Staff Bios

Quick Links

 

Eliud Bonilla

 

Courses: Introduction to Digital Media Forensic Analysis
Contact: ebonilla@gmu.edu
Credentials:
 MS in Recording Arts - Media Forensics – Univ. of Colorado @ Denver
 BS in Electrical Engineering – Univ. of Puerto Rico @ Mayagüez

 

Mr. Bonilla has over thirty years of engineering, signal processing and multimedia (audio, images, video) analysis experience. He is a subject matter expert in speaker identification methods and highly proficient in multimedia forensic analysis and exploitation. Mr. Bonilla is employed at Johns Hopkins University Applied Physics Laboratory as Senior Professional Staff. 
 


 

 

Parnian Najafi Borazjani
Coming soon...

Jennifer Deavers
Coming soon...

Jared K. Greenhill

Jared K Greenhill

Courses:  Memory Forensics
Contact:  jgreenhi@gmu.edu

Credentials:

Jared Greenhill is a Senior Forensic Analyst at Sony where he performs digital media analysis in support of global investigative efforts. Previously Jared was an incident responder for RSA’s IR practice where he performed network and host based forensics, memory analysis and reverse engineering of malware. Prior to joining RSA, Jared was a forensic analyst for US-CERT’s Digital Media Analytics team. Jared has spoken at several industry-recognized conferences including RSA Conference, Security BSides New Orleans, Volatility’s Open Memory Forensics Workshop and the BlackHat webcast series.

 

John J. Irvine

Courses: Legal and Ethical Issues in Computer Forensics
Contact: jirvine2@gmu.edu
Credentials:
M.S. Information Systems, GMU, 2000
G.C. Software Systems Engineering, GMU, 2000
EnCE - EnCase Certified Examiner
Q/EH - Qualified Ethical Hacker
Former Private Investigator, Commonwealth of Virginia
Former CART Certified Field Examiner, Federal Bureau of Investigation
Former DEA Certified Examiner, Drug Enforcement Administration

Mr. Irvine has over twenty five years of experience working for and around the Federal Government, with nearly twenty years specializing in Computer Forensic Analysis and Digital Investigations. John has performed computer forensic analysis and media exploitation casework for the FBI, CIA, DEA, and both large and small commercial companies. Over his career, he has been both a practicing examiner and an active manager, leading teams of up to forty specialists working in the areas of computer forensic analysis, network forensic analysis, malicious code and binary reverse engineering, software development, test and quality assurance, and technical support.

As a senior digital forensic analyst himself, Mr. Irvine specializes in the areas of Cyber Profiling and counterterrorism-based digital forensic analysis.

Currently, Mr. Irvine is the CTO of CyTech Services, Inc. and oversees the development of CyFIR Enterprise, an enterprise-level remote digital forensics and incident response platform. CyFIR Enterprise is known as the tool that found active malicious code at the Office of Personnel Management in 2015 during a demonstration of CyFIR's capabilities, leading to the announcement of the largest network breach in US Government history.

 

Brian E. Hussey

Courses: Intro to Forensic Technologies; Currently designing courses in International Cybercrime and Cyber-Espionage
Contact: bhussey@gmu.edu  
Credentials:
Master of Forensic Science with specialty: in High Tech Crime Investigation - George Washington University
Certifications:
GREM (GIAC Reverse Engineer of Malware)
EnCE (EnCase Certified Examiner)
CCE (Certified Computer Examiner)
Q/EH (Qualified Ethical Hacker)
Licensed private investigator in the state of Virginia.


Mr. Hussey has designed coursework and instructed advanced analytical training sessions for FBI CART teams and cyber agents in field offices throughout the United States specializing in topics such as: network intrusion analysis, volatile memory acquisition and analysis, and malware analysis.  Additionally, he has represented the FBI in international cyber-summits where he has provided intrusion, botnet and cybercrime investigation training to representatives from foreign Governments, most recently to include: India, Nigeria, and Ukraine. He has provided analytical training at JACKE (Joint Agency Cyber Knowledge Exchange) and US-CERT.
Mr. Hussey currently works as a Senior Digital Forensic Analyst at Crucial Security Programs of Harris Corporation supporting federal law enforcement by conducting investigations into network intrusions, botnets, international cybercrime and malware analysis. Prior to this position, he managed a commercial computer forensics division where we assisted law firms, corporations, banks, and Government agencies to conduct computer investigations as well as provide e-discovery services.

 

 

Jessica L. Hyde

Courses: CFRS 762 - Mobile Device Forensics
Credentials:
M.S. Computer Forensics  
B.S. Electronics Engineering Technology 

Jessica Hyde is a Senior Mobile Forensics Examiner and Team Lead for Basis Technology with over 14 years of technical experience. She has performed computer and mobile device forensics in the commercial and government sectors. Prior to working for Basis Technology, Ms. Hyde performed computer crime investigations for Ernst and Young and worked as an electrical engineer performing electronic data recovery on mobile devices for American Systems. Ms. Hyde is a US Marine Corps veteran.

