About ISS World Pre-Conference Seminars and Tutorials
The full agenda for the preconference tutorials are below. For information on any other track, please click the links below.
Track 1: ISS for Lawful Interception and Criminal Investigations
Track 2: ISS for IP Intercept, Big Data Analytics and Social Network Monitoring
Track 3: ISS for Mobile Location, Surveillance and Signal Intercept
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training (Open only to LEAs and Government)
Track 5: LEA and Intelligence Analyst Training and Product Demonstrations (Open only to LEAs and Government)
Preconference Seminar and Tutorials (Tuesday, 23 July 2013)
(Certificates of ISS Technology Training Available Upon Request)
Tuesday, 23 July 2013
Seminar #1
8:30-16:30Online Social Media and Internet Investigations
Presented by Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Commander, Special Investigations and Criminal Intelligence, Indiana State Police, USA8:30-9:30: Session 1 of 6
What Investigators & Analysts Need to Know about Online Social Media.
This session is for criminal investigators and intelligence analysts who need to understand the impact of online social networking on how criminals communicate, train, interact with victims, and facilitate their criminality.9:45-10:45: Session 2 of 6
OSINT and Criminal Investigations
Now that the Internet is dominated by Online Social Media, OSINT is a critical component of criminal investigations. This session will demonstrate, through case studies, how OSINT can and should be integrated into traditional criminal investigations.11:00-12:00: Session 3 of 6
Successful Use of Online Social Media in Criminal Investigations
This session is for investigators who need to understand social network communities along with the tools, tricks, and techniques to prevent, track, and solve crimes.13:00-14:00: Session 4 of 6
Counterintelligence & Liabilities Involving Online Social Media
Current and future undercover officers must now face a world in which facial recognition and Internet caching make it possible to locate an online image posted years or decades before. There are risks posed for undercover associated with online social media and online social networking Investigations. This session presents guidelines for dealing with these risks.14:15-15:15: Session 5 of 6
Facebook: Tools, Tricks, & Techniques Investigators Need to Know
While there are over 300 social networking sites on the Internet, Facebook is by far the most populous, with over 800 million profiles. It has roughly the same population as the US and UK combined, making it the third largest country by population. There are over 250 million images and 170 million status updates loaded on Facebook every day. This session will cover topics including Facebook security and account settings, Facebook data retention and interaction with law enforcement, and common fraud schemes involving Facebook.15:30-16:30: Session 6 of 6
What Investigators Need to Know about Hiding on the Internet
Criminal investigators and analysts need to understand how people conceal their identity on the Internet. Technology may be neutral, but the ability to hide ones identity and location on the Internet can be both a challenge and an opportunity. Various methods of hiding ones identity and location while engaged in activates on the Internet, provides an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities. As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic about which every investigator and analyst may become familiar.
Seminar #2
8:30-16:30Understanding ISS Technologies and Products Deployed in Telecommunications Networks for Law Enforcement and Intelligence Analysts
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis one day pre-conference seminar covers the spectrum of ISS Technologies and Products deployed in today's fixed wire, mobile wireless and Internet Service Provider networks and LEA Monitoring and Intelligence Gathering Centers. This all day seminar is ideal for those law enforcement, public safety and intelligence analysts who need an understanding of the ISS technologies to be discussed in the conference sessions and the ISS products displayed at the exhibit hall as well as an understanding of the buzz words and jargon used by telecom operator engineers and their vendors.
08:30-10:45
Understanding Wireline Telecom Infrastructure, Interception and Related ISS Products
What do LEAs need to know about the public switched telecommunications networks, circuit switching, fiber optics, SONET/SDH, Broadband Access (DSL, ADSL, Cable Modems, etc.), billing systems and call detail records, standards for lawful intercept, basic LI elements (access, delivery and collection function), LEA Monitoring Center Functions (call information and call content data collection) and where are ISS products deployed for monitoring and intercept.11:00-14:00
Understanding Mobile Wireless Infrastructure, Interception and Related ISS Products
Infrastructure basics (GSM, GPRS, EDGE, UMTS, HSPA and LTE), Wi-Fi, WiMax and Femtocells, How a cellular call is processed, back office infrastructure, HLR, VLR, Backhaul and PSTN interconnection, data services, SMS, MMS, IM, data services, fixed mobile convergence, Smartphone challenges for LEA, intrusion techniques, gathering Geolocation data, location technologies (A-GPS and RF finger printing) and where are ISS products deployed for monitoring and intercept.14:15-16:30
Understanding the Internet, Interception and Related ISS Products
What Investigators Have To Know about IP call Identifying Information, Radius, DHCP, DNS, etc., Tracking an Internet Address to a Source, Investigations Involving E-Mail, Facebook, Twitter, Skype, Instant Messaging, Chat Rooms and Message Boards, IMS, P2P Networks and Deep Packet Inspection, Big Data Analytics, defeating encryption, emerging IPv6 Challenges and what can be done to address Internet intercept deploying ISS infrastructure and where are ISS products deployed for monitoring and intercept.Suntech Sponsored Workshop*
Workshop Patrocinado por Suntech * 23 de julho de 2013
Suntechday - " Inteligência e Tecnologias no Combate a Criminalidade e
Defesa NacionalSuntech Pre-conference – Governo (Half Day)
Combate a Criminalidade e Defesa Nacional: Desafios a Serem Superados8h00-8h30
Recepção de Boas-Vindas
Maurício Dobes, Diretor Executivo, Suntech
8h30-9h00
Cyber Segurança: Mais um Domínio para Proteger
Representante do Centro de Defesa Cibernética, Exército Brasileiro9h00-10h00
Desvendando “Big Data”: Como a Tecnologia Pode Trabalhar a Favor da Investigação
Mário Wolf Júnior, Gerente de Produto, Suntech
10h00-10h30
Coffee Break10h30-11h00
Coleta de evidências nas investigações criminais
Emerson Wendt, Delegado de Polícia Civil do Rio Grande do Sul11h00-12h30
Inteligência: Um conceito Fim a Fim
Rafael Righi, Rodrigo Silva, Ruben Siegrist e Fernando Falcão, colaboradores SuntechSuntech Pre-conference – Telecomunicações (Half Day)
Suntech Day Telecom 201314h00-14h30
Cerimônia de Abertura
Maurício Dobes, Diretor Executivo, Suntech14h30-15h00
As Tendências na Interceptação Legal
Wagner Machado, Gerente Técnico, Suntech15h00-16h00
Mitigando Ataques Persistentes em sua Rede
Rafael Righi, Consulto de Comunicações e Inteligência, Suntech16h00-16h30
Localização: Se Preparando para Demandas Futuras
Alexandre Castro, Diretor de Novos Negócios, Suntech16h30-17h00
EncerramentoSeparate Workshop Registration Required
Workshop open to Suntech customers and law enforcement only. To register contact: Flávia Reis, Marketing Manager, [email protected]