Agenda from: 11-13 February 2025
ISS World Middle East and Africa is the world's largest gathering of Regional Law Enforcement, Intelligence and Homeland Security Analysts, Telecoms as well as Financial Crime Investigators responsible for Cyber Crime Investigation, Electronic Surveillance and Intelligence Gathering.
ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety, Government and Private Sector Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network, the Internet and Social Media.
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Presentations
Track 4: Threat Intelligence Gathering and Cyber Security Product Presentations
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
Track 6: Mobile Signal Intercept and Electronic Surveillance Presentations
Track 7: 5G Lawful Intercept, Tracking and Forensics Product Presentations
Plus Special Training Seminars lead by Law Enforcement Officers and Ph.D. Scientists
Training Seminars Led by Law Enforcement Officers and Ph.D., Computer Scientists
20 classroom training hours, presented by Law Enforcement Officers and Ph.D. Scientists
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
(6 classroom hours)Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police
(7 classroom hours)Jerry Lucas (Ph.D., Physics), President, TeleStrategies
(2 classroom hours)Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
(3 classroom hours)
Tuesday, 11 February 2025
Seminar #1
08:30-15:00Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-15:00The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.Seminar #3
08:30-09:15Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception.
Seminar #4
09:30-10:15Transitioning Lawful Interception Network Core Features from 4G to 5G SA to 6G: What’s it Looking Like and Challenges Ahead
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesCellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the transition to 5G stand alone. (Full description below Track 9)
Seminar #5
10:30-11:15Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesSeminar #6
11:30-12:15Generative AI (e.g., ChatGPT): How LEAs and Intelligence Agencies Can Leverage the Technology, and Criminal Use Examples
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesThursday, 13 February 2025
Seminar #7
12:30-13:30Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PolicePre-Conference Sessions Description At The End of Agenda PostinG
ISS World MEA Exhibits Schedule:
Wednesday, 12 February 2025
10:00-18:00
Thursday, 13 February 2025
9:15-12:30
Welcoming Remarks and Top Ten Challenges
Wednesday, 12 February 2025
Welcoming Remarks
8:15-8:30 Tatiana Lucas, ISS World Program Director, TeleStrategies Keynote
8:30-9:00 Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Middle East and Africa has Solutions
Dr. Jerry Lucas, President, TeleStrategies
ISS World MEA Exhibits Schedule:
Wednesday, 12 February 2025
10:00-18:00
Thursday, 13 February 2025
9:15-12:30
Track 1: Lawful Interception and Criminal Investigation Training
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
Tuesday, 11 February 2025
10:30-11:15
Assessing Threats: Intelligence in Pre-War and Active Conflict Zones
Presented by Rayzone13:15-14:00
Effortlessly Detecting Persons and Topics of Interest in Audio
In this session, you will discover the latest capabilities of voice biometrics and speech recognition. Phonexia will present how its innovative technologies can help Security and Defence organizations respond rapidly to a wide range of threats.
Jan Pavlík, Phonexia14:15-15:00
Transforming Criminal Investigations with CSP Network Insights: Efficiency, Security, and Real-Time Precision
This session delves into the newly launched Cross Location Analysis and IMSI Location Comparison, with updates on fast and secure IP searches and the integration of real-time and historical data for unparalleled insights. Discover how leveraging multi-source network data from CDRs, passive probes and more empowers CSPs to deliver enriched and secure results with efficiency, seamlessly transferring insights to law enforcement agencies.
Presented by Subtonomy & Telia Norway15:15-16:00 Session A
Discover how to accelerate your public safety or enterprise’s digital forensics investigations with Magnet AXIOM
Jarina Cotten, Solutions Consultant, Magnet Forensics16:15-17:00 Session B
Remove unwanted data (e.g. video, encrypted traffic, etc.) at n x 100 Gbps using an ultra-compact server
Presented by NapatechWednesday, 12 February 2025
13:00-13:45
How to Detect Fake News
This talk will delve into the challenges posed by digital manipulation techniques. This informative session highlights crucial detection methods needed to identify and mitigate the impact of bots, fake news, and deep fakes in shaping public perception. Gain insight into the detailed overview of the evolving landscape of digital deception, emphasizing its implications on the integrity of information in today's interconnected world.
Presented by Cyabra14:00-14:45
Accelerate Forensic Voice Analysis with Advanced Speaker Recognition Solution
Join us to explore our advanced voice analysis solution for forensic experts and investigators. Discover its rapid, precise capabilities enabled by deep neural networks, which will enhance your forensic analysis.
Jan Pavlík, Phonexia15:15-16:00
Russian, Chinese and Arabic Open Source Collection Intelligence Techniques
The common narrative is that researching online in a foreign language requires a native speaker - when none are available, teams often rely completely on AI to tackle this.
We demonstrate that researching online in Chinese, Russian or Arabic using I-Intelligence's methodology is actually quite easy when adopting an investigative mindset and mastering the basics.
Skip Schiphorst, OSINT language course instructor and coordinator, i-intelligence GmbHThursday, 13 February 2025
8:30-9:15 Session B
Trending Topics in Cryptocurrency Forensics
Bitcoin, Ethereum and other cryptocurrencies are becoming mainstream for financial interactions and standard tools when conducting cybercrime such as scams, frauds, ransomware, darknet markets, sextortion, etc. LEAs also adapted to a new situation, and many investigators are already familiar with cryptocurrency basics and how to trace transactions on publicly available blockchain explorers. This session aims to extend the knowledge of participants about more advanced topics such as: a) address clustering techniques and their applicability to various cryptocurrencies; b) monitoring of cryptocurrency networks and their peers with the help of network intelligence; c) geolocating cryptocurrency transaction with IP address or originator; d) overcoming obfuscation of transactions entering and leaving mixers; e) correlating activities on darkweb with blockchain events. Each subtopic will be thoroughly explained, including currently existing methods and tools for addressing associated challenges.
