Tony Mason has 42 years of experience in Software Development, mostly consulting with companies to find novel and useful ways to build new or improve existing products. He has extensive experience in providing "knowledge transfer" activities, such as clearly written documents and focused education.
Consulting Services - Mr. Mason provides software development in Computer Operating Systems environments ("kernel development") including UNIX, Linux, and Windows, with an emphasis on storage technologies, particularly file systems.
Typical customers are usually clients interested in developing products requiring specialized operating systems functionality and/or understanding. Mr. Mason's usual involvement to achieve the client's goals in a reasonable period of time include:
Constructing Software Architecture
Constructing a Corresponding Design
Constructing a Focused Development Plan
Mr. Mason has worked with multiple operating systems including Microsoft Windows, UNIX, and Linux. He is the author of two books, including, Windows NT Device Driver Development, several peer-reviewed papers, and numerous non-peer-reviewed publications.
Mr. Mason is the primary inventor on 12 patents:
US/9830329 Methods and Systems for Data Storage
US/9600486 File System Directory Attribute Correction
US/9535759 Work Queue Thread Balancing
US/8990228 Arbitrary Data Transformation
US/8903874 File System Directory Attribute Correction
US/8539228 Managing Access to a Resource
US/8521752 Arbitrary Data Transformations
US/8024433 Managing Application Resources
US/7809897 Managing Lock Rankings
US/7512748 Managing Lock Rankings
US/7949693 Log-Structured Host Data Storage
US 15/791,486 Methods and Systems for Data Storage
For years, this has been the definitive and comprehensive technical reference for software engineers, systems programmers, and any engineer who needs to understand Windows NT systems internals. While this text has a fresh new look on the outside, the text, pictures, code samples and references on the inside are vintage 1998. Nevertheless, the book retains a tremendous amount of value in its clear (erudite even) descriptions of the Windows NT operating system architecture and internals; information on the implementation of standard Windows NT kernel mode drivers; Key details on the workings of Windows NT I/O Manager; and detailed technical discussions on interrupt management and synchronization issues.
USAForensic is a boutique state-of-the-art forensics company with two labs in Phoenix Arizona and our booking office on the east coast. This helps with an earlier start each day and with overseas cases.
Specializing in forensic Audio, Video, Cell Phones, Computers Photography & ”Cell Tower tracking” debunking. USAForensic is court certified in Federal, US Military, US District, many State and county courts throughout the United States. International cases are not uncommon. Mr. Neumeister has worked in 23 countries over the past 40 years.
Clients range from the largest Law firms to private firms, large corporations, the Department of Defense, government agencies, advocacy groups, the DOJ to the innocence project.
Technology is flying past the court system. We’re here to work with attorneys to understand how to deal with digital or analog evidence, how to challenge it or how to get it admitted into evidence.
We prefer to work in the background assisting attorneys, even writing out Daubert 702 & 902 issues regarding other parties evidence submissions.
In a recent Federal Daubert hearing USAForensic worked with DOD JAG attorneys to get police cell tower tracking ruled inadmissible. The federal judge rule police cell tower tracking as “Garbage in, Garbage out”.
Not a verifiable science, not peer reviewed, no scientific white-paper to support its use.
Over 600 cases in the past 3 years. From the very highest profile to simple straightforward forensic cell phone extractions or video and audio clarification for court use.
To us Data is Data & takes no side, but it has to be verifiable data.
We've all seen the TV crime shows where the forensic technician opens the grainy surveillance, then zooms in on a tiny face, license plate or scrap of paper, hits the enhance button and, magically, the image becomes sharp and clear (accompanied by appropriate background music).
Setec Investigations offers unparalleled expertise in computer forensics and electronic discovery, providing highly personalized, case-specific forensic analysis and litigation support services to assist in the investigation, handling, and prosecution of computer-related crimes or misuse.
Setec Investigations combines today's most advanced computer forensics and litigation support expertise with a business- and legal-friendly approach, resulting in a sound analytical foundation that carefully balances critical investigative requirements with vital legal and evidentiary needs.
