< Back to ISS World Programs

AGENDA : 4-6 NOVEMBER 2025

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception, and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism, and other criminal activities conducted over today's Telecommunications networks, the Internet, and Social Networks.

Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Gathering Product Presentations
Track 3: Social Network Monitoring, OSINT, Data Analytics and AI Product Presentations
Track 4: Mobile Signal Intercept and Electronic Surveillance Product Presentations
Track 5: Mobile Device and Network Forensics Product Presentations



ISS World North America 2025 - Agenda at a Glance


Special Training Seminars (29 Classroom Hours) Led by

Law Enforcement Officers and Ph.D Computer Scientists

Tuesday, November 4, 2025

Online Social Media and Internet Investigations 
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

A Real World Look at Dark Web Investigations
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
(6 Classroom Hours)
Presented by: Todd G. Shipley, CEO, Dark Intel and Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and Retired Investigator, Reno NV, Police Department

Understanding 2G/3G/4G/5G/6G Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 5G/5GA/6G LI for Investigators
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Thursday, November 6, 2025

Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
(1 Classroom Hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Lawful Interception - What, Why, When, Who and how to, and solutions.
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
(1 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Understanding the Implications of Online Social Media for OSINT During Critical Incidents
(1 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
(1 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

(Seminar Descriptions At The End of Agenda Posting)


Welcoming Remarks and Top Ten Challenges

Wednesday, November 5, 2025

8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies

ISS World North America Exhibit Hours:

Wednesday, November 5, 2025: 10:00 AM-6:00 PM
Thursday, November 6, 2025: 9:30 AM-1:00 PM


ISS World North America 2025 - Agenda at a Glance


Track 1: Lawful Interception and Criminal

Investigations Training

Tuesday, November 4, 2025

9:00 AM-5:00 PM
Online Social Media and Internet Investigations 
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

9:00-10:00 AM
Understanding 2G/3G/4G/5G/6G Infrastructure for Lawful Intercept

Dr. Jerry Lucas, President, TeleStrategies

10:15-11:15 AM
Understanding 5G/5GA/6G LI for Investigators

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

11:30 AM - 12:30 PM
Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

1:30-2:30 PM
Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Thursday, November 6, 2025

8:30-9:30 AM
Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence

Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

10:30-11:30 AM
Understanding the Implications of Online Social Media for OSINT During Critical Incidents

Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

12:00-1:00 PM
Generative AI: Implementation Experience and Lessons Learned for Law Enforcement and Intelligence Agencies

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies


Track 2: LEA, Defense and Intelligence

Gathering Product Presentations

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, November 4, 2025

2:45-3:45 PM
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated, AI enhanced Cyber Intelligence solutions.
A structured case-study
Presented by AREA

Wednesday, November 5, 2025

9:10-10:00 AM
How to Enhance your Investigation: AI-Driven Strategies for Analysing Encrypted Data at Scale
Learn how XCI’s advanced AI based analysis engine shaves time off investigations and enable non-technical investigators to perform advanced and deep forensic analysis in seconds. 
Mark Uldahl, CTO, XCI A/S 

11:00-11:40 AM
Solving the challenges of Data-Fusion and Validation: Communication Data, live Lawful Interception data, Mobile Forensics extraction and more in a single AI enhanced platform.
Use cases and demonstration.
Presented by AREA

1:00-1:45 PM
WhatsApp, Telegram, Facebook... how IPS helps you to locate most wanted targets with LI
Presented by IPS

2:45-3:45 PM
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated, AI enhanced Cyber Intelligence solutions.
A structured case-study
Presented by AREA

3:15-4:00 PM
New MOBILedit ULTRA: From the Latest Smartwatch Forensics to Powerful Phone Unlocking

Learn how to investigate smartwatches—a fast-growing and often overlooked source of crucial digital evidence. From health and location data to activity logs, smartwatches can reveal key insights that other devices simply don’t provide.
 Discover how MOBILedit, the only forensic tool focused on smartwatch data extraction, is helping investigators uncover vital information in real cases.
See how this capability is now part of the all-new MOBILedit Forensic ULTRA—an all-in-one solution for forensic labs, combining smartwatch, phone, and cloud data analysis, now empowered with powerful unlocking and security bypassing features.
Presented by Compelson

4:15-5:00 PM
Forensic content derived metadata with powerful AI enhanced Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Use cases and demonstration.
Presented by AREA


