ISS World Europe is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
Track 6: Mobile Signal Intercept Training and Product Presentations
Track 7: Electronic Surveillance Training and Product Presentations
Track 8: 5G Lawful Intercept, Tracking and Forensics Product Training
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
Training Seminars Led by Law Enforcement Officers and Ph.D., Computer Scientists
20 classroom training hours, presented by Law Enforcement Officers and Ph.D. Scientists
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(7 classroom hours)Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(1 classroom hours)Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(3 classroom hours)Vladimir Vesely (Ph.D., Computer Science) Researcher, Brno University of Technology
(3 classroom hours)
Tuesday, 3 June 2025
Seminar #1
08:30-15:05Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-15:05(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UKPolice
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
Seminar #3
08:30-09:20Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Seminar #4
09:25-10:15Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesCellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone. (Full description below Track 9)
Seminar #5
10:35-11:25Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesSeminar #6
11:30-12:20Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesThursday, 5 June 2025
Seminar #7
13:00-14:00(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PolicePre-Conference Sessions Description At The End of Agenda PostinG
Welcoming Remarks and Top Ten Challenges
Wednesday, 4 June 2025
8:15-8:30 Tatiana Lucas, ISS World Program Director, TeleStrategies
8:30-9:00
Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Europe has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World Europe Exhibit Hours:
Tuesday, 3 June 2025
9:10-18:15Wednesday, 4 June 2025
9:10-18:15
Thursday, 5 June 2025
8:30-15:00
Track 1: Lawful Interception and Criminal Investigation Training
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
Tuesday, 3 June 2025
11:30-12:20
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will present how its innovative technologies can help Security and Defence organizations respond rapidly to a wide range of threats.
Presented by Phonexia14:45-15:05
Simplifying lawful requests: how CSPs can automate, secure and speed their responses to criminal investigations
Presented by Subtonomy15:25-16:05 Session B
Accelerating investigation workflows with specially designed IT-forensic laboratories
incl. Cyfluene, fake news and campaign detection
Presented by mh-service GmbH16:10-17:00 Session B
Remove unwanted data (e.g. video, encrypted traffic, etc.) at n x 100 Gbps using an ultra-compact server
Presented by Napatech
Wednesday, 4 June 2025
13:00-13:40
5G LI Technical Compliance Challenges from a Mobile Operator Industry Perspective
Alex Leadbeater, Technical Security Director GSMA, Chair 3GPP SA3-LI / ETSI TC Cyber
15:00-15:40 Session A
Analyzing Social Networks
BREVIS and OSINT Plugin for i2 Analyst Notebook. Analyze Social Networks – Twitter, Facebook, Linkedin, YouTube, VK, Instagram, TikTok, Telegram, WhatsApp and Pipl.
Presented by MKCVI15:00-15:40 Session B
Interception Challenges on VoLTE Network for LEA's
The presentation on "Interception Challenges on VoLTE Networks for LEAs" promises to unravel the intricate landscape of lawful interception in Voice over LTE (VoLTE) networks. This session dives into the specific challenges faced by Law Enforcement Agencies (LEAs) in ensuring secure and effective interception within the VoLTE framework. The audience can expect a detailed exploration of methodologies, standards, and innovative solutions designed to address the unique complexities of VoLTE networks, providing valuable insights into the evolving landscape of surveillance technologies for LEAs. The session covers a range of critical topics, including Lawful Interception Methodologies, Mobile Network Topology, Interception on GSM/UMTS Network, Challenges & Solutions on IMS Network, and Next Generation Monitoring Center. Attendees will gain insights into the methodologies and standards governing lawful interception, the complexities of mobile network structures, challenges faced in intercepting GSM/UMTS networks, and innovative solutions for navigating the IMS landscape. The presentation also highlights the advanced capabilities of the Next Generation Monitoring Center, offering a glimpse into the future of interception technologies. The audience can anticipate a detailed and informative session providing a deep understanding of the subject matter and the cutting-edge solutions presented by InterProbe.
Serkan Altınışık, Vice Chairman of the Board, Interprobe15:00-15:40 Session C
How to Detect Fake News
This talk will delve into the challenges posed by digital manipulation techniques. This informative session highlights crucial detection methods needed to identify and mitigate the impact of bots, fake news, and deep fakes in shaping public perception. Gain insight into the detailed overview of the evolving landscape of digital deception, emphasizing its implications on the integrity of information in today's interconnected world.
Presented by Cyabra15:00-15:40 Session D
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Presented by PhonexiaThursday, 5 June 2025
8:30-9:10 Session B
Chinese Open Source Intelligence Collection Techniques
The common narrative is that researching online in a foreign language requires a native speaker - when none are available, teams often rely completely on AI to tackle this.
We demonstrate that researching online in Chinese using I-Intelligence's methodology yields fast and accurate results when adopting an investigative mindset and mastering the basics.
Skip Schiphorst, OSINT language course instructor and coordinator, i-intelligence GmbH9:15-10:00 Session A
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
In this talk, we shall discuss various security mechanisms used in WiFi and Bluetooth networks and how to abuse them to obtain mission-critical intel. Apart from explaining all principles, we will demonstrate them (hopefully live) on our tactical device! Starting with an access point and client scans, we will continue with client targetted jamming and total Denial-of-Service of the whole network that may even result in authentication handshake capture. This handshake contains information to recover the WiFi password to access the targeted network. Once inside the network, we will show essential hacking tools to conduct IP-level reconnaissance. But we will not limit ourselves to WiFi and demonstrate how Bluetooth can be leveraged to notify you about a person's presence or exploit various IoT devices.
