27th Annual h A

December 22, 2017 | Author: Anonymous | Category: N/A
Share Embed


Short Description

issues an MS and MPA from Syracuse University/Maxwell School of Citizenship & Public Affairs and a J. ......

Description

cacconference.org

27th hA Annual nnu

AUGUST 10-13, 2015

SHERATON HOTEL DALLAS, TX

PRESENTED BY: D  allas Children’s Advocacy Center and Dallas Police Department

Lynn M. Davis President & CEO Dallas Children’s Advocacy Center

27th Annual

Welcome to Dallas! Thank you for joining us for the 27th Annual Crimes Against Children Conference, and thank you for choosing this Conference for your professional training experience. We hope you enjoy your week in Dallas and take advantage of this year’s outstanding learning and networking opportunities. Here are a few of the highlights:

SM

PRESENTERS

• We are excited about our Opening Plenary speakers. Emily Vacher from Facebook, our Platinum Sponsor, will give us a look at the State of the Industry. Director Sarah Saldaña of ICE will serve as our Partner Keynote speaker. Brie W., a young survivor, will discuss the challenges she has faced and the efforts she has made against sexual exploitation and trafficking in her Survivor Keynote. We are delighted to welcome our new Gold Sponsor, Offender Watch, and all attendees joining us from the field of sex offender monitoring and management. Lou Luzynski, co-founder and managing partner of Watch Systems, will present an award to a law enforcement professional during the Opening Plenary.

Dallas Children’s Advocacy Center

2

Dallas Police Department

3

CONTENTS Program Overview

4

Opening Plenary

5

Tips for Attendees

6

Conference Improvements

7

Discover Dallas

8

Dining Options

9

• This year’s exhibitors will offer a wide range of informational resources for all child abuse professionals. Some exhibitors are also providing product demonstrations on Tuesday and Wednesday in the City View rooms. Attendees who participate in a product demonstration will be entered into two drawings for an iPad or a Google Nexus tablet. The drawings will be held during the Rustic Rodeo on Wednesday evening at 7:45 p.m. You must be present to win.

Maps

10

Sponsors & Partners

12

Continuing Education Information

15

Monday

16

Tuesday

26

Wednesday

38



Thursday

48

Computer Lab Schedule

52

Computer Labs

53

Speaker Biographies

62

Exhibitor Information

77

Exhibitors

78

We will again take you behind the scenes of many complex investigations, such as the suicide of Amanda Todd, a teenager who was cyberbullied and exploited which led to the arrest of a Dutch man using many aliases to blackmail Todd. We will also take you behind the scenes of the investigation and prosecution of Ariel Castro, a man who held three women captive and tortured them for more than a decade. Look for the asterisk (*) that designates the case studies offered this week.



We are again providing hands-on computer lab training and are now including more labs for non-law enforcement attendees. If you did not register prior to arriving, visit the 3rd floor of the conference center to check for open spots. These spots fill quickly.



We are proud to again host the Technology Coalition, where Facebook, Google, Yahoo!, Microsoft, and others will gather to share information about fighting child sexual exploitation online.

• Don’t forget to sign up at the Help Desk for a tour of the Dallas Children’s Advocacy Center’s state of the art facility! Tours will be held on Tuesday and Wednesday from 10:30am-1:30pm. Lunch is included. •

We strive to be responsive to the needs of our attendees. We actively listen to feedback and make adjustments each year. Check out page 7 to see what’s new for 2015!

GET SOCIAL! USE #CACC2015 TO STAY CONNECTED WITH US. During the Conference, look for your posts on the TagBoard!

Thank you for all that you do in our collective effort to protect and serve children around the world. Have an excellent conference experience! @CACConference

WiFi password: cacc2015

Lynn M. Davis President & CEO Dallas Children’s Advocacy Center

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

1

The Crimes Against Children Conference is presented by

DALLAS CHILDREN’S ADVOCACY CENTER

MISSION

CORE VALUES

is to improve the lives of abused children in Dallas County and

We operate as a seamless team.

to provide national leadership on child abuse issues.

Each of us acts with a servant’s heart.

The mission of the Dallas Children’s Advocacy Center (DCAC)

The children come first in all that we do.

OUR IMPACT IN 2014 13,211

2,694

SERVED BY FAMILY ASSISTANCE PROGRAM

4,000+ CHILDREN

and their non-offending family members were served.

50,104

PEOPLE EDUCATED ABOUT CHILD ABUSE

THERAPY CLIENT CONTACT HOURS

2,126

TOTAL FORENSIC INTERVIEWS

744

IN-DEPTH CASE DISCUSSIONS

We moved into our 56,000 sq. ft. building in 2013. We hope you will tour our Center while attending the Crimes Against Children Conference! Visit the Help Desk to sign up for a tour on Sunday or Monday. Tours are offered Tuesday and Wednesday. Pre-registration is required and lunch is included.

2

August 10 -13, 2015

|

D a l l a s , Te x a s |

cacconference.org

The Crimes Against Children Conference is presented by

DALLAS POLICE DEPARTMENT

“The collaboration in the setting of the CAC is seamless.” - DALLAS CHIEF OF POLICE THE DALLAS POLICE DEPARTMENT is one of the original partner agencies supporting the work of the Dallas Children’s Advocacy Center (DCAC). Since DCAC was established in 1991, the Department’s Child Abuse Squad has been housed at DCAC, helping ensure a cooperative working relationship among detectives, DCAC staff, medical experts, and Child Protective Services (CPS). The Child Abuse Squad investigates familial physical and sexual abuse cases and cases of fatal child abuse and neglect. The Squad also investigates incidents of suspected abuse and neglect referred to police by CPS.

this task force involvement, in November 2004, the High Risk Victims and Trafficking Team (HRVT) was formed within the Child Exploitation Squad to more effectively deal with child victims of sex trafficking.

The Child Exploitation Squad investigates offenses of non-familial child sexual abuse and exploitation, juvenile prostitution, non-Internet child pornography, and child abductions. The Squad utilizes DCAC facilities on a routine basis for conducting forensic interviews. The Sex Offender Compliance Squad’s central responsibility is enforcement of Texas sex offender registration laws. This squad includes two teams: Registration and the Sex Offender Apprehension Program (SOAP). The Internet Crimes Against Children (ICAC) Task Force is responsible for investigating cases of technologyfacilitated child pornography and cases of child sexual exploitation or abuse that result from contact over the Internet or other electronic means. In 2003, the Dallas Police Department became part of the FBI National Innocence Lost Task Force to combat domestic trafficking of children. As a result of

August 10-13, 2015

|

The units of the Dallas Police Department described above enjoy close working relationships with the Dallas office of the FBI. A Crimes Against Children Task Force was formed in 1995, combining the resources and expertise of both agencies. This Task Force works cooperatively on all sexual exploitation cases which may involve federal violations such as computer child pornography, juvenile prostitution, and child abductions. The Dallas detectives assigned to this Task Force have been deputized as both U.S. Marshals and Special Investigators of the Texas Attorney General’s Office to assist them in filing criminal charges in exploitation cases.

D a l l a s , Te x a s |

cacconference.org

3

PROGRAM OVERVIEW Welcome to the 27th Annual Crimes Against Children Conference. We are glad you have joined us and hope that you enjoy your week in Dallas at our internationally recognized conference! Monday morning begins with an opening session that includes the conference keynote presentations. It will also provide you with updated conference information. During the conference, there will be 26 workshops and 10 interactive computer labs operating concurrently. Selected workshops are repeated. The schedule is broken down by date and time in this program. Any updates to this schedule will be communicated via information screens located throughout the conference center. If you cannot find something you are looking for, please do not hesitate to go to the HELP DESK or ask one of our Conference staff or volunteers in aqua blue t-shirts. We appreciate the hard work you do, and hope you have a great conference experience!

C O NF ER ENC E S C HEDU LE Please see page 52 for the Computer Lab schedule.

SUNDAY

2:00 - 9:00 PM BEAT THE CROWD Conference Check-in is on the 2nd floor of the Sheraton Conference Center.

MONDAY

TUESDAY

WEDNESDAY

THURSDAY

7:00 - 8:30 AM Light Continental Breakfast Registration/Check-in

7:00 - 8:30 AM Light Continental Breakfast

7:00 - 8:30 AM Light Continental Breakfast

7:00 - 8:30 AM Light Continental Breakfast

8:30 - 9:45 AM Opening Plenary

8:30 - 9:45 AM Workshops

8:30 - 9:45 AM Workshops

8:30 - 9:45 AM Workshops

10:15 - 11:30 AM Workshops

10:15 - 11:30 AM Workshops

10:15 - 11:30 AM Workshops

10:15 - 11:30 AM Workshops

12:00 PM - 1:15 PM Workshops

12:00 PM - 1:15 PM Workshops

12:00 PM - 1:15 PM Workshops

11:30 AM Conference Concludes

1:45 - 3:00 PM Workshops

1:45 - 3:00 PM Workshops

1:45 - 3:00 PM Workshops

3:30 - 4:45 PM Workshops

3:30 - 4:45 PM Workshops

3:30 - 4:45 PM Workshops

4:45 - 6:30 PM Meet and Greet in the Exhibit Hall

6:00 PM Dallas Police Association Hospitality Event

7:00 PM Conference Networking Event

Dinner on your own

Dinner served until 8:30

Optional off-site Networking Event

4

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

OPENING PLENARY Monday, August 10th, 8:30-9:45 AM Lonestar Ballroom

State of the Industry Remarks EMILY VACHER, FACEBOOK Emily Vacher joined Facebook in 2011 and is currently Trust & Safety Manager with Facebook’s Security team. Emily is responsible for law enforcement outreach, global safety initiatives, safety education, and security policy matters. She is currently focusing on Facebook’s AMBER Alert program and child safety issues. Emily works extensively with the National Center for Missing & Exploited Children (NCMEC) and serves as a member of NCMEC’s Team ADAM/ Project Alert and NCMEC’s law enforcement/industry liaison committee. Before she joined Facebook, Emily was a Special Agent with the FBI for more than a decade, leading a broad range of federal investigations. Emily holds an MS and MPA from Syracuse University/Maxwell School of Citizenship & Public Affairs and a J.D. from Syracuse University College of Law.

Partner Keynote DIRECTOR SARAH SALDAÑA, ICE As ICE’s Director, Sarah Saldaña leads the largest investigative agency within the U.S. Department of Homeland Security. In this role, Director Saldaña advances ICE’s mission to promote homeland security and public safety through the criminal and civil enforcement of approximately 400 federal laws governing border control, customs, trade and immigration. Previously, Director Saldaña served as the United States Attorney for the Northern District of Texas. She graduated Summa Cum Laude from Texas A&I University and earned her J.D. degree from Southern Methodist University. Director Saldaña also holds the distinction of being the first Latina appointed by President Barack Obama and confirmed by the U.S. Senate as ICE’s Director.

Presentation of Award to Law Enforcement Professional

LOU LUZYNSKI, WATCH SYSTEMS

Lou Luzynski is the co-founder and managing partner of Watch Systems. In this role, Lou directs all financial aspects of the business including accounting practices, budgeting, financial planning, interface with the financial community, financial analysis, acquisitions and ventures, and monitoring of financial performance. Prior to Watch Systems, Lou was President and Chief Executive Officer of Fuelman. Lou earned a B.A. in Accounting with Cum Laude honors from St. Louis University and is a Certified Public Accountant.

Survivor Address BRIE W.

Our survivor keynote is Brie W., whose full identity is being kept confidential. Brie was victimized in a widely traded child pornography series, “The BluePillow.” Originally reported by the Danish National Police, NCMEC linked the photo series to California through a trash can in the background of a photo. A nearly month long investigation, based on details in the photos and videos in the series, led to her rescue and to the arrest and conviction of her abuser/child pornographer. Brie has since emerged as an advocate of efforts against child sexual exploitation and trafficking.

The Plenary will now be live-streamed downstairs in the Dallas ballroom A u g u s t for 1 10 those - 1 43 , 2who 0 1 45 wish | Dto a l be l a sseated , T e x a sclassroom | c a c c o nstyle. ference.org

55

TIPS FOR A SUCCESSFUL CONFERENCE Wel c o m e t o D a l las! We ’re so g lad you ’re h e re !

WORKSHOP POLICY

HANDOUTS

Please do not record or take any photos in workshops. This is against our policy, and you will be asked to leave the workshop and delete any recorded content. If the issue persists beyond the first offense, you may be asked to leave the conference.

All handouts are available on Dropbox. The access link and password were emailed to each attendee before the conference. If you did not receive this email, please visit the Help Desk for information on accessing handouts.

INFORMATION FOR NURSING MOTHERS

REMEMBER YOUR NAME BADGE You will not be permitted access into any sessions without your name badge. If you misplace your name badge, please check with the Help Desk to see if it has been turned in. You will need to provide a valid picture ID and $5 to replace it.

ARRIVE TO CLASS EARLY If you have your eye on a specific class and want to ensure a seat, arrive early. Have back up workshops in mind in case your first choices are full. Check the schedule for possible repeats of the most popular classes.

WEAR LAYERS

Privacy for nursing mothers can be found in City View 4. Please visit the Help Desk if you need assistance locating this room.

SAFETY FIRST If you are ever uncomfortable or feel unsafe during the conference, please visit the Help Desk and we will address your concerns.

NETWORKING The camaraderie and networking opportunities at our conference are unparalleled. Visit the exhibitors to learn about professional resources available to you. See page 77 for a map of exhibitor booths.

LEARN YOUR WAY AROUND

Don’t forget to attend: • Meet and Greet in the Exhibit Hall Monday Evening • Dallas Police Association Hospitality Event Tuesday Evening • Rustic Rodeo Wednesday Evening

Take a few minutes to review the maps in your final program (pages 10 and 11) and learn some of the important places throughout the Sheraton Hotel and Conference Center as well as the Marriott Dallas City Center and the Plaza of the Americas.

If there is anything we can do to assist you in having a great time in Dallas and a wonderful conference experience, please don’t hesitate to stop by the Help Desk or let one of our staff or volunteers know.

Dallas in August...what can we say? It is HOT outside, but COLD inside. Be prepared with layered clothes as the classrooms are chilly.

Here are a few tips for you: • Find the Skybridge! This connects the Sheraton Conference Center to the Marriott Dallas City Center and the Plaza of the Americas, where you’ll find fantastic lunch options. • The Skybridge will be open Sunday 12:00-8:00pm and until 8:00pm every evening. Outside of these times, guests staying at the Marriott will need to cross at the street level. •

Have a great conference! Conference Team

Follow the signs. We have done our best to provide directional signs that will help you as you locate classrooms, and other events throughout the week.

KNOW YOUR TRANSPORTATION OPTIONS See page 8 to learn more about your transportation and dining options in Dallas.

6

August 10 -13, 2015

|

?

D a l l a s , Te x a s |

IF YOU HAVE A QUESTION during the week, locate one of our volunteers in the ? t-shirts, or visit our Question Booth located on the 2nd floor of the Sheraton Hotel across from the escalators.

cacconference.org

CONFERENCE IMPROVEMENTS We take feedback very seriously from our conference attendees and work every year to improve from the prior year. Here are some of the things we heard from you in 2014 that we are excited to offer you this year:

YOU ASKED FOR

“More classes and a later start in the morning.” Sessions now start at 8:30 AM. Some popular classes are now scheduled over the traditional lunch hour.

YOU ASKED FOR

“Computer labs for non-law enforcement professionals.” See the labs that state “Open to all conference attendees” in the description. Special registration is required for all labs.

Note that the lab schedule is different from the regular workshop/case study schedule, so plan your days carefully. The computer lab schedule is on page 52.

YOU ASKED FOR

“Better transportation from offsite hotels with conference blocks.”

We have continuous bus service from the Fairmont, Adolphus, Magnolia (downtown), and Aloft starting Monday at 7:00 AM daily. Stay at The Highland or Magnolia Park Cities to enjoy the shopping, restaurants and movie theatre at Mockingbird Station, and grab the DART light rail train to come to the conference (just two quick stops away at the Pearl Street Station).

YOU ASKED FOR

“Free Wi-Fi in the conference center.” Done! Access Password: cacc2015

YOU ASKED FOR

“A place to put your coffee and continental breakfast in the Opening Plenary.”

The seating in the main Lone Star Ballroom will continue to be set theatre style, but if you go to the Dallas ballrooms on the exhibit hall level (ground floor of conference center), the room will be set classroom style. We’re live streaming the Plenary session to this room so you can spread out and enjoy your coffee and continental breakfast!

YOU ASKED FOR

“Networking opportunities to meet your professional colleagues.” We have added several professional forums for you! The forums provide not only great educational experiences, but chances to meet colleagues and make some new friends.

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

7

DISCOVER DALLAS

VISIT ONE OF OUR UNIQUE DALLAS NEIGHBORHOODS FOR LUNCH OR DINNER! BISHOP ARTS DISTRICT: Eno’s Pizza Tavern, Gloria’s, Hattie’s THE CEDARS & SOUTH SIDE: The Cedar’s Social, Mi Casa Restaurant Bar & Grill DALLAS ARTS DISTRICT: Lark on the Park, MesoMaya, Stampede 66 DEEP ELLUM: AllGood Café, BuzzBrews, Cane Rosso, Fuzzy’s Taco Shop, Twisted Root Burger Co. MAIN STREET DISTRICT: Capriotti’s Sandwich Shop, Freshii Salads, Dakota’s MOCKINGBIRD STATION: Cafe Express, Knife at the Highland, The People’s Last Stand, Reikyu Sushi & Bar, Urban Taco UPTOWN: Del Frisco’s Grille, Dickey’s BBQ Pit, Ocean Prime, Sambuca, Smashburger, Truluck’s VICTORY PARK: Neo Pizza, Victory Tavern WEST END HISTORIC DISTRICT: Dickey’s BBQ, Gator’s, Spaghetti Warehouse, Y.O. Steakhouse VISIT KLYDE WARREN PARK - A 5-acre urban park within walking distance of the Sheraton. The park is lined with gourmet food trucks from noon-3pm daily, and offers health and fitness programs, reading carts, and game carts full of fun activities like board games and ping-pong.

3 GREAT WAYS TO GET AROUND DALLAS DART LIGHT RAIL SYSTEM operates both a city rail and bus service offering convenient transport throughout Dallas, with the closest DART stop across the street from the hotel at the Pearl/Arts District Station at Bryan St. and Pearl St. A Daily DART Pass is $5. DART operates 24-hours a day. Please visit dart.org or call 214-979-1111 for trip planning assistance. D-LINK BUSES These free buses run every 15 minutes, 11am-11:30pm, Monday-Saturday. D-Link is a convenient way to explore the city and experience Dallas. The closest D-link stop is located at the Pearl/Arts District Station at Bryan St. and Pearl St. Please visit dart.org/dlink for more information. M-LINE TROLLEY The historic and free M-line Trolley travels up and down McKinney Avenue and through the north end of downtown. The closest trolley stop to the Sheraton is located at Federal St. & Olive St. a quick walk 5-minute walk or less from the Sheraton. Please visit mata.org for more information.

8

August 10 -13, 2015

|

D a l l a s , Te x a s |

cacconference.org

IF YOU CAN’T STAND THE HEAT... Dining Options within the Hotel/Conference Center

SHERATON HOTEL DINING OPTIONS Light Continental Breakfast

The Kitchen Table

Draft Sports Bar

Provided by the Conference every morning from 7:00-8:30 AM. A small number of gluten-free options will be provided; please arrive early to enjoy!

Open daily for breakfast, lunch, and dinner 6:30 AM - 10:00 PM

Open daily for lunch and dinner 11:00 AM - 1:00 AM

Peet’s Coffee & Tea

Offered on 1st floor of Conference Center

Open daily at 6:00 AM

Cash Lunch - Grab & Go

PLAZA OF THE AMERICAS DINING OPTIONS Follow the directional signage from the second floor of the Sheraton Hotel across the skybridge to the Plaza of the Americas.

650 North Blimpie’s Subs & Salads Broadway Pizza Chez Max China Dragon Corner Bakery Higher Grounds

J. Pepe’s Tex Mex KFC Express Kobe Kitchen McDonald’s NewHaus Philly Connection Plaza Donuts

Samurai Sam’s Smoothie King Taco Bell Treebirds Yumi Yogurt Ziggy’s BBQ

ENJOY OUR SOUTHERN HOSPITALITY!

Dinner is provided Tuesday and Wednesday evenings at the following social events: TUESDAY:

WEDNESDAY:

DPA Hospitality Evening 6:00 PM Transportation provided See pg. 37 for details

Rustic Rodeo 7:00 PM (Supper Served at 8:30) Lone Star Ballroom You must wear your name badge to this event. No exceptions.

Those attending only one or two days of the Conference, or those who have an Exhibitor Badge, should purchase tickets to the Rustic Rodeo at the Cashier’s Desk. $30/person No tickets available for purchase after 8pm on Wednesday.

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

9

SHERATON HOTEL & CONFERENCE CENTER

1ST FLOOR

Conference Center

Cash Lunch and Seating DCAC Exhibit Booth Dallas Ballrooms Exhibitors Refreshment Breaks

Question Booth

2ND FLOOR

Sheraton Hotel NCMEC CVIP Lab

Austin Ballrooms Live Oak Room NCMEC CVIP Lab Press Club Question Booth Seminar Skybridge access to: Marriott Dallas City Center Plaza of the Americas Seminar Special Registration

2ND FLOOR

Conference Center

Continuing Education Sign In Exhibitors Help Desk Lone Star Ballrooms Premium Exhibitors Refreshment Breaks Registration Booths

10

August 10 -13, 2015

Continuing Education Sign In

Registration Booths and Help Desk |

D a l l a s , Te x a s |

cacconference.org

SHERATON HOTEL & CONFERENCE CENTER Majestic 1

Majestic 2

Majestic 3

Majestic 4

Majestic 5

Majestic 8

Majestic 7

Majestic 6

ELEVATORS

Majestic 11

Majestic 10

Majestic 9

37TH FLOOR Sheraton Hotel

3RD FLOOR Conference Center

Computer Lab Help Desk Houston Ballrooms San Antonio Ballrooms State Rooms

Technology Coalition (closed meeting) Virtual Global Task Force (closed meeting)

4TH FLOOR

Sheraton Hotel

City View Rooms Exhibitor Workshops Fitness Center, Spa, and Pool Remington

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

11

2015 SPONSORS & PARTNERS THE ANNUAL CRIMES AGAINST CHILDREN CONFERENCE IS PRESENTED BY

A SPECIAL THANKS TO THIS YEAR’S

CONFERENCE TRAINING PARTNERS, SPONSORS, AND SUPPORTERS PLATINUM SPONSOR

GOLD SPONSOR

DCAC LEAGU E A Women’s Auxiliary Grou p

We are proud to honor the men and women who defend our nation’s children.

Platinum sponsor of the 27th Annual Crimes Against Children Conference

The leader in sex offender management and community notification

Live Demos at Booth #20

Kick-start your Sex Offender Registry FREE Consultation with Sr. Law Enforcement Consultants

9AM -4PM Pearl 5 Monday, Tuesday and Wednesday Our senior professional staff are available to discuss your specific needs in a private session. Sex offender registry officers, prosecutors, AG staff, probation and parole officers walk away with ideas on how to streamline and energize their sex offender registry and community notification program. Participants can also arrange free training and demonstrations for their staff.

Hands-on Demonstration of Your Agency’s Processes Automated with OffenderWatch

9AM - 4PM Pearl 5 Monday, Tuesday and Wednesday After discussing your current statutes and processes, we will demonstrate how OffenderWatch can improve your agency’s efficiency in registering offenders, conducting verifications, performing sweeps, responding to abductions, managing homeless offenders, and locating absconders.

Workshops for Law Enforcement Comprehensive Offender Management: Exceeding the Letter and the Spirit of the Law

8:30 - 9:45AM Lone Star A4 Tuesday and Wednesday Sex offender registry officers, prosecutors, probation and parole staff will learn how to leverage OffenderWatch® to establish best practices for sex offender management. We will discuss current policies for data collection, supervision, and public notification and demonstration techniques for improving your agency’s efficiency in registering offenders, conducting verifications, performing sweeps, and managing homeless offenders.

Conducting Effective Sex Offender Investigations: Policies, Protocols and Procedures

10:15-11:30AM Lone Star A4 Tuesday and Wednesday We will present case studies to illustrate the importance of collecting more data than the minimum statutory requirement and how that prepares your agency for successful investigations. You will see a demonstration of the advanced search and mapping capabilities of OffenderWatch® that can be used by a Child Abduction Response Team (CART) in identifying potential suspects by geography or MO and in a national search for an absconded sex offender. This session is great for criminal investigators, offender registry officers, prosecutors, probation and parole staff.

Utilizing OffenderWatch® to find Absconded Offenders

1:45 - 3:00 PM Lone Star A4 Tuesday and Wednesday You will learn to use the advanced search and mapping capabilities of OffenderWatch® in a national search for an absconded sex offender and how use the built-in US Marshal Alert feature to engage the US Marshal’s Sex Offender Task force. US Marshals will present case studies that illustrate how they offer free assistance to law enforcement in locating absconded offenders and conducting compliance operations and sweeps.

To arrange a live demonstration for your agency after the conference, please email [email protected] © Copyright 2015 by Watch Systems, LLC. All Rights Reserved. OffenderWatch® is a registered trademark of Watch Systems. Visit www.watchsystems.com

CONTINUING EDUCATION The Crimes Against Children Conference is an approved provider of Continuing Education credit on behalf of the organizations listed below. Please read the information regarding your respective field carefully to assure you receive credit. Please visit the Continuing Education booth in the registration area to sign in EVERY DAY. If you do not sign in every day, we cannot confirm that you attended the conference, and credit may not be granted. The Association for Addiction Professionals (NAADAC) Anyone seeking NAADAC credit must sign in every day. Credential number required. National Association of Social Workers (NASW) Anyone seeking NASW credit must sign in every day. National Board for Certified Counselors (NBCC) DCAC has been approved by NBCC as an Approved Continuing Education Provider, ACEP No. 6602. Programs that do not qualify for NBCC credit are clearly identified. DCAC is solely responsible for all aspects of the program. Anyone seeking NBCC credit must sign in every day. Visit the Continuing Education desk for a list of approved courses of study. State Bar of Texas (MCLE) Anyone seeking MCLE credit must sign in every day. Bar number required. Those seeking ethics credit may visit the Continuing Education desk for a list of approved ethics courses.

