< Back to ISS World Programs

2021 AGENDA

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.

Track 1: Hi-Tech Criminal Investigation Classroom Training
Track 2: Lawful Intercept and Hi-Tech Investigation Product Training
Track 3: Social Network Monitoring, OSINT and Cyberthreat Detection Training
Track 4: Investigating Dark Web and Associated Cryptocurrency Transactions
Track 5: Artificial Intelligence and Analysis of Unstructured Data
Track 6: 4G/5G/WiFi Signal Intercept and Electronic Surveillance
Track 7: Financial Crime Investigations and Prevention


ISS World North America 2021 Program Agenda


Special Training Seminars (30 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists

Tuesday, September 21, 2021

Online Social Media and Internet Investigations 
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Overview of the Seven Fundamental ISS Technologies and Products Presented in Conference Training Tracks
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 2G/3G/4G/5G Cellular Services
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 5G Network Core (NFV, SDN, EDGE Computing and Network Slicing) for Law Enforcement Investigators
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

A Real World Look at Investigations in the Dark Web 
(6 Classroom Hours)
Presented by: Todd G. Shipley, CFE, CFCE, and Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and Retired Investigator, Reno NV, Police Department

The Pursuit of Financial Crime
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

Seminar Descriptions At The End of Agenda Posting


ISS World North America 2021 Conference Agenda


ISS World America Exhibit Hours:

Wednesday, September 22, 2021: 10:00 AM-6:00 PM
Thursday, September 23, 2021: 9:30 AM-12:30 PM

Wednesday, September 22, 2021

8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies

Track 1: Hi-Tech Criminal Investigations Classroom Training

Track 1 sessions open to all conference attendees

Tuesday, September 21, 2021

Online Social Media and Internet Investigations 
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

9:00-10:00
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks

10:15-11:15
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)

11:30-12:30
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)

13:30-14:30
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

14:45-15:45
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective

16:00-17:00
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators

9:00-10:00
Overview of the Seven Fundamental ISS Technologies and Products Presented in Conference
Dr. Jerry Lucas, President, TeleStrategies

10:15-11:15
Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 2G/3G/4G/5G Cellular Services
Dr. Jerry Lucas, President, TeleStrategies

2:45-3:45
Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

4:00-5:00
Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)

Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Wednesday, September 22, 2021

9:00-10:00
Cutting Edge Criminal Tradecraft:  War Stories with a Purpose
Steven D. DeBrota, VP and Chief Counsel, NW3G and Retired Criminal Prosecurtor, US Attorney's Office for the Southern District of Indiana

11:30-12:30
Mobile, Cloud, and Computer Artifact Synergy
When an investigation starts with CSAM found on a cellphone, do you stop there? This presentation will show where to look to ensure no key data is missed. Use credentials extracted from the mobile device to access cloud accounts with Oxygen Forensic® Cloud Extractor, followed by KeyScout to triage computers and capture key evidence like iTunes backups, login credentials, CPU memory, and other important artifacts. Learning to leverage the complete Oxygen Forensic® Detective suite across all facets of an investigation positions you to triage devices in the field, examine data in-office, and report on what matters, most quickly and effectively.
Presented by Oxygen Forensics


Track 2: Lawful Interception and Hi-Tech Criminal Investigation Product Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, September 21, 2021

11:30-12:30
Introducing Search-based Investigative Intelligence for SIGINT, OSINT, Cybersecurity, and Policing
You'll learn how to greatly enhance the possibilities for keeping people, assets, and networks safe with Siren's unique search-based approach to investigations - SIGINT, OSINT, Cyber, and Policing. Some of the data challenges faced by organizations that have deep investigative needs include digital deluge, and siloed data. Siren helps you to rapidly ingest, link, and make massive amounts of data searchable by quickly processing billions of records.
Phil Glod, Siren 

Wednesday, September 22, 2021

9:00-10:00 Session B
ShadowDragon: Digital Tools for Modern Investigations
Presented by Shadow Dragon

