{"id":14970,"date":"2021-03-26T15:54:55","date_gmt":"2021-03-26T19:54:55","guid":{"rendered":"https:\/\/web.uri.edu\/cs\/?page_id=14970"},"modified":"2021-03-26T15:58:11","modified_gmt":"2021-03-26T19:58:11","slug":"partnerships","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/cs\/dfcsc\/partnerships\/","title":{"rendered":"Partnerships"},"content":{"rendered":"<h1>DFCSC Partnerships<\/h1>\n<section class=\"cl-wrapper cl-menu-wrapper\"><nav id=\"\" class=\"cl-menu  \" data-name=\"dfcsc\" data-show-title=\"0\"><ul id=\"menu-dfcsc\" class=\"cl-menu-list cl-menu-list-no-js\"><li id=\"menu-item-12584\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12584\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/\">Overview<\/a><\/li>\n<li id=\"menu-item-12659\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12659\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/academics\/\">Academics<\/a><\/li>\n<li id=\"menu-item-12686\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12686\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/research\/\">Research<\/a><\/li>\n<li id=\"menu-item-12864\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12864\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/active-students\/\">Active Students<\/a><\/li>\n<li id=\"menu-item-15066\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-15066\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/resources\/\">Resources<\/a><\/li>\n<li id=\"menu-item-12701\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-12701\"><a href=\"https:\/\/web.uri.edu\/cs\/dfcsc\/about-us\/\">About Us<\/a><\/li>\n<\/ul><\/nav><\/section>\n<p>The DFCSC members work closely with a number of different academic institutions, government organizations, state and local law enforcement agencies, and private companies. We draw on the expertise of these partners to help in developing digital forensics and cyber security related capabilities and guiding the direction of DFCSC projects.<\/p>\n<h3>Rhode Island State Police Computer Crimes Unit<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-14973 size-full\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/statepolice-e1616788247235.gif\" alt=\"state police patch\" width=\"80\" height=\"98\">The DFCSC has a multi-dimensional partnership with the Rhode Island State Police Computer Crimes Unit. This includes providing consulting services on computer crime forensic processing, partnering on grants that would help to further the state\u2019s capacity to respond to and prosecute computer and Internet based crimes, supporting various training and events, and maintaining a successful internship program.<\/p>\n<p>&nbsp;<\/p>\n<h3>Roger Williams University<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-14985\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/RWU_logo.gif\" alt=\"\" width=\"105\" height=\"43\">The DFCSC and the FANS Lab at Roger Williams University are collaborating on new and exciting methods of teaching digital forensics and cyber security related courses using the latest in industry tools and technologies. In addition to a strong academic partnership, the DFCSC and RWU are working together on a number of new opportunities that would help to advance the digital forensics and cyber security communities within the state.<\/p>\n<p>&nbsp;<\/p>\n<h3>Community College of Rhode Island<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-14982 alignleft\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/ccri_logo.jpg\" alt=\"\" width=\"105\" height=\"61\">The DFCSC academic program works with different departments within CCRI, such as the Computer Studies, Engineering and Technologies, and Criminal Justice Departments to provide additional opportunities to both CCRI and URI students. Many of the minors in the Digital Forensics program at URI, enjoy taking the Criminal Justice courses offered by CCRI, and many of the Cyber Security students take basic networking courses in CCRI\u2019s CISCO Academy. Through our formal articulation agreements, many of the students who finish coursework in the areas of Digital Forensics or Cyber Security at CCRI, continue their studies at URI to obtain a full BA or BS degree in a related area.<\/p>\n<p>&nbsp;<\/p>\n<h3>WetStone Technologies<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15006\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/wetstone_logo.gif\" alt=\"\" width=\"105\" height=\"24\">WetStone Technologies is one of the leaders in Steganography Detection. In 2009, the DFCSC research group successfully transferred their steganography detection algorithms and techniques to WetStone Technologies, where they were integrated into industry leading tools. In addition to providing the DFCSC with a research outlet, WetStone Technologies and the DFCSC also collaborate on projects that originate through the ECTCoE.