ISS World North America is the world's largest gathering of North American Law Enforcement, Homeland Security, Defense, Public Safety and other members of the Government Intelligence Community as well as Telecom Operators responsible for cyber threat intelligence gathering, DarkNet monitoring, lawful interception, and cybercrime investigations.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism, and other criminal activities conducted over today's Telecommunications networks, the Internet, and Social Networks.
Track 1: Lawful Interception and Social Network Monitoring Training
Track 2: LEA, Defense and Intelligence Gathering Product Training
Track 3: Social Network Monitoring, OSINT and Data Analytics Product Training
Track 4: Investigating Dark Web and Crytptocurrency Transaction Traceback
Track 5: Cyber Threat Detection and Product Training
Track 6: Mobile Signal Intercept and Electronic Surveillance Product Training
Track 7: 5G Lawful Interception Training
ISS World North America 2023 Agenda and Registration
will be updated July 2023ISS World North America 2022 Program Agenda
Online Social Media and Internet Investigations
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Practitioners Guide to Internet Investigations
(6 Classroom Hours)
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
(1 Classroom Hour)
Presented by: Dr. Jerry Lucas, President, TeleStrategies
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Defeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
(1 Classroom Hours)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
A Real World Look at Investigations in the Dark Web
(6 Classroom Hours)
Presented by: Todd G. Shipley, CFE, CFCE, and Co-Author of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and Retired Investigator, Reno NV, Police Department
The Pursuit of Financial Crime
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.
Seminar Descriptions At The End of Agenda Posting
ISS World North America 2022 - Agenda at a Glance
ISS World America Exhibit Hours:
Wednesday, November 16, 2022: 10:00 AM-6:00 PM
Thursday, November 17, 2022: 9:30 AM-12:30 PMWednesday, November 16, 2022
8:15-8:30 AM Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies8:30-9:00 AM Top Ten Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World North America has Solutions
Dr. Jerry Lucas, President, TeleStrategies
Track 1: Lawful Interception and Social Network Monitoring Training
Tuesday, November 15, 2022
9:00 AM-5:00 PM
Online Social Media and Internet Investigations
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators1:30-2:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies2:45-3:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know4:00-5:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox11:30 AM-12:30 PM
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies1:30-2:30 PM
Locating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies4:00-5:00 PM
Machine Language Translation for Government
RWS Group’s Bart Mączyński will talk about utilizing machine translation by government agencies. He will review the emerging machine translation use cases and share best practices for improving translation outcomes in the Federal Government.
Bart Maczynski, VP Machine Learning, Solutions Consulting, Language WeaverWednesday, November 16, 2022
1:00-1:45 PM
Investigation of Cyber Attacks Leveraging "False Flags"
Presented by Resecurity
Track 2: LEA, Defense and Intelligence Gathering Product Demonstrations
* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, November 15, 2022
9:00 AM-5:00 PM
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.9:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking1:30-2:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies2:45-3:45
Advanced Techniques in Tracing Suspects, and lateral problem solving4:00-5:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources9:00-10:00 AM
Every piece of data tells a story - combine and analyze data from any source in your digital investigation
Presented by XCI10:15-11:15
No more USBs: How to do inter-agency file sharing, collaboration and warrant management faster and with military-grade security
In law enforcement collaboration, there are times when minutes matter. DekkoGov is an ultra-secure end-to-end encrypted platform developed specifically to meet the needs of law enforcement and others who need to share sensitive information, fast. The platform transfers files of unlimited size easily and securely with a complete audit trail, and it offers live editing and e-signature features as well. This is ideal for sharing intercept, digital surveillance and forensics products, evidence and operational briefs and collaborating on affidavits, warrants, contracts and court documents. Join us to hear how law enforcement agencies on three continents are using DekkoGov to increase information security and reduce their administration burden, freeing officers up to focus on investigations.
Presented by DekkoSecure11:30 AM-12:30 PM
WhatsApp, Telegram, Facebook... how IPS helps you to locate most wanted targets with LI
Presented by IPS1:30-2:30 PM
Precision Cellular Analysis Training Session
Presented by Subsentio AcademyIn this 1-hour session, Law Enforcement investigators will learn basic cellular analysis techniques from former FBI instructors from the FBI CAST program.
The session will include:
- Overview of basic cell phone technology, cell phone investigative techniques, overview of the legal processes and provider specific information.
