< Back to ISS World Programs

2021 AGENDA

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.

Track 1: Hi-Tech Criminal Investigation Classroom Training
Track 2: Lawful Intercept and Hi-Tech Investigation Product Training
Track 3: Social Network Monitoring, OSINT and Cyberthreat Detection Training
Track 4: Investigating Dark Web and Associated Cryptocurrency Transactions
Track 5: Artificial Intelligence and Analysis of Unstructured Data
Track 6: 4G/5G/WiFi Signal Intercept and Electronic Surveillance
Track 7: Financial Crime Investigations and Prevention


ISS World North America 2021 Program Agenda


Special Training Seminars (30 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists

Tuesday, September 21, 2021

Online Social Media and Internet Investigations 
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Practitioners Guide to Internet Investigations 
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Overview of the Seven Fundamental ISS Technologies and Products Presented in Conference Training Tracks 1 thru 8
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 2G/3G/4G/5G Cellular Services
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 5G Network Core (NFV, SDN, EDGE Computing and Network Slicing) for Law Enforcement Investigators
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

A Real World Look at Investigations in the Dark Web 
(6 Classroom Hours)
Presented by: Todd G. Shipley, CFE, CFCE, and Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and Retired Investigator, Reno NV, Police Department

The Pursuit of Financial Crime
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations 
(One Classroom Hour)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Seminar Descriptions At The End of Agenda Posting


ISS World North America 2021 Conference Agenda


ISS World America Exhibit Hours:

Wednesday, September 22, 2021: 10:00 AM-6:00 PM
Thursday, September 23, 2021: 9:30 AM-12:30 PM

Wednesday, September 22, 2021

8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies

Track 1: Hi-Tech Criminal Investigations Classroom Training

Track 1 sessions open to all conference attendees

Tuesday, September 21, 2021

Online Social Media and Internet Investigations 
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective

11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators

13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks

14:45-15:45
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)

16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)

10:15-11:15
Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 2G/3G/4G/5G Cellular Services
Dr. Jerry Lucas, President, TeleStrategies

2:45-3:45
Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

4:00-5:00
L cating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Wednesday, September 22, 2021

9:00-10:00
Cutting Edge of Criminal Trade Craft
Steven D. DeBrota, VP and Chief Counsel, NW3G and Retired Criminal Prosecurtor, US Attorney's Office for the Southern District of Indiana

11:30-12:30
Protecting Mobile Networks and Infrastructure from External Threat Actors
Presented by AdaptiveMobile Security


Track 2: Lawful Interception and Hi-Tech Criminal Investigation Product Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Wednesday, September 22, 2021

9:00-10:00
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence
Presented by AREA

9:00-10:00
Vehicle Forensics and Intelligence
Vehicles built-in sensors store mountains of data, that may sometimes be the digital evidence trail law enforcement and defense agencies need for an investigation. In this session, Toka will introduce its innovative platform for obtaining digital forensic and ongoing intelligence extraction from vehicles, using software means only.
Presented by Toka

11:30-12:30
Oxygen Foresnic Detective Product Training
Presented by Oxygen Forensics

1:30-2:30 Session A
Introducing a new all-in-one frontend A/V solution within critical evidence collection
At this session, we present a solution that will help minimize the risk of detecting installed covert equipment. At the same time, the solution will make life easier for the installers and investigators due to the device’s flexibility and the comprehensive controlling and monitoring capabilities.
Brian Lawrence, DTC

1:30-2:30 Session B
New methods and enforcement tools designed specifically for regulatory agencies
Presented by Utimaco

3:00-4:00 Session A
Reducing Noise in Intelligence Monitoring
Presented by Resecurity

3:00-4:00 Session B
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS

Thursday, September 23, 2021

9:00-10:00
Title to be Announced
Presented by Cognyte

 


Track 3: Social Network Monitoring, OSINT and Cyber Threat Detection Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, September 21, 2021

