About Track 5 - LEA, Defense and Intelligence Analyst Training and Product Demonstrations
The full agenda for track 5 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigations
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Threat Detection from Automated OSINT Collection and Analysis
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Training and Product Demonstrations
Track 7: Mobile Location, Surveillance and Signal Intercept Training and Product DemonstrationsTraining Seminars by LEA's and Ph.D Computer Scientists (Tuesday, 2 June 2015)
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
This training is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 2 June 2015
14:45-15:45 Mini Catcher Unit - Target on the move
Paul Nurflus, Vice President Business Development, Septier CommunicationsWednesday, 3 June 2015
9:00-10:00 Session A Analyzing Multiple Data Sources in One Application
The value of intelligence can multiply as an analyst folds more useful information and intelligence from reputable sources into their investigations. But today, if an analyst needs data from social media, IPDR, field notes, car tracker data, CDR location data, or other intelligence, they must frequently go to different sources, across different platforms and correlate all that information across single or multiple subjects. This session will reveal how one application can ingest data from multiple third party sources allowing for enrichment of already collected intercepted data under a common workspace.
Presented by SS89:00-10:00 Session B Clustering and Early Detection in Surveillance: New Trends in Voice Biometrics
Presented by Agnitio11:30-12:00 Session A Speeding up Criminal Investigations - How to significantly decrease time necessary to identify targets
Presented by trovicor11:30-12:30 Session B Comprehensive Solutions for Digital Surveillance and Data Correlation and Analysis
Presented by RCS S.p.A12:00-12:30 Session A Kidnapping Use-Case - Providing actionable insight from CDR data
Presented by trovicor13:30-14:30 Session A Lawful Interception. Integrated solution for Massive Voice and Data Gathering, Correlation and Decryption
Presented by IPS13:30-14:00 Session B Second Mobile Phone Discovery - An event-based analytical approach
Presented by trovicor13:30-14:00 Session C Stopping the lone wolf terrorist using only web intelligence (WEBINT)
Adiel Horesh, Head of Sales, 3i-MIND15:00-16:00 Session A Collecting, Processing, and Analyzing Multiple Communications Data Sources through One Platform, Pen-Link PLX
Presented by Pen-Link15:00-16:00 Session B Cellebrite - UFED Series: Extract Insights. Focus Investigations - Unparalleled extraction and analysis optimized for lab and field
Presented by Cellebrite15:00-16:00 Session C IP Address Resolution in Mobile Data Networks
Steve Patton, Senior Product Manager, Telesoft Technologies16:15-17:15 Langraf-BIT. The advanced hardware-software solution for processing, storage and retrospective analysis of the Internet protocol data
Roman V. Khokhlov, NORSI-TRANSThursday, 4 June 2015
8:30-9:30 Covert Identity Protection - A Strategic Approach
Presented by GOS Systems10:30-11:00 Session A Kidnapping Use-Case - Providing actionable insight from CDR data
Presented by trovicor10:30-11:30 Session B INVEA-TECH DR and LI Solution Demonstration
Milan Pavlíček, INVEA-TECH11:00-11:30 Session A Second Mobile Phone Discovery - An event-based analytical approach
Presented by trovicor