Biography:Ross J. Anderson

From HandWiki
Short description: British computer scientist (born 1956)
Ross Anderson

Ross Anderson (security researcher).jpg
Ross Anderson in 2008
Born
Ross John Anderson

(1956-09-15) 15 September 1956 (age 67)[1]
NationalityBritish
EducationHigh School of Glasgow
Alma materUniversity of Cambridge (MA, PhD)
Known for
  • Banking security
  • Security economics
  • Information policy
  • Serpent (cipher)
  • University of Cambridge politics
  • Security Engineering book[2]
AwardsLovelace Medal (2015)
Scientific career
Fields
Institutions
ThesisRobust Computer Security (1995)
Doctoral advisorRoger Needham[5]
Doctoral students
Website{{{1}}}

Ross John Anderson FRS FREng FIMA FIET [6][7][1] (born 15 September 1956)[1] is a researcher, author, and industry consultant in security engineering.[2] He is Professor of Security Engineering at the Department of Computer Science and Technology, University of Cambridge[8] where he is part of the University's security group.[9][10][11]

Education

Anderson was educated at the High School of Glasgow.[1] In 1978, he graduated with a Bachelor of Artsin mathematics and natural science from the University of Cambridge where he was an undergraduate student of Trinity College, Cambridge, and subsequently received a qualification in computer engineering. Anderson worked in the avionics and banking industry before moving back to the University of Cambridge in 1992, to work on his doctorate under the supervision of Roger Needham[12] and start his career as an academic researcher.[4] He received his PhD in 1995, and became a lecturer in the same year.[1]

Research and career

File:Ross Anderson on the history of Malware (2010).mp3 Anderson's research interests[3][5][9] are in security, cryptology, dependability and technology policy.[3] In cryptography, he designed with Eli Biham the BEAR, LION and Tiger cryptographic primitives, and co-wrote with Biham and Lars Knudsen the block cipher Serpent, one of the finalists in the Advanced Encryption Standard (AES) competition. He has also discovered weaknesses in the FISH cipher and designed the stream cipher Pike.

Anderson has always campaigned for computer security to be studied in a wider social context. Many of his writings emphasise the human, social, and political dimension of security. On online voting, for example, he writes "When you move from voting in person to voting at home (whether by post, by phone or over the internet) it vastly expands the scope for vote buying and coercion",[13] making the point that it's not just a question of whether the encryption can be cracked.

In 1998, Anderson founded the Foundation for Information Policy Research, a think tank and lobbying group on information-technology policy.

Anderson is also a founder of the UK-Crypto mailing list and the economics of security research domain.[14]

He is well-known among Cambridge academics as an outspoken defender of academic freedoms, intellectual property and other matters of university politics. He is engaged in the "Campaign for Cambridge Freedoms"[15] and has been an elected member of Cambridge University Council since 2002.[16] In January 2004, the student newspaper Varsity declared Anderson to be Cambridge University's "most powerful person".[17]

In 2002, he became an outspoken critic of trusted computing proposals, in particular Microsoft's Palladium operating system vision.[18]

Anderson's TCPA FAQ has been characterised by IBM TC researcher David R. Safford as "full of technical errors" and of "presenting speculation as fact."[19]

For years Anderson has been arguing that by their nature large databases will never be free of abuse by breaches of security. He has said that if a large system is designed for ease of access it becomes insecure; if made watertight it becomes impossible to use. This is sometimes known as Anderson's Rule.[20]

Anderson is the author of Security Engineering, published by Wiley in 2001.[2] He was the founder and editor of Computer and Communications Security Reviews.[4] After the vast Global surveillance disclosure leaked by Edward Snowden beginning in June 2013 Anderson suggested one way to begin stamping out the British state's unaccountable involvement in this NSA spying scandal is to entirely end the domestic secret services. Anderson: "Were I a legislator, I would simply abolish MI5". Anderson notes the only way this kind of systemic data collection has been made possible was through the business models of private industry. The value of information-driven web companies such as Facebook and Google is built around their ability to gather vast tracts of data. It was something the intelligence agencies would have struggled with alone.[21]

