ISS World Americas is the world's ... - XS4ALL Klantenservice
ISS World and Exhibitors Americas Sponsors · 2019-04-05 · Lead and Associate Lead Sponsors...
Transcript of ISS World and Exhibitors Americas Sponsors · 2019-04-05 · Lead and Associate Lead Sponsors...
ISS World Exhibits
October 12, 201010:00 a.m. to 6:00 p.m.
October 13, 20109:30 a.m. to 1:30 p.m.
Sponsors
and ExhibitorsISSWorld®AmericasOCTOBER 11-13, 2010 • WASHINGTON DC
Lead and Associate Lead Sponsors
HACKING TEAM is a company totally focused on IT OFFENSIVE SECURITY intelligencesolutions for LEAs and Security Agencies. Remote Control System V6 (RCS) is a premier,integrated, multi-OS platform for remotely attacking, infecting and controlling target computersand mobile phones. RCS FULLY SUPPORTS XP, Vista, 7, MacOS, iPhone and Symbian - It isINVISIBLE to most protection systems available in the market (e.g., systems listed in theGARTNER's Magic Quadrant For Endpoint Protection Platforms) - It is RESISTANT to systemrestoration technologies (e.g., DeepFreeze) - It is a PROVEN technology: it is being used byAgencies worldwide since 2003 - Target monitoring includes Skype, chat, mail, web, removablemedia, encrypted communications, PGP, GSM-cell GEO-tracking, GPS GEO-tracking, voice calls,[email protected]
NICE Intelligence solutions help LEAs and Intelligence Organizations to reduce crime, preventterrorism and identify other security threats in real-time. NICE solutions enhance security byutilizing innovative technology platforms and built-in intelligence know-how.NiceTrack solutions include: Monitoring & Analysis Solutions, Location Tracking Solutions, MassInterception Solutions
Packet Forensics provides visible and covert communications solutions tailored towards thespecific needs of law enforcement and intelligence customers. The cost-effective platform isdesigned to be flexible and scalable in the face of changing missions with minimal effort, evenin complex environments or in the face of advanced persistent threats.
Spectronic Systems is an independent and 100% privately owned company working exclusivelywith governments and government approved agencies. The Spectronic Systems activitiesinclude development and manufacturing of monitoring systems and monitoring centres handlingtelephony, internet/IP, fax and modem traffic for intelligence and law enforcement agencies.These solutions can act as data retention systems and/or as an intelligence platform for bulkmonitoring of SMS, MMS, e-mails or other means of data communication.
SS8 is a leader in communications interception and a worldwide provider of regulatorycompliant, electronic intercept and surveillance solutions. Headquartered in the heart of theSilicon Valley in Milpitas, California, SS8 has a global reach and is an independent provider ofregulatory-compliant electronic surveillance solutions that have been deployed in over 25countries for the largest wire-line, wireless, cable, VoIP and satellite service providers. Thesevoice and data installations can intercept more than 100 million subscribers, and serve local,regional and national law enforcement and intelligence agencies worldwide. SS8 products aresold and supported both directly and through OEM partnerships. www.ss8.com.
Verint’s solutions help communications service providers, law enforcement, national security,and intelligence agencies neutralize threats from criminals and terrorists. The company’ssystems generate Actionable Intelligence® through the collection, retention and analysis ofvoice, fax, video, email, Internet and data transmissions from multiple communicationsnetworks. Solutions are designed for compliance with ETSI, CALEA and other regional lawfulinterception regulations and standards.