Practitioners Guide to Internet Investigations 
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

This is exclusively Law Enforcement services only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking

13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving

16:00-17:00
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site

Wednesday, September 22, 2021

9:00-10:00 Session A
The Role of Monitoring Deep Web Platforms in Public Safety Protection Programs
Presented by Cobwebs Technologies

9:00-10:00 Session B
Fleeing from Facebook: Discord, Gab and Emerging Platforms
Presented by Fivecast

11:30-12:30
How to quantify the child exploitation problem on the Dark Web
Presented by SearchLight

3:00-4:00
A light in the darkness of Encrypted Communications
Presented by AREA

4:15-5:00 Session A
OSINT and Hybrid warfare (with a pandemic special) 
A brief overview of the current media environment and it’s recent changes. What is the role of TV and Radio in an online word? What is clubhouse and why does it matter? Are podcasts relevant? How are telegram, Parler and other apps being used and how useful can this be? How is disinformation used in these contexts and what are the methods. A demonstration and preview of some of the features of of the HENSOLDT Analytics OSINT system.
Presented by Hensoldt

4:15-5:00 Session B
Using real-world tools and techniques to investigate and disrupt Child Exploitation offender networks on the Dark Web
Presented by SearchLight

Thursday, September 23, 2021

8:30-9:30 Session A
Global Signalling Threat Analysis and Insights for Cyber Intelligence
Presented by AdaptiveMobile Security

8:30-9:30 Session B
CLOS-INT. Closed Source Intelligence form Web2.0 sources
Presented by AREA

8:30-9:30 Session C
Countering Domestic Extremism with adaptive OSINT tools & techniques
Presented by Chris Pulter, Founder & CEO, Osintcombine

10:30-11:30 Session A
"Secure IT instead of IT security - trust is good, verification is better"
Presented by Hensoldt

10:30-11:30 Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS

12:00-1:00
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

12:00-1:00
Ransom-wave Aware
Ransomware and ransom attacks changed the cybercrime dynamics to a degree that most of the other types of attacks are unfeasible in comparison. Defending against ransom-based attacks is difficult and once the attack succeeds, there are very few possible outcomes, most packing bad news and long-lasting side-effects. We will introduce more clarity to these attacks imbued with skills of how to deal with detection and prevention. Most importantly, you will gain valuable skills of how to deal with ransom and ransomware cybercrime at every stage of the attack. Targeting, infection, data exfiltration, encryption, negotiation, and recovery. When you are faced with crisis, you need to be aware and knowledgeable to make good decisions.
Presented by Hold Security, LLC


Track 4: Investigating Dark Web and Associated Cryptocurrency Transactions

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, September 21, 2021

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous use

Wednesday, September 22, 2021

9:00-10:00
Using DarkWeb Information for Active Investigations
Presented by Skopenow

11:30-12:30
How Cryptocurrency Enables Criminals: From Drug Dealers to Terror Financiers
Presented by Cobwebs Technologies

1:30-2:30
Deanonymizing cryptocurrency transactions to fight crime and terror 
Yuval Altman, Cognyte

Thursday, September 23, 2021

8:30-9:30
Breaking Dark Web Barriers
To understand the Dark Web, you need to realize that cybercrime dwells everywhere, and the bad guys use mainstream tools to communicate, store their data, and commit their crimes. In 2021 the black markets are overwhelmed with data for sale. New rules and exploitation techniques get traded and weaponized within hours. Let’s take a look at the Dark Web and cybercrime of today and discover how to strengthen our defenses now and going forward.
Presented by Hold Security, LLC


Track 5: Artificial Intelligence and Analysis of Unstructured Data Training

Note: Sessions in this track are only open to Government Attendees

Wednesday, September 22, 2021

10:30-11:30
The Multi-Sensor Fusion Platform with Artificial Intelligence for Predictive Analysis, Automatic Alerts and Risk Management to have the Complete Maritime Domain Awareness
Presented by IPS

