Brooks Hilliard, CMC, CCP is the only actively practicing expert witness in the world who is both a Certified Management Consultant and a Certified Computing Professional specializing in computer system selection and problem resolution. He has testified more than 30 times as a computer expert witness and has been engaged on more than 90 such matters for both plaintiffs and defendants. Mr. Hillard has done expert witness and consulting assignments in 25 states, and has qualified as an expert witness on computer software and hardware (including ERP, SCM and CRM systems) in both state and federal litigation. His expert witness engagements have included courtroom and deposition testimony in lawsuits, arbitrations, mediations and formal governmental hearings.
Areas of Expertise:
Allegations of ERP and CRM system failures and/or defective business software/systems
Valuation of computer hardware, software and services
An property and casualty insurance agency acting as a managing general agent for several insurance lines sold through sub-agents throughout the United States had agreed to license a comprehensive agency management system from a developer of such software specifically developed for managing general agencies.
Dr. Stephen Castell, Chartered Information Systems Practitioner and Member of the Expert Witness Institute, is Chairman of CASTELL Consulting. He is an internationally acknowledged Independent Computer Expert who has been involved in a wide range of computer litigation over many years. CASTELL Consulting, currently in its twenty-fifth year, provides independent professional consultancy and expert services in Computer Systems, Software, Project Management, Strategy, and Contract Disputes, to a wide variety of international clients and companies.
As an Expert Witness in computer litigation, Dr. Castell has acted in over 100 major cases including the largest and longest computer software actions to have come to trial in the English High Court. He is the author of the best-selling Computer Bluff (1983), and of The APPEAL Report (1990) on the admissibility of computer evidence in court and the 'legal reliability' of information systems and technologies (with the CCTA).
Dr Castell, award-winning international Professional ICT Consultant and Expert has acted as expert witness in an unusual medical equipment procurement litigation of relevance to the current Covid-19 pandemic and its profound clinical and hospitalisation implications. The court case, specific details of which cannot be given since the matter is subject to Confidentiality Hearing strictures, was over a dispute concerning due and diligent process undertaken by a major Hospital Management Group, the Defendant in the action, in issuing a Tender for complex diagnostic units, and the Group’s selection of the bid put in by a US corporation, a leader in its field. That winning bid was challenged by a Claimant, another US corporation, a market competitor to the winning company. The dispute hinged on whether or not the operational computer software of the winning bidder’s units was compliant with the Hospital Management Group’s strict Tender stipulation that the software had to be identical across all versions of the equipment to be supplied in meeting the Tender requirements.
Dr Castell’s investigation and analysis of the operational software involved, and his opinion as to the extent that the software was compliant with the strict Tender condition, provided insight and assistance to the parties in reaching a satisfactory settlement.
In a recent trial, in which I acted as an expert witness, some notable differences appeared to me to emerge, as between UK and USA judicial standards and practices, in regard to the role, obligations, testimony, presentation and rigor of digital forensics expert findings.
The General Data Protection Regulation (GDPR) includes in its provisions Article 17, the Right to be Forgotten, which could potentially be a formidable barrier to the ubiquitous introduction of cryptographic blockchain software and technology.
The new government has announced the areas that it has identified for dramatic cuts in public spending. One of the most effective reductions should be derived through more professional, better-managed government IT spending.
You are an established, reputable, medium-sized corporation. A year ago your board decided to upgrade your existing computer systems by buying a 'unified package', 'lightly-customised', from a 'solution provider'.
Software implementation contracts are frequently terminated with the software rejected amidst allegations from both supplier and customer, e.g. software/database errors/deficiencies, faulty design, shifting user/business requirements. An important technical issue on which the IT Expert appointed in such disputes is asked to give an expert opinion is: what was the quality of the delivered software and was it fit for purpose?
Disputes over failed software construction projects raise interlinked technical and legal issues which are complex, costly, and time-consuming to unravel – whatever the financial size of the claims and counterclaims, the facts and circumstances of the contract between the parties, or the conduct of the software development
This book - "Blockchain Technology and Innovations in Business Processes" - provides a platform to bring together researchers, academia and industry collaborators to exchange their knowledge and work to develop better understanding about the scope of blockchain technology in business management applications of different sectors such as retail sector, supply chain and logistics, healthcare sector, manufacturing sector, judiciary, finance and government sector in terms of data quality and timeliness.
