ISS World Asia is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Demonstrations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
Track 6: Mobile Signal Intercept Training and Product Demonstrations
Track 7: Electronic Surveillance Training and Product Demonstrations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Training
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(6 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)
Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(2 classroom hours)
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(3 classroom hours)
Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:20
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation
09:25-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective
10:35-11:25
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators
11:30-12:20
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies
13:20-14:10
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know
14:15-15:05
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
08:30-09:20
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
09:25-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:35-11:25
WIFI, geolocation, and Mobile Data traces and tracking
11:30-12:20
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
13:20-14:10
Advanced Techniques in Tracing Suspects, and lateral problem solving
14:15-15:05
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone.
Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
You can’t defeat today’s encryption (at least not that we know of) but law enforcement and the government intelligence community can “Work around encryption” for a price. Once you identify a target using commercially available encryption products or services (and with enough resources or money) government can defeat the target near 100% of the time.
Locating and Tracking Devices by MAC Addresses and App-Based SDKs plus Privacy Measures by Apple & Google
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Wednesday, 7 September 2022
10:00-18:00
Thursday, 8 September 2022
9:30-12:30
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World Asia has Solutions
Dr. Jerry Lucas, President, TeleStrategies
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
15:25-16:05
Accelerating investigation workflows with specially designed IT- and phone forensic laboratories
Cyfluene, fake news and campaign detection
Presented by mh Service GmbH
09:15-10:00
Cyber Threat Intelligence in Context of Counterterrorism
Presented by Resecurity
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
09:25-10:15
Carrier in Carrier Analysis: Determine the impact of Carrier in Carrier technology on your satellite monitoring capabilities
Presenting the challenges posed by Carrier in Carrier technologies and VASTech’s approach to the analysis of Carrier in Carrier signals and the separation of Symmetrical and Asymmetrical Carrier in Carrier Signals.
Presented by VASTech
10:35-11:25
How to bring precise location data, call record data and metadata together for advanced intelligence
There is an enormous amount of disparate data that investigators have access to, yet finding and analyzing the most relevant data can be arduous. Learn how to shorten investigation time and improve investigation results.
Presented by SS8
13:20-14:10
Fast visualization, analysis and fusion of large data sets from different sources
Presented by ATIS
14:15-15:05
A light in the darkness of Encrypted Communications
Presented by AREA
15:25-16:05
Geo-monitoring and profiling covering all connected devices and networks (3/4/5G and WiFi) globally
VP Sales and Marketing, GeoGence
16:10-17:00
Combating terrorism, espionage and crime by combining mobile network metadata, mass positioning, and intelligent profiling in real-time
Mohsen Tavakol, Chief Executive Officer, Xolaris
09:00-10:00 Session A
Counter drone and low-intensity conflicts
Presented by NSO Group
09:00-10:00 Session B
Rakia big data system - "Simplifying the complexity of intelligence"
Omri Riter, CTO and Co-Founder, Majestic Technologies
13:00-13:40 Session A
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence
Specialized digital tools to get the task done
Presented by AREA
13:00-13:40 Session B
Fibre Signal Analysis: What intelligence value does a fibre link contain?
Presenting VASTech’s approach to Signal Analysis, Protocol Analysis, Application Classification, Metadata Exploration, and Content Evaluation to enable agencies to obtain maximum value from a fibre or satellite signal.
Presented by VASTech
13:45-14:30 Session A
Revolution in Audio Investigations
At this session, you will discover an extremely efficient way to investigate audio recordings with Phonexia Orbis Investigator. Get ready to see the world’s most advanced voice biometrics in action!
Presented by Phonexia
13:45-14:30 Session B
Streamlining law enforcement and national security communities through convergent intelligence and security technologies
Mohsen Tavakol, Chief Executive Officer, Xolaris
15:00-15:40
Memento Labs arsenal for criminals' deep monitoring - LIVE DEMO
Presented by Memento Labs
15:00-15:40
Simplify investigation with one platform
Presented by ATIS
15:45-16:30
Every piece of data tells a story – combine and analyze data from any source in your digital investigation.
Mark Uldahl, CTO, XCI A/S
08:30-09:10 Session A
Fibre Signal Analysis: What intelligence value does a fibre link contain?
Presenting VASTech’s approach to Signal Analysis, Protocol Analysis, Application Classification, Metadata Exploration, and Content Evaluation to enable agencies to obtain maximum value from a fibre or satellite signal.
Presented by VASTech
08:30-09:10 Session B
Memento Labs arsenal for criminals' deep monitoring - LIVE DEMO
Presented by Memento Labs
9:15-10:00
Majestic5 - "The Swiss army knife for all your OSINT tasks"
Omri Riter, CTO and Co-founder, Majestic Technologies
11:00-11:40
A new perspective for field operations - supporting Cyber operations in the field
Presented by Advanced Systems
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
08:30-09:20 Session A
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS
08:30-09:20 Session B
Fleeing Facebook: how to keep up with new and constantly evolving platforms
Alternative social media platforms such as Parler, Gab, Discord, 8Kun and Telegram are emerging, gaining popularity and disappearing again at a rapid pace. Learn how to address this challenge in your investigations.
