< Back to ISS World Programs

AGENDA

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.

Track 1: Advanced Hi-Tech Cyber Investigation Training by LEAs and Ph.Ds
Track 2: LEA, Defense and Homeland Security Intercept Training
Track 3: Social Network Monitoring and Cyber Threat Analytics Training
Track 4: Investigating Dark Webs and Associated Cybercurrency Transactions
Track 5: Artificial Intelligence Product Training for Law Enforcement and Government Intel
Track 6: Financial Crime Investigation Techniques and Products
Track 7: Quantum Computing Reality and Post-Quantum Cryptography Today

Note: Under each Track (1-7) below, you will note who is elligible to attend. (All attendees or LEA and Government Only)


ISS World 2018 Program - Agenda at a Glance


Track 1: Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

35 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructors include:

Charles Cohen, Cohen Training and Consulting, LLC, also holds the position of Captain, Indiana State Police
(6 classroom hours)

Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(9 classroom hours)

Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 27 year US Federal Law Enforcement Officer
(5 classroom hours)

Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, Co-Author of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired officer, Reno NV, Police Department
(6 classroom hours)

Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies
(4 classroom hours)

Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(5 classroom hours)

Stephen Arnold, Managing Partner, Arnold.IT
(2 classroom hours)

Jean Gottschalk, Principal Consultant, The Telecom Defense Limited Company
(3 classroom hours)

Wednesday, September 5, 2018

Seminar #1
9:00-5:00

Online Social Media and Internet Investigations 

Presented by: Charles Cohen, Cohen Training and Consulting, LLC;
Charles Cohen also holds the position of Captain, Cyber Crimes Investigative Technologies Section, Indiana State Police, USA

9:00-10:00
Proxies, VPNs, and Dark Web:  Identity Concealment and Location Obfuscation


10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator’s Perspective

11:30-12:30 PM
Tor, onion routers, Deepnet, and Darknet:  A Deep Dive for Criminal Investigators

1:30-2:30 PM
Cellular Handset Geolocation:  Investigative Opportunities and Personal Security Risks

2:45-3:45 PM
Collecting Evidence from Online Social Media:  Building a Cyber-OSINT Toolbox (Part 1)

4:00-5:00 PM
Collecting Evidence from Online Social Media:  Building a Cyber-OSINT Toolbox (Part 2)


Seminar #2

9:00-5:00

Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1 day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

09:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

11:30-12:30 PM
WIFI, geolocation, and Mobile Data traces and tracking

1:30-2:30 PM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

2:45-3:45 PM
Advanced Techniques in Tracing Suspects, and lateral problem solving

4:00-5:00 PM
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site

Seminar #3
9:00-10:00

Cybercurrency 101: Introduction to What Technical Investigators Need to Know about Bitcoin and Altcoin Transactions, Dark Web Commerce and Blockchain Analysis
Presented by: Dr. Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

This 101 training seminar is an introduction to Bitcoin, how the system is used to support criminal activities (e.g. Dark Web) and why technical investigators need to understand the basic Bitcoin transaction mechanism (Blockchain) to successfully defeat 21st century criminals and terrorist actions. Specifically, this introduction to Bitcoin for technical investigators addresses:

Seminar #4
10:15-11:15

Investigation Techniques for Unmasking TOR Hidden Services and Other Dark Web Operations
Presented by: Matthew Lucas, (Ph.D Computer Science), VP, TeleStrategies

TOR networks are notoriously effective at hiding the online identity of criminals, terrorists and others who are up to no good. The other side that receives less attention are TOR hidden services. These are services that leverage TOR's anonymizing capabilities to mask the identity of criminally-hosted online services - forming the basis of just about all illegal gambling sites, drug markets, child exploitation material, firearm sales, terrorism propaganda, and more.

Seminar # 5
11:30-12:30

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategies

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This session is about defeating the later.

Seminar #6
13:30-14:30

Understanding "The Very Basics" of Quantum Computing for Non-Engineers
Presented by: Jerry Lucas, (Ph.D, Physics) President, TeleStrategies

This very basic, one-hour session is for cyber security and intelligence gathering professionals who must understand quantum computing technology basics to access artificial intelligence, machine learning as well as defeating encryption applications but do not have any significant advanced academic training in physics, mathematics nor engineering.