Exhibitors and Sponsors
PRESORTED FIRSTU.S. POSTAGE
P A I DHanover, MD
Permit No. 149
6845 Elm StreetMcLean, VA 22101
Where the Telecoms,Law Enforcement,
DoJ, DHS, DoD andthe Intelligence
Community Turn toLearn and Network
ISSWorld®AmericasIntelligence Support Systems for Lawful Interception,
Criminal Investigations and Intelligence Gathering
®
ISS WorldIntelligence Support Systems for Lawful Interception,
Criminal Investigations and Intelligence Gathering
OCTOBER 11-13, 2010 • WASHINGTON DC
OCTOBER 11-13, 2010 • WASHINGTON DC
3 Days of LawEnforcement andIntelligence GatheringTraining
102 LEA/OSINT/IntelTraining Courses ToChoose From
Sponsors and ExhibitorLead and Associate Lead Sponsors
®
ISSWorld®AmericasIntelligence Support Systems for Lawful Interception,
Criminal Investigations and Intelligence Gathering
Register 1
and 2nd FREE
Where Telecom Operators, LawEnforcement, DHS, DoD
and the Intelligence Community Turn to Learn and Network
Where Telecom Operators, LawEnforcement, DHS, DoD
and the Intelligence Community Turn to Learn and Network
OCTOBER 11-13, 2010 • WASHINGTON DC
Earn Up to 5 LEA and Intel Training Certificates with 102 Sessions to Choose From
OCTOBER 11-13, 2010 • WASHINGTON DC
Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence GatheringISSWorld®Americas
For Complete ISS World Conference Session Descriptions, Go To www.telestrategies.com
ISS World Americas is the world's largestgathering of North American, Caribbean andLatin American Law Enforcement,Intelligence and Homeland Security Analystsand Telecom Operators responsible for lawfulinterception, electronic investigations andnetwork Intelligence gathering.
ISS World Programs present themethodologies and tools to bridge thechasms from lawful intercept data gatheringto information creation to investigatorknowledge to actionable intelligence.
ISS World AmericasProgram
Conference Track 1
ISS for Telecom Operator LawfulInterception
Conference Track 2
ISS for Criminal Investigation
Conference Track 3
ISS for Mobile Location, Surveillanceand Intercept
Conference Track 4
DPI for Lawful Interception, NetworkSecurity and Traffic Management
Conference Track 5
ISS for Intelligence Gathering andAnalysis
Conference Track 6
Naked Intelligence: Special OSINTSessions
Conference Track 7
LEA and Intelligence Analyst Trainingand Product Demonstrations
Conference Track 8
Spanish Language ISS Training Track
Pre-Conference Seminars andTutorials (October 11, 2010)
ISS World Americas Exhibits:Tuesday, October 12: 10:30 AM - 6:00PMWednesday, October 13: 9:30 AM - 1:30 PM
Monday, October 11, 20108:45-9:00 a.m.
Welcoming RemarksTatiana Lucas, ISS World Program Director,
TeleStrategies
ISS World Keynote Addresses
9:00-9:30 a.m.
Top Ten Internet Challenges FacingLaw Enforcement and theIntelligence Community Dr. Jerry Lucas, President, TeleStrategies
9:30-10:00 a.m.
Gathering OSINT Challenges FacingLaw Enforcement, Private SectorInvestigators and the IntelligenceCommunity Jed Grant, Founding Partner, Sandstone
10:00-10:30 a.m.
Emerging Technologies: Risks andOpportunitiesCharles Cohen, Cohen Training and
Consulting, LCC. Charles also holds theposition of Commander, SpecialInvestigation and Criminal Intelligence,Indiana State Police
Track 1
ISS for Lawful InterceptionThis track is for Telecom Operators and LawEnforcement/Intelligence/Defense Analysts whoare responsible for specifying or developinglawful intercept network infrastructure.
