Digital Forensics: We are looking at developing more accurate and dependable data extraction & carving techniques with some of the leading companies in the industry.
Social Media Forensics: The rise and popularity of open source intelligence (OSIX) and the increased popularity of social media usage worldwide has prompted our research focus on novel techniques to harvest and analyze social media artifacts from sites such as Twitter, Facebook, etc.
Mobile Device Forensics: We are researching emerging technologies in the field of mobile forensics, an ever-changing and expanding field.
Network Forensics: The rise nefarious activity on public and private networks, including the internet, has focused our research efforts into new and emerging peer-to-peer and network-based technologies
- Rusbarsky, K, Smith C, Brunty, J. & Fenger T. (2012) “A Forensic Comparison of NTFS & FAT32 File Systems.” Poster presentation at the 2012 AAFS Annual Meeting.
- Brunty, J. (2012). Windows 8 Forensic Analysis. Oral presentation at the 2012 Techno Security & Digital Investigations Conference, Myrtle Beach, SC.
- Brunty, J., & Chom, E. (2011) “A Forensic Analysis of PlayStation 3 Artifacts”
- Prolo, M., & Brunty, J. (2009) “Native File System Analysis: Testing Computer Forensic Tools for Accuracy with Native and Non-Native File Systems.”
- Wallace, I. & Brunty, J. (2007) “Defragmentation Residual Information Analysis”
- Doerger, E. & Brunty, J. (2007) “Forensic Analysis of Data Elimination Effectiveness and Residual File Artifacts Among Commercial Wiping Programs”
- Brunty, J. (2012). Social Media Forensics: Techniques, Tools, & Trends. Oral presentation at the 2013 Evidence Conference, Washington, DC.
- Helenek, K., Brunty, J, Vance, C. & T. Fenger. (2011-2012). “Facebook: Do You Leave a Trace? A Forensic Analysis of Facebook Artifacts.” Oral presentation at the 2012 AAFS Annual Meeting. [link]
- Friedman, R., Brunty, J. & Fenger T. (2012). “A Digital Forensic Analysis on the iCloud and its Synchronization to Apple Devices.” Oral presentation at the 2013 American Academy of Forensic Sciences (AAFS) Annual Meeting.
- Corcoran, K., Read, A., Brunty J. & Fenger, T. (2012). Messaging Application Analysis for Android and iOS Platforms.
- Swank, M. & Brunty J. (2008) “USB Portable Operating System and File System Circumvention Capability Analysis” Poster Presentation at the 2008 American Academy of Forensic Sciences (AAFS) Annual Meeting.
- Keirstead, M. & Brunty, J. (2008) “Peer-to-Peer Network Registry and System Artifact Analysis” Oral Presentation at the 2008 Mid Atlantic Association of Forensic Scientists (MAAFS) Annual Conference.
- Brunty J., Helenek, K. (2012) Social Media Investigation for Law Enforcement. Elsevier/Anderson Company, Waltham, MA. ISBN 978-1-4557-3135-0. [link]
- Brunty, J. “Windows 8: A Forensic First Look.” Digital Forensic Investigator (DFI). 2012(2). [read]
- Brunty, J. “Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner.” Digital Forensic Investigator (DFI). Published March 2, 2011. [read]
I received my undergraduate degree in Criminal Justice & Criminology from Marshall University in 2005. I received my MS in Criminal Justice from Marshall University with graduate emphasis in Information and Computer Security in 2009. I also attended the University of Indianapolis for Forensic Digital Imaging and Forensic Video instruction. I'm a former former digital forensics laboratory manager and examiner, with over ten years of experience in the field of digital forensics & investigations. I'm currently an Assistant Professor of Digital Forensics for the Department of Integrated Science & Technology and Forensic Science Departments at Marshall University. Prior to that, I managed digital forensic research & casework laboratories at the Marshall University Forensic Science Center and was an examiner with the West Virginia State Police's Digital Forensic Unit. I currently hold a few certifications within the digital forensics discipline including: AccessData Certified Examiner (ACE), AccessData Mobile Examiner (AME), Computer Hacking Forensic Examiner (CHFI), Seized Computer Evidence Recovery Specialist (SCERS), Certified Malware Investigator, Certified Steganography Examiner, and I am certified by the National Security Agency in Information Assurance Methodology (NSA-IAM). I've developed a variety of digital forensic training sessions and curriculum; including past recertification scenarios/exams for the International Association of Computer Investigative Specialists (IACIS). I'm an active member of the Mid-Atlantic Association of the High Technology Crime Investigation Association (HTCIA), the Digital-Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), the West Virginia Cyber Crimes Task Force, and the West Virginia Chapter of FBI INFRAGARD. I was born and raised in Salt Rock, West Virginia. In my spare time, I enjoy spending time with my family, and participating in my local church group activities.
Co-Principal Investigator- National Institute of Justice (NIJ) Award “Technical Assistance, Training, and Evaluation for the Local Criminal Justice Community Engaged in Digital Forensic Activities” NIJ Award 2010-IJ-CX-K025