Agenda: 24-26 March 2026
ISS World Middle East and Africa is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Media Intelligence, Artificial Intelligence and Analytics Product Presentations
Track 4: Cybersecurity, Threat Detection and Mitigate Product Presentations
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
Track 6: Mobile Signal Intercept and Electronic Surveillance Presentations
Track 7: 5G Lawful Intercept, Tracking and Forensics Product Presentations
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
Training Seminars Led by Law Enforcement Officers and Ph.D., Computer Scientists
20 classroom training hours, presented by Law Enforcement Officers and Ph.D. Scientists
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(9 classroom hours)Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(1 classroom hours)Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(7 classroom hours)
Tuesday, 24 March 2026
Seminar #1
08:30-15:00Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-09:15Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Seminar #3
09:30-10:15Understanding 5G/5GA/6G LI for Investigators
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesSeminar #4
10:30-11:15AI Technology Basics and LEA Use Cases (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesSeminar #5
11:30-12:15Generative AI Use Cases and Capabilities for Law Enforcement and Intelligence Agencies (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesSeminar #6
13:15-14:00Agentic AI - Deployment Options and Approaches (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThursday, 26 March 2026
Seminar #7
8:30-9:15Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #8
10:15-11:00Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #9
11:30-12:15Understanding the Implications of Online Social Media for OSINT During Critical Incidents (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PolicePre-Conference Sessions Description At The End of Agenda PostinG
ISS World MEA Exhibits Schedule:
Wednesday, 25 March 2026
10:00-18:00
Thursday, 26 March 2026
9:15-13:30
Welcoming Remarks and Top Ten Challenges
Wednesday, 25 March 2026
Welcoming Remarks
8:15-8:30 Tatiana Lucas, ISS World Program Director, TeleStrategies Keynote
8:30-9:00 Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Middle East and Africa has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World MEA Exhibits Schedule:
Wednesday, 25 March 2026
10:00-18:00
Thursday, 26 March 2026
9:15-12:30
Track 1: Lawful Interception and Criminal Investigation Training
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
Tuesday, 24 March 2026
13:15-14:00
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will present how its innovative technologies can help Security and Defence organizations respond rapidly to a wide range of threats.
Paul Morris, Phonexia16:15-17:00 Session B
Remove unwanted data (e.g. video, encrypted traffic, etc.) at n x 100 Gbps using an ultra-compact server
Presented by NapatechWednesday, 25 March 2026
14:00-14:45
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Paul Morris, PhonexiaThursday, 26 March 2026
8:30-9:15 Session A
Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police10:15-11:00 Session A
Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police11:30-12:15 Session A
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 24 March 2026
8:30-9:15 Session A
Forensic Multimedia Enhancement and Analysis
Henk-Jan Lamfers, Foclar
8:30-9:15 Session B
SocioTrace: Revealing the Real Source Behind Social Media Posts for Next-Generation LEA Investigations
Presented by PertSol9:30-10:15 Session A
Real Intelligence - Revolutionizing Investigative techniques
Presented by Datafusion Systems9:30-10:15 Session B
POS (Persona Orchestrator Sandbox) One Dashboard .one operator launch and control hundreds of session simultaneously via secure proxy
Presented by ESPY10:30-11:15 Session A
Instant deployment of a multi-audio streaming system with live speaker identification.
Presented by Gedion11:30-12:15 Session A
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated, AI enhanced Cyber Intelligence solutions.
A structured case-study
Presented by AREA11:30-12:15 Session B
CDRs of WhatsApp, Signal, Telegram, and other encrypted VoIP messaging applications
Presented by ClearTrail11:30-12:15 Session C
Understanding the Digital Flow: turning Internet Traffic into Investigative Power
Network traffic analysis is a cornerstone of Lawful Interception, but challenges like encryption and diverse applications obscure insights. RCS tools, built on decades of expertise, uncover hidden patterns and integrate cross-technology data for a complete investigative view. The demo shows how this approach transforms investigations in today’s complex digital landscape.
Presented by RCS11:30-12:15 Session D
Locating the Invisible: Geo-Intelligence in Cybercrime and Counter-Terror Operations.