Tuesday, October 12, 201011:30-12:30
LI for New IP Services “BestPractices” Guru PanelRudolf Winschuh, Business Development,
Utimaco LIMS Dr. Glen Myers, CEO, IP FabricsJerome Tollet, CTO, QosmosDr. Cemal Dikmen, CTO, SS8Jeff Zindel, Vice President of Marketing,
GlimmerglassYuval Altman, Director of Product
Management, Verint Systems
2:00-2:30
Target Identities in NetworkCommunications – Hard to Obtain (orRather Easy)?Rudolf Winschuh, Business Development,
Utimaco LIMS
2:30-3:00
Challenges of Webmail Interceptionand AnalysisVineet Sachdev (Senior Director, Sales
Engineering, SS8
3:30-4:00
Intercepting Voice and other Trafficfrom Instant-Messaging and Social-Networking ServicesGlen Myers, CEO, IP Fabrics
4:00-4:30
Regulatory Challenges in Copingwith Broadband Internet InterceptionItzik Vager, Vice President Product Mediation
and Partners, Verint Systems
4:30-5:00
Interception Solutions IntegratedToday and Scalable for TomorrowAlan Dubberley, VP, AQSACOM
Wednesday, October 13, 20108:30-9:00
Multi-Dimensional IntelligenceProductionNICE Systems
9:00-9:30
Identifying the needle in the10/40/100G haystack.Network Monitoring in today and tomorrow’sdata center.NetOptics
10:00-10:30
Cost Effective, Flexible NetworkInterception and MonitoringSolutions Jeff Zindel, Vice President of Marketing,
Glimmerglass
10:30-11:00
Managing Virtual Identities across IPNetworksGilles d’Aramon, VP Americas, Qosmos
1:30-2:00
New Approach for IP InvestigationNICE Systems
Track 2:
ISS for Criminal InvestigationsThis track is for Law Enforcement, Intelligenceand Cyber Security Analysts who haveinvestigation responsibilities associated withtelecommunications networks.
Tuesday, October 12, 2010
11:30-12:30
Visual Analytics for Financial CrimesChristopher Westphal, CEO, Visual Analytics
OCTOBER 11-13, 2010 • WASHINGTON DC
Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering
2:00-2:30
Leveraging IP Metadata to optimizeMonitoring Center Performance Jerome Tollet, CTO, Qosmos
2:30-3:00
Efficient criminal investigation andidentification Using the new ASIS forLawful InterceptionEmilio Martinez, Agnitio
Wednesday, October 13, 20108:30-9:00
Precise Speaker identification forForensic Labs Antonio Moreno, Agnitio
10:00-10:30
The Distinct Roles and Values of anEnd-to-End IP Intercept SolutionDerek Granath, VP, Product Line Management,
SS8
10:30-11:00
Meshed Networks, MeshedCommunications, Messed LawfulInterception…Dirk Schrader, Director Sales, Utimaco LIMS
11:30-12:00
Meeting the Changing Dynamics,Challenges and Threats in the CyberWorld Chuck Meyo, Vice President, Federal
Government Team, Narus
12:00-12:30
Outlining and Addressing IT IntrusionChallenges in 2010-FinFisher: theULTIMATE IT Intrusion PortfolioMJM, Gamma Group
1:30-2:00
Tracking the Money Trail in Criminaland Terrorist InvestigationsShaked Levy, Director of Product
Management, Verint Systems
2:45-3:15
Communication Pattern Analysis:Innovative Intelligence ExtractionNICE Systems
3:15-3:45
Contextual Investigation in IP WorldNICE Systems
Track 3:
ISS for Mobile Location, Surveillanceand InterceptThis track is for Law Enforcement, InteriorSecurity and the Intelligence Community whohave to work with cellular and mobile satelliteoperators to locate targets and interceptcommunications.