Texas Center for the Judiciary Anyone seeking CJE or Family Violence credit may visit the Continuing Education desk or the Special Registration area for CJE/Ethics and Family Violence forms and lists of approved courses of study. Texas State Board of Examiners of Marriage and Family Therapists (LMFT) Anyone seeking LMFT credit must sign in every day. License number required. Texas State Board of Examiners of Professional Counselors (LPC) Anyone seeking LPC credit must sign in every day. License number required. Texas State Board of Social Work Examiners (LMSW) Anyone seeking LMSW credit must sign in every day. License number required.

Texas Commission on Law Enforcement (TCOLE)* TCOLE credit will be awarded to Texas Peace Officers through the Dallas Police Department. Anyone seeking TCOLE credit must sign in every day. TCOLE issued personal identification number (PID) required. If you do not know your PID number, contact TCOLE at 512-936-7700. *Out of state peace officers should submit their conference certificate to their respective agencies for consideration of credit in their jurisdiction. You are not required to sign in daily.

CERTIFICATE OF COMPLETION

You will receive an e-mail from us immediately post-conference with a link to a survey. Once you complete the survey, you will receive a second email containing the link leading to your certificate. You may print your certificate from that page. No certificates will be handed out on-site.

HOW TO RECEIVE CREDIT

Your certificate will include the provider numbers for this Conference. All attendees (except Texas Peace Officers seeking TCOLE hours) are responsible for turning in their hours to their respective fields.

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

15

CASE STUDIES & WORKSHOPS M ONDAY

Each session is listed by time block.

MONDAY, 10:15-11:30 AM AUGUST 10

Schedule at a glance:

7:00-8:30 AM

Light Continental Breakfast Registration/Check-In Lone Star Foyer

8:30-9:45 AM Opening Plenary

Lone Star Ballroom Live Streamed in Dallas Ballroom for Overflow

Child Advocacy Centers and Sex Trafficking of Children: What are CACs Doing? What Should CACs Be Doing?

Chris Newlin In early 2015, the National Children’s Advocacy Center conducted a survey of the ~850 Children’s Advocacy Centers (CACs) in the U.S. to learn more about the presence of cases involving Domestic Minor Sex Trafficking and/or Commercial Sexual Exploitation of Children, and procedures being utilized to respond to these cases. The data collected in the survey will be presented in this workshop. There will be an open discussion of current practices, what is working, what is not working, and what training and resources are needed in the field to support CACs challenged by this growing issue. SEMINAR

9:45-10:15 AM Break

Refreshments Provided

10:00 AM-5:00 PM

NCMEC CVIP Lab Open

Live Oak Room

11:30AM-NOON Break

No Refreshments Provided

1:15-1:45 PM Break

No Refreshments Provided

3:00-3:30 PM Break

Refreshments Provided

Case Studies are marked with an asterisk ( * ) DON’T MISS OUT ON THE

MEET AND GREET First floor Exhibit Hall Monday 4:45-6:30 PM 16

Child Pornography and its Relationship to Child Exploitation Michael Sullivan This lecture will look at the relationship between child pornography and child sexual exploitation. It will explore the need to investigate cases that may appear to be “only” image cases but in reality may lead to multiple hands on offenses and multiple victims. DALLAS A3

ChildFirst® EX: An Expanded Forensic Interview Protocol Rita Farrell, Amy Russell Based on the nationally-recognized ChildFirst® Forensic Interview Protocol, this session provides an overview of a defensible process for conducting interviews with children who may not succeed in a standard, single interview due to trauma, developmental, special needs or other complicating issues, including polyvictimization. This workshop will discuss the expanded interview process and research supporting multiple, non-duplicative interviews with child victims and witnesses. DALLAS D2

Clinical Approaches to Working with Child Sex Trafficking Victims Stacey Brittain, Danielle Madera This presentation will provide a comprehensive understanding of the dynamics surrounding child sex trafficking as well as the clinical approaches necessary to engage these children and their families in therapeutic services. The psychological impact of this complex trauma influences all areas of functioning and creates unique challenges.

August 10-13, 2015

|

D a l l a s , Te x a s |

The presenters will be sharing specific treatment plans and lessons learned through the provision of group and individual therapy services at The Harris County Children’s Assessment Center. Additionally, a comprehensive review of the case study that prompted the creation of Project LIBERTY (Lifestyle Intervention Based on Engagement and Rehabilitation for Trafficked Youth) will be discussed. Repeats Tuesday from 10:15-11:30am. DALLAS A2

Computer Forensics for Prosecutors Justin Fitzsimmons Digital evidence is pervasive in today’s criminal trials, making it imperative that prosecutors understand the intricacies of computer forensics in order to try and win cases. This presentation covers the fundamentals of computer forensics and discusses the many forensic artifacts that are useful to prove a variety of criminal charges. DALLAS D1

Conducting Practical Research at a Children’s Advocacy Center Jeff Wherry Evidence-based treatment and evidence-based assessments are “all the rage.” However, “research” is a word that intimidates many committed clinicians and administrators. Yet, children’s advocacy centers (CAC) have much to offer and much to gain from participating in research. The Dallas Children’s Advocacy Center has launched a Research Institute with wide support. Nonetheless, there are challenges for any agency in implementing collaborative research projects which have the potential to benefit clients and families immediately while supporting program evaluation needs and advancing our understanding of the models, theories, and practices used in CACs. In this workshop, the process of establishing research protocols, securing team buy-in, and ways for CACs to collaborate will be discussed. CITY VIEW 6

Dropbox and Law Enforcement Sean Li, Chengos Lim This presentation is geared towards law enforcement officials seeking information from Dropbox in connection with child exploitation investigations. The presenters will cover Dropbox’s Government Data Requests Principles, sending legal process to Dropbox, Dropbox’s notice and retention policy, what to do in the event of exigent requests, and the user information that is available in response to government data requests. AUSTIN 1

cacconference.org

(The) FBI’s New Child Abduction Response Plan

DALLAS D3

(The) Future Is Not Near, It’s Here Jim Cole, Johann Hofmann This workshop will discuss how technology can help our visual capabilities to separate pertinent from non-pertinent material in investigations, to find those crucial clues that are usually like looking for a needle in a haystack. Attendees will learn how the latest development of NetClean Analyze DI can actively help investigators find connections between images and build visual maps, instead of getting bogged down by millions of digital files. The result is superior investigations in terms of speed, reduced manual workload, possibilities for cross-agency cooperation and, ultimately, more rescued victims and perpetrators behind bars. We also promise a sneak preview of some really exciting new features coming soon. AUSTIN 3

GoDaddy.com: Helping Law Enforcement Leverage Technology More Effectively Ben Butler One of the most common points of confusion for investigators of online child abuse cases is figuring out who has what information, and how to best go about getting it. This workshop will discuss emerging technologies and attempt to clarify the confusion. We will discuss the information available to law enforcement through Registrars and Hosting Providers. We will also discuss recent trends and tactics in investigating commercial child pornography sites, and the role Go Daddy takes to help you in your investigations. AUSTIN 2

Google Combating Child Exploitation Dona Bellow, Cathy McGoff This workshop will provide an overview of Google’s efforts to combat child exploitation including content reporting, product safety, legal process, and data disclosure policies. DALLAS A1

Roger Canaff Understanding the technology that is used to gain access to children and teens as well as the technology used by children and teens themselves is critical to protection, investigation, prosecution, and even treatment. Each day new social media applications (apps) are created, but most of them use similar technology. Whether they are used to gain access to children, to lure teens, for cyberbullying, or witness intimidation, all child abuse professionals are responsible for staying current in the technology so we can best perform our duties. REMINGTON

*Kidnapping and Exploitation in an Amish Community Frederick Bragg, Gus Burns, Alix Skelton This case study discusses the investigation into the abduction of two Amish sisters from a roadside produce stand in upstate New York by a local couple intending to keep them hidden in their residence indefinitely. The presenters will discuss the investigative steps taken while searching for the victims, identifying the subjects once the victims were released, as well as the subsequent searches leading to the identification of an additional four children who had been drugged and sexually abused by the couple, and the recovery of child pornography depicting all six children. The presenters will also address the challenges faced during the investigation including the remoteness of the area, cultural issues with Amish victims, and computer encryption. Finally, the presenters will discuss the subjects’ claim of being in a master/slave relationship and the impact on the prosecution strategy. Repeats Thursday from 8:30-9:45am. DALLAS C

Law Enforcement Response to Sexting Issues and Investigations Richard Wistocki This workshop will examine the recent trends among teens involving “Sexting.” This activity has lifelong consequences for its participants. Law enforcement often struggles on how to deal with minors who are manufacturing their own child pornography and distributing it. This presentation will examine diversion programs to deal with this issue. This discussion will examine the Why? How? When? Where? and What? As a group we will form a safety plan for law enforcement to deal effectively with teens who are committing these crimes and give parents the tools to successfully monitor their children. The goal in this class is to educate law enforcement on how to effectively protect and

August 10-13, 2015

|

D a l l a s , Te x a s |

educate minors who find themselves involved in these crimes. Repeats Thursday from 10:15-11:30am. LONE STAR C2

*Randy & Me: A Prosecutor’s Story of His Childhood Sexual Abuse Kevin Mulcahy This presentation will recount Kevin’s own story of sexual exploitation at the hands of his soccer coach, Randy. It will not be merely a retelling of the past. Instead, the presentation will address lessons learned from his case by combining Kevin’s experience both as a victim and a long-time prosecutor of child exploitation cases. Knowing what he knows now, Kevin believes there are lessons to be learned from his story for the investigator (Kevin’s was great), the prosecutor (Kevin’s was terrible), and the forensic interviewer (Kevin did not have one). Beyond these useful lessons, the presentation will provide plenty of time for questions from attendees. Given the nature of our work, we don’t often get to ask questions of our child victims. This presentation will provide that opportunity. Repeats Tuesday from 12:00-1:15pm and Thursday from 8:30-9:45am.

M ONDAY

William Donaldson, Mark Hilts This presentation will discuss the FBI’s new Child Abduction Response Plan and how this investigative guide can assist law enforcement agencies faced with a missing/abducted child case. Presenters will highlight aspects of the plan and investigative techniques and show, through the use of lecture and case examples, the benefits of using the Child Abduction Response Plan. Repeats Monday from 1:45-3:00pm.

Hi-Tech Grooming, Hi-Tech World

DALLAS B

Tribal Issues Related to Missing and Exploited Children Ed Suk, Geri Wisner This workshop will focus on the unique challenges faced by law enforcement, social services, and multi-disciplinary team professionals in working with missing and sexually exploited children and families in Indian country. The presenters will outline historical issues of abuse and exploitation, and explore a variety of cultural considerations that together enhance and complicate the investigation and prosecution of child abuse crimes in tribal communities. Participants will be provided with resource materials to guide and assist allied professionals working in and with Indian country. CITY VIEW 7

10:15-11:30 AM CONT’D ON NEXT PAGE. MONDAY FEDERAL AGENCIES INSERVICE MEETINGS ICE – LONE STAR A2 - 10:15 AM FBI – DALLAS BALLROOM C  -  3:30 PM USMS – AUSTIN 2 - 5:00 PM

cacconference.org

17

10:15-11:30 AM CONT’D M ONDAY

Using Social Media to Promote Your Agency Jana Parker Do you know how to effectively use social media? This session will cover some of the basic strategies and best practices to get the most from your social media activity. Attendees will receive hands-on experience with digital forms of engagement and will learn how to use a wide range of social media tools. This workshop will discuss the various social media outlets, specifically Facebook, Twitter, and Instagram, social sharing of content, videos, and images, and how they interact together. In this digital age, social media has become a part of our everyday lives; this workshop will reveal top trends in the social media world and erase any confusion regarding posting relevant content and creating stimulating conversations in your field. Repeats Monday from 1:45-3:00pm.

LONE STAR A1

After the First 48: From Indictment to Trial

CITY VIEW 8

Marci McClellan Curry, Sherre Thomas In this presentation attendees will gain a better understanding of what it takes to prepare a sexual abuse case beginning with indictment and ending in trial with a verdict of guilty. The presenters will also explore common problems and challenges encountered in child sex abuse prosecutions as well as discuss strategies for overcoming them. Repeats Wednesday from 1:45-3:00pm.

What We See is Only the Tip of the Iceberg: The Here and Now of Online Abusive Images

*Benjamin Cuadrado: The Evil Next Door

DALLAS A3

Sharon Cooper This presentation will explore the increasing realization of the victim impact of online abusive images (previously referred to as child pornography). Previously, it was thought that victims could be rescued and have adequate mental health support, it is now clear that the exponentially increasing number of images have left the overwhelming majority of victims with a dark secret that no one knows and haunts children for the foreseeable future. Images are used today in multiple types of cybercrimes and the silencing nature of this form of abuse clearly has resulted in a rational paranoia for children and their families. Investigations and prosecutions need to be aware of the additional unspoken aspects of this form of abuse when working in “simple sexual abuse” all the way to sex trafficking. LONE STAR B

12:00-1:15 PM Acquaintance Molestation and YouthServing Organizations Ken Lanning Acquaintance molesters often pursue careers or volunteer opportunities with organizations that give them access to children. Youth-serving organizations must recognize the diversity of sexual activity, the phenomena of “nice guy” offenders and compliant child victims, and the grooming/seduction process. The four most 18

important protection practices for organizations are screening, management and supervision, response to suspicions, allegations, and complaints, and prevention and awareness programs. This workshop will recommend general approaches to these protection practices and explain why many organizations resist implementing available preventive measures. Repeats Tuesday from 8:30-9:45am.

Terri Botterbusch, James Kilpatrick, Jennifer Peresie The Cuadrado investigation has been described as one of the most disturbing child exploitation cases in history. A victim based approach to investigating child exploitation material progressed to a John Doe warrant for an individual, later identified as Benjamin Cuadrado, who was a contact offender who sexually assaulted and produced child abuse material of infants and toddlers. Cuadrado utilized e-mail and Kik Messenger to trade, distribute, and store sexually explicit material depicting minors. Utilizing a major case strategy, hundreds of individuals were identified, targeted, and eventually prosecuted for trading with Cuadrado, some of whom were also hands-on offenders and producers. This case study will discuss the victim based approach to child exploitation investigations, the use of John Doe warrants, the utilization of Kik Messenger, and the major case strategy in investigating newly produced child exploitation material. Repeats Wednesday from 1:45-3:00pm. LONE STAR A4

*(The) BluePillow Child Pornography Investigation Kevin Papineau, Brie W., Nicole W. In this presentation, the lead investigator, the survivor, and her mother will discuss the successful search for a young girl seen in a widely traded child pornography series, “The BluePillow.” Originally reported by the Danish

August 10-13, 2015

|

D a l l a s , Te x a s |

National Police, NCMEC linked the photo series to Elk Grove, California through a trash can in the background of a photo. A nearly month-long investigation, based on details in the photos and videos in the series, led to the rescue of the victim and the arrest and conviction of her abuser/child pornographer. The survivor has since emerged as an advocate of efforts against child sexual exploitation and trafficking and her mother is now a member of NCMEC’s Team Hope. The presentation will cover the methods, both successful and not, used in the search for the victim, the technical assistance provided by NCMEC, the post-rescue investigation and prosecution and the victim impact/advocacy issues involved. Repeats Wednesday from 8:30-9:45am. DALLAS C

Combating Sexual Exploitation One Stop at a Time Michael Bourke, Derek Prestridge How can you more effectively identify victims of child exploitation and trafficking during a seven-minute traffic stop? Are there indicators you might be missing? The presenters from the Texas Rangers and the U.S. Marshals Service will discuss an innovative program designed to combat all types of child victimization during roadside encounters. They will share techniques that can be coupled with routine police practices to significantly increase the likelihood of identifying victimized children and their offenders. The workshop will include examples of cases where officers used these interdiction techniques to rescue children. Repeats Tuesday from 3:30-4:45pm. AUSTIN 1

Corroborating Child Sexual Assault Disclosures Mary Langer, Nancy Oglesby Child sexual assault cases should never be prosecuted with only, “he said, she said,” evidence. It is imperative that a child’s statement of abuse be corroborated in as many areas as possible. This workshop will discuss the multiple pieces of evidence that can be obtained during a sexual assault investigation. Attendees will learn how to make a “corroboration checklist,” and to dissect the child’s statement for areas to gather evidence. This presentation will enable investigators, prosecutors, and associated child abuse professionals to surround a child’s statement with layers of credible, corroborating evidence, and witness testimony to present the strongest possible case at trial. Repeats Wednesday from 8:30-9:45am. DALLAS A1

cacconference.org

CPS Forum

DALLAS D3

Deception Detection Jim Tanner This session will cover the basics of Discourse Analysis, a lexical and syntactical approach to analyzing statements. Using clear examples, Dr. Tanner will explain how a respondent’s shifts in words and grammar can point interviewers to “hot spots” in a statement that need to be probed. You will never listen to a conversation or interview the same way again if you attend this session. Repeats Tuesday from 10:15-11:30am. LONE STAR A2

Forensic Interviewer Forum Jesse Gonzalez, Carrie Paschall This forum is open to all forensic interviewers attending the conference and will provide an excellent opportunity to meet your colleagues in the field and share experiences. In addition to networking, there will be a group discussion centered on some focus topics facilitated by the presenters. The focus topics will include current trends in best practice standards for interviewing children, interviewing children where there are multiple forms of abuse being investigated, using evidence in the interview room, and interviewing children in unusual circumstances. DALLAS D2

*Jacky Scott Garrett: Two Children Too Many Crystal Levonius, Daniel Lewis Church members encouraged a struggling mother to give two of her children, a twin boy and girl, up for adoption. Jacky Scott Garrett and his wife seemed like they could provide a better home for Logan and his sister. However, shortly after the adoption, Logan died and Jacky Garrett explained he may have knocked Logan out. The medical examiner ruled Logan’s death a homicide by blunt force trauma. Previously, others noticed the twins had multiple injuries including black eyes, genital and buttocks bruising, and head wounds. There was always an excuse for the injuries so no one called Child Protective Services. The presenters will address

DALLAS B

Law Enforcement Forum Robert Farley, Brian Killacky Meet your fellow law enforcement officers from around the country and participate in a forum to discuss the topic of Critical Issues in Conducting Multi-Disciplinary Team (MDT) Child Abuse Investigations. Among the items to be discussed are: the proper role of the MDT, Investigative problems and jurisdictional issues encountered, and how MDTs operate where there is no children’s advocacy center. This high-energy group led discussion will provide you with an opportunity to both learn from others and share your experiences with them. LONE STAR C4

LONE STAR B

*No More Happy Endings: The Demise of MyRedbook Marty Parker, Jason Skrdlant This case study will explore the ever-growing trend of Internet prostitution sites, and take the audience through the 4-year investigation into MyRedbook.com, one of the biggest and most well-known “escort” sites on the West Coast. MyRedbook.com contained hundreds of D a l l a s , Te x a s |

Opening Statements and Closing Arguments in Child Abuse Cases Victor Vieth This workshop will discuss the art of developing effective themes and theories to present to jurors in cases of child abuse. Particular emphasis will be placed on cases in which the outcome largely relies on the assessment of the child’s credibility versus the credibility of the accused.

Prosecutor Forum

Lawrence Meyer, Ashley Reynolds This presentation will detail the investigation into one of the largest sextortion cases in the United States and the successful prosecution of Lucas Michael Chansler. The presentation will describe the techniques Chansler used to conceal his online location and identity and then detail the investigation by analysts at NCMEC and the Jacksonville Field Office of the FBI, which led to Chansler’s identity, arrest and subsequent prosecution. The presentation will then outline the search to identify, locate, and interview his nearly 350 victims, a search which still continues. To date, more than 100 of his victims have been located across the U.S., Canada, and the UK. One of these victims is Ashley Reynolds, whose mother first reported the extortion of her daughter to NCMEC in 2009, and initiated the investigation. Ashley has since become a victim advocate and will describe her experiences as a victim of sextortion. Repeats Wednesday from 10:15-11:30am.

|

LONE STAR A3

AUSTIN 2

*Lucas Michael Chansler: A Case Study in Online Sextortion

August 10-13, 2015

thousands of ads for prostitution, and a robust online community dedicated to the “hobby” of procuring prostitutes. Hundreds of juveniles were known to have been posted on this site, often with extremely graphic and pornographic images, and investigators regularly expressed their frustration with the lack of any type of cooperation from the site. The presenters will discuss investigative methods used, hurdles to the investigation, and prosecution strategies. The audience will also hear about the day the plug was pulled on MyRedbook.com, and the final outcome of the case. Repeats Wednesday from 3:30-4:45pm.

M ONDAY

Kathryn Sibley Horton Is an ethical dilemma keeping you up at night? Does working with abused and neglected kids affect your own parenting? Has a high-profile case or a child fatality caused you to think about seeking employment at a big-box store? It’s a hard job and we all know it! Let’s talk about the problems and celebrate the solutions. Join fellow CPS workers from around the country in a lively session about these and other topics you may choose to discuss.  

issues related to trying a case where the victim has a previous medical condition in the same location as the trauma. They will also address the difficulties that arise when the lead detective is subject to an internal investigation because of a history of multiple affairs with witnesses and victims of crime. Repeats Tuesday from 10:15-11:30am.

Eren Price, Carmen White Bring your questions and prepare to meet your fellow prosecutors from around the country in an informative question and answer session. This class is a group-facilitated discussion designed to provide you with opinions, options and potential solutions to your most problematic issues. Learning from others in the field and utilizing the experience of fellow prosecutors can often bring about a new perspective.   DALLAS D1

Sex Trafficking of Juveniles: A Guide for Investigators Terri Patterson, Daniel Steele This workshop is designed to provide practical guidance to professionals who are responsible for the identification, investigation, and prosecution of juvenile sex trafficking cases. The presenters will discuss recommended steps in the investigation and behavioral dynamics that may impact the successful resolution of the case. Discussion, lecture, and the illustrated use of case examples will be incorporated to deliver information. Each workshop participant will receive a copy of Sex Trafficking of Juveniles: An Investigative Guide, written by a working group comprised of local, state, and federal law enforcement officers. AUSTIN 3

12:00-1:15 PM CONT’D ON NEXT PAGE.

cacconference.org

19

12:00-1:15 PM CONT’D Therapy and Family Advocacy Forum

M ONDAY

Kristen Howell, Jeffrey Wherry Ever feel like you are alone in the effort to eliminate abuse and violence? Or are you worried that your passion is being quelled by administrative demands and heavy volume? You aren’t in this alone! Meet your fellow therapists and family advocates from around the country and bring your questions to an informative question and answer session. A group-facilitated discussion will help you consider programmatic ideas, innovations and challenges; identify and discuss evidence-based treatments; and share best practices, concerns, and trends with your fellow colleagues. DALLAS A2

1:45-3:00 PM Advanced Cold Case and Long Term Missing Children Cases Brian Killacky This workshop is designed for law enforcement officers who investigate long term missing, unidentified remains and unresolved child homicides. This instruction is applicable to closed, suspended, or forgotten cases. Attendees will learn investigative strategies and forensic application regarding the potential resolution of cases that are closed, suspended, or forgotten. Repeats Tuesday from 12:00-1:15pm. LONE STAR C2

*Are Collectors of Child Pornography the Child Molesters of the Future? (Part 1 of 2) Joe Sullivan Some argue that targeting, investigating, and prosecuting collectors of child pornography is an important mission, as these individuals desire sexual contact with children. By viewing sexual images of children they are reinforcing their beliefs and breaking down the barriers to contact abuse. This case study will argue that there is an even more important reason why we should be concerned about those who seek out, view, and collect child pornography. Using video of a clinical interview of a child pornography collector the presenter will explore whether such offenders pose a risk of direct harm to children. Repeats Wednesday from 8:30-9:45am. DALLAS B

Authenticating Digital Evidence Justin Fitzsimmons This presentation covers the various types of 20

evidence that investigators can gather from cyberspace and cellular phone providers. The audience is shown case law examples for authenticating emails, chats, and other technological evidence. The presentation also gives examples of what types of witnesses are needed to lay the proper foundation for the admission of digital evidence.

abuse. The evidence in this case involves disturbing images and a diary of the fantasies of this predator. Repeats Wednesday from 12:00-1:15pm. DALLAS C

Effective Engagement with Male Survivors of Sexual Abuse (Part 1 of 2)

Julie Stauffer There are often factors that may influence a child’s willingness and ability to tell of their experiences in a forensic interview. Such blocks or barriers may be the result of circumstances prior to the interview, or may be those which arise during the interview itself. This session is designed to enable forensic interviewers, law enforcement investigators, child protection workers, and prosecuting attorneys to effectively respond to the needs of children by recognizing blocks for children during the forensic interview and employing necessary block removal techniques. Repeats Wednesday from 8:30-9:45am.

Christopher Anderson Although boys and men are victims of sexual violence in staggering numbers, male survivors often slip through the cracks. The latest National Intimate Partner and Sexual Violence Survey reports that 1 in 4 males will experience some form of sexual victimization in their lifetimes. Male victims are often overlooked because of social and cultural pressures that keep them silent. On average, it takes a male survivor 20 years to disclose, and disclosures are rarely to law enforcement. This creates major obstacles for successful capture and prosecution of offenders. This presentation gives an overview of the unique challenges and harmful myths that discourage boys and men from coming forward, and presents best practices for improving the chances of successful interactions with male victims.

DALLAS D2

DALLAS A1

Build Your Case with the Help of a Forensic Nurse

(The) FBI’s New Child Abduction Response Plan

Sheilah Priori The forensic nurse examiner can play a crucial role in navigating the medical system by providing accurate statements, photo-documentation, expert testimony, and medical records necessary in the investigation of crimes against children. This workshop will utilize case studies to demonstrate the importance of the medical forensic exam in the investigation of sexual and physical abuse.