Vladimir Vesely (Ph.D., Computer Science) and Jan Pluskal, Researchers, Brno University of Technology9:15-10:00 Session B
Using Arabic Script Languages for Online Target Discovery
The amount of content being uploaded in languages using an Arabic alphabet keeps growing at a very fast pace. Being able to tackle online content using this alphabet is essential for any organization’s decision-making process. This introduction will show some of the techniques that will help you find the content that you're looking for using an Arabic alphabet without prior knowledge of this language.
Paolo Walcher, Arabic OSINT Instructor, i-intelligence GmbH11:00-11:40 Session A
From Academia to Industry: Dealing with Cryptography in Real Life
It is a common thought that cryptography is so theoretical to understand, and so technical to defeat, that it can’t be done without enormous effort and technical prowess only found in State Agencies. That is not completely true. In fact, there are many cryptographic problems developers and investigators routinely encounter that they think are insurmountable, but are not. Instead, with a systematic cryptographic approach, these issues can be overcome with modest effort and cost-effective tools. There is a need to use mechanisms that include algorithms, protocols and primitives in accordance with international standards such as ISO and FIPS, with a well-planned development, comprehensive testing and validation process. On the other hand, the strong analysis mechanism to obtain the decryption key is important for investigators. Forensics, reverse engineering, binary analysis, as well as the use of cryptanalysis attacks with AI-based dictionaries or rainbow tables are also used. For these reasons, tools that can operate all these mechanisms systematically that can manage them from a single point make it easier for investigators to deal with real-life use cases.
Özge Acar Küçük, Cryptography Managing Director, Interprobe11:00-11:40 Session B
Understanding the Implications of Online Social Media and OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police11:45-12:30 Session A
Trending Topics in Cryptocurrency Forensics
Bitcoin, Ethereum and other cryptocurrencies are becoming mainstream for financial interactions and standard tools when conducting cybercrime such as scams, frauds, ransomware, darknet markets, sextortion, etc. LEAs also adapted to a new situation, and many investigators are already familiar with cryptocurrency basics and how to trace transactions on publicly available blockchain explorers. This session aims to extend the knowledge of participants about more advanced topics such as: a) address clustering techniques and their applicability to various cryptocurrencies; b) monitoring of cryptocurrency networks and their peers with the help of network intelligence; c) geolocating cryptocurrency transaction with IP address or originator; d) overcoming obfuscation of transactions entering and leaving mixers; e) correlating activities on darkweb with blockchain events. Each subtopic will be thoroughly explained, including currently existing methods and tools for addressing associated challenges.
Vladimir Vesely (Ph.D., Computer Science) and Jan Pluskal, Researchers, Brno University of Technology
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 3 June 2025
08:30-09:20 Session A
ESG and Munich Innovation Labs presents a Crowd-sourced Information Platform (CIP)
ThevCrowd-sourced Information Platform (CIP) enhances real-time situational awareness by integrating data from various sources such as social media, webcams, drones, and other sensors with ground-truth information provided by field operatives. This platform is valuable for both territorial defense and civil applications, emphasizing privacy-by-design principles at its core. Furthermore, by incorporating Large Language AI capabilities, CIP efficiently extracts geoinformation at scale.
Presented by ESG09:25-10:15 Session B
From Data Deluge to Discovery: Leveraging AI to Accelerate Investigations
Lawful intercept and data fusion can provide tremendous investigative potential, but unlocking their full value requires advanced tools. This session explores the rising role AI can play in uncovering hidden patterns and anomalies within your data. Discover how AI can accelerate investigations and improve resourcing, while maintaining compliance with new regulations, like the EU AI Act. The session concludes with a live demo showcasing how AI enrichments extract context-rich insights faster.
Sean Thibert (Product Manager, AI Solutions), JSI
10:35-11:25 Session A
Discover the cutting-edge, all-phone compatible, cost-effective and successful agent.
Presented by Movia10:35-11:25 Session C
Supercharged IPDR extraction and analysis - Encrypted IP Applications and Advanced Internet Activity Analytics
Presented by Datafusion Sytems10:35-11:25 Session D
Enhancing Situational Awareness in Control Rooms
A deep dive into advanced tools for managing crowds, analyzing density, and exploring zones to handle demonstrations proactively and effectively.
Presented by Intersec
11:30-12:20 Session B
Deriving Insights Through OTT-Encrypted Traffic
While encrypted OTT calls present a challenge to conventional surveillance, they hold high potential for homeland security investigations.
Presented by Intersec13:20-14:10 Session C
Challenges of Building the Broad Intelligence Picture
Presented by Cognyte14:15-15:05 Session B
AI Counter-Terrorism Platform for Effective Law Enforcement
Presented by Vehere15:25-16:05 Session A
VIDEO ANALYST - NEO INSIGHT - NEO COLLECT
Collect. Recognise. Analyse. AI-Powered Video, Speech & Social Media Analytics
Jamie Clarke, HTSC-Germany15:25-16:05 Session B
Modernizing Digital Investigations: Automation and Data Enrichment for Efficient and Effective Case Resolution
In this session, you'll discover how leading investigation units are adopting a modern approach to digital investigations with automation and data enrichment. Learn how to tackle the challenges of managing large data volumes and drive faster and more efficient case resolutions.
