ISS World Europe is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
Track 6: Mobile Signal Intercept Training and Product Presentations
Track 7: Electronic Surveillance Training and Product Presentations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Training
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
Training Seminars Led by Law Enforcement Officers and Ph.D., Computer Scientists
20 classroom training hours, presented by Law Enforcement Officers and Ph.D. Scientists
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(6 classroom hours)Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(1 classroom hours)Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(3 classroom hours)Vladimir Vesely (Ph.D., Computer Science) Researcher, Brno University of Technology
(3 classroom hours)
Tuesday, 4 June 2024
Seminar #1
08:30-15:05Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-15:05(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UKPolice
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
Seminar #3
08:30-09:20Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Seminar #4
09:25-10:15Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesCellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone. (Full description below Track 9)
Seminar #5
10:35-11:25Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesSeminar #6
11:30-12:20Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesThursday, 6 June 2024
Seminar #7
13:00-14:00(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PolicePre-Conference Sessions Description At The End of Agenda PostinG
Welcoming Remarks and Top Ten Challenges
Wednesday, 5 June 2024
8:15-8:30 Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Europe has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World Europe Exhibit Hours:
Wednesday, 5 June 2024
10:00-18:15
Thursday, 6 June 2024
10:00 -13:00
Track 1: Lawful Interception and Criminal Investigation Training
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
Tuesday, 4 June 2024
14:45-15:05
Simplifying lawful requests: how CSPs can automate, secure and speed their responses to criminal investigations
Presented by Subtonomy15:25-16:05 Session B
Accelerating investigation workflows with specially designed IT-forensic laboratories
incl. Cyfluene, fake news and campaign detection
Presented by mh-service GmbH15:25-16:05 Session C
AI-enabled Government Intelligence for multilingual content using Language Weaver Machine Translation
Claudiu Stiube, Senior Principal Solutions Consultant, RWS16:10-17:00
ETSI/3GPP LI/LD Standards Update
Martin Kissel, ETSI TC LI Chairman and Coordinator Lawful Interception, Telefónica Germany
Carmine Rizzo, ETSI TC LI Technical Officer and 3GPP SA3-LI Secretary, ETSI
Wednesday, 5 June 2024
13:00-13:40
5G LI Technical Compliance Challenges from a Mobile Operator Industry Perspective
Alex Leadbeater, Technical Security Director GSMA, Chair 3GPP SA3-LI / ETSI TC Cyber
13:45-14:30 Session B
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Presented by Phonexia15:00-15:40 Session A
Analyzing Social Networks
BREVIS and OSINT Plugin for i2 Analyst Notebook. Analyze Social Networks – Twitter, Facebook, Linkedin, YouTube, VK, Instagram, TikTok, Telegram, WhatsApp and Pipl.
Presented by MKCVI15:00-15:40 Session B
Interception Challenges on VoLTE Network for LEA's
Serkan Altınışık, General Director, Interprobe & Mustafa Göksu Gürkaş, Director of Software Development, Interprobe15:00-15:40 Session C
How to Detect Fake News
This talk will delve into the challenges posed by digital manipulation techniques. This informative session highlights crucial detection methods needed to identify and mitigate the impact of bots, fake news, and deep fakes in shaping public perception. Gain insight into the detailed overview of the evolving landscape of digital deception, emphasizing its implications on the integrity of information in today's interconnected world.
Presented by Cyabra16:30-17:15 Session A
Unlocking Hidden Insights: Exploring Metadata Extraction against Encrypted Data
Introducing IP metadata extraction and analysis—a transformative solution for tackling new investigative challenges head-on.
Presented by RCS S.p.A.16:30-17:15 Session B
Using OSINT in offensive operations’
Sylvain HAJRI, EpieosThursday, 6 June 2024
9:15-10:00 Session A
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
In this talk, we shall discuss various security mechanisms used in WiFi and Bluetooth networks and how to abuse them to obtain mission-critical intel. Apart from explaining all principles, we will demonstrate them (hopefully live) on our tactical device! Starting with an access point and client scans, we will continue with client targetted jamming and total Denial-of-Service of the whole network that may even result in authentication handshake capture. This handshake contains information to recover the WiFi password to access the targeted network. Once inside the network, we will show essential hacking tools to conduct IP-level reconnaissance. But we will not limit ourselves to WiFi and demonstrate how Bluetooth can be leveraged to notify you about a person's presence or exploit various IoT devices.
Vladimir Vesely (Ph.D., Computer Science) and Jan Pluskal, Researchers, Brno University of Technology9:15-10:00 Session B
Cost effective network monitoring systems
As internet traffic continues to double every two years and as the data rates across the networks increase from 10G to 100G and even 400+ Gbps, how can you cost effectively access the droplets of information buried in the sea of data traversing your monitored networks. How do you architect the collection system so that you don’t have to rip out the entire monitoring system and replace it in the future when 100 Gbps networks migrate to 400, 800 Gbps or even higher rates? Come and learn how an optical circuit switch based network monitoring system can provide a future-proof front end to your network monitoring systems while also providing up to a 10 times reduction in CAPEX outlay, an 8 times reduction in rack space and over 100 times reduction in power and cooling.
