David Shaw is an Expert with North America, Europe, and Far East expertise as an independent and impartial Technical and ICT Expert and Consultant involved in a wide range of high profile System, Integrations, remedial work on Failed Systems and Programs, Litigation, Expert Witness, Mergers and Acquisitions, Financial and Ultra-High Speed Trading Systems, Cyberwarfare and Defence work.
Dr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys. Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.
Dr. Edwards provides expert consulting in the following areas:
Intellectual property and patent infringement
Software design/source code audit and review
Expert witness and depositions
Dr. Edwards is an expert in the following technologies :
The importance of software patents has increased dramatically in recent years. The high profile patent disputes between Apple, Google, and other smartphone companies have attracted the most attention in the press, but patent battles are being waged all across the software industry.
Scott Cooper, Principal atPegasus Squire, is retained by corporate and legal clients to deliver successful experience-based proactive and reactive solutions involving Electronic Discovery and Computer Forensics, Tactics and Strategy, and Expert Witness testimony and related services. He has over 30 years of experience in this space and has been recognized as an Industry Leader by the Southern California Business Journal, and have been featured in the New York Times.
Mr. Cooper's clients have included The White House, The US Department of Justice, General Electric, Exxon, Kirkland & Ellis, O’Melveny & Myers, Skadden Arps, and many other large national and international corporations and law firms dealing with litigation and internal (and external) investigations.
Litigation Support - A nationally recognized Expert in both Federal and State courts, Mr. Cooper has been utilized as a special master and designated as a court-appointed referee. He has also been involved in successfully supporting no-notice ex-parte computer evidence seizure motions and orders. Mr. Cooper's cases involve major corporate, financial, and oil & gas entities. His forensic services help companies and their lawyers through the steps associated with internal inquiries, governmental investigations, and litigation matters.
Mr. Cooper's most notable engagement includes working with the prevailing party on the nation’s largest corporate Intellectual Property Theft case, which created numerous Federal precedents in the area of Electronic Discovery.
Think Sherlock Holmes sans the goofy hat and magnifying glass. Today ’s digital sleuths enlist the tactics that once were only the purview of FBI and police investigators.The tools of computer forensics play a vital role in resolving matters in the corporate world and litigation process by enhancing the evidence pool, establishing truths otherwise left undiscovered and, consequently, contributing to more efficient and rapid resolution, judgments or settlements
C. Matthew Curtin, CISSP Founder and CEO of Interhack is a Certified Information Systems Security Professional. An Expert in Computers and Information Technology, Mr. Curtin and his team at Interhack help attorneys and executives use data and computer technology in high-stakes situations.
Mr. Curtin's work has been at the cutting edge of the intersection of law and technology. The U.S. Court of Appeals for the First Circuit relied on Interhack's forensic computing practice and Mr. Curtin's expert opinion when it established standards for application of Federal wiretap statutes to Web technology, In re Pharmatrak Privacy Litigation (see link above).
Academic references to their work include the Stanford Law Review and university courses throughout the world. Mr. Curtin maintains a regular academic appointment as a Senior Lecturer at The Ohio State University's Department of Computer Science and Engineering. He currently chairs the Recruitment subcommittee of the Business Advisory Network that advises the Ohio Department of Education's standards for technology education in secondary and postsecondary schools throughout the state.
C. Matthew Curtin's services are available for plaintiffs, defendants, and for the courts directly on technical matters.
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
Computer Software Industry Expert Witness Monty Myers
Monty G. Myers, PE, is an active Software Industry Executive with 30+ years of experience, including the founding of Eureka Software Solutions, Inc. (“Eureka”) and acting as CEO of Eureka for 28 years.
Mr. Myers has provided services to a balanced mix of plaintiffs and defendants in over 40 litigation matters ranging from billion dollar, landscape-changing lawsuits between worldwide industry leaders to smaller-scale litigation between individuals or local businesses. Mr. Myers' clients have included Global 1000 and Fortune 500 companies in industries such as Enterprise, Finance, Military and Defense, Transportation, Oil and Gas, Security, Healthcare, and Automotive.
Litigation Support - Monty Myers is a Computer and Software Expert Witness, experienced and proven at offering expert testimony under-oath at trial, hearings, and depositions. For the last 5+ years, he has provided expert witness services for engagements including Software Patent or Software Trade Secret litigation matters.
Mr. Myers is available as a consulting and/or testifying expert witness to assist with understanding the technology and technical issues in the case and providing review, analysis, and testimony (report, deposition, or courtroom) regarding the technology, software, or patents involved in the case. He has worked extensively with counsel in the taking and defending of depositions, reviewing and challenging the testimony of others, and assisting with and implementing an overall trial strategy.
