Canadian Technical Security Conference (CTSC)

Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC)
 
Home
Media Release
Contact Us - Canada
 
VENUE
Conference Venue
Accommodation
 
EVENT DETAILS
Schedule of Events
Competitive "Bug-Off"
Technical Workshop
Discussion Panel
Awards and Recognition
 
CTSC PARTICIPANT REGISTRATION
Conference Venue
Accommodation
Participant Registration
 
CTSC EXHIBITOR OPPORTUNITIES
Exhibitor Opportunities
 Exhibitor Profiles
Exhibitor Registration
 
SPEAKERS AND PRESENTERS
Call for Presentations
Presenter Registration
Confirmed Presenters
 
ADVERTISING OPPORTUNITIES
Advertising Opportunity
 
CTSC SPONSORSHIP OPPORTUNITIES
Corporate Sponsorship
Corporate Sponsors
 
CANADIAN TECHNICAL SECURITY PROFESSIONAL ASSOCIATION (CTSPA)
CTSPA
CTSPA

 

 

Schedule of Events | CTSC 2018

UPDATED: Friday February 23, 2018

Please note that the CTSC 2018 posted "Schedule of Events" is subject to amendment and change without notice as event planning progresses, and various exhibitors, presenters and events are confirmed.

 

Travel Day | Monday April 23, 2018

 

Time / Session

 

Event Description

Location
Monday

1600 - 2100

 

Exhibitor Setup Opportunity (Optional)

Registered CTSC 2018 exhibitors may setup display booths between 1600 - 2100 hours.
The exhibit area will be locked down at 2100 hours.
Please note that the accommodations check-in time is 1600 hours.

 

Lecture Theatre
Monday

1730 - 2000

 

Dinner at NAV CENTRE

Reservations for CTSC 2018 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant
 

Day 1 | Tuesday April 24, 2018

 

Time / Session

 

Event Description

Location
Tuesday

Day 1

0645 - 0800

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.
Reservations for CTSC 2018 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.
Propeller
Restaurant
Tuesday

Day 1

0700 - 0800

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.
The CTSC 2018 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.
Lecture Theatre
Tuesday

Day 1

0800 - 0830

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2018 registration booth to pick-up your conference identification and participant package.
Lecture Theatre
Tuesday

Day 1

0830 - 0835

Opening Remarks | CTSC 2018

 | Paul D Turner, TSS TSI |
Professional Development TSCM Group Inc.
Lecture Theatre

Tuesday

Day 1

0835 - 0845

Conference Moderator | CTSC 2018

Ryan Sears
Price Langevin & Associates Inc.
Lecture Theatre
Tuesday

Day 1

Session 1A

0845 - 0945

Understanding a Modern Moving Target Threat Model from an RF Detection Perspective of Emerging Radio-Frequency (RF) Signals

Paul D Turner, TSS TSI
Professional Development TSCM Group Inc.
Significant advancements in threat technology during the past decade have complicated the detection, capture, location, base analysis, and the need for a greater, more sophisticated analytical process.
The ability of the technical operator to see beyond the many spectral events that dance across the spectrum, or waterfall display, is becoming a necessary skill, as the complexity of existing and emerging signal classifications become reality, without a preverbal user-manual.
TSCM is not a do it yourself project, it never was, given the reality of embedded digital signals, time-periodic transmitters, modern complex modulation schemes, and the use of power and frequency agile technologies in the mix.
Detection is oftentimes a difficult task for the experienced technical operator, however, the real challenge in a modern moving target threat model, is properly identifying Signals of Interest (SOI), that by design, may be difficult to classify, without the knowledge and experience of professional technical operators.
The ability of the technical operator to understand the complexity of the ambient RF spectrum environment, and the bands, sub-bands, and signal level characteristics of signal events that both belong, or are out of band by design, or the inherent laws of RF metrics, or those that are not characteristic within the inspected Range of Interest (ROI), has become a full time job.
In-short, we are seeing very powerful new RF based threat technology, with virtually no possibility of detection, or identification, utilizing traditional out-dated techniques, and oftentimes obsolete equipment resources and detection strategies.
Many professional technical operators agree that the threat technology has surpassed the the ability of threat detection methods currently being utilized, to identify these new persistent threats, but still they do little to address the mostly, obsolete concepts of deployment, from a Probability of Detection (POD), suitability of equipment resources, applied field techniques, or methodology perspective.
This session will address and define a modern moving target threat model, as well as a new TSCM due-diligence methodology, deployment strategy, and dispel the myth, that if you do nothing, something magical might just happen.
Change must be set in motion, and business models must change at every level, to meet the challenges of global economic-espionage, within the private sector, and national security apparatus.
Lecture Theatre

