Dr. Chuck Easttom

5605 Woodspring Drive
Plano, TX 75093
Office: 214-551-5216
Introduction

Dr. Easttom has 30 years of computer industry experience,a doctorate (D.Sc.) in cyber security (dissertation topic: "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing"), a doctorate (Ph.D.) in technology (focused on nanotechnology dissertation topic: "The Impact of Complexity on Carbon Nanotube Failures"), and a third doctorate: a Ph.D. in computer science (dissertation topic "A Systematic Framework for Network Forensics Using Graph Theory"), as well as 3 masters degrees (1 in applied computer science, 1 in systems engineering, and 1 in education) and over 70 industry certifications. His experience includes software engineering, database design, network administration, cryptography, machine learning, data mining, engineering processes, as well as cybersecurity and digital forensics. He is the author of 42 published computer science books, over 70 published papers, and holds 26computer science related patents. In addition to industry experience, he has 20 years of litigation support experience including extensive testifying experience at depositions and trials. He has testified over 75 times. Chuck Easttom is a senior member of the IEEE and senior member of the ACM, and is a Distinguished Speaker of the ACM and a Distinguished Visitor of the IEEE. He has worked on digital forensics cases, computer patent cases, software copyright cases, cybersecurity cases, and trade secrets cases.


Areas of Expertise
  • Artificial Intelligence
  • Computer Security
  • Copyrights
  • Cybersecurity
  • Intellectual Property
  • Internet
  • Networking
  • Patents
  • Software Engineering
  • Trade Secrets

Expert Background
Q: Please list your professional accreditations, degrees, licenses, and certificates granted:
A: University Degrees
• B.A. Southeastern Oklahoma State University. Major Communications with Minors in Chemistry and Psychology. Extensive coursework in science (chemistry, physics, and biology) as well as specific courses in neuroscience (neurobiology of memory, cognitive science, etc.). Also, additional coursework in computer science including programming and database courses. While attending I was named to the National Dean’s List.
• M.Ed. Southeastern Oklahoma State University. Coursework included technology related courses such as digital video editing, multimedia presentations, and computer graphics. A statistics course was also part of the coursework. While attending I was named to Who’s Who in Colleges and Universities.
• M.B.A. Northcentral University major in Applied Computer Science. Extensive course work in graduate computer science including graduate courses in C++ programming, C# programming, Computer Graphics, Web Programming, Network communication, Complex Database Management Systems, and Artificial Intelligence. Approximately 30 graduate hours of graduate computer science courses. Additionally, a doctoral level statistics course was included. A semester research project in medical software was also part of the curriculum. I also took several research courses beyond the requirements for the degree.
• MSSE Master of Science in Systems Engineering. University of Texas at El Paso. The coursework includes studies in software & system requirements; system integration, verification, and validation; system architecture and design; and systems modeling & simulation. 4.0 GPA member of Phi Kappa Phi honor society. Also, a member of the Gold Key Honor society.
• D.Sc. Doctor of Science in Cyber Security from Capitol Technology University. Dissertation topic was “A Comparative Study of Lattice Based Algorithms for Post Quantum Computing”. 4.0 GPA.
• Ph.D. Doctor of Philosophy in Technology from Capitol Technology University. Focused on nanotechnology, specifically carbon nanotubes used in bioengineering. Dissertation title “The Effects of Complexity on Carbon Nanotube Failures”. 4.0 GPA.
• Ph.D. Doctor of Philosophy in Computer Science from University of Portsmouth in England. The emphasis is on applied mathematics for computer science. Dissertation topic “A Systematic Framework for Network Forensics Using Graph Theory."


Industry Certifications
The following is a list of engineering and computer industry certifications I have earned.
The following is a list of engineering and computer industry certifications I have earned.

