and Register2nd FREE! 1 ISS World ® MEA ® Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering

13-15 FEBRUARY 2012 • JW MARRIOTT • DUBAI, UAE

Where Telecom Operators, Law Enforcement, Defense and the Intelligence Community Turn to Learn and Network

Lead Sponsor Associate Lead Sponsors

Exhibitors and Sponsors

95 LEA/Interior/DoD Training Sessions and Courses to Choose From ISS World ® MEA Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering

13-15 FEBRUARY 2012 • JW MARRIOTT • DUBAI, UAE

ISS World MEA is the world’s largest Pre-Conference Training 10:45-14:00 gathering of Middle East, Central Asia and Understanding Mobile Wireless African Law Enforcement, Intelligence and Seminars Infrastructure, Interception and Homeland Security Analysts as well as Monday, 13 February 2012 Related ISS Products Telecom Operators responsible for Lawful Infrastructure basics (GSM, GPRS, EDGE, Interception, Hi-Tech Electronic Investigations Seminar #1: 8:30-16:30 UMTS, HSPA and LTE), Wi-Fi, WiMax and and Network Intelligence Gathering. Understanding ISS Technologies , How a cellular call is processed, ISS world Programs present the methodologies and Products Deployed in back office infrastructure, HLR, VLR, and tools for law enforcement, public safety Networks for Backhaul and PSTN interconnection, data and government intelligence communities in services, SMS, MMS, IM, data services, the fight against drug trafficking, cyber money Law Enforcement and Intelligence fixed mobile convergence and IMS and laundering, human trafficking, terrorism and Analysis where are ISS products deployed for other criminal activities conducted over today’s Presented By: Dr. Jerry Lucas, President, monitoring and intercept. telecommunications network and the Internet. TeleStrategies This one day pre-conference seminar covers 14:15-16:30 ISS World MEA Program the spectrum of ISS Technologies and Understanding the Internet, Products deployed in today’s fixed wire, Interception and Related ISS Conference Track 1 mobile wireless and Internet Service Products Provider networks. This all day seminar is What Investigators Have To Know about IP ISS for Lawful Interception and ideal for those law enforcement, public call Identifying Information, Radius, DHCP, Criminal Investigations safety and intelligence analysts who need DNS, etc. and Tracking an Internet Address an understanding of the ISS technologies to Conference Track 2 to a Source, Investigations Involving E-Mail, be discussed in the conference sessions Facebook, Twitter, Skype, Instant ISS for Social Network and the ISS products displayed at the Messaging, Chat Rooms and Message Monitoring and Investigations exhibit hall as well as an understanding of Boards, IMS, P2P Networks and Deep the buzz words and jargon used by telecom Conference Track 3 Packet Inspection and what can be done to operator engineers. ISS for Mobile Location, address Internet intercept deploying ISS infrastructure and where are ISS products and Intercept 8:30-10:45 deployed for monitoring and intercept. Conference Track 4 Understanding Wireline Telecom Infrastructure, Interception and ISS for Intelligence Gathering and Related ISS Products Seminar #2: 8:30-16:30 NEW Analysis What do LEAs need to know about the Understanding Mobile Spyware Conference Track 5 public switched telecommunications for Law Enforcement and networks, circuit switching, fiber optics, Intelligence Analysts Encrypted Traffic Monitoring and SS7,SDH, DSL,billing systems and call detail Thomas J. Slovenski, CCFE, Owner, IT Intrusion Product records, standards for lawful intercept, basic Cellular Forensics, LLC. Thomas J. Demonstration and Training LI elements (access, delivery and collection Slovenski is also a retired U.S. Law function), call information, call content data Conference Track 6 Enforcement Officer. collection, and where are ISS products Rick Mislan, Cyber Forensics Professor, Social Network Monitoring and deployed for monitoring and intercept. Investigation Product Purdue University says “this class will rock your world!” Tired of the same old dry Demonstration and Training instructional workshops that are less exciting Conference Track 7 than watching paint dry? Well this one is very Mass Data Monitoring, Intercept Exhibits different! LawEnforcement Instructor Tom Slovenski is dedicated ot make sure this and Analysis Product 14 February 2012, 10:00 - 17:00 class is one of the most exciting you will Demonstration and Training 15 February 2012, 9:30 - 12:30 get!With his own unique and exciting presentation, Tom will take you into the world of spyware. In this 8