 

Tuesday

Day 1

0945 - 1000

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Tuesday

Day 1

Session 2A

1000 - 1100

Implementing the Enterprise Cybersecurity Program Seamlessly with Low Impact on Culture

Presenter | Mark Bernard
Organization | Secure Knowledge Management Inc.
Description | Mark will discuss risk management and the impact that defective software and hardware are having on commercial enterprises and government.
The long-term impact on brands and trust will affect the strategic goals of many organizations as consumers seek reliable - resilient solutions to everyday problems.
DevOps integration with best practices is essential to resolve these exposures.
Mark will touch on the importance of audit and governance as most Cybersecurity frameworks are missing these keystones to sustainable Enterprise Security Programs.
Mark will also talk about the impact that GDPR, IoT and Cloud are having on IMIT/ICT and organizations.

• How should CISO be communicating strategic issues to the Executive Team and Board of Directors.
• How to integrate Cybersecurity into DevOps seamlessly with no impact to culture.
• How to present risks to a Governance Committee that will be supported.
• How to integrate Risk Management into the Enterprise.
• How can GDPR be implemented to address compliance risk yet no impact to culture.
• What has been the best approach to Cloud Security integration so far.
Lecture Theatre

 

Tuesday

Day 1

 1100 - 1105

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge

Tuesday

Day 1

Session 3A

1105 - 1200

 

 Topic

 Presenter
 Organization
 Description
Lecture Theatre

Tuesday

Day 1

Working Lunch

1200 - 1245

 

CTSC 2018 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2018 participants, exhibitors, presenters and guests in the lower lounge exhibit area.
Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

Lower Lounge
Tuesday

Day 1

Session 4A

1245 - 1345

Signals System Seven (SS7) Remote Interception / Disruption Countermeasures

Presenter | John B. Minor, SMA
Description | This presentation will explore the SS7 protocol history, interception exploitation and disruption capabilities.
Attendees will be introduced to counter surveillance tactics in 4G LTE and 5G NR mobile networks.
Lecture Theatre
Tuesday

Day 1

Session 5A

1345 - 1415

 Topic

Ryan Sears
Price Langevin & Associates Inc.
 TBA
Lecture Theatre

 

Tuesday

Day 1

 1415 - 1430

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Tuesday

Day 1

Session 6A

1430 - 1530

Practical Considerations for the Detection of RF Signals of Interest in TSCM | Part I

Presenter | Robert Inkol
Description | Spectrum analysis techniques based on the Fast Fourier Transform (FFT) are widely used for the detection and characterization of radio frequency signals.
For some applications, such as TSCM, the signals of interest can differ widely in their characteristics and it is important to set the signal processing parameters to achieve an appropriate balance between key performance characteristics such as frequency resolution, time resolution and spectral search speed.
This presentation is designed to provide a practical understanding of the fundamental concepts involved in the use of spectrum analyzers and more specialized receivers for TSCM.
Lecture Theatre

 

Tuesday

Day 1

 1530 - 1545

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Tuesday

Day 1

Session 7A

1545 - 1645

Practical Considerations for the Detection of RF Signals of Interest in TSCM | Part II

Presenter | Robert Inkol
Description | Spectrum analysis techniques based on the Fast Fourier Transform (FFT) are widely used for the detection and characterization of radio frequency signals.
For some applications, such as TSCM, the signals of interest can differ widely in their characteristics and it is important to set the signal processing parameters to achieve an appropriate balance between key performance characteristics such as frequency resolution, time resolution and spectral search speed.
This presentation is designed to provide a practical understanding of the fundamental concepts involved in the use of spectrum analyzers and more specialized receivers for TSCM.
Lecture Theatre
Tuesday

Day 1

1700 - 2000

Hospitality Night

Sponsored by Professional Development TSCM Group Inc.

