John Philip Craiger
- Title
- Associate Professor of Cybersecurity
- Department
- Security Studies and International Affairs Dept
- College
- Daytona College of Arts & Sciences
Office Hours

External Links
The views expressed on faculty and external web pages are those of the author and do not necessarily represent those of Embry-Riddle Aeronautical University.
Biography
Dr. J. Philip Craiger is an Associate Professor of Cybersecurity in the Department of Security Studies and International Affairs. Philip previously served as Professor in the School of Engineering Technology at Daytona State College, where was the Principal Investigator of the $1.8 million NSF-funded Advanced Cyberforensics Education Consortium. From 2004-2010 he served a dual appointment at the University of Central Florida as the Assistant Director for Digital Evidence at the National Center for Forensic Science, and as an Assistant Professor in the Department of Engineering Technology. At UCF Philip was instrumental in developing the first online Master of Science in Digital Forensics in the U.S. Philip started his career as an Associate Professor in the Department of Computer Science at the University of Nebraska at Omaha. He is a member of the American Academy of Forensic Sciences, and holds numerous professional certifications, including Certified Information Systems Security Practitioner (CISSP), SANS GIAC Computer Forensics Analyst, and an EC-Council Certified Ethical Hacker. His research and teaching interests include sUAS cybersecurity, and National Airspace System cybersecurity.
Dr. Craiger is a certified NAUI SCUBA Instructor Trainer and NAUI technical SCUBA instructor. He has hundreds of technical dives including cave diving in over 50 caves throughout the U.S. and Mexico, and several cave dives to 300 or more feet.
Email: philip.craiger@erau.edu
Education
- Ph.D. - Doctor of Philosophy in Psychology, University of South Florida
- M.A. - Master of Arts in Psychology, University of South Florida
Currently Teaching
- CYB 335: Infor Security Tools & Tech
- CYB 365: Introduct to Digital Forensics
- CYB 399: Special Topics in Cybersecur
Courses Taught
CYB 365 - Introduction to Digital Forensics
CYB 335 – Information Security Tools & Techniques
HS 491 - Thesis in Homeland Security
CYB 155 – Found of Information Security
CYB465 - Cybercrime & Cyberlaw
Research Projects
Publications
- Aviation Cybersecurity: An Overview National Training Aircraft Symposium (NTAS) (2018)
- Session 3 (continued): Personal Air Vehicles & UAS \u2013 Training and Implications for Pilots National Training Aircraft Symposium (NTAS) (2018)
- A Framework Aviation Cybersecurity J. Philip Craiger (2018)
- Drone Cybersecurity J. Philip Craiger (2019)
- A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System J. Philip Craiger (2018)
- A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System Publications (2018)
- A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System J. Philip Craiger (2019)
- Modeling Performance and Establishing Performance Criteria in Training Systems J. Philip Craiger (2019)
- Aviation Cybersecurity: An Overview J. Philip Craiger (2019)
- Fuzzy-Neural Models in Industrial Psychology Research J. Philip Craiger (1995)
- Drone Cybersecutiry Gary C. Kessler (2019)
- A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System Gary C. Kessler (2019)
- A Framework for Aviation Cybersecurity Gary C. Kessler (2018)
- Mac OS X Forensics Publications (1)
- Forensic Analysis of Xbox Consoles Publications (1)
- Forensic Analysis of the Sony Playstation Portable Publications (1)
- Forensic Analysis of a Playstation 3 Console Publications (1)
