Tag Archives: DFA

Motherboard

The LCDI Experience

Student Worker Experience – Matt Fortier Incoming students have a lot on their minds when they first arrive at Champlain. They may be worried about making friends or where their classes are. When I arrived on campus, I was worried about one thing: getting a job. I had applied for numerous positions including at the […]

Continue reading
wearable technology Apple Watch, Samsung Galaxy Gear S2, FitBit Fitness Tracker LCDI Forensics Project

Wearable Technology Final Blog

Introduction The team has continued to make progress searching for forensic artifacts from the wearable technology devices. Data parsing for the Apple Watch from the iPhone has been completed, while the search for artifacts from the Samsung Gear S2 and newly added FitBit Surge continues. As we near the end of the semester, we find […]

Continue reading
bluetooth security bluetooth logo

Bluetooth Security Final Blog

Introduction Over the past seven weeks, our team at the Leahy Center for Digital Investigation has been working to discover the inherent vulnerabilities in Bluetooth security technology. We have wrapped up the research portion of our project and have begun running tests on our devices. Over the next several weeks we will continue to run […]

Continue reading
cloud forensics LCDI project Dropbox, OneDrive, iCloud, and Google Drive logos

Cloud Forensics Update 2

Introduction After creating our data generation script and installing the proper software clients, we are into the next phase of our research. This week in Cloud Forensics we powered on our virtual machines and completed our data generation. The purpose of the data generation is to document the steps taken, in detail, during the examination […]

Continue reading
wearable technology Apple Watch, Samsung Galaxy Gear S2, FitBit Fitness Tracker LCDI Forensics Project

Wearable Technology Forensics Update 2

Introduction  The Wearable Tech team is trying to discover new ways to extract data from our devices. With the Apple Watch and Samsung Gear S2 having no physical connection, data extraction seems nearly impossible from these devices. Most of the data that has been retrieved thus far holds no significant forensic value, and can be […]

Continue reading