Presented by Rayzone Group14:15-15:00 Session B
Decoding the Digital World: Advanced Techniques in Internet and Voice Analysis
Presented by Datafusion Systems14:15-15:00 Session C
AI-Driven Audio Clarity: Enhancing Speech Extraction from Noisy Tactical Recordings
RCS introduces an innovative forensic audio processing suite that leverages AI and Spatialized Deep Neural Networks to extract speech from recordings with significant background noise and interference. The demonstration will highlight key applications, including recordings from microphone arrays in open spaces and from single microphone devices or signal captures.
Presented by RCS14:15-15:00 Session D
The Virtual Intel Officer: AI's Role in Modern Investigations
Presented by Voyager Labs14:15-15:00 Session E
From Insight to Safety: The Intelligence Behind Major Event Security
Presented by Rayzone Group15:15-16:00 Session A
AI Counter-Terrorism Platform with ZDD for Effective Law Enforcement and Threat Detection
High performance Network Analytics with Petabyte Scale & Terabit Speed, powered by Zero Day Defender, AI and LLM.
Shayshi K Bhalla, Director, Systems Engineering (India, SEA & EMEA), Vehere15:15-16:00 Session B
Generative AI-Led Federal Case Study: Intelligent Fusion
Presented by ClearTrail15:15-16:00 Session C
Solving the challenges of Data-Fusion and Validation: Communication Data, live Lawful Interception data, Mobile Forensics extraction and more in a single AI enhanced platform.
Use cases and demonstration.
Presented by AREA16:15-17:00 Session A
Is this photo lying to me? Amped Authenticate: Forensic Photo and Video Integrity and Authenticity verification.
This session will showcase how Amped Authenticate can help investigators determine whether the footage they're dealing with is original and authentic.
By analyzing the processing history, identifying manipulation and forgeries, and detecting deepfakes, you can ensure that photo and video evidence can be trusted in legal proceedings.
Join us to discover how Amped Authenticate provides powerful tools for forensic experts to detect tampering, verify integrity, and assess the authenticity of visual media.
Presented by Amped Software
16:15-17:00 Session B
From Border Security to National Safety: Advancing Lawful Location Intelligence in Modern Mobile Networks
In today’s hyper-connected world, escalating threats such as mass migration, human trafficking, and drug smuggling demand more advanced approaches to safeguarding civil and national assets. From securing international borders to critical infrastructure on a national level now relies on lawful location intelligence from mobile networks. This session explores advanced methods for collecting and leveraging location data—including active and passive collection, tactical off-air tools, geofencing, metadata analysis, and data fusion—to move from coarse to granular, real-time insights. Attendees will learn how these capabilities are converged together in real-world operations to detect, disrupt, and prevent cross-border threats, enabling faster, smarter decisions and helping decision-makers stay ahead of increasingly sophisticated criminal networks.
Presented by SS8
16:15-17:00 Session C
Spyder Space: Movia's Revolutionary Platform for Real-Time Decision Intelligence
Cutting-edge data fusion technology breaking through delayed analytics, powered by the innovative force of AI!
Presented by MoviaWednesday, 25 March 2026
9:10-10:00
The Rules of the Game Have Changed: Integrating AI into the Investigation Workflow
Lionel Prat, Cellebrite
13:00-13:45 Session A
Forensic content derived metadata with powerful AI enhanced Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Use cases and demonstration.
Presented by AREA13:00-13:45 Session B
LightSabre: Ultra-Portable Fibre Optics Links Interception and Monitoring System
LightSabre is an advanced, ultra-portable system designed for intercepting and monitoring fibre optics links, including OTN, SDH, and Ethernet. Engineered for intelligence operations, LightSabre ensures seamless, real-time data capture and analysis with unmatched precision. Its compact design and powerful capabilities make it the ideal tool for covert surveillance and network security, providing unparalleled insight into critical communications.
Presented by ClearTrail14:00-14:45 Session A
Optical Signal networking and the benefits to architecture management
Presented by DiCon Fiberoptics14:00-14:45 Session B
What It Really Means to Investigate with LLMs, Generative, and Agentic AI
In a world of exploding data volumes and increasingly sophisticated threats, AI has become mission critical. This session explores how AI transforms complex metadata and multi‑source intelligence into actionable insight and predictive foresight, all within responsible and compliant frameworks. Intersec will demonstrate how its domain‑specific AI agents automate deep data correlation, support threat prediction, and empower analysts with intuitive, AI‑assisted tools to detect, investigate, and disrupt criminal and terror networks faster and more effectively than conventional methods.
