< Back to ISS World Programs

AGENDA : 7-9 NOVEMBER 2023

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception, and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism, and other criminal activities conducted over today's Telecommunications networks, the Internet, and Social Networks.

Track 1: Lawful Interception and Social Network Monitoring Training
Track 2: LEA, Defense and Intelligence Gathering Product Presentations
Track 3: Social Network Monitoring, OSINT and Data Analytics Product Presentations
Track 4: Investigating Dark Web and Cryptocurrency Transaction Traceback
Track 5: Mobile Signal, 5G Intercept and Electronic Surveillance Product Presentations



ISS World North America 2023 - Agenda at a Glance


Special Training Seminars (23 Classroom Hours) Led by

Law Enforcement Officers and Ph.D Computer Scientists

Tuesday, November 7, 2023

Online Social Media and Internet Investigations 
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Practitioners Guide to Internet Investigations
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

A Real World Look at Investigations in the Dark Web 
(6 Classroom Hours)
Presented by: Todd G. Shipley, CFE, CFCE, and Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and Retired Investigator, Reno NV, Police Department

(Seminar Descriptions At The End of Agenda Posting)


Welcoming Remarks and Top Ten Challenges

Wednesday, November 8, 2023

8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies

ISS World America Exhibit Hours:

Wednesday, November 8, 2023: 10:00 AM-6:00 PM
Thursday, November 9, 2023: 9:30 AM-1:00 PM


Track 1: Lawful Interception and Social Network

Monitoring Training

Tuesday, November 7, 2023

9:00 AM-5:00 PM
Online Social Media and Internet Investigations
 
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective

11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators

1:30-2:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies

2:45-3:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know

4:00-5:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox

11:30 AM-12:30 PM
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

1:30-2:30 PM
Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

2:45-3:45 PM
Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Thursday, November 9, 2023

10:30-11:30 AM
Understanding the Implications of Online Social Media for OSINT During Critical Incidents

Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police


Track 2: LEA, Defense and Intelligence Gathering

Product Presentations

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, November 7, 2023

9:00 AM-5:00 PM
Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, 
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking

1:30-2:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

2:45-3:45
Advanced Techniques in Tracing Suspects, and lateral problem solving

4:00-5:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources

Wednesday, November 8, 2023

9:10-10:00 AM Session A
From Electronic Surveillance to Social Media Investigations challenges solved with integrated Cyber Intelligence solutions. A structured case-study
Various challenges combined and solved with user friendly and integrated Cyber Intelligence solutions, ranging from Electronic Surveillance to Social Media Investigations, touching End to End Lawful Interception on landline and mobile network up to 5G, Mobile Signal Monitoring, Encrypted communication analysis and processing the results in a Data Fusion Platform.
Presented by AREA

9:10-10:00 AM Session B
Scaling Digital Investigation Efficiently by Leveraging Data Enrichment and Automation

Come and learn how investigation units around the world tackle the complexities of modern digital investigations, overcoming the surge in data volumes and leveraging it to their benefit, removing the expert backlog and  enrolling their full investigative staff as early as possible.​
 Jack Ziv, Head of Investigative Analytics, Cellebrite

1:00-1:45 PM Session A
Power of Location Data to Combat Criminality & Terrorism: Establish suspects’ whereabouts, track movements, and uncover evidence
Highlighting the transformative potential of location data obtained from mobile network operators (MNOs) in assisting national security and law enforcement agencies to investigate and mitigate threats. By analyzing the location data from MNOs, security and law enforcement agencies can expedite investigations, enhance operational efficiency, and achieve better outcomes in their time-critical missions. Join us as we delve into real-world case studies, discuss the benefits and challenges of leveraging MNO location data, and effective use in the pursuit of justice.
Mohsen Tavakol, Chief Executive Officer, Xolaris

1:00-1:45 PM Session B
WhatsApp, Telegram, Facebook... how IPS helps you to locate most wanted targets with LI
Presented by IPS

2:00-2:45 PM Session A
How to Support Investigations with Open-Source Information

Leveraging subjects’ online presence is critical in today’s investigations to both enrich evidence and create momentum when leads go cold. However, gathering data manually from publicly available information is time-consuming and complicated, and surfacing actionable insights from this data can be equally challenging.
In this session, we will:

        Identify why open-source intelligence is both a challenge and a must-have in every investigation;

        Refer to a homicide use-case and identify how to utilize publicly available data at key stages of an investigation;

        Demo the new Cellebrite Smart Search solution to enable you to identify if it is a relevant alternative to your current methods.