Vladimir Vesely, Brno University of Technology10:15-11:00 Session B
Thou shalt wirelessly intercept your neighbor: Leveraging WiFi and Bluetooth in operative
In this talk, we shall discuss various security mechanisms used in WiFi and Bluetooth networks and how to abuse them to obtain mission-critical intel. Apart from explaining all principles, we will demonstrate them (hopefully live) on our tactical device! Starting with an access point and client scans, we will continue with client targetted jamming and total Denial-of-Service of the whole network that may even result in authentication handshake capture. This handshake contains information to recover the WiFi password to access the targeted network. Once inside the network, we will show essential hacking tools to conduct IP-level reconnaissance. But we will not limit ourselves to WiFi and demonstrate how Bluetooth can be leveraged to notify you about a person's presence or exploit various IoT devices.
Jan Pluskal, Brno University of Technology11:30-12:15 Session A
Understanding the Implications of Online Social Media for OSINT During Critical Incidents
Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police12:30-13:30 Session A
Elevate your investigation with Oxygen Forensics Suite
Haitham Khatib, Technical Sales Engineer – MEAI, Oxygen Forensics12:30-13:30 Session B
Mastering the password cracking
Users need to provide passwords when they are logging into the computer, starting their smartphone, accessing their favourite web service, opening protected files/disks, connecting to a network or pairing their wearable. Encryption is an inherent trait of digital presence, whether users realize it or not. We will speak about different approaches to password cracking, including dictionary, rule-based, brute-force, hybrid and association attacks. We will show benchmarks of how fast high-end GPU cards can recover passwords for various formats (e.g., Windows credentials, WPA2 handshakes, ZIP and RAR files, LUKS partitions, Android PINs, and iPhone Backups). We will answer what length or complexity of the password is enough to protect your data. Nevertheless, better than guessing the password is knowing the password! We will conclude our talk by demonstrating the applicability of personal information leaks with usernames, emails, phone numbers and passwords!
Vladimir Vesely and Jan Pluskal, Brno University of Technology
Track 2: LEA, Defense and Intelligence Analyst Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.
Tuesday, 11 February 2025
8:30-9:15 Session B
Proactive Threat Hunting in Cybersecurity Using Generative AI Models and Real-time Threat Intelligence Platforms
Presented by Pertsol9:30-10:15 Session A
Real Intelligence - Revolutionizing Investigative techniques
Presented by Datafusion Systems10:30-11:15 Session A
Instant deployment of a multi-audio streaming system with live speaker identification.
Presented by Gedion11:30-12:15 Session A
From Electronic Surveillance to Encrypted Communication analysis challenges, solved with integrated, AI enhanced Cyber Intelligence solutions.
A structured case-study
Presented by AREA11:30-12:15 Session B
CDRs of WhatsApp, Signal, Telegram, and other encrypted VoIP messaging applications
Presented by ClearTrail11:30-12:15 Session C
Understanding the Digital Flow: turning Internet Traffic into Investigative Power
Network traffic analysis is a cornerstone of Lawful Interception, but challenges like encryption and diverse applications obscure insights. RCS tools, built on decades of expertise, uncover hidden patterns and integrate cross-technology data for a complete investigative view. The demo shows how this approach transforms investigations in today’s complex digital landscape.
Presented by RCS13:15-14:00 Session A
Unravelling JA3 and JA4+: Global Botnet Detection via Encrypted Traffic Fingerprinting
Network security teams and government defense agencies are leveraging encrypted traffic fingerprinting techniques such as JA3/JA3S to detect C2 servers and global botnet campaigns. Learn what a JA3 fingerprint is and how it is evolving to stay ahead of threat actors. Beyond TLS, what are teams doing to fingerprint traffic encrypted via SSH and QUIC?
Presented by NetQuest14:15-15:00 Session A
AI Empowered LEA Intelligence With Various AI And Fusion Tools
Presented by Sinovatio14:15-15:00 Session B
Decoding the Digital World: Advanced Techniques in Internet and Voice Analysis
Presented by Datafusion Systems14:15-15:00 Session C
AI-Driven Audio Clarity: Enhancing Speech Extraction from Noisy Tactical Recordings
RCS introduces an innovative forensic audio processing suite that leverages AI and Spatialized Deep Neural Networks to extract speech from recordings with significant background noise and interference. The demonstration will highlight key applications, including recordings from microphone arrays in open spaces and from single microphone devices or signal captures.
Presented by RCS15:15-16:00 Session A
AI Counter-Terrorism Platform with ZDD for Effective Law Enforcement and Threat Detection
High performance Network Analytics with Petabyte Scale & Terabit Speed, powered by Zero Day Defender, AI and LLM.
Shayshi K Bhalla, Director, Systems Engineering (India, SEA & EMEA), Vehere15:15-16:00 Session B
Generative AI-Led Federal Case Study: Intelligent Fusion
Presented by ClearTrail15:15-16:00 Session C
Solving the challenges of Data-Fusion and Validation: Communication Data, live Lawful Interception data, Mobile Forensics extraction and more in a single AI enhanced platform.
Use cases and demonstration.
Presented by AREA16:15-17:00 Session A
Is this photo lying to me? Amped Authenticate: Forensic Photo and Video Integrity and Authenticity verification.
This session will showcase how Amped Authenticate can help investigators determine whether the footage they're dealing with is original and authentic.
By analyzing the processing history, identifying manipulation and forgeries, and detecting deepfakes, you can ensure that photo and video evidence can be trusted in legal proceedings.
Join us to discover how Amped Authenticate provides powerful tools for forensic experts to detect tampering, verify integrity, and assess the authenticity of visual media.
