Anthony Reyes. Curriculum Vitae



Similar documents
WILLIAM OETTINGER PHONE (702)

JAMES R. SWAUGER Digital Forensic Examiner

CURRICULUM VITAE JAMES R. SWAUGER Digital Forensic Examiner

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

How To Be A Computer Forensics Examiner

Authority: State Trooper - Pennsylvania State Police United States Marshall Special Deputy

THOMAS WELCH, CISSP, CPP, CISA, CISM, CFI, CHS-III SUMMARY

EC-Council Ethical Hacking and Countermeasures

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Curriculum Vitae. Stephen C. Odenthal LPI EnCE Licensed Private Investigator Certified Computer Forensic Examiner

How To Get A Computer Hacking Program

S. Robert Radus, CPA CFE PI Curricula Vitae. Examination of plaintiff, respondent, and defendant books and records to determine:

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Terrance Maguire Chief Scientist. Digital Forensics Academy, LLC

Keith Barger MFS, MCSE, CCE

Executive Cyber Security Training. One Day Training Course

Industry Oriented Training and Capacity Building Program on Cyber Crimes, Ethical hacking, Cyber Security, Forensics and Cyber Laws

Director of Computer Forensic Services

Maryland Leaders Raise Concerns about Computer Forensic Shortages IN THIS ISSUE. School of Graduate and Professional Studies Issue:

Name of presentation Company name

Mitchell D. Kajzer B09 Flanner Hall Notre Dame, IN

WILLIAM M. MICHAELSON, C.P.A., C.F.E., M.A.E., D.A.B.F.A., C.F.F. CURRICULUM VITAE

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Certified Cyber Security Analyst VS-1160

Computer Forensics Preparation

Cyber Security Awareness Workshop

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

El Camino College Homeland Security Spring 2016 Courses

MARK J. ESKRIDGE, OWNER / INVESTIGATOR DIGITAL FORENSIC INVESTIGATIONS, INC. California Private Investigator license #26633

Bio Summary and CV. curriculum vitae of John C. Villines; Introduction; page 1 of 5 (rev Jan 2013)

ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York

U. S. Attorney Office Northern District of Texas March 2013

Jibran Ilyas DIRECTOR

INTEGRITY FORENSICS. Where the Evidence Tells the Truth. Marjorie E. Harris 2545 Bellwood Road Richmond, Virginia

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

New Hampshire Cyber Crime Initiative Overview Briefing. NH Assistant Attorney General Lucy H. Carrillo Internet Crimes Prosecutor

Network Engineering Technology

UNM Information Assurance Scholarship for Service (SFS) Program

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Roy D. Rector CFCE EnCE

CURRICULUM VITAE. Jason Jordaan: CFE, PMCSSA, ACE

Cyber Security, Cyber Crimes and Cyber Laws

Alvarez & Marsal Global Forensic and Dispute Services Asia Pacific Regional Meeting (APRM) Tokyo, Japan April 2015

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

Computer Hacking Forensic Investigator v8

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Services. Computer Forensic Investigations

Curriculum Vita. Gregg M. Stutchman Forensic Analyst & Expert Witness in Audio, Video & Image Forensics & Forensic Photography

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

ICT Barriers, High Tech Crime, and Police

Curriculum Vita. Gregg M. Stutchman Forensic Analyst & Expert Witness in Audio & Video Forensics Forensic Photography

Certification Programs

Professional Experience

How To Write A Crash Reconstruction

WRITTEN TESTIMONY BEFORE THE HEARING ON FEBRUARY 4, 2014 TESTIMONY OF JOHN MULLIGAN TARGET

LESLIE G. WISER, JR. CURRICULUM VITA. Education. Juris Doctor University of Pittsburgh School of Law, 1979 Pittsburgh, Pennsylvania

SECURITY CAREERS. Defining Jobs, Compensation, Qualifications. by Jerry Brennan and Steve Walker

The Massachusetts Strategic Plan for Cyber Crime

Digital War in e-business

IT Security Training. Why Security Certification? A Serious Business - Fear Drives the Demand High Demand Freedom to Make and Break Rules

Presentation Presented By FORENSIC INVESTIGATIVE TEAM

Gregg Gerber. Strategic Engagement, Emerging Markets

Certification Programs

Big 4 Information Security Forum

Into the cybersecurity breach

William F. Leo Forensic Identification Consultant Credentials

THE ALABAMA CHAPTER OF THE ASSOCIATION OF CERTIFIED FRAUD EXAMINERS AND THE UNIVERSITY OF BIRMINGHAM SCHOOL OF BUSINESS

Reynaldo Anzaldua EDUCATION. University of Texas Pan American, Edinburg, TX BBA Business Management 1994 Minor: Computer Information Systems/CIS

