ISS World Latin America is the world's largest gathering of Central and South American Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Hi-Tech Electronic Investigations and Cyber Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet.
Track 1: Lawful Interception And Hi-Tech Investigation Product Presentations
Track 2: Lawful Intercept And Hi-Tech Investigation Product Presentations
Track 3: Social Media Investigations, Monitoring And Cyberthreat Detection Product Presentations
Track 4: Investigating Dark Web and Crypto Currency Transaction Traceback Training
Track 5: Mobile Signal Intercept and Electronic Surveillance Product Presentations
(Certificates of ISS Technology Training Available Upon Request)
Special Training Seminars (11 Classroom Hours) Led by Sworn Law Enforcement Officers
Online Social Media and Internet Investigations
(6 Classroom Hours)
Presented by: Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PolicePractitioners Guide to Internet Investigations
(7 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceFinancial Crime Investigations and Prevention
(3 Classroom Hours)
Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 33 year US Federal Law Enforcement Officer
(Certificates of ISS Technology Training Available Upon Request)
Special Training Seminars (11 Classroom Hours) Led by Law Enforcement Officers and Ph.D Computer Scientists
Tuesday, 29 October 2024
Seminar #1
09:00-17:00Online Social Media and Internet Investigations (6 Classroom Hours)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceThis one day session provides an up-to-date understanding of how social networking sites work and how members act and interact. Attendees will learn what information is available on various sites and how to integrate that information into criminal investigations and criminal intelligence analysis.
09:00-10:00
Proxies and VPNs: Identity Concealment and Location Obfuscation
10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
11:30-12:30
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
13:30-14:30
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
14:45-15:45
Ultra-Wideband Geolocation and Cyber OSINT
16:00-17:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
Seminar #2
09:00-17:00(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.09:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving16:00-17:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resourcesThursday, 31 October 2024
Seminar #3
8:30-12:30Financial Crime Investigations and Prevention
Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC and retired 33 year US Federal Law Enforcement Officer8:30-9:30 am
Money Laundering Case Study: Operation Fashion Cop10:30-11:30 am
1MBD: Largest Fraud in History11:30- 12:30 pm
Operational Financial Structures Used by Threat Networks.Seminar #3
11:30-12:30(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
WELCOME REMARKS & KEYNOTE:
Wednesday, 30 October 2024
8:15-8:30
Opening Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Latin America has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World Latin America Exhibit Hours:
Wednesday, 30 October 2024
10:00 - 18:00
Thursday, 31 October 2024
9:30 - 12:30
ISS World Latin America 2024 - Agenda at a Glance
Track 1: Lawful Interception And Hi-Tech Investigation Product PresentationsThursday, 31 October 2024
8:30-9:30
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Track 2: Lawful Intercept And Hi-Tech Investigation Product Presentations
(THESE SESSIONS ARE ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Tuesday, 29 October 2024
9:00-10:00 Session A
How to face analysis challenges with integrated Cyber Intelligence solutions: From Electronic Surveillance to Encrypted Communication, using a case-study
“Follow the white rabbit” starting from limited and vague information and reaching focused and reliable evidence. Going into a structured case that focuses on the steps that build knowledge and intelligence information for the LEAs, this case study will replicate a realistic approach of the solution of the investigation with actual and proven technologies.
Presented by AREA09:00-10:00 Session B
Strategic stealth intrusion of Android, IoS, Windows PCs, and Windows & Linux servers.
Presented by INT3L10:15-11:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS10:15-11:15 Session B
Challenges of Multicrime Digitalization
Presented by IAFIS11:30-12:30 Session A
Digital Sovereignty
Presented by Allot11:30-12:30 Session B
Answering the 5W Intelligence Questions Using Advanced Techniques in Multi-Layered Investigation Platform.
Presented by Rayzone Group13:30-14:30
Spyder Space: Revolutionize Your Investigative Processes with our cutting-edge solution! Harnessing Data from Mobile Sources, We Optimize, Analyze, and Craft Powerful Insights!
Presented by MOVIA14:45-15:45
Solving the challenges of Data-Fusion and Validation: Communication Data, live lawful interception data, mobile forensics extraction and more in a single platform. Use cases and demonstration.
Taking the examiner into the real optimization of merging multi-source data with a single advanced correlation analysis platform: CDRs and IPDRs, Lawful Interception, Electronic Surveillance, fiscal reports and payments, vehicle transit, forensic extractions, GPS tracks and more. Introducing a unique and portable tool which can help validate the position of any target using mobile network coverage to enhance the quality and reliability of results.
