Staff Bios

Quick Links


Eliud Bonilla

Coming soon...

Parnian Najafi Borazjani
Coming soon...

Jennifer Deavers
Coming soon...

Juan Carlos Diaz
Coming soon...

Jared K. Greenhill

Jared K Greenhill

Courses:  Memory Forensics


Jared Greenhill is a Senior Forensic Analyst at Sony where he performs digital media analysis in support of global investigative efforts. Previously Jared was an incident responder for RSA’s IR practice where he performed network and host based forensics, memory analysis and reverse engineering of malware. Prior to joining RSA, Jared was a forensic analyst for US-CERT’s Digital Media Analytics team. Jared has spoken at several industry-recognized conferences including RSA Conference, Security BSides New Orleans, Volatility’s Open Memory Forensics Workshop and the BlackHat webcast series.


John J. Irvine

Courses: Legal and Ethical Issues in Computer Forensics
M.S. Information Systems, GMU, 2000
G.C. Software Systems Engineering, GMU, 2000
EnCE - EnCase Certified Examiner
Q/EH - Qualified Ethical Hacker
Private Investigator, Commonwealth of Virginia
Former CART Certified Field Examiner, Federal Bureau of Investigation
Former DEA Certified Examiner, Drug Enforcement Administration

Mr. Irvine has over twenty five years of experience working for and around the Federal Government, with nearly twenty years specializing in Computer Forensic Analysis and Digital Investigations. John has performed computer forensic analysis and media exploitation casework for the FBI, CIA, DEA, and both large and small commercial companies. Over his career, he has been both a practicing examiner and an active manager, leading teams of up to forty specialists working in the areas of computer forensic analysis, network forensic analysis, malicious code and binary reverse engineering, software development, test and quality assurance, and technical support.

As a senior digital forensic analyst himself, Mr. Irvine specializes in the areas of Cyber Profiling and counterterrorism-based digital forensic analysis.

Currently, Mr. Irvine is the CTO of CyTech Services, Inc. and oversees the development of CyFIR Enterprise, an enterprise-level remote digital forensics and incident response platform. CyFIR Enterprise is known as the tool that found active malicious code at the Office of Personnel Management in 2015 during a demonstration of CyFIR's capabilities, leading to the announcement of the largest network breach in US Government history.


Michael K. Robinson

Courses:Mobile Device Forensics, Digital Warfare

Stevenson University, Stevenson, MD - MS - Forensic Studies
Mercyhurst College, Erie, PA - Graduate Certificate - Applied Intelligence
University of Maryland, Adelphi, MD - MS - Information Technology, Phi Kappa Phi
International Society of Computer Forensic Examiners – Certified Computer Examiner
Microsoft Certified System Engineer
CompTIA Security+, Server+, Network+

Mr. Robinson is employed by IBM performing cirtitcal incident and fornsic response.  In his position he analyzes various types of media, including hard drive images, memory captures, and network traffic, to identify intrusions. He also performs dynamic analysis of malware. Prior to working with IBM, Michael was the Chief Information Officer for an agency within the U.S. Department of Defense. There he oversaw all IT and IA operations for the agency, including personally handling computer forensic examinations.



Brian E. Hussey

Courses: Intro to Forensic Technologies; Currently designing courses in International Cybercrime and Cyber-Espionage
Master of Forensic Science with specialty: in High Tech Crime Investigation - George Washington University
GREM (GIAC Reverse Engineer of Malware)
EnCE (EnCase Certified Examiner)
CCE (Certified Computer Examiner)
Q/EH (Qualified Ethical Hacker)
Licensed private investigator in the state of Virginia.

Mr. Hussey has designed coursework and instructed advanced analytical training sessions for FBI CART teams and cyber agents in field offices throughout the United States specializing in topics such as: network intrusion analysis, volatile memory acquisition and analysis, and malware analysis.  Additionally, he has represented the FBI in international cyber-summits where he has provided intrusion, botnet and cybercrime investigation training to representatives from foreign Governments, most recently to include: India, Nigeria, and Ukraine. He has provided analytical training at JACKE (Joint Agency Cyber Knowledge Exchange) and US-CERT.
Mr. Hussey currently works as a Senior Digital Forensic Analyst at Crucial Security Programs of Harris Corporation supporting federal law enforcement by conducting investigations into network intrusions, botnets, international cybercrime and malware analysis. Prior to this position, he managed a commercial computer forensics division where we assisted law firms, corporations, banks, and Government agencies to conduct computer investigations as well as provide e-discovery services.



