Tag Archives: LCDI

Artificial Intelligence for Next Generation Law Enforcement

Introduction  Prior to attending this conference, I was still a student concerned about facing the professional world. Despite the reputation digital forensics holds in the technology industry. There were a number of questions regarding the social responsibility and experience that comes along with my education. How could I incorporate the knowledge I obtain from college […]

Continue reading

Exploration Forensics Final Update

Introduction As the Exploration Forensics team wraps up our last few weeks at the LCDI, we have been making progress in analyzing the mobile application files. We’ve also concluded our research on the Ovilus V for the time being, even though it did not meet our original expectations. Despite unexpected hurdles throughout the semester, the […]

Continue reading

Exploration Forensics Update 2

Introduction This semester, the exploration forensics group is researching hardware and software that tests for paranormal activity. The team will test the devices and corresponding apps. Through these tests, they will discover how the devices gather readings and interact with a user’s data. In addition, the team will gather evidence on how the devices and […]

Continue reading
fitbit application analysis

Application Analysis Introduction

Introduction This semester, the Application Analysis team chose four Windows applications to perform a forensic analysis on – Spotify, Bitcoin Miner, Speedtest, and Dashlane. In the coming weeks, we will examine the artifacts generated by these applications. Analysis: Web App Security We will inspect the applications’ security features. Without proper security features, hackers can access data […]

Continue reading

Exploration Forensics Blog 1

Introduction This semester, the exploration forensics team is conducting research on hardware and software that tests for paranormal activity. We will test the devices and corresponding applications to discover if they gather readings and interact with a user’s data. The team will gather evidence on how the devices and applications operate. We will test how […]

Continue reading
Windows Fall Creator Title

Windows Fall Creator Introduction

Pick Up Where I Left Off: Windows Innovative New Feature Coming Soon? This spring, the Windows Fall Creator team will research a new Microsoft feature coming out over the next few months. The Windows Fall Creator/Redstone 4 update will provide users with the ability to continue right where they left off on other devices, as […]

Continue reading

Application Analysis: Conclusion

Introduction: To close out our list of Web Apps, we finished up on Discord. It has been an interesting experience for us to work with the three diverse apps over the last semester. Our analysis on Discord brought our research to a close. Seeing several key similarities with our first application Slack, it was an […]

Continue reading

Bluetooth Security Forensics Conclusion

Introduction  The Bluetooth Team has been working hard all semester and has finally finished testing with all bluetooth tools. This semester has been challenging for everyone as we learned about Bluetooth and its vulnerabilities. Our team has gained a lot of insight into the realities of modern Bluetooth security, using tools such as Econocom Digital […]

Continue reading

Mobile App Analysis Part 5

Introduction The Mobile Application Forensics team is beginning to wind down on application analysis, and have started working on their final report. So far, both the iOS team and Android team worked on Open Whisper Systems’s Signal, an end-to-end encryption chat app, and Bumble, a new mobile dating app. The iOS team then did analysis […]

Continue reading

Malware Analysis Blog 3

Introduction Now that we’ve had a good amount of time to work on this project, we’ve been able to analyze multiple samples of Malware. One of the samples we reviewed was a RAT (Remote Access Trojan), commonly referred to as DarkComet. A RAT is software that allows a person to remotely control a system as […]

Continue reading