Engineering Certifications
Note: some of these appear also in computer industry certifications
1. Associate of Systems Engineering (ASEP) from INCOSE (International Council on Systems Engineering) 05452.
2. Microsoft Certified Systems Engineer (MCSE) Windows Server 2000 Certification Number: A527-9552
3. EC Council Certified Application Security Engineer - .Net
4. EC Council Certified Application Security Engineer – Java
5. CISSP- ISSEP Information Systems Security Engineering Professional #387731

Hardware and Networking Related Certifications
1. CompTIA (Computer Technology Industry Associations) A+ Certified D76DTT4107
2. CompTIA Network + Certified COMP10163630
3. CompTIA Server+ Certified COMP10163630
4. CompTIA I-Net+ Certified COMP10163630
5. CompTIA Cloud+ Certified COMP001021522764
6. JN0-103 Juniper Networks Certified Associate, Junos JNCIA-Junos
7. JN0-351 Enterprise Routing and Switching, Specialist (JNCIS-ENT)
8. JN0-649 Enterprise Routing and Switching, Professional (JNCIP-ENT)
9. Cisco 100-490 Supporting Cisco Routing and Switching Network Devices
10. CompTIA IT Operations Specialist (CIOS) COMP10163630
11. CompTIA Cloud Admin Professional (CCAP) COMP10163630
12. CompTIA Network Infrastructure Professional – CNIP COMP10163630

Operating System Related Certifications
13. CompTIA Linux + Certified COMP10163630
14. CompTIA Systems Support Specialist (CSSS) COMP10163630
15. CompTIA Linux Network Professional – CLNP COMP10163630
16. CompTIA Secure Infrastructure Specialist (CSIS) COMP10163630
17. Microsoft Certified Professional (MCP) – Windows Server 2000 Professional Certification Number: A527-9546
18. Microsoft Certified Systems Administrator (MCSA) Windows Server 2000 Certification Number: A527-9556
19. Microsoft Certified Systems Engineer (MCSE) Windows Server 2000 Certification Number: A527-9552
20. Microsoft Certified Technology Specialist (MCTS) Windows Server 2008 Active Directory Microsoft Certification ID: 1483483
21. Microsoft Certified Technology Specialist (MCTS) Windows 7 Microsoft Certification ID: 1483483

22. Microsoft Certified IT Professional (MCITP) Windows 7 Microsoft Certification ID: 1483483
23. Microsoft Certified Solutions Associate Windows 7 Microsoft Certification ID: 1483483
24. National Computer Science Academy Windows 8 Certification Certificate #: 4787829

Programming and Web Development Related Certifications
25. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Desktop Applications Microsoft Certification ID: 1483483
26. Microsoft Certified Professional (MCP) – Visual Basic 6.0 Distributed Applications Microsoft Certification ID: 1483483
27. Microsoft Certified Application Developer (MCAD) - C# Microsoft Certification ID: 1483483
28. Microsoft Certified Trainer (MCT 2005-2021) Microsoft Certification ID: 1483483
29. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Windows Application Microsoft Certification ID: 1483483
30. Microsoft Certified Technology Specialist (MCTS) Visual Studio 2010 Data Access Microsoft Certification ID: 1483483
31. National Computer Science Academy HTML 5.0 Certification Certificate #: 4788000.
32. National Computer Science Academy ASP.Net Certification Certificate #: 4788342
33. Certified Internet Webmaster (CIW) Associate CIW0163791
34. EC Council Certified Application Security Engineer - .Net
35. EC Council Certified Application Security Engineer – Java
36. Dynamics 365 Business Central Functional Consultant Associate
37. Microsoft Dynamics 365 Fundamentals Microsoft Certification ID: 1483483
38. Microsoft Certified: Azure AI Fundamentals Microsoft Certification ID: 1483483
39. Section 508 Standards for Web (Web accessibility course/certification from US DOJ Civil Rights Division).
40. What is Section 508 and Why Is It Important (Web accessibility course/certification from US DOJ Civil Rights Division).