Areas of Expertise:
Source Code Review
Source Code Comparison
Source Code Reconstruction
Source Code Misappropriation / Theft
Source Code Copyright / Patents
Open Source Licensing
Mobile / Wireless Technology
Cloud and Web Business
Hardware / Infrastructure
Contract Performance / Project Management
Adept at taking highly technical material and effectively communicating it to counsel, the judge or a jury in terms they can understand via testimony or reports/declarations
Skilled at reviewing and comparing software source code and functionality in the litigation context in relation to protected intellectual property including, trade secrets, copyrights, and patents and/or license or other contractual commitments and requirements
Able to reverse engineer and reconstruct hardware and software environments from backups, remnants, and fragments of deprecated software along with re-creating historical hardware and software environments
Highly familiar with functional and performance testing of software against applicable specifications, warranties, or industry standards using proprietary and commercial testing tools and techniques
Matthew Albee, CFCE, EnCE, SCERS is a Computer Forensics expert with over 20 years of experience in his field. He currently serves as project manager and lead examiner on computer forensic and e-discovery cases for DataChasers, Inc.
Background Experience - Since 1996, Mr. Albee has been a Special Agent for the State of California Franchise Tax Board and the Board of Equalization where his responsibilities include equipping and maintaining the computer forensic laboratory, and conducting investigations that involved financial and computer crimes. Since 2012, he has served as a Course Evaluator /Subject Matter Expert for the Office of Anti-Terrorism Assistance (ATA), Diplomatic Security Service, United States Department of State.
Mr. Albee's experience with computer forensics runs the gamut from individual PCs to major corporations(references available), and includes every level and scope of examination. He has consulted to both public and private organizations and maintain a complete computer forensics laboratory.
Litigation Support - Matthew Albee has the distinction of having served as Special Master to Federal Court, as well as being the expert of record in numerous Superior and Municipal courts. He has extensive litigation experience as an expert witness and have testified for both civil and criminal cases. Mr. Albee has experience with employment law, family law, and criminal law cases.
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies. As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
In a recent trial, in which I acted as an expert witness, some notable differences appeared to me to emerge, as between UK and USA judicial standards and practices, in regard to the role, obligations, testimony, presentation and rigor of digital forensics expert findings.
The General Data Protection Regulation (GDPR) includes in its provisions Article 17, the Right to be Forgotten, which could potentially be a formidable barrier to the ubiquitous introduction of cryptographic blockchain software and technology.
The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.
You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.
Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?
Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development
Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants. Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.
Areas of Expertise:
Allegations of ERP and CRM system failures and/or defective business software/systems
Valuation of computer hardware, software and services
An property and casualty insurance agency acting as a managing general agent for several insurance lines sold through sub-agents throughout the United States had agreed to license a comprehensive agency management system from a developer of such software specifically developed for managing general agencies.
Burgess Forensics -Specialists in Computer Forensics, Electronic Discovery, Expert Witness, Data Recovery Since 1985
World-renowned leaders in the recovery of data from disk drives, diskettes, and other media. Burgess Computer Forensics knows all documents begin on a computer - a rich source for discovery. We begin with forensic imaging, finding hidden, deleted and corrupted files, images, email, Internet and file histories. Burgess explains results and computer technology in terms understood by layperson, judge and jury. Mr. Burgess has written and spoken widely and contributed the comprehensive Computer Forensics section to recently-released "Scientific Evidence in Civil and Criminal Cases, 5th Ed." by Moenssens, et al.
Digital and electronic media, forensic and evidentiary processes
Computer forensics cases nationwide, testified as expert witness in many courts
Digital discovery, e-discovery, electronic discovery
Email and email address recovery
File and image recovery
Internet history recovery and Internet activity analysis
Spyware and malware analysis
Criminal defense work
Project Management Our cases have included: Employment Law, Family Law, Intellectual Property, Software Design, Pornography, Child Pornography, Fraud, Military, Law Enforcement, Computer Crime, Harassment, Litigation Support, Embezzlement, Contract Dispute, Security Issues, Murder, Traffic Violation, Class Action, Product Liability, Patent Dispute, Stock Manipulation, American Indian, Medical Devices, Tax Evasion, Surveillance, Manufacturing, Public Works, Sabotage, Immigration, Mobile / Cell Phone, Smart Phones, PDAs, Public Education, Real Estate, Wrongful Termination, Labor Dispute, Insurance, Architecture, Stock Pricing, Stock Ownership and many more.
It was a grey October day, the kind of day when a guy likes to cozy up next to a bank of servers to keep warm, when the Teacher first called me. "They think I'm nuts" were the words emanating from the phone. Well, just because you're paranoid doesn't mean they're not out to get you. I sat up and went to my desk, away from the noisy fans cooling off all those Gigahertzes. "What's the problem, Miss?"The young woman explained that she was a not-yet-tenured teacher in a New England (greyer there than here) high school with a problem. Seems that a student in one of her classes was repeating things in the classroom that she had uttered only the night
A student asked me an interesting question today, regarding what I foresee in the field of computer forensics in the coming years: 5, 10, & 50. Having not thought about it before , my answers surprised me a bit.
In the privacy of our studies, offices, libraries, or wherever it is we have our computers, it may seem that we are alone, with no one looking over our shoulders. But every document we draft, every step through the Internet we take, is creating tracks through the digital environment in our computers