About John
John brings over 20 years of computer experience and programming skills to the cases he works on. His ability to reverse engineer malicious code used to compromise computer networks to determine what intellectual property has been ex-filtrated, who is responsible and how exactly they got in has been central to several cases involving computer misuse and ‘hacking’.