ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception and cybercrime investigations.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.
Track 1: Hi-Tech Criminal Investigation Classroom Training
Track 2: Lawful Intercept and Hi-Tech Investigation Product Training
Track 3: Social Network Monitoring, OSINT and Cyberthreat Detection Training
Track 4: Investigating Dark Webs and Associated Cybercurrency Transactions
Track 5: Artificial Intelligence and Analysis of Unstructured Data
Track 6: 4G/5G/WiFi Signal Intercept and Tracking
Track 7: Digital Forensics Product Training
Track 8: Audio, Video and Airborne Electronic Surveillance Product Training
Track 9: Financial Crime Investigations and Prevention
ISS World North America 2021 Program Agenda
Online Social Media and Internet Investigations
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Practitioners Guide to Internet Investigations
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Overview of the Seven Fundamental ISS Technologies and Products Presented in Conference Training Tracks 1 thru 9
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 2G/3G/4G/5G Cellular Services
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding 5G Network Core (NFV, SDN, EDGE Computing and Network Slicing) for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
A Real World Look at Investigations in the Dark Web
(6 Classroom Hours)
Presented by: Todd G. Shipley, CFE, CFCE, President and CEO of Vere Software, Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired Investigate, Reno NV, Police Department
Concerns and Considerations in Financial Crime Investigations
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance training
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
(One Classroom Hour)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Seminar Descriptions At The End of Agenda Posting
ISS World North America 2021 Conference Agenda
ISS World America Exhibit Hours:
Wednesday, September 22, 2021: 10:00 AM-6:00 PM
Thursday, September 23, 2021: 9:30 AM-12:00 PMWednesday, September 22, 2021
8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies
Track 1: Hi-Tech Criminal Investigations Classroom Training
Track 1 sessions open to all conference attendees
Tuesday, September 21, 2021
Online Social Media and Internet Investigations
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks14:45-15:45
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)
Wednesday, September 22, 2021
9:00-10:00
Protecting Mobile Networks and Infrastructure from External Threat Actors
Presented by AdaptiveMobile Security
Track 2: Lawful Interception and Hi-Tech Criminal Investigation Product Training
* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Wednesday, September 22, 2021
9:00-10:00 Session A
Session to be Announced
Presented by Toka Group9:00-10:00 Session B
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence
Presented by AREA11:30-12:30 Session A
Session to be Announced
Presented by EXFO11:30-12:30 Session B
Oxygen Foresnic Detective Product Training
Presented by Oxygen Forensics11:30-12:30
Introducing a new all-in-one frontend A/V solution within critical evidence collection
At this session, we present a solution that will help minimize the risk of detecting installed covert equipment. At the same time, the solution will make life easier for the installers and investigators due to the device’s flexibility and the comprehensive controlling and monitoring capabilities.
Presented by Spectronic1:30-2:30 Session B
New methods and enforcement tools designed specifically for regulatory agencies
Presented by Utimaco3:00-4:00 Session A
Reducing Noise in Intelligence Monitoring
Presented by Resecurity3:00-4:00 Session B
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS
Track 3: Social Network Monitoring, OSINT and Cyber Threat Detection Training
* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, September 21, 2021
Practitioners Guide to Internet Investigations
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement services only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving16:00-17:00
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site
Wednesday, September 22, 2021
9:00-10:00 Session A
Tactical Web Intelligence (WEBINT) & Social Engineering: Gathering Actionable Intelligence via a powerful WEBINT platform
Presented by Cobwebs Technologies9:00-10:00 Session B
Fleeing from Facebook: Discord, Gab and Emerging Platforms
Presented by Fivecast11:30-12:30
How to quantify the child exploitation problem on the Dark Web
Presented by SearchLight3:00-4:00
A light in the darkness of Encrypted Communications
Presented by AREA4:15-5:00 Session A
OSINT and Hybrid warfare (with a pandemic special)
A brief overview of the current media environment and it’s recent changes. What is the role of TV and Radio in an online word? What is clubhouse and why does it matter? Are podcasts relevant? How are telegram, Parler and other apps being used and how useful can this be? How is disinformation used in these contexts and what are the methods. A demonstration and preview of some of the features of of the HENSOLDT Analytics OSINT system.
