iSMILEcon Agenda


Tuesday, June 16th

5:30 pm – 6:30 pm:Pick up your badge, program etc. at the Royal Sonesta and head to the Host Chief’s Reception.

6:00 pm – 8:00 pm: Chief Alan Rodbell and other Commanders of the Scottsdale Police Department will host.
Meet SMILE Conference® sponsors, speakers and fellow delegates at the Scottsdale Plaza Resort.

Wednesday, June 17th

8:00 am – 8:55 am TBA

TBA

8:55 am – 9:50 am TBA

TBA

9:50 am – 10:05 pm Networking break

10:05 am – 11:00 pm Detective Constable Ron Chhinzer, Toronto Police Service

Topic: Gang Investigations
Description coming soon

11:05 am – 12:00 pm TBA

TBA

12:00 pm – 12:45 pm

Hot buffet lunch in the main hall and quality time with our fantastic sponsors and exhibitors!

12:45 pm – 2:15 pmDetective Chris Adamczyk, Mesa Police Department

Topic: Catphishing
Description coming soon

2:15 pm – 2:30 pm Networking break

2:30 pm – 3:15 pm TBA

TBA

3:15 pm – 4:15 pm TBA

Keynote TBA

Thursday, June 18th

8:00 am – 8:55 am Meredith Bailey, Supervisory Criminal Intelligence Analyst

Leveraging OSINT for Watchdesk and TTL Operations
The Georgia Information Sharing and Analysis Center (GBI-GISAC) is a division of the Georgia Bureau of Investigation and the state epicenter for threat reporting, development, and follow-through. GBI-GISAC analysts provide real-time, 24/7 investigative support to develop, triage, and disseminate criminal intelligence and “threats to life”. GBI-GISAC recently helped develop a new non-federal “Threat to Life” (TTL) protocol to handle the volume of threats originating from the National Threat Operations Center (NTOC), the public, and the internet service providers. In each incident, analysts leverage open-source intelligence techniques and state databases to identify and develop threats of suicide, targeted violence, school shootings, or other criminal activity. This intelligence is then securely shared with public safety stakeholders in a position to mitigate or follow-up on each incident. Watchdesk operations, protocols, and how Analysts leverage OSINT and lead development for time-sensitive TTL will be reviewed.

8:55 am – 9:50 am TBA

TBA

9:50 am – 10:05 pm Networking break

10:05 am – 12:00 pm Break-out sessions.

10:05 am -11:00 am TBA

TBA

10:05 am – 11:00 pm TBA

TBA

11:00 am – 12:00 pm TBA

TBA

11:00 am – 12:00 pm TBA

TBA

12:00 pm – 1:00 pm

Hot buffet lunch in the main hall and quality time with our fantastic sponsors and exhibitors!

1:00 pm – 3:00 pm Break-out sessions.

1:00 pm – 1:55TBA

TBA

1:00 pm – 1:55TBA

TBA

2:00-2:55TBA

TBA

2:00-2:55TBA

TBA

2:55 pm – 3:15 pm Networking break

3:15 pm – 4:00 pm TBA

Keynote TBA

Friday, June 19th

On the third day of the iSMILE Conference, delegates will choose from two all-day sessions. The first is a Missing Persons Capture the Flag contest. Delegates will be asked to submit their real missing-persons cases ahead of time. The second choice is to learn about investigating the Dark Web from one of North America’s premiere experts.

8:00 am – 4:00 pm TBA

Missing Persons: Capture the Flag
The Missing CTF is a non-theoretical Capture the Flag (Hackathon) event where contestants work in teams to crowdsource the collection of open-source intelligence (OSINT) to assist law enforcement in locating missing persons in real and currently open cases. In the information security community, a typical CTF will be of a technical nature where “flags” are hidden within pre-configured servers/virtual machines that contestants have to obtain using hacking techniques to gain points. The Missing CTF differs from this by having different flag categories based on pieces of information that law enforcement would look to gather to aid in a missing person case.

8:00 am – 4:00 pm Constable Nathan Dayler, Toronto Police Service

Shedding Light on Investigating the Dark
As Social Media and Internet commerce become more mainstream, so does Cyber Crime and Digital Currencies. The ability to communicate, plan and transact both financially and socially online has opened up the world, and essentially eliminated borders; and in some cases disregarded laws. As such, various areas have been developed that allow people to operate in a relatively private and secure manner to avoid persecution from their individual countries, or just express themselves in a manner that is secure and private. This, however, has given rise to the creation of “dark” areas of the Internet that allow for Criminal activities to occur. Activities such as cybercrime, hacktivism, fraud, conspiracy, exploitation and hate crime are but some of the criminal activities that occur on these sites. How as Law Enforcement officers do we investigate these areas? How do we penetrate these sites and attempt to identify individuals, while still working with our policies, procedures, and most importantly, the law? This full-day investigations course will introduce more advanced investigators to how to navigate the DarkNet, how to investigate cyber currencies and provide a better understanding of “dark” social networks and the operators that are present in these areas.