You are on page 1of 7

an Reg

d 2 ist

ISSWorld Asia
nd er 1
FR
® EE

Intelligence Support Systems for Electronic Surveillance,


Social Media/DarkNet Monitoring and Cyber Crime Investigations

5-7 DECEMBER 2017 • HILTON HOTEL • KUALA LUMPUR, MY

Where Law Enforcement,


Government Intelligence Agencies and
Financial Crime Investigators turn for
Technical Training and Product Selection

Lead Sponsors

Exhibitors and Sponsors

Covidence

76 LEA/Interior Security/Intel Training Sessions and Courses to Choose From


ISSWorld Asia
® Intelligence Support Systems for
Real-Time Threat
Electronic Surveillance,
Intelligence
Social Media/
Gathering,
DarkNet Monitoring
Cyber Security
and Cyber
and Crime
Cyber Crime Investigations
Investigations

5-7 DECEMBER 2017 • HILTON HOTEL • KUALA LUMPUR, MY

ISS World Asia is the world’s largest gathering


of Regional Law Enforcement, Intelligence
ISS World Asia 2017 - 16:00-17:00
Proxies, VPNs, Tor, Onion Routers,
and Homeland Security Analysts, Telecoms Agenda at a Glance Deepnet, and Darknet: A Deep
as well as Financial Cyber Crime Investigators
responsible for Cyber Defense, Electronic Training Seminars lead by Law Enforcement Dive for Criminal Investigators
Surveillance and Intelligence Gathering. Officers and Ph.D. Computer Scientist (continued)
ISS World Programs present the
methodologies and tools for Law Enforcement, Tuesday, 5 December 2017 Seminar #2

Public Safety, Government and Private Sector
Intelligence Communities in the fight against
9:00-17:15
drug trafficking, cyber money laundering, Seminar #1 Practitioners Guide to Internet
human trafficking, terrorism and other
criminal activities conducted over today’s
09:00-17:15
Investigations
telecommunications network, the Internet and • Presented by: Mark Bentley, Communications
Social Media. Online Social Media and Internet Data Expert, National Cyber Crime Law
Investigations Enforcement, UK Police
Track 1 • Presented by Charles Cohen, Cohen Training
The aim of this 1 day seminar is to take the
and Consulting, LLC.
Charles Cohen also
attendees from the basics of understanding
Lawful Interception and Criminal holds the position of Captain, Cyber Crimes
the Internet, how to find data, through to a full
Investigation Training Investigative Technologies Section, Indiana
understanding of best practice of an Internet
State Police, USA
Track 2 investigator, having awareness and knowledge
This one day session provides an up-to-date of all the tools available to achieve this. It is
Defeating Encryption with IT understanding of how social networking sites aimed primarily at the investigator, delivered
Intrusion work and how members act and interact. from the perspective of detective, to empower
Attendees will learn what information is them to have the best methodology and
Track 3 available on various sites and how to integrate tradecraft to profile and catch suspects.
that information into criminal investigations
LEA, Defense and Intelligence This is exclusively Law Enforcement only, as
and criminal intelligence analysis.
Practical examples, covert and investigative
Analyst Product Demonstrations Training Seminar #1 open to all conference methodology and tradecraft will be given
Track 4 attendees throughout the seminar.

Social Network/DarkNet Monitoring Understanding Cell Handset


and Big Data Analytics Product Geolocation: What Investigators 09:00-10:00
Demonstrations Need to Know The Internet, and how suspects
leave a Digital Footprint
Track 5
10:15-11:15
Mobile Signal Intercept and Open Source Intelligence (OSINT) 10:15-11:15
Electronic Surveillance Product Collection Tools: Creating an Recognizing Traffic Data and digital
Demonstrations Inexpensive OSINT Toolbox
 profiling
Track 6
11:30-12:30 11:30-12:30
Financial Crime, DarkWeb and
Metadata Exploitation in Criminal WIFI, geolocation, and Mobile Data
Bitcoin Transaction Investigations
Investigations
 traces
Track 7

Protecting Financial and 13:30-14:30 13:45-14:45


Government Networks Against Conducting Covert Online Awareness of Emerging
Cyber Attacks Observation and Infiltration Technologies, Masking Tech and
Activities: Challenges and Tools, TOR and proxies
Opportunities for Investigators

15:00-16:00

ISS World Asia Exhibit Hours 14:45-15:45 Advanced Techniques in Tracing


Proxies, VPNs, Tor, Onion Routers, Suspects, and lateral problem
Wednesay, 6 December 2017: Deepnet, and Darknet: A Deep Dive solving
10:00 - 18:00 for Criminal Investigators

