You are on page 1of 7

an Reg

d 2 ist
nd er 1

ISSWorld Asia
FR
® EE

Intelligence Support Systems for Electronic Surveillance,


Social Media/DarkNet Monitoring and Cyber Threat Detection

6-8 SEPTEMBER 2022 • SHANGRI-LA HOTEL • SINGAPORE

Where Law Enforcement,


Government Intelligence Agencies and
Financial Crime Investigators turn for
Technical Training and Product Selection

Lead Sponsor Associate Lead Sponsors

Exhibitors and Sponsors

89 LEA/Interior Security/Intel Training Sessions and Courses to Choose From


ISSWorld Asia
® Intelligence Support Systems for
Real-Time Surveillance,
Electronic Threat Intelligence
Social Media/
Gathering,
DarkNet Monitoring
Cyber Security
and Cyber
and Threat
Cyber Crime Investigations
Detection

6-8 SEPTEMBER 2022 • SHANGRI-LA HOTEL • SINGAPORE

ISS World Asia is the world’s ISS World Asia 2022 09:25-10:15
largest gathering of Regional Law Collecting Evidence from Online
Enforcement, Intelligence and Agenda Social Media: Building a Cyber-
Homeland Security Analysts, Telecoms OSINT Toolbox (Part 1)
as well as Financial Crime Investigators Advanced HI-Tech Cyber
responsible for Cyber Crime Investigation Training Seminars Led 10:35-11:25
Investigation, Electronic Surveillance by Law Enforcement Officers and Collecting Evidence from Online
and Intelligence Gathering. Ph.D Computer Scientists Social Media: Building a Cyber-
ISS World Programs present the Training Seminars Led by Law OSINT Toolbox (Part 2)
methodologies and tools for Enforcement Officers and Ph.D.,
11:30-12:20
Law Enforcement, Public Safety, Computer Scientists
Proxies, VPNs, and Dark Web:
Government and Private Sector 20 classroom training hours, Identity Concealment and
Intelligence Communities in the presented by Law Enforcement
Location Obfuscation
fight against drug trafficking, cyber Officers and Ph.D. Scientists
money laundering, human trafficking, 13:20-14:10
• Charles Cohen, Vice President at
terrorism and other criminal Tor, onion routers, Deepnet,
NW3C, the National White Collar
activities conducted over today’s and Darknet: An Investigator’s
Crime Center, Professor in Practice
telecommunications network, the Perspective
Criminal Justice, Indiana University
Internet and Social Media.
and Retired Captain, Indiana State
Track 1 14:15-15:05
Police (6 classroom hours)
Tor, onion routers, Deepnet, and
Lawful Interception and Criminal • Mark Bentley, Communications Data
Darknet: A Deep Dive for Criminal
Investigation Training Expert, National Cyber Crime Law
Investigators
Enforcement, UK Police
Track 2
(7 classroom hours)
LEA, Defense and Intelligence • Jerry Lucas (Ph.D., Physics), Seminar #2
Analyst Product Demonstrations President, TeleStrategies 08:30-15:05
Track 3 (2 classroom hours) (THIS SEMINAR IS ONLY OPEN
• Matthew Lucas (Ph.D., Computer TO LEA AND GOVERNMENT
Social Network Monitoring,
Science), VP, TeleStrategies ATTENDEES)
Artificial Intelligence and
(3 classroom hours) Practitioners Guide to Internet
Analytics Product Training
Track 4
Investigations
Tuesday, 6 September 2022
• Presented by: Mark Bentley,
Threat Intelligence Gathering and
Communications Data Expert,
Cyber Security Product Training Seminar #1 National Cyber Crime Law
Track 5 08:30-15:05 Enforcement, UK Police
Online Social Media and Internet The aim of this 1-day seminar is to
Investigating DarkWeb, Bitcoin,
Investigations take the attendees from the basics
Altcoin and Blockchain Transaction
• Presented by: Charles Cohen, Vice of understanding the Internet,
Track 6
President at NW3C, the National how to find data, through to a full
Mobile Signal Intercept Training White Collar Crime Center, understanding of best practice of an
and Product Demonstrations Professor in Practice Criminal Internet investigator, building their
Track 7 Justice, Indiana University and OSINT toolbox, and having awareness
Retired Captain, Indiana State Police and knowledge of all the tools
Electronic Surveillance Training available to achieve this. It is aimed
and Product Demonstrations 08:30-09:20
primarily at the investigator, delivered
Cellular Handset Geolocation: from the perspective of detective,
Track 8
Investigative Opportunities and to empower them to have the best
5G Lawful Intercept, Tracking and Personal Security Risks methodology and tradecraft to profile
Forensics Product Training and catch suspects.
Plus Special Training Seminars This is exclusively Law Enforcement
lead by Law Enforcement Officers only, as Practical examples, covert
and Ph.D. Scientists

