Where Telecom Operators, Law Enforcement, Defense and the ...
Transcript of Where Telecom Operators, Law Enforcement, Defense and the ...
®
Where Telecom Operators, LawEnforcement, Defense and
the Intelligence Community Turn to Learn and Network
Where Telecom Operators, LawEnforcement, Defense and
the Intelligence Community Turn to Learn and Network
23-25 FEBRUARY 2010 • JW MARRIOTT • DUBAI, UAE
97 LEA/Interior/DoD Training Sessions and Courses to Choose From
ISSWorld®MEA
Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering
Register 1
and 2nd FREE!
Associate Lead SponsorsLead Sponsor
Exhibitors and Sponsors
For Complete ISS World® Conference Session Descriptions, Go To www.telestrategies.com
ISS World MEA is the world’s largest gatheringof Middle East and African Law Enforcement,Intelligence and Homeland Security Analystsand Telecom Operators responsible for lawfulinterception, electronic investigations andnetwork Intelligence gathering.
ISS World Programs present themethodologies and tools to bridge thechasms from lawful intercept data gatheringto information creation to investigatorknowledge to actionable intelligence.
ISS World MEA Program
Conference Track 1
ISS for Telecom Operator LawfulInterception
Conference Track 2
ISS for Criminal Investigation
Conference Track 3
ISS for Data Retention andRegulatory Compliance
Conference Track 4
ISS for Mobile Location,Surveillance and Intercept
Conference Track 5
DPI for Lawful Interception,Network Security and TrafficManagement
Conference Track 6
ISS for Intelligence Gathering andAnalysis
Conference Track 7
LEA and Intelligence AnalystTraining and ProductDemonstrations
Tuesday, 23 February 20108:45 – 9:00
Welcoming RemarksTatiana Lucas, ISS World Program Director,
TeleStrategies
9:00 – 10:30
Top Ten Internet Challenges FacingLaw Enforcement and theIntelligence CommunityModerator: Dr. Jerry Lucas, President,
TeleStrategiesGuru Panel:Joergen Axland, COO & Strategy, trovicorKeith Driver, Head of Business
Development, Telesoft TechnologiesRudolf Winschuh, Business Development
Manager, Utimaco LIMSPeter Weinlich, Professional Services
Manager, Al Fahad GroupJerome Tollet, CTO, QosmosAlessandro Guida, ATIS Systems
Track 1
ISS for Lawful InterceptionThis track is for Telecom Operators and Law Enforcement/Intelligence/DefenseAnalysts who are responsible for specifyingor deploying lawful intercept networkinfrastructure.
Tuesday, 23 February 201011:00 – 12:00
Global Interception Solutions Carlos Gandini, Head of Sales APAC,
trovicor
11:00 – 11:30
Managing Virtual Identities AcrossIP NetworksJean-Philippe Lion, Vice President EMEA,
Qosmos
11:30 – 12:00
Lawful Interception in NextGeneration IMS and LTENetworksVineet Sachdev, Sr. Director, Solution
Engineering, SS8
13:15 – 14:15
LI for New IP Services “Best Practices” Guru PanelJoergen Axland, COO & Strategy, trovicorRudolf Winschuh, Business Development
Manager Utimaco LIMSErik Larsson, Vice President Marketing,
QosmosBert Hubert, CTO Fox Replay, Fox-ITAlessandro Mordacci, Senior Advisor, EricssonKlaus Mochalski, CEO, ipoque
14:45 – 15:15
Team Based Processing of IPIntercepts: Multiplying YourSurveillance CapabilityBert Hubert, Function: CTO Fox Replay, Fox-IT