Thursday, 7 December 2017:
9:30 - 12:30

To Review Complete Agenda or To Register, Go To WWW.ISSWORLDTRAINING.COM


ISSWorld Asia
® Intelligence Support Systems for
Electronic Surveillance, Social Media/
DarkNet Monitoring and Cyber Crime
Investigations

5-7 DECEMBER 2017 • HILTON HOTEL • KUALA LUMPUR, MY

16:15- 17:15 TOR hidden services. These are services that network encryption. This session open to all
Open Source Tools, resources and leverage TOR’s anonymizing capabilities to conference attendees.
mask the identity of criminally-hosted online
techniques services - forming the basis of just about all
illegal gambling sites, drug markets, child Thursday, 7 December 2017
Seminar #3 exploitation material, firearm sales, terrorism
propaganda, and more. This session open to
all conference attendees. Seminar #7
9:00-12:30
• How TOR hides IP addresses/identity/
Understanding ISS Technologies location 12:00-13:00
and Products Deployed in Top 20 Open Source Tools (OSINT)
• TOR hosting, What is .ONION and content
Telecommunications Networks analysis Used in Cybercrime Investigations
for Lawful Interception and Mass • Mark Bentley, Communications Data Expert,
Surveillance National Cyber Crime Law Enforcement, UK
• Presented by: Dr. Jerry Lucas, President, Seminar #5 Police
TeleStrategies
This half-day seminar covers how criminals 14:45-15:45
and terrorists communicate over today’s public Bitcoin 101: Introduction to What Wednesday, 6 December 2017
telecommunications wireline and wireless Technical Investigators Need to
networks, over the top Internet services and 8:15-8:30
Know about Bitcoin Transactions,
social networks. This seminar is ideal for Welcoming Remarks
law enforcement, interior security, public Dark Web Commerce and
• Tatiana Lucas, ISS World Program Director,
safety and others who need to understand Blockchain Analysis TeleStrategies
the ISS technologies and products used to • Presented by: Dr. Matthew Lucas, Vice
lawfully intercept electronic communications President, TeleStrategies
and conduct mass network surveillance as
This 101 training seminar is an introduction to 8:30-9:00
discussed at ISS World Conference sessions
and by exhibitors. Bitcoin, how the system is used to support Keynote: Top Ten Internet
criminal activities (e.g. Dark Web) and why Challenges Facing Law Enforcement
technical investigators need to understand
the basic Bitcoin transaction mechanism
and the Intelligence Community and
9:00-10:00
(Blockchain) to successfully defeat 21st Who at ISS World Asia has Solutions
Introduction to Wireline and IP century criminals and terrorist actions. • Dr. Jerry Lucas, President, TeleStrategies
Infrastructure and Related ISS Specifically, this introduction to Bitcoin for
Products for Lawful Interception and government and private enterprise technical Track 1
Mass Surveillance investigators addresses
Lawful Interception and
Criminal Investigation Training
10:15-11:15 Seminar # 6
This track is for Telecom Operators and
Understanding Mobile Wireless
Law Enforcement/Intelligence/Defense
Infrastructure and Related ISS 16:00-17:00 Analysts who are responsible for specifying
Products for Lawful Interception and Defeating Network Encryption: or developing lawful intercept network
Mass Surveillance What Law Enforcement and The infrastructure.
Intelligence Community Needs to
11:30-12:30 Understand Wednesday, 6 December 2017
Understanding the Internet Over- • Presented by: Dr. Matthew Lucas (Ph.D
Computer Science), Vice President,
the-Top (OTT) Services and Related 9:00-9:30
TeleStrategies
ISS Products for Mass Intelligence LI in modern networks like 5G
The starting point to defeating encryption
Gathering and Surveillance is to separate techniques addressing stored • Presented by Utimaco
encrypted data such as with the Apple
Seminar #4 iPhone issue. The other challenge is defeating
encrypted data in transit (e.g. Telegram, 9:30-10:00
Whatsapp, etc.) or Network Encryption. This Multi-source Intelligence Collection
13:30-14:30 webinar is about defeating the later. & Big Data Analysis
Investigation Techniques for When it comes to defeating network • Presented by Sinovatio
Unmasking TOR Hidden Services encryption the technical community separates
and Other Dark Web Operations into two camps. Those who want to impede
law enforcement and the government 11:30-12:30 SESSION A
• Presented by Matthew Lucas, (Ph.D Computer
Science), VP, TeleStrategies intelligence community from defeating Lawful Intercept and Investigatory
network encryption: IETF, Silicon Valley and
TOR networks are notoriously effective Insights and the Internet of things
hundreds of third party encryption services.
at hiding the online identity of criminals, And your camp, those who want to investigate (IoT)
terrorists and others who are up to no good. criminals and terrorist group who depend on • Presented by Yaana Technologies
The other side that receives less attention are
12:00-12:30 SESSION B 15:30-16:30 SESSION A
Content Filtering – A Technical Wednesday, 6 December 2017
IP Address Resolution – Breaking
Answer to Data Growth the Anonymity of Network Address
14:00-15:00
• Presented by Utimaco Translation
FinFisherTM: Hacking the Human
• Presented by Yaana Technologies
Element
14:00-14:30 • Presented by FinFisher
“Vitok-CLUSTER”: NoSQL database 15:30-16:30 Session B
intended for specialized processing Big Data and Machine Learning for
15:30-16:30
of the information coming from Intelligence: Cerebro NG
high-speed communication channels In-Line tactical IP probing: practical
• Presented by Advanced Systems
• Presented by NORSI-TRANS
demo and use cases from the field
for passive/active interception and
remote infection Thursday, 7 December 2017
14:30-15:00 • Presented by RCS S.p.A.
100% Signal Visibility within 8:30-9:30 SESSION A
next generation communications Tracking Location and Calls of
networks Track 3
Foreign Nationals through the use of
• Presented by Lumacron Technology
LEA, Defense and Intelligence Strategic Interception System
Analyst Training and Product • Presented by VASTech
Thursday, 7 December 2017 Demonstrations