Please join friends and business associates for a casual evening, networking event sponsored by Professional Development Group Inc.
Enjoy our hospitality night with a selection of good food prepared by the NAV CENTRE staff.
Cash bar is available

Lower Lounge

 

Day 2 | Wednesday April 25, 2018

 

Time / Session

 

Event Description

Location
Wednesday

Day 2

0645 - 0800

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.
Reservations for CTSC 2018 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.
Propeller
Restaurant
Wednesday

Day 2

0700 - 0800

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.
The CTSC 2018 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.
Lecture Theatre
Wednesday

Day 2

0800 - 0830

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2018 registration booth to pick-up your conference identification and participant package.
Lecture Theatre
Wednesday

Day 2

Session 8A

0830 - 0945

Emerging Technical Milestones for Managed Remote Spectrum Surveillance and Monitoring (RSSM) TM

Paul D Turner, TSS TSI
Professional Development TSCM Group Inc.
Software Defined Radio (SDR) technology, at the software and hardware level, continues to dominate and change the face of the technical security industry.
The shift from out-dated old school techniques, have been replaced with a strong focus on a powerful new deployment methodology, that is firmly based on a modern moving target threat model, that significantly enhances the Probability of Detection (POD), and continues to do so (24 / 7 / 365).
This methodology has opened the door for powerful new, multiple receiver platforms, meeting the vast technical challenges head-on, with the threat of many powerful Radio-Frequency (RF) devices, and new breed of unintentional radiator threats, demanding (24 / 7 / 365) power line monitoring.
The opportunities have never been better for the technical operator, and ultimately the end-user of professional services delivery, when multiple receiver systems are deployed around a formal periodic inspection program.
There is a compelling business case for new and recurring revenue streams, resulting in exponentially higher Probability of Detection (POD), and the acquisition of actionable intelligence.
This session explores the many possible deployment scenarios and advantages, of managed Remote Spectrum Surveillance and Monitoring (RSSM) TM, from both and operator assisted mode, and for autonomous collection strategies.
Lecture Theatre

 

Wednesday

Day 2

 0945 - 1000

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Wednesday

Day 2

Session 9A

1000 - 1100

Batten Down The Hatches: Analysis, Evaluation and Overview of Access Control and Video System Vulnerabilities

Scott Hogan | John Sheridan
House of Commons | Tiree Security
The push toward IP-centric integrated security systems has fundamentally changed the security landscape.
In many cases, adoption of Internet Protocols (IP) has resulted in an open environment for the integration of multiple security and life safety devices, applications and systems.
New threats and vulnerabilities are being introduced in the security industry as systems migrate from traditional analog to IP network-enabled systems.
This is particularly prevalent in electronic access control and in video surveillance.
There are also a considerable number of threats that exist in those systems that are not IP-centric.
Lecture Theatre

 

Wednesday

Day 2

1100 - 1105

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge


Wednesday

Day 2

Session 10A

1105 - 1200

 

Vulnerability Assessment

Adrien de Beaupré
Intru-Shun.ca
The discussion covers defining vulnerability assessment fundamentals, followed by in-depth coverage of the SANS Vulnerability Assessment Framework.
 Through a detailed, practical analysis of threat intelligence, threat modeling, documentation, and testing we will discuss how to implement a transformational and comprehensive vulnerability assessment program.
This content is adapted from the new SANS course SEC460 Enterprise Threat and
Vulnerability Assessment.
Lecture Theatre
Wednesday

Day 2

Working
Lunch

1200 - 1245

CTSC 2018 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2018 participants, exhibitors, presenters and guests in the lower lounge exhibit area.
Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

Lower Lounge
Wednesday

Day 2

Session 11A

1245 - 1345

13th Annual | CTSC 2018 "Bug-Off" | Expert Level |

Andrzej Wolczanski, TSS
Professional Development TSCM Group Inc.
Although this session is open to all CTSC participants, it is designed for more advanced participants that understand the equipment resources, methods and techniques.
Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunity and perhaps gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 12 years in the running.
Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.
The CTSC “Bug-off” is open to all conference participants for a chance to win prizes and personal recognition for elite standing.
Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.
The Office of Evil Intent, aka Paul D Turner, TSS TSI and Andrzej Wolczanski, TSS have spent the previous year plotting and planning challenging methods and real-world compromises for this year's event.
Sponsored by the Office of
Evil Intent (OEI)

C214

 

Wednesday

Day 2

1345 - 1400

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Wednesday

Day 2

Session 12A

1400 - 1500

13th Annual CTSC 2018 "Bug-Off" | Introductory Level |

Andrzej Wolczanski, TSS
Professional Development TSCM Group Inc.
This session is open to all CTSC participants, but is designed for less experienced participants that perhaps do not understand the equipment resources, methods and techniques.
Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunity and perhaps gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 13 years in the running.
Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.
The CTSC “Bug-off” is open to all conference participants for a chance to win prizes and personal recognition for elite standing.
Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.
The Office of Evil Intent, aka Paul D Turner, TSS TSI and Andrzej Wolczanski, TSS have spent the previous year plotting and planning challenging methods and real-world compromises for this year's event.
Sponsored by the Office of
Evil Intent (OEI)

