I want to inform about ISS World Latin America Agenda

(Certificates of ISS Tech Training Available Upon Request)

Unique Training Seminars (24 class Hours) Led by police force Officers and Ph.D Computer Scientists

On the web personal Media and Web Investigations (6 class room Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

Professionals Guide to Web Investigations (6 class room Hours) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police

Understanding Cellphone 2G, 3G, 4G and infrastructure that is 5G Intercept and Cryptography (2 class Hours) Presented by: Dr. Jerry Lucas, President, TeleStrategies

Understanding Cryptocurrency 101, DarkNet (TOR and TOR HS) and Defeating Encryption for Technical Investigators (4 class Hours) Presented by: Matthew Lucas (Ph.D., Computer Science, VP, TeleStrategies

Issues and factors in Financial criminal activity Investigations (5 class room Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is just a previous united states federal police force Officer.

Top 20 Open supply Tools (OSINT) Used in Cybercrime Investigations (One class Hour) Presented by: Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police

(Certificates of ISS Tech Training Available Upon Request)

Monday, 28 October 2019

Seminar # 1 09:00-17:15

On line personal Media and Web Investigations (6 class Hours) Presented by: Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police

This 1 day session offers an up-to-date comprehension of just how social media web sites work and just how members act and communicate. Attendees will discover just what info is available on different web web internet sites and exactly how to incorporate that information into unlawful investigations and intelligence analysis that is criminal.

Seminar #2 9:00-17:15

Professionals Guide to Web FreeLocalDates Investigations (6 class Hours) Presented by: Mark Bentley, Communications information Expert, nationwide Cyber Crime police, UK Police

The purpose of that one time seminar is always to make the attendees through the tips of comprehending the online, how to locate information, right through to a complete knowledge of practice that is best of an Internet investigator, having understanding and familiarity with most of the tools offered to accomplish that. It really is aimed mainly during the investigator, delivered through the perspective of detective, to enable them to truly have the most readily useful methodology and tradecraft to profile and catch suspects.

That is solely police force only, as Practical examples, covert and methodology that is investigative tradecraft is going to be offered through the seminar.

Seminar # 3 9:00-10:00

Understanding Cellphone 2G/3G/4G Infrastructure and Law Intercept for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies

This session presents exactly just what technical investigators need to find out about 2G/3G/4G technology infrastructure, Including: legal Interception of Voice, Data and Messaging, SIM Card Basics: Information Available (IMSI, Authentication Key, etc.) and Cryptography Algorithms (A3, A5 and A8) and monitoring objectives making use of CDR’s, SS7 Interconnect and IMSI Catchers and more.

Seminar # 4 10:15-11:15

Understanding 5G Infrastructure and legal Intercept alternatives for Technical Investigators delivered by: Dr. Jerry Lucas, President, TeleStrategies

This session can be an introduction to 5G and just just what technical detectives need to find out including: Infrastructure differences with 4G-LTE and 5G, New broadcast Access Technologies, and Understanding IMSI Encryption influence on LI and SUPI and SUCI replacement

Seminar # 5 11:30-12:30

Understanding 5G NFV, Network Slicing and Edge Computing for Law Enforcement Investigators Presented by: Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies

Seminar # 6 13:45-14:45

Cybercurrency 101: Introduction to What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, black online Commerce and Blockchain Analysis offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

This 101 training seminar is definitely an introduction to Bitcoin, the way the system can be used to guide unlawful activities (e.g. Black Web) and why technical detectives need to comprehend the basic Bitcoin deal apparatus (Blockchain) to effectively beat 21st century crooks and terrorist actions. Especially, this introduction to Bitcoin for technical detectives details:

Seminar # 7 15:00-16:00

Research Techniques for Unmasking TOR Hidden solutions and Other black online Operations offered by: Matthew Lucas (Ph.D, Computer Science), Vice President, TeleStrategies

TOR networks are notoriously good at hiding the identity that is online of, terrorists as well as others that are as much as no good. One other part that gets less attention are TOR services that are hidden. They are services that leverage TOR’s anonymizing capabilities to mask the identification of criminally-hosted online solutions – developing the cornerstone of almost all unlawful gambling internet sites, medication areas, son or daughter exploitation material, firearm product product sales, terrorism propaganda, and much more.

  • TOR hosting, what exactly is .ONION and content analysis
  • Tuesday, 29 October 2019

    Seminar #8 13:00-17:00

    Issues and factors in Financial criminal activity Investigations (3 class room Hours) Presented by: Michael Loughnane, CAMS, CFE, Loughnane Associates, LLC Mike is A us that is former federal Enforcement Officer whom specialized in complex fraudulence and cybercrime investigations and presently provides training to enhance detection and investigations of fraudulence, cash laundering and countertop terror finance.

    In this 1-day seminar we will talk about the tools and methods crooks utilize while the police force reaction. Each presentation defines varying elements of monetary business and crime models utilized by crooks along with police force practices and strategies to recognize and disrupt them. We shall talk about the basics in unlawful sites, key players, cash laundering, and trade-based cash laundering. We’re going to explain exactly just how information are available as cash is relocated around the globe and just how detectives will make use that is best with this knowledge. This training is aimed mainly in the detective and analyst, but in addition has application to your law enforcement, cleverness, and monetary community that is regulatory.