Network scanners like Fing are valuable tools in investigative work, particularly for cyber related investigations. These tools can also be invaluable to personal communities in assisting with device and network security, and network management. Network scanners allow users to scan and map a network, identifying all connected devices, their IP addresses, and other essential details like MAC addresses, device types, and open ports. For forensic investigators, tools like Fing can provide a snapshot of all devices connected to a network at a particular time, useful in tracing the origins of a security incident. For home users, network scanning tools can help map out their homes to ensure no outside devices are connected, can be used in hotels or rentals to map devices in unknown properties. Overall, network scanners are essential in proactive network defense and incident response or investigations.
The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.
As the Internet of Things (IoT) becomes ubiquitous in our everyday lives there are privacy and security concerns that citizens should be aware of. This training will provide an overview of IoT and will teach law enforcement officials methods to engage with their communities to provide information about IoT privacy and security. Steps that community members can take to be safer with these devices, and effective teaching strategies regarding prevention will be covered.
The Internet of Things (IoT) encompasses a complex network of data, demanding a thorough understanding and careful planning for its retrieval, management, and subsequent examination within the context of criminal investigations. From this training program, learn comprehensive exploration of the diverse devices and interconnected systems responsible for generating valuable data. Participants will actively engage in live demonstrations, acquiring practical skills for extracting and analyzing this data using non-forensic methods. Security and privacy concerns that citizens may encounter will be addressed and strategies for Law Enforcement to engage with their communities effectively will be provided.
We are excited to share our newest edition of 2025 for the NCJTC Compass Newsletter! This issue highlights upcoming NCJTC conferences and events we will be exhibiting at. You'll find new training opportunities and how NCJTC has been making an Impact in the field.
We are excited to share our second edition of 2025 for the NCJTC Compass Newsletter! This issue highlights Safer Internet Day, the upcoming National Law Enforcement Training on Child Exploitation and the ICAC Task Force Program. You'll find new ways to promote your organization and What's New within NCJTC.
NCJTC Training and Technical Assistance Catalog - 2024 Edition. For a printable version of the catalog, visit ncjtc.org/catalogprint.
NCJTC Training and Technical Assistance Catalog - 2024 Edition
We’re proud to share the NCJTC 2024 Annual Impact Report with you - a reflection of the critical work we’ve accomplished together. Read it today!
Read our NCJTC Impact Report for 2024 highlights and more!