8:30-9:30 SESSION B
This track is only open to Law Enforcement,
10:30-11:00 Public Safety and Government Intelligence Next generation LI-MC: extracting
Implementing lambda architecture Community Attendees. intelligence from Meta-Data with
with Vitok-Cluster for real-time easy-to use DPI and Big Data
analytics and batch processing for analysis capabilities in a unique
data mining queries Wednesday, 6 December 2017
platform
• Presented by NORSI-TRANS • Presented by RCS S.p.A.
9:00-10:00 SESSION A
Lawful Interception in 2017. VoLTE and
encrypted services like Facebook, Gmail 10:30-11:00 SESSION A
Track 2 and WhatsApp. A new approach to the IP
investigation How to uncover patterns
Defeating Encryption and IT in communication – Live
• Presented by IPS
Intrusion Product Training demonstration on utilizing email
This track is only open to Law Enforcement, analysis to detect corruption
Public Safety and Government Intelligence 9:00-10:00 SESSION B • Presented by trovicor
Community Attendees LIVE DEMO: face & voice
recognition to identify people in
10:30-11:30 SESSION B
video surveillance, phone calls and
Tuesday, 5 December 2017 Massive Investigation, with a care
social media
for privacy: Carrier Grade Nat
• Presented by ATIS
11:00-12:00 disambiguation and Rich IPDRs
FinFisher : Cyber Solutions for The
TM
Analysis
Fight Against Crime 11:30-12:30 SESSION A • Presented by AREA
• Presented by FinFisher Latest updates on Forensic
Investigator Toolbox
12:00-13:00
• Presented by AREA • Mark Bentley, Communications Data Expert,
13:30-14:30
National Cyber Crime Law Enforcement, UK
FinFisherTM: Keeping up with
Police
the Pace – New hacking Tools & 11:30-12:00 SESSION B
Techniques for Practical Operations How to quickly and efficiently
• Presented by FinFisher identify suspects Track 4
• Presented by Trovicor
Social Network Monitoring
16:00-17:00
Defeating Network Encryption: 12:00-12:30
and Big Data Analytics
What Law Enforcement and The Real-time target location tracking Training and Product
Intelligence Community Needs to • Presented by Trovicor Demonstrations
Understand This track is only open to Law Enforcement,
• Presented by: Dr. Matthew Lucas (Ph.D Public Safety and Government Intelligence
14:00-15:00
Computer Science), Vice President, Community Attendees
TeleStrategies
Optic Fiber Analysis: Signals,
Protocols, Metadata and Content all
in one Platform
• Presented by VASTech
16:00-16:30 SESSION A 14:00-15:00 SESSION A
Tuesday, 5 December 2017 How Public Sentiment can be Real-time, high accuracy mobile
influenced through propaganda location tracking
11:30-12:00
campaigns on Social Media • Presented by Creativity Software
Extremist communication: what is • Presented by IPS
out there, how to collect it, what it
does, how to make sense of it and 14:00-15:00 SESSION B
how to counter it – OSINT from a Thursday, 7 December 2017 Portable, Passive Monitoring tool for
practitioners view DPI and Multi-Dimensional Analysis
• Presented by Gamma Group 8:30-9:30 • Presented by EXFO
Advanced Analytics for Law
12:00-12:30
Enforcement 15:30-16:30
• Presented by Yaana Technologies Acquisition from Smart phone and
Evidence-based, operational mission
management – from the simple to WiFi-Data, incl. Geolocalization
the sophisticated 10:30-11:30 • Presented by Secure Information Management
Turning Social Networks Analysis GmbH
• Presented by Gamma Group
into Intelligence and Social
14:45-15:45
Engineering Thursday, 7 December 2017
• Presented by RCS S.p.A.
Digital Investigations in dark net
• Presented by AREA 8:30-9:30
IMSI Catcher, Target localization,
Track 5
Active and Passive Interception,
Wednesday, 6 December 2017 Mobile Signal Intercept Basics and Options
and Electronic Surveillance • Presented by NeoSoft AG
9:00-10:00
AI Powered Web Intelligence Training and Product
Extracting intelligent insights using machine Demonstration 10:30-11:30
learning algorithms This track is for Law Enforcement, Interior
Command and Control Center for
• Presented by Cobwebs Technologies Security and the Government Intelligence covert field operations using Audio,
Community who must work with cellular and Video and GPS feeds
mobile satellite operators regarding mobile • Presented by IPS
11:30-12:30 location, electronic surveillance and RF
Bridging discipline gaps in the hunt intercept.
for perpetrators: Bringing together This track is only open to Law Enforcement, Track 6
Public Safety and Government Intelligence
Metadata, OSINT, SOCMINT, SIGINT,
Community Attendees. Financial Crime, DarkWeb and
Dark Web, Surveillance techniques
Bitcoin Transaction Investigations
and various other capabilities to
This track is for government and private
support law enforcement Wednesday, 6 December 2017 enterprise financial crime investigators. Track
• Presented by Gamma Group 6 open to all conference attendees.
9:00-10:00 SESSION A
14:00-15:00 SESSION A RFID access control exploitation
• Presented by Providence
Tuesday, 5 December 2017
Dark Web – Can Governments afford
not knowing? Hunting criminals on 13:30-14:30
the dark side. 9:00-10:00 SESSION B Investigation Techniques for
• Presented by Gamma Group Challenges in today’s Inmarsat Unmasking TOR Hidden Services
interception and Other Dark Web Operations
• Ruediger Paetzold, Rheinmetall • Presented by: Dr. Matthew Lucas, Vice
14:00-15:00 SESSION B
Communication and Simulation Technology President, TeleStrategies
GoldenSpear Deep WEBINT – Pte. Ltd.
Reaching the Deepest corners of the
Deep Web and the Darkest corners 14:45-15:45
11:30-12:30
of DarkNet Bitcoin 101: Introduction to What
NeoSoft data traffic analyser for
• Presented by S2T Technical Investigators Need to
Mobile Monitoring
Know about Bitcoin Transactions,
• Presented by NeoSoft AG
15:30-16:00 SESSION A Dark Web Commerce and
Automatic Exploitation of Social Blockchain Analysis
12:00-12:30 • Presented by: Dr. Matthew Lucas, Vice
Network, Deep and Dark Web to
GSM Tactical Interception System President, TeleStrategies
complement traditional Lawful
for 3G and 4G
Interception Infrastructure
• Presented by Advanced Systems
• Presented by IPS