 

Robert Osgood

Courses: Network Forensics; Digital Media Forensics; Fraud and Forensic Accounting
Contact:  rosgood@gmu.edu
Credentials:
MS Telecommunications – George Mason University
Certified Computer Forensics Examiner - FBI
Windows, Mac, and Linux
Certified Technically Trained Agent - FBI
Certified Public Accountant - New York State

Mr. Osgood retired from 26 years as an FBI agent specializing in Computer Forensics, Cyber-Crime, Enterprise Criminal Organizations, Espionage and Counter-Terrorism. In the course of his work he has performed computer forensics research and development and created unique new software tools for computer forensic law enforcement. He has also been employed as Project Director for ManTech Intl. Corp. working in the computer forensic intrusion analysis division.
Mr. Osgood formed the first FBI computer forensics squad in 2000, and was part of the team that executed the first court authorized digital computer intercept. In addition he is, along with Prof. Jeremy Allnutt, the original designers of the CFRS Masters program at George Mason University.

Aleksandar Lazarevich

Courses: Network Forensics; Digital Media Forensics, Operations of Intrusion Detection for Forensics, Incident Response Forensics
Contact:  alazarev@gmu.edu
Credentials:
PhD IT with specialties in Computer Forensics and Information Assurance – George Mason University
MS EE – University of Arizona
Certificates: CISSP-ISSAP, MCSE, CCNA, Net+, A+, Nistissi 4011

Dr. Lazarevich is currently the Chief Engineer, Information Assurance Manager, and the acting Deputy Project Manager of the Department of Defense Biometrics Project Management Office. Prior to that, he was a senior investigative engineer with the Defense Information Systems Agency for over 38 years where he was involved in numerous digital forensic investigations in support of the intelligence, tactical and strategic cyber communities.
He has received numerous commendations from Defense, other Federal, and numerous International agencies and Governments including Thailand, Korea, and Australia. Dr. Lazarevich’s book, Analyzing Cyber Crime, has been published in eighteen countries.


David Loveall
Coming soon...

 

Jonathan P. Fowler

Courses: Advanced Computer Forensics
Contact:     jfowler9@gmu.edu
Credentials:
Masters of Science in Justice, Law & Society: American University, 2000
Certifications: EnCE, ACE, and CCE
Federal and State Courts Qualified Expert Witness

Mr. Fowler is a Senior Regional Practice Leader with First Advantage. As part of his job he has direct managerial responsibility for all forensic personnel on the East Coast, as well as assisting in managing all forensic investigations in the US. Before joining First Advantage he spent five years as a corporate investigator working on cases involving fraud, harassment, and embezzlement.
He performs research and development of forensic capabilities on devices running the Android operating system. He is currently conducting basic research into what types of artifacts can be located on such systems, and how they can be used for forensics.
Mr. Fowler routinely provides testimony as an expert witness in computer forensics in Federal and State courts across the country.

 

Kafi Hassan

Courses: Operations of Intrusion Detection and Forensics

Contact: khassan1@gmu.edu

Credentials: 

Ph.D. Electrical Engineering, Graduate Center of City University of New York
BS and MS Electrical Engineering, University of North Carolina at Charlotte

 Dr. Hassan has been working for Sprint Corporation in Reston, Virginia since 2006. He is a Senior Technology Development Engineer in the Network Innovation and Architecture team. From 1995 to 2006, he worked as a Member of Technical Staff at Bell Laboratories at Whippany, New Jersey, doing research and development in design and analysis of communication systems. 

Dr. Hassan’s current research interest include computer forensics, intrusion detection systems, lawful surveillance systems, high performance network optimization algorithms, network architectures and resource management, evolutionary computation and mobile applications. 

Dr. Hassan is the current Chair of the IEEE Communications Society (ComSoc) Northern Virginia Chapter.

 

Tahir Khan

TahirKhan

Contact:  tkhan9@gmu.edu

Courses:  Penetration Testing Forensics, Mobile Application Analysis and Forensics, Anti Forensics

CFRS 767 - Penetration Test Comp Forensics (Fall)

CFRS 769 - Anti-Forensics (Fall)

CFRS 773 - Mobile Application/Forensic Analysis (Spring)

Credentials: MS Computer Forensics - George Mason University

Mr. Khan has over twenty years of experience in the Information Security field. Mr. Khan is currently the Chief Information Security Officer of Sensity Systems and an advisor of a startup focusing on identity management and authentication. Previously he was the Chief Information Security Officer for a private financial services company managing incident response, fraud detection and information security teams as well as researching in the information security arena.  Mr. Khan spent more than a decade at Northrop Grumman where he served various federal agencies in information security and network operations. Mr. Khan's current hobbies are mobile application analysis, mobile application reverse engineering and researching wireless vulnerabilities.


Jim Jones

Jim Jones Assoc Professor PhD CFRS

Contact: jjonesu@gmu.edu

Credentials:

Jim Jones is an Associate Professor in the Computer Forensics program within the ECE Department. Dr. Jones earned his

Bachelor's degree from Georgia Tech (Industrial and Systems Engineering, 1989), Master's degree from Clemson University (Mathematical Sciences, 1995), and PhD

from George Mason University (Computational Sciences and Informatics, 2008). He has been a cyber security practitioner, researcher, and educator for over 18 years. During that time, he has led and performed network and system vulnerability and penetration tests, conducted malware analysis, led a cyber incident response team, conducted digital forensics investigations, and taught university courses in information security, penetration testing, digital forensics, and programming. Past and current funded research sponsors include DARPA, DHS, NSF, and DoD. His academic and research interests are focused on digital forensics, data and intelligence analysis, malware behavior and detection, and cyber warfare.

 

Ryan Chapin

Contact:  rchapin@gmu.edu
Credentials:

With over a decade of Mac computer forensics industry experience, Ryan L. Chapin, an executive with an internationally recognized computer forensic organization has

extensive government and public-sector data collection, processing, analyzing, and reporting experience. He is a highly skilled training curricula development and administration professional, and possesses a unique gift of making very complex concepts easy to learn. Prior to joining his current employer as a senior digital forensic analyst in 2006, Mr. Chapin participated in research, supported investigations, conducted analysis of casework, and supervised 60 DoD contract personnel responsible for computer forensic analysis. 

 

 

T. Roy

Contact: troy@codemachne.com

Credentials:

T.Roy is the founder and president of CodeMachine. He spends most of his time on security research, reverse engineering, software development, and training.  He holds a Master’s Degree in Computer Engineering and has taken many products from their infancy all the way through to commercial success. He has spent more than a decade working on security products like host intrusion prevention, network firewalls, behavioral anti-malware, document security, and data leak prevention systems. He has also worked on the offensive side of security for the government and defense industry.

He has been delivering training courses to companies all over the world, has taught Microsoft’s own engineers and has received many instructor recognition awards. He has an innate talent for taking complex concepts and explaining them in a lucid manner. Through the courses he teaches, he shares the knowledge he has acquired through years of hands-on experience.



Chad Steel

Contact: csteel@gmu.eduCourses:  CFRS 771 - Digital Forensics Profilling (Fall)

Credentials:

Mr. Steel has worked in both the government and private sector in technical and management roles.  He has previously served in multiple digital security positions, including serving as the Sr. Director for Systems Integration and Security Services at Qwest Communications, and the Head of IT Investigations for GlaxoSmithKline.  He previously taught as an Adjunct Professor at Penn State University, where he helped put together their graduate program in information security.

Mr. Steel is the author of multiple peer-reviewed journal

papers on data mining and digital behavioral analysis.  Recent papers include The Asperger's Defense in Digital Child Pornography Investigations (2015), The Technical SODDI Defenses: The Trojan Horse Defense Revisited (2015) and Idiographic Digital Profiling:  Behavioral Analysis Based on Computer Forensics (2015).  He is also the author of two books on digital forensics and child exploitation investigations.  

 

 

Simson Garfinkel

 

Contact: sgarfin2@gmu.edu

Courses: Cloud Forensics

Credentials: 

Credentials:

S.B., Chemistry, Massachusetts Institute of Technology.

S.B., Political Science, Massachusetts Institute of Technology.

S.B., Science, Technology & Society, Massachusetts Institute of Technology.

M.S., Journalism, Columbia University School of Journalism

Ph.D., Computer Science, Massachusetts Institute of Technology.

CISSP® #4757

CIPP/US #000203701I

Simson L. Garfinkel has been researching and writing about computer security since the late 1980s. His book Practical UNIX and Internet Security (co-authored with Gene Spafford and Alan Schwartz), has sold more than 250,000 copies and been translated into more than a dozen languages since the first edition was published in 1991.  He holds seven US patents and has published dozens of research articles in computer security and digital forensics. He is an ACM Fellow, an IEEE Senior Member, as a member of the National Association of Science Writers. Garfinkel is the author or co-author of fourteen books on computing. His book Database Nation: The Death of Privacy in the 21st Century (O'Reilly, 2000) discussed the impact of technology on privacy in the 20th and 21st centuries. As an entrepreneur, Garfinkel founded five companies between 1989 and 2000, including Vineyard.NET, which provided Internet service on Martha's Vineyard to more than a thousand customers from 1995 through 2005, and Sandstorm Enterprises, an early developer of digital forensic tools.