Mike Bitting (Worldwide VP, HUBER+SUHNER Polatis), Huber+Suhner11:00-11:40 Session A
From Academia to Industry: Dealing with Cryptography in Real Life
It is a common thought that cryptography is so theoretical to understand, and so technical to defeat, that it can’t be done without enormous effort and technical prowess only found in State Agencies. That is not completely true. In fact, there are many cryptographic problems developers and investigators routinely encounter that they think are insurmountable, but are not. Instead, with a systematic cryptographic approach, these issues can be overcome with modest effort and cost-effective tools.There is a need to use mechanisms that include algorithms, protocols and primitives in accordance with international standards such as ISO and FIPS, with a well-planned development, comprehensive testing and validation process. On the other hand, the strong analysis mechanism to obtain the decryption key is important for investigators. Forensics, reverse engineering, binary analysis, as well as the use of cryptanalysis attacks with AI-based dictionaries or rainbow tables are also used. For these reasons, tools that can operate all these mechanisms systematically that can manage them from a single point make it easier for investigators to deal with real-life use cases.
Pınar Gürkan Balıkçıoğlu (Ph.D. Cryptography), Chief Cryptography Officer, Interprobe & Adjunct Professor, Middle East Technical University, Interprobe11:00-11:40 Session B
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police11:45-12:30 Session A
Trending Topics in Cryptocurrency Forensics
Bitcoin, Ethereum and other cryptocurrencies are becoming mainstream for financial interactions and standard tools when conducting cybercrime such as scams, frauds, ransomware, darknet markets, sextortion, etc. LEAs also adapted to a new situation, and many investigators are already familiar with cryptocurrency basics and how to trace transactions on publicly available blockchain explorers. This session aims to extend the knowledge of participants about more advanced topics such as: a) address clustering techniques and their applicability to various cryptocurrencies; b) monitoring of cryptocurrency networks and their peers with the help of network intelligence; c) geolocating cryptocurrency transaction with IP address or originator; d) overcoming obfuscation of transactions entering and leaving mixers; e) correlating activities on darkweb with blockchain events. Each subtopic will be thoroughly explained, including currently existing methods and tools for addressing associated challenges.
Vladimir Vesely (Ph.D., Computer Science) and Jan Pluskal, Researchers, Brno University of Technology14:00-14:40
TITLE TBA
Vladimir Vesely (Ph.D., Computer Science) and Jan Pluskal, Researchers, Brno University of Technology
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 4 June 2024
08:30-09:20 Session A
Reinventing DPI through ML: deanon VPN, Cryptotransactions, etc.
New generation of DPI solution based on Machine learning algorithms. Crypto deanonymization, User Activities detection in any web service and App. Case studies on mass deanonymization in the crypto industry (wallets holders, miners, transactions, exchanges), messengers (calls, group members, chat relating). A Capability to work with VPN, obfuscation, frequent updates.
Artem Rychko, Head of Data Science, 7Generation08:30-09:20 Session B
Enhancing Situational Awareness in Control Rooms
A deep dive into advanced tools for managing crowds, analyzing density, and exploring zones to handle demonstrations proactively and effectively.
Presented by Intersec09:25-10:15 Session A
ORCA - rule the ocean of metadata
Presenting VASTech’s solution for fusing telecommunications, IP, and location data from fibre cables, mobile networks, and satellite signals.
Using metadata to answer the important questions of Who, What, Where, and When?
Presented by VASTech09:25-10:15 Session B
From Data Deluge to Discovery: Leveraging AI to Accelerate Investigations
Lawful intercept and data fusion can provide tremendous investigative potential, but unlocking their full value requires advanced tools. This session explores the rising role AI can play in uncovering hidden patterns and anomalies within your data. Discover how AI can accelerate investigations and improve resourcing, while maintaining compliance with new regulations, like the EU AI Act. The session concludes with a live demo showcasing how AI enrichments extract context-rich insights faster.
Sean Thibert (Product Manager, AI Solutions), JSI09:25-10:15 Session C
Octostar: introducing the modern, APP-based Operating System for all-int, all-data Investigations
Presented by Octostar
10:35-11:25 Session A
Discover the cutting-edge, all-phone compatible, cost-effective and successful agent.
Presented by Movia10:35-11:25 Session B
Leveraging BORDERINT to Safeguard Your National Borders
Presented by Rayzone Group10:35-11:25 Session C
Supercharged IPDR extraction and analysis - Encrypted IP Applications and Advanced Internet Activity Analytics
Presented by DNI11:30-12:20 Session A
The future of digital data collection and analytics
Take a step into the future of policing. During this session, you'll discover new ways of uncovering digital intelligence with the most advanced technology. Prepared to have your mind blown away!
Ariel Karayev, Strategic Pre-Sales Expert, Cellebrite
11:30-12:20 Session B
Deriving Insights Through OTT-Encrypted Traffic
While encrypted OTT calls present a challenge to conventional surveillance, they hold high potential for homeland security investigations.
Presented by Intersec11:30-12:20 Session C
Forensic analysis of smartwatches, mobile phones and clouds
Presented by Compelson13:20-14:10 Session A
Silent Data Gathering on Latest Generation Devices.
Presented by RCS S.p.A.13:20-14:10 Session B
FUSION – The single investigation platform
Presented by ATIS13:20-14:10 Session D
Transforming Law Enforcement Tactics: boost your operational efficiency with AI-Powered MULTI-INT Investigative SPECTRA Platform
Uncover how advanced data integration systems and software tools are reshaping crime investigations and intelligence gathering. Join us to explore Intelligence Analysis Management technologies, empowering law enforcement analysts to extract actionable insights swiftly from extensive data sources. Presented by OPPSCIENCE.
Presented by OPPSCIENCE14:15-15:05 Session A
The Future of Digital Forensics with FTK 8!
