Tag Archives: Students

Magnet User Summit 2019: Solving Cyber Crimes with the University of Notre Dame

Mitch Kajzer presented this talk at the Magnet User Summit. He is the director of the Cyber Crimes Unit in St. Joseph County, Indiana, and also an adjunct professor at Notre Dame. He talked about the changing nature of digital forensic investigations and how police agencies need to adapt. Technology is now involved in most […]

Continue reading

Mobile App Forensics Final Update

Introduction During this semester, the Mobile Forensics team analyzed social media apps such as Snapchat, Telegram, and LinkedIn.  Snapchat As for a conclusion on our Snapchat analysis, we couldn’t find much outside of prior research within the community. A big concern we had was how much data would remain on a device  twenty-four hours after […]

Continue reading

Automated Network Scanner! The Final Blog

Testing Our Script Automated Network Scanning ! team has successfully completed their project by capping off the testing phase. The testing phase was divided into four phases. As we had configured our script to execute on boot, we would start each cycle by rebooting the Raspberry Pi. To implement this, we enabled auto-login on boot […]

Continue reading

EnCase Tool Eval Update 2

Introduction This past month the EnCase team has been hard at work evaluating EnCase 8 compared to other digital forensics tools. We started by creating a Virtual Machine where we made a mock computer to be investigated. After this we took the information from the VM and began using it in our tools. We then […]

Continue reading

Mobile App Forensics Intern Blog 2

Introduction Over the past month, our team has analyzed the applications Expedia and Google Trips. These apps help users plan trips to locations abroad with features to order reservations and plan day trips. Our goal for analyzing these applications was to find out how much information they hold for forensic investigators. This will in turn […]

Continue reading

Network Scanning Team: Third Impact

The Beginning of the End So, this is it. The final frontier. Our last blog post. We made it. High fives all around—we successfully went where no man, woman, or hyper-intelligent anthropomorphic beaver has gone before: the LCDI network. All joking aside, our team is happy to report that we have completed the tasks laid […]

Continue reading
LCDI Apple Watch Moto 360 smartwatch Motorola smartphone bluetooth security

Bluetooth Security Forensics

Bluetooth Security  Lately, the LCDI has been committed to researching the capabilities and vulnerabilities of Bluetooth. More and more consumers are including Bluetooth capable devices in their personal repertoire, and the Bluetooth Special Interest Group continues to expand and update the protocol with the recent release of Bluetooth 5.0. With these factors in mind, the […]

Continue reading
Motherboard

The LCDI Experience

Student Worker Experience – Matt Fortier Incoming students have a lot on their minds when they first arrive at Champlain. They may be worried about making friends or where their classes are. When I arrived on campus, I was worried about one thing: getting a job. I had applied for numerous positions including at the […]

Continue reading
wearable technology Apple Watch, Samsung Galaxy Gear S2, FitBit Fitness Tracker LCDI Forensics Project

Wearable Technology Final Blog

Introduction The team has continued to make progress searching for forensic artifacts from the wearable technology devices. Data parsing for the Apple Watch from the iPhone has been completed, while the search for artifacts from the Samsung Gear S2 and newly added FitBit Surge continues. As we near the end of the semester, we find […]

Continue reading
bluetooth security bluetooth logo

Bluetooth Security Final Blog

Introduction Over the past seven weeks, our team at the Leahy Center for Digital Investigation has been working to discover the inherent vulnerabilities in Bluetooth security technology. We have wrapped up the research portion of our project and have begun running tests on our devices. Over the next several weeks we will continue to run […]

Continue reading