Canadian Technical Security Conference (CTSC)

Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC)
 
Home
Media Release
Contact Us - Canada
 
VENUE
Conference Venue
Accommodation
 
EVENT DETAILS
Schedule of Events
Competitive "Bug-Off"
Technical Workshop
Discussion Panel
Awards and Recognition
 
CTSC PARTICIPANT REGISTRATION
Conference Venue
Accommodation
Participant Registration
 
CTSC EXHIBITOR OPPORTUNITIES
Exhibitor Opportunities
 Exhibitor Profiles
Exhibitor Registration
 
SPEAKERS AND PRESENTERS
Call for Presentations
Presenter Registration
Confirmed Presenters
 
ADVERTISING OPPORTUNITIES
Advertising Opportunity
 
CTSC SPONSORSHIP OPPORTUNITIES
Corporate Sponsorship
Corporate Sponsors
 
CANADIAN TECHNICAL SECURITY PROFESSIONAL ASSOCIATION (CTSPA)
CTSPA
CTSPA

 

 

Schedule of Events

UPDATED: Sunday April 23, 2017

Please note that the CTSC 2017 posted "Schedule of Events" is subject to amendment and change without notice as event planning progresses, and various exhibitors, presenters and events are confirmed.

 

Travel Day - Monday April 24, 2017

 

Time / Session

 

Event Description

Location
Monday

1600 - 2100

 

Exhibitor Setup Opportunity (Optional)

Registered CTSC 2017 exhibitors may setup display booths between 1600 - 2100 hours.
The exhibit area will be locked down at 2100 hours.
Please note that the accommodations check-in time is 1600 hours.

 

Exhibit
Area

Lower Lounge
Monday

1730 - 2000

 

Dinner at NAV CENTRE

Reservations for CTSC 2017 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant
 

Day 1 - Tuesday April 25, 2017

 

Time / Session

 

Event Description

Location
Tuesday

Day 1

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.
Reservations for CTSC 2017 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant
Tuesday

Day 1

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.
The CTSC 2017 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

Exhibit
Area

Lower Lounge
Tuesday

Day 1

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2017 registration booth to pick-up your conference identification and participant package.

 

Upper
Lounge
Tuesday

Day 1

0830 - 0845

 

Opening Remarks | CTSC 2017

 | Paul D Turner, TSS TSI |
Professional Development TSCM Group Inc.

 

Theatre
Tuesday

Day 1

Session 1A

0845 - 0945

 

RF Spectrum | Analytical Threat Model

 | Paul D Turner, TSS TSI |
Professional Development TSCM Group Inc.
This presentation will examine the recommended TSCM based, Radio Frequency (RF) spectrum allocation band plan analysis, from an operator deployment perspective.
Many operators miss important, and oftentimes, obvious clues the indicate the presence of a Technical Surveillance Device (TSB) operating periodically or continuously within the ambient RF spectrum environment.
Official spectrum allocation is constantly changing globally, as are the inherent threats of a technical compromise given the vast technological move to virtually “everything” wireless, and spectrum hungry consumer and commercial technology hitting the market as a result.
A common question that often arises among technical operators, is that of RF spectrum prioritization during limited “time-on-target” deployments and the best practice that should be considered to properly capture, document, and analyze the radio frequency spectrum for operator assisted TSCM assignments and for managed Remote Spectrum Surveillance and Monitoring (RSSM) applications.
Gain practical insight into setting deployment priorities for TSCM based Radio Frequency (RF) spectrum analysis.
Paul will introduce some of the common signal types, where they are likely to be observed in the spectrum, and how to characterize the signals for analytical classification.

