An internet security expert witness typically has extensive experience in computer science, software engineering, information security, and/or computer forensics. Cahn Litigation Services is frequently called upon by law firm clients to locate expert witnesses that can support internet security matters.
The intent of internet security is to protect online activities and transactions from threats, such as hacking into computer systems and email addresses, malicious software, and identity theft. In a high-profile case, or litigation involving a significant financial stake, the attorney team may request a subject matter expert with prior expert testimony experience.
Internet security is subset of cyber security and computer security, as it is focused on online protection only, and does not specifically focus on the vulnerability of computers and networks.
Digital evidence has become ubiquitous in the context of a modern legal action. This electronic evidence, consisting of any stored or transmitted information that may be relied upon in court, often requires litigants to depend upon cybersecurity or internet security expertise to determine its authenticity and use.
Representative internet security matters that have required expert witness services involve legal issues pertaining to:
Litigation support by an internet security expert witness typically includes the review of underlying technology, an expert witness report, expert opinion, deposition, and courtroom testimony. In addition, clients may seek a digital forensic or computer forensics expert for pre-litigation consultant work.
Please Note: All Cahn Litigation expert witness searches are customized to attorneys' precise specifications and preferences. Attorneys are encouraged to discuss search parameters with a Cahn search specialist.
The below expert witness bios represent a small fraction of those Internet Security experts known by Cahn Litigation Services. These bios are provided to give attorneys a sense of the Internet Security landscape.
This expert holds a Ph.D. in Applied Mathematics and Scientific Computing and is a Professor in the Electrical and Computer Engineering Department at a research university. Further, this expert serves as Associate Director of a wireless network laboratory, where this expert directs research in wireless security. This expert is a Fellow of the IEEE for contributions to Information Security. This expert has focused research efforts on wireless network security, and led a large research group that has produced research that has appeared in numerous high-impact journals and premier networking, security and systems conferences. This expert has led several federally funded projects in the area of cybersecurity and communication systems, involving security and privacy for sensor networks, physical layer security for wireless systems, a security framework for cognitive radios, the development of wireless testbed resources, and new RFID technologies. This expert was involved in an NSF-funded project, which is a clean-slate effort to re-architect the Internet to support mobility and improved security. This expert has led a DARPA initiative into validating and prototyping physical layer security mechanisms, an Army Research Office project on the theory of physical layer security, and an Army project on cognitive radio networks and routing protocols. This expert has published over 150 papers, including six best papers awards (two in media security, one in Internet design, one in cognitive radio systems, one in mobile computing, and one in wireless security). This expert's experience in network security and wireless spans many years, and this expert has co-authored a popular textbook in security, as well as several notable monographs on wireless security.
This expert's activities in wireless security include the investigation of techniques to secure wireless sensor networks, which includes validating the authenticity and validity of sensor measurements using both cryptographic and non-cryptographic mechanisms. This expert has provided technical analysis to lawyers at the Federal Trade Commission in regards to an anti-trust case. This work involved analyzing defendant software and subpoenaed documents, and subsequently writing thorough reports in regards to the potential intent existing within the defendant's software. This expert has also written several patents.
This expert brings to the table many years of experience and a global reputation for integrity, accuracy, and innovation, and is widely considered one of the world's leading authorities in information protection and risk management. This expert is CEO of an internationally recognized and trusted advisory firm specializing research and advisory services, litigation support, developing high demand graduate education programs, pathfinder studies, and business growth strategies.
This expert has extensive knowledge of issues related to digital forensics and the operation of computers, applications, devices, networks, and related mechanisms. This starts with experience designing, building, managing, operating, examining, and using computers and other devices and the Internet and its predecessor the ARPAnet, starting from when this expert was a computer operator for one of the early nodes in the ARPAnet. This expert has performed a wide variety of different functions associated with the Internet and systems connected thereto continuously, including without limit; specifically writing such software and analysis of such software; (2) examination and analysis of systems, mechanisms, claims, and asserted evidence for legal matters.
This expert has performed research over a period of years and published peer reviewed papers and two books as well as book chapters on issues of digital forensic evidence examination including specific work on examining digital traces for consistency, similarity, and a variety of closely related issues. This expert has testified at deposition and at trial in matters involving digital forensics including systems, mechanisms, and asserted evidence involving the Internet and related environments and systems, and has been qualified as an expert in Federal, State, and Local matters.
This expert earned and received a B.S. in Electrical Engineering, an M.S. in Information Science, and a Ph.D. in Electrical Engineering.
As a corporate consultant and industry analyst this expert has helped advise hundreds of the world's largest enterprises on security and risk management strategy and their information protection programs. As a consultant to and researcher for the U.S. government this expert was the principal investigator on seminal studies in defensive information operations. This expert has also worked in critical infrastructure protection, with law enforcement, and with the intelligence community to help improve their ability to deal with computer related crime and emerging threats to national security. This expert has worked on issues of digital forensics, including work for many large corporations, testimony in federal and state criminal and civil matters, and pro bono and state-funded work for indigent defendants.
