Access and Security, and the board of directors of The Privacy Projects. He served as counsel to the Department of Defense Technology and Privacy Advisory Committee and as chair of the International Telecommunication Unionâs High-Level Experts on Electronic Signatures and Certi- ï¬cation Authorities. The author of more than 150 articles and books, he served as the privacy editor for the Institute of Electrical and Electronic Engineersâ Security & Privacy and is one of the found- ing editors of the Oxford University Press journal, International Data Privacy Law. Professor Cate attended Oxford University and received his J.D. and his A.B. with Honors and Distinction from Stan- ford University. A former Senator and President of the Phi Beta Kappa Society, he is a fellow of Phi Beta Kappa and the American Bar Foundation, and an elected member of the Council on Foreign Re- lations and the American Law Institute. Dan Boneh (NAE1 ) is a professor of Computer Science at Stanford University where he heads the applied cryptography group and co-directs the computer security lab. Dr. Bonehâs research fo- cuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, security for mobile devices, web security, and cryptanalysis. He is the author of over a 150 publications in the ï¬eld and is a recipient of the 2014 ACM Prize in Computing, the 2013 ACM SIGACT GÃ¶del Prize for outstanding papers in theoretical computer science, and six best paper awards. He is a Packard fellow, a Sloan fellow, and a fellow of the ACM. Frederick R. Chang (NAE) is the director of the Darwin Deason Institute for Cyber Security, the Bobby B. Lyle Centennial Distinguished Chair in Cyber Security, and professor in the Department of Computer Science and Engineering in the Lyle School of Engineering at Southern Methodist Uni- versity. He is also a senior fellow in the John Goodwin Tower Center for Political Studies at SMUâs 1 National Academy of Engineering 79 PRE-PUBLICATION COPYâSUBJECT TO FURTHER EDITORIAL CORRECTION
80 APPENDIX A. BIOGRAPHIES OF COMMITTEE AND STAFF Dedman College and a distinguished scholar in the Robert S. Strauss Center for International Secu- rity and Law, at the University of Texas at Austin. He is the former director of research at the Na- tional Security Agency. Dr. Chang received his B.A. from the University of California, San Diego and his M.A. and Ph.D. from the University of Oregon. He also completed the senior executive program at the Sloan School of Management at the Massachusetts Institute of Technology. He has served as a member of the Commission on Cyber Security for the 44th Presidency. He also served as a member of the Computer Science and Telecommunications Board of the National Academies of Sciences, En- gineering, and Medicine and its Committee on Responding to Section 5(d) of Presidential Policy Di- rective 28: The Feasibility of Software to Provide Alternatives to Bulk Signals Intelligence Collection. He has been awarded the NSA Directorâs Distinguished Service Medal and was the 2014 Information Security Magazine "Security 7" award-winner for education. Scott Charney is vice president for security policy at Microsoft, working with public and private sector organizations to develop and implement strategies to help secure the information technology ecosystem. He currently serves as vice chair of the National Security Telecommunications Advisory Committee, as a commissioner on the Dutch Commission for the Stability of Cyberspace, and as chair of the board of the Global Cyber Alliance. Prior to his current position, Mr. Charney led Microsoft- Ã¢ÄÅ¹s Trustworthy Computing Group where he was responsible for enforcing MicrosoftÃ¢ÄÅ¹s manda- tory security engineering policies and implementing Microsoftâs security strategy. Before that, Mr. Charney served as chief of the Computer Crime and Intellectual Property Section (CCIPS) at the U.S. Department of Justice (DOJ) where he was responsible for implementing DOJÃ¢ÄÅ¹s computer crime and intellectual property initiatives. Under his direction, CCIPS investigated and prosecuted na- tional and international hacker cases, economic espionage cases, and violations of the federal crim- inal copyright and trademark laws. He served three years as chair of the G8 Subgroup on High-Tech Crime, was vice chair of the Organization of Economic Cooperation and Development (OECD) Group of Experts on Security and Privacy, led the U.S. Delegation to the OECD on Cryptography Policy, and was co-chair of the Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency. Mr. Charney graduated from the Syracuse University College of Law with hon- ors, and received his undergraduate degree from the State University of New York at Binghamton. Shafrira