Commonwealth Telecommunication Organisation (CTO) 2nd Annual Investing In ICTs In Emerging Markets: Examining Business & Investment Opportunities In Developing Economies. 9th & 10th December 2009, Inmarsat Conference Center, London, UK
The findings of this expert investigation were clearly reported by Dr Castell to the court and (most unusually) were fully accepted by the Prosecution without any need for cross-examination, assisting in achieving a Not Guilty verdict from the Jury.
CyberTruth, LLC is a full-service Digital Forensics expert witness consultancy that provides services primarily to law firms in both civil and criminal defense cases. They provide analysis, reporting and testimony in cases involving a wide range of Digital Devices and Cloud Services, as well as Audio and Video Evidence Analysis.
John H. Morris, Esq., Owner and Principal Analyst at CyberTruth, has over 40 years of experience in technology, including 17 years at Microsoft in a variety of technical services roles. Mr. Morris left Microsoft to open Nashville Vanguard Law and, later, CyberTruth, allowing him to focus on working with those who needed his expertise most.
Mr. Morris is licensed to practice in the Tennessee state courts, admitted to practice in the Middle District Tennessee Federal Court, pending admission to Eastern District Tennessee Federal Court, as well as admitted Pro Hac Vice to the Southern District of New York Federal Court. He is a current member of the Tennessee Bar Association (TBA), Tennessee Association of Criminal Defense Lawyers (TACDL), Tennessee Trial Lawyers Association (TTLA), and American Society of Digital Forensics and eDiscovery.
Litigation Support - Mr. Morris works with criminal defense attorneys, civil litigators, divorce attorneys, and select Individuals. He has provided analysis, expert reports, and testimony in hundreds of cases and can provide numerous references as to the results.
Depending on the case, Mr. Morris serves as a forensic expert with years of experience in finding digital evidence others have tried to hide, an expert witness able to reinforce or disprove forensic practices and results, an assisting attorney for lead attorneys in need of a technology-oriented second chair, or as a provider of eDiscovery for small and midsized firms otherwise unable budget for such services.
Areas of Expertise:
Audio / Video Forensics - CCTV, traffic cameras, teller machines, police cameras, and cell phones; Digital media authentication, Exif (Exchangeable Image File Format) analysis for audio and video files, Forensic data analysis and interpretation, Media conversion, Recovery of deleted or corrupted data, Audio / video editing, Demonstrative exhibit creation
Cell Phone Forensics - Contacts, Photos, Calendars, Notes, SMS and MMS messages, Video, Email, Web browsing information, Location information, Social networking messages, Social networking contacts
Cellular Technology / Tracking - Navigation data analyzed for position and location to forensically reconstruct traveled path
Cloud Forensics - Locating, identifying, and separating suspected or compromised data for OneDrive, Dropbox, Google Drive, Box, iCoud, Sharepoint, iDrive
Computer Forensics / eDiscovery - Identify, collect, examine, and preserve evidence stored on digital media including E-mail, Activity logs, Correspondence, User documents, Internet activity, Browser history, Computer backups, Email archives, Wifi history, Hard drives, Recovery of deleted data, Intrusion detection, Spyware detection, Malware detection
Social Media Forensics - Analysis of platforms including Facebook, Instagram, Twitter, Discord, Reddit, Match, Tinder, LinkedIn Signal, What's App, Periscope, MeWe, Tumblr, YouTube, Snapchat, and more.
Monty G. Myers is the founder and CEO of Eureka Software Solutions, Inc. Mr. Myers, with the support of his team at Eureka, has served as a testifying and consulting software expert witness in over 135 software trade secret, patent, and other technology related cases in both state and federal court.
After over 35 years in business, Eureka is a leading project-oriented, custom software development company based in Austin, Texas. Eureka has built software products and business solutions for an impressive client list which includes members of the Global 1000, Fortune 500, notable private companies, and numerous high-profile start-up organizations. Eureka has a highly successful track record providing state-of-the-art software solutions on a variety of technology platforms. Eureka has enjoyed great business success and has received multiple achievement awards.
