ISS World Americas is the world's largest gathering of Americas Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.

Track 1: Advanced Hi-Tech, Cyber Investigation Training Seminars
Track 2: Automated Cyber Threat Intelligence Analysis and Management
Track 3: Investigating DarkNets and Associated Bitcoin Transactions
Track 4: Lawful Interception and Hi-Tech Criminal Investigations
Track 5: LEA, Defense and Interior Security Intercept
Product Training
Track 6: Social Network Monitoring and Data Analytics Product Training

Track 7: Mobile Threat Intelligence Solutions for Network Security


ISS World Americas 2017 - Agenda at a Glance


Track 1: Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

35 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructors include:

Charles Cohen, Cohen Training and Consulting, LLC, also holds the position of Captain, Indiana State Police

(6 classroom hours)

Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(6 classroom hours)

Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, Co-Author of , Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired officer, Reno NV, Police Department
(6 classroom hours)

Breck McDaniel Geocell and retired Sergeant, Houston Police Department
(5 classroom hours)

Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies
(5 classroom hours)

Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(7 classroom hours)

Monday, September 11, 2017

Seminar #1
9:00-5:00 PM

Online Social Media and Internet Investigations 

Presented by Charles Cohen, Cohen Training and Consulting, LLC Charles Cohen also holds the position of Captain, Indiana State Police

This one day session provides an up-to-date understanding of how social networking sites work and how members act and interact. Attendees will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.

9:00-10:00 AM
Understanding Cell Handset Geolocation: What Investigators Need to Know

10:15-11:15 AM
Open Source Intelligence (OSINT) Collection Tools: Creating an Inexpensive OSINT Toolbox

11:30 AM-12:30 PM
Metadata Exploitation in Criminal Investigations

1:30-2:30 PM
Conducting Covert Online Observation and Infiltration Activities: Challenges and Opportunities for Investigators

2:45-3:45 PM
Proxies, VPNs, Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators

4:00-5:00 PM
Proxies, VPNs, Tor, Onion Routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators (continued)

Seminar #2
9:00-5:00 PM

Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1 day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement Attendees only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00 AM
The Internet, and how suspects leave a digital footprint

10:15-11:15 AM
Recognizing Traffic Data and digital profiling

11:30 AM-12:30 PM
WIFI, geolocation, and Mobile Data traces

1:30-2:30 PM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

2:45-3:45 PM
Advanced Techniques in Tracing Suspects and lateral problem solving

4:00-5:00 PM
Open source tools, resources and techniques

Seminar #3
9:00-5:00 PM

A Real World Look at Investigations in the Dark Web

Presented by: Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, Co-Author of , Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

The aim of this 1 day seminar is to take the attendees from the basics of understanding the Dark Web, how to access it to how to finding information hidden within it. The attendees will learn the best practices for the internet investigator when working in the Deep Web and the tools available to assist their investigations into the Deep Web.
This exclusively Law Enforcement attendees only, as Practical examples, covert and investigative methods will be given throughout the seminar.

09:00-10:00 AM
The Dark Web, what it is and what it is not

10:15-11:15 AM
To Tor or not to Tor

11:30 AM-12:30 PM
CryptoCurrency and its use in the Dark Web

1:30-2:30 PM
Going Undercover on the Dark Web

2:45-3:45 PM
Using web bugs and other technology to locate a suspect

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous user

Seminar #4
9:00-12:30 PM

Understanding ISS Product Deployments in Telecommunication Networks for Lawful Interception and Mass Surveillance

Presented by: Dr. Jerry Lucas, President, TeleStrategies

This half-day seminar covers what law enforcement and intelligence analysts need to understand about today's public telecommunications wireline and wireless networks as well as ISS technologies and products used to lawfully intercept electronic communications and conduct mass network surveillance as discussed at ISS World Conference sessions and by exhibitors.

9:00-10:00 AM
Introduction to Wirelines and IP Infrastructure and Related ISS Products for Lawful Interception and Mass Surveillance

10:15-11:15 AM
Understanding Mobile Wireless Infrastructure, and Related ISS Products for Lawful Interception and Mass Surveillance

11:30 AM - 12:30 PM
Understanding the Internet Over-the-Top (OTT) Services and Related ISS Products for Mass Intelligence Gathering and Surveillance

Seminar #5
9:00 AM-3:45 PM

Cell Phone Investigations

Presented by: Breck McDaniel, Geocell and Retired Seargent, Houston Police Department

This sesminar covers the communications investigations involving cell phone call data analysis, where data can be found, search warrents, subpoena, working with cellular phone companies and more.

