< Back to ISS World Programs

ISS World Latin America is the world's largest gathering of Central and South American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Hi-Tech Electronic Investigations and Cyber Intelligence Gathering.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet.

Track 1: Training Seminars by LEAs and Ph.D Computer Scientists
Track 2: Lawful Interception and Hi-Tech Criminal Investigations
Track 3: Social Media Monitoring, Artificial Intelligence and Data Analytics
Track 4: Dark Web Monitoring and Cybercurrency Analytics
Track 5: Mobile and Wi-Fi Signal Intercept
Track 6: Audio, Video and GPS Surveillance
Track 7: Financial Crime Investigation Techniques and Products


ISS World Latin America Agenda from 2019

ISS World Latin America 2021 Agenda and Registration
will be updated May 2021



(Certificates of ISS Technology Training Available Upon Request)

Special Training Seminars (24 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists

Online Social Media and Internet Investigations
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Practitioners Guide to Internet Investigations
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Understanding Mobile 2G, 3G, 4G and 5G Infrastructure, Intercept and Cryptography
(2 Classroom Hours)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators
(4 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Concerns and Considerations in Financial Crime Investigations
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is a former US Federal Law Enforcement Officer.

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
(One Classroom Hour)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

(Certificates of ISS Technology Training Available Upon Request)


Track 1: Training Seminars by LEAs and Ph.D Computer Scientists

Monday, 28 October 2019

Seminar #1
09:00-17:15

Online Social Media and Internet Investigations (6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This one day session provides an up-to-date understanding of how social networking sites work and how members act and interact. Attendees will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

Seminar #2

9:00-17:15

Practitioners Guide to Internet Investigations (6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1 day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

Seminar #3
9:00-10:00

Understanding Mobile 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategies

This session presents what technical investigators need to know about 2G/3G/4G technology infrastructure, Including: Lawful Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and Tracking Targets Using CDR's, SS7 Interconnect and IMSI Catchers and more.

Seminar #4
10:15-11:15

Understanding 5G Infrastructure and Lawful Intercept Options for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategies

This session is an introduction to 5G and what technical investigators need to know including: Infrastructure differences with 4G-LTE and 5G, New Radio Access Technologies, and Understanding IMSI Encryption Impact on LI and SUPI and SUCI replacement

Seminar #5
11:30-12:30

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar #6
13:45-14:45

Cybercurrency 101: Introduction to What Technical Investigators Need to Know about Bitcoin and Altcoin Transactions, Dark Web Commerce and Blockchain Analysis
Presented by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

This 101 training seminar is an introduction to Bitcoin, how the system is used to support criminal activities (e.g. Dark Web) and why technical investigators need to understand the basic Bitcoin transaction mechanism (Blockchain) to successfully defeat 21st century criminals and terrorist actions. Specifically, this introduction to Bitcoin for technical investigators addresses:

  • Bitcoin Basics for Technical Investigators
  • Understanding Bitcoin Infrastructure, Blockchain and Bitcoin Mining
  • How Criminals and Terrorists Use TOR and Dark Web
  • Bitcoin Cryptography Demystified (For Non-Math Majors)
  • Popular Altcoins used by Criminals and the New Challenges Facing Law Enforcement 

Seminar #7
15:00-16:00

Investigation Techniques for Unmasking TOR Hidden Services and Other Dark Web Operations
Presented by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

TOR networks are notoriously effective at hiding the online identity of criminals, terrorists and others who are up to no good. The other side that receives less attention are TOR hidden services. These are services that leverage TOR's anonymizing capabilities to mask the identity of criminally-hosted online services - forming the basis of just about all illegal gambling sites, drug markets, child exploitation material, firearm sales, terrorism propaganda, and more.

  • How TOR hides IP addresses/identity/location

  • TOR hosting, What is .ONION and content analysis

Tuesday, 29 October 2019

Seminar #8
13:00-17:00

Concerns and Considerations in Financial Crime Investigations (3 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC
Mike is a former US Federal Law Enforcement Officer who specialized in complex fraud and cybercrime investigations and currently provides training to improve detection and investigations of fraud, money laundering and counter terror finance.

In this 1-day seminar we will discuss the tools and methods criminals use and the law enforcement response. Each presentation describes different elements of financial crime and business models used by criminals as well as law enforcement methods and tactics to identify and disrupt them. We will discuss the essentials in criminal networks, key players, money laundering, and trade-based money laundering. We will describe how information can be found as money is moved around the world and how investigators can make best use of this knowledge. This training is aimed primarily at the investigator and analyst, but also has application to the law enforcement, intelligence, and financial regulatory community.