Meirav Gingold, Product Owner, Cellebrite15:25-16:05 Session C
Similar Trajectories & Hidden Connections Through Telecom Metadata
A demonstration showcasing how telecom metadata, combined with advanced AI algorithms, reveals patterns of life, enhances tracking and minimizes opportunities for criminal escape.
Presented by Intersec15:25-16:05 Session D
Password Cracking on FPGA Infrastructure
Presented by SciEngines16:10-17:00 Session A
AI empowered speech technologies: making your audio searchable
Discover our next generation AI speech processing software designed to help professional users extract critical information from large amounts of multilingual audio data. Functionalities includelanguage identification, speech transcription and keyword spotting to ease your OSINT and COMINT activities.
Jodie Lechapelain, Director, Vocapia Research16:10-17:00 Session B
AI-powered Metadata Analysis: Unearthing the Secrets Hidden in Digital Footprints
Mitesh Vageriya, CEO, PertSol16:10-17:00 Session C
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated Cyber Intelligence solutions.
A structured case-study
Presented by AREA16:10-17:00 Session D
Orca Connect: connecting your intelligence gathering systems to fibre and satellite signals.
Presented by VASTech
Wednesday, 4 June 2025
09:10-10:00 Session A
Kick Start Your Investigations with AI
As an analyst, have you ever spent too much valuable time formatting data ready to import and then, having a huge volume of data, quite literally not knowing how to start the investigation? New features in i2 are here to help. A mix of data formats? No problem – we’ll import it all without you to needing to move columns or run a Search and Replace. And once your data is in, we’ll intelligently look at the context and pre-load the most appropriate charts. Want to get a head start in your investigations? Head over to this talk.
Adrian Barfield, Brand Technical Specialist, i2 Group09:10-10:00 Session B
Special IT-forensic workflow including tactical and covert rapid on-scene triage and acquisition
Presented by mh-service GmbH and Detego Global
13:00-13:40 Session A
Drones and UAVs Redefining Tactical Intelligence.
Presented by Ateros13:00-13:40 Session B
Forensic content derived metadata with powerful Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Use cases and demonstration.
Presented by AREA13:00-13:40 Session C
Transformational Power of Graph Data for Law Enforcement Agencies: A Case Study
A case study showing the impact of graph technology on law enforcement’s ability to use ever-growing volumes of data to prevent crime and protect communities. When faced with the challenge of turning this valuable, disconnected and siloed data into actionable intelligence, an Australian police force successfully implemented a graph database and the Hume graph analytics platform, consolidating such data into a dynamic knowledge graph. The result was a connected view of intelligence, enabling their analysts to solve crimes much faster.
Petr Matuska, Sales & Sales Engineering Lead, GraphAware13:45-14:30 Session B
Spyder Space: Revolutionize Your Investigative Processes with our cutting-edge solution! Harnessing Data from Mobile Sources, We Optimize, Analyze, and Craft Powerful Insights!
Presented by Movia13:45-14:30 Session C
AI powered monitoring centre of the future
Live demo of how AI and ML is speeding up intelligence assessment cover DPI, voice and image processing.
Jez Nelmes, Product Manager, BAE Systems Digital Intelligence13:45-14:30 Session D
From Data to Action: How Technology is Revolutionizing Law Enforcement
Presented by Cognyte
15:00-15:40 Session A
Intelligence-led Policing in the 21st Century
Powerful data analysis and fusion solutions help investigators build intelligence-led profiles of targets that combine lawfully intercepted data with OSINT resources like financial records, criminal history, and social media. Investigators today can associate unknown devices with subjects of interest, anticipating where criminals meet, and extract insights from encrypted traffic. In addition, technological advances like Voice over New Radio are providing better data quality than ever before.
Presented by SS8 Networks15:00-15:40 Session B
Smartwatches: Exploring Forensics Possibilties and Limitations of the most Popular Wearables
Join MOBILedit Team presentation focused on investigation of smartwatches, the world's most popular wearable devices. Uncover how the personal data stored in these devices, from heartbeat details to moments of stress or excitement, can provide critical clues in investigations. Learn why smartwatch examination is not just an option but a necessity in the toolkit of modern digital forensics, offering a unique and intimate glimpse into the life of a user.
Presented by Compelson15:00-15:40 Session C
Orca Capture: process and store traffic using protocols found in modern networks
Presented by VASTech15:45-16:25 Session A
Every piece of data tells a story – combine and analyze data from any source in your digital investigation.
Mark Uldahl, CTO, XCI A/S15:45-16:25 Session C
Unraveling JA3 and JA4+: Global Botnet Detection via Encrypted Traffic Fingerprinting
Network security teams and government defense agencies are leveraging encrypted traffic fingerprinting techniques such as JA3/JA3S to detect C2 servers and global botnet campaigns. Learn what a JA3 fingerprint is and how it is evolving to stay ahead of threat actors. Beyond TLS, what are teams doing to fingerprint traffic encrypted via SSH and QUIC?
Mike Seidler, VP Product Management, NetQuest16:30-17:15 Session A
Unveiling the invisible: enhancement and authentication techniques for image and video evidence investigations
In modern digital investigations, the truth often lies beneath the surface, waiting to be uncovered. A thorough examination is essential to reveal hidden information, whether obscured by pixel-level defects or embedded in metadata. Join us to explore how Amped Authenticate and Amped FIVE empower investigators to expose these invisible truths.