Presented by Amped Software
16:15-17:00 Session B
How AI is Impacting End-to-End Lawful Intelligence: Potential and Pitfalls
AI technologies—such as video and voice analytics, facial recognition, and automatic number plate recognition—are transforming lawful intelligence by uncovering and amplifying critical information to enhance investigative efficiency. As we deploy next-generation, standards-based platforms, AI offers powerful opportunities but also presents challenges, including biases and the risk of misleading conclusions. This presentation explores the transformative potential of AI in lawful intelligence.
Presented by SS816:15-17:00 Session C
Spyder Space: Movia's Revolutionary Platform for Real-Time Decision Intelligence
Cutting-edge data fusion technology breaking through delayed analytics, powered by the innovative force of AI!
Presented by Movia16:15-17:00 Session D
Moving from network monitoring to Full real-time network control
Presented by Quant AzimuthWednesday, 12 February 2025
09:10-10:00 Session A
NSO at 15: From Vision to Industry Leader
Presented by NSO Group13:00-13:45 Session A
Forensic content derived metadata with powerful AI enhanced Data Fusion and Analysis unleashes the intelligence hidden in the encrypted communications.
Use cases and demonstration.
Presented by AREA13:00-13:45 Session B
LightSabre: Ultra-Portable Fibre Optics Links Interception and Monitoring System
LightSabre is an advanced, ultra-portable system designed for intercepting and monitoring fibre optics links, including OTN, SDH, and Ethernet. Engineered for intelligence operations, LightSabre ensures seamless, real-time data capture and analysis with unmatched precision. Its compact design and powerful capabilities make it the ideal tool for covert surveillance and network security, providing unparalleled insight into critical communications.
Presented by ClearTrail14:00-14:45 Session A
Smartwatches: Exploring forensic possibilities and limitations of the most popular wearables
Presented by Compelson14:00-14:45 Session B
Cost Effective Network Monitoring Systems
Mike Bitting (VP A&D Sales-Polatis Worldwide), Huber+Suhner14:00-14:45 Session C
Enhancing Situational Awareness in Control Rooms
A deep dive into advanced tools for managing crowds, analyzing density, and exploring zones to handle demonstrations proactively and effectively.
Presented by Intersec
15:15-16:00 Session A
Spyder Space: Movia's Revolutionary Platform for Real-Time Decision Intelligence
Cutting-edge data fusion technology breaking through delayed analytics, powered by the innovative force of AI!
Presented by Movia15:15-16:00 Session C
Keysight data broker for lawful Intercept needs
Luc Erol Alptuna, Strategic Alliance Director EMEA / APAC, Keysight/IXIA16:15-17:00 Session C
AI for Predictive policing and efficient utilisation of resources
Tarun Wig, Co-founder & CEO, Innefu LabsThursday, 13 February 2025
08:30-09:15 Session A
Deep Network Visibility at International Scale Via Enriched Traffic Metadata: IPFIX for OTU4, STM64 and 100GbE Networks
National defense missions require deep signals intelligence from OTN, SDH and Ethernet networks. Learn how unsampled flow-based metadata and IPFIX can provide 100% visibility into telecommunication cables including IP addresses, layer 7 application classification and protocol-specific data from TLS, QUIC, DNS, HTTP, SIP and other traffic types.
Presented by NetQuest08:30-09:15 Session B
Smarter Incident Management with Rapid Threat Hunter
Andreas Arbogast, Chief Information Officer, mh Service10:15-11:00 Session A
Investigative Analysis – Have we forgotten the basics, and its significant impact?
How can we ensure a strong foundation for accurately evaluating information in an era of rapid technological advancements like machine learning and AI? In law enforcement and intelligence investigations, accuracy is critical, but systems alone cannot appear in court. Investigators must clearly explain and justify their conclusions, ensuring transparency and adherence to legal standards.
Presented by Hidden Links10:15-11:00 Session C
Evolving Lawful Interception for the 5G-Driven Future
Presented by Pertsol10:15-11:00 Session D
Revolutionizing DPI with Machine Learning: De-anonymizing VPNs, Crypto, Messengers, Behavior Profiling, ESNI, and More
Discover a groundbreaking approach to Deep Packet Inspection (DPI) through proprietary Machine Learning models designed for next-generation Encrypted Traffic Intelligence. Explore advanced capabilities such as crypto and messenger de-anonymization, user activity detection in any App/website, bulk behavior profiling, OS and platform fingerprinting, VPN detection, and ESNI bypassing. Gain insights from real-world case studies on bulk de-anonymization in the crypto industry (wallet holders, miners, transactions, and exchanges), messengers (calls, group members, chat relating), and more. Learn how ML addresses challenges related to VPNs, obfuscation, frequent updates, and ESNI.
Artem Rychko, Head of Data Science, 7Generation
11:30-12:15 Session A
Opentext Forensics Unpacked: A look at file system and mobile device artifacts, and acquisition with the TX2
Jeremy Fryd, Solutions Consultant, Opentext11:30-12:15 Session B
Deriving Insights Through OTT-Encrypted Traffic
While encrypted OTT calls present a challenge to conventional surveillance, they hold high potential for homeland security investigations.
Presented by Intersec
Track 3: Social Network Monitoring, Artificial Intelligence and Analytics Product Presentations
Sessions in this track are only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees, unless marked otherwise.
Tuesday, 11 February 2025
08:30-09:15 Session A
Automatic Exploitation of Social Network, Deep and Dark Web to complement traditional Lawful Interception Infrastructure for Target Profiling
Presented by IPS08:30-09:15 Session B
Identifying national security threats posed by weaponized narratives and malicious information attacks.
This session will highlight how scaled analysis of online information flows to detect emerging narratives can prevent social fabric breakdowns, economic crises, and disruption of public order.
Presented by VineSight08:30-09:15 Session C
OSINT & Media Monitoring with Intelion
In this session we will show how Intelion can be used to monitor the international public OSINT news space (broadcast and Internet), find specific keywords as well as the current sentiment regarding certain news topics. We will also show its alarm, summary, report and automated workflow functionalities.
