banner ad

Data Management / Recovery Expert Witnesses

Sort Non-Featured Profiles by
< 1 2 >
Check for SynapsUs
Bryan Neumeister
Certified Audio & Video Forensic Expert
44 W. Monroe Street
Penthouse # 3302
Phoenix AZ 85003
USA
phone: 602-740-6128
USA-Forensic-logo.jpg
Bryan NeumeisterBryan Neumeister, CEO of USA Forensics, is a court certified Audio and Video Forensic Expert. Mr. Neumeister has over 34 years of professional experience Clarifying Videos, Still Pictures (film and digital), and Audio Recordings so that jurors can better see and hear evidence. With studios and forensic equipment more advanced than most Federal Agencies, he is able video to large format still pictures for use as Exemplars.

Mr. Neumeister presents high resolution video in court to explain Procedure or Evidence of Tampering to juries. Using 3D Sonograph and Spectrograph printouts, he can also spot and visually explain the “altering of tapes." His Video Recreations have been honored at the Canne Film Festival and have received 39 Emmy Awards from the National Association of Television Arts and Sciences for Technical Excellence.

Mr. Neumeister has worked on over 200 Forensic Cases since 2010. His non-military court cases include: RICO, Murder, Murder for Hire, Fraud, Robbery, Armed Robbery, Assault with a Deadly Weapon, Arson, Kidnapping, Bank Robbery, DUI, DWI, Civil Cases...etc. He is certified in Military, Federal, State, Civil, and Aviation court.

Large Cases include:
  • US Government vs. Charles Keating - Retained as Video Expert
  • State of Arizona vs. Jodi Arias - Retained as Audio and Photography Expert
  • US Grand Jury: The Hope Steffy Case – Video Expert
  • US Government vs. Charles Keating III - Retained as Video Expert
  • US Federal Government vs. State of AZ. - King Case as Video Expert
  • Currently: Encrypted Department of Justice Case
Areas of Expertise:
  • Audio & Video Analysis
  • Voice Enhancement, Verification, Authentication
  • Forensic Voice Comparison
  • Forensic Linguistics
  • Video Enhancement
  • Aerial Surveillance
  • Still Photography Enhancement
  • Video Up-Resolution to HD Court Exemplars
  • Facial Comparisons / Recognition
  • Emmy Award Winning Crime Scene Recreations
  • Certifications and Affiliations:ACFE, ABRE, APA, NATAS, BMI, ASCAP, AES, ACFEi, PSA, NAB

    View Bryan Neumeister's Consulting Profile.
    We've all seen the TV crime shows where the forensic technician opens the grainy surveillance, then zooms in on a tiny face, license plate or scrap of paper, hits the enhance button and, magically, the image becomes sharp and clear (accompanied by appropriate background music).

    Check for SynapsUs
    Bhuvan Urgaonkar, PhD
    Available Nationally and Internationally
    W371 Westgate Building
    University Park PA 16802
    USA
    phone: 814-933-7211
    Bhuvan-Urgaonkar-Computer-Science-Expert-Photo.jpg
    Bhuvan Urgaonkar, PhD, has over 15 years of experience in the field of Software Engineering and Computers. His work includes research in computer systems software, distributed computing (including systems such as Zookeeper, Redis, Memcached, Cassandra, Kafka), datacenters, cloud computing, storage systems, energy efficiency of computers and datacenters, big data (including systems such as Hadoop, Spark).

    Dr. Urgaonkar has published over 80 research papers in competitive peer-reviewed conferences and journals on these topics with several best paper awards. He has procured research funding totaling more than $3 Million USD from federal agencies and industrial labs (Google, HP, IBM, Cisco, Microsoft, Amazon) to lead and train several Phd and MS students who now work in industry and academia. Dr. Urgaonkar has also delivered lectures on topics including Cloud Computing and Data Centers to Faculty at Microsoft and numerous other technology companies and universities around the world.