Defensible Strategy To. Cyber Incident Response

Kim Basinger RN, CA-CP SANE, SANE-A, SANE-P, CFN, CFC, DABFN, DABLEE, FACFEI

Minnesota State Community and Technical College Detroit Lakes Campus

Defending Against Data Beaches: Internal Controls for Cybersecurity

PREPARE YOUR INCIDENT RESPONSE TEAM

Global Security Program Overview

Case 9:14-cr KAM Document 135 Entered on FLSD Docket 07/27/2015 Page 1 of 2 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF FLORIDA

Transcription:

Anthony Reyes Curriculum Vitae 44 Wall Street 12th Floor Telephone/Message: New York, N.Y. 10005 212-461-2160 Profile Internationally recognized practitioner, trainer, and lecturer in the area of computer crimes, fraud, and highly technical investigations. Topics include cyber crimes and fraud investigations, intellectual property theft, computer forensics, network forensics, electronic discovery, cyber terrorism, network security, data encryption, steganography, and malware detection. Practical Experience The ARC Group Chief Executive Officer (1998- Present) The ARC Group is an international security, computer consulting, and private investigation company with offices in New York and Brazil. ARC specializes in the investigation of highly technical crimes and complicated schemes to defraud. Its primary business is the implementation of computer and network security countermeasures, the investigation and detection of fraud, intellectual property theft, and computer related crimes. Consultant services for detecting computer and network security breaches are also preformed. Additional services include fraud prevention, computer forensics, litigation support, electronic discovery, investigations unit development, and risk assessments. The ARC Group provides consulting services for many fortune 100 companies, and government agencies globally. ARC also provides training and consultant services through its sister company (ARC Computer Technologies) for the following institutions; the US Department of Homeland Security, The University of Tennessee s Law Enforcement Innovation Center, Wetstone Technology, AccessData, Technology Pathways, Forensic Matter, and the Internet Parole and Probation Corporation. ARC performs consulting services in the United States, Latin America, Asia, and Europe. New York City Police Department- Detective Investigator (1990-2006) As a Detective I was assigned to the Computer Crimes Squad of the NYPD, where I investigated computer intrusions, fraud, identity theft, intellectual property theft, child exploitation, and software piracy. I also lectured, trained, and provided technical assistance in the area of computer crimes and computer forensics for federal, state, and local law enforcement agencies. Academic and Teaching Positions AccessData Corporation- Instructor (2003- Present) Instruct and lecture extensively in the area of computer forensics. Courses taught on behalf of AccessData include basic and advanced computer forensics classes. Additional consultant

services provided to AccessData include software testing and development, curriculum review, and assistance in the development of their certification program. Technologies Pathways- Instructor (2003- Present) Instruct and lecture extensively in the area of computer forensics. Courses taught on behalf of Technologies Pathways include the ProDiscover Certification Course. Additional consultant services provided to Technologies Pathways include software testing and development, curriculum review, and assistance in the development of their certification program. Wetstone Technologies- Consultant/Instructor (2004-Present) Curriculum Advisor for Wetstone s LiveWire Computer Forensics Course. Provide instruction in the area of Steganography, and Malware detection on their behalf. Other consultant services provided to Wetstone Technologies include software testing and development, and research assistance in the area of electronic investigations. The Department of Homeland Security- Consultant/Instructor (2004-2007) Instructor at the Federal Law Enforcement Training Center in Glynco, Georgia. Assisted in the development of the Cyber Terrorism Course and taught the investigations aspect of this course. Responsible for training members of State, Local, and Federal law enforcement in the area of high tech crimes investigations. The participating officers then utilized the techniques learned in their efforts to protect our nation from terrorists. Polytechnic University-Adjunct Professor (2006-2007) Graduate lecturer in computer forensics. Pace University-Adjunct Professor (2005-2007) Responsibilities include teaching the introduction to computer science course and the introduction to computer forensic course. Chief Advisor to the curriculum development board for a Computer Forensics curriculum. Courses Taught Computer Investigations Fraud investigations Email Tracing Protecting children online Introduction to cyber crime Criminal Investigations Fraud Identity Theft Intellectual Property Theft Insider Threats Risk Analysis Computer Forensics Data Recovery & Computer Forensic Methodology

