ISS World Latin America is the world's largest gathering of Central and South American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet.

Track 1: ISS for Lawful Interception and Criminal Investigations
Track 2: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 3: LEA and Intelligence Analyst Training and Product Demonstrations
Track 4: OSINT for Threat Detection, Social Network  and Dark Web Monitoring
Track 5: Mobile Location, Surveillance and Signal Intercept Product Demonstrations

Pre-Conference Seminars and Tutorials (Monday, 9 October 2017)

ISS World Agenda From 2016 ISS World Latin America Program

ISS World Latin America 2017
Agenda and Registration Link
Available July 2017



Training Seminars by LEAs and Ph.D Computer Scientists

(Certificates of ISS Technology Training Available Upon Request)

Monday, 10 October 2016

Seminar #1
09:00-17:00

Online Social Media and Internet Investigations 

Presented by Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Captain, Indiana State Police, USA

09:00-10:00
The role of Online Social Media OSINT in Predicting and Interdicting Spree Killings: Case Studies and Analysis

10:15-11:15
OSINT and Criminal Investigations

11:30-12:30
Metadata Exploitation in Criminal Investigations

13:30-14:30
EXIF Tags and Geolocation of Devices for Investigations and Operational Security

14:45-15:45
Case Studies in Metadata Vulnerability Exploitation and Facial Recognition

16:00-17:00
What Investigators Need to Know about Emerging Technologies Used to Hide on the Internet

Seminar #2
09:00-17:00

Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1 day seminar is to take the attendees from the basics of understanding the internet, how to find data, through to a full understanding of best practice of an internet investigator, having awareness and knowledge of all the tools available to achieve this.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar.

09:00-10:00
The Internet and how Suspects Leave a Digital Footprint

10:15-11:15
Recognizing Traffic Data and Digital Profiling

11:30-12:30
WIFI, Geolocation and Mobile Data Trace

13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and Proxies

14:45-15:45
Advanced Techniques in Tracing Suspects and Lateral Problem Solving

16:00-17:00
Open Source Tools, Resources and Techniques

Pre-Conference Sessions Description At The End of Agenda PostinG


Tuesday, 11 October 2016

8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies

8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Latin America has Solutions
Dr. Jerry Lucas, President, TeleStrategies


ISS World Latin America Exhibit Hours:

Tuesday, 11 October 2016 - 10:00 - 18:00

Wednesday, 12 October 2016 - 9:30 - 12:00


ISS World Latin America 2016 - Agenda at a Glance


Track 1: ISS for Lawful Interception and Criminal Investigations

This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.

Monday, 10 October 2016

9:00-17:00 Online Social Media and Internet Investigations
Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Captain, Indiana State Police, USA

Tuesday, 11 October 2016

9:00-9:30 Lawful Interception in 4G Wireless Networks
Presented by Utimaco TS GmbH
11:30-12:00 Scalable LI Solutions for dealing with LTE/VoLTE Roaming and OTT Encryption
Michael Hammer, Principal Engineer, Yaana Technologies
12:00-12:30 Voice Biometrics Basics, New powerful ID solutions to fight organized crime - From Forensic to Tactical analysis (kidnaping, blackmail, … )
Presented by Agnitio
15:45-16:15 Session A Deep Packet Inspection in Clouds and NFV
Curt Schwaderer, VP of Engineering, Yaana Technologies
15:45-16:45 Session B Using OSINT, COMINT and HUMINT to Detect and Discover Mission Critical Insight
Organizations and government agencies of all sizes have found it challenging to develop and deploy effective systems that are able to proactively monitor open source intelligence (OSINT) in an effective way.
During this session, you will learn why semantics is the best option available for OSINT, what is required to deploy an effective discovery platform and learn how to utilize OSINT techniques for the continuous monitoring of unstructured data sources. Included in the session will be a demonstration of a semantic platform called: Cogito Risk Watcher Platform. The presenters will go into the detail and demonstrate how the platform has been used by organizations around the globe to actively monitor in near real time all types of unstructured data including: web sites, specialty forums and blogs, RSS feeds, social media posts and saved search engine queries.
Presented by Expert Systems

Wednesday, 12 October 2016

11:00-12:00 Modern Satellite Communication Lawful Interception and Criminal Investigation. Tasks. Problems. Solutions.
Presented by Idea mars UAB.

Track 2: Encrypted Traffic Monitoring and IT Intrusion Product Training

This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees

Monday, 10 October 2016

11:30-12:30 FinFisher™: The End to End approach to Cyber Investigations
Presented by FinFisher
14:45-15:45 Session A A World of Possibilities - Remote Exploitation of Smartphones and PCs
Presented by FinFisher

Tuesday, 11 October 2016

11:30-12:30 Verint: Gaining Intelligence Value in Spite of Growing Encryption Challenges
Alfredo Gabriel Larrañaga, Sales & Marketing Director, CALA, Verint Systems

Track 3: LEA and Intelligence Analyst Training and Product Demonstration Track

This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees

Tuesday, 11 October 2016

9:00-9:30 Generating new Intelligence from call data records
Presented by trovicor
9:30-10:00 Identifying suspects through text analysis - An introduction to mass email monitoring
Presented by trovicor
14:00-15:00 Session A Lawful Interception in 2016. VoLTE and Metadata Analysis on encrypted services like Whatsapp, Viber & Telegram.
Presented by IPS
14:00-15:00 Session B Reveal the Threat and Stop the Breach - Cyber investigation Platform.
Mtro. Luis Javier Perez Del Real - Solution Architect, CALA, Verint
15:45-16:45 Wifi, Wifileaks…
Presented by Suneris

Wednesday, 12 October 2016

9:30-10:00 Real-time target location tracking – How to generate alerts of suspicious movements
Presented by trovicor

Track 4: OSINT for Threat Detection, Social Network and Dark Web Monitoring

This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees

Monday, 10 October 2016

9:00-17:00 Session A Practitioners Guide to Internet Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
9:00-10:00 Beyond Lawful Interception without the need of Hacking! A new approach to the IP investigation on encrypted services like Facebook, Gmail and Whatsapp.
Presented by IPS
10:15-11:15 “We analyzed the internet, now what?” Using the HIWIRE System to transform passive analytics into a full-blown WEBINT mission.
Nir Divon, WIP
13:30-14:30 Mapping the Invisible – A Journey into Discovering Tor hidden Services
Presented by Encryptech Group

Tuesday, 11 October 2016

9:00-10:00 Session A Post Trojan Infiltration: The new Digital Undercover Agent
Marco Braccioli, Senior Vice President, AREA
Emanuele Marcozzi, Presales Engineer, AREA
9:00-10:00 Session B OSINT and Beyond: From Online Surveillance of Targets to Direct Surveillance and Competitive Intelligence
Presented by S2T
11:30-12:30 Session A OSTIM - Open Source Threat Intelligence Management
We see two trends that are expanding when talking about cybersecurity. One is the length of time the networks remain compromised before the attack is completed, we're talking months or years, not days. Also attacks like the one to the White House, JP Morgan, and others, despite the fact that they have the best preventive methods gives indication that the current paradigm of trying to prevent every attack is flawed and the weakest link in the security chain -the human being-, is constantly also under social engineering attacks. Combined the facts mentioned there has to be a paradigm shift, a new way to see things in the cybersecurity space of institutions that carry the responsibility of conducting law enforcement.
Presented by Chenega International Consulting
11:30-12:30 Session B Automatic Exploitation of Social Network, Deep and Dark Web for Enhanced Target Profiling and Public Sentiment Analysis.
Presented by IPS
14:00-15:00 Session A Cybersecurity Protection Paradigms
Franklin Recio – Business Development Manager, SS8
15:45-16:45 Session A The New Forensic Investigator Toolbox: from Tactical to Open Source Investigations
Emanuele Marcozzi, Presales Engineer, AREA

Wednesday, 12 October 2016

9:00-10:00 Session A The powerful effect of‎ using HIWIRE to engage the internet less like a data source and more like a virtual neighborhood.
Nir Divon, WIP
11:00-12:00 DPI and Social Media Analytics
Curt Schwaderer, VP of Engineering, Yaana Technologies

Track 5: Mobile Location, Surveillance and Signal Intercept Product Training

This training is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Monday, 10 October 2016

13:30-14:30 Satellite monitoring explained, including solving the problem of VSAT interception and CiC
Presented by VASTech

Tuesday, 11 October 2016

9:00-9:30 INFORMER: Exposing your target and digital fingerprints in real-time to investigate, prevent and prosecute crime.
Presented by SYM Servicios Integrales
11:30-12:30 Session A The perfect balance between mobile security and usability
This presentation will demo an end to end military grade 360° mobile security solution, that provides maximum functionality with maximum security
Rami Yaar, Kaymera Technologies
11:30-12:30 Session B Advanced analytics to uncover targets and patterns based on mass data from a mobile communications capture system
Presented by VASTech
14:00-15:00 Session A Miniature Video Surveillance
Presented by COVIDENCE
14:00-15:00 Session B EG - uTis 3G / 4G Native Ultimate Tactical Interception System : Voice / Data
Presented by Encryptech Group
15:45-16:45 Session A Electronically Steerable and Highly Directional Microphone Arrays Used for Long Range Audio Capture and Drone Detections
Presented by Squarehead
15:45-16:45 Session B Putting your MDM to Work: Protect Mobile Calls and Messages from Interception
Presented by Koolspan

