Loading

Senator Patrick Leahy Center for Digital Forensics & Cybersecurity Celebrating 10 Years

2006

Under guidance from Gary Kessler Champlain College began working to assist law enforcement agencies in Vermont and throughout the nation through a number of initiatives and partnerships among academia, the public sector, and the private sector.

The Champlain College Center for Digital Investigation (C3DI) is created.

2010

Grant proposal submitted to the Department of Justice for a project to Improve the skill and capacity of Vermont’s digital forensic examiners, detectives, first responders, and members of the judiciary to collect, analyze, and use digital evidence. $500,000 BJA grant awarded to the center; Jonathan Rajewski and Michael Wilkinson start as Co-Directors

2011

In 2011, the Champlain College Center for Digital Investigation is changed to The Senator Patrick Leahy Center for Digital Investigation. (LCDI) Jonathan Rajewski becomes Director and hires Joseph Williams on as Project Manager.

The Leahy Center hires the first group of seventy paid employees, with twelve majors represented. The Leahy Center spends $102,498 on student workers, who work a combined 10,572 hours in the first year.

2015

In 2015, the Digital Forensics & Cybersecurity Academy (DFCS) was launched by the Leahy Center, with 20 students in attendance at the first session.

The Leahy Center begins offering internships through the FOR190 classes at Champlain College. Alexander Caron is hired on as Senior Digital Forensics Analyst.

2019

The Leahy Center under-goes a name change, from the Senator Patrick Leahy Center for Digital Investigation, to the Senator Patrick Leahy Center for Computer Forensics & Cybersecurity.

Adam Goldstein is named as the new Executive Director of The Leahy Center.

Mac Forensics

The goal of our research was to determine the default locations for artifacts in the newest releases of OS X, including new artifacts introduced with El Capitan.

IoT Research

This project looked at a list of popular “Internet of Things” devices and found which ones a malicious actor could extract data from, shut down service to or from, or take control of.

Shattered: Google Glass Forensics

Our research has involved extracting data from Google Glass and automating the process into an imaging tool, as well as looking into the results and understanding what artifacts Glass leaves behind.

Windows 10 Forensics

The mission of this project is to discover differences in the artifact locations of Windows 8 and Windows 10. It will also be within the scope of this to find and discover new artifacts that are linked to new features added to Windows 10. This is a two-part project series.

Kindle Forensics

Created a script for the Kindle Fire that allows users to configure, access, and acquire Kindle information with minimal user-input.

Seating Chart

An in-house solution designed to track student employee’s time spent in the lab, and to help manage allocation of machines for various projects

Bluetooth Analysis

Bluetooth tracking tools like Ubertooth and BlueHydra can and are used in a larger scale tracking effort that focuses on using a mesh network of nodes to track a Bluetooth signal across a wide geographical area, as is done by the New York State Department of Transportation to monitor traffic. This calls into question the efficacy of this technique in office buildings and other high-load urban environments.

Raspberry Pi

This project assessed the Raspberry Pi, a low cost, credit card-sized computer that can connect to a standard display and utilize keyboard/mouse input, and the viability of it redefining how cyber security specialists view honeypots.