7
® Where Telecom Operators, Law Enforcement, Defense and the Intelligence Community Turn to Learn and Network Where Telecom Operators, Law Enforcement, Defense and the Intelligence Community Turn to Learn and Network 23-25 FEBRUARY 2010 JW MARRIOTT DUBAI, UAE 97 LEA/Interior/DoD Training Sessions and Courses to Choose From ISS World ® MEA I ntelligence S upport S ystems for Lawful Interception, Criminal Investigations and Intelligence Gathering Register 1 and 2nd FREE! Associate Lead Sponsors Lead Sponsor Exhibitors and Sponsors

Where Telecom Operators, Law Enforcement, Defense and the

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Where Telecom Operators, Law Enforcement, Defense and the

®

Where Telecom Operators, LawEnforcement, Defense and

the Intelligence Community Turn to Learn and Network

Where Telecom Operators, LawEnforcement, Defense and

the Intelligence Community Turn to Learn and Network

23-25 FEBRUARY 2010 • JW MARRIOTT • DUBAI, UAE

97 LEA/Interior/DoD Training Sessions and Courses to Choose From

ISSWorld®MEA

Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering

Register 1

and 2nd FREE!

Associate Lead SponsorsLead Sponsor

Exhibitors and Sponsors

Page 2: Where Telecom Operators, Law Enforcement, Defense and the

For Complete ISS World® Conference Session Descriptions, Go To www.telestrategies.com

ISS World MEA is the world’s largest gatheringof Middle East and African Law Enforcement,Intelligence and Homeland Security Analystsand Telecom Operators responsible for lawfulinterception, electronic investigations andnetwork Intelligence gathering.

ISS World Programs present themethodologies and tools to bridge thechasms from lawful intercept data gatheringto information creation to investigatorknowledge to actionable intelligence.

ISS World MEA Program

Conference Track 1

ISS for Telecom Operator LawfulInterception

Conference Track 2

ISS for Criminal Investigation

Conference Track 3

ISS for Data Retention andRegulatory Compliance

Conference Track 4

ISS for Mobile Location,Surveillance and Intercept

Conference Track 5

DPI for Lawful Interception,Network Security and TrafficManagement

Conference Track 6

ISS for Intelligence Gathering andAnalysis

Conference Track 7

LEA and Intelligence AnalystTraining and ProductDemonstrations

Tuesday, 23 February 20108:45 – 9:00

Welcoming RemarksTatiana Lucas, ISS World Program Director,

TeleStrategies

9:00 – 10:30

Top Ten Internet Challenges FacingLaw Enforcement and theIntelligence CommunityModerator: Dr. Jerry Lucas, President,

TeleStrategiesGuru Panel:Joergen Axland, COO & Strategy, trovicorKeith Driver, Head of Business

Development, Telesoft TechnologiesRudolf Winschuh, Business Development

Manager, Utimaco LIMSPeter Weinlich, Professional Services

Manager, Al Fahad GroupJerome Tollet, CTO, QosmosAlessandro Guida, ATIS Systems

Track 1

ISS for Lawful InterceptionThis track is for Telecom Operators and Law Enforcement/Intelligence/DefenseAnalysts who are responsible for specifyingor deploying lawful intercept networkinfrastructure.

Tuesday, 23 February 201011:00 – 12:00

Global Interception Solutions Carlos Gandini, Head of Sales APAC,

trovicor

11:00 – 11:30

Managing Virtual Identities AcrossIP NetworksJean-Philippe Lion, Vice President EMEA,

Qosmos

11:30 – 12:00

Lawful Interception in NextGeneration IMS and LTENetworksVineet Sachdev, Sr. Director, Solution

Engineering, SS8

13:15 – 14:15

LI for New IP Services “Best Practices” Guru PanelJoergen Axland, COO & Strategy, trovicorRudolf Winschuh, Business Development

Manager Utimaco LIMSErik Larsson, Vice President Marketing,

QosmosBert Hubert, CTO Fox Replay, Fox-ITAlessandro Mordacci, Senior Advisor, EricssonKlaus Mochalski, CEO, ipoque

14:45 – 15:15

Team Based Processing of IPIntercepts: Multiplying YourSurveillance CapabilityBert Hubert, Function: CTO Fox Replay, Fox-IT

15:15-15:45

A Holistic Approach toImplementing Mobile Location forLawful Intercept, from LegislationCompliance to RoIRichard Lee, CEO, Creativity Software Ltd

16:15 – 16:45

Interception Solutions–IntegratedToday and Scalable for TomorrowAlan Dubberley, VP, Aqsacom

16:45 – 17:15

How to Save Money andResources In Deployment of Large IP Monitoring Centers Nazareno Saguato, Presales Manager, AREA

Wednesday, 24 February 20109:00 – 9:30

Network Level VoIP Interceptionwith Voitap™Murat Balaban, Founder and Director of R&D,

Endersys

9:30 – 10:00

How IPv6 Will Change the Gamefor LIKlaus Mochalski, CEO, ipoque

11:15 – 11:45

Dynamic Triggering in LIRudolf Winschuh, Business Development

Manager Utimaco LIMS

SESSION B

SESSION B

SESSION A

ISSWorld®MEAIntelligence Support Systems for Lawful Interception,

Criminal Investigations and Intelligence Gathering

23-25 FEBRUARY 2010 • JW MARRIOTT • DUBAI, UAE

Exhibits

24 February 2010, 10:00 to 17:3025 February 2010, 9:30 to 12:30

Page 3: Where Telecom Operators, Law Enforcement, Defense and the

11:45 – 12:15

Lawful Interception in FutureNetworksAlessandro Mordacci, Senior Advisor, Ericsson

13:30 – 14:00

Economic Aspects of the ChangedLI Paradigm Marcelo Riccitelli, Account Director APAC,

trovicor

14:00 – 14:30

Speaker Identification Analysis inLawful Interception SystemsNikolay Vasiliev, Head of International Sales,

Speech Technology Center

Thursday, 25 February 20108:30 – 9:00

What LI Vendors Will Not Tell YouClearTrail Technologies

10:30 – 11:00

10 Must Have Features in an LISystemClearTrail Technologies

11:30 – 12:00

How to Tackle the Diversity ofGlobal CommunicationTechnologiesJoerg Schomburg, Solution Architect APAC,

trovicor

12:00 – 12:30

Consolidating LI SolutionsRainer Schiebenhöfer, Technical Project

Manager Utimaco LIMS

Track 2

ISS for Criminal Investigations This track is for Law Enforcement Agents,Intelligence and Security Analysts who haveinvestigation responsibilities associated withtelecom operator networks, forensics andelectronic surveillance technologies.

Tuesday, 23 February 201011:00 – 11:30

Comprehensive IntelligenceGathering and Its Vital Role inNational SecurityHany El-Manawy, Head of Marketing,

Al Fahad Group

11:30 – 12:00

The Potential of Data Retention inCombating CrimesKjell Yving, Senior Sales Manager, Ericsson

13:15 – 13:45

The Distinct Roles and Values of anEnd-to-End IP Intercept SolutionMalek Akilie, Managing Director, MENA

Sales, SS8

13:45 – 14:15

Bringing It Together – How toConnect and Integrate the Systemsand Data from all the SourcesGuglielmo Caruso, HP Investigation

solutions Chief Architect, HP

14:45 – 15:15

Meeting the Changing Dynamics,Challenges and Threats in theCyber World Chris Swan, SVP, Narus

15:15 – 15:45

The Identity Management in theLI: the Key to Identify the NewEra Targets Pietro Felici, Presales Engineer, AREA

16:15 – 16:45

DPI and VoIP, Match or Misfit forLI DemandsDirk Schrader, Sales Director Utimaco LIMS

16:45 – 17:15

Different Sides of the Same Coin?Frans Dreyer, CEO, VASTech

Wednesday, 24 February 201013:30 – 14:00

Lawful Interception: The BiggerPicture Otto Kern, Group 2000 Nederland B.V

14:00 – 14:30

Useful Applications of NetworkForensics Techniques for Securityand Law Enforcement TeamsEddie Schwartz,Chief Security Officer,

NetWitness Corporation

15:30 – 16:00

Mass Monitoring & Data StorageClearTrail Technologies

16:00-16:30

Multi Model IntelligentInterception SystemDr. Mahmoud Fahmy, CEO, IST Networks

16:30-17:00

Massive Monitoring of ShortMessages Services,Jean-Philippe Lelievre,

THALES Communications

Special Voice BiometricsAnd Speech AnalysisSessions

Wednesday, 24 February 20109:00 – 9:30

Voice Analysis: Cutting-EdgeTechnologies and Future Trends Dr. Stephan Grashey, Expert Voice Solutions,

trovicor

9:30 – 10:00

A New Generation of VoiceBiometrics for Intelligence andMassive Interception Systems Emilio Martinez, CEO, Agnitio

11:15 – 11:45

The Use of High PerformanceAutomatic Voice and SpeechAnalysis to SupportCommunications IntelligenceAngelo Ferraris, Sales Manager -

Government & Intelligence, Loquendo

11:45 – 12:15

Voiceprint Identification –Approach and PracticeKonstantin Popov, International Sales

Manager, Speech Technology Center

13:30 – 14:30, Track 7, LEA Training Session

Voices – Acoustic FingerprintsDr. Stephan Grashey, Expert Voice Solutions,

trovicor

15:30 – 16:30

A Demonstration of Key WordSpotting and SpeakerRecognition SystemsLuciano. Piovano, Loquendo

TRACK 7–LEA TRAINING SESSION

23-25 FEBRUARY 2010 • JW MARRIOTT • DUBAI, UAE

ISSWorld®MEAIntelligence Support Systems for Lawful Interception,

Criminal Investigations and Intelligence Gathering

Page 4: Where Telecom Operators, Law Enforcement, Defense and the

Thursday, 25 February 2010 8:30 – 9:30

Understanding Voice BiometricSpeaker Identification for CriminalInvestigations and IntelligenceGatheringAgnitio presenter to be announced10:00 – 11:00

Product Demonstration forAgnitio’s Voice BiometricsForensic ApplicationsAgnitio presenter to be announced10:00 – 10:30

Finding the Needle in a HaystackLukas Grunwald, DN-Systems International

10:30 – 11:00

Empowering LEAs to RegainControl over InternetCommunication – a HolisticApproachPatrick Koebel, Account Director APAC,

trovicor

Track 3

ISS for Data Retention andRegulatory Compliance

Wednesday, 24 February 20109:00 – 10:00

Data Retention “Best Practices”Guru PanelRené Nitzinger, Product Manager

Utimaco LIMSJesper Mathiesen, Head of Solution Sales,

trovicorAndrea Fabrizi, Investigation Solutions GM, HPVineet Sachdev, Senior Director, SS8

11:15 – 11:45

A Network-Based Approach toData RetentionErik Larsson, Vice President Marketing,

Qosmos

11:45 – 12:15

Optimal Data Retention – AStrategic, Best Practices Approachto Communications Data Retention Andrea Fabrizi – HP Investigation solutions

General Manager, HP

13:30 – 14:00

Practical Tips for ImplementingData Retention SystemsRené Nitzinger, Product Manager

Utimaco LIMS

14:00 – 14:30

Metadata Extraction andRetention for IP ApplicationsVineet Sachdev, Sr. Director, Solution

Engineering, SS8

15:30 – 16:00

Watching the Watchers: DesigningChecks and Balances in LawfulInterception SystemsJaya Baloo, Practice Lead Lawful

Interception, Professional ServicesEMEA, Verizon Business

16:00 – 17:00

ETSI/TC LI Standards UpdatePeter Van de Arend, Chairman, ETSI/TC LI

Track 4

ISS for Mobile Location,Surveillance and InterceptThis track is for Law Enforcement, InteriorSecurity and the Intelligence Communitywho have to work with cellular and mobilesatellite operators to locate targets andintercept communications.

Tuesday, 23 February 201013:15 – 13:45

Enhancing Mobile Data Interceptwith Identity and Location Datafrom Network SignalingKeith Driver, Product Manager,

Telesoft Technologies

13:45 – 14:15

Next Generation LI PositioningOpportunitiesSten Lundell, Senior Sales Manager,

Ericsson

14:45-15:15

Precise and Secure Location ofMobile TelephonesJean-Philippe Lelievre, THALES

Communications

16:15 – 17:15

Mobile Location, Monitoring andSatellite Intercept Guru PanelSteve O’Neill, VP, Product line Management,

TruePositionKeith Driver, Head of Business

Development, Telesoft TechnologiesBhavin Shah, Director of Marketing and

Business Development, Polaris WirelessMartin Dawson, Chief Product Architect

GeoLENs™, Andrew Network SolutionsDavid Vincenzetti, Partner, Hacking TeamRichard Grundy, Capability Manager, L-3 TRL

TechnologyJean-Philippe Lelievre, THALES

Communications

Wednesday, 24 February 20109:00 – 9:30

From ‘Where’ to ‘Who and What’:Using Polaris WLS to DetermineWho the Targets Are and WhatThey’re DoingBhavin Shah, Director of Marketing and

Business Development, Polaris Wireless

9:30 – 10:00

Portable Satellite MonitoringSolutions Gathering Intelligencein a Tactical EnvironmentRichard Grundy, Capability Manager,

L-3 TRL Technology

11:15 – 11:45

Leveraging Mobile NetworkEvents to Identify and LocateCriminal ActivitySteve O’Neill, VP, Product Line Management,

TruePosition

11:45 – 12:15

Overview of Location Technologyfor Mission Critical ApplicationsDominic Li, VP, Portfolio Management and

Marketing, TruePosition

11:15 – 12:15

Product Presentation andDemonstration: Monitoring MobileSatellite Phone Handsets, Inmarsat,Thuraya, ACeS/IsatphoneRichard Grundy, Capability Manager,

L-3 TRL Technology

13:30 – 14:30

Location Enabled NetworkSolutions for National SecurityMartin Dawson, Chief Product Architect

GeoLENs™, Andrew Network Solutions

Thursday, 25 February 20108:30 – 9:00

New Generation IP Based TacticalDevicesEmanuele Marcozzi, Presales Engineer, AREA

Track 5

DPI and Intelligent Probesfor Lawful Interception,Network Security andTraffic Management

Tuesday, 23 February 201014:45 – 15:45

Best DPI Deployment Practices forLI, Network Security and TrafficManagement Guru Panel Martin Hayes, Product Manager IP, trovicorErik Larsson, Vice President Marketing,

QosmosCristian D’Incertopadre, Business Development

Manager, IPS-Intelligence & PublicSecurity

Kevin Graves, CTO, IP FabricsMarco Germoni, Director of Engineering,

Bivio NetworksKlaus Mochalski, CEO, iPoque

16:15 – 16:45

IP Guardian – Putting Full Controland Flexibility in the Hands ofLEAs and Intelligence CommunityDavid Helms, Architect IP Solutions,

Al Fahad Group

TRACK 7–LEA TRAINING SESSION

TRACK 7–LEA TRAINING SESSION

TRACK 7–LEA TRAINING SESSION

Page 5: Where Telecom Operators, Law Enforcement, Defense and the

16:45 – 17:15

Controlling Gray TelephonyKlaus Mochalski, CEO, iPoque

Wednesday, 24 February 201011:15 – 11:45

Deep Packet Inspection as a CoreTechnology for Law Enforcementand National SecurityMarco Germoni, Director of Engineering for

Internet Applications, Bivio Networks

11:45 – 12:15

The Case for Intelligent InterceptProbes Kevin Graves, CTO, IP Fabrics

13:30 – 14:00

Isn’t It Just HTTP? – Application-Oriented Interception (Part 1)Alessandro Guida and Peter Eichler,

ATIS systems

14:00 – 14:30

Isn’t It Just HTTP? – Application-Oriented Decoding (Part 2)Alessandro Guida and Peter Eichler,

ATIS systems

15:30 – 16:00

Leveraging DPI and NetworkIntelligence to Develop Next-Generation Cyber Security SolutionsErik Larsson, Vice President Marketing,

Qosmos

16:30 – 17:00

IP Interception – the Challenge ofFlux in the Internet Martin Hayes, Product Manager IP, trovicor

Track 6

ISS for IntelligenceGathering and Analysis

Tuesday, 23 February 201011:00 – 11:30

Catch Me If You Can –Investigation Work in PracticeNagui Erian, ATIS systems

11:30 – 12:00

Are You Drowning? EvaluationStrategies for International Trunk& Backbone TrafficBernd Fiedler and Helmut Huschka, ATIS

systems

13:14 – 13:45

Conducting Deep Surveillance ofComputer Networks to ObtainIntelligenceEddie Schwartz,Chief Security Officer,

NetWitness Corporation

13:45 – 14:15

Bringing Order Into the Chaos –Statistical Limitations Dr. Stefan Cronjaeger, Head of Product Line

IPF & Analytics, trovicor

14:45 – 15:15

A Stealth, Spyware-Based Systemfor Attacking, Infecting andMonitoring Computers andSmartphonesDavid Vincenzetti, Partner, Hacking Team

15:15 – 15:45

Intelligence by Correlation ofMultiple SourcesRenaud ROQUES, Amesys

16:15 – 16:45

Search Engine and Data Mining —a Potential Symbiosis Dr. Stefan Cronjaeger, Head of Product Line

IPF & Analytics, trovicor

16:45 – 17:15

Evaluation and Intelligence Fusionin Technical ReconnaissanceDr. Hans Joachim Kolb, Managing Director

MEDAV GmbH

Wednesday, 24 February 20109:00 – 9:30

Future Intelligence Analytics:Collaboration, Processing andVisualizationAlexander Gruchmann, Product Manager,

Plath GmbH

Track 7

LEA, Intelligence andDefense Analyst Trainingand ProductDemonstration TrackThis training and product demonstrationtrack is open only to Law Enforcement,Intelligence, Defense Analysts and otherGovernment Executives.

Tuesday, 23 February 201011:00 – 12:00

Tactical Mobile Phone Infectionand Interception Beyond BordersMJM, IT Intrusion Export, Gamma Group

11:00 – 12:00

HP Investigation Solutions – TheComprehensive IntelligenceSupport SolutionAndrea Fabrizi, HP Investigation solutions

General Manager, HP

13:15 – 14:15

Next Generation Targeting andAnalytics: The Future of LawfulInterceptJerry Miille, Director of Product Management,

NarusBrett Taylor, Systems Engineer, Narus

14:45 – 15:45

Training on Data Retention LEAClient Pompeo Santoro, Strategic Product Manager,

Ericsson

14:45 – 15:45

Zebra Passive Surveillance Systemfor Interception of On-NetCommunications TrafficGeorge Horn, Development Manager, VASTechFabrizio Diantina, Channel Manager, VASTech

16:15 – 17:15

A Web Masterkey for IntelligenceAnalysis on Social NetworksUgo Santillo, International Sales Department,

IPS-Intelligence & Public Security

16:15 – 17:15

FinFisher IT Intrusion SuiteMJM, IT Intrusion Export, Gamma Group

Wednesday, 24 February 20109:00 – 10:00

Klarios® 2.0 — Investigative Workin a Multi-Media EnvironmentNagui Erian, ATIS systems

9:00 – 10:00

Fox-IT Product Demonstration Bert Hubert, CTO Fox Replay, Fox-IT

11:15 – 12:15

Product Presentation andDemonstration: MonitoringMobile Satellite Phone Handsets,Inmarsat, Thuraya, ACeS/IsatphoneRichard Grundy, Capability Manager,

L-3 TRL Technology

13:30 – 14:30

Demonstration of NetworkIntelligence Extraction Engine forLawful InterceptionJerome Tollet, CTO Qosmos

13:30 – 14:30

Location Enabled NetworkSolutions for National SecurityMartin Dawson, Chief Product Architect

GeoLENs™, Andrew Network Solutions

13:30 – 14:30

Voices – Acoustic FingerprintsDr. Stephan Grashey, Expert Voice Solutions,

trovicor

15:30 – 16:30

REMOTE CONTROL SYSTEM v6:The ULTIMATE WEAPON forAttacking and CovertlyMonitoring PCs and SmartphonesMarco Valleri, Senior Security Engineer, and

Alfredo Pesoli, Senior Security Engineer,Hacking Team

15:30 – 16:30

A Demonstration of Key WordSpotting and SpeakerRecognition SystemsLuciano. Piovano, Loquendo

15:30 – 16:15

How to Access Data Directly fromPCs – an Interception Demo Michael Eisenschmid, Head of Product

Management, trovicor

SESSION C

SESSION B

SESSION A

SESSION C

SESSION B

SESSION A

SESSION A

SESSION B

SESSION A

SESSION B

SESSION A

SESSION B

SESSION A

SESSION B

SESSION A

SESSION A

Page 6: Where Telecom Operators, Law Enforcement, Defense and the

Registration InformationSave $300 by registering before 23 January, 2010

Telecommunications Service Provider or Government Registration

ISS World Conference (Tracks 1 to 6) and Exhibits ......................$995Registration after 23 January 2010 ..........................................$1,295

Law Enforcement/DHS/IC/DoD Registration*

ISS World Conference (Tracks 1 to 6), Training Track 7 plus Exhibits.........................................................$995 Registration after 23 January 2010 ............................................$1,295

Vendor Registration

ISS World Conference (Tracks 1 to 6) and Exhibits ...................$1,995Registration after 23 January 2010 ...........................................$2,295*Note: To Attend the LEA/DHS/IC/DoD Training Track 7 you must be asworn law enforcement officer or military/intelligence/governmentemployee. Also you must register by 17 February 2010 in order to verifyeligibility. Government photo ID required for Track 7 classroom access.Free Colleague Registration: Register as paid and you can invite acolleague to join you with a full, free conference pass. If you havenot identified your guest at this time, just enter “guest of” followedby your name and complete with your contact information. You canregister your guest at no charge at a later time.Conference Hotel: ISS World® MEA will be held at the five star JW Marriott Hotel Dubai. To reserve a room go tohttp://cwp.marriott.com/dxbae/issworlddubai or call 971 42624444.Transfers and Substitutions: Transfers and substitutions arepermissible up to 24 hours in advance of conference date.Cancellations and No-Shows: If you are unable to attend, there is nopenalty if your cancellation is received in writing two weeks prior toconference date. Cancellations after that date are subject to a 25%service charge. Registrants who do not attend and who do not cancelbefore the conference date are liable for the full registration fee. Ifconference is postponed or cancelled, TeleStrategies is notresponsible for any airfare, hotel or other costs incurred by registrants. Conference Payment: Your registration fee must be paid prior tothe ISS World event: VISA, American Express, MasterCard,Company Check and Wire Transfer are acceptable forms ofpayment, please contact TeleStrategies Accounting +1-703-734-7050 or Fax +1-703-556-3959 or Email [email protected] mail to TeleStrategies, PO Box 7443, McLean, VA, 22106, USAInternational Attendees: If you need U.A.E. Visa assistance to attendISS World, please contact Tatiana Lucas at [email protected] by Invitation Only: To attend ISS World you must be aTelecommunications Service Provider, government employee, LEA orvendor with LI, surveillance or network products or services. If youhave questions e-mail Tatiana Lucas at [email protected].

Prepayment Required:

(payment in full is required before attendance)■■ My check is enclosed in the amount of $_____________■■ Please bill my company.■■ Please bill my: ■■ VISA ■■ MasterCard ■■ American Express

N A M E J O B T I T L E

C O M PA N Y

A D D R E S S

C I T Y S TAT E / P R O V I N C E

C O U N T R Y Z I P / P O S TA L / C O U N T R Y C O D E

E M A I L

A C C O U N T N O . E X P.

C A R D H O L D E R ’ S N A M E ( P L E A S E P R I N T )

S I G N AT U R E

FREE Colleague Registration

Register as paid and you can invite a colleague to join you with a FREEConference Pass. If you have not identified your guest at the time, justenter “Guest of” followed by your name and contact information.

Your Guest:

G U E S T N A M E

J O B T I T L E

E M A I L

All Contents © TeleStrategies 2010

Registration

Phone: 1-703-734-7050 • Fax: 1-703-893-3197 • Online: www.telestrategies.com

16:15 – 17:00

Finding the Fishy Needle in theHaystack with NADRAT – aDemonstration Christian Sojtschuk, Solution Architect, trovicor

Thursday, 25 February 2010 8:30 – 9:30

Data Analysis Case StudyAlper Tosun, BTT Bilgi Teknoloji Tasarim

10:00 – 11:00

An Integrated Platform for All YourLawful Interception ActivitiesLuca Bergonzi, Presales Engineer, AREA

10:00 – 11:00

Product Demonstration forAgnitio’s Voice BiometricsForensic ApplicationsAgnitio presenter to be announced11:30 – 12:30

Application Based Splitting andBlocking of IP trafficLukas Grunwald, DN-Systems

International

11:30 – 12:30

Live Demonstration of SmartSystem for Monitoring HTTPSCommunicationsClearTrail Technologies

Special BKForensics CellPhone Forensics Training8:30 – 9:30

BKForensics SIM ANALYSIS

10:00 – 11:00

Preserving the Evidence

11:30 – 12:30

Physical and Logical AnalysisOverviewPresented by BKForensics-Cell Phone

Forensic Solutions

SESSION C

SESSION C

SESSION C

SESSION C

SESSION B

SESSION A

SESSION B

SESSION A

SESSION A

Page 7: Where Telecom Operators, Law Enforcement, Defense and the

ISS World® MEA Exhibits24 February 2010 – 10:00 to 17:30 • 25 February 2010 – 9:30 to 12:30

Lead SponsorsISSWorld®MEA23-25 FEBRUARY 2010 • JW MARRIOTT • DUBAI, UAE

Lead Sponsor

trovicor was founded as the VDR ( Voice & Data Recording) business unit within the Siemens corporation in 1993. Since then, we havebecome an industry leader who provides project and turnkey intelligence solutions. These are a combination of own core development andthe integration of best-in-class third party products as well as our customer-centric Care Programs. Presently, we employ some 170experts worldwide. Our office in Munich addresses Europe, the Community of Independent States (CIS) as well as both Americas; oursubsidiaries in Dubai and Islamabad cater for the Middle East and Africa; and the Kuala Lumpur office addresses Asia Pacific. Many andvaried Monitoring Center solutions as well as other intelligence projects have given us an indepth experience in their requirements. Todayas before, we strive to achieve the highest level of customer satisfaction.

Associate Lead Sponsors

Confidentiality and integrity-of-secrecy are not “givens” in LI, these are values to be exercised and executed in perpetude. These are theprinciples driving Al Fahad group to provide LI and other national security solutions. We have therefore been recognizing exponentialgrowth over the last 5 years in providing national security solutions ranging from Interception, mediation, comprehensive protocoldecoding including webmail and web 2.0 services; evidence processing, forensics, fraud detection, surveillance and cyber intelligence.

Telesoft Technologies products allow intelligence agencies, system integrators and service providers to extract information from fixed, 2/3Gmobile and packet networks. Our universal passive probes extract call content, signalling and location information for use by monitoringapplications. Over 250 operators in more than 100 countries use our equipment ensuring wide protocol compatibility and seamlessconnection of your applications to real world systems. www.telesoft-technologies.com.

Ericsson is shaping the future of Fixed and Mobile Broadband communications through its continuous technology leadership. Providinginnovative solutions in more than 175 countries, Ericsson is helping to create the most successful communication companies in the world.Ericsson offers state of the art Data Retention and Lawful Interception Solutions. http://www.ericsson.com

Spectronic Systems is an independent and 100% privately owned company working exclusively with governments and governmentapproved agencies. The Spectronic Systems activities include development and manufacturing of monitoring systems and monitoringcentres handling telephony, internet/IP, fax and modem traffic for intelligence and law enforcement agencies. These solutions can act as dataretention systems and/or as an intelligence platform for bulk monitoring of SMS, MMS, e-mails or other means of data communication.

Founded and headquartered in Bad Homburg, Germany, the ATIS Group has 200 employees – of which the majority are engineers – in fivecountries across Europe, Asia and North America. Drawing on a long history of success and experience – 60 years in recording technologyand 15 years in the field of integrated lawful interception – ATIS is a key technology partner for both the public and private sectors.

Since 1994 Utimaco has been providing lawful interception systems for mobile and fixed network operators and Internet service providers.The Utimaco Data Retention Suite was introduced in response to the EU directive 2006/24/EC and at the request of telecom customersfor integrated LI and DR solutions. With more than 130 installations in 60 countries. For more information visit www.utimaco.com/lims

Gamma International presents its unique IT Intrusion portfolio - FINFISHER - at the ISS World EMEA Dubai 2010. The FinFisher IT Intrusionproducts contain the most comprehensive online research and infection functionality found in any other solution. The FinFisher portfoliocombined with superior training at Gamma’s IT Intrusion Training Institute differentiates Gamma International as the leading company in thefield of Cyber Surveillance and Counter Surveillance. For more information contact: [email protected]

Elaman provides various solutions for tactical and strategic Communications Monitoring Systems for Telephone, Internet,wireless/cellular/Satellite networks, Radio Frequency and can be the sole supplier, integrator and technical consultant for such systems.Our combination of developments and systems, using best in class products and integrating different systems, enables Elaman, to provideour clients with a unique portfolio of the best services and solutions on the market. For more information visit www.elaman.de

SS8 is a leader in communications interception and a worldwide provider of regulatory compliant, electronic intercept and surveillancesolutions. Headquartered in the heart of the Silicon Valley in Milpitas, California, SS8 has a global reach and is an independent provider ofregulatory-compliant electronic surveillance solutions that have been deployed in over 25 countries for the largest wire-line, wireless, cable,VoIP and satellite service providers. SS8 products are sold and supported both directly and through OEM partnerships. www.SS8.com

HACKING TEAM is a company totally focused on IT OFFENSIVE SECURITY intelligence solutions for LEAs and Security Agencies. RemoteControl System V6 (RCS) is a premier, integrated, multi-OS platform for remotely attacking, infecting and controlling target computers andmobile phones. It is a PROVEN technology: it is being used by Agencies worldwide since 2003 - Target monitoring includes Skype, chat,mail, web, removable media, encrypted communications, PGP, GSM-cell GEO-tracking, GPS GEO-tracking, voice calls, etc. For moreinformation [email protected]

AREA is a leading vendor of LI systems and projects. Since 1999, when it introduced its first IP based digital multichannel digital recorder.MCR System, the complete voice & data Monitoring Center, is the core element which includes IP Probes and Data Analysis. In additionAREA develops surveillance systems, such as Vehicle Tracking and Video Monitoring. www.areamcr.com

HP delivers a comprehensive portfolio of intelligence support systems (ISS) that meet the requirements for today's convergedcommunications services. Based on technology proven in successful deployments worldwide, HP Investigation solutions are modular andstandards-based, and take a fully-integrated, real-time approach to fulfillment of lawful requests for communications data. Together, theycomprise a complete, end-to-end offering for request management, lawful intercept, and data retention. www.hp.com/go/dragon

Qosmos develops network intelligence technology (an evolution of Deep Packet Inspection), which provides real-time visibility into data asit crosses networks. The company’s software development kit and hardware probes are used by Government Agencies, Law EnforcementAgencies (LEAs) and System Integrators to enhance their lawful intercept and cyber security solutions. www.qosmos.com