ISS World Asia is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Demonstrations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
Track 6: Mobile Signal Intercept Training and Product Demonstrations
Track 7: Electronic Surveillance Training and Product Demonstrations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Training
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(6 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)
Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(2 classroom hours)
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(3 classroom hours)
Online Social Media and Internet Investigations
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
11:30-12:15
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving
14:15-15:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone.
Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Wednesday, 6 September 2023
10:00-18:00
Thursday, 7 September 2023
10:00-13:30
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World Asia has Solutions
Dr. Jerry Lucas, President, TeleStrategies
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
11:30-12:15
Fighting Crime with Cutting-Edge Speech Technologies
In this session, you will discover the latest capabilities of voice biometrics and speech recognition and how these technologies can help law enforcement agencies fight crime efficiently.
Ivana Týralová, Phonexia
14:15-15:00
Accelerating investigation workflows with specially designed IT- and phone forensic laboratories
Cyfluene, fake news and campaign detection
Stefan Heimgaertner, mh Service GmbH
13:00-13:40
Gen AI-led Information Operations in the Indo-Pacific: A Growing Threat
This talk will explore the rise of gen AI-led information operations in the Indo-Pacific region and the challenges they pose to domestic and international security. It will also discuss how generative AI is being used to create disinformation and misinformation, the challenges of identifying generative AI-created content, and explore how governments and law enforcement can counter these threats.
Assaf Danby, Vice President EMEA APAC, Cyabra
13:45-14:30 Session A
Location investigations: above and beyond compliance using mass location techniques
Presented by Intersec
13:45-14:30 Session B
Explore Efficient Audio Analysis with Speech to Text and Speaker Identification
During this session, we will introduce a streamlined approach to analyzing audio recordings using a powerful combination of speaker identification and speech transcription. Prepare to witness the exceptional capabilities of these highly efficient technologies in action!
Paul Morris, Phonexia
08:30-09:10
Using AI to Tame the Data Deluge: Promise and Peril
Presented by Babel Street
11:00-11:40
Cost Effective Network Monitoring Architectures
Presented by HUBER+SUHNER Polatis
11:45-12:30
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15 Session A
A complex Use Case.
Various challenges combined and solved with user friendly and integrated Cyber Intelligence solutions, ranging from Electronic Surveillance to Social Media Investigations, touching End to End Lawful Interception on landline and mobile network up to 5G, Mobile Signal Monitoring, Encrypted communication analysis and processing the results in a Data Fusion Platform.
Presented by AREA
09:30-10:15 Session A
Real-world results showing the impact of Carrier-in-Carrier technologies on your satellite monitoring capabilities.
Presented by VASTech
09:30-10:15 Session B
Wireless Spatial Intelligence Analysis and Location under 24Ghz
Presented by Sinovatio
10:30-11:15 Session A
The Future of Lawful Intelligence: fusing OSINT and high-accuracy location with voice and other data sources for quick identity resolution
Presented by SS8
10:30-11:15 Session B
Anonymity vs. You: Accelerated WEBINT insights to identify virality, influencers and unmask suspects across social networks
Presented by ClearTrail
10:30-11:15 Session C
Intelligence that Goes Above and Beyond: Combining ADINT and VISINT for a Better Decision Making
Presented by Rayzone Group
13:15-14:00 Session A
Implementing New Investigation Use-cases for LEAs
We will share our top 7 use-cases that, based on our experience, benefit both LEAs and CSPs
Presented by Matison
13:15-14:00 Session B
Digital Investigation Transformation
Find out how Magnet Forensics tools can help your organization solve cases more quickly and eliminate backlogs, all while improving collaboration across your organization. See for yourself how intuitive and robust Magnet Forensics tool can be, and how they can help users of all skill levels—from non-technical reviewers to in-depth examiners—to find the evidence that matters, faster.
