ISS World Asia is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Demonstrations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
Track 6: Mobile Signal Intercept Training and Product Demonstrations
Track 7: Electronic Surveillance Training and Product Demonstrations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Training
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(6 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)
Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(2 classroom hours)
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(3 classroom hours)
Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
11:30-12:15
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving
14:15-15:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone.
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Wednesday, 6 September 2023
10:00-18:00
Thursday, 7 September 2023
10:00-13:30
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World Asia has Solutions
Dr. Jerry Lucas, President, TeleStrategies
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
14:15-15:00
Accelerating investigation workflows with specially designed IT- and phone forensic laboratories
Cyfluene, fake news and campaign detection
Stefan Heimgaertner, mh Service GmbH
13:45-14:30
Mobile tracking & geodata-driven investigations
Presented by Intersec
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15
Complex investigation Use Cases.
Multiple Cyber Intelligence tools coordinated to achieve significative results.
Presented by AREA
09:30-10:15 Session A
Cyclops Analysis: Determine the impact of Carrier in Carrier technology on your satellite monitoring capabilities.
Presented by VASTech
09:30-10:15 Session B
Wireless Spatial Intelligence Analysis and Location under 24Ghz
Presented by Sinovatio
10:30-11:15 Session A
The Future of Lawful Intelligence: fusing OSINT and high-accuracy location with voice and other data sources for quick identity resolution
Presented by SS8
10:30-11:15 Session B
Anonymity vs. You: Accelerated WEBINT insights to identify virality, influencers and unmask suspects across social networks
Smart Methods to Identify Virality, Bots & Personally Identifiable Information
Presented by ClearTrail
11:30-12:15 Session A
Combating terrorism, espionage and crime by combining mobile network metadata, mass positioning, and intelligent profiling in real-time
Oskar Axelsson, Product Manager, Xolaris
11:30-12:15 Session B
Fighting Crime with Cutting-Edge Speech Technologies
In this session, you will discover the latest capabilities of voice biometrics and speech recognition and how these technologies can help law enforcement agencies fight crime efficiently.
Presented by Phonexia
13:15-14:00 Session A
Matison next generation Mediation system
Presented by Matison
13:15-14:00 Session B
Digital Investigation Transformation
Find out how Magnet Forensics tools can help your organization solve cases more quickly and eliminate backlogs, all while improving collaboration across your organization. See for yourself how intuitive and robust Magnet Forensics tool can be, and how they can help users of all skill levels—from non-technical reviewers to in-depth examiners—to find the evidence that matters, faster.
Presented by Magnet Forensics
14:15-15:00
Geo-monitoring and profiling covering all connected devices and networks (3/4/5G and WiFi) globally
VP Sales and Marketing, GeoGence
15:15-16:00
The Harvester: integrated AI-powered platform for processing and analysis of massive audio, text, video and image data
Presented by Mathesis
13:00-13:40 Session A
Follow your suspect down the Rabbit Hole.
Cyber Intelligence platform to go beyond OSINT and collect evidence form online social communities, even in Dark Web. Use cases and demonstration.
Presented by AREA
13:00-13:40 Session B
ORCA - rule the ocean of metadata
Presenting VASTech’s solution for fusing telecommunications, IP, and location data from fibre cables, mobile networks, and satellite signals. Using metadata to answer the important questions of Who, What, Where, and When?
Presented by VASTech
13:00-13:40 Session C
Pulling Intelligence from the Edge
Presented by JSI
13:45-14:30 Session A
Revolution in Audio Investigations
At this session, you will discover an extremely efficient way to investigate audio recordings with Phonexia Orbis Investigator. Get ready to see the world’s most advanced voice biometrics in action!
Presented by Phonexia
13:45-14:30 Session B
Dark what?! Telegram is now the hub for hackers, fraudsters and other criminals
Presented by S2T
13:45-14:30 Session C
Streamlining law enforcement and national security communities through convergent intelligence and security technologies
Oskar Axelsson, Product Manager, Xolaris
15:00-15:40 Session A
Simplify investigation with one platform
Presented by ATIS
15:00-15:40 Session B
CDRs of WhatsApp, Signal, Telegram and other encrypted VoIP messaging applications
Presented by ClearTrail
15:00-15:40 Session C
Human weakness vs Device Weakness
Presented by RCS S.p.A.