Goldwasser (NAS2 , NAE) is the RSA Professor of Electrical Engineering and Computer Science at MIT, a co-leader of the cryptography and information security group and a member of the complexity theory group within the Theory of Computation Group and the Computer Science and Artiï¬cial Intelligence Laboratory. In 1992 she began a parallel career as a Professor of Computer Science and Applied Mathematics at the Weizmann Institute of Science in Israel. Goldwasser has made fundamental contributions to cryptography, computational complexity, computational num- ber theory and probabilistic algorithms. She was a recipient of the ï¬rst ACM SIGACT GÃ¶del Prize for outstanding papers in theoretical computer science in 1993 and co-recipient of the Turing Award in 2012. She received a B.S. in mathematics from Carnegie Mellon University (1979) and M.S. (1981) and Ph.D. (1984) in electrical engineering and computer science from the University of California, Berkeley. David A. Hoffman is director of security policy and global privacy Ofï¬cer at Intel Corporation, in which capacity he oversees Intelâs privacy activities and security policy engagements. Mr. Hoffman joined Intel in 1998 as Intelâs eBusiness attorney to manage the team providing legal support for In- tel?s Chief Information Ofï¬cer. In 1999, he founded Intel?s Privacy Team, and in 2000 was appointed 2 National Academy of Sciences PRE-PUBLICATION COPYâSUBJECT TO FURTHER EDITORIAL CORRECTION
APPENDIX A. BIOGRAPHIES OF COMMITTEE AND STAFF 81 Group Counsel of eBusiness and Director of Privacy. In 2005, Mr. Hoffman moved to Munich, Ger- many, as group counsel in the Intel European Legal Department, while leading Intelâs Worldwide Privacy and Security Policy Team. Mr. Hoffman served on the U.S. Federal Trade Commissionâs On- line Access and Security Advisory Committee. Mr. Hoffman served on the TRUSTe board of directors from 2000-2006, where he was Chair of the Compliance Committee of the Board. Mr. Hoffman was a member of the U.S. Federal Trade Commissionâs Online Access and Security Committee and the De- partment of Homeland Securityâs Data Privacy and Integrity Advisory Committee. Mr. Hoffman has lectured on privacy and security law at schools in the U.S., Europe, Japan and China. He received a J.D. from Duke University School of Law and an A.B. from Hamilton College. Seny Kamara is an associate professor of computer science at Brown University. He was previ- ously a researcher in the Cryptography Group at Microsoft Research. Kamaraâs interests are in secu- rity and cryptography with a focus on privacy issues in surveillance, cloud computing and databases. His contributions include efï¬cient algorithms to search on encrypted data, attacks on encrypted databases and protocols for privacy-preserving contact chaining. In 2006, he was a research fel- low at the UCLA Institute for Pure and Applied Mathematics. In 2015, he initiated the Workshop on Surveillance and Technology. In 2016 he was named a fellow of the Boston Global Forum. He re- ceived his Ph.D. in computer science from Johns Hopkins University. David Kris is a founder of Culper Partners LLC, a business consulting ï¬rm specializing in national security issues. Prior to forming Culper in 2017, Kris was for six years the General Counsel of Intel- lectual Ventures, a privately held invention investment company. He was also the Deputy General Counsel and Chief Compliance ofï¬cer of Time Warner, Inc., the network and media company, where he worked from 2003 to 2009. In government, Kris was the Presidentially-appointed and Senate- conï¬rmed head of the Department of Justiceâs National Security Division (2009-2011); a senior advi- sor to Republican and Democratic Attorneys General and Deputy Attorneys General (2000-2003); and a federal prosecutor (1992-2000). He currently advises two elements of the U.S. Intelligence Community and serves as an amicus curiae to the two Foreign Intelligence Surveillance Courts. Kris is co-author of the treatise, National Security Investigations and Prosecutions, as well as the author of several other articles and blog posts. He is a director and contributing editor of the Lawfare website, adjunct professor at the University of Washington Law School, and a University Afï¬liate at George- town University. He is a recipient of the National Intelligence Superior Service Medal, the Ofï¬ce of the Secretary of Defense Medal for Exceptional Public Service, the CIA Agency Seal Medal, the De- partment of Justice Edmund J. Randolph Award, and on two occasions the Attorney Generalâs Award for Exceptional Service. He is a 1988 graduate of Haverford College and a 1991 graduate of Har- vard Law School, and a former law clerk to Judge