Presented by Magnet Forensics
14:15-15:00 Session A
Geo-monitoring and profiling covering all connected devices and networks (3/4/5G and WiFi) globally
VP Sales and Marketing, GeoGence
14:15-15:00 Session B
Voice Analysis and speaker identification in covert surveillance
Presented by Gedion
15:15-16:00 Session B
Unmasking Risks with Data for Government (National Security)
Join us for an insightful session as we delve into the convergence of external data sources with your organization's internal data to unveil unprecedented insights. As a leading data provider, we will demonstrate the potential of our data to augment your intelligence efforts, allowing you to unmask hidden risks. Explore innovative methodologies that harmonize disparate data streams, empowering your team to make informed strategic decisions and shape a more secure future for the nation.
Presented by Moody's Analytics
15:15-16:00 Session C
Latest interception Innovations – Speech Analysis, Encrypted IP applications and hyper efficient Big Data Analytics
Presented by Advanced Middle East Systems
16:15-17:00 Session A
Smartphones and PCs interception
Enable LEA and Intelligent Services the anonymous interception and the remote control of multiple devices
Presented by MOLLITIAM CYBERINTELLIGENCE
16:15-17:00 Session B
AI Video Analysis / all video types / Object, Face and Number plate recognition, detection and tracking
Presented by HTSC Germany
13:00-13:40 Session A
Encryption is one of the most common and relevant challenges for every LEA.
Come and experience how the combination of forensic wire speed, contend derived metadata generation and collection, combined with the powerful analytics of the Data Fusion platform, unleashes the intelligence hidden in the encrypted communications. Use cases and Live demo.
Presented by AREA
13:00-13:40 Session B
ORCA - rule the ocean of metadata
Using metadata to answer the important questions of Who, What, Where & When.
Presented by VASTech
13:00-13:40 Session C
Uncovering Digital Footprints with AI-Enabled Data Fusion
In this session, we will present a live simulated case study connecting disparate data sources to accelerate informed decision making. A combination of biometrics, digital forensics, location data, artificial intelligence and active measures are all layered into a single analytical workflow providing users with low risk and highly efficient operational control.
Presented by JSI
13:45-14:30 Session B
Revolutionize OSINT with ChatGPT and LLMs: a Practical Guide
This presentation explores the transformative power of ChatGPT and other large language models (LLMs) in revolutionizing open-source intelligence (OSINT) collection and analysis. We will discuss practical applications of these advanced AI technologies in streamlining OSINT processes. Attendees will learn how to effectively harness the power of ChatGPT and LLMs to enhance their OSINT operations and discover best practices for implementing these cutting-edge tools in real-world scenarios.
Presented by S2T
15:00-15:40 Session A
How AI could support your investigation – a research
Presented by ATIS
15:00-15:40 Session B
Generating CDRs for WhatsApp, Telegram, Viber, Signal, and other Encrypted VoIP Applications
Presented by ClearTrail
16:20-17:00 Session A
Who is communicating with who? - IP end point detection
Communication has moved to encrypted apps in the IP domain. Systems only able to analyze circuit switched data, are operating in darkness. Discover the knowledge that can be extracted from encrypted communication apps.
Presented by XCI A/S
16:20-16:40 Session B
Development and application of biometric technologies in the field of security and identification
Presented by True Detection
16:20-17:00 Session C
The Encryption Battlefield: Leveraging Metadata and AI for Real-World Intelligence Missions
Presented by ClearTrail
08:30-09:10 Session A
Real-world results showing the impact of Carrier-in-Carrier technologies on your satellite monitoring capabilities.
Presented by VASTech
09:15-10:00 Session A
Federal Case Study: Actionable insights using AI Powered Intelligence Fusion
Presented by ClearTrail
09:15-10:00 Session B
Upgrade your Traffic analysis with AI.
Chat relating, user activities detection. Case study on mass deanonymization of the crypto industry
Presented by Butterfly Effect
09:15-10:00 Session C
On Combating Cybercrime and PSYOPs
Presented by CSF
11:00-11:40 Session A
Use Case Discussion of How LEAs Leverage High Accuracy Location Data to Improve Investigation Results
Presented by SS8
11:00-11:40 Session B
End to End Lawful Interception Monitoring Centre, for landline and mobile up to 5G.
