Victor Sheymov

Victor Sheymov is a computer security expert, Russian expert, author, scientist, inventor and patent holder of computer security innovations. As a former intelligence official with the rank of major in the Soviet KGB and a defector to the United States[1][2] in 1980, he was a major contributor to the counter-intelligence community of the western nations. His story is well documented through numerous national appearances in media, both television and print, testimony before various Congressional committees, and speaking appearances.

Since becoming a US citizen, Sheymov has been active in the computer security industry as the CEO of Invicta Networks, Inc., a Northern Virginia-based developer of advanced cyber-security technologies and other endeavors that address the protection of national governmental and commercial data bases and communications as well as programs to protect children and teens from Internet predators.

Invicta Networks was formed in 2000. Invicta Networks developed InvisiLAN® and WizArmorTM technologies among others.

Variable Cyber Coordinates

Sheymov is the inventor of Variable Cyber Coordinates (VCC) method of communications. This method of communications is advantageous for establishing a high level of cyber security. By hopping IP address and other communications parameters, it provides dynamic protection of computers and computer networks through cyber agility. Variable Cyber Coordinates (VCC) is a method of network communications by which the cyber coordinates of the participating objects or entities are constantly changing. It provides an algorithmic foundation for the dynamic security of network devices against network-based cyber attacks. Cyber coordinates are sets of statements that determine the position of an object in cyberspace. For instance, an IP address singularly determines the location of a computer within the Internet. Cyber coordinates enable computers connected to the Internet to “find” each other and to communicate, much in the same way that knowledge of geographic coordinates of a location on Earth enables guidance of an object to travel to that location. Essentially, any communications parameter can be viewed as a cyber coordinate. Other examples of cyber coordinates are computer Port numbers, MAC addresses, telephone numbers, file names, radio calls, etc. With the VCC method of communications cyber coordinates of participating objects or entities are made variable. They are assigned temporary values, often random or pseudorandom. These temporary cyber coordinates are usually encrypted and distributed only to authorized devices. Authorized devices can communicate with each other using the currently valid set of cyber coordinates. Other devices on the network that are not privy to the currently valid set of cyber coordinates, cannot communicate with the authorized devices. However, a determined attacker with sufficient resources, effort and time can identify the currently valid cyber coordinates. To prevent this, the currently valid set of cyber coordinates is periodically changed. The process is repeated at predetermined or random intervals sufficiently frequent to prevent a potential attacker from finding the protected devices and launching a successful attack.

Sheymov whas been granted numerous patents in the United States, European Union, Australia, Japan, India, Korea, and China.[3] US patents granted to Victor Sheymov:[4]

Sheymov has testified in the United States Congress as an expert witness. He was a speaker at major government and private industry events like NSA, National Defense Industry convention, National Science Foundation symposium, and a guest lecturer at universities.[5]

Sheymov has written several books, including Tower of Secrets, a non-fiction book describing the Soviet Communist political system, its repressive apparatus, and technical aspect of intelligence, Cyberspace and Security: A Fundamentally New Approach,[6] which analyzes the real differences between physical space and cyberspace and that explains why the legacy firewall security methods designed for the physical world cannot work in cyberspace, Sheymov's Tiebreaker: Tower of Secrets II,[7] which takes up the author's experience with the CIA, his analysis of mole infiltration, and his development of a new cybersecurity technology, and Party Gold: A Cyrus Grant novel of suspense,[8] which is set in the period following the collapse of the Soviet Union and describing the search of the large sums of money that disappeared during the collapse of the communist system in the Soviet Union.

Sheymov has also authored articles in The Washington Post, Barron's, World Monitor, National Review and other national publications. He appeared at many national news programs including Larry King Live, 48 Hours, Dateline, MacNeil-Lehrer, Charlie Rose and the McLaughlin Report.[9][10]

Sheymov has over 30 years of experience in advanced science. He started his technology career in scientific research involving guidance systems within the Russian "Star Wars" missile defense program. Later, Mr. Sheymov worked in the Russian counterpart to the U.S. National Security Agency, serving in a variety of technical and operational positions.

Prior to immigrating to the United States in 1980, Sheymov had been one of the youngest senior officers in Russian equivalent of the NSA, responsible for coordination of all aspects of the Russian cipher communications security with its outposts abroad. After arrival in the United States he was working for the NSA for a number of years.[2]

Sheymov is a recipient of several prestigious United States awards in intelligence and security.

Sheymov holds an Executive MBA from Emory University and a Master's degree from Moscow State Technical University, a Russian equivalent of MIT.

References

  1. Fenton, Ben (9 June 2000). "Ex-KGB major leads US war against hackers". The Daily Telegraph. Retrieved 6 October 2011.
  2. 2.0 2.1 Ignatius, David (March 2, 1990) "Major KGB Defector to U.S. Breaks 10 Years of Silence; Specialist Knew Entire Code System." Washington Post. Retrieved 2 February 2013.
  3. "IPEXL Worldwide Patents Citation" http://patent.ipexl.com/inventor/Sheymov_Victor_I_1.html
  4. http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=0&f=S&l=50&TERM1=sheymov&FIELD1=INNM&co1=AND&TERM2=&FIELD2=&d=PTXT
  5. "1998 Congressional Hearings, Intelligence and Security Statement by Victor Sheymov, ComShield Corporation before the Joint Economic Committee United States Congress, Wednesday, May 20, 1998, The Low Energy Radio Frequency Weapons Threat to Critical Infrastructure" https://fas.org/irp/congress/1998_hr/sheymov.htm
  6. Cyberspace and Security: A Fundamentally Different Approach, Victor Sheymov, Cyberbooks Publishing; 1st Edition (October, 2012), ISBN 978-0985893002,; Kindle ISBN 978-0-9858930-1-9.
  7. Tiebreaker: Tower of Secrets II, Victor Sheymov, Cyberbooks Publishing; 1st Editioon (October 2013). Kindle ISBN 978-0-9858930-4-0
  8. Party Gold: A Cyrus Grant Novel of Suspense, Victor Sheymov, Cyberbooks Publishing; 1st Edition (October, 2012), Paper ISBN 978-0-9858930-7-1; Kindle ISBN978-0-9858930-6-4.
  9. "Tower of Secrets", Victor Sheymov, Naval Inst Pr; 1st Edition (October 1993), ISBN 1-55750-764-3, ISBN 978-1-55750-764-8 http://www.amazon.com/Tower-Secrets-Real-Life-Thriller/dp/1557507643
  10. "The New York Times" June 8, 2000 "Ex-Soviet Spy Takes on Internet Mission in U.S., Using Old Skills" By JAMES RISEN http://www.nytimes.com/library/national/060800soviet-hacker.html