Reconstruction of Internet History Data Encryption Cracking Techniques Intrusion Detection Hacking Techniques Malware Discovery Security Log Analyst Network Forensics Network Acquisitions Anomaly Detection Network Wiretaps Network Design & Implementation Network Security Intrusion Detection Systems InfoSec Vulnerability Discovery Computer Repairs & Other Programs A+ certification Microsoft Office Education Graduate Certificate (2004-2005) John Jay College of Criminal Justice, New York Police Leadership Certification Bachelor of Science in Criminal Justice (1989) John Jay College of Criminal Justice, New York Major Criminal Justice Minored in Sociology Professional Qualifications AccessData s FTK 2.0 Intermediate Computer Forensics Course (2008) Certified Systems Investigator Course (2007) Nuix s File Base Investigations Course (2007) Guidance s Encase Network Intrusion Investigations Phase I Course (2007) NSA Information Security Assessment Methodology Certification Course (2006) ProDiscover Certification Course (2006) LEIC Facilitator Development Workshop (2006) AccessData s Applied Decryption Course (2005) Dell s Implementing Enterprise Storage Solutions Course (2005) ASR Data s Smart Intermediate Computer Forensics Course (2005) Wetstone s LiveWire Investigator Certification Course (2005) AccessData s Advanced Internet Forensics Course (2004) Wetstone s Steganography Investigator Certification Course (2004) Guidance s Encase Intermediate Computer Forensic Course (2004) AccessData s Intermediate Computer Forensics Course (2003)

AccessData s Advanced Microsoft Windows Forensics Course (2003) The Search Investigation of Online Crimes Course (2003) The Foundstone Ultimate Hacking Course (2003) The Department of Homeland Security s Internet Forensics Investigations Course (2003) The SANS Institute Advanced Incident Handling and Hacker Exploits Course (2003) The SANS Institute Intrusion Detection In-Depth Course (2002) The National White Collar Crime s Advanced Data Recovery Course (2002) The Rockland County Sheriff s Advanced Computer Investigations Course (2002) IDT Network Investigations and Unix Course (2002) The National White Collar Crime s Basic Data Recovery Course (2001) Microsoft Certified System Engineer Course (2000) OEM Systems Builder Pre-installation of NT 4.0 Course (1999) Installation and Configuring Windows NT Server 4.0 Course (1999) A+ PC Technician Training (1998) Certifications A+ PC Technician AccessData Certified Instructor AccessData Certified Examiner University of Tennessee Certified Facilitator NSA Certification Information Security Assessment Methodology Wetstone Steganography Investigator Wetsone LiveWire Examiner Prodiscover Certified Examiner Professional Affiliations & Memberships The High Technology Crime Investigators Association (HTCIA) The New York State Electronic Crimes Task Force (ECTF) The New York State Internet Crimes Against Children Task Force (ICAC) The National Institute of Justice s Electronic Crime Partner Initiative (ECPI) International Association of Computer Investigative Specialists (IACIS) The New York Metro Infragard The Association of Certified Fraud Examiners (ACFE) The American Society for Industrial Security (ASIS) The Information Systems Audit and Control Association (ISACA) The Information Systems Security Association (ISSA) The Order of Lawyers for Brazil s, Sao Paulo Section (OAB SP) Significant Accomplishments Consulting Member to the Director of The Commission of Information Society, of the Order of Lawyers for Brazil s, Sao Paulo Section (2008) Certified System Investigator s (CSI) Association Co-Chairman (2008)

President of the High Technology Crime Investigation Association s (HTCIA) International Executives Committee (2007) Member of the editorial board for The International Journal of Forensic Computer Science (IJoFCS), published by the Brazilian Federal Police (2006) Developed an Advanced Online Investigator s Data Preservation Course which debut at the 2006 International Association of Computer Investigative Specialists (IACIS) Conference Member of the editorial board for the Journal of Digital Forensic Practice, published by Taylor & Francis (2006) 1st Vice President of the HTCIA International Executives Committee (2006) Participated in curriculum and development review of the Computer Crime Investigation Course, for the University of Tennessee s Law Enforcement Innovation Center (2006) Training and Education Working Group Chairman for The National Institute of Justice s Electronic Crime Partner Initiative (2006-Present) Participated in the review and revision of The National Institute of Justice Guide, Electronic Crime Scene Investigation: A Guide for First Responders 2nd Edition (2005) Acting Director and Planer for the 2005 HTCIA Northeast Regional Conference Northeast Chapter President of HTCIA (2005) Recipient of the High Technology Crimes Investigation Association s Case of the Year Award (2004) Participated in the Law Enforcement Cyber Attack Technology Gap Analysis Prioritization Working Group for the Institute for Security Technology Studies at Dartmouth College (2003) Participated in the SANS Institute Interfacing with Law Enforcement FAQ for Incident Handlers and Other Information Security Professionals Project (2003) Served as an alternate member of New York Governor George E. Pataki's Cyber-Security Task Force (2002) Publications Contributing Author for the book titled The Best Damn Cybercrime and Digital Forensics Book Period (2007, Syngress Publishing) Author and Technical Editor for the book titled Cyber Crime Investigations: Bridging the Gaps between Security Professionals, Law Enforcement, and Prosecutors (2007, Syngress Publishing)