Presented by Fivecast
09:25-10:15
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS
13:20-14:10
Welcome to the era of DNA. How to save 40 years and conduct an investigation in a few days
Presented by Social Links
14:15-14:40
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS
14:40-15:05
Cyber Threat Intelligence to accelerate online investigations
Presented by IPS
15:25-16:05
Cyber-Surveillance: From Messenger Monitoring to Device Control
Presented by HSS
16:10-17:00
Anonymity vs. You
Smart Methods to Identify Virality, Bots & Personally Identifiable Information
Presented by ClearTrail
9:00-10:00
Tactical Web Intelligence (WEBINT): Gathering Actionable Intelligence via a powerful WEBINT platform
Presented by Cobwebs
13:00-13:40
Location & Open Source Intelligence: Real Life Case Studies & Live Demonstration
Presented by Cobwebs
13:45-14:30
Using advanced open-source intelligence tools for rapid, real-time discovery & pivoting across multiple information & data mediums. Solution agnostic platform demonstration with real-life examples
Presented by OSINT Combine
15:00-15:45
Supercharged IPDR extraction and analysis - Advanced Mass Internet Activity Analytics
Presented by Advanced Systems
16:20-17:00 Session A
Encryption vs. You: 3 Ways to Combat Threats at a Nationwide Scale
Presented by ClearTrail
16:20-17:00 Session B
CLOS-INT Closed Source Intelligence from Web2.0 sources
Presented by AREA
09:15-10:00 Session A
How to Protect the Status of Data Traffic Without Changing the Status Quo
Presented by Allot
09:15-10:00 Session B
Data breaches compromising national and corporate security
Presented by Social Links
11:00-11:40
Fast visualization, analysis and fusion of large data sets from different sources
Presented by ATIS
11:45-12:30
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
9:25-10:15
Infotecs data security solutions from cipher to cyber range
Presented by Infotecs
10:35-11:25
Maximize Geolocation Intelligence to Investigate the Past & Prevent Future Crimes
Presented by Rayzone Group
13:20-14:10
Geolocation Intelligence for Counter-Terrorism
As terrorist activity becomes increasingly sophisticated, the effectiveness of detection and investigation capabilities depends more and more on the quality, detail and accuracy of geolocation intelligence delivered for threat analytics and targets tracking. The session will cover specifics, actual challenges, and approaches of how security and law enforcement professionals may track high-risk individuals and groups, attribute suspects locations, devices, and movements in preemptive operations, surveillance, and counter-terrorism tasks.
Ayman Alshobaki, Business Development Manager, Middle East, Resecurity
14:15-15:05 Session A
Why secure hardware alone is just not enough: Bittium Tough Mobile 2
Presented by Bittium
14:15-15:05 Session B
Why software is not enough: building next generation, hardenized smartphones for communication security
Presented by Feedback Italia
9:00-10:00
Construct, Visualize and Analyze Digital Trails through Big Data
Presented by Rayzone Group
13:45-14:30 Session A
S2W Quaxar, Tracking the footprints about the initial access broker and the data broker based on Cyber Threat Intelligence Solution
Presented by S2W
15:25-16:05
Shaping the ultimate communication protection strategy: custom-hardened, tamper-proof laptops for uncompromised security
Presented by Feedback Italia
15:00-15:45
Secure National Critical Infrastructure and Organizational IT
Presented by Rayzone Group
16:20-17:00
Early warning threat detection solution baed on mobile, IOT Devices and IPs profiling networks (3/4/5G and WiFi) globally
VP Sales and Marketing, GeoGence
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
13:20-14:10
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
David Alley, CEO, DarkOWL FZE
13:00-13:40
Offline darknet investigation with the Web-I-Quve
Presented by mh Service GmbH
8:30-9:10
Know Now What Your Suspects Will Do Tomorrow
Presented by ClearTrail
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
8:30-9:20
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies
9:25-10:15
Detect & Prevent Communication Interception Systems in Real-Time
Presented by Rayzone
10:35-11:25
VSAT Networks: Tactical and Strategic Threat Detection and Geolocation
Presented by Kratos
11:30-12:20
Intelligence from VSAT/FSS satellite communication systems
Presented by Rohde Schwarz
13:45-14:30
Overcoming geolocation challenges in a complex mobile world
Presented by Intersec
16:20-17:00
Active Interception + Analytics
Presented by HSS
9:15-10:00
Lawful location access
Presented by Intersec
11:00-11:40
Mobile Radio Analysis Solutions with 5G for Government
Presented by Rohde Schwarz
11:45-12:30
Wireless Environment Collection + Analytics
Presented by HSS
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
8:30-9:10
Flexible and intelligent, tactical electronic surveillance. Fully scalable enabling platform LEMF with synchronized multimedia on a single panel.
Presented by AREA
11:45-12:30
5G Enabled LEMF
Presented by AREA
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
9:25-10:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
13:45-14:30
5G Tactical solutions and interoperability
Presented by EXFO
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
11:45-12:30
5G Enabled LEMF
Presented by AREA
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:20
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation
09:25-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective
10:35-11:25
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators
11:30-12:20
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies
13:20-14:10
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know
14:15-15:05
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
08:30-09:20
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.
09:25-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.
10:35-11:25
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.
11:30-12:20
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.
13:20-14:10
Advanced Techniques in Tracing Suspects, and lateral problem solving
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:05
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources
"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how. PART 2 on the final day with free tools to download and keep
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
You can’t defeat today’s encryption (at least not that we know of) but law enforcement and the government intelligence community can “Work around encryption” for a price. Once you identify a target using commercially available encryption products or services (and with enough resources or money) government can defeat the target near 100% of the time.
This session:
Locating and Tracking Devices by MAC Addresses and App-Based SDKs plus Privacy Measures by Apple & Google
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Open Source Tools, Part 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
A must see presentation of the best and most dynamic tools available to the investigator- and they’re all free. A download link will be provided during this session with 100 tools to take away