Presented by AREA
16:00-17:00 Session A
Pinpoint key evidence & solve cases FASTER with the new FTK 8.1
- New intuitive interface design makes it easier for both experienced investigators and non-technical users to navigate within FTK
- Effortlessly pivot through multimedia evidence using FTK’s new image Thumbnail View - Super Timeline visual representation of case evidence helps investigators understand what was happening during an incident or crime
- Filter Panel automatically categorizes artifacts & easily build complex compound filters with Smart Grid
Presented by Exterro
16:00-17:00 Session B
Remote Global Geolocation – By SS7, ADID, and P2P IP
Presented by INT3LWednesday, 30 October 2024
9:10-10:00
How Data Analytics is Changing the Dynamics of Law Enforcement Investigations
Law enforcement agencies are increasingly embracing Big Data technology to enhance their capabilities. In this session, we will explore the leading tech trends that are transforming police work, accelerating investigations, and enabling investigators to solve cases more efficiently than ever before
Presented by Cognyte13:00-14:00 Session A
Leveraging BORDERINT to Safeguard Your National Borders.
Presented by Rayzone Group13:00-14:00 Session B
Discover the cutting-edge, all-phone compatible, cost-effective and successful agent.
Presented by MOVIA14:30-15:30
Next-Generation Monitoring: How Enhance Law Enforcement Operations
Discover how the advanced monitoring is revolutionizing law enforcement. In this talk, we explore how our monitoring center accelerates investigations through real-time speech-to-text, IP interception, and cryptocurrency tracking, helping agencies gather actionable intelligence and deliver court-compliant evidence. Learn how our solution empowers modern investigators to overcome the challenges of today’s complex digital landscape with advanced analytics and AI.
Presented by Cognyte16:00-17:00 Session A
Unleash the intelligence hidden in encrypted communications with the advanced analysis of forensic content derived metadata and powerful Data Fusion. Use cases and demo.
Highlighting two cornerstone concepts essential for a comprehensive intelligence platform. One: the creation and collection of rich metadata form network communications. Two: the analysis and processing of data to extract intelligence and investigative data.
Presented by AREA16:00-17:00 Session B
Deanonymization: Why every digital footprint matters?
Instant messengers and social media have gone from being means of communication to tools used by those who wish to carry out and hide illicit activities of all kinds.
Deanonymizing subjects and organizations and cross-referencing data and profiles will be crucial tools for authorities to track and dismantle criminal networks hiding on these digital platforms.
Learn how to collect every fingerprint to complete your puzzle.
Presented by Prelysis
Track 3: Social Media Investigations, Monitoring And Cyberthreat Detection Product Presentations
(THESE SESSIONS ARE ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Tuesday, 29 October 2024
13:30-14:30
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPS14:45-15:45
Target Profiling and Relationship Mapping: Unlocking Insights with Movia Advanced IP Intelligence
Presented by MOVIA
Wednesday, 30 October 2024
9:10-10:00 Session A
From Data Deluge to Discovery: Leveraging AI to Accelerate Investigations
Lawful intercept and data fusion can provide tremendous investigative potential, but unlocking their full value requires advanced tools. This session explores the rising role AI can play in uncovering hidden patterns and anomalies within your data. Discover how AI can accelerate investigations and improve resourcing, while maintaining compliance with new regulations.
Presented by JSI
9:10-10:00 Session B
The State of Deepfake Detection in 2024: Where and How Bad Actors Are Operating and How to Strike Back
In 2024, the sophistication and accessibility of deepfake technology have escalated, posing significant threats to national security, intelligence operations, and law enforcement efforts. This talk will highlight the geographical hotspots of deepfake activities, the advanced techniques utilized by adversaries, and their typical targets, including high-stakes political events, military conflicts, but also financial crime online such as scams and frauds. Attendees will learn about the latest advancements in deepfake detection, with a focus on Sensity AI's state-of-the-art solutions that integrate advanced AI and deep learning technologies.
Presented by Sensity AI
13:00-14:00
Facial Discovery: Identifying Unknown Persons with OSINT and AI
Clearview AI helps law enforcement and government agencies gain valuable insights and generate leads using our facial recognition platform. Our platform features the largest known database, with over 50 billion open-source facial images from public web sources like news media, mugshot websites, and social media. This allows agencies to identify unknown individuals more efficiently, aiding in solving and preventing crimes.
Afonso Pena, Director of Sales South America, Clearview AI14:30-15:30
Harnessing Generative AI to Power the Next Generation of Digital Intelligence
Generative AI is having a rapid and unprecedented impact on how insights are extracted and surfaced from varied datasets. This session explores the potential of this technology within Law Enforcement and Intelligence, in specific use cases such as training simulations, threat analysis, and even generating investigative leads.