William Donaldson, Mark Hilts LONE STAR A3, See pg. 17 for description

DALLAS D1

Blocks and Problems in Forensic Interviewing

REMINGTON

*(The) Diary of a Predator Nancy Hebert, Cindy Pulcher, Jimmy Wiggins This case study reveals the abuse inflicted by a juvenile predator whose acts were so horrific he was certified to be tried as an adult. The investigation involved multi-jurisdictional agencies that worked together to take multiple sexual predators off of the streets throughout the U.S. and Canada. The presenters will detail the sophisticated techniques the offender used to try and keep child pornographic images from being detected on the Internet and how law enforcement discovered these images. This workshop will explore how family dynamics were a hurdle in pursuing charges and how professionals from ICAC and the Crimes Against Children Division came together to protect a young child who did not outcry to the sexual

August 10-13, 2015

|

D a l l a s , Te x a s |

(The) First Responder Interview Rita Farrell This workshop will explain the differences between a first responder’s interview of an abused child and one conducted by a forensic interviewer. The presenter will offer concrete recommendations for forensic interviewers and investigators who may have to conduct a “minimal facts” or preliminary interview before a forensic interview. DALLAS A3

Fourth Amendment in a Digital Age: Square Pegs, Round Holes Roger Canaff The continued advancement in technology along with the vast amount of information stored on hand held devices has created novel legal issues being addressed with an old 4th Amendment framework. The lag in a workable legal response is causing disparate reactions by the judiciary. This workshop will address emerging and trending legal issues from search incident to arrest, to obtaining search warrants, to conducting digital examinations, to complying with the ECPA, and will discuss workable solutions. AUSTIN 2

cacconference.org

*Israel Berrios-Berrios: Priest, Godfather, and Predator (Part 1 of 2)

Leave Your Ego at the Door: Refocusing Your MDT

Jim Holler Gentle homicides encompass smothering, strangulation, and drowning and are the second most common form of child murder and the most difficult cases for detectives to investigate. In most cases there is no evidence of any type of trauma and there are no tests at autopsy that could help determine this type of death.Many cases are ultimately listed as Sudden Infant Death Syndrome (SIDS). These cases are most likely discovered through admission from caregivers or witness accounts.

Marshal Morgan, Edgardo Motta, Alek Pacheco This case study will detail the investigation and prosecution of a Catholic priest who groomed and eventually sexually assaulted an altar boy. This presentation will illustrate how an investigation that was initiated by the local media led to uncovering the acts committed by the priest. The case study will focus on the grooming process in which the priest paid for two cruise vacations to the Bahamas in order to abuse his victim. Furthermore, it will detail how the Catholic Church handled the investigation, the community reaction upon his arrest and the criminal prosecution. The presenters will also discuss how an effective multijurisdictional team led to the rescue of one victim and to the successfully prosecution of the priest at both state and federal jurisdictions. During this presentation the victim will also discuss his grooming, victimization, and healing process. Repeats Wednesday from 1:45-3:00pm.

Irish Burch How do you get different agencies, disciplines and personalities to work together in the protection of child abuse victims? By leaving all egos at the door! In this workshop, attendees will discuss common issues facing many MDTs today and offer practical steps for building a more effective team and stronger cases. The attendees will learn how a greater understanding of roles and responsibilities of each discipline is key to building trust and respect among team members. The presentation will cover team building, training and orientation, better communication, and handling conflict.

LONE STAR C4

Human Trafficking and Beyond (Part 1 of 2) Tanisha Knighton This workshop will focus on the different types of missing persons and the overlap between missing persons cases, unidentified remains, and human trafficking cases. Participants will explore the social stigma associated with trafficking and the impact social media plays and will analyze the profiles and vulnerability factors of victims and review suggestions on how to identify and interact with them. The workshop will then explore recruitment and grooming tactics used by traffickers of both sexual trafficking and labor trafficking, and terminology and rules associated with pimping subcultures. Participants are encouraged to bring their smartphones and tablets to this workshop so they may participate in the workshop activities. DALLAS D3

Interrogation: A 360-Degree Perspective (Part 1 of 2) Kevin Navarro, John Palmer This workshop will share the results of a joint project by the Federal Law Enforcement Training Center and the Dallas Police Department. Videotaped interrogations of homicide suspects conducted by Dallas homicide detectives were analyzed, along with videotaped interviews of the detectives and now-incarcerated suspects. Those interviews explored the philosophy and methodology of the detectives as well as the opinions of the suspects. This presentation will share what was learned. Key segments of video from the interrogation will be presented combined with videotaped perspective on these aspects of the interrogation from the investigator and the now-incarcerated suspect, providing a 360-degree look at critical steps and principles associated with a criminal interrogation. Repeats Wednesday from 1:45-3:00pm. LONE STAR C1

LONE STAR A4

It’s Never Really Over: Post-Conviction Issues in Child-Abuse Cases Laura Coats, Christine Womble The case does not end when judgment is entered. Months, years, and even decades later, defendants are challenging their convictions alleging countless violations of their constitutional rights. While some claims have merit, most do not. This workshop will present an overview of the most commonly successful post-conviction claims (actual innocence, prosecutorial misconduct, ineffective assistance of counsel) and discuss issues that law enforcement and prosecutors should be aware of as they prepare their cases for trial. CITY VIEW 6

*Jonathan Richardson: The Cat of Nine Tails Torture (Part 1 of 2) Sharon Cooper, Paul Jackson This case presentation describes one of the most violent cases of child torture in North Carolina. An offender, who carefully groomed a mother to leave her child with him during a short military training, successfully imprisoned and deliberately physically, psychologically and sexually tortured her over the next 10 days. His methods were many, but his use of a copper cat of nine tails whip left medical experts initially stymied as to the cause of the unusual pattern injuries. The investigation and prosecution were meticulously executed with more than 800 exhibits at trial, with a capital punishment outcome. Repeats Tuesday from 8:30-9:45am.

M ONDAY

Gentle Child Murder: Suffocation, Strangulation, and Drowning

SEMINAR

Not One More Child; Not in Our Community (Part 1 of 2) Sylvia Bruni, Stephen Daley, Pete Garza Join us for an empowering community initiative that is sending a message to all child predators, “Not Here, Not Now, and No More.” In this workshop we will share a revolutionary community approach empowering children with the opportunity to recognize, avoid, resist, and escape violence or harm. Proactive, preventive, therapeutic and resiliency building directly in the hands and through the eyes of children. United together, the District Attorney, Child Advocacy Center, school districts, and community not for profits are making a difference, and you can too! Join us for this game changer and opportunity. DALLAS A2

Physical Child Abuse Injury Reconstruction Techniques (Part 1 of 2) Robert Farley This workshop will focus on non-accidental injuries inflicted on children. The presenter will emphasize the specific techniques that may be used by the investigator in the assessment, investigation, and reconstruction of cases involving soft tissue injuries such as bruises, lacerations, and burns. The discussion will also address the circumstances and evaluation of deprived and neglected children and offer case illustrations that encourage hands on participation by the student. Repeats Tuesday from 8:30-9:45am. LONE STAR C3

1:45-3:00 PM CONT’D ON NEXT PAGE.

LONE STAR A2

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

21

1:45-3:00 PM CONT’D M ONDAY

Predicting Child Maltreatment with Risk Terrain Modeling Michael Bachman, Dyann Daley This workshop discusses the application of Risk Terrain Modeling (RTM) to investigate the spatial influence of a multitude of known social, environmental, and behavioral risk factors related to child maltreatment to predict discrete geographic areas of future incidents with significantly higher accuracy than common heat map projections. To our knowledge, RTM methodology has never been applied to studies of child maltreatment. Attendees will learn innovative methods to explore the issues surrounding child maltreatment and narrow the geographic target for primary prevention. CITY VIEW 7

*(The) Prosecution of Don Wilburn Collins: Justice Delayed, But Not Denied (Part 1 of 2) Kelly Blackburn, Rob Freyer On his eighth birthday, Robert Middleton was doused with gasoline and set on fire by 13 yearold Don Collins. Middleton received third degree burns to 99.9% of his body, but he survived the attack. Nearly eight years later he died of skin cancer, which doctors determined was caused by his burn injuries and the hundreds of skin grafts he received over the years. His death was ruled a homicide. At the age of 27, Collins was certified to stand trial as an adult for the 1998 burning of Middleton. On February 11, 2015, almost 17 years after Robert Middleton was set on fire, a jury convicted Collins of Capital Murder. This case study will discuss the many complex aspects of this successful cold case investigation and prosecution. The presenters will detail the 1998 criminal investigation, the decision to dismiss criminal charges against Collins in 1999, the 2011 cold case investigation that led to an indictment for Capital Murder, the legal hurdles dealt with regarding the video deposition given by Robert Middleton 17 days before his death, legal issues regarding Middleton’s cause of death, witness issues, and the presentation of the case at trial. Repeats Wednesday from 1:45-3:00pm. LONE STAR B

Sexually Violent Predators: Texas and Beyond Erin Faseler Approximately 20 states, the District of Columbia and the federal government have enacted Sexually Violent Predator laws. This workshop will discuss the development of the civil commitment process, as well as a brief synopsis of sexually 22

violent predator laws across the country. This presentation will further discuss the procedures for civil commitment, building a case for civil commitment, legal challenges currently facing sexually violent predator laws, and issues that commonly arise when trying these cases. Repeats Thursday from 8:30-9:45am. AUSTIN 3

Twitter: Guidelines for Law Enforcement Jane Lee, John Starr In this workshop the presenters will discuss how Twitter works in tandem with technology companies and law enforcement on ways to eliminate child sexual exploitation online. They will provide an overview of the service and give context around what makes Twitter unique. Additionally, they will share the latest tools designed to help users stay safe and in control of their Twitter experience, as well as provide detailed guidelines for law enforcement seeking information about Twitter accounts. AUSTIN 1

Understanding Grooming Behaviors of Child Molesters and the Resulting “Counter-Intuitive” Behaviors of their Victims Darrel Turner This presentation explores behaviors of offenders, such as grooming of families, self-grooming, and grooming of victims that are engaged in to prevent disclosure and to gain the trust and sometimes even “love” of their victims. Also, subsequent behaviors of these groomed victims may appear counter to what would be expected from a victim of sexual abuse. This presentation examines this through personal experience, personal research studies, other available research, and uses video of interviews of sex offenders and victims. The presentation will also address how these variables impact juries’ decisions in these types of cases. Repeats Thursday from 10:15-11:30am. LONE STAR A1

Using Social Media to Promote Your Agency Jana Parker CITY VIEW 8, See pg.18 for description.

3:30-4:45 PM *Are Collectors of Child Pornography the Child Molesters of the Future? (Part 2 of 2) Joe Sullivan Repeats Wednesday from 10:15-11:30am. DALLAS B, See pg. 20 for description.

August 10-13, 2015

|

D a l l a s , Te x a s |

Building a Community Education Program for Your CAC Dianna Smoot, Autumn Williams As part of a strategic planning process, the Dallas Children’s Advocacy Center embarked on a significant community education program several years ago. Come and hear about strategies implemented to raise the profile of the agency and to become the “go to” for child abuse issues within Dallas County. Participants will be given ideas, tools and resources to take back to their communities, including creative ideas on what can be implemented on a limited budget. Think you don’t have time to educate those in your community? You are leaving dollars on the table and uninformed community members in the jury box. Repeats Thursday from 8:30-9:45am. SEMINAR

Child Fatality Review in Texas Amy Bailey Child fatality review teams in Texas meet to develop an understanding of the causes and incidences of child death in Texas. They identify procedures within agencies represented on the State Child Fatality Review Team (SCFRT) to reduce the number of preventable child deaths, promote public awareness and make recommendations to the governor and legislature for changes in law, policy, and practice to reduce the number of preventable child deaths. This workshop will describe current child fatality data trends in Texas, a review of recommendations and positions statements published by the SCFRT and local team activities to prevent child deaths. Repeats Thursday from 10:15-11:30am. REMINGTON

Data is the Key to Prevention: NCMEC Attempted Abduction and KidSmartz Resources Jessica Kenton, Russell Petty The National Center for Missing & Exploited Children (NCMEC) is in an extremely unique position to use data to shape prevention education. NCMEC’s Case Analysis Unit (CAU) collects data from law enforcement on attempted abductions that occur throughout the United States. The CAU provides free resources and analytical support to law enforcement investigating these crimes and is determined to proactively prevent these incidents through education and information sharing. KidSmartz, brought to you by Honeywell Hometown Solutions, furthers that mission with early interactive education for children, parents and educators. This presentation will review the resources provided by the CAU for law enforcement and share the free

cacconference.org

CITY VIEW 7

Direct Examination of the Computer Forensic Examiner Justin Fitzsimmons This presentation focuses on the fundamentals of presenting a forensic examiner at trial. It highlights possible exhibits that prosecutors can use to help explain technology devices and computer forensics during the foundation portion of the examination. Attendees will be provided tips for effectively presenting computer forensic evidence at trial. DALLAS D1

Effective Engagement with Male Survivors of Sexual Abuse (Part 2 of 2) Christopher Anderson DALLAS A1, See pg. 20 for description.

Human Trafficking and Beyond (Part 2 of 2) Tanisha Knighton DALLAS D3, See pg. 21 for description.

Interrogation: A 360-Degree Perspective (Part 2 of 2) Kevin Navarro, John Palmer Repeats Wednesday from 3:30-4:45pm. LONE STAR C1, See pg.21 for description.

Interviewing At-Risk Youth Julie Kenniston As law enforcement officers conduct child pornography investigations, they often find that child pornography suspects have access to children. Sometimes these are biological children and sometimes they are other children known to the suspect. Based on the Butner study, we know that these children are at risk of sexual victimization. This presentation will offer suggestions for managing and conducting interviews of these at-risk youth. Repeats Tuesday from 3:30-4:45pm. DALLAS D2

*Joshua Karr: Preying on the Willing Victim Lauren Hopkins, Crystal Levonius Joshua Karr, a convicted sex offender, used social media to prey upon his sixteen yearold victim. Under his influence, she willingly went with Karr from her home near Houston to Collin County, north of Dallas. Through the cooperation of the National Center for Missing and Exploited Children, independent computer forensic analysis companies, multiple police agencies and the Collin County District Attorney’s office, the victim ultimately was found in Karr’s bedroom. Violent child pornography was also recovered on his cell phone. Karr was charged with multiple offenses and received two life sentences. Prosecutors will address the difficulties that arise in trial when a jury must reach a verdict without being aware of a defendant’s criminal history or extraneous offenses. They will also address issues that arise when the victim appears to have become a willing participant in a predator’s plan. Repeats Wednesday from 10:15-11:30am. LONE STAR C4

Not One More Child; Not in Our Community (Part 2 of 2) Sylvia Bruni, Stephen Daley, Pete Garza DALLAS A2, See pg. 21 for description.

Physical Child Abuse Injury Reconstruction Techniques (Part 2 of 2)

Marshal Morgan, Edgardo Motta, Alek Pacheco Repeats Wednesday from 3:30-4:45pm. LONE STAR A4, See pg. 21 for description.

*Jonathan Richardson: The Cat of Nine Tails Torture (Part 2 of 2) Sharon Cooper, Paul Jackson Repeats Tuesday from 10:15-11:30am. LONE STAR A2, See pg. 21 for description.

Mary-Ann Burkhart Working with child victims creates a unique experience for prosecutors to take the lead on filing pretrial motions meant to protect our most vulnerable victims in the courtroom. This workshop will discuss strategies for using motion practice to make the courtroom a more positive experience for these victims and witnesses, as well as strengthening our cases.

Kelly Blackburn, Rob Freyer Repeats Wednesday from 3:30-4:45pm. LONE STAR B, See pg. 22 for description.

Amber Schroader Smartphones have become a common part of our day-to-day lives with most of our data and information flowing freely through them. Data can exist on a variety of devices from the smartphone itself to the accessories it connects to. Come and learn where to look for data and tricks to finding what might be hidden beneath the surface of your smartphone. Repeats Tuesday from 1:45-3:00pm. DALLAS A3

DON’T MISS OUT ON THE MEET AND GREET First floor Exhibit Hall

Sexual Assault: Rape or Molestation Ken Lanning In a discussion of sexual assault, to what extent does the term “rape” apply to the sexual D a l l a s , Te x a s |

Emily Lentz, Sandra Onyi This talk will bring insight into the different categories for failure to thrive. It will walk attendees through proper ways to identify whether the condition is related to a medical or environmental cause. It will help to better facilitate understanding of what growth curves are appropriate according to the child’s age and how to interpret the growth chart. It will emphasize the importance of a detailed diet history and use of a dietitian to properly manage a child’s condition. Case examples will be utilized to illustrate each category of failure to thrive and management.

3:30-4:45 PM CONT’D ON NEXT PAGE.

*(The) Prosecution of Don Wilburn Collins: Justice Delayed, But Not Denied (Part 2 of 2)

|

Sizing It Up: The Skinny on Failure to Thrive

Smartphone Data: A Game of Hide and Seek

Proactive Pretrial Motions

August 10-13, 2015

LONE STAR A1

CITY VIEW 8

Robert Farley Repeats Tuesday from 10:15-11:30am. LONE STAR C3, See pg. 21 for description.

CITY VIEW 6

*Israel Berrios-Berrios: Priest, Godfather, and Predator (Part 2 of 2)

victimization of children? Are there differences between rape and child molestation cases? Is a sexually victimized 14 year-old girl the victim of rape or molestation? Although these terms have legal definitions and elements, societal perceptions often control their use and subsequent criminal justice consequences. Perceptions about terms such as “rape” and “molestation” influence expectations and can have significant affect on media coverage, investigation, prosecution, and sentencing. In this workshop, contrasting dynamics and their significance will be clearly discussed and illustrated with the goal of improving clear and consistent definitions. Repeats Tuesday from 12:00-1:15pm.

M ONDAY

resources available through KidSmartz, a child safety program that educates families about preventing abduction and empowers kids in grades K-5 to practice safer behaviors.

Monday 4:45-6:30 PM

cacconference.org

23

3:30-4:45 PM CONT’D Tactical Polygraph

M ONDAY

Michael Bourke This presentation discusses the use of “tactical polygraphs,” which are examinations that focus on identifying undetected sexual criminality committed by individuals who view child exploitation material. The technique has been remarkably successful in identifying victims of hands-on abuse. The presenter will summarize the findings from a study conducted by personnel from the Behavioral Analysis Unit of the U.S. Marshals Service, the Office of the U.S. Attorney, the U.S. Postal Inspection Service, the FBI, and the United States Secret Service. The presentation will include a discussion for why the technique works and suggested guidance on the application of the findings. AUSTIN 2

Understanding and Investigating Burn Injuries Jim Holler Infants and toddlers are most likely to be burned intentionally. Child abuse burn victims are typically under the age of ten with the majority under the age of two. Immediate identification of intentional burn victims by those individuals first responding to the call for assistance is crucial because most of the victims are unable to

24

speak for themselves. This workshop will provide law enforcement officers and CPS workers with information that will assist them in distinguishing the difference between intentional and accidental burns. It will also assist the investigator by providing methods that can be used in recreating the incident to help prove or disprove the caregiver’s statements as to how the burns were sustained. Repeats Wednesday from 3:30-4:45pm.

When the Smoke Clears: Examining the Defendant and Defense Witnesses Victor Vieth This workshop details the art and science of preparing for and conducting a cross examination of a suspect or lay defense witness in cases of child maltreatment. Appropriate for prosecutors and child protection attorneys, other MDT members may also gain a deeper understanding of cross-examination practices.

LONE STAR C2

AUSTIN 3

*When the Bough Breaks

Yahoo: Child Safety Investigations

Matthew Cox, Sandy Moreland, Reynie Tinajero One morning, Joniah Baker, a healthy 11 month-old baby, was left alone with his father Jonathan while the mother was at work. Later that day, when the mother returned home, she realized that her son was in trouble. Joniah was rushed to the hospital but he died two days later. Doctors found 26 marks on his tiny body, including burns, bite marks, broken ribs, and a subdural hemorrhage. There is no doubt that Joniah’s final day was one of sheer torture. The presenters will detail both the criminal and the medical investigation that followed. The prosecution resulted in a conviction for Capital Murder for Joniah’s father for killing his infant son. Repeats Wednesday from 12:00-1:15pm.

Sean Zadig This presentation will provide a basic overview of Yahoo services that may be encountered by investigators conducting child exploitation investigations. These services include the Yahoo account in general, as well as Flickr, Yahoo Groups, Yahoo Answers, and Yahoo Messenger. This familiarization will focus upon how users utilize these services and how they have arisen in a few case studies from Yahoo’s ECrime Investigations Team. A short description of Yahoo’s CyberTip reporting process and data disclosure policies will also be included. AUSTIN 1

LONE STAR A3

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

GODADDY

IS ASPONSOR. PROUD 27th Annual Crimes Against Children Conference.

We support the Dallas Children’s Advocacy Center® and all those who fight crimes against children and help children heal.

CASE STUDIES & WORKSHOPS Each session is listed by time block.

TUESDAY, AUGUST 11 Schedule at a glance:

8:30-9:45 AM Acquaintance Molestation and Youth-Serving Organizations Ken Lanning

T UE SDAY

7:00-8:30 AM

Light Continental Breakfast Registration/Check-In Lone Star Foyer

8:00AM-5:00 PM

NCMEC CVIP Lab Open

Live Oak Room

9:45-10:15 AM Break

Refreshments Provided

10:30 AM-1:30 PM

Tour of the Dallas Children’s Advocacy Center with Lunch Visit the Questions Booth for Tour Information

11:30 AM-NOON Break

No Refreshments Provided

1:15-1:45 PM Break

No Refreshments Provided

3:00-3:30 PM Break

Refreshments Provided

6:00 PM

Dallas Police Association Hospitality Event

Shuttle Transportation Provided on Ground Floor of Sheraton Hotel

Case Studies are marked with an asterisk ( * )

26

LONE STAR A1, See pg. 18 for description

Advanced Evidence Analysis For Internet Child Exploitation Cases with Magnet IEF Rob Maddox This hands-on lab session is for forensics examiners who use Magnet IEF in the investigation of Internet child exploitation cases. This lab session will provide a hands-on instruction on new and advanced features of IEF that will aid in the recovery and analysis of several types of digital evidence that are critical in these cases including: Using IEF with Project Vic and PhotoDNA to quickly identify illicit pictures and videos; Exporting pictures and videos recovered by IEF to NetClean for review and categorization: Recovering and analyzing browser history, parsed search queries, peer-to-peer file sharing, and chat threads to reveal intent to lure, download, or distribute. Session attendee’s will receive a free trial copy of Magnet IEF and Magnet Acquire. This is an exhibitor workshop by Magnet Forensics exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. Repeats Tuesday from 10:15-11:30am. CITY VIEW 6

tools extend the initial examination process from triage to automated forensic exams by including a wider array of critical artifacts, while maintaining automation, enhancing ease of use, and increasing performance. This workshop will cover the set-up of an examination, scanning a suspect computer, and reviewing and reporting on collected evidence. All attendees will receive a FREE Evaluation Software Kit with a 90 day license. This is an exhibitor workshop by ADF Solutions exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. Repeats Tuesday from 10:15-11:30am, 1:45-3:00pm, and 3:30-4:45pm. CITY VIEW 5

Because the Bible Tells Me So: Guidelines for Child Protection Professionals Working with Parents Using Scripture to Justify Corporal Punishment Victor Vieth As the legal definition of reasonable force continues to contract, there is increasing tension between criminal justice/child protection professionals and parents who physically discipline their children based on religious beliefs. Using a case study, this workshop offers concrete guidelines for MDTs working with caretakers whose physical discipline of their children exceeds the law but is rooted in their interpretations of scripture. AUSTIN 2

*Ariel Castro: Working Together to Achieve Justice (Part 1 of 2) Saleh Awadallah, Anna Faraglia On May 6, 2013, the world watched as three women held captive in a house in Cleveland for more than a decade escaped their kidnapper. This case study will detail the investigation and prosecution of their captor, Ariel Castro. After his arrest, law enforcement agencies had to investigate, charge, and prosecute a case against Ariel Castro that would not only lead to his conviction, but would stand up under appeal and produce a sentence befitting his horrific crimes.  Repeats Wednesday from 12:00-1:15pm.

Brittle or Battered? Medical Evaluation of Multiple Fractures in Young Children Matthew Cox This lecture will review the types of fractures, the mechanisms of injury, and the medical diseases that can predispose a child to fractures. Recent media reports have reported on a rare genetic disorder (Ehlers Danlos syndrome) or Vitamin D deficiency (rickets) causing unexplained fractures in young children. The exisiting medical literature as it pertains to these disease processes and fractures will be reviewed. The lecture will utilize case studies to illustrate the spectrum of bone problems in children.

