banner ad

Computer Systems Monitoring Expert Witnesses

Sort Non-Featured Profiles by
Check for SynapsUs
Hiren Kulkarni
180 Lonsdale Street
Melbourne Victoria 3000
phone: +61398387759
Hiren Kulkarni specializes is IT Services, Account Management, Business Continuity of IT Services & Support Systems. He is experienced in Business Systems Integration (mergers and acquisitions), Business Process Transformation and ERP Implementations.

Mr. Kulkarni offers Expert Witness and Expert Consultant Services in Project Management, Strategy, Delivery & Execution. He is Certified in Prince2, ITIL and specializes in Oracle Business Intelligence tools & E-Business Suite Modules: Project Accounting (Costing, Billing, Management), SLA, E-Tax, GL, AP, AR, FA, PJM, INV, iExpenses, iProcurement, PO.
Check for SynapsUs
Steven G. Burgess
1010 W. Betteravia Rd, Suite E
Santa Maria CA 93455
phone: 866-345-3345 toll free, or (805) 349-7676
fax: 805-349-7790
Burgess Forensics -Specialists in Computer Forensics, Electronic Discovery, Expert Witness, Data Recovery Since 1985
World-renowned leaders in the recovery of data from disk drives, diskettes, and other media.

Burgess Computer Forensics knows all documents begin on a computer - a rich source for discovery. We begin with forensic imaging, finding hidden, deleted and corrupted files, images, email, Internet and file histories. Burgess explains results and computer technology in terms understood by layperson, judge and jury. Mr. Burgess has written and spoken widely and contributed the comprehensive Computer Forensics section to recently-released "Scientific Evidence in Civil and Criminal Cases, 5th Ed." by Moenssens, et al.

Services Offered:

  • Digital and electronic media, forensic and evidentiary processes
  • Computer forensics cases nationwide, testified as expert witness in many courts
  • Digital discovery, e-discovery, electronic discovery
  • Forensic imaging
  • Password cracking
  • Email and email address recovery
  • File and image recovery
  • Internet history recovery and Internet activity analysis
  • Spyware and malware analysis
  • Criminal defense work
  • Steganographic analysis
  • Expert testimony
  • Project Management

    Our cases have included:

    Employment Law, Family Law, Intellectual Property, Software Design, Pornography, Child Pornography, Fraud, Military, Law Enforcement, Computer Crime, Harassment, Litigation Support, Embezzlement, Contract Dispute, Security Issues, Murder, Traffic Violation, Class Action, Product Liability, Patent Dispute, Stock Manipulation, American Indian, Medical Devices, Tax Evasion, Surveillance, Manufacturing, Public Works, Sabotage, Immigration, Mobile / Cell Phone, Smart Phones, PDAs, Public Education, Real Estate, Wrongful Termination, Labor Dispute, Insurance, Architecture, Stock Pricing, Stock Ownership and many more.
  • It was a cold and rainy San Francisco afternoon. I sat sweating in the conference room of a gritty skyscraper downtown.

    It was a grey October day, the kind of day when a guy likes to cozy up next to a bank of servers to keep warm, when the Teacher first called me. "They think I'm nuts" were the words emanating from the phone. Well, just because you're paranoid doesn't mean they're not out to get you. I sat up and went to my desk, away from the noisy fans cooling off all those Gigahertzes. "What's the problem, Miss?"The young woman explained that she was a not-yet-tenured teacher in a New England (greyer there than here) high school with a problem. Seems that a student in one of her classes was repeating things in the classroom that she had uttered only the night

    A student asked me an interesting question today, regarding what I foresee in the field of computer forensics in the coming years: 5, 10, & 50. Having not thought about it before , my answers surprised me a bit.