Wednesday, 30 October 2019

Seminar #9
08:30-11:30

Concerns and Considerations in Financial Crime Investigations (2 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC
Mike is a former US Federal Law Enforcement Officer who specialized in complex fraud and cybercrime investigations and currently provides training to improve detection and investigations of fraud, money laundering and counter terror finance.

In this 1-day seminar we will discuss the tools and methods criminals use and the law enforcement response. Each presentation describes different elements of financial crime and business models used by criminals as well as law enforcement methods and tactics to identify and disrupt them. We will discuss the essentials in criminal networks, key players, money laundering, and trade-based money laundering. We will describe how information can be found as money is moved around the world and how investigators can make best use of this knowledge. This training is aimed primarily at the investigator and analyst, but also has application to the law enforcement, intelligence, and financial regulatory community.


WELCOME REMARKS & KEYNOTE:

Monday, 28 October 2019

8:30-9:00
Keynote Address
Commissioner Carlos Delgado, National Director of Police Intelligence, National Police of Panama

Tuesday, 29 October 2019

8:15-8:30
Opening Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies

8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Latin America has Solutions
Dr. Jerry Lucas, President, TeleStrategies


ISS World Latin America Exhibit Hours:

Tuesday, 29 October 2019
10:00 - 18:00

Wednesday, 30 October 2019
9:30 - 12:00


ISS World Latin America 2019 - Agenda at a Glance



Track 2: Lawful Interception and Hi-Tech Criminal Investigations

Monday, 28 October 2019

9:00-10:00
The Internet, and how suspects leave a digital footprint. How the system works for us, as investigators
Mark Bentley, Communications Data Experts, National Cyber Crime Law Enforcement, UK Police

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
Mark Bentley, Communications Data Experts, National Cyber Crime Law Enforcement, UK Police

15:00-16:00
Advanced Techniques in Tracing Suspects, a lateral problem solving
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Tuesday, 29 October 2019

9:00-10:00 Session A
Lawful Interception in 5G Networks
This session will elaborate the needs and the challenges of lawful interception in current and future wireless networks. Network operators and law enforcement agencies will get practical advice and hear about best practice techniques for the implementation of LI in 5G networks.
Presented by Utimaco TS GmbH

9:00-10:00 Session B
Data Fusion and Analytics for National Security and Intelligence
Saran Gopalakrishnan, Yaana

14:30-15:30 Session A
IBM i2 Intelligence Analysis delivers new and enhanced capabilities for performance optimization and efficient information managment
Presented by Vanume

14:30-15:30 Session B
Voice Biometrics and Speech Analytics deployments in real world scenarios

Kristof Lorinczy, Phonexia

16:00-17:00 Session B
On and Off Field Synergy: Communicate, Track and Monitor with Tassta
Elmer Hernández, Gisnet

Wednesday, 30 October 2019

8:30-9:30
Live Demo. Cyberoperation: Invisible control of Android smartphones and Google Clouds
OPEN TO LEA AND GOVT ONLY
Antonio Ramos, COO, MOLLITIAM INDUSTRIES

10:30-11:30
5G: Keep Calm & Carry on with LI

OPEN TO LEA AND GOVT ONLY

Gregg Sandridge, Yaana


Track 3: Social Media Monitoring, Artificial Intelligence and Data Analytics

Monday, 28 October 2019

10:15-11:15
Acquiring targets in the digital sphere – Breaking down crime investigation with ProFound
Presented by Digital Clues

11:30-12:30
Everyone leaves a trace - How the digital sphere has become the ultimate place for target acquisition
Presented by Digital Clues

16:15-17:15
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site
Mark Bentley, Communications Data Experts, National Cyber Crime Law Enforcement, UK Police

Tuesday, 29 October 2019

9:00-10:00
Big content intelligence: the Multimedia Laboratory
Presented by everis ADS

13:00-14:00 Session A
An inside look into the world of cyber intelligence
Presented by Wintego

13:00-14:00 Session B
The Butterfly Effect: Making the WEB a safer place
Omri Timianker, President,Cobwebs Technologies

14:30-15:30
The pieces fit: solving the intelligence puzzle with multi source fusion
Presented by WebintPro

