Professional Documents
Culture Documents
d 2 ist
ISSWorld Asia
nd er 1
FR
® EE
Lead Sponsors
Covidence
16:15- 17:15 TOR hidden services. These are services that network encryption. This session open to all
Open Source Tools, resources and leverage TOR’s anonymizing capabilities to conference attendees.
mask the identity of criminally-hosted online
techniques services - forming the basis of just about all
illegal gambling sites, drug markets, child Thursday, 7 December 2017
Seminar #3 exploitation material, firearm sales, terrorism
propaganda, and more. This session open to
all conference attendees. Seminar #7
9:00-12:30
• How TOR hides IP addresses/identity/
Understanding ISS Technologies location 12:00-13:00
and Products Deployed in Top 20 Open Source Tools (OSINT)
• TOR hosting, What is .ONION and content
Telecommunications Networks analysis Used in Cybercrime Investigations
for Lawful Interception and Mass • Mark Bentley, Communications Data Expert,
Surveillance National Cyber Crime Law Enforcement, UK
• Presented by: Dr. Jerry Lucas, President, Seminar #5 Police
TeleStrategies
This half-day seminar covers how criminals 14:45-15:45
and terrorists communicate over today’s public Bitcoin 101: Introduction to What Wednesday, 6 December 2017
telecommunications wireline and wireless Technical Investigators Need to
networks, over the top Internet services and 8:15-8:30
Know about Bitcoin Transactions,
social networks. This seminar is ideal for Welcoming Remarks
law enforcement, interior security, public Dark Web Commerce and
• Tatiana Lucas, ISS World Program Director,
safety and others who need to understand Blockchain Analysis TeleStrategies
the ISS technologies and products used to • Presented by: Dr. Matthew Lucas, Vice
lawfully intercept electronic communications President, TeleStrategies
and conduct mass network surveillance as
This 101 training seminar is an introduction to 8:30-9:00
discussed at ISS World Conference sessions
and by exhibitors. Bitcoin, how the system is used to support Keynote: Top Ten Internet
criminal activities (e.g. Dark Web) and why Challenges Facing Law Enforcement
technical investigators need to understand
the basic Bitcoin transaction mechanism
and the Intelligence Community and
9:00-10:00
(Blockchain) to successfully defeat 21st Who at ISS World Asia has Solutions
Introduction to Wireline and IP century criminals and terrorist actions. • Dr. Jerry Lucas, President, TeleStrategies
Infrastructure and Related ISS Specifically, this introduction to Bitcoin for
Products for Lawful Interception and government and private enterprise technical Track 1
Mass Surveillance investigators addresses
Lawful Interception and
Criminal Investigation Training
10:15-11:15 Seminar # 6
This track is for Telecom Operators and
Understanding Mobile Wireless
Law Enforcement/Intelligence/Defense
Infrastructure and Related ISS 16:00-17:00 Analysts who are responsible for specifying
Products for Lawful Interception and Defeating Network Encryption: or developing lawful intercept network
Mass Surveillance What Law Enforcement and The infrastructure.
Intelligence Community Needs to
11:30-12:30 Understand Wednesday, 6 December 2017
Understanding the Internet Over- • Presented by: Dr. Matthew Lucas (Ph.D
Computer Science), Vice President,
the-Top (OTT) Services and Related 9:00-9:30
TeleStrategies
ISS Products for Mass Intelligence LI in modern networks like 5G
The starting point to defeating encryption
Gathering and Surveillance is to separate techniques addressing stored • Presented by Utimaco
encrypted data such as with the Apple
Seminar #4 iPhone issue. The other challenge is defeating
encrypted data in transit (e.g. Telegram, 9:30-10:00
Whatsapp, etc.) or Network Encryption. This Multi-source Intelligence Collection
13:30-14:30 webinar is about defeating the later. & Big Data Analysis
Investigation Techniques for When it comes to defeating network • Presented by Sinovatio
Unmasking TOR Hidden Services encryption the technical community separates
and Other Dark Web Operations into two camps. Those who want to impede
law enforcement and the government 11:30-12:30 SESSION A
• Presented by Matthew Lucas, (Ph.D Computer
Science), VP, TeleStrategies intelligence community from defeating Lawful Intercept and Investigatory
network encryption: IETF, Silicon Valley and
TOR networks are notoriously effective Insights and the Internet of things
hundreds of third party encryption services.