C214

 

Wednesday

Day 2

1500 - 1515

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge



Wednesday

Day 2

Session 13A

1515 - 1615

 

Acoustical Metrics and Speech Security

Gregory E. Clunis, P.Eng.
Integral DX Engineering Ltd.
TBA
Lecture Theatre

 

Wednesday

Day 2

1615 - 1630

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Wednesday

Day 2

Session 14A

1630 - 1730

The Emerging 5G Standard and NR Technology Impact on TSCM Inspection Protocols

John B. Minor, SMA
This presentation will address the developing 5th Generation standards of Mobile Network Technology with a focus on NR (New Radio).
Key features, including frequency allocation, spectrum flexibility, compatibility, steerable antenna elements, control channels and performance expectations will be discussed.
Lecture Theatre
Wednesday

Day 2

1730 - 2130

Casual Dinner & Awards Night

Join us for a casual, relaxing, and always entertaining Dinner and Awards Night event.
Dinner served at 1800 hours.
Enjoy a catered dinner prepared by the chef and staff of the NAV CENTRE.
The evening rounds out with our Keynote speaker and a networking opportunity.
Cash bar is available.
Noorduyn Banquet Room
Wednesday

Day 2

1900 - 2000

CTSC 2018 | Keynote Address

Topic

 Presenter
 Organization
 Description
Noorduyn Banquet Room

 

Wednesday

Day 2

2000 - 2030

 

 | Industry Awards | Bug-Off Awards | Door Prizes |

Noorduyn Banquet Room
Wednesday

Day 2

2030 - 2200

Networking Opportunity

Upon completion of the CTSC 2018 Dinner & Awards night festivities there will be an informal networking opportunity rounding our the evening.
This is an excellent opportunity for exhibitors, sponsors and participants and CTSC 2018 guests to socialize and network.
Noorduyn Banquet Room
 

Day 3 | Thursday April 26, 2015

 

Time / Session

 

Event Description

Location
Thursday

Day 3

0645 - 0800

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.
Reservations for CTSC 2018 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.
Propeller
Restaurant
Thursday

Day 3

0700 - 0800

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.
The CTSC 2018 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.
Lecture Theatre
Thursday

Day 3

0800 - 0830

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2018 registration booth to pick-up your conference identification and participant package.
Lecture Theatre
Thursday

Day 3

Session 15A

0830 - 0930

Crowd Sourced Surveillance Fundamentals for the TSCM Professional

John B. Minor, SMA
This presentation will focus on the global impact of crowd sourced data from social media, its use as a surveillance mechanism, and how the TSCM professional can assist clients with related risk mitigation.
Lecture Theatre

 

Thursday

Day 3

0930 - 0945

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Thursday

Day 3

Session 16A

0945 - 1045

 TSCM in the Cyber Space | Part I

Dale Jackaman
Amuleta
Real world tools, techniques, hardware and applications for finding surveillance software or devices on computer networks.
Lecture Theatre

 

Thursday

Day 3

 1045 - 1100

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Thursday

Day 3

Session 17A

1100 - 1200

 TSCM in the Cyber Space | Part II

Dale Jackaman
Amuleta
Real world tools, techniques, hardware and applications for finding surveillance software or devices on computer networks.
Lecture Theatre
Thursday

Day 3

Working
Lunch

1200 - 1245

CTSC 2018 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2018 participants, exhibitors, presenters and guests in the lower lounge exhibit area.
Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

Lower Lounge
Thursday

Day 3

Session 18A

1245 - 1345

Kestrel TSCM ® Professional Software

Technical Workshop | Part I

Autonomous Measurement and Collection System (AMCS) TM

Paul D Turner, TSS TSI
Professional Development TSCM Group Inc.
AMCS TM is another example of powerful new industry disruptive defensive deployment technology, emerging across the private and public sector security apparatus, providing network based surveillance of the ambient RF spectrum environment, across local, and wide area geographical regions.

In the private sector, AMCS TM, can be deployed during protective operations, across vehicles, aircraft, hotels, restaurants, meeting and conference facilities, etc., and monitored worldwide.

AMCS TM provides the ability to engage multiple "reporters" via TCP / IP , in combination with a local "file reporter", permitting both network based communication, and locally captured, reviewable spectra, for technical operator assisted deployment.

