You are on page 1of 7

an Reg

d 2 ist

ISSWorld Europe
nd er 1
® FR
EE

Intelligence Support Systems for Electronic Surveillance,


Social Media/DarkNet Monitoring and Cyber Threat Detection

14-16 JUNE 2022 • CLARION CONGRESS HOTEL • PRAGUE, CZ

Where Law Enforcement,


Government Intelligence Agencies and
Financial Crime Investigators turn for
Technical Training and Product Selection

Lead Sponsor Associate Lead Sponsors

Exhibitors and Sponsors

151 LEA/Interior/DoD Training Sessions and Courses to Choose From


ISSWorld Europe
® Intelligence Support Systems for
Real-Time
for Electronic
Threat
Surveillance,
Intelligence
Gathering,
Social Media/DarkNet
Cyber Security
Monitoring
and
Cyber
and Cyber
Crime
Threat
Investigations
Detection

14-16 JUNE 2022 • CLARION CONGRESS HOTEL • PRAGUE, CZ

ISS World Europe is the world’s largest gathering ISS WORLD EUROPE 2022 14:15-15:05
of Regional Law Enforcement, Intelligence and Tor, onion routers, Deepnet, and Darknet:
Homeland Security Analysts, Telecoms as well as PROGRAM AGENDA
Training Seminars Led by Law A Deep Dive for Criminal Investigators
Financial Crime Investigators responsible for Cyber
Crime Investigation, Electronic Surveillance and Enforcement Officers and Ph.D., SEMINAR #2
Intelligence Gathering. Computer Scientists
ISS World Programs present the methodologies 20 classroom training hours, presented by Law 08:30-15:05
and tools for Law Enforcement, Public Safety, Enforcement Officers and Ph.D. Scientists Practitioners Guide to Internet
Government and Private Sector Intelligence
• Charles Cohen, Vice President at NW3C, the Investigations
Communities in the fight against drug trafficking,
National White Collar Crime Center, Professor in • Presented by: Mark Bentley, Communications Data
cyber money laundering, human trafficking,
Practice Criminal Justice, Indiana University and Expert, National Cyber Crime Law Enforcement,
terrorism and other criminal activities conducted
Retired Captain, Indiana State Police, USA UK Police
over today’s telecommunications network, the
(6 classroom hours) The aim of this 1-day seminar is to take the attendees
Internet and Social Media.
• Charles Cohen, Vice President at NW3C, the from the basics of understanding the Internet, how
National White Collar Crime Center, Professor in to find data, through to a full understanding of
Track 1
Practice Criminal Justice, Indiana University and best practice of an Internet investigator, building
Lawful Interception and Criminal Retired Captain, Indiana State Police their OSINT toolbox, and having awareness and
Investigation Training (6 classroom hours) knowledge of all the tools available to achieve this. It
• Mark Bentley, Communications Data Expert, is aimed primarily at the investigator, delivered from
Track 2 National Cyber Crime Law Enforcement, UK Police the perspective of detective, to empower them to
(7 classroom hours) have the best methodology and tradecraft to profile
LEA, Defense and Intelligence Analyst and catch suspects.
Product Demonstrations • Jerry Lucas (Ph.D., Physics), President,
TeleStrategies
(2 classroom hours) This is exclusively Law Enforcement only, as Practical
• Matthew Lucas (Ph.D., Computer Science), VP, examples, covert and investigative methodology and
Track 3
TeleStrategies (3 classroom hours) tradecraft will be given throughout the seminar.
Social Network Monitoring, Artificial
• Vladimir Vesely (Ph.D., Computer Science) 08:30-09:20
Intelligence and Analytics Product
Researcher, Brno University of Technology
Training The Internet, and how suspects leave a
(2 classroom hours)
Digital Footprint. How the system works
Track 4
Tuesday, 14 June 2022 for us, as investigators
Threat Intelligence Gathering and Cyber 09:25-10:15
Security Product Training SEMINAR #1 Recognizing Traffic Data and digital
Track 5 08:30-15:05 profiling via social networks and
Online Social Media and Internet devices - digital shadows
Investigating DarkWeb, Bitcoin, Altcoin
Investigations 10:35-11:25
and Blockchain Transaction
• Presented by: Charles Cohen, Vice President at WIFI, geolocation, and Mobile Data
Track 6 NW3C, the National White Collar Crime Center,
Professor in Practice Criminal Justice, Indiana
traces and tracking
Mobile Signal Intercept Training and University and Retired Captain, Indiana State Police 11:30-12:20
Product Demonstrations Awareness of Emerging Technologies,
08:30-09:20
Track 7 Cellular Handset Geolocation: Masking Tech and Tools, TOR and proxies
Electronic Surveillance Training and Investigative Opportunities and 13:20-14:10
Product Demonstrations Personal Security Risks Advanced Techniques in Tracing
09:25-10:15 Suspects, and lateral problem solving
Track 8
Collecting Evidence from Online Social 14:15-15:05
5G Lawful Intercept, Tracking and Media: Building a Cyber-OSINT Toolbox Open Source Tools, resources and
Forensics Product Training (Part 1) techniques - A walk through my free law
Plus Special Training Seminars lead by Law 10:35-11:25 enforcement open source tools site
Enforcement Officers and Ph.D. Scientists Collecting Evidence from Online Social
Media: Building a Cyber-OSINT Toolbox
SEMINAR #3
(Part 2) 08:30-09:20
ISS World Europe Understanding Mobile 2G, 3G, 4G & 5G
11:30-12:20
Exhibits Schedule NSA Infrastructure and Law Intercept
Proxies, VPNs, and Dark Web: Identity
for Technical Investigators
Wednesday, 15 June 2022 Concealment and Location Obfuscation
• Presented by: Dr. Jerry Lucas, President,
10:00 - 18:15 13:20-14:10 TeleStrategies