15:30-16:30 SESSION B
Intelligence Analysis on Big Data
• Presented by Sinovatio
Track 7 • Cloning and contactless card vulnerabilities
Wednesday, 6 December 2017 • PCI-DSS attacks and vulnerabilities
Protecting Financial and • The hackers point of view
11:30-12:00
Government Networks Against • Mark Bentley, National Cyber Crime Law
Hushmeeting: creating an iron-clad Enforcement, UK Police
Cyber Attacks and quantum-safe communication
This track is for government and private environment
enterprise professionals with cyber security 10:30-11:30
responsibilities. Track 7 open to all conference Preventing attacks, detecting intruders and Practitioners Guide to Defending
attendees. collaborating within a backdoor-free and
malware-proof communication framework. Banks Against Cyber Attacks
Real use cases and attacking scenarios. – Identifying And Protecting
Tuesday, 5 December 2017 • Presented by Feedback Italia Vulnerabilities To Frustrate The
Thief, and Integrity Proof The
16:00-17:00
Systems
Thursday, 7 December 2017 This one hour session will explore the
Best Practices for Securing
protection of weak points and future proofing
Government IT and Communications banks agains cyber attacks.
8:30-9:30
Infrastructure
Practitioners Guide to • PCI-DSS security and tightening
Agenda session topics: • WiFi encryption to avoid MITM
Understanding Cyber Attacks on
1. Common Cyber Security Threat • Pen testing
Banks – Exploring Vulnerabilities • Dynamic virus signatures and monitoring
Governments Must Deal with and New Types
of Attacks from Nation States and Pirates from The Perspective Of The Hacker • End user verification and login
(Ransomware, etc.). This one hour session will explore the • Customer vulnerabilities and verification
2. Common Security Weaknesses in viewpoints of both the banks perception • Quantum Dawn and Waking Shark II
Government IT and Communication of vulnerabilities, and that of the attacker. (wargaming) benefits
Infrastructure. A follow-up session at 10:30 will address • Future proofing and horizon scanning
3. Types of effective Cyber Security Practitioners Guide to Defending Banks • Playing the hacker at his own game.
Communications Solutions Government Against Cyber Attacks. • Mark Bentley, National Cyber Crime Law
should consider. • What is the current typical attack Enforcement, UK Police
• Moderator: Jerry Lucas, President, • Vulnerabilities leak points, and weak points
TeleStrategies • Hacking the Bank by traditional social
• Panel Presenter: Mirko Minuzzo, Feedback Italia engineering
• Other ISS World Asia exhibiting Vendors to be • Man in the middle/mobile (MITM)
invited. • Man in the Browser (MITB) attacks
• DDOS, Zeus, Zbot, and other exploits ISS World Asia Exhibit Hours
• BHO poisoning (browser helper objects)
• DNS poisoning Wednesay, 6 December 2017:
• Pineapple and Rasberry Pi devices 10:00 - 18:00
• Clickjacking Thursday, 7 December 2017:
• Formgrabbers 9:30 - 12:30