To Review Complete Agenda or To Register, Go To WWW.ISSWORLDTRAINING.COM


ISSWorld Asia
® Intelligence Support Systems for
Electronic Surveillance, Social Media/
DarkNet Monitoring and Cyber Threat
Detection

6-8 SEPTEMBER 2022 • SHANGRI-LA HOTEL • SINGAPORE

and investigative methodology and Seminar #4 Thursday, 8 September 2022


tradecraft will be given throughout the
seminar. 09:25-10:15
Understanding 5G Stand Alone, Seminar #7
08:30-09:20 NFV, Edge Computing and 13:00-14:00
The Internet, and how suspects Network Slicing Open Source Tools, PART 2. Top
leave a Digital Footprint. How
• Presented by: Matthew Lucas 20 FREE Open Source Tools
the system works for us, as
(Ph.D, Computer Science), VP, (OSINT) Used in Cybercrime
investigators TeleStrategies Investigations
09:25-10:15 Cellular market analysts collectively • Presented by: Mark Bentley,
Recognizing Traffic Data and have identified 5G services deployed Communications Data Expert,
digital profiling via social in over 400 cities spread over 30 National Cyber Crime Law
networks and devices - digital or so countries. The one common Enforcement, UK Police
shadows feature of all these operations is that
they are providing 5G services with a
10:35-11:25 4G/5G hybrid network infrastructures
WIFI, geolocation, and Mobile or so called non-Stand Alone (NSA) Wednesday, 7 September 2022
Data traces and tracking architecture. This session addresses 8:15-8:30
the transition to 5G stand alone. Welcoming Remarks
11:30-12:20
Awareness of Emerging • Tatiana Lucas, ISS World Program
Technologies, Masking Tech and
Seminar #5 Director, TeleStrategies
Tools, TOR and proxies 10:35-11:25 8:30-9:00
Understanding Advanced Top Ten Internet Challenges
13:20-14:10
Techniques to Defeat (or Work Facing Law Enforcement and
Advanced Techniques in Tracing Around) Encrypted Third Party
Suspects, and lateral problem the Government Intelligence
Services, Bitcoin Anonymity, Community and Who at ISS
solving TOR/HS and iPhone Encryption World Asia has Solutions
14:15-15:05 • Presented by: Matthew Lucas • Dr. Jerry Lucas, President,
Open Source Tools, PART 1. (Ph.D, Computer Science), VP, TeleStrategies
Resources, tradecraft and TeleStrategies
techniques - highlighting the best You can’t defeat today’s encryption Track 1
free tools and resources (at least not that we know of) but
law enforcement and the government Lawful Interception and
Seminar #3 intelligence community can “Work Criminal Investigation Training
around encryption” for a price. This track is for Telecom Operators
08:30-09:20 Once you identify a target using
Understanding Mobile 2G, 3G, and Law Enforcement/Intelligence/
commercially available encryption Defense Analysts who are responsible
4G & 5G NSA Infrastructure and products or services (and with for specifying or developing lawful
Law Intercept for Technical enough resources or money) intercept network infrastructure.
Investigators government can defeat the target
• Presented by: Dr. Jerry Lucas, near 100% of the time.
Tuesday, 6 September 2022
President, TeleStrategies
This session addresses the Seminar #6 15:25-16:05
infrastructure evolution of 2G to 3G
Accelerating investigation
11:30-12:20
to 4G to 5G NSA and the impact on workflows with specially
Locating and Tracking Devices by
lawful interception. designed IT-forensic laboratories
MAC Addresses and App-Based
SDKs plus Privacy Measures by • Presented by mh Service GmbH
Apple & Google
Thursday, 8 September 2022
• Presented by: Matthew Lucas
(Ph.D, Computer Science), VP, 09:15-10:00
TeleStrategies Cyber Threat Intelligence in
Context of Counterterrorism
• Presented by Resecurity
Track 2 15:45-16:30 09:25-10:15
Every piece of data tells a story WhatsApp, Telegram, Facebook...
LEA, Defense and – combine and analyze data how IPS helps you to locate most
