
ISS World Asia is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Presentations
Track 4: Threat Intelligence Gathering and Cyber Security Product Presentations
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
Track 6: Mobile Signal Intercept Product Presentations
Track 7: Electronic Surveillance Training and Product Presentations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Presentations
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(8 classroom hours)
Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(1 classroom hours)
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(4 classroom hours)
Online Social Media and Internet Investigations (6 Classroom hours)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators (1 Classroom hour)
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Understanding 5G/5GA/6G LI for Investigators (1 Classroom hour)
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
This session addresses the challenges facing law enforcement and ISS vendors responsible for intercept on 5G networks.
AI Technology Basics and LEA Use Cases (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI Use Cases and Capabilities for Law Enforcement and Intelligence Agencies (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Agentic AI - Deployment Options and Approaches (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Understanding the Implications of Online Social Media for OSINT During Critical Incidents (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World Asia has Solutions
Dr. Jerry Lucas, President, TeleStrategies
Wednesday, 2 September 2026
10:00-18:00
Thursday, 3 September 2026
10:00-13:30
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
14:15-15:00
Accelerating investigation workflows with specially designed IT and phone forensic laboratories
Holistic Analysis of Multi-Source Data through Oxygen Forensics Detective
Modern digital forensic investigations are not limited to single sources of data to ingest and analyze.
Most often, investigators require multiple tools to seek, import, and parse data from multiple sources only to find they struggle when trying to compare disparate datasets to each other.
Learn how Oxygen Forensics solves this problem with an innovative and clear Interface that is built on stable database technology and provides multiple options to import and analyze data from wherever it may be found
Presented by mh Service GmbH
15:00-15:40
Next-Generation Forensic Voice Analysis Solution with Deepfake Detection
Join us for an exclusive preview of our next-generation forensic voice analysis solution. Designed to support the evolving needs of forensic professionals, this upcoming solution will deliver enhanced speaker recognition performance and introduce new capabilities for detecting synthetic audio.
Jiri Nezval, Phonexia
11:00-11:40
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
11:00-11:40
Russian, Chinese and Arabic Open Source Collection Intelligence Techniques
Skip Schiphorst, Course Manager, I-Intelligence GmbH
11:45-12:30
Chinese OSINT Investigations using AI
Eve Chow, OSINT Instructor, I-Intelligence GmbH
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
8:30-9:15 Session A
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated Cyber Intelligence solutions. A structured case-study
Presented by AREA
9:30-10:15 Session A
VASTech Orca: A cutting-edge, modular, end-to-end system for fibre, satellite, and signals intelligence fusion
Presented by VASTech
9:30-10:15 Session B
From Borders to Boardrooms: Complete Wireless Threat Detection, Device Control, and Blacklist/Whitelist Enforcement
Presented by Sinovatio
9:30-10:15 Session C
POS (Persona Orchestrator Sandbox)One Dashboard .one operator launch and control hundreds of session simultaneously via secure proxy
Presented by CloudCode
10:30-11:15 Session A
Protecting Public Safety with High-Tech Border Security
Technology is shifting the focus of border protection from physical defenses to virtual safeguards. Agents fuse disparate data sources gathered outside of traditional points of entry – such as lawful intelligence, financial records, and location information – to help disrupt global trafficking operations. These scalable approaches cover large distances, adapt to new technologies, and support interagency collaboration.
Presented by SS8
11:30-12:15 Session A
Forensic content derived metadata with powerful Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications. Use cases and demonstration.
Presented by AREA
11:30-12:15 Session B
Intersec.AI: next-gen metadata intelligence for real-world impact
Presented by Intersec
11:30-12:15 Session C
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will demonstrate how its innovative technologies help Security and Defence organizations respond rapidly to a wide range of threats and how they’re already making a difference day to day. See them in action through a live partner integration used in real-world scenarios and witness their impact firsthand.
Paul Morris, Phonexia and Yannic Gayk, Innosystec
11:30-12:15 Session D
Understanding the Digital Flow: turning Internet Traffic into Investigative Power
Network traffic analysis is a cornerstone of Lawful Interception, but challenges like encryption and diverse applications obscure insights. RCS tools, built on decades of expertise, uncover hidden patterns and integrate cross-technology data for a complete investigative view. The demo shows how this approach transforms investigations in today’s complex digital landscape.
