Agenda: 24-26 March 2026
ISS World Middle East and Africa is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Media Intelligence, Artificial Intelligence and Analytics Product Presentations
Track 4: Cybersecurity, Threat Detection and Mitigate Product Presentations
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
Track 6: Mobile Signal Intercept and Electronic Surveillance Presentations
Track 7: 5G Lawful Intercept, Tracking and Forensics Product Presentations
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
Training Seminars Led by Law Enforcement Officers and Ph.D., Computer Scientists
20 classroom training hours, presented by Law Enforcement Officers and Ph.D. Scientists
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(9 classroom hours)Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(1 classroom hours)Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(7 classroom hours)
Tuesday, 24 March 2026
Seminar #1
08:30-15:00Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-09:15Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Seminar #3
09:30-10:15Understanding 5G/5GA/6G LI for Investigators
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesSeminar #4
10:30-11:15AI Technology Basics and LEA Use Cases (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesSeminar #5
11:30-12:15Generative AI Use Cases and Capabilities for Law Enforcement and Intelligence Agencies (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesSeminar #6
13:15-14:00Agentic AI - Deployment Options and Approaches (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThursday, 26 March 2026
Seminar #7
8:30-9:15Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #8
10:15-11:00Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #9
11:30-12:15Understanding the Implications of Online Social Media for OSINT During Critical Incidents (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PolicePre-Conference Sessions Description At The End of Agenda PostinG
ISS World MEA Exhibits Schedule:
Wednesday, 25 March 2026
10:00-18:00
Thursday, 26 March 2026
9:15-13:30
Welcoming Remarks and Top Ten Challenges
Wednesday, 25 March 2026
Welcoming Remarks
8:15-8:30 Tatiana Lucas, ISS World Program Director, TeleStrategies Keynote
8:30-9:00 Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Middle East and Africa has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World MEA Exhibits Schedule:
Wednesday, 25 March 2026
10:00-18:00
Thursday, 26 March 2026
9:15-12:30
Track 1: Lawful Interception and Criminal Investigation Training
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
Tuesday, 24 March 2026
10:30-11:15
Assessing Threats: Intelligence in Pre-War and Active Conflict Zones
Presented by Rayzone13:15-14:00
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will present how its innovative technologies can help Security and Defence organizations respond rapidly to a wide range of threats.
Jan Pavlík, Phonexia16:15-17:00 Session B
Remove unwanted data (e.g. video, encrypted traffic, etc.) at n x 100 Gbps using an ultra-compact server
Presented by NapatechWednesday, 25 March 2026
14:00-14:45
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Jan Pavlík, PhonexiaThursday, 26 March 2026
8:30-9:15 Session A
Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police10:15-11:00 Session A
Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police11:30-12:15 Session A
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 24 March 2026
8:30-9:15 Session B
Proactive Threat Hunting in Cybersecurity Using Generative AI Models and Real-time Threat Intelligence Platforms
Presented by Pertsol9:30-10:15 Session A
Real Intelligence - Revolutionizing Investigative techniques
Presented by Datafusion Systems9:30-10:15 Session B
POS (Persona Orchestrator Sandbox) One Dashboard .one operator launch and control hundreds of session simultaneously via secure proxy
Presented by ESPY10:30-11:15 Session A
Instant deployment of a multi-audio streaming system with live speaker identification.
Presented by Gedion11:30-12:15 Session A
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated, AI enhanced Cyber Intelligence solutions.
A structured case-study
Presented by AREA11:30-12:15 Session B
CDRs of WhatsApp, Signal, Telegram, and other encrypted VoIP messaging applications
Presented by ClearTrail11:30-12:15 Session C
Understanding the Digital Flow: turning Internet Traffic into Investigative Power
Network traffic analysis is a cornerstone of Lawful Interception, but challenges like encryption and diverse applications obscure insights. RCS tools, built on decades of expertise, uncover hidden patterns and integrate cross-technology data for a complete investigative view. The demo shows how this approach transforms investigations in today’s complex digital landscape.
Presented by RCS13:15-14:00 Session A
Unravelling JA3 and JA4+: Global Botnet Detection via Encrypted Traffic Fingerprinting
Network security teams and government defense agencies are leveraging encrypted traffic fingerprinting techniques such as JA3/JA3S to detect C2 servers and global botnet campaigns. Learn what a JA3 fingerprint is and how it is evolving to stay ahead of threat actors. Beyond TLS, what are teams doing to fingerprint traffic encrypted via SSH and QUIC?
