Website of Chuck Easttom, Ph.D., D.Sc.


Forensic Consulting

Dr. Easttom conducts forensic analysis and investigations.  Dr. Easttom has a Texas Private Investigator license with the ALLEGIANT INVESTIGATIONS & SECURITY License Number: A18596
His forensic qualifications and experience are extensive:
  1. Doctor of Science in Cyber Security, Ph.D. in Computer Science, Ph.D. in Technology, as well as three master's degrees including a Masters in Applied Computer Science and a Masters in System's Engineering
  2. He developed a graduate digital forensics course for the University of Dallas. He also taught this course for the University as an adjunct professor from 2019 to 2022
  3. He developed a graduate digital forensics course for Vanderbilt University and currently teaches tha
  4. He has over 70 computer industry certifications including following forensic certifications:
    1. Certified Cyber Forensic Professional (CCFP)
    2. Certified Hacking Forensic Investigator (CHFI)
    3. Access Data Certified Examiner 2014-2017 (ACE)
    4. OSForensics Certified Examiner (OSFCE)
    5. Oxygen Forensics Certified Examiner
    6. Certified Criminal Investigator (CCI)
    7. Certified Forensic Consultant (CFC)
    8. Certified Information Systems Security Professional (CISSP)
  5. He is the author of 37 computer science books including several forensics textbooks and 8 security textbooks that have chapters on forensics.
  6. He has authored several research papers on forensics including:
    1. Easttom, C., & Adda, M. (2021, January). Application of the spectra of graphs in network forensics. In 2021 IEEE 11th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0846-0852). IEEE.
    2. Easttom, C., & Sanders, W. (2019, October). On the efficacy of using android debugging bridge for android device forensics. In 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON) (pp. 0730-0735). IEEE.
    3. Easttom, C. (2021, February). A methodology for smart TV Forensics. In ICCWS 2021 16th International Conference on Cyber Warfare and Security (p. 65). Academic Conferences Limited.
    4. Easttom, C. (2021). A systematic framework for network forensics based on graph theory (Doctoral dissertation, University of Portsmouth).
    5.  Easttom, C. (2018). A Method For Using Historical GPS Phone Records. Digital Forensics Magazine, 36.
    6. Easttom, C. (2018). "A Systems Approach To Indicators Of Compromise Utilizing Graph Theory". 2018 IEEE International Symposium on Technologies for Homeland Security.
    7. Easttom, C. (2018). The Daubert Standard as a Framework for Digital Forensics. Digital Forensics Magazine, 35.
    8. Easttom, C. (2016). Multi-Dimensional Analysis for Cyber Investigations. Forensic Examiner Journal,25 (4).
    9. Easttom, C. (2017). Utilizing Graph Theory to Model Forensic Examination. International Journal of Innovative Research in Information Security (IJIRIS), 4(2).
    10. Easttom, C. (2014). Windows Registry Forensics. Research Gate. DOI RG.2.2.29603.86561
    11. Easttom, C. (2015). Recovering Deleted Files from NTFS Open Source publication academia.edu
  7. Associate member of the American Academy of Forensic Sciences 2015 to 2018.
  8. He frequently teaches forensics including to state, local, and federal law enforcement. His computer security and forensics courses are approved by the U.S. Department of Homeland Security National Initiative For Cyber Security Careers and Studies (NICCS).
  9. He created the OSFCE (OSForensics Certified Examiner) course and test.
  10. He is a frequent speaker at forensic conferences including: AAFS conference 2017, IAFLS Conference 2017 in Cairo, Secure Jordan 2016 and 2017, ADFSL Conference 2016, and ISC2 Security Congress 2014, 2015, and 2017.
  11. He has extensive experience testifying in court as an expert witness
Dr. Easttom is an expert in computer forensics as well as portable device forensics (Cell Phone, Tablet, etc.). He has extensive expertise in forensic science, cell phone forensics, operating system forensics, network forensics, file recovery, and related topics.