Event Schedule | Updated 2025-03-18

Day 1     Day 2     Day 3

Travel Day | Monday May 5, 2025

Date & TimeEvent DescriptionLocation
Monday
14:00-20:00

Exhibitor Setup Opportunity (Optional)

Registered CTSC 2025 exhibitors may setup assigned display exhibits between 14:00 – 20:00 hours. The exhibit hall will be locked down at 20:00 hours and no further admittance will be permitted until the following morning at 0800 hours for conference registration.

KC 303

Day 1 | Tuesday, May 6, 2025

Date & TimeEvent DescriptionLocation
Tuesday
08:00-08:30

Participant | Exhibitor | Presenter Registration

The CTSC 2025 registration table and conference hall will open to registered conference participants, exhibitors, and guests beginning at 08:00 hours.

KC 303
Tuesday
08:30-08:45

Opening Remarks

CTSC 2025 will officially open at 0830 hours with an conference focus address by Paul D Turner, TSS TSI President and CEO of Professional Development TSCM Group Inc. The theme for CTSC 2025 is “The Future of Technical Security: Adapting to a Changing Threat Landscape”.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

KC 303
Session 1ATuesday
08:45-10:00

Radio-Frequency (RF) Wireless Transmission of Power and TSCM Implications

The future; is here and the utilization of the electromagnetic spectrum for so-called radio-frequency air-refueling; mass wireless charging, and the emerging ability to perpetually power the millions of IOT devices surfacing daily, worldwide; support an emerging and dangerous trend in powering threat actor technology, is fast becoming a reality commercially and for a variety of military applications.

Paul will discuss the century old historical relevance of transmitting power; look forward at the technology from a modern perspective; and consider the future of transmitting power via radio-frequency energy as a new and emerging concern for the professional technical operator.

Kinetic energy harvesting and the transmission of power must be considered and explored by the professional technical operator, to include the implications of emerging super-capacitor’s, as a parallel energy storage technology.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

KC 303
Tuesday
10:00-10:15

Morning Break

Join us for a short refreshment break and a snack before the next speaker session.

Sponsored by:
Price Langevin Technical Security
KC 303
Session 2ATuesday
10:15-11:30

Weaponized Malware and Its Impact on Mobile Security: Understanding the Threats

This talk aims to raise awareness about the increasing threat of weaponized malware targeting mobile phones, especially for high-risk individuals discussing sensitive data. Mobile devices, despite encryption protocols, are highly vulnerable to malware attacks.

In this presentation, attendees will learn how malware infiltrates mobile devices and bypasses encryption protocols, compromising the security of even encrypted messaging apps like Signal Messenger. The session will cover prominent spyware vendors and the advanced technologies they use to target mobile devices, exposing vulnerabilities in even the most secure platforms. A pre-recorded demonstration will showcase how I was able to bypass end-to-end encryption (E2EE) and extract data from Signal Messenger conversations. Additionally, the talk will delve into the stages of a mobile malware attack, from initial infection to data exfiltration, highlighting common attack vectors and delivery methods.

Presented by:
Geoff Green

Geoff Green

Geoff is digital privacy and security advocate, with a dedicated focus on safeguarding the communications of leaders, executives, and high-risk clients. As a full-stack developer, systems architect, and encryption expert, Geoff has made a significant impact on the mobile security world. He is passionate about educating others, particularly on the often-misunderstood realm of weaponized malware that targets mobile phones. Through his work and advocacy, he seeks to empower individuals to protect their most personal information from the constant threat of surveillance and intrusion.

KC 303
Tuesday
11:30-12:30

Lunch

Join us for a working lunch in the Vistas Dining Room, the conference and next speaker resume at 1230 sharp.

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
Vistas Dining Room
Session 3ATuesday
12:30-16:30

Parallel Track | Competitive Bug-Off Event | Day-1 | Session-1

This is a two (2) session split day-1 (afternoon) and day-2 (morning) session, designed to challenge experienced and give less experienced participants an opportunity to see what TSCM is all about.

Our schedule is flexible enough to allow participants plenty of time for the exercise as well as providing opportunities to take in some simultaneous conference presentations.

Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly, learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.

Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunities and gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 20-years in the running.

Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.

The Office of Evil Intent, aka Andrzej Wolczanski, TSS, and Paul D Turner, TSS TSI, have spent the previous year, plotting and planning challenging methods and real-world compromises for this year’s event.