    In the privacy of our studies, offices, libraries, or wherever it is we have our computers, it may seem that we are alone, with no one looking over our shoulders. But every document we draft, every step through the Internet we take, is creating tracks through the digital environment in our computers

    Check for SynapsUs
    Brooks Hilliard
    11811 North Tatum Boulevard
    Phoenix AZ 85028
    phone: 602-264-9263
    Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants.

    Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.

    Areas of Expertise:
  • Allegations of ERP and CRM system failures and/or defective business software/systems
  • Computer Forensics
  • Intellectual property
  • Valuation of computer hardware, software and services
  • Regulatory, Procurement and Tax matters
  • 4/7/2011 · Computers
    An property and casualty insurance agency acting as a managing general agent for several insurance lines sold through sub-agents throughout the United States had agreed to license a comprehensive agency management system from a developer of such software specifically developed for managing general agencies.

    2/21/2011 · Computers
    A distributor of products used in the health care industry invented a system and filed patents describing the system and associated methods.

    2/2/2011 · Computers
    A regional wholesale distributor of construction products was sold a manufacturing ERP system that the software developer and implementer claimed was capable of meeting its distribution needs.

    Check for SynapsUs
    Dr. Stephen Castell
    PO Box 334
    Witham CM8 3LP
    phone: 44-1621-891-776
    Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.

    As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
    8/18/2011 · Computers
    The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.

    6/23/2011 · Computers
    You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.

    10/9/2009 · Computers
    Synopsis of a Talk given to the Association of Independent Computer Specialists

    10/8/2009 · Computers
    Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?

    10/7/2009 · Computers
    The Negotiation Competition, now in its fifth year, is a contest open to all law students in England and Wales, designed to promote the skill of negotiation, a crucial component of ADR

    8/4/2004 · Computers
    I spent much of a whole year recently investigating why a major IT outsourcing deal broke down, and had given rise to the largest software contract dispute yet seen in the English High Court

    Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development

    Stephen Castell, PhD
    The Forensic Approach to assessing and dealing effectively with IT Projec Risks. TWO-DAY INTENSIVE SEMINAR, WORKSHOP AND CLINIC. NICE, CÔTE D'AZUR, FRANCE. 17th - 19th MARCH 2005
    Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
    The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
    Check for SynapsUs
    Steven Moshlak
    P.O. Box 232197
    Centreville VA, MD, DC 20120-8197
    phone: 202-262-0225
    "The Original" Computer Forensics Expert Witness
    and Trial Consultation Services
    A subsidiary of 21st Century Strategic Solutions Inc.
    P.O. Box 232197
    Centreville, VA
    (202) 262-0225

    Since 1984, is "The Original" Computer Forensics Expert Witness and Trial Consultation service in the area of computer forensics, analysis, electronic evidentiary and digital data recovery. We utilize our knowledge of the law; criminal, civil and military, with “State-of-the-Art" technologies, education and information technology and systems engineering experience to provide the services needed to support your litigation.

    We provide services in the Virginia, Maryland and DC Metro areas and nationwide.

    Our Services Include:
  • Expert Witness Testimony and Trial Consultation
  • Computer Forensics
  • Electronic Evidence
  • Evidentiary Digital Data Acquisition and Recovery
  • Computer Crime, Misuse and Internet Law
  • Child Exploitation and Pornography
  • Email Discovery and Recovery
  • Digital Rights Management (DRM)
  • Internet Crime and Fraud
  • Password and Data Decryption
  • Hidden Asset Search
  • Hard Drive Analysis, Recovery of Deleted, Encrypted or Damaged Files
  • Independent Technology Analysis and Valuation
  • SPAM or Unsolicited Commercial Email (UCE)
  • Peer-to-Peer (P2P) Networks and Networking Litigation
  • Pre-Litigation Consultation - Independent Second Opinion
  • Contract, Employment and Acceptable Use Policy
  • Loss of Property or Use - Hardware and Software
  • Qui Tam - "Whistleblower Act"
  • Probate
  • Bankruptcy
  • Sexual Harassment
  • Divorce Proceedings - Spousal / Child Support
  • UCMJ - Military Law
  • Advisement to Law and Policy-Makers

    Call the people whose name says what it means:
    (202) 262-0225
  • I receive many telephone calls and emails regarding questions about computer forensics expert witness services. I have created a frequently asked question list which is about fifteen pages long. What I have done is narrow the scope to the top ten items, which I believe is important in the selection and retention of a computer forensics expert witness, for your matter, with a brief explanation of each element.