16:20-17:00 Session A
Every piece of data tells a story – combine and analyze data from any source in your digital investigation.
Mark Uldahl, CTO, XCI A/S
16:20-17:00 Session C
Early detection of malware, bots and advanced persistent threats (APTs) on high-speed networks at a national scale
Presented by ClearTrail
08:30-09:10 Session A
Fibre Signal Analysis: What intelligence value does a fibre link contain?
Presented by VASTech
9:15-10:00 Session B
Encryption Vs You: Identify potential suspects through mass IP metadata analysis at a countrywide scale
Presented by ClearTrail
11:00-11:40 Session A
New perspectives for Strategic Investigation – Latest Innovations!
Presented by Trovicor
11:00-11:40 Session B
How to empower the local workforce and enhance their capabilities in the fields of Lawful Interception
Presented by Butterfly Effect
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
08:30-09:15 Session A
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS
08:30-09:15 Session B
Investigate, prevent and mitigate risks of riots, terrorism, and crimes through a country-wide geo analytical AI.
Massive detecting and tracking crowds with alerting anomaly situations. Targeted finding a second hidden phone number, companions, and similar persons by behavior. Geofense and Massive Profiling.
Presented by Butterfly Effect
09:30-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS
09:30-10:15 Session B
No data scientists? No problem! Intuitive AI for SOCMINT
All intelligence teams have a data problem – too much data & not enough resources to analyze it. In this session, we’ll show you how you can leverage AI and machine learning technology to quickly deliver insights across masses of deep web data, without the need for specialist data science skills. Through real-life examples, you’ll learn how continuous, real-time data collection and intuitive AI-enabled risk analytics are a powerful combination for effective SOCMINT.
Presented by Fivecast
10:30-11:15
Unique Social Media Relation and ID-Mapping Solution Against Encryption Challenges
Presented by Sinovatio
11:30-12:15
Next Generation Data Fusion Monitoring Center: new ways of gathering intelligence
Presented by RCS S.p.A.
13:15-14:00
LEVARAGING THE BIG DATA POWERHOUSE TO ADDRESS THE FINANCIAL CRIME OF ANTI MONEY LAUNDERING (AML)
Using a real case we will demonstrate how a BIG DATA PLATORM can enhance analysts/ investigators ability for early detection, prevention and resolution of anti-money laundering crimes , fraud etc. We will show how big data platforms can do more than just follow the money. It can predict where it will go, making analysts and investigators faster and more effective in addressing what is and will become the greatest threat to economic stability, sustainability and growth in the 21stcentury.
Omri Raiter, RAKIA Group
14:15-14:35
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS
14:35-15:00
Cyber Threat Intelligence to accelerate online investigations
Presented by IPS
15:15-16:00 Session A
Using AI to Tame the Data Deluge: Promise and Peril
Presented by Babel Street
15:15-16:00 Session B
Hybrid threats in current conflicts revealed with OSINT tools
In this presentation we will provide an analysis of hybrid warfare methods employed in current conflicts with a focus on OSINT tools in the broad information space.
Stavros Vologiannidis, Founder, DataScouting
09:10-10:00 Session A
Overview of the Info-stealer Eco System on the deep & dark web
Presented by S2W
09:10-10:00 Session B
BIG DATA PLATFORM – A comprehensive, practical guide to getting the most out of your DATA
A practical and comprehensive guide on the ins and outs of big data platforms and how they have been used to address key problems/challenges in law enforcement agencies . Through a specific use case we will highlight the highest value insight that everyone should have with regards these matters. Some of the elements covered include defining needs, devising algorithms using a no-code rule engine, how to link databases , report generator and much more.
Omri Raiter, RAKIA Group
13:00-13:40
Monitoring maritime crime and threats in supply chain using OSINT
Presented by S2T
13:45-14:30
Using OSINT with visual link analysis to enhance your investigations
Presented by Maltego
15:00-15:45 Session A
Supercharged IPDR extraction and analysis - Advanced Internet Activity Analytics
Presented by Trovicor
16:20-17:00 Session A
Finding the Relevant Pieces of the Puzzle across Multiple Data Sources and Identifying Targets to Discover Real Identities
Presented by Innosystec
16:20-17:00 Session B
From Terabit per second network to intelligence: achieve full communication awareness unleashing the power of advanced metadata with dedicated Cyber intelligence solution.