1:30-2:30 Session A
“BIG Data Challenges to Investigations – The Needle is Still There But Becoming More Difficult to Find”
We all realize that the volumes of data that are available from a huge amount of sources may be critical to an investigation because there may be digital artifacts hidden within these masses of data that prove invaluable.  These volumes grow constantly with higher bandwidths available to consumers, the proliferation of the IoT, the increase of cell sites, the reduction of the coverage areas of cells sites, over the top apps and mobile handset OS vendor meta-data as examples.  This session will focus on ensuring the investigator has an understanding of possible sources of meta-data that can be obtained through subpoena or search warrants and, more importantly, to suggest methods to obtain critical evidence versus discarding the data because of the sheer volume and complexity.  Even obtaining identities of suspects or growing the “conspiracy group” to know who are the players and where they are in the hierarchy is vital in today’s large scale investigations.  Furthermore, consideration of cross sharing data within an agency’s investigations could provide unknown links amongst active cases and even cold cases.  The challenge of working with the meta-data is not insurmountable and, in many cases, well worth the effort.
Todd McDermott, CSO, Subsentio

1:30-2:30 Session B
New methods and enforcement tools designed specifically for regulatory agencies
Presented by Utimaco

3:00-4:00 Session A
Reducing Noise in Intelligence Monitoring
Presented by Resecurity

4:15-5:00 Session A
Importance of Search Warrant and Live Intercept Data for Social Media Investigations
Learn how social media providers like Facebook, Instagram, Snapchat, and Twitter deliver intercept data for targets and how often data is dsent by each provider.  See effective ways to easily monitor the data as it flows in for a case.  Realize just how useful and easy the setup is for your investigation, along with the information that can be acquired.  Also, see how geo-location can positively impact a case using integration tools to make your life much easier. Get useful tips on what to ask for on Search Warrant returns from Google, Facebook, Instagram, Apple, and Snapchat to successfully gain intelligence on today’s criminals.  Gain an understanding of what Google can provide in addition to email and login information, providing searches, location history, device information, geofencing, etc.  Also see just how useful Apple iCloud Search Warrant returns can be to a case.  Lastly, observe how PenLink has created a solution to ingest over 600+ provider’s datasets, by normalizing the data into one program for full communications analysis.  
 Scott Tuma, IP Program Director, PenLink

Thursday, September 23, 2021

9:00-10:00
Lawful Interception Collection and Analytics in the 5G Era
With its promise of higher speeds, low-latency, and flexibility, 5G introduces a completely new network architecture, and raises diverse new challenges. These all require significant changes to the existing Lawful Interception Gateway (LIG) and Monitoring Center (MC) solutions.

This session introduces varied 5G Lawful Interception challenges to both collection and analytics capabilities, and shares vital information on how solutions should evolve to remain compliant with local laws and for enhancing performance, efficiency, and analytics capabilities.
Gil Yaakovi, Director Sales Engineering, Cognyte

10:30-11:30
Importance of Search Warrant and Live Intercept Data for Social Media Investigations
Learn how social media providers like Facebook, Instagram, Snapchat, and Twitter deliver intercept data for targets and how often data is sent by each provider.  See effective ways to easily monitor the data as it flows in for a case.  Realize just how useful and easy the setup is for your investigation, along with the information that can be acquired.  Also, see how geo-location can positively impact a case using integration tools to make your life much easier. Get useful tips on what to ask for on Search Warrant returns from Google, Facebook, Instagram, Apple, and Snapchat to successfully gain intelligence on today’s criminals.  Gain an understanding of what Google can provide in addition to email and login information, providing searches, location history, device information, geofencing, etc.  Also see just how useful Apple iCloud Search Warrant returns can be to a case.  Lastly, observe how PenLink has created a solution to ingest over 600+ provider’s datasets, by normalizing the data into one program for full communications analysis.  
 Scott Tuma, IP Program Director, PenLink


Track 3: Social Network Monitoring, OSINT and Cyber Threat Detection Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, September 21, 2021

10:15-11:15
2021 and beyond: How do we improve our Cybersecurity?
Presented by Argent Software

Wednesday, September 22, 2021

9:00-10:00 Session A
The Role of Monitoring Deep Web Platforms in Public Safety Protection Programs
Presented by Cobwebs Technologies

