-
Notifications
You must be signed in to change notification settings - Fork 0
/
index.html
398 lines (364 loc) · 19 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1">
<META NAME="Title" CONTENT="Steven Walker-Roberts">
<meta name="keywords" content="
steven
walker
roberts
walker-roberts
law
sexual
computer
public
appeal
violence
domestic
criminal
sentence
work
child
s
offences
legal
evidence
unduly
lenient
am
trust
roberts
inquiry
walker
victims
able
under
then
case
inquiries
cases
committee
act
not
model
children
person
sentencing
affairs
working
guidelines
home
select
developed
contact
abuse
court
all
serious
representation
experience
will
advice
justice
family
provide
cardinal
commons
" />
<META NAME="Description" CONTENT="Steven Walker-Roberts is a forward-thinking computer scientist and a formidable academic lawyer at the forefront of cybersecurity and zero trust.">
<META NAME="Subject" CONTENT="Law and Computer Science">
<META NAME="Language" CONTENT="English (UK)">
<META NAME="Robots" CONTENT="INDEX,FOLLOW">
<title>Steven Walker-Roberts - Academic Lawyer and Computer Scientist</title>
<!-- Bootstrap -->
<link href="css/bootstrap.min.css" rel="stylesheet">
<!-- HTML5 shim and Respond.js for IE8 support of HTML5 elements and media queries -->
<!-- WARNING: Respond.js doesn't work if you view the page via file:// -->
<!--[if lt IE 9]>
<script src="https://oss.maxcdn.com/html5shiv/3.7.2/html5shiv.min.js"></script>
<script src="https://oss.maxcdn.com/respond/1.4.2/respond.min.js"></script>
<![endif]-->
</head>
<body>
<!-- contact page -->
<div class="row">
<div class="container-fluid minfull intro">
<div class="col-md-8 minfull prelim">
<nav class="navbar navbar-default">
<div class="container-fluid fix">
<div class="navbar-header">
<button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#mainnav" id="navbutton"><span class="sr-only">Toggle navigation</span><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span>
</button>
<h4 class="visible-xs hidden" id="xsbrand"><b>Steven Walker-Roberts</b></h4>
</div>
<!-- Collect the nav links, forms, and other content for toggling -->
<div class="collapse navbar-collapse" id="mainnav">
<!-- Brand-->
<a class="navbar-brand navbar-nav visible-md visible-lg hidden" id="name" href="#">Steven Walker-Roberts</a>
<ul class="nav navbar-nav">
<li>
<a href="#About">About</a>
</li>
<li>
<a href="#ScientificWork">Scientific Work</a>
</li>
<li>
<a href="#LegalWork">Legal Work</a>
</li>
<li>
<a href="#Publications">Publications</a>
</li>
<li>
<a href="#ProBono">Pro Bono</a>
</li>
<li>
<a href="#Contact">Contact</a>
</li>
</ul>
</div>
<!-- /.navbar-collapse -->
</div>
<!-- /.container-fluid -->
</nav>
<div>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<p class="center name">
Steven Walker-Roberts
<i class="credentials"><br>
Academic Lawyer, Computer Scientist, Teacher, Writer
</i>
</p>
</div>
</div>
<div class="col-md-4">
</div>
</div>
<!-- andrew norfolk quote -->
<div class="container-fluid blackquote">
<div class="col-md-12">
<blockquote class="blockquote blockquote-reverse">
<p class="mb-0 center">Steven will bring a fierce intelligence, a strong work ethic, significant IT skills, a steely will
<br>to succeed and a refusal to be cowed by seemingly insurmountable obstacles.</p>
<footer class="blockquote-footer center">Andrew Norfolk, <cite title="Source Title">The Times</cite>
</footer>
</blockquote>
</div>
</div>
<!-- about -->
<div class="container-fluid spaceout about" id="About">
<div class="col-md-12">
<h3 class="center">About Steven</h3>
<p class="center">
Steven has been able to program since the age of 8 when he learned to disassemble Playstation One games in order to alter game functions (without realising it until he studied computer science). He learned to build his first computer at the same age, and shortly after learned basic electronics. Over his teenage years, he refined and honed these skills. When Steven left school, he accepted private client work and developed fullstack applications for local businesses. He continued to do this until he studied law, when he became active in public policy work arising out of personal sentiment to critical public policy issues. From here, he developed a keen interest in criminal and public law. He furthered this when he studied computer science, later leading to an Honorary Research Fellowship and a Lectureship. That insight into the law and his passion for computer science is what acted as a springboard for his specialism in cybersecurity and secure software development.