    Education / Training: Ph.D. in Computer Science from the University of Massachusetts Amherst (2005) B.Tech (honors) in Computer Science and Engineering from the Indian Institute of Technology, Kharagpur, India

    Awards / Honors: Test of Time Award, ACM Sigmetrics 2016 National Science Foundation Career award, 2010 IBM Faculty Fellowships, 2016, 2014 Several best paper awards (see CV)

    Litigation Support - Dr. Urgaonkar serves as an expert / technical consultant with multiple firms helping them (i) understand technical content related to state of the art products in areas such as content distribution, distributed computing, datacenter design, among others and (ii) interpret patents in these areas and connections between them and state of the art products and services. Services are available to law firms, government agencies, schools, firms / corporations, and hospitals. They include case review, deposition, and trial testimony as needed.

    Areas of Expertise:
    • Software Design and Analysis
    • Computer Systems
    • Operating Systems
    • File Systems
    • Databases
    • Computer Security
    • Performance
    • Distributed Computing
    • Data Centers
    • Cloud Computing
    • Big Data Systems
    • Web
  • Internet
  • Content Distribution Networks
  • Software Reliability and Testing
  • Fault Tolerance
  • Hadoop
  • Spark
  • Kubernetes
  • Linux
  • AWS
  • Azure
  • Machine Learning
  • Scheduling
  • 7/20/2018 · Computers
    Recent technological advances in the development of flashmemory based devices have consolidated their leadership position as the preferred storage media in the embedded systems market and opened new vistas for deployment in enterprise-scale storage systems. Unlike hard disks, flash devices are free from any mechanical moving parts, have no seek or rotational delays and consume lower power. However, the internal idiosyncrasies of flash technology make its performance highly dependent on workload characteristics. The poor performance of random writes has been a cause of major concern which needs to be addressed to better utilize the potential of flash in enterprise-scale environments. We examine one of the important causes of this poor performance: the design of the Flash Translation Layer (FTL) which performs the virtual-to-physical address translations and hides the erase-before-write characteristics of flash. We propose a complete paradigm shift in the design of the core FTL engine from the existing techniques with our Demand-based Flash Translation Layer (DFTL) which selectively caches page-level address mappings. We develop a flash simulation framework called FlashSim. Our experimental evaluation with realistic enterprise-scale workloads endorses the utility of DFTL in enterprise-scale storage systems by demonstrating: (i) improved performance, (ii) reduced garbage collection overhead and (iii) better overload behavior compared to state-of-the-art FTL schemes. For example, a predominantly random-write dominant I/O trace from an OLTP application running at a large financial institution shows a 78% improvement in average response time (due to a 3-fold reduction in operations of the garbage collector), compared to a state-of-the-art FTL scheme. Even for the well-known read-dominant TPC-H benchmark, for which DFTL introduces additional overheads, we improve system response time by 56%.

    6/27/2018 · Computers
    Cloud-based hosting promises cost advantages over conventional in-house (on-premise) application deployment. One important question when considering a move to the cloud is whether it makes sense for 'my' application to migrate to the cloud. This question is challenging to answer due to following reasons. Although many potential benefits of migrating to the cloud can be enumerated, some benefits may not apply to 'my' application. Also, there can be multiple ways in which an application might make use of the facilities offered by cloud providers. Answering these questions requires an in-depth understanding of the cost implications of all the possible choices specific to 'my' circumstances. In this study we identify an initial set of key factors affecting the costs of a deployement choice. Using benchmarks representing two different applications (TPC-W and TPC-E) we investigate the evolution of costs for different deployment choices. We show that application characteristics such as workload intensity, growth rate, storage capacity and software licensing costs produce complex combined effect on overall costs. We also discuss issues regarding workload variance and horizontal partitioning.

    6/7/2018 · Computers
    In this paper, we present techniques for provisioning CPU and network resources in shared hosting platforms running potentially antagonistic third-party applications. The primary contribution of our work is to demonstrate the feasibility and benefits of overbooking resources in shared platforms, to maximize the platform yield: the revenue generated by the available resources. We do this by first deriving an accurate estimate of application resource needs by profiling applications on dedicated nodes, and then using these profiles to guide the placement of application components onto shared nodes. By overbooking cluster resources in a controlled fashion, our platform can provide performance guarantees to applications even when overbooked, and combine these techniques with commonly used QoS resource allocation mechanisms to provide application isolation and performance guarantees at run-time.