This expert is both an Independent Consultant and Expert Witness, as well as an Associate Professor of Engineering Practice. As part of this expert's academic responsibilities, this expert teaches courses on Internet of Things (IoT), Computer Networks, System-on-Chip, Special topics: Software Design and Optimization for Electrical Engineers, and System Verification where the focus is on various algorithms that directly relate to mobile transactions and the security issues associated with them. This expert also performs research on various security and safety aspects of systems, including those in IoT, cloud and data centers. Several of this expert's publications are related to security, verification and optimization of mobile/cloud/data center systems. This expert has been involved in several patent litigation matters related to cloud computing, mobile systems, edge computing, and secure software licensing transactions. This expert has given deposition testimony but has not yet testified at trial. This expert is well published and has presented at industry conferences.
This expert is a world-renowned researcher who has extensive research, technical, managerial, and Intellectual Property/patent expertise in the areas of telecommunications, networking, broadband, MetroEthernet, SONET/SDH/OTN Internet, VoIP, wireless, video, multimedia, MPLS, IPv6, e-commerce, and IoT/M2M for both carrier networks and enterprise networks. This expert's specialties include analysis, design, implementation, operation, and advocacy of new network technologies, particularly with an emphasis on packet technologies and the Internet Protocol (IP) for traditional and broadband applications such as:
Voice over IP (VoIP); Video Over IP (e.g., IPTV, specifically, entertainment quality digital TV, video distribution over satellite/DTH, High Throughput Satellites [HTSs], multimedia; wireless connectivity (including Wi-Fi, wireless sensor networks, and communication/DTH/HTS satellites); security; intranet; Internet/intranet architecture and QoS; IoT/M2M; LANs/VLANs/MetroEthernet; and the underlying high-capacity network infrastructure to support these applications along with the call control signaling logic (SS7/Q.931/Q.2931/Q.933) and Advanced Intelligent Network (AIN) services. Packet systems include X.25/NCP, IPv4, Frame Relay (FR), Asynchronous Transfer Mode (ATM), MultiProtocol Label Switching (MPLS), and IPv6. This expert has also done work in cloud services (Cisco UCS) and IoT/M2M, Smart Cities, Smart Buildings, Smart Grid, and e-health.
This expert has many years of hands-on ATM/SONET/MetroEthernet/OTN experience. In addition to numerous papers and conference presentations, this expert has written several books on LANs/VLANs/MetroEthernet, MPLS, Internet Services Cloud services, and IoT/M2M.
This expert has over 200 published patents as well as 35 patent applications cite this expert's work. Additionally, 5000+ academic researchers cite this expert's work in their publications, according to Google Scholar. This expert has taught IT and Telecommunications courses. This expert has appeared in industry conferences as well a radio and TV technology programs.
This expert has been called upon to undertake infringement/non-infringement analysis (with resulting depositions and testimony) in the area of packet video/IPTV, packet voice/VoIP, imaging (scanned checks), IoT, and wireless.
This expert holds a PhD in Computer Science and specializes in Computer security and privacy, Internet and Web technologies, and software forensics. This expert has brought these skills to bear building a highly successful litigation support consultancy providing technical research and consulting services for software litigation and review, including:
Clients have engaged this expert in cases including trade secrets, patents, privacy, internal product reviews, and antitrust. This expert has testified at trial 8 times, had 19 depositions, and has served almost 10,000 pages of expert reports.
Web bugs (beacons) have been one of this expert's research areas and this expert has published in this area. This expert continues working in Web technologies and is quite comfortable with them.
This expert received a Ph.D. in Computer Science. This expert joined a prestigious University and is Associate Director of its Applied Research Institute where this expert is working with projects related to national security. Specializing in network protocols, telemedicine, electronic commerce, medical data privacy and security, this expert was a National Lecturer, gave keynote addresses at several leading conferences, and is a Fellow of the IEEE. This expert has supervised over 130 funded research projects, advised 68 PhD and master's students, and co-authored two books, 14 book chapters, and 170 refereed journal and conference publications. This expert and colleagues developed a Transport Protocol (supporting multicast and knowledge of the multicast group members) for the US Navy, and then turned it into a commercial product. This expert's current research focuses on medical data privacy and security, implemented by supporting authentication, authorization, and federation across trust domains. This expert is also developing delta compression algorithms for diverse environments. This expert was a Founding Director of an Internet Technology Innovation Center, which provided technical and business strategy for e-business, and developed e-commerce software for corporate and government clients. Other projects include improving security for mobile devices, evaluating relational keyword search techniques, and writing software that can perform a scientometric analysis of scientific literature.