Use cases and demonstration.
Presented by AREA
08:30-09:10 Session B
Siren - The importance of search across multiple data sources in Law Enforcement and National Security
Presented by Siren
09:15-10:00
COUNTER ΙLEGAL ACTIVITY– From a mere hint to real threat mitigation!
step-by-step guide to harnessing OSINT and fusion technology to effectively support the entire process of identification and mitigation of nation illegal threats. We will include the entire OSINT & WEBINT collection capabilities from all aspects , target , mass collection ,darknet , avatar design and management , fake accounts identification and mitigation and no code crawlers
Omri Raiter, RAKIA Group
11:00-11:40 Session A
Simplify investigation with one platform
Presented by ATIS
11:45-12:30
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
09:30-10:15
The Investigation Cycle: Enhance Your Investigation with Multiple Sensors
Presented by Rayzone Group
10:30-11:15 Session A
Back to the Future Using ADINT Solutions
Presented by Rayzone Group
10:30-11:15 Session B
Cost effective cyber monitoring using all-optical switching
Presented by Huber+Suhner
13:15-14:00
When Spyware Turns Phones Into Weapons: Addressing Mobile Devices Software and Hardware Vulnerabilities to Save Your Organization
Presented by Feedback Italia
9:10-10:00
Meet the Expert: Dive Deep into the Challenges of Big Data Fusion
Presented by Rayzone Group
13:45-14:30 Session B
Cybersecurity Reinvented: Navigating the Landscape of Secure Communication in the Age of Threats, Hardware Vulnerabilities, and Post-Quantum Computing
Presented by Feedback Italia
16:20-17:00
Early warning threat detection solution baed on mobile, IOT Devices and IPs profiling networks (3/4/5G and WiFi) globally
VP Sales and Marketing, GeoGence
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
11:30-12:15
Sentinel Protocol: Providing Deep Insights Into Cryptocurrency Crime and Money Laundering Techniques
This will be a demonstration of how our tools can be used for investigating cryptocurrency crimes based on blockchain data. It will include a number of real investigations to help the audience achieve a good grasp.
Upon searching the conference page, I found the below 2 tracks to be suitable.
Presented by Uppsala Pte Ltd
13:15-14:00 Session A
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
David Alley, CEO, DarkOWL FZE
13:15-14:00 Session B
Crypto trends and the power of blockchain to safeguard the industry
Presented by Chainalysis
9:10-10:00
Money Laundering You Say ? Insights from a Dataset of 1500 Cryptocurrency Cases
This is a research study that shows various insights derived from a datatset of 30,000 threat actor wallets related to 1500 crimes. It includes money laundering characteristics, insights into specific cases and some conclusions derived from the dataset. This looks to be a good fit for the following track
Presented by Uppsala Pte Ltd
13:00-13:40
Offline darknet investigation with the Web-I-Qube
Stefan Heimgaertner, mh Service GmbH
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies
11:30-12:15
VSAT Networks: Tactical and Strategic Threat Detection and Geolocation
Presented by Kratos
15:15-16:00
Polaris Fusion - The Power of Locations
Presented by Rheinmetall
9:15-10:00
Lawful Access to Location with Intersec GeoSafe LI
Presented by Intersec
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
13:45-14:30
Next generation of tactical microphone arrays from Squarehead Technology
Vibeke Jahr, COO and Founder, Squarehead Technology
15:00-15:40
See it. Hear it. Try it - The latest and greatest from Spectronic Denmark
Presented by Spectronic Denmark
8:30-9:10
Electronic Surveillance solutions family.
Covertly investigate on suspects in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform. Use cases and demonstration.
Presented by AREA
11:45-12:30
Geo-time link analysis, merging historical Communication Data, (CDR/DR/CD), live lawful interception data (IRI/CDR), Social media communication and computer and mobile forensics extraction.
Use cases and demonstration.
Presented by AREA
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
09:30-10:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
15:00-15:40
5G ID resolution
Presented by EXFO
16:20-17:00
Advanced geolocation with mobile carriers, enhanced by 5G
Presented by Intersec
11:00-11:40
5G Enabled LEMF
Deployment scenarios and live demo.
Presented by AREA
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.
11:30-12:15
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources
"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how. PART 2 on the final day with free tools to download and keep
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police