MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence...

7
® 4-6 MARCH 2013 • JW MARRIOTT • DUBAI, UAE 81 LEA/Interior/DoD Training Sessions and Courses to Choose From ISS World ® MEA I ntelligence S upport S ystems for Lawful Interception, Criminal Investigations and Intelligence Gathering Register 1 and 2nd FREE! Associate Lead Sponsors Lead Sponsor Exhibitors and Sponsors Where Law Enforcement, Public Safety, Telecoms and the Intelligence Community turn for Technical Training and Product Selection Where Law Enforcement, Public Safety, Telecoms and the Intelligence Community turn for Technical Training and Product Selection

description

MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (2013)

Transcript of MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence...

Page 1: MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (2013)

®

4-6 MARCH 2013 • JW MARRIOTT • DUBAI, UAE

81 LEA/Interior/DoD Training Sessions and Courses to Choose From

ISSWorld®

MEAIntelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering

Register 1

and 2nd FREE!

Associate Lead SponsorsLead Sponsor

Exhibitors and Sponsors

Where Law Enforcement, Public Safety, Telecoms and the Intelligence Community turn for

Technical Training and Product Selection

Where Law Enforcement, Public Safety, Telecoms and theIntelligence Community turn for

Technical Training and Product Selection

Page 2: MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (2013)

For Complete ISS World® Conference Session Descriptions, Go To www.telestrategies.com

ISS World MEA is the world’s largestgathering of Middle East and African LawEnforcement, Intelligence and HomelandSecurity Analysts as well as TelecomOperators responsible for Lawful Interception,Hi-Tech Electronic Investigations and NetworkIntelligence Gathering.

ISS World Programs present themethodologies and tools for LawEnforcement, Public Safety and GovernmentIntelligence Communities in the fight againstdrug trafficking, cyber money laundering,human trafficking, terrorism and other criminalactivities conducted over today’stelecommunications network and the Internet.

ISS World MEATrack 1

ISS for Lawful Interception andCriminal Investigations

Track 2

ISS for Big Data Analytics andSocial Network Monitoring

Track 3

ISS for Mobile Location,Surveillance and Signal Intercept

Track 4

Encrypted Traffic Monitoring and ITIntrusion Product Demonstrations

Track 5

Lawful Interception and CriminalInvestigation ProductDemonstrations

Track 6

Social Network Monitoring andBig Data Analytics ProductDemonstrations

Track 7

Mobile Location, Surveillance andSignal Intercept ProductDemonstrations

Pre-Conference TrainingSeminars Monday, 4 March 2013

Seminar #1: 8:30-16:30

Practitioners Guide toInternet InvestigationsPresented by: Mark Bentley, Data CommsManager, Child Exploitation and OnlineProtection Centre (CEOP), UnitedKingdom

This is exclusively Law Enforcement only, asPractical examples, covert and investigativemethods will be given throughout theseminar.The aim of this 1 day seminar is totake the attendees from the basics ofunderstanding the internet, through to a fullunderstanding of best practice of an internetinvestigator, and having awareness of all thetools available to achieve this.

8:30-8:45 Introduction A 15 min introduction to thework of the Child Exploitation and onlineProtection Centre.

8:45-9:30

The World Wide Web and theInternetUnderstanding where an investigator needs tolook to find it.• How it works. Why it works. How datatraffic leaves a trace and

• What the internet is; what is an IP andwhat there is out there to help

• IPv4 and IPv6 – understanding the changes• mirror servers use and value• Virtual servers set up and use.9:45-10:45

Recognizing Traffic Data• A practitioner’s guide to what data isavailable. How to harvest and analyse it.

• Best practice to identify suspects and buildprofiles.

• Data collection and interrogation• IP usage, exploitation and dynamics; IPplotting and analysis how to look forsuspect mistakes and exploit them ( wherethey show their id)

• Dynamic approaches to identifyingsuspects through internet profiles

• What investigators get from tech andservice providers, and how to analyse it

11:00-12:00

WIFI and GPRS• A practitioner’s look at Wi-Fi, attribution, cellsite data, GPRS location services andtechnology. How an investigator can trackdevices, attribute suspects locations,devices and movement.