Tuesday, October 12, 20102:00-3:00
Best Location, Surveillance andIntercept Best Practice “Guru Panels”Steve O’Neill, VP, TruePositionBhavin Shah, Director of Marketing and
Business Development, Polaris WirelessGreg Kopchinski, Director, Product
Management, Bivio NetworksYochai Corem, Product Manager,
Verint SystemsDavid Vincenzetti, Hacking Team
3:30-4:00
From ‘Where’ to ‘Wwho and What’Using Polaris WLS to Determine Whothe Targets are and What They areDoingBhavin Shah, Director of Marketing and
Business Development, Polaris Wireless
4:00-4:30
Overview of Location Technology forMission Critical ApplicationSteve O’Neill, VP, TruePosition
4:30-5:00
Effective Location-Aware DataCapture & Analysis for a MobileWorld”Greg Kopchinski, Director, Product
Management, Bivio Networks
Wednesday, October 13, 201010:00-10:30
Leveraging Mobile Events to Identifyand Locate Criminal ActivityBrian Varano, TruePosition
10:30-11:00
Turning Location Data intoMeaningful IntelligenceNICE Systems
11:30-12:00
New Generation IP based TacticalDevicesPaolo Mandelli, Sales International Director,
AREA
Track 4:
DPI and Intelligent Probes for LawfulInterception, Network Security AndTraffic ManagementThis track is for telecom operators, lawenforcement, intelligence analysts or justabout anyone who has to understand DeepPacket Inspection (DPI) technologies, productavailability, applications and legal issues facingtelecom operators who deploy DPIinfrastructure
Tuesday, October 12, 20103:30-4:30
Best DPI Deployment Practices for LI,Network Security and TrafficManagement Guru PanelKevin Graves, CTO, IP FabricsMike Coward, Chief Technology Officer & Co-
Founder, Continuous ComputingJoel Ebrahimi, Solutions Engineer,
Bivio NetworksAubrey Merchant-Dest, Consulting Engineer,
QosmosChuck Meyo, Vice President, Federal
Government Team, Narus
Wednesday, October 13, 20108:30-9:00
Cyber Defense in Depth: Using DPI &Network Intelligence to Build aSecond Line of DefenseAubrey Merchant-Dest, Consulting Engineer,
Qosmos
9:00-9:30
DPI at 100G: System Architecturesand Tips for Coping with the DataFloodMike Coward, Chief Technology Officer & Co-
Founder, Continuous Computing
10:00-10:30
Intelligent Monitoring ofCommunications Applications Hostedon the ‘Outside’ Kevin Graves, CTO, IP Fabrics
Special Data Retention Sessions
3:30-4:00
Metadata Extraction andRetention for IP ApplicationsCemal Dikmen, CTO, SS8
4:00-4:30
Dynamic Data RetentionSystems Dr. Elan Amir, President & CEO,
Bivio Network
4:30-5:00
Target & Mass detection in aRetained EnvironmentNICE Systems
ISSWorld®Americas
10:30-11:00
DPI and Intelligent Probes for LawfulInterception, Network Security andTraffic EnforcementJoel Ebrahimi, Solutions Engineer,
Bivio Networks
11:30-12:00
DPI and Network Security Platforms:Commercial Off-The-Shelf (COTS)versus Custom PlatformsMike Coward, Chief Technology Officer & Co-
Founder, Continuous Computing
Track 5:
ISS for Intelligence Gathering andAnalysisISS for Intelligence Gathering and Analysis.This track is for intelligence analysts who mustgather on-line intelligence by deploying visualanalytics, data mining and OSINT programs.