Presented by NetQuest13:15-14:00 Session B
Securing High-Risk Operations with Network-Based Strategies
Presented by Intersec14:15-15:00 Session A
AI Empowered LEA Intelligence With Various AI And Fusion Tools
Presented by Sinovatio14:15-15:00 Session B
Decoding the Digital World: Advanced Techniques in Internet and Voice Analysis
Presented by Datafusion Systems14:15-15:00 Session C
AI-Driven Audio Clarity: Enhancing Speech Extraction from Noisy Tactical Recordings
RCS introduces an innovative forensic audio processing suite that leverages AI and Spatialized Deep Neural Networks to extract speech from recordings with significant background noise and interference. The demonstration will highlight key applications, including recordings from microphone arrays in open spaces and from single microphone devices or signal captures.
Presented by RCS14:15-15:00 Session D
The Virtual Intel Officer: AI's Role in Modern Investigations
Presented by Voyager Labs15:15-16:00 Session A
AI Counter-Terrorism Platform with ZDD for Effective Law Enforcement and Threat Detection
High performance Network Analytics with Petabyte Scale & Terabit Speed, powered by Zero Day Defender, AI and LLM.
Shayshi K Bhalla, Director, Systems Engineering (India, SEA & EMEA), Vehere15:15-16:00 Session B
Generative AI-Led Federal Case Study: Intelligent Fusion
Presented by ClearTrail15:15-16:00 Session C
Solving the challenges of Data-Fusion and Validation: Communication Data, live Lawful Interception data, Mobile Forensics extraction and more in a single AI enhanced platform.
Use cases and demonstration.
Presented by AREA15:15-16:00 Session D
Brain: One Platform to Monitor, Analyze, and Predict
React faster. Decide smarter. Operate with precision.
Based on fast real-time access to face recognition and biometric tracking, deep analysis of social networks and telecom traffic, predictive modeling and intelligent search Brain offers a unified environment for decision-making in high-stakes scenarios.
Presented by Solutions Engineering16:15-17:00 Session A
Is this photo lying to me? Amped Authenticate: Forensic Photo and Video Integrity and Authenticity verification.
This session will showcase how Amped Authenticate can help investigators determine whether the footage they're dealing with is original and authentic.
By analyzing the processing history, identifying manipulation and forgeries, and detecting deepfakes, you can ensure that photo and video evidence can be trusted in legal proceedings.
Join us to discover how Amped Authenticate provides powerful tools for forensic experts to detect tampering, verify integrity, and assess the authenticity of visual media.
Presented by Amped Software
16:15-17:00 Session B
How AI is Impacting End-to-End Lawful Intelligence: Potential and Pitfalls
AI technologies—such as video and voice analytics, facial recognition, and automatic number plate recognition—are transforming lawful intelligence by uncovering and amplifying critical information to enhance investigative efficiency. As we deploy next-generation, standards-based platforms, AI offers powerful opportunities but also presents challenges, including biases and the risk of misleading conclusions. This presentation explores the transformative potential of AI in lawful intelligence.
Presented by SS816:15-17:00 Session C
Spyder Space: Movia's Revolutionary Platform for Real-Time Decision Intelligence
Cutting-edge data fusion technology breaking through delayed analytics, powered by the innovative force of AI!
Presented by Movia16:15-17:00 Session D
AI: next-gen metadata intelligence for real-world impact
Presented by IntersecWednesday, 25 March 2026
09:10-10:00 Session A
NSO at 15: From Vision to Industry Leader
Presented by NSO Group13:00-13:45 Session A
Forensic content derived metadata with powerful AI enhanced Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Use cases and demonstration.
Presented by AREA13:00-13:45 Session B
LightSabre: Ultra-Portable Fibre Optics Links Interception and Monitoring System
LightSabre is an advanced, ultra-portable system designed for intercepting and monitoring fibre optics links, including OTN, SDH, and Ethernet. Engineered for intelligence operations, LightSabre ensures seamless, real-time data capture and analysis with unmatched precision. Its compact design and powerful capabilities make it the ideal tool for covert surveillance and network security, providing unparalleled insight into critical communications.
