ISS World Latin America is the world's largest gathering of Central and South American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Hi-Tech Electronic Investigations and Cyber Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet.
Track 1: Lawful Interception And Hi-Tech Investigation Product Presentations
Track 2: Lawful Intercept And Hi-Tech Investigation Product Presentations
Track 3: Social Media Investigations, Monitoring And Cyberthreat Detection Product Presentations
Track 4: Investigating Dark Web and Crypto Currency Transaction Traceback Training
Track 5: Mobile Signal Intercept and Electronic Surveillance Product Presentations
(Certificates of ISS Technology Training Available Upon Request)
Special Training Seminars (13 Classroom Hours) Led by Sworn Law Enforcement Officers
Online Social Media and Internet Investigations
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PolicePractitioners Guide to Internet Investigations
(7 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(Certificates of ISS Technology Training Available Upon Request)
Special Training Seminars (19 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists
Tuesday, 10 October 2023
Seminar #1
09:00-17:00Online Social Media and Internet Investigations (6 Classroom Hours)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceThis one day session provides an up-to-date understanding of how social networking sites work and how members act and interact. Attendees will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.
09:00-10:00
Proxies and VPNs: Identity Concealment and Location Obfuscation
10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
14:45-15:45
Ultra-Wideband Geolocation and Cyber OSINT
16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Seminar #2
09:00-17:00(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.09:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving16:00-17:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resourcesThursday, 12 October 2023
Seminar #3
11:30-12:30(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
WELCOME REMARKS & KEYNOTE:
Wednesday, 11 October 2023
8:15-8:30
Opening Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Latin America has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World Latin America Exhibit Hours:
Wednesday, 11 October 2023
10:00 - 18:00
Thursday, 12 October 2023
9:30 - 12:30
ISS World Latin America 2023 - Agenda at a Glance
Track 1: Lawful Interception And Hi-Tech Investigation Product PresentationsTuesday, 10 October 2023
13:30-14:30
Fighting Crime with Cutting-Edge Speech Technologies
In this session, you will discover the latest voice biometrics and speech recognition capabilities and how these technologies can help law enforcement agencies fight crime efficiently.
Presented by Phonexia16:00-17:00
Cyber Resilience System for DDos
How to reduce vulnerability and neutralize threats to public and critical infrastructure
Presented by MOLLITIAM CYBERINTELLIGENCEThursday, 12 October 2023
8:30-9:30
Portable solutions for radiolocation and analysis of cellular networks
Presented by Rohde & Schwarz8:30-9:30
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Track 2: Lawful Intercept And Hi-Tech Investigation Product Presentations
Tuesday, 10 October 2023
10:15-11:15
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS11:30-12:30 Session A
Digital Enforcement - be the Sovereign of your National Network
Presented by Allot11:30-12:30 Session B
Overcoming the Challenges of Last Mile Tactical Operations
Presented by Rayzone11:30-12:30 Session C
IP-Metadata Generation and Analytics for Actionable Intelligence
Presented by Pertsol14:45-15:45
Top 7 LI use-cases that benefit both LEAs and CSPs
We will share new investigation use-cases that, based on our experience, benefit both LEAs and CSPs
Presented by Matison15:00-16:00
Solution to Intercept Mobile Satellite Services
Presented by Rohde & SchwarzWednesday, 11 October 2023
9:10-10:00 Session A
From Terabit per second network to intelligence: achieve full communication awareness.
Unleash the power of advanced metadata with one cyber intelligence solution.
Use cases and demonstration.
Presented by AREA9:10-10:00 Session B
Location investigations: above and beyond compliance using mass location techniques
Presented by Intersec13:00-14:00 Session A
Lawful Data Ingestion & Analysis
Presented by PenLink13:00-14:00 Session B
The Future of Digital Forensics with FTK 8!
During this session, Exterro will provide an exclusive sneak peek of the highly anticipated FTK 8.0. Prepare to witness the revolutionary new look and feel, along with the latest features designed to streamline and optimize investigations.
Discover the Exciting Updates:
- Experience the New Modern Interface
- Explore the New Super Timeline View.
- Benefit from the Same Reliable, Repeatable Processing.
Presented by Exterro
13:00-14:00 Session C
The Power of Convergence: Strategic Intelligence Integration in Action
Presented by Rayzone14:30-15:30 Session A
One single analysis tool to merge intelligence and digital forensic evidence from multiple sources.
Location, time and instant links between historical Communication Data (CDR/DR/CD), live lawful interception data (IRI/CDR), Social media communication and computer/mobile forensics extraction.
Use cases and demonstration.
Presented by AREA14:30-15:30 Session B
Streamline Data Fusion and Analytics for Accelerated Investigations
Criminals generate data, including metadata from encrypted communications. In this discussion by SS8, you will learn how communication, location and other data sources can be combined and analyzed to provide a visualization of a criminal's activity. Being able to identify the apps they use, who they talk to and where they go allows an agent to easily see a subject of interest's pattern of life.
Presented by SS816:00-17:00
Intelligence Solutions for War crimes, Narco-terrorism, Terrorism, Intelligence and Organized Crime Investigations
Presented by DefentekThursday, 12 October 2023
10:30-11:15 Session A
Lawful Interception and Exfiltration for Smartphones and PCs
Enabling LEAs and intelligence agencies for anonymous, stealth and legal interception and remote control of multiple devices.
Presented by MOLLITIAM CYBERINTELLIGENCE
Track 3: Social Media Investigations, Monitoring And Cyberthreat Detection Product Presentations
Tuesday, 10 October 2023
9:00-10:00 Session A
Optimized use of cyber traffic analysis tools, social networks, measuring opinion, sentiments and mobile devices in real time for the detection, evaluation and prevention of social disorders, violent protests and border control crisis.
