Cybersecurity Experts

Barr Group's experienced computer security expert witnesses review patent portfolios and advise attorneys in cyberbreach and IP litigation.  Many Barr Group engineers have hands-on experience designing secure computing platforms. And our cybersecurity expert team includes several who have testified in high-profile civil and criminal trials.

Need an expert for cybersecurity litigation?  Contact us >

Information Security and Cyberbreaches

From electronic medical devices and health records to safety-critical automotive electronics and mission-critical cloud-hosted business applications and distributed databases, the stakes have never been higher for data security and privacy.

At Barr Group we have been in the business of designing secure computers since our founding and our staff includes world-leading cybersecurity experts and trainers. Our areas of expertise include:

  • Symmetric and asymmetric cryptographic protocols
  • Digital rights management (DRM) for software activation, e-books, etc.
  • Security and privacy of electronic voting systems (e-voting)
  • Encryption and decryption algorithms such as DES, RSA, and AES
  • User authentication and digital signatures
  • Zero-knowledge tests and secure hashes (e.g., MD5)
  • Firewalls and secure network protocols (TLS/SSL, SSH/SFTP, WAP/WEP)
  • Biometric security systems, including fingerprints and retina scans
  • Computer viruses and other malware such as trojans and ransomware
  • Trusted computing modules like TPM and secure bootloaders

Barr Group's software experts are familiar with all major operating systems--such as Linux/Android, iOS, and Windows--and programming languages, including Java, JavaScript, C/C++, C#, Objective-C, Python, Perl, PHP, and assembly.

Request your computer security expert now >

Expert Witness Services

Barr Group's computer security experts support plaintiffs and defendants in litigation in U.S. District Courts, at the International Trade Commission (ITC), and before the Patent Trial and Appeal Board (PTAB). Our services include:

  • Technical assistance with drafting of discovery requests
  • Software source code review and analysis
  • Source code comparisons for copyright and trade secret theft
  • Prior art review for patent invalidity
  • Reverse engineering of electronics and schematics review
  • Forensic analysis of malware, including binary code disassembly
  • Extraction of system logs and electronically-stored metadata
  • Investigation of cyber attacks and data breaches
  • Security audits and penetration testing
  • Expert reports, declarations, and witness statements
  • Testimony at deposition, oral hearings, and trials

Our experience with computer security litigation is extensive and includes electronics and source code analysis and testimony for a large number of cases in numerous U.S. District Courts and the Superior Court of Québec, including in relation to satellite TV hacking and signal interception.

Barr Group has a demonstrated ability to quickly activate one or more engineers to match the size, scope, and complexity of any project.

How can we help you today? >

The following is a representative subset of Barr Group's experts who have experience designing and/or testifying about these technologies:

Computer Security

Biometric & Physical Security Expert Profile

Security consultant and adjunct professor who has developed novel and patented security technologies including for biometric security.

Wireless Protocols Expert Profile

Computer networking and wireless technology expert with over thirty years of industry experience.

Enterprise Software Expert Profile

MIT-educated computer scientist experienced in analyzing, architecting, designing, developing and optimizing service provider and enterprise solutions for a wide variety of industries. 

Wired & Wireless Networks Expert Profile

Career consultant in the field of telecommunications and information services with extensive involvement in the design of major voice and data networks.

Embedded Software Design Expert Profile

Former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded systems.

Cryptography & Encryption Expert Profile

Internationally renowned cryptographer and security technologist with two decades of industry experience in computer security.

Computer Security Expert Profile

Electrical engineer with extensive electronics and software product development experience across a broad range of industries and platform architectures.

Expert J523N

Security consultant and adjunct professor who has developed novel and patented security...

Expert S5300

Electrical engineer with extensive electronics and software product development experience...

Expert B600R

Former adjunct professor of computer engineering with more than twenty-five years of experience...

Expert T512N

MIT-educated computer scientist experienced in analyzing, architecting, designing, developing...

Expert G650N

Internationally renowned cryptographer and security technologist with two decades of industry...

Expert B320S

Career consultant in the field of telecommunications and information services with extensive...

Expert O600R

Computer networking and wireless technology expert with over thirty years of industry experience...

Don't see the right expert for your project among this subset?

Describe the perfect expert for your case >