Intelligence Analyst Product from any source in your digital wanted targets with LI
Demonstrations investigation. • Presented by IPS
This track is only open to Law • Mark Uldahl, CTO, XCI A/S 13:20-14:10
Enforcement, Public Safety and Welcome to the era of DNA. How
Government Intelligence Community Thursday, 8 September 2022 to save 40 years and conduct an
Attendees. 08:30-09:10 investigation in a few days
Fibre Signal Analysis: What • Presented by Social Links
Tuesday, 6 September 2022 intelligence value does a fibre link
14:15-14:40
09:25-10:15 contain?
Automatic Exploitation of Social
Carrier in Carrier Analysis: and Content Evaluation to enable Network, Deep and Dark Web to
Determine the impact of Carrier agencies to obtain maximum value
complement traditional Lawful
in Carrier technology on your from a fibre or satellite signal.
Interception Infrastructure for
satellite monitoring capabilities • Presented by VASTech Target Profiling.
• Presented by VASTech 09:15-10:00 • Presented by IPS
10:35-11:25 Practical and creative example
14:40-15:05
How to bring precise location of modifying Android OS by HEX
Machine Learning in a Command
data, call record data and editing system files, and having
and Control Centre for covert
metadata together for advanced regular applications to achieve
field operations and situation
intelligence surveillance.
awareness
• Presented by SS8 • Denis Cuculic, CEO ex. Head of
• Presented by IPS
14:15-15:05
Technical Department, PRO4SEC
15:25-16:05
A light in the darkness of 11:00-11:40
A new perspective for field Cyber-Surveillance: From
Encrypted Communications
operations - supporting Cyber Messenger Monitoring to Device
• Presented by AREA Control
operations in the field
15:25-16:05 SESSION A
• Presented by HSS
Catch the spyware! A non- • Presented by Trovicor
16:10-17:00
intrusive approach to spot Track 3 Anonymity vs. You
potential infections of mobile
devices over the air Social Network Monitoring, Smart Methods to Identify Virality,
Bots & Personally Identifiable
• Presented by Rohde Schwarz Artificial Intelligence and
Information
15:25-16:05 SESSION B Analytics Product Training
• Presented by ClearTrail
Geo-monitoring and profiling Sessions in this track are only open to
covering all connected devices Law Enforcement, Public Safety and Wednesday, 7 September 2022
and networks (3/4/5G and WiFi) Government Intelligence Community
Attendees, unless marked otherwise. 9:00-10:00
globally
Tactical Web Intelligence
• VP Sales and Marketing, GeoGence (WEBINT): Gathering Actionable
Tuesday, 6 September 2022
Intelligence via a powerful
Wednesday, 7 September 2022 08:30-09:20 SESSION A
WEBINT platform
13:00-13:40 SESSION A Massive Social Media data
collection and analysis for • Presented by Cobwebs
The investigator toolbox: from
Electronic Surveillance to Cyber Counter-Terrorism Intelligence 13:00-13:40
Intelligence Activities Location & Open Source
• Presented by IPS Intelligence: Real Life Case
• Presented by AREA Studies & Live Demonstration
13:00-13:40 SESSION B 08:30-09:20 SESSION B
Fleeing Facebook: how to keep • Presented by Cobwebs
Fibre Signal Analysis: What
intelligence value does a fibre link up with new and constantly 15:00-15:45
contain? evolving platforms  Supercharged IPDR extraction
• Presented by Fivecast and analysis - Advanced Mass
• Presented by VASTech Internet Activity Analytics
13:45-14:30 • Presented by Trovicor
Revolution in Audio
Investigations
• Presented by Phonexia
16:20-17:00 SESSION A 13:20-14:10
Geolocation Intelligence for Tuesday, 6 September 2022
Encryption vs. You: 3 Ways to
Combat Threats at a Nationwide Counter-Terrorism 16:10-17:00
Scale • Ayman Alshobaki, Business
Live Demonstration of DarkOwl
Development Manager, Middle East, Vision: Darknet Intelligence
• Presented by ClearTrail
Resecurity Discovery and Collection