Tuesday, October 12, 201011:30-12:00
A Stealth, Spyware-Based System forAttacking, Infecting and MonitoringComputers and SmartphonesDavid Vincenzetti, Partner, Hacking Team
12:00-12:30
OSINT as a Meaningful Sourcealongside other COMIT SourcesNICE Systems
2:00-2:30
IP Traceback and OSINT for NetworkSecurityVictor Oppleman, President, Packet Forensics
2:30-3:00
The Next Evolutionary Step of theInternet Lior Amsterdamski, Product Manager,
Verint Systems
3:30-4:00
Gathering Open Source IntelligenceAnonymouslyLance Cottrell, Chief Scientist, Abraxas
4:00-4:30
Biometric Speaker Spotting enablesnew horizons for Mass VoiceInterception Philippe Vinci, AGNITIO
4:30-5:00
The Identity Management in the LI:the Key to Identify the New EraTargetsPietro Felici, Sales Engineer, AREA
Wednesday, October 13, 201010:00-10:30
Revolutionary and Easy Access toSort and Browse among MultiSource Intelligence Content: CortexTouchFrancois-Xavier Pons, Ercom
10:30-11:00 AM
Enabling Large-scale Graph Analytics:The Cray Extreme Multi-Threading(XMT) TechnologyDave Strenski, Senior Software Engineer, Cray
1:30-2:00
OSINT Source Validation: The ShortPole in the TentGreg Meyer, Chief Technology Officer,
iJET Intelligent Risk Systems
Track 6:
Special OSINT Sessions: NakedIntelligence ISS World and Naked Intelligence havepartnered to create the world’s most uniqueIntelligence Support Systems and IntelligenceGathering conference. This event combineshands-on access to intelligence supportsystems solution providers with valuableinsight and know-how presented byexperienced practitioners of intelligence.
Tuesday, October 12, 201011:30-12:00 PM
Corporate IntelligenceTyler Drumheller, Chief Operations Officer,
DMC Worldwide
12:00-12:30 PM
Inside the U.S. Domestic Threat- TheLackawanna Six Case StudyPeter J Ahearn
2:00-3:00 PM
Is Government SponsoredIntelligence Relevant in the 21stCentury?Ron Marks, Senior Vice President for
Government Relations, Oxford Analytics
3:30-4:00 PM
Predictive Intelligence in an OpenSource WorldAndrew Chester, Program Manager,
TradeBytes Data Corporation
4:00-4:30 PM
Intelligence Analyst, KnowledgeWorker Model of the 21st Century?Robert J Heibel, Executive Director,
Institute for Intelligence Studies
4:30- 5:00 PM
Is intelligence bogged by theindustry?Jean Labrique, President, EON
Wednesday, October 13, 2010 8:30-9:00 AM
Neil Livingstone, Chairman and CEO,ExecutiveAction
9:00-9:30 AM
Business Intelligence in ChinaGary Lim, Principal Consultant
10:00-10:30 AM
One Global Mind, Collaborative OpenSource IntelligenceJ. Patrick Enderson
10:30-11:00 AM
Media monitoring & analysis 3.0Kristofer Mansson
11:30-12:30 PM
The Naked Intelligence AgencyFrank Schneider, Managing Partner,
SandstoneMats Björe, Senior Partner and CEO,
Infosphere
1:30-2:30 PM
Real Time Information in the Handsof Civilians: Implications forGovernment EntitiesStephen Arnold
2:45-3:15 PM
Realistic Probabilities in ModernSignals IntelligenceSteve Topletz, Administrator and Operations
Advisor, XeroBank
3:15-3:45 PM
OSINT Session To Be AnnouncedRoelof Temmingh
4:00-4:30 PM
NextGEN technology concepts forIntelligenceMark P. Pfeiffer, Chief Visionary,
SAIL Labs Technology
4:30-5:00 PM
A new platform for IntelligenceanalysisJed Grant, Founding Partner, SandstoneChris Bohme
Track 7:
LEA, Intelligence and Defense AnalystTraining and Product DemonstrationTrackThis training and product demonstration trackis open only to Law Enforcement, Intelligence,Defense Analysts and other GovernmentExecutives.