Presented by ISID
09:30-10:15 Session A
WhatsApp, Telegram, Facebook...how IPS helps you to locate most wanted targets with LI
Presented by IPS09:30-10:15 Session B
Accelerating Cybercrime Investigations with GROUP-IB Graph
Anna Yurtaeva, Senior Cyber Investigation Specialist, Group-IB
Daria Shcherbatyuk, Cybercrime Investigator, Group-IB09:30-10:15 Session C
Tracking the world's most wanted criminals
Presented by OSINT Industries09:30-10:15 Session D
Unlocking Insights: OSINT Solutions for Intelligence and Strategic Decision-Making
In an era defined by information overload, the ability to monitor and analyze traditional and digital media in real-time, is critical for intelligence and strategic decision-making. DataScouting’s OSINT solutions empower organizations to uncover actionable insights by seamlessly integrating data from diverse sources, including TV, radio, podcasts, online platforms and social media. By leveraging the transformative capabilities of generative AI, these solutions go beyond simple data aggregation to provide deep contextual analysis, pattern recognition and predictive insights. This presentation explores how the synergy of comprehensive media monitoring and generative AI not only enhances situational awareness but also drives informed, proactive strategies in rapidly evolving environments.
Stavros Vologiannidis, Founder, Business Development, DataScouting
Rami El Sabeh, OSINT Consultant, DataScouting10:30-11:15 Session B
From Data to Knowledge – the Power of Mass Data Fusion
All-source mass data analysis for actionable intelligence
Anders Riskaer, Innosystec10:30-11:15 Session C
Big Data Fusion Driving Seamless Digital Operations Transformation
Experience the power of Big Data Fusion—breaking silos, enhancing decision-making, and driving mission-critical performance. See how seamless data integration and advanced validation unlock precise insights from open and hidden sources for unparalleled operational efficiency.
Presented by RAKIA Group13:15-14:00 Session A
From Data to Knowledge – the Power of Mass Data Fusion
All-source mass data analysis for actionable intelligence
Presented by Innosystec14:15-15:00
2025 challenges and trends in the Webint world
Presented by Terrogence15:15-16:00
Maritime Threats Prediction, Detection and Monitoring with Revolutionary Fusion Intelligence Platform. A real use-case in the Red Sea
Presented by IPS16:15-17:00
SinoGPT Simplify Case Investigation, Retrieval, and Business Application Co-Development
Presented by Sinovatio
Wednesday, 12 February 2025
09:10-10:00 Session A
Unlocking the Present: Digital Data's New Era
Discover how the evolving landscape of digital data is reshaping industries today. This presentation explores the tools, strategies, and insights needed to harness the power of data in the modern era and stay ahead in a rapidly changing digital world
Presented by Penlink09:10-10:00 Session B
Is AI delivering in real investigations? A critical look at its adoption and how to make it work
Presented by SIO9:10-10:00 Session D
Defending Reality: The Fight Against Deepfakes, Digital Manipulation, and Bot-Powered Disinformation
Presented by Blackscore13:00-13:45 Session A
One Trusted Solution: CoAnalyst’s Unified Ecosystem – Real Life Case Studies
Explore how CoAnalyst’s integrated data ecosystem provides a trusted solution for complex investigations. This presentation features real-life case studies demonstrating the power of multi-layered data integration to deliver actionable insights with confidence.
Presented by Penlink13:00-13:45 Session B
How to Follow the Terror Funding Trail with OSINT Analysis
Presented by Cognyte13:00-13:45 Session C
How Intelligence Agencies Eliminate Blind Spots with New AI-Powered Recognition Tools
Presented by Corsight
13:00-13:45 Session D
From Translation to Strategic Insight: Advanced On-Premise NMT with Generative LPs for Government Data Sovereignty
In this session, we'll delve into how advanced on-premise Neural Machine Translation, enhanced by Generative Language Processing, serves not just to translate but to provide strategic insights for government entities. We'll discuss the importance of data sovereignty, how these technologies can be securely implemented, and the real-world implications for policy, communication, and strategic planning within government operations.
Presented by RWS14:00-14:45 Session A
Transforming Intelligence Organizations with the World’s First LLM Specifically Developed for Law Enforcement.
Abhishek Sharma, Co-founder & CTO, Innefu Labs14:00-14:45 Session B
Leveraging Maltego's investigation platform to uncover, monitor and track foreign influence threat actors
This session will explore the workflows for infrastructure investigations to understand the scale and scope of foreign influence operations. In addition to attribution, this real and live use-case will also explore capabilities of live monitoring and situational awareness in the context of preemptively identifying where adversaries will attack next.
Presented by Maltego15:15-16:00 Session A
Octostar: introducing the modern, APP-based Operating System for all-int, all-data Investigations
Presented by Octostar15:15-16:00 Session B
How to identify the identity of the threat actors from hidden channels
YK Lee, S2W15:15-16:00 Session C
Beyond the Surface: CYBERMEDIA for Cyberspace monitoring, engagement & investigations covering Social Media, Web, Deep Web, Dark web and social Networks groups
Presented by Euler Data Solutions16:15-17:00 Session A
OSINT in Action: Unlocking Geolocation Insights Through Online Sources
Presented by Cognyte16:15-17:00 Session B
Pure Storage Platform for Intelligence and Data Lakes
Sherif Saba, Field Solutions Architect, Pure Storage16:15-17:00 Session C
Centralized 5G ready Cyber-intelligence AI enabled Monitoring Centre to support the challenges of Lawful Interception and Electronic Surveillance.
Use cases and demonstration.
Presented by AREA16:15-17:00 Session D
OSINT in a Polarized World: Geo-political Threats
In a polarized world, Open SourceIntelligence (OSINT) is a vital tool for addressing modern challenges. It helps uncover disinformation, monitor conflicts, and track emerging threats by leveraging publicly available data. This presentation will examine how OSINT can be utilized to monitor and investigate these geo-political threats.
