ISS World Asia is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Demonstrations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
Track 6: Mobile Signal Intercept Training and Product Demonstrations
Track 7: Electronic Surveillance Training and Product Demonstrations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Training
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(6 classroom hours)
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)
Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(2 classroom hours)
Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(3 classroom hours)
Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
09:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation
10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective
11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators
13:30-14:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies
14:45-15:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know
16:00-17:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
09:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking
13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving
16:00-17:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone.
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(FULL SESSION DESCRIPTION PRESENTED BELOW TRACK 8)
Wednesday, 7 September 2022
10:00-18:00
Thursday, 8 September 2022
9:30-12:30
8:15-8:30
Welcoming Remarks
Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Government Intelligence Community and Who at ISS World Asia has Solutions
Dr. Jerry Lucas, President, TeleStrategies
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
13:30-14:30
CY4GATE/RCS: Integrated Cyber-Intelligence solutions.
Presented by CY4GATE
16:00-17:00 Session A
Accelerating investigation workflows with specially designed IT- and phone forensic laboratories
Cyfluene, fake news and campaign detection
Stefan Heimgaertner, mh Service GmbH
16:00-17:00 Session B
Why secure hardware alone is just not enough: Bittium Tough Mobile 2
Presented by Bittium
09:00-10:00 Session A
Interception Challenges and Solutions on VoLTE Network for LEA's
Presented by InterProbe
09:00-10:00 Session B
The implications of FAKE NEWS - Helping government agencies identify and combat disinformation campaigns
Presented by Cyabra
13:00-13:40
Next Generation Intelligence Driven by Diverse Data Fusion
Presented by Sinovatio
13:45-14:30
Mobile tracking & geodata-driven investigations
Presented by Intersec
15:00-15:40
Tremendous impact of 3Vs on enhanced intelligence gathering and data insights
Presented by InterProbe
09:15-10:00
Cyber Threat Intelligence in Context of Counterterrorism
Presented by Resecurity
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
09:00-10:00 Session A
A light in the darkness of Encrypted Communications
Network Cyber Intelligence, metadata driven, country scale solution.
Presented by AREA
09:00-10:00 Session B
Obtaining valuable information from information from the latest versions of Windows
Presented by MOLLITIAM CYBERINTELLIGENCE
10:15-11:15 Session A
Cyclops Analysis: Determine the impact of Carrier in Carrier technology on your satellite monitoring capabilities.
Presented by VASTech
10:15-11:15 Session B
Deep shadowing with Gens.AI.
Presented by CY4GATE
11:30-12:30 Session A
How to bring precise location data, call record data and metadata together for advanced intelligence
There is an enormous amount of disparate data that investigators have access to, yet finding and analyzing the most relevant data can be arduous. Learn how to shorten investigation time and improve investigation results.
Presented by SS8
11:30-12:30 Session B
Anonymity vs. You: Accelerated WEBINT insights to identify virality, influencers and unmask suspects across social networks
Smart Methods to Identify Virality, Bots & Personally Identifiable Information
Presented by ClearTrail
13:30-14:30 Session A
Combating terrorism, espionage and crime by combining mobile network metadata, mass positioning, and intelligent profiling in real-time
Oskar Axelsson, Product Manager, Xolaris
13:30-14:30 Session B
Fighting Crime with Cutting-Edge Speech Technologies
In this session, you will discover the latest capabilities of voice biometrics and speech recognition and how these technologies can help law enforcement agencies fight crime efficiently.
Presented by Phonexia
14:45-15:45 Session B
Intelligence IoT: Networked Tactical Intelligence
Presented by Ateros
16:00-17:00 Session A
Geo-monitoring and profiling covering all connected devices and networks (3/4/5G and WiFi) globally
VP Sales and Marketing, GeoGence
16:00-17:00 Session B
Social Media Mining For Real Identification & OTT Communication Relation System Demo
Presented by Sinovatio
09:00-10:00 Session A
Lawful intelligence: multi-platform active cyber surveillance at the time of end-to-end encrypted communications.
Presented by RCS
09:00-10:00 Session B
Simplifying The Intelligence Complexity
Data Management & Analysis Automation in Multisensory Environment, Leveraging ML&AI with Real-Time Rule Engine for Critical Environments.