    In order to explain what computer forensics is, a one day explanation is extremely difficult, since it is like story of the "Elephant and the Blind Men." The purpose of this article is to present what can happen in any day of the life of computer forensics expert. It is also a general overview of what is involved and is provided for informational use only, since every case has its own unique discriminators and does not cover the ancillary areas of computer forensics such as the areas of business development, continuing education, software selection, deposition testimony and general business administration.

    Check for SynapsUs
    Erik Laykin, CHFI, CEDS
    Managing Director
    10100 Santa Monica Blvd
    11th Floor
    Los Angeles CA 90067
    phone: 310-245-2902
    Erik Laykin, CHFI, CEDS, Managing Director in the Los Angeles office of Duff & Phelps, LLP, is an internationally recognized Computer Forensic, Electronic Discovery, and Cybercrime Expert. Mr. Laykin is the co-chair of the firm’s Global Electronic Discovery & Investigations practice. He focuses on high stakes eDiscovery, computer forensics and corporate investigations on behalf of law firms and corporations throughout the North America, Asia and Europe.

    An electronic discovery and computer forensic authority, Mr. Laykin has served as an expert witness throughout the United States in both Federal and state court and has also served as a court-appointed Special Master in matters involving complex eDiscovery and technology investigations. As the co-chair of the GEDI practice, Mr. Laykin directs large-scale corporate investigations and electronic discovery litigation. As a result of his investigations and expert testimony, he and his team have successfully solved/resolved cases valued in the hundreds of millions of dollars on behalf of Fortune 100 companies both domestically and abroad.

    Areas of Investigative Expertise:
    • Cyber-Crime
    • Electronic Fraud
    • Data Breaches
    • Trade Secret Theft
    • Trademark
    • Patent and Systems Design Infringement and Failure
    • Online Piracy
    • Corporate Espionage
    • White Collar Crime
    • Privacy and Data Loss
    • Intellectual Property Disputes
    • Complex Information Technology Disputes
    View Consulting Profile.
    Erik Laykin
    Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both domestically and abroad.
    Check for SynapsUs
    Monty G. Myers, PE
    3305 Northland Drive
    Suite 305
    Austin TX 78731
    phone: 512-459-9292
    Monty Myers Computer Software Expert PhotoMonty G. Myers, PE, is an active Software Industry Executive with 30+ years of experience, including the founding of Eureka Software Solutions, Inc. (“Eureka”) and acting as CEO of Eureka for 28 years.

    Mr. Myers has provided services to a balanced mix of plaintiffs and defendants in over 40 litigation matters ranging from billion dollar, landscape-changing lawsuits between worldwide industry leaders to smaller-scale litigation between individuals or local businesses. Mr. Myers' clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive.

    Litigation Support - Monty Myers is a Computer and Software Expert Witness, experienced and proven at offering expert testimony under-oath at trial, hearings, and depositions. For the last 5+ years, he has provided expert witness services for engagements including Software Patent or Software Trade Secret litigation matters.

    Mr. Myers is available as a consulting and/or testifying expert witness to assist with understanding the technology and technical issues in the case and providing review, analysis, and testimony (report, deposition, or courtroom) regarding the technology, software, or patents involved in the case. He has worked extensively with counsel in the taking and defending of depositions, reviewing and challenging the testimony of others, and assisting with and implementing an overall trial strategy.