at hiding the online identity of criminals, And your camp, those who want to investigate (IoT)
terrorists and others who are up to no good. criminals and terrorist group who depend on • Presented by Yaana Technologies
The other side that receives less attention are
12:00-12:30 SESSION B 15:30-16:30 SESSION A
Content Filtering – A Technical Wednesday, 6 December 2017
IP Address Resolution – Breaking
Answer to Data Growth the Anonymity of Network Address
14:00-15:00
• Presented by Utimaco Translation
FinFisherTM: Hacking the Human
• Presented by Yaana Technologies
Element
14:00-14:30 • Presented by FinFisher
“Vitok-CLUSTER”: NoSQL database 15:30-16:30 Session B
intended for specialized processing Big Data and Machine Learning for
15:30-16:30
of the information coming from Intelligence: Cerebro NG
high-speed communication channels In-Line tactical IP probing: practical
• Presented by Advanced Systems
• Presented by NORSI-TRANS
demo and use cases from the field
for passive/active interception and
remote infection Thursday, 7 December 2017
14:30-15:00 • Presented by RCS S.p.A.
100% Signal Visibility within 8:30-9:30 SESSION A
next generation communications Tracking Location and Calls of
networks Track 3
Foreign Nationals through the use of
• Presented by Lumacron Technology
LEA, Defense and Intelligence Strategic Interception System
Analyst Training and Product • Presented by VASTech
Thursday, 7 December 2017 Demonstrations
8:30-9:30 SESSION B
This track is only open to Law Enforcement,
10:30-11:00 Public Safety and Government Intelligence Next generation LI-MC: extracting
Implementing lambda architecture Community Attendees. intelligence from Meta-Data with
with Vitok-Cluster for real-time easy-to use DPI and Big Data
analytics and batch processing for analysis capabilities in a unique
data mining queries Wednesday, 6 December 2017
platform
• Presented by NORSI-TRANS • Presented by RCS S.p.A.
9:00-10:00 SESSION A
Lawful Interception in 2017. VoLTE and
encrypted services like Facebook, Gmail 10:30-11:00 SESSION A
Track 2 and WhatsApp. A new approach to the IP
investigation How to uncover patterns
Defeating Encryption and IT in communication – Live
• Presented by IPS
Intrusion Product Training demonstration on utilizing email
This track is only open to Law Enforcement, analysis to detect corruption
Public Safety and Government Intelligence 9:00-10:00 SESSION B • Presented by trovicor
Community Attendees LIVE DEMO: face & voice
recognition to identify people in
10:30-11:30 SESSION B
video surveillance, phone calls and
Tuesday, 5 December 2017 Massive Investigation, with a care
social media
for privacy: Carrier Grade Nat
• Presented by ATIS
11:00-12:00 disambiguation and Rich IPDRs
FinFisher : Cyber Solutions for The
TM
Analysis
Fight Against Crime 11:30-12:30 SESSION A • Presented by AREA
• Presented by FinFisher Latest updates on Forensic
Investigator Toolbox
12:00-13:00
• Presented by AREA • Mark Bentley, Communications Data Expert,
13:30-14:30
National Cyber Crime Law Enforcement, UK
FinFisherTM: Keeping up with
Police
the Pace – New hacking Tools & 11:30-12:00 SESSION B
Techniques for Practical Operations How to quickly and efficiently
• Presented by FinFisher identify suspects Track 4
• Presented by Trovicor
Social Network Monitoring
16:00-17:00
Defeating Network Encryption: 12:00-12:30
and Big Data Analytics
What Law Enforcement and The Real-time target location tracking Training and Product