Steve Rivers, VP EMEA Technical Sales, Shadow DragonThursday, 13 February 2025
08:30-09:15 Session A
From Data to Decisions: Leveraging AI for Real-Time Cyber Intelligence in National Security
Presented by SIO08:30-09:15 Session B
Analyst of tomorrow – incorporating co-pilots & Gen-AI Agents into the Intelligence analysis workflow
Noam Zitzman, Cognyte08:30-09:15 Session C
Experience the Future of Raw IP data Analysis for Actionable Intelligence.
Never miss intelligence from WhatsApp, FaceTime and other encrypted calls made by the targets you are investigating and get their behavior on a timeline. Discover Simplicity and Power - No technical expertise required.
Presented by ClearTrail10:15-11:00 Session A
Brain: Universal big data analytics
Rauf Fatullah, Chief Information Officer, Solutions Engineering10:15-11:00 Session B
Leveraging OSINT 0-days to investigate a person of interest
Sylvain HAJRI, Epieos11:30-12:15 Session B
Beyond Borders: Mastering Passenger Screening with Big Data Fusion
A practical guide to making passenger screening faster, safer, and more efficient. Through real-world cases, explore how Big Data Fusion tackles key challenges like human error, misinformation, security silos, fake passport detection, and outdated technology—optimizing resources for seamless operations.
Presented by RAKIA Group11:30-12:15 Session C
Intellectus IA Ecosystem: Built for the Intelligence Mindset
Ivan Poczynok, Presales Analyst, TRG12:30-13:30 Seminar
Open Source Tools, PART 2. Top 20 FREE Open Source Tools (OSINT) Used in Cybercrime Investigations
(THIS SEMINAR IS RESTRICTED TO LEA, MILITARY, AND GOVERNMENT ATTENDEES. PHOTOS AND VIDEO RECORDING ARE PROHIBITED).
Now I’ve shown you how to hide, let us go and start covertly searching and gathering online intelligence with the best tools available.
Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police12:30-13:30 Session A
Enhanced Synergy of SIGINT and OSINT by proprietary AI: From Crime Investigation to Prevention
Presented by 7Generation12:30-13:30 Session B
The AI-driven Intelligence to monitor and extract meaningful information from Social and Traditional Media to improve national security.
Presented by IPS
Track 4: Threat Intelligence Gathering and Cyber Security Product Presentations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees
Tuesday, 11 February 2025
14:15-15:00 Session A
Unveil your network security weaknesses before cybercriminals do
Daniel Munteanu, Senior Technical Product Manager | CISSP, Keysight/IXIA15:15-16:00 Session A
The Italian Way: Advanced AI Surveillance and Strategy vs. Organized Crime
Presented by SIO15:15-16:00 Session B
Covert by Design: Secure Networking for LEA and Intelligence Keeping Your Network Under the Radar
Presented by Blu5 Group
16:15-17:00
Keep your Information Safe! New Trends and Developments in Information Protection
Presented by EO SECURITY s.r.o.Wednesday, 12 February 2025
9:10-10:00
Mastering the Digital Landscape: A Deep Dive into OSINT and Fusion Technology
RAKIA presents a step-by-step guide to leveraging OSINT and fusion technology for comprehensive investigations—all within a single interface. Explore real-world applications, including target profiling, mass data collection, darknet exploration, avatar management, fake account detection, no-code crawlers, and advanced link analysis.
Presented by RAKIA Group
13:00-13:45
Securing AI Pipelines: One-Way Data Diodes for Governmental Intelligence
Harnessing AI's potential in governmental applications demands uncompromising data security. This presentation explores the innovative use of hardware one-way data diodes to securely import training datasets and export result vectors, ensuring airtight isolation of sensitive systems. Discover how this approach mitigates cyber threats while enabling advanced AI capabilities within critical security infrastructures.
Presented by GSN14:00-14:45
Build a network visibility platform to gain insight into your network traffic
Presented by NEOX Networks15:15-16:00
ARGOS: Is my phone infected?
Presented by Top Solution16:15-17:00
Leverage DPI-Based Traffic Visibility at 100Gbps (1 Server) and App-Based Traffic Filtering to Raise the Performance of Government SOCs & Cyber Investigations
Discover a new generation of DPI-based cyber sensors that leverage years of experience in cyber defense environments to raise the performance of government-run Security Operations Centers (SOCs). Find out how this DPI-based traffic visibility can combine with SDK-based threat detection capabilities AND application-based filtering to provide superior network protection, even when traffic is encrypted.
Nicolas Duteil, Senior Technical Account Manager, DPI & Traffic Intelligence, Enea
Track 5: Investigating DarkWeb, Bitcoin, Altcoin and Blockchain Transaction Presentations
This track is for law enforcement and private enterprise investigators who have to monitor and investigate the DarkNet along with Bitcoin transactions associated with criminal activities
Sessions only open to LEA and Government.
Tuesday, 11 February 2025
11:30-12:15
Blockchain Intelligence and Investigations
Presented by Chainalysis13:15-14:00
Live Demonstration of DarkOwl Vision: Darknet Intelligence Discovery and Collection
Concealing your footprint on the Dark Web is time-consuming and challenging, let alone staying abreast of new apps, sites and the increasingly transient nature of the darknet ecosystem. Using the world's most comprehensive darknet database, DarkOwl VISION shows how darknet data can be exploited for criminal investigations, crypto attribution, and behavioral atmospherics. From TOR to Telegram and beyond, DarkOwl VISION is used by analysts as a transparent productivity tool to enhance any Darknet tasking.
