have an experienced forensic scientist working for you

Forensic scientist and CyanLine founder Steven Branigan boasts a unique perspective of Internet security, law enforcement, and business. With a Master's in Computer Science and an MBA, Branigan is equipped to balance the tightrope of mitigating risks without impeding business. Further, still active as a forensic scientist in the field, he builds forensically-sound tools that get the job done quickly and thoroughly.

Branigan's knowledge of the law and computer crimes has made him a highly sought speaker and instructor, as well as a private investigator of the highest caliber. As a forensic scientist, he has worked on cases with both domestic and international enforcement agencies, taught for the Department of Justice, and earned citations and awards from agencies ranging from the US Secret Service to the New Jersey State Police. He has testified before Congress, been a US delegate to the G8 Cyber Crimes Security Summit, and provided training at NATO. He is a licensed private investigator and the author of High Tech Crimes Revealed.

Steven Branigan Curriculum Vitae

Education
  • Master of Business Administration - Columbia University, New York City, NY
  • M.S. Computer Science - Rutgers University, New Brunswick, NJ
  • B.A. Computer Science - Rutgers College, New Brunswick, NJ
Patents
  • A Method and Apparatus for Identifying Hosts Breeching the Firewall Perimeter, (S. Branigan, H. Burch, B. Cheswick), 7,299,489.
  • A Method and Apparatus for Securing Wireless Data Networks, (S. Branigan, B. Cheswick), patent pending.
  • A Method and Apparatus for Electronic Data Reproduction (S. Branigan), patent pending
Publications
  • "Trends in Disk Drives and Data Transfer Speeds", S. Branigan, Information Security Bulletin, May, 2007
  • "Top 10 Most Common Wireless Mistakes", S.Branigan, Computer Technology Review, October, 2007
  • "High-Tech Crimes Revealed", S. Branigan, Addison Wesley, Copyright (c) 2005.
  • "Securing the Critical IP Infrastructure", S. Branigan, Information Security Technical Report, Volume 7, Issue 2, 1 June 2002
  • "What Can You Do with Traceroute", S. Branigan, H. Burch, B. Cheswick and F. Wojcik, Internet Computing online, 2001
  • "Mapping and Visualizing the Internet", S. Branigan, H. Burch, B. Cheswick. Usenix Security Symposium, 2000
Presentations
  • "Online banking Malware", Presented at the NY/NJ Electronic Crimes Task Force meeting, June 23, 2010.
  • "Tracking a stolen iPhone via WiFi", Presented at the HTCIA regional meeting, May, 2010
  • "The Internet as a Backbone of the New Digital Economy", Testimony before the Joint Economic Committed (Chaired by Jim Saxton) as part of the Wired World: Cyber Security and the U.S Economy Hearing for the 107th Congress.
  • "Understanding Steganography", Presented at the New Jersey State Police Cyber Terrorism Awareness Day, May 2, 2003.
  • "An Update on Quantum Computing", Presented to NATO\'s Allied Command Europe Counter Intelligence ACI/CI network security, May, 2001.
  • "Yugoslavia: An Unclassified Peak at a New Battlefield", Presented to NATO's Allied Command Europe Counter Intelligence ACI/CI network security, May, 2001
Honors, Awards, Societies
  • Second Vice President of the High Tech Crime Investigation Association, Northeast Chapter
  • Member of the FBI's Infragard program
  • Member of the NJ License Private Investigator Association
  • Certificate of Appreciation, United States Secret Service, 2002
  • Certificate of Appreciation, New Jersey State Police, 2002
  • Awarded for assistance provided to rebuild infrastructure for the NY Field Office immediately after the September 11th, 2001 attacks
  • Awarded for training on cyber-terrorism issues
  • A founding member, along with ATSAIC Bob Weaver, of the New York Electronic Crimes Task Force
Experience
  • 2004 - Present, CEO, CyanLine, LLC - Eatontown, NJ
    • Designed, developed, implemented and supported patent-pending techniques for forensic disk acquisition.
    • Handled multiple file recovery and file un-deletion cases where data was assumed to be lost on disk.
    • Performed forensic acquisition on multiple computer hard drives to support both file recovery and computer usage analysis.
    • Prepare and submitted reports to the Federal and State court on findings from computer analysis.
    • Developed and taught courses at Brookdale College, (NETW-236) on detecting alterations on file timestamps, and on the process of file deletion in the Windows and Linux operating system.
    • Developed improved computer forensic techniques.
    • Developed and deployed new techniques for tracking hackers.
    • Devised new method for securing wireless networks (patent-pending)
  • 2007 - 2009, Professor, Monmouth University - Long Branch, NJ
    • Developed and taught a new graduate level Software Security Course, (698-C50)
    • Taught graduate level Data Security course (610)
  • 2000 - 2004, Vice President of Engineering, Lumeta Corporation - Somerset, NJ
    • Secured $13 Million in VC funding for the company over 3 years.
