Dr. Chuck Easttom

5605 Woodspring Drive
Plano , TX 75093
Office: 214-551-5216

Introduction

Dr. Easttom has over 25 years of computer industry experience,a doctorate in cyber security (dissertation topic: "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing") coupled with 2 masters degrees (with a third masters due to be completed in spring 2019) and over 40 industry certifications. His experience includes software engineering, database design, network administration, as well as cybersecurity and digital forensics. He is the author of 26 published computer science books, over 40 published papers, and holds 15 computer science related patents. He is also a reviewer for three scientific journals. In addition to industry experience, he has 14 years of litigation support experience including extensive testifying experience at depositions and trials. He has testified over 40 times. Chuck Easttom is a member of the IEEE and ACM, and is a Distinguished Speaker of the ACM. He has worked on digital forensics cases, computer patent cases, software copyright cases, and trade secrets cases.


Areas of Expertise

  • Computer Security
  • Copyrights
  • Cybersecurity
  • Intellectual Property
  • Internet
  • Networking
  • Patents
  • Software
  • Software Engineering

Expert Background

Q: Please list your professional accreditations, degrees, licenses, and certificates granted:
A: B.A. and M.Ed. from Southeastern Oklahoma State. While attending I was named to the National Dean's List and Who's Who in American Colleges and Universities.
M.B.A (specialization in applied computer science) from Northcentral University
D.Sc. from Capitol Technology University- Cybersecurity.
MS (Spring 2019) from UT El Paso - Systems Engineering. While attending I was named to Phi Kappa Phi honor society.

Microsoft Certified Systems Engineer (MCSE) Windows Server 2000
Microsoft Certified Database Administrator (MCSA)Windows Server 2000
Microsoft Certified Professional (MCP)
Microsoft Certified Database Administrator (MCDBA) SQL Server 2000
Microsoft Certified Applications Developer (MCAD)Visual Studio.Net
Microsoft Certified Technology Specialist (MCTS) in SQL Server 2008, Windows Server 2008, Windows 7, and Visual Studio 2010
Microsoft Certified IT professional (MCITP) SQL Server 2008, Windows 7
Microsoft Certified Trainer (MCT)
CompTIA Certified A+ PC Technician
CompTIA Certified Network+, I-Net+, Server+, and Linux+
CIW Certified Security Analyst
EC Council Certified Ethical Hacker
EC Council Certified Hacking Forensic Investigator
EC Council Certified Instructor
CISSP (Certified Information Systems Security Professional)
ISSAP (Intrenet System's Security Architecture Professional)
CCFP (Certified Cyber Forensics Professional)
Certified Criminal Investigator
Texas Private Investigator License with Allegiant Investigations & Security License Number: A18596
Oxygen Certified Phone Forensics
Access Certified Examiner (ACE)
National Computer Science Academy Windows 8 Certification
National Computer Science Academy HTML 5.0 Certification
OSForensics Certified Examiner
Certified Forensic Consultant
Q: Please list your affiliations or memberships in any professional and/or industry organizations:
A: 1. Member of the advisory board for Embry Riddle University cyber security program within the Homeland Security degree program 2016-2018.
1. Created the course and certification test for Certified OSForensics Examiner (OSFCE). OSForensics is a forensic software tool used to analyze computers.
2. Reviewer for scientific papers submitted to IEEE Security & Privacy.
3. Reviewer for scientific papers submitted to the International Journal of Cyber Warfare and Terrorism (IJCWT)
4. Reviewer for International Journal of Computer Science and Security (IJCSS)
5. Reviewer for the International Journal of Network Security (IJNS)
6. Reviewer for scientific papers submitted to Digital Forensics magazine.
7. Member of IEEE Software & Systems Engineering Standards Committee. Working on the DevOps working group.
8. Editorial board member for the year 2016 for Journal of Information Security Science & Digital Forensics. This is an international peer reviewed information security journal.
9. Editorial board for the year 2016 member for The Forensic Examiner. This is a peer reviewed forensic journal.
10. Subject matter expert for the Computer Technology Industry Association (CompTIA) Server + exam creation team. I was part of the team that helped create the CompTIA Server+ certification test.
11. Subject matter expert for the Computer Technology Industry Association (CompTIA) Linux+ exam review team. I was part of the team that helped create the CompTIA Linux+ certification test.
12. Subject matter expert for the Computer Technology Industry Association (CompTIA) Security+ exam Job Task Analysis team. I was part of the team that helped create the CompTIA Security+ certification test.
13. Subject matter expert for the Computer Technology Industry Association (CompTIA) Certified Technical Trainer exam revision team.
14. Created the EC Council Certified Encryption Specialist course and certification test. Then revised the course and certification in 2017.
15. Created the EC Council CAST Advanced Encryption course.
16. Worked on the Job Task Analysis Team for the Certified Ethical Hacker v8 test.
17. Created the Certified Application Security Engineer video courses for EC-Council
Q: Please list any teaching or speaking experience you have had, including subject matter:
A: I routinely teach computer security, secure programming, forensics, penetration testing, and related courses all over the world.
I have taught courses at community colleges, technical colleges, and universities. I currently conduct teaching for corporations and government agencies. I am also an adjunct at Capital Technology University in the graduate school, including serving on doctoral dissertation committees.

