ISS World Asia is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Presentations
Track 4: Threat Intelligence Gathering and Cyber Security Product Presentations
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
Track 6: Mobile Signal Intercept Product Presentations
Track 7: Electronic Surveillance Training and Product Presentations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Presentations
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(6 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)
Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(2 classroom hours)
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(3 classroom hours)
Online Social Media and Internet Investigations
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone.
Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World Asia has Solutions
Dr. Jerry Lucas, President, TeleStrategies
Wednesday, 4 September 2024
10:00-18:00
Thursday, 5 September 2024
10:00-13:30
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
11:30-12:15
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will present how its innovative technologies can help Security and Defence organizations respond rapidly to a wide range of threats.
Presented by Phonexia
14:15-15:00
Accelerating investigation workflows with specially designed IT- and phone forensic laboratories
Cyfluene, fake news and campaign detection
Stefan Heimgaertner, mh Service GmbH
15:15 to 16:00
Using Arabic Script Languages for Online Target Discovery
The amount of content being uploaded in languages using an Arabic alphabet keeps growing at a very fast pace. Being able to tackle online content using this alphabet is essential for any organization’s decision-making process. This introduction will show some of the techniques that will help you find the content that you're looking for using an Arabic alphabet without prior knowledge of this language.
Skip Schiphorst, Online Rearch in Foreign Languages Instructor, i-intelligence GmbH
16:15-17:00
Investigating Targeted Personal Financial Fraud (Pig-butchering), Romance Scams, and Other Financial Scams in Southeast Asia
The fight against targeted personal financial fraud in Southeast Asia requires a multi-pronged approach, combining international cooperation, technological innovation, community empowerment, and individual responsibility. By working together, we can create a future where individuals are safe from exploitation and empowered to pursue their financial goals with confidence.
Christopher Parrish, U.S. Secret Service
15:00-15:40
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Presented by Phonexia
09:15-10:00
Cost Effective Network Monitoring Architectures
Presented by HUBER+SUHNER Polatis
11:00-11:40
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15 Session A
A complex Use Case.
Various challenges combined and solved with user friendly and integrated Cyber Intelligence solutions, ranging from Electronic Surveillance to Social Media Investigations, touching End to End Lawful Interception on landline and mobile network up to 5G, Mobile Signal Monitoring, Encrypted communication analysis and processing the results in a Data Fusion Platform.
Presented by AREA
08:30-09:15 Session B
Deriving Insights Through OTT-Encrypted Traffic
While encrypted OTT calls present a challenge to conventional surveillance, they hold high potential for homeland security investigations.
Presented by Intersec
09:30-10:15 Session A
Real-world results showing the impact of Carrier-in-Carrier technologies on your satellite monitoring capabilities.
Presented by VASTech
09:30-10:15 Session B
Wireless Spatial Intelligence Analysis and Location under 24Ghz
Presented by Sinovatio
10:30-11:15 Session A
The Future of Lawful Intelligence: fusing OSINT and high-accuracy location with voice and other data sources for quick identity resolution
Presented by SS8
10:30-11:15 Session B
Anonymity vs. You: Accelerated WEBINT insights to identify virality, influencers and unmask suspects across social networks
Presented by ClearTrail
10:30-11:15 Session C
Intelligence that Goes Above and Beyond: Combining ADINT and VISINT for a Better Decision Making
Presented by Rayzone Group
13:15-14:00
Implementing New Investigation Use-cases for LEAs
We will share our top 7 use-cases that, based on our experience, benefit both LEAs and CSPs
Presented by Matison
15:15-16:00
Supercharged IPDR extraction and analysis - Encrypted IP Applications and Advanced Internet Activity Analytics
Presented by Trovicor
16:15-17:00 Session A
AI-powered Metadata Analysis: Unearthing the Secrets Hidden in Digital Footprints
Mitesh Vageriya, CEO, PertSol
16:15-17:00 Session B
Building a network visibility platform to dissect packets in 400G networks by using TAPs and Packet Brokers
Using Network TAPs to get passive access to the network infrastructure. Network Packet Brokers enable you to manage the traffic you want to see. Introducing, PacketFalcon our mobile packet capture device.
