Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
2Activity
0 of .
Results for:
No results containing your search query
P. 1
ISS Internet Spying Brochure

ISS Internet Spying Brochure

Ratings: (0)|Views: 812|Likes:
Published by undermattan
Info om en mässa för digital spionutrustning som hålls i Prag 4-6 Juni 2013.
Info om en mässa för digital spionutrustning som hålls i Prag 4-6 Juni 2013.

More info:

Categories:Types, Brochures
Published by: undermattan on Mar 22, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

03/29/2013

pdf

text

original

 
Associate Lead Sponsors
®
Where Law Enforcement,Public Safety, Telecoms andthe Intelligence Community turn forTechnical Training and Product SelectionWhere Law Enforcement,Public Safety, Telecoms andthe Intelligence Community turn forTechnical Training and Product Selection
105 LEA/Interior Security/Intel Training Sessions and Courses to Choose From
Exhibitors and SponsorsLead Sponsor
ISS
World
®
Europe
Intelligence Support Systems for Lawful Interception,Criminal Investigations and Intelligence Gathering
4-6 JUNE 2013 CLARION CONGRESS HOTEL PRAGUE, CZ
 
R  g  i  t  r   1   d   2  d   F  R  E  E  !  
 
For Complete ISS World
®
Conference Session Descriptions, Go To www.issworldtraining.com
ISS World Europe
is the world's largestgathering of European Law Enforcement,Intelligence and Homeland Security Analysts aswell as Telecom Operators responsible for LawfulInterception, Hi-Tech Electronic Investigationsand Network Intelligence Gathering.ISS World Programs present the methodologiesand tools for Law Enforcement, Public Safetyand Government Intelligence Communities inthe fight against drug trafficking, cyber moneylaundering, human trafficking, terrorism andother criminal activities conducted over today'sTelecommunications network, the Internet andSocial Networks.
Track 1
ISS for Lawful Interception and CriminalInvestigations
Track 2
ISS for Big Data Analytics and SocialNetwork Monitoring
Track 3
ISS for Mobile Location, Surveillanceand Signal Intercept
Track 4
Encrypted Traffic Monitoring and ITIntrusion Product Training
Track 5
LEA and Intelligence Analyst Trainingand Product Demonstrations
Track 6
Social Network Monitoring and BigData Analytics Product Demonstration
Track 7
Mobile Location, Surveillance and SignalIntercept Product Training
Pre-Conference Training SeminarsTuesday, 4 June 2013
Seminar #1
8:30-4:30
Online Social Media and InternetInvestigations
Presented by Charles Cohen,
Cohen Training and Consulting, LLC 
Charles Cohen also holds the position ofCommander, Special Investigations andCriminal Intelligence,
Indiana State Police,USA
8:30-9:30
Session 1 of 6:What Investigators &Analysts Need to Know about OnlineSocial Media.
9:45-10:45
Session 2 of 6: OSINT and CriminalInvestigations
11:00-12:00
Session 3 of 6: Successful Use of OnlineSocial Media in Criminal Investigations
1:00-2:00
Session 4 of 6: Counterintelligence &Liabilities Involving Online Social Media
2:15-3:15
Session 5 of 6: Facebook: Tools, Tricks, &Techniques Investigators Need to Know
3:30-4:30
Session 6 of 6: What Investigators Needto Know about Hiding on the Internet
Seminar #2
8:30-4:30
Understanding ISS Technologiesand Products Deployed inTelecommunications Networksand Monitoring Centers for LawEnforcement and Intelligence Analysis
Presented by: Dr. Jerry Lucas, President,
TeleStrategies 
This one day pre-conference seminar coversthe spectrum of ISS Technologies andProducts deployed in today's fixed wire,mobile wireless and Internet ServiceProvider networks and LEA Monitoring andIntelligence Gathering Centers. This all dayseminar is ideal for those law enforcement,public safety and intelligence analysts whoneed an understanding of the ISStechnologies to be discussed in theconference sessions and the ISS productsdisplayed at the exhibit hall as well as anunderstanding of the buzz words and jargonused by telecom operator engineers andtheir vendors.
8:30-10:45
Understanding Wireline TelecomInfrastructure, Interception and RelatedISS Products
What do LEAs need to know about thepublic switched telecommunicationsnetworks, circuit switching, fiber optics,SONET/SDH, Broadband Access (DSL,ADSL, Cable Modems, etc.), billing systemsand call detail records, standards for lawfulintercept, basic LI elements (access, deliveryand collection function), LEA MonitoringCenter Functions (call information and callcontent data collection) and where are ISSproducts deployed for monitoring andintercept.
11:00-2:00
Understanding Mobile WirelessInfrastructure, Interception and RelatedISS Products
Infrastructure basics (GSM, GPRS, EDGE,UMTS, HSPA and LTE), Wi-Fi, WiMax andFemtocells, How a cellular call is processed,back office infrastructure, HLR, VLR,Backhaul and PSTN interconnection, dataservices, SMS, MMS, IM, data services,fixed mobile convergence, Smartphonechallenges for LEA, intrusion techniques,gathering Geolocation data, locationtechnologies (A-GPS and RF finger printing)and where are ISS products deployed formonitoring and intercept.
2:15-4:30
Understanding the Internet,Interception and Related ISS Products
What Investigators Have To Know about IPcall Identifying Information, Radius, DHCP,DNS, etc., Tracking an Internet Address to aSource, Investigations Involving E-Mail,Facebook, Twitter, Skype, Instant Messaging,Chat Rooms and Message Boards, IMS, P2PNetworks and Deep Packet Inspection, BigData Analytics, defeating encryption,
4-6 JUNE 2013 CLARION CONGRESS HOTEL PRAGUE, CZ
ISS
World
®
Europe
Intelligence Support Systems for Lawful Interception,Criminal Investigations and Intelligence Gathering
Exhibits
5 June 2013, 10:00 a.m. - 5:00 p.m.6 June 2013, 9:30 a.m. -12:30 p.m.
 
