Personal Information
Sex: Male
Date of Birth: Mar. 1973
Email: daishijian@cupl.edu.cn
Highest Degree: Master’s Degree
Present Professional Position: Professor, CUPL
Field of Specialization: Electronic Evidence, Law of Evidence
Taught Curriculum: Basics of Information Technology, Data Recovery Technology, Electronic Evidence Investigation, Forensic Electronic Data, Big Data Investigation
Education
09/1987—07/1990 No. 4 Middle School, Xiangfan, Hubei
09/1990—06/1994 Hefei Artillery College, Got Bachelor’s Degree in Instructor of Artillery
09/1994—06/1997 Hefei Artillery College, Got Master’s Degree in Operational Commanding
Work Experience
07/1997—11/1999 Assistant Engineer at 63961 Troops
12/1999—11/2005 Engineer at 63961 Troops
12/2005—03/2009 Senior Engineer at 63961 Troops
04/2009—11/2015 Senior Engineer at Supreme People's Procuratorate
12/2015—Present Professor at School of Criminal Justice, CUPL
Professional Affiliation
(1) Member of the Computer Forensics Committee of China Electronic Society
(2) Expert in charge of the identification of audio, image, electronic evidence and voiceprint at Tianjin Jinshi Judicial Expertise Center
(3) Executive Vice President of the Institute of Forensic Expertise, Tianjin Jinshi Judicial Expertise Center.
Publications
1. Journal Articles
(1) Summary of Data Recovery Technology (I), Netinfo Security,Jan. 2006
(2) Summary of Data Recovery Technology (II), Netinfo Security,Feb. 2006
(3) Unveiling of Data Recovery Technology, Storage World, Apr. 2006
(4) Physical Security Is the Foundation, Storage World, May 2006
(5) Data Recovery and Security of Information Storage, Collection of Essays of Military Engineering Society, Jun. 2006
(6) Study on Computer Forensics Technology System, Proceedings of the 2nd China Computer Forensics Technology Summit, Jun. 2006
(7) Data Recovery Technology, Security and Confidentiality, the 16th Annual Academic Meeting of China Aeronautics and Astronautics Society, Sept. 2006
(8) Application of Information Security Technology, Research on Equipment Technology, Jan. 2007
(9) Pay Attention to the "Two Knives" Situation in Data Recovery, Storage World, Jan. 2007
(10) Thoughts on Proliferation of Data Recovery Companies, Storage World, Jan. 2007
(11) 3D Spatial System of Data Protection, China Information World, Apr. 2007
(12) On the New Era of Data Protection, Storage World, May 2007
(13) How to Protect Your Important Data, Storage World, Jul. 2007
(14) Data Recovery in Network Security Emergency Response, Proceedings of 2008 Annual Meeting of Computer Network Security Emergency in China, Apr. 2008
(15) On the Identification of Electronic Material Evidence, Journal of Shandong Police College, May, 2008
(16) Analysis of Data Recovery Technology and Methods, Netinfo Security, Jun. 2009
(17) Extraction and Fixation of Electronic Material Evidence, National Information Security Evaluation and Certification, Oct. 2009
(18) Evidence Consideration of Electronic Material Evidence, People’s Procuratorial Semimonthly, Oct. 2009
(19) Computer Forensics Technology System and Difficult Problems, Proceedings of China's 1st World Hackers Conference, Nov. 2009
(20) Information Life Cycle and Data Recovery, Proceedings of Hebei Information Security Summit Forum, Jan. 2010
(21) Research on the Principle and Recovery Technology of Electric Storage, National Information Security Evaluation and Certification, Jul. 2010
(22) Research on Traceability of Electronic Physical Evidence, Netinfo Security, Nov. 2010
(23) Research on Electronic Evidence Inspection of Disk Array, Netinfo Security, Jan. 2011
(24) Investigation and Evidence Collection of Network Crime under Cloud Mode, Netinfo Security, Apr. 2011
(25) Tentative Ideas on Collection and Application of Electronic Data and Construction of Laboratory in Procuratorial Organs, Procuratorial Technology and Informatization, Feb. 2012
(26) Research on Electronic Data Forensics of Investigation Department of Procuratorial Organs, Journal of Hunan University (Social Science),Feb. 2017
(27) Changes of Laws and Regulations of Network Security Protection in China, Social Governance, Apr. 2017
(28) On Network Security Law and Electronic Data from the Perspective of Changing Laws and Regulations, Journal of Information Security Research, Sept. 2017
2. Books
(1) Data Recovery Technology (1st Edition), Publishing House of Electronics Industry, Sept. 2003 (author)
(2) Data Recovery (textbook designated for vocational certification by the Ministry of Information Industry), Sept. 2003 (author)
(3) Data Flow Atlas of Enterprise Management Modeling, Publishing House of Electronics Industry, Jan. 2005 (co-author)
(4) Data Recovery Technology (2nd edition), Publishing House of Electronics Industry, Mar. 2005 (author)
(5) Data Security and Programming Technology, Tsinghua University Press, Aug. 2005 (co-author)
(6) Data Recovery Technology (1st Edition), Published in traditional Chinese character specially for Taiwan, Sept. 2005 (author)
(7) Material Evidence Technology (3rd Edition), China Renmin University Press, Sept. 2008 (co-author)
(8) Computer Forensics and Forensic Expertise, Tsinghua University Press, Mar. 2009 (co-author)
(9) Data Recovery Technology (4th Edition), China Renmin University Press, Sept. 2011(co-author)
(10) Practice of Judicial Identification of Electronic Data (compilation of which organized by the Ministry of Justice, PRC), 2011 (co-author)
(11) Hard Disk Maintenance and Data Recovery, Publishing House of Electronics Industry, 2012 (author)
(12) Computer Forensics and Forensic Expertise (2nd Edition), Tsinghua University Press, Mar. 2014 (co-author)
(13) Data Recovery Technology (Classical Reprint Edition), Publishing House of Electronics Industry, Jul. 2014 (author)
(14) Guide to the Investigation of Electronic Evidence, China Procurational Press, Aug. 2014 (author)
(15) Carry On: Sound Advice from Schneier on Security, Publishing House of Electronics Industry, Mar. 2016 (co-translator)