    Areas of Expertise:
    • Source Code Review
    • Source Code Comparison
    • Source Code Reconstruction
    • Source Code Misappropriation / Theft
    • Source Code Copyright / Patents
    • Software Patents
    • Trade Marks
    • Trade Secrets
  • Antitrust
  • NDAs
  • Open Source Licensing
  • Computer Forensics
  • Mobile / Wireless Technology
  • Cloud and Web Business
  • Hardware / Infrastructure
  • Contract Performance / Project Management
  • Capabilities:
    • Adept at taking highly technical material and effectively communicating it to counsel, the judge or a jury in terms they can understand via testimony or reports/declarations
    • Skilled at reviewing and comparing software source code and functionality in the litigation context in relation to protected intellectual property including, trade secrets, copyrights, and patents and/or license or other contractual commitments and requirements
    • Able to reverse engineer and reconstruct hardware and software environments from backups, remnants, and fragments of deprecated software along with re-creating historical hardware and software environments
    • Highly familiar with functional and performance testing of software against applicable specifications, warranties, or industry standards using proprietary and commercial testing tools and techniques
    View Monty Myers' Consulting Profile.

    Eureka Software Client Logos
    Check for SynapsUs
    Yaniv Schiff
    226 S. Wabash Avenue,Suite 300
    Chicago IL 60604
    phone: 312-427-5667
    fax: 312-427-5668
    Based in Chicago, Illinois, Forensicon is a computer forensics firm specializing in electronic discovery, data recovery,financial investigations. theft of intellectual property, internal investigations, and employment litigation. We have worked with many Fortune 500 companies and the top law firms in the country have relied upon our work. Because of our central location close to two international airport hubs as well as several regional airports, Forensicon is situated to respond quickly to any request across the country in a matter of hours.
    Check for SynapsUs
    C. Matthew Curtin, CISSP
    Founder and CEO
    Columbus Headquarters
    5 E. Long St., 9th Floor
    Columbus OH 43215
    phone: 614-545-4225
    C. Matthew Curtin, CISSP Founder and CEO of Interhack is a Certified Information Systems Security Professional. An Expert in Computers and Information Technology, Mr. Curtin and his team at Interhack help attorneys and executives use data and computer technology in high-stakes situations.

    Mr. Curtin's work has been at the cutting edge of the intersection of law and technology. The U.S. Court of Appeals for the First Circuit relied on Interhack's forensic computing practice and Mr. Curtin's expert opinion when it established standards for application of Federal wiretap statutes to Web technology, In re Pharmatrak Privacy Litigation (see link above). Academic references to their work include the Stanford Law Review and university courses throughout the world.

    Mr. Curtin maintains a regular academic appointment as a Senior Lecturer at The Ohio State University's Department of Computer Science and Engineering. He currently chairs the Recruitment subcommittee of the Business Advisory Network that advises the Ohio Department of Education's standards for technology education in secondary and postsecondary schools throughout the state.

    C. Matthew Curtin's services are available for plaintiffs, defendants, and for the courts directly on technical matters.

    Areas of Forensic Expertise:
    • Electronic Discovery
    • Preservation and Forensic Analysis of Data
    • Complex Analysis of Non-Standard Data Sets
    • Investigations
    • Data Breaches
    View Mr. Curtin's Consulting Profile.
    Matthew Curtin
    This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
    Matthew Curtin, Peter G. Neumann
    Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
    Check for SynapsUs
    Dr. George Edwards
    Computer Scientist
    7958 Beverly Blvd
    Los Angeles CA 90046
    phone: 323-545-3933
    George EdwardsDr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.

    Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.

    Dr. Edwards teaches a graduate-level course on software engineering at the University of Southern California.

