ISS World Asia is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Presentations
Track 4: Threat Intelligence Gathering and Cyber Security Product Presentations
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
Track 6: Mobile Signal Intercept Product Presentations
Track 7: Electronic Surveillance Training and Product Presentations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Presentations
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(7 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)
Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(1 classroom hours)
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(4 classroom hours)
Christopher Parrish, U.S. Secret Service
(2 classroom hours)
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
(1 classroom hour)
Matěj Grégr (Ph.D., Computer Science), Researcher, Brno University of Technology
(1 classroom hour)
Online Social Media and Internet Investigations
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
Understanding Mobile 2G, 3G, 4G, 5G & 6G NSA Infrastructure and Law Intercept for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing Interception
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
5G services are nearly ubiquitously deployed globally in a 4G/5G hybrid network infrastructures or so-called non-Stand Alone (NSA) architecture, or as a native 5G. This session addresses the challenges facing law enforcement and ISS vendors associated with 5G network services.
Understanding AI and LEA Use Cases
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
The presentation provides a primer on AI technologies - what are the specific types of AI systems; how are they used in industry today; the strengths and weaknesses of AI; and how ISS vendors are leveraging AI to increase agent efficiency and results in network data, OSINT, application profiling, location and image/language processing.
Generative AI: Use-cases and Implementation Considerations for Law Enforcement and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI (GAI) has potential to completely revolutionize network data and OSINT analytics - potentially allowing investigators to effortlessly engage, analyze, visualize large datasets and “connect the dots” that would traditionally require enormous manual effort from teams of analysts and IT personnel. GAI is also one of those technologies that is particularly difficult to implement because of the inherent nature of machine learning systems and complexity of integrating GAI technology into operational environments. This session will cover the key operational issues related to GAI platforms.
Investigating Targeted Personal Financial Fraud (Pig-butchering), Romance Scams, and Other Financial Scams in Southeast Asia
Christopher Parrish, U.S. Secret Service
OSINT Class Product Types Generating Successful Southeastern Asia Investigations
Christopher Parrish, U.S. Secret Service
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
Trending Topics in Cryptocurrency Forensics
Matěj Grégr (Ph.D., Computer Science), Researcher, Brno University of Technology
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Mastering the password cracking
Jan Pluskal, Researchers, Brno University of Technology
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World Asia has Solutions
Dr. Jerry Lucas, President, TeleStrategies
Wednesday, 4 September 2024
10:00-18:00
Thursday, 5 September 2024
10:00-13:30
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
11:30-12:15
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will present how its innovative technologies can help Security and Defence organizations respond rapidly to a wide range of threats.
Presented by Phonexia
14:15-15:00
Accelerating investigation workflows with specially designed IT- and phone forensic laboratories
Cyfluene, fake news and campaign detection
Stefan Heimgaertner, mh Service GmbH
15:15 to 16:00
Using Arabic Script Languages for Online Target Discovery
The amount of content being uploaded in languages using an Arabic alphabet keeps growing at a very fast pace. Being able to tackle online content using this alphabet is essential for any organization’s decision-making process. This introduction will show some of the techniques that will help you find the content that you're looking for using an Arabic alphabet without prior knowledge of this language.
Skip Schiphorst, Online Rearch in Foreign Languages Instructor, i-intelligence GmbH
16:15-17:00 Session A
Investigating Targeted Personal Financial Fraud (Pig-butchering), Romance Scams, and Other Financial Scams in Southeast Asia
The fight against targeted personal financial fraud in Southeast Asia requires a multi-pronged approach, combining international cooperation, technological innovation, community empowerment, and individual responsibility. By working together, we can create a future where individuals are safe from exploitation and empowered to pursue their financial goals with confidence.
Christopher Parrish, U.S. Secret Service
13:45-14:30
GenAI, Deepfakes, Fake News: New & Improved Threats
Presented by Cyabra
15:00-15:40
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Presented by Phonexia
08:30-09:10
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
In this talk, we shall discuss various security mechanisms used in WiFi and Bluetooth networks and how to abuse them to obtain mission-critical intel. Apart from explaining all principles, we will demonstrate them (hopefully live) on our tactical device! Starting with an access point and client scans, we will continue with client targetted jamming and total Denial-of-Service of the whole network that may even result in authentication handshake capture. This handshake contains information to recover the WiFi password to access the targeted network. Once inside the network, we will show essential hacking tools to conduct IP-level reconnaissance. But we will not limit ourselves to WiFi and demonstrate how Bluetooth can be leveraged to notify you about a person's presence or exploit various IoT devices.
