Canadian Technical Security Conference (CTSC)

Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC) Canadian Technical Security Conference (CTSC)
 
Home
Media Release
Contact Us - Canada
 
VENUE
Conference Venue
Accommodation
 
EVENT DETAILS
Schedule of Events
Competitive "Bug-Off"
Technical Workshop
Discussion Panel
Awards and Recognition
 
CTSC PARTICIPANT REGISTRATION
Conference Venue
Accommodation
Participant Registration
 
CTSC EXHIBITOR OPPORTUNITIES
Exhibitor Opportunities
 Exhibitor Profiles
Exhibitor Registration
 
SPEAKERS AND PRESENTERS
Call for Presentations
Presenter Registration
Confirmed Presenters
 
ADVERTISING OPPORTUNITIES
Advertising Opportunity
 
CTSC SPONSORSHIP OPPORTUNITIES
Corporate Sponsorship
Corporate Sponsors
 
CANADIAN TECHNICAL SECURITY PROFESSIONAL ASSOCIATION (CTSPA)
CTSPA
CTSPA

 

 

Schedule of Events | CTSC 2018

UPDATED: Wednesday April 18, 2018

Please note that the CTSC 2018 posted "Schedule of Events" is subject to amendment and change without notice as event planning progresses, and various exhibitors, presenters and events are confirmed.

 

Travel Day | Monday April 23, 2018

 

Time / Session

 

Event Description

Location

Monday

1600 - 2100

 

Exhibitor Setup Opportunity (Optional)

Registered CTSC 2018 exhibitors may setup display booths between 1600 - 2100 hours. The exhibit hall will be locked down at 2100 hours.

Please note that the accommodations check-in time is 1600 hours for those arriving the day before the conference.

 

Lecture Theatre

Monday

1730 - 2000

 

Dinner at NAV CENTRE

Reservations for CTSC 2018 accommodations, must be booked directly with the venue NAV CENTRE, and dinner is not part of the conference registration package.

 

Propeller
Restaurant

 

Day 1 | Tuesday April 24, 2018

 

Time / Session

 

Event Description

Location

Tuesday

Day 1

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTER as part of your overnight guest package.

Reservations for CTSC 2018 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant

Tuesday

Day 1

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.

The CTSC 2018 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

Lecture Theatre

Tuesday

Day 1

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2018 registration booth to pick-up your conference identification and participant package.

 

Lecture Theatre

Tuesday

Day 1

0830 - 0835

 

Opening Remarks | CTSC 2018

Paul D Turner, TSS TSI

Professional Development TSCM Group Inc.

Mark Hrabowsky

EMF Shield Guard

 

Lecture Theatre

 

Tuesday

Day 1

0835 - 0845

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Tuesday

Day 1

Session 1A

0845 - 1030

 

Understanding a Modern Moving Target Threat Model from an RF Detection Perspective of Emerging Radio-Frequency (RF) Signals

Paul D Turner, TSS TSI | BIO

Professional Development TSCM Group Inc.

Significant advancements in threat technology during the past decade have complicated the detection, capture, location, base analysis, and the need for a greater, more sophisticated analytical process.

The ability of the technical operator to see beyond the many spectral events that dance across the spectrum, or waterfall display, is becoming a necessary skill, as the complexity of existing and emerging signal classifications become reality, without a preverbal user-manual.

TSCM is not a do it yourself project, it never was, given the reality of embedded digital signals, time-periodic transmitters, modern complex modulation schemes, and the use of power and frequency agile technologies in the mix.

Detection is oftentimes a difficult task for the experienced technical operator, however, the real challenge in a modern moving target threat model, is properly identifying Signals of Interest (SOI), that by design, may be difficult to classify, without the knowledge and experience of professional technical operators.

The ability of the technical operator to understand the complexity of the ambient RF spectrum environment, and the bands, sub-bands, and signal level characteristics of signal events that both belong, or are out of band by design, or the inherent laws of RF metrics, or those that are not characteristic within the inspected Range of Interest (ROI), has become a full time job.