Setec Investigations incorporates a cross-disciplinary team comprised of computer forensic investigators, attorneys, law enforcement specialists, and seasoned business professionals who have established a proven track record of success since 1997.
Setec Investigations possesses the necessary combination of technical expertise, understanding of the legal system, and specialized tools and processes enabling the discovery, collection, investigation, and production of electronic information for investigating and handling computer-related crimes or misuse.
Explore our range of service offerings:
Computer Forensic Investigations
Computer forensics and enterprise investigation services identify, gather, analyze, and preserve electronic evidence to establish a sustainable posture for internal or legal action.
Manage large volumes of electronic data and quickly identify and isolate electronic evidence that is critical to the success of a litigation.
Legal consultants and attorneys translate litigation issues into strong case strategies that effectively utilize electronic evidence.
Supports the resolution of security incidents and active litigations by offering impartial and independent expert testimony, opinions, and customized reports in legal proceedings.
Identifying pertinent evidence on computer systems is essential to the discovery process in today's world, as it is believed that over 70% of information stored in computer systems is never reproduced in hard copy form
It is estimated that over 90% of all documents are now created electronically, although most of them are never printed; therefore, legal professionals are being challenged by a drastic increase in electronic evidence
Scott Cooper, Principal atPegasus Squire, is retained by corporate and legal clients to deliver successful experience-based proactive and reactive solutions involving Electronic Discovery and Computer Forensics, Tactics and Strategy, and Expert Witness testimony and related services. He has over 30 years of experience in this space and has been recognized as an Industry Leader by the Southern California Business Journal, and have been featured in the New York Times.
Mr. Cooper's clients have included The White House, The US Department of Justice, General Electric, Exxon, Kirkland & Ellis, O’Melveny & Myers, Skadden Arps, and many other large national and international corporations and law firms dealing with litigation and internal (and external) investigations.
Prior to his responsibilities at Pegasus, Mr. Cooper was a Senior Managing Director at FTI Consulting Inc. and the senior-most person globally in their Electronic Evidence Consulting practice. Prior to joining FTI, in 1984 Mr. Cooper was a co-founder of INSYNC Consulting Group, a nationally recognized Electronic Discovery, Computer Forensics, and Information Technology consulting firm. Prior to that, he worked at KPMG Peat Marwick in their Management Consulting Group’s Information Systems Services practice.
Mr. Cooper's most notable engagement includes working with the prevailing party on the nation’s largest corporate Intellectual Property Theft case, which created numerous Federal precedents in the area of Electronic Discovery.
Think Sherlock Holmes sans the goofy hat and magnifying glass. Today ’s digital sleuths enlist the tactics that once were only the purview of FBI and police investigators.The tools of computer forensics play a vital role in resolving matters in the corporate world and litigation process by enhancing the evidence pool, establishing truths otherwise left undiscovered and, consequently, contributing to more efficient and rapid resolution, judgments or settlements
Interhack Corp is a Computer Expert Firm that specializes in helping corporations and executives with challenges and opportunities involving the use of information. Interhack's focus is in Information Privacy and Security. The company's Information Assurance practice delivers assessment and reporting services to help firms find and keep the proper balance of risk, utility, and expense.
Interhack's overall mission is to make global computing and communications infrastructures worthy of trust. Their small tactical teams work at peak performance to clearly define the mission, its objectives, and the context in which they operate. Their ultimate product is unassailable opinion, delivered artfully.
Interhack's Internet Privacy Project (see link above) looked at the Internet infrastructure and how real systems used for online banking, navigation, advertising, and even enhanced DVD and CD content put unsuspecting consumers at risk. Results of this work were reported in the media worldwide and have served as foundation material for discussion in computer science programs throughout the United States and Europe.
Interhack's Cybersecurity Practice helps you to defend your organization.
Cybersecurity is a diverse topic, including data breaches, compliance violations, and corporate espionage. Security failures can undermine confidence in a brand and can result in catastrophic losses through changes in customer behavior, canceled contracts, and stolen trade secrets.
The Interhack system of Cybersecurity Services has six parts.