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
09:15-10:00
Cost Effective Network Monitoring Architectures
Presented by HUBER+SUHNER Polatis
09:15-10:00
Trending Topics in Cryptocurrency Forensics
Bitcoin, Ethereum and other cryptocurrencies are becoming mainstream for financial interactions and standard tools when conducting cybercrime such as scams, frauds, ransomware, darknet markets, sextortion, etc. LEAs also adapted to a new situation, and many investigators are already familiar with cryptocurrency basics and how to trace transactions on publicly available blockchain explorers. This session aims to extend the knowledge of participants about more advanced topics such as: a) address clustering techniques and their applicability to various cryptocurrencies; b) monitoring of cryptocurrency networks and their peers with the help of network intelligence; c) geolocating cryptocurrency transaction with IP address or originator; d) overcoming obfuscation of transactions entering and leaving mixers; e) correlating activities on darkweb with blockchain events. Each subtopic will be thoroughly explained, including currently existing methods and tools for addressing associated challenges.
Matěj Grégr (Ph.D., Computer Science), Researcher, Brno University of Technology
11:00-11:40
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
11:45-12:30
Mastering the password cracking
Users need to provide passwords when they are logging into the computer, starting their smartphone, accessing their favourite web service, opening protected files/disks, connecting to a network or pairing their wearable. Encryption is an inherent trait of digital presence, whether users realize it or not. We will speak about different approaches to password cracking, including dictionary, rule-based, brute-force, hybrid and association attacks. We will show benchmarks of how fast high-end GPU cards can recover passwords for various formats (e.g., Windows credentials, WPA2 handshakes, ZIP and RAR files, LUKS partitions, Android PINs, and iPhone Backups). We will answer what length or complexity of the password is enough to protect your data. Nevertheless, better than guessing the password is knowing the password! We will conclude our talk by demonstrating the applicability of personal information leaks with usernames, emails, phone numbers and passwords!
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15 Session A
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated Cyber Intelligence solutions. A structured case-study
“Follow the white rabbit” starting from limited and vague information and reaching focused and reliable evidence. Going into a structured case that focuses on the steps that build knowledge and intelligence information for the LEAs, this case study will replicate a realistic approach of the solution of the investigation with actual and proven technologies.
Presented by AREA
08:30-09:15 Session B
Harnessing AI in Police Investigations: A Focus on Audio, Video, and GPS
Presented by SIO
09:30-10:15 Session A
Orca Connect: connecting your intelligence gathering systems to fibre and satellite signals.
Presented by VASTech
09:30-10:15 Session B
Wireless Solution Innovation: 3D Visualizing Mobile Target Locating and Integrating Face & Plate
Pioneering 3D video device solves the challenge of locating targets in high-rise buildings and crowds.
New generation of maximum 16-carrier integrated multi-network devices achieves full-scene positioning and control of targets.
A complete set of location solutions including fixed points, backpack, drone and vehicle-mounted kits.
Presented by Sinovatio
10:30-11:15 Session A
Improving Investigations with Advanced Technology and Automation
Investigators today have new technologies to improve outcomes. Artificial Intelligence supports facial recognition, automatic number plate readers, and visual weapon detection. Audio technologies can detect and report gunfire, and language models can estimate a speaker's dialect, gender, and even emotional state. Drones, smart assistants, and biometrics offer new sources of evidence. Law enforcement and government agencies must harness these innovative capabilities to maximize efficiency.
Presented by SS8
10:30-11:15 Session B
Skin in the Geopolitical Game; the Private Sector saturating the Public Risk
Presented by Birdwatcher Group
11:30-12:15 Session A
Forensic content derived metadata with powerful Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications. Use cases and demonstration.
Highlighting two cornerstone concepts essential for a comprehensive intelligence platform. One: the creation and collection of rich metadata form network communications. Two: the analysis and processing of data to extract intelligence and investigative data.
Presented by AREA
11:30-12:15 Session B
Deriving Insights Through OTT-Encrypted Traffic
While encrypted OTT calls present a challenge to conventional surveillance, they hold high potential for homeland security investigations.
Presented by Intersec
13:15-14:00 Session A
Intercepting the future: Critical use cases for security agencies
Presented by Matison
13:15-14:00 Session B
CDRs of WhatsApp, Signal, Telegram, and other encrypted VoIP messaging applications
Presented by ClearTrail
14:15-15:00 Session A
Solving the challenges of Data-Fusion and Validation: Communication Data, live lawful interception data, mobile forensics extraction and more in a single platform. Use cases and demonstration.
