
ISS World Latin America is the world's largest gathering of Central and South American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet.
Track 1: ISS for Lawful Interception and Criminal Investigations
Track 2: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 3: LEA and Intelligence Analyst Training and Product Demonstrations
Track 4: OSINT for Threat Detection, Social Network and Dark Web Monitoring
Track 5: Mobile Location, Surveillance and Signal Intercept Product DemonstrationsPre-Conference Seminars and Tutorials (Monday, 9 October 2017)
Training Seminars by LEAs and Ph.D Computer Scientists
(Certificates of ISS Technology Training Available Upon Request)
Monday, 10 October 2016
Seminar #1
09:00-17:00Online Social Media and Internet Investigations
Presented by Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Captain, Indiana State Police, USA09:00-10:00
The role of Online Social Media OSINT in Predicting and Interdicting Spree Killings: Case Studies and Analysis10:15-11:15
OSINT and Criminal Investigations11:30-12:30
Metadata Exploitation in Criminal Investigations13:30-14:30
EXIF Tags and Geolocation of Devices for Investigations and Operational Security14:45-15:45
Case Studies in Metadata Vulnerability Exploitation and Facial Recognition16:00-17:00
What Investigators Need to Know about Emerging Technologies Used to Hide on the Internet
Seminar #2
09:00-17:00Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1 day seminar is to take the attendees from the basics of understanding the internet, how to find data, through to a full understanding of best practice of an internet investigator, having awareness and knowledge of all the tools available to achieve this.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar.
09:00-10:00
The Internet and how Suspects Leave a Digital Footprint10:15-11:15
Recognizing Traffic Data and Digital Profiling11:30-12:30
WIFI, Geolocation and Mobile Data Trace13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and Proxies14:45-15:45
Advanced Techniques in Tracing Suspects and Lateral Problem Solving16:00-17:00
Open Source Tools, Resources and TechniquesPre-Conference Sessions Description At The End of Agenda PostinG
Tuesday, 11 October 2016
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Latin America has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World Latin America Exhibit Hours:
Tuesday, 11 October 2016 - 10:00 - 18:00
Wednesday, 12 October 2016 - 9:30 - 12:00
ISS World Latin America 2016 - Agenda at a Glance
Track 1: ISS for Lawful Interception and Criminal Investigations
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
Monday, 10 October 2016
9:00-17:00 Online Social Media and Internet Investigations
Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Captain, Indiana State Police, USATuesday, 11 October 2016
9:00-9:30 Lawful Interception in 4G Wireless Networks
Presented by Utimaco TS GmbH11:30-12:00 Scalable LI Solutions for dealing with LTE/VoLTE Roaming and OTT Encryption
Michael Hammer, Principal Engineer, Yaana Technologies12:00-12:30 Voice Biometrics Basics, New powerful ID solutions to fight organized crime - From Forensic to Tactical analysis (kidnaping, blackmail, … )
Presented by Agnitio15:45-16:15 Session A Deep Packet Inspection in Clouds and NFV
Curt Schwaderer, VP of Engineering, Yaana Technologies
15:45-16:45 Session B Using OSINT, COMINT and HUMINT to Detect and Discover Mission Critical Insight
Organizations and government agencies of all sizes have found it challenging to develop and deploy effective systems that are able to proactively monitor open source intelligence (OSINT) in an effective way.
During this session, you will learn why semantics is the best option available for OSINT, what is required to deploy an effective discovery platform and learn how to utilize OSINT techniques for the continuous monitoring of unstructured data sources. Included in the session will be a demonstration of a semantic platform called: Cogito Risk Watcher Platform. The presenters will go into the detail and demonstrate how the platform has been used by organizations around the globe to actively monitor in near real time all types of unstructured data including: web sites, specialty forums and blogs, RSS feeds, social media posts and saved search engine queries.
Presented by Expert SystemsWednesday, 12 October 2016
11:00-12:00 Modern Satellite Communication Lawful Interception and Criminal Investigation. Tasks. Problems. Solutions.
Presented by Idea mars UAB.
Track 2: Encrypted Traffic Monitoring and IT Intrusion Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Monday, 10 October 2016
11:30-12:30 FinFisher™: The End to End approach to Cyber Investigations
Presented by FinFisher14:45-15:45 Session A A World of Possibilities - Remote Exploitation of Smartphones and PCs
Presented by FinFisherTuesday, 11 October 2016
11:30-12:30 Verint: Gaining Intelligence Value in Spite of Growing Encryption Challenges
Alfredo Gabriel Larrañaga, Sales & Marketing Director, CALA, Verint Systems
Track 3: LEA and Intelligence Analyst Training and Product Demonstration Track
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Tuesday, 11 October 2016
9:00-9:30 Generating new Intelligence from call data records
Presented by trovicor9:30-10:00 Identifying suspects through text analysis - An introduction to mass email monitoring
Presented by trovicor14:00-15:00 Session A Lawful Interception in 2016. VoLTE and Metadata Analysis on encrypted services like Whatsapp, Viber & Telegram.