16:00-17:00
Live Demo. Cyberoperation: invisible control of Windows/macOS systems
Antonio Ramos, COO, MOLLITIAM INDUSTRIES

Wednesday, 30 October 2019

8:30-9:30
Information scraps and big data exploitation
Presented by Vanume

12:00-13:00
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police


Track 4: Dark Web Monitoring and Cybercurrency Analytics

Monday, 28 October 2019

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

10:15-11:15
Tor, onion routers, Deepnet and Darknet: An Investigator's Perspective: PART 1/2
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

11:30-12:30
Tor, onion routers, Deepnet and Darknet: A Deep Dive for Criminal Investigators: PART 2/2
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

13:45-14:45
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

13:45-14:45
Cybercurrency 101: What Technical Investigators Need to Know about Bitcoin and Altcoin Transactions, Dark Web Commerce and Blockchain Analysis
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies

15:00-16:00
Investigation Techniques for Unmasking TOR Hidden Services and Other Dark Web Operations
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies

Tuesday, 29 October 2019

9:00-10:00
Real live case: monitoring and action on Open Sources to face sources of destabilization and mass control in electoral processes and general strikes.
Samuel Alvarez, CEO, MOLLITIAM INDUSTRIES


Track 5: Mobile and Wi-Fi Signal Intercept

Monday, 28 October 2019

9:00-10:00
Understanding Mobile 2G/3G/4G Infrastructure and Law Intercept for Technical Investigations
Dr. Jerry Lucas, President, TeleStrategies

10:15-11:15
Understanding 5G Infrastructure, New Radio and Lawful Intercept Challenges for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies

11:30-12:30
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

11:30-12:30
Tor, onion routers, Deepnet and Darknet: A Deep Dive for Criminal Investigators
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

13:45-14:45
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

13:45-14:45
The Simplicity of Interception and Cyber: How CAPTUR has achieved Simpler, Less expensive and Effective Native 2G/3G/4G Interception with a boost of Cyber-Attack and a smart touch of Wi-Fi
Presented by Almenta

15:00-16:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

15:00-16:00
How will Blockchain participate in the evolution of Mobile Security
Presented by Koolspan

16:15-17:15
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Tuesday, 29 October 2019

13:00-14:00 Session A
Mobile Location Intelligence: how to leverage active targeting, Big Data and tactical geolocation capabilities
Presented by Argos Defense

13:00-14:00 Session B
Mobile Location Intelligence: how to leverage active targeting, Big Data and tactical geolocation capabilities
Presented by Creativity Software

14:30-15:30 Session A
(ENGLISH LANGUAGE)
Practical and creative example of modifying Android OS by HEX editing system files, and having regular applications to achieve surveillance.

Denis Cuculic, CEO ex. Head of Technical Department, PRO4SEC

14:30-15:30 Session B
Tactical Monitoring of Satellite Comms Inmarsat Phone Pro and Iridium traffic.
Voice, data, geolocation, SBD Short Burst Data.

Presented by PAT Systems

16:00-17:00 Session A
Real-time identification and geo-location in mobile networks: how to identify and get, in real-time, the accurate position of a handset in a mobile network
Presented by Evistel

Wednesday, 30 October 2019

8:30-9:30
IMSI catcher – Tactical operations, functionalities and applications of a multi cell/BTS 4G native IMSI catcher
Presented by PAT Systems

10:30-11:30
Use of LoRaWAN in vehicle trackers to defeat GPS and GSM jammers
Presented by Gridsmart


Track 6: Audio, Video and GPS Surveillance

Tuesday, 29 October 2019

9:00-10:00
Covert Miniature Surveillance.
Presented by Covidence

13:00-14:00
IRENE: remote base station for multichannel audio recording
Presented by Innova


Track 7: Financial Crime Investigation Techniques and Products

Tuesday, 29 October 2019

13:00-14:00
Special "Best Practices for Financial Crime Investigators"
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 27 year US Federal Law Enforcement Officer

14:30-15:30
Criminal Essentials: The Needs of a Criminal Network
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 27 year US Federal Law Enforcement Officer

16:00-17:00
Financial Crime Schemes in Money Laundering
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 27 year US Federal Law Enforcement Officer

Wednesday, 30 October 2019

8:30-9:30
The Essentials of Trade Based Money Laundering
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 27 year US Federal Law Enforcement Officer

10:30-11:30
How Does Money Actually Move?
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 27 year US Federal Law Enforcement Officer