Presented by AREA
14:15-15:00 Session B
Leveraging Vehere AI Counter-Terrorism For Effective Law Enforcement.
High performance Network Analytics with Petabyte Scale & Terabit Speed, powered by AI and LLM.
Presented by Vehere
15:15-16:00 Session A
Similar Trajectories & Hidden Connections Through Telecom Metadata
A demonstration showcasing how telecom metadata, combined with advanced AI algorithms, reveals patterns of life, enhances tracking and minimizes opportunities for criminal escape.
Presented by Intersec
15:15-16:00 Session B
Discover the cutting-edge, all-phone compatible, cost-effective and successful agent.
Presented by MOVIA
15:15-16:00 Session C
AI-based computer vision face and object recognition: Methods, Implementation, and Practical Examples
This report is dedicated to introducing pivotal trends in computer vision and its transforming role in security and surveillance: deepfake detection, real-time monitoring, and new smart algorithms in face and object recognition.
Presented by True Detection
15:15-16:00 Session D
Password Cracking on FPGA Infrastructure
Presented by SciEngines
15:15-16:00 Session E
Generative AI-Led Federal Case Study: Intelligent Fusion
Presented by ClearTrail
16:15-17:00 Session A
Enhancing Crime Detection: AI-Driven Communication Monitoring for Law Enforcement
Presented by PertSol
16:15-17:00 Session B
Building a network visibility platform to dissect packets in 400G networks by using TAPs and Packet Brokers
Using Network TAPs to get passive access to the network infrastructure. Network Packet Brokers enable you to manage the traffic you want to see. Introducing, PacketFalcon our mobile packet capture device.
Presented by NEOX NETWORKS GmbH
16:15-17:00 Session C
Bridging The Gaps In Cybercrime Investigations With Group-IB's Graph
Ms. Vesta Matveeva, Head of High-Tech Crime Investigations Department, APAC; and Ms. Daria Shcherbatyuk, Cyber Investigator and Product Owner of Group-IB Graph solution, Group-IB.
16:15-17:00 Session D
Supercharged IPDR extraction and analysis - Encrypted IP Applications and Advanced Internet Activity Analytics
Presented by Datafusion Systems
09:10-10:00 Session A
Kick Start Your Investigations with AI
As an analyst, have you ever spent too much valuable time formatting data ready to import and then, having a huge volume of data, quite literally not knowing how to start the investigation? New features in i2 are here to help. A mix of data formats? No problem – we’ll import it all without you to needing to move columns or run a Search and Replace. And once your data is in, we’ll intelligently look at the context and pre-load the most appropriate charts. Want to get a head start in your investigations? Head over to this talk.
Adrian Barfield, Brand Technical Specialist, i2 Group
09:10-10:00 Session B
Integrating Intercepted Data with Digital Forensics for Investigations
This presentation centers on a holistic approach to criminal investigative review by integrating multiple evidence sources and communications data with digital forensics. Emphasizing the availability of decrypted data on mobile devices for thorough analysis, it explores the role of Natural Language Processing (NLP) and Large Language Models (LLMs). Advanced features like image and video classification, facial recognition, media similarity, chat topic detection, and optical character recognition (OCR) all coexist within a single, comprehensive web-based platform, streamlining the investigative process and enhancing overall efficiency and outcomes.
Presented by Cellebrite
09:10-10:00 Session C
WHO SAID WHAT TO WHOM AND WHEN – GLOBAL VOICE PRINT DATABASE
Combining Speaker identification, Transcription and Translation for comprehensive increased operational efficiency for organizations within Lawful interception, Intelligence, Security and Defence.
Presented by Conversy
13:00-13:40 Session A
Enhance Tradecraft with a Dynamic Landscape View Focusing on “AAA", and embracing PPP (Public-Private Partnership)
Kelvin Lim, Moody's
13:00-13:40 Session B
Orca Capture: process and store traffic using protocols found in modern networks
Presented by VASTech
13:00-13:40 Session C
Harnessing Generative AI to Power the Next Generation of Digital Intelligence
Generative AI is having a rapid and unprecedented impact on how insights are extracted and surfaced from varied datasets. This session explores the potential of this technology within Law Enforcement and Intelligence, in specific use cases such as training simulations, threat analysis, and even generating investigative leads.