- Analyzing the Impact of a Virtual Machine on a Host Machine Publications (1)
- Forensic Analysis of Plug Computers Publications (1)
- Educating the Next Generation of Cyberforensic Professionals Publications (1)
- Factors Affecting One-Way Hashing of CD-R Media Publications (1)
- Recovering Digital Evidence From Linux Systems Publications (1)
- Assessing Trace Evidence Left By Secure Deletion Programs Publications (1)
- sUAS Cybersecurity: Threats, Vulnerabilities, and Exploits (2 of 3) OER Main (1)
- sUAS Cybersecurity: Growth, Uses, Anti-Drone Tactics (1 of 3) OER Main (1)
- sUAS Cybersecurity: A Case Study (3 of 3) OER Main (1)
- Metadata and EXIF Data OER Main (1)
- FAT File System, File Signatures, Recovering Deleted Files, and EXIF Metadata OER Main (1)
- Extracting and Analyzing EXIF Data OER Main (1)
- Digital Forensics with FTK OER Main (1)
- Forensic Wiping and Imaging OER Main (1)
- Creating a Forensic Image OER Main (1)
- RAM and Volatile Data OER Main (1)
- Identifying Hidden Information in Files OER Main (1)
- Password Auditing with John the Ripper OER Main (1)
- Getting Started with John the Ripper Assignment OER Main (1)
- Wireshark Demo 2020 OER Main (1)
- Simple Network Investigation: ping, nmap, Wireshark, netstat OER Main (1)
- Introduction to Linux 2019 (1 of 4) OER Main (1)
- Introduction to Linux 2018 (1 of 4) OER Main (1)
- Introduction to Linux 2018 (2 of 4) OER Main (1)
- Introduction to Linux 2018 (3 of 4) OER Main (1)
- Introduction to Linux 2018 (4 of 4) OER Main (1)
- Intelligence Gathering: Identifying Information Involving a Phishing Attempt OER Main (1)
- VPNs: Virtual Private Networks OER Main (1)
- Connecting to the VM Server OER Main (1)
- Vulnerability Scanning with Nessus OER Main (1)
- OpenVAS for Vulnerability Scanning OER Main (1)
- Creating Cryptographic One-Way Hashes in Windows OER Main (1)
- Packet Sniffing OER Main (1)
- Running Traceroute OER Main (1)
- Wireshark in Kali Linux OER Main (1)
- Understanding Base64 Encoding OER Main (1)
- Mounting a Personal Volume OER Main (1)
- IPTables Firewalls in Linux OER Main (1)
- Installing and Configuring Snort OER Main (1)
- Open source intelligence: Footprinting OER Main (1)
- Network Scanning and Fingerprinting OER Main (1)
- Connecting to SSIA Virtual Machines OER Main (1)
- Introduction to Metasploit OER Main (1)
- Metasploit Exercise Walkthrough OER Main (1)
- MacOS High Sierra No Root Password OER Main (1)
- Password Cracking with John the Ripper OER Main (1)
- Assignment 3.3 Vulnerabilities OER Main (1)
- Citation Machine for APA Formatting OER Main (1)
- Calculating and Verifying Cryptographic One-Way Hashes OER Main (1)
- Acquiring Volatile Data with FTK Imager OER Main (1)
- Introduction to Autopsy Forensic Platform OER Main (1)
- The Autopsy Graphical User Interface OER Main (1)
- Advanced Autopsy Features OER Main (1)
- Introduction to Malware Analysis OER Main (1)
- Current Trends in Small Unmanned Aircraft Systems: Implications for U.S. Special Operations Forces Publications (1)
User Publications
P. Craiger and D.M. Zorri. (September, 2019). Current Trends in sUAS; Implications for U.S. Special Operations Forces. Occasional Paper. MacDill AFB, FL: Joint Special Operations University Press.
P. Craiger, L. Lindamood-Craiger, and D.M. Zorri (2020). Cyber Supply Chain Risk Management: Implications for the SOF Future Operating Environment. Submitted to MacDill AFB, FL: Joint Special Operations University Press. Under review.
G. Kessler, P. Craiger, and J. Haass. (2018). A taxonomy framework for maritime cybersecurity: A demonstration using the Automatic Identification System. The International Journal on Marine Navigation and Safety of Sea Transportation. 12, 3, September, 2018.
