< Back to ISS World Programs

2020 AGENDA

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.

Track 1: Hi-Tech Criminal Investigation Classroom Training
Track 2: Lawful Intercept and Hi-Tech Investigation Product Training
Track 3: Social Network Monitoring, OSINT and Cyberthreat Detection Training
Track 4: Investigating Dark Webs and Associated Cybercurrency Transactions
Track 5: Artificial Intelligence and Big Data Analytics Training
Track 6: 4G/5G/WiFi Signal Intercept and Tracking
Track 7: Digital Forensics and Intelligence Gathering Product Training
Track 8: Electronic Surveillance Product Training
Track 9: Financial Crime Investigations and Prevention


ISS World North America 2020 Special Training Agenda


Special Training Seminars (28 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists

Online Social Media and Internet Investigations 
(5 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Practitioners Guide to Internet Investigations 
(5 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 5G Network Core (NFV, SDN, EDGE Computing and Network Slicing) for Law Enforcement Investigators
Presented by:  Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies

Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption
(1 Classroom Hours
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

A Real World Look at Investigations in the Dark Web 
(5 Classroom Hours)
Presented by: Todd G. Shipley, CFE, CFCE,  President and CEO of Vere Software, Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired Investigate, Reno NV, Police Department

Concerns and Considerations in Financial Crime Investigations 
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance training

Special Half Day DarkNet Seminar 
(3 Classroom Hours)
Presented by: Andrew Lewman, Vice President, DarkOWL and Former Executive Director, The TOR Project

Understanding "Defeating Encryption" with Quantum Computing for Non-Engineers 
(One Classroom Hour)
Presented by:  Jerry Lucas, (Ph.D, Physics) President, TeleStrategies

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations 
(One Classroom Hour)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Seminar Descriptions At The End of Agenda Posting


ISS World North America 2020 Conference Agenda


ISS World America Exhibit Hours:

Thursday, November 5, 2020: 10:30 AM-6:00 PM
Friday, November 6, 2020: 9:30 AM-12:00 PM

Wednesday, November 4, 2020

1:00-1:10 PM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
1:10-1:30 PM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies

Track 1: Hi-Tech Criminal Investigations Classroom Training

Track 1 sessions open to all conference attendees

Online Social Media and Internet Investigations 
(5 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Wednesday, November 4, 2020

1:30-2:30 PM
Proxies, VPNs and Dark Web: Identify Concealed and Location Obfuscation

2:45-3:45 PM
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective

4:00-5:00 PM
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators

Thursday, November 5, 2020

8:30-9:30 AM
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks

9:30-10:30 AM
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox

Wednesday, November 4, 2020

1:30-2:30 PM
Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies 

2:45-3:45 PM Session B
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

4:00-5:00 PM Session B
Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies

Thursday, November 5, 2020

4:00-5:00 PM
Guess who is using THAT App in your country. Metadata as IP Intelligence
Presented by AREA

Friday, November 6, 2020

12:00-1:00 PM
Understanding "Defeating Encryption" with Quantum Computing for Non-Engineers 
Dr. Jerry Lucas, President, TeleStrategies 


Track 2: Lawful Interception and Hi-Tech Criminal Investigation Product Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Wednesday, November 4, 2020

1:00-2:00 PM
Cellular Intelligence in Action. Real use cases solved by combining mobile location and traffic data from cellular networks
Presented by Mobilaris

2:30-3:30 PM
Practical and creative example of modifying Android OS by HEX editing system files and hacking regular applications to achieve surveillance, (NEW PRODUCT RELEASE AT STAND)
Denis Cuculić, CEO ex. Head of Technical Department, PRO4SEC

Thursday, November 5, 2020

8:30-9:30 AM
Digital Toolbox: the investigator’s best friend
Presented by AREA


Track 3: Social Network Monitoring, OSINT and Cyber Threat Detection Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Practitioners Guide to Internet Investigations 
(5 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Wednesday, November 4, 2020

1:30-2:30
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

2:45-3:45
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

4:00-5:00
WIFI, geolocation, and Mobile Data traces and tracking

Thursday, November 5, 2020

8:30-9:30 AM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

9:30-10:30 AM
Advanced Techniques in Tracing Suspects, and lateral problem solving