As the leader of Eureka, Mr. Myers is truly a practicing industry expert. He excels at many expert roles including software expert witness, software trade secret expert witness, software patent expert witness, and source code expert witness. See Eureka's expert witness website for a list of all 135+ of Monty's cases.
Software and computer expert witness experienced and proven at offering expert testimony under-oath at trial, hearings, and depositions.
Extensive work with counsel in the taking and defending of depositions, reviewing, and challenging the testimony of others, and assisting with and implementing an overall trial presentation strategy.
Adept at taking highly technical material and effectively communicating it to counsel, the judge, or a jury in terms they can understand.
Ready availability of Eureka’s experienced team of software developers and IT forensic specialists as needed to analyze or recreate relevant software or hardware platforms or scenarios.
Regular use of proprietary and licensed tools and software to assist with source code analysis and performance testing, load testing, data recovery and extraction, metadata review and management, and e-discovery.
Experience performing analyses supporting matters involving alleged evidence destruction where negative inferences, death penalty sanctions, or other relief is sought by a party.
Practical Implementations of Expertise:
Review and comparison of software source code and functionality in relation to contractual commitments and requirements and/or protected intellectual property including, trade secrets, copyrights, and patents.
Computer/software forensics – able to reverse engineer and reconstruct hardware and software environments from backups, remnants, and fragments of deprecated software. Eureka IT and Software development team is skilled at re-creating historical hardware and software environments.
Investigation and assessment of software project bidding, planning and performance with particular attention to adequacy of discovery, specifications, cost estimates, schedules, and deliverables.
Functional and performance testing of software against applicable specifications, warranties or industry standards using proprietary and commercial testing tools and techniques.
Evaluation and use of both traditional and modern software development techniques and strategies, including creative payment structures related to software application/effort valuation and intellectual property licensing and ownership.
Reviewing and exercising software applications and IT networks to expose and correct security issues and weaknesses.
We have offices throughout the US and have worked on more than 3,000 cases in 41 states and multiple countries. There is a reason Garrett Discovery is hired by the top trial attorneys in the nation.
Garrett Discovery has a team of expert witnesses providing Litigation Services in Digital Forensics, Auto and Truck Accidents, Intellectual Property Theft, Mobile Forensics, EDR Forensics, Cell Tower, Call Detail Records, Electronic Medical Record Analysis, and Medical Malpractice Forensics. No matter how complex the case, they can help you discover what happened and present it in a way that everyone can understand.
Our clients range from the largest law firms to private firms, large corporations, the Department of Defense, government agencies, advocacy groups, the DOJ to the innocence projects.
Garrett Discovery is a large firm that has experts in the following concentrations:
C. Matthew Curtin, CISSP Founder and CEO of Interhack is a Certified Information Systems Security Professional. An Expert in Computers and Information Technology, Mr. Curtin and his team at Interhack help attorneys and executives use data and computer technology in high-stakes situations.
Mr. Curtin's work has been at the cutting edge of the intersection of law and technology. The U.S. Court of Appeals for the First Circuit relied on Interhack's forensic computing practice and Mr. Curtin's expert opinion when it established standards for application of Federal wiretap statutes to Web technology, In re Pharmatrak Privacy Litigation (see link above).
Academic references to their work include the Stanford Law Review and university courses throughout the world. Mr. Curtin maintains a regular academic appointment as a Senior Lecturer at The Ohio State University's Department of Computer Science and Engineering. He currently chairs the Recruitment subcommittee of the Business Advisory Network that advises the Ohio Department of Education's standards for technology education in secondary and postsecondary schools throughout the state.
C. Matthew Curtin's services are available for plaintiffs, defendants, and for the courts directly on technical matters.
This book is the story of the formation of the world's most widely-used system to protect sensitive information and how a group of independent cryptographers, civil libertarians, and hobbyists managed to demonstrate the system's weakness in June of 1997, even as the U.S. Congress debated the government's control over cryptography. As one of the coordinators of the DESCHALL project that broke a secret message encrypted with what was then the government standard, Curtin presents a unique insider view of how the project came together and what happened behind the scenes to demonstrate the weakness of the standard and ultimately to usher in the age of unrestricted cryptography.
