banner ad

Network Monitoring Expert Witnesses

Sort Non-Featured Profiles by
Check for SynapsUs
Dr. Stephen Castell
PO Box 334
Witham CM8 3LP
GBR
phone: 44-1621-891-776
stephen_castell_logo.jpg
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.

As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
8/18/2011 · Computers
The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.

6/23/2011 · Computers
You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.

10/9/2009 · Computers
Synopsis of a Talk given to the Association of Independent Computer Specialists

10/8/2009 · Computers
Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?

10/7/2009 · Computers
The Negotiation Competition, now in its fifth year, is a contest open to all law students in England and Wales, designed to promote the skill of negotiation, a crucial component of ADR

8/4/2004 · Computers
I spent much of a whole year recently investigating why a major IT outsourcing deal broke down, and had given rise to the largest software contract dispute yet seen in the English High Court

Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development

Stephen Castell, PhD
The Forensic Approach to assessing and dealing effectively with IT Projec Risks. TWO-DAY INTENSIVE SEMINAR, WORKSHOP AND CLINIC. NICE, CÔTE D'AZUR, FRANCE. 17th - 19th MARCH 2005
12/7/2009
Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
10/8/2009
The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
Check for SynapsUs
C. Matthew Curtin, CISSP
Founder and CEO
Columbus Headquarters
5 E. Long St., 9th Floor
Columbus OH 43215
USA
phone: 614-545-4225
matt-curtin-photo.jpg
C. Matthew Curtin, CISSP Founder and CEO of Interhack is a Certified Information Systems Security Professional. An Expert in Computers and Information Technology, Mr. Curtin and his team at Interhack help attorneys and executives use data and computer technology in high-stakes situations.

Mr. Curtin's work has been at the cutting edge of the intersection of law and technology. The U.S. Court of Appeals for the First Circuit relied on Interhack's forensic computing practice and Mr. Curtin's expert opinion when it established standards for application of Federal wiretap statutes to Web technology, In re Pharmatrak Privacy Litigation (see link above). Academic references to their work include the Stanford Law Review and university courses throughout the world.

Mr. Curtin maintains a regular academic appointment as a Senior Lecturer at The Ohio State University's Department of Computer Science and Engineering. He currently chairs the Recruitment subcommittee of the Business Advisory Network that advises the Ohio Department of Education's standards for technology education in secondary and postsecondary schools throughout the state.

C. Matthew Curtin's services are available for plaintiffs, defendants, and for the courts directly on technical matters.

Areas of Forensic Expertise:
  • Electronic Discovery
  • Preservation and Forensic Analysis of Data
  • Complex Analysis of Non-Standard Data Sets
  • Investigations
  • Data Breaches
View Mr. Curtin's Consulting Profile.
Matthew Curtin
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Matthew Curtin, Peter G. Neumann
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
Check for SynapsUs
Dr. George Edwards
Computer Scientist
7958 Beverly Blvd
Los Angeles CA 90046
USA
phone: 323-545-3933
quandary-peak-research-logo.jpg
George EdwardsDr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.

Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.

Dr. Edwards teaches a graduate-level course on software engineering at the University of Southern California.

Dr. Edwards provides expert consulting in the following areas:
  • Intellectual property and patent infringement
  • Software design/source code audit and review
  • Non-performance claims
  • Expert witness and depositions
Dr. Edwards is an expert in the following technologies :
  • Programming languages & platforms: Java, C/C++, C#, Perl, Python, PHP, .NET, WinForms, WPF, Visual Studio, Eclipse, Java EE, CORBA
  • Internet and web: JavaScript, AJAX, Node.js, Ruby, HTML, XML, CSS, ASP.NET
  • Mobile devices & applications: Android, iOS, iPhone, Windows Mobile, Windows Phone, BlackBerry, Palm OS, Java ME
  • Multimedia: MPEG, SVG, DVR, Silverlight, Flash
  • Operating systems & servers: UNIX, Linux, Windows, Mac OS
  • Networking: IMAP, POP, SMTP, DNS, TCP/IP, HTTP
  • Databases: RDBMS, SQL, MS SQL Server, MS Access, Oracle, MySQL
  • Project management & development methods: Kanban, Lean software development, agile, object-oriented (OO), aspect-oriented programming (AOP), component-based development, COTS integration, requirements engineering, spiral model, UML
View Consulting Profile.
7/10/2012 · Patents
The importance of software patents has increased dramatically in recent years. The high profile patent disputes between Apple, Google, and other smartphone companies have attracted the most attention in the press, but patent battles are being waged all across the software industry.

Check for SynapsUs
Steven Mains, PhD, Colonel US Army (R)
CEO and Managing Partner
VA USA
phone: 757-814-3598
Steven-Mains-Information-Operations-Expert-Photo.jpg
Steven Mains, PhD, is an Operations Research-trained Cybersecurity Analyst, Planner, and Operator who is expert in counterterrorism, critical infrastructure protection, intelligence, risk management, and cyber-security issues.

Experience: - A Retired Colonel for the United States Army, Dr. Mains' spent his career in Military and civilian business developing cyber intelligence to identify threats and protecting networks. He was responsible for developing cyber offensive and defensive activities for US Central Command (responsible for activities in the Middle East and South Asia) during the ongoing War on Terror.

Consulting / Litigation Support - Dr. Mains provides expert witness and consulting services in the areas of Computer Security, Infrastructure Protection, Network Defense, Computer Forensics and Risk Mitigation. His litigation support services are offered to counsel representing both Plaintiff and Defendant. His consulting services have been offered to such clients as US Special Operations Command, Boeing/SAIC, Leidos, Booz Allen Hamilton, Gemini, SRC, NASA, CACI, and Eaton Corporation. His expertise is available both nationally and internationally.

Specialty Areas:
  • Information Operations: Network Defense and Computer Forensics, Influence Campaign planning and implementation, Network Attack, and Information Assurance
  • Counter-terrorism
  • Real-time creation, collection, analysis and dissemination of knowledge
  • Knowledge Management
  • Integration of new technologies and social networking into influence campaigns
  • Planning and implementing organizational change
  • Rigorous experimentation on alternative concepts and organizations
Degrees / Certifications
  • PhD in Computer Science (Artificial Intelligence) from the College of William and Mary developing agent-based models to optimize solutions across a hyper-sized solution space
  • CompTIA Security+ Certified
  • MPhil in Defence and International Studies, University of Madras, India
  • Master of Science in Computational Operations Research, College of William and Mary
  • Master of Science in Systems Management, University of Denver
  • Bachelor of Science in Civil Engineering/Arabic US Military Academy, West Point NY
  • Graduate of the Indian National Defence College