Hunter Jones has an engineering background and significant experience in systems design and development. As a systems developer, he is intimately familiar with the internals of computer systems, both operating systems and application programs. His systems design and development experience encompasses engineering and accounting applications as well as other functions for business and government clients.

As a certified computer forensics specialist (EnCase Certified Examiner and GIAC Certified Forensic Examiner), Hunter has established credentials in the fields of computer forensics and electronic discovery. These professional certifications attest to his skills and experience and also add to the credibility and reliability of his reports and testimony.

He has testified before federal and state courts in more than a dozen civil and criminal cases as well as in arbitration and administrative hearings. He has been accepted as an expert in both computer science and computer forensics, and has testified in cases involving patent infringement, contract disputes, criminal charges, and domestic matters. Most of these cases have involved forensic analysis of electronically stored information.

As an experienced software engineer, Hunter has evaluated source code written in various languages in numerous intellectual property cases for evidence of copyright or patent infringement or trade secret misappropriation.

Hunter’s litigation consulting work often includes:

  • Tracking the central forensics issues of what was done, who did it, and when, as determined through analysis of data in personal computers, networks, and external storage devices
  • Analysis of video surveillance records to assist in determining technical validity and interpreting what a given record actually proves
  • Expert interpretation of complex issues and clarification of highly technical documents involved in claims, defenses, briefs, and testimony related to information technology
  • Analyzing source code in connection with patent or copyright infringement claims
  • Assisting in drafting clear and effective language for the technical aspects of interrogatories, document production requests and responses
  • Preparing guidelines for counsel in examining and cross-examining technical experts in computer fields and in other engineering disciplines
  • Analyzing both internal and file system metadata to establish trails of creation, alteration, and deletion of documents, as well as tracing document accesses, copying and destruction
  • Organizing data produced in litigation into databases and providing efficient tools for its analysis
  • Advising counsel in planning for discovery in cases with complex technical issues to help ensure thorough, efficient, and useful collection of needed information
  • Forensically capturing and analyzing data (such as email) from suspect computer systems, including hidden and deleted material, to investigate claims of infringement, collusion or other improper actions, and to establish timelines for significant events involved in litigation
  • Comparing original and potentially infringing software, even though disguised, to identify improper use of proprietary code or concepts