• Fall 2017 Courses:
  • DFIA 448-Forensic Image & Video Analysis [syllabus]
  • DFIA 467- Mobile Device Forensics [syllabus]
  • FSC 609- Network Forensics [syllabus]
  • FSC 632- Foundations & Fundamentals of Digital Evidence [syllabus]


ResearchGate [link]

Google Scholar [link]





Digital Forensics: We are looking at developing more accurate and dependable data extraction & carving techniques with some of the leading companies in the industry.


Social Media Forensics: The rise and popularity of open source intelligence (OSINT) and the increased popularity of social media usage worldwide has prompted our research focus on novel techniques to harvest and analyze social media artifacts from sites such as Twitter, Facebook, etc.


Image Forensics: The phrase "a picture is worth a thousand hacks" holds true in today's society. I am currently in the beginning stages of research involving picture-password authentication and how to easily break such encryption. We are also researching meaurements of the pupil as a determinant of age in "selfie" photographs of adolescent children. We presented these findings at the 2015 AAFS annual meeting and are preparing to extend this research presentation again in 2016.


Mobile Device Forensics: We are researching emerging technologies in the field of mobile forensics, an ever-changing and expanding field.


Network Forensics: The rise of nefarious activity on public and private networks, including the internet, has focused our research efforts into new and emerging peer-to-peer and network-based technologies


Digital Forensics

  1. Rusbarsky, K, Smith C, Brunty, J. & Fenger T. (2012) “A Forensic Comparison of NTFS & FAT32 File Systems.” Poster presentation at the 2012 AAFS Annual Meeting.
  2. Brunty, J. (2012). Windows 8 Forensic Analysis. Oral presentation at the 2012 Techno Security & Digital Investigations Conference, Myrtle Beach, SC.
  3. Brunty, J., & Chom, E. (2011) “A Forensic Analysis of PlayStation 3 Artifacts”
  4. Prolo, M., & Brunty, J. (2009) “Native File System Analysis: Testing Computer Forensic Tools for Accuracy with Native and Non-Native File Systems.”
  5. Wallace, I. & Brunty, J. (2007) “Defragmentation Residual Information Analysis”
  6. Doerger, E. & Brunty, J. (2007) “Forensic Analysis of Data Elimination Effectiveness and Residual File Artifacts Among Commercial Wiping Programs”


Digital Forensics: Social Media Forensics

  1. Brunty, J. (2012). Social Media Forensics: Techniques, Tools, & Trends. Oral presentation at the 2013 Evidence Conference, Washington, DC.
  2. Helenek, K., Brunty, J, Vance, C. & T. Fenger. (2011-2012). “Facebook: Do You Leave a Trace? A Forensic Analysis of Facebook Artifacts.” Oral presentation at the 2012 AAFS Annual Meeting. [link]


Digital Forensics: Image Forensics

  1. Baber, K., Boggs, R., Brunty, J., Levstein, I, Fenger, T.. (2014). "Age Estimation of Adolescents and Adults Using the Dimension of the Eye and Pupil in "Selfie" Photographs" Oral presentation at the 2015 AAFS Annual Meeting, Orlando, FL.


Digital Forensics: Mobile Device Forensics

  1. Friedman, R., Brunty, J. & Fenger T. (2012). “A Digital Forensic Analysis on the iCloud and its Synchronization to Apple Devices.” Oral presentation at the 2013 American Academy of Forensic Sciences (AAFS) Annual Meeting.
  2. Corcoran, K., Read, A., Brunty J. & Fenger, T. (2012). Messaging Application Analysis for Android and iOS Platforms.


Digital Forensics: Network Forensics

  1. Swank, M. & Brunty J. (2008) “USB Portable Operating System and File System Circumvention Capability Analysis” Poster Presentation at the 2008 American Academy of Forensic Sciences (AAFS) Annual Meeting.
  2. Keirstead, M. & Brunty, J. (2008) “Peer-to-Peer Network Registry and System Artifact Analysis” Oral Presentation at the 2008 Mid Atlantic Association of Forensic Scientists (MAAFS) Annual Conference.