9:00-10:00 Session B
Fleeing Facebook: how to keep up with new and constantly evolving platforms 
Alternative social media platforms such as Parler, Gab, Discord, 8Kun and Telegram are emerging, gaining popularity and disappearing again at a rapid pace. Being able to monitor threat actors online, as well as track where they are moving to next is essential to understanding risk. Learn how to stay ahead of the rapidly evolving platforms and address these challenges in your intelligence teams.  
Abbigail Dobbertin, Senior US Tradecraft Advisor, Fivecast

11:30-12:30 Session A
How to quantify the child exploitation problem on the Dark Web
Presented by SearchLight

10:30-11:30 Session B
Protecting Mobile Networks and National Critical Infrastructure from External Threat Actors
Presented by AdaptiveMobile Security

4:15-5:00 Session A
OSINT and Hybrid warfare (with a pandemic special) 
A brief overview of the current media environment and it’s recent changes. What is the role of TV and Radio in an online word? What is clubhouse and why does it matter? Are podcasts relevant? How are telegram, Parler and other apps being used and how useful can this be? How is disinformation used in these contexts and what are the methods. A demonstration and preview of some of the features of of the HENSOLDT Analytics OSINT system.
Presented by Hensoldt

4:15-5:00 Session B
Using real-world tools and techniques to investigate and disrupt Child Exploitation offender networks on the Dark Web
Presented by SearchLight

Thursday, September 23, 2021

8:30-9:30 Session C
Countering Domestic Extremism with adaptive OSINT tools & techniques
Presented by Chris Poulter, Founder & CEO, OSINT Combine

10:30-11:30 Session B
"Secure IT instead of IT security - trust is good, verification is better"
Presented by Hensoldt

10:30-11:30 Session C  
Cyber-Surveillance: From Messenger Monitoring to Device Control
Thomas Brigantino, North America Director of Marketing, HSS

12:00-1:00 Session C
Complex Supply Chain investigations to identify risk using open-source intelligence (OSINT)
Presented by Chris Poulter, Founder & CEO, OSINT Combine


Track 4: Investigating Dark Web and Associated Cryptocurrency Transactions

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, September 21, 2021

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous use

Wednesday, September 22, 2021

9:00-10:00
Using DarkWeb Information for Active Investigations
Information on the surface web is very valuable for open source intelligence and investigations; however, failing to account for information on the dark web from sources like Tor, IRC/I2P, and Zeronet can be an incredible missed opportunity. Join Skopenow as we look at the value of data breaches, paste sites, and other content for digital investigations.
Presented by Skopenow

11:30-12:30
How Cryptocurrency Enables Criminals: From Drug Dealers to Terror Financiers
Presented by Cobwebs Technologies

1:30-2:30
De-anonymizing cryptocurrency transactions to fight crime and terror 
Cryptocurrencies are being exploited for a variety of illicit purposes: money laundering, drug deals, organized crime, cybercrime, terror funding and more.

However, while blockchain transactions are public, cryptocurrency users remain anonymous. 

To identify illicit transactions, unmask their makers and solve cases in this complex domain, the most innovative solution is a must!

This session describes how cryptocurrencies are used for crime and terror. We will present Cognyte’s unique blockchain analytics solution and how it identifies illicit transaction makers to enable law enforcement to bring them to justice.
Yuval Altman, VP BLINK, Cognyte


Track 5: Artificial Intelligence and Analysis of Unstructured Data Training

* Note: Sessions in this track are only open to Government Attendees

Tuesday, September 21, 2021

9:00-10:00
Using Open-Source Information (OSINT) to augment investigations for the Office of Inspector Generals
Presented by Voyager Labs

Wednesday, September 22, 2021

1:30-2:30
Creating Order from Chaos: Using Automated AI for Social Network Analysis
Presented by Cobwebs Technologies

3:00-4:00
Tracking Extremism and Conspiracy Theories online, from the Boogaloo to QAnon
Conspiracy theories and violent extremists have long had a home in the darker corners of the Internet. Join Fivecast for a discussion of how OSINT tools can be used to track these conspiracies and extremists online and better predict and understand when adherents to these theories and ideologies are more likely to translate their online behavior into offline violence.
Presented by Fivecast


