< Back to ISS World Programs

2022 AGENDA

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception, and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism, and other criminal activities conducted over today's Telecommunications networks, the Internet, and Social Networks.

Track 1: Lawful Interception and Social Network Monitoring Training
Track 2: LEA, Defense and Intelligence Gathering Product Training
Track 3: Social Network Monitoring, OSINT and Data Analytics Product Training
Track 4: Investigating Dark Web and Crytptocurrency Transaction Traceback
Track 5: Cyber Threat Detection and Product Training
Track 6: Mobile Signal Intercept and Electronic Surveillance Product Training
Track 7: 5G Lawful Interception Training



ISS World North America agenda


Special Training Seminars (30 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists

Tuesday, November 15, 2022

Online Social Media and Internet Investigations 
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Practitioners Guide to Internet Investigations
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

A Real World Look at Investigations in the Dark Web 
(6 Classroom Hours)
Presented by: Todd G. Shipley, CFE, CFCE, and Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and Retired Investigator, Reno NV, Police Department

The Pursuit of Financial Crime
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

Seminar Descriptions At The End of Agenda Posting



ISS World North America 2022 - Agenda at a Glance


ISS World America Exhibit Hours:

Wednesday, November 16, 2022: 10:00 AM-6:00 PM
Thursday, November 17, 2022: 9:30 AM-12:30 PM

Wednesday, November 16, 2022

8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies

Track 1: Lawful Interception and Social Network Monitoring Training

Tuesday, November 15, 2022

9:00 AM-5:00 PM
Online Social Media and Internet Investigations
 
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective

11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators

1:30-2:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies

2:45-3:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know

4:00-5:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox

11:30 AM-12:30 PM
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

1:30-2:30 PM
Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies


Track 2: LEA, Defense and Intelligence Gathering Product Demonstrations

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, November 15, 2022

9:00 AM-5:00 PM
Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, 
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking

1:30-2:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

2:45-3:45
Advanced Techniques in Tracing Suspects, and lateral problem solving

4:00-5:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources

9:00-10:00 AM
Every piece of data tells a story - combine and analyze data from any source in your digital investigation
Presented by XCI

10:15-11:15
Electronic court order / warrant management & approvals and cross-agency data collaboration
Presented by DekkoSecure

1:30-2:30 PM
Precision Cellular Analysis Training Session

Presented by Subsentio Academy

In this 1-hour session, Law Enforcement investigators will learn basic cellular analysis techniques from former FBI instructors from the FBI CAST program. 

The session will include:

  • An introductory case example/study of national significance designed to teach the investigator the significance and possibilities of using cell phone data.
    • Example - Boston Bombing case.
  • Overview of basic cell phone technology
    • Learn why a cell phone selects a cell tower to communicate with, how towers are configured and how records of communication events are created.  
  • Learn cell phone investigative techniques including:
    • Examples of cell site & sector information, timing advance, drive testing (use of a network survey tool) and tower dumps. 
    • Overview of the legal processes used to obtain cell phone data including how the data, once obtained, can be employed to solve crimes.  
  • Preview of evolving data sets and techniques that are providing significant investigative advancements for law enforcement.
    • Examples include Google location & geofence data, vehicle telematics, social media applications. 

Wednesday, November 16, 2022

9:00-10:00 AM
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence. Specialized digital tools to get the task done
Presented by AREA

9:00-10:00 AM
Target-Centric Analysis with ShadowDragon OSINT Tools
Presented by ShadowDragon

11:30 AM-12:30 PM
Combating terrorism, espionage and crime by combining mobile network metadata, mass positioning, and intelligent profiling in real-time
Mohsen Tavakol, Chief Executive Officer, Xolaris

11:30 AM-12:30 PM
Rakia big data system - "Simplifying the complexity of intelligence"
Presented by Rakia Group

3:00-4:00 PM
Streamlining law enforcement and national security communities through convergent intelligence and security technologies
Mohsen Tavakol, Chief Executive Officer, Xolaris

4:15-5:00 PM
Modern Advancements in Live Collection and Analysis
Join us as we discuss the ever-changing cyber landscape and spotlight modern advancements in live communications collection. Internet communications expert, Scott Tuma, will highlight how top investigators across the nation are executing live social media intercepts to enhance investigations and identify larger criminal networks faster. Hear how live intel from social media providers can be crucial to solving cases, plus best practices for effective intercepts with real case examples. 