Presented by Exterro14:15-15:05 Session B
AI Counter-Terrorism Platform for Effective Law Enforcement
Presented by Vehere14:15-15:05 Session C
When Spyware Turns Phones Into Weapons: Addressing Mobile Devices Software and Hardware Vulnerabilities to Save Your Organization
Presented by Feedback Innovation15:25-16:05 Session C
Modernizing Digital Investigations: Automation and Data Enrichment for Efficient and Effective Case Resolution
In this session, you'll discover how leading investigation units are adopting a modern approach to digital investigations with automation and data enrichment. Learn how to tackle the challenges of managing large data volumes and drive faster and more efficient case resolutions.
Meirav Gingold, Product Owner, Cellebrite16:10-17:00 Session A
AI empowered speech technologies: making your audio searchable
Discover our next generation AI speech processing software designed to help professional users extract critical information from large amounts of multilingual audio data. Functionalities includelanguage identification, speech transcription and keyword spotting to ease your OSINT and COMINT activities.
Jodie Lechapelain, Director, Vocapia Research
16:10-17:00 Session B
Complex investigation Use Case.
Multiple Cyber Intelligence tools coordinated to achieve significative results.
Presented by AREA16:10-17:00 Session C
Similar Trajectories & Hidden Connections Through Telecom Metadata
A demonstration showcasing how telecom metadata, combined with advanced AI algorithms, reveals patterns of life, enhances tracking and minimizes opportunities for criminal escape.
Presented by Intersec16:10-17:00 Session D
AI-powered Metadata Analysis: Unearthing the Secrets Hidden in Digital Footprints
Mitesh Vageriya, CEO, PertSol16:10-17:00 Session E
CDRs of WhatsApp, Signal, Telegram, and other encrypted VoIP messaging applications
Presented by ClearTrail
Wednesday, 5 June 2024
09:10-10:00 Session A
NSO: The unencrypted story
Presented by NSO09:10-10:00 Session B
Special IT-forensic workflow including tactical and covert rapid on-scene triage and acquisition
Presented by mh-service GmbH and Detego Global
09:10-10:00 Session C
Case study w client (TBC) - The truly transformational power of Graphs for law enforcement agencies.
Presented by GraphAware09:10-10:00 Session D
Cybersecurity Reinvented: Navigating the Landscape of Secure Communication in the Age of Threats, Hardware Vulnerabilities, and Post-Quantum Computing
Presented by Feedback Innovation13:00-13:40 Session A
Drones and UAVs Redefining Tactical Intelligence.
Presented by Ateros13:00-13:40 Session B
Transform terabits per seconds into valuable information.
Unleash all intelligence in the data, combining analytics solution at the top. Use cases and demonstration.
Presented by AREA13:00-13:40 Session C
VASTech Cyclops: Real-world results showing the impact of Carrier-in-Carrier technologies on your satellite monitoring capabilities
Presented by VASTech13:45-14:30 Session A
Traffic Summarization for LI: Correlating Carrier-Grade NAT (CGNAT) at Carrier Scale and Speed
Presented by Packet Forensics13:45-14:30 Session B
Spyder Space: Revolutionize Your Investigative Processes with our cutting-edge solution! Harnessing Data from Mobile Sources, We Optimize, Analyze, and Craft Powerful Insights!
Presented by Movia13:45-14:30 Session C
AI powered monitoring centre of the future
Live demo of how AI and ML is speeding up intelligence assessment cover DPI, voice and image processing.
Jez Nelmes, Product Manager, BAE Systems Digital Intelligence
15:00-15:45 Session A
Intelligence-led Policing in the 21st Century
Powerful data analysis and fusion solutions help investigators build intelligence-led profiles of targets that combine lawfully intercepted data with OSINT resources like financial records, criminal history, and social media. Investigators today can associate unknown devices with subjects of interest, anticipating where criminals meet, and extract insights from encrypted traffic. In addition, technological advances like Voice over New Radio are providing better data quality than ever before.
Presented by SS8 Networks15:00-15:40 Session C
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will present how its innovative technologies can help Security and Defence organizations respond rapidly to a wide range of threats.
Presented by Phonexia15:00-15:40 Session D
Investigate, prevent and mitigate risks of riots, terrorism, and crimes through a country-wide geo-analytical AI
Massive detecting and tracking crowds with alerting anomaly situations. Targeted finding a second hidden phone number, companions, and similar persons by behavior. Geofense and Massive Profiling.
Artem Rychko, Head of Data Science, 7Generation15:00-15:40 Session E
OSINT and Forensic Data Consolidation For Modern Investigations
This session will walk you through the journey to digital intelligence maturity, the art of the possible for law enforcement, corporate and investigative professionals, and explain the practical steps along the way.
John Randles, CEO, Siren
Richard Chen, EMEA Professional Services, Siren15:45-16:25 Session A
Every piece of data tells a story – combine and analyze data from any source in your digital investigation.
Mark Uldahl, CTO, XCI A/S15:45-16:25 Session B
Fast visualization, analysis and fusion of large data sets from different sources
Presented by ATIS15:45-16:25 Session D
Stealth Interception: One Solution for Any Device
Enable LEA and Intelligent Services the anonymous interception and the remote control of multiple devices
Presented by MOLLITIAM CYBERINTELLIGENCE16:30-17:15 Session A
Effective photo and video investigations: from CCTV enhancement and analysis to deepfake detection in OSINT media
Presented by Amped Software16:30-17:15 Session B
Transforming Law Enforcement Tactics: boost your operational efficiency with AI-Powered MULTI-INT Investigative SPECTRA Platform
Uncover how advanced data integration systems and software tools are reshaping crime investigations and intelligence gathering. Join us to explore Intelligence Analysis Management technologies, empowering law enforcement analysts to extract actionable insights swiftly from extensive data sources. Presented by OPPSCIENCE.
Presented by OPPSCIENCE
16:30-17:15 Session C
How Lawful Interception benefits from Traffic Filtering.