For Complete ISS World® Conference Session Descriptions, Go To www.telestrategies.com ISS World ® MEA Intelligence Support Systems for Lawful Interception, Criminal Investigations and Intelligence Gathering

13-15 FEBRUARY 2012 • JW MARRIOTT • DUBAI, UAE hour journey into the center of the beast, This one day course will be an introduction 15:30-16:30 you will experience what took Tom years to and overview of wiretap investigations and Key Consideration for Setup and learn. And, Tom will supply you with all the systems used by law enforcement and Layout of a Wire Room instruction you will need to locate, analyze, intelligence agencies throughout the United (temporary or permanent) preserve andeven eradicate mobile spyware States and abroad. This one-day course will This seminar is only open to law in the mobile phone of today. demonstrate the basics for law enforcement, intelligence analyst and Seminar Topics: enforcement/intelligence agencies to defense personnel. • The Truth about Mobile Spyware overcome the fears of conducting a wiretap investigation and show how beneficial this • Types of Spyware tool can be. The class will include current Tuesday, 14 February 2012 • Signs of Mobile Malware on a Cell Phone intercept technologies and brief 8:15-8:30 • Names of Available Software in Existence demonstration of actual wiretap Welcoming Remarks Today investigation during the wire, and how to Tatiana Lucas, ISS World Program Director, • How Mobile Spyware Infects a Phone properly manage and run the wiretap room. TeleStrategies • Different Degrees of Spyware 8:30-9:30 • Infection Techniques 8:30-10:00 Wiretap Technologies Keynote Panel: Top Ten Internet • Eradication Techniques What interception systems are available to Challenges Facing Law • Catching the Hacker government agencies and their benefits. A Enforcement and the Intelligence • The U.S. and International Laws Affecting brief demonstration will be given of the Community the Use of Mobile Spyware Sytech ADACS4 interception system to give Dr. Jerry Lucas, President, TeleStrategies This seminar is only open to law students a real-life glimpse of an operational (Moderator) enforcement, intelligence analysts and system. Marco Braccioli, Senior VP, IPS defense personnel. 9:45-10:45 Rudolf Winschuh, Partner Sales Manager Pre-Wire Tap Investigation Utimaco LIMS Seminar #3: 8:30-16:30 Martin Hayes, Head of Innovations, This block of instruction will explain to the trovicor GmbH student eh necessary requirements that are Advanced IP Intercept Training Manohar Katoch, Sr. Director, ClearTrail needed prior to authoring the wiretap. Items Seminar Technologies Presented By: Klaus Mochalski, VP Market such as PEN registers, surveillance, exhaustion and de-confliction will be addressed. Development, ipoque and Jens Geier, Track 1 Product Manager, ipoque 11:00-12:00 8:30-10:45 Detailed Explanation of PEN ISS for Lawful Interception Understanding TCP/IP for Packet Analysis and Criminal Investigations Sniffing and Traffic Analysis Needed for wiretaps and how to do a PEN This track is for Law Enforcement, National analysis without expensive software programs and Interior Intelligence and Public Safety 11:00-14:00 Authorities who are responsible for (DPI) 13:00-14:00 specifically what telecom operators must Basics for LEA's, Intelligence Case Management, Notifications deploy to intercept, retain and hand off Analysts and Telecom Operators and Virtual Command Center VCC intercept data in support of lawful interception Intercepting and hi tech criminal investigations. 14:15-16:30 How to integrate the VCC into your wire Basics of IP Application Decoding investigation. Tuesday, 14 February 2012 11:00-11:30 SESSION A Seminar #4: 8:30-16:30 NEW 14:15-15:15 Integrated Solution for National The Actual Wiretap Investigation WIRETAPPING: Understanding Security and Crime Investigation— Once you are "online", what to expect, how Our Focus the Basics to manage the information flow, how to Tan Wei, ZTEsec Joseph Messinese, Manager-Training "tickle" the wire, how to properly conduct Program, T3TECHSYSTEMS Joseph "wall-off" operations and manage the flow of Messinese also holds the position of information. Officer, Maryland State Police, USA. 11:00-11:30 SESSION B 15:30-16:00 SESSION B intelligence from today’s social networks Intelligence Solutions for LEAs— Revolution or Evolution? including Facebook and Twitter. Note some New Trends How Will Convergence of of these sessions denoted by “LEA and Intel Only” are only open to Law Enforcement, Head of Sales, trovicor Services Public Safety and the