ISS World Asia is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Presentations
Track 4: Threat Intelligence Gathering and Cyber Security Product Presentations
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
Track 6: Mobile Signal Intercept Product Presentations
Track 7: Electronic Surveillance Training and Product Presentations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Presentations
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(7 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)
Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(1 classroom hours)
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(4 classroom hours)
Christopher Parrish, U.S. Secret Service
(2 classroom hours)
Vladimir Vesely (Ph.D., Computer Science) Researcher, Brno University of Technology
(3 classroom hours)
Online Social Media and Internet Investigations
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone.
Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Investigating Targeted Personal Financial Fraud (Pig-butchering), Romance Scams, and Other Financial Scams in Southeast Asia
Christopher Parrish, U.S. Secret Service
OSINT Class Product Types Generating Successful Southeastern Asia Investigations
Christopher Parrish, U.S. Secret Service
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
Trending Topics in Cryptocurrency Forensics
Matěj Grégr (Ph.D., Computer Science), Researcher, Brno University of Technology
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Mastering the password cracking
Jan Pluskal, Researchers, Brno University of Technology
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World Asia has Solutions
Dr. Jerry Lucas, President, TeleStrategies
Wednesday, 4 September 2024
10:00-18:00
Thursday, 5 September 2024
10:00-13:30
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
11:30-12:15
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will present how its innovative technologies can help Security and Defence organizations respond rapidly to a wide range of threats.
Presented by Phonexia
14:15-15:00
Accelerating investigation workflows with specially designed IT- and phone forensic laboratories
Cyfluene, fake news and campaign detection
Stefan Heimgaertner, mh Service GmbH
15:15 to 16:00
Using Arabic Script Languages for Online Target Discovery
The amount of content being uploaded in languages using an Arabic alphabet keeps growing at a very fast pace. Being able to tackle online content using this alphabet is essential for any organization’s decision-making process. This introduction will show some of the techniques that will help you find the content that you're looking for using an Arabic alphabet without prior knowledge of this language.
Skip Schiphorst, Online Rearch in Foreign Languages Instructor, i-intelligence GmbH
16:15-17:00
Investigating Targeted Personal Financial Fraud (Pig-butchering), Romance Scams, and Other Financial Scams in Southeast Asia
The fight against targeted personal financial fraud in Southeast Asia requires a multi-pronged approach, combining international cooperation, technological innovation, community empowerment, and individual responsibility. By working together, we can create a future where individuals are safe from exploitation and empowered to pursue their financial goals with confidence.
Christopher Parrish, U.S. Secret Service
15:00-15:40
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Presented by Phonexia
08:30-09:10
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
In this talk, we shall discuss various security mechanisms used in WiFi and Bluetooth networks and how to abuse them to obtain mission-critical intel. Apart from explaining all principles, we will demonstrate them (hopefully live) on our tactical device! Starting with an access point and client scans, we will continue with client targetted jamming and total Denial-of-Service of the whole network that may even result in authentication handshake capture. This handshake contains information to recover the WiFi password to access the targeted network. Once inside the network, we will show essential hacking tools to conduct IP-level reconnaissance. But we will not limit ourselves to WiFi and demonstrate how Bluetooth can be leveraged to notify you about a person's presence or exploit various IoT devices.
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
09:15-10:00
Cost Effective Network Monitoring Architectures
Presented by HUBER+SUHNER Polatis
09:15-10:00
Trending Topics in Cryptocurrency Forensics
Bitcoin, Ethereum and other cryptocurrencies are becoming mainstream for financial interactions and standard tools when conducting cybercrime such as scams, frauds, ransomware, darknet markets, sextortion, etc. LEAs also adapted to a new situation, and many investigators are already familiar with cryptocurrency basics and how to trace transactions on publicly available blockchain explorers. This session aims to extend the knowledge of participants about more advanced topics such as: a) address clustering techniques and their applicability to various cryptocurrencies; b) monitoring of cryptocurrency networks and their peers with the help of network intelligence; c) geolocating cryptocurrency transaction with IP address or originator; d) overcoming obfuscation of transactions entering and leaving mixers; e) correlating activities on darkweb with blockchain events. Each subtopic will be thoroughly explained, including currently existing methods and tools for addressing associated challenges.
