As the Internet of Things (IoT) becomes ubiquitous in our everyday lives there are privacy and security concerns that citizens should be aware of. This training will provide an overview of IoT and will teach law enforcement officials methods to engage with their communities to provide information about IoT privacy and security. Steps that community members can take to be safer with these devices, and effective teaching strategies regarding prevention will be covered.
Network scanners like Fing are valuable tools in investigative work, particularly for cyber related investigations. These tools can also be invaluable to personal communities in assisting with device and network security, and network management. Network scanners allow users to scan and map a network, identifying all connected devices, their IP addresses, and other essential details like MAC addresses, device types, and open ports. For forensic investigators, tools like Fing can provide a snapshot of all devices connected to a network at a particular time, useful in tracing the origins of a security incident. For home users, network scanning tools can help map out their homes to ensure no outside devices are connected, can be used in hotels or rentals to map devices in unknown properties. Overall, network scanners are essential in proactive network defense and incident response or investigations.
The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.
The Internet of Things (IoT) encompasses a complex network of data, demanding a thorough understanding and careful planning for its retrieval, management, and subsequent examination within the context of criminal investigations. From this training program, learn comprehensive exploration of the diverse devices and interconnected systems responsible for generating valuable data. Participants will actively engage in live demonstrations, acquiring practical skills for extracting and analyzing this data using non-forensic methods. Security and privacy concerns that citizens may encounter will be addressed and strategies for Law Enforcement to engage with their communities effectively will be provided.
Learn how to identify the types of data that is available from connected cars and the difference between network connected cars and vehicle forensics options. Gain knowledge on how to query certain vehicles to determine their connection status to various service providers will also be covered. Explore and be instructed on how to draft legal process for the extraction of vehicle specific data and learn about resources and tools that can assist them in their investigations that involve vehicle data.
Learn how the Apple AirTag works for individuals who want a high-tech option to keep track of their belongings. Examine how this technology is being used to conduct criminal activities, to include stalking. During the webinar, you will learn how an AirTag is synced to an iOS user account, how ‘Find My’ works, limitations to the technology, and issues you need to be aware of when requesting legal compliance from Apple.
IoT trackers are becoming more common as they were initially designed to track your luggage, keys, and other assets. As time went on, criminals learned the potential of these devices to stalk or facilitate other crimes. Learn the use of Apple and Android-based trackers, some of their functionality, and their uses, both good and bad.