Thursday, 16 June 2022 Tor, onion routers, Deepnet, and This session addresses the infrastructure evolution of
Darknet: An Investigator’s Perspective 2G to 3G to 4G to 5G NSA and the impact on lawful
10:00 - 13:00 interception.

To Review Complete Agenda or To Register, Go To WWW.ISSWORLDTRAINING.COM


ISSWorld Europe
® Intelligence Support Systems for
Real-Time
for Electronic
Threat
Surveillance,
Intelligence
Gathering,
Social Media/DarkNet
Cyber Security
Monitoring
and
Cyber
and Cyber
Crime
Threat
Investigations
Detection

14-16 JUNE 2022 • CLARION CONGRESS HOTEL • PRAGUE, CZ

SEMINAR #4 Track 1
The presentation introduces methods addressing
both of these phenomena – intercepting TLS/SSL
09:25-10:15 Lawful Interception and Criminal connections with the help of man-in-the-middle
Understanding 5G Stand Alone NFV, Investigation Training attack employing proxy and automatically creating
snapshots of problematic web pages. Speakers
Edge Computing and Network Slicing This track is for Telecom Operators and Law outline necessary theory (including news about
• Presented by: Matthew Lucas (Ph.D, Computer Enforcement/Intelligence/Defense Analysts who TLS 1.3, HSTS, HTTP3.0), well-known attacks (e.g.,
Science), VP, TeleStrategies are responsible for specifying or developing lawful renegotiation, downgrade, cipherspec change,
Cellular market analysts collectively have identified intercept network infrastructure. and others), and industry-standard tools for traffic
5G services deployed in over 400 cities spread analysis (such as Wireshark, Fiddler proxy, SSL-Split)
over 30 or so countries. The one common feature Tuesday, 14 June 2022 and decoding (e.g., Selenium, Scrapy). The session
of all these operations is that they are providing 5G will include a live demo of MitM attack on HTTPS
services with a 4G/5G hybrid network infrastructures 15:25-16:05 SESSION B connection enhanced with covert extraction of form
or so called non-Stand Alone (NSA) architecture. Accelerating investigation workflows data, which would be later used to periodically web
This session addresses the transition to 5G stand scrape and archive protected content.
with specially designed IT-forensic
alone. (Full description below Track 9)
laboratories • Vladimir Vesely (Ph.D., Computer Science) and
• Presented by mh Service GmbH Jan Pluskal, Researchers, Brno University of
SEMINAR #5 Technology
10:35-11:25 Wednesday, 15 June 2022 Track 2
Understanding Advanced Techniques
09:00-10:00 SESSION A
to Defeat (or Work Around) Encrypted LEA, Defense and Intelligence
Lawful Interception and Communication Analyst Product Demonstrations
Third Party Services, Bitcoin Anonymity,
Data, Current & Future Challenges:
TOR/HS and iPhone Encryption This track is only open to Law Enforcement, Public
Mobile, Cyber Security, Virtualization Safety and Government Intelligence Community
• Presented by: Matthew Lucas (Ph.D, Computer
Science), VP, TeleStrategies
and AI - An industry view Attendees.
• Alex Leadbeater, 3GPP SA3-LI and ETSI TC Cyber
You can’t defeat today’s encryption (at least not
Chairman and Head of Global Obligations Future
that we know of) but law enforcement and the Tuesday, 14 June 2022
and Standards, BT Security
government intelligence community can “Work
around encryption” for a price. Once you identify 08:30-09:20 SESSION B
15:00-15:40
a target using commercially available encryption Intercepting and Collecting Web
Flow aware scalability across servers
products or services (and with enough resources Evidence in the Times of TLS1.3 and
or money) government can defeat the target near • Presented by Napatech
HTTP3.0
100% of the time.
The end-to-end HTTPS encryption and the volatile
Thursday, 16 June 2022
nature of web content make any interception and
SEMINAR #6 8:30-9:10 collection of data on the Internet a challenge.
Password Cracking in Practice The presentation introduces methods addressing
11:30-12:20
both of these phenomena – intercepting TLS/SSL
Locating and Tracking Devices by MAC As more and more traffic and data on the Internet
connections with the help of man-in-the-middle
Addresses and App-Based SDKs plus are being protected end-to-end, decrypting
attack employing proxy and automatically creating
information becomes more critical than ever
Privacy Measures by Apple & Google before. The presentation outlines password-
snapshots of problematic web pages. Speakers
outline necessary theory (including news about
• Presented by: Matthew Lucas (Ph.D, Computer cracking use-cases, employed formats, current
TLS 1.3, HSTS, HTTP3.0), well-known attacks (e.g.,
Science), VP, TeleStrategies GPU/FPGA performance limits, and existing (non-)
renegotiation, downgrade, cipherspec change,
commercial cracking tools. Speaker will show how
and others), and industry-standard tools for traffic
Thursday, 16 June 2022 to: a) automatically extract hashes from encrypted
analysis (such as Wireshark, Fiddler proxy, SSL-Split)
documents; b) prepare and evaluate password
and decoding (e.g., Selenium, Scrapy). The session
SEMINAR #7 keyspace (e.g., generate passwords using Markov
will include a live demo of MitM attack on HTTPS
chains / rule-based grammars and handling of
connection enhanced with covert extraction of form
13:00-14:00 passwords containing national characters); c)
data, which would be later used to periodically web
Top 20 Open Source Tools (OSINT) orchestrate various cracking strategies (e.g., a
scrape and archive protected content.
Used in Cybercrime Investigations combination of dictionaries). Participants will be
provided with tips and tricks on how to use Hashcat • Vladimir Vesely (Ph.D., Computer Science) and
• Presented by: Mark Bentley, Communications more effectively and how to distribute password Jan Pluskal, Researchers, Brno University of
Data Expert, National Cyber Crime Law cracking task on their infrastructure. Technology
Enforcement, UK Police
• Vladimir Vesely (Ph.D., Computer Science) and Jan 09:25-10:15 SESSION A
Pluskal, Researchers, Brno University of Technology Carrier in Carrier Analysis: Determine
Wednesday, 15 June 2022
09:15-10:00 the impact of Carrier in Carrier
8:15-8:30
Cyber Threat Intelligence in Context of technology on your satellite monitoring
Welcoming Remarks
Counterterrorism capabilities
• Tatiana Lucas, ISS World Program Director,
TeleStrategies • Presented by Resecurity Presenting the challenges posed by Carrier in
Carrier technologies and VASTech’s approach to
8:30-9:00 11:45-12:30 the analysis of Carrier in Carrier signals and the
Top Ten Internet Challenges Facing Intercepting and Collecting Web separation of Symmetrical and Asymmetrical Carrier
Law Enforcement and the Intelligence Evidence in the Times of TLS1.3 and in Carrier Signals.