Intelligence Community Needs to • Presented by Trovicor Demonstrations
Understand This track is only open to Law Enforcement,
• Presented by: Dr. Matthew Lucas (Ph.D Public Safety and Government Intelligence
14:00-15:00
Computer Science), Vice President, Community Attendees
TeleStrategies
Optic Fiber Analysis: Signals,
Protocols, Metadata and Content all
in one Platform
• Presented by VASTech
16:00-16:30 SESSION A 14:00-15:00 SESSION A
Tuesday, 5 December 2017 How Public Sentiment can be Real-time, high accuracy mobile
influenced through propaganda location tracking
11:30-12:00
campaigns on Social Media • Presented by Creativity Software
Extremist communication: what is • Presented by IPS
out there, how to collect it, what it
does, how to make sense of it and 14:00-15:00 SESSION B
how to counter it – OSINT from a Thursday, 7 December 2017 Portable, Passive Monitoring tool for
practitioners view DPI and Multi-Dimensional Analysis
• Presented by Gamma Group 8:30-9:30 • Presented by EXFO
Advanced Analytics for Law
12:00-12:30
Enforcement 15:30-16:30
• Presented by Yaana Technologies Acquisition from Smart phone and
Evidence-based, operational mission
management – from the simple to WiFi-Data, incl. Geolocalization
the sophisticated 10:30-11:30 • Presented by Secure Information Management
Turning Social Networks Analysis GmbH
• Presented by Gamma Group
into Intelligence and Social
14:45-15:45
Engineering Thursday, 7 December 2017
• Presented by RCS S.p.A.
Digital Investigations in dark net
• Presented by AREA 8:30-9:30
IMSI Catcher, Target localization,
Track 5
Active and Passive Interception,
Wednesday, 6 December 2017 Mobile Signal Intercept Basics and Options
and Electronic Surveillance • Presented by NeoSoft AG
9:00-10:00
AI Powered Web Intelligence Training and Product
Extracting intelligent insights using machine Demonstration 10:30-11:30
learning algorithms This track is for Law Enforcement, Interior
Command and Control Center for
• Presented by Cobwebs Technologies Security and the Government Intelligence covert field operations using Audio,
Community who must work with cellular and Video and GPS feeds
mobile satellite operators regarding mobile • Presented by IPS
11:30-12:30 location, electronic surveillance and RF
Bridging discipline gaps in the hunt intercept.
for perpetrators: Bringing together This track is only open to Law Enforcement, Track 6
Public Safety and Government Intelligence
Metadata, OSINT, SOCMINT, SIGINT,
Community Attendees. Financial Crime, DarkWeb and
Dark Web, Surveillance techniques
Bitcoin Transaction Investigations
and various other capabilities to
This track is for government and private
support law enforcement Wednesday, 6 December 2017 enterprise financial crime investigators. Track
• Presented by Gamma Group 6 open to all conference attendees.
9:00-10:00 SESSION A
14:00-15:00 SESSION A RFID access control exploitation
• Presented by Providence
Tuesday, 5 December 2017
Dark Web – Can Governments afford
not knowing? Hunting criminals on 13:30-14:30
the dark side. 9:00-10:00 SESSION B Investigation Techniques for
• Presented by Gamma Group Challenges in today’s Inmarsat Unmasking TOR Hidden Services
interception and Other Dark Web Operations
• Ruediger Paetzold, Rheinmetall • Presented by: Dr. Matthew Lucas, Vice
14:00-15:00 SESSION B
Communication and Simulation Technology President, TeleStrategies
GoldenSpear Deep WEBINT – Pte. Ltd.