</p>
</div>
</div>
<!-- turing quote -->
<div class="container-fluid blackquote">
<div class="col-md-12">
<blockquote class="blockquote blockquote-reverse">
<p class="mb-0 center">A computer would deserve to be called intelligent if it could deceive a human into believing that it was human.</p>
<footer class="blockquote-footer center">Alan Turing, <cite title="Source Title">OBE FRS</cite>
</footer>
</blockquote>
</div>
</div>
<!-- scientific work -->
<div class="container-fluid red nhscyber" id="ScientificWork">
<div class="col-md-6">
<h3>Scientific Work</h3>
<p>
Steven is an experienced fullstack secure software developer and DevOps engineer, with years of commercial experience. His work in computer science centres around "zero trust". His research focuses on a theory he devised known as the "cardinal trust" model. This model asks the fundamental question of whether it is possible to have a functioning computer system in which no aspect of the underlying infrastructure, the data or the users of the computer system are trusted. The motivation for this theoretical undertaking was the serious security breaches which have recently occurred such as WannaCry in the NHS, the OPM security breach, the Equifax breach, PRISM and many more security breaches that ask questions at the core of modern society's reliance on computer technology.
</p>
<p>
He is a lecturer at the Manchester Metropolitan University teaching cybersecurity, computer science and technology law as it relates to computer science. His research activities are continued as part of an Honorary Research Fellowship in which he contributes significantly to the state of the art in cybersecurity, publishing in major academic journals, books and conferences as part of his contribution to academia.
</p>
</div>
<div class="col-md-6">
<br>
<h4>Key Achievements</h4>
<ol>
<li>Steven continues to work in the industry as DevOps Engineer in employment and as a Fullstack Developer accepting private client work for major international clients and high value national projects. He also provides expert advise, translating best practice from computer science to other industries.<br><br></li>
<li>Developed the state of the art significantly as it relates to zero trust security, unprivileged and trustless computing. He presently investigates ways of improving industrial practice to allow for guaranteed security and distributed computing applications which work effectively every time.<br><br></li>
<li>Created the Atlas.io PAAS software which implements the trustless model on a mass scale. It allows developers to launch payloads without having to be concerned with the security of the underlying platform. Amateur developers and non-programmers are able to use it to acheive security by default which prevents wider consequential security risks.<br><br></li>
<li>Contributes significantly to the opensource community, particularly in encouraging the uptake of cybersecurity best practices, secure software development and effective DevOps implementations which respect agile requirements whilst maintaining an appropriate level of security that protects not just that user, but the wider internet community.<br><br><br><br></li>
</ol>
</div>
</div>
<!-- denning quote -->
<div class="container-fluid blackquote">
<div class="col-md-12">
<blockquote class="blockquote blockquote-reverse">
<p class="mb-0 center">The poorest man may in his cottage bid defiance to all the forces of the Crown. It may be frail—its roof may shake—the wind may blow through it—the storm may enter—the rain may enter—but the King of England cannot enter—all his force dare not cross
the threshold of the ruined tenement. So be it—unless he has justification by law.</p>
<footer class="blockquote-footer center">Lord Denning in Southam v Smout [1964] 1 QB 308 at 320, <cite title="Source Title">Lord Justice of Appeal & Master of the Rolls</cite>
</footer>
</blockquote>
</div>
</div>
<!-- legal work -->
<div class="container-fluid spaceout legal" id="LegalWork">
<div class="col-md-6">
<h3>Legal Work</h3>
<p>
Steven presently provides the government with advice on law reform related to technology law, national security as it relates to cybersecurity and children's safety on the internet. Most recently, he advised the Joint Committee on National Security Strategy in relation to its wide-ranging review of cybersecurity of critical national infrastructure. He also advised Parliament in relation to the present national security capability of the United Kingdom in responding to cybersecurity threats. He continues to be involved in legal reform relating to data privacy, the protection of children in cyberspace and best practices flowing from computer science academia into legislation.