Community and Who at ISS World HTTP3.0 • Presented by VASTech


Europe has Solutions The end-to-end HTTPS encryption and the volatile
nature of web content make any interception and
• Dr. Jerry Lucas, President, TeleStrategies
collection of data on the Internet a challenge.
10:35-11:25 13:00-13:40 SESSION C 09:15-10:00 SESSION B
An Entirely New Approach for Digital Taking Control with Drone Takeover Practical and creative example of
Forensis and Intelligence-collection C-UAS technology for sensitive and modifying Android OS by HEX editing
from IoT Devices urban environments system files, and having regular
• Presented by Toka Simply resolving a rogue drone incident is not applications to achieve surveillance.
enough for many organizations, especially if the
11:30-12:20 SESSION B • Denis Cuculic, CEO ex. Head of Technical
resolution includes collateral damage resulting
Department, PRO4SEC
Handling the higher data rates in 5G and from shooting down an unauthorized drone. During
Gigabit+ broadband – The impact on his session, “A Safe Landing-Based Approach to 11:00-11:40 SESSION A
lawful interception and the mitigations Sensitive & Urban Scenario Counter-Drone Defense,” A new perspective for field operations -
Amit Haimovich, VP Sales, D-Fend Solutions, will
In the face of ever increasing bandwidth demands
offer best practices on how organizations can
supporting Cyber operations in the field
CSPs are embracing the latest access technologies. • Presented by Trovicor
safely land rogue drones. He will also explain why
With 5G already breaching 1Gbps and broadband FTTP
organizations should focus their counter-drone
offering 10Gbps symmetrical services. LI systems are 13:00-14:00 SESSION B
efforts on truly dangerous drones
under increasing pressure to deliver. We explore the Memento Labs - Live Demo
real world impact of these changes and mitigations • Amit Haimovich, VP Sales, D-Fend
• Presented by Memento Labs
CSPs and end users can take to manage this avalanche.
13:45-14:30 SESSION A 11:45-12:30 SESSION A
• Chris Young, BAE Systems AI Turning mass encrypted network traffic Data Enrichment Techniques and
14:15-15:05 SESSION A into valuable intelligence Sources for Internet Investigations
Don’t let the new 5G SA Privacy De-anonymizing Twitter accounts, WhatsApp
• Presented by Packet Forensics
Features stop you from catching IMSIs activity and more.
• Sander de Jong, Group 2000 • Presented by Wintego Track 3

14:15-15:05 SESSION B 13:45-14:30 SESSION B Social Network Monitoring, Artificial