Reaching the Deepest corners of the
Deep Web and the Darkest corners 14:45-15:45
11:30-12:30
of DarkNet Bitcoin 101: Introduction to What
NeoSoft data traffic analyser for
• Presented by S2T Technical Investigators Need to
Mobile Monitoring
Know about Bitcoin Transactions,
• Presented by NeoSoft AG
15:30-16:00 SESSION A Dark Web Commerce and
Automatic Exploitation of Social Blockchain Analysis
12:00-12:30 • Presented by: Dr. Matthew Lucas, Vice
Network, Deep and Dark Web to
GSM Tactical Interception System President, TeleStrategies
complement traditional Lawful
for 3G and 4G
Interception Infrastructure
• Presented by Advanced Systems
• Presented by IPS
15:30-16:30 SESSION B
Intelligence Analysis on Big Data
• Presented by Sinovatio
Track 7 • Cloning and contactless card vulnerabilities
Wednesday, 6 December 2017 • PCI-DSS attacks and vulnerabilities
Protecting Financial and • The hackers point of view
11:30-12:00
Government Networks Against • Mark Bentley, National Cyber Crime Law
Hushmeeting: creating an iron-clad Enforcement, UK Police
Cyber Attacks and quantum-safe communication
This track is for government and private environment
enterprise professionals with cyber security 10:30-11:30
responsibilities. Track 7 open to all conference Preventing attacks, detecting intruders and Practitioners Guide to Defending
attendees. collaborating within a backdoor-free and
malware-proof communication framework. Banks Against Cyber Attacks
Real use cases and attacking scenarios. – Identifying And Protecting
Tuesday, 5 December 2017 • Presented by Feedback Italia Vulnerabilities To Frustrate The
Thief, and Integrity Proof The
16:00-17:00
Systems
Thursday, 7 December 2017 This one hour session will explore the
Best Practices for Securing
protection of weak points and future proofing
Government IT and Communications banks agains cyber attacks.
8:30-9:30
Infrastructure
Practitioners Guide to • PCI-DSS security and tightening
Agenda session topics: • WiFi encryption to avoid MITM
Understanding Cyber Attacks on
1. Common Cyber Security Threat • Pen testing
Banks – Exploring Vulnerabilities • Dynamic virus signatures and monitoring
Governments Must Deal with and New Types
of Attacks from Nation States and Pirates from The Perspective Of The Hacker • End user verification and login
(Ransomware, etc.). This one hour session will explore the • Customer vulnerabilities and verification
2. Common Security Weaknesses in viewpoints of both the banks perception • Quantum Dawn and Waking Shark II
Government IT and Communication of vulnerabilities, and that of the attacker. (wargaming) benefits
Infrastructure. A follow-up session at 10:30 will address • Future proofing and horizon scanning
3. Types of effective Cyber Security Practitioners Guide to Defending Banks • Playing the hacker at his own game.
Communications Solutions Government Against Cyber Attacks. • Mark Bentley, National Cyber Crime Law
should consider. • What is the current typical attack Enforcement, UK Police
• Moderator: Jerry Lucas, President, • Vulnerabilities leak points, and weak points
TeleStrategies • Hacking the Bank by traditional social
• Panel Presenter: Mirko Minuzzo, Feedback Italia engineering
• Other ISS World Asia exhibiting Vendors to be • Man in the middle/mobile (MITM)
invited. • Man in the Browser (MITB) attacks
• DDOS, Zeus, Zbot, and other exploits ISS World Asia Exhibit Hours
• BHO poisoning (browser helper objects)
• DNS poisoning Wednesay, 6 December 2017:
• Pineapple and Rasberry Pi devices 10:00 - 18:00
• Clickjacking Thursday, 7 December 2017:
• Formgrabbers 9:30 - 12:30
AREA, is the Italian leading technology Industry and provider of Unconventional Communication and IP Info-Intelligence
solutions.AREA provides an “end to end” Dual Use Info-Intelligence CC forHLS/HLD scenarios; satisfying Government
Agencies’ need to securely and effectively gather precious information to contrast menaces to Citizen’s security and
prevent digital attacks.
ATIS systems is a German, private held company with an outstanding history of success and experience in providing turn-
key state-of-the-art lawful interception technology and monitoring solutions to master the rising challenges government
law enforcement and intelligence agencies encounter. Our Klarios® products are: Monitoring Systems, ATIS umbrella IMS /
Mediation, Data Retention Systems, IP Analytics, Biometric Voice Recognition.