Matěj Grégr (Ph.D., Computer Science), Researcher, Brno University of Technology
11:00-11:40
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
11:45-12:30
Mastering the password cracking
Users need to provide passwords when they are logging into the computer, starting their smartphone, accessing their favourite web service, opening protected files/disks, connecting to a network or pairing their wearable. Encryption is an inherent trait of digital presence, whether users realize it or not. We will speak about different approaches to password cracking, including dictionary, rule-based, brute-force, hybrid and association attacks. We will show benchmarks of how fast high-end GPU cards can recover passwords for various formats (e.g., Windows credentials, WPA2 handshakes, ZIP and RAR files, LUKS partitions, Android PINs, and iPhone Backups). We will answer what length or complexity of the password is enough to protect your data. Nevertheless, better than guessing the password is knowing the password! We will conclude our talk by demonstrating the applicability of personal information leaks with usernames, emails, phone numbers and passwords!
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15 Session A
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated Cyber Intelligence solutions. A structured case-study
“Follow the white rabbit” starting from limited and vague information and reaching focused and reliable evidence. Going into a structured case that focuses on the steps that build knowledge and intelligence information for the LEAs, this case study will replicate a realistic approach of the solution of the investigation with actual and proven technologies.
Presented by AREA
08:30-09:15 Session B
Harnessing AI in Police Investigations: A Focus on Audio, Video, and GPS
Presented by SIO
08:30-09:15 Session C
Supercharged IPDR extraction and analysis - Encrypted IP Applications and Advanced Internet Activity Analytics
Presented by Trovicor
09:30-10:15 Session A
Real-world results showing the impact of Carrier-in-Carrier technologies on your satellite monitoring capabilities.
Presented by VASTech
09:30-10:15 Session B
Wireless Solution Innovation: 3D Visualizing Mobile Target Locating and Integrating Facial & Plate
Presented by Sinovatio
10:30-11:15 Session A
Improving Investigations with Advanced Technology and Automation
Investigators today have new technologies to improve outcomes. Artificial Intelligence supports facial recognition, automatic number plate readers, and visual weapon detection. Audio technologies can detect and report gunfire, and language models can estimate a speaker's dialect, gender, and even emotional state. Drones, smart assistants, and biometrics offer new sources of evidence. Law enforcement and government agencies must harness these innovative capabilities to maximize efficiency.
Presented by SS8
10:30-11:15 Session B
Anonymity vs. You: Accelerated WEBINT insights to identify virality, influencers and unmask suspects across social networks
Presented by ClearTrail
11:30-12:15 Session A
Forensic content derived metadata with powerful Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications. Use cases and demonstration.
Highlighting two cornerstone concepts essential for a comprehensive intelligence platform. One: the creation and collection of rich metadata form network communications. Two: the analysis and processing of data to extract intelligence and investigative data.
Presented by AREA
11:30-12:15 Session B
Deriving Insights Through OTT-Encrypted Traffic
While encrypted OTT calls present a challenge to conventional surveillance, they hold high potential for homeland security investigations.
Presented by Intersec
13:15-14:00
Implementing New Investigation Use-cases for LEAs
We will share our top 7 use-cases that, based on our experience, benefit both LEAs and CSPs
Presented by Matison
14:15-15:00 Session A
Solving the challenges of Data-Fusion and Validation: Communication Data, live lawful interception data, mobile forensics extraction and more in a single platform. Use cases and demonstration.
Presented by AREA
14:15-15:00 Session B
Leveraging Vehere AI Counter-Terrorism For Effective Law Enforcement.