Lindsay Whyte, DarkOWL FZEWednesday, 12 February 2025
15:15-16:00 Session A
Financial Intelligence and Anti-Money Laundering Measures in Crypto: A Comprehensive Approach to Cybersecurity
Presented by Match Systems15:15-16:00 Session B
Follow The Money Trail: Disrupting Terror & Organized Crime Crypto Operations
Presented by Cognyte16:15-17:00
Crypto Investigations Simplified: From Blockchain to Real-World Insights
Martin Alcantara, Head of Marketing and Customer Success, TRG
Track 6: Mobile Signal Intercept and Electronic Surveillance Presentations
This track is for Law Enforcement, Interior Security and the Government Intelligence Community who must work with cellular and mobile satellite operators regarding mobile location, electronic surveillance and RF intercept.
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.Tuesday, 11 February 2025
08:30-09:15
Understanding Mobile 2G, 3G, 4G, 5G NSA & LEO Infrastructure, Intercept and Cryptography
Dr. Jerry Lucas, President, TeleStrategies09:30-10:15
Satellite Interception Systems (Thuraya/ISAT/BGAN/IRIDIUM/Bideou).
Presented by Stratign10:30-11:15 Session A
Smart Home and Mobile Devices: Investigative Techniques for Wi-Fi, Bluetooth, Cellular Networks, and Law Enforcement Applications
Digital radio traces are becoming increasingly important in crime prevention and the investigation of criminal acts. While the interrogation of communication data via network operators is standard practice in mobile communications, capturing non-centralized radio traces like Wi-Fi, Bluetooth, peer-to-peer (e.g., AirDrop), and sidelink communications (LTE-V/V2X) requires specialized approaches. These technologies enable swift and precise data collection at crime scenes, even for highly mobile devices that remain in one place only briefly. The presentation also introduces an advanced RF scanner designed to detect and localize hidden smart devices and Bluetooth signals. Capable of identifying Bluetooth beacons, paired and non-paired devices, and extremely weak signals in vehicles or containers, this tool is ideal for law enforcement, customs, border control, and military operations. Equipped with up to five Bluetooth sensors, high-sensitivity directional antennas, and robust signal amplifiers, it reliably detects devices such as smartphones, smartwatches, fitness trackers, and tracking tags. Operated via a user-friendly tablet or smartphone interface, the scanner’s specialized software offers far greater accuracy and versatility than traditional smartphone apps.
Presented by S.E.A. GmbH11:30-12:15 Session A
Similar Trajectories & Hidden Connections Through Telecom Metadata
A demonstration showcasing how telecom metadata, combined with advanced AI algorithms, reveals patterns of life, enhances tracking and minimizes opportunities for criminal escape.
Presented by Intersec11:30-12:15 Session B
Securing Your Mobile World from Surveillance Threats. A deep dive into unmasking and countering IMSI Catchers with Cutting-Edge solutions
In this session, we will explore the threats posed by fake cell towers, such as IMSI Catchers and SMS blasters, when used by non-state actors, along with real-life cases. We will then discuss effective methods for detecting and localizing these threats quickly and accurately.
Finally, we will explore real-time countermeasures, including overloading IMSI Catchers with targeted requests, and strategies to avoid cell-site simulator interception altogether.
Presented by NeoSoft13:15-14:00 Session A
Operational Intelligence Solutions for Countering Terror Threats Across Dynamic Environments
Presented by Cognyte
13:15-14:00 Session B
Lawful Interception of IMS/VoLTE Roaming (S8HR)
With S8HR solution, Utimaco provides a carrier-grade and ETSI/3GPP compliant LI solution. S8HR VoLTE roaming architecture has gained momentum with mobile operators as simpler to implement and offering the fastest time to market. With all mobile traffic traversing the home network, the S8HR has introduced limitations for lawful interception of visiting roamers. Utimaco provides a carrier-grade and ETSI/3GPP compliant LI solution for IMS/VoLTE in visited networks, that comes in two flavors - active (Utimaco LMISF) and passive (S8HR AP).
Presented by Utimaco14:15-15:00 Session A
Understanding cross border patterns of mobility with next generation data fusion technology
With Multi-domain data fusion Rheinmetall makes the next step of combining tactical and strategic intelligence. By combining satellite communication monitoring, satellite imagery and commercial data, a robust cross-border surveillance and protection of critical infrastructure can be achieved.
Presented by Rheinmetall15:15-16:00 Session A
Unlocking Hidden Connections: Harnessing Multi-Source Geo-Intelligence for Smarter Investigations
Discover how multi-source geo-intelligence is reshaping investigations by offering a cross-country perspective that uncovers hidden connections. In this talk, RCS shows how this approach helps investigators pinpoint key starting points and anticipate the next steps, providing a practical and comprehensive solution for tackling complex cases.
Presented by RCS
Wednesday, 12 February 2025
14:00-14:45
2/3/4/5G Airborne Full Passive Direction Finder solution, no IMSI encrypt issues, no difficulties searching&securing.
Presented by REACH16:15-17:00
The challenges of remote surveillance over insecure networks, and how to solve them
When doing remote audio/video surveillance, it is often handy to transport the data through the internet and on private networks. These networks should be considered insecure, and you also do not want their owners to know what you are transporting. In this session we will discuss how these issues can be handled using Covidence equipment.
Presented by CovidenceThursday, 13 February 2025
10:15-11:00
Electronic Surveillance solutions to investigate in the field and operate form a unified, AI enabled, centralized Cyber Intelligence platform.
Use cases and demonstration.
Presented by AREA
Track 7: 5G Lawful Interception Product Presentations
This track is open to all conference attendees unless marked otherwise.
Note: Some sessions are only open to LEA and Government. These sessions are marked accordingly.
Tuesday, 11 February 2025
08:30-09:15
Understanding Mobile 2G, 3G, 4G, 5G NSA & LEO Infrastructure, Intercept and Cryptography
TeleStrategies
Dr. Jerry Lucas, President, TeleStrategies09:30-10:15
Transitioning Lawful interception Network Core Features from 4G to 5G SA: What’s it Looking Like and Challenges Ahead
Dr. Matthew Lucas, VP, TeleStrategies(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
16:15-17:00
5th Generation warfare is the ultimate warfare
5th Generation Warfare (5GW) is often considered a highly complex and evolving form of conflict. It's not necessarily about traditional battlefield confrontations but focuses more on influencing the cognitive domain. 5GW involves tactics like psychological operations, cyber warfare, misinformation, and the manipulation of social and political systems. The goal is to destabilize an opponent through non-traditional means without direct military engagement, making it difficult to identify and combat.
