< Back to ISS World Programs

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.

Track 1: Advanced Hi-Tech Cyber Investigation Training by LEAs and Ph.Ds
Track 2: LEA, Defense and Homeland Security Intercept Product Training
Track 3: Social Network Monitoring and Data Analytics Training
Track 4: Investigating Dark Webs and Associated Cybercurrency Transactions
Track 5: Artificial Intelligence Product Training for Law Enforcement and Government Intel
Track 6: Financial Crime Investigation Techniques and Products
Track 7: Quantum Computing for AI, Defeating Encryption and QSC Options


ISS World 2018 Program - Agenda at a Glance


Track 1: Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

32 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructors include:

Charles Cohen, Cohen Training and Consulting, LLC, also holds the position of Captain, Indiana State Police
(6 classroom hours)

Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(9 classroom hours)

Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 27 year US Federal Law Enforcement Officer
(5 classroom hours)

Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, Co-Author of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired officer, Reno NV, Police Department
(6 classroom hours)

Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies
(4 classroom hours)

Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(5 classroom hours)

Stephen Arnold, Managing Partner, Arnold.IT
(2 classroom hours)

Wednesday, September 5, 2018

Seminar #1
9:00-17:00

Online Social Media and Internet Investigations
Presented by: Charles Cohen, Cohen Training and Consulting, LLC;
Charles Cohen also holds the position of Captain, Cyber Crimes Investigative Technologies Section, Indiana State Police, USA

09:00-10:00
The role of Online Social Media OSINT in Predicting and Interdicting Spree Killings: Case Studies and Analysis


10:15-11:15
OSINT and Criminal Investigations


11:30-12:30
Metadata Exploitation in Criminal Investigations

13:30-14:30
EXIF Tags and Geolocation of Devices for Investigations and Operational Security

14:45-15:45
Case Studies in Metadata Vulnerability Exploitation and Facial Recognition


16:00-17:00
What Investigators Need to Know about Emerging Technologies Used to Hide on the Internet

Seminar #2

9:00-17:00

Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1 day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

09:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking

13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving

16:00-17:00
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site

Seminar #3
09:00-12:30

Understanding ISS Technologies and Products Deployed in Telecommunications Networks for Lawful Interception and Mass Surveillance
Presented by: Dr. Jerry Lucas, President, TeleStrategies

This half-day seminar covers how criminals and terrorists communicate over today's public telecommunications wireline and wireless networks, over the top Internet services and social networks. This seminar is ideal for law enforcement, interior security, public safety and others who need to understand the ISS technologies and products used to lawfully intercept electronic communications and conduct mass network surveillance as discussed at ISS World Conference sessions and by exhibitors.

9:00-10:00
Introduction to Wireline and IP Infrastructure and Related ISS Products for Lawful Interception and Mass Surveillance

10:15-11:15
Understanding Mobile Wireless Infrastructure, and Related ISS Products for Lawful Interception and Mass Surveillance

11:30-12:30
Understanding Internet Infrastructure and Related ISS Products for Mass Intelligence Gathering and Surveillance

Seminar #4
9:00-10:00

Cybercurrency 101: Introduction to What Technical Investigators Need to Know about Bitcoin and Altcoin Transactions, Dark Web Commerce and Blockchain Analysis
Presented by: Dr. Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

This 101 training seminar is an introduction to Bitcoin, how the system is used to support criminal activities (e.g. Dark Web) and why technical investigators need to understand the basic Bitcoin transaction mechanism (Blockchain) to successfully defeat 21st century criminals and terrorist actions. Specifically, this introduction to Bitcoin for technical investigators addresses:

Seminar #5
10:15-11:15

Investigation Techniques for Unmasking TOR Hidden Services and Other Dark Web Operations
Presented by: Matthew Lucas, (Ph.D Computer Science), VP, TeleStrategies

TOR networks are notoriously effective at hiding the online identity of criminals, terrorists and others who are up to no good. The other side that receives less attention are TOR hidden services. These are services that leverage TOR's anonymizing capabilities to mask the identity of criminally-hosted online services - forming the basis of just about all illegal gambling sites, drug markets, child exploitation material, firearm sales, terrorism propaganda, and more.

  • How TOR hides IP addresses/identity/location

  • TOR hosting, What is .ONION and content analysis
Seminar # 6
11:30-12:30

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategies

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.

When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.

