Professional Documents
Culture Documents
d 2 ist
nd er 1
® FR ®
EE
ISSWorld Asia
Intelligence Support Systems for Lawful Interception,
Criminal Investigations and Intelligence Gathering
3-5 DECEMBER 2013 • HILTON HOTEL • KUALA LUMPUR, MY
8:30-9:30 2:15-4:30
11:30-12:00 SESSION B
The World Wide Web and the Basics of IP Application Decoding Communication Surveillance in
Internet From Packets to Structured Data the Fight Against Child
The workshop is a high-level introduction on Exploitation - Re-balancing the
9:45-10:45 building decoder software starting from re- Ethical Debate
Recognizing Traffic Data quirements on an example of software archi- AREA
tecture. After an overview of all parts of the
11:00-12:00 introduction the building blocks are elaborated. 12:00-12:30
WIFI and GPRS Activate the Intelligence to expand
13:00-14:00 Wednesday, December 4, 2013 the Security. GENESI Suite: the
Emerging Technologies, Masking Welcoming Remarks most complete Communication
Tech and Tools 8:15-8:30 Intelligence Platform
Tatiana Lucas, ISS World Program Director, Fabio Romani, Market & investment
14:15-15:15 TeleStrategies Strategy, IPS
Advanced Techniques in Tracing 13:30-14:00
8:30-9:00
Suspects Lawful Interception of LTE, VoLTE,
Top Ten Internet Challenges Facing
15:30-16:30 Law Enforcement and the and RCS
Intelligence Community and Who Rene Nitzinger, Utimaco Safeware AG
Open Source Intelligence Training
(OSINT) at ISS World Asia has Solutions
14:00-14:30 SESSION A
Dr. Jerry Lucas, President, TeleStrategies
Recall IP Intercept – the next-
Seminar #3 generation of IP interception at 10
Track 1: Gigabit and beyond
8:30-4:30
Advanced IP Intercept Training ISS for Lawful Interception and Jayesh Nana, CEO, iSolv Technologies
Presented by: Hendrik Schulze, President & Criminal Investigations
15:00-15:30
CTO, ipoque This track is for Telecom Operators and Law
Enforcement/Intelligence/Defense Analysts
The comprehensive Intelligence
08:30-10:45 who are responsible for specifying or develop- System solution
Understanding TCP/IP for Packet ing lawful intercept network infrastructure. China Top Communication
Sniffing and Traffic Analysis
A brief introduction into network technology Thursday, December 5, 2013
and the basics of TCP/IP needed for intercep-
Wednesday, December 4, 2013
8:30-9:30
9:00-9:30
tion and the impact on proper network analy- New LI challenges. A Countrywide
sis. Based on this, the workshop reflects the
Lawful Interception Consolidation
– A case study Integrated Solution: Voice, Data,
technical options for LEA's to investigate in Positioning and Encryption for
networks. Dirk Börgerding, Utimaco Safeware AG
Massive Interception
9:30-10:00 Cristian D’Incertopadre, Sales, IPS
11:00-2:00
Deep Packet Inspection (DPI) Keeping up with new Security (For LEA and Government Attendees Only)
Basics for LEA's, Intelligence Trends & Surveillance Technologies
10:30-11:00 SESSION A
Analysts and Telecom Operators trovicor
Solve/Prevent with Intelligence
An overview on deep packet inspection tech- 11:30-12:00 SESSION A Solutions
nology (DPI) and its basic operations down to Today’s interception in an Rohini, Sooriamoorthy, Technical Director,
the application level. Skype is used as exam- encrypted, social and clouded Statworks (M) Sdn Bhd
ple to show the implications of complex net-
world
work behavior on DPI.