15:15-15:45
A Holistic Approach toImplementing Mobile Location forLawful Intercept, from LegislationCompliance to RoIRichard Lee, CEO, Creativity Software Ltd
16:15 – 16:45
Interception Solutions–IntegratedToday and Scalable for TomorrowAlan Dubberley, VP, Aqsacom
16:45 – 17:15
How to Save Money andResources In Deployment of Large IP Monitoring Centers Nazareno Saguato, Presales Manager, AREA
Wednesday, 24 February 20109:00 – 9:30
Network Level VoIP Interceptionwith Voitap™Murat Balaban, Founder and Director of R&D,
Endersys
9:30 – 10:00
How IPv6 Will Change the Gamefor LIKlaus Mochalski, CEO, ipoque
11:15 – 11:45
Dynamic Triggering in LIRudolf Winschuh, Business Development
Manager Utimaco LIMS
SESSION B
SESSION B
SESSION A
ISSWorld®MEAIntelligence Support Systems for Lawful Interception,
Criminal Investigations and Intelligence Gathering
23-25 FEBRUARY 2010 • JW MARRIOTT • DUBAI, UAE
Exhibits
24 February 2010, 10:00 to 17:3025 February 2010, 9:30 to 12:30
11:45 – 12:15
Lawful Interception in FutureNetworksAlessandro Mordacci, Senior Advisor, Ericsson
13:30 – 14:00
Economic Aspects of the ChangedLI Paradigm Marcelo Riccitelli, Account Director APAC,
trovicor
14:00 – 14:30
Speaker Identification Analysis inLawful Interception SystemsNikolay Vasiliev, Head of International Sales,
Speech Technology Center
Thursday, 25 February 20108:30 – 9:00
What LI Vendors Will Not Tell YouClearTrail Technologies
10:30 – 11:00
10 Must Have Features in an LISystemClearTrail Technologies
11:30 – 12:00
How to Tackle the Diversity ofGlobal CommunicationTechnologiesJoerg Schomburg, Solution Architect APAC,
trovicor
12:00 – 12:30
Consolidating LI SolutionsRainer Schiebenhöfer, Technical Project
Manager Utimaco LIMS
Track 2
ISS for Criminal Investigations This track is for Law Enforcement Agents,Intelligence and Security Analysts who haveinvestigation responsibilities associated withtelecom operator networks, forensics andelectronic surveillance technologies.
Tuesday, 23 February 201011:00 – 11:30
Comprehensive IntelligenceGathering and Its Vital Role inNational SecurityHany El-Manawy, Head of Marketing,
Al Fahad Group
11:30 – 12:00
The Potential of Data Retention inCombating CrimesKjell Yving, Senior Sales Manager, Ericsson
13:15 – 13:45
The Distinct Roles and Values of anEnd-to-End IP Intercept SolutionMalek Akilie, Managing Director, MENA
Sales, SS8
13:45 – 14:15
Bringing It Together – How toConnect and Integrate the Systemsand Data from all the SourcesGuglielmo Caruso, HP Investigation
solutions Chief Architect, HP
14:45 – 15:15
Meeting the Changing Dynamics,Challenges and Threats in theCyber World Chris Swan, SVP, Narus
15:15 – 15:45
The Identity Management in theLI: the Key to Identify the NewEra Targets Pietro Felici, Presales Engineer, AREA
16:15 – 16:45
DPI and VoIP, Match or Misfit forLI DemandsDirk Schrader, Sales Director Utimaco LIMS
16:45 – 17:15
Different Sides of the Same Coin?Frans Dreyer, CEO, VASTech
Wednesday, 24 February 201013:30 – 14:00
Lawful Interception: The BiggerPicture Otto Kern, Group 2000 Nederland B.V
14:00 – 14:30
Useful Applications of NetworkForensics Techniques for Securityand Law Enforcement TeamsEddie Schwartz,Chief Security Officer,