Face the complexity of the investigations, with a platform that offers user friendly interface and advanced functionality, such as automated processing of data, granting the compliancy with ETSI global standards, with its continuous evolutions.
Presented by AREA
11:45-12:30
Early warning & identification of advanced state sponsored and cyber crime actors and threats
During the session we will present how the solution uses sophisticated metadata collection combined with threat identification algorithms in order to generate valuable cyber threat awareness and enable unmasking of the infrastructure and actores behind it. We will show real use cases from published cyber attacks to demonstrate the capability.
Presented by GeoGence
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
08:30-09:15 Session A
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS
09:30-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS
10:30-11:15 Session A
Unique Social Media Relation and ID-Mapping Solution Against Encryption Challenges
Presented by Sinovatio
10:30-11:15 Session B
LEVARAGING THE BIG DATA POWERHOUSE TO ADDRESS THE FINANCIAL CRIME OF ANTI MONEY LAUNDERING (AML)
Using a real case we will demonstrate how a BIG DATA PLATORM can enhance analysts/ investigators ability for early detection, prevention and resolution of anti-money laundering crimes , fraud etc. We will show how big data platforms can do more than just follow the money. It can predict where it will go, making analysts and investigators faster and more effective in addressing what is and will become the greatest threat to economic stability, sustainability and growth in the 21stcentury.
Omri Raiter, RAKIA Group
14:15-14:35 Session A
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS
14:15-15:00 Session B
Investigate, prevent and mitigate risks of riots, terrorism, and crimes through a country-wide geo-analytical AI.
Massive detecting and tracking crowds with alerting anomaly situations. Targeted finding a second hidden phone number, companions, and similar persons by behavior. Geofence and Massive Profiling.
Presented by Butterfly Effect
14:35-15:00 Session A
Cyber Threat Intelligence to accelerate online investigations
Presented by IPS
15:15-16:00 Session B
The Evolution of Mass Media for Data Fusion: Will AI wield the controls for OSINT data curation
The session delves into the fascinating topic of the evolution of mass media for data fusion. It presents an in-depth analysis of how mass media has transformed over the years, and its positive and negative effects on societies, raising awareness about the importance of the role of AI technology in data curation for open-source intelligence (OSINT).
Stavros Vologiannidis, Founder, Business Development, DataScouting
Rami El Sabeh, OSINT Consultant, DataScouting
16:15-17:00 Session A
Social Media Investigations and Monitoring challenges solved with the Virtual Human Intelligence platform that allows Forensic Investigation of the online communities, Dark Markets, and Encrypted communication channels.
Use cases and Live demo.
Presented by AREA
16:15-17:00 Session B
How to take the complexity out of Multi Source Data Fusion and Analysis
Are you an Intel Analyst who can speak over 100 languages? can you write SQL statements in your sleep? Are you a data scientist? Can you see complex relationships across multiple data sources? Can you bend the space time continuum and fit more work into less time? If you are …. don’t bother attending this session!
If you aren’t ‘superhuman’ then invest some time to visit this session to understand how to better deal with your ever increasing data across different sources from Databases, Documents, Applications and OSINT. Hear how you can analyse the data coming in multiple languages, in different formats, and perform analysis across multiple dimensions such as link connectivity, temporal, and geospatial.
All with the aim to give you faster insight to your data and create actionable intelligence.
Adrian Barfield, Brand Specialist and Channel Leader, i2 APAC
09:10-10:00 Session A
Overview of the Info-stealer Eco System on the deep & dark web
Presented by S2W
09:10-10:00 Session B
BIG DATA PLATFORM – A comprehensive, practical guide to getting the most out of your DATA
A practical and comprehensive guide on the ins and outs of big data platforms and how they have been used to address key problems/challenges in law enforcement agencies . Through a specific use case we will highlight the highest value insight that everyone should have with regards these matters. Some of the elements covered include defining needs, devising algorithms using a no-code rule engine, how to link databases , report generator and much more.