Don’t worry, we’re not going to make you go hungry, as the first session begins after lunch, and the day-2 session finishes before lunch.

Presented by:
Andrzej Wojczanski

Andrzej Wolczanski, TSS

Andrzej is part of the Professional Development TSCM Group Inc., management team and is a graduate of the Technical Security Specialist (TSS) Designate Certification program, providing advanced instructional support for the Kestrel TSCM ® Professional Software, travelling in a support role for our Technical Operator Certification, and various familiarization training programs under the banner of professional development, and certification programs at our Resident Training Centre (RTC) in Eastern Ontario and for clients worldwide.

Sponsored by:
Professional Development TSCM Group Inc.
KC 301
Session 4ATuesday
12:30-13:30

mmWave TSCM Spectrum Analysis

The mmWave band has been traditionally ignored within a TSCM role due to a lack of resources and the cost of radio and antenna hardware.

Our software and hardware support capability opened the door for advanced operator training and low-cost radio hardware entry into the mmWave band from a TSCM perspective. Our announcement in September 2024 introducing planned mmWave hardware support to 170 GHz was just the starting point in achieving full mmWave band support to 300 GHz.

The mmWave band allocation includes wavelengths between 10 mm and 1 mm with a frequency allocation between 30 GHz and 300 GHz.

Modern mmWave threat technology has quickly entered a state of relevance and concern within a technical security role over the past few years, leaving many technical operators without an adequate mmWave solution.

Our Technical Research and Standards Group (TRSG) introduced best practice deployment procedures for inclusion of mmWave detection into a modern TSCM scope of work in late 2023 during our monthly Virtual Classroom training.

This presentation introduces the importance of fully exploring mmWave propagation and the necessity of gaining insight into the unique mmWave characteristics that sophisticated state-sponsored threat actor technology advantage between 30 GHz and 300 GHz.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

KC 303
Session 5ATuesday
13:35-15:00

Detection of Low Probability of Intercept (LPI) Signals

In recent years technological advances have made possible the commercial availability of radio frequency devices whose signals can be difficult to detect with commonly used spectrum analysis techniques since usable signals can exist buried in the noise floor.

This presentation discusses developments such as ultra-wideband (UWB) and chirp spread spectrum (CSS) signals, their capabilities and potential application as TSCM threat devices. Practical approaches for the cost effective detection of UWB signals using available technology are discussed.

This presentation also describes signal processing approaches that could be implemented in a software defined radio system to detect CSS signals.

Presented by:
Robert Inkol

Robert Inkol, BSc, MASc

As a Defence Scientist with Defence Research and Development Canada (DRDC), Robert was responsible for the technical leadership and management of electronic warfare related research projects and programs. In recognition of his contributions to DRDC, he was awarded the Queen Elizabeth II Diamond Jubilee medal. After retiring as a Senior Scientist from DRDC, Mr. Inkol carried out technical investigations for MDA Corporation and became an Adjunct Professor at the Royal Military College.

KC 303
Tuesday
15:00-15:15

Afternoon Break

Join us for a short refreshment break and a snack before the next speaker session.

Sponsored by:
Comsec Global Counterespionage Specialists
KC 303
Session 6ATuesday
15:15-16:15

Next Step Ahead - The Global Photonic Surveillance Threat

Update on the Global Vulnerability of the Primary Communications Channels on Earth Consisting of Photonic Network Segments.

99% of Communications on Planet Earth Traverse Major Segments of Photonic Networks. A Briefing Regarding the Public Availability of  Technical Details on Global Fiber Optic Network Segments and How this Critical Infrastructure Information may be Weaponized by State Actors and Solo Attackers.

Presented by:
John B. Minor

John B. Minor, Subject Matter Expert in Federal and State Courts, DCOE, CSA, CSE, CCE

 

John B. Minor is an independent researcher, author, analyst and inventor with diverse interests in communications technology companies and public service, having served in corporate and government leadership roles. He is a senior lifetime member of IEEE Communications, Antennas and Propagation, Photonics and Intelligent Transportation Systems Societies, a member of the American Society for Testing and Materials (ASTM) E30 Forensics standards group, and a member of the Internet Engineering Task Force (IETF).

KC 303
Session 7ATuesday
16:20-17:30

Technology Awareness and Threat Identification

“The Future is not Friendly” despite what we are told; this presentation will discuss emerging technical security devices being marketed and deployed in the current threat environment and provide examples of methods of deployment. This presentation will look at the technology being made available commercially that more recently was only available to state actors.