NetWitness Corporation
15:30 – 16:00
Mass Monitoring & Data StorageClearTrail Technologies
16:00-16:30
Multi Model IntelligentInterception SystemDr. Mahmoud Fahmy, CEO, IST Networks
16:30-17:00
Massive Monitoring of ShortMessages Services,Jean-Philippe Lelievre,
THALES Communications
Special Voice BiometricsAnd Speech AnalysisSessions
Wednesday, 24 February 20109:00 – 9:30
Voice Analysis: Cutting-EdgeTechnologies and Future Trends Dr. Stephan Grashey, Expert Voice Solutions,
trovicor
9:30 – 10:00
A New Generation of VoiceBiometrics for Intelligence andMassive Interception Systems Emilio Martinez, CEO, Agnitio
11:15 – 11:45
The Use of High PerformanceAutomatic Voice and SpeechAnalysis to SupportCommunications IntelligenceAngelo Ferraris, Sales Manager -
Government & Intelligence, Loquendo
11:45 – 12:15
Voiceprint Identification –Approach and PracticeKonstantin Popov, International Sales
Manager, Speech Technology Center
13:30 – 14:30, Track 7, LEA Training Session
Voices – Acoustic FingerprintsDr. Stephan Grashey, Expert Voice Solutions,
trovicor
15:30 – 16:30
A Demonstration of Key WordSpotting and SpeakerRecognition SystemsLuciano. Piovano, Loquendo
TRACK 7–LEA TRAINING SESSION
23-25 FEBRUARY 2010 • JW MARRIOTT • DUBAI, UAE
ISSWorld®MEAIntelligence Support Systems for Lawful Interception,
Criminal Investigations and Intelligence Gathering
Thursday, 25 February 2010 8:30 – 9:30
Understanding Voice BiometricSpeaker Identification for CriminalInvestigations and IntelligenceGatheringAgnitio presenter to be announced10:00 – 11:00
Product Demonstration forAgnitio’s Voice BiometricsForensic ApplicationsAgnitio presenter to be announced10:00 – 10:30
Finding the Needle in a HaystackLukas Grunwald, DN-Systems International
10:30 – 11:00
Empowering LEAs to RegainControl over InternetCommunication – a HolisticApproachPatrick Koebel, Account Director APAC,
trovicor
Track 3
ISS for Data Retention andRegulatory Compliance
Wednesday, 24 February 20109:00 – 10:00
Data Retention “Best Practices”Guru PanelRené Nitzinger, Product Manager
Utimaco LIMSJesper Mathiesen, Head of Solution Sales,
trovicorAndrea Fabrizi, Investigation Solutions GM, HPVineet Sachdev, Senior Director, SS8
11:15 – 11:45
A Network-Based Approach toData RetentionErik Larsson, Vice President Marketing,
Qosmos
11:45 – 12:15
Optimal Data Retention – AStrategic, Best Practices Approachto Communications Data Retention Andrea Fabrizi – HP Investigation solutions
General Manager, HP
13:30 – 14:00
Practical Tips for ImplementingData Retention SystemsRené Nitzinger, Product Manager
Utimaco LIMS
14:00 – 14:30
Metadata Extraction andRetention for IP ApplicationsVineet Sachdev, Sr. Director, Solution
Engineering, SS8
15:30 – 16:00
Watching the Watchers: DesigningChecks and Balances in LawfulInterception SystemsJaya Baloo, Practice Lead Lawful
Interception, Professional ServicesEMEA, Verizon Business
16:00 – 17:00
ETSI/TC LI Standards UpdatePeter Van de Arend, Chairman, ETSI/TC LI
Track 4
ISS for Mobile Location,Surveillance and InterceptThis track is for Law Enforcement, InteriorSecurity and the Intelligence Communitywho have to work with cellular and mobilesatellite operators to locate targets andintercept communications.
