Computer Misuse Act

This list shows every expert witness in the UK Register of Expert Witnesses who claims expertise in Computer Misuse Act. Click on any expert witness to view full details. You may prefer to interactively search the Register.

Mr Patel in LIVERPOOL
Afentis Forensics is a leading UK scientific investigation practice, providing sophisticated analysis of computers, mobile telephone devices, cell site analysis, e-Discovery, indecent imagery (Operation Ore) & audio-visual exhibit assessments • Certified analysts are available to assist with DNA evidence, fingerprint comparisons, firearm or ballistic studies, & the evaluation of questioned documents • Forensic scientists are recognised expert witnesses, available to present findings in clear witness...
Mr Sykes in LONDON
Information technology • Telecommunications • Electrical & electronic engineering • Microelectronics • Industrial electronic machine/process controllers • Software products & systems • Public & private sector technology procurement projects • Project delay analysis • IT outsourcing & project disputes • IT fitness for purpose • Patents & intellectual property rights • Computer control systems • Data centres...
Mr Shaw in LONDON
Artificial intelligence, AI, AR, 5G holograms • Blockchain • Smart contracts technology • Coding, Assembler machine language through to Z-notation • Cybersecurity, defence and offence, breaches • Data privacy • Digital media and IT technology • Due diligence • eDiscovery • Failed projects • Fintech, pure technology, start-ups and investments • Hardware, middleware, design and architecture • IoT • Network, telecoms • Software, forensic and anti-forensic • Technology development, risk and program failure
Mr Dilloway in BRISTOL
I have over 45 years' experience working with computers and more than 20 years and 300 cases as an expert witness. My work clarifies technical evidence simply and concisely, and assists common understanding of cases among lawyers, clients and experts. I produce clearly worded reports and clear spoken evidence. Criminal cases include indecent images, terrorism, false accounting, computer misuse and unauthorised access, fraud, extreme and prohibited images, drug importation and cultivation....
Dr Collie in LONDON
Digital device forensics, cell site analysis, computers, mobile phones, IOT and Cloud data • Digital document analysis • Cybersecurity consultancy • High quality expert reports in plain English Dr Collie is a CUBS-accredited Expert Witness, certificated for both civil and criminal litigation. In the private sector, clients have included City banks and broker houses, as well as major corporates with issues such as IP theft, fraud, system hacking and staff computer misuse. She has Expert and...
Mr Christopher J Watts in BRACKLEY
Experienced in all aspects of digital investigations including child abuse images, intellectual property, fraud & murder • Expertise includes: • Computer forensics • Data recovery (including RAIDs) • Audio video transcription • Mobile phones, satellite navigation systems & CCTV analysis • Reports provided in a clear, easy to understand format, avoiding technical jargon where possible • Prosecution, Single Joint Expert (SJE) & defence work undertaken...
Mr Khan in ABERDARE
Handling financial fraud crimes & financial fraud detection, money laundering • Creating an expert witness report following current legislations • Phishing, identity theft, scamming, spyware & adware, social engineering crimes • Recruitment skills 360 degree if hiring on high-profile organised crimes • Forensic investigation of data (USB, DH, hard disk) using different tools, e.g. FTKY Encase C & L • Security crimes & incident management according to threat level raised • Acquisition & retention of image pending...
Mr Coyne in PRESTON
Information technology • Technology • Telecommunications • Digital forensics • eDiscovery • IT fitness for purpose • IT outsourcing & project disputes • Project delay analysis • Patents & intellectual property rights • Software copyright • Computer forensics • Mobile forensics • Data recovery • Data security • Incident response • Data expert • Digital communications...
Mr Moore in NOTTINGHAM
Computer forensics • Data recovery • E-mail analysis • Computer crime • Internet abuse • Computer fraud • Mobile forensics • Training
Mr Boyd in NORMANTON
MD5 specialises in the following services: • Mobile Phone Forensics • Computer Forensics • Advanced Data Recovery • eDisclosure • eForensics • Virtual Forensic Computing (VFC) Experts in providing Digital Forensic and eDisclosure services to the legal sector, law enforcement agencies, public sector and corporate clients.
Mr Lewer in ASPATRIA
Computer forensics • Mobile phone forensics • Gathering & analysis of computer-related forensic data • Re-analysis of third party & police collected computer forensic data where the existence of rebuttal evidence is suggested • Specialist in 'EnCase' forensic data analysis • Holistic view of computer-related evidence taken where procedural impropriety is suspected • Evaluation of e-mails for veracity • All forms of computer data analysed & prepared for litigation according to current best practice •...
Mr Cufley in ROMNEY MARSH
Digital Forensics/Computer Forensics I have worked with computers for all of my adult life. I started to specialise in computer forensics 15 years ago and took training courses at Kenesaw State University Post Graduate School in Georgia in the United States and then at the Royal Military College of Science at Shrivenham. I have been trained in expert witness skills by Bond Solon and have presented expert evidence in a number of cases in the Magistrates' Court, the Crown Court and...
Mr Linfoot in ESHER
Data protection & GDPR • Information security • Breach investigation • Incident response • Malware • Hacking • Electronic discovery & disclosure
Mr Liu in LONDON
Securing digital evidence from computers, media and cloud-based systems both on-site and remotely • Forensic examination of evidence, recovery of deleted data • Chronological analysis of computer activity such as copying files and likelihood of exfiltration • Production of exhibits for court use • Data provenance • Email analysis • Cybercrime such as ransomware, email and system compromises • Data analytics • Electronic discovery

© J S  Publications 1988–2021