Judd Robbins
Computer Case Experience
  Location Side Title Types Description Status
New York Defense Competitive SQL code analyses Trade Secret Misappropriation Source code analyses and comparisons Closed #123
Illinois Defense Competitive Fortran and C++ code analyses Trade Secret Misappropriation Source code comparisons and analyses Closed #122
Nevada Plaintiffs Forensics Support for Employment Termination Computer Forensics Hard drive reconstruction and forensics analysis of Internet activities. Closed #120
Utah Defense Sub-domain processing and web services Computer forensics, patent infringement Discovery of invalidation materials on hard drives. Closed #113
Florida Defense Source Code Comparison Analysis copyright infringement Defense/Plaintiff Master: Copyright infringement analysis of Auto dealer management systems Closed #121
Washington Defense AOL Instant Messaging Forensics child pornography, computer forensics, internet Investigative efforts for possible litigation. Closed #119
United Kingdom Defense Counterfeit Microsoft Software Analysis Microsoft, counterfeit, forensics, software Analysis of allegedly counterfeit Microsoft software CDs, documentation, certificates of authenticity, EULAs Closed #118
Missouri Defense Visual Basic Software Code Comparisons breach of contract, copyright infringement Review two sets of health care software code for possible copying analyses. Closed #117
Utah Defense Counterfeit Microsoft Software Analysis Microsoft counterfeit Review of allegedly counterfeit software materials and consulting assistance to defense team. Closed #116
Oregon Plaintiffs Forensics Analyses of Possible Fraud Computer forensics, fraud, internet Investigative efforts for possible litigation. Closed #115
England Plaintiffs Software Execution and Reliability Analysis Y2K Telecommunications Data Corruption Analyses Software project and system design analyses. Arbitration in London. Closed #114
South Dakota Defense Internet Activity Analyses child pornography, computer forensics Analyses of computer usage and file/picture storage. Closed #112
Georgia Defense Felony Murder and Possession of a Firearm computer forensics Analysis of evidence on hard drive of murder victim. Closed #111
California Defense Counterfeit I.D. production child pornography, computer forensics Allegations of production of counterfeit drivers' licenses and possible possession of child pornography Closed #110
Nevada Plaintiffs Gaming Industry Hardware & Software patent infringement, software code review Software and hardware analysis of code behind allegedly infringing shuffling device. Closed #108
California Defense Counterfeit Microsoft Software Analysis Microsoft counterfeit Assessment of counterfeit and genuine Microsoft software and components Closed #109
Florida Defense Violation of Probation computer forensics Forensics analysis of Internet activities Closed #107
California Defense Real Estate Software System Infringements copyright infringement, trade secret misappropriation Copying of data dictionary definitions, database schema Closed #103
California Defense Robbery computer forensics Forensics analysis of email traffic, plus existence of installed spyware Closed #106
Nevada Plaintiffs Electronic Gaming Patent Infringement patent infringement, software code review Software analysis to assess patent infringement Closed #99
Washington Plaintiffs Health Care Computer System Breach of Contract breach of contract, medical & health Breach of contract suit and counterclaim between computer software and information technology services firm and a regional medical center. Closed #104
New York Defense Pornography Forensics child pornography, computer forensics Analysis of drive contents and Internet sourcing information. Closed #105
California Defense Consulting Support in Trust Matter computer forensics Analysis and support in family will and trust matters Closed #98
California Plaintiffs Internet Trademark Infringement internet, trademark infringement, Lanham Act Internet domain name trademark infringment. Cybersquatting. Closed #100
California Defense Forensics Assessment of Child Pornography on Hard Drive child pornography, computer forensics, pornography Assessment of existence and extent and origin/dates of child pornography on both defendant's and "victim's" computers. Closed #102
New Jersey Plaintiffs Electronic Document Management copyright infringement, trade secret misappropriation Alleged misappropriation of software modules and database schema. Closed #96
Illinois Defense Software Analysis and Comparisons copyright infringement Detailed modular comparisons of assembler language code Closed #97
England Defense Conspiracy to Defraud Microsoft and/or Members of the Public fraud, Microsoft counterfeit Analysis of Microsoft software as to Genuine or Counterfeit Nature. Closed #1
California Plaintiffs Summary Execution, Crimes Against Humanity, and Torture computer forensics, internet Email and Internet consulting analyses. Closed #78
Nebraska Defense Counterfeit Software Analysis Microsoft counterfeit Consulting assistance in alleged counterfeit software resales. Closed #79
California Plaintiffs Software Licensing Claims & Counterclaims breach of contract, copyright infringement, fraud Software licensed by one company to another. Breach of Contract & Copyright Infringement claims. Counterclaims for fraud. Closed #101
California Defense Hardware/Software system: trade secret misappropriations trade secret misappropriation Consulting advice and litigation support in combined hardware-software system Closed #81
North Carolina Defense Computer Forensics computer forensics, internet, pornography Analysis of misuse of USAF computer for possible child pornography. Closed #90
California Plaintiffs Trade Secret Misappropriation database, internet, trade secret misappropriation Analysis of Internet data base usage and possible misappropriation. Closed #89