Tuesday, 23 February 201013:15 – 13:45
Enhancing Mobile Data Interceptwith Identity and Location Datafrom Network SignalingKeith Driver, Product Manager,
Telesoft Technologies
13:45 – 14:15
Next Generation LI PositioningOpportunitiesSten Lundell, Senior Sales Manager,
Ericsson
14:45-15:15
Precise and Secure Location ofMobile TelephonesJean-Philippe Lelievre, THALES
Communications
16:15 – 17:15
Mobile Location, Monitoring andSatellite Intercept Guru PanelSteve O’Neill, VP, Product line Management,
TruePositionKeith Driver, Head of Business
Development, Telesoft TechnologiesBhavin Shah, Director of Marketing and
Business Development, Polaris WirelessMartin Dawson, Chief Product Architect
GeoLENs™, Andrew Network SolutionsDavid Vincenzetti, Partner, Hacking TeamRichard Grundy, Capability Manager, L-3 TRL
TechnologyJean-Philippe Lelievre, THALES
Communications
Wednesday, 24 February 20109:00 – 9:30
From ‘Where’ to ‘Who and What’:Using Polaris WLS to DetermineWho the Targets Are and WhatThey’re DoingBhavin Shah, Director of Marketing and
Business Development, Polaris Wireless
9:30 – 10:00
Portable Satellite MonitoringSolutions Gathering Intelligencein a Tactical EnvironmentRichard Grundy, Capability Manager,
L-3 TRL Technology
11:15 – 11:45
Leveraging Mobile NetworkEvents to Identify and LocateCriminal ActivitySteve O’Neill, VP, Product Line Management,
TruePosition
11:45 – 12:15
Overview of Location Technologyfor Mission Critical ApplicationsDominic Li, VP, Portfolio Management and
Marketing, TruePosition
11:15 – 12:15
Product Presentation andDemonstration: Monitoring MobileSatellite Phone Handsets, Inmarsat,Thuraya, ACeS/IsatphoneRichard Grundy, Capability Manager,
L-3 TRL Technology
13:30 – 14:30
Location Enabled NetworkSolutions for National SecurityMartin Dawson, Chief Product Architect
GeoLENs™, Andrew Network Solutions
Thursday, 25 February 20108:30 – 9:00
New Generation IP Based TacticalDevicesEmanuele Marcozzi, Presales Engineer, AREA
Track 5
DPI and Intelligent Probesfor Lawful Interception,Network Security andTraffic Management
Tuesday, 23 February 201014:45 – 15:45
Best DPI Deployment Practices forLI, Network Security and TrafficManagement Guru Panel Martin Hayes, Product Manager IP, trovicorErik Larsson, Vice President Marketing,
QosmosCristian D’Incertopadre, Business Development
Manager, IPS-Intelligence & PublicSecurity
Kevin Graves, CTO, IP FabricsMarco Germoni, Director of Engineering,
Bivio NetworksKlaus Mochalski, CEO, iPoque
16:15 – 16:45
IP Guardian – Putting Full Controland Flexibility in the Hands ofLEAs and Intelligence CommunityDavid Helms, Architect IP Solutions,
Al Fahad Group
TRACK 7–LEA TRAINING SESSION
TRACK 7–LEA TRAINING SESSION
TRACK 7–LEA TRAINING SESSION
16:45 – 17:15
Controlling Gray TelephonyKlaus Mochalski, CEO, iPoque
Wednesday, 24 February 201011:15 – 11:45
Deep Packet Inspection as a CoreTechnology for Law Enforcementand National SecurityMarco Germoni, Director of Engineering for
Internet Applications, Bivio Networks
11:45 – 12:15
The Case for Intelligent InterceptProbes Kevin Graves, CTO, IP Fabrics
13:30 – 14:00
Isn’t It Just HTTP? – Application-Oriented Interception (Part 1)Alessandro Guida and Peter Eichler,
ATIS systems
14:00 – 14:30
Isn’t It Just HTTP? – Application-Oriented Decoding (Part 2)Alessandro Guida and Peter Eichler,
ATIS systems
15:30 – 16:00
Leveraging DPI and NetworkIntelligence to Develop Next-Generation Cyber Security SolutionsErik Larsson, Vice President Marketing,
Qosmos
16:30 – 17:00