- Current trends in live collection and analysis
- How today’s savvy investigators are using social media intercepts
- Myths about modern live collection 
- Advantages and best practices for live social media intercepts
Presented by PenLink

4:15-5:00 PM
Majestic5 - "The Swiss army knife for all of your OSINT tasks"
Presented by Rakia Group

Thursday, November 17, 2022

8:30-9:30 AM
New methods and enforcement tools designed specifically for regulatory agencies
Presented by Utimaco

10:30-11:30 AM Session A
Using GrayKey in Digital Forensics Examinations

Law Enforcement Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with technology is currently a challenge and will remain a challenge for years to come. iOS and Android platforms are constantly being updated on a regular basis, which makes accessing locked and encrypted devices difficult. Staying ahead on the latest applications and artifacts that come from both Android and iOS will be essential. Learn from Grayshift subject matter experts as they provide an overview of GrayKey and how it is used to expedite your investigations for faster case resolution.

  1. Identify the state of the evidence.
  2. Properly secure evidence and maintain complete chain of custody. 
  3. Understand the limitations of other mobile forensics tools and acquisition types.
  4. Differentiate device extractions and understand their impact on criminal investigations.

Presented by Grayshift

10:30-11:30 AM Session B
Electronic court order / warrant management & approvals and cross-agency data collaboration
Presented by DekkoSecure


Track 3: Social Network Monitoring, OSINT and Data Analytics Product Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, November 15, 2022

2:45-3:45 PM
How Advanced AI Technologies are Enhancing Intelligence and Law Enforcement Investigations
Presented by Voyager Labs

4:00-5:00 PM Session A
Introducing Search-based Investigative Intelligence for SIGINT, OSINT, Cybersecurity, and Policing
Presented by Siren

4:00-5:00 PM Session B
Machine Language Translation for Government
RWS Group’s Bart Mączyński will talk about utilizing machine translation by government agencies. He will review the emerging machine translation use cases and share best practices for improving translation outcomes in the Federal Government.
Bart Maczynski, VP Machine Learning, Solutions Consulting, RWS

Wednesday, November 16, 2022

9:00-10:00 AM
Automated Analysis of Social Media Networks
Presented by Cobwebs

9:00-10:00 AM
Disrupting Transnational Organized Crime: Investigating Cross-Border Cartel Operations
Presented by Fivecast

11:30 AM-12:30 PM
AI and network analysis to find out SIMBox fraud at nation scale
Social interactions data, such as telecom metadata, only provides poor information if not aggregated and analyzed. Through the use of network analysis, behavioral data and social context can be extracted to fuel recent AI technologies. Our state-of-the-art detection engine is able to learn fraud pattern and to adapt to new fraud schemes without prior knowledge. Illustrated with one typical fraud case, we demonstrate our ability to discover abnormal telecom behavior and enhance fraud fighting capabilities.
Presented by Suneris

11:30 AM-12:30 PM
Unraveling a Criminal Syndicate using Lawful Intercept PCAP files

This session will demonstrate how extracting encrypted application metadata from a PCAP file can begin to unravel a criminal syndicate by associating social media posts with specific devices, mapping communication networks, and validating known dark web and cryptocurrency activity.
Presented by Sandvine

1:30-2:30 PM
Introducing Search-based Investigative Intelligence for SIGINT, OSINT, Cybersecurity, and Policing
You'll learn how to greatly enhance the possibilities for keeping people, assets, and networks safe with Siren's unique search-based approach to investigations - SIGINT, OSINT, Cyber, and Policing. Some of the data challenges faced by organizations that have deep investigative needs include digital deluge, and siloed data. Siren helps you to rapidly ingest, link, and make massive amounts of data searchable by quickly processing billions of records.
Phil Glod, Siren 

1:30-2:30 PM
How OSINT Tools Can Fight Its Many Forms and joining force with Anti-Human Trafficking Intelligence Initiative (ATII)
Presented by Social Links

3:00-4:00 PM Session A
A light in the darkness of Encrypted Communications. Live Demo of Network Awareness and Network Intelligence platform leveraging the power of content driven metadata
Presented by AREA

3:00-4:00 PM Session B
Combatting threats across the full spectrum of OSINT mediums & sources with consolidated platforms
Presented by OSINT Combine

Thursday, November 17, 2022

8:30-9:30 AM
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditiional Lawful Interception
Presented by IPS

12:00-1:00 PM
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police


Track 4: Investigating Dark Web and Cryptocurrency Transactions Traceback

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, November 15, 2022

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous use

Wednesday, November 16, 2022

9:00-10:00 AM
Ransomware Money Laundering Tactic
Nicholas Smart, Head of Blockchain Intelligence, CrystalBlockChain