David Vincenzetti, CEO, Hacking Team Track 2:
ISS for Big Data Analytics and
Social Network Monitoring
This track is for Intelligence Analysts and Law
Enforcement agents who have to “connect 9:30-10:00 10:30-11:30
the dots” between people, places and other G-SMART: the Social Intelligence Active, Passive and Hybrid
entities by searching through massive App to improve and speed tactical GSM/3G/4G/LTE and CDMA
amounts of unstructured data from various investigations Monitoring systems. New
sources using visual analytics, semantic tech- Cristian D’Incertopadre, Sales, IPS challenges (Randomization, A5.3
nologies, data mining, OSINT and other intelli- etc.). Practical solutions
gence gathering tools and techniques 11:30-12:00 SESSION A NeoSoft AG
Advanced Location Surveillance (For LEA and Government Attendees Only)
for Public Safety and National
Wednesday, December 4, 2013
Security Applications
9:00-9:30 SESSION A Track 4:
Polaris Wireless
Human Threat: Intelligence and Encrypted Traffic Monitoring and IT
Social Media — an industry view 11:30-12:30 SESSION B Intrusion Product Training
from IBM POMS : AN INTELLIGENT TOOL TO This track is only open to Law Enforcement,
Chuck Dodson, World Wide Business DRILL DOWN ON Facebook & Public Safety and Government Intelligence
Development and Strategy, IBM’s i2 Twitter
product portfolio Community Attendees
Daniel Zhang, Marketing Director, Semptian
9:00-9:30 Technologies
Wednesday, December 4, 2013
Extracting and Analyzing Big Data 13:30-14:30 SESSION A 9:00-10:00
at the Network Core How to plan and effectively pin Using Open-Source tools to
Joon Choi, Glimmerglass Optical Cyber conduct governmental
Solutions
point a target's location using a
Geo Locator – investigations against serious
9:30-10:00 A step by step approach from concept to real crime
Integrated Intelligence Gathering world scenarios Gamma International
and Mining Solution Mahesh Kumar, Kommlabs
11:30-12:30 SESSION A
Nanjing Sinovatio Technology
13:30-14:30 SESSION B VUPEN Sophisticated Exploits for
11:30-12:00 SESSION A 3 in 1 Passive Tracker : Pinpoint the IT intrusion and Offensive Security
IP Monitoring - trovicor's end-to- WCDMA/GSM/CDMA phone with Chaouki Bekrar, CEO & Director of
end solution an all in one compact passive Vulnerability Research, VUPEN
trovicor tracker
11:30-12:30 SESSION B
Patrick Fevery, Sales Manager, Semptian
12:00-12:30 SESSION A Technologies Infiltrating and monitoring
Handling “very big data” and find organized crime from inside:
the right target 15:30-16:00 SESSION A Remote Stealth Surveillance Suite
ME Advanced Systems InPoint SMS System. Mass case studies
Emergency Notification. Target AGT-technology
13:30-14:00 Localization
Social Media a gift or a curse: Real 13:30-14:30 SESSION A
NeoSoft AG
Tool for social Media Interception: FinFisher- Next Generation
Twitter and Facebook 15:00-16:00 SESSION B governmental surveillance. Focus:
AGT-technology Extracting intelligence from CDR Mobile phone monitoring
and Tower Dumps. A hands-on Gamma International
14:00-14:30 approach to effectively solve cases
Big Data Analysis: a discovery 13:30-14:30 SESSION B
by analyzing CDRs to detect call
mission patterns, determine common Smart Intrusion on Social
Federico Ciceri, Sales Manager, RCS identities and unearth hidden Networks and Webmails: the Https
links or networks using geo Monitoring & Analysis
Ugo Santillo, Sales Director, IPS
Track 3: location and link analysis.
Deepak Goyal, Kommlabs
ISS for Mobile Location, 15:00-16:00 SESSION A
Surveillance and Intercept Identifying criminal organizations
This track is for Law Enforcement, Interior Se- Thursday, December 5, 2013 on social networks by intruding
curity and the Intelligence Community Author- 8:30-9:30 communications devices.
ities who must work with cellular and mobile eRetriever : The portable Marco Valleri - CTO, Alberto Ornaghi –
satellite operators regarding mobile location, interception system with offensive Software Architect, Alberto Pelliccione –
surveillance and intercept as well as analysis capabilities for PC and smart Senior Software Developer, Hacking Team
of mass geo-location data. phones
15:00-16:00 SESSION B
Jacques Wu, Sales Manager, Semptian
Technologies Do It Yourself (DIY) Program for
Wednesday, December 4, 2013 Trojan Based Monitoring
9:00-9:30 Jitendra Verma, Manager, Business
Geospatial Intelligence for Development, ClearTrail Technologies
National Security
Richard Witham, Esri
Thursday, December 5, 2013 9:00-10:00 SESSION B Thursday, December 5, 2013
8:30-9:30 VIBIS - Voice Identification Based 8:30-9:30 SESSION A
Tactical IP Intercept for HTTPS Interception System New LI challenges. A Countrywide
Monitoring & Remote Intrusion Sugito Wibawa ,CEO, XSPec Technology Integrated Solution: Voice, Data,
Sameer Fegade, Director-Engineering, Positioning and Encryption for
12:00-12:30 SESSION B
ClearTrail Technologies Massive Interception
Cell Based Monitoring Solution – a
Cristian D’Incertopadre, Sales, IPS
10:30-11:30 SESSION A new approach to handle mass
Intruding communication devices: territory surveillance 8:30-9:00
