Cybersecurity Experts

Barr Group's experienced computer security expert witnesses review patent portfolios and advise attorneys in cyberbreach and IP litigation.  Many Barr Group engineers have hands-on experience designing secure computing platforms. And our cybersecurity expert team includes several who have testified in high-profile civil and criminal trials.

Need an expert for cybersecurity litigation?  Contact us >

Information Security and Cyberbreaches

From electronic medical devices and health records to safety-critical automotive electronics and mission-critical cloud-hosted business applications and distributed databases, the stakes have never been higher for data security and privacy.

At Barr Group we have been in the business of designing secure computers since our founding and our staff includes world-leading cybersecurity experts and trainers. Our areas of expertise include:

  • Symmetric and asymmetric (public key) encryption and decryption
  • Elliptic curve cryptography (ECC)
  • Digital rights management (DRM) for software activation, e-books, etc.
  • Security and privacy of electronic voting systems (e-voting)
  • Encryption and decryption algorithms such as DES, RSA, and AES
  • User authentication and digital signatures
  • Zero-knowledge tests and secure hashes (e.g., MD5)
  • Firewalls and secure network protocols (TLS/SSL, SSH/SFTP, WAP/WEP)
  • Biometric security, including fingerprints, retina scans, and facial recognition
  • Computer viruses and other malware such as trojans and ransomware
  • Distributed Denial of Service (DDoS) and other attacks
  • Trusted computing modules like TPM and secure bootloaders

Barr Group's software experts are familiar with all major operating systems--such as Linux/Android, iOS, and Windows--and programming languages, including Java, JavaScript, C/C++, C#, Objective-C, Python, Perl, PHP, and assembly.

Request your computer security expert now >

Expert Witness Services

Barr Group's computer security experts support plaintiffs and defendants in litigation in U.S. District Courts, at the International Trade Commission (ITC), and before the Patent Trial and Appeal Board (PTAB). Our services include:

  • Technical assistance with drafting of discovery requests
  • Software source code review and analysis
  • Source code comparisons for copyright and trade secret theft
  • Prior art review for patent invalidity
  • Reverse engineering of electronics and schematics review
  • Forensic analysis of malware, including binary code disassembly
  • Extraction of system logs and electronically-stored metadata
  • Investigation of cyber attacks and data breaches
  • Security audits and penetration testing
  • Expert reports, declarations, and witness statements
  • Testimony at deposition, oral hearings, and trials

Our experience with computer security litigation is extensive and includes electronics and source code analysis and testimony for a large number of cases in numerous U.S. District Courts and the Superior Court of Québec, including in relation to satellite TV hacking and signal interception.

Barr Group has a demonstrated ability to quickly activate one or more engineers to match the size, scope, and complexity of any project.

How can we help you today? >

The following is a representative subset of Barr Group's experts who have experience designing and/or testifying about these technologies:

Computer Security

Embedded Software Design Expert Profile

Former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded systems.

Cryptography & Encryption Expert Profile

Internationally renowned cryptographer and security technologist with two decades of industry experience in computer security.

Computer Security Expert Profile

Electrical engineer with extensive electronics and software product development experience across a broad range of industries and platform architectures.

Pages

Expert J523N

Security consultant and adjunct professor who has developed novel and patented security...

Expert S530O

Electrical engineer with extensive electronics and software product development experience...

Expert E235M

Consultant and former computer science instructor who has written more than two dozen books and...

Expert N120K

Electrical engineer and computer scientist with extensive technical skills in

Expert B600R

Former adjunct professor of computer engineering with more than twenty-five years of experience...

Expert T512N

MIT-educated computer scientist experienced in analyzing, architecting, designing, developing...

Expert G650N

Internationally renowned cryptographer and security technologist with two decades of industry...

Expert M320K

Software and systems engineer with several decades of hands-on experience

Expert K532N

Professor emeritus of computer science at one university and an associate professor of the same...

Expert M244N

Professor of electrical and computer engineering with significant industry

Expert D130T

Former assistant professor of electrical and computer engineering and Oxford-educated materials...

Expert B320S

Career consultant in the field of telecommunications and information services with extensive...

Expert O600R

Computer networking and wireless technology expert with over thirty years of industry experience...

Don't see the right expert for your project among this subset?

Describe the perfect expert for your case >