Presented by JSI16:00-17:00
How to speed up and increase the precision of your investigations with OSINT, social media, and deep and dark web data
Discover how intelligence teams speed up their work and enhance the precision of their results by integrating and querying diverse internal and external OSINT data sources within a single platform, Maltego. Learn practical strategies your team can adopt to efficiently gather and analyze critical intelligence with the confidence that your insights are reliable and actionable.
Presented by MaltegoThursday, 31 October 2024
08:30-09:30 Session B
Lawful Interception - What, Why, When, Who and how to, and solutions.
Interception - What it is all about; Why it's necessary; When we should consider it; Who we should deploy against; and how to capture, analyze and create actionable connections and intelligence. We will also look at the legal questions of proportionality, Necessity, and collateral intrusion management. Solutions also discussed.
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police10:30-11:15
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case.
Presented by IPS11:30-12:30 Session A
Boost your investigative prowess with AI on intricate data to uncover remarkable insights and unprecedented connections. Explore real-world applications.
Presented by MOVIA11:30-12:30 Session B
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Track 4: Investigating Dark Web and Crypto Currency Transaction Traceback Training
(THESE SESSIONS ARE ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Wednesday, 30 October 2024
14:30-15:30
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS16:00-17:00
Investigating Consumers and Creators of Child Sexual Abuse Material on the Dark Web
Child Sexual Abuse Material has increased in recent years, partly due to the difficulty of tracking and identifying its consumers. For this reason, we are presenting a methodology that overcomes these barriers and, with the help of Crimewall, allows us to quickly and massively identify these actors, enabling a more effective response to this issue.
Presented by Social Links
Track 5: Mobile Signal Intercept and Electronic Surveillance Product Presentations
(THESE SESSIONS ARE ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Wednesday, 30 October 2024
09:10-10:00 Session A
ARGOS: Is my phone infected?
By utilizing ARGOS, you can detect malware and protect your phone, elevating it to a trusted, highly secure device.
Presented by Top Solution09:10-10:00 Session B
Solution for positioning objects and places of interest with microdevices and resolution of extreme situations where there is no coverage.
Comprehensive control of objects with audio, image and GPS devices, where the priority is minimum size and ease of concealment, maximum security and high performance and functionality. All systems are managed from a research and analysis platform.
Presented by INNOVA13:00-14:00
An essential all-in-one on the field and at the command center: Electronic Surveillance tacticals with AI enabled, Cyber Intelligence unified platform. Use cases and demo.
Demonstrating Electronic Surveillance solutions and their multiple benefits for the users, unique design, construction quality and principles, together with the adoption of innovative capabilities of AI and ML technologies, to help and speed up daily operations of LEAs, in a forensic proof centralized platform.
Presented by AREA14:30-15:30
Using Location Intelligence to Combat Contraband Mobile Phones in Prisons
Mobile phones are one of the most smuggled items into prisons, used by inmates to continue criminal enterprises, harass witnesses, or plot escape. While signal jammers, Managed Access Systems, and even dogs have been used to combat the trend, none have been effective. In this session, learn how an end-to-end location platform that automatically detects, identifies, and locates devices can help prison staff intercept contraband mobile phones without jeopardizing their own communications channels.
Presented by SS816:00-17:00
TACTICAL SATELLITE TRAFFIC MONITORING SOLUTION.
Inmarsat I-SAT Phone Pro, Iridium and Thuraya tactical satellite traffic monitoring. Voice, data, and geolocation. SBD (Short Burst Data) of Iridium devices.
Presented by PAT SystemsThursday, 31 October 2024
8:30-9:30 Session A
TACTICAL SATELLITE TRAFFIC MONITORING SOLUTION.
Inmarsat I-SAT Phone Pro, Iridium and Thuraya tactical satellite traffic monitoring. Voice, data, and geolocation. SBD (Short Burst Data) of Iridium devices.
Presented by PAT Systems8:30-9:30 Session B
Lawful Interception and Electronic Surveillance challenges made easy with cutting-edge technology: A centralized Monitoring Center which is AI enabled and holds 5G ready Cyber-intelligence. Interactive.
Introducing the enhanced capabilities of adopting AI and Machine Learning technologies and the principles within a centralized 5G Monitoring Facility for LEAs.
Presented by AREA11:30-12:30
ARGOS: Is my phone infected?
By utilizing ARGOS, you can detect malware and protect your phone, elevating it to a trusted, highly secure device.
Presented by Top Solution