G. Hunter Jones
    Managing Director Emeritus

    Hunter Jones has over 40 years of experience as a systems engineer, working in IT consulting and computer system development.


    • Programming Languages & Databases

      C, C++, Java, SQL, MySQL, PHP, Perl, Ruby, VBA, Visual Basic, among others

    • Operating Systems & Servers

      Windows, Unix


    • EnCase Certified Examiner (EnCE)

      Guidance Software

    • GIAC Certified Forensic Examiner

      International Information Systems Security Certification Consortium, Inc.

    In recent years, Hunter Jones’ focus has been on computer forensics, in both civil and criminal cases. As a systems developer, he is intimately familiar with the internals of computer systems, both operating systems and application programs. His systems design and development experience encompasses engineering and accounting applications as well as other functions for business and government clients.

    As a certified computer forensics specialist (EnCase Certified Examiner and GIAC Certified Forensic Examiner), Hunter has established credentials in the fields of computer forensics and electronic discovery. These professional certifications attest to his skills and experience and also add to the credibility and reliability of his reports and testimony.

    He has testified before federal and state courts in more than a dozen civil and criminal cases as well as in arbitration and administrative hearings. He has been accepted as an expert in both computer science and computer forensics, and has testified in cases involving patent infringement, contract disputes, criminal charges, and domestic matters. Most of these cases have involved forensic analysis of electronically stored information (ESI).

    As an experienced software engineer, Hunter has evaluated source code written in various languages in numerous intellectual property cases for evidence of copyright or patent infringement or trade secret misappropriation. Hunter forensically analyzes data in personal computers, networks, and external storage devices to determine what was done, who did it, and when. His forensic work also includes an analysis of internal and file system metadata to establish trails of creation, alteration, and deletion of documents, as well as tracing document accesses, copying and destruction. Hunter’s video forensics cases often involve the analysis of video surveillance records to assist in determining technical validity and interpreting what a given record actually proves.

    Representative Experience

    Tacoronte v. Lesinski

    Nature of Suit: Computer forensics matter regarding allegations of sexual abuse
    Role: Testifying Expert

    • Hunter examined the computer in question and found that the defendant’s computer forensics expert had identified only a small fraction of the computer’s total Internet history
    • Hunter testified that in light of a full Internet history report containing websites visited by other members of the plaintiff’s family, there was no verifiable basis for concluding that the plaintiff’s mother must have written the summary of events in question

    Persaud-Deep v. Women’s Care of Florida

    Nature of Suit: Medical malpractice matter regarding allegedly lost ultrasound images
    Role: Consulting Expert

    • Hunter determined the status of all identifiable ultrasound images on the system and whether the image files could be recovered
    • Hunter discovered that an update did not take place in the same week claimed, suggesting the images should have been available when requested earlier

    Real Forms LLC v. Arkansas Realtors Association

    Nature of Suit: Software project failure matter regarding real estate management software
    Role: Testifying Expert

    • Hunter examined the software at issue as well as prior changes made by Real Forms to fix errors in the software
    • Hunter testified at trial regarding best practices in software development projects, particularly with respect to software testing and error correction


    • B.S., Massachusetts Institute of Technology

    Top Cases

    DisputeSoft served as an electronic discovery expert for the prosecution in this qui tam action regarding an allegedly overbilled government contract.
    DisputeSoft was engaged by Butler as an electronic discovery expert in this dispute involving a newspaper article that allegedly falsely portrayed the plaintiff.
    DisputeSoft was engaged by Grape Technology Group in this patent infringement dispute involving automated directory assistance services.

    Top Posts

    This installment of DisputeSoft's Computer Forensics series sheds light on how a computer forensics expert can uncover factual information that exposes medical mistakes or cover-ups.
    This installment of DisputeSoft's Computer Forensics series breaks down the differences and intersections between Computer Forensics and Electronic Discovery.
    This installment of DisputeSoft's Computer Forensics series introduces readers to the field of Computer Forensics and the use of forensic evidence in litigation.

    Need an expert?

    DisputeSoft provides expert analysis and testifying services to law firms engaged in complex software disputes.