Rory O’Connor, JSI
13:00-13:40 Session D
LightSabre: Ultra-Portable Fibre Optics Links Interception and Monitoring System
LightSabre is an advanced, ultra-portable system designed for intercepting and monitoring fibre optics links, including OTN, SDH, and Ethernet. Engineered for intelligence operations, LightSabre ensures seamless, real-time data capture and analysis with unmatched precision. Its compact design and powerful capabilities make it the ideal tool for covert surveillance and network security, providing unparalleled insight into critical communications.
Presented by ClearTrail
13:45-14:30 Session A
Face Recognition in mass terror event
Presented by Corsight AI
13:45-14:30 Session B
Answering the 5W Intelligence Questions Using Advanced Techniques in Multi-Layered Investigation Platform
Presented by Rayzone Group
13:45-14:30 Session C
Transforming Geospatial Data into Actionable Insights with AI and Machine Learning
Presented by PertSol
15:00-15:40 Session A
How AI could support your investigation – a research
Presented by ATIS
15:00-15:40 Session C
From Data Hell To Knowledge Well: Turning Raw Internet Traffic to Investigative Intelligence
There is still a great value in network traffic analysis stemming from Lawful Interception. However, challenges like pervasive encryption and application diversity hinder immediate insights form the data stream. This session introduces DETECTA, RCS’s new data analysis platform, designed to help investigators discover insights form internet traffic without needing deep technical skills.
Presented by RCS
16:20-17:00 Session A
Who is communicating with who? - IP end point detection
Communication has moved to encrypted apps in the IP domain. Systems only able to analyze circuit switched data, are operating in darkness. Discover the knowledge that can be extracted from encrypted communication apps.
Presented by XCI A/S
16:20-17:00 Session B
Smartwatches: Exploring Forensic Possibilities and Limitations of the most Popular Wearables
Presented by Compelson
16:20-17:00 Session C
Enhancing Situational Awareness in Control Rooms
A deep dive into advanced tools for managing crowds, analyzing density, and exploring zones to handle demonstrations proactively and effectively.
Presented by Intersec
08:30-09:10 Session A
Orca Integrate and View: integrate data from many different sources to view, filter, and query the results in a single user interface
Presented by VASTech
08:30-09:10 Session B
Lessons Learned from Lessons Taught
Over the past decade, the landscape has shifted—posing threats to some while creating opportunities for others. However, the terrain remains consistent for all participants. As trainers and consultants in this field, we aim to reveal the challenges our clients have faced (while maintaining their anonymity) and share the strategies that proved transformative for them.
Presented by Megatech Research Sdn. Bhd.
08:30-09:10 Session C
Exploiting the power of AI to reduce investigation time from months to minutes
Presented by Voyager Labs
09:15-10:00 Session B
Accelerate your Investigations with Multi-dimensional Multi-source Analysis
As an analyst, you will be challenged with collating information from a variety of different data sources, often in many different formats. Come and learn how to unlock the power of streamlined data analysis and easily manage the complexity of working with diverse data sources with i2. From databases and applications, CDR and OSINT, to unstructured to semi-structured data, i2 offers a unified platform for comprehensive analysis and intelligence sharing. Join Adrian to understand how to simplify your workflow, and gain new insights with speed and precision. Adrian Barfield, Brand Technical Specialist, i2 Group
11:00-11:40 Session A
Using Advanced Lawful and Location Intelligence to Protect International Borders
Southeast Asia is a global hub for illicit drug production, human trafficking, and wildlife and timber smuggling. Recent investment in infrastructure and intra-regional trade are juxtaposed with disparities in political and economic development, making the region vulnerable to cross-border security risks. As smugglers begin employing new tactics, such as concealing illicit contraband among legitimate goods, SS8's accurate, real-time lawful and location solutions can help border agents reduce international crime.
Presented by SS8
11:00-11:40 Session B
Cyclone - the next generation of data gathering
Presented by CSF
11:45-12:30
Spyder Space: Revolutionize Your Investigative Processes with our cutting-edge solution! Harnessing Data from Mobile Sources, We Optimize, Analyze, and Craft Powerful Insights!
Presented by MOVIA
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
08:30-09:15 Session A
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPS
08:30-09:15 Session B
Unveiling the Dynamics: Decoding P2P Services and OTC Desk Trends through Deep Dive Country Report Methodology
Nicholas Smart & Jessica Chuah, Crystal Intelligence
09:30-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS
09:30-10:15 Session B
Datafusion Systems’s Latest interception Innovations – Speech Analysis, Encrypted IP applications and hyper efficient Big Data Analytics
Presented by Datafusion Systems
10:30-11:15
AI-Driven Automatic Metadata Modeling for Telecom Fraud Detection, OTT, VPN, and SNS Behavior Identification
AI-driven metadata modeling uses advanced algorithms to prevent telecom fraudulent activities and identify VPN applications.
