Almeida Camargo Advogados
Faça do Almeida Camargo a sua home page  

Menu
Home
Institucional
Estudos Jurídicos
Código do Consumidor
Cooperativismo e Terceiro Setor
Ciber Crimes
Direito da Sociedade da Informação
Econômico e Concorrêncial
Energia Usina Antiga do Itapeva
Eventos
Informática e os Tribunais
Inf. e Melhoria do Poder Judiciário
Nota Fiscal Eletrônica
Notícias
OAB
Opinião e Notícia
Pareceres
Second Life
SPED-Sist. Público de Escrit. Digital
Tributário
Links Úteis
Fale Conosco

Empresas
Centro de Estudos Jurídicos

Bd4u

Veja Introdução

Enquete
 
Você acredita que a adoção de maiores controles do Fisco através da NF-e poderia evitar situações de sonegação Fiscal?
Dê sua opinião ou envie mensagem:
suaopiniao@almeidacamargo.com.br
  Sim
  Não
 

Login
  Login: 
  Senha:    
Previsão do tempo para região Sudeste
 
::. Anthony Reyes .::

44 Wall Street 12th Floor

Telephone/Message:
New York, N.Y. 10005 212-461-2160

Profile

Internationally recognized trainer, lecturer, and practitioner in the area of computer related investigations. Topics include cyber crimes investigations, computer forensics, network forensics, cyber terrorism, network security, data encryption, Steganography, and malware detection.

Teaching Experience

The Department of Homeland Security- Consultant/Instructor (2004-Present)
• Instructor at the Federal Law Enforcement Training Center in Glynco, Georgia. Assisted in the development of the Cyber Terrorism Course, and teach the investigations aspect of this course. Responsible for training members of State, Local, and Federal law enforcement in the area of high tech crimes investigations. These officers then utilize the techniques learned in their efforts to protect our nation from terrorist.

Wetstone Technologies- Consultant/Instructor (2004-Present)
• Curriculum advisor for Wetstone’s LiveWire Computer Forensics Course. Provide instruction in the area of Steganography, and Malware detection on their behalf. Other consultant services provided to Wetstone Technologies include software testing and development, and research assistance in the area of electronic investigations.

AccessData Corporation- Instructor (2003- Present)
• Instruct and lecture extensively in the area of computer forensics. Courses taught on behalf of AccessData include, basic and advanced computer forensics classes. Additional consultant services provided to AccessData include software testing and development, curriculum review, and assistance in the development of their certification program.

Pace University-Adjunct Professor (2005-2007)
• Responsibilities include teaching the introduction to computer science course, and the introduction to computer forensic course. Chief Advisor to the curriculum development board for the newly added Computer Forensic curriculum. The board is presently in the development and planning phase for the new Forensic Computer Degree Program.

Courses Taught

Computer Investigations
• Fraud investigations
• Email Tracing
• Protecting children online
• Introduction to cyber crime

Criminal Investigations
• Fraud
• Identity Theft
• Intellectual Property Theft
• Insider Threats

Computer Forensics
• Data Recovery & Computer Forensic Methodology
• Reconstruction of Internet History
• Data Encryption Cracking Techniques

Intrusion Detection
• Hacking Techniques
• Malware Discovery
• Security Log Analyst

Network Forensics
• Network Acquisitions
• Anomaly Detection
• Network Wiretaps

Network Design & Implementation
• Network Security
• Intrusion Detection Systems
• InfoSec Vulnerability Discovery

Computer Repairs & Other Programs
• A+ certification
• Microsoft Office

Practical Experience

ARC Enterprises of New York, Inc. – Chief Executive Officer (1998- Present)
• Arc Enterprises of New York, Inc. is a computer and network security consultant company. Its primary business is the implementation of security measures in the IT environment. Consultant services for detecting computer and network security breaches are also preformed. Additional services include computer forensics, and litigation support. ARC also provides training and consultant services for the following companies, or agencies; the Department of Homeland Security, The University of Tennessee’s Law Enforcement Innovation Center, Wetstone Technology, AccessData, Technology Pathways, and the Internet Parole and Probation Corporation. Arc Enterprises conducts consulting services for private companies and government agencies within the United States, Latin America, and Europe.

New York City Police Department- Retired Detective Investigator (1990-2006)
• As a Detective I was assigned to the Computer Crimes Squad of the NYPD, where I investigate computer intrusions, fraud, identity theft, intellectual property theft, child exploitation, and software piracy. I also lectured, trained, and provided technical assistance in the area of computer crimes and computer forensics for federal, state, and local law enforcement agencies.

Education

Graduate Course Work (Present)
Pace University, New York
• Presently pursuing a Masters in Information Technology

Graduate Certificate (2004-2005)
John Jay College of Criminal Justice, New York
• Police Leadership Certification

Bachelor of Science in Criminal Justice (1989)
John Jay College of Criminal Justice, New York
• Major Criminal Justice
• Minored in Sociology