Nevada Plaintiffs Copyright Infringement and Trade Secret Misappropriation copyright infringement, trade secret misappropriation Analysis and comparison of sales and marketing materials for training workshops. Closed #91
Texas Defense Breach of Contract breach of contract Source code and licensing issue assessment. Closed #92
California Defense Defamation and Trademark Infringement internet, trade secret misappropriation Internet analyses of trademark misappropriations and search engine visibility issues. Was deposed. Also testified at trial. Closed #93
Nevada Plaintiffs Trade Secret Misappropriation trade secret misappropriation Software analyses regarding possible data base misappropriations. Closed #10
California Defense Copyright and Trademark Infringement computer forensics, copyright infringement, internet, trademark infringement Forensics analyses of Internet web page promotions and trademark infringements. Was deposed. Closed #11
Michigan Defense Computer Forensics internet, computer forensics, pornography Assessment of Internet-based child pornography allegations. Closed #12
Ohio Plaintiffs Breach of Contract breach of contract Analysis of failed software system. Was deposed. Closed #13
Virginia Defense Fraud and Trademark Infringement Microsoft counterfeit, trademark infringement, fraud Analysis of counterfeit software issues, violations of Lanham Act and UCC. Was deposed. Closed #9
California Defense Copyright Infringement copyright infringement Analysis of engineering software programs. Closed #16
New York Plaintiffs Internet violation of the Federal Lanham Act internet, trademark infringement Assessment of website misappropriation of name and likeness. Closed #18
Minnesota Plaintiffs Patent Infringement patent infringement Analysis of Telnaes slot machine technology infringement. Closed #19
California Plaintiffs Patent Infringement patent infringement Analysis of printing industry software patent. Closed #20
Delaware Plaintiffs Patent Infringement patent infringement Analysis of CD ROM game software. Was deposed. Closed #21
California Plaintiffs Divorce computer forensics, divorce Computer forensics' asset discovery. Closed #17
Massachusetts Plaintiffs Electronic Intrusion computer forensics, internet Closed #95
Michigan Defense Trade Secrets trade secret misappropriation Software trade secret analysis. Closed #94
California Defense Counterfeit Software License copyright infringement, Microsoft counterfeit, trademark infringement Consulting analysis regarding alleged counterfeit software licensing materials. Was deposed. Closed #24
California Defense Trade Secret Misappropriation copyright infringement, medical & health, trade secret misappropriation Infringement analysis of COBOL and FoxPro health insurance software programs. Closed #26
California Plaintiffs Contested Will computer forensics, divorce Computer forensics analysis of hard drive. Closed #27
Utah Plaintiffs Divorce computer forensics, divorce Computer forensics analysis. Closed #28
California Plaintiffs Breach of Contract breach of contract Assessment of software quality in Local Area Network arena. Closed #29
California Plaintiffs Computer Forensics and Trade Secrets Misappropriation trade secret misappropriation, internet, computer forensics Hard drive analysis to determine potential trade secrets misappropriation. Closed #33
South Dakota Plaintiffs Rape internet, computer forensics Internet forensics explorations regarding activities of defendant. Closed #34
Florida Defense Copyright Infringement, Trademark Infringement, Unfair Trade Practices copyright infringement, internet, Microsoft counterfeit, trademark infringement Internet research and counterfeit Microsoft software consulting support. Closed #35
California Plaintiffs Internet Trade Name Misappropriation internet, trademark infringement Misappropriation of tradename in Internet domain name usage. Closed #36
California Defense Trade Secrets Misappropriation trade secret misappropriation, internet Internet search engine and database program analyses. Was deposed. Closed #31
California Defense Copyright Infringement copyright infringement Database comparisons. Closed #37
South Dakota Plaintiffs Murder computer forensics, murder Forensic analysis of Internet and other activity on the defendant's computer hard drives. Testified at trial. Closed #38
California Defense Computer Forensics and Electronic Evidence computer forensics Computer forensic analysis of Internet activity on hard drives in stalking case. Closed #39
California Defense Patent Infringement patent infringement, internet Analysis of computer system specifications for Internet website order processing and web appliances. Closed #30
California Defense Computer Forensics and Electronic Evidence breach of contract, computer forensics Analysis of file activity in real estate transactions. Was deposed. Also, testified at trial. Closed #22
New Jersey Plaintiffs Copyright Infringement and Breach of Contract breach of contract, copyright infringement Software analysis of Y2K issues and Visual Basic code applications. Was deposed. Closed #23
Missouri Defense Trade Secrets Misappropriation trade secret misappropriation, medical & health Analysis of WordPerfect macro-based health insurance plan software system. Closed #41
Washington, DC Plaintiffs Internet Email and Forensics Deletions internet, computer forensics Consulting support for case involving LAN, email, and electronic document processing storage, retrieval and deletions. Closed #42
California Defense Class Action, Product Liability breach of contract Product liability issues in computer based training (CBT) products. Class action suit. Closed #43
California Plaintiffs Copyright Infringement copyright infringement, internet Internet HTML and Javascript code analyses and comparisons. Closed #44
California Plaintiffs Copyright Infringement copyright infringement Comparisons of application systems using Visual Basic and Excel spreadsheets/macros. Closed #45