Omri Raiter, CTO and Co-Founder, RAKIA
13:00-13:40 Session A
The investigator toolbox: from Electronic Surveillance to Cyber Intelligence
Specialized digital tools to get the task done
Presented by AREA
13:00-13:40 Session B
ORCA - rule the ocean of metadata
Presenting VASTech’s solution for fusing telecommunications, IP, and location data from fibre cables, mobile networks, and satellite signals. Using metadata to answer the important questions of Who, What, Where, and When?
Presented by VASTech
13:00-13:40 Session C
Pulling Intelligence from the Edge
Presented by JSI
13:45-14:30 Session A
Revolution in Audio Investigations
At this session, you will discover an extremely efficient way to investigate audio recordings with Phonexia Orbis Investigator. Get ready to see the world’s most advanced voice biometrics in action!
Presented by Phonexia
13:45-14:30 Session B
Dark what?! Telegram is now the hub for hackers, fraudsters and other criminals
Presented by S2T
13:45-14:30 Session C
Streamlining law enforcement and national security communities through convergent intelligence and security technologies
Oskar Axelsson, Product Manager, Xolaris
15:00-15:40 Session A
BTS Geolocation for Emergency Services. Anonymous Simcard, Private Network
Presented by NEGG
15:00-15:40 Session B
Using multimodal, multilingual, cross-platform tools to identify online threats and the resulting individual, institutional and societal harms
Presented by Logically
15:00-15:40 Session C
Simplify investigation with one platform
Presented by ATIS
15:00-15:40 Session D
CDRs of WhatsApp, Signal, Telegram and other encrypted VoIP messaging applications
Presented by ClearTrail
16:20-17:00 Session A
Every piece of data tells a story – combine and analyze data from any source in your digital investigation.
Mark Uldahl, CTO, XCI A/S
16:20-17:00 Session B
Leveraging open-source data to predict and prevent future attacks: combating threats with advanced AI-based technology
Presented by Voyager Labs
16:20-17:00 Session C
Early detection of malware, bots and advanced persistent threats (APTs) on high-speed networks at a national scale
Presented by ClearTrail
16:20-17:00 Session D
Advanced data exfiltration on modern smartphones: inside the targets compromised
Presented by MOLLITIAM CYBERINTELLIGENCE
08:30-09:10 Session A
Fibre Signal Analysis: What intelligence value does a fibre link contain?
Presented by VASTech
9:15-10:00 Session A
Majestic5 - "The Swiss army knife for all your OSINT tasks"
Omri Raiter, CTO and Co-founder, RAKIA
9:15-10:00 Session B
Encryption Vs You: Identify potential suspects through mass IP metadata analysis at a countrywide scale
Presented by ClearTrail
11:00-11:40 Session A
New perspectives for Strategic Investigation – Latest Innovations!
Presented by Advanced Systems
11:00-11:40 Session B
How to empower the local workforce and enhance their capabilities in the fields of Lawful Interception
Presented by Butterfly Effect
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
09:00-10:00 Session A
Massive Social Media data collection and analysis for Counter-Terrorism Intelligence Activities
Presented by IPS
09:00-10:00 Session B
Investigate, prevent and mitigate risks of riots, terrorism, and crimes through a country-wide geo analytical AI.
Massive detecting and tracking crowds with alerting anomaly situations. Targeted finding a second hidden phone number, companions, and similar persons by behavior. Geofense and Massive Profiling.
Presented by Butterfly Effect
10:15-11:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS
10:15-11:15 Session B
No data scientists? No problem! Intuitive AI for SOCMINT
All intelligence teams have a data problem – too much data & not enough resources to analyze it. In this session, we’ll show you how you can leverage AI and machine learning technology to quickly deliver insights across masses of deep web data, without the need for specialist data science skills. Through real-life examples, you’ll learn how continuous, real-time data collection and intuitive AI-enabled risk analytics are a powerful combination for effective SOCMINT.