Presented by Intersec
15:15-16:00 Session A
Spyder Space: Movia's Revolutionary Platform for Real-Time Decision Intelligence
Cutting-edge data fusion technology breaking through delayed analytics, powered by the innovative force of AI!
Presented by Movia15:15-16:00 Session B
VASTech Orca: A cutting-edge, modular, end-to-end system for fibre, satellite, and signals intelligence fusion.
Presented by VASTech15:15-16:00 Session C
Tracking and Unmasking Cybercriminals Active on Hidden Channels
Lena Youjeong Lee, S2W15:15-16:00 Session D
How to Find Crime and Terror Ghosts with Digital Intelligence
Presented by Cognyte15:15-16:00 Session E
Disruptive Location Intelligence for National Security Operations
In this session, Intersec demonstrates how its end-to-end network location intelligence platform delivers full national coverage with high-definition accuracy, enhancing its proven active and passive positioning engine with the latest advances in RF Fingerprinting, 5G positioning, and AI mobility models. This unmatched location performance powers user-friendly applications, enabling agencies to track cross-border movements, disrupt trafficking networks, protect critical infrastructure, and fight terrorism faster and more effectively than ever before.
Presented by Intersec16:15-17:00 Session A
Demo: Investigating a Street Shooting Case
This session demonstrates how Intersec transforms a complex street shooting case with national security implications into a clear, intuitive, and actionable investigative assistant. Attendees will see how investigators reconstruct events, correlate evidence, prioritize leads, and produce operational intelligence in just a few clicks. New features streamline LLM-assisted analysis and validation workflows, ensuring every step remains trusted, evidence-based, and operationally sound.
Presented by Intersec16:15-17:00 Session B
AI-Powered Defence Intelligence Fusion Centre for Enhanced Situational Awareness
Tarun Wig, Co-founder & CEO, Innefu LabsThursday, 26 March 2026
10:15-11:00 Session C
Policy-Driven DPI-Based Inline Traffic Management for Modern Threat Mitigation and National Resilience
Presented by PertSol10:15-11:00 Session D
From DPI to Deep Traffic Models (ML as the core)
Artem Rychko, Head of Data Science, 7Generation12:30-13:15
From SQL to Smart IT-Forensics: Connecting Databases to AI with MCP
Andreas Arbogast, Chief Information Officer, mh Service
Track 3: Social Media Intelligence, Artificial Intelligence and Analytics Product Presentations
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
Tuesday, 24 March 2026
08:30-09:15 Session A
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS08:30-09:15 Session C
OSINT & Media Monitoring with Intelion
In this session we will show how Intelion can be used to monitor the international public OSINT news space (broadcast and Internet), find specific keywords as well as the current sentiment regarding certain news topics. We will also show its alarm, summary, report and automated workflow functionalities.
Presented by ISID
09:30-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS09:30-10:15 Session B
NOESIS: Sovereign Cognitive AI: Agents Building Real-Time Investigation Graphs at ScaleHow do you find a needle in a haystack when the haystack consists of petabytes of video, audio, text, and communication logs from heterogeneous sources? The answer lies in dynamic, agent-based graph construction.This session presents NOESIS, an on-premise, sovereign AI solution built around a two-layer intelligence architecture. A high-speed analytical layer preprocesses massive volumes of unstructured data—video, images, audio, text—as well as structured interaction logs such as calls, transactions, and event records.Above this, a cognitive layer of AI agents operates continuously or on demand, starting from investigative seeds or triggers to autonomously correlate signals across sources.Rather than attempting to materialize a global graph, the system generates ephemeral, high-fidelity, multi-layer investigation graphs tailored to specific cases. NOESIS fuses multimedia intelligence, social and digital activity, and structured network data, enabling scalable real-time link analysis and investigative reasoning while preserving full data sovereignty.