California Defense Trade Name and Service Mark Infringement internet, trademark infringement Internet promotions and search engine manipulations. Closed #46
California Defense Unfair Business Practices and Federal Fair Debt Collection internet Internet Gambling and financial transactions. Closed #47
Michigan Defense Business Interruption breach of contract Consulting on power outages and computer file corruption. Closed #48
California Defense Trademark Infringement internet, trademark infringement Consulting assistance in multimedia Internet claims evaluations. Closed #49
California Defense Counterfeit Software Microsoft counterfeit Assessment of and consulting advice in alleged counterfeit Microsoft software. Closed #50
New York Defense Computer Forensics and Electronic Evidence internet, computer forensics Analysis of system usage and email transmissions. Closed #51
Nevada Plaintiffs Computer Forensics and Electronic Evidence Forensic explorations of correspondence and email on subject's hard drive. Closed #52
Washington Defense Computer Forensics and Electronic Evidence computer forensics, internet, pornography Internet Pornography: analysis of forensic contents of hard drives. Closed #53
Florida Defense Copyright Infringement and Breach of Warranty copyright infringement, breach of contract, medical & health Medical billing systems written in COBOL. Closed #54
Arizona Defense Computer Forensics and Electronic Evidence computer forensics, pornography Consulting on technical aspects underlying the case. Closed #55
California Defense Internet-based ISP hacking internet Consulting on technical aspects underlying the case. Closed #56
California Defense Product Liability breach of contract, database Computer database and system analyses. Closed #57
Texas Defense Murder computer forensics, murder Computer forensics analysis of work and activities on hard drive. Closed #58
Nevada Defense Murder internet Computer forensics analysis of defendant's hard drive and diskettes. Closed #60
Florida Defense Computer Forensics Analysis pornography Child pornography. Discovery and defensive assessment of multiple hard drives and diskettes for relevant evidence. Closed #61
California Plaintiffs Breach of contract, fraud, software piracy of Novell Netware breach of contract, fraud Was deposed and testified at trial on commercial viability, software configurations, and piracy elements of photographic hardware/software application system. Was deposed. Closed #62
California Defense Copyright Infringement copyright infringement Hired to assess technical infringement between two application systems. Closed #63
Utah Defense Computer Forensics and Electronic Evidence computer forensics, pornography Defensive analysis of hard disk contents and organization for child pornography. Closed #64
California Defense Computer Forensics Explorations computer forensics Deleted hard disk files at issue. Closed #65
California Defense Wrongful Termination, Age Discrimination, Breach of Contract, Breach of Good Faith, Defamation breach of contract Consulting role in computer issues surrounding the case. Was deposed. Closed #59
Michigan Plaintiffs Commercial Fraud and Copyright Infringement copyright infringement, fraud, internet, medical & health Evidence research and gathering via the Internet. Potential comparison of multiple medical software systems and languages, including health care billings and patient record keeping. Closed #25
Florida Plaintiffs Airline Flight System Analysis, Air Accident database Analysis of underlying database contents and organization, plus related avionics control computer hardware and software. Was deposed. Closed #40
Massachusetts Plaintiffs Trade Secrets Misappropriation trade secret misappropriation Analysis and comparisons of financial modeling software and systems. Closed #32
Alabama Defense Military Court Martial internet, pornography Testified at trial on a variety of topics related to E-mail, the Internet, child and other pornography on the web, photo retouching software. Closed #66
Nevada Plaintiffs Breach of Contract, Fraud, Rejection under UCC breach of contract, fraud Failure Analysis of Rejected Telecommunications Software and Hardware System; Discovery Guidance. Closed #67
Arizona Plaintiffs Copyright Infringement Suit copyright infringement, medical & health Detailed comparisons of two systems of health care medical billings source code modules, one in Oracle and another in a version of BASIC, to help to determine copyright infringement. Closed #68
California Plaintiffs Copyright Infringement Suit copyright infringement, medical & health Detailed comparisons of hundreds of medical system source code modules, in two dialects of BASIC, to help to determine copyright infringement in programs providing medical record-keeping, 3rd party billing, and nursing home management software services. Closed #69
New Jersey Defense Copyright Infringement Suit copyright infringement As the court-appointed expert, accepted mutually by both Plaintiff and Defense, I analyzed source code from both sides, in two dialects of dBASE, and delivered my detailed opinions directly to the Court. Closed #70
California Plaintiffs Copyright Infringement Suit (in Federal court) and Breach of Contract Suit (in State court) breach of contract, copyright infringement Analyzed/compared BASIC source code for two financial systems to determine possible existence and extent of copying. Was deposed. Closed #71
Utah Plaintiffs Antitrust Suit breach of contract Advice and information about specific company hardware and operating systems. Closed #72
California Defense Application for Temporary Restraining Order breach of contract Analyzed dBASE source code in an Accounting System to assess quality of code in support of the Application. Closed #73
Utah Plaintiffs Breach of Warranty Suit copyright infringement, medical & health Reviewed PASCAL source code for a pharmaceutical system to analyze system quality and reliability. Was deposed. Closed #74