16:20-17:00 SESSION B
• David Alley, CEO, DarkOWL FZE
CLOS-INT Closed Source Wednesday, 7 September 2022
Intelligence from Web2.0 sources  Wednesday, 7 September 2022
9:00-10:00
• Presented by AREA Construct, Visualize and Analyze 13:00-13:40
Digital Trails through Big Data Offline darknet investigation with
Thursday, 8 September 2022
• Presented by Rayzone Group the Web-I-Quve
09:15-10:00 SESSION A
13:00-13:40 • Presented by mh Service GmbH
How to Protect the Status of Data
Traffic Without Changing the Shaping the ultimate
communication protection Thursday, 8 September 2022
Status Quo
strategy: custom-hardened, 8:30-9:10
• Presented by Allot
tamper-proof laptops for Know Now What Your Suspects
09:15-10:00 SESSION B uncompromised security Will Do Tomorrow
Data breaches compromising • Presented by ClearTrail
• Presented by Feedback Italia
national and corporate security
13:45-14:30
• Presented by Social Links Track 6
S2-XARVIS, Cyber Threat
11:45-12:30 Intelligence Solution specialized Mobile Signal Intercept
Open Source Tools, PART 2. Top in Darknet and Cryptocurrencies Product Training and
20 FREE Open Source Tools
• Presented by S2W Demonstrations
(OSINT) Used in Cybercrime
Investigations 15:00-15:45 This track is for Law Enforcement,
Secure National Critical Interior Security and the Government
• Mark Bentley, Communications Data Intelligence Community who must
Infrastructure and
Expert, National Cyber Crime Law work with cellular and mobile satellite
Enforcement, UK Police
Organizational IT
operators regarding mobile location,
• Presented by Rayzone Group
electronic surveillance and RF
Track 4
16:20-17:00 intercept.
Threat Intelligence Gathering Early warning threat detection This track is only open to Law
and Cyber Security Product solution baed on mobile, Enforcement, Public Safety and
IOT Devices and IPs profiling Government Intelligence Community
Training
networks (3/4/5G and WiFi) Attendees.
This track is only open to Law globally
Enforcement, Public Safety and
• VP Sales and Marketing, GeoGence Tuesday, 6 September 2022
Government Intelligence Community
Attendees 8:30-9:20
Track 5
Understanding Mobile 2G, 3G,
Tuesday, 6 September 2022 Investigating DarkWeb, 4G and 5G NSA Infrastructure,
Bitcoin, Altcoin and Intercept and Cryptography
9:25-10:15
Infotecs data security solutions Blockchain Transaction • Dr. Jerry Lucas, President,
from cipher to cyber range TeleStrategies
This track is for law enforcement
• Presented by Infotecs and private enterprise investigators 9:25-10:15
who have to monitor and investigate Detect & Prevent Communication
10:35-11:25
the DarkNet along with Bitcoin Interception Systems in Real-Time
Maximize Geolocation transactions associated with criminal
Intelligence to Investigate the • Presented by Rayzone
activities
Past & Prevent Future Crimes 10:35-11:25
Note: Some sessions are only open to
• Presented by Rayzone Group VSAT Networks: Tactical and
LEA and Government. These sessions
Strategic Threat Detection and
11:30-12:20 are marked accordingly.
Geolocation
Why software is not enough:
building next generation, • Presented by Kratos
hardenized smartphones for 11:30-12:20
communication security SCPC/VSAT Interception in CiC/
• Presented by Feedback Italia CuC Scenarios
• Presented by Rohde Schwarz
11:00-11:40 Track 8
Wednesday, 7 September 2022 Mobile Radio Analysis Solutions
13:45-14:30 with 5G for Government Lawful Interception Product
Overcoming geolocation • Presented by Rohde Schwarz Training
challenges in a complex mobile This track is open to all conference
world 11:45-12:30
Wireless Environment Collection attendees unless marked otherwise.
• Presented by Intersec Note: Some sessions are only open to
+ Analytics
LEA and Government. These sessions
16:20-17:00
• Presented by HSS are marked accordingly.
Active Interception + Analytics
• Presented by HSS Track 7
Tuesday, 6 September 2022
Electronic Surveillance 9:25-10:15
Thursday, 8 September 2022
Training and Product Understanding 5G Stand Alone
9:15-10:00
Demonstrations NFV, Edge Computing and
Lawful location access Network Slicing
This track is for law enforcement
• Presented by Intersec
investigators and the government • Matthew Lucas (Ph.D, Computer
intelligence community who are Science), VP, TeleStrategies
responsible for deploying video, audio
and GPS surveillance products and Thursday, 8 September 2022
ISS World Asia only open to Law Enforcement, Public 11:00-11:40
Safety and Government Intelligence
Exhibit Hours Community Attendees.
5G Enabled LEMF
• Presented by AREA
Wednesday, 7 September 2022
Thursday, 8 September 2022
10:00-18:00
8:30-9:10
Thursday, 8 September 2022 Flexible and intelligent, tactical
9:30-12:30 electronic surveillance
• Presented by AREA