• Dynamic live time tracing• Geo location services and uses13:00-14:00

Emerging Technologies, MaskingTech and Tools• How suspects are using emerging and newtechnologies.

• An introduction to where technology isgoing, and how Law enforcement can usethis to our advantages.

• Darknet, (Deepweb) and IRC use• VOIP, Skype• Advanced data sniffing and profile building• TOR systems, applications and ways tocoax offenders out of the system.

14:15-15:15

Advanced Techniques in TracingSuspects• Using innovative and dynamic methods totrace offenders.

• Tricks used by suspects and how to combatthem

• Covert internet investigations• Directed and intrusive surveillanceauthorities- pitfalls and advantages

• Proxy servers and hiding.• Managing collateral intrusion • Reverse and social engineering• Profile building

ISSWorld®MEAIntelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering

4-6 MARCH 2013 • JW MARRIOTT • DUBAI, UAE

Exhibits5 March 2013, 10:00 a.m. - 5:00 pm

6 March 2013, 9:30 a.m. - 12:30 p.m.

NEW

Page 3: MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (2013)

15:30-16:30

Open Source Intelligence Training(OSINT)• An in depth look at what tools are available;how to use them, and practical applications.

• Safety online when open sourcing• Open source training and awareness basics• Trace suspects using available tools• How to identify leads in investigations anddata from ISP

• Internet tools to assist in building onlineprofiles on suspects

• A run through of my website dedicated toonline tracing tools and how best to use it(LEA ONLY)

• Reverse engineering and social engineering

(Seminar #1 only open to Law Enforcementand other Government Attendees)

Seminar #2: 8:30-16:30

Understanding ISS Technologiesand Products Deployed inTelecommunications Networksand Monitoring Centers for LawEnforcement and IntelligenceAnalysisPresented by: Dr. Jerry Lucas, President,

TeleStrategiesThis one day pre-conference seminar coversthe spectrum of ISS Technologies and Productsdeployed in today’s fixed wire, mobile wirelessand Internet Service Provider networks andLEA Monitoring and Intelligence GatheringCenters. This all day seminar is ideal for thoselaw enforcement, public safety and intelligenceanalysts who need an understanding of the ISStechnologies to be discussed in the conferencesessions and the ISS products displayed at theexhibit hall as well as an understanding of thebuzz words and jargon used by telecomoperator engineers and their vendors.

08:30-10:45

Understanding Wireline TelecomInfrastructure, Interception andRelated ISS ProductsWhat do LEAs need to know about the publicswitched telecommunications networks,circuit switching, fiber optics, SONET/SDH,Broadband Access (DSL, ADSL, CableModems, etc.), billing systems and call detailrecords, standards for lawful intercept, basicLI elements (access, delivery and collection

function), LEA Monitoring Center Functions(call information and call content datacollection) and where are ISS productsdeployed for monitoring and intercept.

11:00-2:00

Understanding Mobile WirelessInfrastructure, Interception andRelated ISS ProductsInfrastructure basics (GSM, GPRS, EDGE,UMTS, HSPA and LTE), Wi-Fi, WiMax andFemtocells, How a cellular call is processed,back office infrastructure, HLR, VLR, Backhauland PSTN interconnection, data services,SMS, MMS, IM, data services, fixed mobileconvergence, Smartphone challenges for LEA,intrusion techniques, gathering Geolocationdata, location technologies (A-GPS and RFfinger printing) and where are ISS productsdeployed for monitoring and intercept.

2:15-4:30

Understanding the Internet,Interception and Related ISSProductsWhat Investigators Have To Know about IP callIdentifying Information, Radius, DHCP, DNS,etc., Tracking an Internet Address to a Source,Investigations Involving E-Mail, Facebook,Twitter, Skype, Instant Messaging, ChatRooms and Message Boards, IMS, P2PNetworks and Deep Packet Inspection, BigData Analytics, defeating encryption,emerging IPv6 Challenges, Anonymous E-mailDetection, TOR, I2P and what can be done toaddress Internet intercept deploying ISSinfrastructure and where are ISS productsdeployed for monitoring and intercept.