IP Interception – the Challenge ofFlux in the Internet Martin Hayes, Product Manager IP, trovicor
Track 6
ISS for IntelligenceGathering and Analysis
Tuesday, 23 February 201011:00 – 11:30
Catch Me If You Can –Investigation Work in PracticeNagui Erian, ATIS systems
11:30 – 12:00
Are You Drowning? EvaluationStrategies for International Trunk& Backbone TrafficBernd Fiedler and Helmut Huschka, ATIS
systems
13:14 – 13:45
Conducting Deep Surveillance ofComputer Networks to ObtainIntelligenceEddie Schwartz,Chief Security Officer,
NetWitness Corporation
13:45 – 14:15
Bringing Order Into the Chaos –Statistical Limitations Dr. Stefan Cronjaeger, Head of Product Line
IPF & Analytics, trovicor
14:45 – 15:15
A Stealth, Spyware-Based Systemfor Attacking, Infecting andMonitoring Computers andSmartphonesDavid Vincenzetti, Partner, Hacking Team
15:15 – 15:45
Intelligence by Correlation ofMultiple SourcesRenaud ROQUES, Amesys
16:15 – 16:45
Search Engine and Data Mining —a Potential Symbiosis Dr. Stefan Cronjaeger, Head of Product Line
IPF & Analytics, trovicor
16:45 – 17:15
Evaluation and Intelligence Fusionin Technical ReconnaissanceDr. Hans Joachim Kolb, Managing Director
MEDAV GmbH
Wednesday, 24 February 20109:00 – 9:30
Future Intelligence Analytics:Collaboration, Processing andVisualizationAlexander Gruchmann, Product Manager,
Plath GmbH
Track 7
LEA, Intelligence andDefense Analyst Trainingand ProductDemonstration TrackThis training and product demonstrationtrack is open only to Law Enforcement,Intelligence, Defense Analysts and otherGovernment Executives.
Tuesday, 23 February 201011:00 – 12:00
Tactical Mobile Phone Infectionand Interception Beyond BordersMJM, IT Intrusion Export, Gamma Group
11:00 – 12:00
HP Investigation Solutions – TheComprehensive IntelligenceSupport SolutionAndrea Fabrizi, HP Investigation solutions
General Manager, HP
13:15 – 14:15
Next Generation Targeting andAnalytics: The Future of LawfulInterceptJerry Miille, Director of Product Management,
NarusBrett Taylor, Systems Engineer, Narus
14:45 – 15:45
Training on Data Retention LEAClient Pompeo Santoro, Strategic Product Manager,
Ericsson
14:45 – 15:45
Zebra Passive Surveillance Systemfor Interception of On-NetCommunications TrafficGeorge Horn, Development Manager, VASTechFabrizio Diantina, Channel Manager, VASTech
16:15 – 17:15
A Web Masterkey for IntelligenceAnalysis on Social NetworksUgo Santillo, International Sales Department,
IPS-Intelligence & Public Security
16:15 – 17:15
FinFisher IT Intrusion SuiteMJM, IT Intrusion Export, Gamma Group
Wednesday, 24 February 20109:00 – 10:00
Klarios® 2.0 — Investigative Workin a Multi-Media EnvironmentNagui Erian, ATIS systems
9:00 – 10:00
Fox-IT Product Demonstration Bert Hubert, CTO Fox Replay, Fox-IT
11:15 – 12:15
Product Presentation andDemonstration: MonitoringMobile Satellite Phone Handsets,Inmarsat, Thuraya, ACeS/IsatphoneRichard Grundy, Capability Manager,
L-3 TRL Technology
13:30 – 14:30
Demonstration of NetworkIntelligence Extraction Engine forLawful InterceptionJerome Tollet, CTO Qosmos
13:30 – 14:30
Location Enabled NetworkSolutions for National SecurityMartin Dawson, Chief Product Architect
GeoLENs™, Andrew Network Solutions
13:30 – 14:30
Voices – Acoustic FingerprintsDr. Stephan Grashey, Expert Voice Solutions,
trovicor
15:30 – 16:30
REMOTE CONTROL SYSTEM v6:The ULTIMATE WEAPON forAttacking and CovertlyMonitoring PCs and SmartphonesMarco Valleri, Senior Security Engineer, and
Alfredo Pesoli, Senior Security Engineer,Hacking Team
15:30 – 16:30
A Demonstration of Key WordSpotting and SpeakerRecognition SystemsLuciano. Piovano, Loquendo
