ISS World America is the world's largest gathering of North American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering and Sharing

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.

Track 1: Lawful Interception and Hi-Tech Criminal Investigations
Track 2: Automated Real-Time Cyber Threat Detection
Track 3: Mobile Threat Intelligence Solutions for Government Network Security
Track 4: Managed Government Security Services
Track 5: LEA, Defense and Interior Security Intercept
Product Training
Track 6: Social Network Monitoring and Data Analytics Product Training
Track 7: Electronic Surveillance and Mobile Signal Intercept Product Training

Track 8: Investigating Criminal Bitcoin and Dark Web Transactions

Plus Advanced Hi-Tech, Cyber Crime Investigation Training Seminars 
(11 - 13 September 2017)


ISS World America 2017 - Agenda at a Glance


Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

28 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructors include:

Charles Cohen, Cohen Training and Consulting, LLC, also holds the position of Captain, Indiana State Police

(6 classroom hours)

Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)

Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, Co-Author of , Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired Reno NV, Police Officer

(6 classroom hours)

Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies
(4 classroom hours)

Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(5 classroom hours)

Monday, September 11, 2017

Seminar #1
9:00-5:00 PM

Online Social Media and Internet Investigations 

Presented by Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Captain, Indiana State Police

09:00-10:00 AM
The role of Online Social Media OSINT in Predicting and Interdicting Spree Killings: Case Studies and Analysis


10:15-11:15 AM
OSINT and Criminal Investigations


11:30-12:30 PM
Metadata Exploitation in Criminal Investigations


1:30-2:30 PM
EXIF Tags and Geolocation of Devices for Investigations and Operational Security


2:45-3:45 PM
Case Studies in Metadata Vulnerability Exploitation and Facial Recognition


4:00-5:00 PM
What Investigators Need to Know about Emerging Technologies Used to Hide on the Internet

Seminar #2
9:00-5:00 PM

Practitioners Guide to Internet Investigations

Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1 day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00 AM
The Internet, and how suspects leave a digital footprint

10:15-11:15 AM
Recognizing Traffic Data and digital profiling

11:30 AM-12:30 PM
WIFI, geolocation, and Mobile Data traces

1:30-2:30 PM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

2:45-3:45 PM
Advanced Techniques in Tracing Suspects and lateral problem solving

4:00-5:00 PM
Open source tools, resources and techniques

Seminar #3
9:00-5:00 PM

A Real World Look at Investigations in the Dark Web

Presented by: Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, Co-Author of , Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired Reno NV, Police Investigator

The aim of this 1 day seminar is to take the attendees from the basics of understanding the Dark Web, how to access it to how to finding information hidden within it. The attendees will learn the best practices for the internet investigator when working in the Deep Web and the tools available to assist their investigations into the Deep Web.
This exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar.

09:00-10:00 AM
The Dark Web, what it is and what it is not

10:15-11:15 AM
To Tor or not to Tor

11:30 AM-12:30 PM
CryptoCurrency and its use in the Dark Web

1:30-2:30 PM
Going Undercover on the Dark Web

2:45-3:45 PM
Using web bugs and other technology to locate a suspect

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous user

Seminar #4
9:00-12:30 PM

Understanding ISS Product Developments in Telecommunication Networks for Lawful Interception and Mass Surveillance

Presented by: Dr. Jerry Lucas, President, TeleStrategies

This half-day seminar covers what law enforcement and intelligence analysts need to understand about today's public telecommunications wireline and wireless networks as well as ISS technologies and products used to lawfully intercept electronic communications and conduct mass network surveillance as discussed at ISS World Conference sessions and by exhibitors.

9:00-10:00 AM
Introduction to Wirelines and IP Infrastructure and Related ISS Products for Lawful Interception and Mass Surveillance

10:15-11:15 AM
Understanding Mobile Wireless Infrastructure, and Related ISS Products for Lawful Interception and Mass Surveillance

11:30 AM - 12:30 PM
Understanding the Internet Over-the-Top (OTT) Services and Related ISS Products for Mass Intelligence Gathering and Surveillance

Seminar #5
1:30-2:30 PM

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand

Presented by: Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.

When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network encryption.

Seminar #6
2:45-3:45 PM

Investigation Techniques for Unmasking TOR Hidden Services and Other Dark Web Operations

Presented by: Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

side that receives less attention are TOR hidden services. These are services that leverage TOR's anonymizing capabilities to mask the identity of criminally-hosted online services - forming the basis of just about all illegal gambling sites, drug markets, child exploitation material, firearm sales, terrorism propaganda, and more.