    Check for SynapsUs
    Todd Stefan
    Executive Vice President
    8391 Beverly Blvd. #167
    Los Angeles CA 90048
    USA
    phone: 800-748-5440
    setec_logo.gif
    Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis and litigation support services to assist in the investigation, handling, and prosecution of computer-related crimes or misuse.

    Setec Investigations combines today's most advanced computer forensics and litigation support expertise with a business- and legal-friendly approach, resulting in a sound analytical foundation that carefully balances critical investigative requirements with vital legal and evidentiary needs.

    Setec Investigations incorporates a cross-disciplinary team comprised of computer forensic investigators, attorneys, law enforcement specialists, and seasoned business professionals who have established a proven track record of success since 1997.

    Services Overview

    Setec Investigations possesses the necessary combination of technical expertise, understanding of the legal system, and specialized tools and processes enabling the discovery, collection, investigation, and production of electronic information for investigating and handling computer-related crimes or misuse.

    Explore our range of service offerings:

    Computer Forensic Investigations

    Computer forensics and enterprise investigation services identify, gather, analyze, and preserve electronic evidence to establish a sustainable posture for internal or legal action.

    Electronic Discovery

    Manage large volumes of electronic data and quickly identify and isolate electronic evidence that is critical to the success of a litigation.

    Litigation Support

    Legal consultants and attorneys translate litigation issues into strong case strategies that effectively utilize electronic evidence.

    Expert Witness

    Supports the resolution of security incidents and active litigations by offering impartial and independent expert testimony, opinions, and customized reports in legal proceedings.

    11/16/2005 · Computer Forensics
    Identifying pertinent evidence on computer systems is essential to the discovery process in today's world, as it is believed that over 70% of information stored in computer systems is never reproduced in hard copy form

    11/12/2004 · Computer Forensics
    It is estimated that over 90% of all documents are now created electronically, although most of them are never printed; therefore, legal professionals are being challenged by a drastic increase in electronic evidence

    Check for SynapsUs
    Dr. George Edwards
    Computer Scientist
    7958 Beverly Blvd
    Los Angeles CA 90046
    USA
    phone: 323-545-3933
    quandary-peak-research-logo.jpg
    George EdwardsDr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.

    Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.

    Dr. Edwards teaches a graduate-level course on software engineering at the University of Southern California.

    Dr. Edwards provides expert consulting in the following areas:
    • Intellectual property and patent infringement
    • Software design/source code audit and review
    • Non-performance claims
    • Expert witness and depositions
    Dr. Edwards is an expert in the following technologies :
    • Programming languages & platforms: Java, C/C++, C#, Perl, Python, PHP, .NET, WinForms, WPF, Visual Studio, Eclipse, Java EE, CORBA
    • Internet and web: JavaScript, AJAX, Node.js, Ruby, HTML, XML, CSS, ASP.NET
    • Mobile devices & applications: Android, iOS, iPhone, Windows Mobile, Windows Phone, BlackBerry, Palm OS, Java ME
    • Multimedia: MPEG, SVG, DVR, Silverlight, Flash
    • Operating systems & servers: UNIX, Linux, Windows, Mac OS
    • Networking: IMAP, POP, SMTP, DNS, TCP/IP, HTTP
    • Databases: RDBMS, SQL, MS SQL Server, MS Access, Oracle, MySQL
    • Project management & development methods: Kanban, Lean software development, agile, object-oriented (OO), aspect-oriented programming (AOP), component-based development, COTS integration, requirements engineering, spiral model, UML
    View Consulting Profile.
    7/10/2012 · Patents
    The importance of software patents has increased dramatically in recent years. The high profile patent disputes between Apple, Google, and other smartphone companies have attracted the most attention in the press, but patent battles are being waged all across the software industry.

    Check for SynapsUs
    C. Matthew Curtin, CISSP
    Founder and CEO
    Columbus Headquarters
    5 E. Long St., 9th Floor
    Columbus OH 43215
    USA
    phone: 614-545-4225
    matt-curtin-photo.jpg
    C. Matthew Curtin, CISSP Founder and CEO of Interhack is a Certified Information Systems Security Professional. An Expert in Computers and Information Technology, Mr. Curtin and his team at Interhack help attorneys and executives use data and computer technology in high-stakes situations.

