Sarah Lewis Cortes PhD CISSP CIPPE FIP CIPT CIPM CISA CRISC

San Francisco, California, United States Contact Info
3K followers 500+ connections

Join to view profile

About

Technology and business visionary with senior leadership experience. Strong record of…

Articles by Sarah Lewis

Activity

Join now to see all activity

Experience & Education

  • Netflix

View Sarah Lewis’s full experience

See their title, tenure and more.

or

By clicking Continue to join or sign in, you agree to LinkedIn’s User Agreement, Privacy Policy, and Cookie Policy.

Licenses & Certifications

Volunteer Experience

  • Merritt College Cybersecurity Program Graphic

    Digital Forensics/Intrusion Detection Lecturer; Advisory Board Member

    Merritt College Cybersecurity Program

    - Present 6 years 5 months

    Education

  • MIT Media Lab Graphic

    MIT co-design studio co-Leader: Surveillance, Terrorism, Privacy/Anonymity Technology & Tor

    MIT Media Lab

    - 1 year

    Science and Technology

  • The Tor Project Graphic

    Researcher

    The Tor Project

    - 3 years

    Science and Technology

  • Lexington Institute Graphic

    Invited Speaker- SmartGrid Cybersecurity and Privacy, Dirksen Senate Building, Capitol Hill

    Lexington Institute

    - less than a year

    Science and Technology

  • Emerge! Center Against Domestic Abuse Graphic

    Vice President Board Of Directors

    Emerge! Center Against Domestic Abuse

    - Present 16 years 9 months

  • HTCIA Graphic

    Invited Speaker, High Technology Crime Investigation Assn International Conference 2017, Anaheim, CA

    HTCIA

    - 1 month

  • ISACA Graphic

    Invited speaker: GDPR: Privacy, the Darknet and IOC- Indicators of Compromise

    ISACA

    - 1 month

    https://iplanit.swoogo.com/isacasf2017/Sessions

  • IEEE Communications Society Graphic

    Project 1912 Privacy/Security Architecture, Consumer Wireless Devices Working Group

    IEEE Communications Society

    - Present 8 years

    Science and Technology

  • ISACA Graphic

    Invited speaker, N America Computer Audit &Security: Generally Accepted Privacy Principles (GAPP)

    ISACA

    - 1 month

    Science and Technology

  • SWIFT Graphic

    Invited Speaker, Cybersecurity & Privacy in Financial Institutions

    SWIFT

    - 1 month

  • University of Delaware Graphic

    Invited Speaker, Cybersecurity and Privacy, Lerner College of Business and Economica

    University of Delaware

    - 1 month

  • American Accounting Association Graphic

    Invited Speaker, Transformative Technologies Workshop

    American Accounting Association

    - 1 month

  • Invited Speaker, Producing Videos on Domestic Violence

    Eastern Communication Association- Film and Television Communications

    - 1 month

    Science and Technology

  • Suffolk University - Sawyer Business School Graphic

    Guest Lecturer, IT Security and Privacy

    Suffolk University - Sawyer Business School

    - 1 month

  • Harvard University Graphic

    co-Chair, Annual Giving, Class Participation

    Harvard University

    - 1 year

  • Invited Speaker

    EnergySecurity12 Conference, Portland Oregon

    - 1 month

  • Transition House Graphic

    Board of Directors, Clerk and Vice President

    Transition House

    - 5 years 1 month

    Founded in 1977, Emerge was the first abuser education program in the United States. Since its creation, Emerge has been a national and international leader in working to end violence in intimate relationships. Emerge provides critical services and support to victims and survivors fo domestic violence and intimate partner abuse.

    In working toward this goal, Emerge seeks to educate individual abusers, prevent young people from learning to accept violence in their relationships, improve…

    Founded in 1977, Emerge was the first abuser education program in the United States. Since its creation, Emerge has been a national and international leader in working to end violence in intimate relationships. Emerge provides critical services and support to victims and survivors fo domestic violence and intimate partner abuse.

    In working toward this goal, Emerge seeks to educate individual abusers, prevent young people from learning to accept violence in their relationships, improve institutional responses to domestic violence, and increase public awareness about the causes and solutions to partner violence. With the development of parenting education groups for fathers, Emerge has expanded its mission to include a goal of helping men to become more responsible parents.

    Emerge teaches that domestic violence is a learned behavior, not a disease or a sickness. Emerge supports grassroots, institutional and cultural efforts to stop partner violence, sexual assault and child abuse. Emerge recognizes that other oppressive life circumstances such as racism, poverty and homophobia create a climate that contributes to partner violence.

Publications

  • The darknet's smaller than we thought: The life cycle of Tor Hidden Services

    Digital Investigation

    Abstract
    The Tor Darknet is a pseudo-anonymous place to host content online frequently used by criminals to sell narcotics and to distribute illicit material. Many studies have attempted to estimate the size of the darknet, but this paper will show that previous estimates on size are inaccurate due to hidden service lifecycle. The first examination of its kind will be presented on the differences between short-lived and long-lived hidden services. Finally, in light of a new Tor protocol for…

    Abstract
    The Tor Darknet is a pseudo-anonymous place to host content online frequently used by criminals to sell narcotics and to distribute illicit material. Many studies have attempted to estimate the size of the darknet, but this paper will show that previous estimates on size are inaccurate due to hidden service lifecycle. The first examination of its kind will be presented on the differences between short-lived and long-lived hidden services. Finally, in light of a new Tor protocol for the darknet which will prevent the running of relays to learning darknet sites, an analysis is presented of the use of crawling and whether this is an effective mechanism to discover sites for law enforcement.

