
ISS World Europe is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
Track 6: Mobile Signal Intercept Training and Product Presentations
Track 7: Electronic Surveillance Training and Product Presentations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Training
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
Training Seminars Led by Law Enforcement Officers and Ph.D., Computer Scientists
20 classroom training hours, presented by Law Enforcement Officers and Ph.D. Scientists
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(9 classroom hours)Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(1 classroom hours)Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(4 classroom hours)Vladimir Vesely (Ph.D., Computer Science) Researcher, Brno University of Technology
(3 classroom hours)
Tuesday, 2 June 2026
Seminar #1
08:30-15:05Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Seminar #2
08:30-09:20Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Seminar #3
09:25-10:15Understanding 5G/5GA/6G LI for Investigators
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesThis session addresses the challenges facing law enforcement and ISS vendors responsible for intercept on 5G networks.
Seminar #4
10:35-11:25AI Technology Basics and LEA Use Cases
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesSeminar #5
11:30-12:20Generative AI Use Cases and Capabilities for Law Enforcement and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesSeminar #6
13:20-14:10Agentic AI - Deployment Options and Approaches
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThursday, 4 June 2026
Seminar #7
8:30-9:15Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #8
10:15-11:00Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #9
11:30-12:15Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PolicePre-Conference Sessions Description At The End of Agenda PostinG
Welcoming Remarks and Top Ten Challenges
Wednesday, 3 June 2026
8:15-8:30 Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Europe has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World Europe Exhibit Hours:
Tuesday, 2 June 2026
10:00-18:15Wednesday, 3 June 2026
10:00-18:15
Thursday, 4 June 2026
10:00-14:00
Track 1: Lawful Interception and Criminal Investigation Training
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
*Note: Sessions open to only LEA/Government attendees in this track will have (Open to LEA and Government attendees only) above their title.
Tuesday, 2 June 2026
10:30-11:15
ETSI and 3GPP LI/LD Standards Update
Alex Leadbeater, 3GPP SA3-LI and ETSI TC Cyber Chairman and Technical Security Director, GSMA
Martin Kissel, ETSI TC LI Chairman and Coordinator Lawful Interception, Telefónica Germany
Carmine Rizzo, ETSI TC LI Technical Officer and 3GPP SA3-LI Secretary, ETSI14:15-15:05
Automated Compliance & e-CODEX: Navigating the New Era of Data Retention
This session delves into data retention automation, preservation orders, and e-CODEX compliance. Discover how an agile platform handles shifting regulations and "data freezes" with ease, featuring lightning-fast IP-searches in a hybrid reality and automated disclosure processes. Using real-world CSP insights, we show how to mitigate legal risks while reducing operational costs. Discover how leveraging multi-source network data from CDRs, passive probes and more empowers CSPs to deliver enriched and secure results with efficiency, seamlessly transferring insights to law enforcement agencies.
Presented by Subtonomy15:25-16:05 Session B
Digital Crime Scene Essentials: Cybercrime Tools, Crypto Analysis, and Forensic Infrastructur
Focused exploration of cybercrime investigations, cryptocurrency analysis tools, advanced forensic software, and specialized hardware solutions for lab and field use.
Presented by mh-service GmbH16:10-17:00 Session B
Remove unwanted data (e.g. video, encrypted traffic, etc.) at n x 100 Gbps using an ultra-compact server
Presented by Napatech
Wednesday, 4 June 2025
13:45-14:30 Session A
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Iva Konečná, Phonexia(Open to LEA and Government attendees only)
13:45-14:30 Session B
Location, Location, Location – Innovative Analytical Techniques for Intelligence and Law Enforcement
Authorities often face operational scenarios in which the ability to correlate the locations and movements of criminals and bad actors can deliver critical breakthroughs. These scenarios can include uncovering the identity of a suspect driving a car spotted near a terror attack or a crime scene, or conversely, pinpointing the vehicle a known criminal is traveling in. In this session, we’ll dive into practical, real-world cases and present innovative analytical techniques for effectively solving these location-based challenges.
Presented by Cognyte15:00-15:40 Session B
Analyzing Social Networks
BREVIS and OSINT Plugin for i2 Analyst Notebook. Analyze Social Networks – Twitter, Facebook, Linkedin, YouTube, VK, Instagram, TikTok, Telegram, WhatsApp and Pipl.
Presented by MKCVI
Thursday, 5 June 2025
9:15-10:00 Session A
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
In this talk, we shall discuss various security mechanisms used in WiFi and Bluetooth networks and how to abuse them to obtain mission-critical intel. Apart from explaining all principles, we will demonstrate them (hopefully live) on our tactical device! Starting with an access point and client scans, we will continue with client targetted jamming and total Denial-of-Service of the whole network that may even result in authentication handshake capture. This handshake contains information to recover the WiFi password to access the targeted network. Once inside the network, we will show essential hacking tools to conduct IP-level reconnaissance. But we will not limit ourselves to WiFi and demonstrate how Bluetooth can be leveraged to notify you about a person's presence or exploit various IoT devices.
Vladimir Vesely (Ph.D., Computer Science), Jan Pluskal (Ph.D., Computer Science), Matej Gregr (Ph.D., Computer Science), researchers, Brno University of Technology9:15-10:00 Session B
Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police11:00-11:40 Session B
Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police11:45-12:30 Session A
Trending Topics in Cryptocurrency Forensics
Bitcoin, Ethereum and other cryptocurrencies are becoming mainstream for financial interactions and standard tools when conducting cybercrime such as scams, frauds, ransomware, darknet markets, sextortion, etc. LEAs also adapted to a new situation, and many investigators are already familiar with cryptocurrency basics and how to trace transactions on publicly available blockchain explorers. This session aims to extend the knowledge of participants about more advanced topics such as: a) address clustering techniques and their applicability to various cryptocurrencies; b) monitoring of cryptocurrency networks and their peers with the help of network intelligence; c) geolocating cryptocurrency transaction with IP address or originator; d) overcoming obfuscation of transactions entering and leaving mixers; e) correlating activities on darkweb with blockchain events. Each subtopic will be thoroughly explained, including currently existing methods and tools for addressing associated challenges.
Vladimir Vesely (Ph.D., Computer Science), Jan Pluskal (Ph.D., Computer Science), Matej Gregr (Ph.D., Computer Science), researchers, Brno University of Technology11:45-12:30 Session B
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
13:00-13:40
Mastering the password cracking
This session will cover the use of passwords in digital life, exploring cracking techniques such as dictionary, rule-based, brute-force, hybrid and association attacks. We'll provide benchmarks for state-of-the-art password recovery hardware and discuss their feasibility. Finally, we'll look at how leaked personal information can aid password discovery and enhance hacking efforts.
Vladimir Vesely (Ph.D., Computer Science), Jan Pluskal (Ph.D., Computer Science), Matej Gregr (Ph.D., Computer Science), researchers, Brno University of Technology
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 2 June 2026
8:30-9:20 Session A
Collect online, third-party and remote sensors (incl humint) data without any risk of attribution
This session will address network operation security risks of osint and online data retrieval (incl. humint) and ways to limit them thanks to our patented VIPN (Virtual & Invisible Private Network) technology and our no-trusted-third-party anonymization platform. The talk will focus on direct and indirect risk (in particular attribution), our new anonymization platform features, its deployment in organizations, its integration with application-level operation security component and will end with a demonstration.