David Greco, Chief Data Architect, Agile Lab
Irene Donato, Lead Data Scientist, Agile Lab
09:30-10:15 Session C
Tracking the world's most wanted criminals
Presented by OSINT Industries10:30-11:15 Session A
The New Frontline: Fighting Digital Deception
Presented by Cyabra10:30-11:15 Session B
Human-centered AI(HCAI): Evolving OSINT and Real Identity Investigations with Full Self Copilot Platform
Presented by Sinovatio10:30-11:15 Session C
Big Data Fusion Driving Seamless Digital Operations Transformation
Experience the power of Big Data Fusion—breaking silos, enhancing decision-making, and driving mission-critical performance. See how seamless data integration and advanced validation unlock precise insights from open and hidden sources for unparalleled operational efficiency.
Presented by RAKIA Group13:15-14:00 Session A
From Data to Knowledge – the Power of Mass Data Fusion
All-source mass data analysis for actionable intelligence
Presented by Innosystec14:15-15:00 Session A
2025 challenges and trends in the Webint world
Presented by Terrogence14:15-15:00 Session B
AI to Optimize Your Risk Assessments and Retargeting
Presented by Evo Tech15:15-16:00
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case in the Red Sea
Presented by IPS16:15-17:00 Session A
Deepfakes - Seeing Is Not Believing in an AI-First World
AI has become a double-edged sword, the same systems driving innovation are now powering deepfakes that scale opinion manipulation. This session breaks down how synthetic narratives are engineered to influence public opinion, and why traditional forensic tools are failing to keep up. You will learn how Explainable AI exposes manipulated content and curb this emerging menace.
Presented by Pi-Labs16:15-17:00 Session B
The AI-driven Intelligence to monitor and extract meaningful information from Social and Traditional Media to improve national security.
Presented by IPS
Wednesday, 25 March 2026
09:10-10:00 Session A
Who Understands the Algorithms Will Control the Future
This presentation explores how algorithms, AI systems, and automated decision engines are no longer just tools, but active forces shaping perception, behavior, and strategic outcomes. As human and machine decision-making become increasingly intertwined, power shifts from those who control infrastructure to those who understand how influence, narratives, and optimization models drive real-world actions. The session will examine how this impacts cybersecurity, intelligence, business, and national security, and why the next competitive advantage will come from mastering human–algorithm dynamics, not just technical defense.
Presented by Penlink09:10-10:00 Session B
From Data to Action: Harnessing AI for Real-Time Cyber Intelligence to Strengthen National Security
Presented by SIO9:10-10:00 Session C
Social Media De-anonymization in Practice: DNI’s Identity Correlation Engine (ICE)
This session introduces DNI’s Identity Correlation Engine and how it supports authorities in attributing anonymous social-media activity to real-world identities within lawful frameworks. We will highlight key outcomes, operational workflows and governance considerations.
Presented by DNI Solutions
9:10-10:00 Session D
From Passive Footage to Active Intelligence: AI-Powered Video Fusion Across Physical and Digital Domains
Presented by Blackscore9:10-10:00 Session E
Experience the Future of Raw IP data Analysis for Actionable Intelligence.
Never miss intelligence from WhatsApp, FaceTime and other encrypted calls made by the targets you are investigating and get their behavior on a timeline. Discover Simplicity and Power - No technical expertise required.
Presented by ClearTrail13:00-13:45 Session A
One Trusted Solution: CoAnalyst’s Unified Ecosystem – Real Life Case Studies
Explore how CoAnalyst’s integrated data ecosystem provides a trusted solution for complex investigations. This presentation features real-life case studies demonstrating the power of multi-layered data integration to deliver actionable insights with confidence.
Presented by Penlink13:00-13:45 Session B
Using OSINT to unmask Hidden Ownership in Financial Investigations
Presented by Cognyte
13:00-13:45 Session C
The Death of Big Data Fusion: Rethinking Intelligence in the AI Era
More data is slowing investigations instead of strengthening them. Using a real-world case study, this talk shows why traditional fusion fails on the ground and how AI-driven intelligence surfaces the right leads faster. Attendees will gain actionable methods to cut through noise, connect evidence intelligently, and accelerate case closure.