    Other authors
    See publication
  • A Freedom Hosting Darknet Case Study: Anatomy of a Takedown

    Proceedings of the American Academy of Forensic Sciences (AAFS)

  • Darknet Investigation and Forensic Techniques

    Proceedings of the American Academy of Forensic Sciences (AAFS)

  • MLAT.is World Treaty Cartel Internet Overlay for Darknet and Digital Traffic Analytics

    Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST17)

    Sarah Cortes, MLAT World Treaty Cartel Internet Overlay for Digital Traffic Analytics, MLAT.is, Proceedings of the 2017 IEEE International Symposium on Technologies for Homeland Security (HST17), 2017

    See publication
  • Cyberterrorism

    SAGE Encyclopedia of War: Social Science Perspectives, Ed. Paul Joseph (2016) DOI: http://dx.doi.org/10.4135/9781483359878.n174.

  • Legalizing Domestic Surveillance: The Role of Mutual Legal Assistance Treaties in Deanonymizing TorBrowser Technology

    Richmond Journal of Law and Technology (JOLT), Richmond Journal of Law & Technology Vol. 22 #2 (December 2015), pp. 1-99

    Changes in government surveillance have resulted in several undesirable circumstances, including foreign nation-state and government attempts to apply pressure directly on US-based and other third-party CSPs operating within their borders. Coincident with the rise of online government surveillance has been a rise in a little-noticed legal tool—the international Mutual Legal Assistance Treaty (MLAT). Governments may control the CSPs which own or operate IT infrastructure over which network…

    Changes in government surveillance have resulted in several undesirable circumstances, including foreign nation-state and government attempts to apply pressure directly on US-based and other third-party CSPs operating within their borders. Coincident with the rise of online government surveillance has been a rise in a little-noticed legal tool—the international Mutual Legal Assistance Treaty (MLAT). Governments may control the CSPs which own or operate IT infrastructure over which network traffic passes. MLATs provide a vector for government intelligence agencies (GIAs) to facilitate global surveillance—technically and legally—through exploiting this control.

    See publication
  • Privacy and the Smart Grid (Chapter in NIST IR 7628)

    NIST

    Co-Authored the chapter on Privacy and the Smart Grid in the draft NISTIR 7628.

    Other authors
    See publication
  • Privacy and the Smart Grid (Chapter in NIST IR 7628)

    NIST / SmartGrid.gov

    Co-Authored the chapter on Privacy and the Smart Grid in the draft NISTIR 7628.

    Other authors
    See publication
  • Google Scholar Profile

    Various

    Full profile at https://scholar.google.com/citations?user=DsKhBmIAAAAJ&hl=en

    See publication

Projects

  • MIT Co-design Graduate Class

    This semester the Civic Media Collaborative Design Studio was focused on surveillance and privacy. Teams worked to design and develop counter-surveillance projects, grounded in the needs of communities most heavily targeted by state, military, and corporate surveillance.

    My team designed, developed, and deployed a research portal for advocates from the Transition House to better understand how technology (for example, device surveillance) is used in Intimate Partner Violence (IPVTech).

    Other creators
    See project

Honors & Awards

  • Best App at World Bank Latin America DV Hackathon

    The World Bank

    Winning Application Prototype at World Bank Latin America, Washington DC for a mobile app to help domestic violence advocates understand cyberstalking and technology abuse for victims. Prototype website at http://fuerza.is/

Languages

  • English

    Native or bilingual proficiency

  • French

    Professional working proficiency

  • Arabic

    Elementary proficiency

  • Russian

    Elementary proficiency

  • Italian

    Elementary proficiency

  • Latin

    Limited working proficiency

  • Egyptian (Ancient)

    Elementary proficiency

Organizations

  • IAPP

    Privacy Engineering Advisory Board December 2019

    - Present
  • IEEE

    IEEE COMSOC Par 1912 Privacy& Security Architecture for Consumer Wireless Devices Working Group Secr

    - Present

    Member of the IEEE COMSOC Par 1912 Privacy and Security Architecture for Consumer Wireless Devices Working Group started in July 2015. Serving as Subcommittee lead on Consumer Wireless Devices use cases. Goal is identify privacy risks and privacy harms in the wireless digital devices, such as fitness wearables, medical devices, etc., and recommend feasible and effective privacy controls to address them.

  • ISC2

    -

    - Present
  • NIST-National Institute of Standards and Technology

    SGIP Smart Grid Cybersecurity Committee Privacy Group

    - Present
  • ISACA

    -

    - Present
  • AAFS-American Academy of Forensic Sciences, Digital Multimedia Evidence

    Member

    -
  • SGIP-Smart Grid Interoperability Panel

    Cybersecurity Working Group

    -
  • ISSA

    -

Recommendations received

More activity by Sarah Lewis

View Sarah Lewis’ full profile

  • See who you know in common
  • Get introduced
  • Contact Sarah Lewis directly
Join to view full profile

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Add new skills with these courses