Track 6: 4G/5G/WiFi Signal Intercept and Electronic Surveillance

Tuesday, September 21, 2021

11:30-12:30 PM
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies 

1:30-2:30 PM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
1:30-2:30 PM
Active Interception + Analytics
Irina Frovola, International Director of Marketing, HSS

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
2:45-3:45 PM
Streaming Visual Intelligence from IoT
NightHawk, a cyber intelligence platform delivering E2E intelligence gathering and covert operations unique capabilities. The NightHawk can be operated remotely or by proximity to the targeted device. The session will enable law enforcement and intelligence agencies a glimpse into how to gather unique intelligence, analyze, track targets and events worldwide in the NightHawk.
Presented by Interionet

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
4:00-5:00 PM
Wireless Environment Collection + Analytics
Dean Manasses, North America Technology Specialist, HSS

Wednesday, September 22, 2021

11:30-12:30 Session A
Lawful Interception in 5G Mobile Networks
Presented by Utimaco

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
11:30-12:30
Tactical Intelligence solutions for evolving threats and technologies
Marios Demetrious, Cognyte

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
1:30-2:30 Session A
5G Tactical Solutions and Interoperability
Presented by EXFO

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
1:30-2:00 Session B
An Entirely New Approach for Digital Forensics and Intelligence-collection from IoT Devices
Connected-devices store vast amount of data, that may be game changing in the fight against terror and crime. However, security, defense and law enforcement agencies face a great number of challenges in gaining access and extract digital data in a quick, simple and effective manner.In this session, Toka will introduce its groundbreaking software-based platforms for obtaining digital forensic and ongoing intelligence from highly demanding devices, using advanced cyber technologies.
Presented by Toka

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
3:00-4:00
Direction Finding into the Future
Presented by Syndetix

(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
4:15-5:00
Using Mobile Signals to Corroborate WEBINT Investigations
Presented by Cobwebs Technologies

Thursday, September 23, 2021

12:00-1:00 PM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies


Track 7: Financial Crime Investigations and Prevention

Open to all conference attendees

The Pursuit of Financial Crime
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

Special Guest Speaker: Toni Gillich,  Forensic Audits and Investigative Service, General Accounting Office, Office of the Inspector General.  Toni is an expert in investigation and the analysis of illegal activities around the world as well as the response by governments and law enforcement.  The United States Congress tasks the GAO with requests to investigate and research, then report on topics critical to promulgating US policy and law. 

As in any business, financial crime is to generate or protect profit.  However, also as in any business, the cost and control of illicit networks, local to international, criminal or terror related, impacts effective operation and profitability.  Whether working locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

Each presentation describes the tools and methods criminals and terrorists manipulate financial and business systems as well as the footprints that leave for the financial crimes investigator in their criminal enterprises.  Mike will discuss the tools used in criminal networks, the facilitators, in fraud, money laundering and other financial crimes. 

This training is applicable to law enforcement, the intelligence community, and the financial and business regulated communities.

Wednesday, September 22, 2021

1:30-2:30 PM
Key Players:  The Money Laundering Professional.  We discuss recent investigations describing the role of the “gatekeeper” or “fixer,” where they fit within criminal networks, and their value to any investigation.

3:00-4:00 PM
The Beneficial Ownership Challenge.  Toni Gillich will speak to the ever-growing concern in the issues of beneficial ownership and methods used by criminals to make involvement in finance and business.  Toni will refer to recent work by the GAO into the use and accuracy of beneficial ownership information, processes used in collection of data, and impact on US policy.

4:15-5:00 PM
Banks, Virtual Assets, and Money Services Businesses.  The recent changes in money laundering laws in the United States can have significant impact in investigations around the world.  We will discuss recent cases, the changes in the law and the changing role FinCEN.

Thursday, September 23, 2021

8:30-9:30 AM
Fundamentals in Case Planning.  Financial investigations can be very complicated and time consuming.  In this presentation we will discuss the challenges in financial investigations with respect to the technical processes of planning an investigation, violation mapping, and critical thinking processes.