Presented by Fivecast
13:30-14:30
Indicators and Warnings of War: Using Open Source and Location Intelligence Capabilities to Identify Key Digital Combat Indicators
Mark Powell, Senior Vice President - International Operations, Babel Street
14:45-15:45
Data breaches compromising national security
Nowadays, it’s essentially impossible to totally avoid data breaches. They will happen eventually, regardless of what cybersecurity measures have been taken. Social Links will tell how to detect and mitigate the data leak with OSINT before it spirals into a multi-million dollar corporate problem, or a critical lapse in national security.
Presented by Social Links
16:00-16:30
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS
16:30-17:00
Cyber Threat Intelligence to accelerate online investigations
Presented by IPS
9:00-10:00 Session A
Web Intelligence in Action [+ Government Speaker]: How a 5-Eyes agency operates its ‘National OSINT Centre’ with Cobwebs tools.
Presented by Cobwebs + Government Speaker
9:00-10:00 Session B
POLARIS Fusion – Transforming Information Into Intelligence
Presented by Rheinmetall
13:00-13:40 Session A
Location & Open Source Intelligence: Real Life Case Studies & Live Demonstration
Presented by Cobwebs
13:00-13:40 Session B
Monitoring maritime crime and threats in supply chain using OSINT
Presented by S2T
13:00-13:40 Session C
Localize. Engage. Interact. How to stealthily exploit information
Presented by NEGG
13:45-14:30
Full Spectrum OSINT - combatting threats with consolidated open-source platforms
Presented by OSINT Combine
15:00-15:45 Session A
Supercharged IPDR extraction and analysis - Advanced Internet Activity Analytics
Presented by Advanced Systems
15:00-15:45 Session B
Every Second Matters - a race against the clock using open, deep, and dark web to expose network behind recent incident in APAC
Presented by Voyager Labs
16:20-17:00 Session A
Finding the Relevant Pieces of the Puzzle across Multiple Data Sources and Identifying Targets to Discover Real Identities
Presented by Innosystec
16:20-17:00 Session B
CLOS-INT Closed Source Intelligence from Web2.0 sources
Beyond the limitations of OSINT, through fully independent platform
Presented by AREA
08:30-09:10 Session A
Crowd control on the internet via OSINT
Presented by MOLLITIAM CYBERINTELLIGENCE
08:30-09:10 Session B
Siren - The importance of search across multiple data sources in Law Enforcement and National Security
Presented by Siren
08:30-09:10 Session C
Blending Artificial and Expert Intelligence to Combat the Harms Associated with Mis- and Disinformation
Presented by Logically
11:00-11:40 Session A
Simplify investigation with one platform
Presented by ATIS
11:00-11:40 Session B
Using social media intelligence to identify influence operations, radicalisation and online threats
Presented by Logically
11:45-12:30
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
10:15-11:15
The Investigation Cycle: Enhance Your Investigation with Multiple Sensors
Presented by Rayzone Group
11:30-12:30 Session A
Back to the Future Using ADINT Solutions
Presented by Rayzone Group
11:30-12:30 Session B
Cost effective cyber monitoring using all-optical switching
Presented by Huber+Suhner
14:45-15:45
Geolocation Intelligence for Counter-Terrorism
As terrorist activity becomes increasingly sophisticated, the effectiveness of detection and investigation capabilities depends more and more on the quality, detail and accuracy of geolocation intelligence delivered for threat analytics and targets tracking. The session will cover specifics, actual challenges, and approaches of how security and law enforcement professionals may track high-risk individuals and groups, attribute suspects locations, devices, and movements in preemptive operations, surveillance, and counter-terrorism tasks.