Presented by ClearTrail14:00-14:45 Session A
Smartwatches: Exploring forensic possibilities and limitations of the most popular wearables
Presented by Compelson14:00-14:45 Session C
Demos Series: Homeland Security Use Cases
Presented by Intersec
15:15-16:00 Session A
Spyder Space: Movia's Revolutionary Platform for Real-Time Decision Intelligence
Cutting-edge data fusion technology breaking through delayed analytics, powered by the innovative force of AI!
Presented by Movia15:15-16:00 Session B
VASTech Orca: A cutting-edge, modular, end-to-end system for fibre, satellite, and signals intelligence fusion.
Presented by VASTech16:15-17:00 Session C
AI for Predictive policing and efficient utilisation of resources
Tarun Wig, Co-founder & CEO, Innefu LabsThursday, 26 March 2026
08:30-09:15 Session A
Deep Network Visibility at International Scale Via Enriched Traffic Metadata: IPFIX for OTU4, STM64 and 100GbE Networks
National defense missions require deep signals intelligence from OTN, SDH and Ethernet networks. Learn how unsampled flow-based metadata and IPFIX can provide 100% visibility into telecommunication cables including IP addresses, layer 7 application classification and protocol-specific data from TLS, QUIC, DNS, HTTP, SIP and other traffic types.
Presented by NetQuest08:30-09:15 Session B
Smarter Incident Management with Rapid Threat Hunter
Andreas Arbogast, Chief Information Officer, mh Service10:15-11:00 Session C
Evolving Lawful Interception for the 5G-Driven Future
Presented by Pertsol10:15-11:00 Session D
Revolutionizing DPI with Machine Learning: De-anonymizing VPNs, Crypto, Messengers, Behavior Profiling, ESNI, and More
Discover a groundbreaking approach to Deep Packet Inspection (DPI) through proprietary Machine Learning models designed for next-generation Encrypted Traffic Intelligence. Explore advanced capabilities such as crypto and messenger de-anonymization, user activity detection in any App/website, bulk behavior profiling, OS and platform fingerprinting, VPN detection, and ESNI bypassing. Gain insights from real-world case studies on bulk de-anonymization in the crypto industry (wallet holders, miners, transactions, and exchanges), messengers (calls, group members, chat relating), and more. Learn how ML addresses challenges related to VPNs, obfuscation, frequent updates, and ESNI.
Artem Rychko, Head of Data Science, 7Generation
Track 3: Social Media Intelligence, Artificial Intelligence and Analytics Product Presentations
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
Tuesday, 24 March 2026
08:30-09:15 Session A
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS08:30-09:15 Session C
OSINT & Media Monitoring with Intelion
In this session we will show how Intelion can be used to monitor the international public OSINT news space (broadcast and Internet), find specific keywords as well as the current sentiment regarding certain news topics. We will also show its alarm, summary, report and automated workflow functionalities.
Presented by ISID
09:30-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS09:30-10:15 Session C
Tracking the world's most wanted criminals
Presented by OSINT Industries09:30-10:15 Session D
Unlocking Insights: OSINT Solutions for Intelligence and Strategic Decision-Making
In an era defined by information overload, the ability to monitor and analyze traditional and digital media in real-time, is critical for intelligence and strategic decision-making. DataScouting’s OSINT solutions empower organizations to uncover actionable insights by seamlessly integrating data from diverse sources, including TV, radio, podcasts, online platforms and social media. By leveraging the transformative capabilities of generative AI, these solutions go beyond simple data aggregation to provide deep contextual analysis, pattern recognition and predictive insights. This presentation explores how the synergy of comprehensive media monitoring and generative AI not only enhances situational awareness but also drives informed, proactive strategies in rapidly evolving environments.
Stavros Vologiannidis, Founder, Business Development, DataScouting
Rami El Sabeh, OSINT Consultant, DataScouting10:30-11:15 Session C
Big Data Fusion Driving Seamless Digital Operations Transformation
Experience the power of Big Data Fusion—breaking silos, enhancing decision-making, and driving mission-critical performance. See how seamless data integration and advanced validation unlock precise insights from open and hidden sources for unparalleled operational efficiency.
