About Track 1 - Lawful Interception and Criminal Investigations Training
The full agenda for track 1 is below. For information on any other track, please click the links below
Track 1: Lawful Interception and Criminal Investigation Training
Track 2: Big Data Analytics and Social Network Monitoring Training
Track 3: Threat Detection from Automated OSINT Collection and Analysis
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA, Defense and Intelligence Analyst Product Training
Track 6: Social Network Monitoring and Big Data Analytics Product Training
Track 7: Mobile Signal Intercept and Electronic Surveillance Product TrainingPre-Conference: Seminars and Tutorials (Monday, 16 March 2015)
Track 1: Lawful Interception and Criminal Investigation Training
This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.
Monday, 16 March 2015
10:15-11:15 The Battle for Communication Security is Lost, or is it?
Presented by Mils ElectronicTuesday, 17 March 2015
9:00-9:30 Session A | Today’s Interception in an encrypted, social and clouded world Presented by Hacking Team |
9:00-9:30 Session B | Enterprise-Level Intercept Technology for the Edge User Presented by Ultra Electronics |
9:30-10:00 Session A | Newest trends and technologies in Lawful Intelligence Presented by trovicor |
11:30-12:00 Session A | LI in Clouds, SDN & NVF Rudolf Winschuh, Utimaco TS GmbH |
11:30-12:30 Session B | Current and Future Standardization Challengers: Encryption, Network Function Virtualization, Cloud Computing and More Alex Leadbeater, Chairman, SA3 LI and EU Data Retention Compliance Manager, BT |
12:00-12:30 | Demystifying SSL/TOR Interception: Attack case history and state-of-art countermeasures Presented by Hacking Team |
14:00-14:30 Session A | Utimaco Umbrella Solution - a case study Dirk Börgerding, Utimaco TS GmbH |
14:00-14:30 Session B | Exploiting Communications Metadata to Deliver a National Cyber Network Defence Capability This presentation describes how various types of communications metadata traditionally available to, and exploited by, existing communications intelligence missions support the realisation of a National Cyber Network Defence capability and explores the benefits and trade-offs of shared mission architectures and common infrastructure reuse. Andy Cheadle, Chief Engineer, BAE Systems Applied Intelligence |
14:30-15:00 Session A | One-way layer 1 connection: The only secure solution to bridge your confidential network’s air gap The FoxIt Data Diode is the only Common Criteria EAL7 certified product in the world. This is a OSI layer one one-way device: data can only transmitted from the less secure network to the more secure network and not the other way around at the physical layer. It is physical impossible to send data the other way. Gilles Loridon, CEO, GSN |
14:30-15:00 Session B | Make Sure You Get All Data, and Get It Correct - even if it is hidden or been faked If you are using data from mobile devices in your investigations, you should be aware of that the data may be hidden or faked. In this presentation you will learn which type of hidden data may be at hand, how you can get access to it for intelligence and investigat Presented by MicroSystemation |
15:30-16:00 | How NFV Changes Everything: LI and other compliance obligations Tony Rutkowski, Executive VP, Yaana Technologies |
16:00-16:30 | Signals Intelligence and Interception for DWDM Networks Presented by NetQuest |
Wednesday, 18 March 2015
9:00-9:30 Session A | How to put digital evidence in the hands of Case Officers without Cyber Forensic skills Digital evidence is become more important in all investigations, yet the tools to analyse it require scarce, expensive and highly trained resources. We need to change this. This presentation looks at how to bring digital evidence to the entire investigation team without compromise on quality or integrity. Frank Coggrave, Founder and Sales Director, GSN |
9:00-9:30 Session B | Enterprise-Level Intercept Technology for the Edge User Presented by Ultra Electronics |
9:30-10:00 Session A | Tactical Audio Monitoring via IP Presented by Seartech |
9:30-10:00 Session B | Gaining Deeper Visibility into Network Traffic for the Intelligence & Security Community Presented by Gigamon |
11:00-11:30 | 100GE Network Traffic Interception in Practice Presented by INVEA-TECH |
12:15-13:15 | Understanding Bitcoin along with TOR and Dark Web Matthew Lucas (Ph.D, Computer Science) and Vice President, TeleStrategies |