Wednesday, 12 October 2016

9:00-10:00 Session A Forensic Data Fusion Center: IPDR, CDR, Nat-Pat disambiguation and every external source in a single frame
Emanuele Marcozzi, Presales Engineer, AREA
9:00-9:30 Session B INFORMER: Exposing your target and digital fingerprints in real-time to investigate, prevent and prosecute crime.
Presented by SYM Servicios Integrales
11:00-12:00 Session A Tactical Operations with a Strategic Vision with a Command and Control Center using Audio, Video and GPS.
Presented by IPS
11:00-12:00 Session B The multiple uses of IMSI CATCHERS for HOMELAND SECURITY
Presented by Encryptech Group


Pre-Conference Training Seminars 2016

(Certificates of ISS Technology Training Available Upon Request)

Monday, 10 October 2016

Seminar #1
09:00-17:00

Online Social Media and Internet Investigations 

Presented by Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Commander, Cyber Crimes Investigative Technologies Section, Indiana State Police, USA

9:00-10:00
The role of Online Social Media OSINT in Predicting and Interdicting Spree Killings: Case Studies and Analysis
This session is for criminal investigators and intelligence analysts who need to understand the impact of online social networking on how criminals communicate, train, interact with victims, and facilitate their criminality.

10:15-11:15
OSINT and Criminal Investigations
Now that the Internet is dominated by Online Social Media, OSINT is a critical component of criminal investigations. This session will demonstrate, through case studies, how OSINT can and should be integrated into traditional criminal investigations.
 
11:30-12:30
Metadata Exploitation in Criminal Investigations
This session is for investigators who need to understand social network communities along with the tools, tricks, and techniques to prevent, track, and solve crimes.

13:30-14:30
EXIF Tags and Geolocation of Devices for Investigations and Operational Security
Current and future undercover officers must now face a world in which facial recognition and Internet caching make it possible to locate an online image posted years or decades before. There are risks posed for undercover associated with online social media and online social networking Investigations. This session presents guidelines for dealing with these risks.

14:45-15:45
Case Studies in Metadata Vulnerability Exploitation and Facial Recognition
While there are over 300 social networking sites on the Internet, Facebook is by far the most populous, with over 800 million profiles. It has roughly the same population as the US and UK combined, making it the third largest country by population. There are over 250 million images and 170 million status updates loaded on Facebook every day. This session will cover topics including Facebook security and account settings, Facebook data retention and interaction with law enforcement, and common fraud schemes involving Facebook.

16:00-17:00
What Investigators Need to Know about Emerging Technologies Used to Hide on the Internet
Criminal investigators and analysts need to understand how people conceal their identity on the Internet. Technology may be neutral, but the ability to hide ones identity and location on the Internet can be both a challenge and an opportunity. Various methods of hiding ones identity and location while engaged in activates on the Internet, provides an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities. As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic about which every investigator and analyst may become familiar.

Seminar #2
09:00-17:00

Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1 day seminar is to take the attendees from the basics of understanding the internet, how to find data, through to a full understanding of best practice of an internet investigator, having awareness and knowledge of all the tools available to achieve this.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar.

9:00-10:00
The Internet and how Suspects Leave a Digital Footprint

  • How it works. Why it works. How data traffic leaves a trace ;
  • What the internet is; what is an IP and what protocols are used ( TCP/IP)
  • IPv4 and IPv6 – understanding the changes
  • mirror servers use and value
  • Tracking and evaluating data

10:15-11:15
Recognizing Traffic Data and Digital Profiling

  • A practitioner's guide to what data is available. How to harvest and analyze it.
  • Best practice to identify suspects and build profiles.
  • Data collection and interrogation
  • IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id)
  • Dynamic approaches to identifying suspects through internet profiles
  • What investigators get from tech and service providers, and how to analyze it
  • What to ask for with current legislation to achieve best results
  • SPOC best practice.
  • ISP/ CSP capabilities and opportunities.

11:30-12:30
WIFI, Geolocation and Mobile Data Trace

  • A practitioner's look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement.
  • Dynamic live time tracing
  • Geo location services and uses
  • Surveillance without DSA and authority

13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and Proxies

  • How suspects are using emerging and new technologies.
  • An introduction to where technology is going, and how Law enforcement can use this to our advantages.
  • Darknet, (Deepweb) and IRC use
  • VOIP, Skype
  • Advanced data sniffing and profile building
  • TOR systems, applications and ways to coax offenders out of the system.

14:45-15:45
Advanced Techniques in Tracing Suspects

  • Using innovative and dynamic methods to trace offenders.
  • tricks used by suspects and how to combat them
  • Covert internet investigations
  • Proxy servers and hiding.
  • managing collateral intrusion
  • Reverse and social engineering
  • Thinking outside the box
  • Possible missed opportunities
  • Profile building and manhunts

16:00-17:00
Open Source Intelligence Training (OSINT)

  • An in depth look at what tools are available; how to use them, and practical applications.
  • safety online when open sourcing
  • open source training and awareness basics
  • Trace suspects using available tools
  • How to identify leads in investigations and data from ISP
  • Internet tools to assist in building online profiles on suspects
  • A run through of my website dedicated to online tracing tools and how best to use it (LEA ONLY)
  • Reverse engineering and social engineering