Discover cutting-edge and forensically sound techniques that enhance the visual clarity of your images and videos while verifying their integrity and authenticity. Prepare compelling presentation materials showcasing the results of your processing. Learn to harness the power of scientifically-backed analysis and enhancement tools to elevate your investigative capabilities. Don’t miss this opportunity to transform your approach to solving cases and uncovering evidence.
Presented by Amped Software
16:30-17:15 Session C
How Lawful Interception benefits from Traffic Filtering.
High bandwidth networks like fiber and eMBB (LTE / 5G) put new requirements to a Lawful Interception solution. With high throughput data streams, the costs of processing this data increases. However, not all data is relevant for an investigation, e.g., Netflix and application and OS updates carry no user data. Within this session we will discuss how Lawful Interception benefits from Traffic Filtering capabilities.
Presented by Group 200016:30-17:15 Session E
From data hell to knowledge well: turning raw internet traffic to investigative intelligence.
There is still great value in network traffic analysis stemming from Lawful Interception. However, stakeholders need to confront with complex challenges like pervasive encryption and application diversity, which hinders the ability to achieve immediate and actionable insights from data streams. This session discusses the foundations of Detecta, the brand-new data analysis platform by RCS, born to help investigators without deep technical skills to discover the big picture buried into internet traffic. A live demo will show practically the benefits of this new approach.
Presented by RCSThursday, 5 June 2025
08:30-09:10 Session B
Data to Decision: Transforming Criminal Investigations with AI-powered Predictive Analytics
Gurjot Sandhu, CBO, PertSol08:30-09:10 Session C
Generative AI-Led Federal Case Study: Intelligent Fusion
Presented by ClearTrail
09:15-10:00 Session A
Harnessing Generative AI to Power the Next Generation of Digital Intelligence
Generative AI is having a rapid and unprecedented impact on how insights are extracted and surfaced from varied datasets. This session explores the potential of this technology within Law Enforcement and Intelligence, in targeted use cases such as threat analysis and generating investigative leads. We will address shifting regulations and strategies to maintain compliance. The session concludes with a demonstration showcasing how the 4Sight Digital Intelligence platform uses generative AI to enhance workflows and improve team efficiency.
Sean Thibert (Product Manager, AI Solutions), JSI09:15-10:00 Session B
Accelerate your Investigations with Multi-dimensional Multi-source Analysis
As an analyst, you will be challenged with collating information from a variety of different data sources, often in many different formats. Come and learn how to unlock the power of streamlined data analysis and easily manage the complexity of working with diverse data sources with i2. From databases and applications, CDR and OSINT, to unstructured to semi-structured data, i2 offers a unified platform for comprehensive analysis and intelligence sharing. Join Adrian to understand how to simplify your workflow, and gain new insights with speed and precision. Adrian Barfield, Brand Technical Specialist, i2 Group09:15-10:00 Session C
A Single Platform to Manage All Requests from Law Enforcement Agencies (LEAs)
Presented by Microtel Innovation09:15-10:00 Session D
Using Zero-days in Mobile Forensics for Advanced Data Extractions
Presented by Secfence09:15-10:00 Session E
Any Digital Footprint with AI-Enhanced capabilities
Presented by Prelysis11:00-11:40 Session A
Top 5 AI Trends Redefining Law Enforcement Investigations
Presented by Cognyte11:00-11:40 Session B
Using situational awareness and C2 tools to achieve faster decisions and actions during operations
Presented by Drakontas LLC11:45-12:30 Session A
Orca Integrate and View: integrate data from many different sources to view, filter, and query the results in a single user interface
Presented by VASTech11:45-12:30 Session C
Deep Network Visibility at International Scale Via Enriched Traffic Metadata: IPFIX for OTU4, STM64 and 100GbE Networks
National defense missions require deep signals intelligence from OTN, SDH and Ethernet networks. Learn how unsampled flow-based metadata and IPFIX can provide 100% visibility into telecommunication cables including IP addresses, layer 7 application classification and protocol-specific data from TLS, QUIC, DNS, HTTP, SIP and other traffic types.
Mike Seidler, VP Product Management, NetQuest11:45-12:30 Session D
Similar Trajectories & Hidden Connections Through Telecom Metadata
Presented by Intersec13:00-13:40 Session A
Experience the Future of Raw IP data Analysis for Actionable Intelligence.
Never miss intelligence from WhatsApp, FaceTime and other encrypted calls made by the targets you are investigating and get their behavior on a timeline. Discover Simplicity and Power - No technical expertise required.
Presented by ClearTrail with Mark Bentley, UK Police13:00-13:40 Session B
VIDEO ANALYST - NEO INSIGHT - NEO COLLECT
Collect. Recognise. Analyse. AI-Powered Video, Speech & Social Media Analytics
Jamie Clarke, HTSC-Germany
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Training
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
Tuesday, 3 June 2025
08:30-09:20 Session A
The ultimate AI-driven Intelligence to monitor and extract meaningful information from Social Media and Traditional Media like TV and Radio to improve national security. A live demo.