Automatic detecting unusual behavior, helping to discover potential security threats on OTT platforms and social networking services.
AI empowerment and data intelligence let you fully enjoy the value of intelligence data.
Presented by Sinovatio
11:30-12:15 Session A
Synergizing Cyber Intelligence Technologies: A Multi-Domain Approach to Advanced Law Enforcement Investigations.
Presented by RCS
11:30-12:15 Session B
Autonomous Data Fusion: Connecting, Loading and Extraction Made Easy!
Accessing data is a piece of cake nowadays but everything thereafter not so much. The RAKIA team uncovers how their Big Data Fusion ensures autonomy and ease when it comes to extracting precise insight and actionable intelligence. Discover firsthand how to use big data fusion to address data validation challenges, create seamless operations, break through silos and enhance decision-making, for elevated mission critical performance.
Ron Zilke, RAKIA Group
13:15-14:00 Session A
Gaining Knowledge from Mass Data for Actionable Intelligence
Anders Riskaer, Innosystec
13:15-14:00 Session B
The Value of the Analyst-AI Relationship in emerging OSINT Technologies
In the ever-expanding ocean of data within today’s open-source environment, the modern intelligence analyst needs speed to insight, while still maintaining analytical rigor.
Using real-world examples, OSINT Combine will explore the interplay and balance required throughout the intelligence cycle between the human analyst, open-source technologies, and the rapidly-evolving frontier of artificial intelligence.
Presented by OSINT Combine
14:15-14:35 Session A
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS
14:35-15:00 Session A
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case.
Presented by IPS
14:15-15:00 Session B
From Data Deluge to Discovery: Leveraging AI to Accelerate Investigations
Lawful intercept and data fusion can provide tremendous investigative potential, but unlocking their full value requires advanced tools. This session explores the rising role AI can play in uncovering hidden patterns and anomalies within your data. Discover how AI can accelerate investigations and improve resourcing, while maintaining compliance with new regulations.
Presented by JSI
15:15-16:00
The Evolution of Mass Media for Data Fusion: Will AI wield the controls for OSINT data curation
The session delves into the fascinating topic of the evolution of mass media for data fusion. It presents an in-depth analysis of how mass media has transformed over the years, and its positive and negative effects on societies, raising awareness about the importance of the role of AI technology in data curation for open-source intelligence (OSINT).
Stavros Vologiannidis, Founder, Business Development, DataScouting
16:15-17:00
VIDEO ANALYST - NEO INSIGHT - NEO COLLECT
Collect. Recognise. Analyse. AI-Powered Video, Speech & Social Media Analytics
Presentation by HTSC Germany
09:10-10:00 Session a
How to track the identity of the threat actors active on the Hidden Channels.
Presented by S2W
09:10-10:00 Session B
Mastering the Digital Landscape: Live Demo of Majestic 5
The RAKIA team will present a step-by-step guide for harnessing OSINT and fusion technology using Majestic 5 to effectively build multifaceted and comprehensive investigation workflows. The use cases presented will harness the full spectrum of OSINT capabilities including target profiling, mass collection, DarkNet exploitation, avatar design and management, fake account identification and mitigation, no code crawlers, and cross-domain link analysis between targets.
David Alley, RAKIA Group
13:00-13:40 Session A
The State of Deepfake Detection in 2024: Where and How Bad Actors Are Operating and How to Strike Back
In 2024, the sophistication and accessibility of deepfake technology have escalated, posing significant threats to national security, intelligence operations, and law enforcement efforts. This talk will highlight the geographical hotspots of deepfake activities, the advanced techniques utilized by adversaries, and their typical targets, including high-stakes political events, military conflicts, but also financial crime online such as scams and frauds. Attendees will learn about the latest advancements in deepfake detection, with a focus on Sensity AI's state-of-the-art solutions that integrate advanced AI and deep learning technologies.
Presented by Sensity AI
13:45-14:30 Session B
Mastering Large-Scale OSINT Investigations: Advanced Tips, Techniques and Tools
In today's digital era, an avalanche of data continually pours into the open-source domain - this overflow poses significant challenges for intelligence analysts striving to extract value from the masses of data available online. In this session, we discuss the expert strategies for streamlining OSINT investigations. We'll also demystify how cutting-edge artificial intelligence and machine learning can empower analysts to transform raw OSINT data into actionable insights.