Presented by Snowpack8:30-9:20 Session B
Title TBA
Mike Seidler, VP Product Management, NetQuest9:25-10:15 Session A
Deep semiconductor forensics: FIB-SEM extraction of eFuse, antifuse, and embedded Flash - even without interfaces or on damaged chips
This session demonstrates advanced semiconductor-level forensics enabling the recovery of critical data stored directly within the silicon die. Using FIB-SEM techniques, it is possible to access eFuse, antifuse, and embedded Flash memory structures even when traditional interfaces are disabled, encrypted, or physically destroyed. The presentation covers practical methods to reconstruct memory from damaged or secured devices and to bypass hardware protections in forensic contexts. It also shows how actionable intelligence can be obtained when no other acquisition path exists. The session emphasizes real-world applicability for law enforcement, intelligence, and digital forensics investigations.
Michal Grygarek, Accenture10:35-11:25 Session A
Decoding the Digital World: A look into Encrypted networks!
Presented by Datafusion Sytems10:35-11:25 Session B
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated, AI enhanced Cyber Intelligence solutions.
A structured case-study
Presented by AREA10:35-11:25 Session C
An introduction to media file structure for digital investigations
In today’s digital world, the ease of manipulating and sharing media files with emerging technologies has made it increasingly challenging to detect alterations and prove authenticity. Understanding the underlying structure of these files is essential to ensuring reliable evidence analysis.
Join Jarina Cotten as she introduces Magnet Verify and how it uncovers critical insights beyond standard metadata, providing deterministic results for efficient analysis and unparalleled reliability in legal proceedings.
Jarina Cotten, Solutions Consultant, Magnet Forensics10:35-11:25 Session D
From Mobile Forensics to Countering National Security Threats: AI-Powered Data Fusion
This session explores how national security teams can transform mobile forensic extractions into comprehensive, multidomain investigations by fusing device data with OSINT, leaks, CDRs, geospatial movement, and crypto intelligence within a single collaborative workflow. Rather than treating forensics as a standalone lab function, Falkor turns extracted data into shareable, AI-driven investigative intelligence. This helps analysts uncover facilitators, meeting points, influence networks, and funding trails faster across local and national levels.
Presented by Falkor10:35-11:25 Session E
Finding needles in Terabit-sized haystacks: Application filtering on live OTU4/1000GbE/400GbE+ networks
The challenges of searching through huge volumes of traffic on transport links have never been greater. Learn how wide-view visibility of the whole network pairs with focused traffic filtering to provide unparalleled insights. Explore how to filter on layer 7 applications, form targeted rule sets and ultimately focus on only the traffic of interest, discarding all unwanted data. Understand how to identify and deal with encrypted traffic types (QUIC, TLS and others), expose terminal IP sessions from inside deep tunnelling structures (MPLS, VLAN etc) and ultimately find the crucial needles of actionable intelligence.
Alan Anderson Ph.D., Chief Technology Officer, Lumacron Technology
11:30-12:20 Session A
Safeguard Your Sea with DarkWave: Shedding Light on Dark Ships
Presented by Rayzone Group11:30-12:20 Session B
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will demonstrate how its innovative technologies help Security and Defence organizations respond rapidly to a wide range of threats and how they’re already making a difference day to day. See them in action through a live partner integration used in real-world scenarios and witness their impact firsthand.
Paul Morris, Phonexia and Yannic Gayk, Innosystec13:20-14:10 Session A
Leveraging Mobility Data for Actionable Insights and Crime Prevention
Presented by Rayzone Group13:20-14:10 Session F
Turning Insights into Action: Leveraging Dark Data and Risk Intelligence Databases
Presented by CHAPSVISION14:15-15:05 Session A
Enhancing Real-time Intelligence from Seized Devices with Tactical Location Analytics
During missions, field agents confiscate devices with crucial location data and valuable, timely intelligence insights – but if they can't analyze it in the field, opportunities are wasted. Tactical location solutions that require no internet, operate on a laptop, and offer drag-and-drop ingestion help transform seized data into real-time, actionable intelligence.
Presented by SS8
14:15-15:05 Session B
Introducing the Modern, App-Based Operating System for All‑Int, All‑Data Investigations
Presented by Octostar
15:25-16:05 Session A
High End Covert Car Entry Systems
SCP, a high-end platform that is purpose-built to provide covert access to vehicles from leading car manufacturers equipped with keyless entry systems. Copy the electronic smart key and with multi grabber functions.
Presented by Secupro Government BV15:25-16:05 Session B
Actionable intelligence on the Edge
This session dives into the latest innovations shaping modern investigations — from unlocking devices and cutting through terabytes of data, to drone evidence and AI-assisted analysis. Whether you’re in law enforcement, a forensics lab, or a specialised unit, we’ll show you how agencies are turning overwhelming volume into clear, actionable intelligence — faster than ever before.
Andrew Martin, Head of EMEA Solution Engineering, Cellebrite15:25-16:05 Session D
Lessons Learned: Deploying AI Speech Technologies in Air-Gapped Environments
Drawing from several years of real-world deployments, this session shares lessons learned implementing and supporting automatic speech recognition (ASR) and translation tools in high risk, on-premises environments at scale. We’ll dive deep into the end-to-end offline speech processing pipeline, exploring the tradeoffs around ASR accuracy, speed, and hardware costs, their downstream impacts, and where this technology is headed next.
Sean Thibert, Senior Product Manager, AI Solutions, JSI15:25-16:05 Session E
VPNz – Unveiling and Locating VPN Users
VPN users often assume their connections grant full anonymity and protection from tracking. This VPNz challenges that assumption by exploring how such users can still be identified and located
Presented by Target Team16:10-17:00 Session A
The Big Reveal: What If Intelligence Was as Easy as Asking? It Is Now.
Presented by ClearTrail16:10-17:00 Session B
Real time DPI-Based Traffic Visibility, Analytics and Blocking
Presented by PertSol16:10-17:00 Session C
Solving the challenges of Data-Fusion and Validation: Communication Data, live Lawful Interception data, Mobile Forensics extraction and more in a single AI enhanced platform.
Use cases and demonstration.
Presented by AREA16:10-17:00 Session D
Orca Connect: make monitoring signals of interest easier using VASTech’s integrated analysis tools specifically designed for the satellite and fibre domains.
Presented by VASTech16:10-17:00 Session E
Spyder Space: Movia's Revolutionary Platform for Real-Time Decision Intelligence
Cutting-edge data fusion technology breaking through delayed analytics, powered by the innovative force of AI!
Presented by Movia
Wednesday, 3 June 2026
09:10-10:00 Session B
Digital Crime Scene Essentials: Cybercrime Tools, Crypto Analysis, and Forensic Infrastructur
Focused exploration of cybercrime investigations, cryptocurrency analysis tools, advanced forensic software, and specialized hardware solutions for lab and field use.
Presented by mh-service GmbH09:10-10:00 Session C
Forensic content derived metadata with powerful AI enhanced Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Use cases and demonstration.