High performance Network Analytics with Petabyte Scale & Terabit Speed, powered by AI and LLM.
Presented by Vehere
15:15-16:00 Session A
Similar Trajectories & Hidden Connections Through Telecom Metadata
A demonstration showcasing how telecom metadata, combined with advanced AI algorithms, reveals patterns of life, enhances tracking and minimizes opportunities for criminal escape.
Presented by Intersec
15:15-16:00 Session B
Discover the cutting-edge, all-phone compatible, cost-effective and successful agent.
Presented by MOVIA
15:15-16:00 Session C
AI-based computer vision face and object recognition: Methods, Implementation, and Practical Examples
Presented by True Detection
15:15-16:00 Session D
Password Cracking on FPGA Infrastructure
Presented bySciEngines
16:15-17:00 Session A
AI-powered Metadata Analysis: Unearthing the Secrets Hidden in Digital Footprints
Mitesh Vageriya, CEO, PertSol
16:15-17:00 Session B
Building a network visibility platform to dissect packets in 400G networks by using TAPs and Packet Brokers
Using Network TAPs to get passive access to the network infrastructure. Network Packet Brokers enable you to manage the traffic you want to see. Introducing, PacketFalcon our mobile packet capture device.
Presented by NEOX NETWORKS GmbH
09:10-10:00 Session A
Kick Start Your Investigations with AI
As an analyst, have you ever spent too much valuable time formatting data ready to import and then, having a huge volume of data, quite literally not knowing how to start the investigation? New features in i2 are here to help. A mix of data formats? No problem – we’ll import it all without you to needing to move columns or run a Search and Replace. And once your data is in, we’ll intelligently look at the context and pre-load the most appropriate charts. Want to get a head start in your investigations? Head over to this talk.
Adrian Barfield, Brand Technical Specialist, i2 Group
09:10-10:00 Session B
Integrating Intercepted Data with Digital Forensics for Investigations
Presented by Cellebrite
09:10-10:00 Session C
WHO SAID WHAT TO WHOM AND WHEN – GLOBAL VOICE PRINT DATABASE
Combining Speaker identification, Transcription and Translation for comprehensive increased operational efficiency for organizations within Lawful interception, Intelligence, Security and Defence.
Presented by Conversy
13:00-13:40 Session A
Enhance Tradecraft with a Dynamic Landscape View Focusing on “AAA", and embracing PPP (Public-Private Partnership)
Kevin Lim, Moody's
13:00-13:40 Session B
ORCA - rule the ocean of metadata
Using metadata to answer the important questions of Who, What, Where & When.
Presented by VASTech
13:00-13:40 Session C
Uncovering Digital Footprints with AI-Enabled Data Fusion
In this session, we will present a live simulated case study connecting disparate data sources to accelerate informed decision making. A combination of biometrics, digital forensics, location data, artificial intelligence and active measures are all layered into a single analytical workflow providing users with low risk and highly efficient operational control.
Presented by JSI
13:45-14:30 Session A
Face Recognition in mass terror event
Presented by Corsight AI
13:45-14:30 Session B
Answering the 5W Intelligence Questions Using Advanced Techniques in Multi-Layered Investigation Platform
Presented by Rayzone Group
13:45-14:30 Session C
Data to Decision: Transforming Criminal Investigations with AI-powered Predictive Analytics
Gurjot Sandhu, CBO, PertSol
15:00-15:40 Session A
How AI could support your investigation – a research
Presented by ATIS
15:00-15:40 Session B
Generating CDRs for WhatsApp, Telegram, Viber, Signal, and other Encrypted VoIP Applications
Presented by ClearTrail
15:00-15:40 Session C
Human weakness vs Device weakness
Presented by RCS S.p.A.
16:20-17:00 Session A
Who is communicating with who? - IP end point detection
Communication has moved to encrypted apps in the IP domain. Systems only able to analyze circuit switched data, are operating in darkness. Discover the knowledge that can be extracted from encrypted communication apps.