In-short, we are seeing very powerful new RF based threat technology, with virtually no possibility of detection, or identification, utilizing traditional out-dated techniques, and oftentimes obsolete equipment resources and detection strategies.

Many professional technical operators agree that the threat technology has surpassed the the ability of threat detection methods currently being utilized, to identify these new persistent threats, but still they do little to address the mostly, obsolete concepts of deployment, from a Probability of Detection (POD), suitability of equipment resources, applied field techniques, or methodology perspective.

This session will address and define a modern moving target threat model, as well as a new TSCM due-diligence methodology, deployment strategy, and dispel the myth, that if you do nothing, something magical might just happen.

Change must be set in motion, and business models must change at every level, to meet the challenges of global economic-espionage, within the private sector, and national security apparatus.

 

Lecture Theatre

 

Tuesday

Day 1

1030 - 1045

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Tuesday

Day 1

Session 2A

1045 - 1200

 

Espionage by the Numbers | A Journey into the Motivations and Demographics

Paul D Turner, TSS TSI | BIO

Professional Development TSCM Group Inc.

This presentation will take a look at espionage in North America, based on US government statistical information compiled by David Major, President and CEO of the Centre for Counterintelligence and Security Studies.

This introduction and review will focus on factual graphically presented information obtained from the CI Centre ® and online SPYPEDIA ® resources.

 

Lecture Theatre


Tuesday

Day 1

Working Lunch

1200 - 1245

 

 

CTSC 2018 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2018 participants, exhibitors, presenters and guests in the lower lounge exhibit area.

Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

 

Lower Lounge

Tuesday

Day 1

Session 3A

1245 - 1400

 

Signals System Seven (SS7) Remote Interception / Disruption Countermeasures

John Minor | CTSC 2018Presenter | John B. Minor, SMA | BIO

Description | This presentation will explore the SS7 protocol history, interception exploitation and disruption capabilities.

Attendees will be introduced to counter surveillance tactics in 4G LTE and 5G NR mobile networks.

 

 

Lecture Theatre

 

Tuesday

Day 1

 1400 - 1415

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Tuesday

Day 1

Session 4A

1415 - 1530

 

Practical Considerations for the Detection of RF Signals of Interest in TSCM | Part I

Robert InkolRobert Inkol | BIO

Spectrum analysis techniques based on the Fast Fourier Transform (FFT) are widely used for the detection and characterization of radio frequency signals.

For some applications, such as TSCM, the signals of interest can differ widely in their characteristics and it is important to set the signal processing parameters to achieve an appropriate balance between key performance characteristics such as frequency resolution, time resolution and spectral search speed.

This presentation is designed to provide a practical understanding of the fundamental concepts involved in the use of spectrum analyzers and more specialized receivers for TSCM.

 

Lecture Theatre

 

Tuesday

Day 1

 1530 - 1545

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Tuesday

Day 1

Session 5A

1545 - 1645

 

Practical Considerations for the Detection of RF Signals of Interest in TSCM | Part II

Robert InkolPresenter | Robert Inkol | BIO

Description | Spectrum analysis techniques based on the Fast Fourier Transform (FFT) are widely used for the detection and characterization of radio frequency signals.

For some applications, such as TSCM, the signals of interest can differ widely in their characteristics and it is important to set the signal processing parameters to achieve an appropriate balance between key performance characteristics such as frequency resolution, time resolution and spectral search speed.

This presentation is designed to provide a practical understanding of the fundamental concepts involved in the use of spectrum analyzers and more specialized receivers for TSCM.

 

Lecture Theatre

Tuesday

Day 1

1700 - 2000

 

CTSC 2018 | Hospitality Night Sponsor

Kestrel TSCM | Paul D Turner, TSS TSI | CTSC 2018

Please join friends and business associates for a casual evening, and networking event following the first day of the conference. Enjoy our hospitality night with a selection of good food prepared by the NAV CENTRE staff.

A cash bar is available

 

Lower Lounge

 

Day 2 | Wednesday April 25, 2018

 

Time / Session

 

Event Description

Location

Wednesday

Day 2

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.

Reservations for CTSC 2018 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant

Wednesday

Day 2

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.

