Areas of Expertise (6)
Defense and Security
Air Force Institute of Technology: Ph.D., Systems Engineering 2014
National Defense Intelligence College: M.S., Strategic Intelligence 2007
Nova Southeastern University: M.S., Management Information Systems 2006
Excelsior College: B.S., Liberal Arts 2001
- Institute of Electrical and Electronics Engineers (IEEE) : Member
- International Council on Systems Engineering (INCOSE) : Member
- Information Systems Security Association (ISSA) : Member
- Tau Beta Pi – The Engineering Honor Society : Member
- Sigma Iota Epsilon – National Honorary and Professional Management Society : Member
Media Appearances (10)
Scan scams? Some QR codes may pose security risk
It’s something we use at restaurants, art galleries and many other places: QR codes. They’re as easy as scanning from our camera or an app and then clicking the link to what we need. But what if scammers and hackers start putting fake QR codes out to the public? That’s what we asked a Georgia professor about. And doctor, you’re saying now that you’re seeing some dangers in the QR codes that people see everywhere? “Yes, QR codes are everywhere,” Dr. Jeff Morris with the Augusta University Cyber Sciences program, said. “They’re easy to use, but none of us natively speaks QR code. It’s not a, not something that we humans can read. So we rely on our phones and our computers to do it for us. There’s been instances where malicious actors have planted out QR codes that send people to malicious sites, printed them out, and then gone into public places and pasted their QR codes over. Posters and other places where QR codes have. Have been posted and then people thinking that they’re going to the right place, bring them up, hit the OK on the phone and then next thing you know, they’re they’ve got a whole bunch of malware downloaded onto their phone.”
A cyber expert’s advice on keeping our data safe
We look at ways to protect your personal information on this edition of The Means Report. Cyber expert Dr. Jeffrey Morris is our guest. He walks us through the many ways we can protect our passwords, our data and other information stored on our devices. Watch our interview and learn how to stay safe when you’re online. Be sure to join us for The Means report Monday afternoons at 12:30 on WJBF NewsChannel 6. We welcome back Dr. Jeffrey Morris from Augusta University School of Computer and Cyber Sciences. Dr. Morris, thanks for talking to us about cyber. It impacts all of us and thanks for coming back so soon. I really appreciate it.
One on One with Richard Rogers│Seeking protection against cyber attacks
Like it or not, our lives are closely connected to our computers and there are so many ways cyber thieves can target us these days. October is Cyber Security Awareness Month and Jeff Morris with the School of Computer and Cyber Sciences at Augusta University stopped by to talk to us about the importance of keeping our information secure.
NCO Earns PhD at AFIT
DVIDS - Defense Visual Information Distribution Service online
For the first time ever since the Air Force Institute of Technology opened it's doors 95 years ago, a Non-Commissioned Officer has earned a PhD. The kicker? It was an Army Soldier! Here is the story of Army MSG Jeffery Morris, a career Army soldier, who has labored up to 70 hours a week in study for several years to earn this title. His efforts will now lead him to continue his military service at the United States Military Academy where he teach and continue his research at the New Army Cyber Institute.
Cyber News Now: SRNL and Augusta University establish first joint appointment to advance cyber research
For the first time, Savannah River National Laboratory and Augusta University have appointed someone to a joint faculty position. Jeffrey Morris will advance research in cyber sciences.
Ransomware attack could delay paychecks at some companies
A ransomware attack on a large human resources company could impact employees' time and payroll right before the holidays.
Bridgestone investigates security incident, Aiken workers impacted
Operations are stalled at Bridgestone for the second night in a row. Investigators are looking into what the company calls a “potential information security incident.” Plants are down across two continents. We’re still waiting to hear back from Bridgestone on several of our questions. We’re wondering if this was a cyberattack or if it has anything to do with the Ukraine invasion. Bridgestone says it’s out of an abundance of caution to try and get as much information as they can throughout this comprehensive investigation. We spoke with one local cyber expert who says it’s easier said than done. “It is extremely difficult. They’ll start into one system, and then they’ll break into another, and then they’ll attack the target,” said Jeffrey Morris, Augusta University assistant professor, school in computer and cyber sciences.