Tuesday, October 12, 201011:30-12:30
Tactical Intercepts in High-StakesEnvironmentsVictor Oppleman, President, Packet Forensics
11:30-12:30
Accurate Location TechnologiesYochai Corem, Product Manager,
Verint Systems
2:00-3:00, Session A
REMOTE CONTROL SYSTEM v6: TheULTIMATE WEAPON for attacking andcovertly monitoring PCs andSmartphones.LIVE DEMO: Targeting Windows, WindowsMobile, Mac, iPhone, Symbian and BlackBerry.Marco Valleri, Senior Security Engineer, and
Alfredo Pesoli, Senior Security Engineer,Hacking Team
SESSION B
SESSION A
For Complete ISS World Conference Session Descriptions, Go To www.telestrategies.com
2:00-3:00
Demonstration of NetworkIntelligence technology for LawfulInterception (for engineers anddevelopers)Identifying virtual Web IDs within a stream ofIP trafficAubrey Merchant-Dest, Consulting Engineer,
Qosmos
2:00-3:00
Next Generation Targeting andAnalytics: The Future of LawfulInterceptJerry Miille, Drector, Product Management,
Narus
3:30-4:30
Traffic Analysis & Pattern AnalyzerTrainingNICE Systems
3:30-4:30
FinFisher IT Intrusion SuiteMJM, IT Intrusion Expert, Gamma Group
Wednesday, October 13, 20108:30-9:30
Tactical Mobile Phone Infection andInterception Beyond BordersMJM, IT Intrusion Expert, Gamma Group
8:30-9:30
An Integrated Platform for all yourLawful Interception ActivitiesLuca Bergonzi, Network Solution Designer,
AREA
10:00-11:00
REMOTE CONTROL SYSTEM v6: IN-DEPTH demonstration of INFECTIONvectors and ATTACK TechniquesONLY.Alberto Ornaghi, Senior Security Engineer,
Hacking Team
10:00-11:00
WEBINTLior Amsterdamski, Product Manager,
Verint Systems
11:30-12:30
Cost Effective, Flexible NetworkInterception and MonitoringSolutions Jim Donnelly, Vice President of Sales – North
America and Safdar Akhtar, SeniorManager, Sales Engineer, Glimmerglass
11:30-12:30
Biometric Speaker Spotting System(BS3) DemoCaroline Rey, Agnitio
1:30-2:30
Location Tracking TrainingNICE Systems
1:30-5:00
Special Intelligence GatheringTraining (Three One Hour Sessions)Breck McDaniel, President, GEOCELL
Breck also holds the position of Sergeantand Head of the CommunicationsIntelligence Unit, Houston PoliceDepartment, USA
1:30-2:30
Introduction to Cellular Site RecordsMapping
2:45-3:45
Mashing Up Cellular Call Records,Location and Forensics Data ToSupport Criminal Investigations
4:00-5:00
Law Enforcement Wiretapping 101:What every investigator shouldknow!
Pre-Conference Seminars and Tutorials
Monday, October 11, 20108:30-12:10
Pre-Conference Seminar:Understanding TelecommunicationsTechnologies for LEA Investigatorsand Intelligence Analysts (Three OneHour Sessions)Presented By: Dr. Jerry Lucas, President,
TeleStrategiesThis pre-conference seminar is for lawenforcement, interior security and intelligenceanalysts who have to understandtelecommunications technology buzz wordsand jargon in order to communicate withtelecom operator engineers regarding theirIntelligence Support System (ISS)requirements regarding lawful interception,investigative analysis and intelligence gatheringwith intercept case study challenges. Seminarsessions include:
8:30-9:30
Understanding Wireline TelecomInfrastructure and Interception What LEA’s and intelligence analysts need toknow about the Public SwitchedTelecommunication Network (PSTN),broadband access, (DSL and Cable), signaling(SS7), circuit switched as VoIP, billing systemsand CDRs, handoff to LEA via virtual privatenetworks (vpn) and basic lawful interceptionelements (access, collection function anddelivery).
9:50-10:50
Understanding Mobile WirelessInfrastructure and InterceptionWhat LEA’s and intelligence analysts need toknow about mobile wireless networks, how acellular call is processed, network architectures(GSM vs. CDMA and 3G/4G) wireless dataarchitectures (GPRS, EDGE, LTE, WiMAX, etc.),wireless network (WiFi, femtocells, etc.), datasources (SMS, MMS, IM, etc.) and locationarchitectures (A-GPS, V-TDOA and WLS).