Seminar #7
13:30-14:30

Understanding "The Very Basics" of Quantum Computing for Non-Engineers
Presented by: Jerry Lucas, (Ph.D, Physics) President, TeleStrategies

This very basic, one-hour session is for cyber security and intelligence gathering professionals who must understand quantum computing technology basics to access artificial intelligence, machine learning as well as defeating encryption applications but do not have any significant advanced academic training in physics, mathematics nor engineering.

Specifically, this session covers:

  • What potentially makes quantum computers more powerful than today's electronic computers: qubits, superpositioning, entanglement & interference (light on quantum mechanics)

  • A one-to-one functional comparison of a general-purpose computer with an application specific quantum circuit designed to do but one thing, for example defeating today's public key encryption (light on computer technology)

  • Qubit gates and circuits explained (light on the physics and mathematics)

  • The basics of the three leading quantum computing architectures: Ion Traps, Superconducting Circuits and Annealing and the advantages and disadvatages of each.

  • The key development challenges: qubit error correction, decoherence, algorithms and more.

  • Leading general purpose quantum computing hardware options supported by IBM, Microsoft & Google for artificial intelligence, machine learning and optimization applications and the projected development time for each.

Seminar #8
14:45-15:45

Understanding "Defeating Encryption" with Quantum Computing for Non-Engineers
Presented by: Jerry Lucas, (Ph.D, Physics) President, TeleStrategies

This one hour, session is for cyber security executives and specialists who have the responsibility of assessing the lead time they have before deploying quantum safe cryptography solutions but don't have a technical background. If you believe nation state security agencies are developing quantum computing to decrypt your past and future intercepted transmission sessions, this high-level webinar should be a must attend briefing.
And to do this you need to understand how a quantum computing circuit works when designed for the sole purpose of defeating public key encryption.

  • Matching qubits, entanglement and interference with quantum computing hardware.

  • A Step-by-Step walk through of what goes on within a quantum circuit designed to process a small public encryption key as numerical input, probablistic measurements along the way through the delivery of numerical private key as output thereby defeating encryption (light on physics and mathematics as well)

  • Quantum computer challenges with decrypting large public keys (e.g. RSA 2048 class) and the performance metrics (number of entangled qubits, logic gates, longevity, etc.) cyber security specialists need to be monitoring.

  • Leading quantum computer hardware options supported by IBM, Microsoft & Google vs. defeating encryption only, application specific quantum circuit architectures.

  • Why annealing quantum computers can support thousands of qubits today but are unable to successfully run Shor Type (e.g. defeating encryption) algorithms.

Seminar #9
16:00-17:00

Understanding "Quantum Computing and Artificial Intelligence Applications" for Non-Computer Scientists
Presented by: Matthew Lucas, (Ph.D Computer Science), VP, TeleStrategies

Thursday, September 6, 2018

Seminar #10
09:00-17:00

Concerns and Considerations in Financial Crime Investigations
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is a former US Federal Law Enforcement Officer who specialized in complex fraud and cybercrime investigations and currently provides  training to improve detection and investigations of fraud, money laundering and counter terror finance.

09:00-10:00 AM
Criminal Essentials: The Needs of a Criminal Network

11:00-12:00 PM
Financial Crime Schemes in Money Laundering

1:00-2:00 PM
The Essentials of Trade Based Money Laundering

2:30-3:30 PM
How Does Money Actually Move?

4:00-5:00 PM
Follow the Money Beyond the Banks

Seminar #11
16:45-17:45

Encrypted Messaging: Techniques and Tools for Exposing Bad Actors Who Use Next-Generation Communication Methods
Presented by: Stephen Arnold, Managing Partner, Arnold.IT

Friday, September 7, 2018

Seminar #12
8:30-9:30

Practitioners Guide to Understanding Cyber Attacks on Banks - Exploring Vulnerabilities from The Perspective Of The Hacker
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

This one-hour session will explore the viewpoints of both the banks perception of vulnerabilities, and that of the attacker. A follow-up session at 10:30 will address Practitioners Guide to Defending Banks Against Cyber Attacks.

Seminar #13
10:30-11:30

Practitioners Guide to Defending Banks Against Cyber Attacks – Identifying And Protecting Vulnerabilities To Frustrate The Thief, and Integrity Proof The Systems
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

This one-hour session will explore the protection of weak points and future proofing banks against cyber attacks.

Seminar #14
10:30-11:30

Identifying a Bad Actor Using the Dark Web, i2p, and Other Methods of Hiding "True Identity"
Presented by: Stephen Arnold, Managing Partner, Arnold.IT

Seminar #15
12:00-13:00

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

(Full Pre-Conference Seminar Agenda Appears After Track 7)