Tag Archives: Student

Application Analysis Blog 1

What is Application Analysis? Artifacts are a subject of fascination, full of information from their time and location.  An application leaves markers on systems that often go undetected by the user. These digital artifacts are small bits of information, ranging from profile icons to private messages. This information could be a threat, and it’s crucial that […]

Continue reading

Internet of Things at Magnet User Summit 2019

INTRODUCTION During the first week of April, I had the privilege of attending the Magnet User Summit in Nashville, Tennessee. Previously held as a separate training right before or after EnFuse in Las Vegas, the Magnet User Summit is a two day conference put on by Magnet Forensics. It features talks and hands on labs […]

Continue reading

Magnet User Summit 2019: Solving Cyber Crimes with the University of Notre Dame

Mitch Kajzer presented this talk at the Magnet User Summit. He is the director of the Cyber Crimes Unit in St. Joseph County, Indiana, and also an adjunct professor at Notre Dame. He talked about the changing nature of digital forensic investigations and how police agencies need to adapt. Technology is now involved in most […]

Continue reading

Data Recovery Blog 2

Putting Hard Drives to the Test At the LCDI, we believe your data is important, and surely most would agree. The pictures of your family vacation are important, but what about your passwords? The hard drives that are in most computers store your data, leaving it open for anyone with the proper knowledge to find […]

Continue reading

Data Recovery – Blog 1

The Science of Data Recovery Do you think your deleted data is truly gone? Every day, people around the world share, save, or move critically important data, like credit card numbers, medical checks, and passwords. It wouldn’t be unreasonable to think that the delete function erases files forever, but the truth is that those files […]

Continue reading

SIFT Update 3

SIFT Update 3 Introduction As we are coming to an end working at the Senator Leahy Center for Digital Investigation, we are closer to completing our final report. Our last post was about recovering artifacts and keyword searches. Due to time issues and inexperience, our team couldn’t recover deleted files. Experience Throughout the semester, working […]

Continue reading

Automated Network Scanning + Final Experience

With our time here and finals week approaching fast, we are working to tie up all loose ends. Our final report is now complete, and we’ve done as much as we can with our scanner. The script scans the network, prints out some information, and sends it to an email address. We only got around […]

Continue reading
fitbit application analysis

Application Analysis Introduction

Introduction This semester, the Application Analysis team chose four Windows applications to perform a forensic analysis on – Spotify, Bitcoin Miner, Speedtest, and Dashlane. In the coming weeks, we will examine the artifacts generated by these applications. Analysis: Web App Security We will inspect the applications’ security features. Without proper security features, hackers can access data […]

Continue reading
Motherboard

The LCDI Experience

Student Worker Experience – Matt Fortier Incoming students have a lot on their minds when they first arrive at Champlain. They may be worried about making friends or where their classes are. When I arrived on campus, I was worried about one thing: getting a job. I had applied for numerous positions including at the […]

Continue reading
bluetooth security bluetooth logo

Bluetooth Security Final Blog

Introduction Over the past seven weeks, our team at the Leahy Center for Digital Investigation has been working to discover the inherent vulnerabilities in Bluetooth security technology. We have wrapped up the research portion of our project and have begun running tests on our devices. Over the next several weeks we will continue to run […]

Continue reading