Forward contributor on the book titled How to Own an Identity (2005, Syngress Publishing) Selected Publications & Presentations & Events Attended the 13th Annual Congressional Breakfast for The National Center for Missing and Exploited Children s (NCMEC), Washington, DC (2008). Presented at the 2008 Army Counter Intelligence Conference, Reston, Virginia. Presentation topic: Network Forensics Interviewed and Quoted in The Washington Post, article titled Online Banking: Do You Know Your Rights? (4/10/2008) Presented at the 2007 HTCIA Asia Pacific Chapter Conference, Hong Kong, China. Presentation topic: Network Forensics Presented at the 2007 CSI World Conference, Kuala Lumpur, Malaysia. Presentation topic: Fighting Crime Internationally Interviewed and Quoted in American Airline s Americanway Magazine article titled I Spy; Corporate espionage has the business world shaken, not stirred. (November 2007) Presented at Techno Forensics 2007, Gaithersburg, Maryland. Presentation topic: The Beginning of the End - The Forensics Practice Collision Course Presented at The 2007 European Network Forensic and Security Conference. Heerlen Netherlands. Presentation topic: Fighting Crime Internationally Presented at The IV Conferencia Internacional de Pericias em Crimes Ciberneticos, 2007. Sao Paulo, Brazil. Presentation topic: The Future of Forensics Presented at the High Technology Crimes Investigation Association International Conference, 2007. California. Presentation topic: Enterprises Email Investigations and Data Correlation. Presented at the 2007 Infosecurity Conference East and Exhibition, New York, NY. Presentation topic: IT Security, Protecting Our Nation: Whose job is it anyway? Presented at the 2007 China International Conference on Gaming and Intellectual Property Theft, Shanghai, China. Presentation topic: Combating International Property Theft. Presented at the 2007 China International Digital Forensics Technology Forum, Beijing China. Presentation topic: International Exchange of Criminal Investigation Information. Presented at the New York State Bar Association s Information and Technology Law Committee Spring Meeting, 2007. New York, NY. Presentation topic: on Metadata titled Hidden Data: Its Dangers and Traps for the Unwary

Appeared on CNN s Pipeline on Demand (2007) Appeared on WTBQ Radio Station, The Self-Defense for Life Show (2007) Presented at the ICCYBER 2006 III Conferencia Internacional de Pericias em Crimes Ciberneticos, 2006. Brazil. Presentation topic: Computer Forensics in the USA Presented at the High Technology Crimes Investigation Association International Conference, 2006. Ohio. Presentation topic: The Future of Forensics Presented at The U.S. Department of Justice (DOJ) National Institute of Justice (NIJ), in association with CTC, Inc.-Public Safety Technology Center (CTC), 8th Annual Technologies for Critical Incident Preparedness Conference and Exposition, 2006. Atlanta. Presentation topic: Cyber Terrorism. Presented at the Conferencia Internacional Situación Actual del Fraude Informático en América Una Perspectiva Forense, 2006, Bogota, Colombia. Presentation Topic: Combatiendo el Delito Informático y Cooperación Inter-Agencias Presented at the Congreso Internacional La Cibercriminalidad Hoy for the Procuraduría General de la República (PGR), 2006, Mexico City. Presentation topic: Bridging the International Gaps in the Fight Against Cyber Crime. Interviewed and Quoted in Popular Mechanics Magazine, article titled Who s Stealing your Identity? (February 2006 Issue) Presented at Infosecurity 2005, New York City, Presentation topic: Wireless and Mobile Security. Quoted in the CSOonline.com article titled Cops and Crooks Find New Uses for Mobile Phones (2005, http://www2.csoonline.com) Presented at the International Security Conference 2005, Las Vegas, Presentation topic: Bridging the Gaps Between the Public and Private Sector. Presented at the South Carolina Secret Service ECTF Quarterly meeting 2005, Presentation topic: Bridging the Gaps Between the Public and Private Sector. Featured in the Government Computer News for the article titled The Invisible War on Terrorism (2005, http://appserv.gcn.com/24_11/news/35787-1.html). Served as a discussant, on a panel for Research and Development Directions for Cyber Attacks Investigative Technologies, at the 2003 National Institute of Justice Annual Conference on Criminal Justice Research and Evaluation. Quoted extensively in the GovExec.com article titled Security officials discuss efforts to combat computer crime (2003,http://www.govexec.com/dailyfed/0703/072803td2.htm). News worthy arrested published in the New York Post (2002, http://www.museum-security.org/02/057.html)

News worthy arrest published in the Times News Weekly Internet Paper for fraud (2001, http://timesnewsweekly.com/oldsite/080901/newfiles/chargedfour.html).