9:00-10:00
Introduction; what are we going to cover

10:15-11:15
How is the data used?

11:30-12:30
Legal thoughts: Manual searches?

1:30-2:30
Cell phone forensics: important considerations

2:45-3:45
Getting your hands on the data

Seminar #6
9:00-10:00 AM

Investigation Techniques for Unmasking TOR Hidden Services and Other Dark Web Operations

Presented by: Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

Seminar #7
1:30-2:30 PM

Introduction to Cryptography

Presented by: Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

This session covers the basics of cryptography for law enforcement and intelligence analysists who must understand encryption:
Symmetric Key Block (AES, 3DES & RC4), Public Key (RSA, DH & ECC), (SHA-1, 2 & 3), Certificates and CA's, SSL vs. TLS (What's the difference?), Wi-Fi Security, IPSec, IKE and more of the basics

Tuesday, September 12, 2017

Seminar #8
9:00-10:00 AM

Bitcoin 101: Introduction to What Technical Investigators Need to Know about Bitcoin Transactions, Dark Web Commerce and Blockchain Analysis

Presented by: Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

This 101 training seminar is an introduction to Bitcoin, how the system is used to support criminal activities (e.g. Dark Web) and why technical investigators need to understand the basic Bitcoin transaction mechanism (Blockchain) to successfully defeat 21st century criminals and terrorist actions. Specifically this introduction to Bitcoin for technical investigators addresses

Seminar #9
1:30-2:30

SS7 Vulnerabilities and Intercept Options

Presented by: Dr. Jerry Lucas, President, TeleStrategies and a Distinguished Telecom Technology Expert to be announced

There are two very important aspects of telco SS7 infrastructure law enforcement and inteior security needs to understand. For law enforcement: you can locate and track a target anywhere in the world if they just turn on their cell phone. For Interior Security: large scale distributed denial of service attacks over SS7 can completely take down today's telecom networks. 

Seminar #10
3:00-4:00

Intercept Implications of 4G/5G Diameter Signaling Replacing SS7

Presented by: Dr. Jerry Lucas, President, TeleStrategies and a Distinguished Telecom Technology Expert to be announced

As telecom service providers transition to IP based VoLTE and introduce 5G, SS7 will be replaced with diameter signaling. This session provides the technical basics of diameter, options for transitioning SS7 to diameter and the new challenges facing law enforcement.

Seminar #11
4:15-5:15 PM

The Implications of multi-IMSI and OTA for Law Enforcement and the Government Intelligence Community

Presented by Dr. Jerry Lucas, President, TeleStrategies and a Distinguished Telecom Technology Expert to be announced

The era of SIM Cards with static IMSIs issued by cellular operators is changing. Deployment of multi-IMSI as well as network programmable (OTA) SIM cards will create new challenges for law enforcement. This session looks at the implications of multi-SIM and OTA for LEAs and Intel analysts

Wednesday, September 13, 2017

Seminar #12
9:00-10:00 AM

Investigation Techniques for Unmasking TOR Hidden Services and Other Dark Web Operations

Presented by: Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

There are on-line services that leverage TOR's anonymizing capabilities to mask the identity of criminally-hosted online services - forming the basis of just about all illegal gambling sites, drug markets, child exploitation material, firearm sales, terrorism propaganda, and more. This session addresses successful investigators techniques for unmasking TOR hidden services and other Dark Web operations.

Seminar #13
9:00-10:00 AM

Quantum Computing and Defeating Encryption: Myths vs. Realities for Cyber Security Decision Makers

Presented by: Dr. Jerry Lucas, President, TeleStrategies

The sole reason nation state governments are investing billiions of dollars in quantum computing development is to defeat today's crypto systems. On the otherhand the sole reason nation state governments as well as the venture capital community are investing in quantum safe cryptograph is to defeat quantum computers. If you have responsibilities for sifting through the myths and realities of quantum computing and/or quantum safe cryptography product readiness claims but don't have a degree in physics nor math, this session is for you.

Seminar #14
11:00 AM - 12:00 PM

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand

Presented by: Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This seminar addresses successful techniques to defeat network encryption including cellular, Wi-Fi, MITM attacks, IT Intrusion and more.

Pre-Conference Sessions Description At The End of Agenda Posting After Track 7