</p>
<p>
He has contributed significantly to the state of the law, particularly in regards to the legislation concerning child sexual offences. He has experience of public, criminal and family law. During the sequence of public inquiries related to sexual grooming in the United Kingdom, Steven coordinated evidence in key public inquiries and led a private inquiry into the performance of public bodies. He is also regularly involved in unduly lenient sentence referrals under s.36 Criminal Justice Act
1988 as regards the correctness and scope of judicial power in passing sentence.
</p>
<p>
Steven has significant experience of teaching law to professional lawyers and law students in both practice environments and university environments. His teaching efforts are supplemented heavily by his contributions to the law.
</p>
</div>
<div class="col-md-6">
<br>
<h4>Contributions to the Law</h4>
<ol>
<li>
Presently advising Her Majesty's Government in relation to the United Kingdom's Internet Safety Strategy. (Present).<br><br>
</li>
<li>
Advised the Joint Committee on National Security Strategy in relation to the United Kingdom's national security capability in the cyber sphere (2018).<br><br>
</li>
<li>
Advised the Joint Committee on National Security Strategy as to the Cybersecurity of Critical National infrastructure following recent security breaches (2018).<br><br>
</li>
<li>
Drafted sections of the Serious Crime Bill 2014-15 [HL] during the committee stage to extend protection of children from sexual abuse (2015).<br><br>
</li>
<li>
Drafted the new s.5 and s.9 sentencing guidelines in the new Definitive Guidelines on the Sentencing of Sexual Offences. These are now domestic criminal law in England and Wales during all sentencing exercises. (2014)<br><br>
</li>
<li>Provided evidence to the Children's Commissioner's CSEGG Inquiry, contributing to the new draft of the "Working Together to Safeguard Children" statutory guidance. (2013)<br><br></li>
<li>Coordinated the evidence of circa 800 victims of sexual offences to the Home Affairs Select Committee of the House of Commons. (2012)<br><br></li>
</ol>
</div>
</div>
<!-- michael meacher quote -->
<div class="container-fluid blackquote">
<div class="col-md-12">
<blockquote class="blockquote blockquote-reverse">
<p class="mb-0 center">He is a dilligent and keen worker; he is used to regularly giving evidence to Parliamentary inquiries.</p>
<footer class="blockquote-footer center">Rt. Hon. Michael Meacher MP, <cite title="Source Title">House of Commons</cite>
</footer>
</blockquote>
</div>
</div>
<!-- publications -->
<div class="container-fluid red publications" id="Publications">
<div class="col-md-12">
<h3>Publications</h3>
<ol>
<li>Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications <i>in</i> Parkinson et al: Guide to Vulnerability Analysis for Computer Networks and Systems <i>Springer</i> (2018) <br><br></li>
<li>A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure <i>IEEE Access</i> (2018) <br><br></li>
<li>Joint Committee on National Security Strategy - Inquiry into Cybersecurity and Critical National Infrastructure: Written Submissions for Manchester Metropolitan University [CNI0001] <i>House of Commons Library</i> (2018) <br><br></li>
<li>Joint Committee on National Security Strategy - National Security Capability Review: Written Submissions for Manchester Metropolitan University [CSE0005] <i>House of Commons Library</i> (2018) <br><br></li>
<li>Security Focused Distributed Platforms for the Internet of Things: A Novel & Fundamental Theory of Zero Trust <i>Manchester Metropolitan University</i> (2017) <br><br></li>
<li>Serious Crime Bill 2014-15 [HL]<br><br></li>
<li>Definitive Guidelines on the Sentencing of Sexual Offences (s.5 and s.9 guidelines) (2014)<br><br></li>
<li>"Working Together to Safeguard Children" statutory guidance (2013).<br><br></li>
<li>
Real Voices Evidence - Coffey Inquiry (2013)<br><br>
</li>
<li>HASC Report to the Home Affairs Select Committee of the House of Commons on behalf of victims of child sexual abuse. (2012)<br><br></li>
</ol>
</div>
<div class="col-md-6">
</div>
</div>
<!-- lord hope quote -->
<div class="container-fluid blackquote">
<div class="col-md-12">
<blockquote class="blockquote blockquote-reverse">
<p class="mb-0 center">Fairness is rather like beauty, you see. Fairness, like beauty, lies in the eye of the beholder.</p>
<footer class="blockquote-footer center">Lord Hope of Craighead in White v White, <cite title="Source Title">President of the Supreme Court of the United Kingdom</cite>
</footer>
</blockquote>
</div>
</div>
<!-- pro bono work -->
<div class="container-fluid spaceout probono" id="ProBono">
<div class="col-md-12">
<p><em>Steven continuously exercises responsible academic citizenship by challenging areas of injustice in public policy, by providing expert advice and by supporting on-going legal proceedings.</em>
<h3>Pro Bono</h3>
<h4>National Security</h4>
<p>Steven regularly provides expert advice to Parliament and Her Majesty's Government on national security matters related to computer science and cybersecurity. He also contributes to the development of opensource software and initiatives that provide wider access to the tools needed to avert national security threats at the very foundation. He works as part of an interdisciplinary team to ensure that expertise is delivered to the right places in right way.