Database Related Certifications
41. Microsoft Certified Database Administrator (MCDBA) SQL Server 2000 Microsoft Certification ID: 1483483
42. Microsoft Certified Technology Specialist (MCTS) Implementing SQL Server 2008 Microsoft Certification ID: 1483483
43. Microsoft Certified IT Professional (MCITP) SQL Server Administration Microsoft Certification ID: 1483483
44. DP-203 - Data Engineering on Microsoft Azure Microsoft Certification ID: 1483483
45. CompTIA Data+ (Data mining and Data science certification)

Security and Forensics Related Certifications
46. CIW Certified Security Analyst CIW0163791
47. EC Council Certified Ethical Hacker v5 (CEH) ECC942445
48. EC Council Certified Hacking Forensics Investigator v4 (CHFI) ECC945708
49. EC Council Certified Security Administrator (ECSA) ECC947248
50. EC Council Certified Encryption Specialist (ECES)
51. EC Council Certified Instructor
52. CISSP – Certified Information Systems Professional #387731
53. ISSAP – Certified Information Systems Architect #387731
54. CCFP – Certified Cyber Forensics Professional #387731
55. Certified Criminal Investigator (CCI) 2015-2017
56. Forensic Examination of CCTV Digital VTR Surveillance Recording Equipment
57. Oxygen Phone Forensics Certified
58. Access Data Certified Examiner (ACE) 2014-2017
59. OSForensics Certified Examiner (OSFCE)
60. Certified Forensic Consultant (CFC) 2015-2017
61. CompTIA Certified Advanced Security Practitioner (CASP) COMP10163630
62. CompTIA Certified Cybersecurity Analysis (CySA+) COMP001021522764
63. CompTIA Pentest+ COMP001021522764
64. CompTIA Security+ COMP001021522764
65. CompTIA Security Analytics Specialist-CSAP COMP001021522764
66. CompTIA Secure Cloud Professional-CSCP COMP001021522764
67. CompTIA Network Vulnerability Assessment Professional-CNVP COMP001021522764
68. CompTIA Security Infrastructure Expert -CSIE COMP001021522764
69. CompTIA Security Analytics Expert-CSAE COMP001021522764
70. CompTIA Security Network Professional – CNSP
71. JN0-230 – Juniper Security Associate (JNCIA-SEC)
72. JN0-334 – Juniper Security Specialist (JNCIS-SEC)
73. JN0-635 – Juniper Security, Professional (JNCIP-SEC)
74. CISSP- ISSEP Information Systems Security Engineering Professional #387731
75. Certified Cloud Security Professional (CCSP) #387731
76. SC-300 - Microsoft Identity and Access Administrator

Software Certifications

77. Certified Secure Software Lifecycle Professional (CSSLP) #387731
78. National Computer Science Academy Microsoft Word 2013 Certification Certificate #: 5078016
79. National Computer Science Academy Microsoft Word 2000 Certification Certificate #: 5078187
Other Certifications
80. CompTIA Project+ COMP10163630
Texas State Licensed Private Investigator. Registration Number 827827. Associated with Allegiant Investigations & Security License Number: A18596
Q: Please list your affiliations or memberships in any professional and/or industry organizations:
A: 5. Senior Member of the IEEE (Institute of Electronics and Electrical Engineers) #92862378
6. Senior Member of the ACM (Association of Computing Machinery) #0447967
7. Member of the ACM Special Interest Group on Artificial Intelligence
8. Member of the International Association of Cryptological Research (IACR)
9. International Association of Accessibility Professionals
10. Member of the ACM Special Interest Group on Security, Audit and Control
11. Member of the IEEE Nanotechnology Society
12. Member of the IEEE Engineering in Medicine and Biology Society
13. Member of the International Council of Systems Engineers (INCOSE) # 275062
14. Affiliate Member of the National Academy of Forensic Engineers
15. Member of the American Physical Society (APS). Member of both the Quantum Information and Nuclear Physics divisions from 2018 to 2023.
16. Member of the Association for the Advancement of Artificial Intelligence
17. Associate Member of the American Academy of Forensic Sciences (2015 to 2018)
18. Member of InfraGard (FBI-Civilian group for cyber security) 2013- 2019
Q: Please list any teaching or speaking experience you have had, including subject matter:
A: I routinely teach computer security, secure programming, forensics, penetration testing, and related courses all over the world.
I have taught courses at community colleges, technical colleges, and universities as well as private companies and government groups. I currently conduct teaching for corporations and government agencies. I am also currently an adjunct at Georgetown and Vanderbilt. I was an adjunct for the University of Dallas from 2019 to 2022.