1:30-2:30
Creating Order from Chaos: Using Automated AI for Social Network Analysis
Presented by Cobwebs Technologies

3:00-4:00
Supplementing LI with AI: Creating a Hyper-Enabled OSINT Analyst
Presented by Fivecast


Track 6: 4G/5G/WiFi Signal Intercept and Electronic Surveillance

Tuesday, September 21, 2021

11:30-12:30 PM
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies 

1:30-2:30 PM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Wednesday, September 22, 2021

11:30-12:30
Lawful Interception in 5G Mobile Networks
Presented by Utimaco

11:30-12:30
Tactical Intelligence solutions for evolving threats and technologies
Ran Rahamin, Cognyte

1:30-2:30
5G Tactical Solutions and Interoperability
Presented by EXFO

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
1:30-2:30
Obtaining Visual Intelligence from IoT devices
Security agencies face a great number of challenges in gaining visual control and achieve situational awareness in an operational environment. The session will illustrate how Toka software-based platforms leverage the connected-world landscape, Artificial Intelligence (AI) analytics, and advanced cyber technologies to enable operators transform meaningful IoT devices into visual intelligence sources.
Presented by Toka

3:00-4:00
Direction Finding into the Future
Presented by Syndetix

4:15-5:00
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence
Presented by AREA

4:15-5:00
Using Mobile Signals to Corroborate WEBINT Investigations
Presented by Cobwebs Technologies

Thursday, September 23, 2021

10:30-11:30
5G Enabled LEMF
Presented by AREA


Track 7: Financial Crime Investigations and Prevention

Open to all conference attendees

The Pursuit of Financial Crime
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

Special Guest Speaker: Toni Gillich,  Forensic Audits and Investigative Service, General Accounting Office, Office of the Inspector General.  Toni is an expert in investigation and the analysis of illegal activities around the world as well as the response by governments and law enforcement.  The United States Congress tasks the GAO with requests to investigate and research, then report on topics critical to promulgating US policy and law. 

As in any business, financial crime is to generate or protect profit.  However, also as in any business, the cost and control of illicit networks, local to international, criminal or terror related, impacts effective operation and profitability.  Whether working locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

Each presentation describes the tools and methods criminals and terrorists manipulate financial and business systems as well as the footprints that leave for the financial crimes investigator in their criminal enterprises.  Mike will discuss the tools used in criminal networks, the facilitators, in fraud, money laundering and other financial crimes. 

This training is applicable to law enforcement, the intelligence community, and the financial and business regulated communities.

Wednesday, September 22, 2021

1:15-2:15 PM
Key Players:  The Money Laundering Professional.  We discuss recent investigations describing the role of the “gatekeeper” or “fixer,” where they fit within criminal networks, and their value to any investigation.

2:45-3:45
The Beneficial Ownership Challenge.  Toni Gillich will speak to the ever-growing concern in the issues of beneficial ownership and methods used by criminals to make involvement in finance and business.  Toni will refer to recent work by the GAO into the use and accuracy of beneficial ownership information, processes used in collection of data, and impact on US policy.

2:45-3:45 PM
Banks, Virtual Assets, and Money Services Businesses.  The recent changes in money laundering laws in the United States can have significant impact in investigations around the world.  We will discuss recent cases, the changes in the law and the changing role FinCEN.

4:15-5:00 PM
Follow the Value: Financial Crime Schemes in Trade Based Money Laundering.  We will discuss two high profile international criminal scheme and where the elements of trade-based money laundering processes were used.

Thursday, September 23, 2021

8:30-9:30 AM
Fundamentals in Case Planning.  Financial investigations can be very complicated and time consuming.  In this presentation we will discuss the challenges in financial investigations with respect to the technical processes of planning an investigation, violation mapping, and critical thinking processes.

