• Spring 2020 Courses:
  • DFIA 448-Forensic Image & Video Analysis
  • DFIA 462- Network Forensics
  • DFIA 467- Mobile Device Forensics
  • FSC 605- Forensic Digital Imaging
  • FSC 634- Search & Seizure of Digital Evidence
  • FSC 676- Advanced Digital Evidence


ResearchGate [link]

Academia.edu [link]

Google Scholar [link]

ORCID ID [link]






Digital Forensics: We are looking at developing more accurate and dependable data extraction techniques with some of the leading companies in the industry. We are also looking at developing scientific protocols for mobile devices that have been exposed to various environments such as flammables, clandestine chemicals, opioids, etc. These protocols will help the digital forensics community more efficiently and accurately extract data in any given mobile forensic investigation.


Social Media Forensics: The rise and popularity of open source intelligence (OSINT) and the increased popularity of social media usage worldwide has prompted our research focus on novel techniques to harvest and analyze social media artifacts from sites such as Twitter, Facebook, etc.


Image Forensics: The phrase "a picture is worth a thousand hacks" holds true in today's society.We have researched meaurements of the pupil as a determinant of age in "selfie" photographs of adolescent children. We presented these findings at the 2015 & 2016 AAFS annual meetings.


Mobile Device Forensics: We are researching emerging technologies in the field of mobile forensics, an ever-changing and expanding field. We expanded this research into wearable device forensics, which was presented at the 2019 American Academy of Forensic Sciences (AAFS) Annual meeting and published in the November 2019 issue of the Journal of Forensic Sciences. This research also earned the 2020 Most Outstanding Research honor in the Digital & Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS). We have also performed a significant amount of research in the acquisition of data from mobile devices that have been submerged and/or contaminated with liquids, fuels, oils, drugs, fire damage, etc. This research has led to the development of cleaning & handling protocols that are being used in digital forensics laboratories throughout the country.


Network Forensics: The rise of nefarious activity on public and private networks, including the internet, has focused our research efforts into new and emerging peer-to-peer and network-based technologies. I have presented such research at multiple venues including Security BSides (Kansas City, 2017), HackerCon/SecureWV (2016-2018), the Appalachian Institute of Digital Evidence (AIDE), and the American Academy of Forensic Sciences (AAFS).


Cross-Cutting Forensics: The rise in Opioid trafficking in the Appalachian region has focused much of our research on creating new techniques & technologies to assist investigators both on the surface web and dark web.


Digital Forensics

  1. Rusbarsky, K, Smith C, Brunty, J. & Fenger T. (2012) “A Forensic Comparison of NTFS & FAT32 File Systems.” Poster presentation at the 2012 AAFS Annual Meeting.
  2. Brunty, J. (2012). Windows 8 Forensic Analysis. Oral presentation at the 2012 Techno Security & Digital Investigations Conference, Myrtle Beach, SC.
  3. Brunty, J., & Chom, E. (2011) “A Forensic Analysis of PlayStation 3 Artifacts”
  4. Prolo, M., & Brunty, J. (2009) “Native File System Analysis: Testing Computer Forensic Tools for Accuracy with Native and Non-Native File Systems.”
  5. Wallace, I. & Brunty, J. (2007) “Defragmentation Residual Information Analysis”
  6. Doerger, E. & Brunty, J. (2007) “Forensic Analysis of Data Elimination Effectiveness and Residual File Artifacts Among Commercial Wiping Programs”


Digital Forensics: Social Media Forensics

  1. Brunty, J. (2012). Social Media Forensics: Techniques, Tools, & Trends. Oral presentation at the 2013 Evidence Conference, Washington, DC.
  2. Helenek, K., Brunty, J, Vance, C. & T. Fenger. (2011-2012). “Facebook: Do You Leave a Trace? A Forensic Analysis of Facebook Artifacts.” Oral presentation at the 2012 AAFS Annual Meeting. [link]


Digital Forensics: Image Forensics

  1. Baber, K., Boggs, R., Brunty, J., Levstein, I, Fenger, T.. (2014). "Age Estimation of Adolescents and Adults Using the Dimension of the Eye and Pupil in "Selfie" Photographs" Oral presentation at the 2015 AAFS Annual Meeting, Orlando, FL.


Digital Forensics: Mobile Device Forensics

        1. Odom, N., Brunty, J. Lindmar, J., and Hirt, J. (2019), Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices. Presented at the 2019 American Academy of Forensic Sciences (AAFS) Annual Meeting & the 2019 Techno Security & Digital Forensics Conference
  1. Wilkinson, K., Brunty, J., et. al (2016). "Development of a Portable Mobile Forensics Toolkit Using Open Source Tools.." Oral presentation at the 2013 American Academy of Forensic Sciences (AAFS) Annual Meeting. [link]
  2. Friedman, R., Brunty, J. & Fenger T. (2012). “A Digital Forensic Analysis on the iCloud and its Synchronization to Apple Devices.” Oral presentation at the 2013 American Academy of Forensic Sciences (AAFS) Annual Meeting.
  3. Corcoran, K., Read, A., Brunty J. & Fenger, T. (2012). Messaging Application Analysis for Android and iOS Platforms.


Digital Forensics: Network Forensics

  1. Swank, M. & Brunty J. (2008) “USB Portable Operating System and File System Circumvention Capability Analysis” Poster Presentation at the 2008 American Academy of Forensic Sciences (AAFS) Annual Meeting.
  2. Keirstead, M. & Brunty, J. (2008) “Peer-to-Peer Network Registry and System Artifact Analysis” Oral Presentation at the 2008 Mid Atlantic Association of Forensic Scientists (MAAFS) Annual Conference.