In 5GW, information becomes a primary weapon, and the battlefield expands into digital and ideological spaces. It incorporates elements of hybrid warfare, where state and non-state actors might engage in covert actions, including cyber-attacks, social media manipulation, and influencing public opinion to achieve strategic objectives.
Presented by Owlsense
Wednesday, 12 February 2025
(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
09:00-10:00
A revolutionary AI Based network independent 5G cellular locator
Presented by Septier(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
13:00-13:45
Evolution of 5G and the need for stand-alone capabilities on 5G
The world of 5G is advancing rapidly and staying ahead of the curve is critical for operational success. In this session, we’ll share insights into the latest 5G enhancements, and you’ll learn about new mission techniques that operators can leverage every day, on every mission.
Presented by Octasic(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
14:00-14:45
Survival of IMSI-catchers in 5G Networks
Utimaco´s 5G ID Associator solution supports network element vendors and operators in achieving 3GPP compliance. The latest 3GPP releases have introduced several security features that significantly improve resistance against false base stations, making the tactical IMSI catchers/stingrays unusable in 5G networks. The presentation provides a legal standardized approach to overcome this challenge.
Presented by Utimaco(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
16:15-17:00
Tactical Location Analytics: Accelerating Actionable Intelligence from Seized Devices
Field agents often seize multiple devices during missions, each containing critical forensic location data. Without the ability to quickly analyze this time-sensitive information on-site, valuable insights can be lost. For example, identifying the delivery location of a drug shipment before criminals realize their operation is compromised. This presentation discusses how tactical location solutions can empower agents with an efficient solution that runs on a single laptop, requires no internet connection, and features intuitive, drag-and-drop data ingestion. Learn how to transform seized data into real-time actionable intelligence, giving agents the edge to stay ahead.
Presented by SS8Thursday, 13 February 2025
(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
10:15-11:00
5G Security Encrypted Phone, no information leaking any more
Presented by REACH(THIS SESSION IS FOR LEA AND GOVERNMENT ATTENDEES ONLY)
11:30-12:15
Real-life lessons of overcoming 5G SA challenges in field operations
Presented by Cognyte
Training Seminars Led by Law Enforcment Officers and Ph.D Computer Scientists
Tuesday, 11 February 2025
Seminar #1
08:30-15:00Online Social Media and Internet Investigations
Presented by:Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police08:30-09:15
Proxies and VPNs: Identity Concealment and Location Obfuscation
09:30-10:15
Tor, onion routers, Deepnet, and Darknet: An Investigator's Perspective
10:30-11:15
Tor, onion routers, Deepnet, and Darknet: A Deep Dive for Criminal Investigators
11:30-12:15
Cellular Handset Geolocation: Investigative Opportunities and Personal Security Risks
13:15-14:00
Ultra-Wideband Geolocation and Cyber OSINT
14:15-15:00
Collecting Evidence from Online Social Media: Building a Cyber-OSINT ToolboxSeminar #2
08:30-16:00The cyber investigators essential toolbox - Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK PoliceThe aim of this 1-day seminar is to take the attendees from the basics of understanding the Internet, how to covertly discover live and deleted data, through to a full understanding of best practice of an Internet investigator, building their OSINT toolbox. Having awareness and knowledge of all the tools available to achieve this. It is aimed primarily at the investigator, delivered from the perspective of detective, to empower them to have the best methodology and tradecraft to profile and catch suspects.
This is exclusively Law Enforcement military and government only, as Practical examples, covert and investigative methodology and tradecraft will be given throughout the seminar. Free tools in every session. This seminar is not structural or theoretical practices and awareness. Its hands-on practical techniques.08:30-09:15
The Internet, and how suspects leave a Digital Footprint. How the system works for us, as investigators
How it works, for us. Why it works, for us. How data traffic leaves a permanent trace. How and why everything that was on the internet, is still there. Identifying the structural data and exploits, that will take you to your suspect. Tracking and evaluating data. MAC tracking. If you’ve ever said “it’s been deleted” or “its no longer there”, this seminar is for you. Let me prove you wrong.
09:30-10:15
Recognizing Traffic Data and digital profiling via social networks and devices - digital shadows
What data is available. How to harvest and analyse it. Best practice to identify suspects and build profiles. Good practice, virtual data 'housekeeping' and tradecraft. Data collection and interrogation, significance, and value. IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them (where they show their id). Dynamic approaches to identifying suspects through internet profiles. What investigators get from tech and service providers, and how to analyse it. Investigator capabilities and opportunities. TCP/IP and header value and analysis
10:30-11:15
WIFI, geolocation, and Mobile Data traces and tracking
A detectives look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement. Unique communication identifiers. Dynamic live time tracing. Geo location services and uses. Online Surveillance and tracking movement and speed. You and your target are being tracked by multi organisations that you done even know exist. Lets identify them and interrogate their data bases.
11:30-12:15
Exploiting and circumnavigating Masking Tech,( encro’s, VPN’s, TOR and proxies)
How suspects are using emerging and new technologies.
An introduction to where technology is going, and how Law enforcement can use this to our advantages. dynamic and pro-active problem solving. Darknet, (Deep web), TOR and IRC use. VOIP, Skype and FaceTime exploits. Advanced data sniffing and profile building. TOR systems, applications, and ways to coax offenders out of the system.
13:15-14:00
Advanced Techniques in Tracing Suspects, and lateral problem solving.