Suitable for the IP manager or developer seeking to improve Web privacy and security, is an indispensable resource for system administrators and application developers, providing a means to understand, create, and maintain secure Internet systems.
David Shaw is an Expert with North America, Europe, and Far East expertise as an independent and impartial Technical and ICT Expert and Consultant involved in a wide range of high profile System, Integrations, remedial work on Failed Systems and Programs, Litigation, Expert Witness, Mergers and Acquisitions, Financial and Ultra-High Speed Trading Systems, Cyberwarfare and Defence work.
Scott Cooper, Principal atPegasus Squire, is retained by corporate and legal clients to deliver successful experience-based proactive and reactive solutions involving Electronic Discovery and Computer Forensics, Tactics and Strategy, and Expert Witness testimony and related services. He has over 30 years of experience in this space and has been recognized as an Industry Leader by the Southern California Business Journal, and have been featured in the New York Times.
Mr. Cooper's clients have included The White House, The US Department of Justice, General Electric, Exxon, Kirkland & Ellis, O’Melveny & Myers, Skadden Arps, and many other large national and international corporations and law firms dealing with litigation and internal (and external) investigations.
Litigation Support - A nationally recognized Expert in both Federal and State courts, Mr. Cooper has been utilized as a special master and designated as a court-appointed referee. He has also been involved in successfully supporting no-notice ex-parte computer evidence seizure motions and orders. Mr. Cooper's cases involve major corporate, financial, and oil & gas entities. His forensic services help companies and their lawyers through the steps associated with internal inquiries, governmental investigations, and litigation matters.
Mr. Cooper's most notable engagement includes working with the prevailing party on the nation’s largest corporate Intellectual Property Theft case, which created numerous Federal precedents in the area of Electronic Discovery.
Think Sherlock Holmes sans the goofy hat and magnifying glass. Today ’s digital sleuths enlist the tactics that once were only the purview of FBI and police investigators.The tools of computer forensics play a vital role in resolving matters in the corporate world and litigation process by enhancing the evidence pool, establishing truths otherwise left undiscovered and, consequently, contributing to more efficient and rapid resolution, judgments or settlements
Dr. George Edwards, Ph.D. is an expert in Computer Software, Internet Applications, Web Technologies, Mobile Phone/Tablet Applications, Digital Video and Multimedia, Medical and Embedded Software, and Aerospace/Defense Systems. He has more than a decade of experience as a scientist, engineer, and technical consultant to academic research labs, government agencies, technology companies, and attorneys.
Dr. Ewards has authored dozens of articles and papers related to software engineering for scientific journals and industry magazines. He is listed as a co-inventor on two pending patent applications for novel software technology and has served as a software expert witness in patent litigation matters.
Dr. Lavian holds a Ph.D. from the University of California, Berkeley, in computer science, specializing in networking and communications. He is a consummate expert in network communications, telecommunications, Internet Protocols (TCP/IP), LAN/WAN, Streaming media, VoIP, mobile wireless, and Internet/Web technologies. He has over 30 years of experience, has invented over 120 patents, and has co-authored over 25 scientific publications. For 20 years, Dr. Lavian has researched, studied, and lectured at UC Berkeley Engineering. He has served as an industry fellow and lecturer with UC Berkeley’s Industrial Engineering IEOR, Berkeley Engineering’s SCET, UC Berkeley’s start-up accelerator, SkyDeck, as principal investigator for CRadar.Ai and CTO for Aybell.
Areas of Expertise:
Network communications, telecommunications, Internet protocols (TCP/IP), VoIP, Streaming Media, and mobile wireless:
Communication Networks: Internet protocols; TCP/IP suite, TCP, UDP, IP, Ethernet, 802.3, network protocols, network software applications, data link, network, and transport layers (L2, L3, L4), packet switching, data center network architecture.
Mobile Wireless: Wi-Fi, 802.11, Bluetooth, MAC, PHY, Wireless LAN (WLAN). Cellular systems, SMS, instant messaging (chat), mobile devices, smartphones.
Internet/Cloud: Internet Technologies, Web applications, HTTP, e-mail, SMTP, POP, IMAP, Java, C/C++, file transfer FTP, client-server, cloud computing, distributed computing.