John will discuss the technology being openly marketed, the methods observed being deployed, as well as other methods of collection impacted by changes in consumer and business technology, highlighting the concern for the professional technical operator.

The conclusion of the discussion will provide insight into methods to increase the effectiveness of the Technical Security Countermeasures Program as we adapt to the changing threat landscape.

Presented by:
John A. Price

John A. Price, CPP, CRM

John has been the President and managing partner of Price-Langevin and Associates Inc., a Technical Security firm with a national reach since 2001.  John is an accomplished Security Manager with 38 years experience and is a Certified Protection Professional CPP and a Certified Risk Manager CRM.   He specializes in the design and implementation of physical and technical security protective systems and programs, specifically designing plans for corporate operations, government officials and politicians.  He has worked in various positions in the security industry including Security Director, Alberta Solicitor General Protective Services Operations and as a Corporate Security Advisor. John is also a Certified Locksmith and former Chairman for the American Society for Industrial Security (ASIS) Alberta /Northern Alberta Chapter.

KC 303
Tuesday
17:30-17:35

Q & A Opportunity | Daily Reminders and Announcements

End of day-1 reminders and announcements.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

KC 303
Tuesday
18:00-21:00

CTSC 2025 | Hospitality Night

Join us in room KC 201 for our first night of the conference reception / hospitality night event, for some excellent food and beverage.

Hospitality night is and excellent opportunity for informal casual networking with friends and business associates. All registered conference participants and guests are welcome to attend hospitality night.

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
KC 201

Day 1     Day 2     Day 3

Day 2 | Wednesday, May 7, 2025

Date & TimeEvent DescriptionLocation
Wednesday
08:00-08:30

Participant | Exhibitor | Presenter Registration

The CTSC 2025 Registration Booth and Exhibit Area will open to conference participants beginning at 08:00 hours.

KC 303
Session 8AWednesday
08:30-10:00

TSCM Spectrum Allocation – More than Just Bands!

This presentation explores the electromagnetic spectrum well below the surface layer of standard band allocations. The electromagnetic spectrum has an infinite number of layers and complexities.

Most TSCM operators recognize and understand spectral surface layer and perhaps a sub-layer or two for some of the more common bands.

Paul will explore the spectrum allocation menu tree from band allocations, down to sub-bands, and beyond to channelized signal level allocations. Paul will review some of the many reference resources useful to TSCM operators who deploy locally and outside of their home spectrum.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

KC 303
Wednesday
10:00-10:15

Morning Break

Join us for a short refreshment break and a snack before the next speaker session.

Sponsored by:
Price Langevin Technical Security
KC 303
Session 9AWednesday
10:15-11:30

Developing for High-Performance Radio

Over the last 15 years we have witnessed a rapid evolution in Software controlled radio. This has enabled a new ecosystem of software solutions to problems traditionally tackled using expensive, monolithic ‘Spectrum Analyzer’ solutions. In this presentation, Don Goodeve – lead developer for Kestrel gives his perspective on key trends, challenges, and future directions both for developers and users of new and emerging capabilities.

Presented by:

Don Goodeve, DPhil, MEng

Dr. Don Goodeve holds a DPhil in Electronic Systems from the University of York, UK. As a Consultant he has developed a reputation for developing elegant, powerful software solutions where very high-performance and user simplicity are key; from bare-metal embedded systems to full desktop and server-based solutions. Also a Leadership Coach, Don balances his work on technical innovation with personal development. He lives, works, and plays in Campbell River, BC, Canada.

KC 303
Session 10AWednesday
08:30-11:30

CTSC 2025 "Bug-Off"

This is a two (2) session split day-1 (afternoon) and day-2 (morning) session, designed to challenge experienced and give less experienced participants an opportunity to see what TSCM is all about. Our schedule is flexible enough to allow participants plenty of time for the exercise as well as providing opportunities to take in some simultaneous conference presentations.

Our TSCM “Bug-off” provides a light-hearted competitive spirit and the opportunity to evaluate, and most importantly learn more about the professional level TSCM equipment resources supplied by various exhibitors and sponsoring participants.

Participating in our competitive “Bug-Off” is an excellent way to extend your networking opportunities and gain valuable in-sight from other like-minded professional TSCM practitioners while enjoying a mildly entertaining and practical component of the conference, now 20-years in the running.