    Mr. Curtin's work has been at the cutting edge of the intersection of law and technology. The U.S. Court of Appeals for the First Circuit relied on Interhack's forensic computing practice and Mr. Curtin's expert opinion when it established standards for application of Federal wiretap statutes to Web technology, In re Pharmatrak Privacy Litigation (see link above). Academic references to their work include the Stanford Law Review and university courses throughout the world.

    Mr. Curtin maintains a regular academic appointment as a Senior Lecturer at The Ohio State University's Department of Computer Science and Engineering. He currently chairs the Recruitment subcommittee of the Business Advisory Network that advises the Ohio Department of Education's standards for technology education in secondary and postsecondary schools throughout the state.

    C. Matthew Curtin's services are available for plaintiffs, defendants, and for the courts directly on technical matters.

    Areas of Forensic Expertise:
    • Electronic Discovery
    • Preservation and Forensic Analysis of Data
    • Complex Analysis of Non-Standard Data Sets
    • Investigations
    • Data Breaches
    View Mr. Curtin's Consulting Profile.
    Matthew Curtin
    This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
    Matthew Curtin, Peter G. Neumann
    Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
    Check for SynapsUs
    Yaniv Schiff
    Director Digital Forensics
    309 W. Washington St., Ste. 1300
    Chicago IL 60606
    USA
    phone: 312-427-5667
    fax: 312-427-5668
    Based in Chicago, Illinois, Forensicon is the Digital Forensics Division of QDiscovery. We specialize in data recovery, financial investigations, theft of intellectual property, internal investigations, security breaches, and employment litigation. As a QDiscovery company, we offer a full suite of eDiscovery and litigation support services, including electronic data processing, hosting in Relativity and Viewpoint, managed document review, trial presentation and much more. This broad range of services enable you to keep your entire litigation matter with a single service provider from the initial stages of a data misappropriation investigation all the way through trial and resolution.
    Check for SynapsUs
    Henry Flores, PhD
    3111 Alamo Creek Circle
    San Antonio TX 78230
    USA
    phone: 210-846-8260
    FloreStat-LLC-Logo.jpg
    Henry Flores Employment Law Statistics Expert PhotoHenry Flores, PhD, has over 30 years of experience in Data Management, Data Mining, and Statistical Analysis. A Distinguished University Research Professor, he also teaches Political Science and International Relations at St. Mary’s University in San Antonio, Texas.

    Select Background Experience - A member of the Institute for Public Administration, Politics, and Public Policy, Dr. Flores has conducted national election exit polls and local telephone polls for numerous elections. He has provided consultations on environmental contamination issues and developed methodologies for enumeration of homeless communities.

    Dr. Flores has also served as outside evaluator to Nielsen Media Research on the construction of their sampling frames and population samples. He also assisted in the assessment of Nielsen’s household targeting methods and techniques.

    Litigation Support - Dr. Flores has served as an expert witness in more than 50 federal Voting and Civil Rights Lawsuits. He has acted primarily as a plaintiff witness in Election Law and Challenges and as a defense witness in Employment Law and Criminal cases. His services include data and statistics, depositions, trial testimony, jury selection, and change of venue. He is fluent in English and Spanish.

    Areas of Expertise:
    • Statistical Analysis
    • Data Mining
    • Employment Law
    • Workforce Analysis
    • Election Law / Voting Rights
    • Voting Rights Act
  • Racial Discrimination
  • Age Discrimination
  • Gender Discrimination
  • Statistical Forensics Accreditation Cases
  • Economic Development Analysis
  • Wills and Estates Cost Analysis
  • View Dr. Flores' Consulting Profile.
    Check for SynapsUs
    Monty G. Myers, PE
    3305 Northland Drive
    Suite 305
    Austin TX 78731
    USA
    phone: 512-459-9292
    Eureka-Software-logo.jpg
    Monty Myers Computer Software Expert PhotoMonty G. Myers, PE, is an active Software Industry Executive with 30+ years of experience, including the founding of Eureka Software Solutions, Inc. (“Eureka”) and acting as CEO of Eureka for 28 years.