Wednesday, November 16, 2022
9:10-10:00 AM
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence. Specialized digital tools to get the task done
Presented by AREA9:10-10:00 AM
Target-Centric Analysis with ShadowDragon OSINT Tools
Presented by ShadowDragon1:00-1:45 PM Session A
Combating terrorism, espionage and crime by combining mobile network metadata, mass positioning, and intelligent profiling in real-time
Mohsen Tavakol, Chief Executive Officer, Xolaris
3:15-4:00 PM
Combating terrorism, espionage and crime by combining mobile network metadata, mass positioning, and intelligent profiling in real-time
Oskar Axelsson, Product Manager, Xolaris
4:15-5:00 PM Session A
Modern Advancements in Live Collection and Analysis
Join us as we discuss the ever-changing cyber landscape and spotlight modern advancements in live communications collection. Internet communications expert, Scott Tuma, will highlight how top investigators across the nation are executing live social media intercepts to enhance investigations and identify larger criminal networks faster. Hear how live intel from social media providers can be crucial to solving cases, plus best practices for effective intercepts with real case examples.- Current trends in live collection and analysis
- How today’s savvy investigators are using social media intercepts
- Myths about modern live collection
- Advantages and best practices for live social media intercepts
Presented by PenLink4:15-5:00 PM Session B
The use of technical equipment in hostage situations
Presented by EskanThursday, November 17, 2022
8:30-9:30 AM
Survival of IMSI catchers in 5G Mobile Networks
Presented by Utimaco10:30-11:30 AM Session A
Using GrayKey in Digital Forensics Examinations
Law Enforcement Mobile devices provide a wealth of digital evidence. They can indicate where devices have been, what they’ve done, who they’ve communicated with, when and why. Keeping up with technology is currently a challenge and will remain a challenge for years to come. iOS and Android platforms are constantly being updated on a regular basis, which makes accessing locked and encrypted devices difficult. Staying ahead on the latest applications and artifacts that come from both Android and iOS will be essential. Learn from Grayshift subject matter experts as they provide an overview of GrayKey and how it is used to expedite your investigations for faster case resolution.
- Identify the state of the evidence.
- Properly secure evidence and maintain complete chain of custody.
- Understand the limitations of other mobile forensics tools and acquisition types.
- Differentiate device extractions and understand their impact on criminal investigations.
Presented by Grayshift
10:30-11:30 AM Session B
No more USBs: How to do inter-agency file sharing, collaboration and warrant management faster and with military-grade security
In law enforcement collaboration, there are times when minutes matter. DekkoGov is an ultra-secure end-to-end encrypted platform developed specifically to meet the needs of law enforcement and others who need to share sensitive information, fast. The platform transfers files of unlimited size easily and securely with a complete audit trail, and it offers live editing and e-signature features as well. This is ideal for sharing intercept, digital surveillance and forensics products, evidence and operational briefs and collaborating on affidavits, warrants, contracts and court documents. Join us to hear how law enforcement agencies on three continents are using DekkoGov to increase information security and reduce their administration burden, freeing officers up to focus on investigations.
Presented by DekkoSecure
Track 3: Social Network Monitoring, OSINT and Data Analytics Product Training
* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, November 15, 2022
2:45-3:45 PM
Introducing Search-based Investigative Intelligence for SIGINT, OSINT, Cybersecurity, and Policing
You'll learn how to greatly enhance the possibilities for keeping people, assets, and networks safe with Siren's unique search-based approach to investigations - SIGINT, OSINT, Cyber, and Policing. Some of the data challenges faced by organizations that have deep investigative needs include digital deluge, and siloed data. Siren helps you to rapidly ingest, link, and make massive amounts of data searchable by quickly processing billions of records.
Phil Glod, SirenWednesday, November 16, 2022
9:10-10:00 AM
Automated Analysis of Social Media Networks
Presented by Cobwebs9:10-10:00 AM
Disrupting Transnational Organized Crime: Investigating Cross-Border Cartel Operations
Presented by Fivecast
1:00-1:45 Session A
Mobile, Cloud, and Computer Artifact Synergy with Oxygen Forensic® Detective
When your information collection starts with a cellphone in the field, do you stop there? This presentation will show where to look to ensure no key data is missed. Use credentials extracted from the mobile device to enter cloud accounts with Oxygen Forensic® Cloud Extractor. Then, use Oxygen Forensic® KeyScout to triage computers and capture key evidence, such as iTunes backups, login credentials, CPU memory, and other important artifacts. Afterwards, compile all that multi-source data in one comprehensive view of your target in the Oxygen Forensic® Detective interface. Learning to leverage the complete Oxygen Forensic® Detective suite across all facets of an investigation allows you to triage devices in the field, examine data in the lab, and report on what matters most.