Wednesday, November 4, 2020

11:30-12:30 PM
How the digital sphere has become the ideal place for target acquisition
Presented by Digital Clues

1:30-2:30 PM
Global terror butterfly effect: Social network and real time threat analysis of lone wolves terrorism
Presented by Cobwebs

2:45-3:45 PM
Fighting the Opioid Epidemic: Dark Web & Social Networks Investigation
Presented by Cobwebs Technologies

4:00-5:00 PM
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
David Alley, CEO, DarkOWL FZE

Thursday, November 5, 2020

1:00-2:00 PM
Fleeing from Facebook: Discard, Gab and Emerging Platforms
Presented by Fivecast

2:30-3:30 PM
Automating OSINT Investigations
Presented by Skopenow

Friday, November 6, 2020

8:30-9:30 AM
Global terror butterfly effect: Social network and real time threat analysis of lone wolves terrorism
Presented by Cobwebs

10:30-11:30 AM Session A
Combating Threats with Advanced AI-Driven Technologies - Leveraging open source data to anticipate and prevent future attacks
Presented by Voyager Labs

10:30-11:30 AM Session B
Profile, target and investigate the Darknet. Reinventing traditional HUMINT in the Digital Era
Presented by AREA


Track 4: Investigating Dark Webs and Associated Cybercurrency Transactions

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

(5 Classroom Hours)
A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

Wednesday, November 4, 2020

1:30-2:30 PM
The Dark Web, what it is and what it is not

2:45-3:45 PM
CryptoCurrency and its use in the Dark Web 

4:00-5:00 PM
Going Undercover on the Dark Web 

Thursday, November 5, 2020

8:30-9:30
Using web bugs and other technology to locate a suspect 

9:30-10:30
Advanced Dark Web Investigations, identifying the anonymous user

Thursday, November 5, 2020

8:30-9:30 AM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

9:30-10:30 AM
Advanced Techniques in Tracing Suspects , and lateral problem solving
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

1:00-2:00 PM
Fighting the Opioid Epidemic: Dark Web & Social Networks Investigation
Presented by Cobwebs Technologies

2:30-3:30 PM
When law enforcement hack; identifying darknet suspects
Presented by Searchlight Security

4:00-5:00 PM
How the digital sphere has become the ideal place for target acquisition
Presented by Digital Clues

Friday, November 6, 2020

8:30-11:30 AM
Special Half Day Dark Net Seminars

By Andrew Lewman, Vice President, DarkOWL and Former Executive Director, The TOR Project

8:30-9:30 AM
Breaking Darknets Through Theory and Fundamentals

10:30-11:30 AM
Cases from the Darknet: Technical Walkthroughs

12:00-1:00 PM
Future Directions of Darknets, Investigations and Infrastructure


Track 5: Artificial Intelligence and Big Data Analytics Training

Note: Sessions in this track are only open to Government Attendees

Thursday, November 5, 2020

8:30-9:30
Combating Threats with Advanced AI-Driven Technologies - Leveraging open source data to anticipate and prevent future attacks
Presented by Voyager Labs

9:30-10:30
Utilizing AI-Powered Web Intelligence for Deep Web intricate Investigations
Presented by Cobwebs Technologies

1:00-2:00 PM Session A
AI based Translation Solutions to Enable Actionable Intelligence
Presented by SDL

2:30-3:30 PM
Transforming Investigations & Risk Assessment with Artificial Intelligence
Presented by Voyager Labs

4:00-5:00 PM
Supplementing LI with AI: Creating a Hyper-Enabled OSINT Analyst
Presented by Fivecast

Friday, November 6, 2020

8:30-9:30
Transforming Investigations & Risk Assessment with Artificial Intelligence
Presented by Voyager Labs

10:30-11:30 PM
Utilizing AI-Powered Web Intelligence for Deep Web intricate Investigations
Presented by Cobwebs Technologies

12:00-1:00 PM
AI based Translation Solutions to Enable Actionable Intelligence
Presented by SDL


Track 6: 4G/5G/WiFi Signal Intercept and Tracking

Wednesday, November 4, 2020

1:30-2:30 PM
Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies 

2:45-3:45 PM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies


Track 7: Digital Forensics and Intelligence Gathering Product Training

(Sessions to be announced)