Seminar #7
14:45-15:45

Understanding "Defeating Encryption" with Quantum Computing for Non-Engineers
Presented by: Jerry Lucas, (Ph.D, Physics) President, TeleStrategies

This one hour, session is for cyber security executives and specialists who have the responsibility of assessing the lead time they have before deploying quantum safe cryptography solutions but don't have a technical background. If you believe nation state security agencies are developing quantum computing to decrypt your past and future intercepted transmission sessions, this high-level webinar should be a must attend briefing.
And to do this you need to understand how a quantum computing circuit works when designed for the sole purpose of defeating public key encryption.

Seminar #8
4:00-5:00 PM

Understanding "Post-Quantum Cryptography" for Non-Mathematicians
Presented by: Jerry Lucas (Ph.D, Physics) President, TeleStrategies

This one hour session is for cyber security exutives responsible for developing alternatives to todays cryptography infrastructure in response to the threat of quantum computing.

Thursday, September 6, 2018

Seminar #9
09:00-5:00 PM

Concerns and Considerations in Financial Crime Investigations
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is a former US Federal Law Enforcement Officer who specialized in complex fraud and cybercrime investigations and currently provides  training to improve detection and investigations of fraud, money laundering and counter terror finance.

09:00-10:00 AM
Criminal Essentials: The Needs of a Criminal Network

11:00-12:00 PM
Financial Crime Schemes in Money Laundering

1:00-2:00 PM
The Essentials of Trade Based Money Laundering

2:30-3:30 PM
How Does Money Actually Move?

4:00-5:00 PM
Follow the Money Beyond the Banks

Seminar #10
4:00-5:00 PM

Advanced Analytic Techniques for Deanonymizing Hidden Network Digital Currency Transactions and Messaging Using Open Source and Commercial Software
Presented by: Stephen Arnold, Managing Partner, Arnold.IT

In this session, Stephen E Arnold reviews technology-centric methods for deanonymizing hidden network activities.  Based on research conducted for US federal agencies and research to support his work as a commissioner for the Judicial Commission of Inquiry into Human Trafficking and Child Sex Abuse.

Friday, September 7, 2018

Seminar #11
8:30-9:30

Practitioners Guide to Understanding Cyber Attacks on Banks - Exploring Vulnerabilities from The Perspective Of The Hacker
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

This one-hour session will explore the viewpoints of both the banks perception of vulnerabilities, and that of the attacker. A follow-up session at 10:30 will address Practitioners Guide to Defending Banks Against Cyber Attacks.

Seminar #12
10:30-11:30

Practitioners Guide to Defending Banks Against Cyber Attacks – Identifying And Protecting Vulnerabilities To Frustrate The Thief, and Integrity Proof The Systems
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

This one-hour session will explore the protection of weak points and future proofing banks against cyber attacks.

Seminar #13
12:00-1:00 PM

What Investigators and Intelligence Professionals Need to Know about Amazon's Disruptive Streaming Data Marketplace and Policeware Services
Presented by: Stephen Arnold, Managing Partner, Arnold.IT

In this presentation, research completed by Stephen E Arnold and his research team to support their work related to the Judicial Commission’s activities reveals the capabilities of Amazon’s entrance into the policeware and intelligence analytics markets. (“Policeware” is shorthand for the vendors who provide data gathered via OSINT methods, software to analyze and make sense of OSINT and nonpublic data, and how certain investigative work will be performed.)

Seminar #14
12:00-1:00 PM

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Seminar #15
8:30-1:00 PM

Special SS7 Intercept, Vulnerabilties and Most Damaging SS7 Infrastructure Attacks over the Last 12 Months
Presented by Jean Gottschalk, Principal Consultant, The Telecom Defense Limited Company

8:30-9:30 AM
SS7 Vulnerabilities and Intercept Options
There are two very important aspects of telco SS7 infrastructure law enforcement and interior security needs to understand. For law enforcement: you can locate and track a target anywhere in the world if they just turn on their cell phone. For Interior Security: large scale distributed denial of service attacks over SS7 can completely take down today's telecom networks.

10:30-11:30 AM
The Most Damaging SS7 Network Infrastructure Attacks over the Last 12 Months

12:00-1:00 PM
Intercept Implications of 4G/5G Diameter Signaling Replacing SS7
As telecom service providers transition to IP based VoLTE and introduce 5G, SS7 will be replaced with diameter signaling. This session provides the technical basics of diameter, options for transitioning SS7 to diameter and the new challenges facing law enforcement.

(Full Pre-Conference Seminar Agenda Appears After Track 7)