11:30 AM-12:30 PM
Automating Open-Source Intelligence Analysis for Deep and Dark Web Investigations and Cryptocurrency Transactions
Presented by Cobwebs

1:30-2:30 PM
Tracing Al-Qaeda's Terrorist Financing Campaigns with Blockchain Intelligence
Presented by Chainalysis

3:00-4:00 PM
Ransomware Money Laundering Tactic
Nicholas Smart, Head of Blockchain Intelligence, CrystalBlockChain

4:15-5:00 PM
Technical Exploitation of the Dark Web
Jason Nack, Head of Technology, Bluestone Analytics, a CACI Company


Track 5: Cyber Threat Intelligence Detection and Product Training

* Note: Sessions in this track are only open to Government Attendees

Wednesday, November 16, 2022

1:30-2:30 PM
Case Studies: Using Social Network Analysis to Detect Potential Threats and Uncover New Investigation Leads
Presented by Cobwebs

3:00-4:00 PM
Critical Infrastructure Protection: Conducting a National Security Investigation Online:

This session will demonstrate how to monitor Indicators of Compromise across an entire nation-state’s critical infrastructure, identifying compromised sites, determining the bad actors behind the compromise, and mapping out the critical sectors being probed by the bad actors.
Presented by Sandvine

4:15-5:00 PM
Data Breaches Compromising national security
Nowadays, it’s essentially impossible to totally avoid data breaches. They will happen eventually, regardless of what cybersecurity measures have been taken. Social Links will tell how to detect and mitigate the data leak with OSINT before it spirals into a multi-million dollar corporate problem, or a critical lapse in national security.
Presented by Social Links


Track 6: Mobile Signal Intercept and Electronic Surveillance Product Training

Tuesday, November 15, 2022

11:30-12:30 PM
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies 

1:30-2:30 PM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Wednesday, November 16, 2022

1:30-2:30 PM Session A
CEMA: Electronic Warfare meets the Cyber Domain to support Offensive Cyber Operations. 
Andrea Pompili, Chief Scientist Officer, CY4GATE S.p.A.

1:30-2:30 PM Session B
Tools for the analysis of cellular, WLAN and Bluetooth communication
Presented by S.E.A. Science & Engineering Applications

3:00-4:00 PM
Cyber & Cellular Communication Interception
Presented by HSS

4:15-5:00 PM
Using Mobile Signals to Corroborate WEBINT Investigations

Presented by Cobwebs Technologies

Thursday, November 17, 2022

8:30-9:30 AM
Live Demo of compact, flexible, and intelligence tactical electronic surveillance fully scalable enabling platform LEMF with synchronized multimedia on a single panel
Presented by AREA

10:30-11:30
Advanced UAV Surveillance Detection & Jamming Solutions
Presented by HSS


Track 7: 5G Lawful Interception Product Training

Open to all conference attendees

Tuesday, November 15, 2022

9:00-10:00 AM
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies

10:15-11:15 AM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

2:45-3:45 PM
5G: What is it and what is it not
There are a lot of misconceptions about 5G technology and what it will deliver. Likewise, there are many misconceptions about the security of 5G and 6G. This session looks at the truth behind 5G technology, and the impacts of a virtualized telecom network. Understand what OpenRAN is, and how it differs from current technology in cellular networks, and understand what sits behind every RAN in the 5G core network.
Travis Russell, Oracle Communications

4:00-5:00 PM
Lawful interception in 5G Mobile Networks
Presented by Utimaco

Wednesday, November 16, 2022

1:30-5:00 PM
The Pursuit of Financial Crime

(6 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

As in any business, financial crime is to generate or protect profit.  However, also as in any business, the cost and control of illicit networks, local to international, criminal or terror related, impacts effective operation and profitability.  Whether working locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

Each presentation describes the tools and methods criminals and terrorists manipulate financial and business systems as well as the footprints that leave for the financial crimes investigator in their criminal enterprises.  Mike will discuss the tools used in criminal networks, the facilitators, in fraud, money laundering and other financial crimes. 

This training is applicable to law enforcement, the intelligence community, and the financial and business regulated communities.

1:30-2:30 PM
Key Players:  The Money Laundering Professional.  We discuss recent investigations describing the role of the “gatekeeper” or “fixer,” where they fit within criminal networks, and their value to any investigation.