Presented by RAKIA Group13:15-14:00 Session A
From Data to Knowledge – the Power of Mass Data Fusion
All-source mass data analysis for actionable intelligence
Presented by Innosystec14:15-15:00 Session A
2025 challenges and trends in the Webint world
Presented by Terrogence14:15-15:00 Session B
AI to Optimize Your Risk Assessments and Retargeting
Presented by Evo Tech15:15-16:00
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case in the Red Sea
Presented by IPS16:15-17:00
SinoGPT Simplify Case Investigation, Retrieval, and Business Application Co-Development
Presented by Sinovatio
Wednesday, 25 March 2026
09:10-10:00 Session A
Unlocking the Present: Digital Data's New Era
Discover how the evolving landscape of digital data is reshaping industries today. This presentation explores the tools, strategies, and insights needed to harness the power of data in the modern era and stay ahead in a rapidly changing digital world
Presented by Penlink09:10-10:00 Session B
Is AI delivering in real investigations? A critical look at its adoption and how to make it work
Presented by SIO9:10-10:00 Session C
Social Media De-anonymization in Practice: DNI’s Identity Correlation Engine (ICE)
Presented by DNI Solutions
9:10-10:00 Session D
Defending Reality: The Fight Against Deepfakes, Digital Manipulation, and Bot-Powered Disinformation
Presented by Blackscore13:00-13:45 Session A
One Trusted Solution: CoAnalyst’s Unified Ecosystem – Real Life Case Studies
Explore how CoAnalyst’s integrated data ecosystem provides a trusted solution for complex investigations. This presentation features real-life case studies demonstrating the power of multi-layered data integration to deliver actionable insights with confidence.
Presented by Penlink13:00-13:45 Session B
How to Follow the Terror Funding Trail with OSINT Analysis
Presented by Cognyte13:00-13:45 Session C
How Intelligence Agencies Eliminate Blind Spots with New AI-Powered Recognition Tools
Presented by Corsight
13:00-13:45 Session D
From Translation to Strategic Insight: Advanced On-Premise NMT with Generative LPs for Government Data Sovereignty
In this session, we'll delve into how advanced on-premise Neural Machine Translation, enhanced by Generative Language Processing, serves not just to translate but to provide strategic insights for government entities. We'll discuss the importance of data sovereignty, how these technologies can be securely implemented, and the real-world implications for policy, communication, and strategic planning within government operations.
Presented by RWS14:00-14:45 Session A
Transforming Intelligence Organizations with the World’s First LLM Specifically Developed for Law Enforcement.
Abhishek Sharma, Co-founder & CTO, Innefu Labs14:00-14:45 Session B
Leveraging Maltego's investigation platform to uncover, monitor and track foreign influence threat actors
This session will explore the workflows for infrastructure investigations to understand the scale and scope of foreign influence operations. In addition to attribution, this real and live use-case will also explore capabilities of live monitoring and situational awareness in the context of preemptively identifying where adversaries will attack next.
Presented by Maltego14:00-14:45 Session C
The Virtual Intel Officer: AI’s Role in Modern Investigations
Presented by Voyager Labs15:15-16:00 Session B
How to identify the identity of the threat actors from hidden channels
YK Lee, S2W15:15-16:00 Session C
Beyond the Surface: CYBERMEDIA for Cyberspace monitoring, engagement & investigations covering Social Media, Web, Deep Web, Dark web and social Networks groups
Presented by Euler Data Solutions16:15-17:00 Session A
OSINT in Action: Unlocking Geolocation Insights Through Online Sources
Presented by Cognyte16:15-17:00 Session C
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance.
Use cases and demonstration.
Presented by AREA16:15-17:00 Session D
OSINT in a Polarized World: Geo-political Threats
In a polarized world, Open SourceIntelligence (OSINT) is a vital tool for addressing modern challenges. It helps uncover disinformation, monitor conflicts, and track emerging threats by leveraging publicly available data. This presentation will examine how OSINT can be utilized to monitor and investigate these geo-political threats.
Steve Rivers, VP EMEA Technical Sales, Shadow DragonThursday, 26 March 2026
08:30-09:15 Session A
From Data to Decisions: Leveraging AI for Real-Time Cyber Intelligence in National Security
Presented by SIO08:30-09:15 Session B
Analyst of tomorrow – incorporating co-pilots & Gen-AI Agents into the Intelligence analysis workflow
Noam Zitzman, Cognyte08:30-09:15 Session C
Experience the Future of Raw IP data Analysis for Actionable Intelligence.
Never miss intelligence from WhatsApp, FaceTime and other encrypted calls made by the targets you are investigating and get their behavior on a timeline. Discover Simplicity and Power - No technical expertise required.