Presented by AREA
13:00-13:40 Session A
Drones Redefining Tactical SIGINT
Presented by Ateros13:00-13:40 Session B
Advanced Geo-Location Intelligence and IP-Mapping for Investigations
This session focuses on advanced investigative functionalities designed for modern intelligence needs. We demonstrate live how Cross Location Analysis, IMSI Comparison, and Timing Advance Cell Tracing can pinpoint targets in real-time and historically with surgical precision. Learn how to identify the users behind complex IPv4/IPv6 mixed environments with speed and accuracy. See how multi-source network insights turn complex data sets into the evidence needed for successful prosecutions, supported by full audit trails for total transparency.
Presented by Subtonomy13:45-14:30 Session A
Seven Hills Prague: Cutting-Edge Intelligence Tools for Law Enforcement
This session introduces our interception and investigation solutions designed to support law enforcement with fast, data-driven insights. We will demonstrate how integrated intelligence tools can uncover hidden connections, process large data volumes, and strengthen operational capabilities in demanding investigative environments.
Presented by Seven Hills13:45-14:30 Session B
Spyder Space: Movia's Revolutionary Platform for Real-Time Decision Intelligence
Cutting-edge data fusion technology breaking through delayed analytics, powered by the innovative force of AI!
Presented by Movia13:45-14:30 Session C
Live Demo: Turbocharging LEA monitoring centre with GenAI
A demo of how GenAI accelerates intelligence assessment including DPI, digital forensics, and diverse digital sources
Jez Nelmes, BAE Systems Digital Intelligence
15:00-15:40 Session A
Title TBA
Aviel Lev Astanovsky, Bold15:00-15:40 Session B
New MOBILedit ULTRA: From the Latest Smartwatch Forensics to Powerful Phone Unlocking
Learn how to investigate smartwatches—a fast-growing and often overlooked source of crucial digital evidence. From health and location data to activity logs, smartwatches can reveal key insights that other devices simply don’t provide.
Discover how MOBILedit, the only forensic tool focused on smartwatch data extraction, is helping investigators uncover vital information in real cases.
See how this capability is now part of the all-new MOBILedit Forensic ULTRA—an all-in-one solution for forensic labs, combining smartwatch, phone, and cloud data analysis, now empowered with powerful unlocking and security bypassing features.
Presented by Compelson15:00-15:40 Session C
Orca Capture: monitor modern telephony and IP networks using VASTech’s capture units with comprehensive protocol processing.
Presented by VASTech15:00-15:40 Session D
Assessing Threats: Intelligence in Pre-War and Active Conflict Zones
Presented by Rayzone Group
15:00-15:40 Session E
REVEL·IO by Synacktiv : Accelerating digital evidence accessWhat if you could unlock phones faster by leveraging GPU performance?What if brute-force attacks could be offloaded to a dedicated server?What if you could benefit from a European mobile forensic solution that significantly reduces the time needed to access phone data?What if you haven’t discovered REVEL·IO yet?
Presented by Synaktiv15:00-15:40 Session F
CDRs of WhatsApp, Signal, Telegram, and other encrypted VoIP messaging applications
Presented by ClearTrail15:00-15:40 Session G
Blind Spots on China: The Case for a Sovereign European AI-OSINT Capability
European intelligence services face a structural blind spot on China: state-subsidized firms, Military-Civil Fusion networks, and dual-use suppliers operating behind layers of corporate opacity that Western-language sources cannot penetrate. Drawing on concrete cases, Datenna will show how an AI-driven OSINT capability built on Chinese primary-source data can map these networks and convert open-source signals into actionable intelligence at scale. As European agencies move to de-risk their dependence on non-European platforms, this session argues that a sovereign AI-OSINT capability on China has shifted from a nice-to-have into core infrastructure for European security.
Presented by Datenna15:45-16:25 Session A
The Impact of AI on End-to-End Lawful Intelligence: Opportunities and Challenges
Investigators need efficient tools to help extract critical intelligence from vast databases. AI technologies like video and voice analytics, facial recognition, and automatic number plate readers are revolutionizing lawful intelligence, but introduce challenges. We must harness the transformative potential of these platforms while remaining vigilant for bias and misleading conclusions.
Presented by SS815:45-16:25 Session B
How to Enhance your Investigation: AI-Driven Strategies for Analysing Encrypted Data at Scale
Learn how XCI’s advanced AI based analysis engine shaves time off investigations and enable non-technical investigators to perform advanced and deep forensic analysis in seconds.
Mark Uldahl, CTO, XCI A/S15:45-16:25 Session C
AI empowered speech technologies: making your audio searchable
Discover our next generation AI speech processing software designed to help professional users extract critical information from large amounts of multilingual audio data. Functionalities includelanguage identification, speech transcription and keyword spotting to ease your OSINT and COMINT activities.
Jodie Lechapelain, Director, Vocapia Research15:45-16:25 Session D
Title TBA
Mike Seidler, VP Product Management, NetQuest15:45-16:25 Session F
How to ensure the security of mobile communication? Use radio forensics to monitor and secure mobile networks in 5G SA technology
This presentation of the Sentinel system will showcase its capabilities in enhancing real-time situational awareness in the field of mobile communication security. Attendees will learn how Sentinel detects threats such as unauthorized BTS stations and protects mobile networks against various forms of attack. Designed for both military and governmental applications Sentinel supports secure communication management.
Rafał Wołczyk, Presales Engineer, Vespereye
16:30-17:15 Session B
Cutting Through the Noise: Enhancing Lawful Interception with Intelligent IP Traffic Profiling.
High-bandwidth networks like LTE, 5G, and fiber introduce significant processing challenges for lawful interception systems. Most traffic—such as video streaming or OS updates—carries no investigative value. This session shows how IP Traffic Profiling helps isolate relevant data and reduce costs while boosting operational efficiency.
Presented by Group 200016:30-17:15 Session C
Instant deployment of a multi-audio streaming system with live speaker identification and speech analysis.
Presented by Gedion16:30-17:15 Session D
Beyond RAG: Designing Agentic Applications for Investigations
This session reviews the patterns and techniques used to build agentic applications in high-risk, on-premises environments. We’ll cover real-world investigative use cases, then dive into the practical considerations that determine success: LLM selection, retrieval and analysis pipelines, agentic frameworks, benchmarking, and hardware considerations.
Sean Thibert, Senior Product Manager, AI Solutions, JSI16:30-17:15 Session E
Monitoring Centre-Interception, Location & IP Metadata Analytics
Presented by PertSol16:30-17:15 Session F
Turn PCAPs and IPDRs to patterns-of-life in one click.
Join the session to download the tool.
Presented by ClearTrailThursday, 4 June 2026
08:30-09:10 Session A
GULP: See the Attack. Understand the Story. Prove the Facts
Interactive timelines, AI support and enriched logs for forensic‑grade investigations
Federico Ramondino, Mentat Solution operating under the ILIO Security Group
Gabriele Zuddas, Mentat Solution operating under the ILIO Security Group08:30-09:10 Session B
Password Cracking on FPGA Infrastructure
Presented by SciEngines
09:15-10:00 Session B
Using Zero-days in Mobile Forensics for Advanced Data Extractions
Presented by Secfence09:15-10:00 Session C
Beyond the Search Bar: Automated Social OSINT for Large-Scale Intelligence Ops
Manual OSINT doesn't scale. When dealing with mass data, analysts need tools that think like investigators. Join us for a technical walkthrough on how to automate the collection and analysis of social media traces at scale. We will explore advanced correlation algorithms that identify hidden connections between targets across multiple platforms, transforming chaotic social data into a clean, actionable intelligence feed for command centers and field agents.