15:30 – 16:15
How to Access Data Directly fromPCs – an Interception Demo Michael Eisenschmid, Head of Product
Management, trovicor
SESSION C
SESSION B
SESSION A
SESSION C
SESSION B
SESSION A
SESSION A
SESSION B
SESSION A
SESSION B
SESSION A
SESSION B
SESSION A
SESSION B
SESSION A
SESSION A
Registration InformationSave $300 by registering before 23 January, 2010
Telecommunications Service Provider or Government Registration
ISS World Conference (Tracks 1 to 6) and Exhibits ......................$995Registration after 23 January 2010 ..........................................$1,295
Law Enforcement/DHS/IC/DoD Registration*
ISS World Conference (Tracks 1 to 6), Training Track 7 plus Exhibits.........................................................$995 Registration after 23 January 2010 ............................................$1,295
Vendor Registration
ISS World Conference (Tracks 1 to 6) and Exhibits ...................$1,995Registration after 23 January 2010 ...........................................$2,295*Note: To Attend the LEA/DHS/IC/DoD Training Track 7 you must be asworn law enforcement officer or military/intelligence/governmentemployee. Also you must register by 17 February 2010 in order to verifyeligibility. Government photo ID required for Track 7 classroom access.Free Colleague Registration: Register as paid and you can invite acolleague to join you with a full, free conference pass. If you havenot identified your guest at this time, just enter “guest of” followedby your name and complete with your contact information. You canregister your guest at no charge at a later time.Conference Hotel: ISS World® MEA will be held at the five star JW Marriott Hotel Dubai. To reserve a room go tohttp://cwp.marriott.com/dxbae/issworlddubai or call 971 42624444.Transfers and Substitutions: Transfers and substitutions arepermissible up to 24 hours in advance of conference date.Cancellations and No-Shows: If you are unable to attend, there is nopenalty if your cancellation is received in writing two weeks prior toconference date. Cancellations after that date are subject to a 25%service charge. Registrants who do not attend and who do not cancelbefore the conference date are liable for the full registration fee. Ifconference is postponed or cancelled, TeleStrategies is notresponsible for any airfare, hotel or other costs incurred by registrants. Conference Payment: Your registration fee must be paid prior tothe ISS World event: VISA, American Express, MasterCard,Company Check and Wire Transfer are acceptable forms ofpayment, please contact TeleStrategies Accounting +1-703-734-7050 or Fax +1-703-556-3959 or Email [email protected] mail to TeleStrategies, PO Box 7443, McLean, VA, 22106, USAInternational Attendees: If you need U.A.E. Visa assistance to attendISS World, please contact Tatiana Lucas at [email protected] by Invitation Only: To attend ISS World you must be aTelecommunications Service Provider, government employee, LEA orvendor with LI, surveillance or network products or services. If youhave questions e-mail Tatiana Lucas at [email protected].
Prepayment Required:
(payment in full is required before attendance)■■ My check is enclosed in the amount of $_____________■■ Please bill my company.■■ Please bill my: ■■ VISA ■■ MasterCard ■■ American Express
N A M E J O B T I T L E
C O M PA N Y
A D D R E S S
C I T Y S TAT E / P R O V I N C E
C O U N T R Y Z I P / P O S TA L / C O U N T R Y C O D E
E M A I L
A C C O U N T N O . E X P.