Presented by ClearTrail10:15-11:00 Session A
Brain: Universal big data analytics
Rauf Fatullah, Chief Information Officer, Solutions Engineering10:15-11:00 Session B
Leveraging OSINT 0-days to investigate a person of interest
Sylvain HAJRI, Epieos11:30-12:15 Session A
De-anonymization and Content Extraction in Cyber Operations
An overview of de-anonymization and content extraction tactics to unmask and track cyber-criminals. Join us to discover how to turn the tables on scammers.
Presented by Megatech Research11:30-12:15 Session B
Beyond Borders: Mastering Passenger Screening with Big Data Fusion
A practical guide to making passenger screening faster, safer, and more efficient. Through real-world cases, explore how Big Data Fusion tackles key challenges like human error, misinformation, security silos, fake passport detection, and outdated technology—optimizing resources for seamless operations.
Presented by RAKIA Group11:30-12:15 Session C
Intellectus IA Ecosystem: Built for the Intelligence Mindset
Ivan Poczynok, Presales Analyst, TRG12:30-13:15 Session A
Enhanced Synergy of SIGINT and OSINT by proprietary AI: From Crime Investigation to Prevention
Presented by 7Generation12:30-13:15 Session B
The AI-driven Intelligence to monitor and extract meaningful information from Social and Traditional Media to improve national security.
Presented by IPS
Track 4: Cybersecurity Threat Detection and Mitigation Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Tuesday, 24 March 2026
15:15-16:00 Session A
The Italian Way: Advanced AI Surveillance and Strategy vs. Organized Crime
Presented by SIO
16:15-17:00
Keep your Information Safe! New Trends and Developments in Information Protection
Presented by EO SECURITY s.r.o.Wednesday, 25 March 2026
9:10-10:00
Mastering the Digital Landscape: A Deep Dive into OSINT and Fusion Technology
RAKIA presents a step-by-step guide to leveraging OSINT and fusion technology for comprehensive investigations—all within a single interface. Explore real-world applications, including target profiling, mass data collection, darknet exploration, avatar management, fake account detection, no-code crawlers, and advanced link analysis.
Presented by RAKIA Group
15:15-16:00
ARGOS: Is my phone infected?
Presented by Top Solution16:15-17:00
Leverage DPI-Based Traffic Visibility at 100Gbps (1 Server) and App-Based Traffic Filtering to Raise the Performance of Government SOCs & Cyber Investigations
Discover a new generation of DPI-based cyber sensors that leverage years of experience in cyber defense environments to raise the performance of government-run Security Operations Centers (SOCs). Find out how this DPI-based traffic visibility can combine with SDK-based threat detection capabilities AND application-based filtering to provide superior network protection, even when traffic is encrypted.
Nicolas Duteil, Senior Technical Account Manager, DPI & Traffic Intelligence, EneaThursday, 26 March 2026
8:30-9:15
ARGOS: Is my phone infected?
Presented by Top Solution
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Sessions only open to LEA and Government.
Tuesday, 24 March 2026
13:15-14:00
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
Concealing your footprint on the Dark Web is time-consuming and challenging, let alone staying abreast of new apps, sites and the increasingly transient nature of the darknet ecosystem. Using the world's most comprehensive darknet database, DarkOwl VISION shows how darknet data can be exploited for criminal investigations, crypto attribution, and behavioral atmospherics. From TOR to Telegram and beyond, DarkOwl VISION is used by analysts as a transparent productivity tool to enhance any Darknet tasking.
Lindsay Whyte, DarkOWL FZEWednesday, 25 March 2026
15:15-16:00 Session B
Follow The Money Trail: Disrupting Terror & Organized Crime Crypto Operations
Presented by Cognyte16:15-17:00
Crypto Investigations Simplified: From Blockchain to Real-World Insights
Martin Alcantara, Head of Marketing and Customer Success, TRG
Track 6: Mobile Signal Intercept and Electronic Surveillance Presentations
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.Tuesday, 24 March 2026
08:30-09:15
Understanding Mobile 2G, 3G, 4G, 5G NSA & LEO Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies09:30-10:15
Satellite Interception Systems (Thuraya/ISAT/BGAN/IRIDIUM/Bideou).