Anderson is a critic of smart meters, writing that there are various privacy and energy security concerns.[22]

Awards and honours

Anderson was elected a Fellow of the Royal Society (FRS) in 2009. His nomination reads:

Anderson was also elected a Fellow of the Royal Academy of Engineering (FREng) in 2009.[6][7][1][4] He is a fellow of Churchill College, Cambridge.[24]

References

  1. 1.0 1.1 1.2 1.3 1.4 1.5 Anon (2014). ",". Who's Who (online edition via Oxford University Press ed.). A & C Black, an imprint of Bloomsbury Publishing plc. doi:10.1093/ww/9780199540884.013.U70837. https://www.ukwhoswho.com/view/article/oupww/whoswho/U70837.  (subscription or UK public library membership required)
  2. 2.0 2.1 2.2 Anderson, Ross (2008). Security engineering: a guide to building dependable distributed systems. New York: John Wiley. ISBN 978-0-470-06852-6. http://www.cl.cam.ac.uk/~rja14/book.html. 
  3. 3.0 3.1 3.2 {{Google Scholar id}} template missing ID and not present in Wikidata.
  4. 4.0 4.1 4.2 4.3 Curriculum Vitae – Ross Anderson, May 2007
  5. 5.0 5.1 5.2 Ross J. Anderson at the Mathematics Genealogy Project
  6. 6.0 6.1 "The Royal Academy of Engineering Annual Report 2009/2010". https://www.yumpu.com/en/document/read/25650027/annual-report-967kb-royal-academy-of-engineering. 
  7. 7.0 7.1 "List of Fellows". https://raeng.org.uk/fellows-directory. 
  8. The Blue Book – "The Computer Laboratory: an Introduction”, University of Cambridge Computer Laboratory, August 2007
  9. 9.0 9.1 Ross J. Anderson's publications indexed by the Scopus bibliographic database. (Subscription content?)
  10. Ross J. Anderson author profile page at the ACM Digital Library
  11. Anderson, R. J. (1999). "Information technology in medical practice: Safety and privacy lessons from the United Kingdom". The Medical Journal of Australia 170 (4): 181–4. doi:10.5694/j.1326-5377.1999.tb127721.x. PMID 10078187. 
  12. Anderson, Ross John (2014). Robust Computer Security. cam.ac.uk (PhD thesis). University of Cambridge. OCLC 53659223. EThOS uk.bl.ethos.338198.
  13. Nicole Kobie (30 March 2015). "Why electronic voting isn't secure – but may be safe enough". https://www.theguardian.com/technology/2015/mar/30/why-electronic-voting-is-not-secure. 
  14. Ross Anderson: Why information security is hard – an economic perspective , ACSAC 2001.
  15. Campaign for Cambridge Freedoms
  16. Election to the Council: Notices 2 December 2002 and 7 November 2006, Cambridge University Reporter
  17. Cambridge Power 100, Varsity, Issue 591, 16 January 2004
  18. Ross Anderson: ‘Trusted Computing’ Frequently Asked Questions, August 2003
  19. http://domino.research.ibm.com/comm/research_projects.nsf/pages/gsal.TCG.html/$FILE/tcpa_rebuttal.pdf[yes|permanent dead link|dead link}}]
  20. Guardian newspaper article on a security breach, in which Anderson's Rule is formulated
  21. Cambridge's Head of Cryptography: I Would Abolish MI5, Forbes, 3 January 2013
  22. https://www.fipr.org/100110smartmeters.pdf [bare URL PDF]
  23. "EC/2009/02: Anderson, Ross". London: The Royal Society. https://collections.royalsociety.org/DServe.exe?dsqIni=Dserve.ini&dsqApp=Archive&dsqDb=Catalog&dsqCmd=show.tcl&dsqSearch=(RefNo==%27EC/2009/02%27). 
  24. "Professor Ross Anderson FRS, FREng". Churchill College, Cambridge. https://www.chu.cam.ac.uk/people/view/ross-anderson.