Presented by Pi-Labs13:00-13:45 Session D
From Translation to Strategic Insight: Advanced On-Premise NMT with Generative LPs for Government Data Sovereignty
In this session, we'll delve into how advanced on-premise Neural Machine Translation, enhanced by Generative Language Processing, serves not just to translate but to provide strategic insights for government entities. We'll discuss the importance of data sovereignty, how these technologies can be securely implemented, and the real-world implications for policy, communication, and strategic planning within government operations.
Presented by RWS14:00-14:45 Session A
From ChatGPT to Private LLMs: Secure Generative AI for Offline Intelligence
Amir Sela, VP International Sales, Innefu Labs14:00-14:45 Session B
360 OSINT: Person of Interest investigations from every angle
Presented by Maltego14:00-14:45 Session C
The Virtual Intel Officer: AI’s Role in Modern Investigations
Presented by Voyager Labs15:15-16:00 Session A
OSINT in the Age of AI: Advantages and Challenges.
Presented by Rayzone Group15:15-16:00 Session B
Next-Gen OSINT: Leveraging AI for Strategic Intelligence and Decision-Making
In an era of relentless information overload and geopolitical volatility, effective intelligence requires more than monitoring — it requires foresight. DataScouting’s OSINT solutions redefine situational awareness by transforming vast data streams from TV, radio, podcasts, web and social media into proactive intelligence signals rather than reactive alerts. By integrating advanced AI, the platform moves beyond basic data collection to deliver deep contextual analysis and predictive insights, enabling organizations to operate and invest with confidence in high-uncertainty environments. The technology supports decision-making across all levels, from real-time tactical ground truth and crisis management to high-level policy synthesis and the detection and mitigation of coordinated disinformation campaigns.
Stavros Vologiannidis, Founder, Business Development, DataScouting
Nabil Tawil, Business Development Director, DataScouting16:15-17:00 Session A
Brain: The Analytical Mind of Security
Modern security failures are rarely caused by a lack of data they result from late or incomplete analysis.
Through centralized data integration, AI-driven behavioral analysis, and predictive forecasting, Brain enables agencies to move beyond incident response and toward early threat detection, risk anticipation, and strategic control.
Presented by Solutions Engineering16:15-17:00 Session B
AI Redefining Data Analytics for Law Enforcement.
Presented by Rayzone Group16:15-17:00 Session C
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance.
Use cases and demonstration.
Presented by AREAThursday, 26 March 2026
08:30-09:15 Session A
Deepfakes in hybrid warfare operations: A case study from the Ukraine battleground
Not all weapons in Ukraine leave physical traces. This session exposes how deepfakes are systematically engineered and deployed within hybrid warfare campaigns. Analyzed as coordinated operations, they aim to erode trust, exhaust morale, and destabilize decision-making, raising urgent questions for governments about detection, attribution, and response.
Presented by Sensity AI08:30-09:15 Session B
OSINT in the Age of AI: Why Tools Still Need Minds.
Presented by Predicta Labs08:30-09:15 Session C
Title TBA
Presented by GMDSOFT10:15-11:00 Session A
From Exposure to Control: Intelligence Across the Cyber Kill Chain
This session explores how law enforcement and government agencies gain end-to-end visibility across the cyber threat lifecycle - from real-world data exposure to controlled, intelligence-led adversarial testing.
It demonstrates how compromised and leaked data can be converted into actionable post-incident intelligence, and how controlled, AI-driven attack simulations can be used to assess organizational readiness before real damage occurs.
Presented by Solutions Engineering10:15-11:00 Session B
Leveraging OSINT 0-days to investigate a person of interest
Sylvain HAJRI, Epieos10:15-11:00 Session C
AI-Native Solutions For National Security
Presented by Geonosys10:15-11:00 Session D
Unveiling the invisible: SIO advanced intelligence in action
Presented by SIO10:15-11:00 Session E
OSINT for situational awareness: how to use social media to paint a clearer picture of terrorism in West Africa
Presented by Maltego11:30-12:15 Session A
De-anonymization and Content Extraction in Cyber Operations
An overview of de-anonymization and content extraction tactics to unmask and track cyber-criminals. Join us to discover how to turn the tables on scammers.