Sam Ogborn, Fivecast
13:45-14:30 Session C
The use of Mass data advanced Analytics in real time investigation – use case presentation
In today's world, nearly everyone carries at least one mobile phone, with some opting to use different phones for various purposes. Switching SIM cards is also a common practice, particularly among criminal and terrorist groups. The capability to handle vast amounts of cellular data has transformed the landscape for intelligence and law enforcement agencies, offering precise and continuous geolocation tracking that was not possible before. This wealth of data holds critical insights, and by leveraging advanced analysis tools, agencies can generate high-quality intelligence that enhances the investigation and resolution of both historical and ongoing security incidents.
In this meeting, we will explore and demonstrate how employing mass data analysis tools within a cellular-based geolocation system can significantly enhance an analyst's ability to solve cases. By identifying suspect behaviour through patterns in suspicious data, these tools can even effectively aid in the prevention of terrorism and crime.
Eran Drukman Senior, Vice President, Wave Guard Technologies
15:00-15:40 Session A
The Value of the Analyst-AI Relationship in emerging OSINT Technologies
Presented by OSINT Combine
15:00-15:40 Session B
Experience the Future of Raw IP data Analysis for Actionable Intelligence.
Never miss intelligence from WhatsApp, FaceTime and other encrypted calls made by the targets you are investigating and get their behavior on a timeline. Discover Simplicity and Power - No technical expertise required.
Presented by ClearTrail with Mark Bentley, UK Police
16:20-17:00 Session A
Enhance your investigative skills with AI-powered analysis of complex data to unveil extraordinary insights and unprecedented connections.
Leverage powerful AI-tools to make strategic decisions autonomously and dive into real-world applications like never before.
Presented by Movia
16:20-17:00 Session B
OSINT Class Product Types Generating Successful Southeastern Asia Investigations
Christopher Parrish, U.S. Secret Service
16:20-17:00 Session C
ML in the Synergy of SIGINT and OSINT: from Crime Investigation to Prevention!
Presented by 7Generation
08:30-09:10
Risk Insights to Prevent the Start of Scam Centres
Kelvin Lim, Moody's
9:15-10:00 Session A
Beyond Borders: Mastering Passenger Screening with Big Data Fusion
A practical and comprehensive guide on how to make passenger screening easier, faster, and safer with the optimal use of resources. Using real-world cases, participants will be taken through the passenger journey and discover how they can use big data fusion technology to address common challenges such as: human mistakes, disinformation, misinformation, time spent on verbal and technological treatment, silo effect between local security and international security, fake passport detection, prioritization, and old technologies.
Lorenzo Giombini, RAKIA Group
11:00-11:40 Session A
How AI could support your investigation – a research
Presented by ATIS
11:00-11:40 Session B
Catch me if you can: Connecting the Dots by Leveraging generative A.I.
Researchers recently discovered that 37.48% of criminals have started using generative AI to craft alibis and create fake evidence. Sounds alarming, doesn’t it? But it’s a completely fabricated statistic that sounds very credible. This tendency of generative AI to hallucinate is one of the key reasons why this disruptive technology has struggled to fully break through in law enforcement and intelligence. In this talk, you will learn how Quantexa ensures your data is AI-ready through entity resolution, enabling you to leverage generative AI to identify criminals hiding within your data while minimizing the risk of hallucinations. Additionally, the talk will explore innovative use cases for effectively harnessing generative AI in law enforcement.
Presented by Quantexa
11:45-12:30
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
15:15-16:00
Countering AI-Driven Cyber Attacks: Post-VPN Strategies for Law Enforcement and Intelligence Infrastructures
This session will explore advanced strategies for countering cyber attacks, emphasising the limitations of traditional VPNs. It will introduce SElink, an innovative technology enhancing security frameworks, and discuss the evolution of Zero Trust and Network Lockdown principles in law enforcement and intelligence IT networks. Attendees will gain insights into cutting-edge approaches for securing the future of digital law enforcement critical operations.
Presented by Blu5 Group
16:15-17:00
Keep your Information Safe! New Trends and Developments in Information Protection
Presented by EO SECURITY s.r.o.