emerging IPv6 Challenges and what can bedone to address Internet intercept deployingISS infrastructure and where are ISSproducts deployed for monitoring andintercept.
Seminar#3
8:30-4:30
Practitioners Guide to InternetInvestigations
Presented by: Mark Bentley, Data Comms Manager,
Child Exploitation and Online Protection Centre (CEOP) 
, United Kingdom
This is exclusively Law Enforcement only, asPractical examples, covert and investigativemethods will be given throughout theseminar.The aim of this 1 day seminar is totake the attendees from the basics ofunderstanding the internet, through to a fullunderstanding of best practice of an internetinvestigator, and having awareness of all thetools available to achieve this.
8:30-8:45
Introduction
A 15 min introduction to the work of theChild Exploitation and online ProtectionCentre
8:45-9:30
The World Wide Web and the Internet
9:45-10:45
Recognizing Traffic Data
11:00-12:00
WIFI and GPRS
13:00-14:00
Emerging Technologies, Masking Techand Tools
14:15-15:15
Advanced Techniques in TracingSuspects
15:30-16:30
Open Source Intelligence Training(OSINT)
Seminar #4
8:30-4:30
Advanced IP Intercept Training
Presented by: Hendrik Schulze, President & CTO and Jens Geier, Product Manager,
ipoque 
08:30-10:45
Understanding TCP/IP for PacketSniffing and Traffic Analysis
A brief introduction into network technologyand the basics of TCP/IP needed forinterception and the impact on propernetwork analysis. Based on this, theworkshop reflects the technical options forLEA's to investigate in networks.
11:00-2:00
Deep Packet Inspection (DPI) Basics forLEA's, Intelligence Analysts and TelecomOperators
An overview on deep packet inspectiontechnology (DPI) and its basic operationsdown to the application level. Skype is usedas example to show the implications ofcomplex network behavior on DPI.
2:15-4:30
Basics of IP Application Decoding
From Packets to Structured DataThe workshop is a high-level introduction onbuilding decoder software starting fromrequirements on an example of softwarearchitecture. After an overview of all parts ofthe introduction the building blocks areelaborated.
Seminar #5
13:00-14:00
The Dark Side of the Internet - TheHidden TOR and I2P and How theyFunction
Presented by: Ross Bowerman, Detective Sergeant,
Scottish Police College, UK 
Seminar #6
14:15-15:15
Smartphone Application ChallengesEncountered and OpportunitiesPresented to Law Enforcement
Presented by: Michael Williamson, Detective Inspector, Force Intelligence Bureau,
Crime and Safer Communities, UK 
A users overview of Smartphoneapplications, what they can do, implications,challenges and opportunities for lawenforcement in obtaining results andcoordinating our response to theoverwhelming new apps appearing daily.
Seminar #7
8:30-12:00
Sharing in Real-Time Cyber Threat andAttack Informaiton AmongGovernments, Telecoms and PrivateIndustry
Presented By Matthew Lucas (Ph.D. Computer Science), Vice President,
TeleStrategies 
And Invited Faculty 
Collaborative cybersecurity systems -- wheregovernments, enterprises and telcomoperators share threat and attack informationin real-time -- are gaining significant interestand momentum in the industry. Theapproach not only improves respectivecyberdefense capabilities and criticalinfrastructure protection as compared totraditional stove-pipe implementations, butalso enables operators to improve the qualityof their service offerings and complementthem with enhanced cybersecurity features.As with any distributed system,implementing collaborative cybersecurityplatforms is incredibly complicated. In orderto be successful, the approach will requirerobust standards that are efficient,comprehensive and vendor-independent. Thishalf day tutorial will look at the overallchallenges, the emerging architectures andstandards surrounding distributedcollaborative cybersecurity systems. Thetutorial will be broke into three sessions:
Session 1:Overview of the TechnicalChallenges in Real-Time Sharing of Threatand Attack Information AmongGovernments, Telecoms and PrivateIndustry.
This panel of technical experts will give theirassessment of the challenges of sharinginformation among governments, telecomoperators and the private sector from alawful interception and intelligence gatheringvendors perspective.
Presented By Panel of ISS Vendors 
Session 2:Distributed CybersecurityRequirements and Architectures –
Cyberthreat data requirements for eachdomain (government, telcom wide-area,enterprise and CPE) will be identified, datatypes/schemas will be explained and real-time requirements will be considered.
Session 3:Exchange protocols / use cases– STIX and other protocols
will be
4-6 JUNE 2013 CLARION CONGRESS HOTEL PRAGUE, CZ
ISS
World
®
Europe
Intelligence Support Systems for Lawful Interception,Criminal Investigations and Intelligence Gathering

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->