I also have conducted a number of speaking engagements:
1. Mid-Cities PC Users Group September 19, 2003. The topic was computer security in general.
2. The Harvard Computer Society April 5, 2004. The topic was computer security.
3. The ACM Chapter of Columbia University November 15, 2005. The topic was computer viruses.
4. DeVry/Keller University in Dallas December 2009 Commencement Speaker.
5. Public presentation on computer crime in McKinney Texas in July 2008.
6. Southern Methodist University Computer Science and Engineering Colloquium September 2010. The topic was organized computer crime and computer terrorism. I was an invited speaker.
7. Takedowncon security conference in Dallas Texas, May 2011. The topic was steganography. I was an invited speaker.
8. An Overview of Modern Cryptography, May 5, 2011 Webinar
9. CAST Conference in Washington D.C. August 2011. The topic was Cryptography: Feistel Ciphers. The audience was primarily Department of Defense personnel and contractors. I was an invited speaker.
10. Digital Certificates: An Expert View, January 12, 2012 Webinar
11. Takedown security conference in Dallas Texas, May 2012. The topic was RSA cryptography. I was an invited speaker.
12. Problems with RSA, November 4, 2012 Webinar
13. Takedowncon security conference in Huntsville Alabama, July 15, 2013. The topic was cryptanalysis. The audience was primarily Department of Defense personnel and contractors. I was an invited speaker.
14. September 25-26, I conducted a 2-day master class in hacking techniques, in Singapore for Clariden Global. I was an invited speaker.
15. March 2014, I conducted a presentation for the University of Texas ACM chapter. The topics where distributed steganography and cryptographic backdoors.
16. May 26-27, 2014. I conducted a 2-day workshop in software testing in Singapore for Clariden Global. I was an invited speaker.
17. June 2014, I conducted a public talk on computer crime and internet safety in Melissa Texas, sponsored by the Melissa Police Department.
18. October 1, 2014 presentation of a talk on cryptographic backdoors at the ISC2 Security Conference in Atlanta Georgia.
19. October 5, 2014 presentation of a talk on cryptographic backdoors at the Hakon convention in Indore, India. I was an invited speaker.
20. October 17, 2014 U.S. Secret Service, North Texas Electronic Crimes (N-TEC) Task Force presenting a talk on the history and current state of computer crime. I was an invited speaker.
21. November 7, 2014 North Texas Crime Commission-Healthcare Cyber Security Symposium presenting a talk on health care breaches. I was an invited speaker.
22. January 27, 2015: Collin County Sheriff's Academy Alumni Association. "Cybercrime and online predators".
23. April 14, 2015 Brighttalk webinar “What you don’t know about Cryptography and how it can hurt you”.
24. May 4, 2015 North Texas Crime Commission-Healthcare Cyber Security Symposium presenting a talk on the causes and remediation of health care breaches. I was an invited speaker.
25. May 12, 2015 SecureWorld Houston “What you don’t know about Cryptography and how it can hurt you”.
26. August 20, 2015. Southwest Financial Crimes Forum “7 biggest mistakes of incident response.” I was an invited speaker.
27. September 30, 2015 ISC2 Security Congress “Cryptanalysis for Forensics”.
28. October 3, 2015. Conducted a 1-day workshop in Malware at Hakon India. I was an invited speaker.
29. October 4, 2015. Hakon India Indore India. 2015 “Cyberwar and Terrorism”.
30. November 4, 2015 iSMG Fraud Summit in Dallas Texas “Business Email Masquerading: How Hackers Are Fooling Employees to Commit Fraud”. I was an invited speaker.
31. November 5, 2015 SWACHA Electronic Payments Summit in Irving Texas “Emerging Trends in Cyber Crime”. I was an invited speaker.
32. May 25, 2016 “Improving Professional Standards in Cyber Forensics” Keynote speaker for Association of Digital Forensics Security and Law. I was an invited speaker.
33. June 22, 2016 the topic was “Cyber Security Issues Facing Business” Texas Security Bank Business Institute meeting. I was an invited speaker.
34. August 4, 2016 “Steganography: The in’s and Out’s” DefCon 24, Las Vegas.
35. September 12, 2016 USMCOC Third North American Sustainable Economic Development Summit Cyber Security, Information Technology & Innovation Panel. I was an invited speaker.
36. September 13, 2016 Tarleton State University CyberSecurity Summit at the George W. Bush Institute. The topic was "A template for incident response". I was an invited speaker.
37. September 28, 2016 Secure World Dallas. A presentation on "Analyzing Forensic Evidence -Applications of graph theory to forensic analysis”.
