Cybercrime Expert Witnesses

Computers & Technology Expert Witness Listings

Cybercrime experts evaluate electronic devices used in crimes, study or solve crimes committed through electronic means, develop information on how a particular crime was committed, advise victims on how to respond to cybercrimes (e.g., cyberextortion, sexting, denial of service attacks, etc.), and present evidence in court. Cybercrime Expert Witnesses who are available to consult and testify can be found here. These cybercrime experts found on this page may consult on issues involving hacking, phishing, malware, ransomware, spyware, adware, and trojan horses. Experts found here may provide reports regarding botnets, denial-of-service (DoS) attacks, distributed denial-of-service (DDoS) attacks, SQL injection, and man-in-the-middle (MITM) attacks. Experts here may be familiar with issues involving zero-day exploits, social engineering, identity theft, data breaches, keylogging, and credential stuffing. They may also provide expert witness testimony concerning brute force attacks, cyberstalking, the dark web, deepfake fraud, cryptojacking, clickjacking, and eavesdropping attacks, among other topics. Additionally, these professionals may have knowledge regarding rootkits, session hijacking, cyber espionage, cyber warfare, digital forensics, worms, logic bombs, backdoors, typosquatting, DNS spoofing, and watering hole attacks. These experts may also be able to opine regarding formjacking, rogue software, baiting, pretexting, whaling attacks, business email compromise (BEC), juice jacking, SIM swapping, and card skimming. These experts may also handle cases involving cyberterrorism, hacktivism, exploit kits, deep packet inspection (DPI), and ethical hacking, as well as other forms of digital crime such as adoption fraud, business and investment fraud, charity and disaster fraud, and consumer fraud schemes. Additional areas in which they may testify include cryptocurrency investment fraud, cryptocurrency job scams, holiday scams, romance scams, and sextortion.

You may limit your search for Cybercrime expert witnesses to a specific area by selecting a state from the drop down box.

Expert Witnesses

List Your Qualifications by Clicking Here

Featured Experts
Cameron H. Malin (Park Dietz & Associates, Inc., a nationwide, interdisciplinary forensic expert firm)
Cameron H. Malin, JD, CISSP, is a Cyber Behavioral Profiler and former Supervisory Special Agent/Behavioral Profiler with the Federal Bureau of Investigation (FBI), specializing in the assessment of Cyber Threat Actor Decision Making, Adversary Tradecraft,... Learn More ›