Registration Information Save $300 by registering before 18 October 2017

Law Enforcement/DHS/IC/DoD Registration* Free Colleague Registration:


Register as paid and you can invite a colleague to join you at ISS World
ISS World Conference Training Tracks 1, 2, 3, 4, 5, 6 and 7 Asia with a full, free conference pass. If you have not identified your
Pre-Conference Seminars plus Exhibits............................. $995 guest at this time, just enter “guest of” followed by your name and
complete with your contact information. You can register your guest at
Registration after 18 October 2017....................................$1,295 no charge at a later time.
Conference and Exhibitions:
Telecommunications Service Provider or Hilton Kuala Lumpur Hotel.
Enterprise Registration Special ISS World early registration rate: $112 US per night.
Telephone 60-3-2264-2264.
ISS World Conference (Tracks 1, 6 and 7),
International Attendees:
Pre-Conference Seminars and Exhibits............................. $995 If you need Visa assistance to attend ISS World, please contact Tatiana
Registration after 18 October 2017....................................$1,295 Lucas at talucas@telestrategies.com
Conference by Invitation Only:
Vendor Registration To attend ISS World you must be a Telecommunications Service
Provider, government employee, LEA or vendor with LI, surveillance or
ISS World Conference (Tracks 1, 6 and 7), network products or services. If you have questions e-mail Tatiana Lucas
Pre-Conference Seminars and Exhibits............................. $995 at talucas@telestrategies.com.
Registration after 18 October 2017....................................$1,295
*Note: To Attend the LEA/DHS/IC/DoD Training Tracks 2, 3, 4, & 5
Registration
you must be a sworn law enforcement officer or military/intelligence/
government employee. Also you must register by 30 November 2017 in Phone: 1-703-734-7050
order to verify eligibility. Government photo ID required for Tracks 2, 3, Fax: 1-703-734-9371
4, & 5 classroom access.
Online: www.telestrategies.com
ISSWorld Asia
®