Presented by Megatech Research11:30-12:15 Session B
Beyond Borders: Mastering Passenger Screening with Big Data Fusion
A practical guide to making passenger screening faster, safer, and more efficient. Through real-world cases, explore how Big Data Fusion tackles key challenges like human error, misinformation, security silos, fake passport detection, and outdated technology—optimizing resources for seamless operations.
Presented by RAKIA Group11:30-12:15 Session C
Intellectus IA Ecosystem: Built for the Intelligence Mindset
Ivan Poczynok, Presales Analyst, TRG12:30-13:15 Session A
Next-Gen DPI with AI for Enhancement of Network Intelligence, ECH bypass, deep and wide profiling
Presented by 7Generation
Track 4: Cybersecurity Threat Detection and Mitigation Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Tuesday, 24 March 2026
15:15-16:00 Session A
Advanced AI Surveillance in Action Against Organized Crime – See How it Works
Presented by SIO
16:15-17:00
Keep your Information Safe! New Trends and Developments in Information Protection
Presented by EO SECURITY s.r.o.Wednesday, 25 March 2026
9:10-10:00
Mastering the Digital Landscape: A Deep Dive into OSINT and Fusion Technology
RAKIA presents a step-by-step guide to leveraging OSINT and fusion technology for comprehensive investigations—all within a single interface. Explore real-world applications, including target profiling, mass data collection, darknet exploration, avatar management, fake account detection, no-code crawlers, and advanced link analysis.
Presented by RAKIA Group14:00-14:45
Title TBA
Presented by Cognyte
15:15-16:00
ARGOS: Is my phone infected?
Presented by Top Solution16:15-17:00 Session A
Leverage DPI-Based Traffic Visibility at 100Gbps (1 Server) and App-Based Traffic Filtering to Raise the Performance of Government SOCs & Cyber Investigations
Discover a new generation of DPI-based cyber sensors that leverage years of experience in cyber defense environments to raise the performance of government-run Security Operations Centers (SOCs). Find out how this DPI-based traffic visibility can combine with SDK-based threat detection capabilities AND application-based filtering to provide superior network protection, even when traffic is encrypted.
Nicolas Duteil, Senior Technical Account Manager, DPI & Traffic Intelligence, EneaThursday, 26 March 2026
11:30-12:15
ARGOS: Is my phone infected?
Presented by Top Solution
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Sessions only open to LEA and Government.
Tuesday, 24 March 2026
13:15-14:00
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
Concealing your footprint on the Dark Web is time-consuming and challenging, let alone staying abreast of new apps, sites and the increasingly transient nature of the darknet ecosystem. Using the world's most comprehensive darknet database, DarkOwl VISION shows how darknet data can be exploited for criminal investigations, crypto attribution, and behavioral atmospherics. From TOR to Telegram and beyond, DarkOwl VISION is used by analysts as a transparent productivity tool to enhance any Darknet tasking.
Lindsay Whyte, DarkOWL FZE16:15-17:00
How criminals launder crypto (Live Demo)
Crypto criminals use many different methods to launder dirty money through crypto.
Lorne Lantz, CEO of Breadcrumbs will demo these methods including swaps/bridges/mixers, and educate on how you can trace through these obfuscation methods.
Presented by BreadcrumbsWednesday, 25 March 2026
16:15-17:00
Crypto Investigations Simplified: From Blockchain to Real-World Insights
Martin Alcantara, Head of Marketing and Customer Success, TRGThursday, 26 March 2026
11:30-12:15
Uncovering your National Crypto Networks: A Practical Guide to Detection
Presented by Cognyte
Track 6: Mobile Signal Intercept and Electronic Surveillance Presentations
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.Tuesday, 24 March 2026
08:30-09:15
Understanding Mobile 2G, 3G, 4G, 5G NSA & LEO Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies09:30-10:15 Session B
Full-Spectrum Security : Mastering Signal & Airspace Security (From UAV To StarLink)
Presented by Sinovatio10:30-11:15 Session A
Smart Home and Mobile Devices: Investigative Techniques for Wi-Fi, Bluetooth, Cellular Networks, and Law Enforcement Applications
Digital radio traces are becoming increasingly important in crime prevention and the investigation of criminal acts. While the interrogation of communication data via network operators is standard practice in mobile communications, capturing non-centralized radio traces like Wi-Fi, Bluetooth, peer-to-peer (e.g., AirDrop), and sidelink communications (LTE-V/V2X) requires specialized approaches. These technologies enable swift and precise data collection at crime scenes, even for highly mobile devices that remain in one place only briefly. The presentation also introduces an advanced RF scanner designed to detect and localize hidden smart devices and Bluetooth signals. Capable of identifying Bluetooth beacons, paired and non-paired devices, and extremely weak signals in vehicles or containers, this tool is ideal for law enforcement, customs, border control, and military operations. Equipped with up to five Bluetooth sensors, high-sensitivity directional antennas, and robust signal amplifiers, it reliably detects devices such as smartphones, smartwatches, fitness trackers, and tracking tags. Operated via a user-friendly tablet or smartphone interface, the scanner’s specialized software offers far greater accuracy and versatility than traditional smartphone apps.