38. October 2, 2016 Hakon India (Indore India). A presentation on “The Dark Web Markets – Implications for Law Enforcement and Counter Terrorism”. I was an invited speaker.
39. October 18-19, 2016 Jordan Cyber Security & Forensics Forum (JCSFF-2016) Presenting two presentations. The topics were “Zero Day Exploits” and “How to forensically analyze Zero Day Exploits”. I was an invited speaker.
40. December 1-2. I conducted a 2-day advanced workshop on cyber-threat intelligence in Singapore for Clariden Global. I was an invited speaker.
41. January 17, 2017 the 2nd International Congress of the International Association of Law and Forensic Science (IALFS), in Cairo Egypt January 17, 18, 19. The topics were “Improving Digital Forensics” and “Applying Graph Theory to Model Forensic Examinations”. I was an invited speaker.
42. February 11, 2017. North Texas Cyber Security Association bi monthly meeting. Speaking on Dark Web Markets and their impact for law enforcement and intelligence agencies. Plano Texas Collin College Courtyard Campus.
43. February 17, 2017. American Academy of Forensic Sciences 69th Annual Meeting. Speaking on a novel approach JTAG phone forensics.
44. March 3, 2017. University of North Texas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.
45. May 24, 2017. Enfuse 2017 conference in Las Vegas. A presentation on Applying Graph Theory to Analyzing Digital Evidence.
46. July 27, 2017. Defcon 25 2017 conference in Las Vegas. A presentation entitled “Windows: The Undiscovered Country” on undocumented features of Windows and SQL Server that can be used for hacking and penetration testing.
47. September 25, 2017 ISC2 Security Congress in Austin Texas. A presentation on" Applying Graph Theory to Analyzing Digital Evidence".
48. September 27 and 28, 2017. Secure Jordan conference in Amman. I presented two talks. The first is "An overview of current challenges in phone forensics". The second is "How to address dark web markets".
49. October 18-19 SecureWorld Dallas 2017. A presentation on "Cryptography, what you don't know and how it can hurt you".
50. January 8 to 10th Annual IEEE Computing and Communication Workshop at the University of Nevada in Las Vegas, a presentation on my paper "A Generalized Methodology for Designing Non-Linear Elements in Symmetric Cryptographic Primitives". I also chaired a session on Artificial Intelligence, and another session on Computer Architecture and VLSI.
51. March 8 to 9 ICCWS conference (13th International Conference on Cyber Warfare and Security) presenting my paper "The Role of Weaponized Malware in Cyber Conflict and Espionage". Also presenting a research poster on “A Modified McCumber Cube as a Basis for a Taxonomy of Attacks”
52. March 23, 2018 presenting "Penetration Testing as a Profession Rather than a Dark Art". at the ISC2 Dallas Chapter Meeting in Murphy Texas.
53. April 11, 2018 University of Texas at Dallas ACM chapter is hosting my Distinguished Speaker of the ACM Talk "Quantum Computing and Lattice Based Cryptography"
54. May 7, 2018 Princess Sumaya University for Technology in Amman Jordan will be hosting my Distinguished Speaker of the ACM Talk "Applying Graph Theory to Digital Forensics" May 17, 2018. SecureWorld Houston 2018. Presentation on "Quantum Computing and Cryptography.”
55. May 17, 2018 speaking on “Quantum Computing and Post Quantum Cryptography” at SecureWorld Houston.
56. September 17-19, 2018 I will be presenting "Dark Web Market Investigations" at the San Antonio Techno Security & Digital Forensics Conference
57. September 25, 2018 I will be presenting "Dark Web Market Investigations" at the Global Security Exchange (GSX) 2018 (formerly the Annual Seminar and Exhibits) in Las Vegas Tuesday, September 25, 2018 (11 am Session 5127)
58. October 8-10, 2018 "An exploration of quantum computing and post quantum cryptography" ISC2 Security Congress in New Orleans.
59. October 10-11, 2018 speaking on “Quantum Computing and Post Quantum Cryptography” at SecureWorld Dallas.
60. October 23-24 2018 IEEE International Symposium on Technologies for Homeland Security. Presenting my paper "A Systems Approach To Indicators Of Compromise Utilizing Graph Theory"
Q: Have any of your accreditations ever been investigated, suspended or removed? (if yes, explain)
A: No
Q: On how many occasions have you been retained as an expert?
A: Over 50 different cases. Several of these where complex cases involving multiple defendants.
Q: For what area(s) of expertise have you been retained as an expert?
A: Operating system patent infringment.