Presented by Prelysis11:00-11:40 Session A
Enhance your Monitoring Center with OSINT, All-Source Intelligence and Blockchain Analytics
Presented by Cognyte11:00-11:40 Session B
Using situational awareness and C2 tools to achieve faster decisions and actions during operations
Presented by Drakontas LLC11:00-11:40 Session C
Extracting RAM and Breaking the BFU Barrier in Mobile Phones with XRY Pro
Presented by MSAB11:45-12:30 Session A
Orca Integrate and View: integrate metadata from different sources to view, filter, and query the results in VASTech’s optimised single user interface.
Presented by VASTech
13:00-13:40 Session B
AI Video Analysis - all video types - object, face, number plate recognition, detection & tracking
Presented by Secupro
*Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise unless marked otherwise.
*Note: Sessions open to all attendees in this track will have (Open to all attendees) above their title.
Tuesday, 2 June 2026
08:30-09:20 Session A
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPS08:30-09:20 Session B
Possibilities of AI-powered Mass Data Fusion.
Boosting efficiency through automated analysis functions for mass data analytics – SCOPE live Demo
Presented by INNOSYSTEC08:30-09:20 Session C
(Open to all attendees)
Link analysis on maps - new techniques for combining intelligence data with geospatial context
Dan Williams, Chief Product Officer, Cambridge Intelligence08:30-09:20 Session D
Social Media De-anonymization in Practice: DNI’s Identity Correlation Engine (ICE)
Presented by DNI Solutions09:25-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS09:25-10:15 Session B
Real Intelligence - Revolutionizing Investigative techniques
Presented by Datafusion Sytems
09:25-10:15 Session C
The Italian Way, Chapter 2: AI-Driven Counter-Terrorism Intelligence. See how it works
Presented by SIO09:25-10:15 Session D
From Exposure to Control: Intelligence Across the Cyber Kill Chain
This session explores how law enforcement and government agencies gain end-to-end visibility across the cyber threat lifecycle - from real-world data exposure to controlled, intelligence-led adversarial testing.
It demonstrates how compromised and leaked data can be converted into actionable post-incident intelligence, and how controlled, AI-driven attack simulations can be used to assess organizational readiness before real damage occurs.
Presented by Solutions Engineering10:35-11:25 Session A
From Digital Chaos to Clarity: Unifying all Evidence Layers for Faster, Smarter Case Resolution
Investigations today generate massive digital evidence —from devices, forensics, social media, financials, and OSINT.
PLX, a comprehensive evidence analysis platform, brings all investigation layers together in a single, intuitive view so teams can move fast and stay focused.
With real-time integrations, support for 1,000+ formats, and advanced visualizations, PLX helps surface hidden connections, patterns, and leads.
Powered by CoAnalyst GenAI assistant for judiciary data, natural language search accelerates the path to impactful insights.
From complexity to clarity, the mission outcome you need is now just a few clicks away.
Presented by Penlink10:35-11:25 Session C
The AI Propaganda War: Iran’s Digital Battlefield
Cyabra investigated tens of thousands of fake accounts to uncover how Iran leveraged generative AI to push manipulated war footage to over 145 million viewers during the 2026 conflict. This data-driven session breaks down the anatomy of that cognitive warfare campaign, equipping attendees with actionable strategies to detect coordinated bot behavior, understand deepfake distribution, and neutralize today’s most sophisticated disinformation networks.
Presented by Cyabra
11:30-12:20 Session A
Demonstrating Babel Street Insights for Effective Counterterrorism
This presentation will showcase how Babel Street Insights enhances counterterrorism efforts through advanced open-source intelligence (OSINT) capabilities. Attendees will learn how to utilize Babel Street's persistent search functions and multilingual support to detect extremism, dismantle terror plots, and track financial flows. By transforming diverse data sources into actionable insights, Babel Street Insights empowers analysts to pierce terrorist networks and monitor lone wolves, ensuring the safety of nations and individuals worldwide.
Pat Butler, Executive Vice President, Strategic Engagement, Babel Street11:30-12:20 Session B
Analyst Training: Foundations for Investigator Excellence
Real world training for professionals to acquire theoretical framework, practical skills and core competencies.
Presented by RAKIA Group13:20-14:10 Session A
From Data to Knowledge – the Power of Mass Data Fusion
All-source mass data analysis for actionable intelligence – SCOPE live Demo
Presented by INNOSYSTEC13:20-14:10 Session B
How to Find Crime and Terror Ghosts with Digital Intelligence
Presented by Cognyte13:20-14:10 Session C
Next-Gen OSINT: Leveraging AI for Strategic Intelligence and Decision-Making
In an era of relentless information overload and geopolitical volatility, effective intelligence requires more than monitoring — it requires foresight. DataScouting’s OSINT solutions redefine situational awareness by transforming vast data streams from TV, radio, podcasts, web and social media into proactive intelligence signals rather than reactive alerts. By integrating advanced AI, the platform moves beyond basic data collection to deliver deep contextual analysis and predictive insights, enabling organizations to operate and invest with confidence in high-uncertainty environments. The technology supports decision-making across all levels, from real-time tactical ground truth and crisis management to high-level policy synthesis and the detection and mitigation of coordinated disinformation campaigns.
Stavros Vologiannidis, Founder, Business Development, DataScouting
Nabil Tawil, Business Development Director, DataScouting13:20-14:10 Session D
360 OSINT: investigating a POI from every angle
Presented by Maltego14:15-15:05 Session A
OVINT: The Future of Intelligence for the Video-First Era
As the world shifts from text to video, traditional intelligence methods are falling behind. In this talk, we introduce OVINT (Open Video Intelligence) — a new paradigm for collecting, analyzing, and understanding massive volumes of online video in real time. Discover how next-generation platforms can transform fragmented visual content into actionable insights, enabling governments and organizations to detect threats, monitor events, and make faster, more informed decisions in an increasingly video-driven world.
Presented by Senai14:15-14:40 Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS14:15-15:05 Session C
Shadow Tracking: Unmasking High-Value Targets Through Social Media Intelligence
Stop chasing ghosts. In an era of fragmented digital identities, social media remains the primary leak for operational security (OPSEC) failures. This session demonstrates how our OSINT tool pivots from a single handle or post to map an entire criminal ecosystem. We will showcase real-time identification of threat actors, link analysis between disparate profiles, and how to turn "noise" into a structured intelligence landscape for immediate tactical advantage.