Presented by NEOX NETWORKS GmbH
09:10-10:00 Session A
Kick Start Your Investigations with AI
As an analyst, have you ever spent too much valuable time formatting data ready to import and then, having a huge volume of data, quite literally not knowing how to start the investigation? New features in i2 are here to help. A mix of data formats? No problem – we’ll import it all without you to needing to move columns or run a Search and Replace. And once your data is in, we’ll intelligently look at the context and pre-load the most appropriate charts. Want to get a head start in your investigations? Head over to this talk.
Adrian Barfield, Brand Technical Specialist, i2 Group
13:00-13:40 Session A
Encryption is one of the most common and relevant challenges for every LEA.
Come and experience how the combination of forensic wire speed, contend derived metadata generation and collection, combined with the powerful analytics of the Data Fusion platform, unleashes the intelligence hidden in the encrypted communications. Use cases and Live demo.
Presented by AREA
13:00-13:40 Session B
ORCA - rule the ocean of metadata
Using metadata to answer the important questions of Who, What, Where & When.
Presented by VASTech
13:00-13:40 Session C
Uncovering Digital Footprints with AI-Enabled Data Fusion
In this session, we will present a live simulated case study connecting disparate data sources to accelerate informed decision making. A combination of biometrics, digital forensics, location data, artificial intelligence and active measures are all layered into a single analytical workflow providing users with low risk and highly efficient operational control.
Presented by JSI
13:45-14:30 Session A
Face Recognition in mass terror event
Presented by Corsight AI
13:45-14:30 Session B
Enhancing Situational Awareness in Control Rooms
A deep dive into advanced tools for managing crowds, analyzing density, and exploring zones to handle demonstrations proactively and effectively.
Presented by Intersec
13:45-14:30 Session C
Data to Decision: Transforming Criminal Investigations with AI-powered Predictive Analytics
Gurjot Sandhu, CBO, PertSol
15:00-15:40 Session A
How AI could support your investigation – a research
Presented by ATIS
15:00-15:40 Session B
Generating CDRs for WhatsApp, Telegram, Viber, Signal, and other Encrypted VoIP Applications
Presented by ClearTrail
16:20-17:00 Session A
Who is communicating with who? - IP end point detection
Communication has moved to encrypted apps in the IP domain. Systems only able to analyze circuit switched data, are operating in darkness. Discover the knowledge that can be extracted from encrypted communication apps.
Presented by XCI A/S
16:20-17:00 Session C
The Encryption Battlefield: Leveraging Metadata and AI for Real-World Intelligence Missions
Presented by ClearTrail
08:30-09:10 Session A
Real-world results showing the impact of Carrier-in-Carrier technologies on your satellite monitoring capabilities.
Presented by VASTech
09:15-10:00 Session A
Federal Case Study: Actionable insights using AI Powered Intelligence Fusion
Presented by ClearTrail
09:15-10:00 Session B
Accelerate your Investigations with Multi-dimensional Multi-source Analysis
As an analyst, you will be challenged with collating information from a variety of different data sources, often in many different formats. Come and learn how to unlock the power of streamlined data analysis and easily manage the complexity of working with diverse data sources with i2. From databases and applications, CDR and OSINT, to unstructured to semi-structured data, i2 offers a unified platform for comprehensive analysis and intelligence sharing. Join Adrian to understand how to simplify your workflow, and gain new insights with speed and precision. Adrian Barfield, Brand Technical Specialist, i2 Group
11:00-11:40 Session A
Use Case Discussion of How LEAs Leverage High Accuracy Location Data to Improve Investigation Results
Presented by SS8
11:00-11:40 Session B
End to End Lawful Interception Monitoring Centre, for landline and mobile up to 5G.