FinFisher solutions help government law enforcement and intelligence agencies to identify, locate and convict serious
criminals. With innovative products, tailor-made solutions and end-to-end services FinFisher closes the gap in traditional
investigative methods. Its portfolio allows governments to gain access to protected, offline information and relevant
web-based communication channels.
Gamma Group is an international manufacturer of surveillance & monitoring systems with technical and sales offices in
Europe, Asia, the Middle East and Africa. We provide advanced technical surveillance, monitoring and Media Mining/
OSINT solutions, advanced government training, as well as international consultancy to National and State Intelligence
Departments and Law Enforcement Agencies.
Hacking Team provides the world’s premier offensive technology helping law enforcement stop crime and terrorism.
Circumventing universal end-to-end encryption, HT technology gives government agencies the ability to read and hear
communications of suspects and examine the contents of endpoint devices, all without protection systems being able to
detect the investigation in progress. The system fulfills LEAs and Security Agencies highest expectations.
IPS is an Italian high-tech company with 30 years’ experience in the design and delivery of “turnkey” solutions for
Communication Monitoring and Analysis. IPS solutions are specifically designed for Homeland Security Departments and
Intelligence Agencies that need to intercept, collect and deep analyze heterogeneous data. The IPS monitoring platforms
are used today in around 20 countries in 4 continents: Europe, Latin America, Africa and Asia.
NeoSoft AG aims at the development, production and distribution of informatics and security products, based on cellular
technologies 3G, GSM, LTE, CDMA. Our worldwide known equipment is: GSM/3G Mobile Active Monitoring System,
GSM Passive and Hybrid Monitoring Systems , CDMA Passive and Active Monitoring Systems, IMSI/IMEI GSM/UMTS/LTE
catcher, InPoint SMS System, GSM communication system, Localization System, Rescue solutions.
RCS provides highly scalable, secure and comprehensive lawful interception and digital surveillance systems to approved
Governments and Agencies enabling them to digitally collect and see a deep and rich intelligence picture of their persons
of interest and to visualise their timings, intentions and capabilities. Collection – Decoding – Processing - Correlation –
Analysis.
S2T provides big data solutions to support making sense of large volumes of information. Our GoldenSpear solutions
enhance the capabilities of organisations and analysts in web and cyber collection, collation, analysis and generating
insights and reports. These solutions leverage powerful collection capabilities spanning web sites, social media networks,
darknet, and end-user devices and harness big data analytics, machine learning, and powerful visualisation tools.
Sinovatio is a leading global network security solutions provider which is founded in 2003. Based on our dedication to
customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across
the lawful interception, wireless locating, intelligence analysis, digital forensics, video surveillance, intelligent fencing,
public opinion mining and other related fields. Our products and solutions have already been deployed in over 20
countries.
trovicor is a world leader in lawful intelligence technology, providing end-to-end monitoring and intelligence solutions to
more than 35 governments across the globe. With 20+ years’ experience of collaborating with governments worldwide,
trovicor’s solutions are a powerful tool proven to help governments protect their citizens against the threat of criminal
activity and safeguard national security.
Since 1994 Utimaco has been developing lawful interception and data retention systems for telecom operators and
Internet service providers. Utimaco’s carrier-grade systems enable real-time monitoring and long term data retention in
public telecommunication networks. Utimaco participates in LI standardization and supports international standardization
institutes and industry associations, such as, ETSI, 3GPP, ANSI/ATIS, and Bitkom.
VASTech (Pty) Ltd, an independent company, created in 1999, with the head office in South Africa, and offices located
in Dubai and Switzerland, is recognized internationally as a leading edge innovator and preferred independent global
supplier of massive data acquisition, utilization and value extraction solutions. We provide solutions to governments not
under United Nations or other security sanctions
Yaana Technologies is a leading global provider of intelligent Compliance Solutions with accurate data retention,
sophisticated security, and unique analytical capabilities. Our solutions offer our customers a cost-effective path to
address the complexities related to meeting compliance needs in the rapidly evolving information-communications and
cloud markets worldwide.