hero image
Dr. Tino Posillico - Farmingdale State College. Farmingdale, NY, US

Dr. Tino Posillico Dr. Tino Posillico

Associate Professor, Criminal Justice/Security Systems & Law Enforcement Technology | Farmingdale State College

Farmingdale, NY, UNITED STATES

Dr. Posillico is a member of Protect New York, a criminal justice and police operations research organization.


Dr. Posillico holds a PhD in Experimental and Computational Modeling. His area of specialty was in Aerospace Engineering and Design. In the past, he worked for General Applied Science Laboratory, NASA and Brookhaven National Laboratory. He also taught at Hofstra University and SUNY Old Westbury.

He was the first Academic Director for the CISCO Academy and the Institute for Networking Systems Technology and Education Programs at Farmingdale. He is also a member of Protect New York, a criminal justice and police operations research organization.

In addition, he is also the faculty adviser for Kappa Chi, the Farmingdale Chapter of Alpha Phi Sigma, the National Criminal Justice Honor Society. He is on the review board of the Journal of Applied Security Research: An International Journal of Police - Security Operations & Practices. He is also the Co-Chair of the Homeland Security Region Industry Council of the Long Island Science, Technology and Engineering Mathematics Hub.

Currently, he is a Dual Associate Professor in the departments of Criminal Justice and Law Enforcement Technology and Security Systems.





loading image



Areas of Expertise (8)

Computer Forensics

Network Operations and Countermeasures

Intelligence Analysis

Computer and Network Security

Legal aspects of data collection


Government Surveillance

Internet Regulations

Industry Expertise (3)


Law Enforcement

Computer/Network Security

Education (3)

Polytechnic Institute of New York: PhD, Mechanical Engineering 1986

Polytechnic Institute of New York: MS, Mechanical Engineering 1981

Polytechnic Institute of New York: BS, Mechanical Engineering 1978

Languages (1)

  • English

Testimonials (1)

Jaci Clement, Director | Fair Media Council

Rave reviews about your panel discussion, the setting, and the quality of character of each of the speakers made The News Conference: Real & Powerful a remarkable day. Of course, that couldn't have happened without you: You set the stage for what we were looking for in speakers, and indeed, we hosted the best in journalism, business, community, academia and government for discussions that matter. The event drew an audience of influencers, who have the ability to continue the conversation in their daily work.

Event Appearances (3)

“Current Research in Computer Systems-based Security”

Homeland Security Research Conference  Levin Institute


"Fourth Generation Warfare Tactics: Are Police Operationally Ready ? "

International Police Executive Symposium  Washington, D.C.


The News Conference: Real & Powerful

Fair Media Council conference  Garden City Hotel




  • Keynote
  • Moderator
  • Panelist
  • Workshop Leader
  • Host/MC
  • Author Appearance
  • Corporate Training

Media Appearances (1)

News 12: Senate votes to kill privacy rules guarding your online info

News 12  tv


News 12: Senate votes to kill privacy rules guarding your online info

view more

Research Grants (1)

"Enhanced Learning in Criminal Justice Applications of Computer Forensics via CISSP Embedded Domains"

Title III Grant 


"Enhanced Learning in Criminal Justice Applications of Computer Forensics via CISSP Embedded Domains"

Published Articles (1)

Fourth Generation Warfare Tactics : Are Metropolitan Police Operationally Ready ?

George Washington University


"Fourth Generation Warfare Tactics : Are Metropolitan Police Operationally Ready ?", at the 2016 International Police Executive Symposium, George Washington University, Washington D.C.

Courses (5)

Computer Forensics I

This course is an orientation to the study of computer forensic methods. The course will include an analysis of computer hardware that is utilized in forensic investigations such as motherboards, BIOS settings, hard and floppy disk drives and controllers, SCSI controllers and drives and implementations, RAID controllers, boot sequences and related components. Also, this course will introduce the student to methods used in analyzing data storage devices and will include an examination of the physical structures, surfaces and formats of hard disks and other media.

Computer Forensics II

Computer Forensics II is a continuation of CRJ 115. This course covers topics such as disk geometry and organization. Master boot sector record and volume record creation and organization, file signatures for data type identification, cyclic redundancy checksum for data integrity validation, and RSA's MD5 hash values for file authentication. Other subjects introduced include the UNIX "grep" search utility, search string techniques and file signature matching, and recovery of files that are intentionally deleted, hidden, or renamed. The course examines advanced computer-based evidentiary and "discovery" data methodologies, and includes a study of evidence identification, documentation, and chain of custody procedures.

Computer Forensics III

This course examines federal, state, and local computer fraud statutes to provide the student with a legal foundation to approach computer investigations. The course includes lecture elements that provide the student with the skills necessary to conduct successful computer-related investigations, and includes an examination of the processes involved in preparing an affidavit for a search warrant.

Database Operations

The course introduces students to the meaning and structure of criminal justice data, the design of and security for criminal, legal and classified databases, the management of competing information security and confidentiality concerns, and the rights to access criminal justice records on the part of the public, corporate interests and the media. The course examines criminal justice data collection throughout the legal lifecycle (complaint, arrest, prosecution, court, corrections, probation and parole); understanding all through the prism of authenticity, value, timeliness, accountability, integration and prevention.

Crime Analysis and Mapping

Students will learn how to analysis and apply sampled data distributions to crime patterns. Digital tools will allow students to identify trends and patterns in order to determine police service allocations based on collected data The science and foundation principles of geographical information systems design and operation will be reviewed. Homeland Security implications as well as publicly available geospatial information will also be covered as specific applications for mapping techniques.