LONE STAR B

LONE STAR C1

Automated, Targeted Digital Forensic Examinations (Includes Free Evaluation Software)

Cell Phone Forensis and ICAC Investigations

Richard Drinkwater In this hands-on workshop, attendees will learn how to use the newest ADF forensic tools. These

August 10-13, 2015

|

D a l l a s , Te x a s |

Sean Morrissey Designed to provide hands-on instruction to extract evidence from cell phones and to examine that evidence in a timely and judicious fashion. A

cacconference.org

CITY VIEW 8

(A) Child’s Only Chance:  Improving the Medical Community’s Recognition of Maltreatment Dyann Daley A maltreated child, who is not in day care, can be isolated and invisible. Medical professionals and first responders may be the only people who can examine the child’s body and get enough information to detect child maltreatment. Unfortunately, medical professionals either fail to recognize or fail to report child maltreatment up to 50-75% of the time. Would your police officer, EMT, nurse, pediatrician, or specialist recognize a child in trouble?  Join us to explore options for improving the first responder and medical professionals’ response to these children in your community. DALLAS A1

Comprehensive Offender Management: Exceeding the Letter and the Spirit of the Law Joe Gauthier This workshop will be a comprehensive look at how to leverage OffenderWatch® to effectively establish best practices for proactive sex offender management. The presenters will discuss the benefits of advanced data collection standards, effective public communication and notification polices, and how and when to adopt advanced supervision and public notification policies. The workshop will include demonstration of techniques to help improve your agency’s efficiency and effectiveness when conducting verifications, sweeps, and managing homeless offenders. Whether you are an existing OffenderWatch® client or not, this session will give you invaluable ideas and concepts to help your agency remain compliant with state statutes, while exceeding the expectations of the public. Repeats Wednesday from 8:30-9:45am. LONE STAR A4

Cultural Considerations When Working with Latino Victims of Abuse Monica Urbaniak, Viviana Urdaneta Latino children, who have experienced or witnessed domestic abuse and/or sexual assault, face barriers and challenges to seeking help and reporting including language, influence of extended family, and ongoing acculturation. This workshop will discuss a framework and cultural considerations when working with Latino families who have survived domestic violence and/or sexual assault. This presentation will include a discussion of the strengths of the Latino culture and ways to empower community leaders to provide and give information regarding services. The presenters will describe specific ideas on how to engage Latinos to use their traditions and cultural backgrounds to support others. It will include information about the “Madrinas de Genesis” project, which trains indigenous leaders to provide information and support to victims of abuse. Repeats Thursday from 10:15-11:30am. REMINGTON

Following the Evidence in the Forensic Interview Julie Kenniston This presentation will highlight techniques that will assist forensic interviewers in maximizing information obtained from children by following the evidence. Repeats Wednesday from 10:15-11:30am. AUSTIN 3

Grooming: Making You See What I Want You to See and Believe Chris Newlin The investigation of child abuse is challenging, and the pursuit of evidence associated with the grooming of children, caregivers, and the community environment provides opportunities for investigators to pursue additional evidence. This workshop will provide an overview of research related to grooming and propose a new framework for the concept of grooming which could dramatically modify current investigatory practices and enhance current forensic interviewing efforts. DALLAS A2

How Not to Help the Defense Attorney in Child Sexual Abuse Cases (Part 1 of 2) Lawrence Braunstein This workshop, presented by a defense attorney (and former prosecutor), will acquaint attendees with the intimate workings of the defense in child sexual abuse

August 10-13, 2015

|

D a l l a s , Te x a s |

cases: the preparation of a defense case, investigative techniques, pretrial motion practice and discovery, examinations before trial, jury selection, defense trial strategy, demonstrative evidence, trial exhibits, cross examination techniques, and courtroom psychology. By having a broad overview of both pretrial and trial procedures, and how the defense will approach its preparation during each phase of the litigation, the expert and lay (fact) witness will be better prepared in understanding his/her individual role in the proceedings, and better prepared to maximize his/her participation in the overall litigation. DALLAS B

INTERPOL Resources for U.S. Law Enforcement

T UE SDAY

range of searches including simple searches, hash sets, and third party applications will be discussed. Also, some of the common pitfalls encountered with modern cell phones and other technologies in investigations will be discussed and the methods to overcome some of those barriers will be addressed. This is an exhibitor workshop by Katana Forensics Research and Development Corporation exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win.

Michelle Ford-Stepney, Paul Layman This presentation will consist of case scenarios that will explore how INTERPOL Washington assists U.S. law enforcement agencies in matters with an international nexus. This assistance generally involves the location and arrest of known sex offenders, criminal history information and records checks from member countries, requests to obtain evidence or conduct interviews for a judicial or law enforcement purpose, and preparation and issuance of INTERPOL notices. INTERPOL notices have demonstrated themselves to be very effective in locating and tracking high profile subjects of interest to U.S. law enforcement. DALLAS D3

Interrogation Themes A-Z: 26 Themes for Child Pornography Cases (Part 1 of 2) Chad Steel This presentation will discuss setting the stage for and using themes when interrogating child pornography subjects. Building on existing techniques, two areas are focused on in detail. In the first session, informational, blocking, assessment, and behavior-provoking questions specific to child pornography cases are covered to set the stage for the interrogation. In the second session, specific themes that can be used successfully on child pornographers are introduced, including “The Collector,” “The Artist,” and “The Hail Mary.” Repeats Thursday from 8:30-9:45am. LONE STAR A3

8:30-9:45 AM CONT’D ON NEXT PAGE.

cacconference.org

27

8:30-9:45 AM CONT’D *Jonathan Richardson: The Cat of Nine Tails Torture (Part 1 of 2) Sharon Cooper, Paul Jackson DALLAS C, See pg. 21 for description

Knock and Talks: Maximum Results with Minimum Manpower

T UE SDAY

Michael Johnson, John Pirics This workshop will draw from several years of experience in child exploitation investigations that have been initiated by consensual contact (knock and talks). The presenters will provide successful techniques to gain and maintain consent, tips on maximizing the interview, methods for triaging knock and talk targets, and overall strategies for the different types of situations and individuals that are encountered. This information will be blended with examples from cases that the presenters have worked together, many of which have resulted in child rescues and significant sentences. Repeats Thursday from 10:15-11:30am. DALLAS A3

Multimedia Based Investigations: Early Discovery and Victim Identification Using FaceDNATM Biometric Facial Recognition John Bradley This workshop will demonstrate how the use of Internet Examiner® Toolkit and FaceDNA™ biometric facial recognition can be used to abate bad practices while creating profound time savings opportunities. Learn how facial recognition can be used to detect, identify and reveal faces of victims, suspects and persons of interest in pictures, movie files and surveillance videos. This includes other sources such as browser cache files, the retrieval of Facebook Profile Photos and YouTube videos in real-time. The timesavings and cost savings benefits of using FaceDNA™ will be evident. The future research and development into FaceDNA™ will be shared and discussed. Attendees will be provided a fully featured 60-day evaluation copy of Internet Examiner® Toolkit and will be enrolled in a prize drawing for one full perpetual license with SMS. Drawing will be August 12th at 3:00 pm at SiQuest’s booth. This is an exhibitor workshop by SiQuest, exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. Repeats Wednesday from 8:30-9:45am. CITY VIEW 7

28

Physical Child Abuse Injury Reconstruction Techniques (Part 1 of 2) Robert Farley DALLAS D1, See pg. 21 for description

Protecting Yourself in a Tech World: Digital Officer Safety and Ethical Concerns Justin Fitzsimmons, Lauren Wagner Nothing is more important than officer safety, whether on the street or on the computer. Attendees will learn how they leave traces of themselves when visiting websites, what information can be traced, and how to ensure that they are not compromising their safety or their investigations by broadcasting this information. This lecture covers website data, IP tracing, cell phone considerations, Bluetooth snarfing, and home wireless networks. This lecture also addresses the unique responsibilities of those in the medical, legal, law enforcement, victim services, and advocacy fields to highlight common pitfalls of social media use by professionals. The audience will see examples from various media sites that could cause ethical issues. Hypotheticals are given to encourage audience participation and interaction in determining whether social media use crosses an ethical boundary. Privacy issues will also addressed. LONE STAR C4

*Sextortion: How Facebook Tracked Down a Global Predator Julian Sher, Carol Todd It’s considered one of the most widespread and pernicious online crimes today: Sextortion - young girls tricked into exposing themselves online and then blackmailed. Amanda Todd was a teenager who committed suicide after enduring blackmail and cyber-bullying and her online video plea for help went viral. After an intense investigation, Facebook tracked down her alleged tormenter and police arrested a Dutch man who used as many as 90 aliases and had more than 75 victims around the world. Online chats show the extent of his well-plotted extortion, and how a desperate 15 year-old Amanda tried to fight back. Julian Sher presents a gripping hour-long investigative TV documentary that tells the inside story. Repeats Wednesday from 3:30-4:45pm. LONE STAR A2

(The) Six Principles of Successful Board/CEO Partnerships Jonathan Schick Boards are often riddled with political and functional challenges that creep into the running

August 10-13, 2015

|

D a l l a s , Te x a s |

of the organization, conflicting with operations and inhibiting effectiveness, despite everyone’s devotion to the same set of goals. In this dynamic presentation, the presenter shares the Six Principles that can unlock an organization’s potential and lead to successful board/CEO partnerships. During this workshop you will discover the simplest, but often overlooked, keys to strong Board-CEO relationships, uncover strategic ways to empower all members of your board, and develop skills to effectively set achievable goals and evaluation performance. SEMINAR

Testimony: The Art of Teaching Strangers How You Put on Your Pants Roger Canaff Even the most skilled clinicians can decompensate in the face of having to testify at trial. The best testimony is plainly worded, bite sized, and presented as a collegial conversation. But how do you teach strangers how you put your pants on? It’s the words you use every day, the procedure you know like the back of your hand, and the mental gymnastics it takes you mere moments to complete; that is what your testimony is based on. This session will explore the art of explanation in the context of criminal trial testimony. LONE STAR C3

Unmasking the Sexual Offender (Part 1 of 2) Veronique Valliere Sexual offenders present complex issues in investigation, prosecution, management, and treatment. This training will hope to unmask the sexual offender and reveal their thinking, fantasies, techniques, and influence of the victim and the community. Sex offender methods with victims, manipulation of the community, and deception of others will be explored. Repeats Tuesday from 1:45-3:00pm. LONE STAR C2

What CAC & CPS Professionals Need to Know About Stalking Rebecca Dreke, Sue Ryan Stalking is a crime that is often misunderstood and missed, yet one that affects millions of individuals each year. It is essential for all professionals to understand the dynamics of stalking in order to enhance the safety of stalking. In this session we will explore the prevalence and dynamics of stalking, the effect on victims, and the implications for child protection and child advocacy center professionals. In this interactive workshop, participants will have an opportunity to learn about the common ways

cacconference.org

offenders stalk, and will explore preventative measures, safety planning, and legal remedies available to victims of stalking and their families. DALLAS D2

Working with Victims of Commercial Sexual Exploitation and Domestic Trafficking: Do’s and Don’ts for Law Enforcement (Part 1 of 2)

AUSTIN 1

10:15-11:30AM Advanced Evidence Analysis for Internet Child Exploitation Cases with Magnet IEF Rob Maddox This is an exhibitor workshop by Magnet Forensics exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 6, See pg. 26 for description.

Alternative Response: An Alternative Path to Safety Joshua Martin This presentation will discuss a new stage of service in the Child Protective Services Investigations division called Alternative Response (AR). AR is a more positive, family-friendly, and collaborative approach to working with families in the CPS system. It encourages a caseworker/ family partnership and families have an active and important voice in the process. It promotes a more flexible, family engaging approach while still focusing on child safety. In AR the family is recognized as the expert of the family. AR caseworkers will work with families in a deeper level, developing a rapport that will enable them to be an ally, not an adversary. This presentation will provide a detailed overview of the AR program,

AUSTIN 2

*Ariel Castro: Working Together to Achieve Justice (Part 2 of 2) Saleh Awadallah, Anna Faraglia Repeats Wednesday from 1:45-3:00pm. LONE STAR B, See pg. 26 for description.

SEMINAR

Deception Detection

Automated, Targeted Digital Forensic Examinations (Includes Free Evaluation Software) Richard Drinkwater This is an exhibitor workshop by ADF Solutions, exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. Repeats Tuesday from 1:45-3:00pm, and 3:30-4:45pm. CITY VIEW 5, See pg. 26 for description.

Clinical Approaches to Working with Child Sex Trafficking Victims Stacey Brittain, Danielle Madera REMINGTON, See pg. 16 for description.

Conducting Effective Sex and Violent Offender Investigations: Policies, Protocols, and Procedures Joe Gauthier, Kyle Hoertsch This workshop will leverage OffenderWatch® case studies to illustrate the importance of advanced data collection standards in conducting timely and effective investigations. The presenters will discuss how exceeding the minimum statutory data collection requirements can prepare your agency for successful, efficient, and accurate investigations. Attendees will also see a demonstration on how effective data management in OffenderWatch® can assist agencies in quickly running reports and radial searches for offenders who match criteria, based on descriptions provided by victims. This session will provide both OffenderWatch® and nonOffenderWatch® agencies with valuable information useful in establishing, documenting, and adopting agency-wide offender management practices. Repeats Wednesday from 10:15-11:30am. LONE STAR A4

Creating an Inclusive Workplace Environment Heather Emmanuel, Kim Jones This workshop explores the realities of diversity in the workplace and discusses the importance of accepting and valuing individual differences. Through engaging discussion and thoughtful

August 10-13, 2015

|

D a l l a s , Te x a s |

scenarios, attendees are encouraged to assess their own behavior and biases toward people who are different from themselves and develop an understanding of the benefits of changing negative attitudes and resistance into appreciation and mutual respect.

Jim Tanner LONE STAR A1, See pg. 19 for description

Developing Trauma-Focused Cognitive Behavioral Therapy for Youth: A Personal and Professional Narrative Highlighting the Impact of Childhood Trauma

T UE SDAY

Al Krok, Ali Wolf Girls Educational and Mentoring Services (GEMS) is the nation’s largest service provider to commercially sexually exploited (CSE) and domestically trafficked girls and young women. GEMS will present a workshop adapted from its highly rated Commercial Sexual Exploitation of Children Community Intervention Project training curriculum. While open to all audiences and all experience levels, this workshop is specifically designed to provide law enforcement professionals with information needed to work with victims and address the crime of CSE and domestic trafficking of youth. The presentation will pinpoint best practices in identifying, engaging, and interviewing victims.

its beginnings, foundational tenets, and current implementation plans and strategies for Texas.

Esther Deblinger This workshop will introduce multidisciplinary professionals to the impact of childhood trauma and the value of early effective interventions for addressing the therapeutic needs of child victims of crime and their families. The history, development, and research supporting the efficacy of Trauma-Focused Cognitive Behavioral Therapy (TF-CBT) will be briefly reviewed with an overview of the essential elements of TFCBT. With 25 investigations and over 16 randomized controlled trials documenting its efficacy, TF-CBT today is considered the standard of care for children and teens who have experienced trauma. The presenter will also share her personal professional journey in engaging in this work for the past 28 years highlighting areas of insight and growth. AUSTIN 3

Ethics and Plea Agreements Geoffrey Keller This workshop details the practicalities of entering into plea agreements and raises myriad ethical conundrums often faced by prosecutors and, in some instances, the MDT as a whole. Attendees will receive practical guidance for developing plea agreements that are consistent and ethical.  DALLAS A1

10:15-11:30 AM CONT’D ON NEXT PAGE.

ATTEND THE EXHIBITOR WORKSHOPS! Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win.

cacconference.org

29

10:15-11:30 AM CONT’D Facebook: Working with Law Enforcement

T UE SDAY

Jason Barry, Emily Vacher In this workshop, the presenters will discuss how Facebook works with law enforcement to combat crimes against children. Discussed during this presentation will be Facebook “basics,” the latest safety and privacy controls available to prevent and reduce risks for users of the site, safety initiatives designed to combat crimes, and a detailed review of Facebook’s on-line records request system for law enforcement use. Repeats Wednesday from 1:45-3:00pm.

Chad Steel Repeats Thursday from 10:15-11:30am. LONE STAR A3, See pg.27 for description

Crystal Levonius, Daniel Lewis

Robert Farley DALLAS D1, See pg. 21 for description.

*Jonathan Richardson: The Cat of Nine Tails Torture (Part 2 of 2)

Prosecuting Human Trafficking Cases

From Dispatch to Verdict: Corroboration in Sexual Abuse Cases

Long-Term Missing Guide for Law Enforcement

How Not to Help the Defense Attorney in Child Sexual Abuse Cases (Part 2 of 2) Lawrence Braunstein DALLAS B, See pg. 27 for description

Ignoring Doctor’s Orders: The Spectrum of Medical Neglect Matthew Cox The neglect of children is often underappreciated, under reported, and under evaluated. This case based talk will serve to define medical neglect by using numerous case examples ranging from failure to treat common childhood diseases (asthma, diabetes) to the more severe, sometimes fatal forms of medical neglect. LONE STAR C1

CITY VIEW 7

DALLAS D3, See pg. 19 for description

LONE STAR A2

LONE STAR C4

iting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. Repeats Wednesday from 10:15-11:30am.

Physical Child Abuse Injury Reconstruction Techniques (Part 2 of 2)

*Jacky Scott Garrett: Two Children Too Many

Sharon Cooper, Paul Jackson DALLAS C, See pg. 21 for description.

Nancy Hebert, Todd Hoff What do law enforcement, CPS, forensic interviewers, therapists, SANE nurses, and prosecutors have in common when it comes to child sexual abuse? They are all MDT members who within their independent disciplines ensure a child’s well-being and enhance a child’s credibility through the development of corroborating evidence. This presentation will consist of real life case examples that demonstrate how unexpected evidence will impact an investigation or a trial. These examples will include how graphic videos, DNA collection, SANE exams, information from forensic interviews, and how what seemed insignificant became vital corroborating evidence. Many times verdicts depend on the child’s credibility. This presentation emphasizes ways to develop corroborating evidence to provide a safety net of credibility for a child at trial. Repeats Wednesday from 3:30-4:45pm.

30

Interrogation Themes A-Z: 26 Themes for Child Pornography Cases (Part 2 of 2)

Robert Hoever The recent recoveries of long-term missing children have generated much-needed public interest in other long-term missing children. The recoveries resulted in a Long-Term Missing Summit at NCMEC in which leading experts provided valuable input helping develop a guide to help law enforcement address these difficult cases. This presentation will discuss Scope and Scale, investigative techniques pertaining to long term missing children and unidentified bodies, resources such as technology, comprehensive case reviews, biometric data collection, and forensic imaging. DALLAS A3

Online Investigations: Track, Identify, and Locate Cyber Criminals, Associates, and Website Targets Using Internet Examiner® Toolkit John Bradley This workshop will introduce attendees to the new “live analysis” features of Internet Examiner® Toolkit (IXTK™) and describe how to incorporate and act on clues derived from conventional hard drive analysis. The use of integrated domain research tools within IXTK will be covered in detail, along with how to capture and save real-time results within an active case file. Domain search options to be covered include WhoIs, Reverse DNS, Reverse IP, Reverse MX, Domain IP WhoIs, Email Address, and Name Searches. At the conclusion, attendees will have newfound skills and knowledge to be more effective in their online investigations. Attendees will be provided a fully featured 60-day evaluation copy of Internet Examiner® Toolkit and will be automatically enrolled in a prize drawing for one full perpetual license with SMS. Drawing will be August 12th at 3:00 pm at SiQuest’s booth. This is an exhibitor workshop by SiQuest, exhib-

August 10-13, 2015

|

D a l l a s , Te x a s |

Brooke Grona-Robb This workshop is designed to assist prosecutors and investigators who are tackling human trafficking cases, from initial investigation to post-conviction. A team approach between prosecutors, law enforcement, and victim advocates allows for simultaneous goals of rescuing victims and prosecuting their offenders to the fullest extent. This course will help prosecutors work with law enforcement to investigate cases involving trafficking, and to gather the evidence necessary to make a successful case. We will discuss charging decisions, trial preparation, accomplice testimony, defense strategies, and witness preparation. Working with trafficking victims to prepare them for trial requires knowledge of their individual trauma experience, interpersonal dynamics, their needs, and their recovery process. Addressing witness issues and anticipating the unexpected is crucial for a successful prosecution. Repeats Wednesday from 3:30-4:45pm. DALLAS A2

Teens and Stalking Rebecca Dreke, Sue Ryan Research indicates that many stalking victims report being stalked before the age of 18. Although the dynamics of stalking of teens and adults are often similar, including primarily intimate partner offenders, low reporting rates, and connection to sexual and physical assault, practitioners should know how they differ to better serve teen victims. Participants will learn about the dynamics of teen stalking, developmental considerations related to pursuit behavior, the types of technologies teens use and how they are misused, and how to work with teen victims. Presenters will discuss the parent/adult knowledge gap in the use of technology, safety interventions, and prevention efforts. A discussion of how stalking intersects with other forms of teen victimization including bullying and dating abuse will also be included. DALLAS D2

cacconference.org

Tips for Testifying: Presenting a CAC Case Through Investigators

LONE STAR C3

Triage and Analysis of Mac Computers for Sexual Exploitation Investigations Steve Whalen Join SUMURI’s founder and CEO, Steve Whalen, as he walks you through best practices for conducting sexual exploitation cases when a Mac computer is involved. All of us know time is of the essence in most sexual exploitation or predator cases. SUMURI will show you the fastest and easiest way to conduct Mac forensic analysis, triage, timelines, and reporting using their newest software - RECON for Mac OS X. Designed for both the experienced Mac examiner and any investigator in the field. Thorough exams and reports can be done in minutes, not weeks! All conference attendees will be given the opportunity to obtain a 30-day demo of RECON for Mac OS X. This is an exhibitor workshop by SUMURI, LLC, exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 8

Unmasking the Sexual Offender (Part 2 of 2) Veronique Valliere Repeats Tuesday from 3:30-4:45pm. LONE STAR C2, See pg. 28 for description.

Working with Victims of Commercial Sexual Exploitation and Domestic Trafficking: Do’s and Don’ts for Law Enforcement (Part 2 of 2) Al Krok, Ali Wolf AUSTIN 1, See pg. 29 for description.

DALLAS D1

Advanced Cold Case and Long Term Missing Children Cases

AUSTIN 1

Brian Killacky AUSTIN 3, See pg. 20 for description

Courtroom Psychology: How to be a Good Witness and Survive in the Courtroom (Part 1 of 2)

(An) Advanced Social Network Analysis of Child Exploitation Networks Petra Talens, Madeleine van der Bruggen The presentation will provide insight into the structure of online child exploitation networks. The presenters will discuss their project that differed from other (operational) studies conducted on child exploitation networks as it did not only align at high-status members but at those key players who, by their knowledge, behavior or leading position, enable these networks to exist and prevail. Law enforcement personnel will be taught a valid method of extracting key players from online child exploitation networks. The method focuses on offender behavior and network ties on a deeper level than regular social network analysis most commonly used in running operations. This method is very innovative in nature, empirically validated, and it directly offers possible key targets for future operations. Repeats Thursday from 10:15-11:30am. DALLAS A3

Behind the Mask of a Child Rapist: “Hope’s Journey” Jim Holler This workshop will follow the life of a young child who was molested and raped by caregivers. We will follow the traumatic events of her life into adulthood. This story will give participants the tools to investigate similar crimes and provide ongoing services for child victims. This information will help participants complete more thorough investigations, greatly improving the odds of a successful arrest and prosecution of the perpetrator. Repeats Tuesday from 3:30-4:45pm. LONE STAR A4

12:00-1:15PM Accident or Inflicted: Investigator, You Decide Jim Sears This interactive workshop will look at many common injuries in children from an investiga-

Child Neglect: Intervening in Cases that are Hard to See

|

D a l l a s , Te x a s |

Lawrence Braunstein This workshop is designed for the expert and lay (fact) witness, and will “demystify” the trial process. It will address and explain the different layers of action in the courtroom, how to “read” it and how to effectively respond. Issues such as body language, the importance of what you say and how you say it, demonstrative evidence and effective presentation, the trial as theatre, establishing a level of comfort in the courtroom, how to defend yourself on cross examination and how to protect yourself in the witness box (when no one else will). The more comfortable and confident a witness is in the courtroom, the more effective their testimony can be. DALLAS B

Domestic Minor Sex Trafficking Investigations 101 Michael Barker, Carrie Landau Sex trafficking cases are among the most complex and difficult, yet most rewarding, cases to work. This lecture will focus on some strategies that will ensure the success of your investigation, providing an understanding of the human trafficking victim in order to start your case out right, and keep your investigation on target. Using case examples, the presenters will discuss the psychology behind human trafficking, how traffickers gain and maintain their control, and strategies for overcoming these effects. They will discuss recent trends in recruiting, victim control and coercion, and strategies for responding to, and creating effective relationships with victims of all circumstances. Lastly, they will discuss collaboration between federal and local entities, and strategies for sharing resources and working successful joint human sex trafficking investigations. Repeats Thursday from 8:30-9:45am. DALLAS D2

Amy Russell The effects of neglect are destructive and potentially lifelong for child victims. Neglect can impact children in multiple areas, including health and physical development, intellectual

August 10-13, 2015

and cognitive development, emotional and psychological development, and social and behavioral development. This workshop examines the multiple areas of impact neglect has on a child’s development and offers suggestions for investigating and responding to cases of child neglect through child welfare, criminal and mental health systems.

T UE SDAY

Justin Fitzsimmons Receiving a notice to appear in court or a subpoena can cause a potential witness to feel nervous and anxious. This interactive presentation discusses testifying and provides concrete suggestions for enduring the witness stand. Attendees will learn the difference between direct and cross-examination, as well as common defense attorney tactics intended to destroy witness credibility.

tor’s point of view. Attendees will learn how to differentiate between accidental and inflicted abusive injuries and will learn ways to improve abuse investigations. Repeats Wednesday from 10:15-11:30am.

12:00-1:15 PM CONT’D ON NEXT PAGE.

cacconference.org

31

12:00-1:15 PM CONT’D Investigation of Sudden, Unexplained Infant Deaths

T UE SDAY

Candace Schoppe This lecture focuses on the Sudden Unexplained Infant Death Investigation (SUIDI) “Top 25” produced by the Centers for Disease Control. The “Top 25” represents the 25 most important pieces of information that the medical examiner needs in order to facilitate an appropriate death investigation and interpret autopsy findings (or lack thereof). The discussion will include common autopsy findings in “SIDS” or “SUIDI” cases, and emphasize the importance of scene investigation, doll reenactment, and communication between various investigating agencies and the medical examiner. Repeats Thursday from 10:15-11:30am. LONE STAR A3

It’s a Crisis for Me Too! Helping Non-Offending Parents in Child Sexual Abuse Jeff Wherry Non-offending parents play a key role in the recovery of sexually abused children. This workshop will review the importance of social support in the recovery of sexually abused children, examine ways in which systems have neglected the psychological needs of non-offending parents, discuss myths and controversies which complicate the non-offending parent’s ability to be supportive, review the needs of non-offending parents, and discuss ideas for engagement of parents. DALLAS A2

Peter Hahn This case study will detail the investigation of Mark Berndt, a 30-year veteran teacher, whose sexual abuse of children included feeding them semen-laced cookies. Documents made public in the related civil lawsuit revealed that the L.A. Unified School District had received complaints as far back as 1983 about possible sexual misconduct by Berndt. The school district eventually settled the lawsuit for nearly 40 million dollars over its handling of the sexual abuse case involving Brandt. In this presentation attendees will learn how to handle the problems and issues that will arise with a major investigation that gathers worldwide media attention, how to interview hundreds of children, and how to handle political interference and civil attorneys distorting the truth prior to trial. Repeats Thursday from 8:30-9:45am.

32

Tyler Smith, Aaron Spivack In this presentation, the case agent and lead prosecutor will discuss how to make a bulletproof case against a sophisticated defendant and his girlfriend starting from an unreliable informant. They will take you through the investigation and successful prosecution of a couple who planned to set up a babysitting business to molest children and who possessed the largest child pornography collection seen by FBI New York, which the couple kept hidden in sophisticated encrypted containers on over 65 terabytes of computer media. The presenters will talk about how to best use a variety of investigatory techniques including an informant, a jailhouse informant, undercover Agent, and cryptanalysis, how to conduct a post-indictment obstruction of justice investigation, and how to pull together evidence and head off nearly every possible defense at trial. The presenters will also discuss how they prosecuted this case without calling either informant or the undercover agent.  Repeats Wednesday from 3:30-4:45pm. LONE STAR C4

*Randy & Me: A Prosecutor’s Story of His Childhood Sexual Abuse Kevin Mulcahy Repeats Thursday from 8:30-9:45am. LONE STAR A2, See pg. 17 for description

Sexual Assault: Rape or Molestation Ken Lanning LONE STAR A1, See pg. 23 for description.

*Mark Berndt: Sexual Abuse at the Miramonte Elementary School

DALLAS C

*(A) Perverted Pair: The Investigation of a Child-Molesting Couple

Social Media and Ethics Roger Canaff Social Media use by professionals is both useful for career enhancement and a great way to stay in touch with family and friends. However, ethical rules of professionalism are implicated when comments related to work are posted. This workshop will highlight the ethical rules for lawyers, social workers, nurses, physicians, and law enforcement and demonstrate ethical and also troublesome content. DALLAS A1

*Trafficking Children for Sexual Exploitation Joe Sullivan This case study will focus on an offender who provided children for adult perpetrators for the purpose of sexual exploitation. The presentation will follow the life of the offender and highlight some of the important features of this type of sexual offending. The offender shares insights

August 10-13, 2015

|

D a l l a s , Te x a s |

into his mind-set and the steps he took to avoid detection from law enforcement. The presentation contains video of interviews with the offender which some might find disturbing or distressing. Repeats Wednesday from 3:30-4:45pm. LONE STAR B

Utilizing MDTs to Effectively Address Cases of Domestic Minor Sex Trafficking Caroline Diemar, Tammy Sneed, Erin Williamson Using case examples, this presentation will discuss how law enforcement, prosecutors, and victim advocates can effectively work together through MDTs to address human trafficking in their communities. This presentation will discuss how team members can collaborate to meet the needs of victims, support the successful prosecution of traffickers, and effectively address common challenges that can present themselves in these cases. Attendees will also learn about the systems and protocols the Connecticut Department of Children and Families has put in place to facilitate interagency collaboration and support the use of MDTs in addressing cases of human trafficking across the state. Repeats Thursday from 10:15-11:30am. DALLAS D3

When a Child Takes It Back: Successfully Prosecuting a Case with a Recanting Victim Mary-Ann Burkhart Recantation is very common in child abuse cases, as evidenced not only by current available studies, but also in the personal experiences of child abuse professionals. This workshop will explore the realities of recantation, the common reasons for recantation, suggestions for avoiding recantation, and helpful hints to help recanting victims through the system; whether recantation occurs in the investigative stage, the pretrial phase, or during trial itself. AUSTIN 2

1:45-3:00PM 3D Printing: Non-Accidental and other Pediatric Trauma Jonathan Morris 3D printing has continued to expand within the field of medicine. The Mayo Clinic has incorporated this technology into their imaging work flows. This presentation will give a brief overview of turning cross sectional images, including CT and MRI, into accurate life size models using additive manufacturing.

cacconference.org

DALLAS A2

Automated, Targeted Digital Forensic Examinations (Includes Free Evaluation Software) Richard Drinkwater This is an exhibitor workshop by ADF Solutions, exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. Repeats Tuesday from 3:30-4:45pm. CITY VIEW 5, See pg. 26 for description.

Conducting Risk Assessments of Child Pornography Offenders Darrel Turner This workshop examines the risk factors that should be considered in a psychological risk assessment of child pornography offenders in comparison to a risk assessment of a contact child sex offender. This presentation will address ongoing research related to this topic, findings from the 2012 Congressional Report, and other available research including an analysis of studies frequently cited by the defense as evidence of general low risk of this population. Repeats Wednesday from 12:00-1:15pm. DALLAS D1

Controversies in Abusive Head Trauma (Part 1 of 2) Reade Quinton This workshop will cover current “hot topics” in abusive head injuries. The discussion will include sources of subdural hemorrhage, the debate over the significance of retinal hemorrhage, proposed mechanisms of injury in “shaking” cases, and an analysis of “short falls.” Repeats Wednesday from 1:45-3:00pm. LONE STAR A2

Courtroom Psychology: How to be a Good Witness and Survive in the Courtroom (Part 2 of 2)

interview of offender Austin Sigg, highlighting his pre-offense behavior, victim selection, and possible motives. Repeats Thursday from 8:30-9:45am.

Lawrence Braunstein DALLAS B, See pg. 31 for description

LONE STAR B

Craigslist Investigations Wayne Nichols Craigslist continues to be a target-enriched environment for exploitation investigations. This workshop will cover some critical changes that Craigslist has made in regards to communication on Craigslist. This lecture will discuss examples of good, bad, and ambiguous ads on Craigslist. Script ideas to personify a juvenile, parent, or Good Samaritan who are not only responding to ads, but also posting ads will be discussed. Attendees will also see several examples of different ways law enforcement can request information from Craigslist. Repeats Wednesday from 8:30-9:45am. DALLAS D3

How to Create a Strategic Plan that’s Inspirational, Inclusive, and Implementable Jonathan Schick Has your strategic plan been “museum quality, suitable for framing,” nice to look at, but without any practical use? Or have you not even embarked on a plan, fearing it will be a waste of time anyway? This workshop will walk you through the steps of creating a 100% participant owned, user-friendly strategic plan. The Four Steps are: Practical Visioning, Identifying Blocks, Strategic Directions, and Realistic Implementation Steps. Take your organization to the next level through this process! SEMINAR

Sherre Thomas This workshop will discuss issues and challenges facing the prosecutor in selecting a jury in a child sexual abuse cases. This session will include topics such as the recanting victim, the young child victim, the teenage victim, the lack of medical and physical evidence, and punishment issues. REMINGTON

*(The) Kidnapping and Murder of Polly Klaas (Part 1 of 2) Eddie Freyer This case study examines the various dynamics of a complex investigation involving an abducted child. The presentation reviews initial law enforcement responses and crime scene management protocols. A special emphasis is placed upon forensic evidence collection and interpretations. Major case management strategies will be discussed as well as resource supervision. The presentation follows investigators through the 65 days of intense investigation and includes family and community issues. Media and officer wellness issues will be closely reviewed giving the attendees a real feeling of stresses experienced by the investigative team. The attendees will be asked to “role play” and will make pivotal decisions during the investigation. Repeats Wednesday from 12:00-1:15pm. DALLAS C

*Jessica Ridgeway Case Study: A Behavioral Perspective

Kik and Law Enforcement

Mark MacKizer This presentation will focus on the behavioral analysis techniques used by the FBI’s Behavioral Analysis Unit to assist the Westminster, CO Police Department in their 2012 investigation into the abduction of 10 year-old Jessica Ridgeway. It will specifically detail the on-scene behavioral analysis input provided to investigators of the abduction, homicide and dismemberment of Jessica. The presenters will discuss how these techniques assisted in narrowing the focus of the investigation, generated potential leads, formulated media strategies, interview strategies and assisted in the prosecution of the offender. The presentation will conclude with a dialogue, based on the post-offense behavioral

August 10-13, 2015

Jury Selection in Child Sexual Abuse Cases

T UE SDAY

Specifically the presenter will discuss the role of 3D printing as a demonstrable aid in nonaccidental trauma, varied pediatric traumas, and post mortem forensic pathology. 3D printing creates accurate life size models of pediatric trauma that may not be able to be recreated pathologically. For non-medical personnel it provides an easily understandable depiction of the injury sustained. At the conclusion of this talk the attendees will be able to see the benefits of 3D printing including education of the legal community, forensic pathologists, forensic radiologists and all who work with abused children. Repeats Wednesday from 1:45-3:00pm.

|

D a l l a s , Te x a s |

Nicole Nearing, Lisa van Heugten This workshop will provide an overview of Kik’s processes and resources for law enforcement in criminal investigations. The presenters will discuss how Kik works, new product features, data that might be available pursuant to legal process, and provide an update on the team’s initiatives to keep kids safe on Kik. DALLAS A3

1:45-3:00 PM CONT’D ON NEXT PAGE.

cacconference.org

33

1:45-3:00 PM CONT’D *Lessons from Amora (Part 1 of 2)

T UE SDAY

Jacob Crater, Micheal Jimerson This presentation discusses the investigation and prosecution of the brutal sexual assault and murder of 13 month-old Amora Bain Carson. Specifically, speakers will focus on how different professionals, peace officers, social workers and prosecutors, faced the challenges of a crime so horrific. The medical examiner testified it was the worst he had ever seen. Presenters will address the stages and admitted mistakes of the case, from how the killers manufactured a “fake” crime scene, to the DNA bite mark evidence, and to a community’s attempt to understand the viciousness of the crime. Included in the workshop will be the Texas Ranger’s audio recording of the murderer’s statement, which the Ranger initially mistook for a grieving parent. Members of the original prosecution team will address how each agency played a pivotal role in the trials of the mother and her paramour. Repeats Thursday from 8:30-9:45am. LONE STAR C4

*Looking for Love in All the Wrong Places Amy Derrick, Carmen White This case study will examine the investigation and prosecution of Thomas Eppelsheimer aka Tommy Gunn. He was the promotions agent for Club Darkside, a teen club also purporting to be a religious institution. Gunn would routinely distribute narcotics to underage girls, and he was subsequently convicted of raping two girls from the club. This case study will focus on how prosecutors used the defendant’s cell phone and the calls he made from jail to convince a judge to look beyond the actions of the teenagers and to look at the choices made by the defendant. Repeats Wednesday from 8:30-9:45am. DALLAS D2

Mobile Forensics: Modern Ways of Communication, Hidden and Deleted Data Galina Rabotenko Modern devices are not just phones for calls but modern communication devices which store a lot of personal data. The experts’ job is to analyze this information. The purpose of this workshop is to share knowledge on how to find and identify this data. The technology of mobile devices changes frequently. It is important your forensic tools stay up to date and highlight these changes. In this live demonstration find out what information mobile devices can hide about the device owner and what data can easily be overlooked. This is an exhibitor 34

workshop by Oxygen Forensics, exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 6

(An) Overview of the PRACTICE Implementation of Trauma-Focused Cognitive Behavioral Therapy with Children, Adolescents, and their Non-Offending Caregivers (Part 1 of 2) Esther Deblinger This workshop will focus on introducing clinicians to the PRACTICE components of TF-CBT and the basic principles guiding the implementation of this approach with families. This overview workshop is designed to give participants “a taste” of TF-CBT to enhance their understanding of the potential benefits of this early effective intervention for children, adolescents and non-offending caregivers impacted by trauma. The presenter will demonstrate methods of engaging in individual parent and child as well as conjoint parent child sessions via case examples, role-plays and creative interventions. The session will end with a focus on clinician self-care. AUSTIN 3

Polyvictimization: The Victim Impact of Multiple Forms of Child Abuse Sharon Cooper Many victim impact statements focus on a specific form of child abuse, which may be the basis of charges in child maltreatment. However, psychological and social science research has revealed that when a victim has been abused by four or more different means over the course of a year, the impact is far greater. Investigators, prosecutors, and judges as well as mental health specialists must recognize the challenges of polyvictimization. The link between this outcome and the Adverse Childhood Experiences Study requires ongoing mental health and educational monitoring for children who have had this complex form of ongoing trauma. LONE STAR A1

(The) Power of 3: Combine Artifacts from Mobile, Operator, and Private Cloud Data Sources to Focus Your Investigations Ronen Engler Do you need to extract insights from an increasing number of disparate data sources, but also need to make sense of it in minimal time? In this scenario-based session, find out how to extract forensically sound data from private cloud and mobile data sources. Learn how importing it, together with carrier records, into a unified visual

August 10-13, 2015

|

D a l l a s , Te x a s |

view can help you efficiently contextualize the data to identify leads and make decisions—all within the confines of appropriate legal authority. Finally, understand how these efficiencies can accelerate your investigations, improving both their quantity and their quality. This is an exhibitor workshop by Cellebrite Inc. exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 7

Smartphone Data: A Game of Hide and Seek Amber Schroader DALLAS A1, See pg. 23 for description

Suffer from Burnout? Give’em the F.I.N.G.E.R.!     Mark Yarbrough This workshop will discuss burnout, which affects millions of Americans each year and has been called “the disease of our civilization.” Professionals who help protect children have a high risk of developing burnout. But there’s good news -- burnout can be healed. The presenter, a former 20-year elected district attorney, personally experienced burnout and then conquered it. He has since become a “burnout expert” and has written and published on the subject and has taught thousands of people how to overcome burnout. Attendees will be laughing, and at the same time learning Mark’s F.I.N.G.E.R. philosophy to help themselves or their co-workers avoid and/or recover from Burnout.  Repeats Wednesday from 12:00-1:15pm and Thursday from 10:15-11:30am. LONE STAR C1

Suspect Interrogation Techniques in Child Abuse Cases John Combs Child abuse investigations can be very complex and difficult to prosecute. When given the opportunity to interview and interrogate the suspect we must make the most of it. This workshop will provide techniques to assist the investigator in obtaining a confession. We will discuss building rapport and learning about the suspect’s life “stressors” that will be used in the latter part of the interrogation in order to obtain a confession. We will learn from the suspect what we can use as a “theme” as to how and why the offense took place in order to give the suspect an “out.” Brief case studies will be referred to as well as excerpts from an actual interview. Repeats Thursday from 8:30-9:45am. LONE STAR C3

cacconference.org

Tools for Identifying Victims and Finding Producers

Al Krok, Ali Wolf Girls Educational and Mentoring Services (GEMS) will screen their documentary, “Very Young Girls.” The critically acclaimed documentary is used as a backdrop for probing insightful discussion about the commercial sexual exploitation of children (CSEC). After the viewing, audience members will have the opportunity to ask questions and react to themes raised in the film. AUSTIN 1

What Child Abuse Professionals Must Know About Domestic Violence (Part 1 of 2)

Jan Langbein A growing body of research points to a definite link between adult domestic violence and child Unmasking the Sexual Offender (Part 1 of 2) abuse.  These are not isolated crimes. Whether Veronique Valliere the child is the unintended victim, the accidental LONE STAR C2, See pg.28 for description. victim or the deliberate target, the severity and manner of child abuse bears a strong resemUser Education and Deterrence blance to the type of maltreatment experienced Campaigns by their mothers. The two populations share Jacqueline Beauchere, Antigone Davis, several similarities as well as some important Shantal Rands Poovala, Leah Treitman differences. Understanding the impact of doThis workshop will explore the industry’s role in mestic violence on victims and their children can educating users (both potential victims and po- increase appropriate response and decrease the tential offenders) regarding child sexual exploi- risk of child victims experiencing and perpetrating tation, and discuss the effectiveness of current abuse in adulthood. This workshop will discuss practices such as providing a resource portal how by knowing the dynamics and effects of dowith guidance for safe interactions online, dis- mestic violence, law enforcement/CPS intervenrupting access to contraband images, and offer- tion and prevention can reduce crimes of tomoring resources for potential offenders to get help.  row as they make children safer today.     CITY VIEW 8

AUSTIN 2

LONE STAR A3

Utilitizing Offender Watch® to Find Absconded Offenders Mike Robinson, Joel Shoultz This workshop will discuss how OffenderWatch® helps you efficiently and effectively leverage your US Marshal to assist in locating and apprehending absconded offenders. Included will be a detailed discussion of how the US Marshal Alert feature works and the lead process after notification is initiated. Attendees will be presented a case study to illustrate how to generate quality leads for the USMS as well as a discussion on ways to further streamline communications and the role of the US Marshals when conducting compliance sweeps. While this session will focus on how to leverage functionality within OffenderWatch®, anyone who manages sex offenders should attend to learn more about the additional resources made available by the US Marshals Service through The National Sex Offender Targeting Center. Repeats Wednesday from 1:45-3:00pm. LONE STAR A4

Carol Todd This case study will detail the cyberbullying, exploitation and real life bullying that that led to the suicide of Amanda Todd at age 15. The presenter, Amanda’s mother, will discuss the events prior to and following Amanda’s death and how it started a conversation regarding cyberbullying and mental health issues. She will explain how Amanda’s story brought to the world’s attention the serious consequences that can result from such serious issues. Carol will discuss her efforts at helping kids stay strong by creating The Amanda Todd Legacy Society. The Amanda Todd Legacy Society is a non-profit that seeks to help youth, wherever they are, supplying resources and assistance for anti-bullying initiatives, mental health research, and cyber safety. Repeats Wednesday from 8:30-9:45am. |

D a l l a s , Te x a s |

Behind the Mask of a Child Rapist: “Hope’s Journey” Jim Holler LONE STAR C1, See pg. 31 for description

Case Law Updates and Current Issues in Crimes Against Children Cases Justin Fitzsimmons The case law relating to digital evidence is constantly evolving. For investigators and prosecutors handling cases involving digital evidence, an understanding of the current trends and rules covering technological evidence is of utmost importance to a successful outcome. This lecture will apprise participants of current case law on issues of technology, search and seizure, and hot topics affecting child exploitation cases. LONE STAR A1

Combating Sexual Exploitation One Stop at a Time Michael Bourke, Derek Prestridge REMINGTON, See pg.18 for description.

Reade Quinton Repeats Wednesday from 3:30-4:45pm. LONE STAR A2, See pg.33 for description

*Amanda’s Story: The Perfect Storm

August 10-13, 2015

Richard Drinkwater This is an exhibitor workshop by ADF Solutions, exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 5, See pg. 26 for description.

Controversies in Abusive Head Trauma (Part 2 of 2)

3:30-4:45PM

LONE STAR C3

Automated, Targeted Digital Forensic Examinations (Includes Free Evaluation Software)

T UE SDAY

Glynn LeBlanc Attend this session to see how multimedia files are extracted from evidence sources, analyzed and categorized, and then investigated to identify and build a case against the perpetrators and their associates. The presentation will include a demonstration and case study from Mike Johnson of DHS-ICE and will conclude with Q&A. This is an exhibitor workshop by Nuix North America exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win.

Very Young Girls: GEMS Documentary Screening with Q&A

Engaging Resistant Partners Gene Klein With the need for organizations to be efficient, there is continuing pressure for collaboration in the response to child abuse. The Child Advocacy Center Model has been a national effort to engage partners from multiple disciplines to work together and have a collective impact. Yet working together is not always easy. This session will distinguish the nature and purpose of partnerships, assist in the evaluation of the collaboration, give tools for engaging resistant partners, and share a process for decision making about new partner relationships. SEMINAR

3:30-4:45 PM CONT’D ON NEXT PAGE.

cacconference.org

35

3:30-4:45 PM CONT’D Highlighting the Legal and Technical Challenges Faced by Both Law Enforcement and Industry

T UE SDAY

Einat Clarke, Andrea Kirkpatrick, Ian Quinn, John Starr CyberTip reports from industry continue to rise exponentially. This workshop will explore the challenges faced by law enforcement in dealing with increasing volumes. Additionally, the presenters will touch on the implications of the Keith and Ackerman decisions in which defendants have tried to suppress evidence based on the allegation that service providers have acted as agents of the government. AUSTIN 2

Internal Controls for Fraud Prevention in Non-profit Agencies Lynn Davis, Heather Emmanuel Internal controls form a complex system that involves the collaboration of the board of directors, the audit committee, external auditors, operations personnel, and others. This workshop will explore the key roles in preventive controls and essential components of internal control, inherent limitations of internal controls, and much more. The presenters will discuss several instances of fraud that occurred within not-forprofits and how they could have, potentially, been avoided. Attendees will learn how to outline key preventative controls, identify essential elements of an effective internal control system, categorize major fraud schemes, use controls to prevent specific fraud schemes, and evaluate controls and corrective deficiencies.

Interviewing At-Risk Youth Julie Kenniston DALLAS A2, See pg. 23 for description

Introduction to Snapchat Law Enforcement Operations ​Darren Hubbard​ This presentation will provide a brief introduction to the Snapchat app, including its Snap, Story, and Chat messaging features. It will then give an overview of various Snapchat Law Enforcement Operations policies and procedures. These topics are designed to familiarize law enforcement agencies with the types of information that may be available from Snapchat and the specific legal process needed to compel that information.

36

Eddie Freyer Repeats Wednesday from 1:45-3:00pm. DALLAS C, See pg. 33 for description

*Lessons from Amora (Part 2 of 2) Jacob Crater, Micheal Jimerson Repeats Thursday from 10:15-11:30am. LONE STAR C4, See pg.34 for description

*Maurice Jerralds: The Popular Cheerleading Coach Was a Predator Nancy Oglesby This case study will examine the multiple investigations and prosecutions of Maurice “Moe” Jerralds, a private cheerleading coach. It will detail his victimization of young girls for more than a decade while parents failed or refused to recognize his abuse. In 2001, his prosecution for sexual abuse of two cheerleaders resulted in an acquittal when the cheerleading “community” rallied to his support, packed the courtroom, wore t-shirts displaying his picture, and treated the two victims as outcasts. For the next ten years, Jerralds abused five other girls on his cheer team almost right in front of their parents’ eyes. In 2011, an outcry of abuse led to a second investigation and a successful prosecution. This case study will not only look at both investigations and trials but also discuss the difficulties of convincing this cheerleading community that the popular coach was in fact a predator in their midst. Repeats Thursday from 8:30-9:45am. DALLAS B

OK, You Got This Case, Now What?

CITY VIEW 7

DALLAS A3

*(The) Kidnapping and Murder of Polly Klaas (Part 2 of 2)

Jim Sears You have been assigned “that case,” now the challenge is how to proceed. This workshop will provide some ideas in overcoming obstacles in complex and challenging child abuse investigations. The presenter will discuss ideas for both physical and sexual abuse cases. Repeats Wednesday from 1:45-3:00pm. DALLAS D1

Overcoming Anti-Forensics and Showing Intent Z​ eus Flores, Jad Saliba​ Successful prosecution of child pornography investigations often requires the core evidence, i.e. images and videos, to be present. Unfortunately, anti-forensics, encryption, and privacy software continue to pose a challenge. Proving intent is a key component in these cases. What clues should a forensic examiner look for when anti-forensics tools/techniques are used and the core evidence is gone? And how can you

August 10-13, 2015

|

D a l l a s , Te x a s |

paint a picture showing intent and sequencing? This intermediate-level technical lecture will discuss examination techniques, software tools, and provide information on various artifacts that can bolster a child pornography case or even reveal the “smoking gun” that secures a conviction. Jad Saliba, from Magnet Forensics, will join us to show how IEF can help in these types of cases.  Repeats Wednesday from 10:15-11:30am. DALLAS D3

(An) Overview of the PRACTICE Implementation of Trauma-Focused Cognitive Behavioral Therapy with Children, Adolescents, and Their Non-Offending Caregivers (Part 2 of 2) Esther Deblinger AUSTIN 3, See pg. 34 for description.

Sex Offender Registration in the United States: Update and Trends Lori McPherson This presentation will provide participants with an overview of the state, territory, and tribal sex offender registration systems within the U.S. In addition, the role of federal standards (SORNA) and national-level databases housing sex offender information will be discussed. Participants will also gain knowledge about the special issues of sex offender registration for persons convicted in military courts, as well as trending legal and policy issues of interest to the practitioner such as retroactive application, risk assessment, and juvenile registration. LONE STAR A4

Shades of Gray: Balancing Discovery Obligations and Victims’ Rights Linda Seabrook, Nathan Stump The discovery obligations of state and federal prosecutors are established by numerous sources such as State or Federal Rules of Criminal Procedure, applicable federal or state statutes, Brady v. Maryland, Giglio v. United States, relevant case law, discovery orders entered in particular cases, and ethics rules. While prosecutors have the responsibility to provide broad discovery, they should also be mindful of appropriate concerns such as victim privacy, safety, and protecting the case from obstruction efforts. This seminar will discuss this tension in detail and provide practical tips for striking an appropriate balance in the best interest of the case and the victim. Repeats Wednesday from 12:00-1:15pm. CITY VIEW 8

cacconference.org

Somebody’s Daughter: How Pimps Play the Prostitution PR Game

LONE STAR B

Technology Trends: What is the New Evil on the Internet? Ben Butler, Chris Roosenraad This workshop will review current and future trends in Internet technology with a focus on technical issues that can have an impact on Internet criminal investigations. Topics will include: the growth in end-to-end encryption, persistent monitoring, IPv6, NAT, CGN, the “Internet of Things,” TOR, the rise of “2 factor authentication,” and the growth of “multipathing.” This presentation is designed for anyone who wants to know where the Internet is going.

Ben LeMere Vehicle systems store a vast amount of data. This includes navigation history such as recent and favorite locations as well as calls logs, contacts and SMS messages. The amount of data these systems contain has increased to include emails, pictures, videos and social media feeds. Many systems record events such as when and where a vehicle’s lights are activated, which doors are opened and closed at specific locations, and even the vehicle’s location when Bluetooth devices connect. When vehicles with these systems are connected with criminal activity, this data can contain vital evidence. Retrieving this data can be challenging. In many vehicles multiple systems can be responsible for recording data, each requiring a difference method of acquisition and analysis. This presentation will address the data stored in several different systems and touch on methods used to acquire and analyze it. This is an exhibitor workshop by Berla Corporation, exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win.

What Child Abuse Professionals Must Know About Domestic Violence (Part 2 of 2) Jan Langbein LONE STAR A3, See pg.35 for description.

Working with Non-Offending Parents in Child Sexual Abuse Cases Dan Powers This workshop is intended for interviewers, police officers, CPS workers, probation officers, attorneys, judges, social workers, therapists, and anyone else dealing with abused children and their non-offending parents. We will review types of non-offending parents and suggest a consistent approach in dealing with them from investigation through on-going treatment. Your actions can “make or break it” for the next professional dealing with the parent. We will discuss the range of emotions professionals may feel as well as the “do’s and don’ts” of dealing with non-offending parents, emphasizing the need for a collaborative, consistent approach when dealing with them. Repeats Wednesday from 12:00-1:15pm.

T UE SDAY

Julian Sher Across the country, police are revolutionizing the way we tackle sex trafficking, treating teenage girls on the street as victims, not criminals. A federal prosecutor got the first ever convictions against “johns” under federal trafficking statutes. Judges set up a special youth courts to help the girls, not punish them. But we are still losing the battle because of the widespread “pimp culture” in TV, movies, and music videos that demean young women and turn the men who are their human traffickers into pop icons. Share the lessons and insights from Julian Sher’s book, “Somebody’s Daughter: The Hidden Story of Americas Prostituted Children.” Repeats Wednesday from 12:00-1:15pm.

Vehicle System Forensics

DALLAS D2

CITY VIEW 6

AUSTIN 1

Tools in the Toolbox: NCMEC’s Efforts to Help Combat Child Sexual Abuse Images Online Jennifer Newman NCMEC’s efforts fighting online child sexual abuse goes well beyond the CyberTipline. Working globally with industry and law enforcement to protect child victims, NCMEC encourages a multi-faceted approach to attack this problem. In this workshop you will learn about the many tools being used around the world to reduce the amount of child sexual abuse material online. Highlighted topics will include PhotoDNA, blocking & filtering, industry reporting, and the policy implications of each. DALLAS A1

Unmasking the Sexual Offender (Part 2 of 2) Veronique Valliere LONE STAR C2, See pg. 28 for description.

DALLAS POLICE ASSOCIATION

HOSPITALITY EVENING TUESDAY, AUGUST 12 6:00 PM 1412 Griffin Street East

The Dallas Police Association—the original, and largest police employee group for Dallas police officers with over 3,500 active and retired members—will host a hospitality evening. Please join us for an opportunity to network and meet new friends. Transportation to the DPA office will be provided on the Ground Floor of the Sheraton Hotel, just past the Draft Sports Bar. The office is located approximately two miles from the Sheraton Dallas Hotel. It is a short cab ride if you miss the bus. Please enjoy your beverages before boarding the bus. There will be no alcoholic beverages allowed on the buses. The last bus will leave the event at 10:45pm.

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

37

CASE STUDIES & WORKSHOPS WEDNESDAY, AUGUST 12 Schedule at a glance:

7:00-8:30 AM

Light Continental Breakfast Registration/Check-In Lone Star Foyer

8:00 AM-5:00 PM

NCMEC CVIP Lab Open

Live Oak Room

WEDNESDAY

9:45-10:15 AM Break

Refreshments Provided

10:30 AM-1:30 PM

Tour of the Dallas Children’s Advocacy Center with Lunch Visit the Questions Booth for Tour Information

11:30 AM-NOON Break

No Refreshments Provided

1:15-1:45 PM Break

No Refreshments Provided

3:00-3:30 PM Break

Refreshments Provided

7:00 PM

Rustic Rodeo: Conference Networking Event Lone Star Ballroom

7:45 PM

Drawing for Tablet For those who attended Exhibitor Workshops (Must be present to win)

Case Studies are marked with an asterisk ( * ) 38

Each session is listed by time block.

8:30-9:45AM *Amanda’s Story: The Perfect Storm Carol Todd DALLAS C, See pg. 35 for description

*Are Collectors of Child Pornography the Child Molesters of the Future? (Part 1 of 2) Joe Sullivan LONE STAR B, See pg. 20 for description.

Corroborating Child Sexual Assault Disclosures Mary Langer, Nancy Oglesby AUSTIN 1, See pg. 18 for description.

*(The) BluePillow Child Pornography Investigation

Craigslist Investigations

Kevin Papineau, Brie W., Nicole W. LONE STAR C1, See pg. 18 for description.

Building Resiliency in the Workforce When Your Job is Investigating Child Abuse Debra Anderson, Kimberly Day Child abuse investigators know firsthand the impact child welfare work can have on staff and teams. This workshop will present tools for the development of an organizational resiliency model— based on OVC’s National Victim Assistance Academy’s curriculum on Resiliency. Participants will learn the five core elements of Resiliency and how this model uses policies, supervisory techniques, and training to implement specific strategies that support resiliency. This workshop will provide an overview of the organizational resiliency model and concrete strategies that organizations can implement. Repeats Thursday from 8:30-9:45am. SEMINAR

Child Abuse and Neglect Fatalities: Learning from Tragedy Kathryn Sibley Horton Understanding child abuse and neglect fatalities is an important step to designing prevention and intervention strategies. This workshop will cover what is an abuse/neglect fatality, data and examples to help inform interventions, and various prevention strategies that go beyond the basics. Participants will walk away with several tools to help increase their knowledge about the difference between a child fatality caused by abuse/neglect D a l l a s , Te x a s |

Comprehensive Offender Management: Exceeding the Letter and the Spirit of the Law LONE STAR A4, See pg. 27 for description.

Julie Stauffer DALLAS A2, See pg. 20 for description.

|

DALLAS A1

Joe Gauthier

Blocks and Problems in Forensic Interviewing

August 10-13, 2015

and an accidental child fatality, what information first responders/investigators can gather to help determine the difference, what data about CPS can confirm about child abuse/neglect fatalities, and innovative ways for communities to strengthen prevention and intervention efforts. Repeats Thursday from 8:30-9:45am.

Wayne Nichols DALLAS D3, See pg. 33 for description.

Defending the Forensic Interview in Court Rita Farrell The field of forensic interviewing is a constantly evolving profession. This presentation will give attendees concrete suggestions for defending their work in court and handling themselves in a direct examination. The presenter will discuss common cross-examination tactics and how to respond to them. DALLAS D1

Empowerment vs. Expectations: A Revolution in Children’s Safety Stephen Daley This workshop will present a “revolution in prevention education,” a methodology built on empowerment to provide children with real skills and the opportunity to recognize, avoid, resist, and escape predatory violence, harm, or manipulation. The presenter will discuss a formula that trains and empowers children with the ability to plan and react at both a cognitive and instinctive level if they find themselves in danger. If you are getting tired of responding after the crime and victimization and are hoping or looking for an effective way to make it harder for the predator to hurt our children in this world today, we hope you will join us. DALLAS A3

cacconference.org

Five B’s of Child Physical Abuse: Bruises, Burns, Bones, Bellies, and Brains (Part 1 of 2) Kristen Reeder This workshop will review the variety of injuries seen in cases of child physical abuse. The discussion will be case based and include examples of abusive and non-abusive injuries. The lecture will be geared toward CPS workers, law enforcement investigators, and attorneys to learn the basic aspects of child physical abuse injuries. DALLAS B

(The) Front Line Worker: Child Abuse and Injury Investigation and Reconstruction (Part 1 of 2)

LONE STAR C3

Gangs and Child Abuse (Part 1 of 2) Jabari Howard, Doug Millican The median age of criminal street gangs is getting younger. Popular culture and social media have made it “cool” to be in a gang. In the city of Dallas alone, there are nearly 10,000 documented gang members and over 100 documented criminal street gangs. For law enforcement, dealing with a criminal offense involving a member of a criminal street gang or gang-related conduct can present its own challenges. If that criminal offense involves elements of child abuse, the challenge is even greater. This presentation will give participants an understanding of the fundamentals of gang recognition, documentation and investigation. In addition, the presenters will discuss several prior cases where the worlds of gangs and child abuse met. Repeats Thursday from 8:30-9:45am. LONE STAR A1

Summer Elmazi This presentation will explore problems that often arise in the investigation and prosecution of child abuse cases. The discussion will include examples of issues that prosecutors commonly encounter before and during trial and advice that each member of a multi-disciplinary agency team can use to improve the quality of child abuse cases filed with the courts. REMINGTON

Interrogations and Confessions: A Debate Between Cops and a Defense Attorney Mike Krapfl, Joshua Tepfer, Jonathan Turbett From the unique perspective of a defense attorney, this presentation will discuss evolving legal issues related to custodial interrogations and confessions, including special issues when your suspect is a juvenile. The presentation will discuss best practices to ensure that your interrogations result in constitutionally permissible confessions that can survive defense motions to suppress. The presentation will also explain how certain psychological tactics can induce false confessions and provide tips on how to how to distinguish between true and false confessions. Repeats Wednesday from 12:00-1:15pm. LONE STAR C4

Just the Facts: Successful Interview Strategies (Part 1 of 2) Thomas McGreal “Just the facts” was what Sgt. Joe Friday of Dragnet used to tell the witness. Officers and investigators are called upon daily to interview victims, witnesses, and suspects to obtain case details, providing the foundation for investigations. But the fact gathering interview is much more than asking who, what, where, when, how, and why. This session focuses on new research into the fact gathering interview and how witnesses and victims store and retrieve memories. Learn a new structured approach to develop information without contaminating a witness’s memory or eliciting false information. LONE STAR A2

Leveraging Cell Phone Numbers and Data to Locate and Convict Child Predators

|

D a l l a s , Te x a s |

CITY VIEW 8

*Looking for Love in All the Wrong Places Amy Derrick, Carmen White LONE STAR C2, See pg.34 for description.

Multimedia Based Investigations: Early Discovery and Victim Identification Using FaceDNATM Biometric Facial Recognition John Bradley This is an exhibitor workshop by SiQuest, exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 7, See pg. 28 for description.

Protecting Children by Getting Mom Out of a Domestic Violence Situation Kristen Howell Protecting children who live in a home with domestic violence is both frustrating and challenging for law enforcement, CPS, and child advocates. Children in these settings are not only exposed to the violence they witness, they are often abused themselves. To combat this problem, professionals must feel a sense of urgency to create a safe environment for the child—one that is free from domestic violence. This presentation will discuss ideas and strategies that will allow you to use your sense of urgency to prepare the mother for the long ‘marathon’ of leaving the violent relationship and protecting her children. AUSTIN 2

Zach Artz, Richard Spradley Do you need to know who belongs to a cell phone number? Discovering this quickly is key to the capture of child predators. Conversely, in order to build the case and ultimately convict these people, the data pulled from their phones can seal the deal. Learn how to leverage a

August 10-13, 2015

simple tool via text messaging to help you discover, in near real time, who belongs to a phone number and dramatically accelerate your investigations. In addition, learn how cell phone data has become one of the most utilized tools to apprehend and convict criminals. Gain an understanding of how and what data can be extracted from a suspect’s phone to support the case; this includes data that the user believes is private and erased. This is an exhibitor workshop by HDREdge exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win.

WEDNESDAY

Jim Holler Physical abuse, sexual abuse, and neglect of children can happen anywhere. Anyone, regardless of social, economic, or educational level, can physically abuse or neglect a child. Investigators must be able to recognize the behaviors of abusive parents or caretakers and be able to process important information related to the assessment of soft tissue injuries in victims of child abuse. This workshop will address the duties of the investigating police officer and CPS worker as they begin to investigate a child abuse complaint and what evidence should be collected in every case. Investigators will be provided with the essential information on the abuse and neglect of children, the dynamics of physical abuse, and the reconstruction and investigation of soft tissue injuries.

Handling Common Problems in Child Sexual Abuse Cases

8:30-9:45 AM CONT’D ON NEXT PAGE.

cacconference.org

39

8:30-9:45 AM CONT’D Smartphone and Tablet Forensics with Magnet IEF

WEDNESDAY

Rob Maddox This hands-on lab session is for forensics examiners who use Magnet IEF in the investigation of Internet child exploitation cases. This lab will provide instruction on how to best use Magnet IEF and Magnet ACQUIRE to find, analyze, and report more smartphone Internet and App evidence. Learn how to use IEF to dig deeper and find more evidence than ever before in your smartphone and tablet examinations. Session attendees will receive a free trial copy of Magnet IEF and Magnet Acquire. This is an exhibitor workshop by Magnet Forensics exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. Repeats Wednesday from 10:15-11:30am. CITY VIEW 6

*Tracking the Bus Stop Rapist Frederick Harris, Sheilah Priori This case study will detail the abduction and rape of a child as she walked to the school bus stop in the early morning hours of December 2010 in Killeen, Texas. Unfortunately, this was not the first time a child had been taken from the bus stop and raped in this town. The presentation will cover the medical aspects of a pediatric sexual assault exam. The presenters will discuss how law enforcement was able to track a serial rapist with the help of the forensic nurse, a brave nine year-old girl, the sketch artist, a live line up and the use of hypnosis during the investigation. The presentation will discuss the lessons learned in this case. Repeats Thursday from 10:15-11:30am. AUSTIN 3

Understanding Sex Offenders (Part 1 of 2) Jim Tanner This workshop focuses professionals on the cognitive set of the interfamilial and position of trust sex offender. We will expand and clarify elements of investigation, prosecution, and effective containment. We will discuss sex offenders’ perceptions, ideation, grooming strategies and cognitive processes. The impact of the Internet and the offenders’ digital behavior will be explored and explained. Participants will leave this session with a new understanding of sex offenders, their thoughts, and digital behaviors which will enhance the ability to investigate, prosecute, supervise, and treat sex offenders. LONE STAR A3 40

Wellness/Survival and the MDT Approach to Child Abuse Dan Powers This presentation is meant to provide you with the insight and knowledge to help survive in a job no one else really understands. People “outside the business” don’t want to hear about this stuff! You can clear a restaurant with a discussion of what you did that day. We see and hear things on a daily basis our mom and dad never told you existed in this world. Participants will learn how dynamic determination and working as a member of THE TEAM will help you survive in “our world.” Based on the wisdom of Kermit the Frog, participants will be encouraged to look at themselves, why they do “this” for a living and most of all learn to laugh at it all. Repeats Wednesday from 1:45-3:00pm. DALLAS D2

10:15-11:30AM Accident or Inflicted: Investigator, You Decide Jim Sears DALLAS D3, See pg.31 for description.

*Amazing Grace: The Murder of a Toddler and the Cover-up Robyn Busby, Zeke Fortenberry This presentation will detail the investigation and successful prosecution of Melinda Muniz for murdering her boyfriend’s two year-old daughter and her attempt to cover-up what she did by claiming an intruder assaulted her and the child. When the police responded to a 911 call, they found Muniz lying on the living floor with duct tape across her mouth and her pants pulled down to her knees. In the adjacent bedroom, Grace was found the same way. Grace never regained consciousness and was taken off life support three days later. When questioned, Muniz claimed she was the victim of a home invasion but later claimed she had amnesia, and could not remember anything from the past two years. This presentation will discuss the investigative techniques used to make the case against Muniz. The presentation will also cover the prosecutorial decisions relating to the death penalty, plea negotiations, and trial strategy. Repeats Thursday from 10:15-11:30am. DALLAS C

Anatomy of a Child Sexual Abuse Case for CACs Francey Hakes This workshop will offer insight into the trial of

a criminal child sexual abuse case for children advocacy center personnel. Attendees will hear the prosecution and defense perspective on trial strategy and will learn common tricks and traps that will allow them to become great witnesses for the prosecution. AUSTIN 3

*Are Collectors of Child Pornography the Child Molesters of the Future? (Part 2 of 2) Joe Sullivan LONE STAR B, See pg. 20 for description

But, I Love Him: When Victims Love Their Offenders (Or Think They Do) Nakisha Biglow, Carrie Paschall Interviewing children and teenagers who have been sexually victimized can be challenging in itself, but it can be especially challenging when they do not see themselves as victims, but feel that they are in loving relationships with their offenders. The feelings they have can often create blocks to disclosure that can be difficult to overcome. This presentation will offer suggestions on how to ask questions in a way that can gather helpful information without further complicating the emotional challenges the victim already faces. The presentation will include lecture, case study, and video clips to assist in the learning process. The case studies will include cases of student/teacher and youth/ pastor sexual relationships. Repeats Thursday from 8:30-9:45am. LONE STAR C4

Conducting Effective Sex and Violent Offender Investigations: Policies, Protocols, and Procedures Joe Gauthier, Kyle Hoertsch LONE STAR A4, See pg.29 for description.

Digital Evidence Awareness Colin Fagan Whether you are involved in the investigation of missing or abducted children, child sex trafficking, or any other investigation or prosecution that may be facilitated by technology, this workshop will improve your awareness of the capacity and capabilities of digital evidence in improving investigative outcomes and prosecutions, and provide more effective supervision of offenders. Information will be provided on the proper identification, preservation, and basic analysis of digital evidence that may be found on physical devices or may be maintained by service providers. Law enforcement attendees will also receive a Technology Investigations Resource Guide. Repeats Thursday from 8:30-9:45am. DALLAS A1

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

Donuts and Dongles Glynn LeBlanc Join us for a hands-on workshop...And donuts! You will receive a Nuix trial dongle to load onto your personal laptop, and we will walk you through set-up and process a test case. This is a great opportunity to become familiar with the software, ask questions, and understand why Nuix is unique in the industry. Come for the donuts, stay for the Nuix knowledge! This is an exhibitor workshop by Nuix North America exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 8

Amy Russell This workshop will discuss institutions that fail to adequately respond to child maltreatment within their purview. Issues of perpetrator protection and institutional loyalty will be discussed and suggestions will be offered as lessons learned from recent high-profile cases. DALLAS A3

Fatal Distraction: Kids in Cars Mary-Ann Burkhart Perhaps some of the most tragic and preventable deaths of children involve children left in vehicles. This workshop will explore the reasons given, what happens to children in cases of hyperthermia, how to effectively investigate and prosecute these specific cases of parental neglect, and how to meet dishonest defenses. AUSTIN 1

Five B’s of Child Physical Abuse: Bruises, Burns, Bones, Bellies, and Brains (Part 2 of 2) Kristen Reeder DALLAS B, See pg. 39 for description.

Following the Evidence in the Forensic Interview Julie Kenniston DALLAS A2, See pg. 27 for description.

(The) Front Line Worker: Child Abuse and Injury Investigation and Reconstruction (Part 2 of 2) Jim Holler LONE STAR C3, See pg.39 for description.

Gangs and Child Abuse (Part 2 of 2) Jabari Howard, Doug Millican Repeats Thursday from 10:15-11:30am. LONE STAR A1, See pg. 39 for description.

Don Lewis Devices that connect to the Internet must have two things, an Internet protocol (IP) address and a MAC address. Similar to a phone number identifying and routing a phone call to a telephone, an IP address identifies a device on the internet and routes traffic to that device. There are 4.3 billion available IP addresses in IPv4, all of which were exhausted February 3, 2011. The creation of IPv6 vastly expands the number of available IP addresses. This session discusses changes in Internet addressing, the advantages, limitations and risks to investigations, introduced by migration from IPv4 to IPv6. Attendees will learn methods for identifying and tracking IPv6 addresses. REMINGTON

*Joshua Karr: Preying on the Willing Victim Lauren Hopkins, Crystal Levonius DALLAS D1, See pg.23 for description.

Just the Facts: Successful Interview Strategies (Part 2 of 2) Thomas McGreal LONE STAR A2, See pg. 39 for description.

*Lucas Michael Chansler: A Case Study in Online Sextortion

key programs to help prevent the victimization of children. Based on evidence and research gathered by our internal teams, comprehensive educational and awareness messaging is delivered free of charge to the public. In this workshop, you will learn about the NCMEC prevention programs for professionals to educate communities to help keep children safer online and in the real world. SEMINAR

Prosecuting the Purchaser: How to Attack the Demand for Human Trafficking Dalia Racine There has been great success in prosecuting the exploiters/pimps involved in the Commercial Sexual Exploitation of Children and Human Trafficking cases. Now our focus is being broadened to make sure the demand side of exploitation is addressed. Apprehending the purchaser can be difficult. However, with law enforcement using low-tech and high-tech techniques, it is possible. By looking at techniques and case studies, this presentation will explore methods to building a successful case against the purchaser. Participants will have a better understanding of the demand side and how we can hold these individuals accountable. Repeats Thursday from 10:15-11:30am.

WEDNESDAY

Failure to Protect: Institutional Response to Child Sexual Abuse

(The) Internet: Once a Village (IPv4) Now a Universe (IPv6)

LONE STAR C2

Smartphone and Tablet Forensics with Magnet IEF

Lawrence Meyer, Ashley Reynolds LONE STAR C1, See pg.19 for description

Online Investigations: Track, Identify, and Locate Cyber Criminals, Associates, and Website Targets Using Internet Examiner® Toolkit John Bradley This is an exhibitor workshop by SiQuest, exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 7, See pg. 30 for description.

Rob Maddox This is an exhibitor workshop by Magnet Forensics exhibiting on the 2nd floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 6, See pg. 40 for description

Understanding Sex Offenders (Part 2 of 2) Jim Tanner LONE STAR A3, See pg. 40 for description.

Overcoming Anti-Forensics and Showing Intent ​Zeus Flores, Jad Saliba​ DALLAS D2, See pg. 36 for description.

10:15-11:30 AM CONT’D ON NEXT PAGE.

Power in Prevention: A NCMEC Perspective Russell Petty Prevention provides ways to strengthen individual knowledge and skills, promote community education, change organizational practices, and influence policy and legislation. The National Center for Missing & Exploited Children (NCMEC) offers vital information and

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

41

10:15-11:30 AM CONT’D Youth, Technology, and Today’s Trends

WEDNESDAY

Christine Feller, Melissa Hemzacek Technology integration, which encourages social interaction and self-expression, presents new opportunities for youth and challenges for parents, teachers, and law enforcement as we work together to keep children healthy and safe. This workshop provides case examples of current technology use and online behavior of youth, with consideration to their social and emotional development. The presenters will also offers tools including: teacher training modules, student climate surveys, social norming posters, and online action days, to help facilitate ongoing digital safety lessons. Topics to be covered include: cyberbullying, sexting, online privacy, and digital citizenship. Repeats Thursday from 8:30-9:45am. AUSTIN 2

12:00-1:15PM All About That Data: Maximizing Sex Offender Registry Information Dannah Vardaman Linking registered sex offenders, whose whereabouts are unknown, to open and unsolved missing/exploited child cases is of great potential benefit. This presentation will focus on the free analytical resources the National Center for Missing & Exploited Children (NCMEC) can provide law enforcement regarding noncompliant sex offenders. The presenter will discuss how NCMEC’s Sex Offender Tracking Team (SOTT) can support law enforcement by conducting batch searches to assist with updating registry data and to support compliance operations, providing in-depth analysis and other ongoing support. SOTT is constantly bringing together various resources to assist law enforcement in locating noncompliant sex offenders and identify linkages. Using case examples we will discuss the utilization of public record databases, NCIC/Nlets, NCIC Offlines, timelines, NCMEC databases, and other available OSINT. DALLAS A1

*Ariel Castro: Working Together to Achieve Justice (Part 1 of 2) Saleh Awadallah, Anna Faraglia LONE STAR B, See pg. 26 for description

Barriers in Interviews of Spanish Speaking Children Lisa Martinez Many barriers arise during the investigation 42

and prosecution of child abuse cases involving Spanish-speaking families. Cultural and linguistic barriers can be addressed by properly trained Spanish speaking forensic interviewers, and through multidisciplinary team collaboration and training. This workshop will focus on identifying ways to overcome culturally influenced blocks to disclosure, and language barriers unique to the Spanish speaking population within the forensic interview and throughout the investigation. The impact of family dynamics on both the disclosure process and investigation process also will be explored. Portions of forensic interviews conducted in Spanish and case examples will be used throughout this presentation. Repeats Thursday from 8:30-9:45am. AUSTIN 1

Compassionate Listening: A First Aid Tool for Interacting with Trauma Survivors Christopher Anderson For many survivors, disclosing a painful past is often met with doubt, anger, or apathy. These negative reactions can reinforce feelings of shame and fear. This workshop will discuss how the initial response to a trauma or abuse disclosure can dramatically influence whether the individual will further engage with law enforcement. Attendees will learn the basics of Compassionate Listening, a skill that can be learned and could have a powerful impact on our society. AUSTIN 3

Conducting Risk Assessments of Child Pornography Offenders Darrel Turner DALLAS D3, See pg. 33 for description

*(The) Diary of a Predator Nancy Hebert, Cindy Pulcher, Jimmy Wiggins LONE STAR A1, See pg.20 for description

“I Would Never Hurt My Child”: Identifying Accidental vs. Non-Accidental Trauma Deborah Kleypas Every day children arrive in emergency rooms with injuries to their body. Many are diagnosed with abrasions, bruising, broken bones, and burns and head injuries. Some children are able to tell what happened to them, but many cannot. Often it is the parents or guardians who provide the history of what happened. “She fell off of the bed.” “His brother pushed him down the stairs.” “She grabbed the cup and spilled the hot water down her legs.” Or sometimes simply, “I don’t know what happened.” When

August 10-13, 2015

|

D a l l a s , Te x a s |

caregivers are questioned about child injuries they often state, “I would never hurt my child.” However, research and experience tells us otherwise. This presentation with case studies aims to provide information to help aid in the recognition of injuries caused by accidents vs. injuries inflicted by a caregiver, a vital skill necessary for all involved in the care of children. Repeats Thursday from 10:15-11:30am. DALLAS A3

Interrogations and Confessions: A Debate Between Cops and a Defense Attorney Mike Krapfl, Joshua Tepfer, Jonathan Turbett LONE STAR C4, See pg.39 for description

Interviewing the Reluctant Child Rita Farrell This workshop offers concrete guidance for forensic interviewers or investigators called on to interview a child who is reluctant or fearful of making a disclosure. DALLAS D1

*(The) Kidnapping and Murder of Polly Klaas (Part 1 of 2) Eddie Freyer LONE STAR A2, See pg.33 for description