Presented by S.E.A. GmbH11:30-12:15 Session B
Securing Your Mobile World from Surveillance Threats. A deep dive into unmasking and countering IMSI Catchers with Cutting-Edge solutions
In this session, we will explore the threats posed by fake cell towers, such as IMSI Catchers and SMS blasters, when used by non-state actors, along with real-life cases. We will then discuss effective methods for detecting and localizing these threats quickly and accurately.
Finally, we will explore real-time countermeasures, including overloading IMSI Catchers with targeted requests, and strategies to avoid cell-site simulator interception altogether.
Presented by NeoSoft
13:15-14:00 Session A
Best Practices & Latest Innovations for Field Missions
Presented by Cognyte13:15-14:00 Session B
Survival of IMSI-catchers in 5G Networks
With transition to 5G Mobile Networks, 3GPP has introduced advanced security mechanisms that significantly increase resistance against rogue base stations – effectively shutting down conventional IMSI catchers. Nexburg’s 5G ID Associator empowers intelligence services, agencies and police to overcome these challenges, enabling the continued and effective use of IMSI-catcher capabilities in 5G and future mobile networks. The solution is fully aligned with 3GPP standards and delivers advanced functionality through modular options, allowing adaptation to country-specific requirements while maintaining maximum integration flexibility.
Presented by Nexburg14:15-15:00 Session A
SatINT - un-masking the SATCOM users
Un-masking the satellite terminals users, believing they are untraceable and un-touchable when using Satellite terminals.
Providing location and PIIs of Starlink, V-SAT, BeiDou, and Tiantong users.
Presented by Targeteam15:15-16:00 Session A
Unlocking Hidden Connections: Harnessing Multi-Source Geo-Intelligence for Smarter Investigations
Discover how multi-source geo-intelligence is reshaping investigations by offering a cross-country perspective that uncovers hidden connections. In this talk, RCS shows how this approach helps investigators pinpoint key starting points and anticipate the next steps, providing a practical and comprehensive solution for tackling complex cases.
Presented by RCS
Wednesday, 25 March 2026
14:00-14:45
Satellite Interception Systems
Presented by Stratign15:15-16:00
De-anonymization - A key capability when Privacy Means are abused by Crime and Terror
Un-masking threats by utilizing de-anonymization capabilities to reveal illegal activity, done over VPNs, SATCOM, IM, and more
Presented by Targeteam16:15-17:00 Session A
AI-Driven Machine Vision & Analytics: Advancing Covert Surveillance Capabilities
Explore how Kinesense’s cutting-edge machine vision and AI analytics enhance covert surveillance. This 45-minute session covers practical use cases, operational limitations, and the latest AI techniques for discreet intelligence gathering, empowering agencies to efficiently detect, analyze, and act while maintaining operational security.
Gary Dring, CovidenceThursday, 26 March 2026
10:15-11:00
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform.
Use cases and demonstration.
Presented by AREA
Track 7: 5G Lawful Interception Product Presentations
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
Tuesday, 24 March 2026
08:30-09:15
Understanding Mobile 2G, 3G, 4G, 5G NSA & LEO Infrastructure, Intercept and Cryptography
TeleStrategies
Dr. Jerry Lucas, President, TeleStrategies09:30-10:15
Transitioning Lawful Interception Network Core Features from 4G to 5G SA to 6G: What's it Looking Like and Challenges Ahead
Dr. Matthew Lucas, VP, TeleStrategies(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
15:15-16:00
5G IMSI/IMEI DE-ENCRYPTION
Presented by EXFO
Wednesday, 25 March 2026
(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
13:00-13:45
Evolution of 5G and the need for stand-alone capabilities on 5G
The world of 5G is advancing rapidly and staying ahead of the curve is critical for operational success. In this session, we’ll share insights into the latest 5G enhancements, and you’ll learn about new mission techniques that operators can leverage every day, on every mission.