      Ryan Parthmore, Cellebrite

      2:00-2:45 PM Session B
      Implementing New Investigation Use-cases for LEAs
      Top 7 use-cases that, based on our experience, benefit both LEAs and CSPs
      Presented by Matison

2:00-2:45 PM Session C
Uncovering Digital Sales of Lethal Chinese Synthetic Opioids
The opioid crisis remains a global public health emergency, with synthetic opioids contributing significantly to the epidemic's severity. Lethal Chinese synthetic opioids have emerged as a particularly concerning threat, exacerbating the crisis due to their potency and accessibility. This presentation aims to shed light on the intricate web of digital sales channels through which these deadly substances are distributed.
Presented by Bluestone Analytics

3:15-4:00 PM Session B
Unraveling JA3 and JA4+: Global Botnet Detection via Encrypted Traffic Fingerprinting
Network security teams and government defense agencies are leveraging encrypted traffic fingerprinting techniques such as JA3/JA3S to detect global botnet campaigns. Learn what a JA3 fingerprint is and how it is evolving to stay ahead of threat actors. Beyond TLS, what are teams doing to fingerprint traffic encrypted via SSH and QUIC?
Presented by NetQuest

4:15-5:00 PM
Who is communicating with who? - IP end point detection
Communication has moved to encrypted apps in the IP domain. Systems only able to analyze circuit switched data, are operating in darkness.  
Discover the knowledge that can be extracted from encrypted communication apps.
Morten Kinly Klinge, Product Marketing Manager, XCI

Thursday, November 9, 2023

8:30-9:30 AM
Survival of IMSI catchers in 5G Mobile Networks
Utimaco´s 5G ID Associator solution supports network element vendors and operators in achieving 3GPP compliance. The latest 3GPP releases have introduced several security features that significantly improve resistance against false base stations, making the tactical IMSI catchers/stingrays unusable in 5G networks. The presentation provides a legal standardized approach to overcome this challenge.
Presented by Utimaco


Track 3: Social Network Monitoring, OSINT and Data

Analytics Product Presentations

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Wednesday, November 8, 2023

9:10-10:00 AM
Unravel the Mystery of Virtual & Network Identifiers
Presented by Cobwebs

1:00-1:45 PM Session A
Leveraging OSINT In Complex Cybercrime Investigations

Presented by Maltego

1:00-1:45 PM Session B
Revolutionize OSINT with ChatGPT and LLMs: a Practical Guide
This presentation explores the transformative power of ChatGPT and other large language models (LLMs) in revolutionizing open-source intelligence (OSINT) collection and analysis. We will discuss practical applications of these advanced AI technologies in streamlining OSINT processes. Attendees will learn how to effectively harness the power of ChatGPT and LLMs to enhance their OSINT operations and discover best practices for implementing these cutting-edge tools in real-world scenarios.
Presented by S2T 

2:00-2:45 PM Session A
OSINT and Forensic Data Consolidation For Modern Investigations

This session will walk you through the journey to digital intelligence maturity, the art of the possible for law enforcement, corporate and investigative professionals, and explain the practical steps along the way. 

Driven by a global increase in volume of crimes and dramatic increase in volumes of online crimes, coupled with the sophistication of those crimes committed, analysts and investigators are reaching for a record number of data sources, search platforms and analytical visualization tools to perform investigative research and create links in their data.

Without advanced search-based intelligence technology analysts cannot perform a single search across all available information sources to produce a single link analysis chart  illustrating the connections. They must complete individual searches per data type in different systems each time and piece together the information by hand.