Government Affect Your LI System 11:00-11:30 SESSION C Intelligence Community. Jaroslaw Tabor, R& D Engineer, The ipoque Internet Macro-System Observatory—Measuring the Tuesday, 14 February 2012 Internet 15:30-16:00 SESSION C 11:00-11:30 Klaus Mochalski, VP Market Development, A New Way of Supporting LEA in Cyber Investigation on Social ipoque, A Rohde & Schwarz Company Lawful Interception Activities Network Paolo Mario Finzi, Vice President, Ugo Santillo – International Operations, IPS 11:30-12:00 SESSION A RCS S.p.A. Not Able to Monitor HTPPS 11:30-12:00 and Other Secured IP 16:30-17:00 Intelligence Monitoring & Communications? Multi-Source Collection & Analysis of Social Networks— Do Active Interception Correlation for Context-Based An Introduction ClearTrail Technologies speaker to be Product Manager, trovicor announced Bob Wiest, Vice President, Technical Services, Bivio Network 13:30-14:00 SESSION A 11:30-12:00 SESSION B Monitoring Social Networking Intelligence Gathering and Sites for Actionable Intelligence Analysis for Next Generation Wednesday, 15 February 2012 10:30-11:00 SESSION A Nanda Kumar, Director, Paladion HUAWEI presenter to be announced Rich Communication Suite 13:30-14:30 11:30-12:00 SESSION C Sven Jonas, Project Manager, Social Network Monitoring and Managed the Flood Utimaco LIMS Analysis – How To Gain New Jeff Zindel, Glimmerglass Networks 10:30-11:00 SESSION B Insights 13:30-14:00 SESSION A The Art of Selection Among Product Manager, trovicor LI in Clouds—Challenges & Tactical and Strategic LI Solutions This Session only open to Law Enforcement Possible Opportunities for Cezary Jachniewicz, Marketing Manager and Intelligence Analysts & Jaroslaw Tabor, R&D Engineer, Providers & LEAs 14:00-14:30 SESSION B Macro-System Rudolf Winschuh, Partner Sales Manager Probing the Mobile IP Networks: Utimaco LIMS 11:00-11:30 SESSION A An Effective Approach to Web 14:00-14:30 SESSION A Paradigm Shift Mass Interception Spam, SPIT, Secrets—Do You Bernd Schilp, Glimmerglass Networks Simone Benvenuti, Solution Architect, RCS S.p.A. Know What Leaves Your Network? 11:00-11:30 SESSION B ATIS systems presenter to be announced Scalable Network Intelligence 13:30-14:30 SESSION B for LI 14:00-14:30 SESSION B 15:00-16:00 Block the ‘Bad’ Network Traffic Dr. Ismail Uzun, C2Tech Forensics of Web 2.0 Applications George Chen, CEO, Semptian 12:00-12:30 and Social Networks Technologies Collect & Retain Your ATIS systems present to be announced 15:00-15:30 SESSION A Communications Network Data— This Session only open to Law Enforcement Converging Networks, Exploding Efficiently & At Lowest Cost and Intelligence Analysts Bandwidth, Complex Julian Cook, GM EMEA & APAC, RainStor Wednesday, 15 February 2012 Communications and Simplified 12:00-12:30 SESSION B MASS MONITORING Challenging the IP Interception 8:30-9:30 A Web Master Key™ for Social ClearTrail Technologies speaker to be Problem: Know Your Enemy, Use announced Networks Monitoring, the Right Weapon! Interception and Analysis 15:00-15:30 SESSION B Murat Balaban, President, Inforcept Ugo Santillo, International Operations, IPS Networks Context-Based Data Retention This Session only open to Law Enforcement Using Multi-Source Collection and Intelligence Analysts & Correlation Track 2 Steve Wallbank, Vice President, International 10:30-11:30 Sales, Bivio Networks ISS for Social Network Social Network Monitoring and Monitoring and Analysis—How To Gain New SESSION A 15:30-16:00 Insights IPv6, Identities & DPI Investigations Product Manager, trovicor Jens Geier, Product Manager, ipoque, This track is for Law Enforcement, This Session only open to Law Enforcement A Rohde & Schwarz Company Intelligence and Public Safety Authorities who are responsible for cyber investigations, and Intelligence Analysts monitoring, analysis and creating actionable Track 3 11:30-12:00 10:30-11:00 SESSION B Codename: Da Vinci. Attack, Intelligence Management ISS for Mobile Location, Control and Gather Intelligence System—Handling Big Data Surveillance and Intercept from Personal Devices Renaud Roques, Amesys - Bull This track is for Law Enforcement, Interior David Vincenzetti, Partner, Hacking Team 12:00-12:30 Security and Intelligence Community 13:30-14:00 SESSION A Topic-Based Advanced Knowledge Authorities who must work with cellular and User Network Behavior Analysis mobile satellite operators regarding mobile Exploration location, surveillance and intercept as well and Prediction Mirko Böttcher, Software Architect, as analysis of mass geo-location data. HUAWEI presenter to be announced PLATH GmbH