10:30-11:30 AM
Follow the Money: Criminal and terror organizations, small local to large transnational, will likely make use of financial networks to transfer value.  In this presentation we will discuss the processes in detail the information footprints that can be found and where that information can be found while conducting your investigations.

Thursday, September 23, 2021

12:00-1:00
Complex Supply Chain investigations to identify risk using open-source intelligence (OSINT)
Presented by Chris Pulter, Founder & CEO, Osintcombine


Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

30 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructor sessions include:

Seminar #1

Online Social Media and Internet Investigations 

Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.  

While Tor is the most common Darknet Service, it is not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.  The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.

Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective

11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators

13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks

14:45-15:45
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)

16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)

Seminar #2


Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement services only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking

13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving

16:00-17:00
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site

Thursday, 23 September 2021

12:00-13:00
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations

Seminar #3

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

Tuesday, September 21, 2021

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous user

Seminar #4
10:15-11:15 AM

Tuesday, September 21, 2021

Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 2G/3G/4G/5G Cellular Services
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Seminar #5
11:30-12:30 AM

Tuesday, September 21, 2021

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Seminar #6
1:30-2:30 PM

Tuesday, September 21, 2021

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar #7
2:45-3:45 PM

Tuesday, September 21, 2021

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategies

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.

When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.

Seminar # 8
4:00-5:00 PM

Tuesday, September 21, 2021

Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Seminar #9

Concerns and Considerations in Financial Crime Investigations 
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

Special Guest Speaker: Toni Gillich,  Forensic Audits and Investigative Service, General Accounting Office, Office of the Inspector General.  Toni is an expert in investigation and the analysis of illegal activities around the world as well as the response by governments and law enforcement.  The United States Congress tasks the GAO with requests to investigate and research, then report on topics critical to promulgating US policy and law. 

As in any business, financial crime is to generate or protect profit.  However, also as in any business, the cost and control of illicit networks, local to international, criminal or terror related, impacts effective operation and profitability.  Whether working locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

Each presentation describes the tools and methods criminals and terrorists manipulate financial and business systems as well as the footprints that leave for the financial crimes investigator in their criminal enterprises.  Mike will discuss the tools used in criminal networks, the facilitators, in fraud, money laundering and other financial crimes. 

This training is applicable to law enforcement, the intelligence community, and the financial and business regulated communities.

Wednesday, September 22, 2021

1:15-2:15 PM
Key Players:  The Money Laundering Professional.  We discuss recent investigations describing the role of the “gatekeeper” or “fixer,” where they fit within criminal networks, and their value to any investigation.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

2:45-3:45
The Beneficial Ownership Challenge.  Toni Gillich will speak to the ever-growing concern in the issues of beneficial ownership and methods used by criminals to make involvement in finance and business.  Toni will refer to recent work by the GAO into the use and accuracy of beneficial ownership information, processes used in collection of data, and impact on US policy.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

2:45-3:45 PM
Banks, Virtual Assets, and Money Services Businesses.  The recent changes in money laundering laws in the United States can have significant impact in investigations around the world.  We will discuss recent cases, the changes in the law and the changing role FinCEN.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

4:15-5:00 PM
Follow the Value: Financial Crime Schemes in Trade Based Money Laundering.  We will discuss two high profile international criminal scheme and where the elements of trade-based money laundering processes were used.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

Thursday, September 23, 2021

8:30-9:30 AM
Fundamentals in Case Planning.  Financial investigations can be very complicated and time consuming.  In this presentation we will discuss the challenges in financial investigations with respect to the technical processes of planning an investigation, violation mapping, and critical thinking processes.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

10:30-11:30 AM
Follow the Money: Criminal and terror organizations, small local to large transnational, will likely make use of financial networks to transfer value.  In this presentation we will discuss the processes in detail the information footprints that can be found and where that information can be found while conducting your investigations.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

Seminar #10
12:00-1:00 PM

Thursday, September 23, 2021

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police