Track 3: Social Network Monitoring, OSINT, AI

and Data Analytics Product Presentations

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, November 4, 2025

4:00-5:00 PM
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPS

Wednesday, November 5, 2025

9:10-10:00 Session A
Introducing VIA: Media Intelligence Powered by CoAnalyst Generative AI 
This session unveils VIA, a groundbreaking media intelligence solution that redefines how analysts extract insights from visual content.
Built on the CoAnalyst framework, VIA leverages Generative AI to unlock significantly deeper layers of intelligence from images and videos.
It empowers thorough analysis and contextualization of media derived from OSINT, evidentiary data, and digital forensics - through a powerful, intuitive interface.
Attendees will explore this cutting-edge GenAI platform and discover how to integrate and adapt it to supercharge their digital intelligence capabilities.
Presented by Penlink

9:10-10:00 AM Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception
Presented by IPS 

11:00-11:40 AM Session A
Deceptio.ai, Detecting Deception at Scale for Actionable Intelligence
Presented by Deceptio

11:00-11:40 AM Session B
Introducing VIA: Media Intelligence Powered by CoAnalyst Generative AI 
This session unveils VIA, a groundbreaking media intelligence solution that redefines how analysts extract insights from visual content.
Built on the CoAnalyst framework, VIA leverages Generative AI to unlock significantly deeper layers of intelligence from images and videos.
It empowers thorough analysis and contextualization of media derived from OSINT, evidentiary data, and digital forensics - through a powerful, intuitive interface.
Attendees will explore this cutting-edge GenAI platform and discover how to integrate and adapt it to supercharge their digital intelligence capabilities.
Presented by Penlink

1:00-1:45 PM Session A
From Data to Decision: CoAnalyst and the Future of Prompt-Driven Intelligence
In this session, we explore how CoAnalyst leverages the power of generative AI and prompt-driven workflows to transform OSINT and digital forensics. Learn how the analyst's role is evolving — from data gatherer to insight navigator — empowered by intuitive AI tools that accelerate decision-making, enhance investigative depth, and redefine what digital intelligence can achieve.
Presented by Penlink

1:00-1:45 PM Session B
Beyond Breaches: Leveraging Compromised Credentials in OSINT and DarkINT Investigations 
This session explores how breached records and other datasets with compromised PII gathered from the Deep and Dark Web can significantly enhance corporate and law enforcement investigations. We will begin by exploring the various types of breached datasets from hacked databases and combolists to stealer logs and scrapes. We will then provide insights into where these datasets can be located and highlight the critical information that can be extracted from them. Finally, we will demonstrate the practical application of compromised records in a live investigation in which we track down one of the FBI’s Ten Most Wanted individuals. 
Matteo Tomasini, Founder & CTO at District 4 Labs

2:00-2:45 PM Session A
POS – Persona Orchestrator Sandbox
Presented by ESPY

2:00-2:45 PM Session B
From Digital Trail to Identity: Leveraging Location Data and Telegram for Bad Actors Identification
Presented by PenLink

3:15-4:00 PM Session A
EMPOWER CITIZENS: AI Chatbot for amplified Suspicious Activity Reporting (SAR)
Presented by Vigiliti

4:15-5:00 PM Session B
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case.
Presented by IPS

Thursday, November 6, 2025

8:30-9:30 AM
Lawful Interception - What, Why, When, Who and how to, and solutions.
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

10:30-11:30 AM
Deceptio.ai, Detecting Deception at Scale for Actionable Intelligence
Presented by Deceptio

12:00-1:00 PM
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, UK Police


Track 4: Mobile Signal Intercept and Electronic

Surveillance Product Presentations

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Thursday, November 6, 2025

08:30-09:30 AM
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance.
Use cases and demonstration.
Presented by AREA

10:30-11:30 AM
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform.
Use cases and demonstration.
Presented by AREA


Track 5: Mobile Device and Network Forensics Product

Presentations

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.


Advanced HI-Tech Cyber Investigation Training

Seminars Led by Law Enforcement Officers and

Ph.D Computer Scientists

29 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructor sessions include:

Tuesday, November 4, 2025

Seminar #1
9:00 AM-5:00 PM

Online Social Media and Internet Investigations 

Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.  

While Tor is the most common Darknet Service, it is not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.  The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.

Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective

11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators

13:30-14:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies

14:45-15:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know

16:00-17:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox

Seminar #2
9:00 AM-5:00 PM

(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, 
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00 AM
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

How it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.

10:15-11:15 AM
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

What data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.

11:30 AM-12:30 PM
WIFI, geolocation, and Mobile Data traces and tracking

A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.

1:30-2:30 PM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.

2:45-3:45 PM
Advanced Techniques in Tracing Suspects, and lateral problem solving

Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.