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
09:30-10:15
De-anonymization of VPN and Crypto Transactions by Reinventing DPI through ML
Presented by 7Generation
13:15-14:00
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
Erin Brown, Director of Intelligence and Collections, DarkOwl
14:15-16:00
How to build the bridge between fiat and crypto world
At the ISS exhibition, we will showcase how our expertise enables us to link cryptocurrency transactions with real assets and the actions of specific individuals. We will explain how we track the movement of crypto assets and identify their connections to traditional finance, real estate, and other assets. Examples will be provided to demonstrate how this approach can help uncover financial schemes and enhance transparency in investigations by connecting digital traces to real-world actions and assets.
Presented by Match Systems
13:00-13:40 Session A
ACCELERATING INVESTIGATION WORKFLOWS FOR IT FORENSIC & INCIDENT HANDLING
RAPID THREAT HUNTER
PLATFORM FOR RAPID AND COLLABORATIVE INVESTIGATION OF CYBER THREAT EVENTS
Stefan Heimgaertner, mh Service GmbH
13:00-13:40 Session B
Navigating the Blockchain: Investigating Suspicious Crypto Transactions and Unveiling the Identities Behind Them
Presented by Rayzone Group
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies
10:30-11:15
Detecting, Locating and Intercepting GSO & NGSO transmitters
Presented by Kratos
13:15-14:00
Securing Your Mobile World from Surveillance Threats. A deep dive into unmasking and countering IMSI Catchers with Cutting-Edge solutions
Presented by NeoSoft
16:15-17:00
Investigating Serial Crimes with High Accuracy Location
Presented by Polaris Wireless
9:10-10:00
Satellite Interception Systems (Thuraya/ISAT/BGAN/IRIDIUM/Bideou)
Presented by Stratign
13:00-13:40
Investigating Serial Crimes with High Accuracy Location
Presented by Polaris Wireless
16:20-17:00
Protecting Against Vulnerabilities in 2G, 3G, 4G, and 5G Networks
Presented by 4intelligence
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
13:45-14:30
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform. Use cases and demonstration.
Demonstrating Electronic Surveillance solutions and their multiple benefits for the users, unique design, construction quality and principles, together with the adoption of innovative capabilities of AI and ML technologies, to help and speed up daily operations of LEAs, in a forensic proof centralized platform.
Presented by AREA
15:00-15:40
Situational awareness for Tactical Teams and Decision Makers – through the wall listening
Designed with SWAT teams, crisis negotiators and Special Interventions Units in mind, the Thor Contact Microphone provides excellent speech intelligibility through most materials; brick, concrete, wood, doors, and windows. The contact microphone does not need an opening or air-path to carry the audio from the incident scene to the operator, as it picks up vibrations and converts them into sound.
Presented by Spectronic Denmark
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
09:30-10:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
13:45-14:30
Enhancing Surveillance Capabilities: The Role of AI, Bluetooth, WiFi, and 5G in Tracking Targets
In a world where technology is constantly evolving, advanced surveillance technologies that utilize AI, Bluetooth, WiFi, and 5G are becoming increasingly crucial tools for law enforcement and national security. These technologies enable precise and efficient real-time tracking of targets, enhancing both the accuracy and response capabilities of security agencies. This presentation will explore how these tools can be integrated into existing security frameworks to improve data collection and analysis, optimize resource allocation, and strengthen community protection against threats. By combining theoretical concepts with practical applications, this overview aims to provide a comprehensive look at the future of surveillance technologies.
Presented by Combain
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
15:00-15:40 Session A
5G passive and active hybrid direction finder, no IMSI encrypt issues any more
Presented by REACH
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
15:00-15:40 Session B
A revolutionary AI Based network independent 5G SA cellular locator
Presented by Septier
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
16:20-17:00
Harnessing AI in Police Investigations: A Focus on Audio, Video, and GPS
Presented by SIO
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
08:30-09:15
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance. Hands on.
Introducing the enhanced capabilities of adopting AI and Machine Learning technologies and the principles within a centralized 5G Monitoring Facility for LEAs.
Presented by AREA
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
09:15-10:00
Oculus 5 - the new 5G recorder from Covidence
Presented by Covidence
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
11:00-11:40
5G Security Encrypted Phone, no information leaking any more
Presented by REACH
Online Social Media and Internet Investigations
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works, for us. Why it works, for us. How data traffic leaves a permanent trace. How and why everything that was on the internet, is still there. Identifying the structural data and exploits, that will take you to your suspect. Tracking and evaluating data. MAC tracking. If you’ve ever said “it’s been deleted” or “its no longer there”, this seminar is for you. Let me prove you wrong.
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyse it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft. Data collection and interrogation, significance, and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them (where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyse it. Investigator capabilities and opportunities. TCP/IP and header value and analysis
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed. You and your target are being tracked by multi organisations that you done even know exist. Lets identify them and interrogate their data bases.