Additional Education

  • NSA Information Security Assessment Methodology Certification Course (2006)
  • ProDiscover Certification Course (2006)
  • AccessData’s Applied Decryption Course (2005)
  • Dell’s Implementing Enterprise Storage Solutions Course (2005)
  • ASR Data’s Smart Intermediate Computer Forensics Course (2005)
  • Wetstone’s LiveWire Investigator Certification Course (2005)
  • AccessData’s Advanced Internet Forensics Course (2004)
  • Wetstone’s Steganography Investigator Certification Course (2004)
  • Guidance’s Encase Intermediate Computer Forensic Course (2004)
  • AccessData’s Intermediate Computer Forensics Course (2003)
  • AccessData’s Advanced Microsoft Windows Forensics Course (2003)
  • The Search Investigation of Online Crimes Course (2003)
  • The Foundstone Ultimate Hacking Course (2003)
  • The Department of Homeland Security’s Internet Forensics Investigations Course (2003)
  • The SANS Institute Advanced Incident Handling and Hacker Exploits Course (2003)
  • The SANS Institute Intrusion Detection In-Depth Course (2002)
  • The National White Collar Crime’s Advanced Data Recovery Course (2002)
  • The Rockland County Sheriff’s Advanced Computer Investigations Course (2002)
  • IDT Network Investigations and Unix Course (2002)
  • The National White Collar Crime’s Basic Data Recovery Course (2001)
  • Microsoft Certified System Engineer Course (2000)
  • OEM Systems Builder Pre-installation of NT 4.0 Course (1999)
  • Installation and Configuring Windows NT Server 4.0 Course (1999)
  • A+ PC Technician Training (1998)


Affiliations & Memberships

• The High Technology Crime Investigators Association (HTCIA)
• The New York State Electronic Crimes Task Force (ECTF)
• The New York State Internet Crimes Against Children Task Force (ICAC)
• The National Institute of Justice’s Electronic Crime Partner Initiative (ECPI)
• International Association of Computer Investigative Specialists (IACIS)
• The New York Metro Infragard

Significant Accomplishments

• Member of the editorial board for The International Journal of Forensic Computer Science (IJoFCS), published by the Brazilian Federal Police (2006)

• Developed an Advanced Online Investigator’s Data Preservation Course which debut at the 2006 International Association of Computer Investigative Specialists Conference

• Member of the editorial board for the Journal of Digital Forensic Practice, published by Taylor & Francis (2006)

• 1st Vice President of the HTCIA International Executives Committee (2006)

• Participated in curriculum and development review of the Computer Crime Investigation Course, for the University of Tennessee’s Law Enforcement Innovation Center (2006)

• Training and Education Working Group Chairman for The National Institute of Justice’s Electronic Crime Partner Initiative (2006)

• Participated in the review and revision of The National Institute of Justice Guide, “Electronic Crime Scene Investigation: A Guide for First Responders” (2005)

• Acting Director and Planer for the 2005 HTCIA Northeast Regional Conference

• Northeast Chapter President of HTCIA (2005)

• Recipient of the High Technology Crimes Investigation Association’s Case of the Year Award (2004)

• Participated in the Law Enforcement Cyber Attack Technology Gap Analysis
Prioritization Working Group for the Institute for Security Technology Studies at Dartmouth College (2003)

• Participated in the SANS Institute Interfacing with Law Enforcement FAQ for Incident Handlers and Other Information Security Professionals Project (2003)

• Sat as an alternate member of New York Governor George E. Pataki's Cyber-Security Task Force (2002)

Selected Publications & Presentations

• Presented at the ICCYBER 2006 III Conferencia Internacional de Pericias em Crimes Ciberneticos, 2006. Brazil. Presentation topic “Computer Forensics in the USA”

• Presented at the High Technology Crimes Investigation Association International Conference, 2006. Ohio. Presentation topic “The Future of Forensics”

• Presented at The U.S. Department of Justice (DOJ) National Institute of Justice (NIJ), in association with CTC, Inc.-Public Safety Technology Center (CTC), 8th Annual Technologies for Critical Incident Preparedness Conference and Exposition, 2006. Atlanta. Presentation topic “Cyber Terrorism.”

• Conferencia Internacional Situación Actual del Fraude Informático en América Una Perspectiva Forense, 2006, Bogota, Colombia. Presentation Topic “Combatiendo el Delito Informático y Cooperación Inter-Agencias”

• Presented at the Congreso Internacional “La Cibercriminalidad Hoy” for the Procuraduría General de la República (PGR), 2006, Mexico City. Presentation topic “Bridging the International Gaps in the Fight Against Cyber Crime.”

• Interviewed and Quoted in Popular Mechanics Magazine, article titled “Who’s Stealing your Identity”? (February 2006 Issue)

• Forward contributor on the book titled “How to Own an Identity” (2005, Syngress Publishing)

• Presented at Infosecurity 2005, New York City, Presentation topic “Wireless and Mobile Security.”

• Quoted in the CSOonline.com article titled “Cops and Crooks Find New Uses for Mobile Phones” (2005, http://www2.csoonline.com)

• Presented at the International Security Conference 2005, Las Vegas, Presentation topic “Bridging the Gaps Between the Public and Private Sector.”

• Presented at the South Carolina Secret Service ECTF Quarterly meeting 2005, Presentation topic “Bridging the Gaps Between the Public and Private Sector.”

• Featured in the Government Computer News for the article titled “The Invisible War on Terrorism” (2005, http://appserv.gcn.com/24_11/news/35787-1.html).

• Served as a discussant, on a panel for Research and Development Directions for Cyber Attacks Investigative Technologies, at the 2003 National Institute of Justice Annual Conference on Criminal Justice Research and Evaluation.

• Quoted extensively in the GovExec.com article titled “Security officials discuss efforts to combat computer crime” (2003,http://www.govexec.com/dailyfed/0703/072803td2.htm).

• News worthy arrested published in the New York Post
(2002, http://www.museum-security.org/02/057.html)


• News worthy arrest published in the Times News Weekly Internet Paper
(2001, http://timesnewsweekly.com/OldSite/080901/NewFiles/CHARGEDFOUR.html).


"O essencial não é fazer muita coisa no menor prazo;
é fazer muita coisa aprazível ou útil."
Machado de Assis 
Copyright Fox Informática                                                       Home | Institucional | Fale Conosco | Profissionais | Artigos | China | Links