Presented by IPS14:00-15:00 Session B Reveal the Threat and Stop the Breach - Cyber investigation Platform.
Mtro. Luis Javier Perez Del Real - Solution Architect, CALA, Verint15:45-16:45 Wifi, Wifileaks…
Presented by SunerisWednesday, 12 October 2016
9:30-10:00 Real-time target location tracking – How to generate alerts of suspicious movements
Presented by trovicor
Track 4: OSINT for Threat Detection, Social Network and Dark Web Monitoring
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Monday, 10 October 2016
9:00-17:00 Session A Practitioners Guide to Internet Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police9:00-10:00 Beyond Lawful Interception without the need of Hacking! A new approach to the IP investigation on encrypted services like Facebook, Gmail and Whatsapp.
Presented by IPS10:15-11:15 “We analyzed the internet, now what?” Using the HIWIRE System to transform passive analytics into a full-blown WEBINT mission.
Nir Divon, WIP13:30-14:30 Mapping the Invisible – A Journey into Discovering Tor hidden Services
Presented by Encryptech GroupTuesday, 11 October 2016
9:00-10:00 Session A Post Trojan Infiltration: The new Digital Undercover Agent
Marco Braccioli, Senior Vice President, AREA
Emanuele Marcozzi, Presales Engineer, AREA9:00-10:00 Session B OSINT and Beyond: From Online Surveillance of Targets to Direct Surveillance and Competitive Intelligence
Presented by S2T11:30-12:30 Session A OSTIM - Open Source Threat Intelligence Management
We see two trends that are expanding when talking about cybersecurity. One is the length of time the networks remain compromised before the attack is completed, we're talking months or years, not days. Also attacks like the one to the White House, JP Morgan, and others, despite the fact that they have the best preventive methods gives indication that the current paradigm of trying to prevent every attack is flawed and the weakest link in the security chain -the human being-, is constantly also under social engineering attacks. Combined the facts mentioned there has to be a paradigm shift, a new way to see things in the cybersecurity space of institutions that carry the responsibility of conducting law enforcement.
Presented by Chenega International Consulting11:30-12:30 Session B Automatic Exploitation of Social Network, Deep and Dark Web for Enhanced Target Profiling and Public Sentiment Analysis.
Presented by IPS14:00-15:00 Session A Cybersecurity Protection Paradigms
Franklin Recio – Business Development Manager, SS815:45-16:45 Session A The New Forensic Investigator Toolbox: from Tactical to Open Source Investigations
Emanuele Marcozzi, Presales Engineer, AREAWednesday, 12 October 2016
9:00-10:00 Session A The powerful effect of using HIWIRE to engage the internet less like a data source and more like a virtual neighborhood.
Nir Divon, WIP11:00-12:00 DPI and Social Media Analytics
Curt Schwaderer, VP of Engineering, Yaana Technologies
Track 5: Mobile Location, Surveillance and Signal Intercept Product Training
This training is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Monday, 10 October 2016
13:30-14:30 Satellite monitoring explained, including solving the problem of VSAT interception and CiC
Presented by VASTechTuesday, 11 October 2016
9:00-9:30 INFORMER: Exposing your target and digital fingerprints in real-time to investigate, prevent and prosecute crime.
Presented by SYM Servicios Integrales11:30-12:30 Session A The perfect balance between mobile security and usability
This presentation will demo an end to end military grade 360° mobile security solution, that provides maximum functionality with maximum security
Rami Yaar, Kaymera Technologies11:30-12:30 Session B Advanced analytics to uncover targets and patterns based on mass data from a mobile communications capture system
Presented by VASTech14:00-15:00 Session A Miniature Video Surveillance
Presented by COVIDENCE14:00-15:00 Session B EG - uTis 3G / 4G Native Ultimate Tactical Interception System : Voice / Data
Presented by Encryptech Group15:45-16:45 Session A Electronically Steerable and Highly Directional Microphone Arrays Used for Long Range Audio Capture and Drone Detections
Presented by Squarehead15:45-16:45 Session B Putting your MDM to Work: Protect Mobile Calls and Messages from Interception
Presented by KoolspanWednesday, 12 October 2016
9:00-10:00 Session A Forensic Data Fusion Center: IPDR, CDR, Nat-Pat disambiguation and every external source in a single frame
Emanuele Marcozzi, Presales Engineer, AREA9:00-9:30 Session B INFORMER: Exposing your target and digital fingerprints in real-time to investigate, prevent and prosecute crime.
