SlideShare a Scribd company logo
1 of 2
2856 Hillbrook Way
Decatur, GA 30033
Phone 404-502-0539
E-mail gacis1992@gmail.com
MichaelD.Anderson
Objective:
To work on projects for both civil and criminal attorneys doing digital forensic recovery, analysis, and
testimony.
Summary of
qualifications:
Special Agent (March 1987 – January 2, 2015): I became a special agent with the Criminal
Investigation Division of the IRS in 1987. As a S/A I have been responsible for investigating
individuals, and businesses for violations of various criminal charges including money
laundering, RICO, tax evasion, mail fraud and defrauding the government, multi-agency
Organized Crime and Drug Enforcement Task Force cases (OCDETF), multi-million dollar
bankruptcy cases and multi-million dollar boiler room investigations and identity theft cases.
On January 2, 2015, I retired from my law enforcement position.
Computer Investigative Specialist – In 1990 I attended Seized Computer and Evidence
Recovery. In 1995 I attended Computer Investigative Specialist training at the University of
North Texas. As a CIS I am tasked to recover evidence from electronic media such as
computers, cell phones, tablets, floppy disks, CD’s, DVD’s, and GPS’. I have testified dozens
of times in federal court concerning evidence obtained during search warrants. I have been
qualified twice as an expert in computer forensics in federal court. As a CIS I have processed
tens of thousands of computers and other electronic devices. I have received training in
various forensic software packages, including XWays, ILook, Encase, and Access Data’s
Forensic Tool Kit. I also had the unique assignment of being a Macintosh or Apple specialist
and I have received training in the Black Bag Forensic package specifically used for Apple
products. I have completed and instructed multiple classes on data recovery and Microsoft
products.
Significant Cases: American Rights Litigators-In 2004 I was the lead CIS on the
execution of a search warrant at the offices of American Rights Litigators (ARL). ARL was an
organization with close to 5000 clients who assisted the obstruction of collection of income
taxes for their clients. At the search warrant there were 33 computers including a Linux Email
Server, Fax Server, and a Windows 2000 Server containing an access database of all of
ARL’s clients and their activities. I secured, imaged and analyzed the computers and the
servers. Using the Access Database I identified potential targets for the IRS. My work
resulted in over 20 trials including the trial and conviction of Wesley Snipes. I testified in depth
during the trials including four and half days in Washington DC in the trial of the employees of
ARL.
Attorney General (Eric Holder): During the summer of 2013 it came to the attention of the
federal government that someone had stolen the identity of Mr. Holder and filed a false tax
return in his name. I worked extensively with the Federal Bureau of Investigation to identify
the culprits. During this investigation multiple interviews were done and search warrants for
email, IP addresses, and physical locations were completed. It turned out that the culprits had
bought Mr. Holder’s information from a black market server containing thousands of stolen
identities. The computer containing the stolen data was imaged and analyzed by myself.
Eventually the two defendants pled guilty. Their guilty plea was a direct result of my analysis
of the email, computers, and IP information.
Gregory Harrison (NC): Mr. Harrison ran multiple temporary labor companies which were
located all over the Southeastern United States. Mr. Harrison failed to file employment tax
returns and used the withholdings from his thousands of employees for personal gain. I was
called into the case to assist in the recovery of the accounting software that was stored on
tape drives. Using the tape drives and tapes recovered during a search warrant that had been
executed years before I recovered the data and then analyzed it to determine the amount of
the loss. The accounting program was one that was obsolete and was out of production. I
conducted a large amount of research into the accounting program in order to get it
operational. I located and interviewed the original owners of the software and also the
programmer but due to licensing issues I got very little information. Through trial and error I
eventually got the accounting software to run. I generated hundreds of reports showing a loss
of $60,000,000.00. During the trial I summarized my reports and presented the loss. One of
the prosecutors said “Mike is the best government witness I’ve ever worked with.” My
testimony resulted in guilty verdicts on all 69 counts. Mr. Harrison was sentenced to forty plus
years.
Revenue Agent: From 1982 through 1987 I was a revenue agent with the Examination
Division of the Internal Revenue Service. As a revenue agent I audited numerous income tax
returns of businesses including sole proprietorships, partnerships, and corporations.
Education:
Teaching
Assignments:
Certifications:
08/1979 – 06/1981, Florida International University, Miami, Florida; Degree Earned -
Bachelors of Arts in Accounting; Dean’s List and overall GPA of 3.4. Member of Honorary
Accounting Society.
09/1983 – 12/1984, Florida International University, Miami, Florida. Degree Earned -
Masters of Science in Taxation. Deans List and overall GPA of 3.6
1982: Passed Certified Public Accountants; Became a CPA licensed in Florida in 1984.
CIS Training: Unix/Linux operating systems; Windows 7; Windows XP; Windows 3.11;
Windows 2000; Windows Server; SQL Server; Microsoft Office Products; Windows NT;
Microsoft Disk Operating System (DOS); Apple OS; Comptia Net+ Certified; Novel Certified
Engineering Program; Encase Training; XWays Forensics; Access Data Forensic Tool Kit;
ILook Forensics; RAID Reconstruction; Cell Phone Forensics; Basic Instructor Facilitator
Training;
Special Agent Training: Top graduate in Criminal Investigator Class; Second in my Special
Agent Investigator Training Class. Firearms Instructor Training; Basic Instructor/Facilitator
Training; Microsoft Windows and Office Training; Building Entry Instructor Training;
As a special agent/CIS I have taught numerous classes and been on several task forces to
establish training programs. These include:
CIS 2000 (predecessor to Basic Computer Evidence Recovery); Advanced Computer
Evidence Recovery Training, MS Office, MS Windows, CIS CPE, Apple Operating Systems
and Data Recovery; Firearms Instructor. Identity Theft Symposium.
CompTIA Net +, Encase Certified Examiner (ENCE), CPA licensed in Florida through 2003,
and Certified Novell Engineer.
Professional
memberships:
American Institute of Certified Public Accountants, Florida Institute of Public Accountants,
High Technology Crime Investigators Association, Fraternal Order of Police, Association of
Retired Special Agents
Security
clearance:
As a CIS, I am required to have a Top Secret clearance. I completed my third Top Secret
background investigation in July, 2013.
Awards
received:
Two Department of Justice awards for outstanding work on extensive trials; Multiple
outstanding Law Enforcement Awards from the United States Attorney’s Office; Dozens of
performance and special acts awards, as well as two Quality Step Increases, over the last 32
years of government employment.