Presented by XCI A/S
16:20-17:00 Session B
Smartwatches: Exploring Forensic Possibilities and Limitations of the most Popular Wearables
Presented by Compelson
16:20-17:00 Session C
The Encryption Battlefield: Leveraging Metadata and AI for Real-World Intelligence Missions
Presented by ClearTrail
16:20-17:00 Session D
Enhancing Situational Awareness in Control Rooms
A deep dive into advanced tools for managing crowds, analyzing density, and exploring zones to handle demonstrations proactively and effectively.
Presented by Intersec
08:30-09:10 Session A
Real-world results showing the impact of Carrier-in-Carrier technologies on your satellite monitoring capabilities.
Presented by VASTech
09:15-10:00 Session A
Federal Case Study: Actionable insights using AI Powered Intelligence Fusion
Presented by ClearTrail
09:15-10:00 Session B
Accelerate your Investigations with Multi-dimensional Multi-source Analysis
As an analyst, you will be challenged with collating information from a variety of different data sources, often in many different formats. Come and learn how to unlock the power of streamlined data analysis and easily manage the complexity of working with diverse data sources with i2. From databases and applications, CDR and OSINT, to unstructured to semi-structured data, i2 offers a unified platform for comprehensive analysis and intelligence sharing. Join Adrian to understand how to simplify your workflow, and gain new insights with speed and precision. Adrian Barfield, Brand Technical Specialist, i2 Group
11:00-11:40 Session A
Using Advanced Lawful and Location Intelligence to Protect International Borders
Southeast Asia is a global hub for illicit drug production, human trafficking, and wildlife and timber smuggling. Recent investment in infrastructure and intra-regional trade are juxtaposed with disparities in political and economic development, making the region vulnerable to cross-border security risks. As smugglers begin employing new tactics, such as concealing illicit contraband among legitimate goods, SS8's accurate, real-time lawful and location solutions can help border agents reduce international crime.
Presented by SS8
11:45-12:30
Spyder Space: Revolutionize Your Investigative Processes with our cutting-edge solution! Harnessing Data from Mobile Sources, We Optimize, Analyze, and Craft Powerful Insights!
Presented by MOVIA
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
08:30-09:15
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPS
09:30-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS
09:30-10:15 Session B
trovicor’s Latest interception Innovations – Speech Analysis, Encrypted IP applications and hyper efficient Big Data Analytics
Presented by Trovicor
10:30-11:15
AI-Driven Automatic Metadata Modeling for Telecom Fraud Detection, OTT, VPN, and SNS Behavior Identification
Presented by Sinovatio
11:30-12:15 Session A
Next Generation Data Fusion Monitoring Center: new ways of gathering intelligence
Presented by RCS S.p.A.
11:30-12:15 Session B
Big Data Fusion Driving Seamless Digital Operations Transformation
Explore how Big Data Fusion revolutionizes operational efficiency by seamlessly integrating diverse data sources to generate precise insights, breaking down silos, and enhances decision-making. Discover firsthand how to use big data fusion to address data validation challenges, extracting valuable insights from open and hidden sources and creating seamless operations that elevate mission critical performance.
Presented by RAKIA Group
13:15-14:00 Session A
Gaining Knowledge from Mass Data for Actionable Intelligence
Anders Riskaer, Innosystec
13:15-14:00 Session B
The Value of the Analyst-AI Relationship in emerging OSINT Technologies
Presented by OSINT Combine
14:15-14:35
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS
14:35-15:00
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case.
Presented by IPS
15:15-16:00
The Evolution of Mass Media for Data Fusion: Will AI wield the controls for OSINT data curation
The session delves into the fascinating topic of the evolution of mass media for data fusion. It presents an in-depth analysis of how mass media has transformed over the years, and its positive and negative effects on societies, raising awareness about the importance of the role of AI technology in data curation for open-source intelligence (OSINT).