Face the complexity of the investigations, with a platform that offers user friendly interface and advanced functionality, such as automated processing of data, granting the compliancy with ETSI global standards, with its continuous evolutions.
Presented by AREA
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
08:30-09:15
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS
09:30-10:15
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS
10:30-11:15
Unique Social Media Relation and ID-Mapping Solution Against Encryption Challenges
Presented by Sinovatio
11:30-12:15
Next Generation Data Fusion Monitoring Center: new ways of gathering intelligence
Presented by RCS S.p.A.
14:15-14:35
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS
14:35-15:00
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case in the Red Sea
Presented by IPS
15:15-16:00
The Evolution of Mass Media for Data Fusion: Will AI wield the controls for OSINT data curation
The session delves into the fascinating topic of the evolution of mass media for data fusion. It presents an in-depth analysis of how mass media has transformed over the years, and its positive and negative effects on societies, raising awareness about the importance of the role of AI technology in data curation for open-source intelligence (OSINT).
Stavros Vologiannidis, Founder, Business Development, DataScouting
Rami El Sabeh, OSINT Consultant, DataScouting
16:15-17:00
Social Media Investigations and Monitoring challenges solved with the Virtual Human Intelligence platform that allows Forensic Investigation of the online communities.
Use cases and Live demo.
Presented by AREA
09:10-10:00
Overview of the Info-stealer Eco System on the deep & dark web
Presented by S2W
13:45-14:30 Session A
Using OSINT with visual link analysis to enhance your investigations
Presented by Maltego
13:45-14:30 Session B
Mastering Large-Scale OSINT Investigations: Advanced Tips, Techniques and Tools
In today's digital era, an avalanche of data continually pours into the open-source domain - this overflow poses significant challenges for intelligence analysts striving to extract value from the masses of data available online. In this session, we discuss the expert strategies for streamlining OSINT investigations. We'll also demystify how cutting-edge artificial intelligence and machine learning can empower analysts to transform raw OSINT data into actionable insights.
David Huggett, Senior Tradecraft Advisor, Fivecast
13:45-14:30 Session C
OSINT Case Study: Leveraging Open Data to Make Breakthroughs in an Arms Trafficking Investigation
Open data can provide the connections required to expand cases around existing leads. In this presentation, the team will demonstrate how the Social Links’ OSINT solution, SL Professional, enabled investigators to greatly enhance internal data with open sources. This led to significant breakthroughs in an arms trafficking case, where the main actors were successfully identified.
Christof De Windt, OSINT Specialist at the Federal Judicial Police of Belgium; and Alexandra Samuseva, Customer Success Manager, Social Links
15:00-15:40
trovicor’s Latest interception Innovations – Speech Analysis, Encrypted IP applications and hyper efficient Big Data Analytics
Presented by Trovicor
16:20-17:00 Session A
CDRs, IPDRs, Lawful Interception, IP content derived Metadata, Location, Forensic Investigations and many more.
All those sources and a single, web based, flexible, compatible, and user-friendly Forensic Data Fusion and Analysis platform.
Use cases and Live demo.
Presented by AREA
16:20-17:00 Session B
OSINT Class Product Types Generating Successful Southeastern Asia Investigations
Christopher Parrish, U.S. Secret Service
11:00-11:40 Session A
How AI could support your investigation – a research
Presented by ATIS
11:45-12:30
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
14:15-15:00
OSINT Case Study: How the Analysis of TikTok Led to the Identification of a Fugitive Criminal
This talk will have two parts. The first will focus on a real case in which a suspect had disappeared. We’ll demonstrate how investigators used SL Professional to carefully analyze media from TikTok, leading to the fugitive’s identification. Following on from this, part two will cover how the OSINT solution can process a whole range of open-source media to boost investigations.
Speakers: Christof De Windt, OSINT Specialist at the Federal Judicial Police of Belgium; and Dmitry Danilov, Head of the Expertise Centre at Social Links.