Prizes, Awards, Peer Recognition, and Bragging Rights are just a few of the benefits for the participants of our TSCM competitive “Bug-off”.

The Office of Evil Intent, aka Andrzej Wolczanski, TSS, and Paul D Turner, TSS TSI, have spent the previous year, plotting and planning challenging methods and real-world compromises for this year’s event.

Don’t worry, we’re not going to make you go hungry, as the first session begins after lunch, and the day-2 session finishes before lunch.

Presented by:
Andrzej Wojczanski

Andrzej Wolczanski, TSS

Andrzej is part of the Professional Development TSCM Group Inc., management team and is a graduate of the Technical Security Specialist (TSS) Designate Certification program, providing advanced instructional support for the Kestrel TSCM ® Professional Software, travelling in a support role for our Technical Operator Certification, and various familiarization training programs under the banner of professional development, and certification programs at our Resident Training Centre (RTC) in Eastern Ontario and for clients worldwide.

Sponsored by:
Professional Development TSCM Group Inc.
KC 301
Wednesday
11:30-12:30

Lunch

Join us for a working lunch in the Vistas Dining Room, the conference and next speaker resume at 1230 sharp.

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
Vistas Dining Room
Session 11AWednesday
12:30-13:40

AI in TSCM: Real-World Applications and Implementation

The complexity of TSCM operations continues to grow, and AI is now an essential tool for identifying, analyzing, and countering modern surveillance threats. In this session, Dale will demonstrate how AI can enhance real-time investigative workflows, providing practical, hands-on applications rather than theoretical discussions. Dale’s AI assistant, Katie, will explore AI’s role in device identification, signal analysis, and spectrum intelligence, showcasing how AI-driven tools are already being used in real-world TSCM scenarios. This session will be entirely live and interactive—no slides, just real-world demonstrations of AI’s capabilities in technical surveillance countermeasures.

A major highlight will be AI’s ability to visually analyze objects and schematics in real-time, assisting with device identification and circuit analysis. Dale will also demonstrate how AI enhances traditional TSCM tools, such as Kestrel, supporting live signal analysis and anomaly detection, with future applications in real-time spectrum monitoring currently being explored. Additionally, Dale will walk through how he personally set up Katie as an AI augmentation partner, fine-tuning her capabilities to assist in TSCM operations, investigative processes, and technical assessments. From RF threat identification to counter-surveillance measures, this session will show why AI should be adopted as a true operational partner in modern TSCM work.

Presented by:

Dale Jackaman

Mr. Jackaman is a seasoned expert with a rich and varied professional background. As a licensed private investigator and security consultant, he excels in internal cybersecurity investigations, as well as civil and criminal probes, digital forensics, and technical surveillance countermeasures. His expertise is not limited to the detection of electronic eavesdropping devices but also includes the nuanced art of identifying and capturing espionage agents. He is adept at conducting covert operations, interviewing suspects and witnesses, and assuming high-level corporate responsibilities, notably serving as the Director of Information Systems at BC Research at UBC. Mr. Jackaman’s educational background in digital forensics is solid, with a specialization in the Computer Crime Option from the BCIT Forensic Sciences Program. He has been deeply involved in radio communications and electronics, holding an advanced amateur experimental radio license since 1973. His early career was marked by dedicated service in the Canadian Armed Forces Signals Corps from 1978 to 1983, completing three active tours of duty in the Middle East. Since 2005, Mr. Jackaman has led Amuleta Computer Security Inc., a firm specializing in high-tech criminal and civil investigations. His leadership underscores his dedication to leveraging cutting-edge technology, including artificial intelligence, to enhance security and investigative efforts.

KC 303
Session 12AWednesday
13:45-15:00

RF – “Is it Live or is it Memorex”

Ken will review Radio Frequency Identification (RFID) technology used in various areas of Technical Security (TS) such as building/room access cards and will include a short technical demonstration of RFID readers, such as the Flipper Zero, used to copy and clone RFID cards. Ken will also build on last years presentation on GPS Interference with a focus this year on GPS Spoofing including reports out of the Ukraine and the Middle East during the past year.  He will share his recent research using a low-cost Software Defined Radio (SDR) known as the HackRF One combined with a user interface known as the Portapack and include a demonstration of the HackRF One/Portapack in action.  Attendees are encouraged to bring along any personal RFID tags/access cards along with their IPhones (with NFC Tools App and GPS Diagnostic App), Android Phones (with GPS Test App) and/or GPS based devices such as a Garmin golf watch.

