Steven Walker-Roberts
Academic Lawyer, Computer Scientist, Teacher, Writer

Steven will bring a fierce intelligence, a strong work ethic, significant IT skills, a steely will
to succeed and a refusal to be cowed by seemingly insurmountable obstacles.

Andrew Norfolk, The Times

About Steven

Steven has been able to program since the age of 8 when he learned to disassemble Playstation One games in order to alter game functions (without realising it until he studied computer science). He learned to build his first computer at the same age, and shortly after learned basic electronics. Over his teenage years, he refined and honed these skills. When Steven left school, he accepted private client work and developed fullstack applications for local businesses. He continued to do this until he studied law, when he became active in public policy work arising out of personal sentiment to critical public policy issues. From here, he developed a keen interest in criminal and public law. He furthered this when he studied computer science, later leading to an Honorary Research Fellowship and a Lectureship. That insight into the law and his passion for computer science is what acted as a springboard for his specialism in cybersecurity and secure software development.

A computer would deserve to be called intelligent if it could deceive a human into believing that it was human.

Alan Turing, OBE FRS

Scientific Work

Steven is an experienced fullstack secure software developer and DevOps engineer, with years of commercial experience. His work in computer science centres around "zero trust". His research focuses on a theory he devised known as the "cardinal trust" model. This model asks the fundamental question of whether it is possible to have a functioning computer system in which no aspect of the underlying infrastructure, the data or the users of the computer system are trusted. The motivation for this theoretical undertaking was the serious security breaches which have recently occurred such as WannaCry in the NHS, the OPM security breach, the Equifax breach, PRISM and many more security breaches that ask questions at the core of modern society's reliance on computer technology.

He is a lecturer at the Manchester Metropolitan University teaching cybersecurity, computer science and technology law as it relates to computer science. His research activities are continued as part of an Honorary Research Fellowship in which he contributes significantly to the state of the art in cybersecurity, publishing in major academic journals, books and conferences as part of his contribution to academia.

Key Achievements

  1. Steven continues to work in the industry as DevOps Engineer in employment and as a Fullstack Developer accepting private client work for major international clients and high value national projects. He also provides expert advise, translating best practice from computer science to other industries.

  2. Developed the state of the art significantly as it relates to zero trust security, unprivileged and trustless computing. He presently investigates ways of improving industrial practice to allow for guaranteed security and distributed computing applications which work effectively every time.

  3. Created the PAAS software which implements the trustless model on a mass scale. It allows developers to launch payloads without having to be concerned with the security of the underlying platform. Amateur developers and non-programmers are able to use it to acheive security by default which prevents wider consequential security risks.

  4. Contributes significantly to the opensource community, particularly in encouraging the uptake of cybersecurity best practices, secure software development and effective DevOps implementations which respect agile requirements whilst maintaining an appropriate level of security that protects not just that user, but the wider internet community.

The poorest man may in his cottage bid defiance to all the forces of the Crown. It may be frail—its roof may shake—the wind may blow through it—the storm may enter—the rain may enter—but the King of England cannot enter—all his force dare not cross the threshold of the ruined tenement. So be it—unless he has justification by law.

Lord Denning in Southam v Smout [1964] 1 QB 308 at 320, Lord Justice of Appeal & Master of the Rolls

He is a dilligent and keen worker; he is used to regularly giving evidence to Parliamentary inquiries.

Rt. Hon. Michael Meacher MP, House of Commons


  1. Artificial Intelligence Agents as Mediators of Trustless Security Systems and Distributed Computing Applications in Parkinson et al: Guide to Vulnerability Analysis for Computer Networks and Systems Springer (2018)

  2. A Systematic Review of the Availability and Efficacy of Countermeasures to Internal Threats in Healthcare Critical Infrastructure IEEE Access (2018)

  3. Joint Committee on National Security Strategy - Inquiry into Cybersecurity and Critical National Infrastructure: Written Submissions for Manchester Metropolitan University [CNI0001] House of Commons Library (2018)

  4. Joint Committee on National Security Strategy - National Security Capability Review: Written Submissions for Manchester Metropolitan University [CSE0005] House of Commons Library (2018)

  5. Security Focused Distributed Platforms for the Internet of Things: A Novel & Fundamental Theory of Zero Trust Manchester Metropolitan University (2017)

  6. Serious Crime Bill 2014-15 [HL]

  7. Definitive Guidelines on the Sentencing of Sexual Offences (s.5 and s.9 guidelines) (2014)

  8. "Working Together to Safeguard Children" statutory guidance (2013).

  9. Real Voices Evidence - Coffey Inquiry (2013)

  10. HASC Report to the Home Affairs Select Committee of the House of Commons on behalf of victims of child sexual abuse. (2012)

Fairness is rather like beauty, you see. Fairness, like beauty, lies in the eye of the beholder.

Lord Hope of Craighead in White v White, President of the Supreme Court of the United Kingdom

Steven continuously exercises responsible academic citizenship by challenging areas of injustice in public policy, by providing expert advice and by supporting on-going legal proceedings.

Pro Bono

National Security

Steven regularly provides expert advice to Parliament and Her Majesty's Government on national security matters related to computer science and cybersecurity. He also contributes to the development of opensource software and initiatives that provide wider access to the tools needed to avert national security threats at the very foundation. He works as part of an interdisciplinary team to ensure that expertise is delivered to the right places in right way.

Unduly Lenient Sentence Referrals

He has a keen interest in ensuring cases are referred to the to the Law Officers (the Attorney-General and the Solicitor-General) under the Unduly Lenient Sentence Scheme (that is the government machinery for s.36 Criminal Justice Act 1988) where there is doubt about whether a sentence was appropriate for the nature of the offence for which a given conviction was made. It takes only one referral under the scheme for the law officers to be required to review a prosecution case.

His ability to pick up on the finites and nuances of the complexities of Domestic Violence has made him one of the most dependable and well-respected members of our team.

Stewart Henderson, Operational Manager of the National Centre for Domestic Violence