11:10-12:10
Understanding the Internet andLawful InterceptionWhat Investigators Have To Know about IP callIdentifying Information, Radius, DHCP, DNS,etc. and Tracking an Internet Address to aSource, Investigations Involving E-Mail,Websites, Instant Messaging, Chat Roomsand Message Boards, P2P Networks and DeepPacket Inspection.
8:30-12:10
Visual Analytics & InformationSharingMr. Westphal will present an interactive,thought compelling presentation on the use ofvarious visualization and representationtechniques for understanding a variety ofdomains ranging from financial crimes andmoney laundering to narcotics-trafficking andcounter-terrorism. The presentation will providea number of real-world scenarios thatchallenge the audience participants to try andinterpret the results and explain the outcomes.The goal of this presentation is to offeralternative interpretations for obvioussituations and complex analytical scenarios.Much of the content presented is based onMr. Westphal’s recent book, “Data Mining forIntelligence, Fraud & Criminal Detection:Advanced Analytics & Information SharingTechnologies” (CRC Press, December 2008).Christopher Westphal, CEO, Visual Analytics
8:30-12:10
Online Social Media andInvestigations (Three One HourSessions)Charles Cohen,
Cohen Training and Consulting, LLC Charles Cohen also holds the position ofCommander, Special Investigations andCriminal Intelligence, Indiana State Police,USA
The presentation is comprised of 3 one-hoursessions. The presentation gives attendees anup-to-date understanding of how socialnetworking sites work and how members actand interact. Through an exploration of casestudies, the second hour will focus oninformation that is available on various sites andhow to integrate that information into criminalinvestigations and criminal intelligence analysis.
1:20-3:40
Cyber Money Laundering ( Two onehour sessions)Now, every analyst, investigator, and riskmanager must at least understand the basics ofthe Internet online monetary transactions inorder to be effective. From eCash to onlineprepaid debit cards and from virtual currenciesto mobile payment systems, the Internet is apanacea for the active or aspiringentrepreneurial criminal. This tutorial is designedspecifically for the active private sectorinvestigator, criminal intelligence analyst,detective, or agent that wants to track theproceeds of unlawful activity and the movementof funds within a criminal organization. Charles Cohen,
Cohen Training and Consulting, LLC
SESSION B
SESSION C
SESSION B
SESSION B
SESSION A
SESSION A
SESSION A
SESSION A
SESSION B
SESSION B
4:00-5:00
What Investigators Need To KnowAbout Hiding On The InternetBoth public and private sector investigatorsand analysts need to understand how peopleconceal their identity on the Internet.Technology may be neutral, but the ability tohide ones identity and location on the Internetcan be both a challenge and an opportunity.This tutorial will focus on two main areas:• An exploration and comparison of various
ways of hiding ones identity and locationwhile engaged in activates on the Internet.
• The risks posed to those in the public arenaand those charged with protecting themassociated with online social media andonline social networking.
Charles Cohen, Cohen Training and Consulting, LLC
8:30-5:00
Bob Lottero, President, NTI Law Enforcement Services
Improving Communications IntelAnalysis and Reporting in FederalInvestigationsCutting edge analytical and presentationtechniques to exploit Communications Records(Landline, cell, VoIP, Satphone, Prepaid callingcards, and emails)
8:30-9:30
Processing paper and electroniccommunications records fromsubpoenas and pen orders for importto computerized Intel systems
9:50-10:50
Building an Effective Analytical Plan
11:10-12:10
Enhancing the results of basiccontact communications analysis(frequency, common call, etc.)