13:30-14:00 SESSION B Tuesday, 14 February 2012 Sensor Independent Operational Track 5 9:00-9:30 Picture Encryption Traffic Identify “Unknown” Suspects Kai-Michael Lilie, International Sales, PLATH Using Unique Movement Patterns GmbH Monitoring and IT Intrusion Product Demonstrations Derived From High Accuracy, SESSION A 14:00-14:30 This track is only open to Law Enforcement, Historical Mass Geo-Location of Intelligence Gathering from Wireless Devices Public Safety and Government Intelligence Facebook and Twitter Community attendees. Bhavin Shah, VP Marketing and Business Conversations In Arabic Development, Polaris Wireless Bastien Hillen, Scan & Target Tuesday, 14 February 2012 9:30-10:00 SESSION B 9:00-10:00 Mobile Location Technology and 14:00-14:30 Case Studies with Visual Analysis IT Intrusion with FinFisher— Next Generation National Security Alper Tosun, Manager, BTT Bilgi Teknoloji An Operational Overview of Colin Bryce, CommScope Tasarım Monitoring Encrypted Data On 11:00-11:30 Computers and Mobile Phones 15:00-15:30 Integration Of Location Based Multimedia Mass IP Interception— Gamma Group Services As One More Information Capturing & Processing MJM, Gamma Group Source On Top of Traditional Innovation Manager, trovicor 13:30-14:30 Intercepted Services Active IP Intrusion, Infection, 15:30-16:00 Dirk Börgerding, Pre-Sales Manager, Blocking and Shaping within Utimaco LIMS A System of Finding Drug Trafficker Ning Jiang, Product Manager, Semptian Backbones—Powered by FinFisher 11:30-12:00 Technologies Gamma Group Monitoring, Surveillance and TF, Gamma Group Intelligence In Service of 16:30-17:00 Homeland Security SDIA—Software Defined 15:00-16:00 Codename: Da Vinci. Stealth Data Klaus Ehrenfried Schmidt, MEDAV GmbH Intelligence Architecture Klaus Ehrenfried Schmidt, MEDAV GmbH Collection. Massive target 13:30-14:00 Scalability. And an Artificial Challenges Monitoring Wednesday, 15 February 2012 Intelligence Engine To Adapt To Sophisticated Mobile Satellite 8:30-9:30 SESSION A Hostile Environments. Handsets — Inmarsat IsatPhone Pro Potency of Cumulative Cyber Marco Valleri, Senior Security Engineer, and Richard Grundy, L-3 TRL Technology Daniele Milan, Senior Security Engineer, Attack Vectors Hacking Team Faiz Ahmad Shuja, CEO, Rewterz Track 4 16:30-17:30 8:30-9:00 SESSION B ISS for Intelligence VUPEN Sophisticated Exploits Triage Tools Used By Special for IT Intrusion and Offensive Gathering and Analysis Forces for Exploitation of Security This track is for Intelligence Analysts and Computers and Digital Devices Chaouki Bekrar, CEO & Director of Law Enforcement agents who have to J.J. Wallia, CEO/Co-founder, Vulnerability Research, VUPEN “connect the dots” between people, places