Presented by IPS08:30-09:20 Session C
Automation meets Intelligence
Our view of AI-powered Analytics
Presented by Innosystec09:25-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS09:25-10:15 Session B
trovicor’s Latest interception Innovations – Speech Analysis, Encrypted IP applications and hyper efficient Big Data Analytics.
Presented by Datafusion Sytems
10:35-11:25
Big Data Fusion Driving Seamless Digital Operations Transformation
Explore how Big Data Fusion revolutionizes operational efficiency by seamlessly integrating diverse data sources to generate precise insights, breaking down silos, and enhances decision-making. Discover firsthand how to use big data fusion to address data validation challenges, extracting valuable insights from open and hidden sources and creating seamless operations that elevate mission critical performance.
Presented by RAKIA Group13:20-14:10 Session A
Gaining knowledge from mass data
The power of cumulative information for actionable intelligence - Live Demo
Presented by Innosystec13:20-14:10 Session B
Give a hand to your Investigator: A Synthetic Analyst.
The Synthetic Analyst is the advanced approach that reduces the time of the Investigation life cycle.
An integrated network of Large Language Models, Knowledge Models, Decision Models and Knowledge Graph.
Presented by RCS14:15-15:05 Session A
The State of Deepfake Detection in 2025: How Cyber Criminals and Nation-State Adversaries Are Exploiting AI and How to Detect Them
In 2024, the sophistication and accessibility of deepfake technology have escalated, posing significant threats to national security, intelligence operations, and law enforcement efforts. This talk will highlight the geographical hotspots of deepfake activities, the advanced techniques utilized by adversaries, and their typical targets, including high-stakes political events, military conflicts, but also financial crime online such as scams and frauds. Attendees will learn about the latest advancements in deepfake detection, with a focus on Sensity AI's state-of-the-art solutions that integrate advanced AI and deep learning technologies.
Presented by Sensity AI14:15-14:40 Session B
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling.
Presented by IPS14:15-15:05 Session C
Revolutionizing OSINT for LEA with Advanced AI Analytics
Presented by Prelysis14:40-15:05 Session B
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case.
Presented by IPS
15:25-16:05 Session C
Introducing CoAnalyst Platform: Revolutionizing Digital Intelligence with Generative AI
This talk will demonstrate how GenAI capabilities can transform analysts and investigators workflows by introducing intuitive platform for digital investigations.
By blending layers of OSINT, forensics, and digital intelligence with GenAI Large Language Models (LLMs), this session will showcase a disruptive approach for data gathering, analysis, summary, and reporting.
Attendees will explore this cutting-edge GenAI platform and learn how to leverage this technology to enhance their analytical work.
Presented by PenLink16:10-17:00 Session A
Illuminating the Shadows: Harnessing OSINT in the Age of Live Streaming and Unconventional Platforms
Presented by Cognyte
Wednesday, 4 June 2025
9:10-10:00 Session A
Location & Open Source Intelligence: Real Life Case Studies & Live Demonstration
By combining open-source intelligence with location intelligence, analysts can reveal hidden connections and valuable insights to move an investigation or operation forward. This session will explore how combining the two can help generate valuable case intelligence to propel an investigation or operation forward.
Presented by PenLink9:10-10:00 Session B
Data Awareness - powered by Web-IQ
Online platform monitoring for Law Enforcement and National Security. Activate (alternative) social media platforms like Telegram, Weibo, TikTok, Discord, and many more with Web-IQ’s Intelligence Platform.
Presented by Web-IQ13:00-13:40 Session A
Digital Intelligence Supercharged: OSINT and Digital Forensics Investigations with CoAnalyst Generative AI platform.
This session explores the transformative impact of integrating OSINT and digital forensics with Generative AI technologies using CoAnalyst platform.
Attendees will learn how they can significantly enhance the accuracy, efficiency, and depth of digital investigations and threats monitoring.
The presentation will demonstrate how this state-of-the-art Large Language Models (LLMs) technology revolutionizes industry practices by delivering deeper analytical insights and superior decision-making capabilities.
Presented by PenLink13:45-14:30 Session A
Breaking Data Silos. Taking action.
Enhancing collaboration with SCOPE multi-source mass data analysis.
Presented by Innosystec13:45-14:30 Session B
Unveiling the Future of Intelligence Gathering
Presented by Prelysis15:00-15:40 Session A
LightSabre: Ultra-Portable Fibre Optics Links Interception and Monitoring System
LightSabre is an advanced, ultra-portable system designed for intercepting and monitoring fibre optics links, including OTN, SDH, and Ethernet. Engineered for intelligence operations, LightSabre ensures seamless, real-time data capture and analysis with unmatched precision. Its compact design and powerful capabilities make it the ideal tool for covert surveillance and network security, providing unparalleled insight into critical communications.
Presented by ClearTrail16:30-17:15 Session A
Leveraging OSINT 0-days to investigate a person of interest
Sylvain HAJRI, Epieos
Thursday, 5 June 2025
08:30-9:10 Session A
Cross Domain protecting Collection and Surveillance data in classified GOVERNMENT Networks
Arbit provides certified and accredited CDS to Central Government Agencies, Intelligence, Armed Forces and Police throughout Scandinavia, Baltics, and Europe. Arbit’s services focus on protecting CONFIDENTIALITY data and systems from cyber and inside threats. This is relevant Government as it enhances national security.
Presented by Arbit08:30-09:10 Session D
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance.
Hands on.
