Analysis Of Audio / Video Evidence Digital Enhancement / Restoration Voice Identification / Elimination Event / Sound Identification Expert Testimony / Consultation Piracy / Copyright Infringement Transcription
Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants. Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.
Areas of Expertise:
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies. As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Ian Cullimore, PhD, has over 30 years of hands-on Software and Hardware Development experience. He specializes in handheld devices, palmtops, PDAs, low power embedded systems, and Internet server technologies.
Background - Dr. Cullimore has held many employment and consulting posts as a software/hardware developer and inventor. He invented the world's first pocket PC which he licensed to Atari as the 'Portfolio'. He is also the co-inventor of the 'Poqet PC', acquired by Fujitsu. Dr. Cullimore is an experienced hi-tech CEO/CTO, yet still very hands-on with respect to architecture and coding. He has many years of experience both in the UK and California (Silicon Valley and LA) in companies ranging from small startups to large corporations, and in building and managing software and hardware teams.
An entrepreneur and start-up and young company specialist, Dr. Cullimore has helped to raise Angel and VC rounds, and has taken startups to exit. He has much experience interfacing with Boards, Investors, and sales/marketing/bizdev groups.
Litigation Support - Dr. Cullimore has a long track record as a Patent and Software / Hardware Expert Witness. His experience includes 19 cases, 16 written Expert Reports, 7 Depositions, and 1 trial. His services are available to attorneys for both plaintiff and defendant.
Areas of Expertise:
Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense.
Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully.
Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe.
Interhack's Cybersecurity Practice helps you to defend your organization.
Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets.
The Interhack system of Cybersecurity Services has six parts.
Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities.
Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize.
Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards.
Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation.
Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have.
Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.