 

Theatre

 

Tuesday

Day 1

0945 - 1000

 

Refreshment Break

Refreshment breaks are sponsored by Price-Langevin & Associates Inc.
Lower Lounge
Tuesday

Day 1

Session 2A

1000 - 1100

 

The Impact of The Evolution from Circuit Switched to Packet Switched Communications on Eavesdropping Detection

 | John B. Minor, Communications Expert |
The presentation will address the history of the development of packet switched networks and the evolution from a circuit switched to packet switched telecommunications network infrastructure and on to the Internet.
This discussion will explore the impact upon surveillance techniques and Technical Surveillance Counter Measures tactics.
The presentation will incorporate an overview of the latest technology evolution as the world prepares to move to 5G cellular communications including front haul, backhaul, and cross haul.
Theatre

 

Tuesday

Day 1

1100 - 1105

 

Refreshment Break

Refreshment breaks are sponsored by Price-Langevin & Associates Inc.
Lower Lounge

Tuesday

Day 1

Session 3A

1105 - 1200

 

 

Introduction to Evading Security Controls

 | Adrien de Beaupré |
Intru-Shun.ca Inc.
This presentation will discuss the things that you will actually need to become a penetration tester, be prepared for a no-fluff honest discussion.
So do you really want to be a penetration tester? We get these questions all the time, such as:
What is penetration testing?
What are the top 10 coolest most important hacking tools for penetration testers?
What are the top 10 skills that are important to become the worlds greatest hacker? Answer? Make up lots of lies, plagiarize, and write a book!
How do I become the "bestest" cyber hacker?
Can you hack my buddies hotmail for me?
Do I need a cool hacker handle?
Do I really need to learn all that stuff to be a cool hacker?
Do I really have to work hard for many years to be a pen tester?
I have a $CERT or degree in so that makes me an expert!
You will need attitude, aptitude, initiative, desire, dedication, discipline, integrity, ethics, experience, knowledge, and tools.

 

Theater

Tuesday

Day 1

Working Lunch

1200 - 1245

 

 | Lunch |

 | Sponsored by JD LeaSure at COMSEC LLc. |

A working lunch will be served for CTSC 2017 participants, exhibitors, presenters and guests in the lower lounge exhibit area.
Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.
Lower Lounge

Exhibit
Area
Tuesday

Day 1

Session 4A

1245 - 1315

 

Project Management in the technical Security world | It’s not how it used to be!

  | Ryan Sears |
Price-Langevin & Associates Inc.
This presentation will cover the basics in managing technical security projects from start to finish, and reflect on my experiences in past & current projects that will give attendee’s insight as to what is all involved in technical security construction.
This presentation will also touch base on how client’s needs have changed and how we need to adapt to them to provide effective security and building integration in this day in age.

 

Theater
Tuesday

Day 1

Session 5A

1315 - 1415

 

Privacy Protection - Essential Elements for Getting it Right

 | Sue Lajoie | Lara Ives |
Privacy Commissioner of Canada
Find out about the role and work of the Office of the Privacy Commissioner of Canada (OPC).
Learn what the OPC has seen and uncovered in the conduct of its privacy reviews and investigations.
Hear about what can be done to mitigate against privacy breaches, how to safeguard information, best practices and tips.

 

Theatre

 

Tuesday

Day 1

 1415 - 1430

 

Refreshment Break

Refreshment breaks are sponsored by Price-Langevin & Associates Inc.
Lower Lounge
Tuesday

Day 1

Session 6A

1430 - 1530

 

The ThinkRF R5500 Receiver with Kestrel ® TSCM Professional Software for TSCM applications

 | Nikhil Adnani |
ThinkRF Corporation
This presentation will introduce the new 27 GHz R5500 hardware platform and applications to TSCM.
The platform is unique in its ability to both plug into a laptop as well as directly into the network for remote RF monitoring.
The R5500 also has hardware triggers, fast sweep and stream rates to enable real-time signal capture, analysis and processing.
With compelling performance at a cost-effective price point, the R5500 is a game changer for monitoring applications.
Coupled with Kestrel software, the R5500 is a versatile and powerful TSCM solution for Remote Spectrum Surveillance and Monitoring (RSSM).

