[DFSci] Get Rewarded for DF Education through the Artifact Genome Project

Baggili, Ibrahim IBaggili at newhaven.edu
Tue Mar 2 11:30:26 PST 2021


Sorry, for the last e-mail. Did not realize dfsci is only text. This should be clearer!


Help Expand Digital Forensics Education!
Test the Efficacy of AGP Educational Modules. Get Rewarded for it!
NSF Grant No.1900210


The University of New Haven's Connecticut Institute of Technology & Bergami Jr. Cybersecurity Center invites you to collaborate in our new venture to impact students, and instructors in Cybersecurity and Digital Forensics through the implementation of mini educational cybersecurity and cyber forensic challenges into their classrooms using the Artifact Genome Project (agp.newhaven.edu) platform.

How to Collaborate?

Interested instructors from different universities will have a chance to test drive this tool at agp.newhaven.edu by implementing it specifically in their cybersecurity and cyber forensics courses for one semester or more. Students enrolled in these classes in return will take a certain amount of already created educational modules and test their efficacy. Instructors will also be able to create their own educational modules to assign to their own classes, if preferred. In return, we ask instructors and students to commit to provide feedback through a survey that will be administered at the end of the semester. Instructors interested and chosen to participate will be rewarded with a $500 honorarium.

How to Participate?

Any instructor interested in participating in this project, please fill out our participant form at https://bit.ly/37IxxIC to get started. The information collected in the form is for us to know a little more about you, the institution you work at and the courses you teach. Once we receive your information, we will contact you to arrange a remote meeting to go over the project. If you have any questions, please contact Cinthya, AGP manager, and Dr. Baggili at agp at newhaven.edu<mailto:agp at newhaven.edu>. Please, fill out the form as soon as possible if you would like to start this semester or the next or whenever your institution allows you to. This project is open ended. Thank you!

Sample Exercises:

These are just a few examples of the types of assignments AGP contains. These are just the overview of what the assignment's case is about. These exercises are a convenient way to learn from, not only for students, but for instructors as they are automatically graded, and students can download and submit a report card to the instructor as proof of completion.

  *   DJI Go App & Phantom 3 Drone: The Case of the Killer Drone: Analyze the Data to Nab the Suspect!

Today, March 24th, 2016, at around 6:15 pm, the West Haven police department found a dead body lying on the ground at the corner of Rockdale Road and Allan Street in West Haven, CT. Witnesses nearby accounted hearing gunshots and seeing a drone crashing into the trees with an awkward device attached to it. While canvasing the scene, investigators found the drone in the bushes, broken into pieces, only 50 feet away from the victim. Attached to it appeared to be a homemade weapons system resembling a gun. A broken Asus Nexus 7 Android tablet was also found near the crime scene. Consequently, the evidence was recovered and brought to the Digital Forensics Lab. The drone's internal SD card was extracted and the tablet was forensically imaged. Unfortunately, due to the extreme damage the devices experienced, only minimum data was extracted from the devices. As a Cyber Forensics Investigator, your task is to analyze and recover any pertinent evidence that would provide leads onto whether this is the drone that was used in this crime and any information about the person who committed the homicide.

  *   iOS 12.4.6 Applications: Espionage on the Home Front, Can You Break the Code?

Today, June 2, 2020, investigators noticed something strange on surveillance footage. They have discovered that the last time Henry Higgens accessed a restricted area, something flashed a few times from the eye glasses he was wearing. These flashes resembled that of a camera. Strict company and federal policy prohibits individuals from bringing any devices and taking pictures in this restricted area. As of today, Henry was still a worker with top secret clearance at the Naval Submarine Base in Groton, CT, however, it appears that he has yet to come to work.  After analyzing further, investigators discovered the eye glasses had the capability of taking pictures. Due to not being able to find Henry, investigators relayed on analyzing every device he had used at the company. As an Internal Affairs Cyber Forensic Investigator, you have been assigned to be part of the team to investigate Henry's "work" iPhone. So far, you have discovered Henry was indeed misusing his work cell phone, and breaking company policy by using the Kik and Venmo applications in his work cell phone. These applications are of interest to the case. Hunt for the recovered artifacts in AGP and make logical assumptions as to what Henry Higgens had been doing with his work issued iPhone. Is it possible he was also using this device along with the eye glasses to conduct an insider job? Was he responsible for something more compromising and illegal?

  *   Android 7.0 MapMyRide Application: What Happened to This Biker?

A trail of blood has been found along a bike route for cyclists in West Haven, Connecticut. A few items were found along this trail, including a Samsung Galaxy S8 phone, one glove, and an empty wallet. This discovery was reported to authorities by another cyclist riding nearby at approximately 9:30 PM on November 10th, 2017. There were no witnesses and it is uncertain as to what has happened. A forensic image of this phone was acquired by the city's Cyber Forensics lab and as a Cyber Security Analyst, it is your job to investigate the MapMyRide application. This application is believed to have been in use while the person in question was riding. This application provides information and helps users track their nutrition and training plans, while also tracking bike routes and other types of workouts. In this assignment, your goal is to investigate the MapMyRide's artifacts in order to find any leads as to what has happened and possibly find the missing person.


Contact Information:

Project Website: agp.newhaven.edu<https://nam04.safelinks.protection.outlook.com/?url=https%3A%2F%2Flinkprotect.cudasvc.com%2Furl%3Fa%3Dhttps%253a%252f%252fagp.newhaven.edu%26c%3DE%2C1%2CZD-t64-RN60o5-Pss_AnsTgvLnELMUUfA-9EFLIZWQptvSozsPD9qv6CsjBP6OhokpsN8XDjhY0JVulzX16s1bTLC-A5OmwVKFJium5P3zc3wKVhhkz29bZI7g%2C%2C%26typo%3D1%26ancr_add%3D1&data=04%7C01%7Cibaggili%40newhaven.edu%7C73dece3c43e742de183508d8ddabb6d0%7C3c71cbabb5ed4f3bac0d95509d6c0e93%7C1%7C1%7C637503076895347236%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=vpUb0zQOs2Yu8V59cpP92iYjwq7hgrSCg%2F7KVhs3wUI%3D&reserved=0>
Email: agp at newhaven.edu<mailto:agp at newhaven.edu>
AGP PI: Dr. Baggili
AGP Manager: Cinthya
Project funding provided by the National Science Foundation



Ibrahim (Abe) Baggili PhD, Elder Family Endowed Chair
Founding Director, Connecticut Institute of Technology @ University of New Haven,
Executive Director, Samuel S. Bergami Jr. Cybersecurity Center,
Executive Director & Founder, Cyber Forensics Research and Education Group (cFREG)
CyberCorps Scholarship For Service(r) PI
NSA Center of Academic Excellence in Cyber Operations (CAE-CO) Lead

University of New Haven,
Tagliatela College of Engineering
300 Boston Post Rd, West Haven, CT 06516
+1-203-932-7198 E-mail: ibaggili at newhaven.edu<mailto:ibaggili at newhaven.edu>
Web: UNHcFREG<http://www.unhcfreg.com/> Personal Website <http://www.baggili.com/> Google Scholar<http://scholar.google.com/citations?user=cskwIy8AAAAJ&hl=en&oi=ao>




CONFIDENTIALITY NOTICE :: This email message and any documents, files, or previous e-mail messages attached to it is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Any unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply email and destroy all copies of the original message.




More information about the DFSci mailing list