Track 8: Electronic Surveillance Product Training

(Sessions to be announced)


Track 9: Financial Crime Investigations and Prevention

Open to all conference attendees

Concerns and Considerations in Financial Crime Investigations 
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance training

Wednesday, November 4, 2020

1:30-2:30 PM
The Critical Tools and Processes of Criminal and Terrorist Networks

2:45-3:45 PM
Money Laundering Foundations and Case Studies

4:00-5:00 PM
A Needle in a Haystack of Needles: Trade Based Money Laundering

Thursday, November 5, 2020

8:30-9:30 AM
Follow the Value: How Money Really Moves?

9:30-10:30 AM
Beyond the Banks: Alternative Remittance Methods



Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

28 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructors include:

Seminar #1

Online Social Media and Internet Investigations 

Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Wednesday, November 4, 2020

1:30-2:30 PM
Proxies, VPNs, and Dark Web:  Identity Concealment and Location Obfuscation


2:45-3:45 PM
Tor, onion routers, Deepnet, and Darknet: An Investigator’s Perspective

4:00-5:00 PM
Tor, onion routers, Deepnet, and Darknet:  A Deep Dive for Criminal Investigators

Thursday, November 5, 2020

8:30-9:30 AM
Cellular Handset Geolocation:  Investigative Opportunities and Personal Security Risks

9:30-10:30 AM
Collecting Evidence from Online Social Media:  Building a Cyber-OSINT Toolbox (Part 2)


Seminar #2


Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

Wednesday, November 4, 2020

1:30-2:30
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

How it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.

2:45-3:45
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

What data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.

4:00-5:00
WIFI, geolocation, and Mobile Data traces and tracking

A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.

Thursday, November 5, 2020

8:30-9:30 AM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.

9:30-10:30 AM
Advanced Techniques in Tracing Suspects, and lateral problem solving

Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.

Friday, November 6, 2020

12:00-1:00 PM
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site

"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how.

Seminar #3

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

Wednesday, November 4, 2020

1:30-2:30 PM
The Dark Web, what it is and what it is not

2:45-3:45 PM
CryptoCurrency and its use in the Dark Web 

4:00-5:00 PM
Going Undercover on the Dark Web 

Thursday, November 5, 2020

8:30-9:30
Using web bugs and other technology to locate a suspect 

9:30-10:30
Advanced Dark Web Investigations, identifying the anonymous user

Seminar #4
1:30-2:30 AM

Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Wednesday, November 4, 2020

This session presents what technical investigators need to know about 2G/3G/4G technology infrastructure, Including:

  • Lawful Interception of Voice, Data and Messaging Differences in GSM, UMTS and LTE Networks
  • SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8)
  • Tracking Targets Using CDR's, SS7 Interconnect and IMSI Cathers and more.

Seminar #5
2:45-3:45 PM

Wednesday, November 4, 2020

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar # 6
4:00-5:00 PM

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategies

Wednesday, November 4, 2020

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.

When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.

Seminar #7

Concerns and Considerations in Financial Crime Investigations
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance training

The purpose of financial crime can be to generate or protect criminal profit. Locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

In this 1 day seminar we will discuss the tools and methods criminals use and the law enforcement response. Each presentation describes different elements of financial crime and business models used by criminals as well as law enforcement methods and tactics to identify and disrupt them.  We will discuss the essentials in criminal networks, key players, money laundering, and trade based money laundering.  We will describe how information can be found as money is moved around the world and how investigators can make best use of this knowledge.  This training is aimed primarily at the investigator and analyst, but also has application to the law enforcement, intelligence, and financial regulatory community.

Wednesday, November 4, 2020

09:00-10:00 AM
Criminal Essentials: The Needs of a Criminal Network

11:00-12:00 PM
Financial Crime Schemes in Money Laundering

1:00-2:00 PM
The Essentials of Trade Based Money Laundering

Thursday, November 5, 2020

8:30-9:30
How Does Money Actually Move?

9:30-10:30
Follow the Money Beyond the Banks

Seminar #8
12:00-1:00 PM

Friday, November 6, 2020

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police