- No products in the cart.
President and Chief Executive Officer
HAVE A HIGHLY EXPERIENCED FORENSIC SCIENTIST WORKING FOR YOU
Forensic scientist and CyanLine founder Steven Branigan boasts a unique perspective of Internet security, law enforcement, and business. With a Master’s in Computer Science and an MBA, Branigan is equipped to balance the tightrope of mitigating risks without impeding business. Further, still active as a forensic scientist in the field, he builds forensically-sound tools that get the job done quickly and thoroughly.
Branigan’s knowledge of the law and computer crimes has made him a highly sought speaker and instructor, as well as a private investigator of the highest caliber. As a forensic scientist, he has worked on cases with both domestic and international enforcement agencies, taught for the Department of Justice, and earned citations and awards from agencies ranging from the US Secret Service to the New Jersey State Police. He has testified before Congress, been a US delegate to the G8 Cyber Crimes Security Summit, and provided training at NATO. He is a licensed private investigator and the author of High Tech Crimes Revealed.
- Master of Business Administration – Columbia University, New York City, NY
- M.S. Computer Science – Rutgers University, New Brunswick, NJ
- B.A. Computer Science – Rutgers College, New Brunswick, NJ
- A Method and Apparatus for Identifying Hosts Breeching the Firewall Perimeter, (S. Branigan, H. Burch, B. Cheswick), 7,299,489.
- A Method and Apparatus for Securing Wireless Data Networks, (S. Branigan, B. Cheswick), patent pending.
- A Method and Apparatus for Electronic Data Reproduction (S. Branigan), patent pending.
- “Trends in Disk Drives and Data Transfer Speeds”, S. Branigan, Information Security Bulletin, May, 2007
- “Top 10 Most Common Wireless Mistakes”, S.Branigan, Computer Technology Review, October, 2007
- “High-Tech Crimes Revealed”, S. Branigan, Addison Wesley, Copyright (c) 2005.
- “Securing the Critical IP Infrastructure”, S. Branigan, Information Security Technical Report, Volume 7, Issue 2, 1 June 2002
- “What Can You Do with Traceroute”, S. Branigan, H. Burch, B. Cheswick and F. Wojcik, Internet Computing online, 2001
- “Mapping and Visualizing the Internet”, S. Branigan, H. Burch, B. Cheswick. Usenix Security Symposium, 2000.
- “Online banking Malware”, Presented at the NY/NJ Electronic Crimes Task Force meeting, June 23, 2010.
- “Tracking a stolen iPhone via WiFi”, Presented at the HTCIA regional meeting, May, 2010
- “The Internet as a Backbone of the New Digital Economy”, Testimony before the Joint Economic Committed (Chaired by Jim Saxton) as part of the Wired World: Cyber Security and the U.S Economy Hearing for the 107th Congress.
- “Understanding Steganography”, Presented at the New Jersey State Police Cyber Terrorism Awareness Day, May 2, 2003.
- “An Update on Quantum Computing”, Presented to NATO\’s Allied Command Europe Counter Intelligence ACI/CI network security, May, 2001.
- “Yugoslavia: An Unclassified Peak at a New Battlefield”, Presented to NATO’s Allied Command Europe Counter Intelligence ACI/CI network security, May, 2001.
Honors, Awards, Societies
- Second Vice President of the High Tech Crime Investigation Association, Northeast Chapter
- Member of the FBI’s Infragard program
- Member of the NJ License Private Investigator Association
- Member of Rutgers Cybersecurity Advisory Board 2018.
- Certificate of Appreciation, United States Secret Service, 2002
- Certificate of Appreciation, New Jersey State Police, 2002
- Awarded for assistance provided to rebuild infrastructure for the NY Field Office immediately after the September 11th, 2001 attacks
- Awarded for training on cyber-terrorism issues
- A founding member, along with ATSAIC Bob Weaver, of the New York Electronic Crimes Task Force.
- 2004 – Present, CEO, CyanLine, LLC – Eatontown, NJ
- Designed, developed, implemented and supported patent-pending techniques for forensic disk acquisition.
- Handled multiple file recovery and file un-deletion cases where data was assumed to be lost on disk.
- Performed forensic acquisition on multiple computer hard drives to support both file recovery and computer usage analysis.
- Prepare and submitted reports to the Federal and State court on findings from computer analysis.
- Developed and taught courses at Brookdale College, (NETW-236) on detecting alterations on file timestamps, and on the process of file deletion in the Windows and Linux operating system.
- Developed improved computer forensic techniques.
- Developed and deployed new techniques for tracking hackers.
- Devised new method for securing wireless networks (patent-pending)
- 2007 – 2009, Professor, Monmouth University – Long Branch, NJ
- Developed and taught a new graduate level Software Security Course, (698-C50)
- Taught graduate level Data Security course (610)
- 2000 – 2004, Vice President of Engineering, Lumeta Corporation – Somerset, NJ
- Secured $13 Million in VC funding for the company over 3 years.
- Managed a budget of $5Million.
- Led the team of engineers that build and deliver Lumeta’s IPsonar product.
- Direct research on TCP/IP networks as it relates to Internet and intranet traffic.
- Devised new methods for detecting network devices that are attempting to hide computers on a network.
- 1999 – 2000, Senior Manager, Bell Labs – Murray Hill, NJ
- Assisted corporate business units and the CIO in implementing Virtual Private Network technology, to securely improve remote access and reduce cost for the business.
- Researched Internet networking security issues with Bill Cheswick. Devised and patented a method for detecting hosts that are breeching the corporate network security perimeter.
- Researched wireless data communication issues. Devised and patented a method for securing wireless data networks that enables user level authorization while preserving the ability of clients to roam among many different base stations.
- 1996 – 1999, Senior Manager, Lucent Technologies – Holmdel, NJ
- Brought Intrusion Detection technology into the corporation to improve detection of hacker activity on the corporate network.
- Improved the technology and techniques that the computer investigation teams used, reducing the potential liability incurred by lack of procedures.
- Led team for Integrated E-Commerce Security for the corporation that reported to the General Auditor.
- Led the security efforts to implement Virtual Private Network technology for remote access into the corporation, and ran the first corporate VPN trial for the company.
- Worked with business units to develop methods to securely distribute sensitive sales data to a world wide sales force.
- 1990 – 1996, Senior Systems Engineer, Bellcore – Redbank, NJ
- Led intrusion investigations on behalf of the RBOCs. Pioneered techniques in high-tech investigations.
- Led teams on providing network security consulting services to the RBOCs and financial clients.
- Led a team of engineers on the redesign and implementation of the security subsystem for the Service Control Point (a switch in the SS7 network).
- Led a team of engineers on the redesign of the toll-free and calling cards database used in processing telephone calls in the US and Canada to allow the RBOCs to comply with FCC mandates.
- 1988 – 1990, System Manager, Metpath, INC – Teterboro, NJ
- 1987 – 1988, Programmer/Analyst, K. Hovnanian – Redbank, NJ
- 1986-1987, Patrolman, Seaside Heights Police Dept. – Seaside Heights, NJ