I also have conducted a number of speaking engagements:
1. Mid-Cities PC Users Group September 19, 2003. The topic was computer security in general.
2. The Harvard Computer Society April 5, 2004. The topic was computer security.
3. The ACM Chapter of Columbia University November 15, 2005. The topic was computer viruses.
4. DeVry/Keller University in Dallas December 2009 Commencement Speaker.
5. Public presentation on computer crime in McKinney Texas in July 2008.
6. Southern Methodist University Computer Science and Engineering Colloquium September 2010. The topic was organized computer crime and computer terrorism. I was an invited speaker.
7. Takedowncon security conference in Dallas Texas, May 2011. The topic was steganography. I was an invited speaker.
8. An Overview of Modern Cryptography, May 5, 2011, Webinar
9. CAST Conference in Washington D.C. August 2011. The topic was Cryptography: Feistel Ciphers. The audience was primarily Department of Defense personnel and contractors. I was an invited speaker.
10. Digital Certificates: An Expert View, January 12, 2012, Webinar
11. Takedown security conference in Dallas Texas, May 2012. The topic was RSA cryptography. I was an invited speaker.
12. Problems with RSA, November 4, 2012, Webinar
13. Takedowncon security conference in Huntsville Alabama, July 15, 2013. The topic was cryptanalysis. The audience was primarily Department of Defense personnel and contractors. I was an invited speaker.
14. September 25-26, I conducted a 2-day master class in hacking techniques, in Singapore for Clariden Global. I was an invited speaker.
15. March 2014, I conducted a presentation for the University of Texas ACM chapter. The topics were distributed steganography and cryptographic backdoors.
16. May 26-27, 2014. I conducted a 2-day workshop in software testing in Singapore for Clariden Global. I was an invited speaker.
17. June 2014, I conducted a public talk on computer crime and internet safety in Melissa Texas, sponsored by the Melissa Police Department.
18. October 1, 2014, presentation of a talk on cryptographic backdoors at the ISC2 Security Conference in Atlanta Georgia.
19. October 5, 2014, presentation of a talk on cryptographic backdoors at the Hakon convention in Indore, India. I was an invited speaker.
20. October 17, 2014, U.S. Secret Service, North Texas Electronic Crimes (N-TEC) Task Force presenting a talk on the history and current state of computer crime. I was an invited speaker.
21. November 7, 2014, North Texas Crime Commission-Healthcare Cyber Security Symposium presenting a talk on health care breaches. I was an invited speaker.
22. January 27, 2015: Collin County Sheriff's Academy Alumni Association. "Cybercrime and online predators".
23. April 14, 2015, Brighttalk webinar “What you don’t know about Cryptography and how it can hurt you”.
24. May 4, 2015, North Texas Crime Commission-Healthcare Cyber Security Symposium presenting a talk on the causes and remediation of health care breaches. I was an invited speaker.
25. May 12, 2015, SecureWorld Houston “What you don’t know about Cryptography and how it can hurt you”.
26. August 20, 2015. Southwest Financial Crimes Forum “7 biggest mistakes of incident response.” I was an invited speaker.
27. September 30, 2015, ISC2 Security Congress “Cryptanalysis for Forensics”.
28. October 3, 2015. Conducted a 1-day workshop in Malware at Hakon India. I was an invited speaker.
29. October 4, 2015. Hakon India Indore India. 2015 “Cyberwar and Terrorism”.
30. November 4, 2015, iSMG Fraud Summit in Dallas Texas “Business Email Masquerading: How Hackers Are Fooling Employees to Commit Fraud”. I was an invited speaker.
31. November 5, 2015, SWACHA Electronic Payments Summit in Irving Texas “Emerging Trends in Cyber Crime”. I was an invited speaker.
32. May 25, 2016 “Improving Professional Standards in Cyber Forensics” Keynote speaker for Association of Digital Forensics Security and Law. I was an invited speaker.
33. June 22, 2016, the topic was “Cyber Security Issues Facing Business” Texas Security Bank Business Institute meeting. I was an invited speaker.
34. August 4, 2016 “Steganography: The in’s and Out’s” DefCon 24, Las Vegas.
35. September 12, 2016, USMCOC Third North American Sustainable Economic Development Summit Cyber Security, Information Technology & Innovation Panel. I was an invited speaker.
36. September 13, 2016, Tarleton State University CyberSecurity Summit at the George W. Bush Institute. The topic was "A template for incident response". I was an invited speaker.