</p>
<h4>Unduly Lenient Sentence Referrals</h4>
<p>He has a keen interest in ensuring cases are referred to the to the Law Officers (the Attorney-General and the Solicitor-General) under the Unduly Lenient Sentence Scheme (that is the government machinery for s.36 Criminal Justice Act 1988) where there is doubt about whether a sentence was appropriate for the nature of the offence for which a given conviction was made. It takes only one referral under the scheme for the law officers to be required to review a prosecution case.</p>
</div>
</div>
<!-- stuart henderson quote -->
<div class="container-fluid blackquote">
<div class="col-md-12">
<blockquote class="blockquote blockquote-reverse">
<p class="mb-0 center">His ability to pick up on the finites and nuances of the complexities of Domestic Violence has made him one of the most dependable and well-respected members of our team.</p>
<footer class="blockquote-footer center">Stewart Henderson, <cite title="Source Title">Operational Manager of the National Centre for Domestic Violence</cite>
</footer>
</blockquote>
</div>
</div>
<!-- contact -->
<div class="container-fluid footer" id="Contact">
<h3 class="center">Contact</h3>
<div class="col-md-3">
<h4>Address</h4>
<p>Ref:BPM317090
<br> Mr Steven Walker-Roberts
<br> 372 Old Street
<br> London
<br> EC1V 9AU
<br>
<br>
</p>
</div>
<div class="col-md-3">
<h4>Telephone</h4>
<p>0203 608 2232</p>
<h4>Fax</h4>
<p>0203 637 0189</p>
<br>
</div>
<div class="col-md-6">
<h4>Social</h4>
<a href="mailto:[email protected]"><img src="./img/mail.png" height="60" width="60" alt="Email" />
</a>
<a href="https://www.facebook.com/whitetigerx"><img src="./img/Facebook.png" height="60" width="60" alt="Facebook" />
</a>
<a href="https://twitter.com/swalkerroberts"><img src="./img/Twitter.png" height="60" width="60" alt="Twitter" />
</a>
<a href="https://plus.google.com/u/0/+StevenWalkerRobertsLawyer"><img src="./img/google.png" height="60" width="60" alt="Google+" />
</a>
<a href="https://uk.linkedin.com/in/walkerroberts"><img src="./img/Linkedin.png" height="60" width="60" alt="LinkedIn" />
</a>
<a href="https://github.com/walkerandco"><img src="./img/Github.png" height="60" width="60" alt="GitHub" />
</a>
<a href="https://web.whatsapp.com/"><img src="./img/wa.png" height="60" width="60" alt="WhatsApp" />
</a>
</div>
</div>
<div class="container-fluid blackquote">
<div class="col-md-12 center bfooter">
<footer>Copyright (c) Steven Walker-Roberts 2017. All rights reserved, no unauthorised duplication of any material appearing on this website is permitted.</footer>
</div>
</div>
</div>
<!-- jQuery (necessary for Bootstrap's JavaScript plugins) -->
<script src="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/jquery.min.js" integrity="sha256-hwg4gsxgFZhOsEEamdOYGBf13FyQuiTwlAQgxVSNgt4=" crossorigin="anonymous"></script>
<!-- Include all compiled plugins (below), or include individual files as needed -->
<script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js" integrity="sha384-Tc5IQib027qvyjSMfHjOMaLkfuWVxZxUPnCJA7l2mCWNIpG9mGCD8wGNIcPD7Txa" crossorigin="anonymous"></script>
<!-- custom js files -->
<script src="./js/customjq.js" type="text/javascript"></script>
</body>
</html>