<\/p>\n<p>&nbsp;<\/p>\n<h3>AccessData<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15009\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/AccessDataLogo.jpg\" alt=\"\" width=\"90\" height=\"90\">In an effort to provide students with the best learning opportunities, the DFCSC is a member of AccessData\u2019s Academic Partnership Program. Through this program, DFCSC instructors have become certified to teach AccessData\u2019s industry leading tools, such as Forensic Toolkit, Mobile Phone Examiner, Registry Viewer, FTK Imager, and PRTK, to students who are enrolled in one of our academic programs. Many of the students who leave our program leave as an AccessData Certified Examiner (ACE).<\/p>\n<p>&nbsp;<\/p>\n<h3>ForensicSoft<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15012\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/forensicsoft_logo_sm.jpg\" alt=\"\" width=\"105\" height=\"21\">The DFCSC transitioned their ground-breaking research in software write blocking and Windows forensic boot disks to ForensicSoft, who are now the industry leaders in providing the forensics community with these tools. ForensicSoft also provides students that are enrolled in one of the DFCSC academic programs with free versions of the software that they may use in class, giving our students hands-on experience with the industry leading tools and technologies.<\/p>\n<p>&nbsp;<\/p>\n<h3>Brown University<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15015\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/brown-logo.png\" alt=\"\" width=\"105\" height=\"52\">The DFCSC collaborates with Brown University\u2019s Cyber Security Center on cyber security issues, particularly those at the intersection of technology, policy, law, and national strategy. We inform each other of courses and degree programs that we offer, research that is funded, publications that are produced, seminars, colloquia and conferences being planned, and training programs being offered. We look for opportunities to collaborate in these offerings as well as on research proposals to strengthen and expand our interests at the intersection of technology and policy in cyberspace. See <a href=\"http:\/\/www.cyberpolicy.org\" target=\"_blank\" rel=\"noopener\">www.cyberpolicy.org<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3>Naval War College<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15018\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/nwc-logo-color.jpg\" alt=\"\" width=\"76\" height=\"80\">The University collaborates with the U.S. Naval War College on cybersecurity issues, particularly those at the intersection of technology, policy, law, and national strategy. We inform each other of courses and degree programs that we offer, research that is funded, publications that are produced, seminars, colloquia and conferences being planned, and training programs being offered. We will look for opportunities to collaborate in these offerings as well as on research proposals to strengthen and expand our interests at the intersection of technology and policy in cyberspace. See <a href=\"http:\/\/www.cyberpolicy.org\" target=\"_blank\" rel=\"noopener\">www.cyberpolicy.org<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h3>Adaptive Methods<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-15021\" style=\"min-width: unset\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/1531\/AdaptiveMethodsLogo.gif\" alt=\"\" width=\"105\" height=\"53\">Adaptive Methods is a developer of advanced sensor processing and computing architecture products for surveillance, security, and military combat systems. Adaptive Methods technology transition programs deliver increased product value through improved sensor performance, operability, and user flexibility. URI has recently partnered with Adaptive Methods on several research projects that provide visualization of trust in networked systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DFCSC Partnerships The DFCSC members work closely with a number of different academic institutions, government organizations, state and local law enforcement agencies, and private companies. We draw on the expertise of these partners to help in developing digital forensics and cyber security related capabilities and guiding the direction of DFCSC projects. Rhode Island State Police [&hellip;]<\/p>\n","protected":false},"author":1322,"featured_media":0,"parent":12578,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-14970","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/14970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/users\/1322"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/comments?post=14970"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/14970\/revisions"}],"predecessor-version":[{"id":15039,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/14970\/revisions\/15039"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/pages\/12578"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/cs\/wp-json\/wp\/v2\/media?parent=14970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}