Presented by Prelysis14:15-15:05 Session E
How Blackfusion Bridges the Physical-Digital Divide in Human Intelligence Operations
The traditional boundaries between cyber intelligence, OSINT, and human intelligence are rapidly dissolving in today's interconnected world. This presentation explores how modern intelligence operations require a new paradigm where digital engagement and traditional source operations are part of a continuous spectrum rather than separate disciplines. We'll demonstrate how Blackfusion's fusion architecture enables this convergence by creating a unified intelligence environment where physical and digital intelligence operations inform and enhance each other. Beyond tactical advantages, we'll discuss the strategic implications of this approach for organizational structure, operational doctrine, and the future evolution of intelligence tradecraft in an era where the distinction between online and offline reality continues to blur.
Presented by Blackscore14:40-15:05 Session B
Sentinel AI – from Chaos to early Strategic Decision. Transforming vast, multi-domain media streams into real-time, actionable intelligence, empowering decision-makers to detect, understand, and respond to critical events before others do.
Presented by IPS
15:25-16:05 Session A
Telegram AI based content monitoring and Analysis
How to extract intelligence from millions of chaotic, unstructured inputs, in real time.
Presented by Wave Guard Technologies15:25-16:05 Session B
Unveiling the invisible: SIO advanced intelligence in action
Presented by SIO16:10-17:00 Session A
GenAI Co-Pilots: An Investigator's Best Friend
Presented by Cognyte16:10-17:00 Session B
From Exposure to Control: Intelligence Across the Cyber Kill Chain
This session explores how law enforcement and government agencies gain end-to-end visibility across the cyber threat lifecycle - from real-world data exposure to controlled, intelligence-led adversarial testing.
It demonstrates how compromised and leaked data can be converted into actionable post-incident intelligence, and how controlled, AI-driven attack simulations can be used to assess organizational readiness before real damage occurs.
Presented by Solutions Engineering16:10-17:00 Session C
The Untapped Domain: Turning User-Generated Video – Seized, Shared, and Collected into a Single AI-Driven Intelligence Workflow
Presented by Airis Labs
Wednesday, 3 June 2026
9:10-10:00 Session B
Introducing CoAnalyst-360: Multi-Agent Investigative Platform
This session unveils CoAnalyst-360, a multi-agent intelligence platform that redefines how investigative workflows are executed end to end.
Built on orchestrated AI agents, CoAnalyst 360 autonomously interprets investigative goals, performs reasoning, and generates insights across OSINT, digital evidence, and forensic data.
It enables analysts to define objectives in natural language, with the platform translating intent and executing complete workflows into a full investigation with structured, traceable, and explainable reports.
Attendees will explore how this agent-driven platform adapts to real-world missions and transforms digital intelligence operations at scale.
Presented by Penlink9:10-10:00 Session C
Revolutionizing Data Analytics with AI for Law Enforcement
Presented by Rayzone Group9:10-10:00 Session D
GEO Intelligence for Modern Law Enforcement
Integrating Multi-Source Intelligence on a Single Operational Map
Presented by RAKIA Group13:00-13:40 Session A
Hey Google, buy me DPI: How ML creates superpower to make everything transparent
This is a tool that promotes fair competition. Globally. Digital Taxation is not just a fiscal mechanism — it’s a strategic tool for ensuring fairness in the digital economy. Powered by DPI Inline, this solution offers governments real-time visibility into the scale and nature of foreign digital service consumption within national borders. It enables regulators to understand how global platforms operate, quantify their footprint, and enforce tax obligations based on actual usage. Beyond taxation, it provides a foundation for balanced, transparent, and competitive market conditions, where all players — local or international — are subject to the same rules. DPI-based intelligence ensures high accuracy, encrypted traffic visibility, and full alignment with data sovereignty principles.
Alibek Kapsalanov, 7Generation13:00-13:40 Session B
Who Understands the Algorithms Will Control the Future
This presentation explores how algorithms, AI systems, and automated decision engines are no longer just tools, but active forces shaping perception, behavior, and strategic outcomes. As human and machine decision-making become increasingly intertwined, power shifts from those who control infrastructure to those who understand how influence, narratives, and optimization models drive real-world actions. The session will examine how this impacts cybersecurity, intelligence, business, and national security, and why the next competitive advantage will come from mastering human–algorithm dynamics, not just technical defense.
Presented by Penlink13:00-13:40 Session C
AI Intellectus Ecosystem: Integrating Intelligence Systems for Operational Impact
Ivan Poczynok, Presales Manager & Nicholas Loulloudes, CTO, TRG13:00-13:40 Session F
Tracking FSB operatives with OSINT
Presented by OSINT Industries13:45-14:30 Session A
Seamless integration of Voice Enrichment into SCOPE – the Analytics and Knowledge Hub
Presented by INNOSYSTEC & Phonexia13:45-14:30 Session B
Target De-Anonymization: Leveraging Social OSINT to Disrupt Criminal Networks
Intelligence is useless if it doesn't lead to disruption. This LEA-focused session deep dives into the transition from digital monitoring to physical intervention. Learn how to bypass common obfuscation techniques used by organized crime on social platforms. We will demonstrate through a simulated case study how social media OSINT provides the "missing link" in encrypted communication investigations, allowing agencies to identify, locate, and neutralize threats before they escalate.
Presented by Prelysis13:45-14:30 Session C
Digital Convergence: Unveiling Hidden Networks Through Blackfusion's Integration of Geolocation, Social Media Intelligence, and Cross-Platform Identifiers
Traditional intelligence approaches often miss critical connections hidden across fragmented digital identities and physical movements. This session reveals how Blackfusion's advanced correlation engine integrates facial recognition, geolocation data, and social media intelligence to expose previously invisible networks. Through real-world examples, we'll demonstrate how our platform automatically resolves identities across platforms using multi-modal biometric matching, maps behavioral patterns, and visualizes complex relationships between online and offline activities. Discover how leading agencies are leveraging these capabilities to accelerate investigations and generate actionable intelligence from seemingly disconnected data points that bridge the gap between faces captured in surveillance footage and digital footprints across multiple platforms.
Presented by Blackscore15:00-15:40
AI in OSINT Investigations: From Hype to Control
AI is transforming OSINT - but for law enforcement and national security, speed without control is a risk. In scenarios like monitoring the online information space around elections, how do we apply AI to noisy, unstructured, and potentially deceptive data? We will show a practical EU-grounded approach through real Use Cases.
Mathijs Homminga, CTO, Web-IQ
15:45-16:25 Session B
From Data Overload to Intelligence Advantage: How AI is Reshaping OSINT Exploitation
Presented by CHAPSVISION16:30-17:15 Session A
Leveraging OSINT 0-days to investigate a person of interest
When most people think of OSINT, they often associate it with basic Google searches or web scraping. However, OSINT is much more than that, it involves a diverse set of techniques that go far beyond surface-level information gathering.
One powerful but often overlooked method is reverse engineering. In this talk, we will explore how reverse engineering, alongside other advanced OSINT techniques, can be leveraged to uncover hidden information and identify criminal activities.
