The full agenda for track 7 is below. For information on any other track, please click the links below.
Track 1: ISS for Lawful Interception and Criminal Investigation
Track 2: ISS for Telecom Metadata Retention and NSA Access
Track 3: ISS for Cyber Threat Detection and Information Sharing
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Product Demonstrations
Track 7: ISS for Dark Web, TOR and Bitcoin Investigation
Advanced Hi-Tech, Cyber Crime Investigation Training (29 September - 1 October 2015)
31 classroom training hours, scheduled over 3 days, presented by sworn law enforcement officers, Ph.D. Computer Scientists and nationally recognized cybercrime textbook authors and instructors.
Track 7: ISS for Dark Web, TOR and Bitcoin Investigation
Some track sessions are for LEA and Other Government Attendees Only as indicated by ""
Tuesday, September 29, 2015
9:00-5:00 pm A Real World Look at Investigations in the Dark Web
Todd G. Shipley CFE, CFCE, President and CEO of Vere Software, Co-Author of , Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace and retired Reno, NV, Police OfficerWednesday, September 30, 2015
9:00-10:00 Bitcoin 101: What Investigators Need to Know about Bitcoin, TOR and Dark Web Commerce: Bitcoin basics, Miners, Blockchain and Cryptography Demystified and more.
Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies11:30-12:30 pm The Computer Science View of Bitcoins and Dark Markets
Nicholas Weaver, Ph.D. is a researcher at the International Computer Science Institute in Berkeley. His primary research is focused on network security, including worms, botnets, and other internet-scale attacks, network measurement, and network criminality including Bitcoin.1:30-2:30 pm Can Bitcoin be Taken Down Overnight by Hackers or CyberSaboteurs because of Software Flaws or Injected Malware in Bitcoin Core Technologies
Moderator:
Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies
Panelists:
Bitcoin Technology Experts to be Announced3:00-4:00 pm Analyzing Bitcoin Transactions to Detect Fraud and Other Financial Crimes
Moderator:
Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies
Panelists:
Panel of Financial Security Executives to be Announced
Thursday, October 1, 2015
10:30-11:30 Understanding and Defeating TOR
This session will explain how TOR anonymizes IP traffic, how TOR hidden services work, who uses TOR hidden services and the top five TOR investigation approaches. The session will start by illustrating standard standard IP based services and comparing with anonymizing TOR software. Transactions will be considered by both a DPI tool, and looking at server logs. Next, the presenter will illustrate how TOR hidden services work, and present the latest research on TOR HSDIR usage and statistics. Finally, the presenter will look at TOR statistical analysis; identifying TOR traffic via IP lookups and protocol signatures; TOR protocol defeating research such as padding and signaling; malware compromises and inducing identity-related traffic outside the TOR stack.
Matthew Lucas (Ph.D., Computer Science), Vice President, TeleStrategies