ADF Solutions, Inc and other entities by searching through massive amounts of data from various 9:00-9:30 SESSION B Wednesday, 15 February 2012 sources using visual analytics, semantic New Trends in Data Analysis— 8:30-9:00 technologies, data mining, OSINT and other Handling Massive Amounts of Data Governmental IT Intrusion: intelligence gathering tools and techniques. Solution Sales Manager, trovicor Applied Hacking Techniques Used by Government Agencies 10:30-11:00 SESSION A Tuesday, 14 February 2012 Digital Footprint—Are You Aware Gamma Group 11:00-11:30 of Your Digital Traces? MJM, Gamma Group Exploiting Computer and Mobile ATIS systems presenter to be announced Vulnerabilities for Electronic Surveillance Chaouki Bekrar, CEO & Director of Vulnerability Research, VUPEN 10:30-11:30 Wednesday, 15 February 2012 15:00-16:00 SESSION B Codename: Da Vinci. An In-Depth, Scalable Network Intelligence for LI Live Demonstration Of Infection 8:30-9:30 A Web Master Key™ for Social Dr. Ismail Uzun, C2Tech Vectors And Attack Techniques Networks Monitoring, Marco Valleri, Senior Security Engineer, and 16:30-17:30 SESSION A Daniele Milan, Senior Security Engineer, Interception and Analysis Multimedia Mass IP Interception— Hacking Team Ugo Santillo, International Operations, IPS A Live Demo Innovation Manager, trovicor 12:00-13:00 10:30-11:30 Monitoring HTTPS Based Social Network Monitoring and 16:30-17:30 SESSION B Applications in the Changing Analysis—How To Gain New Managed the Flood Product Demo Cyber World Insights Bernd Schilp and Safdar Akhtar, ClearTrail Networks speaker to be Product Manager, trovicor Glimmerglass Networks announced Track 7 Wednesday, 15 February 2012 Track 6 Mass Data Monitoring, 10:30-11:30 Application & User Date Social Network Monitoring Intercept and Analysis Interception Demo and Investigation Product Product Demonstration Jens Geier, Product Manager, ipoque, Demonstrations This track is only open to Law Enforcement, A Rohde & Schwarz Company This track is only open to Law Enforcement, Public Safety and Government Intelligence community attendees. 12:00-13:00 SESSION A Public Safety and Government Intelligence Intelligence Analysis—Turning community attendees. Mass Data Into Intelligence Tuesday, 14 February 2012 Product Manager, trovicor Tuesday, 14 February 2012 11:00-12:00 13:30-14:30 How to find actionable 12:00-13:00 SESSION B Social Network Monitoring and intelligence from the mountain of Multi-Source Data Correlation for Analysis—How To Gain New data coming from intercepted Intelligent Retention & Action Insights communications Bob Wiest, Vice President, Technical Services, Bivio Networks Product Manager, trovicor Raj Wadhwa, Senior Product Manager, SS8