Jessica L. Hyde

Courses: CFRS 762 - Mobile Device Forensics
M.S. Computer Forensics  
B.S. Electronics Engineering Technology 

Jessica Hyde is a Senior Mobile Forensics Examiner and Team Lead for Basis Technology with over 14 years of technical experience. She has performed computer and mobile device forensics in the commercial and government sectors. Prior to working for Basis Technology, Ms. Hyde performed computer crime investigations for Ernst and Young and worked as an electrical engineer performing electronic data recovery on mobile devices for American Systems. Ms. Hyde is a US Marine Corps veteran.


Robert Osgood

Courses: Network Forensics; Digital Media Forensics; Fraud and Forensic Accounting
MS Telecommunications – George Mason University
Certified Computer Forensics Examiner - FBI
Windows, Mac, and Linux
Certified Technically Trained Agent - FBI
Certified Public Accountant - New York State

Mr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics, Cyber-Crime, Enterprise Criminal Organizations, Espionage and Counter-Terrorism. In the course of his work he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division.
Mr. Osgood formed the first FBI computer forensics squad in 2000, and was part of the team that executed the first court authorized digital computer intercept. In addition he is, along with Prof. Jeremy Allnutt, the original designers of the CFRS Masters program at George Mason University.

Aleksandar Lazarevich

Courses: Network Forensics; Digital Media Forensics, Operations of Intrusion Detection for Forensics, Incident Response Forensics
PhD IT with specialties in Computer Forensics and Information Assurance – George Mason University
MS EE – University of Arizona
Certificates: CISSP-ISSAP, MCSE, CCNA, Net+, A+, Nistissi 4011

Dr. Lazarevich is currently the Chief Engineer, Information Assurance Manager, and the acting Deputy Project Manager of the Department of Defense Biometrics Project Management Office. Prior to that, he was a senior investigative engineer with the Defense Information Systems Agency for over 38 years where he was involved in numerous digital forensic investigations in support of the intelligence, tactical and strategic cyber communities.
He has received numerous commendations from Defense, other Federal, and numerous International agencies and Governments including Thailand, Korea, and Australia. Dr. Lazarevich’s book, Analyzing Cyber Crime, has been published in eighteen countries.

David Loveall
Coming soon...


Jonathan P. Fowler

Courses: Advanced Computer Forensics
Masters of Science in Justice, Law & Society: American University, 2000
Certifications: EnCE, ACE, and CCE
Federal and State Courts Qualified Expert Witness

Mr. Fowler is a Senior Regional Practice Leader with First Advantage. As part of his job he has direct managerial responsibility for all forensic personnel on the East Coast, as well as assisting in managing all forensic investigations in the US. Before joining First Advantage he spent five years as a corporate investigator working on cases involving fraud, harassment, and embezzlement.
He performs research and development of forensic capabilities on devices running the Android operating system. He is currently conducting basic research into what types of artifacts can be located on such systems, and how they can be used for forensics.
Mr. Fowler routinely provides testimony as an expert witness in computer forensics in Federal and State courts across the country.


Kafi Hassan

Courses: Operations of Intrusion Detection and Forensics



Ph.D. Electrical Engineering, Graduate Center of City University of New York
BS and MS Electrical Engineering, University of North Carolina at Charlotte

 Dr. Hassan has been working for Sprint Corporation in Reston, Virginia since 2006. He is a Senior Technology Development Engineer in the Network Innovation and Architecture team. From 1995 to 2006, he worked as a Member of Technical Staff at Bell Laboratories at Whippany, New Jersey, doing research and development in design and analysis of communication systems. 