Omri Raiter, RAKIA Group
13:00-13:40 Session A
Accelerate Multi-source Investigations with Modern AI Capabilities
In an era characterized by a deluge of data, efficient and accurate investigations require harnessing the potential of data from diverse sources. Whether it's for cybersecurity, fraud detection, market research or law enforcement, data fusion and web intelligence (WEBINT) have become cornerstones of comprehensive, multi-dimensional analysis. We explore the current state of AI-enhanced multi-source investigations, their practical implications, and a glimpse into their promising future.
Presented by S2T
13:45-14:30 Session A
Using OSINT with visual link analysis to enhance your investigations
Presented by Maltego
13:45-14:30 Session B
Mastering Large-Scale OSINT Investigations: Advanced Tips, Techniques and Tools
In today's digital era, an avalanche of data continually pours into the open-source domain - this overflow poses significant challenges for intelligence analysts striving to extract value from the masses of data available online. In this session, we discuss the expert strategies for streamlining OSINT investigations. We'll also demystify how cutting-edge artificial intelligence and machine learning can empower analysts to transform raw OSINT data into actionable insights.
David Huggett, Senior Tradecraft Advisor, Fivecast
15:00-15:45 Session A
Supercharged IPDR extraction and analysis - Encrypted IP Applications and Advanced Internet Activity Analytics
Presented by Advanced Middle East Systems
15:00-15:45 Session B
Streamlining Social Media Investigations
Presented by ShadowDragon
16:20-17:00 Session A
Finding the Relevant Pieces of the Puzzle across Multiple Data Sources and Identifying Targets to Discover Real Identities
Presented by Innosystec
16:20-17:00 Session B
CDRs, IPDRs, Lawful Interception, IP content derived Metadata, Location, Forensic Investigations and many more.
All those sources and a single, web based, flexible, compatible, and user-friendly Forensic Data Fusion and Analysis platform.
Use cases and Live demo.
Presented by AREA
16:40-17:00 Session C
Social media analysis methods for detecting and preventing cyberattacks
Presented by True Detection
08:30-09:10 Session B
OSINT and Forensic Data Consolidation For Modern Investigations
This session will walk you through the journey to digital intelligence maturity, the art of the possible for law enforcement, corporate and investigative professionals, and explain the practical steps along the way.
Driven by a global increase in volume of crimes and dramatic increase in volumes of online crimes, coupled with the sophistication of those crimes committed, analysts and investigators are reaching for a record number of data sources, search platforms and analytical visualization tools to perform investigative research and create links in their data.
Without advanced search-based intelligence technology analysts cannot perform a single search across all available information sources to produce a single link analysis chart illustrating the connections. They must complete individual searches per data type in different systems each time and piece together the information by hand.
Cases are abandoned or taking too long to solve as data and data linkages are inaccessible, analysts are overwhelmed and dissatisfied in their jobs, organizations are suffering from high analyst attrition rates, it takes an unreasonable period of time to onboard new analysts and unique top talent is required to train the rest of the team, which is expensive and in short supply.
Siren uniquely connects data first from internal data sources and then to different sources like ShadowDragon, Chainalysis, and Sayari and makes connections that are not usually humanly possible. View these inaccessible network connections displayed in an intuitive Knowledge Graph.