Presented by RCS
13:15-14:00 Session C
Decoding Patterns: Predictive Investigation with ADINT
Presented by Rayzone Group
14:15-15:00 Session A
Solving the challenges of Data-Fusion and Validation: Communication Data, live lawful interception data, mobile forensics extraction and more in a single platform. Use cases and demonstration.
Presented by AREA
14:15-15:00 Session B
AI-Driven Audio Clarity: Enhancing Speech Extraction from Noisy Tactical Recordings
RCS introduces an innovative forensic audio processing suite that leverages AI and Spatialized Deep Neural Networks to extract speech from recordings with significant background noise and interference. The demonstration will highlight key applications, including recordings from microphone arrays in open spaces and from single microphone devices or signal captures.
Presented by RCS
15:15-16:00 Session A
Securing High-Risk Operations with Network-Based Strategies
Presented by Intersec
15:15-16:00 Session B
Discover the cutting-edge, all-phone compatible, cost-effective and successful agent.
Presented by MOVIA
15:15-16:00 Session C
CDRs of WhatsApp, Signal, Telegram, and Other Encrypted VoIP Messaging Applications
Presented by ClearTrail
16:15-17:00 Session A
Modernizing Lawful Interception: Adapting to 5G, Encryption & Cloud-Native Networks
Presented by PertSol
16:15-17:00 Session B
Decoding the Digital World: A look into Encrypted networks!
Presented by Datafusion Systems
16:15-17:00 Session C
Trusted Traffic Intelligence: Enabling Regulators and Governments to See the Unseen
Presented by 31C
16:15-17:00 Session D
What If Intelligence Was as Easy as Asking? It Is Now.
Presented by ClearTrail
13:00-13:40 Session A
VASTech Orca: A cutting-edge, modular, end-to-end system for fibre, satellite, and signals intelligence fusion
Presented by VASTech
13:00-13:40 Session B
CARINT - Leveraging Mobility Data for Actionable Insights and Crime Prevention
Presented by Rayzone Group
13:45-14:30 Session A
Tracking and Unmasking Cybercriminals Active on Hidden Channels
Presented by S2W
13:45-14:30 Session C
Strengthening National Security through Predictive Geospatial Analytics
Presented by PertSol
15:00-15;40 Session D
The Virtual Intel Officer: AI's Role in Modern Investigations
Presented by Voyager Labs
16:20-17:00 Session A
How to Enhance your Investigation: AI-Driven Strategies for Analysing Encrypted Data at Scale
Presented by XCI A/S
16:20-17:00 Session B
Instant deployment of a multi-audio streaming system with live speaker identification and speech analysis.
Presented by Gedion
16:20-17:00 Session C
Demos Series: Homeland Security Use Cases
Presented by Intersec
16:20-17:00 Session D
How Lawful Interception Benefits from Traffic Filtering
Presented by Group 2000
16:20-17:00 Session E
Turn PCAPs and IPDRs to Patterns-of-Life in One Click.
Join the session to download the tool.
Presented by ClearTrail
8:30-9:10
VASTech Orca: A cutting-edge, modular, end-to-end system for fibre, satellite, and signals intelligence fusion
Presented by VASTech
9:15-10:00 Session A
Unveiling the invisible: SIO advanced intelligence in action
Presented by SIO
11:00-11:40 Session A
Solving the Surveillance Challenge: Accessing Powerful Analytics On Demand
Intelligence agents face a daunting task: sift through endless amounts of data from various sources using outdated tools and a limited budget while preserving the evidentiary chain of custody. With a compliant, subscription-based cloud solution, analysts can cost-effectively unify data into a single, searchable platform and access powerful, AI-driven analytics when and where needed.
Presented by SS8
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
8:30-9:15 Session A
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPS
8:30-9:15 Session B
Social Media De-anonymization in Practice: DNI’s Identity Correlation Engine (ICE)
Presented by DNI Solutions
9:30-10:15 Session A
WhatsApp, Telegram, Facebook…how IPS helps you to locate most wanted targets with LI
Presented by IPS
10:30-11:15 Session A
AI-Powered Fusion Intelligence: Redefining Threat Prediction, Financial Crime Prevention, Criminal Investigation Support, Automated OSINT/HUMINT Reporting, and Paper-to-Digital Intelligence
Presented by Sinovatio
11:30-12:15 Session B
Autonomous Data Fusion: Connecting, Loading and Extraction Made Easy!