More Related Content

Viewers also liked

Viewers also liked (15)

2015 LINNEA J GARLOCK Resume
2015 LINNEA J GARLOCK Resume2015 LINNEA J GARLOCK Resume
2015 LINNEA J GARLOCK Resume
 
resume Belet Deribie W.Gies,Dr
resume Belet Deribie W.Gies,Drresume Belet Deribie W.Gies,Dr
resume Belet Deribie W.Gies,Dr
 
J Martin Resume
J Martin ResumeJ Martin Resume
J Martin Resume
 
Doug Wille Resume
Doug Wille ResumeDoug Wille Resume
Doug Wille Resume
 
Edward stewart 2016v3
Edward stewart 2016v3Edward stewart 2016v3
Edward stewart 2016v3
 
Staff Accountant revised_b
Staff Accountant revised_bStaff Accountant revised_b
Staff Accountant revised_b
 
Robinson Resume
Robinson ResumeRobinson Resume
Robinson Resume
 
Resume of-larisa-strijicova
Resume of-larisa-strijicovaResume of-larisa-strijicova
Resume of-larisa-strijicova
 
Resume Eleanor Luu 2
Resume Eleanor Luu 2Resume Eleanor Luu 2
Resume Eleanor Luu 2
 
Resume Lisa Miller
Resume  Lisa MillerResume  Lisa Miller
Resume Lisa Miller
 
David S Garrett Resume 09122016
David S Garrett Resume 09122016David S Garrett Resume 09122016
David S Garrett Resume 09122016
 
SA-Int'l resume II
SA-Int'l resume IISA-Int'l resume II
SA-Int'l resume II
 
Jack Deeds
Jack DeedsJack Deeds
Jack Deeds
 
Todd Bittner Resume ver2
Todd Bittner Resume ver2Todd Bittner Resume ver2
Todd Bittner Resume ver2
 
1 page resume
1 page resume1 page resume
1 page resume
 

Similar to CIS Resume

Combined declarations & exhibits in support of motion for expedited discovery
Combined declarations & exhibits in support of motion for expedited discoveryCombined declarations & exhibits in support of motion for expedited discovery
Combined declarations & exhibits in support of motion for expedited discoveryticular - strategies for success
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinFecomercioSP
 
Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015Timothy Nolan
 
Evidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayEvidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayJessica Howard
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftCase IQ
 
Cybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsCybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsEthisphere
 
NR10192015 resume
NR10192015 resumeNR10192015 resume
NR10192015 resumeNia Raymond
 
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...Senator Grassley's investigation into fraud in EB-5 visa program by regional ...
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...Mohammed Shaikh
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...Shawn Tuma
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11pdewitte
 
My Internship With Battle Born Progress
My Internship With Battle Born ProgressMy Internship With Battle Born Progress
My Internship With Battle Born ProgressHolly Vega
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unpreparedhaynormania
 

Similar to CIS Resume (20)

Combined declarations & exhibits in support of motion for expedited discovery
Combined declarations & exhibits in support of motion for expedited discoveryCombined declarations & exhibits in support of motion for expedited discovery
Combined declarations & exhibits in support of motion for expedited discovery
 
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson PerinIII Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
III Congresso Crimes Eletrônicos, 10/10/2011 - Apresentação de Edson Perin
 
Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015Case-Study-Cyber-Investigations-8-5-2015
Case-Study-Cyber-Investigations-8-5-2015
 
Myron's Resume Jan. 2017
Myron's Resume Jan. 2017Myron's Resume Jan. 2017
Myron's Resume Jan. 2017
 
Evidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity EssayEvidence Integrity And Evidence Continuity Essay
Evidence Integrity And Evidence Continuity Essay
 
Resume 2
Resume 2Resume 2
Resume 2
 
cv_Bodenmann
cv_Bodenmanncv_Bodenmann
cv_Bodenmann
 
Resume3
Resume3Resume3
Resume3
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Tips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity TheftTips to Protect Your Organization from Data Breaches and Identity Theft
Tips to Protect Your Organization from Data Breaches and Identity Theft
 
Cybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data ThreatsCybersecurity: Managing Risk Around New Data Threats
Cybersecurity: Managing Risk Around New Data Threats
 
NR10192015 resume
NR10192015 resumeNR10192015 resume
NR10192015 resume
 
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...Senator Grassley's investigation into fraud in EB-5 visa program by regional ...
Senator Grassley's investigation into fraud in EB-5 visa program by regional ...
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
ISSA North Texas - SecureWorld Expo Dallas - Cybersecurity Legal Issues: What...
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014Eli Lane Resume 11-15-2014
Eli Lane Resume 11-15-2014
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
My Internship With Battle Born Progress
My Internship With Battle Born ProgressMy Internship With Battle Born Progress
My Internship With Battle Born Progress
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 

