C. Matthew Curtin, CISSP
Founder and CEO of Interhack is a Certified Information Systems Security Professional
. An Expert in Computers and Information Technology
, Mr. Curtin and his team at Interhack help attorneys and executives use data and computer technology in high-stakes situations.
Mr. Curtin's work has been at the cutting edge of the intersection of law and technology. The U.S. Court of Appeals for the First Circuit relied on Interhack's forensic computing practice and Mr. Curtin's expert opinion when it established standards for application of Federal wiretap statutes to Web technology, In re Pharmatrak Privacy Litigation
(see link above). Academic references to their work include the Stanford Law Review and university courses throughout the world.
Mr. Curtin maintains a regular academic appointment as a Senior Lecturer at The Ohio State University's Department of Computer Science and Engineering. He currently chairs the Recruitment subcommittee of the Business Advisory Network that advises the Ohio Department of Education's standards for technology education in secondary and postsecondary schools throughout the state.
C. Matthew Curtin's services are available for plaintiffs, defendants, and for the courts directly on technical matters.
Areas of Forensic Expertise
View Mr. Curtin's Consulting Profile
- Electronic Discovery
- Preservation and Forensic Analysis of Data
- Complex Analysis of Non-Standard Data Sets
- Data Breaches
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Matthew Curtin, Peter G. Neumann
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.