4:00-5:00 PM
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources

"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how. PART 2 on the final day with free tools to download and keep

Seminar #3
9:00 AM-5:00 PM

(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
A Real World Look at Dark Web Investigations

Presented by: Todd G. Shipley, CEO, Dark Intel, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

This intensive one-day training introduces law enforcement investigators to the knowledge, tradecraft, and operational safeguards required to navigate and analyze the Dark Web. Participants will progress from foundational understanding to advanced investigative techniques, including covert access, digital currency usage, and deanonymization strategies. Delivered with tactical clarity and real-world examples, this seminar empowers professionals to engage hidden environments safely, interpret technological artifacts, and build actionable intelligence. This is a Law Enforcement–Only training: investigative methodology, covert tactics, and operational tradecraft will be discussed in detail throughout.

9:00-10:00 AM
Unmasking the Dark Web: Myth vs Reality
Explore what the Dark Web really is and the media myths. Dispel common myths about anonymity and illicit trade, understand the layered internet (Surface, Deep, Dark), and learn why Dark Web familiarity matters for investigators.

10:15-11:15 AM
Inside TOR: Tracing the Onion
Examine the TOR network’s architecture, access methods, and Tor’s role in obfuscating criminals’ identities. Learn forensic artifacts generated during TOR usage, how exit nodes behave, and what investigators can observe, log, and preserve legally.

11:30-12:30 PM
Bitcoin & Beyond: How Digital Money Powers Hidden Markets
Understand how cryptocurrency operates within Dark Web marketplaces—beyond tracing transactions. Learn about payment mechanics, vendor trust systems, wallet practices, and common misconceptions about anonymity.

1:30-2:30 PM
Fieldcraft in the Shadows: Safely Engaging the Dark Web
Learn secure, covert engagement techniques for accessing the Dark Web, its forums and markets. Topics include persona development, OPSEC protocols, and other best practices.

2:45-3:45 PM
Web Bugs & Covert Tech: Tracing the Invisible
Dive into investigative technologies including web bugs, tracking pixels, browser fingerprinting, and covert probes. Learn how these tools can be used ethically to reveal suspect behavior, location, and activity across hidden platforms. *

4:00-5:00 PM
Piercing the Veil: Identifying Anonymous Actors
Learn how covert actors slip up on the Dark Web and are uncovered using real-world investigative techniques. See how investigations have exposed hidden actors across encrypted channels and from fragments of digital behavior.

Seminar #4
9:00-10:00 AM

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Seminar #5
10:15-11:15 AM

Understanding 5G/5GA/6G LI for Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar #6
11:30 AM -12:30 PM

Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Law enforcement and intelligence agencies have massive data sets to pile through in order to find the evidence and information they need for their investigations. This seminar will address how AI is helping. The presentation will first provide a background/primer in at AI technologies -  what are the specific types of AI systems; how are they used in industry today; and what are the strengths and weaknesses of AI. The second half will focus on how ISS vendors are leveraging AI to increase agent efficiency and results in network data, OSINT, application profiling, location and image/language processing. Specific topics include: 

      • Overview of AI, machine learning (ML) and deep learning (DL) systems technology.
      • What AI capabilities are helping law enforcement and national security agencies (e.g., image / natural language processing, unstructured data analytics, predictive analytics).
      • How AI is powering OSINT analytics, mobile signal intercept, location, signaling intelligence, audio-visual forensics, encryption and surveillance products. 
      • Negative impacts of AI, such as clutter, fake news.
      • Future directions: generative AI, ChatGPT.

Seminar # 7
1:30-2:30 PM

Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Generative AI is a completely new technology that is greatly impacting all aspects of society, industry, politics, and culture. This seminar is going to look at generative AI from law enforcement and the intelligence community’s perspective. The first half of the presentation will focus on what the technology is, how it works, the training sets, what is good at, and the pitfalls. The second half will look at how LEAs and intelligence agencies can leverage the technology; how the technology is already making the lives of agents more difficult; and how generative AI might find itself working into LEA/ISS tools. Specific topics include: 

  • What are the key difference between traditional AI systems and generative AI platforms?
  • What are generative AI systems and large language models? How does the work? What are they good at? What can’t they do?
  • What are the key platform providers? Who is behind the technology? Where is it going?
  • What are the potential application, upside and downside of generative AI for LEAs and intel agencies?
  • How are the platforms evolving? What to expect going forward from a criminal use/misuse perspective (e.g., fake news, deepfakes, clutter generation)? What products and platforms are available to address this?

Thursday, November 6, 2025

Seminar #8
8:30-9:30 AM

Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Seminar #9
8:30-9:30 AM

(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Lawful Interception - What, Why, When, Who and how to, and solutions.

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Seminar #10
10:30-11:30 AM

Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Seminar #11
12:00-1:00 PM

(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations

Presented by:  Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police