Presented by:

Kenneth Johnston, CD, BSc, MSc

Ken Johnston retired in 2014 from the Royal Canadian Air Force after 36 years of service. Following graduation from the US Air Force Institute of Technology in Dayton, Ohio in 1999, he was assigned to the Canadian Forces School of Aerospace Studies in Winnipeg, MB where he spent five years as a Space and GPS instructor.  In 2009 Ken was seconded to the US Joint Navigation Warfare Center (JNWC) at Kirtland Air Force Base in Albuquerque, New Mexico as a GPS analyst where he was involved in GPS jamming trials at several military test ranges in the US, Norway and Canada. Ken is a member of the Association of Old Crows (AOC), the Institute of Navigation (ION) and the Canadian Aeronautics and Space Institute (CASI).

KC 303
Wednesday
15:00-15:15

Afternoon Break

Join us for a short refreshment break and a snack before the next speaker session.

Sponsored by:
Comsec Global Counterespionage Specialists
KC 303
Session 13AWednesday
15:15-16:10

Corporate Security and TSCM: Part 1

Diana and Len will lead a discussion that introduces a comprehensive framework for organizational security governance, with a focus on a holistic approach to protecting personnel, physical assets, information technology, and critical infrastructure. The session will cover essential governance elements, risk assessment processes, and physical security measures, including access control and perimeter protection.

During this session, we will also present the Security Risk Assessment (SRA) methodology, exploring its key components and highlighting the value it brings to overall security strategy. This segment serves as a foundation for the subsequent presentation, where the concepts introduced will be further developed and completed.

Presented by:

Len Babin, CPP, ABSP

Mr. Babin is a Calgary-based, executive-level security leader with a successful career as a security consultant, Director of Security of a provincial electricity company and a Superintendent in the Royal Canadian Mounted Police (RCMP). He specializes in designing and fine-tuning corporate security frameworks, delivering elaborate threat and risk assessments, and domestic and international security training.  He has been the Director of Security of a provincial electric system operator where he designed and initiated a threat and risk assessment on the provincial power grid, led the delivery of a comprehensive corporate security framework and was one of the drafters of the Critical Infrastructure Protection standards for the North American Electric Reliability Council (NERC).  He was a police executive at the rank of Superintendent in the RCMP with over 30 years’ experience and a multi-faceted career of criminal operations, technology, training, and asset protection.  He is VIP trained and has led the delivery of security measures for Canadian Prime Ministers and other dignitaries.

Diana Elkin

Diana Elkin, CSMP

Diana Elkin is a dynamic security leader and entrepreneur with nearly 20 years experience in the information technology, security and intelligence space. She has tackled a broad range of cybersecurity and physical security challenges over the span of her career, leveraging the unique approach developed through her diverse background. Diana is the principal consultant and managing partner of Method Intelligence Ltd. She holds a Master’s degree in Intelligence Analysis and a Bachelor’s degree in Political Science. She is a Certified Security Management Professional and also supports the trade by assessing future candidates.

KC 303
Session 14AWednesday
16:15-17:15

Corporate Security and TSCM: Part 2

Diana will continue the discussion on the Security Risk Assessment (SRA), delving into each component and explaining its critical role in strengthening organizational security. Recognized as a fundamental element of any security strategy, the SRA’s significance will be explored in relation to Technical Surveillance Counter-Measures (TSCM).

Attendees will gain insights into developing information technology policies aligned with ISO 27000 standards, as well as strategies for protecting critical infrastructure. The session will also cover emergency planning, including evacuation procedures and disaster recovery protocols. Participants will walk away with practical guidance on building resilient security frameworks that not only foster safer workplaces but also ensure regulatory compliance. This content is highly relevant for security professionals, corporate leaders, and policymakers navigating today’s ever-evolving risk landscape.

The final segment of the session will highlight the interconnectedness between the SRA, the corporate security framework, and TSCM, providing a comprehensive view of their collective impact on organizational security.

Presented by:
Diana Elkin

Diana Elkin, CSMP

Diana Elkin is a dynamic security leader and entrepreneur with nearly 20 years experience in the information technology, security and intelligence space. She has tackled a broad range of cybersecurity and physical security challenges over the span of her career, leveraging the unique approach developed through her diverse background. Diana is the principal consultant and managing partner of Method Intelligence Ltd. She holds a Master’s degree in Intelligence Analysis and a Bachelor’s degree in Political Science. She is a Certified Security Management Professional and also supports the trade by assessing future candidates.