  1. Odom, N., Brunty, J. Lindmar, J., and Hirt, J. (2019), Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices,. J Forensic Sci. DOI: 10.1111/1556-4029.14109 [link]
  2. Brunty J. (2016) Mobile Device Forensics:Threats, Challenges, and Future Trends (Chapter 6). “Digital Forensics: Threatscape and Best Practices” Syngress/Elsevier , Waltham, MA. ISBN978-0-12-804526 - 8 [link]
  3. Brunty, J. L. (2016) Law Enforcement Advisory Panel (LEAP), "Fostering Innovation in US Law Enforcement" RAND Corporation, Arlington, VA. (June 21, 2016). [link]
  4. Brunty J., Helenek, K. (2012) Social Media Investigation for Law Enforcement. Elsevier/Anderson Company, Waltham, MA. ISBN 978-1-4557-3135-0. [link]
  5. Brunty, J. “Windows 8: A Forensic First Look.” Digital Forensic Investigator (DFI). 2012(2). [read]
  6. Brunty, J. “Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner.” Digital Forensic Investigator (DFI). Published March 2, 2011. [read]
  1. Windows 8 Forensics- A First Look [watch]
  2. High Tech Research-Forensic Science [watch]
  3. Network Forensics Using Kali Linux/SANS SIFT (HackerCon7- 2016 [watch] ) (HackerCon8- 2017 [watch] )
  4. Introduction to Wireshark (HackerCon7- 2016) [watch] ) (HackerCon8- 2017 [watch] )
  5. Mobile Device Forensics- An Introduction (HackerCon7- 2016) [watch]
  6. PUPs to PWN:Attack Vectors of Newest Waves of Bloatware (BSides Kansas City-2017) [watch]
  7. PUPs to PWN:Attack Vectors of Newest Waves of Ransomware (AIDE- 2018) [watch]
  8. Electronic Evidence Essentials- Stetson University (2018) [link] [watch]
  1. GitHub Page [link]
  2. Keybase [link]


  1. UA student spent night in jail over Facebook post that wasn't hers. Now she sees perils in tracing of threats (April 1, 2019) [link]
  2. Credit Card Vulnerability Awareness Arises. Huntington Herald Dispatch (Nov 2, 2017) [link]
  3. Local Digital Forensics Experts Weigh in on Apple vs. FBI. WOWKTV 13 News (Feb 23, 2016) [read] [watch]
  4. Social Media Reshapes the Courts.  Point Park News Service (May 7, 2013) [link]
  5. Social Media Sites a Treasure Trove for Police.  Scranton Times Tribune (April 14, 2013) [link]

I received my undergraduate degree in Criminal Justice & Criminology from Marshall University in 2005. I received my MS in Criminal Justice from Marshall University with graduate emphasis in Information and Computer Security in 2009. I also attended the University of Indianapolis for Forensic Digital Imaging and Forensic Video instruction. I'm a former former digital forensics laboratory manager and examiner, with over ten years of experience in the field of digital forensics & investigations. I'm currently an Associate Professor of Cyber Forensics for the Forensic Science Department at Marshall University. Prior to that, I managed digital forensic research & casework laboratories at the Marshall University Forensic Science Center (MUFSC), and was an examiner working with the West Virginia State Police's Digital Forensic Unit (WVSP-DFU). I am a member of the Editorial Board of the Journal of Forensic Sciences- appointed to the position by the AAFS Board of Directors in February 2020. I currently sit on the NIST Organization of Scientific Area Committee (OSAC) Digital Evidence Committee and have been since 2015. I currently hold the following certifications within the digital forensics discipline: Magnet Certifed Forensic Examiner (MCFE), Cellebrite Certified Mobile Examiner (CCME), LEVA Certified Forensic Video Technician (CFVT), Computer Hacking Forensic Examiner (CHFI), Seized Computer Evidence Recovery Specialist (SCERS), Certified Malware Investigator, Certified Steganography Examiner, and I am certified by the National Security Agency in Information Assurance Methodology (NSA-IAM). I've developed a variety of digital forensic training sessions and curriculum; including past recertification scenarios/exams for the International Association of Computer Investigative Specialists (IACIS). I am a Fellow of the Digital-Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), currently serving as Co-Chair of the Planning Committee. I'm an active member of the Mid-Atlantic Association of the High Technology Crime Investigation Association (HTCIA), the West Virginia Cyber Crimes Task Force, and the West Virginia Chapter of FBI INFRAGARD. I was born and raised in Salt Rock, West Virginia. In my spare time, I enjoy spending time with my family, and participating in my local church group activities. I also serve as the Chapter Advisor of the Marshall University Collegiate Cyber Defense (CCDC) Club. This team has placed in the Top 10 Nationally for 3 straight years [Fall 2018, Spring 2019, Fall 2019]


  1. Principal Investigator (PI)- National Security Agency (NSA) Award- "GenCyber Marshall University Advanced Agents of Cyber Camp" NSA/NSF Award H98230-17-1-0237. [link]
  2. Principal Investigator (PI)- National Security Agency (NSA) Award- "GenCyber Marshall University Residential Cyber Camp" NSA/NSF Award H98230-18-1-0148. [link]
  3. Co-Principal Investigator (CO-PI)- National Institute of Justice (NIJ) Award “Technical Assistance, Training, and Evaluation for the Local Criminal Justice Community Engaged in Digital Forensic Activities” NIJ Award 2010-IJ-CX-K025. $855,000 [link].



  1. Twitter [link]
  2. LinkedIn [link]
  3. Keybase [link]
  4. Github [link]
  5. Marshall University Digital Forensics & Information Assurance Facebook Group [link]
  6. Marshall University Digital Forensics & Information Assurance Twitter [link]
  7. GenCyber Homepage [link]
  8. GenCyber Twitter [link]
  9. Collegiate Cyber Defense Competition Club (CCDC) [link]