Hacking Expert Witnesses
Hacking expert witnesses and consultants listed here may be able to form expert opinions, draft expert witness reports, provide expert witness testimony at deposition and/or trial as or serve as consulting (non-testifying) experts on hacking. The hacking expert witness listings on this page are typically from fields/areas of expertise such as: Computers, Cryptocurrency, Cybersecurity, Digital Forensics , and Fraud.
View Full Profile
Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC
Data Security, Digital Forensics and e-Discovery
Arizona
Computers, Digital Forensics
-
Computer Forensics, Smartphone Forensics, eDiscovery Reference Model (EDRM), Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR), Center for Internet Security CIS, Cybersecurity, Privacy, eDiscovery
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone.
My most frequent practical contributions in litigation consulting are as follows:
• Distinguishing useful ESI from non probative data
• Overcoming adverse party’s resistance to producing ESI
• Producing ESI with confidence it will be admissible
• Delivering concise written reports that clarify rather than confuse
• Incorporating digital evidence into the legal strategy
• Advising methods that ...
View Full Profile
Jason T Ghetian, CISSP, GISP, GCFE, GCIH, GISF, DeXT, CART
Cryptocurrency - Former FBI Special Agent (Cyber)
Crypto Experts LLC
Aliso Viejo, California
Cryptocurrency, Cybersecurity
-
Asset Searches, Fraud Investigations, Pig Butchering, High-Tech Fraud, Digital Forensics, Cyber Investigations, Cryptocurrency Valuation, Hacking, Cybercrime, Call Centers, Cell Phones, Divorce, Family Law, Industry Standards, EB-5
Over my 20-year career as an FBI Special Agent, I specialized in investigating complex cyber-enabled financial crimes, including cryptocurrency investment fraud, exchange compromises, SIM swapping, phishing, and account takeovers. My work extended into advanced cryptocurrency tracing, digital forensics, email and VOIP analysis, and international coordination with foreign law enforcement. I founded the FBI’s Orange County Cyber Task Force, bringing together federal, state, and local investigators to combat sophisticated cybercrime, and the investigative techniques I developed were disseminated across all 52 FBI Field Offices.
From 2021 through my retirement in December 2023, I led U.S. government investigations into large-scale cryptocurrency fraud operations, including “pig butchering” schemes—now recognized as one of the most significant global crypto fraud threats. This work resulted in a nomination for the Attorney General’s Award from the Department of Justice’s National Crypto...
View Full Profile
Michael Nelson
Digital Forensics | eDiscovery | Incident Response
CYBIR
Lewes, Delaware
Digital Forensics, Cybersecurity
-
Computer Forensics, Ransomware, Hacking, Metadata Analysis, Mobile Forensics, Cloud Forensics, Phishing, Everlaw, Incident Response, eDiscovery, Spoofing, Cellebrite, Business Email Compromise, Data Recovery, Data Preservation, EnCase, cyber, breach, Malware, Threat Actor Negotiations
Founder of DFDR Consulting LLC, now doing business as, CYBIR. Over the course of eighteen years, Nelson has consulted on, examined and testified to digital evidence related to personal, corporate, criminal, civil and domestic cases, along with data breaches.
Acknowledged in “EnCE The Official EnCase Certified Examiner Study Guide” (Second and Third Editions) and “Mastering Windows Network Forensics and Investigation” (Second Edition), Nelson has also been published in eForensics Magazine for SQL investigation techniques. As a speaker, in addition to industry conferences and events, Nelson serves on the faculty of National Business Institute for CLEs and was a past Adjunct Professor of Digital Forensics.
Industry credentials include: AccessData Certified Examiner (ACE), AccessData Mobile Examiner (AME), Certified Computer Examiner (CCE), Cellebrite Certified Mobile Examiner (CCME), Certified Data Recovery Professional (CDRP), Certified Ethical Hacker (CEH), Certified Forensic Compute...
View Full Profile
Christopher J Hadnagy
Expert in Social Engineering & Child Exploitation
Social-Engineer, LLC
Orlando, Florida
Cybersecurity, Fraud
-
hacking, social engineering, scams, romance scams, sexplotation, phishing, vishing, body language , facial expressions, smishing, impersonation, csam, child porn, trafficking
Christopher Hadnagy is a globally recognized expert in social engineering, human behavior, and cybersecurity, with over two decades of experience working alongside law enforcement, government, and military agencies around the world. As the founder and CEO of Social-Engineer, LLC, Chris has developed pioneering methodologies in human-based attack vectors, insider threat detection, nonverbal communication analysis, and psychological manipulation—especially as they relate to cybercrime and crimes against children.
Chris has served as an expert witness in high-stakes criminal and civil cases, offering testimony and analysis in matters involving phishing, cyber-enabled fraud, insider threats, nonverbal deception detection, and the exploitation of minors. His behavioral insights are frequently used to decode grooming tactics, psychological coercion, and deception patterns in both digital and real-world environments.
He has spoken at the Pentagon on the topic of social engineering and ha...
View Full Profile
Ira Victor, G2700, GCFA, GPCI, GSEC-Gold, CGEIT, GRISC
Data Security, Digital Forensics and e-Discovery
Las Vegas and Reno, Nevada
Computers, Digital Forensics
-
Computer Forensics, Smartphone Forensics, eDiscovery Reference Model (EDRM), Cybersecurity, Meta Data, Video Forensics, Data Recovery, Hacking, Information Security, Vehicle Electronics, Email, Electronic Medical Records (EMR), Electronic Health Records (EHR), Center for Internet Security CIS, Cybersecurity, Privacy, eDiscovery
I work with attorneys to interpret digital evidence, and tell a powerful story. My technical expertise saves time and money: pre-discovery communications, forensically-sound data preservation, and reports that pack a punch. Expert analysis for electronic medical records, business espionage, employee misconduct, vehicle computer systems, video surveillance, cybercrime, divorce, probate and more (ask about your case -- initial consultation is free). I have more than two decades in the field. Court appearances in multiple states. A live person always answers the phone.
My most frequent practical contributions in litigation consulting are as follows:
• Distinguishing useful ESI from non probative data
• Overcoming adverse party’s resistance to producing ESI
• Producing ESI with confidence it will be admissible
• Delivering concise written reports that clarify rather than confuse
• Incorporating digital evidence into the legal strategy
• Advising methods that ...