< Back to ISS World Programs

2021 AGENDA

ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception and cybercrime investigations.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications networks, the Internet and Social Networks.

Track 1: Hi-Tech Criminal Investigation Classroom Training
Track 2: Lawful Intercept and Hi-Tech Investigation Product Training
Track 3: Social Network Monitoring, OSINT and Cyberthreat Detection Training
Track 4: Investigating Dark Webs and Associated Cybercurrency Transactions
Track 5: Artificial Intelligence and Analysis of Unstructured Data
Track 6: 4G/5G/WiFi Signal Intercept and Tracking
Track 7: Digital Forensics Product Training
Track 8: Audio, Video and Airborne Electronic Surveillance Product Training
Track 9: Financial Crime Investigations and Prevention


ISS World North America 2021 Program Agenda


Special Training Seminars (28 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists

Tuesday, September 21, 2021

Online Social Media and Internet Investigations 
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Practitioners Guide to Internet Investigations 
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Overview of the Seven Fundamental ISS Technologies and Products Presented in Conference Training Tracks 1 thru 9
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding Basic Cryptography Used in Encrypted Third Party Services, Bitcoin/Blockchain, TOR, DarkNets and 2G/3G/4G/5G Cellular Services
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding 5G Network Core (NFV, SDN, EDGE Computing and Network Slicing) for Law Enforcement Investigators
Presented by:  Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies

Understanding Advanced Techniques to Defeat (or Work Around) Encrypted Third Party Services, Bitcoin Anonymity, TOR/HS and iPhone Encryption
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

A Real World Look at Investigations in the Dark Web 
(6 Classroom Hours)
Presented by: Todd G. Shipley, CFE, CFCE,  President and CEO of Vere Software, Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired Investigate, Reno NV, Police Department

Concerns and Considerations in Financial Crime Investigations 
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance training

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations 
(One Classroom Hour)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

Seminar Descriptions At The End of Agenda Posting


ISS World North America 2021 Conference Agenda


ISS World America Exhibit Hours:

Wednesday, September 22, 2021: 10:00 AM-6:00 PM
Thursday, September 23, 2021: 9:30 AM-12:00 PM

Wednesday, September 22, 2021

8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies

Track 1: Hi-Tech Criminal Investigations Classroom Training

Track 1 sessions open to all conference attendees

Tuesday, September 21, 2021

Online Social Media and Internet Investigations 
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective

11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators

13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks

14:45-15:45
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)

16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)

Wednesday, September 22, 2021

9:00-10:00
Protecting Mobile Networks and Infrastructure from External Threat Actors
Presented by AdaptiveMobile Security


Track 2: Lawful Interception and Hi-Tech Criminal Investigation Product Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Wednesday, September 22, 2021

9:00-10:00 Session A
Session to be Announced
Presented by Toka Group

9:00-10:00 Session B
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence
Presented by AREA

11:30-12:30 Session A
Session to be Announced
Presented by EXFO

11:30-12:30 Session B
Oxygen Foresnic Detective Product Training
Presented by Oxygen Forensics

11:30-12:30
Introducing a new all-in-one frontend A/V solution within critical evidence collection
At this session, we present a solution that will help minimize the risk of detecting installed covert equipment. At the same time, the solution will make life easier for the installers and investigators due to the device’s flexibility and the comprehensive controlling and monitoring capabilities.
Presented by Spectronic

1:30-2:30 Session B
New methods and enforcement tools designed specifically for regulatory agencies
Presented by Utimaco

3:00-4:00 Session A
Reducing Noise in Intelligence Monitoring
Presented by Resecurity

3:00-4:00 Session B
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS


Track 3: Social Network Monitoring, OSINT and Cyber Threat Detection Training

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, September 21, 2021

Practitioners Guide to Internet Investigations 
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement services only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking

13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving

16:00-17:00
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site

Wednesday, September 22, 2021

9:00-10:00 Session A
Tactical Web Intelligence (WEBINT) & Social Engineering: Gathering Actionable Intelligence via a powerful WEBINT platform
Presented by Cobwebs Technologies

9:00-10:00 Session B
Fleeing from Facebook: Discord, Gab and Emerging Platforms
Presented by Fivecast

11:30-12:30
How to quantify the child exploitation problem on the Dark Web
Presented by SearchLight

3:00-4:00
A light in the darkness of Encrypted Communications
Presented by AREA

4:15-5:00 Session A
OSINT and Hybrid warfare (with a pandemic special) 
A brief overview of the current media environment and it’s recent changes. What is the role of TV and Radio in an online word? What is clubhouse and why does it matter? Are podcasts relevant? How are telegram, Parler and other apps being used and how useful can this be? How is disinformation used in these contexts and what are the methods. A demonstration and preview of some of the features of of the HENSOLDT Analytics OSINT system.
Presented by Hensoldt

4:15-5:00 Session B
Using real-world tools and techniques to investigate and disrupt Child Exploitation offender networks on the Dark Web
Presented by SearchLight

Thursday, September 23, 2021

8:30-9:30 Session A
Global Signalling Threat Analysis and Insights for Cyber Intelligence
Presented by AdaptiveMobile Security

8:30-9:30 Session B
CLOS-INT. Closed Source Intelligence form Web2.0 sources
Presented by AREA

10:30-11:30 Session A
"Secure IT instead of IT security - trust is good, verification is better"
Presented by Hensoldt

10:30-11:30 Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS

12:00-1:00
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police


Track 4: Investigating Dark Webs and Associated Cybercurrency Transactions

* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Tuesday, September 21, 2021