Seminar #3: 8:30-16:30

Advanced IP Intercept TrainingPresented by: Dr. Hendrik Schulze,President & CTO and Jens Geier, ProductManager, ipoque

08:30-10:45

Understanding TCP/IP for PacketSniffing and Traffic AnalysisA brief introduction into network technologyand the basics of TCP/IP needed forinterception and the impact on propernetwork analysis. Based on this, theworkshop reflects the technical options forLEA’s to investigate in networks.

11:00-2:00

Deep Packet Inspection (DPI)Basics for LEA’s, IntelligenceAnalysts and Telecom OperatorsAn overview on deep packet inspectiontechnology (DPI) and its basic operationsdown to the application level. Skype is usedas example to show the implications ofcomplex network behavior on DPI.

2:15-4:30

Basics of IP Application DecodingFrom Packets to Structured DataThe workshop is a high-level introduction onbuilding decoder software starting fromrequirements on an example of softwarearchitecture. After an overview of all parts ofthe introduction the building blocks areelaborated.

Seminar #4: 8:30-16:30

Introduction to Audio, Video and GPS Surveillance:Equipment, Tactics andManagementPresented by James Deater, President,

T3TECHSYSTEMS, Joseph MessineseJr., Training Manager, T3TECHSYSTEMS.James Deater and Joseph Messinese Jr.are also officers with the MarylandState Police, USA.

This one day course will be an introduction toAudio, Video and GPS Surveillance:Equipment, Tactics and Management. AudioInterception investigations and ElectronicSurveillance is comprised of highly advancedinvestigative techniques/tools used by lawenforcement and intelligence agenciesthroughout the United States and abroad.These extremely valuable tools are often notused due to misconceptions and lack ofunderstanding. This one-day course willdemonstrate the basics for lawenforcement/intelligence agencies toovercome the fears of utilizing ElectronicSurveillance Equipment such as audiointerception equipment, pole cameras, groundbase camera systems, covert video, thermalcameras, GPS tracking devices, new bodywire technology, audio bugging devices andmuch more to further investigations andintelligence gathering like never before.

4-6 MARCH 2013 • JW MARRIOTT • DUBAI, UAE

ISSWorld®MEAIntelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering

NEW

Page 4: MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (2013)

08:30-09:30

Camera SystemsIntroduction to Miniature Video Surveillance,Covert Video Operational Consideration,Working with IP Video Systems andTransmission Across Internet, CovertEnclosures, Simple Image Only vs. FullMotion Video Systems, Thermal Imaging andInfrared Cameras (FLIR), Pole Mount Camerasand Power Considerations and MotionSensing Cameras

09:45-10:45

GPS TrackingIntroduction to GPS Tracking Technologies,GPS Tracking and Device Placement,Integration with Cellular OperatorInfrastructure and Operations, GPS Unit CostConsiderations, GPS Geofensing andGeolocation and Monitoring Consideration

11:00-12:00

Wireless TechnologyConsiderationsIntroduction to Wireless Technologies andSurveillance Considerations, IntelligenceGathering Consideration, Covert Operationand the use of Two Way Radios, CellularListening Devices/Audio Bugging Devices:Size and Control and Off Air MonitoringSystems

1:00-2:00

Wiretap Technologies, AudioCollectionIntroduction to Wiretap Technologies, AudioCollection devices, PEN Registers, CaseManagement, Recording Mediaconsiderations and Audio/Video evidenceprocedures and considerations

2:15-3:15

Body Wires and Audio BuggingDevicesIntroduction to Audio/Video TransmitterConsiderations – Including New Body WornCameras, Covert Operation Consideration,Short vs. Long Range Consideration –Choosing the Correct Technology, Cell PhoneBody Wire Considerations – New Technologyand Special Accessories for Covert Operations

3:30-4:30

Management of Intelligence andOther Surveillance OptionsIntroduction to Portable Surveillance Systems– Quick Deployment Units, Drug andExplosive Detection, Intelligence Gatheringand Crowd Control, Real Time ArialSurveillance Operations, Building and ParkingLot Monitoring and Secure In-Vehicle StorageSystems and Sensor Systems for RemoteMonitoring