P. Craiger, G. Kessler and W. Rose. sUAS Cybersecurity Threats, Vulnerabilities, and Exploits: A Case Study. Submitted to the Journal of Aviation/Aerospace Education & Research. (submitted, under review)
J. Haass, P. Craiger, and G. Kessler. A Framework and Taxonomy for Aviation Cybersecurity. To appear in the Proceedings of the 2018 IEEE National Aerospace & Electronics Conference. Dayton, Ohio, July, 2018. (forthcoming)
P. Craiger and G. Kessler. Cybersecurity. To appear in Joseph R. Rudolph, Jr. and William J. Lahneman, Eds. Combating Terrorism in the 21st Century: American Laws, Strategies, and Agencies (2 volumes). Santa Barbara, California: ABC-CLIO. (forthcoming)
P. Craiger and G. Kessler. Cyberterrorism, Cyberwarfare, Cybercrime, Cyberespionage, and Hacktivism. To appear in Joseph R. Rudolph, Jr. and William J. Lahneman, Eds. Combating Terrorism in the 21st Century: American Laws, Strategies, and Agencies (2 volumes). Santa Barbara, California: ABC-CLIO.(forthcoming)
P. Craiger, G. Kessler, and T. Wilson. Embry-Riddle Aeronautical University Aviation and Aerospace Cybersecurity Institute. Embry-Riddle Aeronautical University White paper. May, 2018. (white paper)
M. Pollitt and P. Craiger. Educating the Next Generation of Cyberforensics Professionals. In G. Peterson and S. Shenoi (Eds.), Advances in Digital Forensics XI, Springer, pp. 328-335 2014. https://commons.erau.edu/publication/1002/
S. Conrad, G. Dorn, and P. Craiger. Forensics analysis of plug computers. In G. Peterson and S. Shenoi (Eds.), Advances in Digital Forensics VII, Springer, New York. 65-76, 2011. https://commons.erau.edu/publication/1003/
S. Conrad, G. Dorn, and P. Craiger. Forensic analysis of PlayStation 3 Game Console. In G. Peterson and S. Shenoi (Eds.), Advances in Digital Forensics VI, Springer, New York. 69-82. Wiley & Sons, pp. 921-930, 2010. https://commons.erau.edu/publication/999/
G. Dorn, C. Marberry, S. Conrad, and P. Craiger. Forensic analysis of virtual machines impact on host machine. In G. Peterson and S. Shenoi (Eds.), Advances in Digital Forensics V, Springer, New York. pp. 69-82. 2009. https://commons.erau.edu/publication/1000/
S. Conrad, C. Rodriguez, C. Marberry, and P. Craiger. Forensic analysis of the Sony PlayStation Portable. In G. Peterson and S. Shenoi (Eds.), Advances in Digital Forensics V, Springer, New York. pp. 119-132. 2009. https://commons.erau.edu/publication/1001/
P. Burke and P. Craiger. Forensic Analysis of Xbox Consoles. In P. Craiger and S. Shenoi (Eds.), Advances in Digital Forensics III, Springer, New York. pp. 269-280. 2008. https://commons.erau.edu/publication/1004/
C. Marberry and P. Craiger, Burn Options Affect Cryptographic One-way Hashing of CD-R Media. In P. Craiger and S. Shenoi (Eds.), Advances in Digital Forensics III, Springer, New York. pp. 149-161. 2008. https://commons.erau.edu/publication/1005/
P. Craiger, Training and Education in Digital Forensics. In J. Barbara (Ed.), Handbook of Digital and Multimedia Evidence. Humana Press, pp. 11-20. 2008.