Sylvain HAJRI, Epieos16:30-17:15 Session B
Cognitive Fusion for National Security: A Technology-Agnostic Intelligence Ecosystem
Building upon the foundational principles of some of the pioneering digital governance and data fusion concepts, our Data Fusion Platform explores the implementation of a technology-agnostic intelligence ecosystem designed for enhanced public safety and secure data exchange. We delve into a fusion-based concept that prioritizes seamless integration across diverse intelligence disciplines, leveraging the transformative power of Artificial Intelligence and Generative AI agents to optimize military, governmental and citizen workflows. This ecosystem allows for a secure and auditable architecture underpinned augmented intelligence and machine learning algorithms, capable of connecting and harmonizing data from any sensor or technological source. Our focus is on providing a resilient, interoperable, and ethically sound intelligence framework that empowers decision-makers with actionable insights while upholding the highest standards of security and privacy.
Süleyman Serkan Yıldız, InterProbe16:30-17:15 Session C
Uncovering What OSINT Reveals About the US–Iran Conflict with Maltego
Presented by Maltego
Thursday, 4 June 2026
8:30-9:10 Session A
De-anonymization and Content Extraction in Cyber Operations
An overview of de-anonymization and content extraction tactics to unmask and track cyber-criminals. Join us to discover how to turn the tables on scammers.
Presented by Megatech Research8:30-9:10 Session B
Sovereign Cognitive AI: Agents Building Real-Time Investigation Graphs at Scale
How do you find a needle in a haystack when the haystack consists of petabytes of video, audio, text, and communication logs from heterogeneous sources? The answer lies in dynamic, agent-based graph construction.
This session presents an on-premise, sovereign AI solution built around a two-layer intelligence architecture. A high-speed analytical layer preprocesses massive volumes of unstructured data—video, images, audio, text—as well as structured interaction logs such as calls, transactions, and event records.
Above this, a cognitive layer of AI agents operates continuously or on demand, starting from investigative seeds or triggers to autonomously correlate signals across sources.
Rather than attempting to materialize a global graph, the system generates ephemeral, high-fidelity, multi-layer investigation graphs tailored to specific cases. These graphs fuse multimedia intelligence, social and digital activity, and structured network data, enabling scalable real-time link analysis and investigative reasoning while preserving full data sovereignty.
David Greco, Chief Data Architect, Agile Lab
Irene Donato, Lead Data Scientist, Agile Lab
09:15-10:00 Session A
Hunting with OSINT: Identify, Investigate, Monitor and Analyze
Join renowned OSINT expert and investigator Nico Dekens as he walks through a real-world OSINT investigation — from zero to insight. You'll see how to start with a single digital breadcrumb and follow it through to a detailed understanding of your target.
Presented by ShadowDragon
11:00-11:40 Session A
OSINT & Media Monitoring with Intelion
In this session we will show how Intelion can be used to monitor the international public OSINT news space (broadcast and Internet), find specific keywords as well as the current sentiment regarding certain news topics. We will also show its alarm, summary, report and automated workflow functionalities.
Presented by ISID11:00-11:40 Session B
Brain: The Analytical Mind of Security
Modern security failures are rarely caused by a lack of data they result from late or incomplete analysis.
Through centralized data integration, AI-driven behavioral analysis, and predictive forecasting, Brain enables agencies to move beyond incident response and toward early threat detection, risk anticipation, and strategic control.
Presented by Solutions Engineering11:00-11:40 Session C
The Intelligence Mosaic in the AI Era:
How OSINT, Data Fusion, and AI Agents Enable Real-Time Intelligence for Decision Makers
Presented by RAKIA11:45-12:30 Session A
From Open-Source Signals to Operational Warning
Multilingual OSINT for Sanctions Evasion, Illicit Networks, and Critical Infrastructure Threat Monitoring
Semantic Visions applies multilingual OSINT as an external sensing and decision-support layer that helps analysts and investigators turn fragmented open-source signals into earlier operational warning. This session shows how Semantic Visions can identify sanctions-evasion patterns, intermediary entities, contested-logistics vulnerabilities, cross-border procurement pathways, and critical infrastructure threat indicators, while also surfacing regional threat patterns and narrative escalation around developing incidents. The result is not more data, but stronger investigative situational awareness, earlier warning, and clearer context for law enforcement and security stakeholders.
Presented by Semantic Vision
11:45-12:30 Session B
Beyond Automation: Building Competence in AI-Driven OSINT
Presented by Insig211:45-12:30 Session C
Multi-modal AI Analysis for Intelligence and Investigations: video, audio, images and text
Presented by ZETTA Critical AI13:00-13:40 Session A
From Data to Decision: A Look into Cutting-Edge OSINT Solutions
Pat Butler, Executive Vice President, Strategic Engagement, Babel Street13:00-13:40 Session B
Modern Fusion Capabilities in the AI space
Presented by Insight Sera
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Tuesday, 2 June 2026
08:30-09:20
A Portable Cyber Threat Detection System that Every Cybersecurity Council Should See
Presented by ClearTrail09:25-10:15
Harnessing Cyber Threat Intelligence for Advanced National Security and Law Enforcement Strategies
This session explores how cutting-edge cyber threat intelligence can enhance national security and law enforcement efforts. We’ll examine how intelligence sourced directly from the cybercrime underground can support criminal investigations, help secure critical infrastructure, and strengthen national cyber resilience. Attendees will gain practical insights into leveraging CTI for proactive threat mitigation and smarter enforcement strategies.
Christian Bungeroth, KELA11:30-12:20
Tracking and Unmasking Cybercriminals Active on Hidden Channels
Sunhyung Shim, S2W14:15-15:05
Cognitive Attack Analytics: Turning OSINT & AI into Actionable Threat Intelligence
Presented by FutureSpace15:25-16:05 Session A
Quantum-Safe Communications in Hostile Environments
Quantum technology is about to revolutionize the world, bringing immense benefits, but also new security threats.
To achieve quantum-safe communication, understanding the cryptographical risks, vulnerable information in hostile environments, and the “harvest now, decrypt later” threats to state secrets, is essential. After this session, you will know more about post-quantum cryptography and how to safeguard your communications from the threats.
Niko Keskitalo, Bittium15:25-16:05 Session B
Cyber Security meets TSCM. Reactive vs Proactive
Presented by AcustekWednesday, 3 June 2026
13:45-14:30 Session A
ARGOS: Is my phone infected?
Presented by TopSolution15:00-15:40 Session B
Redefining National Cyber Defense: From Current Threat to AI-Powered Investigations
Join KELA for an in-depth session exploring the evolving cybercrime ecosystem through the lens of our most recent intelligence reports. We’ll unpack key insights from the KELA’s 2025 Cyber Threat Landscape and dive into findings from The Infostealer Epidemic report, highlighting real-world examples, threat actor tactics, and emerging trends that matter to defenders today. The session will wrap with the introduction of the 1st AI-Driven Digital Cyber Analysts—our new AI-powered cyber warriors built to make elite threat intelligence accessible to any organization. You’ll get a first look at how these virtual analysts work in an interactive demo designed to show how your team can act faster, smarter, and with deeper context.
Lin Levy, Ben Kapon, KELA15:45-16:25
Leverage DPI-Based Traffic Visibility and Cyber Defense Features at Hundreds of Gbps Closer to the Wire
Discover a new generation of DPI-based cyber sensors that leverage years of experience in network visibility and cyber defense environments to raise the performance of government-run Security Operations Centers (SOCs). Find out how this DPI-based traffic visibility can combine with SDK-based threat detection capabilities, file inspection and malware detection capabilities AND application-based filtering to provide superior network protection, even when traffic is encrypted.