( The T3TECHSYSTEMS Seminar is for lawenforcement and other government attendeesonly)

Tuesday, 5 March 2013

Welcoming Remarks8:15-8:30Tatiana Lucas, ISS World Program Director,

TeleStrategies8:30-9:00

Top Ten Internet Challenges FacingLaw Enforcement and theIntelligence Community and Whoat ISS World MEA has SolutionsDr. Jerry Lucas, President, TeleStrategies

Track 1:

ISS for Lawful Interceptionand Criminal InvestigationsThis track is for Telecom Operators and LawEnforcement/Intelligence/Defense Analystswho are responsible for specifying ordeveloping lawful intercept networkinfrastructure.

Tuesday, 5 March 2013

9:00-9:30

Integrated Information Extractionand Intelligence Mining SolutionZTEsec presenter to be announced9:30-10:00

New LI challenges. A CountrywideIntegrated Solution: Voice, Data,Positioning and EncryptionCristian D’Incertopadre – International Sales,

IPS11:30-12:00

Lawful Interception and Retentionof Telecom Services vs. DataProtectionRené Nitzinger, Product Manager, Utimaco

LIMS 12:00-12:30

Putting digital investigations inthe hands of detectivesGlobal Security Network presenter to beannounced

14:00-14:30

FoCC: Filtering of CommunicationContentRudolf Winschuh, Partner Sales Manager,

Utimaco LIMS14:00-14:30

IPv6, Identities & DPIHendrik Schulze, President & CTO, ipoque14:30-15:00

Communication Surveillance inthe Fight Against ChildExploitation - Re-balancing theEthical DebateAREA presenter to be announced15:30-16:00

Challenges in cross domainsolutions for Lawful InterceptionGlobal Security Network presenter to beannounced

16:00-16:30

Plug and Replay™: The Benefits ofan Open IP Reconstruction &Analysis PlatformBob Brandt, Product Manager Replay,

NetScout

Wednesday, 6 March 2013

8:30-9:00

Disappearing in the CloudJens Geier, Product Management, ipoque

Note: Lawful Interception and CriminalInvestigation Product DemonstrationSessions Scheduled in Track 5

Track 2:

ISS for Big Data Analyticsand Social NetworkMonitoringThis track is for Intelligence Analysts and LawEnforcement agents who have to “connectthe dots” between people, places and otherentities by searching through massiveamounts of unstructured data from varioussources using visual analytics, semantictechnologies, data mining, OSINT and otherintelligence gathering tools and techniques

Tuesday, 5 March 2013

9:00-9:30

Geospatial solutions for NationalSecurityPaul Christin, Esri9:30-10:00

How to manage mass IP, SocialNetwork & Web SurveillanceAccount Director, trovicor9:30-10:00

Integrated Intelligent Profilingwith OSINTBasem Abu Ayash, Creative Technosoft

Systems

11:30-12:00

Handling “very big data” and findthe right targetAdvanced Middle East Systems presenterto be announced

12:00-12:30

The constant risk of Cyber threatsSolution Architect, trovicor

12:00-12:30

Surveillance of FinancialTransactions and its Impact onIntelligence InsightJayesh Nana, CEO – iSolv Technologies

14:00-14:30

Social Media and LI: TechnologyPerspectiveC2Tech presenter to be announced

SESSION A

SESSION B

SESSION A

SESSION A

SESSION B

SESSION B

SESSION B

Page 5: MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (2013)

14:30-15:00

Big Data Analytics: AnInvestigative Tool for SecuringNetwork Infrastructure”Marco Germoni, Director of EngineeringApplications & Services, ISC8

Note: Social Network Monitoring and BigData Analytics Product DemonstrationSessions Scheduled in Track 6

Track 3:

ISS for Mobile Location,Surveillance and SignalInterceptThis track is for Law Enforcement, InteriorSecurity and the Intelligence CommunityAuthorities who must work with cellular andmobile satellite operators regarding mobilelocation, surveillance and intercept as well asanalysis of mass geo-location data.

Tuesday, 5 March 2013

9:00-10:00

Cellular Tracking and localization.Vehicle based and PortablesolutionsNeoSoft AG presenter to be announce11:30-12:00

Introducing Da Vinci: attack,control and gather intelligencefrom personal devices.David Vincenzetti, Partner, Hacking Team12:00-12:30

MOBILE TRACKER: Essential toolfor pinpointing mobile locationPatrick, Sales Manager, SEMPTIAN

Technologies11:30-12:30

The Evolution of LocationSurveillance: Combining High-Accuracy Location withComplementary Technologies andData Streams to DeliverActionable IntelligenceMahesh Patel, SVP Products andTechnology, Polaris Wireless

14:00-14:30

Securing Infrastructure andBorders with Location IntelligenceTruePosition presenter to be announced14:30-15:00

Active, Passive and Hybrid GSM &3G Monitoring systems. Newchallenges (Randomization, etc.).Practical solutions.NeoSoft AG Speaker to be announced 15:30-16:00

Why Smartphones are becomingmore and more essential assources of important data forcrime investigation andintelligence gatheringAnna-Maija Graus, Micro Systemation

10:30-11:00

Real Life use Cases: CrimePrevention by combining invisibleCell Phone Positioning andBehavioral AnalysisMikael Nyström, CEO, Mobilaris AB

Note: Mobile Location, Surveillance andSignal Intercept Product DemonstrationSessions Scheduled in track 7

Track 4:

Encrypted TrafficMonitoring and ITIntrusion Product TrainingThis track is only open to Law Enforcement,Public Safety and Government IntelligenceCommunity Attendees

Tuesday, 5 March 2013

9:00-10:00

FinFisher - Actively MonitoringNetworks, Computers and MobilePhonesMJM, Gamma Group11:30-12:30

VUPEN Sophisticated Exploits forIT intrusion and OffensiveSecurityChaouki Bekrar, CEO & Director ofVulnerability Research, VUPEN

14:00-15:00

Governmental IT Intrusion:Applied Hacking Techniques usedby GovernmentsMJM, Gamma Group15:30-16:30

Da Vinci: a spy story aboutbusting a terrorist organization byusing the most advancedoffensive technology.Marco Valleri, Head of R&D, AlbertoOrnaghi, Senior Software Developer andAlberto Pelliccione, Senior SoftwareDeveloper, Hacking Team

Wednesday, 6 March 2013

8:30-9:00

Encryption Anywhere andEverywhere. Now What? AnAnalysis of Possible WorkaroundsAREA presenter to be announced9:00-9:30

Less invasive than a Trojan andless complicated than a StrategicSolution: the new IPS EncryptedTraffic MonitoringUgo Santillo – International Sales Director,

IPS

10:30-11:30

Da Vinci: a live demonstrationof unrivaled attack capabilitiesand total resistance to detection,quarantine and removal by anyendpoint security technology.Marco Valleri, Head of R&D, AlbertoOrnaghi, Senior Software Developer andAlberto Pelliccione, Senior SoftwareDeveloper, Hacking Team

12:00-12:30

Tactical IP Intercept for HTTPSMonitoring & Remote IntrusionJitendra Verma, Manager, BusinessDevelopment, ClearTrail Technologies

12:30-13:00

‘Dark Eagle’: The ultimate solutionfor DSL voice and datainterception and remote systemintrusionRomanelli Massimo (CEO), GR SISTEMI

SRL

Track 5:

Lawful Interception andCriminal InvestigationProduct DemonstrationTrackThis track is only open to Law Enforcement,Public Safety and Government IntelligenceCommunity Attendees

Tuesday, 5 March 2013

11:30-12:30

Flexible IP CommunicationSurveillance Solutions - Adaptingto Your Investigative Needs andObjectivesAREA presenter to be announced14:00-15:00

Replay NetAnalyst 3.0 - The NextGeneration in Advanced IPReconstructionBob Brandt, Product Manager Replay,

NetScout15:30-16:30

Application & User DataInterception Demo Jens Geier, Product Manager, ipoque

Wednesday, 6 March 2013

8:30-9:30

NetRASAT: Scalable End-to-End IPLI SolutionC2Tech presenter to be announced12:00-13:00

A Countrywide MonitoringCenters solution: Voice, Data andPositioningCristian D’Incertopadre – International Sales,

IPS

SESSION A

SESSION A

SESSION B

Page 6: MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (2013)

Track 6:

Social NetworkMonitoring and Big DataAnalytics ProductDemonstration TrackThis track is only open to Law Enforcement,Public Safety and Government IntelligenceCommunity Attendees

Tuesday, 5 March 2013

9:00-10:00

Applying Artificial Intelligence inMass Monitoring of IP dataManohar Katoch, AVP-BusinessDevelopment, ClearTrail Technologies

9:00-9:30

Integrated Mass CommunicationMonitoring – A new paradigm inSurveillance & Big Data AnalyticsVehere speaker to be announced9:30-10:00

Speech Analytics in ElectronicWarfare – Myth vs RealityVehere speaker to be announced11:30-12:00

Cell Based Monitoring Solution –a new approach to handle massrecordingsSolution Architect, trovicor11:30-12:00

Data Discovery-tracking theunknown criminal in a sea ofcommunicationsPamela Warren, Director, SS8 Solutions14:00-14:30

Intelligence Platform – TargetprofilingSolution Architect, trovicor

14:00-14:30

POMS: An eagle’s view ofFacebook & TwitterDaniel, Marketing director, SEMPTIAN

Technologies14:30-15:00

GMAIL RETRIEVER: An innovatesystem for LI monitoring George, CEO, SEMPTIAN Technologies

Wednesday, 6 March 2013

8:30-9:30

Smart Intrusion on SocialNetwork and Webmails: the HttpsMonitoring & Analysis Fabio Romani – Market Strategy, IPS9:00-9:30

Intelligence Platform – TargetprofilingSolution Architect, trovicor10:30-11:30

Recall Intelligence Fusion Centersupports Intelligence-drivenOperationsJayesh Nana, CEO – iSolv Technologies10:30-11:00

Cell Based Monitoring Solution –a new approach to handle massrecordingsSolution Architect, trovicor11:00-11:30

Mass metadata Analysis – Revealthe unknownSolution Architect, trovicor

Track 7:

Mobile Location,Surveillance and SignalIntercept Product TrainingThis track is only open to Law Enforcement,Public Safety and Government IntelligenceCommunity Attendees

Tuesday, 5 March 2013

9:00-10:00

Cobham’s RF/GSM/Satellite Tagand Tracking Integrated Solution15:30-16:30

TruePosition LOCINT solutiondemonstration including mobileclient.15:30-16:00

PHOENIX” : undetectable GPS &AUDIO deviceGiacomo Cera, GR SISTEMI SRL

Wednesday, 6 March 2013

8:30-9:30

XRY and XAMN – tools that givefull view of mobile phone data forcrime investigation andintelligence purposesMicro Systemation presenter to beannounced

10:30-11:30

IMSI/IMEI Catcher. InPoint SMSSystem – Mass EmergencyNotification. Neosoft AG 12:00-13:00

FENCING IN THE THREAT: Mobileidentification and alert systemJacques, Sales, SEMPTIAN Technologies

SESSION A

SESSION B

SESSION B

SESSION B

SESSION B

SESSION B

SESSION B

SESSION A

SESSION B

SESSION B

SESSION A

SESSION B

Registration InformationSave $300 by registering before 31 January, 2013

Telecommunications Service Provider or Government RegistrationISS World Conference (Tracks 1 to 3), Pre-Conference Seminars and Exhibits ........................................$995Registration after 31 January 2013 ..........................................$1,295

Law Enforcement/DHS/IC/DoD Registration*ISS World Conference (Tracks 1 to 3), Training Tracks 4-7, Pre-Conference Seminars plus Exhibits .......................................$995 Registration after 31 January 2013 ..........................................$1,295

Vendor RegistrationISS World Conference (Tracks 1 to 3), Pre-Conference Seminars and Exhibits .....................................$1,995Registration after 31 January 2013 ...........................................$2,295

*Note: To Attend the LEA/DHS/IC/DoD Training Tracks 4-7 you must be asworn law enforcement officer or military/intelligence/governmentemployee. Also you must register by 28 February 2013 in order to verifyeligibility. Government photo ID required for Tracks 4-7 classroom access.

Free Colleague Registration: Register as paid and you can invite acolleague to join you at ISS World MEA with a full, free conferencepass. If you have not identified your guest at this time, just enter“guest of” followed by your name and complete with your contactinformation. You can register your guest at no charge at a later time.

Conference and Exhibitions: JW Marriott Hotel Dubai. To reserve a room go to http:// cwp.marriott.com/dxbae/issworlddubai orcall 971 42624444.

International Attendees: If you need Visa assistance to attend ISSWorld, please contact Tatiana Lucas at [email protected]

Conference by Invitation Only: To attend ISS World you must be aTelecommunications Service Provider, government employee, LEA orvendor with LI, surveillance or network products or services. If youhave questions e-mail Tatiana Lucas at [email protected].

Registration

Phone: 1-703-734-7050Fax: 1-703-734-9371

Online: www.issworldtraining.com

Page 7: MiddleEast Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering (2013)

ISS World® MEA Exhibits5 March 2013, 10:00 a.m. - 5:00 pm • 6 March 2013, 9:30 a.m. - 12:30 p.m.

Lead SponsorsISSWorld®MEAtrovicor is an established leading supplier of intelligence solutions for Law Enforcement and Government Agencies, worldwide. The companyrepresents almost two decades of industry experience in customer-centric development of state-of-the-art monitoring centers and intelligenceplatforms for the security market. Headquartered in Munich, Germany and with affiliate offices in Europe, Middle East, Asia-Pacific, trovicor servicesLaw Enforcement and Government Agencies in the security sector with deployments in more than 100 countries. The trovicor systems captureinteractions, transactions and surveillance from multiple sources, including fixed line as well as mobile telephone, radio communication, email, web,chat, social media, and more.

Associate Lead SponsorsAccessData Group has pioneered digital investigations for 20+ years. Clients rely on AccessData’s technologies for incident response and cybersecurity. Its new CIRT security framework integrates network analysis, host analysis and large-scale auditing into a single interface and facilitatescontinuous monitoring, while enabling more effective handling of advanced persistent threats and data spillage.

Advanced Middle East Systems (AmeS) is a provider in Comint solutions ; AmeS provide lawful interception system for voice and IP. We arespecialized in handling very big data streams (several 100GBit/s), being able to retrieve any interesting information thanks to our embedded“Analytics Intelligence” and our Intelligent Data Retention System. AmeS can provide also massive passive GSM off the air interception system.

AQSACOM is a global leader in Telecommunications Security Solutions, providing real-time Lawful Interception, Data Retention, Mobility Tracking andSurveillance Solutions. AQSACOM’s core business focuses upon end-to-end, turnkey systems for fulfilling Lawful Interception requirements.AQSACOM’s diverse customer portfolio includes clients from more than 35 countries. Regional offices are located in Paris, Dubai, Hyderabad,Melbourne, Florianopolis, and New York City.

AREA is a market-leading independent provider of turn-key, fully integrated end-to-end communication surveillance solutions for law enforcementorganizations worldwide. The MCR solution portfolio ranges from interception/mediation to collection/retention as well as data analysis. Leveragingour extensive track-record and field experience, we aim to provide solutions which simplify complexity.

ATIS systems – with its integrated lawful interception and monitoring system Klarios® 2.0 – has been a technology leader in the industry for over 60years. The underlying philosophy of the Klarios® solution suite is to provide fully integrated turnkey solutions with a modular, flexible and scalablearchitecture. Founded and headquartered in Bad Homburg, Germany, the ATIS Group has 200 employees in five countries across Europe, Asia andNorth America. www.atis-systems.com

ClearTrail is leading provider of communication monitoring solutions to LEA’s, Intelligence Agencies and Telecom carriers worldwide. Our solutions aredeployed across hundreds of communication links and empower agencies to: Mass Intercept GSM/CDMA, PSTN, GPRS; EDGE, 3G/3.5G, Wi-Max,VSAT, & IP links; Monitor Wi-Fi networks and replay HTTPS sessions; Analyze vast amount of information; Remote intrusion and monitoring.

Cobham Tactical Communications and Surveillance is a world leader in securing, sharing and communicating situational awareness in challengingenvironments, from urban environments to the digital battlefield. It provides specialist communications, security and surveillance products togetherwith integrated systems and solutions to 18 armed forces and more than 140 agencies globally.

Gamma International has developed for Law Enforcement and Intelligence Agencies its own FinFisher IT Intrusion Portfolio, which is acomprehensive range of professional offensive tools for information gathering, sniffing, manipulation and exploitation. FinFisher is proving to beinstrumental in the fight against child pornography, cybercrime, pedophilia, human trafficking, drug smuggling, terrorism, and other criminal [email protected]

Global Security Network (GSN) is a UAE based French-owned Company with more than 12 years of experience in delivering large high-end ITSecurity projects to organizations in the Middle East. GSN focuses on delivering specialized IT Security solutions through Value-Added Distribution tocustomers like Government High Security, Military, Air Defense, Law Enforcement and Critical National Infrastructure companies in the Middle East.

Hacking Team provides the premier offensive technology solution: Remote Control System. Proven by more than 10 years of adoption and designedto fulfill LEAs and Security Agencies expectations, newly released version 8 “Da Vinci” gives you total control over endpoint devices, offering thewidest selection of infection vectors, showing total invisibility to protection systems and implementing the most sophisticated data gatheringtechniques. www.hackingteam.com

NeoSoft AG is a world-wide known manufacturer of Monitoring security systems such as: Passive, Active (Semi-Active), Hybrid GSM Monitoringsystems with A5.2/A5.1 deciphering; CDMA Passive Monitoring systems; IMSI/IMEI Catchers 2G and 3G and InPoint SMS System. All our systemssupport the following bands: GSM, PCS, EGSM, 2100 and 850. Our systems are widely used for victim detection and recovery during various acts ofterrorism and natural disasters.

Polaris Wireless is the global leader in high accuracy, software-based wireless location solutions to law enforcement/government agencies. PolarisWireless has successfully completed 14 deployments for lawful location surveillance in Asia and EMEA. Polaris Wireless is the recipient of the Frost& Sullivan “2011 Enabling Technology of the Year” award and was named to the 2012 Inc. 5000 list of fastest-growing private companies.

With more than 180 installations in 70 countries, Utimaco is a leading global supplier in the lawful interception market. Since 1994 Utimaco has beenproviding systems for network operators and Internet service providers. In addition at the request of telecom customers for an integrated lawfulinterception and data retention solution, Utimaco introduced the Data Retention Suite corresponding to the EU directive 2006/24/EC, visithttp://lims.utimaco.com

Vehere is a niche R&D firm specializing in the field of Homeland Security whose solutions have helped Law Enforcement and National SecurityAgencies to intercept, visualize & decipher the voice & vast telecom/internet information. Vehere already holds 5 copyrights with TechnicalPowerhouses including IJCN, NASA & CERN, Harvard, Cornell University and other prestigious Agencies for its research on Next GenerationCommunication Technologies.

VUPEN is the leading provider of IT intrusion and offensive cyber security capabilities. VUPEN provides sophisticated exploits (attack/infectionvectors) specifically designed for the Intelligence community, LEAs, and national security agencies. VUPEN takes advantage of undisclosed “zero-day” vulnerabilities, and bypasses all modern security protections and exploit mitigation technologies such as DEP, ASLR, sandboxes and Antivirusproducts. http://www.vupen.com

ZTEsec is a subsidiary company of ZTE Corporation which is a major player in the worldwide telecom market. ZTEsec was founded in 2003 andfocusing on R&D for network security and surveillance solution to our customers. Our company is also encouraging high efficiency and innovation,which also plays a lot of attention to realize the value of society, customers and staff.