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous use

Wednesday, September 22, 2021

9:00-10:00
Using DarkWeb Information for Active Investigations
Presented by Skopenow

11:30-12:30 Session A
Session to be Announced
Presented by Cobwebs Technologies


Track 5: Artificial Intelligence and Big Data Analytics Training

Note: Sessions in this track are only open to Government Attendees

Wednesday, September 22, 2021

10:30-11:30
The Multi-Sensor Fusion Platform with Artificial Intelligence for Predictive Analysis, Automatic Alerts and Risk Management to have the Complete Maritime Domain Awareness
Presented by IPS

1:30-2:30
Session to be Announced
Presented by Cobwebs Technologies

3:00-4:00
Supplementing LI with AI: Creating a Hyper-Enabled OSINT Analyst
Presented by Fivecast


Track 6: 4G/5G/WiFi Signal Intercept and Tracking

Tuesday, September 21, 2021

11:30-12:30 PM
Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies 

1:30-2:30 PM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Wednesday, September 22, 2021

11:30-12:30
Lawful Interception in 5G Mobile Networks
Presented by Utimaco

4:15-5:00
Session to be Announced
Presented by Cobwebs Technologies

Thursday, September 23, 2021

10:30-11:30
5G Enabled LEMF
Presented by AREA


Track 7: Digital Forensics Product Training

Sessions to be Announced


Track 8: Audio, Video and Airborne Electronic Surveillance Product Training

Wednesday, September 22, 2021

1:30-2:30
Session to be Announced
Presented by Toka Group

3:00-4:00
Direction Finding into the Future
Presented by Syndetix

4:15-5:00
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence
Presented by AREA


Track 9: Financial Crime Investigations and Prevention

Open to all conference attendees

Concerns and Considerations in Financial Crime Investigations 
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance training

The purpose of financial crime can be to generate or protect criminal profit. Locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

In this 1 day seminar we will discuss the tools and methods criminals use and the law enforcement response. Each presentation describes different elements of financial crime and business models used by criminals as well as law enforcement methods and tactics to identify and disrupt them.  We will discuss the essentials in criminal networks, key players, money laundering, and trade based money laundering.  We will describe how information can be found as money is moved around the world and how investigators can make best use of this knowledge.  This training is aimed primarily at the investigator and analyst, but also has application to the law enforcement, intelligence, and financial regulatory community.

Wednesday, September 22, 2021

09:00-10:00 AM
Criminal Essentials: The Needs of a Criminal Network

11:00-12:00 PM
Financial Crime Schemes in Money Laundering

1:00-2:00 PM
The Essentials of Trade Based Money Laundering

Thursday, September 23, 2021

8:30-9:30
How Does Money Actually Move?

9:30-10:30
Follow the Money Beyond the Banks


Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists

28 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructors include:

Seminar #1

Online Social Media and Internet Investigations 

Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.  

While Tor is the most common Darknet Service, it is not the only one.  And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools.  The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.

Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.

9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation

10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective

11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators

13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks

14:45-15:45
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 1)

16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox (Part 2)

Seminar #2


Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.

This is exclusively Law Enforcement services only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.

9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators

10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking

13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies

14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving

16:00-17:00
Open Source Tools, resources and techniques - A walk through my free law enforcement open source tools site

Thursday, 23 September 2021

12:00-13:00
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations

Seminar #3

A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department

Tuesday, September 21, 2021

9:00-10:00 AM
The Dark Web, what it is and what it is not 

10:15-11:15 AM
To TOR or not to TOR

11:30-12:30 PM
CryptoCurrency and its use in the Dark Web 

1:30-2:30 PM
Going Undercover on the Dark Web 

2:45-3:45 PM
Using web bugs and other technology to locate a suspect 

4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous user

Seminar #4
1:30-2:30 AM

Understanding 2G/3G/4G/5G Radio Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategies

Tuesday, September 21, 2021

This session presents what technical investigators need to know about 2G/3G/4G technology infrastructure, Including:

  • Lawful Interception of Voice, Data and Messaging Differences in GSM, UMTS and LTE Networks
  • SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8)
  • Tracking Targets Using CDR's, SS7 Interconnect and IMSI Cathers and more.

Seminar #5
2:45-3:45 PM

Tuesday, September 21, 2021

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar # 6
4:00-5:00 PM

Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategies

Tuesday, September 21, 2021

The starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.

When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.

Seminar #7

Concerns and Considerations in Financial Crime Investigations
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and Mike is a former EPA Officer of Inspector General Special Agent and Director of Special Operations who specializes in financial crime and cyber crime investigations as well as counter terrorist finance training

The purpose of financial crime can be to generate or protect criminal profit. Locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.  

In this 1 day seminar we will discuss the tools and methods criminals use and the law enforcement response. Each presentation describes different elements of financial crime and business models used by criminals as well as law enforcement methods and tactics to identify and disrupt them.  We will discuss the essentials in criminal networks, key players, money laundering, and trade based money laundering.  We will describe how information can be found as money is moved around the world and how investigators can make best use of this knowledge.  This training is aimed primarily at the investigator and analyst, but also has application to the law enforcement, intelligence, and financial regulatory community.

Wednesday, September 22, 2021 

09:00-10:00 AM
Criminal Essentials: The Needs of a Criminal Network 

11:00-12:00 PM
Financial Crime Schemes in Money Laundering

1:00-2:00 PM
The Essentials of Trade Based Money Laundering

Thursday, September 23, 2021

8:30-9:30
How Does Money Actually Move? 

9:30-10:30
Follow the Money Beyond the Banks

Seminar #8
12:00-1:00 PM

Thursday, September 23, 2021

Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police