    Mr. Myers has provided services to a balanced mix of plaintiffs and defendants in over 40 litigation matters ranging from billion dollar, landscape-changing lawsuits between worldwide industry leaders to smaller-scale litigation between individuals or local businesses. Mr. Myers' clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive.

    Litigation Support - Monty Myers is a Computer and Software Expert Witness, experienced and proven at offering expert testimony under-oath at trial, hearings, and depositions. For the last 5+ years, he has provided expert witness services for engagements including Software Patent or Software Trade Secret litigation matters.

    Mr. Myers is available as a consulting and/or testifying expert witness to assist with understanding the technology and technical issues in the case and providing review, analysis, and testimony (report, deposition, or courtroom) regarding the technology, software, or patents involved in the case. He has worked extensively with counsel in the taking and defending of depositions, reviewing and challenging the testimony of others, and assisting with and implementing an overall trial strategy.

    Areas of Expertise:
    • Source Code Review
    • Source Code Comparison
    • Source Code Reconstruction
    • Source Code Misappropriation / Theft
    • Source Code Copyright / Patents
    • Software Patents
    • Trade Marks
    • Trade Secrets
  • Antitrust
  • NDAs
  • Open Source Licensing
  • Computer Forensics
  • Mobile / Wireless Technology
  • Cloud and Web Business
  • Hardware / Infrastructure
  • Contract Performance / Project Management
  • Capabilities:
    • Adept at taking highly technical material and effectively communicating it to counsel, the judge or a jury in terms they can understand via testimony or reports/declarations
    • Skilled at reviewing and comparing software source code and functionality in the litigation context in relation to protected intellectual property including, trade secrets, copyrights, and patents and/or license or other contractual commitments and requirements
    • Able to reverse engineer and reconstruct hardware and software environments from backups, remnants, and fragments of deprecated software along with re-creating historical hardware and software environments
    • Highly familiar with functional and performance testing of software against applicable specifications, warranties, or industry standards using proprietary and commercial testing tools and techniques
    View Monty Myers' Consulting Profile.

    Eureka Software Client Logos
    Check for SynapsUs
    Johnette Hassell
    President
    141 Robert E. Lee Blvd.,Suite 108
    New Orleans LA 70124-2534
    USA
    phone: 504-483-0201
    Electronic Evidence Retrieval provides computer forensic, e-discovery, & software intellectual property services nationwide.

    EER President Dr. Johnette Hassell, a recognized expert in computer forensics, e-discovery, & software IP, has more than 30 years experience in litigation support & consulting. She also provides seminars for attorneys and clients on computer forensics and e-discovery.

    EER assists in all stages of case building, including:

    • Determining if a suspect computer is likely to yield useful data

    • Drafting appropriate language for/assisting in preparing and responding to, interrogatories and RFPs

    • Preparing for Rule 26 conferences and Markman hearings

    • Recovering and analyzing data that is accessible only through forensic techniques

    • Evaluating “substantial similarity” and validity & infringement in software copyright & patent matters

    • Evaluating electronic document authenticity

    • Preparing court reports & expert testimony

    When the Lieutenant on a television show--usually at a murder scene--says, "Get forensics in here!" the viewer knows what to expect.

    Discovery. Law schools teach the importance of, and methods for, effective discovery. However, in today's world, discovery regularly involves electronic information, a specialized field not generally addressed in law school

    Check for SynapsUs
    Erik Laykin, CHFI, CEDS
    Managing Director
    10100 Santa Monica Blvd
    11th Floor
    Los Angeles CA 90067
    USA
    phone: 310-245-2902
    erik-laykin-photo.jpg
    Erik Laykin, CHFI, CEDS, Managing Director in the Los Angeles office of Duff & Phelps, LLP, is an internationally recognized Computer Forensic, Electronic Discovery, and Cybercrime Expert. Mr. Laykin is the co-chair of the firm’s Global Electronic Discovery & Investigations practice. He focuses on high stakes eDiscovery, computer forensics and corporate investigations on behalf of law firms and corporations throughout the North America, Asia and Europe.