The CTSC 2018 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

Lecture Theatre

Wednesday

Day 2

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2018 registration booth to pick-up your conference identification and participant package.

 

Lecture Theatre

Wednesday

Day 2

Session 6A

0830 - 0945

 

Secure Office Design TM

Gary Dawson | CTSC 2018Gary Dawson MSc. PSP, CPP, PCIP | Senior Principal Consultant | BIO

Vigilans Security and Risk Management Inc.

The presentation will discuss the process of designing a Secure Office facility.

The brief will explore the factors that should be assessed during the design of an office facility and how the design should be integrated into a comprehensive security plan.

As with any security plan, the office design should be based on a thorough risk assessment.

The presentation will also discuss issues of policy and procedures and other considerations when planning a secure office facility.

 

Lecture Theatre

 

Wednesday

Day 2

 0945 - 1000

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Wednesday

Day 2

Session 7A

1000 - 1100

 

Batten Down The Hatches: Analysis, Evaluation and Overview of Access Control and Video System Vulnerabilities

John SheridanJohn Sheridan | BIO

Tiree Security

 

 

 

Scott HoganScott Hogan | BIO

House of Commons

 

 

 

The push toward IP-centric integrated security systems has fundamentally changed the security landscape.

In many cases, adoption of Internet Protocols (IP) has resulted in an open environment for the integration of multiple security and life safety devices, applications and systems.

New threats and vulnerabilities are being introduced in the security industry as systems migrate from traditional analog to IP network-enabled systems.

This is particularly prevalent in electronic access control and in video surveillance.

There are also a considerable number of threats that exist in those systems that are not IP-centric.

 

Lecture Theatre

 

Wednesday

Day 2

1100 - 1105

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge



Wednesday

Day 2

Session 8A

1105 - 1200

 

 

Political and Security Situation - TSCM Work in Mexico

Carl-Christian Steger | CTSC 2018M.C. Ing. Carl Christian Steger Schmidt, Director General | BIO

Techno Alarms S.A.de C.V.

 

Lecture Theatre

Wednesday

Day 2

Working
Lunch

1200 - 1245

 

CTSC 2018 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2018 participants, exhibitors, presenters and guests in the lower lounge exhibit area.

Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

 

Lower Lounge

Wednesday

Day 2

Session 9A

1245 - 1345

 

13th Annual | CTSC 2018 "Bug-Off" | Expert Level |

Andrzej WolczanskiAndrzej Wolczanski, TSS | BIO

Professional Development TSCM Group Inc.

Although this session is open to all CTSC participants, it is designed for more advanced participants that understand the equipment resources, methods and techniques.

Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunity and perhaps gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 12 years in the running.

Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.

The CTSC “Bug-off” is open to all conference participants for a chance to win prizes and personal recognition for elite standing.

Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.

The Office of Evil Intent, aka Paul D Turner, TSS TSI and Andrzej Wolczanski, TSS have spent the previous year plotting and planning challenging methods and real-world compromises for this year's event.

 

Sponsored by the Office of
Evil Intent (OEI)

C214

 

Wednesday

Day 2

1345 - 1400

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Wednesday

Day 2

Session 10A

1400 - 1500

 

13th Annual CTSC 2018 "Bug-Off" | Introductory Level |

Andrzej WolczanskiAndrzej Wolczanski, TSS | BIO

Professional Development TSCM Group Inc.

This session is open to all CTSC participants, but is designed for less experienced participants that perhaps do not understand the equipment resources, methods and techniques.

Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunity and perhaps gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 13 years in the running.

Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.

The CTSC “Bug-off” is open to all conference participants for a chance to win prizes and personal recognition for elite standing.

Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.

The Office of Evil Intent, aka Paul D Turner, TSS TSI and Andrzej Wolczanski, TSS have spent the previous year plotting and planning challenging methods and real-world compromises for this year's event.

 

Sponsored by the Office of
Evil Intent (OEI)

C214

 

Wednesday

Day 2

1500 - 1515

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge



Wednesday

Day 2

Session 11A

1515 - 1615

 

 

Acoustical Metrics and Speech Security

Gregory ClunisGregory E. Clunis, P.Eng. | BIO

Integral DX Engineering Ltd.