Presented by Stratign10:30-11:15 Session A
Smart Home and Mobile Devices: Investigative Techniques for Wi-Fi, Bluetooth, Cellular Networks, and Law Enforcement Applications
Digital radio traces are becoming increasingly important in crime prevention and the investigation of criminal acts. While the interrogation of communication data via network operators is standard practice in mobile communications, capturing non-centralized radio traces like Wi-Fi, Bluetooth, peer-to-peer (e.g., AirDrop), and sidelink communications (LTE-V/V2X) requires specialized approaches. These technologies enable swift and precise data collection at crime scenes, even for highly mobile devices that remain in one place only briefly. The presentation also introduces an advanced RF scanner designed to detect and localize hidden smart devices and Bluetooth signals. Capable of identifying Bluetooth beacons, paired and non-paired devices, and extremely weak signals in vehicles or containers, this tool is ideal for law enforcement, customs, border control, and military operations. Equipped with up to five Bluetooth sensors, high-sensitivity directional antennas, and robust signal amplifiers, it reliably detects devices such as smartphones, smartwatches, fitness trackers, and tracking tags. Operated via a user-friendly tablet or smartphone interface, the scanner’s specialized software offers far greater accuracy and versatility than traditional smartphone apps.
Presented by S.E.A. GmbH11:30-12:15 Session A
Similar Trajectories & Hidden Connections Through Telecom Metadata
A demonstration showcasing how telecom metadata, combined with advanced AI algorithms, reveals patterns of life, enhances tracking and minimizes opportunities for criminal escape.
Presented by Intersec11:30-12:15 Session B
Securing Your Mobile World from Surveillance Threats. A deep dive into unmasking and countering IMSI Catchers with Cutting-Edge solutions
In this session, we will explore the threats posed by fake cell towers, such as IMSI Catchers and SMS blasters, when used by non-state actors, along with real-life cases. We will then discuss effective methods for detecting and localizing these threats quickly and accurately.
Finally, we will explore real-time countermeasures, including overloading IMSI Catchers with targeted requests, and strategies to avoid cell-site simulator interception altogether.
Presented by NeoSoft13:15-14:00 Session A
Operational Intelligence Solutions for Countering Terror Threats Across Dynamic Environments
Presented by Cognyte
13:15-14:00 Session B
Lawful Interception of IMS/VoLTE Roaming (S8HR)
With S8HR solution, Utimaco provides a carrier-grade and ETSI/3GPP compliant LI solution. S8HR VoLTE roaming architecture has gained momentum with mobile operators as simpler to implement and offering the fastest time to market. With all mobile traffic traversing the home network, the S8HR has introduced limitations for lawful interception of visiting roamers. Utimaco provides a carrier-grade and ETSI/3GPP compliant LI solution for IMS/VoLTE in visited networks, that comes in two flavors - active (Utimaco LMISF) and passive (S8HR AP).
Presented by Utimaco14:15-15:00 Session A
SatINT - un-masking the SATCOM users
Un-masking the satellite terminals users, believing they are untraceable and un-touchable when using Satellite terminals.
Providing location and PIIs of Starlink, V-SAT, BeiDou, and Tiantong users.
Presented by Targeteam15:15-16:00 Session A
Unlocking Hidden Connections: Harnessing Multi-Source Geo-Intelligence for Smarter Investigations
Discover how multi-source geo-intelligence is reshaping investigations by offering a cross-country perspective that uncovers hidden connections. In this talk, RCS shows how this approach helps investigators pinpoint key starting points and anticipate the next steps, providing a practical and comprehensive solution for tackling complex cases.
Presented by RCS
Wednesday, 25 March 2026
14:00-14:45
2/3/4/5G Airborne Full Passive Direction Finder solution, no IMSI encrypt issues, no difficulties searching&securing.
Presented by REACH15:15-16:00
De-anonymization - A key capability when Privacy Means are abused by Crime and Terror
Un-masking threats by utilizing de-anonymization capabilities to reveal illegal activity, done over VPNs, SATCOM, IM, and more
Presented by Targeteam16:15-17:00
The challenges of remote surveillance over insecure networks, and how to solve them
When doing remote audio/video surveillance, it is often handy to transport the data through the internet and on private networks. These networks should be considered insecure, and you also do not want their owners to know what you are transporting. In this session we will discuss how these issues can be handled using Covidence equipment.
Presented by CovidenceThursday, 26 March 2026
10:15-11:00
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform.
Use cases and demonstration.