Dr. Hassan’s current research interest include computer forensics, intrusion detection systems, lawful surveillance systems, high performance network optimization algorithms, network architectures and resource management, evolutionary computation and mobile applications. 

Dr. Hassan is the current Chair of the IEEE Communications Society (ComSoc) Northern Virginia Chapter.


Tahir Khan



Courses:  Penetration Testing Forensics, Mobile Application Analysis and Forensics, Anti Forensics Credentials: 

MS Computer Forensics - George Mason Universit

Mr. Khan has over sixteen years of experience in the Information Security field. Mr. Khan is currently the CTO of a startup focusing

on identity managment and authentication. Previously he was the CISO for a financial services company managing incident response and fraud detection teams as well researching in the information security arena.

Mr. Khan spent more than a decade at Northrop Grumman where he served various federal agencies in information security and network operations.

Mr. Khan's current hobbies are mobile application analysis, mobile application reverse engineering and researching wireless technologiesCourses: CFRS 767 – Penetration Test Comp Forensics

(Fall), CFRS 769 – Anti – Forensics (Fall), CFRS 773 – Mobile Application/ Forensic Analysis (Spring)

Jim Jones

Jim Jones Assoc Professor PhD CFRS



Jim Jones is an Associate Professor in the Computer Forensics program within the ECE Department. Dr. Jones earned his

Bachelor's degree from Georgia Tech (Industrial and Systems Engineering, 1989), Master's degree from Clemson University (Mathematical Sciences, 1995), and PhD

from George Mason University (Computational Sciences and Informatics, 2008). He has been a cyber security practitioner, researcher, and educator for over 18 years. During that time, he has led and performed network and system vulnerability and penetration tests, conducted malware analysis, led a cyber incident response team, conducted digital forensics investigations, and taught university courses in information security, penetration testing, digital forensics, and programming. Past and current funded research sponsors include DARPA, DHS, NSF, and DoD. His academic and research interests are focused on digital forensics, data and intelligence analysis, malware behavior and detection, and cyber warfare.


Ryan Chapin


With over a decade of Mac computer forensics industry experience, Ryan L. Chapin, an executive with an internationally recognized computer forensic organization has

extensive government and public-sector data collection, processing, analyzing, and reporting experience. He is a highly skilled training curricula development and administration professional, and possesses a unique gift of making very complex concepts easy to learn. Prior to joining his current employer as a senior digital forensic analyst in 2006, Mr. Chapin participated in research, supported investigations, conducted analysis of casework, and supervised 60 DoD contract personnel responsible for computer forensic analysis. 



T. Roy



T.Roy is the founder and president of CodeMachine. He spends most of his time on security research, reverse engineering, software development, and training.  He holds a Master’s Degree in Computer Engineering and has taken many products from their infancy all the way through to commercial success. He has spent more than a decade working on security products like host intrusion prevention, network firewalls, behavioral anti-malware, document security, and data leak prevention systems. He has also worked on the offensive side of security for the government and defense industry.

He has been delivering training courses to companies all over the world, has taught Microsoft’s own engineers and has received many instructor recognition awards. He has an innate talent for taking complex concepts and explaining them in a lucid manner. Through the courses he teaches, he shares the knowledge he has acquired through years of hands-on experience.

Chad Steel

Contact: csteel@gmu.eduCourses:  CFRS 771 - Digital Forensics Profilling (Fall)


Mr. Steel has worked in both the government and private sector in technical and management roles.  He has previously served in multiple digital security positions, including serving as the Sr. Director for Systems Integration and Security Services at Qwest Communications, and the Head of IT Investigations for GlaxoSmithKline.  He previously taught as an Adjunct Professor at Penn State University, where he helped put together their graduate program in information security.

Mr. Steel is the author of multiple peer-reviewed journal

papers on data mining and digital behavioral analysis.  Recent papers include The Asperger's Defense in Digital Child Pornography Investigations (2015), The Technical SODDI Defenses: The Trojan Horse Defense Revisited (2015) and Idiographic Digital Profiling:  Behavioral Analysis Based on Computer Forensics (2015).  He is also the author of two books on digital forensics and child exploitation investigations.