37. September 28, 2016, Secure World Dallas. A presentation on "Analyzing Forensic Evidence -Applications of graph theory to forensic analysis”.
38. October 2, 2016, Hakon India (Indore India). A presentation on “The Dark Web Markets – Implications for Law Enforcement and Counter Terrorism”. I was an invited speaker.
39. October 18-19, 2016, Jordan Cyber Security & Forensics Forum (JCSFF-2016) Presenting two presentations. The topics were “Zero Day Exploits” and “How to forensically analyze Zero Day Exploits”. I was an invited speaker.
40. December 1-2. I conducted a 2-day advanced workshop on cyber-threat intelligence in Singapore for Clariden Global. I was an invited speaker.
41. January 17, 2017, the 2nd International Congress of the International Association of Law and Forensic Science (IALFS), in Cairo Egypt January 17, 18, 19. The topics were “Improving Digital Forensics” and “Applying Graph Theory to Model Forensic Examinations”. I was an invited speaker.
42. February 11, 2017. North Texas Cyber Security Association bimonthly meeting. Speaking on Dark Web Markets and their impact for law enforcement and intelligence agencies. Plano Texas Collin College Courtyard Campus.
43. February 17, 2017. American Academy of Forensic Sciences 69th Annual Meeting. Speaking on a novel approach JTAG phone forensics.
44. March 3, 2017. University of North Texas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.
45. May 24, 2017. Enfuse 2017 conference in Las Vegas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.
46. July 27, 2017. Defcon 25 2017 conference in Las Vegas. A presentation entitled “Windows: The Undiscovered Country” on undocumented features of Windows and SQL Server that can be used for hacking and penetration testing.
47. September 25, 2017, ISC2 Security Congress in Austin Texas. A presentation on" Applying Graph Theory to Analyzing Digital Evidence".
48. September 27 and 28, 2017. Secure Jordan conference in Amman. I presented two talks. The first is "An overview of current challenges in phone forensics". The second is "How to address dark web markets".
49. October 18-19 SecureWorld Dallas 2017. A presentation on "Cryptography, what you don't know and how it can hurt you".
50. January 8 to 10th Annual IEEE Computing and Communication Workshop at the University of Nevada in Las Vegas, a presentation on my paper "A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives". I also chaired a session on Artificial Intelligence, and another session on Computer Architecture and VLSI.
51. March 8 to 9 ICCWS conference (13th International Conference on Cyber Warfare and Security) presenting my paper "The Role of Weaponized Malware in Cyber Conflict and Espionage". Also presenting a research poster on “A Modified McCumber Cube as a Basis for a Taxonomy of Attacks”
52. March 23, 2018, presenting "Penetration Testing as a Profession Rather than a Dark Art". at the ISC2 Dallas Chapter Meeting in Murphy Texas.
53. April 11, 2018, University of Texas at Dallas ACM chapter is hosting my Distinguished Speaker of the ACM Talk "Quantum Computing and Lattice Based Cryptography."
54. May 7, 2018, Princess Sumaya University for Technology in Amman Jordan hosted my Distinguished Speaker of the ACM Talk "Applying Graph Theory to Digital Forensics"
55. May 17, 2018. SecureWorld Houston 2018. Presentation on "Quantum Computing and Cryptography.”
56. May 17, 2018, speaking on “Quantum Computing and Post Quantum Cryptography” at SecureWorld Houston.
57. September 17-19, 2018, I presented presenting "Dark Web Market Investigations" at the San Antonio Techno Security & Digital Forensics Conference
58. September 25, 2018, I presented "Dark Web Market Investigations" at the Global Security Exchange (GSX) 2018 (formerly the Annual Seminar and Exhibits) in Las Vegas Tuesday, September 25, 2018 (11 am Session 5127)
59. October 8-10, 2018 "An exploration of quantum computing and post quantum cryptography" ISC2 Security Congress in New Orleans.
60. October 10-11, 2018, speaking on “Quantum Computing and Post Quantum Cryptography” at SecureWorld Dallas.
61. October 23-24, 2018, IEEE International Symposium on Technologies for Homeland Security. Presenting my paper "A Systems Approach To Indicators Of Compromise Utilizing Graph Theory"