Christof De Windt, OSINT Specialist at the Federal Judicial Police of Belgium; and Dmitry Danilov, Head of the Expertise Centre, Social Links
16:15-17:00
Keep your Information Safe! New Trends and Developments in Information Protection
Presented by EO SECURITY s.r.o.
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
13:15-14:00
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
David Alley, CEO, DarkOWL FZE
13:00-13:40
Offline darknet investigation with the Web-I-Qube
Stefan Heimgaertner, mh Service GmbH
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies
10:30-11:15
Satellite Networks: Detecting, Locating and Intercepting transmitters
Presented by Kratos
11:30-12:15
ArrowCell - Securing your Cellular Environment, Anywhere, Anytime
Presented by Rayzone Group
15:15-16:00
Similar Trajectories & Hidden Connections Through Telecom Metadata
A demonstration showcasing how telecom metadata, combined with advanced AI algorithms, reveals patterns of life, enhances tracking and minimizes opportunities for criminal escape.
Presented by Intersec
9:10-10:00
Satellite Interception Systems (Thuraya/ISAT/BGAN/IRIDIUM/Bideou)
Presented by Stratign
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
15:00-15:40
Thor Store & Forward
Presented by Spectronic Denmark
8:30-9:10
Walk in your suspect’s shoes. See what your suspect does.
Listen to what suspect says. Electronic Surveillance family of sensors, capable to be adopted both in a stand-alone operation scenario and supported by the centralized command and control monitoring centre. Experience the integrated Unified Fusion Platform, open to third party sensors. Use cases and Live demo.
Presented by AREA
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
09:30-10:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
13:45-14:30
Tactical 5G ID resolution
Presented by EXFO
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
15:00-15:40
5G passive and active hybrid direction finder, no IMSI encrypt issues any more
Presented by REACH
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
09:15-10:00
Oculus 5 - the new 5G recorder from Covidence
Presented by Covidence
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
11:00-11:40
5G Security Encrypted Phone, no information leaking any more
Presented by REACH
Online Social Media and Internet Investigations
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works, for us. Why it works, for us. How data traffic leaves a permanent trace. How and why everything that was on the internet, is still there. Identifying the structural data and exploits, that will take you to your suspect. Tracking and evaluating data. MAC tracking. If you’ve ever said “it’s been deleted” or “its no longer there”, this seminar is for you. Let me prove you wrong.
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyse it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft. Data collection and interrogation, significance, and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them (where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyse it. Investigator capabilities and opportunities. TCP/IP and header value and analysis
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed. You and your target are being tracked by multi organisations that you done even know exist. Lets identify them and interrogate their data bases.
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web), TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications, and ways to coax offenders out of the system.
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game? Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
"Just google it" is great for tickets, tyres, holidays and opening hours. But as an investigator, we can do better, and safer. Using most main stream search engines and browsers come with certain risks. This session aims to change that. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. Tools that the target can’t see . Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how to fast track you to the data you need, and cut away the chaff. PART 2 on the final day with free tools to download and keep
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Law enforcement and intelligence agencies have massive data sets to pile through in order to find the evidence and information they need for their investigations. This seminar will address how AI is helping. The presentation will first provide a background/primer in at AI technologies - what are the specific types of AI systems; how are they used in industry today; and what are the strengths and weaknesses of AI. The second half will focus on how ISS vendors are leveraging AI to increase agent efficiency and results in network data, OSINT, application profiling, location and image/language processing. Specific topics include:
Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI is a completely new technology that is greatly impacting all aspects of society, industry, politics, and culture. This seminar is going to look at generative AI from law enforcement and the intelligence community’s perspective. The first half of the presentation will focus on what the technology is, how it works, the training sets, what is good at, and the pitfalls. The second half will look at how LEAs and intelligence agencies can leverage the technology; how the technology is already making the lives of agents more difficult; and how generative AI might find itself working into LEA/ISS tools. Specific topics include:
Defeating Network Encryption: What Law Enforcement and The Intelligence community Needs to Understand
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police