Tuesday, September 12, 2017

Seminar #7
9:00-10:00 AM

SS7 Network Vulnerabilities and Intercept Options

Presented by Dr. Jerry Lucas, President, TeleStrategies and a Distinguished Telecom Technology Expert to be announced

Last April's "60 Minute" episode on SS7 Network vulnerabilities sparked a lot of interest from privacy advocates, Congress as well as law enforcement and the government intelligence community. This session reviews the basics of SS7 Networks, how the "60 Minutes" team "legally" hacked into a call to Congressman Ted Lieu's office, how else someone could do the same without a large cooperative telecom and what else can be done with SS7 Networks access.

Seminar #8
11:30 AM-12:30 PM

The Implications of multi-IMSI and OTA for Law Enforcement and the Government Intelligence Community

Presented by Dr. Jerry Lucas, President, TeleStrategies and a Distinguished Telecom Technology Expert to be announced

The era of SIM Cards with static IMSIs issued by cellular operators is changing. Deployment of multi-IMSI as well as network programmable (OTA) SIM cards will create new challenges for law enforcement. This session looks at the implications of multi-SIM and OTA for LEAs and Intel analysts

Seminar #9
1:30-2:30 PM

Bitcoin 101: Introduction to What Technical Investigators Need to Know about Bitcoin Transactions, Dark Web Commerce and Blockchain Analysis

Presented by: Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies

This 101 training seminar is an introduction to Bitcoin, how the system is used to support criminal activities (e.g. Dark Web) and why technical investigators need to understand the basic Bitcoin transaction mechanism (Blockchain) to successfully defeat 21st century criminals and terrorist actions. Specifically this introduction to Bitcoin for technical investigators addresses

Seminar #10
4:15-5:15 PM

Understanding Quantum Computers and How They Can Be Defeated with Quantum Safe Cryptography Options: QKD and PQC

Presented by: Dr. Jerry Lucas, President, TeleStrategies

This session first addresses why Quantum Computers when eventually deployed can defeat today's cryptosystems, a very briefly describes the Quantum Physics involved (e.g. Qubits, superpostion and entanglements), the key crypto cracking computer algorithms (Shor and Grover) and the Quantum Computer performance metric to monitor.

The second part of this session will present the two defensive options: Quantum Key Distribution (QKD) via a Quantum Optic Channel and Post Quantum Cryptography (PQC) with no quantum physics, just newly developed cryptography algorithms.

Wednesday, September 13, 2017

Seminar #11
9:00-10:00 AM

The Computer Science View of Bitcoins

Presented by: Nicholas Weaver, Ph.D. is a researcher at the International Computer Science Institute in Berkeley. His primary research is focused on network security, including worms, botnets, and other internet-scale attacks, network measurement, and network criminality including Bitcoin.

The research community has devoted significant effort into understanding Bitcoin and the associated criminal activities ‹ the results of which have promise to transform how law enforcement might handle Bitcoin investigations going forward. This speaker will present relevant Bitcoin/Dark Web investigation research including clustering to mass-deanonymize Bitcoin transactions, "tumblers" and Dark Markets; and why recording transactions is critical for de-anoymization success; robust estimates on the scale of Dark Markets and the daily volume of currency exchanged to/from Bitcoin ($500,000/day); and experiments involving merging datasets with the Bitcoin blockchain ‹ both of which reveal the MtGox accounts of multiple Silk Road drug dealers and was able to confirm that Sean Bridges (the Secret Service agent who stole from Silk Road) transferred effectively all his Bitcoins through MtGox.

Seminar #12
11:00 AM-12:00 PM

The Computer Science View of Dark Markets

Presented by: Nicholas Weaver, Ph.D. is a researcher at the International Computer Science Institute in Berkeley. His primary research is focused on network security, including worms, botnets, and other internet-scale attacks, network measurement, and network criminality including Bitcoin.

The research community has devoted significant effort into understanding Bitcoin and the associated criminal activities ‹ the results of which have promise to transform how law enforcement might handle Bitcoin investigations going forward. This speaker will present relevant Bitcoin/Dark Web investigation research including clustering to mass-deanonymize Bitcoin transactions, "tumblers" and Dark Markets; and why recording transactions is critical for de-anoymization success; robust estimates on the scale of Dark Markets and the daily volume of currency exchanged to/from Bitcoin ($500,000/day); and experiments involving merging datasets with the Bitcoin blockchain ‹ both of which reveal the MtGox accounts of multiple Silk Road drug dealers and was able to confirm that Sean Bridges (the Secret Service agent who stole from Silk Road) transferred effectively all his Bitcoins through MtGox.

Pre-Conference Sessions Description At The End of Agenda Posting After Track 7