Turning mass encrypted network traffic GeoGence – National level, non- Intelligence and Analytics Product
into valuable intelligence intrusive and independent accurate Training
De-anonymizing Twitter accounts, WhatsApp geo-monitoring and profiling covering Sessions in this track are only open to Law
activity and more. all device types and networks (3/4/5G Enforcement, Public Safety and Government
and WIFI) globally Intelligence Community Attendees, unless marked
• Presented by Wintego
otherwise.
• Presented by GeoGence
14:15-15:05 SESSION C
Memento Labs present the totally 13:45-14:30 SESSION D Tuesday, 14 June 2022
brand-new arsenal for deep monitoring Challenges to Consider when preparing
08:30-09:20
criminals for the 5G Lawful Interception Era
Massive Social Media data collection
• Presented by Memento Labs • Presented by Cognyte (Formerly a Verint
company) and analysis for Counter-Terrorism
15:25-16:05 SESSION B Intelligence Activities
Catch the spyware! A non-intrusive 15:00-15:45
• Presented by IPS
approach to spot potential infections of Next Generation of Data Convergence,
Analytics, and Intelligence 09:25-10:15
mobile devices over the air
• Kevin Metcalf, SS8 WhatsApp, Telegram, Facebook...how
• Presented by Rohde Schwarz
IPS helps you to locate most wanted
15:25-16:05 SESSION C 15:45-16:30 SESSION A
targets with LI
Commercial SIGINT – unrestricted, global Every piece of data tells a story –
• Presented by IPS
and large-scale accurate geo-monitoring combine and analyze data from any
source in your digital investigation 13:20-14:10 SESSION B
and profiling of connected devices
• Mark Uldahl, CTO, XCI A/S Multi-Source-Analytics: Mastering
• Presented by GeoGence
constant changing communication
16:30-17:15 SESSION C
Wednesday, 15 June 2022 patterns and ever growing sources.
Advanced data exfiltration on modern
• Presented by Innosystec
09:00-10:00 SESSION A smartphones: inside the targets
compromised 14:15-14:40 SESSION B
A new dawn of AI, analytics and
intelligence: Are you ready for it? • Presented by MOLLITIAM CYBERINTELLIGENCE Automatic Exploitation of Social
• Presented by NSO Group
Network, Deep and Dark Web to
Thursday, 16 June 2022 complement traditional Lawful
09:00-09:30 SESSION B Interception Infrastructure for Target
Breaking down organized crime by 08:30-09:10 SESSION A
Profiling.
mastering WEBINT thinking A light in the darkness of Encrypted
• Presented by IPS
• Presented by Cognyte (Formerly a Verint Communications
company) • Presented by AREA 14:40-15:05 SESSION B
Machine Learning in a Command
09:00-10:00 SESSION D 08:30-09:10 SESSION B
and Control Centre for covert field
Cutting through the noise with FibreSignal Analysis: What intelligence
operations and situation awareness
intelligent data acquisition value does a fibre link contain?
• Presented by IPS
• Jez Nelmes, BAE Systems AI • Presented by VASTech
15:25-16:05 SESSION A
13:00-13:45 SESSION A 09:15-10:00 SESSION A
Looking into the future of investigations
Intelligence IoT: Networked Tactical Real Time Application Forensics:
with big data analytics and ML
Intelligence Finding suspects and evidence on an
• Presented by Cognyte (Formerly a Verint company)
• Presented by Ateros encrypted internet
• Presented by Sandvine 16:10-17:00 SESSION A
13:00-13:40 SESSION B
Social Media as the new passport for
The investigator toolbox: from Electronic
illegal immigration
Surveillance to Cyber Intelligence
• Presented by Cognyte (Formerly a Verint company)
Specialized digital tools to get the task done
• Presented by AREA
16:10-17:00 SESSION B 09:15-10:00 SESSION C Track 5
Augmented Analytics: Preventing Welcome to the era of DNA analysis in
Investigating DarkWeb, Bitcoin,
threats through using automated OSINT
Altcoin and Blockchain Transaction
anomalies detection. How to save 40 years and conduct an investigation
in a few days? This track is for law enforcement and private
• Presented by Innosystec
enterprise investigators who have to monitor
16:10-17:00 SESSION C • Presented by Social Links and investigate the DarkNet along with Bitcoin
Anonymity vs. You transactions associated with criminal activities
13:00-14:00 SESSION A
Smart Methods to Identify Virality, Bots & Personally Top 20 Open Source Tools (OSINT) Note: Some sessions are only open to LEA and
Identifiable Information Used in Cybercrime Investigations Government. These sessions are marked accordingly.