High bandwidth networks like fiber and eMBB (LTE / 5G) put new requirements to a Lawful Interception solution. With high throughput data streams, the costs of processing this data increases. However, not all data is relevant for an investigation, e.g., Netflix and application and OS updates carry no user data. Within this session we will discuss how Lawful Interception benefits from Traffic Filtering capabilities.
Presented by Group 200016:30-17:15 Session E
A Deep Dive in to Mobile Exploitation - A Full Chain overview
Presented by SecFenceThursday, 6 June 2024
08:30-09:10 Session A
OpSec in Offensive Cyber Operations: How to make your Zero-Days last longer
Presented by SecFence08:30-09:10 Session B
TITLE TBA
Presented by StealthMole08:30-09:10 Session C
Data to Decision: Transforming Criminal Investigations with AI-powered Predictive Analytics
Gurjot Sandhu, CBO, PertSol08:30-09:10 Session D
Be the First to Experience the Future of Raw IP data Analysis for Actionable Intelligence.
Never miss intelligence from WhatsApp, FaceTime and other encrypted calls made by the targets you are investigating and get their behavior on a timeline. Discover Simplicity and Power - No technical expertise required.
Presented by ClearTrail09:15-10:00 Session A
Harnessing Generative AI to Power the Next Generation of Digital Intelligence
Generative AI is having a rapid and unprecedented impact on how insights are extracted and surfaced from varied datasets. This session explores the potential of this technology within Law Enforcement and Intelligence, in specific use cases such as training simulations, threat analysis, and even generating investigative leads. We'll address ethical considerations alongside shifting regulations and how to maintain compliance. The session concludes with a live demo showcasing how the 4Sight Digital Intelligence platform uses the power of generative AI to enhance workflows and improve team efficiency.
Sean Thibert (Product Manager, AI Solutions), JSI09:15-10:00 Session B
Face recognition in mass terror events
Presented by Corsight09:15-10:00 Session C
A single platform to manage all requests from Law Enforcement Agencies (LEAs)
Presented by Microtel Innovation11:00-11:40 Session A
Breaking Barriers: How SATCOM Intelligence Can Fill Communication Gaps in Law Enforcement Investigations
Presented by Cognyte11:00-11:40 Session B
Using situational awareness and C2 tools to achieve faster decisions and actions during operations
Presented by Drakontas LLC11:00-11:40 Session C
Automate and collaborate with FTK Connect and FTK Lab
Presented by Exterro11:45-12:30 Session A
VASTech Cyclops: Real-world results showing the impact of Carrier-in-Carrier technologies on your satellite monitoring capabilities
Presented by VASTech13:00-13:40 Session A
Be the First to Experience the Future of Raw IP data Analysis for Actionable Intelligence.
Never miss intelligence from WhatsApp, FaceTime and other encrypted calls made by the targets you are investigating and get their behavior on a timeline. Discover Simplicity and Power - No technical expertise required
Presented by ClearTrail13:00-13:40 Session B
VIDEO ANALYST - NEO INSIGHT - NEO COLLECT
Collect. Recognise. Analyse. AI-Powered Video, Speech & Social Media Analytics
Jamie Clarke, HTSC-Germany
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
Tuesday, 4 June 2024
08:30-09:20 Session A
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS08:30-09:20 Session C
Automation meets Intelligence
Our view of AI-powered Analytics
Presented by Innosystec09:25-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS09:25-10:15 Session B
trovicor’s Latest interception Innovations – Speech Analysis, Encrypted IP applications and hyper efficient Big Data Analytics.
Renita John, CPO, Trovicor Intelligence
10:35-11:25 Session A
LEVARAGING THE BIG DATA POWERHOUSE TO ADDRESS THE FINANCIAL CRIME OF ANTI MONEY LAUNDERING (AML)
Using a real case we will demonstrate how a BIG DATA PLATORM can enhance analysts/ investigators ability for early detection, prevention and resolution of anti-money laundering crimes , fraud etc. We will show how big data platforms can do more than just follow the money. It can predict where it will go, making analysts and investigators faster and more effective in addressing what is and will become the greatest threat to economic stability, sustainability and growth in the 21stcentury.
Omri Raiter, RAKIA Group
10:35-11:25 Session B
Link analysis in 2024: how to find intelligence in connected data
Presented by Cambridge Intelligence11:30-12:20
Evolving OSINT: Challenges and Opportunities
Presented by Strategic OSINT13:20-14:10 Session B
Gaining knowledge from mass data
The power of cumulative information for actionable intelligence - Live Demo
Presented by Innosystec14:15-14:40 Session A
TikTok challenges: Adapting to new and evolving platforms
While communities and governments are justifiably concerned about threats related to censorship and espionage, this talk examines the variety of nefarious and criminal behaviour playing out on TikTok, the challenges for law enforcement SOCMINT efforts and how these can be overcome.
Presented by Fivecast14:15-14:40 Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS14:15-14:40 Session C
Unleashing the potential of Data-Centric A.I.: Revolutionize Network Security with Enhanced Traffic Classification and Malware Detection
In an era where encryption dominates over 90% of network traffic, traditional DPI methods fall short. A.I. and Machine Learning techniques have now replaced traffic flow classification where DPI has failed. However, these tools depend on data labeling, leaving room for errors, posing significant risks. Data-Centric A.I autonomously rectifies input data, paving the way for heightened accuracy. This not only refines classification but also enhances malware detection capabilities.
Presented by Quant Azimuth14:40-15:05 Session B
Cyber Threat Intelligence to accelerate online investigations
Presented by IPS15:25-16:05 Session A
How to Uncover a Money Laundering Network in 7 Steps
Presented by Cognyte15:25-16:05 Session B
Hands-on - Using GPT to enable complex data analysis from large OSINT data (Social networks, Documents, ...)