C A R D H O L D E R ’ S N A M E ( P L E A S E P R I N T )
S I G N AT U R E
FREE Colleague Registration
Register as paid and you can invite a colleague to join you with a FREEConference Pass. If you have not identified your guest at the time, justenter “Guest of” followed by your name and contact information.
Your Guest:
G U E S T N A M E
J O B T I T L E
E M A I L
All Contents © TeleStrategies 2010
Registration
Phone: 1-703-734-7050 • Fax: 1-703-893-3197 • Online: www.telestrategies.com
16:15 – 17:00
Finding the Fishy Needle in theHaystack with NADRAT – aDemonstration Christian Sojtschuk, Solution Architect, trovicor
Thursday, 25 February 2010 8:30 – 9:30
Data Analysis Case StudyAlper Tosun, BTT Bilgi Teknoloji Tasarim
10:00 – 11:00
An Integrated Platform for All YourLawful Interception ActivitiesLuca Bergonzi, Presales Engineer, AREA
10:00 – 11:00
Product Demonstration forAgnitio’s Voice BiometricsForensic ApplicationsAgnitio presenter to be announced11:30 – 12:30
Application Based Splitting andBlocking of IP trafficLukas Grunwald, DN-Systems
International
11:30 – 12:30
Live Demonstration of SmartSystem for Monitoring HTTPSCommunicationsClearTrail Technologies
Special BKForensics CellPhone Forensics Training8:30 – 9:30
BKForensics SIM ANALYSIS
10:00 – 11:00
Preserving the Evidence
11:30 – 12:30
Physical and Logical AnalysisOverviewPresented by BKForensics-Cell Phone
Forensic Solutions
SESSION C
SESSION C
SESSION C
SESSION C
SESSION B
SESSION A
SESSION B
SESSION A
SESSION A
ISS World® MEA Exhibits24 February 2010 – 10:00 to 17:30 • 25 February 2010 – 9:30 to 12:30
Lead SponsorsISSWorld®MEA23-25 FEBRUARY 2010 • JW MARRIOTT • DUBAI, UAE
Lead Sponsor
trovicor was founded as the VDR ( Voice & Data Recording) business unit within the Siemens corporation in 1993. Since then, we havebecome an industry leader who provides project and turnkey intelligence solutions. These are a combination of own core development andthe integration of best-in-class third party products as well as our customer-centric Care Programs. Presently, we employ some 170experts worldwide. Our office in Munich addresses Europe, the Community of Independent States (CIS) as well as both Americas; oursubsidiaries in Dubai and Islamabad cater for the Middle East and Africa; and the Kuala Lumpur office addresses Asia Pacific. Many andvaried Monitoring Center solutions as well as other intelligence projects have given us an indepth experience in their requirements. Todayas before, we strive to achieve the highest level of customer satisfaction.
Associate Lead Sponsors
Confidentiality and integrity-of-secrecy are not “givens” in LI, these are values to be exercised and executed in perpetude. These are theprinciples driving Al Fahad group to provide LI and other national security solutions. We have therefore been recognizing exponentialgrowth over the last 5 years in providing national security solutions ranging from Interception, mediation, comprehensive protocoldecoding including webmail and web 2.0 services; evidence processing, forensics, fraud detection, surveillance and cyber intelligence.
Telesoft Technologies products allow intelligence agencies, system integrators and service providers to extract information from fixed, 2/3Gmobile and packet networks. Our universal passive probes extract call content, signalling and location information for use by monitoringapplications. Over 250 operators in more than 100 countries use our equipment ensuring wide protocol compatibility and seamlessconnection of your applications to real world systems. www.telesoft-technologies.com.
Ericsson is shaping the future of Fixed and Mobile Broadband communications through its continuous technology leadership. Providinginnovative solutions in more than 175 countries, Ericsson is helping to create the most successful communication companies in the world.Ericsson offers state of the art Data Retention and Lawful Interception Solutions. http://www.ericsson.com
Spectronic Systems is an independent and 100% privately owned company working exclusively with governments and governmentapproved agencies. The Spectronic Systems activities include development and manufacturing of monitoring systems and monitoringcentres handling telephony, internet/IP, fax and modem traffic for intelligence and law enforcement agencies. These solutions can act as dataretention systems and/or as an intelligence platform for bulk monitoring of SMS, MMS, e-mails or other means of data communication.
Founded and headquartered in Bad Homburg, Germany, the ATIS Group has 200 employees – of which the majority are engineers – in fivecountries across Europe, Asia and North America. Drawing on a long history of success and experience – 60 years in recording technologyand 15 years in the field of integrated lawful interception – ATIS is a key technology partner for both the public and private sectors.
Since 1994 Utimaco has been providing lawful interception systems for mobile and fixed network operators and Internet service providers.The Utimaco Data Retention Suite was introduced in response to the EU directive 2006/24/EC and at the request of telecom customersfor integrated LI and DR solutions. With more than 130 installations in 60 countries. For more information visit www.utimaco.com/lims
Gamma International presents its unique IT Intrusion portfolio - FINFISHER - at the ISS World EMEA Dubai 2010. The FinFisher IT Intrusionproducts contain the most comprehensive online research and infection functionality found in any other solution. The FinFisher portfoliocombined with superior training at Gamma’s IT Intrusion Training Institute differentiates Gamma International as the leading company in thefield of Cyber Surveillance and Counter Surveillance. For more information contact: [email protected]
Elaman provides various solutions for tactical and strategic Communications Monitoring Systems for Telephone, Internet,wireless/cellular/Satellite networks, Radio Frequency and can be the sole supplier, integrator and technical consultant for such systems.Our combination of developments and systems, using best in class products and integrating different systems, enables Elaman, to provideour clients with a unique portfolio of the best services and solutions on the market. For more information visit www.elaman.de
SS8 is a leader in communications interception and a worldwide provider of regulatory compliant, electronic intercept and surveillancesolutions. Headquartered in the heart of the Silicon Valley in Milpitas, California, SS8 has a global reach and is an independent provider ofregulatory-compliant electronic surveillance solutions that have been deployed in over 25 countries for the largest wire-line, wireless, cable,VoIP and satellite service providers. SS8 products are sold and supported both directly and through OEM partnerships. www.SS8.com
HACKING TEAM is a company totally focused on IT OFFENSIVE SECURITY intelligence solutions for LEAs and Security Agencies. RemoteControl System V6 (RCS) is a premier, integrated, multi-OS platform for remotely attacking, infecting and controlling target computers andmobile phones. It is a PROVEN technology: it is being used by Agencies worldwide since 2003 - Target monitoring includes Skype, chat,mail, web, removable media, encrypted communications, PGP, GSM-cell GEO-tracking, GPS GEO-tracking, voice calls, etc. For moreinformation [email protected]
AREA is a leading vendor of LI systems and projects. Since 1999, when it introduced its first IP based digital multichannel digital recorder.MCR System, the complete voice & data Monitoring Center, is the core element which includes IP Probes and Data Analysis. In additionAREA develops surveillance systems, such as Vehicle Tracking and Video Monitoring. www.areamcr.com
HP delivers a comprehensive portfolio of intelligence support systems (ISS) that meet the requirements for today's convergedcommunications services. Based on technology proven in successful deployments worldwide, HP Investigation solutions are modular andstandards-based, and take a fully-integrated, real-time approach to fulfillment of lawful requests for communications data. Together, theycomprise a complete, end-to-end offering for request management, lawful intercept, and data retention. www.hp.com/go/dragon
Qosmos develops network intelligence technology (an evolution of Deep Packet Inspection), which provides real-time visibility into data asit crosses networks. The company’s software development kit and hardware probes are used by Government Agencies, Law EnforcementAgencies (LEAs) and System Integrators to enhance their lawful intercept and cyber security solutions. www.qosmos.com