Nicolas Duteil, PreSales Team Leader, DPI & Traffic Intelligence, Enea16:30-17:15
Title TBA
Presented by FutureSpaceThursday, 4 June 2026
8:30-9:10
Zero Exposure. Full Control. A New Sovereign Security Paradigm
Presented by Blu5 Labs9:15-10:00
Introducing LADOS: The Low Altitude Defense Operating System
Presented by Sentrycs11:00-11:40
DEEPFAKE FORENSICS: DEFENDING OURSELVES AGAINST MULTIPLE THREATS
Synthetic imagery and video creation comes in different flavours: Generative Adversarial Networks, diffusion models, text-to-image generators, image-to-image generators and AI integration in popular off the shelf image and video editors (such as Adobe Photoshop, Premiere etc.). Each of these may require different detection strategies. In this presentation we will discuss and demonstrate the typical forensic workflow for detecting deepfakes, including metadata analysis, processing history, geometrical analysis and AI based detection
Emi Polito, CFVA, Forensic Analyst, Amped Software11:45-12:30 Session A
Reliable Secure Communication Over Open Channels
Presented by Protelion13:00-13:40 Session A
POS (Persona Orchestrator Sandbox) One Dashboard .one operator launch and control hundreds of session simultaneously via secure proxy
Presented by ESPY
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 2 June 2026
09:25-10:15
Crypto Investigations: Operational Insights from the AI Intellectus Ecosystem
Martin Alcantara, Marketing Manager & Nicholas Loulloudes, CTO, TRG10:35-11:25
Next-generation Hybrid cellular locator
Presented by Septier11:30-12:20 Session B
Beyond Breaches: Leveraging Compromised Credentials in OSINT and DarkINT Investigations
This session explores how breached records and other datasets with compromised PII gathered from the Deep and Dark Web can significantly enhance corporate and law enforcement investigations. We will begin by exploring the various types of breached datasets from hacked databases and combolists to stealer logs and scrapes. We will then provide insights into where these datasets can be located and highlight the critical information that can be extracted from them. Finally, we will demonstrate the practical application of compromised records in a live investigation in which we track down one of the FBI’s Ten Most Wanted individuals.
Matteo Tomasini, Founder & CTO at District 4 Labs13:20-14:10 Session A
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
Lindsay Whyte, Regional Director, DarkOwl, LLC14:15-15:05
How criminals launder crypto (Live Demo)
Crypto criminals use many different methods to launder dirty money through crypto.
Lorne Lantz, CEO of Breadcrumbs will demo these methods including swaps/bridges/mixers, and educate on how you can trace through these obfuscation methods.
Presented by Breadcrumbs
Wednesday, 3 June 2026
13:00-13:40
“Stargetz – Unmasking Starlink Terminal Users”
Starlink users often believe satellite connectivity makes them invisible. This session demonstrates how that assumption breaks down, revealing methods to uncover user location and link activity to real-world identities.
Presented by Target TeamThursday, 4 June 2026
08:30-09:10
Saved as 'Boss': How Phone Contacts Expose Your Identity
A former NATO intelligence lead demonstrates how systematically combining data from infostealers with common OSINT sources creates a powerful tool for comprehensive analysis of persons of interest. Through a practical demonstration, he shows how ordinary contact details can lead to revealing entire networks of relationships, professional affiliations, international connections, and additional context.
Integration with public registries, social media, and leaked credential databases can reveal a subject's comprehensive profile including their financial status, professional activities, and hidden connections. Beyond investigation techniques, you'll learn how infostealers can threaten your own organization's security and why you should handle your colleagues' phone numbers with caution.
Petr Vancl Hochberger, Head of Marketing and Business Development, TOVEK
Track 6: Mobile Signal Intercept Product Training and Presentations
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 2 June 2026
8:30-9:20 Seminar Session
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies8:30-9:20 Session B
On-the-Move Interception and Direction Finding of 60 RF Channels with a Mobile Monitoring Receiver
This presentation will introduce Novator Solutions' mobile monitoring receiver and direction finder, an out-of-the-box solution for on-the-move signal interception and direction finding of push-to-talk radio communications. Designed for rapid deployment on any vehicle platform with minimal preparation, this system enables users to quickly establish mobile monitoring capabilities in dynamic environments.
We will also highlight the role of channelizer technology in enabling the system to handle 60 simultaneous channels for monitoring, listening, and recording analogue audio communications. Additionally, the solution supports four IQ recording channels, providing comprehensive data capture for signal analysis and intelligence gathering.
Jeremy Twaits, Technical Marketing Manager, Novator Solutions AB9:25-10:15 Session B
A Deep Dive into Mobile Exploitation - A Full Chain Overview
Presented by Secfence
10:35-11:25 Session A
Title TBA
Presented by Kratos11:30-12:30 Session A
From Sensors to Knowledge: Fusing tactical and strategic assets for superior satellite communications intelligence
Presented by Rohde & Schwarz11:30-12:20 Session B
Measurement instruments for Wi-Fi, Bluetooth – SmartTags, and Cellular
Presented by S.E.A. Science & Engineering Applications Datentechnik GmbH13:20-14:10 Session A
Smart Solution for Smart Devices
Mobile devices are intimately aware of criminals’ habits, movements, conversations, and connections. A versatile toolbox supporting multiple platforms and diverse engagement approaches enables LEAs to act discreetly, providing them a decisive advantage in time-sensitive and covert operations.
Presented by RCS14:15-15:05
From Smart Homes to Smart Evidence: Navigating Zigbee Mesh
Zigbee, built on IEEE 802.15.4, is the backbone of many smart-home and building-automation systems. This session demystifies its core security model, focusing on the Trust Center, shared network keys, and per-device link keys. We show how weaknesses and misconfigurations commonly expose deployments. We explain practical data-harvesting techniques such as passive RF capture, topology mapping, and targeted device interrogation. Legal aspects and chain-of-custody requirements are also covered. We demonstrate how traffic patterns can reveal occupancy and behavior, and how to maximize evidentiary value without disrupting critical services. The session balances technical clarity with investigative pragmatism, giving law enforcement actionable insights for search, seizure, and forensic workflows in Zigbee environments.
Ondrej Suffner, Accenture15:25-16:05
Measurement instruments for Wi-Fi, Bluetooth – SmartTags, and Cellular
Presented by S.E.A. Science & Engineering Applications Datentechnik GmbH16:10-17:00
Securing Your Mobile World from Surveillance Threats. A deep dive into unmasking and countering IMSI Catchers with Cutting-Edge solutions
Presented by NeoSoft
Wednesday, 3 June 2026
9:10-9:30
Best Practices & Latest Innovations for Field Missions
Presented by Cognyte9:30-10:00
Dark Skies: Unlocking the Hidden Intelligence Potential in Satellite Communications
Presented by Cognyte15:45-16:14
AI-Driven Audio Clarity: Enhancing Speech Extraction from Noisy Tactical Recordings
RCS introduces an innovative forensic audio processing suite that leverages AI and Spatialized Deep Neural Networks to extract speech from recordings with significant background noise and interference. The demonstration will highlight key applications, including recordings from microphone arrays in open spaces and from single microphone devices or signal captures.