Vulnerability Assessment - will show you where your systems are vulnerable, and how your systems are impacted by those vulnerabilities.
Penetration Testing - shows you how well your organization detects and responds to active attacks by having our team of experts conduct controlled attacks you authorize.
Information Security Assessment - shows you how well your organization addresses information security, as seen through the prism of relevant industry standards.
Application Security Evaluation - shows you how your security concerns have been identified and are managed through system design and implementation.
Network Traffic Assessment - shows you what is actually on your network, and helps you verify that you have only what you think you have.
Criticality Assessment - provides you a view of your organization's most mission-critical information, where it can be found, and how the organization is impacted by a loss of confidentiality, integrity, and availability.
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
ExpoTech Engineering Inc. uses Cloud Computing, Mobile Technology, and IT Infrastructure Strategy to increase their clients' efficiency and competitive advantage. They deliver tailored enterprise applications that address business needs and meet client specifications.
For years, ExpoTech has implemented SAP and IT software within businesses. They optimize business processes, and train people within businesses to operate software efficiently. They also work with businesses that have experienced SAP failed implementation, getting their business operations back on track to maximize ROI. It is their experience and reliability that give them a large client list that continues to grow.
Partial Client List - Amazon, American Eagle Outfitters, Blackberry, BMW, Cisco, Emory University, IBM, Intel, Krueger, Microsoft, Nokia, Shell, Sprint, and Uline.
Mobile Development - Mobile application solutions, PWA, PCI compliance, and patented secure electronic signature applications and systems will enable organizations to achieve the best customer experience. Design and build mobile applications that are customer-friendly and facilitate easy and quick data processing.
Telemedicine - Telemedicine Solution is the only complete telehealth platform that fit into any workflow. From fast, secure text + video collaboration app HIPAA messenger, fully customizable Virtual waiting rooms and clinics.
Cloud Computing - Formally conduct cloud computing reliability and scalability assessments to determine the best solution (private, public, hybrid) for the growth of each client's organization.
Learning Management Systems - Deploy and track online learning initiatives with a modern and user-centered learning management system. Top-notch capabilities in content delivery and information management, all in a comprehensive digital learning solution.
Electronic Signature - At the core of eSignature is patented technology and the guarantee of a secure document and legal compliance. The application is all a company needs for electronic signature and document management requirements.
Cyber Security - Measure, benchmark, and set targets to actively manage the digital resilience of networks and security infrastructure. Offering Security Risk Assessments, Penetration, Testing, Application and Code Review, Digital Forensic Investigations.
Data Warehouse - Fast Track Data Warehouse hardware is tested for data warehousing which eliminates guesswork and is designed to save months of configuration, setup, testing and tuning.
Data Analysis - Transform your data into crucial information by creating reports and analysis. Unique elemental approach, intelligent features, and wizards combined with an integrated development environment of Info enables company's to develop reports without the need of writing any code.
Blockchain and UI Development - Deliver state-of-the-art and functional UI and Blockchain development, listening to client needs before designing the perfect turnkey solution needed for growth and success.
This book will explain how cloud computing will be the most radical transformation of business processes every organization will face to date. Is cloud computing a strategic advantage? Cloud computing will reclassify service delivery models in ways that organizations have never seen before. IT organizations will become commoditized and in the center of the new business transformation.
Leverage wireless technology to leapfrog your business into a brand new millennium Deploy and leverage mobile technology in your organization Increase your field efficiency with wireless technology · How unified messaging will play a key roll in your business processes · How the convergence between voice and data will benefit your bottom line. · What does Location Based Services mean to your business? How will you be communicating in 2012?
Data and Information Analysis Consultants Evidence Solutions Inc
Evidence Solutions, Inc., (ESI) is a premier forensics company founded in 1982. The goal at ESI is to help clients obtain, understand, and utilize all the Data and Information available to them.
ESI can analyze cell phones, computers, hard drives, EDRs, reconstruct accidents, provide trucking standard of care consulting, recover digital data, and provide consulting services in their many areas of expertise. Their team of experts can help you understand what needs to be done, what should have been done, and what to do next.