Presented by SYM Servicios Integrales11:00-12:00 Session A Tactical Operations with a Strategic Vision with a Command and Control Center using Audio, Video and GPS.
Presented by IPS11:00-12:00 Session B The multiple uses of IMSI CATCHERS for HOMELAND SECURITY
Presented by Encryptech Group
Pre-Conference Training Seminars 2016
(Certificates of ISS Technology Training Available Upon Request)
Monday, 10 October 2016
Seminar #1
09:00-17:00Online Social Media and Internet Investigations
Presented by Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Commander, Cyber Crimes Investigative Technologies Section, Indiana State Police, USA9:00-10:00
The role of Online Social Media OSINT in Predicting and Interdicting Spree Killings: Case Studies and Analysis
This session is for criminal investigators and intelligence analysts who need to understand the impact of online social networking on how criminals communicate, train, interact with victims, and facilitate their criminality.10:15-11:15
OSINT and Criminal Investigations
Now that the Internet is dominated by Online Social Media, OSINT is a critical component of criminal investigations. This session will demonstrate, through case studies, how OSINT can and should be integrated into traditional criminal investigations.
11:30-12:30
Metadata Exploitation in Criminal Investigations
This session is for investigators who need to understand social network communities along with the tools, tricks, and techniques to prevent, track, and solve crimes.13:30-14:30
EXIF Tags and Geolocation of Devices for Investigations and Operational Security
Current and future undercover officers must now face a world in which facial recognition and Internet caching make it possible to locate an online image posted years or decades before. There are risks posed for undercover associated with online social media and online social networking Investigations. This session presents guidelines for dealing with these risks.14:45-15:45
Case Studies in Metadata Vulnerability Exploitation and Facial Recognition
While there are over 300 social networking sites on the Internet, Facebook is by far the most populous, with over 800 million profiles. It has roughly the same population as the US and UK combined, making it the third largest country by population. There are over 250 million images and 170 million status updates loaded on Facebook every day. This session will cover topics including Facebook security and account settings, Facebook data retention and interaction with law enforcement, and common fraud schemes involving Facebook.16:00-17:00
What Investigators Need to Know about Emerging Technologies Used to Hide on the Internet
Criminal investigators and analysts need to understand how people conceal their identity on the Internet. Technology may be neutral, but the ability to hide ones identity and location on the Internet can be both a challenge and an opportunity. Various methods of hiding ones identity and location while engaged in activates on the Internet, provides an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities. As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic about which every investigator and analyst may become familiar.Seminar #2
09:00-17:00Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1 day seminar is to take the attendees from the basics of understanding the internet, how to find data, through to a full understanding of best practice of an internet investigator, having awareness and knowledge of all the tools available to achieve this.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar.
9:00-10:00
The Internet and how Suspects Leave a Digital Footprint
- How it works. Why it works. How data traffic leaves a trace ;
- What the internet is; what is an IP and what protocols are used ( TCP/IP)
- IPv4 and IPv6 – understanding the changes
- mirror servers use and value
- Tracking and evaluating data
10:15-11:15
Recognizing Traffic Data and Digital Profiling
- A practitioner's guide to what data is available. How to harvest and analyze it.
- Best practice to identify suspects and build profiles.
- Data collection and interrogation
- IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id)
- Dynamic approaches to identifying suspects through internet profiles
- What investigators get from tech and service providers, and how to analyze it
- What to ask for with current legislation to achieve best results
- SPOC best practice.
- ISP/ CSP capabilities and opportunities.
11:30-12:30
WIFI, Geolocation and Mobile Data Trace
- A practitioner's look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement.
- Dynamic live time tracing
- Geo location services and uses
- Surveillance without DSA and authority
13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and Proxies
- How suspects are using emerging and new technologies.
- An introduction to where technology is going, and how Law enforcement can use this to our advantages.
- Darknet, (Deepweb) and IRC use
- VOIP, Skype
- Advanced data sniffing and profile building
- TOR systems, applications and ways to coax offenders out of the system.
14:45-15:45
Advanced Techniques in Tracing Suspects
- Using innovative and dynamic methods to trace offenders.
- tricks used by suspects and how to combat them
- Covert internet investigations
- Proxy servers and hiding.
- managing collateral intrusion
- Reverse and social engineering
- Thinking outside the box
- Possible missed opportunities
- Profile building and manhunts
16:00-17:00
Open Source Intelligence Training (OSINT)
- An in depth look at what tools are available; how to use them, and practical applications.
- safety online when open sourcing
- open source training and awareness basics
- Trace suspects using available tools
- How to identify leads in investigations and data from ISP
- Internet tools to assist in building online profiles on suspects
- A run through of my website dedicated to online tracing tools and how best to use it (LEA ONLY)
- Reverse engineering and social engineering