    Dr. Edwards provides expert consulting in the following areas:
    • Intellectual property and patent infringement
    • Software design/source code audit and review
    • Non-performance claims
    • Expert witness and depositions
    Dr. Edwards is an expert in the following technologies :
    • Programming languages & platforms: Java, C/C++, C#, Perl, Python, PHP, .NET, WinForms, WPF, Visual Studio, Eclipse, Java EE, CORBA
    • Internet and web: JavaScript, AJAX, Node.js, Ruby, HTML, XML, CSS, ASP.NET
    • Mobile devices & applications: Android, iOS, iPhone, Windows Mobile, Windows Phone, BlackBerry, Palm OS, Java ME
    • Multimedia: MPEG, SVG, DVR, Silverlight, Flash
    • Operating systems & servers: UNIX, Linux, Windows, Mac OS
    • Networking: IMAP, POP, SMTP, DNS, TCP/IP, HTTP
    • Databases: RDBMS, SQL, MS SQL Server, MS Access, Oracle, MySQL
    • Project management & development methods: Kanban, Lean software development, agile, object-oriented (OO), aspect-oriented programming (AOP), component-based development, COTS integration, requirements engineering, spiral model, UML
    View Consulting Profile.
    7/10/2012 · Patents
    The importance of software patents has increased dramatically in recent years. The high profile patent disputes between Apple, Google, and other smartphone companies have attracted the most attention in the press, but patent battles are being waged all across the software industry.

    Check for SynapsUs
    David Shaw
    9 Wimpole Street
    London W1G 9SG
    phone: 44-207-193-8355
    David Shaw is an independent Technical and ICT Expert and Consultant involved in a wide range of high profile System, Integrations, remedial work on Failed Systems and Programs, Litigation, Expert Witness, Mergers and Acquisitions, Financial and Ultra-High Speed Trading Systems, Cyberwarfare and Defence work.

    Services Offered:
  • Governance
  • Strategy
  • Programme Definition
  • Capability
  • Enterprise Architecture
  • Process Engineering
  • Portfolio Management
  • Programme Management Office Implementation
  • Individual Assignments
  • Check for SynapsUs
    Steven Mains, PhD, Colonel US Army (R)
    CEO and Managing Partner
    VA USA
    phone: 757-814-3598
    Steven Mains, PhD, is an Operations Research-trained Cybersecurity Analyst, Planner, and Operator who is expert in counterterrorism, critical infrastructure protection, intelligence, risk management, and cyber-security issues.

    Experience: - A Retired Colonel for the United States Army, Dr. Mains' spent his career in Military and civilian business developing cyber intelligence to identify threats and protecting networks. He was responsible for developing cyber offensive and defensive activities for US Central Command (responsible for activities in the Middle East and South Asia) during the ongoing War on Terror.

    Consulting / Litigation Support - Dr. Mains provides expert witness and consulting services in the areas of Computer Security, Infrastructure Protection, Network Defense, Computer Forensics and Risk Mitigation. His litigation support services are offered to counsel representing both Plaintiff and Defendant. His consulting services have been offered to such clients as US Special Operations Command, Boeing/SAIC, Leidos, Booz Allen Hamilton, Gemini, SRC, NASA, CACI, and Eaton Corporation. His expertise is available both nationally and internationally.

    Specialty Areas:
    • Information Operations: Network Defense and Computer Forensics, Influence Campaign planning and implementation, Network Attack, and Information Assurance
    • Counter-terrorism
    • Real-time creation, collection, analysis and dissemination of knowledge
    • Knowledge Management
    • Integration of new technologies and social networking into influence campaigns
    • Planning and implementing organizational change
    • Rigorous experimentation on alternative concepts and organizations
    Degrees / Certifications
    • PhD in Computer Science (Artificial Intelligence) from the College of William and Mary developing agent-based models to optimize solutions across a hyper-sized solution space
    • CompTIA Security+ Certified
    • MPhil in Defence and International Studies, University of Madras, India
    • Master of Science in Computational Operations Research, College of William and Mary
    • Master of Science in Systems Management, University of Denver
    • Bachelor of Science in Civil Engineering/Arabic US Military Academy, West Point NY
    • Graduate of the Indian National Defence College