Sports & Fitness Injury
Featured ESI Expert:
Scott Greene - Technology Forensics Acquisition - Digital Evidence Preservation, Analysis, and Presentation Consultant and Expert Witness
For over 35 years, Scott Greene has been helping owners, CEO’s, managers and IT departments understand data. Mr. Greene Collects, Analyzes and Explains Complex Electronic Evidence in Plain English.
Mr. Greene was the founder of Great Scott Enterprises, Inc, which provided superior computer consulting services. The array of services included: custom programming, database design optimization, administration of databases, evaluation of existing systems to ensure optimal efficiency, profitability analysis, as well as design and implementation of knowledge base systems.
Today, Scott is an Affiliated Professional Member of the American Bar Association and works with Law Firms, Businesses, and Private Individuals. His extensive and diverse experience allows him to be an expert in many facets of computer and digital technology. He is a sought-after speaker and educator and travels throughout the country presenting to local, regional, national and international organizations.
Areas of Expertise:
Accounting and Medical Billing System Forensics
Accounting Systems Forensics
Black Box, ECM, ECU, EDR, DDEC, Download & Analysis
Black Box / Event Data Recorder / EDR, Forensics
Cell Phone Carrier Forensics
Cell Phone Forensics & Mobile Device Forensics
Data Fabrication Forensics
Digital Camera Forensics / Digital Photo Forensics
Digital Copier Forensics
Digital Photo Forensics
Document & Spreadsheet Forensics
Electronic Logging Device
Electronic Medical Record (EMR) / Electronic Health Record (EHR) Forensics
Eureka Software Solutions, Inc. is a Software Development and Consulting business with over 35 years of hands-on experience in the Computer, Software, and Technology industries. Eureka and its team of professionals provide an unparalleled understanding of nearly every facet and factor involved in a complex software or computer related litigation scenario. Eureka's clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive. Eureka Services and Practical Implementation of Expertise:
Review and comparison of software source code and functionality in relation to contractual commitments and requirements and/or protected intellectual property including, trade secrets, copyrights and patents
Computer / Software Forensics – able to reverse engineer and reconstruct hardware and software environments from backups, remnants and fragments of deprecated software. Eureka IT and Software development team is skilled at re-creating historical hardware and software environments
Investigation and assessment of software project bidding, planning and performance with particular attention to adequacy of discovery, specifications, cost estimates, schedules, and deliverables
Functional and performance testing of software against applicable specifications, warranties or industry standards using proprietary and commercial testing tools and techniques
Evaluation and use of both traditional and modern software development techniques and strategies, including creative payment structures related to software application/effort valuation and intellectual property licensing and ownership
Reviewing and exercising software applications and IT networks to expose and correct security issues and weaknesses
Founder and CEO, Monty G. Myers, PE, is an active Software Industry Executive with 40+ years of experience. Mr. Myers is involved in all aspects of the daily management and operation of Eureka, including business development, contracts, customer relations, project scope, execution and oversight, strategy and management, hiring, and finance. Mr. Myers has negotiated and performed hundreds of real-world software and technology contracts and statements of work involving complex software project and licensing terms and conditions including material intellectual property aspects. He is actively engaged in handling and protecting the confidential, proprietary, and trade secret information and technology of Eureka and its clients. View Monty Myers' Expert Witness Profile.
DataChasers, Inc. is a select, exclusive Computer Forensics and E-Discovery company. With Computer and Cell Phone Forensics and E-Discovery as their core focus, they offer strategies and provide alternatives so that clients are aware of all options to make more informed decisions.
DataChasers, Inc. provides an initial evaluation at one rate regardless of hourly time/rate that includes a review of the initial reports, search warrants, written evidence, and a consultation regarding the strengths and weaknesses of each case.
Cell Phone and Device Forensics
Forensic Computer Examinations
E-Discovery Exams - Electronically Stored Information
Intellectual Property & Copyright
Employment Law & Civil Rights Cases
Computer Forensics Training - DataChasers, Inc. also provides California State Bar approved MCLE presentations for MCLE credits.Topics include Computer Forensics, Intellectual Property, Criminal Defense, Family Law, and Computer Forensics Presentations, Presenting Electronic Evidence at Court, and How to be an Expert Witness.