Attendees will learn:
A real life walk-through to disseminate and analyze multiple OSINT and vendor data sources returned through an investigative lead (ie: a topic, event, or identifying information)
Presented by Siren
09:15-10:00
COUNTER ΙLEGAL ACTIVITY– From a mere hint to real threat mitigation!
step-by-step guide to harnessing OSINT and fusion technology to effectively support the entire process of identification and mitigation of nation illegal threats. We will include the entire OSINT & WEBINT collection capabilities from all aspects , target , mass collection ,darknet , avatar design and management , fake accounts identification and mitigation and no code crawlers
Omri Raiter, RAKIA Group
11:00-11:40 Session A
How AI could support your investigation – a research
Presented by ATIS
11:45-12:30
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
13:15-14:00
When Spyware Turns Phones Into Weapons: Addressing Mobile Devices Software and Hardware Vulnerabilities to Save Your Organization
Presented by Feedback Italia
15:15-16:00
Combine DPI-based Traffic Visibility with Threat Detection Capabilities to Raise the Performance of Government Security Operations
Discover a new generation of DPI-based cyber sensors that leverage years of experience in cyber defense environments to raise the performance of government-run Security Operations Centers (SOCs). Find out how this DPI-based traffic visibility can combine with SDK-based threat detection capabilities to provide superior network protection, even when traffic is encrypted.
Guillaume Guichard, Technical Account Manager, DPI & Traffic Intelligence, Enea
16:15-17:00
Protection without Disruption
Presented by Sentrycs
13:45-14:30 Session B
Cybersecurity Reinvented: Navigating the Landscape of Secure Communication in the Age of Threats, Hardware Vulnerabilities, and Post-Quantum Computing
Presented by Feedback Italia
15:00-15:40
Complex OSINT and CSINT in two unique solutions
How to collect high-value intelligence by accessing public and private data
Presented by MOLLITIAM CYBERINTELLIGENCE
16:20-17:00
Early warning threat detection solution baed on mobile, IOT Devices and IPs profiling networks (3/4/5G and WiFi) globally
VP Sales and Marketing, GeoGence
08:30-09:10
Cyber Resilience System for DoS
How to reduce the vulnerability and neutralize threats for public and critical infrastructures
Presented by MOLLITIAM CYBERINTELLIGENCE
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
11:30-12:15
Sentinel Protocol: Providing Deep Insights Into Cryptocurrency Crime and Money Laundering Techniques
This will be a demonstration of how our tools can be used for investigating cryptocurrency crimes based on blockchain data. It will include a number of real investigations to help the audience achieve a good grasp.
Presented by Uppsala Pte Ltd
13:15-14:00 Session A
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
David Alley, CEO, DarkOWL FZE
14:15-15:00
Crime & Crypto - How can Law Enforcement prepare for a Web3 Future?
In recent times, illicit actors have used cryptocurrencies for a wide range of criminal activities - from scams and ransomware to money laundering and terrorism financing. Cryptocurrencies allow criminals to move large amounts of funds across borders, in a short amount of time, purportedly under the cloak of anonymity. With rising crypto adoption across the world, we can only expect such crypto-based crimes to grow - both in numbers and sophistication. In this session, we share how Law Enforcement can prepare for this future reality. Join us to
1) Understand the trends in crypto crimes
2) Learn how blockchain analytics tools can be applied to investigations and intelligence
3) Deep dive into some recent cases, and learn how public sector agencies worked with Chainalysis to achieve successful outcomes.
Presented by Chainalysis
16:15-17:00
Unveiling the Evolution of Money Laundering: Analyzing the Impact of Smart Contracts
Ian Lee, Merkle Science
9:10-10:00
Money Laundering You Say ? Insights from a Dataset of 1500 Cryptocurrency Cases
This is a research study that shows various insights derived from a datatset of 30,000 threat actor wallets related to 1500 crimes. It includes money laundering characteristics, insights into specific cases and some conclusions derived from the dataset.
Presented by Uppsala Pte Ltd
13:00-13:40
Offline darknet investigation with the Web-I-Qube
Stefan Heimgaertner, mh Service GmbH
08:30-09:10
From Leaks to Lockdown: Profiling Suspects Using Their Compromised Credentials
Steve Kim, Director of Business Development, StealthMole
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies
09:30-10:15 Session B
Unleashing the Power of Location Data: Examining how law enforcement and security agencies can leverage MNO data to establish suspect whereabouts, track movements, and uncover key evidence.