 

Theatre

 

Tuesday

Day 1

 1530 - 1540

 

Refreshment Break

Refreshment breaks are sponsored by Price-Langevin & Associates Inc.
Lower Lounge
Tuesday

Day 1

Session 7A

1540 - 1640

 

Access Control | Authorized or Trespasser?

 | Gary Dawson |
Vigilans Security and Risk Management Inc.
This presentation will cover planning and implementation of Access Control in a physical security plan.
The briefing will cover the factors to assess when implementing access control as a critical element of a comprehensive security plan.
As the title suggests Access Control is the process of authorizing personnel and material onto (as well as off) a site or premises.
Moreover the presentation will examine aspects of policy, access control technologies and other considerations when implementing an effective access control program.

 

Theatre

 

Tuesday

Day 1

 1640 - 1650

 

 | Q & A Opportunity | Daily Reminders and Announcements |

Theatre
Tuesday

Day 1

1700 - 2000

 

 | Hospitality Night |

 | Sponsored by Professional Development TSCM Group Inc. |

Please join friends and business associates for a casual evening, networking event sponsored by Professional Development Group Inc.
Enjoy our hospitality night with a selection of good food prepared by the NAV CENTRE staff.
Cash bar is available

 

Lower Lounge

 

Day 2 - Wednesday April 26, 2016

 

Time / Session

 

Event Description

Location
Wednesday

Day 2

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.
Reservations for CTSC 2017 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant
Wednesday

Day 2

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.
The CTSC 2017 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

Exhibit
Area
Wednesday

Day 2

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2017 registration booth to pick-up your conference identification and participant package.

 

Upper
Lounge
Wednesday

Day 2

Session 8A

0830 - 0945

 

SDR Receiver Hardware | TSCM Review

 | Paul D Turner, TSS TSI |
Professional Development TSCM Group Inc.
There is often considerable hype and confusion about Software Defined Radio (SDR) receiver hardware and the suitability of the more traditional Test & Measurement based Spectrum Analyzers that have all but revolutionized the TSCM industry during the past five (5) years.
Gaining a better understanding about various SDR hardware devices and options, can help bring clarity and reason to a rather complex subject, given the wide ranging differences from one manufacturers product to another, with very few comparative points of reference.
Learn about the capabilities and limitations of a number of popular SDR hardware options, and learn how they compare across the spectrum analysis, TSCM, and RSSM operational environment.
Gain better insight regarding the development challenges realized in interfacing a cross section of hardware products supported by the Kestrel TSCM ® Professional Software.

 

Theatre

 

Wednesday

Day 2

 0945 - 1000

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.
Lower Lounge
Wednesday

Day 2

Session 9A

1000 - 1100

 

Practical Considerations for the Detection and Identification of Signals for TSCM | Part I

 | Robert Inkol, B.Sc M.A.Sc |
Technical Consultant
Increasing demands for wireless personal communications and networking digital devices have motivated the development of new communications technologies and their codification in industry standards.
Considerable attention has been devoted to approaches for making more effective use of the available spectrum.
In addition to using more sophisticated modulation techniques, specialized wireless communications standards tailored to emerging wireless applications are being developed.
Consequently, not only is the number of signals in the environment increasing, there is also an increasing diversity in the bandwidths and the channelization schemes being used by them.
Because of the increasingly ubiquitous nature of wireless signals and their potential exploitation for surveillance or network security compromises, it is essential that Technical Security operators be able to make effective use of their equipment to detect and identify threat transmitters.
Given the increasingly diverse nature of the signal environment, it is especially important that they understand how their equipment works and be able to make appropriate choices for its configuration.
This presentation includes:
  • A brief overview of wireless and personal communications technologies;
  • A review of the basic concepts of wideband radio frequency receivers;
  • The basic concepts of spectrum analysis as applied to TSCM;
  • The effects of receiver settings for gain, frequency resolution and other settings and the considerations affecting how they should be chosen;
  • The use of IQ signals (where available) as a further aid to signal identification.
Theatre