5-7 DECEMBER 2017 • HILTON HOTEL • KUALA LUMPUR, MY


Lead Sponsors

AREA, is the Italian leading technology Industry and provider of Unconventional Communication and IP Info-Intelligence
solutions.AREA provides an “end to end” Dual Use Info-Intelligence CC forHLS/HLD scenarios; satisfying Government
Agencies’ need to securely and effectively gather precious information to contrast menaces to Citizen’s security and
prevent digital attacks.
ATIS systems is a German, private held company with an outstanding history of success and experience in providing turn-
key state-of-the-art lawful interception technology and monitoring solutions to master the rising challenges government
law enforcement and intelligence agencies encounter. Our Klarios® products are: Monitoring Systems, ATIS umbrella IMS /
Mediation, Data Retention Systems, IP Analytics, Biometric Voice Recognition.
FinFisher solutions help government law enforcement and intelligence agencies to identify, locate and convict serious
criminals. With innovative products, tailor-made solutions and end-to-end services FinFisher closes the gap in traditional
investigative methods.  Its portfolio allows governments to gain access to protected, offline information and relevant
web-based communication channels.
Gamma Group is an international manufacturer of surveillance & monitoring systems with technical and sales offices in
Europe, Asia, the Middle East and Africa. We provide advanced technical surveillance, monitoring and Media Mining/
OSINT solutions, advanced government training, as well as international consultancy to National and State Intelligence
Departments and Law Enforcement Agencies.
Hacking Team provides the world’s premier offensive technology helping law enforcement stop crime and terrorism.
Circumventing universal end-to-end encryption, HT technology gives government agencies the ability to read and hear
communications of suspects and examine the contents of endpoint devices, all without protection systems being able to
detect the investigation in progress. The system fulfills LEAs and Security Agencies highest expectations.
IPS is an Italian high-tech company with 30 years’ experience in the design and delivery of “turnkey” solutions for
Communication Monitoring and Analysis. IPS solutions are specifically designed for Homeland Security Departments and
Intelligence Agencies that need to intercept, collect and deep analyze heterogeneous data. The IPS monitoring platforms
are used today in around 20 countries in 4 continents: Europe, Latin America, Africa and Asia.
NeoSoft AG aims at the development, production and distribution of informatics and security products, based on cellular
technologies 3G, GSM, LTE, CDMA. Our worldwide known equipment is:  GSM/3G Mobile Active Monitoring System,
GSM Passive and Hybrid Monitoring Systems , CDMA Passive and Active Monitoring Systems,  IMSI/IMEI GSM/UMTS/LTE
catcher,  InPoint SMS System,  GSM communication system,  Localization System,  Rescue solutions.
RCS provides highly scalable, secure and comprehensive lawful interception and digital surveillance systems to approved
Governments and Agencies enabling them to digitally collect and see a deep and rich intelligence picture of their persons
of interest and to visualise their timings, intentions and capabilities. Collection – Decoding – Processing - Correlation –
Analysis.
S2T provides big data solutions to support making sense of large volumes of information. Our GoldenSpear solutions
enhance the capabilities of organisations and analysts in web and cyber collection, collation, analysis and generating
insights and reports. These solutions leverage powerful collection capabilities spanning web sites, social media networks,
darknet, and end-user devices and harness big data analytics, machine learning, and powerful visualisation tools.
Sinovatio is a leading global network security solutions provider which is founded in 2003. Based on our dedication to
customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across
the lawful interception, wireless locating, intelligence analysis, digital forensics, video surveillance, intelligent fencing,
public opinion mining and other related fields. Our products and solutions have already been deployed in over 20
countries.
trovicor is a world leader in lawful intelligence technology, providing end-to-end monitoring and intelligence solutions to
more than 35 governments across the globe. With 20+ years’ experience of collaborating with governments worldwide,
trovicor’s solutions are a powerful tool proven to help governments protect their citizens against the threat of criminal
activity and safeguard national security.
Since 1994 Utimaco has been developing lawful interception and data retention systems for telecom operators and
Internet service providers. Utimaco’s carrier-grade systems enable real-time monitoring and long term data retention in
public telecommunication networks. Utimaco participates in LI standardization and supports international standardization
institutes and industry associations, such as, ETSI, 3GPP, ANSI/ATIS, and Bitkom.
VASTech (Pty) Ltd, an independent company, created in 1999, with the head office in South Africa, and offices located
in Dubai and Switzerland, is recognized internationally as a leading edge innovator and preferred independent global
supplier of massive data acquisition, utilization and value extraction solutions. We provide solutions to governments not
under United Nations or other security sanctions
Yaana Technologies is a leading global provider of intelligent Compliance Solutions with accurate data retention,
sophisticated security, and unique analytical capabilities. Our solutions offer our customers a cost-effective path to
address the complexities related to meeting compliance needs in the rapidly evolving information-communications and
cloud markets worldwide.

You might also like