Scott Cooper, Principal at Pegasus Squire, is retained by corporate and legal clients to deliver successful experience-based proactive and reactive solutions involving Electronic Discovery and Computer Forensics, Tactics and Strategy, and Expert Witness testimony and related services. He has over 30 years of experience in this space and has been recognized as an Industry Leader by the Southern California Business Journal, and have been featured in the New York Times.
Mr. Cooper's clients have included The White House, The US Department of Justice, General Electric, Exxon, Kirkland & Ellis, O’Melveny & Myers, Skadden Arps, and many other large national and international corporations and law firms dealing with litigation and internal (and external) investigations.
Prior to his responsibilities at Pegasus, Mr. Cooper was a Senior Managing Director at FTI Consulting Inc. and the senior-most person globally in their Electronic Evidence Consulting practice. Prior to joining FTI, in 1984 Mr. Cooper was a co-founder of INSYNC Consulting Group, a nationally recognized Electronic Discovery, Computer Forensics, and Information Technology consulting firm. Prior to that, he worked at KPMG Peat Marwick in their Management Consulting Group’s Information Systems Services practice.
Mr. Cooper's most notable engagement includes working with the prevailing party on the nation’s largest corporate Intellectual Property Theft case, which created numerous Federal precedents in the area of Electronic Discovery.
Areas of Expertise:
Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense.
Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully.
Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe.
Interhack's Cybersecurity Practice helps you to defend your organization.
Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets.
The Interhack system of Cybersecurity Services has six parts.
Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities.
Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize.
Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards.
Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation.
Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have.
Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.
E911-LBS Consulting is a premier provider of business, product, and technology strategy and implementation services for enterprises, start-ups, and public sector entities looking to capitalize on Location Information. With market leading expertise in all forms of indoor and outdoor location technologies including GPS, Beacons, RFID, RTLS/Wi-Fi, network-based methods, and various combinations and hybrids, E911 provides services to ensure fully functional and integrated indoor and outdoor applications to maximize ROI and customer success. Mobile Location Strategy Development and Implementation Services
Mobile Location Product Design and Implementation Services:
David H. Williams is an internationally-known expert in the Wireless / Mobile Location field and President and Founder of E911-LBS Consulting. With over 100 projects in mobile communications and information technology solutions design, selection, implementation and ongoing management, he has extensive experience in the activities and issues needed to get applications to market, including planning and design at the application, system, interface / integration, network, IT, operational and customer facing levels. Mr. Williams is an expert in the full range of business and consumer location-based services (LBS) that utilize these technologies. His client list includes Apple, AT&T, General Electric, General Motors, Google, HERE, Kaspersky Internet Security, LOCAID, Nextel, Qualcomm, Peschke, Samsung, Sprint, Toyota, and Verizon. Mr. Williams has been published and quoted by leading magazines and newspapers about location-related services, including The New York Times, CBS News.com, The Boston Globe, Computerworld, Directions Magazine, Mission Critical Communications, Popular Mechanics, and RFID Journal. He has also published numerous research reports and dozens of location-related articles, and tracks and analyzes leading companies in the LBS industry, particularly with respect to their product and technology strategies, competitive capabilities, and implementation issues. View David Williams' Expert Witness Profile.
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies. As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants. Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.
Areas of Expertise:
Burgess Forensics -Specialists in Computer Forensics, Electronic Discovery, Expert Witness, Data Recovery Since 1985
World-renowned leaders in the recovery of data from disk drives, diskettes, and other media. Burgess Computer Forensics knows all documents begin on a computer - a rich source for discovery. We begin with forensic imaging, finding hidden, deleted and corrupted files, images, email, Internet and file histories. Burgess explains results and computer technology in terms understood by layperson, judge and jury. Mr. Burgess has written and spoken widely and contributed the comprehensive Computer Forensics section to recently-released "Scientific Evidence in Civil and Criminal Cases, 5th Ed." by Moenssens, et al.
Analysis Of Audio / Video Evidence Digital Enhancement / Restoration Voice Identification / Elimination Event / Sound Identification Expert Testimony / Consultation Piracy / Copyright Infringement Transcription