Software patent infringement.

Source code copyright infringement.

Computer Security/Forensics.

Cryptography

Software Valuation

Computer Forensics

Computer Security

Computer Crime

Q: In what percentage of your cases were you retained by the plaintiff?
A: 70%
Q: In what percentage of your cases were you retained by the defendant?
A: 30%
Q: On how many occasions have you had your deposition taken?
A: 30 depositions (in addition I have testified at trials and hearings. I have testified on a total of 42 occasions)
Q: When was the last time you had your deposition taken?
A: October 12, 2018. The last time I testified at a trial was July 25, 26, and 27 . The last time I testified at a hearing was December 22, 2017
Q: On how many occasions have you been qualified by a court to give expert testimony?
A: On 100% of the cases
Q: On how many occasions have you testified as an expert in court or before an arbitrator?
A: 11 times I have testified in court at trial or a hearing. This is in addition to 31depositions.
Q: For how many years have you worked with the legal industry as an expert?
A: 14
Q: What services do you offer? (E.g.: consulting, testing, reports, site inspections etc.)
A: Consulting, investigation and research, expert reports, testifying.
Q: What is your hourly rate to consult with an attorney?
A: 400 per hour.
Q: What is your hourly rate to review documents?
A: 400 per hour.
Q: What is your hourly rate to provide deposition testimony?
A: 400 per hour.
Q: What is your hourly rate to provide testimony at trial?
A: 400 per hour.
Q: Please list any fees other than those stated above (E.g.: travel expenses, copy fees, etc.)
A: normal travel expenses

References

Mark Henry Rose Law Firm
240 N. Block Avenue, Fayetteville, AR 72702
www.roselawfirm.com
mhenry@roselawfirm.com
Direct: (479) 856-6017

Adam C. Sanderson
Reese Gordon Marketos LLP
750 N. St. Paul St.
Dallas, Texas 75246
(214) 382-9806
adam.sanderson@rgmfirm.com

Jim Etheridge | Etheridge Law Group
2600 East Southlake Blvd | Suite 120-324 |Southlake, TX 76092
jim@etheridgelaw.com | T 817 470 7249 | F 817 887 5950

Brett Mangrum | Etheridge Law Group
2600 East Southlake Blvd | Suite 120-324 |Southlake, TX 76092
brett@etheridgelaw.com | T 469 401 2659 | F 817 887 5950

Brian A. Tollefson
Prince Lobel Tye LLP
617 456 8099 Boston
410 885-6620 Greater DC