    An electronic discovery and computer forensic authority, Mr. Laykin has served as an expert witness throughout the United States in both Federal and state court and has also served as a court-appointed Special Master in matters involving complex eDiscovery and technology investigations. As the co-chair of the GEDI practice, Mr. Laykin directs large-scale corporate investigations and electronic discovery litigation. As a result of his investigations and expert testimony, he and his team have successfully solved/resolved cases valued in the hundreds of millions of dollars on behalf of Fortune 100 companies both domestically and abroad.

    Areas of Investigative Expertise:
    • Cyber-Crime
    • Electronic Fraud
    • Data Breaches
    • Trade Secret Theft
    • Trademark
    • Patent and Systems Design Infringement and Failure
    • Online Piracy
    • Corporate Espionage
    • White Collar Crime
    • Privacy and Data Loss
    • Intellectual Property Disputes
    • Complex Information Technology Disputes
    View Consulting Profile.
    Erik Laykin
    Accountants, CEOs, and other financial professionals need to understand how to leverage the newly emerging tools of computer forensics to protect assets, investigate fraud, and win the case. Investigative Computer Forensics takes the purely scientific aspects of classic computer forensics and marries them to the practical side of investigations and the pursuit of digital evidence in the course of litigation. It provides financial professionals with the necessary practical aids, case examples, and skills needed to leverage computer forensics during eDiscovery and investigations both domestically and abroad.
    Check for SynapsUs
    Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC
    Chief Forensic Analyst
    4790 Caughlin Pkwy., #223
    Reno NV 89519
    USA
    phone: 702-331-8686
    Discovery-Technician-Logo.jpg
    Ira Victor Cybersecurity Expert PhotoIra Victor is the Discovery Technician, practitioner of digital forensics for 25 years. He has extensive background in the following areas:
    • Digital forensics, the examination of data residing on a computer or network to determine events that occurred in the past;
    • E-discovery and preservation of Electronically Stored Information (ESI);
    • Incident Response, the recovery of lost data after a cybercrime, natural disaster, or other business disruption;
    • Information security, the practice of preventing data loss;
    Case consulting and/or expert witness experience:
    • Medical malpractice, personal injury, wrongful death, business espionage, escrow fraud; insurance defense, real property, family/divorce, social media abuse; criminal defense;
    • Strategic use of electronic evidence and ESI;
    • Efficient electronic evidence preservation to contain costs;
    • Experience as consultant or expert witness in California, Mississippi, New Mexico, New York, and Nevada;
    Additional professional activities:
    • Teaches CLE classes for attorneys through the Washoe and Clark County Bar Associations, and the Nevada Justice Association.
    • Public speaking engagements on cybercrime prevention.
    • Named on six U.S. patents in email security and information security, with one additional information security patent pending.
    Education and Relevant Certifications:
    Six (6) active certifications from globally-recognized certification bodies:
    • Global Information Assurance Certification body (GIAC)
    • ISACA, Formerly known as Information Systems Audit and Control Association
    Undergraduate degree: Bachelor of Arts, Temple University

    Areas of Expertise:
    • E-discovery
    • Electronically Stored Information (ESI)
    • Computers and Mobile Devices
    • Vehicle Electronics
    • Electronic Banking
    • Email
    • Title fraud
    • Wire fraud
    • Electronic Medical Records (EMR)
    • Electronic Health Records (EHR)
  • Video Forensics
  • Hacking
  • Ecommerce
  • Cybersecurity
  • Cybercrime (also: cyber crime)
  • Data Recovery
  • Digital Forensics
  • Metadata
  • Information Security
  • Information Governance
  • 5/18/2018 · Digital Forensics
    Habeas Hard Drive gives a thumbs up to Losing the Signal: The Untold Story Behind the Extraordinary Rise and Spectacular Fall of BlackBerry. The book chronicles the life of the BlackBerry, a fabulous product that's going extinct. It also offers a clear lesson in how not to present technical evidence in court.