STC, NIC, ASTC, SPC: There are many different metrics which describe speech privacy and sound isolation performance between rooms.

It is often the case that our clients do not understand these acronyms, leaving them vulnerable at design, construction, commissioning, ongoing verification and use.

All have limitations that should be recognized and understood.

What do these descriptors signify? How do they apply, and how are they measured or derived? How do laboratory and field ratings compare and how are each identified? Can acoustic performance be modeled?

This presentation will present technical details in order to answer these questions. SPC or “Speech Privacy Class” is the newest acoustic descriptor in the list, and has perhaps the most relevance to the work of the TS specialist. Its limitations, however, must also be understood.

In addition to the presentation, a demonstration will be made as to how measurements are done to determine in-situ performance. Finally, we will demonstrate a relational database tool developed by Integral DX Engineering which allows us to quickly and precisely generate single-number acoustic ratings for our clients from the field measurement data.

 

C210

 

Wednesday

Day 2

1615 - 1630

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Wednesday

Day 2

Session 12A

1630 - 1730

 

The Emerging 5G Standard and NR Technology Impact on TSCM Inspection Protocols

John Minor | CTSC 2018John B. Minor, SMA | BIO

This presentation will address the developing 5th Generation standards of Mobile Network Technology with a focus on NR (New Radio).

Key features, including frequency allocation, spectrum flexibility, compatibility, steerable antenna elements, control channels and performance expectations will be discussed.

 

 

Lecture Theatre

Wednesday

Day 2

1730 - 2130

 

CTSC 2018 | Casual Dinner & Awards Night Sponsor

Kestrel TSCM | Paul D Turner, TSS TSI | CTSC 2018

Join us for a casual, relaxing, and always entertaining Dinner and Awards Night event. Dinner will be served at 1800 hours. Enjoy a catered dinner prepared by the chef and staff of the NAV CENTRE. The evening rounds out with our Keynote speaker and a networking opportunity, with like-minded industry leaders in TSCM and Cyber-Security disciplines.

A cash bar is available.

 

Noorduyn Banquet Room

Wednesday

Day 2

1900 - 2000

 

CTSC 2018 | Keynote Presentation | Challenges in Delivering a Coherent Technical Security Program

Paul D Turner, TSS TSI | BIO

Information is decidedly among the most precious of organizational assets at every level, however, there is often a failure to recognize or embrace the scope of the defensive effort needed to protect it.

Competitive and state-sponsored actors have powerful motivations to find and exploit a wide range of technical security vulnerabilities.

They also have the luxury of being able to choose from a wide range of possible attacks; these not only include technologically sophisticated threats such as cyber threats, data harvesting and electronic surveillance, but also traditional methods such as Human Intelligence (HUMIT).

It might seem that the menace posed by the current threat environment would certainly receive the most careful attention from organizational leaders. Yet, all too often, the actual situation is very different.

The threats, their potential significance, and the measures needed to defend against them, are often difficult to visualize. Conversely, it is tempting to assume that existing defensive measures are sufficient, overlooking that they are likely to represent piecemeal and un-coordinated efforts, with the potential for significant unrealized technical vulnerabilities.

In reality, a successful defensive strategy depends on the design and execution of a comprehensive and well thought out strategy that is supported from the highest levels of the organization.

This presentation describes the challenges posed by the modern threat environment and discusses how technical security strategies can be integrated into an organizations structure and culture to achieve this objective.

 

Noorduyn Banquet Room

 

Wednesday

Day 2

2000 - 2030

 

Industry Awards | Bug-Off Awards | Door Prizes

Noorduyn Banquet Room

Wednesday

Day 2

2030 - 2200

 

Networking Opportunity

Upon completion of the CTSC 2018 Dinner & Awards night festivities there will be an informal networking opportunity rounding our the evening.

This is an excellent opportunity for exhibitors, sponsors and participants and CTSC 2018 guests to socialize and network.

 

Noorduyn Banquet Room

 

Day 3 | Thursday April 26, 2015

 

Time / Session

 

Event Description

Location

Thursday

Day 3

0645 - 0800

 

Breakfast

Breakfast is available for registered guests at NAV CENTRE as part of your overnight guest package.

Reservations for CTSC 2018 accommodations, must be booked directly with the venue NAV CENTRE and is not part of the conference registration package.

 

Propeller
Restaurant

Thursday

Day 3

0700 - 0800

 

Exhibitor Setup

Exhibitors are required to arrive and setup exhibit booths displays between 0730 and 0800 hours.

The CTSC 2018 registration booth and the exhibit area will open to conference participants at 0800 hours sharp.

 

Lecture Theatre

Thursday

Day 3

0800 - 0830

 

Participant | Exhibitor | Presenter Registration

Please attend the CTSC 2018 registration booth to pick-up your conference identification and participant package.

 

Lecture Theatre

Thursday

Day 3

Session 13A

0830 - 0930

 

Crowd Sourced Surveillance Fundamentals for the TSCM Professional

John Minor | CTSC 2018John B. Minor, SMA | BIO

This presentation will focus on the global impact of crowd sourced data from social media, its use as a surveillance mechanism, and how the TSCM professional can assist clients with related risk mitigation.

 

 

 

 

Lecture Theatre

 

Thursday

Day 3

0930 - 0945

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Thursday

Day 3

Session 14A

0945 - 1045

 

TSCM within Computer Networks | Part I

Dale Jackaman | CTSC 2018 SpeakerDale Jackaman

Amuleta

Real world tools, techniques, hardware and applications for finding surveillance software or devices on computer networks.

 

 

 

Lecture Theatre

 

Thursday

Day 3

 1045 - 1100

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Thursday

Day 3

Session 15A

1100 - 1200

 

TSCM within Computer Networks | Part II

Dale Jackaman | CTSC 2018 SpeakerDale Jackaman

Amuleta

Real world tools, techniques, hardware and applications for finding surveillance software or devices on computer networks.

 

 

 

Lecture Theatre

Thursday

Day 3

Working
Lunch

1200 - 1245

 

CTSC 2018 | Working Lunch

Sponsored by JD LeaSure at COMSEC LLc.

COMSEC LLCA working lunch will be served for CTSC 2018 participants, exhibitors, presenters and guests in the lower lounge exhibit area.

Please take this opportunity to view the exhibits and network with other conference participants over a casual working lunch.

 

 

Lower Lounge

Thursday

Day 3

Session 16A

1245 - 1345

 

Kestrel TSCM ® Professional Software

Technical Workshop | Part I

Autonomous Measurement and Collection System (AMCS) TM

Paul D Turner, TSS TSI

Professional Development TSCM Group Inc.

AMCS TM is another example of powerful new industry disruptive defensive countermeasures deployment technology, emerging across the private and public sector security apparatus, providing network based TCP / IP surveillance of the ambient RF spectrum environment, across local, and wide area geographical regions.

In the private sector, AMCS
TM, can be deployed during protective operations, across vehicles, aircraft, hotels, restaurants, meeting and conference facilities, etc., and can monitored worldwide across a public or private network connection.

AMCS
TM provides the ability to engage multiple custom "reporters" via TCP / IP streaming, in combination with a local machine "file reporter", permitting both network based communication, and locally captured, reviewable spectra, for technical operator assisted deployment.

The optional AMCS
TM module is a low cost advanced capability, that is fully integrated deep within the Kestrel TSCM  ® Professional Software at the code level, and is referred to as OPT AMCS TM, and can be deployed across a dedicated, or existing operational network.

Commercial level encryption can be provided via the AMCS
TM module, or the end-user may utilize proprietary encryption within an existing network structure, making AMCS TM ideal for law-enforcement, government, and military applications, across ground-based, air, marine, and satellite operations.

AMCS
TM is part of the Kestrel-net TM umbrella of advanced standards based TSCM, and SIGINT based Software Defined Radio (SDR) applications.

Learn about the latest release of the AMCS TM Kestrel ® Data Interpreter (KDI) TM client application, and companion API as part of our SDK, now available.

 

Lecture Theatre

 

Thursday

Day 3

1345 - 1400

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Thursday

Day 3

Session 17A

1400 - 1515

 

Kestrel TSCM ® Professional Software

Technical Workshop | Part II

Understanding Time Differential Signal Analysis (TDSA) TM

Paul D Turner, TSS TSI

Professional Development TSCM Group Inc.

TDSA TM is just one aspect of the Kestrel Signal Analytics (KSA) TM process that can be applied, defined, and easily redefined during active runtime, and / or post analytical analysis.

The premise of a modern moving target threat model, as defined under the TSB 2000 (Technical) Standard
TM, requires that RF spectrum analysis and capture, extend beyond the limitations of traditional "snap-shot" style RF reviews, and limited capability spectrum analysis, and demands greater reliance on longer capture times as part of a managed Remote Spectrum Surveillance and Monitoring (RSSM) TM deployment process.

TDSA
TM is a powerful resource, that encompasses many other Kestrel TSCM ® Professional Software features and functionality, that are fully integrated across all other available features, including all relevant display parameters, to bring clarity to the ambient RF spectrum environment, and pinpoint potentially hostile Signals of Interest (SOI) lurking within the RF spectrum.

This presentation is an interactive session, so be sure to bring your Kestrel TSCM
® Professional Software | Signals Intelligence Support System (SISS) TM, and follow along, to gain a working knowledge of this new capability.

 

Lecture Theatre

 

Thursday

Day 3

1515 - 1530

 

 

CTSC 2018 | Refreshment Break Sponsor

PRICE LANGEVIN 

 

Lower Lounge

Thursday

Day 3

Session 18A

1530 - 1630

 

Kestrel TSCM ® Professional Software

Technical Workshop | Part III

Understanding Receiver Differential Signal Analysis (RDSA) TM

Paul D Turner, TSS TSI

Professional Development TSCM Group Inc.

RDSA TM is the latest innovation added as a standard included feature of the Kestrel TSCM  ® Professional Software, which is described as a radical departure over traditional deployment methods, taking advantage of independent multiple receivers (by location), with direct spectra overlay for real-time, peak, and averaging comparative analysis.

Any connected receiver acts in a totally independent, operator defined mode, with a unique collection location, allowing bands, sub-bands, and any operator defined Range of Interest (ROI) to essentially be dropped into the existing spectrum display view, of any other receiver, or band allocation.

Applications include full remote operation of receivers, such as internal and external collection locations, at the room level, or any other operator defined strategy, at the facility level, or across multiple buildings or floors within a multi-level structure, for a 3-dimentional overview and cross receiver comparative, utilizing peak, average, and our powerful real-time display modes.

RDSA
TM encompasses many other Kestrel TSCM  ® Professional Software features and functionality, that are fully integrated across all other available features, including all display parameters, to bring clarity to the ambient RF spectrum environment, and pinpoint potentially hostile Signals of Interest (SOI) lurking within the RF spectrum.

RDSA TM has also made possible, the development of geo-location based heat mapping, across Dual Receiver Operation (DRO) TM, and Multiple Receiver Operation (MRO) TM.

The ability to provide an operator defined colour profile for the heat mapping feature, combined with fully supported image mapping overlay of any floor plan, virtual reality photograph, facility riser plot, site plan, 3D rendering, or geographical map, significantly enhances operator efficiency.

This presentation is an interactive session, so be sure to bring your Kestrel TSCM 
® Professional Software | Signals Intelligence Support System (SISS) TM and follow along to gain a working knowledge of this capability.

 

Lecture Theatre

Thursday

Day 3

1630 - 1645

 

Closing Remarks

Paul D Turner, TSS TSI

Professional Development TSCM Group Inc.

 

Lecture Theatre

 

 

Extend Your Professional Credibility | Canadian Technical Security Conference (CTSC) TM

Canada Wide: 1-888-293-7384 | Toronto: (647) 293-7384 | Calgary: (403) 812-0737 | Ottawa: (613) 903-7577

Copyright © 2018 | All Rights Reserved

Last Revised: Wednesday April 18, 2018 20:24:45

| Webmaster | Copyright | Legal Notice | Privacy |