Presented by AREA09:15-10:00 Session A
The Battle of Antagonistic Narratives: the role of AI in OSINT, StratCom and Narrative Intelligence for National Security.
In a scenario where disinformation in the framework of hybrid warfare has become something more than the dissemination of false information, a new element of analysis appears that goes beyond: strategic narratives. The aim is no longer to verify information, but to identify which narratives the strategic antagonists want to disseminate, and to understand to whom and how they are going to do it. With this presentation, Future Space seeks to show, using the context of the European Union Parliamentary Elections, how OSINT and StratCom methodology and technology, as well as advances in AI, can help us get ahead in these contexts of information warfare to prevent influence operations of third party actors and identify which goals need to be addressed in the face of an inoculation campaign.
Presented by Future Space
11:00-11:40 Session A
Beyond Borders: Mastering Passenger Screening with Big Data Fusion
A practical and comprehensive guide on how to make passenger screening easier, faster, and safer with the optimal use of resources. Using real-world cases, participants will be taken through the passenger journey and discover how they can use big data fusion technology to adress common challenges such as: human mistakes, disinformation, misinformation, time spent on verbal and technological treatment, silo effect between local security and international security, fake passport detection, prioritization, and old technologies.
Presented by RAKIA Group11:00-11:40 Session D
Investigate, prevent and mitigate, risks of riots, terrorism, and crimes through a country-wide geo-analyticsl AI.
Presented by Butterfly Effect11:45-12:30 Session A
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
(THIS SEMINAR IS RESTRICTED TO LEA, MILITARY, AND GOVERNMENT ATTENDEES. PHOTOS AND VIDEO RECORDING ARE PROHIBITED).
Now I’ve shown you how to hide, let us go and start covertly searching and gathering online intelligence with the best tools available.
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
Track 4: Threat Intelligence Gathering and Cyber Security Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Tuesday, 3 June 2025
09:25-10:15
Harnessing Cyber Threat Intelligence for Advanced Law Enforcement Strategies
In an era where digital threats are rapidly evolving, law enforcement agencies must harness the power of Cyber Threat Intelligence (CTI) to enhance their operational capabilities.
In this session, we will explore the essential role of advanced CTI tools in strengthening national security, protecting organizational assets, and effectively investigating cybercrime.
Through this session, attendees will see how our solution can assist in exposing the bad guys and staying one step ahead of digital threats.
Or Lev, VP of Sales Engineering, KELA16:10-17:00
CDRs of WhatsApp, Signal, Telegram, and other encrypted VoIP messaging applications
Presented by ClearTrail
Wednesday, 4 June 2025
9:10-10:00
Mastering the Digital Landscape: A Deep Dive into OSINT and Fusion Technology
Within the context of this presentation the RAKIA team provide a step-by-step guide to harnessing OSINT and fusion technology to effectively build a multifaceted comprehensive investigation through a single interface. The use case used will harness the full spectrum of OSINT capabilities including target profiling, mass collection, darknet, avatar design and management, fake accounts identification and mitigation and no code crawlers, link analysis between targets and much more.
Presented by RAKIA Group15:00-15:40
Harnessing Cyber Threat Intelligence for Advanced Law Enforcement Strategies
In an era where digital threats are rapidly evolving, law enforcement agencies must harness the power of Cyber Threat Intelligence (CTI) to enhance their operational capabilities.
In this session, we will explore the essential role of advanced CTI tools in strengthening national security, protecting organizational assets, and effectively investigating cybercrime.
Through this session, attendees will see how our solution can assist in exposing the bad guys and staying one step ahead of digital threats.
Or Lev, VP of Sales Engineering, KELA15:45-16:25
Combine DPI-based Traffic Visibility with Threat Detection Capabilities to Raise the Performance of Government Security Operations
Discover a new generation of DPI-based cyber sensors that leverage years of experience in cyber defense environments to raise the performance of government-run Security Operations Centers (SOCs). Find out how advanced DPI-based traffic visibility combines traffic identification with machine learning and SDK-based threat detection capabilities to provide superior network protection, even when traffic is encrypted.
Nicolas Duteil, Senior Technical Account Manager, DPI & Traffic Intelligence, Enea SoftwareThursday, 5 June 2025
13:00-13:40
Title TBA
Presented by EO Security
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 3 June 2025
11:30-12:20
Beyond Breaches: Leveraging Compromised Credentials in OSINT and DarkINT Investigations
This session explores how breached records and other datasets with compromised PII gathered from the Deep and Dark Web can significantly enhance corporate and law enforcement investigations. We will begin by exploring the various types of breached datasets from hacked databases and combolists to stealer logs and scrapes. We will then provide insights into where these datasets can be located and highlight the critical information that can be extracted from them. Finally, we will demonstrate the practical application of compromised records in a live investigation in which we track down one of the FBI’s Ten Most Wanted individuals.
Matteo Tomasini, Founder & CTO at District 4 Labs13:20-14:10 Session A
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
David Alley, CEO, DarkOWL FZE14:15-15:05
Defeating the Tor Dark Web: The Latest Updates, Evidence Collection, Countermeasures, and Investigation Techniques
This talk will bring you up to date on the latest challenges and issues related to defeating Tor, the dark web network of choice for many criminals, and the latest techniques and best practices available to law enforcement for defeating Tor operators and unmasking IPs.