Presented by RAKIA Group
13:15-14:00 Session A
Seeing More Than a Face: Discovering Behavioral Insights from Facial Data
Presented by Corsight AI
13:15-14:00 Session B
The Value of the Analyst-AI Relationship in emerging OSINT Technologies
Presented by OSINT Combine
14:15-14:40 Session A
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception
Presented by IPS
14:15-14:40 Session B
JA4+ Fingerprinting and the Cyber Threat Hunter's Toolkit: Detecting Botnets and Anomalous Activity
Government defense organizations are increasingly targeted by sophisticated cyber threats, placing critical infrastructure and national security at risk. This session will demonstrate how JA4+ fingerprinting is empowering cyber threat hunters to detect botnets and malicious behaviors concealed within encrypted traffic. Through real-world examples—including detection of state-sponsored activity like Salt Typhoon—this session is aimed at showing how JA4+ enhances visibility and faster disruption of adversary C2 infrastructure at scale.
Mike Seidler, VP Product Management, NetQuest
14:40-15:00 Session A
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case.
Presented by IPS
15:15-16:00 Session B
The Virtual Intel Officer: AI’s Role in Modern Investigations
Presented by Voyager Labs
9:10-10:00 Session B
Mastering the Digital Landscape: Live Demo of Majestic 5
Presented by RAKIA Group
13:00-13:40 Session A
From Data to Action: Harnessing AI for Real-Time Cyber Intelligence to Strengthen National Security
Presented by SIO
13:00-13:40 Session B
Seeing More Than a Face: The Next Evolution in Security Insights
Presented by Corsight AI
13:45-14:30 Session A
The Changing OSINT Landscape
Tony Knox, Fivecast
13:45-14:30 Session B
Gaining Knowledge from Mass Data for Actionable Intelligence
Presented by Innosystec
15:00-15:40 Session A
Strategic Surprises: Why Humans Keep Failing
Presented by Red Valley
15:00-15:40 Session B
From Noisy Data to Clarity: The Critical Role of Accuracy in Data Intelligence
Presented by 31C
16:20-17:00 Session A
Enhance your investigative skills with AI-powered analysis of complex data to unveil extraordinary insights and unprecedented connections.
Presented by MOVIA
9:15-10:00 Session A
Leveraging OSINT 0-days to investigate a person of interest
Sylvain HAJRI, Epieos
11:00-11:40 Session A
Unlocking Knowledge: OSINT Solutions for Intelligence and Strategic Decision-Making
In an age of information overload, the ability to transform vast streams of data into meaningful knowledge is essential for effective intelligence and strategic decision-making. DataScouting’s OSINT solutions empower organizations to uncover actionable knowledge by seamlessly integrating data from diverse sources, including TV, radio, podcasts, IP streams, online platforms, dark and deep web, and social media. Leveraging the power of generative AI, Large Language Models and virtual AI agents, these solutions go far beyond simple data aggregation to deliver real-time contextual understanding, advanced pattern recognition, and predictive insights.
This presentation explores how the fusion of open source data and generative AI creates critical knowledge that enhances situational awareness, enables early warning and crisis detection, and addresses vital needs such as tracking disinformation and propaganda, monitoring conflict and security issues, terrorism or radicalization, and possible activities of foreign state and non-state actors. By transforming raw data into reliable knowledge, our solutions empower organizations to develop informed, proactive strategies in rapidly evolving environments.
Stavros Vologiannidis, Founder, Business Development, DataScouting
Rami El Sabeh, OSINT Consultant, DataScouting
11:00-11:40 Session B
From Detection to Evidence: Instant Deepfake Forensic Reports for Investigations and Legal Proceedings
Deepfakes are no longer just a technical curiosity, they’re a growing weapon used by cybercriminals and nation-state actors to deceive, defame, and disrupt. In this seminar, you’ll discover how fully automated deepfake detection tools can generate reliable, court-ready forensic reports in just seconds. Designed for investigators, prosecutors, and forensic analysts, this session will show real-world use cases, including how malicious actors exploit deepfakes in scams, disinformation campaigns, and identity fraud. Learn how to integrate these tools into criminal investigations, digital forensics, and courtroom workflows, ensuring you stay ahead in the fight against synthetic media manipulation.