Presented by GraphAware
15:25-16:05 Session C
Introducing CoAnalyst: Revolutionize Your Data Analysis with Conversational Intelligence
By blending layers of intelligence with Generative AI, this presentation will showcase a future where data analysis is more efficient, accurate, and insightful. This talk will demonstrate how GenAI can transform industries by providing deeper insights and enhancing decision-making. Attendees will explore this cutting-edge GenAI application and learn how to leverage this technology to elevate their analytical work.
Presented by PenLink Cobwebs16:10-17:00 Session A
Investigative Analytics - Looking into the future of intelligence with advanced data analytics
Presented by Cognyte16:10-17:00 Session B
"What will be the future of OSINT?"
Presented by PredictaLab16:10-17:00 Session C
Accelerating Social Media and OSINT Investigations with ShadowDragon
Presented by Shadow Dragon
Wednesday, 5 June 2024
9:10-10:00 Session A
Location & Open Source Intelligence: Real Life Case Studies & Live Demonstration
By combining open-source intelligence with location intelligence, analysts can reveal hidden connections and valuable insights to move an investigation or operation forward. This session will explore how combining the two can help generate valuable case intelligence to propel an investigation or operation forward.
Presented by PenLink Cobwebs9:10-10:00 Session B
Translate alternative socials into actionable data
Web-IQ’s Open Language Intelligence (OLI) combined with data from alternative socials such as Sina Weibo, Discord, Naver or even Telegram discloses intelligence as never shown before. Our experts will show how to activate these new intelligence sources using Voyager and its features such as OCR, entity resolution and -relation analyses, account discovery and more. Welcome!
Presented by Web-IQ13:00-13:40 Session A
From IOC to threat actors hunting
By providing security and threat intelligence analysts with a centralized platform to analyze IOCs and other data, corporate security teams can reduce wasted resources and human error. This presentation will focus on how an AI-powered solution can streamline intelligence operations to quickly analyze risk and threats in one application.
Presented by PenLink Cobwebs13:00-13:40 Session C
Revolutionize OSINT with ChatGPT and LLMs: a Practical Guide
This presentation explores the transformative potential of ChatGPT and other large language models (LLMs) in revolutionizing open-source intelligence (OSINT) collection and analysis. We will discuss practical applications of these advanced AI technologies in streamlining OSINT processes. Attendees will learn how to effectively harness the power of ChatGPT and LLMs to enhance their OSINT operations and discover best practices for implementing these cutting-edge tools in real-world scenarios.
Presented by S2T Unlocking Cyberspace13:45-14:30 Session A
Heterogeneous AI-powered data platform for advanced CTI analysis
Presented by CHAPSVISION13:45-14:30 Session B
Breaking Data Silos. Taking action.
Enhancing collaboration with SCOPE multi-source mass data analysis.
Presented by Innosystec15:00-15:40
Generative AI Led Federal Case Study: Intelligent Fusion
Presented by ClearTrail
15:45-16:25 Session A
Using OSINT with visual link analysis to enhance your investigations
Presented by Maltego
Thursday, 6 June 2024
08:30-9:10 Session A
Our Cross Domain Solutions and what we do for Classified C2 and GOVERNMENT Networks
Presented by Arbit08:30-9:10 Session B
Transforming OSINT, Cyber and POI investigations with the power of Maltego
Presented by Maltego08:30-09:10 Session D
Follow your suspect down the OSINT Rabbit Hole.
Cyber Intelligence platform to get deeper into the OSINT of online social communities and Dark Web. Use cases and demonstration.
Presented by AREA09:15-10:00 Session A
The Battle of Antagonistic Narratives: the role of AI in OSINT, StratCom and Narrative Intelligence for National Security.
Presented by Future Space09:15-10:00 Session B
OSINT Case Study: Leveraging Open Data to Make Breakthroughs in an Arms Trafficking Investigation
Open data can provide the connections required to expand cases around existing leads. In this presentation, the team will demonstrate how the Social Links’ OSINT solution, SL Professional, enabled investigators to greatly enhance internal data with open sources. This led to significant breakthroughs in an arms trafficking case, where the main actors were successfully identified.
Christof De Windt, OSINT Specialist at the Federal Judicial Police of Belgium; and Alexandra Samuseva, Customer Success Manager, Social Links
11:00-11:40 Session B
OSINT For Counter Extremism in Europe
Ideologically motivated violent extremism is on the rise across Europe. Widespread adoption of social media has exacerbated the situation, as it has become a conduit for spreading and sharing extremist propaganda and false information. This presentation discusses the history of extremism over the past decade, and how the current threat is being mitigated through open-source intelligence.
Presented by Fivecast11:00-11:40 Session C
BIG DATA PLATFORM – A comprehensive, practical guide to getting the most out of your DATA
A practical and comprehensive guide on the ins and outs of big data platforms and how they have been used to address key problems/challenges in law enforcement agencies . Through a specific use case we will highlight the highest value insight that everyone should have with regards these matters. Some of the elements covered include defining needs, devising algorithms using a no-code rule engine, how to link databases , report generator and much more.
Omri Raiter, RAKIA Group11:00-11:40 Session D
Investigate, prevent and mitigate, risks of riots, terrorism, and crimes through a country-wide geo-analyticsl AI.
Presented by Butterfly Effect11:45-12:30 Session A
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
(THIS SEMINAR IS RESTRICTED TO LEA, MILITARY, AND GOVERNMENT ATTENDEES. PHOTOS AND VIDEO RECORDING ARE PROHIBITED).