Len Babin, CPP, ABSP

Mr. Babin is a Calgary-based, executive-level security leader with a successful career as a security consultant, Director of Security of a provincial electricity company and a Superintendent in the Royal Canadian Mounted Police (RCMP). He specializes in designing and fine-tuning corporate security frameworks, delivering elaborate threat and risk assessments, and domestic and international security training.  He has been the Director of Security of a provincial electric system operator where he designed and initiated a threat and risk assessment on the provincial power grid, led the delivery of a comprehensive corporate security framework and was one of the drafters of the Critical Infrastructure Protection standards for the North American Electric Reliability Council (NERC).  He was a police executive at the rank of Superintendent in the RCMP with over 30 years’ experience and a multi-faceted career of criminal operations, technology, training, and asset protection.  He is VIP trained and has led the delivery of security measures for Canadian Prime Ministers and other dignitaries.

KC 303
Wednesday
17:15-17:30

Q & A Opportunity | Daily Reminders and Announcements

End of day-2 reminders and announcements.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

KC 303
Wednesday
17:45-21:00

CTSC 2025 | Casual Dinner & Awards Night

Join us for a casual, relaxing, and always entertaining Dinner and Awards Night event. The evening rounds out with our Keynote speaker and a networking opportunity with like-minded industry leaders in TSCM and Cyber-Security disciplines.

A causal sit-down dinner will be served promptly at 18:00 hours in KC 301.

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
KC 301
Session 15AWednesday
19:00-20:00

Keynote Speaker

To Be Announced

Get your copy of I Was Never There signed by the author himself

Presented by:

Andrew Kirsch

Andrew Kirsch served 10 years as an Intelligence Officer with the Canadian Security Intelligence Service (CSIS), where he rose up the ranks to leading technical and physical covert teams in special operations. After leaving CSIS, he was a founding member and first ever Department Security Officer (DSO) in the Ontario Office of the Provincial Security Advisor. Today, he works as a security consultant, helping organizations and individuals identify and mitigate their risk. Andrew has a public policy degree from Brown University, and worked as an investment advisor in London, England, before joining CSIS. He was born and raised in Toronto, Ontario, where he lives with his wife and two young children.

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
KC 301
Wednesday
20:00-21:00

Industry Awards | Bug-Off Awards | Antenna Design Awards | Door Prizes

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
KC 301

Day 3 | Thursday, May 8, 2025

Date & TimeEvent DescriptionLocation
Thursday
08:00-08:30

Participant | Exhibitor | Presenter Registration

The CTSC 2025 Registration Booth and Exhibit Area will open to conference participants beginning at 08:00 hours.

KC 303
Session 16AThursday
08:30-10:00

SPACE ~ The Final Frontier … ?

Will the arrival of Low Earth Orbit (LEO) Satellite Constellations providing GAP coverage for Mobile Network Subscribers become the Arch-Nemesis of the Technical Security Threat Landscape?

A Briefing on Current Developments Regarding Beams, Nodes, DoA, and LEO Technology Arrival as a Primary Challenge for Technical Security Countermeasures

Presented by:
John B. Minor

John B. Minor, Subject Matter Expert in Federal and State Courts, DCOE, CSA, CSE, CCE

 

John B. Minor is an independent researcher, author, analyst and inventor with diverse interests in communications technology companies and public service, having served in corporate and government leadership roles. He is a senior lifetime member of IEEE Communications, Antennas and Propagation, Photonics and Intelligent Transportation Systems Societies, a member of the American Society for Testing and Materials (ASTM) E30 Forensics standards group, and a member of the Internet Engineering Task Force (IETF).

KC 303
Thursday
10:00-10:15

Morning Break

Join us for a short refreshment break and a snack before the next speaker session.

