An information security expert witness typically has extensive experience and expertise in computer science, information security, cyber security, and/or computer forensics. An information security expert witness should also feel confident explaining digital evidence and technology to a jury. In a high-profile case, or litigation involving a significant financial stake, a law firm may request an information security subject matter expert with prior expert testimony experience.
Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of physical or electronic information. Information security programs are commonly built around CIA (Confidentiality, Integrity and Availability).
Cahn Litigation Services is frequently called upon by law firm clients to locate expert witnesses that can support information security and cyber security matters. Representative information security matters that have required expert witness services involve legal issues pertaining to cybersecurity software patent infringement, data breach, computer security, and intrusion detection. A computer forensics expert can reverse engineer components to prove (or disprove) intellectual property infringement, theft, or cyber crime. Litigation support by an information security expert witness can include a review of the underlying technology, a digital forensic investigation, an expert report, expert opinion, and courtroom testimony. Attorney clients may also utilize a computer security expert or cybersecurity expert for pre-litigation security consulting work.
Please Note: All Cahn Litigation expert witness searches are customized to attorneys' precise specifications and preferences. Attorneys are encouraged to discuss search parameters with a Cahn search specialist.
The below expert witness bios represent a small fraction of those Information Security experts known by Cahn Litigation Services. These bios are provided to give attorneys a sense of the Information Security landscape.
This expert holds a Ph.D. in Applied Mathematics and Scientific Computing and is a Professor in the Electrical and Computer Engineering Department at a research university. Further, this expert serves as Associate Director of a wireless network laboratory, where this expert directs research in wireless security. This expert is a Fellow of the IEEE for contributions to Information Security. This expert has focused research efforts on wireless network security, and led a large research group that has produced research that has appeared in numerous high-impact journals and premier networking, security and systems conferences. This expert has led several federally funded projects in the area of cybersecurity and communication systems, involving security and privacy for sensor networks, physical layer security for wireless systems, a security framework for cognitive radios, the development of wireless testbed resources, and new RFID technologies. This expert was involved in an NSF-funded project, which is a clean-slate effort to re-architect the Internet to support mobility and improved security. This expert has led a DARPA initiative into validating and prototyping physical layer security mechanisms, an Army Research Office project on the theory of physical layer security, and an Army project on cognitive radio networks and routing protocols. This expert has published over 150 papers, including six best papers awards (two in media security, one in Internet design, one in cognitive radio systems, one in mobile computing, and one in wireless security). This expert's experience in network security and wireless spans many years, and this expert has co-authored a popular textbook in security, as well as several notable monographs on wireless security.
This expert's activities in wireless security include the investigation of techniques to secure wireless sensor networks, which includes validating the authenticity and validity of sensor measurements using both cryptographic and non-cryptographic mechanisms. This expert has provided technical analysis to lawyers at the Federal Trade Commission in regards to an anti-trust case. This work involved analyzing defendant software and subpoenaed documents, and subsequently writing thorough reports in regards to the potential intent existing within the defendant's software. This expert has also written several patents.
This expert brings to the table many years of experience and a global reputation for integrity, accuracy, and innovation, and is widely considered one of the world's leading authorities in information protection and risk management. This expert is CEO of an internationally recognized and trusted advisory firm specializing research and advisory services, litigation support, developing high demand graduate education programs, pathfinder studies, and business growth strategies.
This expert has extensive knowledge of issues related to digital forensics and the operation of computers, applications, devices, networks, and related mechanisms. This starts with experience designing, building, managing, operating, examining, and using computers and other devices and the Internet and its predecessor the ARPAnet, starting from when this expert was a computer operator for one of the early nodes in the ARPAnet. This expert has performed a wide variety of different functions associated with the Internet and systems connected thereto continuously, including without limit; specifically writing such software and analysis of such software; (2) examination and analysis of systems, mechanisms, claims, and asserted evidence for legal matters.
This expert has performed research over a period of years and published peer reviewed papers and two books as well as book chapters on issues of digital forensic evidence examination including specific work on examining digital traces for consistency, similarity, and a variety of closely related issues. This expert has testified at deposition and at trial in matters involving digital forensics including systems, mechanisms, and asserted evidence involving the Internet and related environments and systems, and has been qualified as an expert in Federal, State, and Local matters.
This expert earned and received a B.S. in Electrical Engineering, an M.S. in Information Science, and a Ph.D. in Electrical Engineering.
As a corporate consultant and industry analyst this expert has helped advise hundreds of the world's largest enterprises on security and risk management strategy and their information protection programs. As a consultant to and researcher for the U.S. government this expert was the principal investigator on seminal studies in defensive information operations. This expert has also worked in critical infrastructure protection, with law enforcement, and with the intelligence community to help improve their ability to deal with computer related crime and emerging threats to national security. This expert has worked on issues of digital forensics, including work for many large corporations, testimony in federal and state criminal and civil matters, and pro bono and state-funded work for indigent defendants.
This expert received a Ph.D. degree in electrical engineering. This expert's research is in the broad area of wireless communications and networking, with particular emphasis on resource management, distributed protocols, and security. This expert has worked extensively on secure verification of location and timing information, including privacy preserving audit mechanisms. This expert's research in this area focused on third-part privacy preserving audits of encrypted control messages (e.g., secure sensing measurements that must be accompanied by time and GPS coordinates) in various contexts, including wireless sensor networks, storage systems (verifiability of stored data in cloud storage), location-based message verification in packet relaying, and others.
