Google Scholar [link]
ORCID ID [link]
Digital Forensics: We are looking at developing more accurate and dependable data extraction techniques with some of the leading companies in the industry. We are also looking at developing scientific protocols for mobile devices that have been exposed to various environments such as flammables, clandestine chemicals, opioids, etc. These protocols will help the digital forensics community more efficiently and accurately extract data in any given mobile forensic investigation.
Social Media Forensics: The rise and popularity of open source intelligence (OSINT) and the increased popularity of social media usage worldwide has prompted our research focus on novel techniques to harvest and analyze social media artifacts from sites such as Twitter, Facebook, etc.
Image Forensics: The phrase "a picture is worth a thousand hacks" holds true in today's society. I am currently in the beginning stages of research involving picture-password authentication and how to easily break such encryption. We are also researching meaurements of the pupil as a determinant of age in "selfie" photographs of adolescent children. We presented these findings at the 2015 & 2016 AAFS annual meeting and are preparing to extend this research presentation again in 2016.
Mobile Device Forensics: We are researching emerging technologies in the field of mobile forensics, an ever-changing and expanding field. We expanded this research into wearable device forensics, which was presented at the 2019 American Academy of Forensic Sciences (AAFS) Annual meeting and published in the November 2019 issue of the Journal of Forensic Sciences.
Network Forensics: The rise of nefarious activity on public and private networks, including the internet, has focused our research efforts into new and emerging peer-to-peer and network-based technologies. This research has been presented at multiple venues including Security BSides, HackerCon/SecureWV, and the American Academy of Forensic Sciences (AAFS).
- Rusbarsky, K, Smith C, Brunty, J. & Fenger T. (2012) “A Forensic Comparison of NTFS & FAT32 File Systems.” Poster presentation at the 2012 AAFS Annual Meeting.
- Brunty, J. (2012). Windows 8 Forensic Analysis. Oral presentation at the 2012 Techno Security & Digital Investigations Conference, Myrtle Beach, SC.
- Brunty, J., & Chom, E. (2011) “A Forensic Analysis of PlayStation 3 Artifacts”
- Prolo, M., & Brunty, J. (2009) “Native File System Analysis: Testing Computer Forensic Tools for Accuracy with Native and Non-Native File Systems.”
- Wallace, I. & Brunty, J. (2007) “Defragmentation Residual Information Analysis”
- Doerger, E. & Brunty, J. (2007) “Forensic Analysis of Data Elimination Effectiveness and Residual File Artifacts Among Commercial Wiping Programs”
- Brunty, J. (2012). Social Media Forensics: Techniques, Tools, & Trends. Oral presentation at the 2013 Evidence Conference, Washington, DC.
- Helenek, K., Brunty, J, Vance, C. & T. Fenger. (2011-2012). “Facebook: Do You Leave a Trace? A Forensic Analysis of Facebook Artifacts.” Oral presentation at the 2012 AAFS Annual Meeting. [link]
- Baber, K., Boggs, R., Brunty, J., Levstein, I, Fenger, T.. (2014). "Age Estimation of Adolescents and Adults Using the Dimension of the Eye and Pupil in "Selfie" Photographs" Oral presentation at the 2015 AAFS Annual Meeting, Orlando, FL.
- Odom, N., Brunty, J. Lindmar, J., and Hirt, J. (2019), Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices. Presented at the 2019 American Academy of Forensic Sciences (AAFS) Annual Meeting & the 2019 Techno Security & Digital Forensics Conference
- Wilkinson, K., Brunty, J., et. al (2016). "Development of a Portable Mobile Forensics Toolkit Using Open Source Tools.." Oral presentation at the 2013 American Academy of Forensic Sciences (AAFS) Annual Meeting. [link]
- Friedman, R., Brunty, J. & Fenger T. (2012). “A Digital Forensic Analysis on the iCloud and its Synchronization to Apple Devices.” Oral presentation at the 2013 American Academy of Forensic Sciences (AAFS) Annual Meeting.
- Corcoran, K., Read, A., Brunty J. & Fenger, T. (2012). Messaging Application Analysis for Android and iOS Platforms.
- Swank, M. & Brunty J. (2008) “USB Portable Operating System and File System Circumvention Capability Analysis” Poster Presentation at the 2008 American Academy of Forensic Sciences (AAFS) Annual Meeting.
- Keirstead, M. & Brunty, J. (2008) “Peer-to-Peer Network Registry and System Artifact Analysis” Oral Presentation at the 2008 Mid Atlantic Association of Forensic Scientists (MAAFS) Annual Conference.