Stavros Vologiannidis, Founder, Business Development, DataScouting
Rami El Sabeh, OSINT Consultant, DataScouting
09:10-10:00 Session a
Overview of the Info-stealer Eco System on the deep & dark web
Presented by S2W
09:10-10:00 Session B
Mastering the Digital Landscape: A Deep Dive into OSINT and Fusion Technology
Within the context of this presentation the RAKIA team provide a step-by-step guide to harnessing OSINT and fusion technology to effectively build a multifaceted comprehensive investigation through a single interface. The use case used will harness the full spectrum of OSINT capabilities including target profiling, mass collection, darknet, avatar design and management, fake accounts identification and mitigation and no code crawlers, link analysis between targets and much more.
Presented by RAKIA Group
13:00-13:40 Session A
The State of Deepfake Detection in 2024: Where and How Bad Actors Are Operating and How to Strike Back
In 2024, the sophistication and accessibility of deepfake technology have escalated, posing significant threats to national security, intelligence operations, and law enforcement efforts. This talk will highlight the geographical hotspots of deepfake activities, the advanced techniques utilized by adversaries, and their typical targets, including high-stakes political events, military conflicts, but also financial crime online such as scams and frauds. Attendees will learn about the latest advancements in deepfake detection, with a focus on Sensity AI's state-of-the-art solutions that integrate advanced AI and deep learning technologies.
Presented by Sensity AI
13:00-13:40 Session B
VIDEO ANALYST - NEO INSIGHT - NEO COLLECT
Collect. Recognise. Analyse. AI-Powered Video, Speech & Social Media Analytics
Jamie Clarke, HTSC-Germany
13:45-14:30 Session A
Using OSINT with visual link analysis to enhance your investigations
Presented by Maltego
13:45-14:30 Session B
Mastering Large-Scale OSINT Investigations: Advanced Tips, Techniques and Tools
In today's digital era, an avalanche of data continually pours into the open-source domain - this overflow poses significant challenges for intelligence analysts striving to extract value from the masses of data available online. In this session, we discuss the expert strategies for streamlining OSINT investigations. We'll also demystify how cutting-edge artificial intelligence and machine learning can empower analysts to transform raw OSINT data into actionable insights.
David Huggett, Senior Tradecraft Advisor, Fivecast
15:00-15:40
The Value of the Analyst-AI Relationship in emerging OSINT Technologies
Presented by OSINT Combine
16:20-17:00 Session A
Boost your investigative prowess with AI on intricate data to uncover remarkable insights and unprecedented connections. Explore real-world applications.
Presented by MOVIA
16:20-17:00 Session B
OSINT Class Product Types Generating Successful Southeastern Asia Investigations
Christopher Parrish, U.S. Secret Service
08:30-09:10
TITLE TBA
Choon Hong Chua, Moody's
9:15-10:00
Beyond Borders: Mastering Passenger Screening with Big Data Fusion
A practical and comprehensive guide on how to make passenger screening easier, faster, and safer with the optimal use of resources. Using real-world cases, participants will be taken through the passenger journey and discover how they can use big data fusion technology to adress common challenges such as: human mistakes, disinformation, misinformation, time spent on verbal and technological treatment, silo effect between local security and international security, fake passport detection, prioritization, and old technologies.
Presented by RAKIA Group
11:00-11:40 Session A
How AI could support your investigation – a research
Presented by ATIS
11:45-12:30
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
15:15-16:00
Countering AI-Driven Cyber Attacks: Post-VPN Strategies for Law Enforcement and Intelligence Infrastructures
This session will explore advanced strategies for countering cyber attacks, emphasising the limitations of traditional VPNs. It will introduce SElink, an innovative technology enhancing security frameworks, and discuss the evolution of Zero Trust and Network Lockdown principles in law enforcement and intelligence IT networks. Attendees will gain insights into cutting-edge approaches for securing the future of digital law enforcement critical operations.