live demonstration of latest attack trovicor Intelligence Platform: reveal the
techniques. unknown - a live demo
13:30-14:00 SESSION A
Marco Valleri - CTO, Alberto Ornaghi – trovicor
Software Architect, Alberto Pelliccione – Intelligence Platform – target
Senior Software Developer, Hacking Team profiling 9:00-9:30 SESSION B
trovicor Monitoring Center next generation
10:30-11:30 SESSION B
– a live demo
Encryption Anywhere and 14:00-14:30 SESSION A
trovicor
Everywhere. Now What? An Monitoring Center next generation
Analysis of Possible Workarounds – a live demo 10:30-11:00 SESSION A
AREA trovicor Cell Based Monitoring Solution – a
13:30-14:30 SESSION B new approach to handle mass
Track 5: territory surveillance
15:00-16:00 SESSION A trovicor
LEA, Intelligence and Defense
Analyst Training and Product Recall Intruder – covert intrusion
11:00-11:30 SESSION A
Demonstration Track and collection solution for
smartphones and tablets Intelligence Platform: reveal the
This training is only open to Law Enforce- unknown - a live demo
Jayesh Nana, CEO, iSolv Technologies
ment, Public Safety and Government Intelli- trovicor
gence Community Attendees. 15:00-16:00 SESSION B
10:30-11:30 SESSION B
Mito Cube: RCS LI platform, a
Wednesday, December 4, 2013 successful case history Active, Passive and Hybrid
9:00-10:00 SESSION A Federico Ciceri, Sales Manager, RCS GSM/3G/4G/LTE and CDMA
CDMA Catcher and IMSI/IMEI Monitoring systems. New
Catcher with Public Number 15:00-16:00 SESSION C challenges (Randomization, A5.3
Detection. Vehicle based and From Needs to Technology – Use etc.). Practical solutions
Portable solutions Cases for Social Network NeoSoft AG
NeoSoft AG Monitoring, Intrusive Surveillance,
Network-Based Surveillance,
OSINT and Virtual HUMINT
AREA
Registration Information
Save $300 by registering before 18 October, 2013
Telecommunications Service Provider or Government Registration Free Colleague Registration: Register as paid and you can invite a
ISS World Conference (Tracks 1 to 3), colleague to join you at ISS World Asia with a full, free conference
pass. If you have not identified your guest at this time, just enter
Pre-Conference Seminars and Exhibits ........................................$995
“guest of” followed by your name and complete with your contact in-
Registration after 18 October 2013 ............................................$1,295 formation. You can register your guest at no charge at a later time.
Law Enforcement/DHS/IC/DoD Registration* Conference and Exhibitions: Hilton Kuala Lumpur Hotel.
Special ISS World early registration rate: $147 US per night.
ISS World Conference (Tracks 1 to 3), Training Tracks 4 & 5, Telephone 60-3-2264-2264.
Pre-Conference Seminars plus Exhibits........................................$995
Registration after 18 October 2013 ............................................$1,295 International Attendees: If you need Visa assistance to attend ISS
World, please contact Tatiana Lucas at talucas@telestrategies.com
Vendor Registration
Conference by Invitation Only: To attend ISS World you must be a
ISS World Conference (Tracks 1 to 3), Telecommunications Service Provider, government employee, LEA or
Pre-Conference Seminars and Exhibits ........................................$995 vendor with LI, surveillance or network products or services. If you
Registration after 18 October 2013 ............................................$1,295 have questions e-mail Tatiana Lucas at talucas@telestrategies.com.
*Note: To Attend the LEA/DHS/IC/DoD Training Tracks 4 & 5 you must be a sworn law Registration
enforcement officer or military/intelligence/government employee. Also you must register
by 28 November 2013 in order to verify eligibility. Government photo ID required for Tracks 4
Phone: 1-703-734-7050 • Fax: 1-703-734-9371
& 5 classroom access. Online: www.issworldtraining.com
ISSWorld Asia Lead and Associate Lead Sponsors
3-5 DECEMBER 2013 • HILTON HOTEL • KUALA LUMPUR, MY
Lead Sponsor
trovicor is an established leading supplier of intelligence solutions for Law Enforcement and Government Agencies, worldwide.
The company represents almost two decades of industry experience in customer-centric development of state-of-the-art monitor-
ing centers and intelligence platforms for the security market. Headquartered in Munich, Germany and with affiliate offices in Eu-
rope, Middle East, Asia-Pacific, trovicor services Law Enforcement and Government Agencies in the security sector with
deployments in more than 100 countries. The trovicor systems capture interactions, transactions and surveillance from multiple
sources, including fixed line as well as mobile telephone, radio communication, email, web, chat, social media, and more. Thus,
they provide the framework for merging data into a single operational view delivering meaningful information to decision makers
about threats and targets. They are the cores that enable clients to move to an intelligence platform concept where masses of
communication data, gathered from multiple sources, forms the basis for effective intelligence analyses of information.