Matthew Albee, CFCE, EnCE, SCERS is a Computer Forensics expert with over 20 years of experience in his field. He currently serves as project manager and lead examiner on computer forensic and e-discovery cases for DataChasers, Inc.
Background Experience - Since 1996, Mr. Albee has been a Special Agent for the State of California Franchise Tax Board and the Board of Equalization where his responsibilities include equipping and maintaining the computer forensic laboratory, and conducting investigations that involved financial and computer crimes. Since 2012, he has served as a Course Evaluator /Subject Matter Expert for the Office of Anti-Terrorism Assistance (ATA), Diplomatic Security Service, United States Department of State.
Howard J. Cohen, PhD, has over 30 years of experience in Software Engineering, Architecture and Implementation. He possesses particular expertise in Algorithms, Relational Databases, Graphical User Interfaces (GUIs) and Software Applications in general. His experience has been in a broad spectrum of technology, in several languages, in a wide variety of applications, and on multiple platforms. Dr. Cohen's background includes Electronic Design Automation, Bioinformatics, Digital Cartography, Banking Systems for Foreign Exchange Traders, and many more. He is the co-inventor on approximately 120 patents.
Since 1979, Dr. Cohen has served as a Software Development Consultant to several major Silicon Valley businesses including Nortel Networks, Surromed, Incyte Genomics, BomDiver, Canon Information Systems, WeatherNews, PetroSoft, LSI Logic, Aspect Development, Abbott Laboratories, ETAK, Engineering DataXpress, Nikon Precision, Diasonics, Daisy Systems, Rolm, Oceanroutes, Mindcraft, and Integrated CMOS Systems. Concurrently, he has also held full time senior engineering and management positions with such companies as Tibco, Zycad, ETAK, and the NASA Ames Research Center.
Dr. Cohen's Consulting Services are available to companies needing software development involving problem definition, analysis, design modeling, documentation, programming, and implementation. Consulting services are also available issues regarding Trade Secrets, Copyright and Patent Infringement, and Computer Software Security and Forensics.
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.
As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Dr Castell, award-winning international Professional ICT Consultant and Expert has acted as expert witness in an unusual medical equipment procurement litigation of relevance to the current Covid-19 pandemic and its profound clinical and hospitalisation implications. The court case, specific details of which cannot be given since the matter is subject to Confidentiality Hearing strictures, was over a dispute concerning due and diligent process undertaken by a major Hospital Management Group, the Defendant in the action, in issuing a Tender for complex diagnostic units, and the Group’s selection of the bid put in by a US corporation, a leader in its field. That winning bid was challenged by a Claimant, another US corporation, a market competitor to the winning company. The dispute hinged on whether or not the operational computer software of the winning bidder’s units was compliant with the Hospital Management Group’s strict Tender stipulation that the software had to be identical across all versions of the equipment to be supplied in meeting the Tender requirements.
Dr Castell’s investigation and analysis of the operational software involved, and his opinion as to the extent that the software was compliant with the strict Tender condition, provided insight and assistance to the parties in reaching a satisfactory settlement.
In a recent trial, in which I acted as an expert witness, some notable differences appeared to me to emerge, as between UK and USA judicial standards and practices, in regard to the role, obligations, testimony, presentation and rigor of digital forensics expert findings.
The General Data Protection Regulation (GDPR) includes in its provisions Article 17, the Right to be Forgotten, which could potentially be a formidable barrier to the ubiquitous introduction of cryptographic blockchain software and technology.
The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.
You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.
Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?
Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development
This book - "Blockchain Technology and Innovations in Business Processes" - provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness.
Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants. Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.
Areas of Expertise:
Allegations of ERP and CRM system failures and/or defective business software/systems
Valuation of computer hardware, software and services
An property and casualty insurance agency acting as a managing general agent for several insurance lines sold through sub-agents throughout the United States had agreed to license a comprehensive agency management system from a developer of such software specifically developed for managing general agencies.