Presented by Blu5 Group
16:15-17:00
Keep your Information Safe! New Trends and Developments in Information Protection
Presented by EO SECURITY s.r.o.
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
10:30-11:15
Navigating the Blockchain: Investigating Suspicious Crypto Transactions and Unveiling the Identities Behind Them
Presented by Rayzone Group
13:15-14:00
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
Erin Brown, Director of Intelligence and Collections, DarkOwl
14:15-16:00
How to build the bridge between fiat and crypto world
Presented by Match Systems
13:00-13:40
Offline darknet investigation with the Web-I-Qube
Stefan Heimgaertner, mh Service GmbH
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
08:30-09:15
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies
10:30-11:15
Satellite Networks: Detecting, Locating and Intercepting transmitters
Presented by Kratos
13:15-14:00 Session A
Protecting Against Vulnerabilities in 2G, 3G, 4G, and 5G Networks
Presented by 4intelligence
13:15-14:00 Session B
Securing Your Mobile World from Surveillance Threats. A deep dive into unmasking and countering IMSI Catchers with Cutting-Edge solutions
Presented by NeoSoft
16:15-17:00
Investigating Serial Crimes with High Accuracy Location
Presented by Polaris Wireless
9:10-10:00
Satellite Interception Systems (Thuraya/ISAT/BGAN/IRIDIUM/Bideou)
Presented by Stratign
13:00-13:40
Investigating Serial Crimes with High Accuracy Location
Presented by Polaris Wireless
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
13:45-14:30
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform. Use cases and demonstration.
Demonstrating Electronic Surveillance solutions and their multiple benefits for the users, unique design, construction quality and principles, together with the adoption of innovative capabilities of AI and ML technologies, to help and speed up daily operations of LEAs, in a forensic proof centralized platform.
Presented by AREA
15:00-15:40
Thor Store & Forward
Presented by Spectronic Denmark
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
09:30-10:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
13:45-14:30
Tactical 5G ID resolution
Presented by EXFO
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
15:00-15:40 Session A
5G passive and active hybrid direction finder, no IMSI encrypt issues any more
Presented by REACH
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
15:00-15:40 Session B
A revolutionary AI Based network independent 5G SA cellular locator
Presented by Septier
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
16:20-17:00
Harnessing AI in Police Investigations: A Focus on Audio, Video, and GPS
Presented by SIO
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
08:30-09:15
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance. Hands on.
Introducing the enhanced capabilities of adopting AI and Machine Learning technologies and the principles within a centralized 5G Monitoring Facility for LEAs.
Presented by AREA
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
09:15-10:00
Oculus 5 - the new 5G recorder from Covidence
Presented by Covidence
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
11:00-11:40
5G Security Encrypted Phone, no information leaking any more
Presented by REACH
Online Social Media and Internet Investigations
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.
08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works, for us. Why it works, for us. How data traffic leaves a permanent trace. How and why everything that was on the internet, is still there. Identifying the structural data and exploits, that will take you to your suspect. Tracking and evaluating data. MAC tracking. If you’ve ever said “it’s been deleted” or “its no longer there”, this seminar is for you. Let me prove you wrong.
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyse it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft. Data collection and interrogation, significance, and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them (where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyse it. Investigator capabilities and opportunities. TCP/IP and header value and analysis
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed. You and your target are being tracked by multi organisations that you done even know exist. Lets identify them and interrogate their data bases.
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web), TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications, and ways to coax offenders out of the system.