Registration Information Save $300 by registering before 22 July 2022

Law Enforcement/DHS/IC/DoD Registration* Free Colleague Registration:


Register as paid and you can invite a colleague to join you
ISS World Conference Training Tracks 2, 3, 4, 6 and 7
at ISS World Asia with a full, free conference pass. If you
Day 1 Seminars plus Exhibits.............................................. $995
have not identified your guest at this time, just enter “guest
Registration after 22 July 2022....................................... $1,295 of” followed by your name and complete with your contact
information. You can register your guest at no charge at a
Telecommunications Service Provider or later time.
Enterprise Registration
Conference and Exhibitions:
ISS World Conference (Tracks 1, 5 and 8), Shangri-La Singapore.
Pre-Conference Seminars and Exhibits.......................... $995 22 Orange Grove Rd Singapore 258350.
Registration after 22 July 2022....................................... $1,295 Telephone +6567373644.
International Attendees:
Vendor Registration If you need Visa assistance to attend ISS World, please
ISS World Conference (Tracks 1, 5 and 8), contact Tatiana Lucas at talucas@telestrategies.com
Pre-Conference Seminars and Exhibits.......................... $995
Conference by Invitation Only:
Registration after 11 July 2022......................................... $1,295 To attend ISS World you must be a Telecommunications
Service Provider, government employee, LEA or vendor
*Note: To Attend the LEA/DHS/IC/DoD Training Tracks 2, with LI, surveillance or network products or services.
3, 4, 6 & 7 you must be a sworn law enforcement officer or If you have questions e-mail Tatiana Lucas at talucas@
military/intelligence/government employee. Also you must telestrategies.com.
register by 2 September 2022 in order to verify eligibility.
Government photo ID required for Tracks 2, 3, 4, 6 & 7 Registration
classroom access.
Phone: 1-703-734-7050 Fax: 1-703-734-9371
Online: www.telestrategies.com
ISSWorld Asia
®

6-8 SEPTEMBER 2022 • SHANGRI-LA HOTEL • SINGAPORE

Lead Sponsor

Associate Lead Sponsors

Exhibitors and Sponsors

You might also like