    • Managed a budget of $5Million.
    • Led the team of engineers that build and deliver Lumeta's IPsonar product.
    • Direct research on TCP/IP networks as it relates to Internet and intranet traffic.
    • Devised new methods for detecting network devices that are attempting to hide computers on a network.
  • 1999 - 2000, Senior Manager, Bell Labs - Murray Hill, NJ
    • Assisted corporate business units and the CIO in implementing Virtual Private Network technology, to securely improve remote access and reduce cost for the business.
    • Researched Internet networking security issues with Bill Cheswick. Devised and patented a method for detecting hosts that are breeching the corporate network security perimeter.
    • Researched wireless data communication issues. Devised and patented a method for securing wireless data networks that enables user level authorization while preserving the ability of clients to roam among many different base stations.
  • 1996 - 1999, Senior Manager, Lucent Technologies - Holmdel, NJ
    • Brought Intrusion Detection technology into the corporation to improve detection of hacker activity on the corporate network.
    • Improved the technology and techniques that the computer investigation teams used, reducing the potential liability incurred by lack of procedures.
    • Led team for Integrated E-Commerce Security for the corporation that reported to the General Auditor.
    • Led the security efforts to implement Virtual Private Network technology for remote access into the corporation, and ran the first corporate VPN trial for the company.
    • Worked with business units to develop methods to securely distribute sensitive sales data to a world wide sales force.
  • 1990 - 1996, Senior Systems Engineer, Bellcore - Redbank, NJ
    • Led intrusion investigations on behalf of the RBOCs. Pioneered techniques in high-tech investigations.
    • Led teams on providing network security consulting services to the RBOCs and financial clients.
    • Led a team of engineers on the redesign and implementation of the security subsystem for the Service Control Point (a switch in the SS7 network).
    • Led a team of engineers on the redesign of the toll-free and calling cards database used in processing telephone calls in the US and Canada to allow the RBOCs to comply with FCC mandates.
  • 1988 - 1990, System Manager, Metpath, INC - Teterboro, NJ
  • 1987 - 1988, Programmer/Analyst, K. Hovnanian - Redbank, NJ
  • 1986-1987, Patrolman, Seaside Heights Police Dept. - Seaside Heights, NJ
Speed matters. How to make a forensic image as quickly as possible.(12/31/2012) The typical method used to create a forensic image is to connect the source disk to a write-blocker. The write-blocker is then connected to a computer and a forensic image is made. This process needs to be updated to keep up with the capacity and...
the latest on credit card frauds (03/31/2012) Recently I worked with Acme (the name has been changed to protect their identify), a retail company that had been contacted by their bank. (Let’s call the company Acme.) During an investigation of some credit card frauds, the bank...
Why won’t my call go through? Denial of service in the cell phone network.> (01/30/2012) Recently, some of the major cellular carriers have released “Network Extenders”, also known as femtocell. The network extender is a device that a subscriber purchases to extend the reach of the cell phone network. (In effect, the...
CyanLine featured in Data Security Podcast: Making Strides in Combatting Cybercrime
CyanLine's Steven Branigan is featured in Government Security News: Computer forensics expert reveals 'hidden' source for two vital pieces of computer evidence
CyanLine's Steven Branigan is published in the Journal of Forensic Sciences:Characteristics of Forensic Imaging Performance- An Analysis of Forensic Imaging Bottlenecks.
CyanLine's cutting-edge Fast Disk Acquisition System (FDAS) reveals new evidence of unknown details about a suspect's computer use.
CyanLine launches www.HighSpeedForensics.com!
CyanLine Introduces Forensic Imager On a Thumb Drive (04/23/2014) CyanLine is now offering MiniDAS, a compact forensic imaging software, which collects metadata that can change the outcome of criminal investigations. **Eatontown, NJ** – CyanLine, a leader in computer forensics and network security solutions,...
Digital Forensics Company CyanLine Announces New Cloud-Based Forensics to Accelerate Electronic Discovery (02/07/2014) Forensic security solutions leader CyanLine announces breakthrough cloud-based forensics technology that allows analysis of forensic evidence over a network interface in real-time *Eatontown, NJ* -- CyanLine, a New Jersey-based company dedicated...
Introducing Forensic Imager On a Thumb Drive (03/14/2014) CyanLine is now offering MiniDAS, forensic imaging software that collects metadata that can change the outcomes of investigations. *Eatontown, NJ* -- CyanLine, a leader in computer forensics and network security solutions, has introduced...