Alvin K. Brown, Esq., LLM, CFE, CCEP, CIPP/US, is a Cybersecurity & Privacy Attorney, and Data Protection Consultant with over 20 years of Department of Defense (DoD) and Intelligence Community (IC) experience working on National Security, Cybersecurity, Data Protection, and Privacy matters.
Background Experience - During his career, Mr. Brown served in operations, management, policy, compliance and legal positions at the Central Intelligence Agency, Defense Intelligence Agency, Office of Naval Intelligence, U.S Special Operations Command, U.S. Central Command, and U.S. Special Operations Command Central. Mr. Brown earned a Juris Doctorate (JD) and Master of Law (LL.M) in International Law from Stetson University College of Law and a Bachelor of Arts (BA) in Interdisciplinary Social Science from the University of South Florida.
The Department of Defense designated Mr. Brown as an Information Warfare Dominance Officer, Intelligence Officer, Counterintelligence Investigator, and Special Operations Intelligence Officer. Additionally, Mr. Brown holds several private sector certifications, to include:
Certified Information Privacy Professional
Certified Fraud Examiner
Certified Financial Crimes Investigator
Certified Compliance and Ethics Professional
Consulting Services - Mr. Brown currently serves as the PrincipalCybersecurity & Privacy Attorney, and Data Protection Consultant for Alvin K. Brown, P.A.He is the legal advisor on security and privacy issues to companies in the Department of Defense (DOD), Intelligence Community (IC) and technology sectors . He maintains a thorough mastery of applicable federal and state laws, including statutes, regulations, Executive Orders, and precedential case law related to National Security, Homeland Security, Cybersecurity and Privacy.
Mr. Brown conducts legal research to analyze or assess issues of first impression, and drafts opinions for decision-makers related to such issues. He provides legal guidance and oversight to discrete internal investigations, and provides compliance and ethics guidance to ensure substantive and procedural due process safeguards are maintained.
Ideal Client Engagement: Mr. Brown is available to work with Fintech Companies, Defense / National Security Companies, Technology Companies, Academia, and Research Facilities.
Advantage Forensics Inc. is a multi-disciplinary forensic engineering firm based in Ontario with service across Canada and the U.S.
Our firm was VOTED #1 in Expert Witness Accident Investigation & Reconstruction in Canada. Our team of over 30 experts and consultants are ready to assist you with your litigation needs in the following areas:
Product Failure Liability
Personal Injury Investigation
Road Lighting Safety Assessment
Road Signage Assessment
Traffic Safety Assessment
Data Recorder Download & Analysis
Floor Safety, Friction Testing & Audits
Safety Hazard Assessment
Playground Safety Inspection & Compliance
Product Safety Testing & Compliance
Product Warning Assessment
Fire Safety Assessment & Audits
President, Jason Young, B.E.Sc., M.A.Sc., P.Eng., is a licensed professional engineer with over 20 years of experience in Collision Reconstruction, Human Factors, Biomechanics, Patent Infringement, and Sports/Rec Accidents. Mr. Young has extensive trial experience during his career of over 2500 forensic cases, with great success for his clients. Mr. Young has a Masters in Biomedical Engineering and has lectured to fellow investigators, to academia and to the legal industry across North America over the past 15 years with numerous publications.
VP Kyle Serkies, B.A.Sc., M.A.Sc., P.Eng., is a licensed professional engineer specializing in Motorcycle Collision Reconstruction, Material Failure & Product Failure. Mr. Serkies is a motorcycle safety instructor and a sought-out guest speaker in his areas of practice, with outstanding attention to detail in both his investigations and trial-ready reports.
VP Dr. Essam Dabbour, Ph.D., P.Eng., is a licensed professional engineer specializing in Road Design, Road Safety & Traffic Safety. Dr. Dabbour is a world-renowned expert in road design and traffic safety, and has published extensive research in these areas, with exceptional depth of analysis and clarity of findings in his investigations and trial-ready reports.