ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception, and cybercrime investigations.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism, and other criminal activities conducted over today's Telecommunications networks, the Internet, and Social Networks.
Track 1: Social Media Intelligence, OSINT and AI Product Presentations
Track 2: LEA, Defense and Intelligence Gathering Product Presentations
Track 3: Mobile Signal Intercept and Electronic Surveillance Product Presentations
Track 4: DarkWeb Monitoring and Cryptocurrency Transaction Product Presentations
Track 5: Device and Digital Forensics Network Intelligence Product Presentations
ISS World North America 2025 - Agenda at a Glance
Online Social Media and Internet Investigations
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
A Real World Look at Dark Web Investigations
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
(6 Classroom Hours)
Presented by: Todd G. Shipley, CEO, Dark Intel and Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and Retired Investigator, Reno NV, Police Department
Understanding 2G/3G/4G/5G/6G Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies
AI Technology Basics and LEA Use Cases
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI Use-cases and Capabilities for Law Enforcement and Intelligence Agencies
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI Deployment Challenges, Considerations and Approaches
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators
(1 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
(1 Classroom Hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Generative AI Use-cases and Capabilities for Law Enforcement and Intelligence Agencies
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
(1 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Generative AI Deployment Challenges, Considerations and Approaches
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
(Seminar Descriptions At The End of Agenda Posting)
Welcoming Remarks and Top Ten Challenges
Wednesday, November 5, 2025
8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World North America Exhibit Hours:
Wednesday, November 5, 2025: 10:00 AM-6:00 PM
Thursday, November 6, 2025: 9:30 AM-1:00 PM
ISS World North America 2025 - Agenda at a Glance
Track 1: Social Media Intelligence, OSINT and AI
Product Presentations
* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, November 4, 2025
1:30-2:30 PM
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case.
Presented by IPS4:00-5:00 PM
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPSWednesday, November 5, 2025
9:10-10:00 Session A
Artificial Intelligence, Real Prejudice: When LE Gets Catfished by Code
Large Language Models (LLMs) inherit biases from their training data, and their use in law enforcement can reinforce existing prejudices or introduce new ones—raising serious ethical and legal concerns. In this presentation, we’ll examine the challenges of integrating AI into investigations and offer practical strategies for using it to enhance, rather than compromise, investigative work.
Presented by Penlink9:10-10:00 AM Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception
Presented by IPS11:00-11:40 AM Session A
Deceptio.ai, Detecting Deception at Scale for Actionable Intelligence
Presented by Deceptio1:00-1:45 PM Session A
Generative AI for Threat Analysis at Large-Scale Events
Ensuring public safety at large-scale events requires advanced preparation and real-time intelligence. The 2025 Super Bowl in New Orleans exemplified how Generative AI can expedite threat analysis by processing vast amounts of social media data to identify security risks, uncover threat actors’ identities, and provide law enforcement with actionable leads. Beyond real-time threat detection, AI-powered intelligence played a critical role in disrupting human trafficking networks, a known risk at major events. This case study underscores the growing role of Generative AI—through the lens of Penlink’s Tangles—in large-scale event security, demonstrating its impact on crime forecasting, investigative support, and proactive threat mitigation.
Presented by Penlink1:00-1:45 PM Session B
Beyond Breaches: Leveraging Compromised Credentials in OSINT and DarkINT Investigations
This session explores how breached records and other datasets with compromised PII gathered from the Deep and Dark Web can significantly enhance corporate and law enforcement investigations. We will begin by exploring the various types of breached datasets from hacked databases and combolists to stealer logs and scrapes. We will then provide insights into where these datasets can be located and highlight the critical information that can be extracted from them. Finally, we will demonstrate the practical application of compromised records in a live investigation in which we track down one of the FBI’s Ten Most Wanted individuals.