15:00-16:00 15:00-16:00 SESSION A Forensics of Web 2.0 Applications The Modular Evaluation Platform and Social Networks Alexander Gruchmann, Proposal Manager, ATIS systems present to be announced PLATH GmbH

Registration Information Free Colleague Registration: Register as paid and you can invite a colleague to join you at ISS World MEA with a full, free conference Save $300 by registering before 13 January, 2012 pass. If you have not identified your guest at this time, just enter “guest of” followed by your name and complete with your contact Telecommunications Service Provider or Government Registration information. You can register your guest at no charge at a later time. ISS World Conference (Tracks 1 to 4), Pre-Conference Seminars and Exhibits ...... $995 Conference and Exhibitions: JW Marriott Hotel Dubai. Registration after 13 January 2012 ...... $1,295 To reserve a room go to http:// cwp.marriott.com/dxbae/issworlddubai or call 971 42624444. Law Enforcement/DHS/IC/DoD Registration*

ISS World Conference (Tracks 1 to 4), Training Tracks 5-7, International Attendees: If you need Visa assistance to attend ISS Pre-Conference Seminars plus Exhibits ...... $995 World, please contact Tatiana Lucas at [email protected] Registration after 13 January 2012 ...... $1,295 Conference by Invitation Only: To attend ISS World you must be a Vendor Registration Telecommunications Service Provider, government employee, LEA or ISS World Conference (Tracks 1 to 4), vendor with LI, surveillance or network products or services. If you Pre-Conference Seminars and Exhibits ...... $1,995 have questions e-mail Tatiana Lucas at [email protected]. Registration after 13 January 2012 ...... $2,295 Registration *Note: To Attend the LEA/DHS/IC/DoD Training Tracks 5-7 you must be a sworn law enforcement officer or military/intelligence/government Phone: 1-703-734-7050 employee. Also you must register by 10 February 2012 in order to verify Fax: 1-703-734-9371 eligibility. Government photo ID required for Tracks 5-7 classroom access. Online: www.telestrategies.com ® ISS World MEA Lead Sponsors 13-15 FEBRUARY 2012 • JW MARRIOTT • DUBAI, UAE

Lead Sponsor trovicor is an established leading supplier of intelligence solutions for Law Enforcement and Government Agencies, worldwide. The company represents almost two decades of industry experience in customer-centric development of state-of-theart monitoring centers and intelligence tools for the security market. With in-depth knowledge of the public sector requirements and 170 highly qualified experts, worldwide, trovicor designs and manufactures many and varied lawful interception solutions for the most sophisticated applications in Communication Surveillance. Headquartered in Munich, Germany and with affiliate offices in Europe, Middle East, Asia-Pacific, trovicor services Law Enforcement and Government Agencies with deployments in more than 100 countries. These turn-key solutions are based on trovicor’s own innovative cores and designed for integrating best-in-class third party products providing the most fl exible platform for the apprehension of criminals. The trovicor Monitoring Center systems completely developed in-house are a state-of-the-art solution to monitor, analyse and store all data acquired during investigation activities, such as the interception of communication data in fixed and mobile networks, to Next Generation Networks and the Internet. Associate Lead Sponsors Al Fahad Group: Confidentiality and integrity-of-secrecy are not “givens” in LI, these are values to be exercised and executed in perpetude. We have therefore been recognizing exponential growth over the last 5 years in providing national security solutions ranging from Interception, mediation, comprehensive protocol decoding including webmail and web 2.0 services; evidence processing, forensics, fraud detection, surveillance and cyber intelligence. Across our operations in the Middle East, North Africa and Europe, Our accurate assessment of intelligence needs enable us to deploy adaptive solutions, fully integrated end to end, providing Active In-Line control and applied to serve your directive. ClearTrail is leading provider of communication monitoring solutions to LEA’s, Intelligence Agencies and Telecom carriers worldwide. Our solutions are deployed across hundreds of communication links and empower agencies to: Mass Intercept GSM/CDMA,PSTN, GPRS, EDGE, 3G/3.5G, Wi-Max, VSAT, & IP links; Analyze vast amount of information; Monitor Wi-Fi networks and replay HTTPS sessions; Deliver Trojans remotely & locate targets; Monitor GSM calls 'Off-The-Air' Gamma International has developed for Law Enforcement and Intelligence Agencies its own FinFisher IT Intrusion Portfolio, which is a comprehensive range of professional offensive tools for information gathering, sniffing, manipulation and exploitation. FinFisher is proving to be instrumental in the fight against child pornography, cybercrime, pedophilia, human trafficking, drug smuggling, terrorism, and other criminal activities. For more information contact: [email protected]. HackingTeam provides the premier Cyber Intelligence solution: Remote Control System (RCS). Proven by years of worldwide adoption and designed to fulfill LEAs and Security Agencies higher expectations, RCS gives you total control over endpoint devices. Offering the widest selection of infection vectors and showing total invisibility to protection systems, RCS guarantees easy installation on target devices. An integrated, easy to use Console allows you to manage all of your tasks, from evidence collection to infrastructure management. Newly released RCS version 8, codenamed Da Vinci, introduces a new dimension of cyber investigations: data intelligence. Find out more at www.hackingteam.com HUAWEI is a leading telecom solutions provider with products and solutions deployed in over 100 countries. By leveraging its network security experience, Huawei helped governments worldwide to build a green network since ten years ago. With professional consulting, training, and services, Huawei has built an excellent reputation worldwide. Polaris Wireless is the global leader in providing high accuracy, software-based geo-location solutions to wireless operators and law enforcement agencies. With commercial deployments in EMEA and APAC regions, our lawful and mass location intercept solutions are ideal for tracking known/unknown targets to within 50 meters including urban and indoor areas. NeoSoft AG is a world-wide known manufacturer of Monitoring security systems such as: Passive, Active (Semi-Active), Hybrid GSM Monitoring systems with A5.2/A5.1 deciphering; CDMA Passive Monitoring systems; IMSI/IMEI Catchers 2G and 3G and InPoint SMS System .All our systems support the following bands: GSM, PCS, EGSM, 2100 and 850. Our systems are widely used for victim detection and recovery during various acts of terrorism and natural disasters. Semptian Technologies Ltd was founded in 2003 with headquarters in Shenzhen China and is a private company enabling continuous technical innovation. Semptian is positioned as a cyber monitoring expert, providing the technical LI means to intercept Internet, PSTN fixed telephone and mobile phone networks. With high performance and low cost solutions, Semptian helps Law Enforcement Agencies accomplish their missions such as criminal investigation, counter-terrorism, intelligence gathering and network security. www.semptian.com With more than 180 installations in about 70 countries, Utimaco is a leading global supplier in the lawful interception market. Since 1994 Utimaco has been providing lawful interception systems for mobile and fixed network operators and Internet service providers. In addition at the request of telecom customers for an integrated lawful interception and data retention solution, Utimaco introduced the Data Retention Suite corresponding to the EU directive 2006/24/EC. For more information visit http://lims.utimaco.com VUPEN is the leading provider of IT intrusion and offensive cyber security capabilities. VUPEN provides private and highly sophisticated exploits (attack/infection vectors) specifically designed for the Intelligence community, LEAs, and national security agencies to help them remotely and covertly install any monitoring software on target computers, laptops, and mobile devices during lawful intercept and criminal investigation missions. VUPEN's industry-recognized vulnerability research and exclusive exploits target a wide range of software and operating systems, take advantage of undisclosed "zero-day" vulnerabilities, and bypass all modern security protections and exploit mitigation technologies such as DEP, ASLR, sandboxes and Antivirus products. For more information: http://www.vupen.com ZTEsec is a subsidiary company of ZTE Corporation which is a major player in the worldwide telecom market. ZTEsec was founded in 2003 and focusing on R&D for network security and surveillance solution to our customers. Our company is also encouraging high efficiency and innovation, which also plays a lot of attention to realize the value of society, customers and staff.

ISS World® MEA Exhibits 14 February 2012 – 10:00 to 17:00 • 15 February 2012 – 9:30 to 12:30