 

Wednesday

Day 2

1100 - 1110

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.
Lower Lounge


Wednesday

Day 2

Session 9B

1110 - 1200

 

Practical Considerations for the Detection and Identification of Signals for TSCM | Part II

 | Robert Inkol, B.Sc M.A.Sc |
Technical Consultant
Increasing demands for wireless personal communications and networking digital devices have motivated the development of new communications technologies and their codification in industry standards.
Considerable attention has been devoted to approaches for making more effective use of the available spectrum.
In addition to using more sophisticated modulation techniques, specialized wireless communications standards tailored to emerging wireless applications are being developed.
Consequently, not only is the number of signals in the environment increasing, there is also an increasing diversity in the bandwidths and the channelization schemes being used by them.
Because of the increasingly ubiquitous nature of wireless signals and their potential exploitation for surveillance or network security compromises, it is essential that Technical Security operators be able to make effective use of their equipment to detect and identify threat transmitters.
Given the increasingly diverse nature of the signal environment, it is especially important that they understand how their equipment works and be able to make appropriate choices for its configuration.
This presentation includes:
  • A brief overview of wireless and personal communications technologies;
  • A review of the basic concepts of wideband radio frequency receivers;
  • The basic concepts of spectrum analysis as applied to TSCM;
  • The effects of receiver settings for gain, frequency resolution and other settings and the considerations affecting how they should be chosen;
  • The use of IQ signals (where available) as a further aid to signal identification.
Theatre
Wednesday

Day 2

Working
Lunch

1200 - 1245

 

 | Lunch |

 | Sponsored by John Price at Price-Langevin & Associates Inc. |

A working lunch will be served for CTSC 2017 participants, exhibitors, presenters and guests in the lower lounge exhibit area.
Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

Lower Lounge

Exhibit
Area
Wednesday

Day 2

Session 10A

1245 - 1345

 

12th Annual | CTSC 2017 "Bug-Off" | Expert Level |

 | Andrzej Wolczanski, TSS |
Professional Development TSCM Group Inc.
Technical Research and Standards Group (TRSG)
Although this session is open to all CTSC participants, it is designed for more advanced participants that understand the equipment resources, methods and techniques.
Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunity and perhaps gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 12 years in the running.
Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.
The CTSC “Bug-off” is open to all conference participants for a chance to win prizes and personal recognition for elite standing.
Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.
The Office of Evil Intent, aka Paul D Turner, TSS TSI and Andrzej Wolczanski, TSS have spent the previous year plotting and planning challenging methods and real-world compromises for this year's event.

 

Sponsored by the Office of
Evil Intent (OEI)

Room A
C214

Room B
TBA

 

Wednesday

Day 2

1345 - 1400

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.
Lower Lounge
Wednesday

Day 2

Session 11A

1400 - 1500

 

12th Annual CTSC 2017 "Bug-Off" | Introductory Level |

 | Andrzej Wolczanski, TSS |
Professional Development TSCM Group Inc.
Technical Research and Standards Group (TRSG)
This session is open to all CTSC participants, but is designed for less experienced participants that perhaps do not understand the equipment resources, methods and techniques.
Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunity and perhaps gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 12 years in the running.
Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.
The CTSC “Bug-off” is open to all conference participants for a chance to win prizes and personal recognition for elite standing.
Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.
The Office of Evil Intent, aka Paul D Turner, TSS TSI and Andrzej Wolczanski, TSS have spent the previous year plotting and planning challenging methods and real-world compromises for this year's event.

 

Sponsored by the Office of
Evil Intent (OEI)

Room A
C214

Room B
TBA

 

Wednesday

Day 2

1500 - 1515

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.