• Presented by ClearTrail • Mark Bentley, Communications Data Expert,


National Cyber Crime Law Enforcement, UK Police Tuesday, 14 June 2022
Wednesday, 15 June 2022 16:10-17:00
Track 4
9:00-10:00 Live Demonstration of DarkOwl Vision:
Tactical Web Intelligence (WEBINT): Threat Intelligence Gathering and Darknet Intelligence Discovery and
Gathering Actionable Intelligence via a Cyber Security Product Training Collection
powerful WEBINT platform This track is only open to Law Enforcement, Public (THIS SESSION IS ONLY OPEN TO LEA AND
Safety and Government Intelligence Community GOVERNMENT ATTENDEES)
• Presented by Cobwebs Attendees
• David Alley, CEO, DarkOWL FZE
13:00-13:40
Location & Open Source Intelligence: Tuesday, 14 June 2022 Wednesday, 15 June 2022
Real Life Case Studies & Live 10:35-11:25
Demonstration 13:00-13:40
Maximize Geolocation Intelligence to Offline darknet investigation with the
• Presented by Cobwebs
Investigate the Past & Prevent Future Web-l-Qube
13:00-13:40 SESSION B Crimes (DEMO) • Presented by mh Service GmbH
Modern security challenges - Staying • Presented by Rayzone Group
stealthy and understanding the cyber 11:30-12:20 Thursday, 16 June 2022
landscape threats, utilizing a holistic Hushmeeting: creating an iron-clad
operational security approach 8:30-9:10
and quantum-safe communication Know Now What Your Suspects Will Do
• Presented by CANDIRU
environment Tomorrow
13:45-14:30 • Presented by Feedback Italia • Presented by ClearTrail
Discover the Unknows of the Digital 16:10-17:00
Sphere 9:15-10:00
Obtaining valuable information from Workshop on Correlating Blockchain
• Presented by Ultra
information from the latest versions of Activity with Real-Life Events and Users
15:00-15:45 SESSION B MacOS The session starts with the outline of current
Supercharged IPDR extraction and • Presented by MOLLITIAM CYBERINTELLIGENCE methods for blockchain and traffic analysis. Speaker
analysis - Advanced Mass Internet explains in detail the properties of cryptocurrencies,
Activity Analytics Wednesday, 15 June 2022 including address clustering, coin-joining of inputs,
transaction mixing, and traffic correlation. It then
• Presented by Trovicor 9:00-10:00 focuses on employing previously described methods
15:45-16:25 Construct, Visualize and Analyze Digital to obtain intel about dark marketplace operators,
Encryption vs. You: 3 Ways to Combat Trails through Big Data (DEMO) vendors, and buyers. To address cryptocurrency
forensics, we have developed a set of tools
Threats at a Nationwide Scale • Presented by Rayzone Group
(exclusively available to law enforcement agencies)
• Presented by ClearTrail 13:00-13:40 that are capable of correlating things happening in
Hushmeeting: creating an iron-clad real-life with the blockchain. Moreover, participants
15:45-16:30 SESSION C
will have a chance to bring their cryptocurrency
CLOS-INT Closed Source Intelligence and quantum-safe communication addresses/transactions for assessment.
from Web2.0 sources environment
(THIS SESSION IS ONLY OPEN TO LEA AND
• Presented by AREA • Presented by Feedback Italia
GOVERNMENT ATTENDEES)
16:30-17:15 SESSION A 15:00-15:45 • Vladimir Vesely (Ph.D., Computer Science) and
VoIP Forensics: Revealing encrypted Secure National Critical Infrastructure Jan Pluskal, Researchers, Brno University of
VoIP communication network of and Organizational IT Technology
criminal organizations • Presented by Rayzone Group 11:00-11:45
• Presented by Sandvine 15:45-16:30 SESSION B De-anonymizing cryptocurrency
Exploitation & Operations Security transactions to fight crime and terror
Thursday, 16 June 2022 (OpSec) in Cyber Intelligence Ops (THIS SESSION IS ONLY OPEN TO LEA AND
09:15-10:00 SESSION A GOVERNMENT ATTENDEES)
• Presented by Secfense
Information overkill: finding the relevant • Presented by Cognyte (Formerly a Verint
pieces of the puzzle across multiple Thursday, 16 June 2022 company)
data sources to detect and prevent 11:45-12:30 Track 6