P. Craiger and P. Burke, Mac OS X Forensics. In M. Olivier and S. Shenoi (Eds.), Advances in Digital Forensics II, Springer, New York, 159-170, 2006. https://commons.erau.edu/publication/1006/
P. Burke and P. Craiger, Trace evidence of secure delete programs. In M. Olivier and S. Shenoi (Eds.), Advances in Digital Forensics II. Springer, New York, 185-198, 2006. https://commons.erau.edu/publication/998/
P. Craiger, Computer forensics methods and procedures. In H. Bigdoli, (Ed), Handbook of Information Security, New York, John Wiley and Sons, 2, pp. 736-755, 2006.
P. Craiger, M. Pollitt and J. Swauger, Digital Evidence and law enforcement. In H. Bigdoli, (Ed.), Handbook of Information Security, New York, John Wiley and Sons, 2, pp. 739-777, 2006.
P. Craiger, Recovering digital evidence from Linux systems, In S. Shenoi and M. Pollitt (Eds.), Advances in Digital Forensics, New York, Springer, pp. 233-243, 2006. https://commons.erau.edu/publication/1007/
M. Pollitt, K. Nance, B. Hays, R. Dodge, P. Craiger, P. Burke, C. Marberry, and B. Brubaker. Virtualization and digital forensics: A research and education agenda. Journal of Digital Forensics Practice, 4, pp. 74-82, 2008.
P. Burke and P. Craiger. Xbox forensics. Journal of Digital Forensics Practice, New York, Taylor & Francis, 4, pp. 275-282, 2007.
C. Marberry and P. Craiger. CD-R acquisition hashes affected by write options. Journal of Digital Forensics Practice, New York, Taylor & Francis, 4, pp. 1-10. 2007.
P. Craiger, P. Burke, and C. Marberry. Forensics Analysis of Phishing Cases Using Open Source and Free Tools. Anti-phishing and Online Fraud. Journal of Digital Forensics Practice, New York, Taylor & Francis, 223-230, 2007.
Professional Experience
2017-present
- Associate Professor of Cybersecurity, Department of Security Studies and International Affairs, Embry-Riddle Aeronautical University, Daytona Beach, FL, 32114.
2015-2017
- Professor, School of Engineering and Information Technology, Daytona State College, Advanced Technology Campus, Daytona Beach, FL. 32117.
- Principal Investigator, Advanced Cyberforensics Education Consortium, NSF ATE DUE1204800. (2013-2017) www.cyberace.org.
2010-2014
- Associate Professor, School of Engineering and Information Technology, Daytona State College, Advanced Technology Campus, Daytona Beach, FL. 32117.
2004-2010
- Assistant Professor, Department of Engineering Technology, University of Central Florida Orlando, FL 32816.
- Assistant Director for Digital Evidence, National Center for Forensic Science, University of Central Florida, Orlando, FL 32826.
2000-2004
- Associate Professor, Department of Computer Science, College of Information Science and Technology, The Peter Kiewit Institute, University of Nebraska at Omaha, Omaha, NE 68182.
- Courtesy appointment, Department of Psychology, University of Nebraska at Omaha, Omaha.
1996-1999
- Assistant Professor, Department of Computer Science, College of Information Science and Technology, The Peter Kiewit Institute, University of Nebraska at Omaha, Omaha, NE 68182.
- Courtesy appointment, Department of Psychology, University of Nebraska at Omaha, Omaha.
- Assistant Professor, Center for Management of Information Technology, and Department of Psychology (dual appointment), University of Nebraska at Omaha, Omaha, NE 68182.
Memberships and Credentials
Certified Cyber Forensics Practitioner (CCFP-US, (ISC)2)
Certified Information System Security Professional (CISSP (ISC)2)
American Society of Crime Labs/Laboratory Accreditation Board (ASCLD/LAB) Certified Inspector
EC-Council Certified Ethical Hacker (CEH)
American Academy of Forensic Sciences (Member)
International Federation of Information Professionals 9.11 Digital Forensics Group
National Association of Underwater Instructors (Technical Diving Instructor)
SANS GIAC Certified Computer Forensic Analyst (GCFA: Expired)
SANS GIAC Certified Security Essentials (GSEC: Expired