10:30-11:30 AM
Follow the Money: Criminal and terror organizations, small local to large transnational, will likely make use of financial networks to transfer value.  In this presentation we will discuss the processes in detail the information footprints that can be found and where that information can be found while conducting your investigations.

12:00-1:00 PM
Follow the Value: Financial Crime Schemes in Trade Based Money Laundering.  We will discuss two high profile international criminal scheme and where the elements of trade-based money laundering processes were used.


Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

30 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructor sessions include:

Seminar #1

Online Social Media and Internet Investigations 

Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.  

While Tor is the most common Darknet Service, it is not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.  The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.

Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.

9:00-10:00
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks

10:15-11:15
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)

11:30-12:30
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)

13:30-14:30
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

14:45-15:45
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective

16:00-17:00
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators

Seminar #2

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

Tuesday, September 21, 2021

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous user

Seminar #3
9:00-10:00 AM

Tuesday, September 21, 2021

Overview of the Seven Fundamental ISS Technologies and Products Presented in Conference Tracks 1 thru 7
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Seminar #4
10:15-11:15 AM

Tuesday, September 21, 2021

Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 2G/3G/4G/5G Cellular Services
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Seminar #5
11:30-12:30 AM

Tuesday, September 21, 2021

Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Seminar #6
1:30-2:30 PM

Tuesday, September 21, 2021

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Thursday, September 23, 2021

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar #7
2:45-3:45 PM

Tuesday, September 21, 2021

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategies

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.

When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.

Seminar # 8
4:00-5:00 PM

Tuesday, September 21, 2021

Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Seminar #9

Concerns and Considerations in Financial Crime Investigations 
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.

Special Guest Speaker: Toni Gillich,  Forensic Audits and Investigative Service, General Accounting Office, Office of the Inspector General.  Toni is an expert in investigation and the analysis of illegal activities around the world as well as the response by governments and law enforcement.  The United States Congress tasks the GAO with requests to investigate and research, then report on topics critical to promulgating US policy and law. 

As in any business, financial crime is to generate or protect profit.  However, also as in any business, the cost and control of illicit networks, local to international, criminal or terror related, impacts effective operation and profitability.  Whether working locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

Each presentation describes the tools and methods criminals and terrorists manipulate financial and business systems as well as the footprints that leave for the financial crimes investigator in their criminal enterprises.  Mike will discuss the tools used in criminal networks, the facilitators, in fraud, money laundering and other financial crimes. 

This training is applicable to law enforcement, the intelligence community, and the financial and business regulated communities.

Wednesday, September 22, 2021

1:30-2:30 PM
Key Players:  The Money Laundering Professional.  We discuss recent investigations describing the role of the “gatekeeper” or “fixer,” where they fit within criminal networks, and their value to any investigation.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

3:00-4:00 PM
The Beneficial Ownership Challenge.  Toni Gillich will speak to the ever-growing concern in the issues of beneficial ownership and methods used by criminals to make involvement in finance and business.  Toni will refer to recent work by the GAO into the use and accuracy of beneficial ownership information, processes used in collection of data, and impact on US policy.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

4:15-5:00 PM
Banks, Virtual Assets, and Money Services Businesses.  The recent changes in money laundering laws in the United States can have significant impact in investigations around the world.  We will discuss recent cases, the changes in the law and the changing role FinCEN.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

Thursday, September 23, 2021

8:30-9:30 AM
Fundamentals in Case Planning.  Financial investigations can be very complicated and time consuming.  In this presentation we will discuss the challenges in financial investigations with respect to the technical processes of planning an investigation, violation mapping, and critical thinking processes.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

10:30-11:30 AM
Follow the Money: Criminal and terror organizations, small local to large transnational, will likely make use of financial networks to transfer value.  In this presentation we will discuss the processes in detail the information footprints that can be found and where that information can be found while conducting your investigations.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC

12:00-1:00 PM
Follow the Value: Financial Crime Schemes in Trade Based Money Laundering.  We will discuss two high profile international criminal scheme and where the elements of trade-based money laundering processes were used.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC