vrijdag 28 april 2017

Un rappel pour ceuX que cela intéresse... Qui fait quoi?... TAXES & TRADE...

https://www.issworldtraining.com... un rappel:

"The Communications Taxation Conference brings together the nation's top taX professionals to address the challenging and amazingly compleX domain of telecommunications taXation and compliance."

Pour tous les eXperts fiscauX de la planète: qui fait quoi dans le commerce en ligne? Les équipes de la police européenne connectée, bien connectée, même avec les équipes de l'OTAN qui revoient leurs stratégies dans les affaires mondialisée , en lien avec les comptes bancaires les mieuX fournis: où va l'argent? qui fait quoi dans les transactions financières? Les banquiers pensent se retrouver avec les équipes policières et la Commission européenne à la régulation mieuX pensée, un face à face, avec les plus gros comptes bancaires qui participeraient aussi, même les plus riches fondations.

http://www.issworldtraining.com/

http://www.issworldtraining.com/ISS_EUROPE/

ISS World Europe is the world's largest gathering of European Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic Investigations and Network Intelligence Gathering.

ISS World Programs present the methodologies and tools for Law Enforcement, Public Safety and Government Intelligence Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's Telecommunications network, the Internet and Social Networks.

For more information about the 2014 program, click on the track name below -- or see the agenda at a glance for a summary of the sessions.

Track 1: ISS for Lawful Interception and Criminal Investigations
Track 2: ISS for Social Network Monitoring and Big Data Analytics
Track 3: ISS for Mobile Location, Surveillance and Signal Intercept
Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training
Track 5: LEA and Intelligence Analyst Training and Product Demonstrations
Track 6: Social Network Monitoring and Big Data Analytics Product Demonstrations
Track 7: Mobile Location, Surveillance and Signal Intercept Product Demonstrations

Pre-Conference Training Seminars (Tuesday, 3 June 2014)

ISS World Europe - Conference Agenda at a Glance

3-5 June 2014

Pre-Conference Training Seminars

Tuesday, 3 June 2014

Seminar #1
8:30-4:30

Online Social Media and Internet Investigations
Presented by Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Commander, Cyber Crimes and Investigative Technologies Section, Indiana State, USA


8:30-9:30: Session 1 of 6

What Investigators & Analysts Need to Know about Online Social Media.

9:45-10:45: Session 2 of 6
OSINT and Criminal Investigations

11:00-12:00: Session 3 of 6
Successful Use of Online Social Media in Criminal Investigations

1:00-2:00: Session 4 of 6
Counterintelligence & Liabilities Involving Online Social Media

2:15-3:15: Session 5 of 6
Facebook: Tools, Tricks, & Techniques Investigators Need to Know

3:30-4:30: Session 6 of 6
What Investigators Need to Know about Hiding on the Internet


Seminar #2
8:30-16:30

Understanding ISS Technologies and Products Deployed in Telecommunications Networks and Monitoring Centers for Law Enforcement and Intelligence Analysis
Presented by: Dr. Jerry Lucas, President, TeleStrategies

This one day pre-conference seminar covers the spectrum of ISS Technologies and Products deployed in today's fixed wire, mobile wireless and Internet Service Provider networks and LEA Monitoring and Intelligence Gathering Centers. This all day seminar is ideal for those law enforcement, public safety and intelligence analysts who need an understanding of the ISS technologies to be discussed in the conference sessions and the ISS products displayed at the exhibit hall as well as an understanding of the buzz words and jargon used by telecom operator engineers and their vendors.


08:30-10:45
Understanding Wireline Telecom Infrastructure, Interception and Related ISS Products

11:00-14:00
Understanding Mobile Wireless Infrastructure, Interception and Related ISS Products

14:15-16:30
Understanding the Internet, Interception and Related ISS Products

Seminar #3
8:30-16:30

Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1 day seminar is to take the attendees from the basics of understanding the internet, how to find data, through to a full understanding of best practice of an internet investigator, having awareness and knowledge of all the tools available to achieve this.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar.


8:30-9:30
The World Wide Web and the Internet

9:45-10:45
Recognizing Traffic Data

11:00-12:00
WiFi and Mobile Data Intercept

13:00-14:00
Emerging Technologies, Masking Tech and Tools

14:15-15:15
Advanced Techniques in Tracing Suspects

15:30-16:30
Open Source Intelligence Training (OSINT)

Seminar #4
8:30-10:45

Beyond Google: What to Do When Google (Bing and Yahoo) Do Not Answer Your Questions in a Useful Way
Presented by Stephen Arnold, ArnoldIT

The purpose of this tutorial is to provide recommendations for specific online search tactics tailored to law enforcement and intelligence professionals. In this two hour session, Stephen E Arnold will walk through "how tos" for four specific cases/situations in which free open source online services can help handle the types of questions investigators and analysts often have in different languages.

Questions the presentation will address include:

- What are important tips to work around Google filters for general queries?
- When should Bing or Yahoo be used to dig more deeply into open source content?
- How does an investigator/analyst research content in language other than English?
- How does an investigator translate non-English content in real time and for free?
- What free tools are available to determine relationships among and between persons of interest?
- What free and open source information services provide current data about individuals and their activities?
- What free system displays relationships and telephone numbers in the Bing index?
- How can an investigator / analyst maximize time in a critical research task?

Seminar #5
11:00-12:00

Smart Systems Substance or Shadow, Blind Spots or Shadow. Blind Spots in Mainstream Intelligence Systems
Presented by Stephen Arnold, ArnoldIT

Despite the high profile of Big Data and surveillance in the
US, the systems used by intelligence and law enforcement
professionals have limitations.

This lecture will seek to answer these key questions for practitioners in intelligence:

- Are next generation systems delivering value to licensees?
- Are sophisticated systems hardened and reliable?
- What are the limitations within which these smart systems operate for the intelligence professional?

Seminar #6
1300-14:00

The Dark Side of the Internet - TOR & Bitcoins
Presented by Ross Bowerman, Detective Sergeant, UK Police

Seminar #7

14:15-16:30

Smartphone Application Challenges Encountered and Opportunities Presented to Law Enforcement
Presented by Michael Williamson, Detective Inspector, Force Intelligence Bureau, Crime and Safer Communities, UK

A users overview of Smartphone applications, what they can do, implications, challenges and opportunities for law enforcement in obtaining results and coordinating our response to the overwhelming new apps appearing daily.

Pre-Conference Sessions Description At The End of Agenda PostinG

Wednesday, 4 June 2014

Welcoming Remarks

8:15-8:30
Tatiana Lucas, ISS World Program Director, TeleStrategies

8:30-9:00

Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Europe has Solutions
Moderator: Dr. Jerry Lucas, President, TeleStrategies

ISS World Europe Exhibit Hours:
Wednesday, 4 June 2014: 10:00 - 17:00

Thursday, 5 June 2014: 9:30 - 12:30

Track 1: ISS for Lawful Interception and Criminal Investigations

This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure.

Wednesday, 4 June 2014

9:00-9:30 Forensic grade Tactical surveillance and Monitoring Centre portability, High Quality and Mobility in nowadays surveillance
Presented by AREA
9:30-10:00 Keeping up with new Security Trends & Surveillance Technologies
Presented by trovicor
11:30-12:00 Session A Today’s interception in an Encrypted, Social and Clouded World.
David Vincenzetti , CEO, Hacking Team
11:30-12:00 Session B How to Track Terrorist on the Internet
Presented by HIWIRE™ System
12:00-12:30 Activate the Intelligence to expand the Security.
GENESI Suite: the most complete Communication Intelligence Platform
Ugo Santillo, Sales Director, IPS
13:30-14:00 LI Going dark
Rudolf Winschuh, Utimaco Safeware AG
14:00-14:30 True 100G BASE-xR4 single server data capture
Presented by Fiberblaze
15:00-15:30 Session A RAN Aware Network Intelligence and End-to-End Monitoring
Chandresh Ruparel, Radisys
15:30-16:00 Session A Building a Center of Excellence Digital Forensics Lab: Initial considerations ; what capabilities do you want; strategy for success
Presented by Phil Harrold, AGT
15:00-16:00 Session B ETSI/TC LI Standards Update: Part 1
Presented by Gerald McQuaid, Chairman, ETSI/TC LI
and Committee Members
16:30-17:30 ETSI/TC LI Standards Update: Part 2
Presented by Gerald McQuaid, Chairman, ETSI/TC LI
and Committee Members

Thursday, 5 June 2014

8:30-9:00 Who Is Talking and What? - Power of Speech Technologies
Radim Kudla, Head of Business Development, Phonexia
9:00-9:30 Application level interception in 100G networks
Presented by INVEA-TECH
10:30-11:00 Lawful Interception Consolidation - A case study
Presented by Utimaco Safeware AG
12:30-13:30 The Dark Side of the Internet - The Hidden TOR and I2P and How they Function
Ross Bowerman, Detective Sergeant, UK Police

Note: Lawful Interception and Criminal Investigation Product Training and Demonstrations Scheduled in Track 5

Track 2: ISS for Social Network Monitoring and Big Data Analytics

This track is for Intelligence Analysts and Law Enforcement agents who have to “connect the dots” between people, places and other entities by searching through massive amounts of unstructured data from various sources using visual analytics, semantic technologies, data mining, OSINT and other intelligence gathering tools and techniques

Wednesday, 4 June 2014

9:00-9:30 Maintaining cyber intelligence in expanding data networks
Glynn Barrett – Product Manager, Telesoft Technologies
9:30-10:00 CREATING THE HAYSTACK AND FINDING THE NEEDLE WITHIN
Lilach Shenker, Marketing Manager, NICE
11:30-12:00 INVESTIGO - From Information to Intelligence - A multifaceted intelligence analysis
Federico Ciceri, RCS
12:00-12:30 IP Deep Investigation Analytics
Presented by trovicor
13:30-14:00 Making Sense of the Deep Web: Examples of Practical Case Studies and Methodology
Presented by 3iMind
16:30-17:00 Voice Analytics - How to Mine Data from Speech Records
Radim Kudla, Head of Business Development, Phonexia
17:00-17:30 CyberCrime Intelligence-Case Studies
Presented by HIWIRE™ System

Thursday, 5 June 2014

8:30-9:00 Opening the Floodgate: Enabling you to Capture and Analyze Big Data Traffic
Christopher Bihary, CEO/Founder, Garland Technology, LLC
9:00-9:30 DESOMA IP-Analysis - Daisy, a different approach
Michael Wahl, Senior Sales and Business Development Manager, Desoma GmbH
10:30-11:00 Handling “very big data” and find the right target
Presented by Advanced Systems
11:00-11:30 Deep Analytics-Going beyond Big Data
Presented by HIWIRE™ System
12:30-13:30 Beyond Google: What to Do When Google (Bing and Yahoo) Do Not Answer Your Questions in a Useful Way
Stephen Arnold, ArnoldIT

Note: Big Data Analytics and Social Network Monitoring Product Training and Demonstrations Scheduled in Track 6

Track 3: ISS for Mobile Location, Surveillance and Signal Intercept

This track is for Law Enforcement, Interior Security and the Intelligence Community Authorities who must work with cellular and mobile satellite operators regarding mobile location, surveillance and intercept as well as analysis of mass geo-location data.

Wednesday, 4 June 2014

9:00-9:30 Geo Location Resolution – a stepping stone towards tacking the attribution challenge
Esti Peshin, Director of Cyber Programs, IAI-ELTA
9:30-10:00 Hybrid Tactical LTE, 3G & GSM IMSI Catchers
Presented by Septier Communication
13:30-14:00 How the future of policing depends on the latest innovations in wireless and cellular
Tim Phipps, Business Development Wireless, Cambridge Consultants
14:00-14:30 Hybrid LTE, 3G, & GSM Accurate Location tracking
Presented by Septier Communication
15:00-15:30 Trackwise – real time location application used by the Law Enforcement Agencies
Richard Lee, Creativity Software

15:30-16:00 Modern Approaches in Cyber Analytics – utilizing techniques from advanced EW and Radar arena
Guy Alon, Marketing Director, IAI-ELTA

Thursday, 5 June 2014

12:30-13:30 Smartphone Application Challenges Encountered and Opportunities Presented to Law Enforcement
Michael Williamson, Detective Inspector, Force Intelligence Bureau, Crime and Safer Communities, UK

Note: Mobile Location, Surveillance and Signal Intercept Product Training and Demonstrations Scheduled in Track 7

Track 4: Encrypted Traffic Monitoring and IT Intrusion Product Training

This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees

Wednesday, 4 June 2014

9:00-10:00 Session A VUPEN Zero-Day Exploits for IT intrusion (Computers & Mobiles)
Chaouki Bekrar, CEO & Director of Vulnerability Research, VUPEN
9:00-10:00 Session B DARK EAGLE: Fully configurable Convert IT intrusion and collection solution. Case studies and tips
Giacomo Cera, GR Sistemi
11:30-12:30 Session A Using Open-Source tools to conduct Governmental Investigations against Serious Crime
Presented by FinFisher GmbH

11:30-12:30 Session B Virtual Human Intelligence for Digital Agents. Dual Use 2.0 Digital Infiltration
Presented by AREA

13:30-14:30 Session A
Identifying criminal organizations on social networks by intruding communications devices.
Marco Valleri - CTO, Alberto Ornaghi – Software Architect, Alberto Pelliccione – Senior Software Developer, Hacking Team
13:30-14:30 Session B Do It Yourself (DIY) Program for Trojan Based Monitoring
Jitendra Verma, Manager, Business Development, ClearTrail Technologies
15:00-16:00 Session A FinFisher- Next Generation Governmental Surveillance.
Focus: Mobile Phone Monitoring
Presented by FinFisher GmbH
15:00-16:00 Session B Profile and Attack
Fabio Romani, CMO, IPS

Thursday, 5 June 2014

8:30-9:30 Session A Encryption of mass-communication changed the game’s rules, learn how to stay ahead of threats with Remote Stealth Surveillance
Presented by AGT
8:30-9:30 Session B Live Demonstration of OpenMIND: A True, Deep Web, End-to-End Intelligence Solution
Presented by 3iMind
10:30-11:30 Session A Intruding communication devices: live demonstration of latest attack techniques.
Marco Valleri - CTO, Alberto Ornaghi – Software Architect, Alberto Pelliccione – Senior Software Developer, Hacking Team
10:30-11:00 Session B OVERCOME THE ENCRYPTION CHALLENGE: GO BEYOND TRADITIONAL INTERCEPTION
Ori Nurick, Director of Marketing, NICE

Track 5: LEA, Intelligence and Defense Analyst Training and Product Demonstrations

This training is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Wednesday, 4 June 2014

9:00-9:30 Analyzing Multiple Data Sources in One Application
Presented by SS8
9:30-10:00 Interception and Intelligence Gathering - Impact of Growing Bandwidth and New IP Applications
Presented by SS8
11:30-12:00 Target Behavioural Analytics based on Data Retention - a demo
Presented by trovicor
13:30-14:00 Session A Target profile building on trovicor Intelligence Platform
Presented by trovicor
13:30-14:30 Session B Leveraging the best phone traces investigation techniques
Guillaume Tissot, Business Development, Ockham Solutions
14:00-14:30 Session A Cyber Security - a demo
Presented by trovicor
15:00-16:00 Session B Advancing the Role of the Monitoring Center
Presented by SS8
16:30-17:30 INVEA-TECH LI Demonstration
Presented by INVEA-TECH

Thursday, 5 June 2014

8:30-9:30 Session A New Digital Interception and Cyber Intelligence instruments
Presented by AREA
8:30-9:00 Session B Target profile building on trovicor Intelligence Platform
Presented by trovicor
8:30-9:30 Session C The Content and Context Analysis of Intercepted Data
Presented by TOVEK
9:00-9:30 Session B Target behavioural analytics based on data retention - a demo
Presented by trovicor
10:30-11:30 Session A Mito Cube: RCS LI platform, a successful case history
Federico Ciceri, RCS

10:30-11:00 Session B Cyber Security - a demo
Presented by trovicor
11:00-11:30 Session A Dictionary Investigation - a demo
Presented by trovicor
12:30-13:30 Session A New LI challenges. A Countrywide Integrated Solution:
Voice, Data, Positioning and Encryption for Massive Interception
Cristian D'Incertopadre, Sales, IPS

Track 6: Social Network Monitoring and Big Data Analytics Product Demonstrations
This track is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees

Wednesday, 4 June 2014

9:00-9:30 More Mass, Less Weight: Zeroing In on Actionable Intelligence through Bundles of Big Data
Amos Eliav, Senior Director, Verint
9:30-10:00 Feel their Pulse with Every Interaction: Extracting More Target Intelligence from Captured IP
Amos Eliav, Senior Director, Verint
11:30-12:00 Session A War on Social Media
Prof. Mohamed Abdel Mottaleb, AGT
11:30-12:00 Session B Klarios Analytics: Finding the Truth
Presented by ATIS systems
12:00-12:30 Social Media Steals Intelligence
Prof. Mohamed Abdel Mottaleb, AGT
13:30-14:30 Handling Multilingual Big Data with SDL Automated Translation
George Bara, Business Consultant for Enterprise and Government Solutions, SDL
Patrick Vanderper, Senior Sales Director Intelligence Solutions EMEA, SDL
15:00-15:30 Multi-dimensional Tactical Intelligence Solutions for Neutralizing Global Threats
Amir Barel, VP, Verint
15:30-16:00 Open Source Web Intelligence Extracting More Actionable Intelligence from the Open Source Web
Natan Bandler, Director, Product Manager, Verint
16:30-17:00 Announcing the Verint Integrated Suite of Solutions for Actionable Intelligence
Monique Lance, Marketing Manager, Verint
17:00-17:30 Detecting and Eliminating Tomorrow's Nation-wide Cyber Threats
Monique Lance, Marketing Manager, Verint

Thursday, 5 June 2014

8:30-9:30 Mitigating the risk of encryption
Presented by BAE Systems Applied Intelligence
10:30-11:00 Social Network Morning Session
Presented by Clear-Trail Technologies

Track 7: ISS for Mobile Location, Surveillance and Signal Intercept Product Demonstrations
This training is only open to Law Enforcement, Public Safety and Government Intelligence Community Attendees.

Wednesday, 4 June 2014

11:30-12:30 CDMA Catcher and GSM/3G/LTE Catcher with Public Number Detection. Vehicle based and Portable solutions. InPoint SMS System. Mass Emergency Notification. Emergency GSM Network, Target Localization.
Presented by NeoSoft
13:30-14:30 A complete solution to acquire satellite and terrestrial signals for massive data analysis and intelligence reports
Presented by VASTech
15:00-16:00 Navigation, Geopositioning and tracking : new technology to overcome GPS jamming or GPS-denied situations
Presented by SYSNAV

Thursday, 5 June 2014

8:30-9:30 Session A Audio, Video, GPS and more: tactical devices in a strategic vision
Ugo Santillo, Sales Director, IPS
9:00-9:30 Session B Portable Active System. GSM/3G/4G/LTE and CDMA Active, Passive and Hybrid systems.
Presented by NeoSoft
10:30-11:30 Session A TESLA : latest undetectable technology for tracking and audio bug, data streaming by LTE, UMTS, GPRS WIFI & BT
We will demonstrate real case of installation in a car, using opening tools and shown real installation giving tips & Tricks
Giacomo Cera, GR Sistemi
10:30-11:30 Session B Flexible SDR Platforms for multi-standard base stations
Presented by Octasic

Pre-Conference Training Seminars

Tuesday, 3 June 2014

Seminar #1
8:30-4:30

Online Social Media and Internet Investigations
Presented by Charles Cohen, Cohen Training and Consulting, LLC
Charles Cohen also holds the position of Commander, Cyber Crimes and Investigative Technologies Section, Indiana State, USA

8:30-9:30: Session 1 of 6
What Investigators & Analysts Need to Know about Online Social Media.
This session is for criminal investigators and intelligence analysts who need to understand the impact of online social networking on how criminals communicate, train, interact with victims, and facilitate their criminality.

9:45-10:45: Session 2 of 6
OSINT and Criminal Investigations
Now that the Internet is dominated by Online Social Media, OSINT is a critical component of criminal investigations. This session will demonstrate, through case studies, how OSINT can and should be integrated into traditional criminal investigations.

11:00-12:00: Session 3 of 6
Successful Use of Online Social Media in Criminal Investigations
This session is for investigators who need to understand social network communities along with the tools, tricks, and techniques to prevent, track, and solve crimes.

13:00-14:00: Session 4 of 6
Counterintelligence & Liabilities Involving Online Social Media
Current and future undercover officers must now face a world in which facial recognition and Internet caching make it possible to locate an online image posted years or decades before. There are risks posed for undercover associated with online social media and online social networking Investigations. This session presents guidelines for dealing with these risks.

14:15-15:15: Session 5 of 6
Facebook: Tools, Tricks, & Techniques Investigators Need to Know
While there are over 300 social networking sites on the Internet, Facebook is by far the most populous, with over 800 million profiles. It has roughly the same population as the US and UK combined, making it the third largest country by population. There are over 250 million images and 170 million status updates loaded on Facebook every day. This session will cover topics including Facebook security and account settings, Facebook data retention and interaction with law enforcement, and common fraud schemes involving Facebook.

15:30-16:30: Session 6 of 6
What Investigators Need to Know about Hiding on the Internet
Criminal investigators and analysts need to understand how people conceal their identity on the Internet. Technology may be neutral, but the ability to hide ones identity and location on the Internet can be both a challenge and an opportunity. Various methods of hiding ones identity and location while engaged in activates on the Internet, provides an opportunity for investigators to engage in covert online research while also providing a means for criminals to engage in surreptitious communication in furtherance of nefarious activities. As technologies, such as digital device fingerprinting, emerge as ways to attribute identity this becomes a topic about which every investigator and analyst may become familiar.

Seminar #2
8:30-16:30

Understanding ISS Technologies and Products Deployed in Telecommunications Networks and Monitoring Centers for Law Enforcement and Intelligence Analysis
Presented by: Dr. Jerry Lucas, President, TeleStrategies

This one day pre-conference seminar covers the spectrum of ISS Technologies and Products deployed in today's fixed wire, mobile wireless and Internet Service Provider networks and LEA Monitoring and Intelligence Gathering Centers. This all day seminar is ideal for those law enforcement, public safety and intelligence analysts who need an understanding of the ISS technologies to be discussed in the conference sessions and the ISS products displayed at the exhibit hall as well as an understanding of the buzz words and jargon used by telecom operator engineers and their vendors.

08:30-10:45
Understanding Wireline Telecom Infrastructure, Interception and Related ISS Products
What do LEAs need to know about the public switched telecommunications networks, circuit switching, fiber optics, SONET/SDH, Broadband Access (DSL, ADSL, Cable Modems, etc.), billing systems and call detail records, standards for lawful intercept, basic LI elements (access, delivery and collection function), LEA Monitoring Center Functions (call information and call content data collection) and where are ISS products deployed for monitoring and intercept.

11:00-14:00
Understanding Mobile Wireless Infrastructure, Interception and Related ISS Products
Infrastructure basics (GSM, GPRS, EDGE, UMTS, HSPA and LTE), Wi-Fi, WiMax and Femtocells, How a cellular call is processed, back office infrastructure, HLR, VLR, Backhaul and PSTN interconnection, data services, SMS, MMS, IM, data services, fixed mobile convergence, Smartphone challenges for LEA, intrusion techniques, gathering Geolocation data, location technologies (A-GPS and RF finger printing) and where are ISS products deployed for monitoring and intercept.

14:15-16:30
Understanding the Internet, Interception and Related ISS Products
What Investigators Have To Know about IP call Identifying Information, Radius, DHCP, DNS, etc., Tracking an Internet Address to a Source, Investigations Involving E-Mail, Facebook, Twitter, Skype, Instant Messaging, Chat Rooms and Message Boards, IMS, P2P Networks and Deep Packet Inspection, Big Data Analytics, defeating encryption, emerging IPv6 Challenges and what can be done to address Internet intercept deploying ISS infrastructure and where are ISS products deployed for monitoring and intercept.

Seminar #3
8:30-16:30

Practitioners Guide to Internet Investigations
Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police

The aim of this 1 day seminar is to take the attendees from the basics of understanding the internet, how to find data, through to a full understanding of best practice of an internet investigator, having awareness and knowledge of all the tools available to achieve this.

This is exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar.

8:30-9:30
The World Wide Web and the Internet
- How it works. Why it works. How data traffic leaves a trace ;
- What the internet is; what is an IP and what protocols are used ( TCP/IP)
- IPv4 and IPv6 – understanding the changes
- mirror servers use and value
- Tracking and evaluating data

9:45-10:45
Recognizing Traffic Data
- A practitioner’s guide to what data is available. How to harvest and analyse it.
- Best practice to identify suspects and build profiles.
- Data collection and interrogation
- IP usage, exploitation and dynamics; IP plotting and analysis how to look for suspect mistakes and exploit them ( where they show their id)
- Dynamic approaches to identifying suspects through internet profiles
- What investigators get from tech and service providers, and how to analyse it
- What to ask for with current legislation to achieve best results
- SPOC best practice.
- ISP/ CSP capabilities and opportunities.

11:00-12:00
WIFI and GPRS
- A practitioner’s look at Wi-Fi, attribution, cell site data, GPRS location services and technology. How an investigator can track devices, attribute suspects locations, devices and movement.
- Dynamic live time tracing
- Geo location services and uses
- Surveillance without DSA and authority

13:00-14:00
Emerging Technologies, Masking Tech and Tools
- How suspects are using emerging and new technologies.
- An introduction to where technology is going, and how Law enforcement can use this to our advantages.
- Darknet, (Deepweb) and IRC use
- VOIP, Skype
- Advanced data sniffing and profile building
- TOR systems, applications and ways to coax offenders out of the system.

14:15-15:15
Advanced Techniques in Tracing Suspects
- Using innovative and dynamic methods to trace offenders.
- tricks used by suspects and how to combat them
- Covert internet investigations
- Proxy servers and hiding.
- managing collateral intrusion
- Reverse and social engineering
- Thinking outside the box
- Possible missed opportunities
- Profile building and manhunts

15:30-16:30
Open Source Intelligence Training (OSINT)
- An in depth look at what tools are available; how to use them, and practical applications.
- safety online when open sourcing
- open source training and awareness basics
- Trace suspects using available tools
- How to identify leads in investigations and data from ISP
- Internet tools to assist in building online profiles on suspects
- A run through of my website dedicated to online tracing tools and how best to use it (LEA ONLY)
- Reverse engineering and social engineering

Seminar #4
8:30-10:45

Beyond Google: What to Do When Google (Bing and Yahoo) Do Not Answer Your Questions in a Useful Way
Presented by Stephen Arnold, ArnoldIT

The purpose of this tutorial is to provide recommendations for specific online search tactics tailored to law enforcement and intelligence professionals. In this two hour session, Stephen E Arnold will walk through "how tos" for four specific cases/situations in which free open source online services can help handle the types of questions investigators and analysts often have in different languages.

Questions the presentation will address include:
- What are important tips to work around Google filters for general queries?- •When should Bing or Yahoo be used to dig more deeply into open source content?
- How does an investigator/analyst research content in language other than English?
- How does an investigator translate non-English content in real time and for free?
- What free tools are available to determine relationships among and between persons of interest?
- What free and open source information services provide current data about individuals and their activities?
- What free system displays relationships and telephone numbers in the Bing index?
- How can an investigator / analyst maximize time in a critical research task?

Seminar #5
11:00-12:00

Smart Systems Substance or Shadow, Blind Spots or Shadow. Blind Spots in Mainstream Intelligence Systems
Presented by Stephen Arnold, ArnoldIT

Despite the high profile of Big Data and surveillance in the
US, the systems used by intelligence and law enforcement
professionals have limitations.

This lecture will seek to answer these key questions for practitioners in intelligence:

- Are next generation systems delivering value to licensees?
- Are sophisticated systems hardened and reliable?
- What are the limitations within which these smart systems operate for the intelligence professional?

Seminar #6
1300-14:00

The Dark Side of the Internet - TOR & Bitcoins
Presented by Ross Bowerman, Detective Sergeant, UK Police

Seminar #7

14:15-16:30

Smartphone Application Challenges Encountered and Opportunities Presented to Law Enforcement
Presented by Michael Williamson, Detective Inspector, Force Intelligence Bureau, Crime and Safer Communities, UK

A users overview of Smartphone applications, what they can do, implications, challenges and opportunities for law enforcement in obtaining results and coordinating our response to the overwhelming new apps appearing daily.

[...]

Geen opmerkingen:

Een reactie posten