Ayman Alshobaki, Business Development Manager, Middle East, Resecurity
9:00-10:00
Meet the Expert: Dive Deep into the Challenges of Big Data Fusion
Presented by Rayzone Group
13:45-14:30 Session A
S2W Quaxar, Tracking the footprints about the initial access broker and the data broker based on Cyber Threat Intelligence Solution
Presented by S2W
13:45-14:30 Session B
Shaping the ultimate communication protection strategy: custom-hardened, tamper-proof laptops for uncompromised security
Presented by Feedback Italia
16:20-17:00
Early warning threat detection solution baed on mobile, IOT Devices and IPs profiling networks (3/4/5G and WiFi) globally
VP Sales and Marketing, GeoGence
8:30-9:10
Why software is not enough: building next generation, hardenized smartphones for communication security
Presented by Feedback Italia
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
13:30-14:30
Ransomware Money Laundering Tactics
Nicholas Smart, Head of Blockchain
Intelligence, Crystal
14:45-15:45 Session A
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
David Alley, CEO, DarkOWL FZE
14:45-15:45 Session B
Everything You Need To Know About Cryptocurrency-Based Crime & Investigations
Cryptocurrency is always changing, and so is cryptocurrency-based crime. Join this session to help you understand the latest trends around cryptocurrency and crime, including:
Presented by Chainalysis
13:00-13:40
Offline darknet investigation with the Web-I-Qube
Stefan Heimgaertner, mh Service GmbH
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
09:00-10:00
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies
11:30-12:30
VSAT Networks: Tactical and Strategic Threat Detection and Geolocation
Presented by Kratos
13:30-14:30
Intelligence from VSAT/FSS satellite communication systems
Presented by Rohde Schwarz
9:15-10:00
Lawful Access to Location with Intersec GeoSafe LI
Presented by Intersec
11:00-11:40
Enhancing security and border control with distributed satellite intelligence solutions
Presented by Rohde Schwarz
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
13:45-14:30
OSCURO: Covert offensive tooling in the WIFI spectrum
Presented by SIGN4L (EDGE GROUP)
15:00-15:40
See it. Hear it. Try it - The latest and greatest from Spectronic Denmark
Presented by Spectronic Denmark
8:30-9:10
Compact, flexible, and intelligent tactical electronic surveillance.
Live demo of fully scalable enabling platform LEMF with synchronized multimedia on a single panel.
Presented by AREA
11:45-12:30
Compact and complete electronic surveillance solutions.
Audio, video and location in the palm of your hand.
Presented by AREA
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
10:15-11:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
16:20-17:00
Advanced geolocation with mobile carriers, enhanced by 5G
Presented by Intersec
9:15-10:00
Building All-round Security Awareness in 5G Network - Practical 5G Locator and LI solutions
Presented by Sinovatio
11:00-11:40
5G Enabled LEMF
Deployment scenarios and live demo.
Presented by AREA
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
09:00-10:00
Proxies, VPNs, and Dark Web: Identity Concealment and Location Obfuscation
10:15-11:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Operational Perspective
11:30-12:30
How Criminals exploit Darknet Services and Dark Markets: A Deep Dive for Criminal Investigators
13:30-14:30
Tor, onion routers, Deepnet, and Darknet: Investigative Strategies & Case Studies
14:45-15:45
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know
16:00-17:00
Collecting Evidence from Online Communication: Building a Cyber-OSINT Toolbox
(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet,
how to find data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox, and having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar.
09:00-10:00
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works. Why it works. How it works for us .How data traffic leaves a trace ; What the internet is; what is an IP and how is it significant to trace a person. IPv4 and IPv6 – understanding the changes- the benefits and pitfalls for the investigator. The internet has millions of copies of data on it - why, and where can we find this. Tracking and evaluating data. MAC adders tracking.
10:15-11:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyze it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft .Data collection and interrogation, significance and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyze it. Investigator capabilities and opportunities.
11:30-12:30
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed.
13:30-14:30
Awareness of Emerging Technologies, Masking Tech and Tools, TOR and proxies
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web) , TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications and ways to coax offenders out of the system.
14:45-15:45
Advanced Techniques in Tracing Suspects, and lateral problem solving
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game?. Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
16:00-17:00
Open Source Tools, PART 1. Resources, tradecraft and techniques - highlighting the best free tools and resources
"Just google it" doesn't work anymore. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. A look at a selection of 200+ tools available on Mark's open source law enforcement tools website, that search engines can’t see, with login and password provided during the session. Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how. PART 2 on the final day with free tools to download and keep
Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategies
This session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Understanding 5G Stand Alone, NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
Cellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Device Geolocation through GPS, Wi-Fi Triangulation, Cell site Trilateration, BLE Beacons, and Ultra-Wideband: What Investigators Need to Know
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police