    Habeas Hard Drive was dismayed at the ruckus that unfolded in North Las Vegas earlier this month, when the retiring police chief revealed some details from a six-month-old child porn investigation. Police had responded last fall to Mayor John Lee's report that he found images on his iPad he believed to be child pornography.

    4/4/2018 · Computers
    Maybe you heard about an insurance case in which sides both sides got sanctioned over inadvertent exposure of confidential information – facilitated by a nonlawyer associate. This story skims the surface of a deep reservoir filled with unhappy tales about the many ways electronically stored information (ESI) can get away from you.

    Check for SynapsUs
    Matthew Albee, CFCE, EnCE, SCERS
    Certified Forensic Computer Examiner
    19510 Van Buren Blvd., F3-131
    Riverside CA 95208
    USA
    phone: 951-780-7892
    Matthew-Albee-Computer-Forensics-Expert-Photo.jpg
    Matthew Albee, CFCE, EnCE, SCERS is a Computer Forensics expert with over 20 years of experience in his field. He currently serves as project manager and lead examiner on computer forensic and e-discovery cases for DataChasers, Inc.

    Background Experience - Since 1996, Mr. Albee has been a Special Agent for the State of California Franchise Tax Board and the Board of Equalization where his responsibilities include equipping and maintaining the computer forensic laboratory, and conducting investigations that involved financial and computer crimes. Since 2012, he has served as a Course Evaluator /Subject Matter Expert for the Office of Anti-Terrorism Assistance (ATA), Diplomatic Security Service, United States Department of State.

    Mr. Albee's experience with computer forensics runs the gamut from individual PCs to major corporations(references available), and includes every level and scope of examination. He has consulted to both public and private organizations and maintain a complete computer forensics laboratory.

    Litigation Support - Matthew Albee has the distinction of having served as Special Master to Federal Court, as well as being the expert of record in numerous Superior and Municipal courts. He has extensive litigation experience as an expert witness and have testified for both civil and criminal cases. Mr. Albee has experience with employment law, family law, and criminal law cases.

    Areas of Expertise:
    • Computer Forensics
    • Cell Phone Forensics
    • E-discovery
    • Intellectual Property Disputes
    • Unauthorized Computer Use
  • Restore Hidden, Deleted, Lost Files
  • Restore Hidden, Deleted, Lost Files Images
  • File Dates: Created, Modified, Deleted
  • Internet History Tracking
  • Email Recovery
  • View Matthew Albee's Consulting Profile.
    Check for SynapsUs
    Ray Yepes
    Director of Forensics and Incident Response
    1205 Sam Bass Rd.
    Round Rock Texas 78681
    USA
    phone: 512-255-3700
    Cyberdefenses-Logo.gif
    Ray Yepes Security Expert PhotoRay Yepes, Director of Forensics and Incident Response at Cyber Defenses, Inc., has over 21 years of experience as a Security Professional and Criminal Investigations Examiner. In addition to many forensic industry certifications, Mr. Yepes is a Diplomate member of the American Board of Forensic Examiners and the American Board for Certification in Homeland Security. He has been a licensed private investigator since 2006.

    As a security professional, Mr. Yepes has consulted, designed, maintained, and/or implemented security perimeters, network security architectures, and security policies for small, midsize, and large companies including Fortune 500, 200, 100, and 50 companies.

    As a criminal investigations examiner, Mr. Yepes has assisted and advised local and federal government agencies in national security matters and high profile criminal investigations. His first digital forensic investigation dates back to 1995 while assisting the FBI in a child pornography case.

    Mr. Yepes has conducted and managed numerous Cyber Security incidents, including but not limited to malware, phishing, password attacks, denial of service attacks (DoS), Man in the Middle attacks (MiTM), drive-by downloads, malvertising, rogue software, social media threats, advanced persistent threats (APT), and other incidents. In response, he has developed and executed information security strategies, advising business areas on security risks.

    Litigation Support - Mr. Yepes has conducted over 1,000 Digital Forensic Investigations ranging from complex white-collar schemes, to murder, and economic espionage. He has testified on Computer Forensics, Cyber Security, and eDiscovery matters in federal, state, and local courts. Mr. Yepes has served as board member, Treasurer, and Vice President for the Forensic Expert Witness Association (Houston Chapter) and is fluent in both Spanish and English.