CIS Resume

  • 1. 2856 Hillbrook Way Decatur, GA 30033 Phone 404-502-0539 E-mail gacis1992@gmail.com MichaelD.Anderson Objective: To work on projects for both civil and criminal attorneys doing digital forensic recovery, analysis, and testimony. Summary of qualifications: Special Agent (March 1987 – January 2, 2015): I became a special agent with the Criminal Investigation Division of the IRS in 1987. As a S/A I have been responsible for investigating individuals, and businesses for violations of various criminal charges including money laundering, RICO, tax evasion, mail fraud and defrauding the government, multi-agency Organized Crime and Drug Enforcement Task Force cases (OCDETF), multi-million dollar bankruptcy cases and multi-million dollar boiler room investigations and identity theft cases. On January 2, 2015, I retired from my law enforcement position. Computer Investigative Specialist – In 1990 I attended Seized Computer and Evidence Recovery. In 1995 I attended Computer Investigative Specialist training at the University of North Texas. As a CIS I am tasked to recover evidence from electronic media such as computers, cell phones, tablets, floppy disks, CD’s, DVD’s, and GPS’. I have testified dozens of times in federal court concerning evidence obtained during search warrants. I have been qualified twice as an expert in computer forensics in federal court. As a CIS I have processed tens of thousands of computers and other electronic devices. I have received training in various forensic software packages, including XWays, ILook, Encase, and Access Data’s Forensic Tool Kit. I also had the unique assignment of being a Macintosh or Apple specialist and I have received training in the Black Bag Forensic package specifically used for Apple products. I have completed and instructed multiple classes on data recovery and Microsoft products. Significant Cases: American Rights Litigators-In 2004 I was the lead CIS on the execution of a search warrant at the offices of American Rights Litigators (ARL). ARL was an organization with close to 5000 clients who assisted the obstruction of collection of income taxes for their clients. At the search warrant there were 33 computers including a Linux Email Server, Fax Server, and a Windows 2000 Server containing an access database of all of ARL’s clients and their activities. I secured, imaged and analyzed the computers and the servers. Using the Access Database I identified potential targets for the IRS. My work resulted in over 20 trials including the trial and conviction of Wesley Snipes. I testified in depth during the trials including four and half days in Washington DC in the trial of the employees of ARL. Attorney General (Eric Holder): During the summer of 2013 it came to the attention of the federal government that someone had stolen the identity of Mr. Holder and filed a false tax return in his name. I worked extensively with the Federal Bureau of Investigation to identify the culprits. During this investigation multiple interviews were done and search warrants for email, IP addresses, and physical locations were completed. It turned out that the culprits had bought Mr. Holder’s information from a black market server containing thousands of stolen identities. The computer containing the stolen data was imaged and analyzed by myself. Eventually the two defendants pled guilty. Their guilty plea was a direct result of my analysis of the email, computers, and IP information. Gregory Harrison (NC): Mr. Harrison ran multiple temporary labor companies which were located all over the Southeastern United States. Mr. Harrison failed to file employment tax returns and used the withholdings from his thousands of employees for personal gain. I was called into the case to assist in the recovery of the accounting software that was stored on tape drives. Using the tape drives and tapes recovered during a search warrant that had been executed years before I recovered the data and then analyzed it to determine the amount of the loss. The accounting program was one that was obsolete and was out of production. I conducted a large amount of research into the accounting program in order to get it
  • 2. operational. I located and interviewed the original owners of the software and also the programmer but due to licensing issues I got very little information. Through trial and error I eventually got the accounting software to run. I generated hundreds of reports showing a loss of $60,000,000.00. During the trial I summarized my reports and presented the loss. One of the prosecutors said “Mike is the best government witness I’ve ever worked with.” My testimony resulted in guilty verdicts on all 69 counts. Mr. Harrison was sentenced to forty plus years. Revenue Agent: From 1982 through 1987 I was a revenue agent with the Examination Division of the Internal Revenue Service. As a revenue agent I audited numerous income tax returns of businesses including sole proprietorships, partnerships, and corporations. Education: Teaching Assignments: Certifications: 08/1979 – 06/1981, Florida International University, Miami, Florida; Degree Earned - Bachelors of Arts in Accounting; Dean’s List and overall GPA of 3.4. Member of Honorary Accounting Society. 09/1983 – 12/1984, Florida International University, Miami, Florida. Degree Earned - Masters of Science in Taxation. Deans List and overall GPA of 3.6 1982: Passed Certified Public Accountants; Became a CPA licensed in Florida in 1984. CIS Training: Unix/Linux operating systems; Windows 7; Windows XP; Windows 3.11; Windows 2000; Windows Server; SQL Server; Microsoft Office Products; Windows NT; Microsoft Disk Operating System (DOS); Apple OS; Comptia Net+ Certified; Novel Certified Engineering Program; Encase Training; XWays Forensics; Access Data Forensic Tool Kit; ILook Forensics; RAID Reconstruction; Cell Phone Forensics; Basic Instructor Facilitator Training; Special Agent Training: Top graduate in Criminal Investigator Class; Second in my Special Agent Investigator Training Class. Firearms Instructor Training; Basic Instructor/Facilitator Training; Microsoft Windows and Office Training; Building Entry Instructor Training; As a special agent/CIS I have taught numerous classes and been on several task forces to establish training programs. These include: CIS 2000 (predecessor to Basic Computer Evidence Recovery); Advanced Computer Evidence Recovery Training, MS Office, MS Windows, CIS CPE, Apple Operating Systems and Data Recovery; Firearms Instructor. Identity Theft Symposium. CompTIA Net +, Encase Certified Examiner (ENCE), CPA licensed in Florida through 2003, and Certified Novell Engineer. Professional memberships: American Institute of Certified Public Accountants, Florida Institute of Public Accountants, High Technology Crime Investigators Association, Fraternal Order of Police, Association of Retired Special Agents Security clearance: As a CIS, I am required to have a Top Secret clearance. I completed my third Top Secret background investigation in July, 2013. Awards received: Two Department of Justice awards for outstanding work on extensive trials; Multiple outstanding Law Enforcement Awards from the United States Attorney’s Office; Dozens of performance and special acts awards, as well as two Quality Step Increases, over the last 32 years of government employment.