Presented by Oxygen Forensic1:00-1:45 PM Session B
Unraveling a Criminal Syndicate using Lawful Intercept PCAP files
This session will demonstrate how extracting encrypted application metadata from a PCAP file can begin to unravel a criminal syndicate by associating social media posts with specific devices, mapping communication networks, and validating known dark web and cryptocurrency activity.
Presented by Sandvine
2:00-2:45 PM Session A
Introducing Search-based Investigative Intelligence for SIGINT, OSINT, Cybersecurity, and Policing
You'll learn how to greatly enhance the possibilities for keeping people, assets, and networks safe with Siren's unique search-based approach to investigations - SIGINT, OSINT, Cyber, and Policing. Some of the data challenges faced by organizations that have deep investigative needs include digital deluge, and siloed data. Siren helps you to rapidly ingest, link, and make massive amounts of data searchable by quickly processing billions of records.
Phil Glod, Siren3:15-4:00 PM Session A
A light in the darkness of Encrypted Communications. Live Demo of Network Awareness and Network Intelligence platform leveraging the power of content driven metadata
Presented by AREA3:15-4:00 PM Session B
Days to Minutes: The Efficiency of Consolidated OSINT Platforms
Presented by OSINT CombineThursday, November 17, 2022
8:30-9:30 AM
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS
10:30-11:30 AM
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS12:00-1:00 PM
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Track 4: Investigating Dark Web and Cryptocurrency Transactions Traceback
* Note: Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, November 15, 2022
A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department9:00-10:00 AM
The Dark Web, what it is and what it is not10:15-11:15 AM
To TOR or not to TOR11:30-12:30 PM
CryptoCurrency and its use in the Dark Web1:30-2:30 PM
Going Undercover on the Dark Web2:45-3:45 PM
Using web bugs and other technology to locate a suspect4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous useWednesday, November 16, 2022
9:10-10:00 AM
Defeating the Tor Dark Web: The Latest Updates, Evidence Collection, Countermeasures, and Investigation Techniques
Tor has been around for a long time and has proven to be an effective Internet anonymizing protocol for hosting dark web markets and hiding various illegal activities. However, there are techniques that law enforcement can use to reveal the identities of hosts and users. This webinar will bring you up to date on those techniques as well as the latest challenges and issues related to defeating Tor.
The presentation will use recent Tor investigations and cases to illustrate the techniques and challenges.
Dr Gareth Owenson BSc PhD PgC FHEA, Co-Founder and Chief Technology Officer, Searchlight Security Ltd1:00-1:45 PM
Automating Open-Source Intelligence Analysis for Deep and Dark Web Investigations and Cryptocurrency Transactions
Presented by Cobwebs2:00-2:45 PM
Tracing Al-Qaeda's Terrorist Financing Campaigns with Blockchain Intelligence
Presented by Chainalysis4:15-5:00 PM
Technical Exploitation of the Dark Web
Jason Nack, Head of Technology, Bluestone Analytics, a CACI Company
Track 5: Cyber Threat Intelligence Detection and Product Training
* Note: Sessions in this track are only open to Government Attendees
Wednesday, November 16, 2022
2:00-2:45 PM
Case Studies: Using Social Network Analysis to Detect Potential Threats and Uncover New Investigation Leads
Presented by Cobwebs3:15-4:00 PM Session A
Critical Infrastructure Protection: Conducting a National Security Investigation Online:
This session will demonstrate how to monitor Indicators of Compromise across an entire nation-state’s critical infrastructure, identifying compromised sites, determining the bad actors behind the compromise, and mapping out the critical sectors being probed by the bad actors.
Presented by Sandvine3:15-4:00 PM Session B
Using Threat Intelligence to Track Malicious Infrastructure
This session will examine how to curate an intel collection, using tools such as netflow and server data, to identify malicious infrastructure across the internet. Then what can be done with this collection to identify clusters, investigate and disrupt command and control infrastructure that threat groups have established.
The presentation will use real cases to illustrate the techniques and challenges in identifying malicious infrastructure.