This expert has been involved in NSF and DoD funded projects related to cognitive radio networks; shared and dynamic spectrum access; coexistence of heterogeneous wireless systems (e.g., LTE-U/WiFi); wireless security (e.g., obfuscation of transmission signatures, MIMO-based friendly jamming; insider attacks, selective-reactive jamming/dropping, game-theoretic countermeasures); 802.11 WLANs; power control protocols; multi-channel MIMO systems (including virtual/cooperative MIMO); mmWave systems; secure satellite communications; energy management in solar-powered WSNs; full-duplex communications and self-interference suppression; and media streaming over wireless links. This expert worked on packet scheduling and buffer management in switches and routers, QoS provisioning, fault monitoring/detection in optical networks, effective-bandwidth theory, traffic characterization, voice-over-IP, and video-on-demand systems. This expert has published more than 250 journal articles and peer-reviewed conference papers, and is a co-inventor of 5 granted/pending US patents. This expert's grants include 20 competitive NSF awards, 16 of which this expert served as the sole or lead PI. This expert was a keynote speaker at various conferences, including IEEE ICCSP, IEEE CRESS, IEEE CCW, IFIP Wireless Days, and the IEEE Workshop on Wireless Mesh Networks. This expert was an invited panelist at various international conferences. This expert gave tutorials at premier wireless networking conferences and frequently consults for companies in the telecommunications sector.
This expert holds a PhD in Computer Science, serves as an Associate Professor for a College of Information Systems as well as director of a Human-Computer Interaction Lab. Specializing in web, privacy and social media, this expert's work began professionally as a web designer. This expert started a web design company that built commercial websites. Since moving to academia, this expert has taught web design and web programming and written a textbook on web design.
This expert's work spans many areas, but core research interests are in understanding how people use social media to improve the way they interact with information. This expert approaches this from a computer science perspective and this expert's general research hits social networks, trust, web science, artificial intelligence, and human-computer interaction. This expert has done a lot of work looking at how to infer information about people (like personality and political preferences) and their relationships (like trust) from social media. This expert also works on usable security, bringing HCI to the design of security and privacy systems.
Areas of Expertise include:
This expert has extensive experience as an expert witness analyzing intellectual property issues, including patent validity and infringement and prior art. This expert has work as a technical expert, both pre-trial and in trial, on the workings of most major social media systems and recommender systems as well as the history and development of the web, web science, social networks, and social media.
This expert is an internationally recognized Information and Communications Technology (ICT) architect with expertise in designing and deploying enterprise-class solutions in a wide range of technologies and business sectors. This expert's extensive experience spans industry, U.S. Government, and academia environments. This expert is also a practicing security and privacy professional, who has specialized in data protection and storage security, where this expert is recognized as one of the top experts in the world.
This expert is an Associate Member of the American Bar Association (ABA) and been active with the Section of Science and Technology Law (SciTech). In addition to speaking and publishing on behalf of the ABA, this expert has served in several SciTech leadership roles. This expert is also actively involved in the ABA's Internet of Things (IoT) National Institute and the Artificial Intelligence National Institute.
Additionally, this expert has actively contributed to the efforts and projects of key ICT-based standards development organizations and industry associations as part of a focus on advancing the state of various technologies. This expert's passion for technology has been recognized in the form of awards and leadership positions in organization such as ISO/IEC, the InterNational Committee for Information Technology Standards (INCITS), the IEEE Computer Society, the Cloud Security Alliance (CSA), and the Storage Networking Industry Association (SNIA). This expert is or has served in an editorship role on the following international standards projects: ISO/IEC 22123 (Cloud computing -- Concepts and terminology), ISO/IEC 27031 (ICT readiness for business continuity), ISO/IEC 27050 (Electronic discovery), ISO/IEC 27040 (Storage security), ISO/IEC PAS 16248 (TLS for Storage Systems), Rec. ITU-T 3500 | ISO/IEC 17788 (Cloud computing -- Overview and vocabulary), and IEEE 1619-2018 (XTS-AES).
This expert possesses a unique set of professional credentials that include the (ISC)2 CISSP-ISSAP, ISSMP, and ISSEP certifications as well as the ISACA CISA, IAPP CIPT, and CSA CCSK certifications.
This expert has many years of experience in Computer Science, Security network communications, Remote control, and monitoring systems. This expert has specialized in wireless and cloud based security applications monitored from mobile applications, and device controls configured by user profiles.
This expert has been an expert for over 25 cases including 12 remote control and security network communications and patent litigation cases. This expert has provided Expert Reports, IPR, CBM, Deposition, and Trial Testimony. This includes testifying in a technology patent suit for remote authorization from a mobile device, where the judge found for this expert’s client and cited this expert on all points of contention. This expert’s analysis also contributed to a $35 million settlement in a Network Transaction systems patent litigation.
Sample of Professional Experience
Designed computer control systems and user control panels for remote control of manufacturing equipment.
Implemented remote monitoring of telephone facilities including central office switch buildings. Application included remote control of X10 monitoring devices and alarm activation operating on local secure networks and external networks.
Development of remote monitoring applications for monitoring of utility buildings including powerline monitoring utilizing Network alarm notification. Also implemented system for remote meter reading and remote control of appliances.
Development of mobile applications (iPhone and Android), high speed wireless communications, WiFi security mesh networks, and performed evaluation of secure networks and telecommunication system.