Cases are abandoned or taking too long to solve as data and data linkages are inaccessible, analysts are overwhelmed and dissatisfied in their jobs, organizations are suffering from high analyst attrition rates, it takes an unreasonable period of time to onboard new analysts and unique top talent is required to train the rest of the team, which is expensive and in short supply.

Siren uniquely connects data first from internal data sources and then to different sources like ShadowDragon, Chainalysis, and Sayari and makes connections that are not usually humanly possible. View these inaccessible network connections displayed in an intuitive Knowledge Graph. 

Attendees will learn:

                            The types of data investigators and analysts need in a modern investigations

                            How technology replaces manual methods of research

                            What is a centralized search?

                            How to link data from multiple sources to a single location

                            Why do investigators need Knowledge Graphs?

                            The high speed at which link charts and intelligence products can actually be created with the right tools

                            How to perform fusion of internal data with OSINT and API Data

                            The journey to digital intelligence maturity

                            A real life walk-through to disseminate and analyze multiple OSINT and vendor data  sources returned through an investigative lead (ie: a topic, event, or identifying information)

Presented by Siren 

2:00-2:45 PM Session B
Case Studies: Using Social Network Analysis to Detect Potential Threats and Uncover New Investigation Leads
Presented by Cobwebs Technologies

3:15-4:00 PM Session A
CDRs, IPDRs, Lawful Interception, Advanced Metadata, Location, Forensic Investigations and more in the Forensic Data Fusion and Analysis platform
All those sources and a single, web based, flexible, compatible, and user-friendly Forensic Data Fusion and Analysis platform.
Use cases and Live demo.
Presented by AREA

3:15-4:00 PM Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS

4:15-5:00 PM Session A
AI Neural Machine Translations for Investigations and Monitoring
Learn how to leverage secure, scalable, high-quality automated language translations for text and audio content captured in foreign languages for OSINT investigations and proactive cybersecurity monitoring.
Presented by Systran

4:15-5:00 PM Session B
Using OSINT in offensive operations
Sylvain Hajri, CEO, Epieos

Thursday, November 9, 2023

10:30-11:30 AM
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS

12:00-1:00 PM
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police


Track 4: Investigating Dark Web and Cryptocurrency

Transactions Traceback

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, November 7, 2023

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous use

Wednesday, November 8, 2023

9:10-10:00 AM
Deanonymization on Tor - New tactics and techniques law enforcement can employ to achieve their mission 
This talk looks at updates on previous research into the deanonymization of criminal actors on the dark web. It will highlight the challenges law enforcement is faced with and how to overcome these using the latest technology and techniques. Attendees will come away from this talk with new tactics to use in their current investigations to unmask their targets with a focus on criminal prosecution. 
Evan Blair, General Manager North America, Searchlight Cyber 

1:00-1:45 PM
Leveraging Corporate Data to Investigate Criminal Networks
Presented by Cobwebs Technologies

4:15-5:00 PM
Unveiling a Novel Scheme: Tracing the Trail of Tether Laundering on the Tron Blockchain
Mriganka Pattanaik, Co-Founder & CEO, Merkle Science


Track 5: Mobile Signal Intercept, 5G and Electronic

Surveillance Product Presentations

* Note: Sessions in this track are only open to Government Attendees, unless marked otherwise

Tuesday, November 7, 2023

(Open to all attendees)
9:00-10:00 AM
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies 

(Open to all attendees)
10:15-11:15 AM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Wednesday, November 8, 2023

2:00-2:45 PM
Empowering Network Management and Cybersecurity with Fiber Layer Switching
Presented by DiconFiberOptics

3:15-4:00 PM
Lawful Intercepts, Finishing Tools & Walking It Down
Join us to learn what a finishing tool is, how it works, and where it fits into your investigation.
Paul Troiani and Nicole Poser, Syndetix