Stephen S. Trott of the U.S. Court of Appeals for the Ninth Circuit. Susan Landau is Bridge Professor in the Fletcher School of Law and Policy and the School of En- gineering, Department of Computer Science, Tufts University and visiting professor of Computer Science, University College London. Landau works at the intersection of cybersecurity, national secu- rity, law, and policy. Her latest book, Listening In: Cybersecurity in an Insecure Age, was published by Yale University Press in 2017. Landau is also the author of Surveillance or Security? The Risks Posed by New Wiretapping Technologies (MIT Press, 2011) and Privacy on the Line: the Politics of Wiretap- ping and Encryption, co-authored with Whitï¬eld Difï¬e (MIT Press, 1998). Landau has testiï¬ed to Congress and frequently briefed U.S. and European policymakers on encryption, surveillance, and cy- bersecurity issues. Landau has been a senior staff privacy analyst at Google, a distinguished engineer PRE-PUBLICATION COPYâSUBJECT TO FURTHER EDITORIAL CORRECTION
82 APPENDIX A. BIOGRAPHIES OF COMMITTEE AND STAFF at Sun Microsystems, and a faculty member at Worcester Polytechnic Institute, the University of Mas- sachusetts, and Wesleyan University. She has served on the National Academiesâ Computer Science and Telecommunications Board (2010-2016), the National Science Foundationâs Computer, Informa- tion Science & Engineering Advisory Committee (2010-2013), the Information Security and Privacy Advisory Board (2002-2008), as an associate editor-in-chief on IEEE Security and Privacy, section board member on the Communications of the ACM, and associate editor at the Notices of the American Mathematical Society. A 2015 inductee in the Cybersecurity Hall of Fame and a 2012 Guggenheim fel- low, Landau was a 2010-2011 fellow at the Radcliffe Institute for Advanced Study and the recipient of the 2008 Women of Vision Social Impact Award. She is also a fellow of the American Association for the Advancement of Science and of the Association for Computing Machinery. She received her BA from Princeton, her MS from Cornell, and her PhD from MIT. Steven B. Lipner (NAE) is executive director of SAFECode, a non-proï¬t organization dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. He retired in 2015 as partner director of software security in Trustworthy Computing at Microsoft Corporation. His expertise is in software security, software vulnerabilities, Internet security, and organization change for security. He is the founder and long-time leader of the Security Development Lifecycle (SDL) team that has delivered processes, tools and associated guidance and oversight that have signiï¬cantly improved the secu- rity of Microsofts software. Mr. Lipner has over 40 years of experience as a researcher, development manager, and general manager in IT security. He served as executive vice president and general man- ager for Network Security Products at Trusted Information Systems and has been responsible for the development of mathematical models of security and of a number of secure operating systems. Mr. Lipner was one of the initial 12 members of the U.S. Computer Systems Security and Privacy Advi- sory Board (now the Information Security and Privacy Advisory Board) and served two terms and a total of ten years on the board. He is the author of numerous professional papers and has spoken on security topics at many professional conferences. He is named as inventor on 12 U.S. patents in the ï¬elds of computer and network security and has served on numerous scientiï¬c boards and advisory committees, including as a current member of the National Academies of Sciences, Engineering, and Medicine Committee on Future Research Goals and Directions for Foundational Science in Cyberse- curity. Mr. Lipner was elected in 2015 to the National Cybersecurity Hall of Fame. He received an S.B. and S.M. in civil engineering from MIT. Richard Littlehale is Special Agent in Charge of the Tennessee Bureau of Investigationâs Technical Services Unit, and supervises TBIâs electronic surveillance, digital forensics, online child exploitation, and cyber investigation functions. He is an attorney, and serves as one of TBIâs constitutional law and criminal procedure trainers. He provides instruction to law enforcement ofï¬cers in techniques for obtaining and using communications evidence in support of criminal investigations, and is active in national groups of law enforcement technical and electronic surveillance specialists. He serves as a subject matter expert on electronic surveillance for the Association of State Criminal Investigative Agencies and the International Association of Chiefs of Police, and chairs ASCIAâs Technology and Digital Evidence Committee. He frequently represents the law enforcement communityâs interest in lawful access to communications evidence at the state and national level. He attended Bowdoin College and Vanderbilt Law School. Kate Martin is a senior fellow at the Center for American Progress where she works on issues at the intersection of national security, civil liberties, and human rights. The New York Times Taking PRE-PUBLICATION COPYâSUBJECT TO FURTHER EDITORIAL CORRECTION
