Tuesday, 29 October 2019 10:00 - 18:00
Wednesday, 30 October 2019 9:30 - 12:00
9:00-10:00 The world-wide-web, and how suspects leave a footprint that is digital. The way the system works for us, as detectives Mark Bentley, Communications information professionals, nationwide Cyber Crime police force, UK Police
10:15-11:15 acknowledging Traffic Data and electronic profiling via social support systems and devices - electronic shadows Mark Bentley, Communications information professionals, National Cyber Crime police force, UK Police
15:00-16:00 Advanced approaches to Tracing Suspects, a problem that is lateral Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
9:00-10:00 Session a interception that is lawful 5G systems This session will elaborate the wants as well as the challenges of legal interception in present and future cordless systems. System operators and police force agencies can get practical advice and learn about most readily useful training practices when it comes to utilization of LI in 5G companies. Presented by Utimaco TS GmbH
9:00-10:00 Session B Data Fusion and Analytics for National protection and Intelligence Saran Gopalakrishnan, Yaana
14:30-15:30 Session A IBM i2 Intelligence research delivers brand brand brand new and improved abilities for performance optimization and efficient information managment Presented by Vanume
14:30-15:30 Session B Voice Biometrics and Speech Analytics deployments in real-world situations Kristof Lorinczy, Phonexia
16:00-17:00 Session B off and on Field Synergy: Communicate, Track and track with Tassta Elmer HernГЎndez, Gisnet
8:30-9:30 Real Time Demo. Cyberoperation: Invisible control of Android smart phones and Bing Clouds AVAILABLE TO LEA AND GOVT JUST Antonio Ramos, COO, MOLLITIAM INDUSTRIES
10:30-11:30 5G: Keep Calm & keep on with LI AVAILABLE TO LEA AND GOVT JUST Gregg Sandridge, Yaana
10:15-11:15 Acquiring goals into the sphere that is digital wearing down crime https://hookupdate.net/nl/milfaholic-recenzja/ research with ProFound offered by Digital Clues
11:30-12:30 every person actually leaves a trace - how a electronic sphere has end up being the ultimate location for target acquisition offered by Digital Clues
16:15-17:15 Open Source Tools, resources and practices - a stroll through my free police force available supply tools web web web site Mark Bentley, Communications Data Specialists, nationwide Cyber Crime police force, UK Police
9:00-10:00 Big intelligence that is content the Multimedia Laboratory offered by everis advertisements
13:00-14:00 Session a an internal look into the planet of cyber cleverness Presented by Wintego
13:00-14:00 Session B The Butterfly impact: Making the net a safer place Omri Timianker, President,Cobwebs Technologies
14:30-15:30 The pieces fit: re re solving the intelligence puzzle with multi supply fusion Presented by WebintPro
16:00-17:00 Live Demo. Cyberoperation: invisible control over Windows/macOS systems Antonio Ramos, COO, MOLLITIAM INDUSTRIES
8:30-9:30 Information scraps and big information exploitation Presented by Vanume
12:00-13:00 Top 20 Open supply Tools (OSINT) utilized in Cybercrime Investigations Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
9:00-10:00 Proxies, VPNs, and black internet: identification Concealment and Location Obfuscation Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
10:15-11:15 Tor, onion routers, Deepnet and Darknet: An Investigator's attitude: ROLE 1/2 Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
11:30-12:30 Tor, onion routers, Deepnet and Darknet: a dive that is deep Criminal Investigators: ROLE 2/2 Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
13:45-14:45 Awareness of appearing Technologies, Masking Tech and Tools, TOR and proxies Mark Bentley, Communications information Professional, nationwide Cyber Crime police force, UK Police
13:45-14:45 Cybercurrency 101: exactly just exactly What Technical Investigators Need to understand about Bitcoin and Altcoin Transactions, black online Commerce and Blockchain review Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
15:00-16:00 Investigation processes for Unmasking TOR Hidden solutions and Other black online Operations Matthew Lucas (Ph.D, Computer Science), VP, TeleStrategies
9:00-10:00 real case that is live monitoring and action on Open Sources to manage sourced elements of destabilization and mass control in electoral processes and basic hits. Samuel Alvarez, CEO, MOLLITIAM INDUSTRIES
9:00-10:00 Mobile that is understanding 2G/3G/4G and Law Intercept for Technical Investigations Dr. Jerry Lucas, President, TeleStrategies
10:15-11:15 Learning 5G Infrastructure, brand brand New Radio and legal Intercept Challenges for Technical Investigators Dr. Jerry Lucas, President, TeleStrategies
11:30-12:30 understanding NFV that is 5G Slicing and Edge Computing for Law Enforcement Investigators Matthew Lucas (Ph.D., Computer Science), VP, TeleStrategies
11:30-12:30 WIFI, geolocation, and mobile phone information traces and Mark that is tracking Bentley Communications information Professional, nationwide Cyber Crime police force, UK Police
11:30-12:30 Tor, onion routers, Deepnet and Darknet: A Deep plunge for Criminal Investigators Charles Cohen, Vice President at NW3C, the National White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
13:45-14:45 Cellular Handset Geolocation: Investigative possibilities and private Security dangers Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
13:45-14:45 The convenience of Interception and Cyber: just just How CAPTUR has accomplished easier, cheaper and Effective native interception that is 2G/3G/4G a boost of Cyber-Attack and a good touch of Wi-Fi delivered by Almenta
15:00-16:00 Collecting proof from Online personal Media: Building a Cyber-OSINT Toolbox (component 1) Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
15:00-16:00 How will Blockchain take part in the development of Cellphone Security offered by Koolspan
16:15-17:15 Collecting proof from on the web personal Media: Building a Cyber-OSINT Toolbox (component 2) Charles Cohen, Vice President at NW3C, the nationwide White Collar Crime Center, Professor in Practice Criminal Justice, Indiana University and Retired Captain, Indiana State Police
13:00-14:00 Session A Mobile Location Intelligence: just how to leverage targeting that is active Big Data and tactical geolocation abilities Presented by Argos Defense
13:00-14:00 Session B Mobile Location Intelligence: just how to leverage active targeting, Big Data and tactical geolocation abilities Presented by Creativity computer computer Software
14:30-15:30 Session A (ENGLISH LANGUAGE) Practical and innovative illustration of changing Android OS by HEX modifying system files, and achieving regular applications to produce surveillance. Denis Cuculic, CEO ex. Mind of Technical Department, PRO4SEC
14:30-15:30 Session B Tactical tabs on Satellite Comms Inmarsat mobile Pro and Iridium traffic. Voice, information, geolocation, SBD Brief Burst Information. Presented by PAT Systems
16:00-17:00 Session a identification that is real-time geo-location in mobile systems: how exactly to recognize and obtain, in real-time, the accurate place of a handset in a mobile system Presented by Evistel