3:00-4:00 PM
The Beneficial Ownership Challenge.  Toni Gillich will speak to the ever-growing concern in the issues of beneficial ownership and methods used by criminals to make involvement in finance and business.  Toni will refer to recent work by the GAO into the use and accuracy of beneficial ownership information, processes used in collection of data, and impact on US policy.

4:15-5:00 PM
Banks, Virtual Assets, and Money Services Businesses.  The recent changes in money laundering laws in the United States can have significant impact in investigations around the world.  We will discuss recent cases, the changes in the law and the changing role FinCEN.

Thursday, November 17, 2022

8:30-1:00 PM
The Pursuit of Financial Crime
(Continued)

8:30-9:30 AM
Fundamentals in Case Planning.  Financial investigations can be very complicated and time consuming.  In this presentation we will discuss the challenges in financial investigations with respect to the technical processes of planning an investigation, violation mapping, and critical thinking processes.

10:30-11:30 AM
Follow the Money: Criminal and terror organizations, small local to large transnational, will likely make use of financial networks to transfer value.  In this presentation we will discuss the processes in detail the information footprints that can be found and where that information can be found while conducting your investigations.

12:00-1:00 PM
Follow the Value: Financial Crime Schemes in Trade Based Money Laundering.  We will discuss two high profile international criminal scheme and where the elements of trade-based money laundering processes were used.


Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

30 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructor sessions include:

Tuesday, November 15, 2022

Seminar #1

Online Social Media and Internet Investigations 

Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.  

While Tor is the most common Darknet Service, it is not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.  The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.

Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective

11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators

13:30-14:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies

14:45-15:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know

16:00-17:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox

Seminar #2

(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, 
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00 AM
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

How it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.

10:15-11:15 AM
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows

What data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.

11:30 AM-12:30 PM
WIFI, geolocation, and Mobile Data traces and tracking

A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.

1:30-2:30 PM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.

2:45-3:45 PM
Advanced Techniques in Tracing Suspects, and lateral problem solving

Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.

4:00-5:00 PM
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources

"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how. PART 2 on the final day with free tools to download and keep

Seminar #3

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous user

Seminar #4
10:15-11:15 AM

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Seminar #5
1:30-2:30 PM

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar #6
2:45-3:45 PM

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategies

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.

When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.

Seminar # 7
4:00-5:00 PM

Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Seminar #8

Concerns and Considerations in Financial Crime Investigations 
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

As in any business, financial crime is to generate or protect profit.  However, also as in any business, the cost and control of illicit networks, local to international, criminal or terror related, impacts effective operation and profitability.  Whether working locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

Each presentation describes the tools and methods criminals and terrorists manipulate financial and business systems as well as the footprints that leave for the financial crimes investigator in their criminal enterprises.  Mike will discuss the tools used in criminal networks, the facilitators, in fraud, money laundering and other financial crimes. 

This training is applicable to law enforcement, the intelligence community, and the financial and business regulated communities.

Wednesday, November 16, 2022

1:30-2:30 PM
Key Players:  The Money Laundering Professional.  We discuss recent investigations describing the role of the “gatekeeper” or “fixer,” where they fit within criminal networks, and their value to any investigation.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

3:00-4:00 PM
The Beneficial Ownership Challenge.  Toni Gillich will speak to the ever-growing concern in the issues of beneficial ownership and methods used by criminals to make involvement in finance and business.  Toni will refer to recent work by the GAO into the use and accuracy of beneficial ownership information, processes used in collection of data, and impact on US policy.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

4:15-5:00 PM
Banks, Virtual Assets, and Money Services Businesses.  The recent changes in money laundering laws in the United States can have significant impact in investigations around the world.  We will discuss recent cases, the changes in the law and the changing role FinCEN.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

Thursday, November 17, 2022

8:30-9:30 AM
Fundamentals in Case Planning.  Financial investigations can be very complicated and time consuming.  In this presentation we will discuss the challenges in financial investigations with respect to the technical processes of planning an investigation, violation mapping, and critical thinking processes.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

10:30-11:30 AM
Follow the Money: Criminal and terror organizations, small local to large transnational, will likely make use of financial networks to transfer value.  In this presentation we will discuss the processes in detail the information footprints that can be found and where that information can be found while conducting your investigations.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

12:00-1:00 PM
Follow the Value: Financial Crime Schemes in Trade Based Money Laundering.  We will discuss two high profile international criminal scheme and where the elements of trade-based money laundering processes were used.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC