Chuck Easttom
Author, Consultant, Computer Expert
Home | Books |Contact
| Bibliography |
Litigation Support
| Teaching |
Consulting
| Forensics | Speaking | Class Notes | Research | Curriculum Vitae
| Forensics | Speaking | Class Notes | Research | Curriculum Vitae
Chuck Easttom conducts forensic analysis and investigations. Dr. Easttom has a Texas Private Investigator license with the ALLEGIANT INVESTIGATIONS & SECURITY License Number: A18596
His forensic qualifications and experience are extensive:
- He has a D.Sc. in Cyber Security, a Ph.D. in Technology, a
Ph.D. in computer science, and three masters degrees
- He has 67 computer industry certifications including
following forensic certifications:
- Certified Cyber Forensic Professional (CCFP)
- Certified Hacking Forensic Investigator (CHFI)
- Access Data Certified Examiner 2014-2017 (ACE)
- OSForensics Certified Examiner (OSFCE)
- Oxygen Forensics Certified Examiner
- Certified Criminal Investigator (CCI)
- Certified Forensic Consultant (CFC)
- Certified Information Systems Security Professional (CISSP)
- CompTIA Security Analytics Expert-CSAE CompTIA Pentest+
-
CompTIA Certified Cybersecurity Analysis (CySA+)
- He has 67 computer industry certifications including
following forensic certifications:
- He is the author of 33 computer science books including 4 forensics books and 8 security textbooks that have chapters on forensics.
- He has authored several research papers on forensics
including:
- Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).
- Easttom, C., Sanders, W. (2019). 'On the Efficacy of Using Android Debugging Bridge for Android Device Forensics. IEEE 10th Annual Computing and Communication Conference UEMCON.
- Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination. International Journal of Innovative Research in Information Security (IJIRIS), 4(2).
- Easttom, C. (2018). How to model digital forensics investigations with graph theory. Digital Forensics Magazine, 37.
- Easttom, C. (2018). "A Systems Approach to Indicators
Of Compromise Utilizing Graph Theory". 2018 IEEE
International Symposium on Technologies for Homeland
Security.
- Easttom, C. (2019). " Conducting Investigations on the
Dark Web". Journal of Information Warfare 18 (1).
- Easttom, C. (2018). A Method for Using Historical GPS
Phone Records. Digital Forensics Magazine, 36.
- Alsmadi, I, Easttom, C. (2019). Using Maximum Weighted
Cliques in the Detection of Sub-Communities’ behaviors in OSNs. Proceedings
of the Future Technologies Conference 2019.
- Easttom, C. (2020). On the Application of Algebraic
Graph Theory to Modeling Network Intrusions. 2020 IEEE
10th Annual Computing and Communication Conference.
- Easttom, C. (2020). Mathematically modeling
cyber-attacks utilizing engineering techniques 15th
International Conference on Cyber Warfare and Security
ICCWS
- Easttom, C. (2021). Mathematically modelling victim selection in cybercrimes. 16th International Conference on Cyber Warfare and Security - ICCWS 2021
- Easttom, C. (2021). A methodology for smart TV
Forensics. 16th International Conference on Cyber Warfare
and Security - ICCWS 2021
-
Easttom, C., Adda, M. (2021). Application of the
Spectra of Graphs in Network Forensics.
IEEE
11th Annual Computing and Communication Conference
- Adjunct professor for University of Dallas teaching graduate digital forensics.
- Adjunct Lecturer for Georgetown University in the Master of Professional Studies in Applied Intelligence department
- Associate member of the American Academy of Forensic Sciences 2015 to 2018.
- He frequently teaches forensics including to state, local, and federal law enforcement. His computer security and forensics courses are approved by the U.S. Department of Homeland Security National Initiative For Cyber Security Careers and Studies (NICCS).
- He created the OSFCE (OSForensics Certified Examiner) course and test.
- He is a frequent speaker at forensic conferences
including: AAFS conference 2017, IAFLS Conference 2017 in
Cairo, Secure Jordan 2016 and 2017, ADFSL Conference 2016, and
ISC2 Security Congress 2014, 2015, and 2017.
- He has extensive experience testifying in court as an
expert witness
Chuck Easttom's Home Page