Cyber News Now: Practicing caution with information sharing and targeted ads
If you've been online, you've likely seen targeted ads at some point. But, a local cyber expert says don't click so fast. Often, you'll see targeted ads on Facebook, Instagram or maybe even Twitter. While scrolling, these ads will pop up on your feed. “They track where you go and then you will have a digital profile that’s being built on you and then that is what is used by vendors to generate money.” said Jeffrey Morris, Augusta University School of Computer and Cyber Sciences Assistant Professor. These ads can show products or services you may be interested in based on your data. Before you agree to any privacy policies on various apps, Morris encourages you to ask yourself a question. "What is it you’re willing to give up for people to know about you?” Morris says it’s a question not many consider.
One on One with Laura Warren: Keeping safe from cyber attacks
Like it or not, we depend on technology more and more. Cyber thieves are finding new ways to take advantage of us. October is Cyber Security Awareness Month and Jeff Morris, with the School of Computer and Cyber Sciences at Augusta University, is here to talk about it one on one with Laura Warren.
The Means Report
Dr. Jeffrey Morris is our guest on this edition of The Means Report. He talks about the path to a solid career in Cybersecurity at Augusta University. Watch our interview and learn how you can get the skills you need to succeed. Be sure to join us for The Means Report Monday afternoons at 12:30 on NewsChannel 6. Welcome back to “The Means Report”. We appreciate you staying with us. Great information about Medicaid, and in the closing segments of that interview, great information about the health of our children and how we can all contribute to improving that. Thank you so much Dr. Hartman for your time. And thank you to Dr. Jeffrey Morris. He is with the AU School of Computer and Cyber Sciences where he serves as an assistant professor, a very busy man, and we appreciate Dr. Morris, you coming to “The Means Report” today to talk about all things cyber.
Cyber Talent for Unified Land OperationsSmall Wars Journal
2016 The Army is well on path to build their required portion of the US Cyber Command’s Cyber Mission Force to meet strategic objectives. It’s now time to address the impending need for cyber-enabled tactical operations and Service demands. Our strategy should be focused on the ways and means of creating an organization that allows the Army to lead in this domain while achieving the Combatant Commander’s objectives, enabling Army operations across a full spectrum of combat in support of all levels of command.
Cyber Aptitude Assessment: Finding the Next Generation of Enlisted Cyber SoldiersCyber Defense Review
2015 As noted in the 2013 DoD Cyberspace Workforce Strategy, not all cyberspace personnel will have a STEM background, but instead will come from a broad variety of backgrounds. The problem is trying to find personnel having the knowledge and aptitude for cyberspace operations. There are many instruments available to measure knowledge, but there few that measure aptitude.
Implications of Quantum Information Processing On Military OperationsCyber Defense Review
2015 This paper discusses the benefits and drawbacks of quantum computing and quantum cryptography, subsets of the field of Quantum Information Processing (QIP). This field uses quantum mechanics for information processing rather than classical mechanics and portends game-changing implications to technologies long-relied on by military organizations, including computing, communication, and cryptographic systems.
A Modeling Framework for Studying Quantum Key Distribution System Implementation NonidealitiesIEEE Access
2015 Quantum key distribution (QKD) is an innovative technology that exploits the laws of quantum mechanics to generate and distribute unconditionally secure shared key for use in cryptographic applications. However, QKD is a relatively nascent technology where real-world system implementations differ significantly from their ideal theoretical representations.
Using the Discrete Event System Specification to Model Quantum Key Distribution System ComponentsJournal of Defense Modeling and Simulation
2014 In this paper, we present modeling a Quantum Key Distribution (QKD) system with its components using the Discrete Event System Specification (DEVS) formalism. The DEVS formalism assures the developed component models are composable and exhibit well-defined temporal behavior independent of the simulation environment. These attributes enable users to assemble a valid simulation using any collection of compatible components to represent complete QKD system architectures.