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game? Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
"Just google it" is great for tickets, tyres, holidays and opening hours. But as an investigator, we can do better, and safer. Using most main stream search engines and browsers come with certain risks. This session aims to change that. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. Tools that the target can’t see . Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how to fast track you to the data you need, and cut away the chaff. PART 2 on the final day with free tools to download and keep
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Law enforcement and intelligence agencies have massive data sets to pile through in order to find the evidence and information they need for their investigations. This seminar will address how AI is helping. The presentation will first provide a background/primer in at AI technologies - what are the specific types of AI systems; how are they used in industry today; and what are the strengths and weaknesses of AI. The second half will focus on how ISS vendors are leveraging AI to increase agent efficiency and results in network data, OSINT, application profiling, location and image/language processing. Specific topics include:
Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies
Generative AI is a completely new technology that is greatly impacting all aspects of society, industry, politics, and culture. This seminar is going to look at generative AI from law enforcement and the intelligence community’s perspective. The first half of the presentation will focus on what the technology is, how it works, the training sets, what is good at, and the pitfalls. The second half will look at how LEAs and intelligence agencies can leverage the technology; how the technology is already making the lives of agents more difficult; and how generative AI might find itself working into LEA/ISS tools. Specific topics include:
Investigating Targeted Personal Financial Fraud (Pig-butchering), Romance Scams, and Other Financial Scams in Southeast Asia
The fight against targeted personal financial fraud in Southeast Asia requires a multi-pronged approach, combining international cooperation, technological innovation, community empowerment, and individual responsibility. By working together, we can create a future where individuals are safe from exploitation and empowered to pursue their financial goals with confidence.
Christopher Parrish, U.S. Secret Service
OSINT Class Product Types Generating Successful Southeastern Asia Investigations
Christopher Parrish, U.S. Secret Service
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
In this talk, we shall discuss various security mechanisms used in WiFi and Bluetooth networks and how to abuse them to obtain mission-critical intel. Apart from explaining all principles, we will demonstrate them (hopefully live) on our tactical device! Starting with an access point and client scans, we will continue with client targetted jamming and total Denial-of-Service of the whole network that may even result in authentication handshake capture. This handshake contains information to recover the WiFi password to access the targeted network. Once inside the network, we will show essential hacking tools to conduct IP-level reconnaissance. But we will not limit ourselves to WiFi and demonstrate how Bluetooth can be leveraged to notify you about a person's presence or exploit various IoT devices.
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
Trending Topics in Cryptocurrency Forensics
Bitcoin, Ethereum and other cryptocurrencies are becoming mainstream for financial interactions and standard tools when conducting cybercrime such as scams, frauds, ransomware, darknet markets, sextortion, etc. LEAs also adapted to a new situation, and many investigators are already familiar with cryptocurrency basics and how to trace transactions on publicly available blockchain explorers. This session aims to extend the knowledge of participants about more advanced topics such as: a) address clustering techniques and their applicability to various cryptocurrencies; b) monitoring of cryptocurrency networks and their peers with the help of network intelligence; c) geolocating cryptocurrency transaction with IP address or originator; d) overcoming obfuscation of transactions entering and leaving mixers; e) correlating activities on darkweb with blockchain events. Each subtopic will be thoroughly explained, including currently existing methods and tools for addressing associated challenges.
Matěj Grégr (Ph.D., Computer Science), Researcher, Brno University of Technology
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Mastering the password cracking
Users need to provide passwords when they are logging into the computer, starting their smartphone, accessing their favourite web service, opening protected files/disks, connecting to a network or pairing their wearable. Encryption is an inherent trait of digital presence, whether users realize it or not. We will speak about different approaches to password cracking, including dictionary, rule-based, brute-force, hybrid and association attacks. We will show benchmarks of how fast high-end GPU cards can recover passwords for various formats (e.g., Windows credentials, WPA2 handshakes, ZIP and RAR files, LUKS partitions, Android PINs, and iPhone Backups). We will answer what length or complexity of the password is enough to protect your data. Nevertheless, better than guessing the password is knowing the password! We will conclude our talk by demonstrating the applicability of personal information leaks with usernames, emails, phone numbers and passwords!
Jan Pluskal (Ph.D., Computer Science), Researcher, Brno University of Technology
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police