Using innovative and dynamic methods to trace offenders. Tricks used by suspects and how to combat them- Play them at their own game? Covert internet investigations. Proxy servers and hiding. Managing collateral intrusion. Reverse and social engineering. Thinking outside the box. Lateral thinking. Possible missed opportunities. Profile building and manhunts through device footprints, speed and movement.
14:15-15:00
Open-Source Tools, PART 1. Resources, tradecraft and techniques – Before you use the tools you need to know the tools that enable you to be safe and how to hide……. PART 2 on Thursday.
"Just google it" is great for tickets, tyres, holidays and opening hours. But as an investigator, we can do better, and safer. Using most main stream search engines and browsers come with certain risks. This session aims to change that. A look at good tradecraft, practice and methodology in profiling, tracking and tracing digital footprints and shadows on the internet, by means of best available tools. Tools that the target can’t see . Do's and do nots. Best tools for best results. When was the last time you 'googled' something in an investigation, and it returned 5 results, all specifically relating to your suspect? This session will teach you how to fast track you to the data you need, and cut away the chaff. PART 2 on the final day with free tools to download and keepSeminar #3
08:30-09:15Understanding Mobile 2G, 3G, 4G, 5G and 6G Infrastructure and Law Intercept for Technical Investigators
Presented by: Dr. Jerry Lucas, President, TeleStrategiesThis session addresses the infrastructure evolution of 2G to 3G to 4G to 5G NSA and the impact on lawful interception. Specifically;
Network Architecture Evolution from 2G to 3G, 3G to 4G, 4G to 5G regarding radio technology (TDMA, CDMA, OFDM and MIMO), network core from CSFB to VoLTE and SS7 to Diameter.
Encryption, Target Identification and Location: SIM and eSIM cards, IMSI and Target ID, encryption algorithms (A3, A5, A8 and Ki) and basically how user authentication and traffic encryption is accomplished.
Target Location Tracking with CDR analysis, MAC address farming, MITM attacks, SS7 access, IMSI catchers and IT intrusion.
4G to 5G Transition Specifics Understanding 5G Non Stand Alone (NSA) vs. SA 5G, the IMSI catcher issue (myth vs. realities), 5G Cryptography (ECC, SUPI, SUCI), 5G target location enhancement and LTE/NR Internetworking and Co-existance.
5G Spectrum What can 5G deliver with mid vs. high frequency spectrum and what new spectrum bands are soon to be auctioned off
SA 5G Infrastructure Features: NFV, SDN, Edge/Cloud Computing and Network Slicing
Seminar #4
09:30-10:15Transitioning Lawful Interception Network Core Features from 4G to 5G SA to 6G: What's it Looking Like and Challenges Ahead
Presented by: Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategiesCellular market analysts collectively have identified 5G services deployed in over 400 cities spread over 30 or so countries. The one common feature of all these operations is that they are providing 5G services with a 4G/5G hybrid network infrastructures or so called non-Stand Alone (NSA) architecture. This session addresses the trasition to 5G standalone.
In reality lawful interception of non-standalone is not any different from 4G interception regarding new LI feature additions. The next LI challenge will be for 5G SA. This webinar addresses the technical challenges facing law enforcement, 5G operators and ISS vendors. Specifically the four transitions are:
- 5G Network Challenges Identifiers: How are law enforcement going to grab 1gbps traffic streams; backhaul to monitoring centers and filter non-important traffic of interest.
- 5G Edge Cloud Computing: How do you intercept on a 5G operators IT systems, deal with proprietary system protocols, e2e encryption and localized content
- 5G Virtual Network Core: How complicated will this be regarding LI, VoIP on virtual devices and what LI barriers has the IETF created
- 5G Network Slicing: Is this 5G feature restricted to private enterprises or will 5G MVNO’s provide public mobile wireless services, How will law enforcement interconnect with 5G OSS provisioning systems and what is the LI point of interconnection?
Seminar #5
10:30-11:15Understanding How AI Empowers ISS Products, LEAs and Intelligence Agencies
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesLaw enforcement and intelligence agencies have massive data sets to pile through in order to find the evidence and information they need for their investigations. This seminar will address how AI is helping. The presentation will first provide a background/primer in at AI technologies - what are the specific types of AI systems; how are they used in industry today; and what are the strengths and weaknesses of AI. The second half will focus on how ISS vendors are leveraging AI to increase agent efficiency and results in network data, OSINT, application profiling, location and image/language processing. Specific topics include:
- Overview of AI, machine learning (ML) and deep learning (DL) systems technology.
- What AI capabilities are helping law enforcement and national security agencies (e.g., image / natural language processing, unstructured data analytics, predictive analytics).
- How AI is powering OSINT analytics, mobile signal intercept, location, signaling intelligence, audio-visual forensics, encryption and surveillance products.
- Negative impacts of AI, such as clutter, fake news.
- Future directions: generative AI, ChatGPT.
Seminar #6
11:30-12:15Generative AI (e.g., ChatGPT): How LEAs and Intelligence Agencies Can Leverage the Technology, and Criminal Use Examples
Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategiesGenerative AI (GAI) is a bit over a year old, yet the technology has made profound impact across the tech industry. This session will look at the key functional elements that make GAI disruptive; what it means for LEAs and intel agencies; and emerging GenAI capabilities to watch for in 2024. Focus areas include:
- How can LEAs/IAs leverage GenAI to improve their capabilities?
- What does each model specialize in? What differentiates them - training data, use cases, integration points?
- Beyond language, what’s next? Multi-modal model advancements – images, video, audio processing and generation
- Devices / integrations to watch - “glasses”, handsets, robotics, augmented reality systems, cars, weaponized systems (e.g., drones, AVs)
- How might criminals leverage? cyber, fake news/deepfakes, autonomous systems/robotics, communications applications, command and control, chatbots, and more.
Thursday, 13 February 2025
Seminar #7
12:30-13:30Top 20 Open Source Tools (OSINT) Used in Cybercrime Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police