Presented by AREA
Track 7: 5G Lawful Interception Product Presentations
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
Tuesday, 24 March 2026
08:30-09:15
Understanding Mobile 2G, 3G, 4G, 5G NSA & LEO Infrastructure, Intercept and Cryptography
TeleStrategies
Dr. Jerry Lucas, President, TeleStrategies09:30-10:15
Transitioning Lawful Interception Network Core Features from 4G to 5G SA to 6G: What's it Looking Like and Challenges Ahead
Dr. Matthew Lucas, VP, TeleStrategies
Wednesday, 25 March 2026
(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
13:00-13:45
Evolution of 5G and the need for stand-alone capabilities on 5G
The world of 5G is advancing rapidly and staying ahead of the curve is critical for operational success. In this session, we’ll share insights into the latest 5G enhancements, and you’ll learn about new mission techniques that operators can leverage every day, on every mission.
Presented by Octasic(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
14:00-14:45
Survival of IMSI-catchers in 5G Networks
Utimaco´s 5G ID Associator solution supports network element vendors and operators in achieving 3GPP compliance. The latest 3GPP releases have introduced several security features that significantly improve resistance against false base stations, making the tactical IMSI catchers/stingrays unusable in 5G networks. The presentation provides a legal standardized approach to overcome this challenge.
Presented by Utimaco(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
16:15-17:00
Tactical Location Analytics: Accelerating Actionable Intelligence from Seized Devices
Field agents often seize multiple devices during missions, each containing critical forensic location data. Without the ability to quickly analyze this time-sensitive information on-site, valuable insights can be lost. For example, identifying the delivery location of a drug shipment before criminals realize their operation is compromised. This presentation discusses how tactical location solutions can empower agents with an efficient solution that runs on a single laptop, requires no internet connection, and features intuitive, drag-and-drop data ingestion. Learn how to transform seized data into real-time actionable intelligence, giving agents the edge to stay ahead.
Presented by SS8Thursday, 26 March 2026
(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
10:15-11:00
5G Security Encrypted Phone, no information leaking any more
Presented by REACH(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
11:30-12:15
Real-life lessons of overcoming 5G SA challenges in field operations
Presented by Cognyte
Training Seminars Led by Law Enforcment Officers and Ph.D Computer Scientists
Tuesday, 24 March 2026
Seminar #1
08:30-15:00Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-09:15Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Seminar #3
09:30-10:15Understanding 5G/5GA/6G LI for Investigators
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesSeminar #4
10:30-11:15AI Technology Basics and LEA Use Cases (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThis session gives LEA, intelligence and other practitioners a primer on AI technologies. Topics covered include how AI technology is being leveraged in our industry (e.g., image recognition, classifying unstructured data, natural language processing, document summarization, and more); traditional AI approaches (heuristics, indicators); basics of machine-learning systems (models, training, neural-networking); generative AI systems (OpenAI, Anthropic, Grok, others); the strengths and weaknesses of each AI model; and how the LEA/IA/ISS vendor communities are leveraging AI to increase the efficiency and accuracy of their network data, OSINT, location, image and natural language operations/applications.
Seminar #5
11:30-12:15Generative AI Use-cases and Capabilities for Law Enforcement and Intelligence Agencies (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesGenerative AI (GAI) is revolutionizing network data and OSINT analytics – with the end-goal of enabling investigators to effortlessly engage, analyze, visualize large datasets and “connect the dots” that would traditionally require enormous manual effort from teams of analysts and IT personnel. This session will cover the key issues related to GAI platforms: how they are/can be used; what models are available; who are the key players; how to integrate GAI systems with your datasets (RAG); dealing with accuracy and hallucinations; data embeddings and citations; integration standards; data orchestration and more
Seminar #6
13:15-14:00Agentic AI - Deployment Options and Approaches (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThis session will cover Agentic-based AI platforms, the technology and challenges facing LEAs/IAs looking to incorporate Agentic AI platforms in their operations. Topics covered include hosting platform options; small/local model options; operational costs; implementation requirements; security; regulatory considerations; aligning and fine-tuning models; optimizing agentic AI platforms for ISS workflows; and ongoing development advances to watch.
Thursday, 26 March 2026
Seminar #7
8:30-9:15Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #8
10:15-11:00Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #9
11:30-12:15Understanding the Implications of Online Social Media for OSINT During Critical Incidents (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police