Highlighting the transformative potential of location data obtained from mobile network operators (MNOs) in assisting national security and law enforcement agencies. By analyzing the location data from MNOs, security and law enforcement agencies can expedite investigations, enhance operational efficiency, and achieve better outcomes. Join us as we delve into real-world case studies, discuss the benefits and challenges of leveraging MNO location data, and effective use in the pursuit of justice.
Rickard Karlsson, Solution Architect, Xolaris
11:30-12:15 Session A
Satellite Networks: Detecting, Locating and Intercepting transmitters
Presented by Kratos
11:30-12:15 Session B
ArrowCell - Securing your Cellular Environment, Anywhere, Anytime
Presented by Rayzone Group
15:15-16:00
Polaris Fusion - The Power of Locations
Taking the burden out of position data analysis. In this session we show to which insights the fusion of position data can lead, and how more data can be analysed in the same time.
Jens Scheithauer, Rheinmetall
09:10-10:00
Why mobile phone location accuracy matters for successful missions
Presented by Polaris Wireless
13:45-14:30
Unleashing the Power of Location Data: Examining how law enforcement and security agencies can leverage MNO data to establish suspect whereabouts, track movements, and uncover key evidence.
Highlighting the transformative potential of location data obtained from mobile network operators (MNOs) in assisting national security and law enforcement agencies. By analyzing the location data from MNOs, security and law enforcement agencies can expedite investigations, enhance operational efficiency, and achieve better outcomes. Join us as we delve into real-world case studies, discuss the benefits and challenges of leveraging MNO location data, and effective use in the pursuit of justice.
Rickard Karlsson, Solution Architect, Xolaris
9:15-10:00
Product demo: Mobile tracking with a narcotic investigation
Presented by Intersec
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
13:45-14:30
New tactical microphone array from Squarehead Technology
Peter Just, Area Sales Manager, Squarehead Technology
15:00-15:20
Thor Store & Forward
Presented by Spectronic Denmark
8:30-9:10
Walk in your suspect’s shoes. See what your suspect does.
Listen to what suspect says. Electronic Surveillance family of sensors, capable to be adopted both in a stand-alone operation scenario and supported by the centralized command and control monitoring centre. Experience the integrated Unified Fusion Platform, open to third party sensors. Use cases and Live demo.
Presented by AREA
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
09:30-10:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
15:00-15:40
Tactical 5G ID resolution
The future of 5G IMSI Catchers and how they can interface with the network providers in order to resolve the SUPI ID and locate the device
Presented by EXFO
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
16:20-17:00 Session A
AI & geolocation for homeland security
Presented by Intersec
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
16:20-17:00 Session B
5G passive and active hybrid direction finder, no IMSI encrypt issues any more
Presented by Reach
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
08:30-09:10
5G Security Encrypted Phone, no information leaking any more
Presented by Reach
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
09:15-10:00
Oculus 5 - the new 5G recorder from Covidence
Presented by Covidence
Online Social Media and Internet Investigations
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.
11:30-12:15
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources
"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how. PART 2 on the final day with free tools to download and keep
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Law enforcement and intelligence agencies have massive data sets to pile through in order to find the evidence and information they need for their investigations. This seminar will address how AI is helping. The presentation will first provide a background/primer in at AI technologies - what are the specific types of AI systems; how are they used in industry today; and what are the strengths and weaknesses of AI. The second half will focus on how ISS vendors are leveraging AI to increase agent efficiency and results in network data, OSINT, application profiling, location and image/language processing. Specific topics include:
Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI is a completely new technology that is greatly impacting all aspects of society, industry, politics, and culture. This seminar is going to look at generative AI from law enforcement and the intelligence community’s perspective. The first half of the presentation will focus on what the technology is, how it works, the training sets, what is good at, and the pitfalls. The second half will look at how LEAs and intelligence agencies can leverage the technology; how the technology is already making the lives of agents more difficult; and how generative AI might find itself working into LEA/ISS tools. Specific topics include:
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police