terror and crime. Riots in Colombia: crowd control on the
• Presented by Innosystec Mobile Signal Intercept Product
internet
Training and Demonstrations
09:15-10:00 SESSION B • Presented by MOLLITIAM CYBERINTELLIGENCE
This track is for Law Enforcement, Interior Security
How to Protect the Status of Data and the Government Intelligence Community
Traffic Without Changing the who must work with cellular and mobile satellite
Status Quo operators regarding mobile location, electronic
• Presented by Allot surveillance and RF intercept.
This track is only open to Law Enforcement, Public 11:00-11:40 the challenges for law enforcement and national &
Safety and Government Intelligence Community Mobile Radio Analysis Solutions with 5G homeland security personnel, as well as the best
Attendees. method for full counter-drone control.
for Government
• Presented by Rohde Schwarz • Nadav Horowitz, Product Manager, D-Fend
Tuesday, 14 June 2022
11:45-12:30
8:30-9:20 SESSION B Wednesday, 15 June 2022
An Entirely New Approach for Digital
Understanding Mobile 2G, 3G, 4G and Forensics and Intelligence-collection 15:45-16:25
5G NSA Infrastructure, Intercept and from IoT Devices An Entirely New Approach for Digital
Cryptography Connected-devices store vast amount of data,
Forensics and Intelligence – collection
• Dr. Jerry Lucas, President, TeleStrategies that may be game changing in the fight against from IoT Devices
terror and crime. However, security, defense and • Presented by Toka
9:25-10:15
law enforcement agencies face a great number
Detect & Prevent Communication of challenges in gaining access and extract digital 16:30-17:15
Interception Systems in Real-Time data in a quick, simple and effective manner. In Border Security and Force Protection
• Presented by Rayzone this session, Toka will introduce its groundbreaking Analytics using Passive RF
software-based platforms for obtaining digital • Presented by Packet Forensics
10:35-11:25 forensics and ongoing intelligence from highly
VSAT Networks: Tactical and Strategic demanding devices, using advanced cyber Track 8
Threat Detection and Geolocation technologies.
• Presented by Kratos • Presented by Toka
5G Lawful Interception Product
Training
11:30-12:20 SESSION B Track 7 This track is open to all conference attendees unless
SCPC/VSAT Interception in CiC/CuC marked otherwise.
Scenarios Electronic Surveillance Training and
• Presented by Rohde Schwarz
Product Demonstrations Note: Some sessions are only open to LEA and
Government. These sessions are marked accordingly.
This track is for law enforcement investigators
Wednesday, 15 June 2022 and the government intelligence community
who are responsible for deploying video, audio Tuesday, 14 June 2022
9:30-10:00 and GPS surveillance products and only open to
9:25-10:15
(TI) Tactical Intelligence solutions for Law Enforcement, Public Safety and Government
Intelligence Community Attendees. Understanding 5G Stand Alone NFV,
evolving threats and technologies
Edge Computing and Network Slicing
• Presented by Cognyte (Formerly a Verint
Tuesday, 14 June 2022 • Matthew Lucas (Ph.D, Computer Science), VP,
company)
TeleStrategies
13:45-14:30 9:25-10:15
16:10-17:00
Overcoming geolocation challenges in a A Safe Landing based approach to
Impact of 5GC on LEAs Usage of Cell
complex mobile world Sensitive and Urban Scenario Counter-
Site Simulators & Alternative Solutions
• Ahmed Hamza, Intersec Drone Defense
• Presented by SS8
Traditional counter-drone solutions have a role to
Thursday, 16 June 2022 play in a multi-layered defense strategy, but they
do not offer the required control and continuity in Wednesday, 15 June 2022
09:15-10:00 sensitive environments. During his session, “Taking Training Seminars Led by Law Enforcement Officers
5G Tactical solutions and Control with Drone Takeover C-UAS Technology for and Ph.D Computer Scientists
interoperability Sensitive & Urban Environments,” Nadav Horowitz,
Product Manager, D-Fend Solutions, highlights
• Presented by EXFO