1:20-2:20
Advanced Communications TemporalAnalytical Theory
2:40-3:40
Development of High-PercentageLeads (probable possibilities)
4:00-5:00
A New Approach to Writing andPresenting Analytical Reports
8:30-12:10
Building and Operating World ClassLaboratory for eXtreme DigitalForensics and Cloud ComputingForensicsAlvaro Alexander Soto, Digital Forensic Lab
Director, ASOTO Technology Group
11:10-12:10
The Evolving Service ProviderLandscape and its Impact onManaging Network InterceptsJim Donnelly, Vice President of Sales – North
America, Glimmerglass
1:20-2:20
Off-network Voice and Video Servicesover IPYuval Altman, Director of Product
Management, Verint Systems
2:40-3:40
Demonstration of ComputerForensics Tools, Search Techniques,and Evaluation CriteriaMun-Wai Hon, CISSP, CSSLP, Principal System
Engineer, NOBLIS
4:00-5:00
Cell Phone Call and Cell TowerRecords for InvestigatorsCellular Data Resources will demonstrateanalysis and presentation techniques using a
sample set of CDR’s to provide attendees withpractical skills they can use in theirinvestigations.Brent Bailey, Cellular Data Resources
Track 8:
Spanish Language ISS Training TrackThis track repeats sessions previouslypresented in English
Construyendo y OperandoLaboratorios de Clase Mundial Para“eXtreme” Forense Digital yComputación en la NubeAlvaro Alexander Soto –
Director Laboratorio Forense Digital, ASOTO Technology Group
Plataforma única de Alta Precisiónpara Localización de TeléfonosCelulares: Propuesta de Valor paraGobierno y Operadores.Pedro Sotomayor, VP Sales – International,
Polaris Wireless
Redes malladas, comunicacionesmalladas, Intercepción Legalrevuelta…Ultimaco
“Risk Awareness Intelligence”™ yAnálisis the OrganizacionesTransnationales Criminales,Terroristas, y de Traficantes en laAmérica Latina y los EstadosUnidos.”Dr. Maria Velez de Berliner, President,
Latin Intelligence Corporation
Registration InformationSave $300 by registering before 3 September, 2010
Telecommunications Service Provider or Government Registration*
ISS World Conference Tracks, Pre-Conference Seminars and Exhibits ........................................$995Registration after 3 September 2010 .......................................$1,295
Law Enforcement/DHS/IC/DoD Registration*
ISS World Conference Tracks, Training Track 7, Pre-Conference Seminars plus Exhibits .......................................$995 Registration after 3 September 2010 .......................................$1,295
Vendor Registration*
ISS World Conference Tracks, Pre-Conference Seminars and Exhibits .....................................$1,995Registration after 3 September 2010 ........................................$2,295
*Note: To Attend the LEA/DHS/IC/DoD Training Track 7 you must be asworn law enforcement officer or military/intelligence/governmentemployee. Also you must register by October 1, 2010 in order to verifyeligibility. Government photo ID required for Track 7 classroom access.
Free Colleague Registration: Register as paid and you can invite acolleague to join you at ISS World Americas with a full, freeconference pass. If you have not identified your guest at this time,just enter “guest of” followed by your name and complete with yourcontact information. You can register your guest at no charge at alater time.
Conference and Exhibitions
The conference and exhibits will be held at the JW Marriott Hotel,Bethesda, MD in suburban Washington, DC. The DC Metro has a stopadjacent to the hotel.
International Attendees: If you need Visa assistance to attend ISSWorld, please contact Tatiana Lucas at [email protected]
Conference by Invitation Only: To attend ISS World you must be aTelecommunications Service Provider, government employee, LEA orvendor with LI, surveillance or network products or services. If youhave questions e-mail Tatiana Lucas at [email protected]
Phone: 1-703-734-7050
Fax: 1-703-734-9371
Online: www.telestrategies.com
Una Identificación e InvestigaciónCriminal Eficiente Usando el NuevoSistema ASIS Para InterceptacionesLegales Emilio MARTINEZ, Agnitio
La Deteccion Biometrica de LocutoresAbre Nuevos Horizontes en laIntercepción Masiva deConversaciones. Philippe Vinci
Identificación Precisa de Locutores enlos Laboratorios Forenses Antonio Moreno
Sistema Biométricode Detección deLocutor. Caroline Rey