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web), TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications, and ways to coax offenders out of the system.
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game? Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
"Just google it" is great for tickets, tyres, holidays and opening hours. But as an investigator, we can do better, and safer. Using most main stream search engines and browsers come with certain risks. This session aims to change that. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. Tools that the target can’t see . Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how to fast track you to the data you need, and cut away the chaff. PART 2 on the final day with free tools to download and keep
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing Interception
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
5G services are nearly ubiquitously deployed globally in a 4G/5G hybrid network infrastructures or so-called non-Stand Alone (NSA) architecture, or as a native 5G. This session addresses the challenges facing law enforcement and ISS vendors associated with 5G network services.
Understanding AI and LEA Use Cases
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
The presentation provides a primer on AI technologies - what are the specific types of AI systems; how are they used in industry today; the strengths and weaknesses of AI; and how ISS vendors are leveraging AI to increase agent efficiency and results in network data, OSINT, application profiling, location and image/language processing. Specific topics include:
Generative AI: Use-cases and Implementation Considerations for Law Enforcement and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI (GAI) has potential to completely revolutionize network data and OSINT analytics - potentially allowing investigators to effortlessly engage, analyze, visualize large datasets and “connect the dots” that would traditionally require enormous manual effort from teams of analysts and IT personnel. GAI is also one of those technologies that is particularly difficult to implement because of the inherent nature of machine learning systems and complexity of integrating GAI technology into operational environments. This session will cover the key operational issues related to GAI platforms.
Investigating Targeted Personal Financial Fraud (Pig-butchering), Romance Scams, and Other Financial Scams in Southeast Asia
The fight against targeted personal financial fraud in Southeast Asia requires a multi-pronged approach, combining international cooperation, technological innovation, community empowerment, and individual responsibility. By working together, we can create a future where individuals are safe from exploitation and empowered to pursue their financial goals with confidence.
Christopher Parrish, U.S. Secret Service
OSINT Class Product Types Generating Successful Southeastern Asia Investigations
Christopher Parrish, U.S. Secret Service
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
In this talk, we shall discuss various security mechanisms used in WiFi and Bluetooth networks and how to abuse them to obtain mission-critical intel. Apart from explaining all principles, we will demonstrate them (hopefully live) on our tactical device! Starting with an access point and client scans, we will continue with client targetted jamming and total Denial-of-Service of the whole network that may even result in authentication handshake capture. This handshake contains information to recover the WiFi password to access the targeted network. Once inside the network, we will show essential hacking tools to conduct IP-level reconnaissance. But we will not limit ourselves to WiFi and demonstrate how Bluetooth can be leveraged to notify you about a person's presence or exploit various IoT devices.
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
Trending Topics in Cryptocurrency Forensics
Bitcoin, Ethereum and other cryptocurrencies are becoming mainstream for financial interactions and standard tools when conducting cybercrime such as scams, frauds, ransomware, darknet markets, sextortion, etc. LEAs also adapted to a new situation, and many investigators are already familiar with cryptocurrency basics and how to trace transactions on publicly available blockchain explorers. This session aims to extend the knowledge of participants about more advanced topics such as: a) address clustering techniques and their applicability to various cryptocurrencies; b) monitoring of cryptocurrency networks and their peers with the help of network intelligence; c) geolocating cryptocurrency transaction with IP address or originator; d) overcoming obfuscation of transactions entering and leaving mixers; e) correlating activities on darkweb with blockchain events. Each subtopic will be thoroughly explained, including currently existing methods and tools for addressing associated challenges.
Matěj Grégr (Ph.D., Computer Science), Researcher, Brno University of Technology
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Mastering the password cracking
Users need to provide passwords when they are logging into the computer, starting their smartphone, accessing their favourite web service, opening protected files/disks, connecting to a network or pairing their wearable. Encryption is an inherent trait of digital presence, whether users realize it or not. We will speak about different approaches to password cracking, including dictionary, rule-based, brute-force, hybrid and association attacks. We will show benchmarks of how fast high-end GPU cards can recover passwords for various formats (e.g., Windows credentials, WPA2 handshakes, ZIP and RAR files, LUKS partitions, Android PINs, and iPhone Backups). We will answer what length or complexity of the password is enough to protect your data. Nevertheless, better than guessing the password is knowing the password! We will conclude our talk by demonstrating the applicability of personal information leaks with usernames, emails, phone numbers and passwords!
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police