APPENDIX A. BIOGRAPHIES OF COMMITTEE AND STAFF 83 Note blog described her as an expert on surveillance and detention, and a leading advocate for the rule of law in the so-called âwar on terror.â Before coming to American Progress, Martin served as director of the Center for National Security Studies for more than 20 years. She frequently testiï¬es before Congress on national security and civil liberties issues. She is also a frequent commentator in the national media and has written extensively on these issues for the past 25 years. At the Center for National Security Studies, Martin brought lawsuits that challenged government deprivations of civil liberties. She has taught national security law and served as general counsel to the National Se- curity Archive. Martin is a graduate of the University of Virginia School of Law and Pomona College. Before joining the public interest world, she served as a partner at the law ï¬rm of Nussbaum, Owen & Webster. Harvey Rishikof is co-chair of the American Bar Associationâs Cybersecurity Legal Task Force. He previously served as director, Ofï¬ce of Military Commissions / Convening Authority, U.S. Department of Defense and as a senior counsel in Crowell & Moringâs Privacy & Cybersecurity and Government Contracts groups in Washington, D.C., where his practice focused on national security, cybersecu- rity, government contracts, civil and military courts, terrorism, international law, civil liberties, and the U.S. Constitution. At the leading edge of many of the interactions between the legal community and the federal government and corporations, Rishikof is routinely called upon to represent the legal community at meetings and forums on national security, cybersecurity, and terrorism. Prior to join- ing Crowell & Moring, Harvey was most recently the dean of faculty, National War College at the Na- tional Defense University, Washington, D.C. He currently serves as an outside director to CBI, Baton Rouge, LA, chairing the companyâs Government Security Committee, CFIUS. Rishikof is also the chair of the American Bar Association Advisory Standing Committee on Law and National Security, co- chair with Judy Miller of the ABA National Taskforce on Cyber and the law, and a lifetime member of the American Law Institute and the Council on Foreign Relations. Over his career, Rishikof has been a member of Hale and Dorr and has held multiple positions in government focused on national and cyber security investigations. He most recently served as senior policy advisor to the National Coun- terintelligence Executive, the agency responsible for counterintelligence and insider threat manage- ment across the federal government. He has also served at the FBI as a legal counsel to the deputy director of the FBI focusing on national security and terrorism and served as liaison to the Ofï¬ce of the Attorney General at the Department of Justice. Prior to serving as dean, he was a professor of Na- tional Security Law at the National War College and dean of Roger Williams University School of Law. Until recently, Rishikof also had a joint appointment as professor of law at Drexel University teaching courses in national security and cyber law. Peter J. Weinberger has been a software engineer at Google Inc since 2003 working on software infrastructure. After a stint at the University of Michigan in Ann Arbor he moved to Bell Labs. At Bell Labs he worked on Unix and did research on various topics before moving into research manage- ment, ending up as Information Sciences Research Vice President. After AT&T and Lucent split he moved to Renaissance Technologies, a technical trading hedge fund, as head of technology. He has been on the Army Science Board, the National Academiesâ Computer Science and Telecommunica- tions Board, and participated in a number of National Academies studies, including one on electronic voting and one on bulk surveillance. From 2008 to 2016 he was a member of the Information Secu- rity and Privacy Advisory Board, the last two years as chair. He has a PhD in mathematics (number theory) from the University of California, Berkeley. PRE-PUBLICATION COPYâSUBJECT TO FURTHER EDITORIAL CORRECTION
PRE-PUBLICATION COPYâSUBJECT TO FURTHER EDITORIAL CORRECTION