Sponsored by:
Price Langevin Technical Security
KC 303
Session 17AThursday
10:15-11:30

TSCM Situational Awareness in an Environment of Pervasive Electronic Devices

The proliferation of electronic devices has greatly complicated the task of TSCM practitioners. In particular, there is the task of sorting through the increasing number of sophisticated consumer and Internet of Things (IoT) devices that a typical home or office environment will have. A “smart office” may use interconnected devices to perform a host of functions including climate and lighting management, security and access control systems, and inventory management. The TSCM practitioner must be able to identify such devices, assess possible security vulnerabilities and distinguish them from actual threat devices. This presentation provides an overview of recent developments in IoT devices and provide guidance how they can be positively identified and assessed

Presented by:
Robert Inkol

Robert Inkol, BSc, MASc

As a Defence Scientist with Defence Research and Development Canada (DRDC), Robert was responsible for the technical leadership and management of electronic warfare related research projects and programs. In recognition of his contributions to DRDC, he was awarded the Queen Elizabeth II Diamond Jubilee medal. After retiring as a Senior Scientist from DRDC, Mr. Inkol carried out technical investigations for MDA Corporation and became an Adjunct Professor at the Royal Military College.

KC 303
Thursday
11:30-12:30

Lunch

Join us for a working lunch in the Vistas Dining Room, the conference and next speaker resume at 1230 sharp.

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
Vistas Dining Room
Session 18AThursday
12:30-13:55

TBA

KC 303
Session 19AThursday
14:00-15:00

Technical Security Branch (TSB) Technical Workshop | Part I

Our CTSC 2025 technical workshop will tackle advanced elements of emerging hardware technology, delivered by our certified Technical Security Instructors (TSI) from Canada and the United Kingdom; introducing the new Kestrel Lightning RTSA-SDR USB and Network-based radios; including the powerful Kestrel-Net TM, RF Node, Universal Spectral Translator (UST) TM, and Operational DTAP Tactical Backpack TM jointly designed, and manufactured by a global group of companies in Canada, the United Kingdom, and France.

This session, will discuss and demonstrate the Kestrel-Net TM, Kestrel ® Lightning RTSA-SDR USB and Network-based radios, and our Universal Spectral Translator (UST) TM dual radio TSCM spectrum analysis technology for our Tap Capture Plot (TCP) and Dynamic Trace Autonomous Platform (DTAP) field applications.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

Rebecca Kairouz

Rebecca Kairouz, CTO, TSI

Rebecca is the CEO of Vilution Ltd, a business management consultancy firm that supports SMEs in the UK and worldwide to develop, network and pioneer in their niche market.

Rebecca has a demonstrated history of working in the defence and security industry. Skilled in Negotiation, Tendering, Project Management, strong Business Development professional, Field Installation, and Security Training.

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
KC 303
Thursday
15:00-15:15

Afternoon Break

Join us for a short refreshment break and a snack before the next speaker session.

Sponsored by:
Comsec Global Counterespionage Specialists
KC 303
Session 20AThursday
15:15-16:45

Technical Security Branch (TSB) Technical Workshop | Part II

Our CTSC 2025 technical workshop will tackle advanced elements of emerging hardware technology, delivered by our certified Technical Security Instructors (TSI) from Canada and the United Kingdom; introducing the new Kestrel Lightning RTSA-SDR USB and Network-based radios; including the powerful Kestrel-Net TM, Blackbox RF Node, Universal Spectral Translator (UST) TM, and Operational DTAP Tactical Backpack TM jointly designed, and manufactured by a global group of companies in Canada, the United Kingdom, and France.

This session, will discuss and demonstrate the Kestrel-Net TM, Blackbox RF Node, and our Operational DTAP Tactical Backpack TM technology for professional Remote Spectrum Surveillance and Monitoring (RSSM) applications.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

Rebecca Kairouz

Rebecca Kairouz, CTO, TSI

Rebecca is the CEO of Vilution Ltd, a business management consultancy firm that supports SMEs in the UK and worldwide to develop, network and pioneer in their niche market.

Rebecca has a demonstrated history of working in the defence and security industry. Skilled in Negotiation, Tendering, Project Management, strong Business Development professional, Field Installation, and Security Training.

Sponsored by:
Professional Development TSCM Group Inc.
Vilution Limited (UK)
KC 303
Thursday
16:45-17:00

Q & A Opportunity | Closing Remarks

End of day-3 | Thank you for attending CTSC 2025.

Presented by:
Paul D. Turner

Paul D Turner, TSS, TSI

Paul is the President | CEO of Professional Development TSCM Group Inc., and is a TSB certified Technical Security Specialist (TSS) and Technical Security Instructor (TSI) with 45 years of direct experience providing TSEC, TSCM, ECM, COMSEC and CI professional services. Paul has a quarter century of practical experience working as a professional investigator, and six (6) years as group leader, providing high risk VIP protection and technical intelligence support, for high profile entities and clients.

KC 303