Matteo Tomasini, Founder & CTO at District 4 Labs2:00-2:45 PM Session A
POS – Persona Orchestrator Sandbox
Presented by CloudCode2:00-2:45 PM Session B
Generative AI for Threat Analysis at Large-Scale Events
Ensuring public safety at large-scale events requires advanced preparation and real-time intelligence. The 2025 Super Bowl in New Orleans exemplified how Generative AI can expedite threat analysis by processing vast amounts of social media data to identify security risks, uncover threat actors’ identities, and provide law enforcement with actionable leads. Beyond real-time threat detection, AI-powered intelligence played a critical role in disrupting human trafficking networks, a known risk at major events. This case study underscores the growing role of Generative AI—through the lens of Penlink’s Tangles—in large-scale event security, demonstrating its impact on crime forecasting, investigative support, and proactive threat mitigation.
Presented by Penlink2:00-2:45 PM Session C
AI to Optimize Your Risk Assessments and Retargeting
Matthew Taylor, Evo Tech3:15-4:00 PM Session A
EMPOWER CITIZENS: AI Chatbot for amplified Suspicious Activity Reporting (SAR)
Presented by Vigiliti3:15-4:00 PM Session B
Beyond Imaging: Zero-Click Acquisition of 25+, Automated Data Recovery, Unknown RAID Reassembly, and End-to-End Automation
Yulia Samoteykina, Director of Marketing, Atola3:15-4:00 PM Session C
Unlocking the Power of Cyber Threat Intelligence (CTI): Strategies, Tools and Real-World Impact
Presented by Resecurity4:15-5:00 PM
TALINO + PALADIN: The Gold Standard in Custom Forensic Workstations
Jason Roslewicz, SumuriThursday, November 6, 2025
10:30-11:30 AM
Deceptio.ai, Detecting Deception at Scale for Actionable Intelligence
Presented by DeceptioAdditional Track 1 Sessions to be Scheduled
Track 2: LEA, Defense and Intelligence
Gathering Product Presentations* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, November 4, 2025
2:45-3:45 PM
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated, AI enhanced Cyber Intelligence solutions.
A structured case-study
Presented by AREA
Wednesday, November 5, 2025
9:10-10:00 AM
How to Enhance your Investigation: AI-Driven Strategies for Analysing Encrypted Data at Scale
Learn how XCI’s advanced AI based analysis engine shaves time off investigations and enable non-technical investigators to perform advanced and deep forensic analysis in seconds.
Mark Uldahl, CTO, XCI A/S11:00-11:40 AM
Solving the challenges of Data-Fusion and Validation: Communication Data, live Lawful Interception data, Mobile Forensics extraction and more in a single AI enhanced platform.
Use cases and demonstration.
Presented by AREA1:00-1:45 PM
WhatsApp, Telegram, Facebook... how IPS helps you to locate most wanted targets with LI
Presented by IPS2:00-2:45 PM
EMPOWER CITIZENS: AI Chatbot for Amplified Suspicious Activity Reporting (SAR)
Presented by Vigiliti2:45-3:45 PM
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated, AI enhanced Cyber Intelligence solutions.
A structured case-study
Presented by AREA3:15-4:00 PM
New MOBILedit ULTRA: From the Latest Smartwatch Forensics to Powerful Phone Unlocking
Learn how to investigate smartwatches—a fast-growing and often overlooked source of crucial digital evidence. From health and location data to activity logs, smartwatches can reveal key insights that other devices simply don’t provide.
Discover how MOBILedit, the only forensic tool focused on smartwatch data extraction, is helping investigators uncover vital information in real cases.
See how this capability is now part of the all-new MOBILedit Forensic ULTRA—an all-in-one solution for forensic labs, combining smartwatch, phone, and cloud data analysis, now empowered with powerful unlocking and security bypassing features.
Presented by Compelson4:15-5:00 PM
Forensic content derived metadata with powerful AI enhanced Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Use cases and demonstration.