Dr Gareth Owenson BSc PhD PgC FHEA, Co-Founder and Chief Technology Officer, Searchlight Security Ltd
Track 6: Mobile Signal Intercept and Electronic Surveillance Product Training
* Note: Sessions in this track are only open to Government Attendees, unless marked otherwise
Tuesday, November 15, 2022
(Open to all attendees)
11:30-12:30 PM
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies(Open to all attendees)
1:30-2:30 PM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategiesWednesday, November 16, 2022
2:00-2:45 PM Session B
Tools for the analysis of cellular, WLAN and Bluetooth communication
Presented by S.E.A. Science & Engineering Applications4:15-5:00 PM
Using Mobile Signals to Corroborate WEBINT Investigations
Presented by Cobwebs TechnologiesThursday, November 17, 2022
8:30-9:30 AM
Live Demo of compact, flexible, and intelligence tactical electronic surveillance fully scalable enabling platform LEMF with synchronized multimedia on a single panel
Presented by AREA
Track 7: 5G Lawful Interception Product Training
Open to all conference attendees
Tuesday, November 15, 2022
9:00-10:00 AM
Understanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Dr. Jerry Lucas, President, TeleStrategies10:15-11:15 AM
Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies2:45-3:45 PM
5G: What is it and what is it not
There are a lot of misconceptions about 5G technology and what it will deliver. Likewise, there are many misconceptions about the security of 5G and 6G. This session looks at the truth behind 5G technology, and the impacts of a virtualized telecom network. Understand what OpenRAN is, and how it differs from current technology in cellular networks, and understand what sits behind every RAN in the 5G core network.
Travis Russell, Oracle Communications4:00-5:00 PM
Lawful Interception of IMS VoLTE Roaming
Presented by UtimacoWednesday, November 16, 2022
2:00-5:00 PM
The Pursuit of Financial Crime
(6 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.As in any business, financial crime is to generate or protect profit. However, also as in any business, the cost and control of illicit networks, local to international, criminal or terror related, impacts effective operation and profitability. Whether working locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.
Each presentation describes the tools and methods criminals and terrorists manipulate financial and business systems as well as the footprints that leave for the financial crimes investigator in their criminal enterprises. Mike will discuss the tools used in criminal networks, the facilitators, in fraud, money laundering and other financial crimes.
This training is applicable to law enforcement, the intelligence community, and the financial and business regulated communities.
2:00-2:45 PM
Key Players: The Money Laundering Professional. We discuss recent investigations describing the role of the “gatekeeper” or “fixer,” where they fit within criminal networks, and their value to any investigation.
3:15-4:00 PM
The Beneficial Ownership Challenge. Toni Gillich will speak to the ever-growing concern in the issues of beneficial ownership and methods used by criminals to make involvement in finance and business. Toni will refer to recent work by the GAO into the use and accuracy of beneficial ownership information, processes used in collection of data, and impact on US policy.
4:15-5:00 PM
Banks, Virtual Assets, and Money Services Businesses. The recent changes in money laundering laws in the United States can have significant impact in investigations around the world. We will discuss recent cases, the changes in the law and the changing role FinCEN.Thursday, November 17, 2022
8:30-1:00 PM
The Pursuit of Financial Crime (Continued)
8:30-9:30 AM
Fundamentals in Case Planning. Financial investigations can be very complicated and time consuming. In this presentation we will discuss the challenges in financial investigations with respect to the technical processes of planning an investigation, violation mapping, and critical thinking processes.
10:30-11:30 AM
Follow the Money: Criminal and terror organizations, small local to large transnational, will likely make use of financial networks to transfer value. In this presentation we will discuss the processes in detail the information footprints that can be found and where that information can be found while conducting your investigations.12:00-1:00 PM
Follow the Value: Financial Crime Schemes in Trade Based Money Laundering. We will discuss two high profile international criminal scheme and where the elements of trade-based money laundering processes were used.
Advanced HI-Tech Cyber Investigation Training Seminars Led by Law Enforcement Officers and Ph.D Computer Scientists
30 classroom training hours, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors. Distinguished ISS World Training Instructor sessions include:
Tuesday, November 15, 2022
Seminar #1
Online Social Media and Internet Investigations
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
This Seminar is open to all attendees but designed for practitioners who are actively collecting evidence and criminal intelligence, identifying unlawful online activity, and mitigating threats.
While Tor is the most common Darknet Service, it is not the only one. And, while Tor Hidden Service servers are the most well-known portion of the Darknet, there are other areas accessible through other tools. The first two sessions will give practitioners the foundation that they need to understand these tools and communities—both how they function and how they are exploited by criminals.
Mobile devices collect, store, and transmit an ever-increasing amount of information that includes handset geolocation information collected from a combination of GPS, Wi-Fi, cellular trilateration, BLE beacons, and ultra-wideband sensors. The afternoon sessions will take a deep dive into information being collected by mobile handsets, operating system developers, and social media companies.
9:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators13:30-14:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies14:45-15:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know16:00-17:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox
Seminar #2
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.9:00-10:00 AM
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigatorsHow it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.
10:15-11:15 AM
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadowsWhat data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.
11:30 AM-12:30 PM
WIFI, geolocation, and Mobile Data traces and trackingA detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.