    Areas of Expertise:
    • Network Forensics
    • Mobile Forensics
    • Vehicle Forensics
    • Computer Forensics
    • Firewall Appliance Forensics
    • Intellectual Property Theft
  • Industrial Espionage
  • Employment Disputes
  • Fraud / Forgery
  • Bankruptcy Investigations
  • Workplace Email / Internet Misuse
  • Regulatory Compliance
  • View Cyber Defenses, Inc.'s Consulting Profile.
    Check for SynapsUs
    Howard J. Cohen, PhD
    President
    3272 Cowper Street
    Palo Alto CA 94306-3004
    USA
    phone: 650-856-8123
    fax: 650-856-4273
    Howard J. Cohen, PhD, has over 30 years of experience in Software Engineering, Architecture and Implementation. He possesses particular expertise in Algorithms, Relational Databases, Graphical User Interfaces (GUIs) and Software Applications in general. His experience has been in a broad spectrum of technology, in several languages, in a wide variety of applications, and on multiple platforms. Dr. Cohen's background includes Electronic Design Automation, Bioinformatics, Digital Cartography, Banking Systems for Foreign Exchange Traders, and many more. He is the co-inventor on approximately 120 patents.

    Dr. Cohen has over 15 years of experience as an Expert Witness. He possesses excellent written and verbal communications skills, including the ability to express himself well in interpersonal contacts, make presentations to large audiences, explain complex concepts clearly, and write well on levels ranging from the scientific to end user documentation. He is available to analyze complex systems, to write clearly about technical issues, and communicate face-to-face in a manner appropriate for any audience to understand the issues, the technology and the point of view. Dr. Cohen has been deposed and testified at arbitration hearings and in Federal Court.

    Expert Witness Projects Include:
    • Trade Secrets
    • Copyright
    • DMCA - Digital Millennium Copyright Act
    • Patent Infringement
    • Source Code Analysis
    • Business Practices
    • Damages Analysis
    • Computer Software Security / Forensics
    View Consulting Profile.
    Check for SynapsUs
    Dr. Stephen Castell
    PO Box 334
    Witham CM8 3LP
    GBR
    phone: 44-1621-891-776
    stephen_castell_logo.jpg
    Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.

    As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
    6/28/2018 · Computers
    The Reg A Conference is the largest gathering of deal-makers and investors interested in Regulation A, a prime opportunity for companies to network with like-minded business executives, as well as financial professionals who assist in bringing capital to companies (https://theregaconference.com/presenting-companies/). Many such companies are today basing their new business ventures and projects, and their search and submissions for funding, on blockchain technology applications. So-called cryptocurrencies such as bitcoin are just one example of the use of this functionality. The business implications of this secure online record-keeping tech are huge – and not only in cryptocurrency. This presentation provides a probing and extensive expert critique of blockchain, its cryptocurrency, distributed ledger and smart contract applications, and argues for a cautionary, savvy approach to implementing and investing in such business systems, on grounds of professional due diligence, rigorous corporate governance and wide experience of past leading-edge ICT systems failures.

    8/18/2011 · Computers
    The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.

    6/23/2011 · Computers
    You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.

    10/9/2009 · Computers
    Synopsis of a Talk given to the Association of Independent Computer Specialists

    10/8/2009 · Computers
    Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?

    10/7/2009 · Computers
    The Negotiation Competition, now in its fifth year, is a contest open to all law students in England and Wales, designed to promote the skill of negotiation, a crucial component of ADR

    8/4/2004 · Computers
    I spent much of a whole year recently investigating why a major IT outsourcing deal broke down, and had given rise to the largest software contract dispute yet seen in the English High Court

    Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development

    Stephen Castell, PhD
    The Forensic Approach to assessing and dealing effectively with IT Projec Risks. TWO-DAY INTENSIVE SEMINAR, WORKSHOP AND CLINIC. NICE, CÔTE D'AZUR, FRANCE. 17th - 19th MARCH 2005
    12/7/2009
    Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
    10/8/2009
    The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
    < 1 2 >