62. January 7-9, 2019. On 9 January at 10:30 I was the keynote speaker at the IEEE CCWS conference in Las Vegas presenting a talk on "The impact of complexity and emergent properties on engineering". During the conference I am also presenting my papers "A Modified McCumber Cube as a Basis for a Taxonomy of Cyber Attacks" and "An Analysis of Leading Lattice-Based Asymmetric Cryptographic Primitives"
63. February 11th, an invited talk on “Application of Graph Theory for Digital Forensics” at Seton Hall University.
64. March 7-8, 2019, The International Conference on Data Sciences, Security and Applications(ICDSSA, 2019) Delivering two invited talks: "Overview of Cryptographic Backdoors" and "S-Box Design in symmetric cryptographic primitives" as part of the Distinguished Speakers of the ACM program.
65. March 14-15, 2019. Future of Information and Communication Conference (FICC) 2019 in San Francisco. I presented my Distinguished Speaker of the ACM talk: "Quantum Computing and Lattice Based Cryptography" as an invited keynote speaker.
66. April 4, 2019, Cyberintelligence Summit - Identifying Emerging Threats & Defenses. Fayetteville Arkansas. Speaking on "What Computer Science and Digital Forensics Can and Cannot Do for You in any Case". This is at the University of Arkansas School of Law, Fayetteville, Arkansas.
67. April 5, 2019, Cyberintelligence Summit - Identifying Emerging Threats & Defenses. Fayetteville Arkansas. Speaking on "What Computer Science and Digital Forensics Can and Cannot Do for You in any Case". This is at the Arkansas Bar Center, Little Rock, Arkansas.
68. May 23-24, 2019. ACM Colloquium on Information Assurance, Cybersecurity, and Management CIACAM in Minneapolis. Delivering my Distinguished Speaker of the ACM talk on "Quantum Computing and Lattice Based Cryptography".
69. September 27-28. ICCSIE –International Conference on Computer Science and Information Engineering in Beijing China. Presenting two papers as well as a keynote address "The current state of Quantum Computing"
70. October 11, 2019. Hacker Halted, presenting a talk on "The State of Dark Web Investigations".
71. October 26, 2019, Colloquium on Analytics, Data Science and Computing (CADSCOM 2019). Keynote talk on Quantum Computing and AI.
72. October 28-30. ISC2 Security Congress. Presenting on machine learning and cybersecurity.
73. November 6, 2019. IEEE Quantum Education Summit 2019. Speaking on master’s degree curriculum in quantum computing.
74. February 26-27, 2020. 5th International Conference on Quantum and Particle Physics in London, England. Delivering a talk entitled "Space-Time and Gravity as Emergent Quantum Properties."
75. September 2, 2020, National Centers for Academic Excellence invited talk: "Quantum Computing and how it relates to security."
76. September 10, 2020. International IOT, Electronics and Mechatronics Conference Delivering a keynote address "The impact of complexity and emergence on engineering."
77. November 19, 2020. Distinguished Visitor of the IEEE talk on "The impact of Emergence, Nonlinear Dynamics, and Chaos Theory on Engineering."
78. December 18, 2020. US-Korea Conference Sustainable Development & the Future. I am an invited speaker presenting on "Applications of Machine Learning to BCI (Brain Computer Interface)"
79. February 12, 2021. Arizona ISACA Meeting. I spoke on criminal activity on the Dark Web.
80. 24 February 2021. "The Current Status of Quantum Computing" This is an IEEE Distinguished Visitor Program talk presented to the IEEE Region 4.
81. 25 March 2021. "The Current Status of Quantum Computing" This is an IEEE Distinguished Visitor Program talk presented to IEEE Rock River Valley Computer Society chapter and IEEE Rock River Valley Section and IEEE Women in Engineering.
82. 25 April 2021 “Applications of Machine Learning to Cybersecurity” GIDS 2021 conference.
83. September 21, 2021. Delivering a talk on Quantum Resistant Cryptographic Algorithms for the Silicon Valley/SF Bay Area IEEE Computer Chapter.
84. October 5, 2021. Delivering a talk at Hacker Halted on The Impact of Machine Learning on Cybersecurity.
85. October 27, 2021 Keynote speaker at CIIS2021 conference. Delivering a talk on Bringing Mathematical Rigor to Cybersecurity
Q: Have any of your accreditations ever been investigated, suspended or removed? (if yes, explain)
A: No
Q: On how many occasions have you been retained as an expert?
A: Over 100 different cases. Several of these where complex cases involving multiple defendants.
Q: For what area(s) of expertise have you been retained as an expert?
A: Operating system patent infringement.