4:15-5:00 PM Session A
Using Mobile Signals to Corroborate WEBINT Investigations

Presented by Cobwebs Technologies

4:15-5:00 PM Session B
Lawful Interception of IMS/VoLTE Roaming (S8HR)
With our S8HR solution, Utimaco provides a carrier-grade and ETSI/3GPP compliant LI solution. S8HR VoLTE roaming architecture has gained momentum with mobile operators as simpler to implement and offering the fastest time to market. With all mobile traffic traversing the home network, the S8HR has introduced limitations for lawful interception of visiting roamers. Utimaco provides a carrier-grade and ETSI/3GPP compliant LI solution for IMS/VoLTE in visited networks, that comes in two flavors - active (Utimaco LMISF) and passive (S8HR AP).
Presented by Utimaco

Thursday, November 9, 2023

8:30-9:30 AM
Forensic content derived metadata with powerful Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Come and experience how the combination of forensic wire speed, contend derived metadata generation and collection, combined with the powerful analytics of the Data Fusion platform, unleashes the intelligence hidden in the encrypted communications. Use cases and Live demo.
Presented by AREA


Advanced HI-Tech Cyber Investigation Training

Seminars Led by Law Enforcement Officers and

Ph.D Computer Scientists

30 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructor sessions include:

Tuesday, November 7, 2023

Seminar #1

Online Social Media and Internet Investigations 

Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.  

While Tor is the most common Darknet Service, it is not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.  The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.

Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective

11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators

13:30-14:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies

14:45-15:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know

16:00-17:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox

Seminar #2

(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, 
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00 AM
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

How it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.

10:15-11:15 AM
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

What data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.

11:30 AM-12:30 PM
WIFI, geolocation, and Mobile Data traces and tracking

A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.

1:30-2:30 PM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.

2:45-3:45 PM
Advanced Techniques in Tracing Suspects, and lateral problem solving

Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.

4:00-5:00 PM
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources

"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how. PART 2 on the final day with free tools to download and keep

Seminar #3

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous user

Seminar #4
9:00-10:00 AM

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Seminar #5
10:15-11:15 AM

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar #6
11:30 AM-12:30 PM

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategies

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.

When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.

Seminar # 7
1:30-2:30 PM

Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Law enforcement and intelligence agencies have massive data sets to pile through in order to find the evidence and information they need for their investigations. This seminar will address how AI is helping. The presentation will first provide a background/primer in at AI technologies -  what are the specific types of AI systems; how are they used in industry today; and what are the strengths and weaknesses of AI. The second half will focus on how ISS vendors are leveraging AI to increase agent efficiency and results in network data, OSINT, application profiling, location and image/language processing. Specific topics include: 

  • Overview of AI, machine learning (ML) and deep learning (DL) systems technology.
  • What AI capabilities are helping law enforcement and national security agencies (e.g., image / natural language processing, unstructured data analytics, predictive analytics).
  • How AI is powering OSINT analytics, mobile signal intercept, location, signaling intelligence, audio-visual forensics, encryption and surveillance products. 
  • Negative impacts of AI, such as clutter, fake news.
  • Future directions: generative AI, ChatGPT.

Seminar # 8
2:45-3:45 PM

Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Generative AI is a completely new technology that is greatly impacting all aspects of society, industry, politics, and culture. This seminar is going to look at generative AI from law enforcement and the intelligence community’s perspective. The first half of the presentation will focus on what the technology is, how it works, the training sets, what is good at, and the pitfalls. The second half will look at how LEAs and intelligence agencies can leverage the technology; how the technology is already making the lives of agents more difficult; and how generative AI might find itself working into LEA/ISS tools. Specific topics include: 

  • What are the key difference between traditional AI systems and generative AI platforms?
  • What are generative AI systems and large language models? How does the work? What are they good at? What can’t they do?
  • What are the key platform providers? Who is behind the technology? Where is it going?
  • What are the potential application, upside and downside of generative AI for LEAs and intel agencies?
  • How are the platforms evolving? What to expect going forward from a criminal use/misuse perspective (e.g., fake news, deepfakes, clutter generation)? What products and platforms are available to address this?