The AMCS TM module is a low cost optional capability, that is fully integrated deep within the Kestrel TSCM  ® Professional Software at the code level, referred to as OPT AMCS TM, that can be deployed across a dedicated, or existing operational network.

Commercial level encryption can be provided via the AMCS TM module, or the end-user may utilize proprietary encryption within an existing network structure, making AMCS TM ideal for law-enforcement, government, and military applications, across ground-based, air, marine, and satellite operations.

AMCS TM is part of the Kestrel-net TM umbrella of advanced standards based TSCM, and SIGINT based Software Defined Radio (SDR) applications.
Lecture Theatre

 

Thursday

Day 3

1345 - 1400

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Thursday

Day 3

Session 19A

1400 - 1515

Kestrel TSCM ® Professional Software

Technical Workshop | Part II

Understanding Time Differential Signal Analysis (TDSA) TM

Paul D Turner, TSS TSI
Professional Development TSCM Group Inc.
TDSA TM is just one aspect of the Kestrel Signal Analytics (KSA) TM process that can be applied, defined, and easily redefined during active runtime, and / or post analytical analysis.

The premise of a modern moving target threat model, as defined under the TSB 2000 (Technical) Standard TM, requires that RF spectrum analysis and capture, extend beyond the limitations of traditional "snap-shot" style RF reviews, and demands greater reliance on longer capture times as part of a managed Remote Spectrum Surveillance and Monitoring (RSSM) TM deployment process.

TDSA TM is a powerful resource, that encompasses many other Kestrel TSCM ® Professional Software features and functionality, that are fully integrated across all other available features, including all display parameters, to bring clarity to the ambient RF spectrum environment, and pinpoint potentially hostile Signals of Interest (SOI) lurking within the RF spectrum.

This presentation is an interactive session, so be sure to bring your Kestrel TSCM ®  Professional Software | Signals Intelligence Support System (SISS) TM, and follow along, to gain a working knowledge of this new capability.
Lecture Theatre

 

Thursday

Day 3

1515 - 1530

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

Lower Lounge
Thursday

Day 3

Session 20A

1530 - 1630

Kestrel TSCM ® Professional Software

Technical Workshop | Part III

Understanding Receiver Differential Signal Analysis (RDSA) TM

Paul D Turner, TSS TSI
Professional Development TSCM Group Inc.
RDSA TM is the latest innovation added as a standard included feature of the Kestrel TSCM  ® Professional Software, which is described as a radical departure over traditional deployment methods, taking advantage of independent multiple receivers, with direct spectra overlay for real-time comparative analysis.

Any connected receiver acts in a totally independent, operator defined mode, with a unique collection location, allowing bands, sub-bands, and any operator defined Range of Interest (ROI) to essentially dropped into the existing spectrum of any other receiver, or band allocation.

Applications include full remote operation of receivers, such as internal and external, at the room level, or any other operator defined strategy, at the facility level, or across multiple buildings or floors within a multi-level structure, for a 3-dimentional overview and cross receiver comparative, utilizing peak, average, and our powerful real-time display modes.

RDSA TM encompasses many other Kestrel TSCM  ® Professional Software features and functionality, that are fully integrated across all other available features, including all display parameters, to bring clarity to the ambient RF spectrum environment, and pinpoint potentially hostile Signals of Interest (SOI) lurking within the RF spectrum.
RDSA TM has also made possible, the development of geo-location based heat mapping, across Dual Receiver Operation (DRO) TM, and Multiple Receiver Operation (MRO) TM.
The ability to provide an operator defined colour profile, combined with fully supported image mapping overlay of any floor plan, virtual reality photograph, facility riser plot, site plan, 3D rendering, or geographical map, enhances operator efficiency.

This presentation is an interactive session, so be sure to bring your Kestrel TSCM  ®  Professional Software | Signals Intelligence Support System (SISS) TM and follow along to gain a working knowledge of this capability.
Lecture Theatre
Thursday

Day 3

1630 - 1645

Closing Remarks

Paul D Turner, TSS TSI
Professional Development TSCM Group Inc.
Lecture Theatre

 

 

Extend Your Professional Credibility | Canadian Technical Security Conference (CTSC) TM

Canada Wide: 1-888-293-7384 | Toronto: (647) 293-7384 | Calgary: (403) 812-0737 | Ottawa: (613) 903-7577

Copyright © 2018 | All Rights Reserved

Last Revised: Friday February 23, 2018 20:30:27

| Webmaster | Copyright | Legal Notice | Privacy |