Presented by Hensoldt4:15-5:00 Session B
Using real-world tools and techniques to investigate and disrupt Child Exploitation offender networks on the Dark Web
Presented by SearchLightThursday, September 23, 2021
8:30-9:30 Session A
Global Signalling Threat Analysis and Insights for Cyber Intelligence
Presented by AdaptiveMobile Security8:30-9:30 Session B
CLOS-INT. Closed Source Intelligence form Web2.0 sources
Presented by AREA10:30-11:30 Session A
"Secure IT instead of IT security - trust is good, verification is better"
Presented by Hensoldt10:30-11:30 Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS12:00-1:00
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Track 4: Investigating Dark Webs and Associated Cybercurrency Transactions
* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, September 21, 2021
A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department9:00-10:00 AM
The Dark Web, what it is and what it is not10:15-11:15 AM
To TOR or not to TOR11:30-12:30 PM
CryptoCurrency and its use in the Dark Web1:30-2:30 PM
Going Undercover on the Dark Web2:45-3:45 PM
Using web bugs and other technology to locate a suspect4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous useWednesday, September 22, 2021
9:00-10:00
Using DarkWeb Information for Active Investigations
Presented by Skopenow11:30-12:30 Session A
Session to be Announced
Presented by Cobwebs Technologies
Track 5: Artificial Intelligence and Big Data Analytics Training
Note: Sessions in this track are only open to Government Attendees
Wednesday, September 22, 2021
10:30-11:30
The Multi-Sensor Fusion Platform with Artificial Intelligence for Predictive Analysis, Automatic Alerts and Risk Management to have the Complete Maritime Domain Awareness
Presented by IPS1:30-2:30
Session to be Announced
Presented by Cobwebs Technologies3:00-4:00
Supplementing LI with AI: Creating a Hyper-Enabled OSINT Analyst
Presented by Fivecast
Track 6: 4G/5G/WiFi Signal Intercept and Tracking
Tuesday, September 21, 2021
11:30-12:30 PM
Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies1:30-2:30 PM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategiesWednesday, September 22, 2021
11:30-12:30
Lawful Interception in 5G Mobile Networks
Presented by Utimaco4:15-5:00
Session to be Announced
Presented by Cobwebs TechnologiesThursday, September 23, 2021
10:30-11:30
5G Enabled LEMF
Presented by AREA
Track 7: Digital Forensics Product Training
Sessions to be Announced
Track 8: Audio, Video and Airborne Electronic Surveillance Product Training
Wednesday, September 22, 2021
1:30-2:30
Session to be Announced
Presented by Toka Group3:00-4:00
Direction Finding into the Future
Presented by Syndetix4:15-5:00
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence
Presented by AREA
Track 9: Financial Crime Investigations and Prevention
Open to all conference attendees
Concerns and Considerations in Financial Crime Investigations
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance trainingThe purpose of financial crime can be to generate or protect criminal profit. Locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.
In this 1 day seminar we will discuss the tools and methods criminals use and the law enforcement response. Each presentation describes different elements of financial crime and business models used by criminals as well as law enforcement methods and tactics to identify and disrupt them. We will discuss the essentials in criminal networks, key players, money laundering, and trade based money laundering. We will describe how information can be found as money is moved around the world and how investigators can make best use of this knowledge. This training is aimed primarily at the investigator and analyst, but also has application to the law enforcement, intelligence, and financial regulatory community.
Wednesday, September 22, 2021
09:00-10:00 AM
Criminal Essentials: The Needs of a Criminal Network11:00-12:00 PM
Financial Crime Schemes in Money Laundering1:00-2:00 PM
The Essentials of Trade Based Money LaunderingThursday, September 23, 2021
8:30-9:30
How Does Money Actually Move?9:30-10:30
Follow the Money Beyond the Banks
Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists
28 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructors include:
Seminar #1
Online Social Media and Internet Investigations
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.
While Tor is the most common Darknet Service, it is not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools. The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.
Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.
9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks14:45-15:45
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)Seminar #2
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement services only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving16:00-17:00
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools siteThursday, 23 September 2021
12:00-13:00
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Seminar #3
A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police DepartmentTuesday, September 21, 2021
9:00-10:00 AM
The Dark Web, what it is and what it is not10:15-11:15 AM
To TOR or not to TOR11:30-12:30 PM
CryptoCurrency and its use in the Dark Web1:30-2:30 PM
Going Undercover on the Dark Web2:45-3:45 PM
Using web bugs and other technology to locate a suspect4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous userSeminar #4
1:30-2:30 AMUnderstanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategiesTuesday, September 21, 2021
This session presents what technical investigators need to know about 2G/3G/4G technology infrastructure, Including:
- Lawful Interception of Voice, Data and Messaging Differences in GSM, UMTS and LTE Networks
- SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8)
- Tracking Targets Using CDR's, SS7 Interconnect and IMSI Cathers and more.
Seminar #5
2:45-3:45 PMTuesday, September 21, 2021
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategiesSeminar # 6
4:00-5:00 PMDefeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategiesTuesday, September 21, 2021
The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.
When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.Seminar #7
Concerns and Considerations in Financial Crime Investigations
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance trainingThe purpose of financial crime can be to generate or protect criminal profit. Locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.
In this 1 day seminar we will discuss the tools and methods criminals use and the law enforcement response. Each presentation describes different elements of financial crime and business models used by criminals as well as law enforcement methods and tactics to identify and disrupt them. We will discuss the essentials in criminal networks, key players, money laundering, and trade based money laundering. We will describe how information can be found as money is moved around the world and how investigators can make best use of this knowledge. This training is aimed primarily at the investigator and analyst, but also has application to the law enforcement, intelligence, and financial regulatory community.
Wednesday, September 22, 2021
09:00-10:00 AM
Criminal Essentials: The Needs of a Criminal Network11:00-12:00 PM
Financial Crime Schemes in Money Laundering1:00-2:00 PM
The Essentials of Trade Based Money LaunderingThursday, September 23, 2021
8:30-9:30
How Does Money Actually Move?9:30-10:30
Follow the Money Beyond the BanksSeminar #8
12:00-1:00 PMThursday, September 23, 2021
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police