Now I’ve shown you how to hide, let us go and start covertly searching and gathering online intelligence with the best tools available.
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police11:45-12:30 Session B
The Evolution of Mass Media for Data Fusion: Will AI wield the controls for OSINT data curation
The session delves into the fascinating topic of the evolution of mass media for data fusion. It presents an in-depth analysis of how mass media has transformed over the years, and its positive and negative effects on societies, raising awareness about the importance of the role of AI technology in data curation for open-source intelligence (OSINT).
Presented by DataScouting
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Tuesday, 4 June 2024
08:30-09:20
ESG and Munich Innovation Labs presents a Crowd-sourced Information Platform (CIP)
ThevCrowd-sourced Information Platform (CIP) enhances real-time situational awareness by integrating data from various sources such as social media, webcams, drones, and other sensors with ground-truth information provided by field operatives. This platform is valuable for both territorial defense and civil applications, emphasizing privacy-by-design principles at its core. Furthermore, by incorporating Large Language AI capabilities, CIP efficiently extracts geoinformation at scale.
Presented by ESG09:25-10:15 Session B
Connecting the Dots for Proactive Threat Detection - stay ahead of your targets with KELA Cyber Threat Intelligence - Live demo
Effective Cyber Threat Intelligence (CTI) requires a comprehensive understanding of a target's activities and intentions. In this session, we will explore how CTI can be leveraged to gain insights into a target's identity, behavior, and potential next steps. We will introduce our unique CTI solution, which uses innovative capabilities to collect, investigate and analyze data from cybercrime sources. Through a live demo, attendees will see how our solution can assist in exposing the bad guys and staying one step ahead of them.
David Carmiel, CEO, KELA
11:30-12:20
Decoding Cyber Warfare with Dark Web Intelligence: Predicting Threats, Protecting Nations (Israel-Hamas: A Case Study)
Presented by Webz.io15:25-16:05
OSINT Case Study: How the Analysis of TikTok Led to the Identification of a Fugitive Criminal
This talk will have two parts. The first will focus on a real case in which a suspect had disappeared. We’ll demonstrate how investigators used SL Professional to carefully analyze media from TikTok, leading to the fugitive’s identification. Following on from this, part two will cover how the OSINT solution can process a whole range of open-source media to boost investigations.
Speakers: Christof De Windt, OSINT Specialist at the Federal Judicial Police of Belgium; and Dmitry Danilov, Head of the Expertise Centre at Social Links.
Christof De Windt, OSINT Specialist at the Federal Judicial Police of Belgium; and Dmitry Danilov, Head of the Expertise Centre, Social Links
Wednesday, 5 June 2024
09:10-10:00 Session A
Multi-dimensional Network Cyber Security – where AI meets the relevant data for Network Visibility, Protection, Prevention and Control
- Evolution from Interception to a holistic, integrated, multi-technology platforms approach to Network Security, and how the relevant data enables scalable AI and ML – based correlation, profiling and modelling.
- Renewed relevance of specialized Threat Intelligence and AI-centric Packet Broker and DPI systems in new network environments for appropriate, multi-vendor, multi-technology Detection, Response and Analytics beyond and enhancing NG Firewalls infrastructures.
Presented by Quant Azimuth
09:10-10:00 Session B
COUNTER ΙLLEGAL ACTIVITY– From a mere hint to real threat mitigation!
A step-by-step guide to harnessing OSINT and fusion technology to effectively support the entire process of identification and mitigation of nation illegal threats. We will include the entire OSINT & WEBINT collection capabilities from all aspects , target , mass collection ,darknet , avatar design and management , fake accounts identification and mitigation and no code crawlers
Omri Raiter, RAKIA Group13:45-14:30
Secure and Anonymous OSINT Investigations at the Touch of a Button.
Discover how you can conduct effective investigations under time pressure without the risk of being personally identified, spied on, or infected. We'll show you a secure way to conduct all your research and investigations anonymously and securely, in a familiar environment that's just a click away.
Presented by slinf AG15:45-16:25
Combine DPI-based Traffic Visibility with Threat Detection Capabilities to Raise the Performance of Government Security Operations
Discover a new generation of DPI-based cyber sensors that leverage years of experience in cyber defense environments to raise the performance of government-run Security Operations Centers (SOCs). Find out how this DPI-based traffic visibility can combine with SDK-based threat detection capabilities to provide superior network protection, even when traffic is encrypted.
Nicolas Duteil, Senior Technical Account Manager, DPI & Traffic Intelligence, Enea Software
Thursday, 6 June 2024
09:15-10:00
Intercepting the future: Critical use cases for security agencies
Presented by Matison11:00-11:40 Session B
Identify New Threats With Next-Generation DPI-Based Cyber Sensors
In this live demonstration, discover a new generation of DPI-based cyber sensors that leverage years of experience in cyber defense environments to extend the cyber threat detection capabilities, and raise the performance of government-run Security Operations Centers (SOCs).
Nicolas Duteil, Senior Technical Account Manager, DPI & Traffic Intelligence, Enea Software13:00-13:40 Session A
Collaborative Cyber Intelligence Sharing for Enterprise, Government, and Military Entities
Ensure your esteemed entities remain vigilant and proactive against cyber threats. In this presentation, we will unveil our innovative solution designed to facilitate collaboration with trusted entities in exchanging Cyber Threat Intelligence (CTI) using a structured approach. Our solution boasts capabilities including but not limited to, collecting, storing, distributing, and sharing cyber security indicators (IOCs) and threat content. Additionally, we will explore advanced features such as community creation, visualization tools, automation, data exchange & collection, calssification, integration, malware sandboxing, SLAs, escalation, MITRE ATT&CK profiling, bidirectional communication channels, AI support, and more.
Presented by Quantum Security Systems13:00-13:40 Session B
Information Protection - Prevention Methods Against Illegal Recordings
Alex Voloshyn - Senior Sales Representative, Prof. DR. ILIN SAVOV, LLM, PHD, DCS - Expert in Security and Surveillance Countermeasure, EO Security
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 4 June 2024
8:30-9:20
How to identify threat actors on the dark web
Sunhyung Shim, S2W13:20-14:10 Session A
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
David Alley, CEO, DarkOWL FZE13:20-14:10 Session B
Title TBA
Presented by Rayzone GroupWednesday, 5 June 2024
13:45-14:30
Revealing the invisible: Real Stories of Cryptocurrency Deanonymization
Presented by Cognyte
15:45-16:25
How to Investigate Crypto Crime
Presented by Breadcrumbs16:30-17:15
Dark what?! Telegram is now the hub for hackers, fraudsters and other criminals
Presented by S2T Unlocking CyberspaceThursday, 6 June 2024
14:00-14:40
From Dark Web Information to Nicknames, Phone Numbers and Emails to Real People
A former elite intelligence officer and NATO intelligence pieces how seemingly small names of information on the web can lead to real police cases. Showcasing real-world examples covering the dark web, breached credentials, social media, public records and sanctions lists that have prompted multiple police investigations.
Petr Vancl Hochberger, Head of Marketing and Business Development, TOVEK
Track 6: Mobile Signal Intercept Product Training and Presentations
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 4 June 2024
8:30-9:20 Session B
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies10:35-11:25
Satellite Networks: Detecting, Locating and Intercepting transmitters
Presented by Kratos11:30-12:20
Evolutions and revolutions in satellite interception technology
Presented by Rohde & Schwarz13:20-14:10 Session A
Streaming Visual Intelligence from IoT
NightHawk, a cyber intelligence platform delivering E2E intelligence gathering and covert operations unique capabilities. The NightHawk can be operated remotely or by proximity to the targeted device. The session will enable law enforcement and intelligence agencies a glimpse into how to gather unique intelligence, analyze, track targets and events worldwide in the NightHawk platform.
Presented by Interionet14:15-15:05 Session B
Why mobile phone location accuracy matters for successful missions
Chris Fritz, Polaris Wireless15:25-16:05 Session A
Secure the smartphone data at rest and in transit - Bittium secure communication solutions
The modern smartphone environment offers users various options for storing and moving sensitive organizational data. Therefore, it is crucial for organizations to have a communication solution which makes sure the data is secure when it is stored into device, but especially when the data is in transit. In this session, Bittium Security Specialist Mr. Niko Keskitalo will present the ways how to secure your organization’s sensitive data with Bittium security solutions.
Presented by Bittium15:25-16:05 Session B
Unleashing the Power of Location Data: Examining how law enforcement and security agencies can leverage MNO
Presented by Xolaris16:10-17:00
Securing Your Mobile World from Surveillance Threats. A deep dive into unmasking and countering IMSI Catchers with Cutting-Edge solutions
Presented by NeoSoft
Wednesday, 5 June 2024
9:10-9:30
(Very) Connected Cars: How Identity Collection From Vehicles Can Help Fight Crime
Presented by Cognyte9:30-10:00
It's Compact...It's Covert...It's a Micro-tactical Suite – Operating Everyday Field Missions in Versatile Environments
Presented by Cognyte13:00-13:40 Session A
Strategic Satellite Monitoring
Presented by Secure Information Management GmbH14:00-14:40
Enhancing Surveillance Capabilities: The Role of AI, Bluetooth, WiFi, and 5G in Tracking Targets
In a world where technology is constantly evolving, advanced surveillance technologies that utilize AI, Bluetooth, WiFi, and 5G are becoming increasingly crucial tools for law enforcement and national security. These technologies enable precise and efficient real-time tracking of targets, enhancing both the accuracy and response capabilities of security agencies. This presentation will explore how these tools can be integrated into existing security frameworks to improve data collection and analysis, optimize resource allocation, and strengthen community protection against threats. By combining theoretical concepts with practical applications, this overview aims to provide a comprehensive look at the future of surveillance technologies.
Rikard Windh, COO, Combain
Track 7: Electronic Surveillance Training and Product Presentations
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Wednesday, 5 June 2024
13:00-13:40
Harnessing AI in Police Investigations: A Focus on Audio, Video, and GPS
Presented by SIO13:45-14:30 Session A
Liberating Experts in Tracking and Video Surveillance
Presented by ProximaIT13:45-14:30 Session B
New Microphone Arrays from Squarehead
Vibeke Jahr, COO and Founder, Squarehead Technology15:00-15:40 Session A
Mastering Data Empowering Intelligence
Presented by Elbit15:45-16:25 Session A
QuipoEVO: new features and new use case for Cy4Gate Decision Intelligence Platform
Introducing QuipoEVO, the latest innovation from Cy4Gate, designed specifically for Law Enforcement Agencies (LEAs) to enhance decision intelligence capabilities. In the fast-paced world of law enforcement, staying ahead of criminals and ensuring public safety requires advanced tools and technologies. QuipoEVO combines cutting-edge artificial intelligence and machine learning to provide LEAs with a comprehensive Decision Intelligence Platform tailored to their unique needs.
QuipoEVO offers a range of powerful new features that revolutionize data analysis and decision-making in the LEA domain. Real-time data integration and analysis capabilities enable LEAs to gather and process vast amounts of data from multiple sources, including structured and unstructured data. By leveraging advanced analytics and algorithms, QuipoEVO provides actionable insights and helps LEAs identify patterns, detect trends, and make informed decisions to combat crime effectively.
Presented by CY4GATE S.p.A.15:45-16:25 Session B
Tracers: walk in the shoes of your target.
Electronic Surveillance solutions to covertly investigate on suspects in the field and operate from an all-in-one, AI enabled, centralized cyber intelligence platform. Use cases and demonstration.
Presented by AREA15:45-16:25 Session C
How to ensure the security of mobile communication? Use radio forensics to monitor and secure mobile networks in 5G SA technology
This presentation will explain the technical aspects of detecting rogue networks using the parameters of a Base Transceiver Station (BTS). We'll discuss how these parameters can be harnessed to protect against eavesdropping and digital wiretapping, making it an essential tool for anyone interested in the security of mobile networks.
Rafał Wołczyk, Presales Engineer, Vespereye16:30-17:15 Session A
Updating Border Security Through Comprehensive Wireless Spectrum Operations
Presented by Packet ForensicsThursday, 6 June 2024
11:45-12:30
Interception and direction finding of 60 simultaneous audio traffic channels with a mobile EW/SIGINT system
Presenting Novator Solutions’ tactical turnkey EW/SIGINT system for signal interception and direction finding of clear voice push to talk communication. The out-of-the-box solution is designed for operations on the move and allows quick deployment in any vehicle platform without preparation. We will briefly touch on the channelizer technology used to provide 60 simultaneous channels for monitoring, listening, and recording of analog audio communication and to provide 4 IQ recording channels.
Carsten Watolla, Head of Spectral Data Analysis Department, Novator Solutions AB
Track 8: 5G Lawful Interception Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 4 June 2024
9:25-10:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
14:15-15:05
Securing International Borders with Advanced Lawful and Location Intelligence
Political instability and conflicts in places like Syria, Ukraine, and Gaza are causing mass migrations. Desperate people sometimes turn towards human smugglers, exposing them to the dangers of human trafficking. In addition to traditional risks like illegal drug smuggling, this creates a heightened need for advanced lawful and location intelligence solutions. Learn how geofencing, location tracking, metadata analysis, data fusion, and more help secure international borders.
Presented by SS815:25-16:05
Keep using your IMSI Catchers and Direction Finders in the 5G SA Era
With the introduction of 5G SA, the 3GPP decided to improve subscribers’ privacy by designing an encrypted protocol architecture that protects against the use of IMSI catchers. These design choices resulted in the need for a “future proof” and solid solution in order for law enforcement to correlate temporary identifiers collected over the air interface and match them to permanent identifiers and to track suspects using their direction-finding tools and capabilities.
Presented by Group 200016:10-17:00
On the way to Online Catching on 5G SA
Presented by Rohde & Schwarz
Wednesday, 5 June 2024
09:10-10:00
Survival of IMSI-catchers in 5G Networks
Presented by Utimaco13:00-13:40
POLIIICE 5G standalone end to end LI live demo.
POLIIICE will offer, research, validate and demonstrate array of innovative LI measures at cloud & network level as well as at edge device level that together will enable LEAs to efficiently overcome the new age challenges and enable high throughput of its LI
Chris Young, Product Manager, BAE Systems Digital Intelligence16:30-17:15
5G ID Resolution
Presented by EXFOThursday, 6 June 2024
08:30-09:10
Lawful Interception of IMS/VoLTE Roaming (S8HR)
Presented by Utimaco
Training Seminars Led by Law Enforcment Officers and Ph.D Computer Scientists
Tuesday, 4 June 2024
Seminar #1
08:30-15:05Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-15:05(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UKPolice
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works, for us. Why it works, for us. How data traffic leaves a permanent trace. How and why everything that was on the internet, is still there. Identifying the structural data and exploits, that will take you to your suspect. Tracking and evaluating data. MAC tracking. If you’ve ever said “it’s been deleted” or “its no longer there”, this seminar is for you. Let me prove you wrong.
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyse it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft. Data collection and interrogation, significance, and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them (where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyse it. Investigator capabilities and opportunities. TCP/IP and header value and analysis
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed. You and your target are being tracked by multi organisations that you done even know exist. Lets identify them and interrogate their data bases.
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web), TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications, and ways to coax offenders out of the system.
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game? Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
"Just google it" is great for tickets, tyres, holidays and opening hours. But as an investigator, we can do better, and safer. Using most main stream search engines and browsers come with certain risks. This session aims to change that. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. Tools that the target can’t see . Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how to fast track you to the data you need, and cut away the chaff. PART 2 on the final day with free tools to download and keepSeminar #3
08:30-09:20Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Seminar #4
09:25-10:15Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesCellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
- 5G Network Challenges Identifiers: How are law enforcement going to grab 1gbps traffic streams; backhaul to monitoring centers and filter non-important traffic of interest.
- 5G Edge Cloud Computing: How do you intercept on a 5G operators IT systems, deal with proprietary system protocols, e2e encryption and localized content
- 5G Virtual Network Core: How complicated will this be regarding LI, VoIP on virtual devices and what LI barriers has the IETF created
- 5G Network Slicing: Is this 5G feature restricted to private enterprises or will 5G MVNO’s provide public mobile wireless services, How will law enforcement interconnect with 5G OSS provisioning systems and what is the LI point of interconnection?
Seminar #5
10:35-11:25Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesSeminar #6
11:30-12:20Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesThursday, 6 June 2024
Seminar #7
13:00-14:00(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, Part 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceA must see presentation of the best and most dynamic tools available to the investigator- and they’re all free. A download link will be provided during this session with 100 tools to take away