Presented by PAT Systems9:00-10:00 Session B
Cyber Threat Intelligence to accelerate online investigations
Presented by IPS10:15-11:15
Complex Use Cases.
Multiple Cyber Intelligence tools coordinated to achieve significative results.
Presented by AREA13:30-4:30
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS14:45-15:45
Follow your suspect down the Rabbit Hole.
Cyber Intelligence platform to go beyond OSINT and collect evidence from online social communities, even in Dark Web. Use cases and demonstration.
Presented by AREA16:00-17:00
Using OSINT with visual link analysis to enhance your investigations
Presented by Maltego
Wednesday, 11 October 2023
9:10-10:00
Beyond LI: Advanced Investigation Fusion Techniques for an Evolving Digital Landscape
As lawful intercept (LI) continues to evolve, the value of LI data is diluted by the increased use of encryption and over-the-top communication. More and more, Law Enforcement professionals must look for ways to enhance LI data by overlaying other sources, such as digital forensics, OSINT, deep/dark web, even blockchain, to gain a more complete picture of target activities and patterns of life. In this workshop, we will explore the benefits and challenges of using a multi-source approach to investigations, show how ML/AI enrichments can help add focus and context, and provide an overview of the tools and techniques that can help you get to outcomes faster in a rapidly evolving digital landscape.
Presented by JSI
13:00-14:00
Facial Discovery: Identifying Unknown Persons with OSINT and AI
Afonso Pena, Director of Sales South America, Clearview AI14:30-15:30
Transforming OSINT, Cyber and POI investigations with the power of Maltego
Presented by Maltego16:00-17:00
Complex OSINT and CSINT in Two Unique Solutions
How to gather high-value intelligence through legal access and analysis of data on the surface, deep, and dark web
Presented by MOLLITIAM CYBERINTELLIGENCEThursday, 12 October 2023
11:30-12:30 Session B
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Track 4: Investigating Dark Web and Crypto Currency Transaction Traceback Training
Wednesday, 11 October 2023
9:10-10:00
Use of darknet for National Intelligence and Law Enforcement purposes
This session details the intelligence available on deep/dark web (DDW) platforms, as well as adjacent platforms such as Telegram and Discord, which can be enriched and used by law enforcement and government officials to reduce criminal activity and simultaneously protect national security. Types of intelligence include: tracing financial transactions to illuminate drug, weapon, human trafficking, and other supply chains that contribute to malicious activity, whether fiat or cryptocurrency transactions; hybrid incidents events that threaten both cyberspace and physical safety; and the kinds of equipment, kits, and material sold by criminal actors that contribute to digital attacks against critical infrastructure and key resources (CIKR), threatening the safety of everyday services.
Steph Shample, Senior Intelligence Analyst, DarkOWL13:00-14:00
How modern criminals move their finances in the Blockchain world
Criminal Finance investigations based on cryptocurrencies and blockchain. Practical case.
Carlos Jaramillo, Account Executive, Chainalysis Latin America, Chainalysis14:30-15:30
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS16:00-17:00
Deanonymizing Extremist Groups on the Dark Web Using OSINT
Extremist groups and forums on the Dark Web are active platforms of radicalization, which can lead to acts of violence. This case study examines the darknet forum Dogolachan, which played an influential role in the tragic Suzanno Massacre in Brazil. We’ll be looking at the specific OSINT tools and techniques used to deanonymize the forum’s admins.
Presented by Social Links
Track 5: Mobile Signal Intercept and Electronic Surveillance Product Presentations
Tuesday, 10 October 2023
9:00-10:00
Solutions for interception of Fixed Satellite services
Presented by Rohde & Schwarz10:15-11:15
Product demo: Mobile tracking with a narcotic investigations
Presented by IntersecWednesday, 11 October 2023
14:30-15:30
Mobile Positioning for Law enforcement agencies, including 5G NSA & 5G SA technology
Presented by Titan Geo16:00-17:00
Power of Location Data: Establish suspects’ whereabouts, track movements, and uncover evidence
Highlighting the transformative potential of location data obtained from mobile network operators (MNOs) in assisting national security and law enforcement agencies. By analyzing the location data from MNOs, security and law enforcement agencies can expedite investigations, enhance operational efficiency, and achieve better outcomes. Join us as we delve into real-world case studies, discuss the benefits and challenges of leveraging MNO location data, and effective use in the pursuit of justice.
Presented by XolarisThursday, 12 October 2023
8:30-9:30
TACTICAL SATELLITE TRAFFIC MONITORING SOLUTION.
Inmarsat I-SAT Phone Pro, Iridium and Thuraya tactical satellite traffic monitoring. Voice, data, and geolocation. SBD (Short Burst Data) of Iridium devices.
Presented by PAT Systems
10:30-11:15 Session A
Tracers. Walk in the shoes of your target.
Electronic Surveillance solutions to covertly investigate on suspects in the field and operate from an all-in-one, AI enabled, centralized cyber intelligence platform. Use cases and demonstration.
Presented by AREA10:30-11:15 Session B
Power of Location Data: Establish suspects’ whereabouts, track movements, and uncover evidence
Highlighting the transformative potential of location data obtained from mobile network operators (MNOs) in assisting national security and law enforcement agencies. By analyzing the location data from MNOs, security and law enforcement agencies can expedite investigations, enhance operational efficiency, and achieve better outcomes. Join us as we delve into real-world case studies, discuss the benefits and challenges of leveraging MNO location data, and effective use in the pursuit of justice.
Presented by Xolaris10:30-11:15 Session C
AI & geolocation for homeland security
Presented by Intersec