Tag Archives: Students

Intrusion Into the Internet of Things

Welcome to the Internet of Things Intrusion team’s first blog. The Internet of Things—or IoT for short—is a fancy term for the interconnected devices that make up our world. Many consumers know these devices as “smart” devices. For example, your smartphone can connect to your smart fridge to let you know when you’re, say, out […]

Continue reading

Magnet User Summit 2019: Solving Cyber Crimes with the University of Notre Dame

Mitch Kajzer presented this talk at the Magnet User Summit. He is the director of the Cyber Crimes Unit in St. Joseph County, Indiana, and also an adjunct professor at Notre Dame. He talked about the changing nature of digital forensic investigations and how police agencies need to adapt. Technology is now involved in most […]

Continue reading

Mobile App Forensics Final Update

Introduction During this semester, the Mobile Forensics team analyzed social media apps such as Snapchat, Telegram, and LinkedIn.  Snapchat As for a conclusion on our Snapchat analysis, we couldn’t find much outside of prior research within the community. A big concern we had was how much data would remain on a device  twenty-four hours after […]

Continue reading

Automated Network Scanner! The Final Blog

Testing Our Script Automated Network Scanning ! team has successfully completed their project by capping off the testing phase. The testing phase was divided into four phases. As we had configured our script to execute on boot, we would start each cycle by rebooting the Raspberry Pi. To implement this, we enabled auto-login on boot […]

Continue reading

EnCase Tool Eval Update 2

Introduction This past month the EnCase team has been hard at work evaluating EnCase 8 compared to other digital forensics tools. We started by creating a Virtual Machine where we made a mock computer to be investigated. After this we took the information from the VM and began using it in our tools. We then […]

Continue reading

Mobile App Forensics Intern Blog 2

Introduction Over the past month, our team has analyzed the applications Expedia and Google Trips. These apps help users plan trips to locations abroad with features to order reservations and plan day trips. Our goal for analyzing these applications was to find out how much information they hold for forensic investigators. This will in turn […]

Continue reading

Network Scanning Team: Third Impact

The Beginning of the End So, this is it. The final frontier. Our last blog post. We made it. High fives all around—we successfully went where no man, woman, or hyper-intelligent anthropomorphic beaver has gone before: the LCDI network. All joking aside, our team is happy to report that we have completed the tasks laid […]

Continue reading
LCDI Apple Watch Moto 360 smartwatch Motorola smartphone bluetooth security

Bluetooth Security Forensics

Bluetooth Security  Lately, the LCDI has been committed to researching the capabilities and vulnerabilities of Bluetooth. More and more consumers are including Bluetooth capable devices in their personal repertoire, and the Bluetooth Special Interest Group continues to expand and update the protocol with the recent release of Bluetooth 5.0. With these factors in mind, the […]

Continue reading
Motherboard

The LCDI Experience

Student Worker Experience – Matt Fortier Incoming students have a lot on their minds when they first arrive at Champlain. They may be worried about making friends or where their classes are. When I arrived on campus, I was worried about one thing: getting a job. I had applied for numerous positions including at the […]

Continue reading
wearable technology Apple Watch, Samsung Galaxy Gear S2, FitBit Fitness Tracker LCDI Forensics Project

Wearable Technology Final Blog

Introduction The team has continued to make progress searching for forensic artifacts from the wearable technology devices. Data parsing for the Apple Watch from the iPhone has been completed, while the search for artifacts from the Samsung Gear S2 and newly added FitBit Surge continues. As we near the end of the semester, we find […]

Continue reading