1:30-2:30 PM
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxiesHow suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.2:45-3:45 PM
Advanced Techniques in Tracing Suspects, and lateral problem solvingUsing innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
4:00-5:00 PM
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how. PART 2 on the final day with free tools to download and keep
Seminar #3
A Real World Look at Investigations in the Dark Web
Presented by: Todd G. Shipley CFE, CFCE, and CoAuthor of, Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired investigator, Reno NV, Police Department9:00-10:00 AM
The Dark Web, what it is and what it is not10:15-11:15 AM
To TOR or not to TOR11:30-12:30 PM
CryptoCurrency and its use in the Dark Web1:30-2:30 PM
Going Undercover on the Dark Web2:45-3:45 PM
Using web bugs and other technology to locate a suspect4:00-5:00 PM
Advanced Dark Web Investigations, identifying the anonymous userSeminar #4
10:15-11:15 AMUnderstanding 2G/3G/4G/5G Infrastructure for Lawful Intercept
Presented by: Dr. Jerry Lucas, President, TeleStrategiesSeminar #5
1:30-2:30 PMUnderstanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators
Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategiesSeminar #6
2:45-3:45 PMDefeating Network Encryption: What Law Enforcement and The Intelligence Community Needs to Understand
Presented by: Dr. Matthew Lucas (Ph.D Computer Science), Vice President, TeleStrategiesThe starting point to defeating encryption is to separate techniques addressing stored encrypted data such as with the Apple iPhone issue. The other challenge is defeating encrypted data in transit (e.g. Telegram, Whatsapp, etc.) or Network Encryption. This webinar is about defeating the later.
When it comes to defeating network encryption the technical community separates into two camps. Those who want to impede law enforcement and the government intelligence community from defeating network encryption: IETF, Silicon Valley and hundreds of third party encryption services. And your camp, those who want to investigate criminals and terrorist group who depend on network
encryption.Seminar # 7
4:00-5:00 PMLocating and Tracking Devices by MAC Addresses and app-based SDKs: Limitations and Emerging OS-based Privacy Measures (e.g., Apple/Google)
Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesSeminar #8
Concerns and Considerations in Financial Crime Investigations
(5 Classroom Hours)
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC. Mike is a former Director of Special Operations with the US Environmental Protection Agency, Office of the Inspector General. He has over 40 years of experience as a US federal investigator and later as an instructor in the intelligence community in financial crime investigations and counter terror finance.As in any business, financial crime is to generate or protect profit. However, also as in any business, the cost and control of illicit networks, local to international, criminal or terror related, impacts effective operation and profitability. Whether working locally or internationally, criminals face a continuous challenge of building structure to protect against the efforts of law enforcement and make their profits useable without fear of getting caught. Criminals will therefore build business and financial structures to mask their activities as well as launder money.
Each presentation describes the tools and methods criminals and terrorists manipulate financial and business systems as well as the footprints that leave for the financial crimes investigator in their criminal enterprises. Mike will discuss the tools used in criminal networks, the facilitators, in fraud, money laundering and other financial crimes.
This training is applicable to law enforcement, the intelligence community, and the financial and business regulated communities.
Wednesday, November 16, 2022
1:30-2:30 PM
Key Players: The Money Laundering Professional. We discuss recent investigations describing the role of the “gatekeeper” or “fixer,” where they fit within criminal networks, and their value to any investigation.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC3:00-4:00 PM
The Beneficial Ownership Challenge. Toni Gillich will speak to the ever-growing concern in the issues of beneficial ownership and methods used by criminals to make involvement in finance and business. Toni will refer to recent work by the GAO into the use and accuracy of beneficial ownership information, processes used in collection of data, and impact on US policy.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC4:15-5:00 PM
Banks, Virtual Assets, and Money Services Businesses. The recent changes in money laundering laws in the United States can have significant impact in investigations around the world. We will discuss recent cases, the changes in the law and the changing role FinCEN.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLCThursday, November 17, 2022
8:30-9:30 AM
Fundamentals in Case Planning. Financial investigations can be very complicated and time consuming. In this presentation we will discuss the challenges in financial investigations with respect to the technical processes of planning an investigation, violation mapping, and critical thinking processes.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC
10:30-11:30 AM
Follow the Money: Criminal and terror organizations, small local to large transnational, will likely make use of financial networks to transfer value. In this presentation we will discuss the processes in detail the information footprints that can be found and where that information can be found while conducting your investigations.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC12:00-1:00 PM
Follow the Value: Financial Crime Schemes in Trade Based Money Laundering. We will discuss two high profile international criminal scheme and where the elements of trade-based money laundering processes were used.
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC