ISSWorld Europe Intelligence Support Systems for Lawful Interception,

Embed Size (px)

Citation preview

  • 7/22/2019 ISSWorld Europe Intelligence Support Systems for Lawful Interception,

    1/7

    Associate Lead Sponsors

    Where Law Enforcement,

    Public Safety, Telecoms and

    the Intelligence Community turn for

    Technical Training and Product Selection

    Where Law Enforcement,

    Public Safety, Telecoms and

    the Intelligence Community turn for

    Technical Training and Product Selection

    105 LEA/Interior Security/Intel Training Sessions and Courses to Choose From

    Exhibitors and SponsorsLead Sponsor

    ISSWorld

    EuropeIntelligence Support Systems for Lawful Interception,

    Criminal Investigations and Intelligence Gathering

    4-6 JUNE 2013 CLARION CONGRESS HOTEL PRAGUE, CZ

    Registe

    and2ndFRE

  • 7/22/2019 ISSWorld Europe Intelligence Support Systems for Lawful Interception,

    2/7For Complete ISS World Conference Session Descriptions, Go To www.issworldtraining.co

    SS World Europe is the world's largestathering of European Law Enforcement,

    ntelligence and Homeland Security Analysts aswell as Telecom Operators responsible for Lawfulnterception, Hi-Tech Electronic Investigationsnd Network Intelligence Gathering.

    SS World Programs present the methodologiesnd tools for Law Enforcement, Public Safetynd Government Intelligence Communities inhe fight against drug trafficking, cyber money

    aundering, human trafficking, terrorism andther criminal activities conducted over today'selecommunications network, the Internet andocial Networks.

    Track 1

    SS for Lawful Interception and Criminalnvestigations

    Track 2

    SS for Big Data Analytics and SocialNetwork Monitoring

    Track 3

    SS for Mobile Location, Surveillancend Signal Intercept

    Track 4

    Encrypted Traffic Monitoring and ITntrusion Product Training

    Track 5

    EA and Intelligence Analyst Trainingnd Product Demonstrations

    Track 6

    Social Network Monitoring and BigData Analytics Product Demonstration

    Track 7

    Mobile Location, Surveillance and Signalntercept Product Training

    Pre-Conference Training Seminars

    Tuesday, 4 June 2013

    Seminar #18:30-4:30

    Online Social Media and InternetInvestigationsPresented by Charles Cohen, Cohen Training

    and Consulting, LLCCharles Cohen also holds the position ofCommander, Special Investigations andCriminal Intelligence, Indiana State Police,USA

    8:30-9:30

    Session 1 of 6: What Investigators &Analysts Need to Know about OnlineSocial Media.

    9:45-10:45

    Session 2 of 6: OSINT and CriminalInvestigations

    11:00-12:00

    Session 3 of 6: Successful Use of OnlineSocial Media in Criminal Investigations

    1:00-2:00

    Session 4 of 6: Counterintelligence &Liabilities Involving Online Social Media

    2:15-3:15

    Session 5 of 6: Facebook: Tools, Tricks, &Techniques Investigators Need to Know

    3:30-4:30

    Session 6 of 6: What Investigators Needto Know about Hiding on the Internet

    Seminar #28:30-4:30

    Understanding ISS Technologies

    and Products Deployed inTelecommunications Networksand Monitoring Centers for LawEnforcement and Intelligence AnalysisPresented by: Dr. Jerry Lucas, President,

    TeleStrategiesThis one day pre-conference seminar coversthe spectrum of ISS Technologies andProducts deployed in today's fixed wire,mobile wireless and Internet ServiceProvider networks and LEA Monitoring andIntelligence Gathering Centers. This all dayseminar is ideal for those law enforcement,

    public safety and intelligence analysts wneed an understanding of the ISStechnologies to be discussed in theconference sessions and the ISS producdisplayed at the exhibit hall as well as anunderstanding of the buzz words and jarused by telecom operator engineers andtheir vendors.

    8:30-10:45

    Understanding Wireline Telecom

    Infrastructure, Interception and RelaISS ProductsWhat do LEAs need to know about thepublic switched telecommunicationsnetworks, circuit switching, fiber optics,SONET/SDH, Broadband Access (DSL,ADSL, Cable Modems, etc.), billing systeand call detail records, standards for lawintercept, basic LI elements (access, deland collection function), LEA MonitoringCenter Functions (call information and cacontent data collection) and where are ISproducts deployed for monitoring andintercept.

    11:00-2:00Understanding Mobile WirelessInfrastructure, Interception and RelaISS ProductsInfrastructure basics (GSM, GPRS, EDGEUMTS, HSPA and LTE), Wi-Fi, WiMax anFemtocells, How a cellular call is procesback office infrastructure, HLR, VLR,Backhaul and PSTN interconnection, datservices, SMS, MMS, IM, data services,fixed mobile convergence, Smartphonechallenges for LEA, intrusion techniquesgathering Geolocation data, locationtechnologies (A-GPS and RF finger printiand where are ISS products deployed fo

    monitoring and intercept.

    2:15-4:30

    Understanding the Internet,Interception and Related ISS ProducWhat Investigators Have To Know about call Identifying Information, Radius, DHCDNS, etc., Tracking an Internet Address tSource, Investigations Involving E-Mail,Facebook, Twitter, Skype, Instant MessaChat Rooms and Message Boards, IMS,Networks and Deep Packet Inspection, BData Analytics, defeating encryption,

    4-6 JUNE 2013 CLARION CONGRESS HOTEL PRAGUE, CZ

    ISSWorld

    EuropeIntelligence Support Systems for Lawful Interception,

    Criminal Investigations and Intelligence Gathering

    Exhibits5 June 2013, 10:00 a.m. - 5:00 p.m.

    6 June 2013, 9:30 a.m. -12:30 p.m.

  • 7/22/2019 ISSWorld Europe Intelligence Support Systems for Lawful Interception,

    3/7

    merging IPv6 Challenges and what can beone to address Internet intercept deploying

    SS infrastructure and where are ISSroducts deployed for monitoring and

    ntercept.

    Seminar#3:30-4:30

    Practitioners Guide to Internetnvestigations

    Presented by: Mark Bentley, Data CommsManager, Child Exploitation and OnlineProtection Centre (CEOP), United Kingdomhis is exclusively Law Enforcement only, asractical examples, covert and investigative

    methods will be given throughout theeminar. The aim of this 1 day seminar is toake the attendees from the basics ofnderstanding the internet, through to a fullnderstanding of best practice of an internet

    nvestigator, and having awareness of all theools available to achieve this.

    :30-8:45

    ntroductionA 15 min introduction to the work of theChild Exploitation and online ProtectionCentre

    :45-9:30

    The World Wide Web and the Internet

    :45-10:45

    Recognizing Traffic Data

    1:00-12:00

    WIFI and GPRS

    3:00-14:00

    Emerging Technologies, Masking Technd Tools

    4:15-15:15Advanced Techniques in TracingSuspects

    5:30-16:30

    Open Source Intelligence TrainingOSINT)

    Seminar #4:30-4:30

    Advanced IP Intercept TrainingPresented by: Hendrik Schulze, President & CTO

    and Jens Geier, Product Manager, ipoque

    08:30-10:45

    Understanding TCP/IP for PacketSniffing and Traffic AnalysisA brief introduction into network technologyand the basics of TCP/IP needed forinterception and the impact on propernetwork analysis. Based on this, theworkshop reflects the technical options forLEA's to investigate in networks.

    11:00-2:00

    Deep Packet Inspection (DPI) Basics for

    LEA's, Intelligence Analysts and TelecomOperatorsAn overview on deep packet inspectiontechnology (DPI) and its basic operationsdown to the application level. Skype is usedas example to show the implications ofcomplex network behavior on DPI.

    2:15-4:30

    Basics of IP Application DecodingFrom Packets to Structured Data

    The workshop is a high-level introduction onbuilding decoder software starting fromrequirements on an example of softwarearchitecture. After an overview of all parts ofthe introduction the building blocks areelaborated.

    Seminar #513:00-14:00

    The Dark Side of the Internet - TheHidden TOR and I2P and How theyFunctionPresented by: Ross Bowerman, Detective

    Sergeant, Scottish Police College, UK

    Seminar #614:15-15:15

    Smartphone Application ChallengesEncountered and OpportunitiesPresented to Law EnforcementPresented by: Michael Williamson, Detective

    Inspector, Force Intelligence Bureau, Crimeand Safer Communities, UK

    A users overview of Smartphoneapplications, what they can do, implications,challenges and opportunities for lawenforcement in obtaining results andcoordinating our response to theoverwhelming new apps appearing daily.

    Seminar #78:30-12:00

    Sharing in Real-Time Cyber Threat aAttack Informaiton AmongGovernments, Telecoms and PrivateIndustryPresented By Matthew Lucas (Ph.D. Comp

    Science), Vice President, TeleStrategiesAnd Invited FacultyCollaborative cybersecurity systems -- wgovernments, enterprises and telcom

    operators share threat and attack informin real-time -- are gaining significant inteand momentum in the industry. Theapproach not only improves respectivecyberdefense capabilities and criticalinfrastructure protection as compared totraditional stove-pipe implementations, balso enables operators to improve the quof their service offerings and complemethem with enhanced cybersecurity featu

    As with any distributed system,implementing collaborative cybersecurityplatforms is incredibly complicated. In orto be successful, the approach will requi

    robust standards that are efficient,comprehensive and vendor-independenthalf day tutorial will look at the overallchallenges, the emerging architectures astandards surrounding distributedcollaborative cybersecurity systems. Thetutorial will be broke into three sessions

    Session 1: Overview of the TechnicalChallenges in Real-Time Sharing of Thand Attack Information AmongGovernments, Telecoms and PrivateIndustry.

    This panel of technical experts will give tassessment of the challenges of sharing

    information among governments, telecooperators and the private sector from alawful interception and intelligence gathvendors perspective.

    Presented By Panel of ISS Vendors

    Session 2: Distributed CybersecurityRequirements and Architectures Cyberthreat data requirements for eachdomain (government, telcom wide-area,enterprise and CPE) will be identified, datypes/schemas will be explained and reatime requirements will be considered.

    Session 3: Exchange protocols / use c

    STIX and other protocols will be

    4-6 JUNE 2013 CLARION CONGRESS HOTEL PRAGUE, CZ

    ISSWorld

    EuropeIntelligence Support Systems for Lawful Interception,

    Criminal Investigations and Intelligence Gathering

  • 7/22/2019 ISSWorld Europe Intelligence Support Systems for Lawful Interception,

    4/7

    xamined in detail, looking at the specificvents captured, usage data formats, triggervents, transport protocols,ecurity/authentication, capabilitiesxchange, and protocols. The session will

    wrap up with reference architectures andse cases.

    Seminar #83:00-17:00

    ETSI/TC LI Update

    3:00-13:40ETSI/TC LI Standards OverviewGerald McQuaid, Chairman ETSI/TC LI

    3:40-14:00

    E-Warrant InterfaceTony Rutkowski, Yaana Technologies

    -Warrant Interface: Details on the "eWarrantnterface" for Lawful Interception and DataRetention. The general use of this electronicnterface is highlighted. Future plans will bendicated.

    4:45-15:15

    Dynamic TriggeringAlex Leadbeater, BT Group

    Dynamic Triggering: As communicationservices become more nomadic andnterception of basic access services (e.g.roadband) becomes more difficult due tohe ever increasing data volumes, serviceased interception becomes increasinglyttractive. In addition Virtual Serviceroviders and constant mobility of userccess methods to those services require aew approach to interception.

    5:30-16:00

    I Cloud/Virtual ServicesTony Rutkowski, Yaana Technologies

    I Cloud/Virtual Services: Beside generalnformation on Cloud services also the TC LItudy on "LI Cloud/Virtual services" will beandled.

    6:00-16:30

    ETSI TC LI Standards In RealityRudolf Winschuh, Utimaco Safeware

    TSI TC LI standards in reality: Thisresentation will describe in which parts ofhe world ETSI TC LI standards are used andow they are implemented in variousountries.

    6:30-17:00

    Guru" Round for Questions for thepresenters

    Wednesday, June 5, 2013

    Welcoming Remarks

    :15-8:30

    Tatiana Lucas, ISS World Program Director,TeleStrategies

    :30-9:00

    Top Ten Internet Challenges Facing LawEnforcement and the IntelligenceCommunity and Who at ISS WorldEurope has SolutionsDr. Jerry Lucas, President, TeleStrategies

    Track 1

    ISS for Lawful Interception and CriminalInvestigationsThis track is for Telecom Operators and LawEnforcement/Intelligence/Defense Analystswho are responsible for specifying ordeveloping lawful intercept networkinfrastructure.

    Wednesday, 5 June 2013

    14:00-14:30Lawful Interception and Retention ofTelecom Services vs. Data ProtectionDirk Brgerding, Pre-Sales Manager, Utimaco

    LIMS

    15:00-15:30

    New LI challenges. A CountrywideIntegrated Solution: Voice, Data,Positioning and EncryptionCristian DIncertopadre, Sales, IPS

    15:00-15:30

    IPv6, Identities & DPIHendrik Schulze, President & CTO, Ipoque

    15:30-16:00

    Communication Surveillance in theFight Against Child Exploitation - Re-balancing the Ethical DebateAREA presenter to be announced

    15:30-16:00

    DPI Tactical ProbeTomas Dedek, INVEA-TECH

    Thursday, 6 June 2013

    8:30-9:00

    Disappearing in the CrowdJens Geier, Product Manager, ipoque

    9:00-9:30Case study: 40G Lawful Interception &Data RetentionPetr Kastovsky, INVEA-TECH

    9:00-9:30

    New Generation of Language andSpeaker Identification TechnologyRadim Kudla, Senior Business Developer,

    Phonexia

    10:30-11:00

    Going beyond Packets: object-basedreconstruction and analysis in the era ofSSLNetScoutPresenter to be Announced

    11:00-11:30

    Assuring performance at 100 GbpsNapatechpresenter to be announced

    Note: Lawful Interception and CriminalInvestigation Product Training andDemonstrations Scheduled in Track 5

    Track 2

    ISS for Big Data Analytics and SocialNetwork MonitoringThis track is for Intelligence Analysts andLaw Enforcement agents who have to

    "connect the dots" between people, placand other entities by searching throughmassive amounts of data.

    Wednesday, 5 June 2013

    9:00-9:30

    Utilising Big Data to Best MaximiseLawful Intercept ActivityBAE Systems Deticapresenter to be

    announced

    9:30-10:00

    Keeping up with new Security TrendSurveillance TechnologiesPresented by CEO, trovicor

    11:30-12:00

    Automating the "Memory Game":Collect and Connect Social MediaOSINT DataKapow Technologiespresenter to be

    annocuned

    12:00-12:30

    IP Monitoring trovicors end-to-endsolutionPresented by CTO, trovicor

    13:30-14:00

    Making Sense of the Web and SociaNetworksYoni Heilbronn, Director of Marketing and

    Business Development, NICE Systems

    14:00-14:30

    A case study for Identity Resolutionidentification of bogus identities inSocial Network ServicesELTA SIGINTspeaker to be announced

    15:00-15:30

    Investigating Big Data when sizematters after allAaron (Ronnie) Eilat, Director of Product

    Management and Marketing, Elbit Syste

    15:30-16:00

    A Paradigm Shift - The New World oCOMINTOri Nurick, Director of Marketing, NICE

    Systems

    Thursday, 6 June 2013

    9:00-9:30

    IP -Decoding is a ghost of the pastDesomaspeaker to be announced

    10:30-11:00

    Connecting Dots from MultisourceCommunication InterceptsTomas Vejlupek, President, TOVEK

    12:30-13:30

    The Dark Side of the Internet - TheHidden TOR and I2P and How theyFunctionRoss Bowerman, Detective Sergeant, Sco

    Police College, UK

    Note: Big Data Analytics and SocialNetwork Monitoring Product Training Demonstrations Scheduled in Track 6

    Session A

    Session B

    Session A

    Session A

    Session B

    Session B

  • 7/22/2019 ISSWorld Europe Intelligence Support Systems for Lawful Interception,

    5/7

    Track 3

    SS for Mobile Location, Surveillancend Signal Intercepthis track is for Authorities who must work

    with cellular and mobile satellite operatorsegarding mobile location, surveillance andntercept.

    Wednesday, 5 June 2013

    :00- 9:30

    ntegration of location based servicess one more information source on topof traditional intercepted services.Dirk Brgerding, Pre-Sales Manager, Utimaco

    LIMS

    :00-10:00

    Breaking new grounds in Mobile Deviceorensics for law enforcement

    professionals.Yuval Ben Moshe, Forensics Technical Director,

    Cellebrite

    1:30-12:00

    ntroducing Da Vinci: attack, control andather intelligence from personal

    devices.David Vincenzetti, Partner, Hacking Team

    2:00-12:30

    nPoint SMS System. Mass EmergencyNotification. Vehicle based and Portableolutions.

    NeoSoft AGspeaker to be announced

    3:30-14:00

    Tactical GSM & 3G interceptionElan Sharon, Septier Communication

    4:00-14:30

    MSI Catching in GSM, UMTS and LTENetworks Challenges and SolutionsEXFOpresenter to be announced

    5:00-15:30

    Mobile cellular: developing with theatest technologies

    Tim Phipps, Business Development WirelessDefence and Security, CambridgeConsultants

    Thursday, June 6, 2013

    0:30-11:00

    Active, Passive and Hybrid GSM & 3GMonitoring systems. New challengesRandomization, A5.3 etc.). Practicalolutions.

    NeoSoft AGspeaker to be announced1:00-11:30

    Accurate Cellular Location trackingolutions

    Elan Sharon, Septier Communication

    2:30-13:30

    Smartphone Application ChallengesEncountered and OpportunitiesPresented to Law EnforcementMichael Williamson, Detective Inspector, Force

    Intelligence Bureau, Crime and SaferCommunities, UK

    Note: Mobile Location, Surveillance andSignal Intercept Product Training andDemonstrations Scheduled in Track 7

    Track 4

    Encrypted Traffic Monitoring and ITIntrusion Product TrainingThis track is only open to Law Enforcement,Public Safety and Government IntelligenceCommunity Attendees

    Wednesday, 5 June 2013

    9:00-10:00

    Using Open-Source tools to conductgovernmental investigations againstserious crimeMGM, Gamma Group

    11:30-12:30

    VUPEN Sophisticated Exploits for ITintrusion and Offensive SecurityChaouki Bekrar, CEO & Director of Vulnerability

    Research, VUPEN

    13:30-14:30

    FinFisher- Next Generationgovernmental surveillance. Focus:Mobile phone monitoringMGM, Gamma Group

    13:30-14:30

    Monitoring Communications InsideEncrypted TrafficPacket ForensicsSpeaker to be Announced

    15:00-16:00

    Da Vinci: a spy story about busting aterrorist organization by using the mostadvanced offensive technology.Marco Valleri, Head of R&D, Alberto Ornaghi,

    Senior Software Developer and AlbertoPelliccione, Senior Software Developer,

    Hacking Team

    16:15-17:15

    WiTTM PSS an End-2-End LawfulHacking/IT intrusion Solution demoDoron Truk, VP Sales, Elbit Systems

    Thursday, 6 June 2013

    8:30-9:00

    Smart Intrusion on Social Networks andWebmails: the Https Monitoring &AnalysisUgo Santillo, Sales Director, IPS

    8:30-9:30

    Dark Eagle: The ultimate solution forDSL voice and Data Interception andRemote System IntrusionGR SISTEMI SRLpresenter to be announced

    9:00-9:30

    Encryption Anywhere and Everywhere.Now What? An Analysis of PossibleWorkaroundsAREA presenter to be announced

    10:30-11:30

    Da Vinci: a live demonstration ofunrivaled attack capabilities and toresistance to detection, quarantine aremoval by any endpoint securitytechnology.Marco Valleri, Head of R&D, Alberto Ornagh

    Senior Software Developer and AlbertoPelliccione, Senior Software Developer,Hacking Team

    10:30-11:00

    Man in the Middle - yes we can

    Desomapresenter to be announced

    Track 5

    LEA, Intelligence and Defense AnalyTraining and Product DemonstrationTrackThis training is only open to LawEnforcement, Public Safety and GovernmIntelligence Community Attendees.

    Wednesday, 5 June 2013

    9:00-10:00

    Modern Monitoring Center Approacfor Lawful InterceptionAmos Eliav, Sr. Director, Product Managem

    Verint Systems

    11:30-12:30

    A framework for meeting the LIregulatory and technological challenin Cloud based ServicesELTA SIGINTspeaker to be announced

    13:30-14:30

    Flexible IP Communication SurveillaSolutions - Adapting to YourInvestigative Needs and ObjectivesAREA presenter to be announced

    13:30-14:30

    Replay NetAnalyst 3.0 - The NextGeneration in Advanced IPReconstructionBob Brandt, Product Manager Replay,

    NetScout

    16:15-17:15

    A Countrywide Monitoring Centressolution: Voice, Data and PositioningCristian DIncertopadre, Sales, IPS

    16:15-17:15

    Speech Intelligence Platform How

    Mine Data from Speech RecordsPetr Schwarz, CEO, Phonexia

    Thursday, 6 June 2013

    8:30-9:30

    NiceTrack Target 360 Achievecomprehension by IP SimplificationNir Yanovsky, Product Manager, NICE Syst

    8:30-9:30

    From Mass Interception to ActionabIntelligenceAmos Eliav, Sr. Director, Product Managem

    Verint Systems

    Session A

    Session B

    Session B

    Session A

    Session B

    Session A

    Session B

    Session A

    Session A

    Session B

  • 7/22/2019 ISSWorld Europe Intelligence Support Systems for Lawful Interception,

    6/7

    Registration InformationSave $300 by registering before 29 April, 2013

    Telecommunications Service Provider or Government Registration

    SS World Conference (Tracks 13),

    re-Conference Seminars and Exhibits ........................................$995

    Registration after 29 April 2013..................................................$1,295

    aw Enforcement/DHS/IC/DoD Registration*

    SS World Conference (Tracks 13), Training Tracks 47,

    re-Conference Seminars plus Exhibits........................................$995

    Registration after 29 April 2013..................................................$1,295

    Vendor Registration

    SS World Conference (Tracks 13),

    re-Conference Seminars and Exhibits .....................................$1,995

    Registration after 29 April 2013..................................................$2,295

    Note: To Attend the LEA/DHS/IC/DoD Training Tracks 4-7 you must be

    sworn law enforcement officer or military/intelligence/government

    mployee. Also you must register by 30 May 2013 in order to verify

    ligibility. Government photo ID required for classroom access.

    Free Colleague Registration: Register as paid and you can invite

    colleague to join you at ISS World Europe with a full, free confere

    pass. If you have not identified your guest at this time, just enter

    guest of followed by your name and complete with your contac

    formation. You can register your guest at no charge at a later time

    Conference and Exhibitions: Clarion Congress Hotel Prague.

    To reserve a room at the early bird rate of 95 EUR ($125 US) go to

    www.issworldtraining.com and select ISS World Europe 2013 or c

    420 211 131 119 and reference ISS World 2013. Early bird rate exp

    4 April 2013.

    International Attendees: If you need Visa assistance to attend IS

    World, please contact Tatiana Lucas at [email protected]

    Conference by Invitation Only: To attend ISS World you must be

    Telecommunications Service Provider, government employee, LE

    vendor with LI, surveillance or network products or services. If yo

    have questions e-mail Tatiana Lucas at [email protected]

    Registration

    Phone: 1-703-734-7050Fax: 1-703-734-9371

    Online: www.issworldtraining.com

    0:30-11:30

    Advanced Case Communicationnvestigation ManagementSalviolpresenter to be announced

    0:30-11:30

    Application & User Data InterceptionDemoens Geier, Product Manager, ipoque

    Track 6

    SS for IP Intercept, Big Data Analytics

    nd Social Network MonitoringEA and IC Attendees Only

    Wednesday, 5 June 2013

    :00-10:00

    Data Discovery tracking criminals in aea of communications

    SS8Speaker to be announced

    1:30-12:30

    Klarios Analytics: Finding the TruthATISsystems to be announced

    1:30-12:30

    Cell Based Monitoring - a new approacho handle mass recordingsSolution Architect, trovicor

    1:30-12:30

    Advanced Methods for Intercepting andAnalyzing Social NetworksAmos Eliav, Sr. Director, Product Management,

    Verint Systems

    3:30-14:30

    Troy Ultimate Software AgentsDeployment System Demonstrationwith Live DeploymentAGTspeaker to be announced

    13:30-14:30

    OSINT in confusing and high fluxeventsMark Pfeiffer, CVO, SAIL LABS Technology

    15:00-16:00

    Social Networks and Webmails: BigData Architecture for MassiveInterceptionFabio Romani, Market & Investment Strategy,

    IPS

    15:00-16:00

    Monitoring Center Next Generation -

    demoPresented by Solution Architect, trovicor

    16:15-17:15

    OSINT tools in crisis - unearthinghidden agendas using OSINTMark Pfeiffer, CVO, SAIL LABS Technology

    16:15-17:15

    Big Data Analytics ProductDemonstrationBAE Systems Deticapresenter to be

    announced

    Thursday, 6 June 2013

    9:00-9:30

    Intelligence Platform Target profilingSolution Architect, trovicor

    10:30-11:00

    Cell Based Monitoring Solution- a newapproach to handle mass recordingsSolution Architect, trovicor

    10:30-11:30

    Social Media Real Time Monitoring andReportingAGT Troy Softwarepresenter to be

    announced

    10:30-11:30

    The Power of Open Source WebIntelligence

    Natan Bandler, Director, Product ManagemVerint Systems

    11:00-11:30

    Mass metadata Analysis reveal theunknownSolution Architect, trovicor

    Track 7

    ISS for Mobile Location, Surveillancand Signal InterceptLEA and IC Attendees Only

    Wednesday, 5 June 2013

    9:00-10:00

    IMSI/IMEI Catcher with Public NumDetectionNeoSoft AGspeaker to be announced

    1:30-12:30

    A Passive Radio System and AnalytiPlatform for Gaining Deep Insight frPublic Wireless SignalsPacket Forensicsspeaker to be announce

    13:30-14:30

    PHOENIX: undetectable GPS & AUDdeviceGR SistemiSRL speaker to be announced

    15:00-16:00

    Accurate Mobile Locations in theMonitoring Center Technologies anUsabilityAmos Eliav, Sr. Director, Product Managem

    Verint Systems

    Session A

    Session A

    Session A

    Session A

    Session B

    Session B

    Session B

    Session B

    Session B

    Session C

    Session B

    Session C

    Session A

    Session A

    Session A

    Exhibits5 June 2013, 10:00 a.m. - 5:00 p

    6 June 2013, 9:30 a.m. -12:30 p.

  • 7/22/2019 ISSWorld Europe Intelligence Support Systems for Lawful Interception,

    7/7

    ISSWorld

    Europe4-6 JUNE 2013 CLARION CONGRESS HOTEL PRAGUE, CZ

    Lead Sponsors

    Lead Sponsor

    trovicor is an established leading supplier of intelligence solutions for Law Enforcement and Government Agencies,

    worldwide.The company represents almost two decades of industry experience in customer-centric development of statthe-art monitoring centers and intelligence platforms. Headquartered in Munich, Germany and with affiliate offices in EurMiddle East, Asia-Pacific, trovicor services Law Enforcement and Government Agencies in the security sector withdeployments in more than 100 countries. The trovicor systems capture interactions, transactions and surveillance frommultiple sources, including fixed line as well as mobile telephone, radio communication, email, web, chat, social media, amore. Thus, they provide the framework for merging data into a single operational view delivering meaningful informationdecision makers about threats and targets.

    Associate Lead Sponsors

    AREA is a market-leading independent provider of turn-key, fully integrated end-to-end communication surveillance solutifor law enforcement organizations worldwide. The MCR solution portfolio ranges from interception/mediation tocollection/retention as well as data analysis. Leveraging our extensive track-record and field experience, we aim to providesolutions which simplify complexity.

    ATIS systems with its integrated lawful interception and monitoring system Klarios 2.0 has been a technology leadethe industry for over 60 years. ATIS has a long history of success and experience 60 years in recording technology and years in the field of integrated lawful interception. Founded and headquartered in Bad Homburg, Germany, the ATIS Grouhas 200 employees in five countries across Europe, Asia and North America. www.atis-systems.com

    ClearTrail is leading provider of communication monitoring solutions to LEAs, Intelligence Agencies and Telecom carriersworldwide. Our solutions are deployed across hundreds of communication links and empower agencies to Mass InterceGSM/CDMA, PSTN, GPRS, EDGE, 3G/3.5G, Wi-Max, VSAT, & IP links; Analyze vast amount of information; Monitor Wi-Fnetworks and replay HTTPS sessions; Deliver Trojans remotely & locate targets; Monitor GSM calls Off-The-Air.

    Gamma International has developed for Law Enforcement and Intelligence Agencies its own FinFisher IT Intrusion Portfowhich is a comprehensive range of professional offensive tools for information gathering, sniffing, manipulation andexploitation. FinFisher is proving to be instrumental in the fight against child pornography, cybercrime, pedophilia, humantrafficking, drug smuggling, terrorism, and other criminal activities. For more information contact: [email protected]

    Hacking Team provides the premier offensive technology solution: Remote Control System. Proven by more than 10 yearworldwide adoption and designed to fulfill LEAs and Security Agencies highest expectations, newly released version 8 "DVinci" gives you total control over endpoint devices, offering the widest selection of infection vectors, showing total invisto protection systems and implementing the most sophisticated data gathering techniques. Find out more atwww.hackingteam.com

    NeoSoft AG is a world-wide known manufacturer of Monitoring security systems such as: Passive, Active (Semi-Active),Hybrid GSM Monitoring systems with A5.2/A5.1 deciphering; CDMA Passive Monitoring systems; IMSI/IMEI Catchers 2and 3G and InPoint SMS System .All our systems support the following bands: GSM, PCS, EGSM, 2100 and 850. Oursystems are widely used for victim detection and recovery during various acts of terrorism and natural disasters.

    NICE Cyber and Intelligence Solutions help Law Enforcement Agencies (LEAs), intelligence organizations and SIGINTagencies to reduce crime, prevent terrorism and identify other security threats by enhancing communication intelligenceproduction. NICE Intelligence Solutions provide end-to-end solutions for communication interception and analysis. NICEsolutions are deployed by dozens of experts around the world.

    Packet Forensics innovative solutions are used by governments and businesses world-wide to defend property and protepeople. As a proud partner and supplier to many of the worlds most admired technical organizations, Packet Forensics isrecognized market leader in complex network monitoring and active network defense. http://www.packetforensics.com

    SS8 is a leading worldwide provider of end-to-end communications and cyber intelligence solutions. We enable LEAs andnational governments to collect and monitor current and evolving voice and IP data communicationsfrom IP data recorand call detail records, to content such as webmail, search results, social media and chatin accordance with local laws standards. Learn more at: www.ss8.com

    Utimaco with more than 180 installations in about 70 countries is a leading global supplier in the lawful interception markSince 1994 Utimaco has been providing lawful interception systems for mobile and fixed network operators and Internetservice providers. In addition at the request of telecom customers for an integrated lawful interception and data retentionsolution, Utimaco introduced the Data Retention Suite corresponding to the EU directive 2006/24/EC. For more informativisit http://lims.utimaco.com

    Verint Communications and Cyber Intelligence Solutions help law enforcement, national security, and other governmagencies neutralize terror and crime, facilitate communication service provider compliance with lawful interception mandand assist public sector organizations detect and thwart cyber attacks. Our solutions collect, monitor, and analyze informfrom virtually any network.

    VUPEN is the leading provider of IT intrusion and offensive cyber security capabilities. VUPEN provides private and highlysophisticated exploits (attack/infection vectors) specifically designed for the Intelligence community, LEAs, and nationalsecurity agencies to help them remotely and covertly install any monitoring software on target computers, laptops, andmobile devices during lawful intercept and criminal investigation missions. VUPEN's industry-recognized vulnerability reseand exclusive exploits target a wide range of software and operating systems, take advantage of undisclosed "zero-day"vulnerabilities, and bypass all modern security protections and exploit mitigation technologies such as DEP, ASLR, sandboand Antivirus products. For more information: http://www.vupen.com