  1. Brunty J. (2016) Mobile Device Forensics:Threats, Challenges, and Future Trends (Chapter 6). “Digital Forensics: Threatscape and Best Practices” Syngress/Elsevier , Waltham, MA. ISBN978-0-12-804526 - 8[link]
  2. Brunty J., Helenek, K. (2012) Social Media Investigation for Law Enforcement. Elsevier/Anderson Company, Waltham, MA. ISBN 978-1-4557-3135-0. [link]
  3. Brunty, J. “Windows 8: A Forensic First Look.” Digital Forensic Investigator (DFI). 2012(2). [read]
  4. Brunty, J. “Validation of Forensic Tools and Software: A Quick Guide for the Digital Forensic Examiner.” Digital Forensic Investigator (DFI). Published March 2, 2011. [read]
  1. Windows 8 Forensics- A First Look [watch]
  2. High Tech Research-Forensic Science [watch]
  3. Network Forensics Using Kali Linux/SANS SIFT (HackerCon7- 2016) [watch]
  4. Introduction to Wireshark (HackerCon7- 2016) [watch]
  5. Mobile Device Forensics- An Introduction (HackerCon7- 2016) [watch]
  6. PUPs to PWN:Attack Vectors of Newest Waves of Bloatware (BSides Kansas City-2017) [watch]
  1. GitHub Page [link]


  1. Local Digital Forensics Experts Weigh in on Apple vs. FBI (Feb 23, 2016) [link]
  2. Police Say Customer Tackles Jewelry Store Thief (Dec 30, 2015) [link]
  3. Social Media Reshapes the Courts.  Point Park News Service (May 7, 2013) [link]
  4. Social Media Sites a Treasure Trove for Police.  Scranton Times Tribune (April 14, 2013) [link]

I received my undergraduate degree in Criminal Justice & Criminology from Marshall University in 2005. I received my MS in Criminal Justice from Marshall University with graduate emphasis in Information and Computer Security in 2009. I also attended the University of Indianapolis for Forensic Digital Imaging and Forensic Video instruction. I'm a former former digital forensics laboratory manager and examiner, with over ten years of experience in the field of digital forensics & investigations. I'm currently an Assistant Professor of Digital Forensics for the Forensic Science Department at Marshall University. Prior to that, I managed digital forensic research & casework laboratories at the Marshall University Forensic Science Center and was an examiner working with the West Virginia State Police's Digital Forensic Unit. I currently sit on the NIST Organization of Scientific Area Committee (OSAC) Digital Evidence Committee and have been since 2015. I currently hold the following certs within the digital forensics discipline: AccessData Certified Examiner (ACE), Cellebrite Certified Mobile Examiner (CCME), AccessData Mobile Examiner (AME), Computer Hacking Forensic Examiner (CHFI), Seized Computer Evidence Recovery Specialist (SCERS), Certified Malware Investigator, Certified Steganography Examiner, and I am certified by the National Security Agency in Information Assurance Methodology (NSA-IAM). I've developed a variety of digital forensic training sessions and curriculum; including past recertification scenarios/exams for the International Association of Computer Investigative Specialists (IACIS). I'm an active member of the Mid-Atlantic Association of the High Technology Crime Investigation Association (HTCIA), the Digital-Multimedia Sciences section of the American Academy of Forensic Sciences (AAFS), the West Virginia Cyber Crimes Task Force, and the West Virginia Chapter of FBI INFRAGARD. I was born and raised in Salt Rock, West Virginia. In my spare time, I enjoy spending time with my family, and participating in my local church group activities.


  1. Principal Investigator (PI)- National Security Agency (NSA) Award- "GenCyber Marshall University Residential Cyber Camp" NSA/NSF Award H98230-17-1-0237. [link]
  2. Co-Principal Investigator (CO-PI)- National Institute of Justice (NIJ) Award “Technical Assistance, Training, and Evaluation for the Local Criminal Justice Community Engaged in Digital Forensic Activities” NIJ Award 2010-IJ-CX-K025. $855,000 [link].



  1. Twitter [link]
  2. LinkedIn [link]
  3. Google+ [link]
  4. Marshall University Digital Forensics & Information Assurance Facebook Group [link]
  5. Marshall University Digital Forensics & Information Assurance Twitter Page [link]
  6. Marshall University Digital Forensics & Information Assurance Homepage [link]