- Odom, N., Brunty, J. Lindmar, J., and Hirt, J. (2019), Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices,. J Forensic Sci. DOI: 10.1111/1556-4029.14109 [link]
- Brunty J. (2016) Mobile Device Forensics:Threats, Challenges, and Future Trends (Chapter 6). “Digital Forensics: Threatscape and Best Practices” Syngress/Elsevier , Waltham, MA. ISBN978-0-12-804526 - 8 [link]
- Brunty, J. L. (2016) Law Enforcement Advisory Panel (LEAP), "Fostering Innovation in US Law Enforcement" RAND Corporation, Arlington, VA. (June 21, 2016). [link]
- Brunty J., Helenek, K. (2012) Social Media Investigation for Law Enforcement. Elsevier/Anderson Company, Waltham, MA. ISBN 978-1-4557-3135-0. [link]
- Brunty, J. “Windows 8: A Forensic First Look.” Digital Forensic Investigator (DFI). 2012(2). [read]
- Brunty, J. “Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner.” Digital Forensic Investigator (DFI). Published March 2, 2011. [read]
- Windows 8 Forensics- A First Look [watch]
- High Tech Research-Forensic Science [watch]
- Network Forensics Using Kali Linux/SANS SIFT (HackerCon7- 2016 [watch] ) (HackerCon8- 2017 [watch] )
- Introduction to Wireshark (HackerCon7- 2016) [watch] ) (HackerCon8- 2017 [watch] )
- Mobile Device Forensics- An Introduction (HackerCon7- 2016) [watch]
- PUPs to PWN:Attack Vectors of Newest Waves of Bloatware (BSides Kansas City-2017) [watch]
- PUPs to PWN:Attack Vectors of Newest Waves of Ransomware (AIDE- 2018) [watch]
- Electronic Evidence Essentials- Stetson University (2018) [link] [watch]
- UA student spent night in jail over Facebook post that wasn't hers. Now she sees perils in tracing of threats (April 1, 2019) [link]
- Credit Card Vulnerability Awareness Arises. Huntington Herald Dispatch (Nov 2, 2017) [link]
- Local Digital Forensics Experts Weigh in on Apple vs. FBI. WOWKTV 13 News (Feb 23, 2016) [read] [watch]
- Social Media Reshapes the Courts. Point Park News Service (May 7, 2013) [link]
- Social Media Sites a Treasure Trove for Police. Scranton Times Tribune (April 14, 2013) [link]
I received my undergraduate degree in Criminal Justice & Criminology from Marshall University in 2005. I received my MS in Criminal Justice from Marshall University with graduate emphasis in Information and Computer Security in 2009. I also attended the University of Indianapolis for Forensic Digital Imaging and Forensic Video instruction. I'm a former former digital forensics laboratory manager and examiner, with over ten years of experience in the field of digital forensics & investigations. I'm currently an Assistant Professor of Digital Forensics for the Forensic Science Department at Marshall University. Prior to that, I managed digital forensic research & casework laboratories at the Marshall University Forensic Science Center and was an examiner working with the West Virginia State Police's Digital Forensic Unit. I currently sit on the NIST Organization of Scientific Area Committee (OSAC) Digital Evidence Committee and have been since 2015. I currently hold the following certs within the digital forensics discipline: AccessData Certified Examiner (ACE), Magnet Certifed Forensic Examiner (MCFE), Cellebrite Certified Mobile Examiner (CCME), LEVA Certified Forensic Video Technician (CFVT), Computer Hacking Forensic Examiner (CHFI), Seized Computer Evidence Recovery Specialist (SCERS), Certified Malware Investigator, Certified Steganography Examiner, and I am certified by the National Security Agency in Information Assurance Methodology (NSA-IAM). I've developed a variety of digital forensic training sessions and curriculum; including past recertification scenarios/exams for the International Association of Computer Investigative Specialists (IACIS). I'm an active member of the Mid-Atlantic Association of the High Technology Crime Investigation Association (HTCIA), the Digital-Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), the West Virginia Cyber Crimes Task Force, and the West Virginia Chapter of FBI INFRAGARD. I was born and raised in Salt Rock, West Virginia. In my spare time, I enjoy spending time with my family, and participating in my local church group activities.
- Principal Investigator (PI)- National Security Agency (NSA) Award- "GenCyber Marshall University Advanced Agents of Cyber Camp" NSA/NSF Award H98230-17-1-0237. [link]
- Principal Investigator (PI)- National Security Agency (NSA) Award- "GenCyber Marshall University Residential Cyber Camp" NSA/NSF Award H98230-18-1-0148. [link]
- Co-Principal Investigator (CO-PI)- National Institute of Justice (NIJ) Award “Technical Assistance, Training, and Evaluation for the Local Criminal Justice Community Engaged in Digital Forensic Activities” NIJ Award 2010-IJ-CX-K025. $855,000 [link].
- Twitter [link]
- LinkedIn [link]
- Google+ [link]
- Marshall University Digital Forensics & Information Assurance Facebook Group [link]
- Marshall University Digital Forensics & Information Assurance Twitter [link]
- Marshall University Digital Forensics & Information Assurance Homepage [link]
- GenCyber Homepage [link]
- GenCyber Twitter [link]
- Collegiate Cyber Defense Competition Club (CCDC) [link]