Revenge Porn: A New Crime Takes Shape Across the Country Shannon O’Brien “Revenge Porn” has become a well-known problem around the country in recent years, and as media coverage has increased, so too has the interest of legislators around the country. The number of states that have passed laws criminalizing such behavior has exploded. This workshop will discuss what investigators and prosecutors need to know about what behaviors are covered by the laws, how to present them to judges and juries, and the likely constitutional challenges that will be faced. The presenter will explain how these crimes apply to minors, both as victims and perpetrators, and how these new laws may present a charging alternative to other offenses that may label minors as sex offenders for the rest of their lives. Repeats Thursday from 10:15-11:30am. DALLAS B

Sexual Abuse Prosecution 101 Melinda Westmoreland This workshop will focus on the basics of child sexual abuse prosecution. This will include both case evaluation and case preparation. The presenter will take you through what to do when a sexual abuse case lands on your desk. Repeats Thursday from 8:30-9:45am. DALLAS A2

cacconference.org

Shades of Gray: Balancing Discovery Obligations and Victims’ Rights Linda Seabrook, Nathan Stump DALLAS D2, See pg. 36 for description

Somebody’s Daughter: How Pimps Play the Prostitution PR Game Julian Sher LONE STAR A4, See pg. 37 for description

Suffer from Burnout? Give’em the F.I.N.G.E.R.!     Mark Yarbrough Repeats Thursday from 10:15-11:30am DALLAS C, See pg. 34 for description

*When the Bough Breaks Matthew Cox, Sandy Moreland, Reynie Tinajero LONE STAR A3, See pg. 24 for description

Dan Powers AUSTIN 2, See pg.37 for description

1:45-3:00PM 3D Printing: Non-Accidental and Other Pediatric Trauma Jonathan Morris DALLAS A2, See pg. 32 for description

After the First 48: From Indictment to Trial Marci McClellan Curry, Sherre Thomas DALLAS B, See pg. 18 for description

*Ariel Castro: Working Together to Achieve Justice (Part 2 of 2) Saleh Awadallah, Anna Faraglia LONE STAR B, See pg. 26 for description

*Benjamin Cuadrado: The Evil Next Door Terri Botterbusch, James Kilpatrick, Jennifer Peresie LONE STAR C4, See pg.18 for description

Child Pornography Offending: Analysis of Data from NCMEC Cierra Buckman, Jennifer Newman In an effort to better serve law enforcement and inform the field of child pornography offending, the National Center for Missing & Exploited Children (NCMEC) has partnered with both the THORN Foundation and a team of expert researchers to analyze over a decade of victim and offender data. Designated as the national clearinghouse for child pornography cases, NCMEC’s Child Victim Identification Program (CVIP) provides insight into trends in child pornography

REMINGTON

Controversies in Abusive Head Trauma (Part 1 of 2)

*Decision Point: How and Why Did Jackson Curtis Really Die? Daniel Dawson, Amy Zacharias This case study details the life and death of abusive head trauma victim, Jackson Curtis. During his short five-month life, Jackson was repeatedly subjected to physical abuse by his biological father who was ultimately convicted of First Degree Murder. This presentation will detail successful investigative and prosecutorial techniques where abusive head trauma is suspected, including interview and custody issues, preservation of key evidence, as well as overcoming complicated victim medical histories. We will review the testimonies of defense medical experts from England, Colorado and North Carolina and show successful strategies in how to handle such experts and refute their conclusions. Lastly, this presentation will discuss how a close-working relationship with your own experts makes all of the difference in obtaining a conviction for murder. Repeats Thursday from 10:15-11:30am. LONE STAR A1

Does Race and Culture Matter When Handling a Child Sexual Abuse Case? An African American Victim’s Perspective JJ Staples How does child sexual abuse differ in the African American community? Or, is the problem of child sexual abuse considered to be the same in other communities? This workshop will delve into the differences in the African American community from those of other communities. Although there will be many similarities and overlap of African American children that have been sexually abused, the participants will be charged with drawing their own conclusions. The primary purpose is to stimulate healthy discussions and understanding for the need of further research to develop inclusive policies, investigative strategies, and treatment needs. This is an exhibitor workshop by JJ Staples Enterprises, exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded |

D a l l a s , Te x a s |

CITY VIEW 6

Facebook: Working with Law Enforcement Jason Barry, Emily Vacher AUSTIN 1, See pg.30 for description

Forensic Interviewer in the Courtroom (Part 1 of 2)

Reade Quinton LONE STAR C3, See pg.33 for description

August 10-13, 2015

Wednesday evening at the social event. You must be present to win.

Rachel Burris, Carrie Paschall This presentation will be a basic course for new interviewers who have not yet testified or have only testified a handful of times and are nervous about the process. The first session will cover how to best prepare yourself for court once you’ve been notified that you will be needed as a witness. This presenter will cover the importance of maintaining accurate records and creating and updating your CV. In addition, this presenter will discuss tips on how to review your interview in such a way that maximizes the amount of quality information for your testimony, reviewing literature and trial prep with your DA. The second session will focus on taking the witness stand. This presenter will cover detailed questions every interviewer should be prepared to answer, tips for being the best witness you can possibly be, and how to handle cross examination with professionalism and ease.

WEDNESDAY

Working with Non-Offending Parents in Child Sexual Abuse Cases

offending, including differences in familial and non-familial cases, egregiousness of sexual content, and case initiation methods. This joint presentation will give an overview of NCMEC’s Child Victim Identification Program as well as the research team’s preliminary findings.

DALLAS D1

Help ID Me: The Nation’s Nameless Children Jessica Kenton, Carol Schweitzer The staggering number of missing and unidentified person cases in the U.S. has been deemed the nation’s “Silent Mass Disaster” by NIJ. There are thousands of human remains across the country that are nameless. In 2011, NCMEC created the Unknown Victim Identification Program that specializes in providing resources to medical examiners, coroners and law enforcement to help name the unidentified that are deemed to be children. UVIP partners with NCMEC’s Case Analysis Unit to provide investigating agencies technical assistance and analytical support. This lecture will discuss the methodology NCMEC uses in approaching unidentified child cases and the resources available to authorities investigating these cases. The presenters will discuss case examples to show how forensics, detailed analysis and public exposure can help identify these children. AUSTIN 2

1:45-3:00 PM CONT’D ON NEXT PAGE.

cacconference.org

43

1:45-3:00 PM CONT’D Interrogation: A 360-Degree Perspective (Part 1 of 2) Kevin Navarro, John Palmer LONE STAR A3, See pg. 21 for description

*Israel Berrios-Berrios: Priest, Godfather, and Predator (Part 1 of 2) Edgardo Motta, Marshal Morgan, Alek Pacheco LONE STAR C1, See pg. 21 for description

*(The) Kidnapping and Murder of Polly Klaas (Part 2 of 2) Eddie Freyer LONE STAR A2, See pg. 33 for description

WEDNESDAY

LETS​:​ ​C​overt ​P​hone ​S​ystem for ICAC ​I​nvestigations Ryan Glover In today’s world people communicate using their phones. In this workshop we will demonstrate how the LETS phone system can be useful in an ICAC investigation. The LETS MRP system allows agents to capture phone calls, text messages and MMS messages. Agents can use the LETS system for all their recording needs. Follow-up calls, pretext or one party calling, incoming/outgoing calls, interviews and more. LETS is ideal for Internet based operations such as human trafficking and ICAC investigations. This is an exhibitor workshop by LEA/AID exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 7

OK, You Got This Case, Now What? Jim Sears DALLAS D3, See pg. 36 for description

Online Parental Monitoring: Privacy vs. Safety? Erika Miller, Rich Wistocki In today’s digital age, parents are conflicted with staying aware of their kids’ online activity while worrying they are invading their privacy. In this workshop, Detective Rich Wistocki explains the importance of monitoring children’s online activity through all devices they use to access the Internet. Detective Wistocki’s first-hand experience with cybercrimes involving children allows him to help teach parents the importance of using all online safety measures including online monitoring software. Following Rich’s presentation, Erika Miller, WebWatcher’s Director of Online Safety will demonstrate WebWatcher’s award winning, centralized monitoring solution 44

which allows parents to view all online activity across all devices through one interface. All participants will receive a free trial of the software and special discounts for groups they serve who may want to use the software. This is an exhibitor workshop by WebWatcher exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 8

*(The) Poison of a Mother’s Love (Part 1 of 2) Michael Weber This presentation will detail the investigation of a case of Medical Child Abuse (formerly known as Munchausen Syndrome by Proxy). The lecture will detail the case of Hope Ybarra, a college educated woman who presented her child as sick for years, highlighted by a false diagnosis for Cystic Fibrosis, the needless placement of a feeding tube, and multiple suspicious anemic episodes. Ybarra’s access to multiple pathogens through her employment as a laboratory supervisor for a food testing company, including pathogens that ended up inside her daughter will be discussed. The presenter will show video of Ybarra’s interview, which includes her shocking admissions. During the presentation, effective investigation techniques that can be used by both law enforcement and Child Protective Services when confronted with one of these not so rare cases of child abuse will be highlighted. LONE STAR C2

Presenting Evidence in Victim/Witness Interviews (Part 1 of 2) Amy Allen, Crystal Gregory, Ale Levi Homeland Security Investigations’ “Prepare and Predict Method,” developed by HSI Forensic Interview Specialists, addresses the ever-evolving exploitation cases that are being investigated by HSI and other law enforcement agencies. While maintaining the basic principles of a legally defensible forensic interview, the method stems from experience, research-based protocols and lessons learned. This presentation will provide information for those individuals who interview victims/witnesses in child exploitation investigations and discuss how the evidence can be utilized in both the investigative process as well as for the prosecution. The presenters will use a combination of methodology and case examples. This presentation is best for forensic interviewers, law enforcement, and prosecutors. DALLAS A1

August 10-13, 2015

|

D a l l a s , Te x a s |

*(The) Prosecution of Don Wilburn Collins: Justice Delayed, But Not Denied (Part 1 of 2) Kelly Blackburn, Rob Freyer DALLAS C, See pg. 22 for description

Protecting Missing Children with Special Needs: A Community Effort Robert Hoever, Lindsay Naeder This ‘train the trainer’ workshop will prepare law enforcement and first responders with essential strategies to understand and be prepared to respond effectively and safely to situations that involve individuals with autism and other disabilities. The training will provide participants with a full curriculum to implement to increase department’s critical knowledge of autism, and provides practical tips and strategies for use in the field, as well as a plan of action for subsequent community affairs engagement. This workshop is co-presented by NCMEC and Autism Speaks. SEMINAR

Safeguarding Michael Bourke, Melanie Malterer This presentation focuses on ensuring the psychological well-being of investigative and support personnel who work in the field of sexual abuse and exploitation. The presenter reviews the existing literature in the area of secondary traumatic stress and vicarious traumatization and summarizes important issues for investigators, prosecutors, probation officials, treatment providers, and others who are exposed to disturbing material in the course of their work. Also addressed are ways to build resilience and the use of effective coping strategies. DALLAS D2

Utilitizing Offender Watch® to Find Absconded Offenders Mike Robinson, Joel Shoultz LONE STAR A4, See pg. 35 for description

Wellness/Survival and the MDT Approach to Child Abuse Dan Powers AUSTIN 3, See pg. 40 for description

Whom to Believe: Investigator Bias and False Allegations of Child Abuse Amy Russell While fabricated accounts of abuse, particularly sexual abuse of children, are relatively rare, responses to child abuse allegations by child protection professionals may be impacted by personal biases and expectations. This is particularly true of cases involving female sexual offenders or allegations in the context of divorce and custody disputes. This workshop

cacconference.org

will explore these biases and discuss research on the prevalence and incidence of such cases. DALLAS A3

3:30-4:45PM Child Advocacy Center Executive Director’s Forum

SEMINAR

Controversies in Abusive Head Trauma (Part 2 of 2) Reade Quinton LONE STAR C3, See pg. 33 for description

Ethical Considerations in Child Abuse Cases Mary-Ann Burkhart This workshop will remind child abuse professionals of the need to adhere to their ethical obligations when dealing with cases involving child victims. The presenter will explore ethical scenarios with audience and discuss justice, fairness, and the need to remain above reproach to best serve our youngest and most vulnerable victims of crime. LONE STAR A2

Forensic Interviewer in the Courtroom (Part 2 of 2) Rachel Burris, Carrie Paschall DALLAS D1, See pg. 43 for description

From Dispatch to Verdict: Corroboration in Sexual Abuse Cases Nancy Hebert, Todd Hoff DALLAS D2, See pg. 30 for description

Innovations in Incident Response for Crimes Against Children Jason Sanchez Yaana’s Mobile Investigation & Data Acquisition System (MIDAS) meets multiple challenges that Law Enforcement Agencies face today. Current methods and processes for critical investigations are tedious and extremely slow, marred with manual paperwork causing miscom-

Center for Missing & Exploited Children’s (NCMEC) resources available to investigators working to identify and recover victims of child sex trafficking. Attendees will become familiar with the free analytical resources provided by the Child Sex Trafficking Team (CSTT) at NCMEC, who process hundreds of online advertisements a month, and assist NCMEC CST Case Managers by providing analytical support for the missing cases assigned to them. At law enforcement’s request, CSTT can also assist by completing comprehensive analytical reports regarding possible child victims and their traffickers to provide technical assistance and support to their child sex trafficking investigations. Case examples demonstrating CSTT resources will be used throughout the presentation. REMINGTON

*Israel Berrios-Berrios: Priest, Godfather, and Predator (Part 2 of 2) Edgardo Motta, Marshal Morgan, Alek Pacheco LONE STAR C1, See pg. 21 for description

CITY VIEW 6

*No More Happy Endings: The Demise of MyRedbook

Interrogation: A 360-Degree Perspective (Part 2 of 2)

Marty Parker, Jason Skrdlant AUSTIN 1, See pg. 19 for description

Kevin Navarro, John Palmer LONE STAR A3, See pg. 21 for description.

*(A) Perverted Pair: The Investigation of a Child-Molesting Couple

Investigating and Prosecuting Crimes Against Children in a Global Arena Stewart Robinson With growing sophistication, individuals and criminal enterprises often develop complex schemes in which information, evidence, witnesses, and the perpetrators themselves are located outside the reach of U.S. laws and courts. The success of our investigations and prosecutions are increasingly dependent on assistance from foreign jurisdictions. DOJ’s Office of International Affairs works with U.S. and foreign officials through a network of international treaties, conventions, agreements, understandings, practices, and relationships in an effort to secure the return of fugitives, evidence, and other assistance from abroad. This presentation will discuss mechanisms through which U.S and foreign law enforcement officials, prosecutors and courts can interact to bring those who exploit and abuse our children to justice. DALLAS A2

Laura Carroll This presentation will demonstrate the National |

D a l l a s , Te x a s |

Tyler Smith, Aaron Spivack LONE STAR C4, See pg. 32 for description

*(The) Poison of a Mother’s Love (Part 2 of 2) Michael Weber LONE STAR C2, See pg. 44 for description

Preparing Children for Court Amy Russell Court preparation is invaluable for children required to testify in court. The purpose of court preparation is to assist the child witness in his or her ability to testify truthfully and effectively in a courtroom. This session will discuss the importance of preparing children and their families for court experiences, preparing the court for children, and will provide concrete examples of courtroom modifications and child preparation techniques. DALLAS A3

Presenting Evidence in Victim/Witness Interviews (Part 2 of 2) Amy Allen, Crystal Gregory, Ale Levi DALLAS A1, See pg. 44 for description

Is Only My Pimp Looking for Me? NCMEC Resources for Child Sex Trafficking Investigations

August 10-13, 2015

WEDNESDAY

Lynn Davis, Gene Klein Meet your fellow Executive Directors from around the country for a facilitated discussion regarding leadership issues that you face each and every day. Bring your questions/ issues to this informative question and answer session. This discussion will provide you with options and potential solutions to your most problematic issues. Learning from others in the field and utilizing the experience of fellow Executive Directors can often bring about a new perspective. 

munication and inefficiency between the field investigators and the command staff. MIDAS provides a unique mobile application along with a fully integrated Command Center system. The MIDAS mobile application offers a user-friendly, intuitive, and a case-oriented approach to instantly capturing and organizing various types of data (photos, videos, voice recordings, and notes) using standard smartphones or tablets. The MIDAS mobile application distributes the captured data in real-time from the field to the MIDAS Command Center system, which then processes the field data instantly using advanced text, image, and video analytics capabilities, allowing analysts to rapidly review, create leads, and assign tasks to critical points of interest. MIDAS allows the incident response team to focus on the critical details of a case by eliminating the significant overhead of manual data gathering processes. This is an exhibitor workshop by Yaana Technologies exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win.

3:30-4:45 PM CONT’D ON NEXT PAGE.

cacconference.org

45

3:30-4:45 PM CONT’D *(The) Prosecution of Don Wilburn Collins: Justice Delayed, But Not Denied (Part 2 of 2) Kelly Blackburn, Rob Freyer DALLAS C, See pg. 22 for description

Prosecuting Human Trafficking Cases Brooke Grona-Robb CITY VIEW 7, See pg. 30 for description

*Sextortion: How Facebook Tracked Down a Global Predator Julian Sher, Carol Todd LONE STAR B, See pg. 28 for description

Tor for Investigators James Kilpatrick This presentation will provide investigators with an overview of what Tor is and how Tor works. It is not designed to be a solution for investigating criminal activity on Tor or overcoming anonymity. The presenter will provide an exposure to criminal activity on Tor and a basic understanding of the functionality of the three components of Tor: the Tor Network, the Tor Browser Bundle and Tor hidden services. Attendees will become familiar with identifying Tor activity, understanding the anonymity obtained by using Tor and an appreciation for why criminals would want to utilize Tor for Illicit activity. AUSTIN 3

Traffic Jam: Unlocking Online Data to Fight Human Trafficking (Includes Free Trial Access to Software) Lisa Tu Each day, thousands of internet classified ads are used to market unlawful activities. Behind many of these ads are underage victims of sex trafficking and the organized criminals who exploit them. Learn about an intelligence and time-saving tool to combat these crimes and identify exploited victims. Traffic Jam, our web-

based tool, allows users to follow-up on tips and identifies new high-potential leads in readily available data that is much too large for humans to sift through by hand. Benefits include the ability to track criminals and victims using previously known numbers and images to reduce manhours in investigations by leveraging prompt and comprehensive summaries of suspicious activity exposed in online data and proactively review local alerts for suspicious content within mounds of daily postings. This session provides training, live demonstration, and access for audience members, as well as highlighting previous success stories. This is an exhibitor workshop by the Marinus Analytics exhibiting on the 1st floor. Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win. CITY VIEW 8

*Trafficking Children for Sexual Exploitation Joe Sullivan LONE STAR A4, See pg. 32 for description

Understanding and Investigating Burn Injuries Jim Holler DALLAS D3, See pg. 24 for description

Understanding the Psychopathic Sex Offender Melanie Malterer News media are filled with accounts of heinous crimes of child maltreatment ranging from abuse and neglect to child abduction and homicide. People are often left scratching their head, asking, “Who are these people?” “Why would someone do such a thing?” This workshop seeks to shed light on those questions by focusing on one type of particularly callous, predatory offender the psychopath. Attendees will learn the prevalence rates of psychopathy in society and prison populations. Distinctions will be made between

what psychopathy is and what it is not, including the oft-confused diagnoses of Antisocial Personality Disorder and Sexual Sadism. The audience will be given strategies for the identification of psychopathic traits and how to utilize this information in investigative contexts. Repeats Thursday from 8:30-9:45am. DALLAS B

Vctim Identification: A Global Response to Child Rescue Lauren Schuette Coffren, Jim Cole Many children never disclose the fact that they were sexually abused and pornographically photographed. As this crime knows no borders, neither can the law enforcement response. The U.S. has an unprecedented number of experienced law enforcement agencies working in conjunction with NCMEC seeking to locate children through a victim-centric perspective of approaching child pornography cases. This workshop will be co-presented by NCMEC and HSI and will highlight several case studies of how child victims have been identified all over the world because of images seized by U.S. investigators. In addition, participants will learn techniques of victim identification and how they can become more involved in the complex search for these child victims. LONE STAR A1

X-Ways Forensics Overview Eric Zimmerman This presentation will discuss how X-Ways Forensics can be used for common forensic tasks including imaging, finding data via filters and searching, and generating reports. X-Ways Forensics has many unique features that will also be covered including PhotoDNA support, extensive data recovery options, and more. Attendees will see how X-Ways can be used to streamline the exam process, allowing examiners to do more in less time. AUSTIN 2

LOCATED IN LIVE OAK

during any of the following times: MONDAY 10:00-5:00 | TUESDAY 8:00-5:00 | WEDNESDAY 8:00-5:00 | THURSDAY 8:00-12:00

VISIT THE NCMEC CHILD VICTIM IDENTIFICATION LAB Many children have been rescued from further sexual abuse because a clue in the background of child pornography images led to the location of their abuse. The National Center for Missing & Exploited Children is proud to bring the “Victim Identification Lab” back to the Dallas Crimes Against Children Conference for the tenth year. NCMEC will offer all registered participants at this year’s Conference a glimpse into this powerful tool designed to help law enforcement and social service agencies in their efforts to identify and rescue these children. Within this interactive lab, computers will be available for participants to access background identifiers and audio clues in 46

August 10-13, 2015

|

hopes that these items may be recognizable or familiar to Lab participants. Accompanying each sanitized picture will be a real-time message thread where participants can post their comments and suggestions. You may have the piece of the puzzle that could lead to the rescue of a child victim. Please visit the Lab in the Live Oak Room on the second floor of the hotel.

NOTE: All registered conference attendees are invited to participate in this Lab; however due to the sensitivity of this issue, please make sure to wear your conference badge and bring proof of identity to gain entry.

D a l l a s , Te x a s |

cacconference.org

RUSTIC RODEO WEDNESDAY, AUGUST 12 TH 7 PM-MIDNIGHT

CASINO

DJ

CASH BAR

Serving Supper until 8:30 Must wear name tag to attend. No exceptions.

CASE STUDIES & WORKSHOPS Each session is listed by time block.

THURSDAY, AUGUST 13 Schedule at a glance:

7:00-8:30 AM

Light Continental Breakfast Registration/Check-In Lone Star Foyer

8:00AM-NOON

NCMEC CVIP Lab Open Live Oak Room

9:45-10:15 AM Break

Refreshments Provided THURSDAY

10:15-11:30 AM Workshops

11:30 AM

Conference Concludes Case Studies are marked with an asterisk ( * )

8:30-9:45AM

From Investigation to Trial: The Prosecutor’s Perspective (Part 1 of 2)

Ages and Stages of Sexual Abuse Sandra Onyi, Lisa Schuster This presentation will discuss elementary information regarding sexual abuse and how each child is affected differently depending upon their stage of development. Normal sexualized behaviors will be reviewed as well as techniques on how to make the examination and entire process more comfortable for the child. Each developmental stage (i.e. toddler, preschool age, school age, adolescent, etc.) will be explored including typical sexual contacts at the age, normal and abnormal sexual activities, and possible adverse effects on the child. The medical examination will be reviewed according to age. CITY VIEW 8

LONE STAR A4

Barriers in Interviews of Spanish Speaking Children

Gangs and Child Abuse (Part 1 of 2) Jabari Howard, Doug Millican DALLAS C, See pg. 39 for description

Lisa Martinez CITY VIEW 7, See pg. 42 for description

Building a Community Education Program for Your CAC

Interrogation Themes A-Z: 26 Themes for Child Pornography Cases (Part 1 of 2)

Dianna Smoot, Autumn Williams AUSTIN 2, See pg. 22 for description

Chad Steel LONE STAR A1, See pg. 27 for description

Building Resiliency in the Workforce When Your Job is Investigating Child Abuse

*Jessica Ridgeway: A Behavioral Perspective

Debra Anderson, Kimberly Day REMINGTON, See pg. 38 for description

But, I Love Him: When Victims Love Their Offenders (Or Think They Do) Nakisha Biglow, Carrie Paschall DALLAS B, See pg. 40 for description

SAVE THE DATE FOR THE 28TH ANNUAL CRIMES AGAINST CHILDREN CONFERENCE

AUGUST 8-11, 2016 48

Elizabeth Ciaccia, Pamela Stratigakis The first part of this workshop will discuss the steps for obtaining digital evidence via legal process, including notice issues requests for forensic analysis for evidence specific to the case and authentication for admitting and preserving evidence in child pornography and solicitation cases. We will also discuss ways to rebut common defense arguments in these cases. The second part of the presentation will discuss two case studies that demonstrate recovery of evidence necessary to meet the elements of child pornography and sexual exploitation cases. The presenters will detail how to admit digital evidence at trial and explain how the actual evidence was presented.

Child Abuse and Neglect Fatalities: Learning from Tragedy Kathryn Sibley Horton DALLAS D2, See pg. 38 for description.