Presented by Octasic(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
14:00-14:45
Seamless Monitoring of Inbound Roaming Voice
Mobile operators are adopting modern roaming architectures, based on S8HR and N9HR (5G-SA), to simplify deployment and accelerate time-to-market. However, in consequence intercepting IMS voice calls (VoLTE/VoNR) from visitors in your country can present technical challenges. Nexburg tackles these challenges with a comprehensive lawful interception solution of mobile roamers, fully compatible with both S8HR and N9HR deployments. This ensures mobile operators maintain full regulatory compliance while enjoying operational flexibility in today’s roaming environments.
Presented by Nexburg(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
16:15-17:00
AI-Driven Voice Analytics: Advancing Intelligence Gathering and Threat Detection
Voice interactions contain powerful indicators of intent, emotion, and hidden behavior. AI-powered voice analytics allows intelligence agencies to go beyond transitional transcription that leverages advanced speech recognition, natural language processing, and behavioral analysis to extract actionable intelligence from massive audio datasets. Furthermore, this powerful and advanced technology enables real-time detection of stress, deception, and sentiment changes, supporting quick-action counterterrorism operations, insider threat monitoring, and operational security. Learn how AI voice analytics is advancing surveillance, enhancing situational awareness, and accelerating decision-making in high-stakes environments.
Presented by SS8
Training Seminars Led by Law Enforcment Officers and Ph.D Computer Scientists
Tuesday, 24 March 2026
Seminar #1
08:30-15:00Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-09:15Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Seminar #3
09:30-10:15Understanding 5G/5GA/6G LI for Investigators
Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesSeminar #4
10:30-11:15AI Technology Basics and LEA Use Cases (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThis session gives LEA, intelligence and other practitioners a primer on AI technologies. Topics covered include how AI technology is being leveraged in our industry (e.g., image recognition, classifying unstructured data, natural language processing, document summarization, and more); traditional AI approaches (heuristics, indicators); basics of machine-learning systems (models, training, neural-networking); generative AI systems (OpenAI, Anthropic, Grok, others); the strengths and weaknesses of each AI model; and how the LEA/IA/ISS vendor communities are leveraging AI to increase the efficiency and accuracy of their network data, OSINT, location, image and natural language operations/applications.
Seminar #5
11:30-12:15Generative AI Use-cases and Capabilities for Law Enforcement and Intelligence Agencies (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesGenerative AI (GAI) is revolutionizing network data and OSINT analytics – with the end-goal of enabling investigators to effortlessly engage, analyze, visualize large datasets and “connect the dots” that would traditionally require enormous manual effort from teams of analysts and IT personnel. This session will cover the key issues related to GAI platforms: how they are/can be used; what models are available; who are the key players; how to integrate GAI systems with your datasets (RAG); dealing with accuracy and hallucinations; data embeddings and citations; integration standards; data orchestration and more
Seminar #6
13:15-14:00Agentic AI - Deployment Options and Approaches (1 Classroom hour)
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThis session will cover Agentic-based AI platforms, the technology and challenges facing LEAs/IAs looking to incorporate Agentic AI platforms in their operations. Topics covered include hosting platform options; small/local model options; operational costs; implementation requirements; security; regulatory considerations; aligning and fine-tuning models; optimizing agentic AI platforms for ISS workflows; and ongoing development advances to watch.
Thursday, 26 March 2026
Seminar #7
8:30-9:15Unmasking Hidden Evidence: Metadata & EXIF for Digital Investigators (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #8
10:15-11:00Push Tokens in Criminal Investigations: Tracing Digital Footprints & Uncovering Evidence (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State PoliceSeminar #9
11:30-12:15Understanding the Implications of Online Social Media for OSINT During Critical Incidents (1 Classroom hour)
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police