Presented by Sensity AI
11:45-12:30 Session B
Real Intelligence - Revolutionizing Investigative techniques
Presented by Datafusion Systems
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
13:00-13:40
A Portable Cyber Threat Detection System that Every Cybersecurity Council Should See
Presented by ClearTrail
13:45-14:30
ARGOS: Is my phone infected?
Presented by TopSolution
11:00-11:40
ARGOS: Is my phone infected?
Presented by TopSolution
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
13:00-13:40 Session A
IT Forensics Investigation Workflows and Crime Scene Essentials
Digital Forensic Incident Response DFIR, Cybercrime Tools, Crypto Analysis, and Forensic Infrastructure
Presented by mh Service GmbH
15:00-15:40
Live Demonstration of DarkOwl Vision UI: Safely Search the Darknet & Unmask Criminal Identities
Lindsay Whyte and Magnus Svard, DarkOWL
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
10:30-11:15
Detecting, Locating and Intercepting VSAT and Other GSO Terminals
Presented by Kratos
13:15-14:00
Fake Towers, Real Threats: Detecting and Defending against IMSI Catchers and SMS Blasters.
Gunter Knall, NeoSoft
14:15-15:00
Monitoring, Detecting and Locating Starlink and Other NGSO Terminals
Presented by Kratos
15:15-16:00
Unlocking Hidden Connections: Harnessing Multi-Source Geo-Intelligence for Smarter Investigations
Discover how multi-source geo-intelligence is reshaping investigations by offering a cross-country perspective that uncovers hidden connections. In this talk, RCS shows how this approach helps investigators pinpoint key starting points and anticipate the next steps, providing a practical and comprehensive solution for tackling complex cases.
Presented by RCS
9:10-10:00
Satellite Interception Systems (Thuraya/ISAT/BGAN/IRIDIUM/Bideou)
Presented by Stratign
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
8:30-9:15
The Italian Way: Advanced AI Surveillance in Action Against Organized Crime-See How it Works
Presented by SIO
13:45-14:30
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform. Use cases and demonstration.
Presented by AREA
15:00-15:40
Ultra-low bandwidth video encoding pushing the boundaries of secure video compression
Presented by Spectronic Denmark
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
15:15-16:00
Keep using your IMSI Catchers and Direction Finders in the 5G SA Era
Presented by Group 2000
8:30-9:10
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance. Hands on.
Presented by AREA
Online Social Media and Internet Investigations (6 Classroom hours)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators (1 Classroom hour)
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Understanding 5G/5GA/6G LI for Investigators (1 Classroom hour)
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
This session addresses the challenges facing law enforcement and ISS vendors responsible for intercept on 5G networks. Topics covered include:
AI Technology Basics and LEA Use Cases (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
This session gives LEA, intelligence and other practitioners a primer on AI technologies. Topics covered include how AI technology is being leveraged in our industry (e.g., image recognition, classifying unstructured data, natural language processing, document summarization, and more); traditional AI approaches (heuristics, indicators); basics of machine-learning systems (models, training, neural-networking); generative AI systems (OpenAI, Anthropic, Grok, others); the strengths and weaknesses of each AI model; and how the LEA/IA/ISS vendor communities are leveraging AI to increase the efficiency and accuracy of their network data, OSINT, location, image and natural language operations/applications.
Generative AI Use Cases and Capabilities for Law Enforcement and Intelligence Agencies (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI (GAI) is revolutionizing network data and OSINT analytics – with the end-goal of enabling investigators to effortlessly engage, analyze, visualize large datasets and “connect the dots” that would traditionally require enormous manual effort from teams of analysts and IT personnel. This session will cover the key issues related to GAI platforms: how they are/can be used; what models are available; who are the key players; how to integrate GAI systems with your datasets (RAG); dealing with accuracy and hallucinations; data embeddings and citations; integration standards; data orchestration and more
Agentic AI - Deployment Options and Approaches (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
This session will cover Agentic-based AI platforms, the technology and challenges facing LEAs/IAs looking to incorporate Agentic AI platforms in their operations. Topics covered include hosting platform options; small/local model options; operational costs; implementation requirements; security; regulatory considerations; aligning and fine-tuning models; optimizing agentic AI platforms for ISS workflows; and ongoing development advances to watch.
Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Understanding the Implications of Online Social Media for OSINT During Critical Incidents (1 Classroom hour)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police