Presented by Searchlight CyberWednesday, 4 June 2025
15:00-15:40
Tracking the Lazarus Group using Breadcrumbs, Live demo
The Lazarus group, a hacking group funded by North Korea, have laundered $200M from 25 cryptocurrency hacks.
Lorne Lantz, CEO of Breadcrumbs, and author of Mastering Blockchain will demonstrate the power of Breadcrumbs by tracking the Lazarus group's activities.
He will also highlight some of the unique features and services Breadcrumbs offers.
Presented by Breadcrumbs16:30-17:15
Unmasking Criminals Operating on the Dark Web
This talk will provide practical guidance on how law enforcement agencies can investigate criminals on the dark web with recaptured data, build profiles of these high-risk criminal actors, and identify the actors behind the aliases. Including guidance on dark web market seizure techniques: evidence collection, unmasking users, and harvesting data.
Presented by Searchlight Cyber
Thursday, 5 June 2025
13:00-13:40
From Dark Web Information to Nicknames, Phone Numbers and Emails to Real People
A former elite intelligence officer and NATO intelligence pieces how seemingly small names of information on the web can lead to real police cases. Showcasing real-world examples covering the dark web, breached credentials, social media, public records and sanctions lists that have prompted multiple police investigations.
Petr Vancl Hochberger, Head of Marketing and Business Development, TOVEK
Track 6: Mobile Signal Intercept Product Training and Presentations
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 3 June 2025
8:30-9:20
Understanding Mobile 2G, 3G, 4G and 5G NSA Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies9:25-10:15
A Deep Dive into Mobile Exploitation - A Full Chain Overview
Presented by Secfence
10:35-11:25
Detecting, Locating and Intercepting GSO & NGSO transmitters
Presented by Kratos11:30-12:20 Session A
Evolutions and revolutions in satellite interception technology
The latest innovations in satellite communication, particularly VHTS satellite networks and LEO/MEO constellations, are challenges to satellite intelligence organizations. These new satellite infrastructures require novel approaches to satellite interception. Rohde & Schwarz offers solutions to address these new satellite communication scenarios.
Presented by Rohde & Schwarz11:30-12:20 Session B
Measurement instruments for Wi-Fi, Bluetooth – SmartTags, and Cellular
Presented by SEA GmbH13:20-14:10 Session A
Deep dive into STARINT – where millions of cameras are using p2p to communicate.
join our session to hear about our Innovative approach to significantly expand access to VISINT and how that will allow you to reach behind the cloud and access information behind dynamic IP's, NAT and p2p.
Presented by Interionet15:25-16:05 Session A
Mitigating Current Mobile Device Security Threats
In the digital age, security of mobile communications has emerged as a key concern. As robust protection against cyber threats, especially authorities and organizations need to consider both hardware and software security in their solutions.
As mobile devices are increasingly the focal point of professional and personal lives, the combination of hardware and software security is not just a best practice but a critical necessity for ensuring the safe and secure use of technology.
In this session, Bittium’s Product Manager Mr. Niko Keskitalo will present the ways how to secure your organization’s sensitive data against a multitude of threats.
Presented by Bittium16:10-17:00
Securing Your Mobile World from Surveillance Threats. A deep dive into unmasking and countering IMSI Catchers with Cutting-Edge solutions
Presented by NeoSoft
Wednesday, 4 June 2025
9:10-9:30
One Compact System, Unlimited Capabilities: From Undercover Operations to Search & Rescue Missions
Presented by Cognyte9:30-10:00
Navigating the Evolving Challenges of 5G Networks
Presented by Cognyte
Track 7: Electronic Surveillance Training and Product Presentations
This track is for law enforcement investigators and the government intelligence community who are responsible for deploying video, audio and GPS surveillance products and only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Wednesday, 4 June 2025
13:00-13:40
Harnessing AI in Police Investigations: A Focus on Audio, Video, and GPS
Presented by SIO13:45-14:30 Session A
From proven GPS tracking system to integrated Mobile mission control
Presented by ProximaIT13:45-14:30 Session B
New Microphone Array
Peter Just, Squarehead Technology15:00-15:40 Session A
Mastering Data Empowering Intelligence
Presented by Elbit15:45-16:25 Session A
QuipoEVO: new features and new use case for Cy4Gate Decision Intelligence Platform
Introducing QuipoEVO, the latest innovation from Cy4Gate, designed specifically for Law Enforcement Agencies (LEAs) to enhance decision intelligence capabilities. In the fast-paced world of law enforcement, staying ahead of criminals and ensuring public safety requires advanced tools and technologies. QuipoEVO combines cutting-edge artificial intelligence and machine learning to provide LEAs with a comprehensive Decision Intelligence Platform tailored to their unique needs.
QuipoEVO offers a range of powerful new features that revolutionize data analysis and decision-making in the LEA domain. Real-time data integration and analysis capabilities enable LEAs to gather and process vast amounts of data from multiple sources, including structured and unstructured data. By leveraging advanced analytics and algorithms, QuipoEVO provides actionable insights and helps LEAs identify patterns, detect trends, and make informed decisions to combat crime effectively.
Presented by CY4GATE S.p.A.15:45-16:25 Session B
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform.
Use cases and demonstration.
Presented by AREA15:45-16:25 Session C
How to ensure the security of mobile communication? Use radio forensics to monitor and secure mobile networks in 5G SA technology
This presentation will explain the technical aspects of detecting rogue networks using the parameters of a Base Transceiver Station (BTS). We'll discuss how these parameters can be harnessed to protect against eavesdropping and digital wiretapping, making it an essential tool for anyone interested in the security of mobile networks.