Software patent infringement.

Source code copyright infringement.

Computer Security/Forensics.

Cryptography

Software Valuation

Computer Forensics

Computer Security

Computer Crime

Mobile devices

Trade Secrets

Q: In what percentage of your cases were you retained by the plaintiff?
A: 70%
Q: In what percentage of your cases were you retained by the defendant?
A: 30%
Q: On how many occasions have you had your deposition taken?
A: I have testified at 68 depositions,11 trials, 2 arbitration, and 9 hearings.
Q: When was the last time you had your deposition taken?
A: December 20, 203, my deposition was taken in the matter of Convexity Limited, vs Ivan Novikov, Wallarm, INC.
Q: On how many occasions have you been qualified by a court to give expert testimony?
A: On 100% of the cases
Q: On how many occasions have you testified as an expert in court or before an arbitrator?
A: I have testified at 68 depositions,11 trials, 2 arbitration, and 9 hearings.
Q: For how many years have you worked with the legal industry as an expert?
A: 20
Q: What services do you offer? (E.g.: consulting, testing, reports, site inspections etc.)
A: Consulting, investigation and research, expert reports, testifying.
Q: What is your hourly rate to consult with an attorney?
A: 550 per hour.
Q: What is your hourly rate to review documents?
A: 550 per hour.
Q: What is your hourly rate to provide deposition testimony?
A: 550 per hour.
Q: What is your hourly rate to provide testimony at trial?
A: 550 per hour.
Q: Please list any fees other than those stated above (E.g.: travel expenses, copy fees, etc.)
A: normal travel expenses

References

Adam C. Sanderson
Reese Gordon Marketos LLP
750 N. St. Paul St.
Dallas, Texas 75246
(214) 382-9806
adam.sanderson@rgmfirm.com

Bryana T. McGillycuddy
Choate, Hall & Stewart LLP
Two International Place
Boston, MA 02110
t 617.248.4077
f 617.502.4077
bmcgillycuddy@choate.com
www.choate.com

Linda R. Stahl | Partner
lstahl@carterarnett.com
D: 214.736.3949
F: 214.550.8185
www.carterarnett.com