Presented by RCS16:30-17:15
Unlocking Hidden Targets: Harnessing Geo-Intelligence for Smarter Investigations.
Discover how new types of marketing data are revealing their full potential in investigative practices—driving a powerful shift that enables precise target identification, deeper understanding of personal networks, and dynamic, cross-border insights.
Presented by RCSThursday, 4 June 2026
8:30-9:10
Smartphone-Only Edge AI Solutions for Surveillance and Tactical Operations
Presented by Coverty
Track 7: Electronic Surveillance Training and Product Presentations
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Wednesday, 3 June 2026
13:00-13:40 Session A
Crime-as-a-Service: The Evolution of Crime and How Data with AI Can Spot Them
Presented by SIO13:00-13:40 Session B
Innovative Audio Surveillance for Moving Targets in Large Areas
Presented by Commesh15:00-15:40 Session A
Covert Drilling
Covert drilling is a deployment methodology for installing miniature surveillance equipment through solid building materials without access to the target side whilst generating a minimum of noise.
Because sometimes the target is not connected and takes all the right measures to prevent access to his house or premises.
Our complete solution enables you to install Audio and Video surveillance equipment through any building material.
With our equipment you can install video surveillance from 0,25mm for full frame video.
Presented by Caminos15:00-15:40 Session B
Mastering Data Empowering Intelligence
Presented by Elbit15:45-16:25 Session A
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform.
Use cases and demonstration.
Presented by AREAThursday, 4 June 2026
9:15-10:00
Redefining Intelligence Production from VISINT for modern operations
As threats evolve and environments grow more complex, visual intelligence must adapt. This session explores how advanced visual sources, AI-driven analysis, and remote operational capabilities are reshaping how agencies generate timely and actionable intelligence.
Presented by Interionet11:00-11:40
Innovative technologies for covert access to vehicles for Law Enforcement and Service applications
Presented by AG Group 007
Track 8: 5G Lawful Interception Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 2 June 2026
9:25-10:15
Understanding 5G/5GA/6G LI for Investigators
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
13:20-14:10
Enabling flexible mission sets for Tactical Edge Ops
Octasic’s compact mission-ready CSS systems are engineered to support the evolving realities of modern SIGINT. With native 5G SA capabilities these modular designs adapt seamlessly across portable, vehicular, and airborne deployments. Built for speed, stealth and precision targeting – these systems can go wherever the mission takes you.
Presented by Octasic15:25-16:05
Building a tech ecosystem for digital investigation
Presented by Group 2000 x Forensic Analytics16:10-17:00
Full spectrum intelligence: from lawful intercept to OSINT
Presented by Rohde & Schwarz
Wednesday, 3 June 2026
09:10-10:00 Session B
Survival of IMSI-catchers in 5G Networks
With transition to 5G Mobile Networks, 3GPP has introduced advanced security mechanisms that significantly increase resistance against rogue base stations – effectively shutting down conventional IMSI catchers. Nexburg’s 5G ID Associator empowers intelligence services, agencies and police to overcome these challenges, enabling the continued and effective use of IMSI-catcher capabilities in 5G and future mobile networks. The solution is fully aligned with 3GPP standards and delivers advanced functionality through modular options, allowing adaptation to country-specific requirements while maintaining maximum integration flexibility.
Presented by Nexburg13:00-13:40 Session A
Unlocking Passive Location Accuracy: An LEA Goal, A Telco Reality
Explore cutting-edge passive geolocation techniques for precise targeted and bulk mobile tracking, outlining the essential operational shifts required from telcos to enable enhanced law enforcement capabilities.
Chris Young, Product Manager, BAE Systems Digital Intelligence13:00-13:40 Session B
Seamless Monitoring of Inbound Roaming Voice
Mobile operators are adopting modern roaming architectures, based on S8HR and N9HR (5G-SA), to simplify deployment and accelerate time-to-market. However, in consequence intercepting IMS voice calls (VoLTE/VoNR) from visitors in your country can present technical challenges. Nexburg tackles these challenges with a comprehensive lawful interception solution of mobile roamers, fully compatible with both S8HR and N9HR deployments. This ensures mobile operators maintain full regulatory compliance while enjoying operational flexibility in today’s roaming environments.
Presented by Nexburg15:45-16:25
Command the spectrum from above: Modular Airborne SIGINT with AI and Native 5G SA
Octasic's CSS portfolio is equipped with native 5G SA, AI-enhanced scanning and is airborne-enabled. Designed for fixed-wing, rotary, and drone-based platforms, Octasic’s airborne systems deliver real-time intelligence at scale - surveying, identifying and geolocating faster than ever.
Presented by Octasic16:30-17:15
Optimized solution for COMINT in today’s and tomorrow’s 5G networks
New 2G/3G/4G/5G platform by EXFO for catching and DF purposes and complete solution for 5G SA ID resolution
Presented by EXFOThursday, 4 June 2026
08:30-09:00
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance.
Use cases and demonstration.
Presented by AREA
Training Seminars Led by Law Enforcment Officers and Ph.D Computer Scientists
Tuesday, 2 June 2026
Seminar #1
08:30-15:05Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-09:20Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Seminar #3
09:25-10:15Understanding 5G/5GA/6G LI for Investigators
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesThis session addresses the challenges facing law enforcement and ISS vendors responsible for intercept on 5G networks.
Seminar #4
10:35-11:25AI Technology Basics and LEA Use Cases
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThis session gives LEA, intelligence and other practitioners a primer on AI technologies. Topics covered include how AI technology is being leveraged in our industry (e.g., image recognition, classifying unstructured data, natural language processing, document summarization, and more); traditional AI approaches (heuristics, indicators); basics of machine-learning systems (models, training, neural-networking); generative AI systems (OpenAI, Anthropic, Grok, others); the strengths and weaknesses of each AI model; and how the LEA/IA/ISS vendor communities are leveraging AI to increase the efficiency and accuracy of their network data, OSINT, location, image and natural language operations/applications.
Seminar #5
11:30-12:20Generative AI Use-cases and Capabilities for Law Enforcement and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesGenerative AI (GAI) is revolutionizing network data and OSINT analytics – with the end-goal of enabling investigators to effortlessly engage, analyze, visualize large datasets and “connect the dots” that would traditionally require enormous manual effort from teams of analysts and IT personnel. This session will cover the key issues related to GAI platforms: how they are/can be used; what models are available; who are the key players; how to integrate GAI systems with your datasets (RAG); dealing with accuracy and hallucinations; data embeddings and citations; integration standards; data orchestration and more
Seminar #6
13:20-14:10Agentic AI - Deployment Options and Approaches
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThis session will cover Agentic-based AI platforms, the technology and challenges facing LEAs/IAs looking to incorporate Agentic AI platforms in their operations. Topics covered include hosting platform options; small/local model options; operational costs; implementation requirements; security; regulatory considerations; aligning and fine-tuning models; optimizing agentic AI platforms for ISS workflows; and ongoing development advances to watch.
Thursday, 4 June 2026
Seminar #7
8:30-9:15Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #8
10:15-11:00Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #9
11:30-12:15Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police