About Track 1 - Lawful Interception and Criminal Investigations
The full agenda for track 1 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigations
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Threat Detection from Automated OSINT Collection and Analysis
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Training and Product Demonstrations
Track 7: Mobile Location, Surveillance and Signal Intercept Training and Product DemonstrationsTraining Seminars by LEA's and Ph.D Computer Scientists (Tuesday, 2 June 2015)
Track 1: Lawful Interception and Criminal Investigation Training
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
Tuesday, 2 June 2015
10:15-10:45 Addressing the Growing Challenges of Cyber Intelligence
Presented by Equus Technologies11:30-12:30 Demystifying SSL/TOR Interception: Attack case history and state-of-art countermeasures
David Vincenzetti, CEO, Daniele Milan, Operations Manager, Fabrizio Cornelli, QA Manager, Hacking Team13:30-14:30 Signals Intelligence and Interception for DWDM Networks
Presented by NetQuestWednesday, 3 June 2015
9:00-10:00 Session A Offensive Surveillance in Today's Changing, Challenging and Dangerous World and Solutions for Law Enforcement
Eric Rabe, Chief Marketing & Communications Officer, Hacking Team9:00-9:30 Session B Finding the Needle in a Haystack: Visualizing Communications Data
Joe Parry, CEO, Cambridge Intelligence9:30-10:00 Session B Newest trends and technologies in Lawful Interception
Presented by trovicor11:30-12:00 Session A Content Filtering - A Technical Answer to Data Growth
Presented by Utimaco TS GmbH11:30-12:00 Session B The future of mobile security: making sense of 5G, SDN and technology innovation
Presented by Cambridge Consultants12:00-12:30 Session A Enhancing mobile forensic investigations with data from the cloud
Joachim Müller, Cellebrite12:00-12:30 Session B Long Range Target...Face The Next Threat...
Paul Nurflus, Vice President Business Development, Septier Communications13:30-14:00 Session A Lawful Interception in 4G Wireless Networks
Presented by Utimaco TS GmbH14:00-14:30 Session A Understanding the challenge of full VoLTE visibility on 10/40/100G interfaces in the mobile core network
Presented by Fiberblaze13:30-14:30 Session C Signals Intelligence and Interception for DWDM Networks
Presented by NetQuest14:00-14:30 Session B Deep Packet Inspection in Clouds and NFV
Tony Rutkowski, Yaana Technologies15:00-16:00 Session A ETSI/TC LI Standards Update: Part 1
Gerald McQuaid, Chairman, ETSI/TC
Alex Leadbeater, Chairman, 3GPP SA3LI
Carmine Rizzo, ETSI
Tony Rutkowski, VP Regulatory, Yaana Technologies15:00-15:30 Session B Voice Biometry and Speech Analytics for Intelligence, LEA and Police Forces
Radim Kudla, head of BD, Phonexia15:30-16:00 Session B Modern Technologies for Passive Interception of Wireless Traffic
Oleg Odintsov, CJSC, NORSI-TRANS16:15-17:15 Session A ETSI/TC LI Standards Update: Part 2
Gerald McQuaid, Chairman, ETSI/TC
Alex Leadbeater, Chairman, 3GPP SA3LI
Carmine Rizzo, ETSI
Tony Rutkowski, VP Regulatory, Yaana Technologies16:15-16:45 Session B Network Visibility Challenges in the LI Arena
Hanan Klainer, VP Sales, EMEA at Interface Masters Technologies, Interface Masters Technologies, Inc.16:45-17:15 Session B Optimized high-performance traffic monitoring and inspection platforms
Opher Reviv, Senior Technical Expert, EZchipThursday, 4 June 2015
8:30-9:00 Seamless Traffic Interception by means of hand-held Appliances and Packet Capture
F. Hens, CTO, ALBEDO Telecom9:00-9:30 100GE network traffic interception
Petr Kaštovský, INVEA-TECH10:30-11:00 100 Gbit Capture is Different
Packet capture at 100 Gbit introduces challenges for current server technology. The ingest rate leaves little time for packet inspection. Potential solutions include load balancing into multiple servers or offloading some of the packet inspection to the adapter. CSPi, via its Myricom Product Line, is the leading supplier of specialized adapters into lawful intercept. Our latest adapters at 40, 100, and soon 400 Gbit can both load balance and inspect (filter, classify, time stamp).
Craig Lund, Myricom Product Line CTO, CSPI12:00-13:00 Bitcoin Protocols Interception
Vladimir Vesely, Researcher, FIT-BUT, Brno University of TechnologyNote: Lawful Interception and Criminal Investigation Product Training and Demonstrations Scheduled in Track 5