Presented by AREAAdditional Track 2 Sessions to be Scheduled
Track 3: Mobile Signal Intercept and Electronic
Surveillance Product Presentations
* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, November 4, 2025
9:00-10:00 AM
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies10:15-11:15 AM
Understanding 5G/5GA/6G LI for Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategiesThursday, November 6, 2025
08:30-09:30 AM
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance.
Use cases and demonstration.
Presented by AREA10:30-11:30 AM
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform.
Use cases and demonstration.
Presented by AREAAdditional Track 3 Sessions to be Scheduled
Track 4: DarkWeb Monitoring and Cryptocurrency
Transaction Product Training* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, November 4, 2025
9:00-10:00 AM
Unmasking the Dark Web: Myth vs Reality
Explore what the Dark Web really is and the media myths. Dispel common myths about anonymity and illicit trade, understand the layered internet (Surface, Deep, Dark), and learn why Dark Web familiarity matters for investigators.
Todd G. Shipley, CEO, Dark Intel, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department
10:15-11:15 AM
Inside TOR: Tracing the Onion
Examine the TOR network’s architecture, access methods, and Tor’s role in obfuscating criminals’ identities. Learn forensic artifacts generated during TOR usage, how exit nodes behave, and what investigators can observe, log, and preserve legally.
Todd G. Shipley, CEO, Dark Intel, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department
11:30-12:30 PM
Bitcoin & Beyond: How Digital Money Powers Hidden Markets
Understand how cryptocurrency operates within Dark Web marketplaces—beyond tracing transactions. Learn about payment mechanics, vendor trust systems, wallet practices, and common misconceptions about anonymity.
Todd G. Shipley, CEO, Dark Intel, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department
1:30-2:30 PM
Fieldcraft in the Shadows: Safely Engaging the Dark Web
Learn secure, covert engagement techniques for accessing the Dark Web, its forums and markets. Topics include persona development, OPSEC protocols, and other best practices.
Todd G. Shipley, CEO, Dark Intel, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department
2:45-3:45 PM
Web Bugs & Covert Tech: Tracing the Invisible
Dive into investigative technologies including web bugs, tracking pixels, browser fingerprinting, and covert probes. Learn how these tools can be used ethically to reveal suspect behavior, location, and activity across hidden platforms.
Todd G. Shipley, CEO, Dark Intel, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department
4:00-5:00 PM
Piercing the Veil: Identifying Anonymous Actors
Learn how covert actors slip up on the Dark Web and are uncovered using real-world investigative techniques. See how investigations have exposed hidden actors across encrypted channels and from fragments of digital behavior.
Todd G. Shipley, CEO, Dark Intel, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police DepartmentWednesday, November 5, 2025
11:00-11:40 AM
Dark Web to Real World: Practical Deanonymization Techniques
Learn how investigators can pierce the veil of anonymity on the dark web. While actors rely on Tor, VPNs, and pseudonyms to conceal their identities, mistakes, leaks, and behavioral fingerprints often create openings to trace activity back to real-world individuals.This session will cover three proven methods:
- Leaked Data & Reuse – How compromised credentials, stealer logs, and repeated use of emails, usernames, or IPs are often enough to unmask seemingly anonymous users.
- Cross-Platform OSINT Mapping – Using pivots across platforms to uncover behavioral patterns, stylistic correlations, infrastructure misconfigurations, and accidental IP leaks.
- Timing & Activity Correlation – Aligning recurring login patterns and activity timelines with external data to directly identify users behind anonymous accounts.
We’ll conclude with a live case demonstration, showing step-by-step how these methods, when combined, can reveal the real identity of an anonymous actor.
Presented by IntelHawk
4:15-5:00 PM
Dark Web to Real World: Practical Deanonymization Techniques
Learn how investigators can pierce the veil of anonymity on the dark web. While actors rely on Tor, VPNs, and pseudonyms to conceal their identities, mistakes, leaks, and behavioral fingerprints often create openings to trace activity back to real-world individuals.This session will cover three proven methods:
- Leaked Data & Reuse – How compromised credentials, stealer logs, and repeated use of emails, usernames, or IPs are often enough to unmask seemingly anonymous users.
- Cross-Platform OSINT Mapping – Using pivots across platforms to uncover behavioral patterns, stylistic correlations, infrastructure misconfigurations, and accidental IP leaks.
- Timing & Activity Correlation – Aligning recurring login patterns and activity timelines with external data to directly identify users behind anonymous accounts.
We’ll conclude with a live case demonstration, showing step-by-step how these methods, when combined, can reveal the real identity of an anonymous actor.
Presented by IntelHawk
Additional Track 4 Sessions to be Scheduled
Track 5: Device and Digital Forensics Network
Intelligence Product Presentations* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Wednesday, November 5, 2025
2:00-2:45 PM
AI to Optimize Your Risk Assessments and Retargeting
Matthew Taylor, Evo Tech3:15-4:00 PM
Beyond Imaging: Zero-Click Acquisition of 25+, Automated Data Recovery, Unknown RAID Reassembly, and End-to-End Automation
Yulia Samoteykina, Director of Marketing, Atola3:15-4:00 PM
New MOBILedit ULTRA: From the Latest Smartwatch Forensics to Powerful Phone Unlocking
Learn how to investigate smartwatches—a fast-growing and often overlooked source of crucial digital evidence. From health and location data to activity logs, smartwatches can reveal key insights that other devices simply don’t provide.
Discover how MOBILedit, the only forensic tool focused on smartwatch data extraction, is helping investigators uncover vital information in real cases.
See how this capability is now part of the all-new MOBILedit Forensic ULTRA—an all-in-one solution for forensic labs, combining smartwatch, phone, and cloud data analysis, now empowered with powerful unlocking and security bypassing features.
Presented by Compelson4:15-5:00 PM
TALINO + PALADIN: The Gold Standard in Custom Forensic Workstations
Jason Roslewicz, Sumuri4:15-5:00 PM
Forensic content derived metadata with powerful AI enhanced Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Use cases and demonstration.
Presented by AREATrack 5 Sessions to be Announced
Advanced HI-Tech Cyber Investigation Training
Seminars Led by Law Enforcement Officers and
Ph.D Computer Scientists29 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructor sessions include:
Tuesday, November 4, 2025
Seminar #1
9:00 AM-5:00 PM
Online Social Media and Internet Investigations
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.
While Tor is the most common Darknet Service, it is not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools. The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.
Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.
9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators13:30-14:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies14:45-15:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know16:00-17:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox
Seminar #2
9:00 AM-5:00 PM
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
A Real World Look at Dark Web Investigations
Presented by: Todd G. Shipley, CEO, Dark Intel, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police DepartmentThis intensive one-day training introduces law enforcement investigators to the knowledge, tradecraft, and operational safeguards required to navigate and analyze the Dark Web. Participants will progress from foundational understanding to advanced investigative techniques, including covert access, digital currency usage, and deanonymization strategies. Delivered with tactical clarity and real-world examples, this seminar empowers professionals to engage hidden environments safely, interpret technological artifacts, and build actionable intelligence. This is a Law Enforcement–Only training: investigative methodology, covert tactics, and operational tradecraft will be discussed in detail throughout.
9:00-10:00 AM
Unmasking the Dark Web: Myth vs Reality
Explore what the Dark Web really is and the media myths. Dispel common myths about anonymity and illicit trade, understand the layered internet (Surface, Deep, Dark), and learn why Dark Web familiarity matters for investigators.
10:15-11:15 AM
Inside TOR: Tracing the Onion
Examine the TOR network’s architecture, access methods, and Tor’s role in obfuscating criminals’ identities. Learn forensic artifacts generated during TOR usage, how exit nodes behave, and what investigators can observe, log, and preserve legally.
11:30-12:30 PM
Bitcoin & Beyond: How Digital Money Powers Hidden Markets
Understand how cryptocurrency operates within Dark Web marketplaces—beyond tracing transactions. Learn about payment mechanics, vendor trust systems, wallet practices, and common misconceptions about anonymity.
1:30-2:30 PM
Fieldcraft in the Shadows: Safely Engaging the Dark Web
Learn secure, covert engagement techniques for accessing the Dark Web, its forums and markets. Topics include persona development, OPSEC protocols, and other best practices.
2:45-3:45 PM
Web Bugs & Covert Tech: Tracing the Invisible
Dive into investigative technologies including web bugs, tracking pixels, browser fingerprinting, and covert probes. Learn how these tools can be used ethically to reveal suspect behavior, location, and activity across hidden platforms. *
4:00-5:00 PM
Piercing the Veil: Identifying Anonymous Actors
Learn how covert actors slip up on the Dark Web and are uncovered using real-world investigative techniques. See how investigations have exposed hidden actors across encrypted channels and from fragments of digital behavior.Seminar #3
9:00-10:00 AMUnderstanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategiesSeminar #4
11:30 AM -12:30 PMAI Technology Basics and LEA Use Cases
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesThis session gives LEA, intelligence and other practitioners a primer on AI technologies. Topics covered include how AI technology is being leveraged in our industry (e.g., image recognition, classifying unstructured data, natural language processing, document summarization, and more); traditional AI approaches (heuristics, indicators); basics of machine-learning systems (models, training, neural-networking); generative AI systems (OpenAI, Anthropic, Grok, others); the strengths and weaknesses of each AI model; and how the LEA/IA/ISS vendor communities are leveraging AI to increase the efficiency and accuracy of their network data, OSINT, location, image and natural language operations/applications.
Seminar # 5
1:30-2:30 PMGenerative AI Use-cases and Capabilities for Law Enforcement and Intelligence Agencies
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesGenerative AI (GAI) is revolutionizing network data and OSINT analytics – with the end-goal of enabling investigators to effortlessly engage, analyze, visualize large datasets and “connect the dots” that would traditionally require enormous manual effort from teams of analysts and IT personnel. This session will cover the key issues related to GAI platforms: how they are/can be used; what models are available; who are the key players; how to integrate GAI systems with your datasets (RAG); dealing with accuracy and hallucinations; data embeddings and citations; integration standards; data orchestration and more
Seminar #6
2:45-3:15 PMGenerative AI Deployment Challenges, Considerations and Approaches (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThis session will cover the key AI implementation challenges facing LEAs/IAs looking to incorporate Generative AI platforms in their operations. Topics covered include hosting platform options; small/local model options; operational costs; implementation requirements; security; regulatory considerations; aligning and fine-tuning models; optimizing agentic AI platforms for ISS workflows; and key ongoing development advances to watch.
Thursday, November 6, 2025
Seminar #7
8:30-9:30Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #8
10:30-11:30 AMPush Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #9
10:30-11:30 AMGenerative AI Use-cases and Capabilities for Law Enforcement and Intelligence Agencies (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesGenerative AI (GAI) is revolutionizing network data and OSINT analytics – with the end-goal of enabling investigators to effortlessly engage, analyze, visualize large datasets and “connect the dots” that would traditionally require enormous manual effort from teams of analysts and IT personnel. This session will cover the key issues related to GAI platforms: how they are/can be used; what models are available; who are the key players; how to integrate GAI systems with your datasets (RAG); dealing with accuracy and hallucinations; data embeddings and citations; integration standards; data orchestration and more
Seminar #10
12:00-1:00 PMUnderstanding the Implications of Online Social Media for OSINT During Critical Incidents
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #11
12:00-1:00 PMGenerative AI Deployment Challenges, Considerations and Approaches (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThis session will cover the key AI implementation challenges facing LEAs/IAs looking to incorporate Generative AI platforms in their operations. Topics covered include hosting platform options; small/local model options; operational costs; implementation requirements; security; regulatory considerations; aligning and fine-tuning models; optimizing agentic AI platforms for ISS workflows; and key ongoing development advances to watch.