Registration Information Save $300 by registering before 1 May 2022


Law Enforcement/DHS/IC/DoD Registration* Free Colleague Registration:
Register as paid and you can invite a colleague to join you at ISS World Europe
ISS World Conference Training Tracks 1-8, with a full, free conference pass. If you have not identified your guest at this time,
Pre-Conference Seminars plus Exhibits...........................$995 just enter “guest of” followed by your name and complete with your contact
information. You can register your guest at no charge at a later time.
Registration after 1 May 2022............................................ $1,295
Conference and Exhibitions: Clarion Congress Center
Telecommunications Service Provider or To reserve a room at the early bird rate of 115 EUR ($125 US) go to www.
issworldtraining.com and select ISS World Europe 2022 or call 420 211 131 119 and
Private Enterprise Registration reference ISS World 2022. Early bird rate expires 1 May 2022.
ISS World Conference (Tracks 1, 5 and 8),
International Attendees:
Pre-Conference Seminars and Exhibits............................$995
If you need Visa assistance to attend ISS World, please contact Tatiana Lucas at
Registration after 1 May 2022............................................ $1,295 talucas@telestrategies.com

Vendor Registration Conference by Invitation Only:


To attend ISS World you must be a Private Enterprise Investigator, government
ISS World Conference (Tracks 1, 5 and 8), employee, LEA or vendor with LI, surveillance or network products or services. If
Pre-Conference Seminars and Exhibits............................$995 you have questions e-mail Tatiana Lucas at talucas@telestrategies.com.

Registration after 1 May 2022............................................ $1,295 Registration


*Note: To Attend the LEA/DHS/IC/DoD Training Tracks 2, 3, 4, 6 and 7 you
must be a sworn law enforcement officer or military/intelligence/ government Phone: 1-703-734-7050
employee. Also you must register by 10 June 2022 in order to verify eligibility.
Government photo ID required for classroom access. Fax: 1-703-734-9371
Online: www.issworldtraining.com
ISSWorld Europe
® Intelligence Support Systems for
Real-Time
for Electronic
Threat
Surveillance,
Intelligence
Gathering,
Social Media/DarkNet
Cyber Security
Monitoring
and
Cyber
and Cyber
Crime
Threat
Investigations
Detection

14-16 JUNE 2022 • CLARION CONGRESS HOTEL • PRAGUE, CZ

Lead Sponsor

Associate Lead Sponsors

Exhibitors and Sponsors

You might also like