Lower Lounge



Wednesday

Day 2

Session 12A

1515 - 1615

 

 

Research Electronics International (REI)

 | Lee Jones |
Today's Eavesdropping Threats and Countermeasures
Commercial surveillance products continue to get more sophisticated, easier to acquire, cheaper, and harder to detect.
REI will present some of the more common illicit surveillance threats and countermeasure to prevent information theft.
Theatre

 

Wednesday

Day 2

1615 - 1630

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.
Lower Lounge
Wednesday

Day 2

Session 13A

1630 - 1720

 

The Challenges of Obtaining TSCM Services in a Foreign Country

 | Len Babin, CPP |
Many of us have had the experience of a TSCM project in North America which we have delivered to our employers or a client.
While this always brings its own challenges, professionally installed infrastructure and societies operating under the rule of law tend to help mitigate these challenges.
Len has worked as a security manager for a Canadian mining company in Guatemala.
Upon his arrival, there was a lineup of employees at his door to report security issues, prominent amongst which was that everyone was being bugged.
Guatemala, having endured a 36 year civil war, was rebuilding its society after a series of Machiavellian dictators and all bets were off on the rule of law.
This is a presentation about the challenges of obtaining TSCM services in a foreign country:
locating the appropriate individual (who doesn’t mind alligators and scorpions);
collaborating on a plan to import highly technical equipment;
conducting a pre-arrival technical assessment of building infrastructure; and
hauling sensitive technical equipment to a remote mine site and having everyone including the equipment survive the trip.
This is not a deeply technical presentation, however, it’s an overview of the challenges one will encounter to obtain or provide TSCM services in a Third World country.
It is not a travel log but an inside look at a real TSCM project in the developing world colored with interesting challenges in the environment and stunning pictures.

 

Theatre

 

Wednesday

Day 2

1720 - 1730

 

 | Daily Reminders and Announcements | Q & A Opportunity |

Theatre
Wednesday

Day 2

1730 - 2130

 

Casual Dinner & Awards Night

Join us for a casual, relaxing, and always entertaining Dinner and Awards Night event.
Dinner served at 1800 hours.
Enjoy a catered dinner prepared by the chef and staff of the NAV CENTRE.
The evening rounds out with our Keynote speaker and a networking opportunity.
Cash bar is available.

 

Noorduyn Banquet Room
Wednesday

Day 2

1900 - 2000

 

CTSC 2017 | Keynote Address

The Rise of Machine Virtualization and the Impact on TSCM Inspection Protocols

 | John B. Minor, Communications Expert |
This presentation will provide an exploration of the virtualization of computing components including current and future trends in computing machine virtualization.
The presentation will also explore how virtual machines may be exploited for espionage, how and where to conduct TSCM inspections in pursuit of counter espionage, and an overview of the forensic autopsy of a virtual machine.

 

Noorduyn Banquet Room

 

Wednesday

Day 2

2000 - 2030

 

 | Industry Awards | Bug-Off Awards | Door Prizes |

Noorduyn Banquet Room
Wednesday

Day 2

2030 - 2200

 

Networking Opportunity

Upon completion of the CTSC 2017 Dinner & Awards night festivities there will be an informal networking opportunity rounding our the evening.
This is an excellent opportunity for exhibitors, sponsors and participants and CTSC 2017 guests to socialize and network.

 

Noorduyn Banquet Room
 

Day 3 - Thursday April 27, 2015

 

Time / Session

 

Event Description

Location
Thursday

Day 3

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.
Reservations for CTSC 2017 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant
Thursday

Day 3

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.
The CTSC 2017 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

Exhibit
Area
Thursday

Day 3

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2017 registration booth to pick-up your conference identification and participant package.