Cameron Malin, JD, CISSP (Eagle Security Group)
Cameron Malin is an esteemed expert in Cyber Behavioral Profiling with a deep knowledge of digital forensics who has testified regarding cyber-crime, computer intrusions, malicious code (malware) and cyber-attacks. Specifically, he has testified in the... Learn More ›
Jeff Martin (Evidence Solutions, Inc.)
Location: Multiple Locations
Areas of Expertise: Jeff Martin is a Digital Forensics Expert specializing in Cell Phone Forensics, Black Box/EDR Forensics, Cybersecurity, EMR/EHR Forensics, Audio/Video/Imagery Forensics and more. Jeff has conducted hundreds...
ForensisGroup, Inc. (The Expert of Experts)
Location: Multiple Locations
Areas of Expertise: For over 30 years, ForensisGroup has provided the nation’s top law firms, businesses, insurance companies, government entities with highly qualified expert witnesses and consultants. Experts referred by...
Steve Novak (Bay2Sierra)
Location: California
Areas of Expertise: Mr Novak has 30 years of experience working in the digital design and verification of ASIC/FPGA and other custom digital designs. : Mr Novak is a strong technical and business leader for entire Digital...
Benjamin A Perez
Location: California
Areas of Expertise: My name is Dr. Benjamin Perez and I am thrilled to be part of the JurisPro Expert Witness Directory! I live and work in North Tustin, CA. My hobbies are jogging, swimming, and traveling. I especially...
Gordon MacKay (Quandary Peak Research)
Location: California and Texas
Areas of Expertise: I am a software and systems expert and technical executive with more than 30 years of experience in computer, telecommunications, network security, and SaaS/Cloud platforms. I have led development and...
Stephen P. Castell (CASTELL Consulting)
Location: California
Areas of Expertise: Dr Stephen Castell CITP MEWI is an award-winning independent ICT expert witness, management consultant and project manager professional, with extensive experience in risk assessment, quality assurance,...
Rick Watts (Quandary Peak Research)
Location: Florida
Areas of Expertise: Rick Watts is a seasoned professional with over 30 years of experience, holding certifications as an Enterprise Architect, Project Management Professional, and Software Engineering Master. Rick’s technology...
Eric B. Cole
Location: Virginia
Areas of Expertise: A computer and cybersecurity expert witness with over 30 years of hands-on experience, Dr. Cole is an expert witness in information technology with a focus on cybersecurity. Dr. Cole works on a wide...
Michael Barr (Barr Group)
Location: Maryland
Areas of Expertise: Michael Barr is a former adjunct professor of computer engineering with more than twenty-five years of experience in the software industry, including over a decade spent developing software for embedded...
Mehdi Tarrit Mirakhorli
Location: Hawaii
Areas of Expertise: Mehdi Tarrit Mirakhorli is software engineering professor in the department of Information and Computer Sciences at University of Hawaii at Manoa. Prior to that Dr. Mirakhorli served as Kodak Endowed Chair,...
Shawn H. Malone, CISSP, CTPRP, CTPRA (Security Diligence, LLC)
Location: Pennsylvania
Areas of Expertise: Award winning information security and cyber risk expert. Thirty-five years of experience including secure communications systems, network security, data protection, security program management, policy...
Alec Yasinsac
Location: Alabama
Areas of Expertise: As a long time cybersecurity research scientist and voting systems security specialist, my primary consulting area is elections security and integrity. My background includes formal, detailed systems review...
Jae Young Bang, PhD (Quandary Peak Research)
Location: California
Areas of Expertise: Dr. Jae Young Bang is director of software development and software technology consultant with over a decade of experience in software engineering. He has a diverse background ranging from academic research...
Braden M Perry (Kennyhertz Perry, LLC)
Location: Kansas
Areas of Expertise: Braden M. Perry is a co-founder and partner at Kennyhertz Perry, LLC, with extensive experience serving as an expert witness in complex regulatory and criminal matters. Specializing in commodities, derivatives,...
Lynn Mattice (Park Dietz & Associates, Inc., a nationwide, interdisciplinary forensic expert firm)
Location: Multiple Locations
Areas of Expertise: Lynn Mattice is President and Founder of the National Economic Security Alliance (NESA), a nonpartisan and nonpolitical IRS designated 501(c)(3) nonprofit focused at educating policymakers at the Federal,...
John J. Carney, Esq. (Carney Forensics)
Location: Minnesota
Areas of Expertise: Do you need to recover digital evidence from a cell phone, computer, or online cloud account for an upcoming criminal or civil court case? Do you need to retain an expert witness who can explain findings...
Albert Hui (Security Ronin)
Location: England
Areas of Expertise: Albert Hui is a forensic expert witness with expertises covering: • digital forensics (investigation and examination of mobile devices, computers, and other data), • forensic accounting & fraud examination...
Mark Songer, M.S.F.S. (Robson Forensic, Inc.)
Location: Multiple Locations
Areas of Expertise: Forensic Document Examiner Mark Songer is a former FBI Special Agent and FBI Forensic Examiner who specializes in forensic document examinations. He is frequently retained to investigate matters involving...
John Horst, CISSP®-ISSAP® (Xanesti Technology Services, LLC)
Location: California
Areas of Expertise: John Horst, CISSP®-ISSAP®, is the Chief Technology Officer for Xanesti Technology Services, LLC. John has provided expert information technology consulting across several lines of business such as pharmaceutical...
Paul Sibenik (Cryptoforensic Investigators)
Location: Pennsylvania
Areas of Expertise: Paul Sibenik is a blockchain forensics and cryptocurrency tracing expert. He frequently conducts investigations in a range of niches, including cryptocurrency hacks, exploits, vulnerabilities, thefts,...
Ugo Buy
Location: Illinois
Areas of Expertise: I have over 30 years specializing in software engineering and programming languages. For the past 10 years I have been involved in investigating mobile app development for native Android, native iOS and...
Chuck Easttom
Location: Texas
Areas of Expertise: Dr. Easttom has 30 years of computer industry experience,a doctorate (D.Sc.) in cyber security (dissertation topic: "A Comparative Study Of Lattice Based Algorithms For Post Quantum Computing"), a doctorate...
Eric Yuan, PhD (Cyberonix)
Location: District of Columbia
Areas of Expertise: Dr. Eric Yuan is an Adjunct Professor in the Computer Science Department at George Mason University, where he teaches graduate-level courses including Mathematical Foundation for Computer Science and Introduction...
Greg Crouse
Location: Texas
Areas of Expertise: Technical Expert Witness - Technology Intellectual Property and Systems Implementation Greg Crouse has spent nearly 30 years in the trenches implementing large technology systems all over the world....
Richard M Marshall (Concept Gap Ltd)
Location: Scotland
Areas of Expertise: Software and data are ubiquitous, with every organization now dependent on ever more complex digital infrastructure. AI is being infused into every product and service, dramatically increasing that complexity...
Joseph Greenfield, Ph.D. (Maryman & Associates Inc.)
Location: California
Areas of Expertise: I am the Vice President and Chief Forensic Examiner with Maryman & Associates, with over 15 years of investigative experience, including cyber breach investigations, employee misconduct, and email recovery...
Steven Bergin (Cybertek Forensics, Inc.)
Location: Pennsylvania
Areas of Expertise: Steve Bergin is an experienced military veteran and IT Specialist in Digital Forensics, Network Administration and Management, with a demonstrated history of working in the U.S. defense industry, Federal...
Jack Bicer (Septium)
Location: California
Areas of Expertise: Inventor of Multifactor Authentication (MFA), Mobile Push Login and QR Login. Expert Witness in - Login, - Authentication (2-Factor/3-Factor/Multifactor), - Account Hacking and Account Takeovers,...
Randall Valentine (Valentine Forensic Finance)
Location: Mississippi
Areas of Expertise: Led by Dr. Randall Valentine, a respected scholar with a Ph.D. in Finance from Mississippi State University and a graduate certificate in FinTech from Wharton (University of Pennsylvania), Valentine Forensic...
Jason T Ghetian (Cyber Asset Recovery Experts Inc)
Location: California
Areas of Expertise: Over his 20-year career with the FBI, Jason excelled in investigating cyber-related crimes, including hacking, online stalking, SIM card swapping, business email compromises, phishing, tech support scams,...
Sam Malek, PhD (Cyberonix)
Location: California
Areas of Expertise: Sam Malek is a Software Engineering Professor in the Informatics Department within the School of Information and Computer Sciences at the University of California, Irvine. His research is in the field...
Cybercrime FAQs

What is cybercrime expert?

Cybercrime experts evaluate electronic devices used in crimes, study or solve crimes committed through electronic means, develop information on how a particular crime was committed, advise victims on how to respond to cybercrimes (e.g., cyberextortion, sexting, denial of service attacks, etc.), and present evidence in court.