Rafał Wołczyk, Presales Engineer, Vespereye16:30-17:15 Session A
Evolving Capabilities – Training and Equipping Special Forces
Oli Smith, Providence
Track 8: 5G Lawful Interception Product Training
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 3 June 2025
9:25-10:15
Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
13:20-14:10
Performing successful missions on 5G SA with or without network operator assistance
Presented by Octasic14:15-15:05
Securing International Borders with Advanced Lawful and Location Intelligence
Political instability and conflicts in places like Syria, Ukraine, and Gaza are causing mass migrations. Desperate people sometimes turn towards human smugglers, exposing them to the dangers of human trafficking. In addition to traditional risks like illegal drug smuggling, this creates a heightened need for advanced lawful and location intelligence solutions. Learn how geofencing, location tracking, metadata analysis, data fusion, and more help secure international borders.
Presented by SS815:25-16:05
Keep using your IMSI Catchers and Direction Finders in the 5G SA Era
With the introduction of 5G SA, the 3GPP decided to improve subscribers’ privacy by designing an encrypted protocol architecture that protects against the use of IMSI catchers. These design choices resulted in the need for a “future proof” and solid solution in order for law enforcement to correlate temporary identifiers collected over the air interface and match them to permanent identifiers and to track suspects using their direction-finding tools and capabilities.
Presented by Group 200016:10-17:00
On the way to Online Catching on 5G SA
5G SA Online catching or identiifer asscociation changes the setup of active mobile phone monitoring solutions after nearly 30 years dramatically. To keep the operational concept and sustain the usage of these solutions for 5G SA agencies, operators, LI users, regulators, CSPs and manufactorers have to join to together to shape the future of 5G catching. Our presentation will give an overview about the concepts, architectures and the process of standardization as well what call for action every agency has."
Presented by Rohde & Schwarz
Wednesday, 4 June 2025
09:10-10:00 Session B
Survival of IMSI-catchers in 5G Networks
Presented by Utimaco13:00-13:40 Session A
POLIIICE 5G standalone end to end LI live demo.
POLIIICE will offer, research, validate and demonstrate array of innovative LI measures at cloud & network level as well as at edge device level that together will enable LEAs to efficiently overcome the new age challenges and enable high throughput of its LI
Chris Young, Product Manager, BAE Systems Digital Intelligence13:00-13:40 Session B
Lawful Interception of IMS/VoLTE Roaming (S8HR)
Presented by Utimaco15:45-16:25
Performing successful missions on 5G SA with or without network operator assistance
Presented by Octasic16:30-17:15
Title TBA
Presented by EXFO
Training Seminars Led by Law Enforcment Officers and Ph.D Computer Scientists
Tuesday, 3 June 2025
Seminar #1
08:30-15:05Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-15:05(THIS SEMINAR IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UKPolice
The aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works, for us. Why it works, for us. How data traffic leaves a permanent trace. How and why everything that was on the internet, is still there. Identifying the structural data and exploits, that will take you to your suspect. Tracking and evaluating data. MAC tracking. If you’ve ever said “it’s been deleted” or “its no longer there”, this seminar is for you. Let me prove you wrong.
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyse it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft. Data collection and interrogation, significance, and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them (where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyse it. Investigator capabilities and opportunities. TCP/IP and header value and analysis
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed. You and your target are being tracked by multi organisations that you done even know exist. Lets identify them and interrogate their data bases.
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web), TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications, and ways to coax offenders out of the system.
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game? Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
"Just google it" is great for tickets, tyres, holidays and opening hours. But as an investigator, we can do better, and safer. Using most main stream search engines and browsers come with certain risks. This session aims to change that. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. Tools that the target can’t see . Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how to fast track you to the data you need, and cut away the chaff. PART 2 on the final day with free tools to download and keepSeminar #3
08:30-09:20Understanding Mobile 2G, 3G, 4G & 5G NSA Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Seminar #4
09:25-10:15Understanding 5G Stand Alone NFV, Edge Computing and Network Slicing
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesCellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
- 5G Network Challenges Identifiers: How are law enforcement going to grab 1gbps traffic streams; backhaul to monitoring centers and filter non-important traffic of interest.
- 5G Edge Cloud Computing: How do you intercept on a 5G operators IT systems, deal with proprietary system protocols, e2e encryption and localized content
- 5G Virtual Network Core: How complicated will this be regarding LI, VoIP on virtual devices and what LI barriers has the IETF created
- 5G Network Slicing: Is this 5G feature restricted to private enterprises or will 5G MVNO’s provide public mobile wireless services, How will law enforcement interconnect with 5G OSS provisioning systems and what is the LI point of interconnection?
Seminar #5
10:35-11:25Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesSeminar #6
11:30-12:20Generative AI (e.g., ChatGPT): Hype vs. Reality and Law Enforcement Friend or Foe
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesThursday, 5 June 2025
Seminar #7
13:00-14:00(THIS SESSION IS ONLY OPEN TO LEA AND GOVERNMENT ATTENDEES)
Open Source Tools, Part 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceA must see presentation of the best and most dynamic tools available to the investigator- and they’re all free. A download link will be provided during this session with 100 tools to take away