 

Upper
Lounge
Thursday

Day 3

Session 14A

0830 - 0930

 

Adding a Remote Network Probe for Remote Spectrum Surveillance and Monitoring (RSSM), An Overview

 | John B. Minor, Communications Expert |
This presentation will provide an overview of how to add a packet switched network probe for Remote Spectrum Surveillance and Monitoring (RSSM) to your TSCM repertoire.
This overview will also provide a primer on Transmission Control Protocol / Internet Protocol (TCP/IP), sub-netting, ports, routing and more.
Further, the overview will address how to install and configure a network probe, suggested security protocols to encrypt remote access to the network probe, and how to remotely manage a network probe and adjust parameters to accommodate emerging threats.

 

Theatre

 

Thursday

Day 3

0930 - 0940

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.
Lower Lounge
Thursday

Day 3

Session 15A

0940 - 1110

 

Constructing a SDA/SCIF in Non-Greenfield Environments: "Square Peg in a Round Hole"

 | Scott Hogan | House of Commons
 | Greg Clunis | Integral DX Engineering Ltd.
Constructing an SDA/SCIF in a building where there are no constraints due to space, weight, life safety, electrical, mechanical, heritage, et cetera is complicated and expensive.
This presentation will focus on the challenges of creating an SDA/SCIF in buildings where some or all of the above constraints do exist.
Reference will be made to various guidelines, directives and standards, as well as some of the unique challenges of heritage or existing buildings that are already overfilled.
Attributes and requirements for SDA/SCIF's will be discussed, as well as a the various acoustic metrics of relevance including Sound Transmission Class (STC) and Speech Privacy Class (SPC).
The implementation process and key milestones will be reviewed, as well as the necessary certifications and approvals. The presentation will conclude with several real-world case studies of SDA/SCIF spaces that have been incorporated in to existing buildings.

 

Theatre

 

Thursday

Day 3

 1110 - 1120

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.
Lower Lounge
Thursday

Day 3

Session 16A

1120 - 1200

 

Public Private Partnerships | The Timely Delivery of Defensive Technical Surveillance Countermeasures (TSCM)

 | Paul D Turner, TSS TSI |
Professional Development TSCM Group Inc.
This presentation will introduce the subject of Public Private Partnerships in the delivery of timely defense TSCM inspections for government contractors, crown corporations, law-enforcement, government, military, and many other publicly controlled and regulated entities.
The private sector is well positioned to fulfill the strategic requirements for the timely delivery of TSCM professional services at the due-diligence and national security level across the country.

 

Theatre
Thursday

Day 3

Working
Lunch

1200 - 1245

 

 | Lunch |

 Sponsored by JD LeaSure at COMSEC LLc. |

A working lunch will be served for CTSC 2017 participants, exhibitors, presenters and guests in the lower lounge exhibit area.
Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

Exhibit
Area
Thursday

Day 3

Session 17A

1245 - 1345

 

Technical Workshop | Part I

Kestrel TSCM Professional Software | Technical Surveillance Countermeasures (TSCM) Deployment

 | Paul D Turner, TSS TSI |
 | Andrzej Wolczanski, TSS |
Professional Development TSCM Group Inc.
Technical Research and Standards Group (TRSG)
The Kestrel TSCM ® Professional Software continues to dominate the Technical Security (TSEC) industry worldwide, with a modern methodology and unsurpassed full featured application, designed for use in a moving target threat model.
This presentation will take technical operators on a Technical Surveillance Countermeasures (TSCM) deployment journey demonstrating, project file and write management tools, collection and comparative analysis process, spectra review and analytical analysis, signal identification, characterization, and classification, alerting and Automatic Export Control (AEC) file export) capability, demodulation Visualizer, IQ recording and playback, and Session Report Generator (SRG).
Learn how the key aspects of the Kestrel TSCM ® Professional Software work together to capture, store, identify, characterize, classify, alert, report, and store all aspects of the inspection data during traditional real-time capture and analyze assignments.
Participants are encouraged to bring your Kestrel TSCM ® Professional Software system and follow along during the technical workshop.
Andrzej and Paul will provide assistance to participants, in updating your Kestrel TSCM ® Professional Software and answer any questions you might have about the software, hardware, or host computer.

 

Theatre

 

Thursday

Day 3

1345 - 1400

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.
Lower Lounge
Thursday

Day 3

Session 18A

1400 - 1515

 

Technical Workshop | Part II

Kestrel TSCM Professional Software | Remote Spectrum Surveillance and Monitoring (RSSM) Deployment

 | Paul D Turner, TSS TSI |
 | Andrzej Wolczanski, TSS |
Professional Development TSCM Group Inc.
Technical Research and Standards Group (TRSG)
The Kestrel TSCM ® Professional Software continues to dominate the Technical Security (TSEC) industry worldwide, with a modern methodology and unsurpassed full featured application, designed for use in a moving target threat model.
This presentation will take technical operators on a Remote Spectrum Surveillance and Monitoring (RSSM) deployment journey demonstrating, deployment considerations, system architecture and network connectivity, remote desktop software, advanced new capability, including Time Differential Signal Analysis (TDSA), Automatic Export Control (AEC), and other essential new technology advancements that are designed to significantly improve the Probability of Detection (POD).
Learn how the key aspects of the Kestrel TSCM ® Professional Software work together to capture, store, identify, characterize, classify, alert, report, and store all aspects of the inspection data captured over an extended period of time.
Participants are encouraged to bring your Kestrel TSCM ® Professional Software system and follow along during the technical workshop.
Andrzej and Paul will provide assistance to participants, in updating your Kestrel TSCM ® Professional Software and answer any questions you might have about the software, hardware, or host computer.

 

Theatre

 

Thursday

Day 3

1515 - 1530

 

Refreshment Break

Refreshment breaks are sponsored by Professional Development TSCM Group Inc.
Lower Lounge
Thursday

Day 3

Session 19A

1530 - 1630

 

Technical Workshop | Part III

Kestrel TSCM Professional Software | Kestrel ® Signal Analytics (KSA) TM | An Introduction to IF Broadband (IFB) Detection

 | Paul D Turner, TSS TSI |
 | Andrzej Wolczanski, TSS |
Professional Development TSCM Group Inc.
Technical Research and Standards Group (TRSG)
The Kestrel TSCM ® Professional Software continues to dominate the Technical Security (TSEC) industry worldwide, with a modern methodology and unsurpassed full featured application, designed for use in a moving target threat model.
This presentation will take technical operators on a analytical journey demonstrating, the capture, reporting, and storage of active runtime deployment, and introduce interim,  and post collection review and analysis resources under the Kestrel Analytics TM umbrella of advanced operator centric, TSCM specific tools.
Discover how Kestrel ® minimizes the requirement for secondary search tools such as a IF Broadband (IFB) detector, by providing built-in locate and verify resources, for quickly pin-pointing and neutralizing the emitter.
Learn how the key aspects of the software work together to capture, store, identify, characterize, classify, alert, report, store all aspects of the inspection data, and provide advanced locate and verify capabilities.
Participants are encouraged to bring your Kestrel TSCM ® Professional Software system and follow along during the technical workshop.
Andrzej and Paul will provide assistance to participants, in updating your Kestrel TSCM ® Professional Software and answer any questions you might have about the software, hardware, or host computer.
Learn about new features currently under development.

 

Theatre
Thursday

Day 3

1630 - 1645

 

Closing Remarks

 | Paul D Turner, TSS TSI |
Professional Development TSCM Group Inc.

 

Theatre

 

 

Extend Your Professional Credibility | Canadian Technical Security Conference (CTSC) TM

Canada Wide: 1-888-293-7384 | Toronto: (647) 293-7384 | Calgary: (403) 812-0737 | Ottawa: (613) 903-7577

Copyright © 2017 | All Rights Reserved

Last Revised: Sunday April 23, 2017 13:22:48

| Webmaster | Copyright | Legal Notice | Privacy |