Digital Evidence Awareness Colin Fagan LONE STAR A2, See pg. 40 for description

Domestic Minor Sex Trafficking Investigations 101 Michael Barker, Carrie Landau LONE STAR A3, See pg. 31 for description

August 10-13, 2015

|

D a l l a s , Te x a s |

Mark MacKizer LONE STAR C2, See pg. 33 for description

*Kidnapping and Exploitation in an Amish Community Frederick Bragg, Gus Burns, Alix Skelton LONE STAR B, See pg. 17 for description

Law Enforcement in International Parental Child Kidnapping Kendall Beels, Nathan George, Daniel Githens The Office of Children’s Issues in Department of State is the U.S. Central Authority under the Hague Convention on the Civil Aspects of Child Abduction. In this role, the State Department handles both incoming abductions to the U.S. and outgoing abductions from the U.S., and also has a branch dedicated to preventing abductions from occurring; law enforcement is crucial in all three of these capacities. Law enforcement is especially important in the Texas area due to the high volume of cases and proximity to the border. This presentation will review law enforcement’s cacconference.org

key role in locating children and taking parents in the United States, the Office of Children’s Issues collaboration with our colleagues in the Bureau of Diplomatic Security, and how law enforcement can assist us in preventing international parental child abduction. DALLAS A3

Legal and Ethical Considerations of the Use of Social Media in Criminal Cases Nathan Stump We live in the age of social media – of oversharing, “liking” and “checking in.” Facebook, Instagram, Twitter, Snapchat and other applications have become useful tools in the investigator’s or prosecutor’s arsenal, but there are pitfalls to be aware of when using social media in investigating and prosecuting criminal cases. The presenter, an Assistant United States Attorney for the Southern District of Illinois, will discuss relevant case law and recent examples of when “friending” someone can go wrong, or oversharing on your own social media outlets can potentially derail your case, or your career. HOUSTON C

Jacob Crater, Micheal Jimerson LONE STAR C4, See pg. 34 for description

*Mark Berndt: Sexual Abuse at the Miramonte Elementary School Peter Hahn LONE STAR C3, See pg. 32 for description

*Maurice Jerralds: The Popular Cheerleading Coach Was a Predator Nancy Oglesby DALLAS A1, See pg. 36 for description

*Randy & Me: A Prosecutor’s Story of His Childhood Sexual Abuse Kevin Mulcahy AUSTIN 1, See pg. 17 for description

Screening and Treatment of Sexually Abused Children Using EvidenceBased Approaches (Part 1 of 2) Jeff Wherry This training session will present a transactional model for understanding the impact of sexual abuse and placement on children in the foster care system. Differential diagnosis and misdiagnosis will be addressed utilizing research and clinical findings. Evidence-based screening and assessment will be discussed with protocols offered as examples. Evidencedbased treatments will be reviewed with special

SEMINAR

AUSTIN 3

Understanding the Psychopathic Sex Offender Melanie Malterer LONE STAR C1, See pg. 46 for description

Youth, Technology, and Today’s Trends Christine Feller, Melissa Hemzacek DALLAS A2, See pg. 42 for description

Sexual Abuse Prosecution 101 Melinda Westmoreland STATE 4, See pg. 42 for description

10:15-11:30AM

Sexually Violent Predators: Texas and Beyond Erin Faseler CITY VIEW 6, See pg. 22 for description

(An) Advanced Social Network Analysis of Child Exploitation Networks

Suspect Interrogation Techniques in Child Abuse Cases

Petra Talens, Madeleine van der Bruggen HOUSTON C, See pg. 31 for description

John Combs DALLAS D3, See pg. 34 for description

*Amazing Grace: The Murder of a Toddler and the Cover-up

(The) Tactical Polygraph: An Interviewer Team Approach Brett Banner, Brant Ungerer This presentation illustrates the need for an integrated investigative team approach that includes both the investigators and the polygrapher. Defense attorneys, legal scholars and some judges view sentencing guidelines as draconian for failing to distinguish between producers of child pornography and web surfers who are described as social misfits. The presenters use the Butner study as a guide to overcome the obstacles child pornography (CP) offenders present during the interview. A multipronged team approach, incorporating an initial interview, an on-scene preview of computers, the polygraph and a follow-up interview reveal that a high percentage of offenders have engaged in contact offenses with minors. The presenters have over a 90% success rate with CP offenders admitting to sexual contact with a minor. DALLAS D1

U.S. Marshals: Fugitive Sex Offender Investigations and Resources

|

D a l l a s , Te x a s |

Robyn Busby, Zeke Fortenberry LONE STAR B, See pg. 40 for description

Child Fatality Review in Texas Amy Bailey CITY VIEW 6, See pg. 22 for description

Cultural Considerations When Working with Latino Victims of Abuse Monica Urbaniak, Viviana Urdaneta CITY VIEW 7, See pg. 27 for description

*Decision Point: How and Why Did Jackson Curtis Really Die? Daniel Dawson, Amy Zacharias LONE STAR A3, See pg. 43 for description

From Investigation to Trial: The Prosecutor’s Perspective (Part 2 of 2) Elizabeth Ciaccia, Pamela Stratigakis LONE STAR A4, See pg. 48 for description

Gangs and Child Abuse (Part 2 of 2)

Eric Mayo, Justin Vickers This presentation will cover topics related to the U.S. Marshals Service and its efforts to work with state, local, and other federal agencies to identify, locate, and apprehend unregistered or non-compliant sex offenders. Specifically, the

August 10-13, 2015

presenters will discuss the U.S. Marshals and the Adam Walsh Act, registered sex offender compliance checks, and the variety of resources available to state and local agencies through the National Sex Offender Targeting Center, the Sex Offender Tracking Team, and USMS district offices located across the United States.

THURSDAY

*Lessons from Amora (Part 1 of 2)

emphasis designing treatments in response to assessment findings. Implications for systems reform and program evaluation will be discussed. Learning objectives include: Understand the complexity of symptom presentation among sexually abused children; identify measures for screening and assessment which are reliable, valid, and normed; review evidence-based treatments and the use of assessments in treatment planning; understand the rationale and implementation for the core components of TF-CBT; explore opportunities for system reform and program evaluation in state systems.

Jabari Howard, Doug Millican DALLAS C, See pg. 39 for description

10:15-11:30 AM CONT’D ON NEXT PAGE.

cacconference.org

49

10:15-11:30 AM CONT’D “I Would Never Hurt My Child”: Identifying Accidental vs. Non-Accidental Trauma

Knock and Talks: Maximum Results with Minimum Manpower Michael Johnson, John Pirics STATE 4, See pg. 28 for description

Deborah Kleypas DALLAS A3, See pg. 42 for description

Law Enforcement Response to Sexting Issues and Investigations

Interrogation Themes A-Z: 26 Themes for Child Pornography Cases (Part 2 of 2)

*Lessons from Amora (Part 2 of 2)

Chad Steel

Richard Wistocki AUSTIN 2, See pg. 17 for description

LONE STAR A1, See pg. 27 for description

Jacob Crater, Micheal Jimerson LONE STAR C4, See pg. 34 for description

Interviewing Child/Adolescent Victims of International Sex Tourism

Male vs. Female Perspective on Prosecuting Child Abuse Cases

THURSDAY

Karen Blackwell, Rachel Happel This workshop will address the fundamental and most critical component of investigations involving child/adolescent victims of international sex tourism: the interview of the victim or victims. The specific phases of the interview process will be presented and participants will learn to identify and address complex challenges related to conducting these interviews including: overcoming cultural barriers, language and interpreters, setting, international partners in the investigative process and the importance of working with the presentation of evidence. DALLAS A2

Investigation of Sudden, Unexplained Infant Deaths Candace Schoppe LONE STAR C3, See pg. 32 for description

Amy Derrick, Jason Fine Ever feel uneasy asking a 7 year-old girl to describe how her stepfather sexually abused her? Ever had a 14 year-old boy deny that he had sex with his teacher despite her confession? This workshop will focus on the unique strengths and weaknesses of prosecuting child abuses cases from a female and male DA’s point of view. We will cover issues ranging from the initial meeting with the victim and their family, to conveying the victim’s story as effectively as possible in front of a jury, to dealing with the post-verdict stress associated with these cases. The workshop will offer an open and honest forum to discuss how we can best utilize our strengths to more effectively provide justice for our victims. CITY VIEW 8

Missing Kids: Resources for Law Enforcement Sherry Friedlander, Sonia Lucero Non-profit organizations with expertise in missing and abducted children’s issues can bring a

50

August 10-13, 2015

|

D a l l a s , Te x a s |

wealth of resources for law enforcement agencies when a child goes missing. This session will provide an overview of the services offered by two members of the Center for Missing and Abducted Children’s Organizations (CMACO), a coalition of effective non-profit organizations funded by the OJJDP. The presenters will detail how their non-profits collaborate with law enforcement, bringing in specialized capabilities to cases involving missing children. They will also describe the importance of each partner’s role in these collaborations, how their agencies have worked successfully with law enforcement around the country, and make recommendations for agencies wishing to form these partnerships. AUSTIN 3

(The) Path of Child Sex Abuse Images: From Victimization to Restitution Lauren Coffren Child sexual abuse images have a lifecycle that touches representatives from agencies throughout the world as we work collaboratively to combat this problem. From the abuse and its documentation, to distribution and investigation, and ultimately to rescue and restitution, child pornography images form part of an ecosystem that involves hotlines, NCMEC, industry, and law enforcement. Come learn about the path these files take from a victim-centered standpoint, and how your help and participation in the “chain” is pivotal to rescuing children featured in child sexual abuse images. The role of NCMEC’s CyberTipline and Child Victim Identification Program, how they interact and are connected, along with their resources for investigators, will be discussed in depth. Case studies will be used to highlight the concepts. DALLAS D2

cacconference.org

Prosecuting the Purchaser: How to Attack the Demand for Human Trafficking Dalia Racine DALLAS D3, See pg. 41 for description.

Protecting the Online Footprint: Strategies for Prevention Alison Feigh Youth can find themselves in over their head very quickly with various online concerns, from cyberbullying to sexting. This presentation details the risks students are facing online and practical ways that adults can respond. The Jacob Wetterling Resource Center is committed to using what we have learned in our 25 years providing online and personal safety education to empower our audiences. AUSTIN 1

Revenge Porn: A New Crime Takes Shape Across the Country Shannon O’Brien LONE STAR A2, See pg. 32 for description.

Jeff Wherry SEMINAR, See pg. 49 for description

Utilizing MDTs to Effectively Address Cases of Domestic Minor Sex Trafficking

Mark Yarbrough DALLAS D1, See pg. 34 for description

Caroline Diemar, Tammy Sneed, Erin Williamson LONE STAR C2, See pg. 32 for description

*Tracking the Bus Stop Rapist

Why Don’t They Leave? Understanding Trauma and Trauma Bonds

Frederick Harris, Sheilah Priori DALLAS B, See pg. 40 for description

Tracking Registered Sex Offenders Internationally Lori McPherson The efforts to identify and track registered sex offenders as they travel internationally has increased over recent years. In addition, more than 20 foreign countries now have their own sex offender registration systems. This presentation will provide participants with an overview of the international tracking system in development via the mandate found in SORNA, as well as detailed information about the registration systems currently in place around the world. REMINGTON

Understanding Grooming Behaviors of Child Molesters and the Resulting “Counter-Intuitive” Behaviors of their Victims Darrel Turner LONE STAR C1, See pg. 22 for description

August 10-13, 2015

|

D a l l a s , Te x a s |

Tanisha Knighton For victims of human trafficking the ability to “just leave” is easier said than done. This workshop will explore why leaving may be difficult for victims by examining the different types of trauma, the effect trauma has on the brain, and the impact trauma bonds may play on the victim. This information is of tremendous value in successful investigation and prosecution of trafficking cases. DALLAS A1

Certificates will be emailed after you complete a post-conference survey. Surveys will be sent immediately post-conference.

cacconference.org

THURSDAY

Screening and Treatment of Sexually Abused Children Using Evidence-Based Approaches (Part 2 of 2)

Suffer from Burnout? Give’em the F.I.N.G.E.R.!

51

COMPUTER LABS SCHEDULE SUNDAY

2:00 - 9:00 PM BEAT THE CROWD. Conference Check-in is on the 2nd floor of the Sheraton Conference Center.

MONDAY

TUESDAY

WEDNESDAY

THURSDAY

7:00 - 8:30 AM Light Continental Breakfast Registration/Check-in

7:00 - 8:30 AM Light Continental Breakfast

7:00 - 8:30 AM Light Continental Breakfast

7:00 - 8:30 AM Light Continental Breakfast

8:30 - 9:45 AM Opening Plenary

8:00 - 9:30 AM Computer Labs

8:00 - 9:30 AM Computer Labs

8:00 - 9:30 AM Computer Labs

10:00 AM - NOON Computer Labs

10:00 - 11:30 AM Computer Labs

10:00 - 11:30 AM Computer Labs

10:00 - 11:30 AM Computer Labs

NOON - 1:30 PM Lunch On Your Own

11:30 AM - 1:00 PM Lunch On Your Own

11:30 AM - 1:00 PM Lunch On Your Own

11:30 AM Conference Concludes

1:30 - 3:00 PM Computer Labs

1:00 - 2:30 PM Computer Labs

1:00 - 2:30 PM Computer Labs

3:30 - 5:00 PM Computer Labs

3:00 - 4:30 PM Computer Labs

3:00 - 4:30 PM Computer Labs

4:45 - 6:30 PM Meet and Greet in the Exhibit Hall

6:00 PM Dallas Police Association Hospitality Event

7:00 PM Conference Networking Event

Dinner on your own

Dinner served until 8:30

Optional off-site Networking Event

Computer labs are held on the 3rd floor of the conference center. After you check in for the conference, please visit the 3rd floor to make any changes to your computer lab schedule. Please note that the computer lab schedule differs from the regular conference schedule. Labs begin at 8:00am Tuesday-Thursday.

SPECIAL THANKS TO THIS YEAR’S CONFERENCE COMPUTER LAB PARTNERS

52

Bedford County Sheriff’s Office

National White Collar Crime Center

Illinois Office of the Attorney General

SEARCH

National Criminal Justice Training Center

Sedgwick County Sheriff’s Office

August 10 -13, 2015

|

D a l l a s , Te x a s |

cacconference.org

COMPUTER LABS Each session is listed by time block.

MONDAY, AUGUST 10 Schedule at a glance:

7:00-8:00 AM

Light Continental Breakfast Registration/Check-In Lone Star Foyer

8:30-9:45 AM Opening Plenary

Lone Star Ballroom

9:45-10:30 AM

Morning Break

Refreshments Provided

10:00 AM-5:00 PM

NCMEC CVIP Lab Open

Live Oak Room

Lunch

On Your Own

3:00-3:30 PM Afternoon Break

Refreshments Provided

Become a Google Jedi: Save Yourself from Information Overload Lauren Wagner, Elizabeth Tow, Chris Armstrong This computer lab will teach students how to effectively use Google to filter search results to relevant and useable information. Students will complete hands-on exercises using Google Boolean and advanced Operators. Open to all attendees regardless of technology skill level. HOUSTON C

Child Protection System (CPS) Update William Wiltse This hands-on lab is designed for currently licensed and experienced peer-to-peer investigators and will showcase the newest functionality built-in to the Child Protection System (CPS). Topics include new dashboard “perspectives” to provide triage assistance, arrestee/victim input form, task-force performance report, CPS Desktop integration and more. A current CPS license is not required to participate in this lab, nor will a CPS license be issued upon completion of this training. Repeats Thursday from 10:00-11:30am. STATE 1

ICAC Investigative Tools Mike Duffey, Wayne Nichols This lab is aimed at those individuals who are new to investigating online child exploitation cases. Covered in this class will be the set up and configuration of a host of tools recommended for conducting online undercover investigations. The tools that will be discussed include Chrome browser with Google Drive, Exif Scrubber, Exif editor, Opanda, Fireshot, and Google Image search. Repeats Tuesday from 10:00-11:30am and Wednesday from 1:00-2:30pm. HOUSTON B

IP GEO Location: Tools and Tactics

DON’T MISS OUT ON THE MEET AND GREET First floor Exhibit Hall Monday 4:45-6:30 PM

Greg Kesner This lab will discuss some tools and tactics available for identifying the location of IP addresses. The class will start with a short review of IP addresses, NATs and Proxies. We will then discuss and demonstrate various tools and tactics that are available. We will discuss free tools, paid tools, and other social engineering techniques that are available. The participants should have a good understanding of IP addresses and general networking. The labs will be set up to have the participants utilize tools

August 10-13, 2015

|

D a l l a s , Te x a s |

STATE 2

ShellBags Explorer/Registry Explorer: Understanding the Registry and Leveraging its Contents Scott Schofield, Eric Zimmerman A vast amount of data is available in the Windows Registry, to include timestamps, directory access history, and program execution. By leveraging these artifacts, investigators can quickly generate a very complete picture of a user’s activity on a system in minutes, which can then be used in interviews, etc. Attendees of this lab will learn to use both ShellBags Explorer and Registry Explorer to streamline Registry examinations, both in the field and in the lab. Repeats Wednesday from 8:00-9:30am and 10:00-11:30am. STATE 3

Smartphone Forensics: Finding the App Amber Schroader Smartphones have become as important as any computer in the digital investigation process. Learning where to look for valuable data and tips and tricks that are needed for processing is crucial. This hands-on computer lab will use both iOS and Android devices on processing and working through the data they hold. This lab is open to nonlaw enforcement attendees. This lab is open to all attendees. Repeats Tuesday from 8:00-9:30am and 10:00-11:30am. HOUSTON A

COM P L AB S

NOON-1:30 PM

10:30AM-NOON

to identify the location of IP addresses during the exercise portion of the lab. Repeats Wednesday from 1:00-2:30pm and 3:00-4:30pm.

Social Media and Investigative Tools Mark Bowser, John Sedoski This workshop will give participants an up-to-date understanding of how many of the popular social networking sites work, what information is available on these sites, and how to integrate this information into their investigations.  This lab will provide participants with hands-on experience, and will familiarize them with open source and commercial tools that can be utilized within their investigation.   Repeats Tuesday from 1:00-2:30pm and Wednesday from 8:00-9:30am. SAN ANTONIO B

10:30 AM - NOON CONT’D ON NEXT PAGE. cacconference.org

53

10:30 AM - NOON CONT’D Utilizing Virtual Machines in ICAC Investigations Don Lewis There are advantages to using virtual computer machine environments in investigations. This presentation will introduce the virtual machine concept and its application in a variety of uses. These concepts include using virtual environments to store and share active case data, keeping several investigations in separate containers, booting directly to a virtual machine for undercover investigations and how to utilize virtual environment components and utilities built in to current operating systems used today. Open to all attendees regardless of technology skill level. Repeats Tuesday from 3:00-4:30pm. STATE 4

Windows Live Triage Collecting Volatile System State Cynthia Gonnella, Mike Stern In this lab students will be presented with a live computer system in which they will triage the system and collect the system state data in order of most to lease volatility according to NIST recommendations. This is helpful in cases where it is necessary to prove Internet connections are present or cloud services are being accessed during the upload or download of child exploitation materials while on the crime scene. Repeats Wednesday from 10:00-11:30am. SAN ANTONIO A

COM P L A BS

1:30-3:00 PM Advanced Cell Phone Interrogation Techniques: Cell Phone J-Tag Overview Mark Bowser, John Sedoski In this presentation we will be discussing advanced techniques used to retrieve data from cellular telephones and devices after traditional methods don’t work. Specific topics to be covered: What to do with damaged or broken phones, password or Pin locked phones and the techniques for recovery of them, devices unsupported by traditional forensic tools, how to gain physical memory acquisition using JTag and other methods, tools needed for these advanced techniques, advantages and disadvantages of these techniques. Repeats Tuesday from 3:00-4:30pm and Wednesday from 10:00-11:30am. SAN ANTONIO B

54

Finding the Hands On Offenders via IRC and Databases (Part 1 of 2) Kevin Laws, Michael Sullivan This lab will look at ways to identify the hands on offenders using chat and peer 2 peer clients. Students will learn the advantages of the tactical polygraph and searching for specific torrent values. They will also use the ICACCOPS and CPS databases to identify hands on offenders in the chat client MIRC, Internet Relay Chat using the Undernet and Dalnet. Repeats Wednesday from 8:00-9:30am. HOUSTON B

Forensic Artifacts from Wireless Routers Cynthia Gonnella, Mike Stern In this lab students will connect to a router to locate and document wired and wireless devices connected to the router, the router’s security settings, and other artifacts pertinent to Internet facilitated crimes. These skills are especially helpful when proving a device had access to a certain network and the Internet for downloading files in cases such as leeching off the neighbor’s Internet for downloading child exploitation material through an unwitting wireless network. Repeats Wednesday from 1:00-2:30pm. SAN ANTONIO A

Forensic Child Abuse Imagery Recovery Tool William Wiltse Designed for forensic computer examiners, this hands-on lab will utilize cutting-edge technology under development for recovering child abuse imagery from digital devices. Revolutionary in nature, this application will locate 100% of known content (even from unallocated space) and requires only minimal effort by the examiner. This translates into significant time savings for your ever-increasing forensics backlog. Lab is for demonstration only. Repeats Thursday from 8:00-9:30am. STATE 1

Introduction to Windows Forensic Environment (WinFE) (Part 1 of 2) Dean Chatfield, Chris Armstrong The Windows Forensic Environment (WinFE) is a new bootable forensic environment. WinFE does not mount the suspect’s hard drive, which will allow investigators to operate in a traditional Windows environment and run their preview tools against a suspect computer. This lab and lecture will provide the attendee with the skills and software necessary to create a WinFE image, which can be booted by either CD or USB device.  Students will also have the opportunity to practice booting a “suspect computer” with

August 10-13, 2015

|

D a l l a s , Te x a s |

their WinFE and run preview tools. **Note: Due to Windows licensing rules, students will create their cd and USB thumb drives using a 30-day evaluation copy of Windows. Lab suggested for attendees with intermediate technology skills. Repeats Wednesday from 8:00-9:30am. STATE 4

Life Beyond Facebook (Part 1 of 2) Elizabeth Tow, Lauren Wagner This computer lab will introduce students to social media sites of investigative value, beyond the common thought of Facebook. Twitter searching will be introduced to allow searching for Twitter profiles, tweet keywords and hashtags, and even searching for tweets from a particular latitude and longitude. These Twitter searching techniques will include both standard and hidden Boolean operators, ensuring that investigators have access to the best possible evidence. With 55 million photos being shared daily, Instagram is becoming a major player in the social networking world. In addition to searching Instagram through Google (using techniques similar to Facebook), participants will also be introduced to third-party resources that can be used to search Instagram all without having an Instagram account. Instagram searching for profiles, keywords, hashtags, and geographical information will all be covered. Other social networking websites will also be addressed, such as Vine, Ask.fm, Kik messenger, as well as others. Open to all attendees regardless of technology skill level. Repeats Tuesday from 1:00-2:30pm. HOUSTON C

osTriage: Improving Workflow from the Field to the Lab and Beyond (Part 1 of 2) Jeff Rich, Scott Schofield, Eric Zimmerman This lab covers osTriage version 2, its capabilities, and how to leverage it in a multitude of ways to find relevant data faster. By getting answers to investigative questions in minutes, not months, osTriage helps move a case forward on both the investigative and prosecutorial fronts. Attendees will learn the advantages of using osTriage in a live response capacity including real time detection of encryption, user searches, device history, registry information and much more. Repeats Tuesday from 8:00-9:30am. STATE 3

So You Want To Be A Cyber Sleuth? (Part 1 of 2) Jim Tanner This lab is for those who always wanted to try solving a crime through digital evidence. No

cacconference.org

experience necessary, but participants should know how to use Windows® and Google®. In part one, we will train you on several tools you will use to solve a crime in part two. Part two is a tongue-in-cheek mystery that can only be solved through digital evidence. Come try your skills, have some fun, and learn a bit about digital evidence in crimes. Open to all conference attendees. Must participate in both part one and part two. Repeats Tuesday from 1:00-2:30pm and Wednesday from 1:00-2:30pm.

Intro to Macs

HOUSTON A

STATE 1

Using Google in Your Investigations (Basic) Nirupa Calvin, Denise Smith This basic level lab will give investigators insight and valuable tips to conduct online investigations. The instructors will review investigative techniques and tools using many of Google’s services (Search, Image Search, Google Account, Gmail, YouTube, Blogger) that can be used to supplement your current investigative process. Get ready to learn by doing! This lab is open to all attendees. Repeats Tuesday from 1:00-2:30pm and Wednesday from 8:00-9:30am. STATE 2

3:30-5:00 PM Cyberbullying: Our Children, Our Problem 

Introduction to Windows Forensic Environment (WinFE) (Part 2 of 2) Dean Chatfield, Chris Armstrong Repeats Wednesday from 10:00-11:30am. STATE 4, See pg. 54 for description

Life Beyond Facebook (Part 2 of 2) Elizabeth Tow, Lauren Wagner Repeats Tuesday from 3:00-4:30pm. HOUSTON C, See pg. 54 for description

osTriage: Improving Workflow from the Field to the Lab and Beyond (Part 2 of 2) Jeff Rich, Scott Schofield, Eric Zimmerman Repeats Tuesday from 10:00-11:30am. STATE 3, See pg. 54 for description

So You Want To Be A Cyber Sleuth? (Part 2 of 2)

Using Google in Your Investigations (Advanced) Nirupa Calvin, Denise Smith, Cathy McGoff If you have attended the basic Google lab, or are familiar with Google services, this advanced level workshop will provide you with additional insight and valuable tips to conduct online investigations. The instructors will review investigative techniques and tools using many of Google’s services (Google+, AdWords, AdSense, Wallet, Analytics, Voice) that can be used to supplement your current investigative process. Get ready to learn by doing! This lab is open to all attendees. Repeats Tuesday from 3:00-4:30pm and Wednesday from 10:00-11:30am. STATE 2

Windows Event Log Artifacts Cynthia Gonnella, Mike Stern In this lab students will use Windows Native Event Viewer to import saved event logs for processing to collect artifacts pertinent to computer usage in criminal cases. These skills assist an investigator in determining when programs were installed successfully, what users were logged in during a specific time frame, what user changed certain system settings, and several other Internet related events such as the IP address associated to a specific machine. Repeats Wednesday from 3:00-4:30pm. SAN ANTONIO A

Jim Tanner Repeats Tuesday from 3:00-4:30pm and Wednesday from 3:00-4:30pm. HOUSTON A,

• Leading-edge training for child protection professionals • Expert speakers and trainers • Independent youth-serving program reviews • Prevention and victim assistance

See pg. 54 for description

COM P L AB S

Mark Bowser, John Sedoski This presentation is an overview of NW3C’s new web education service that is an easy and effective way to educate children, parents, teachers, social workers, police officers and bystanders giving solutions on the identification and remedy for cyberbullying of today’s children. Discussion topics will focus on current issues affecting children who are active on the Internet and encountering or participating in Cyberbullying, along with a demonstration of how to access the NW3C web education portal. This lab open to all attendees. Repeats Tuesday from 8:00-9:30am and Thursday from 8:00-9:30am.

Mike Duffey This lab is aimed at those individuals who have never used an Apple computer before or are brand to new to the Apple OS. Covered in this block of instruction will be the comparison between the PC world and the Mac world along with using virtual machines on a Mac and the iOS applications, iCloud, iPhoto, disk utility, network tools and various Mac hot keys and short cuts. This lab is open to all attendees. Repeats Tuesday from 1:00-2:30pm.

SAN ANTONIO B

Finding the Hands On Offenders via IRC and Databases (Part 2 of 2) Kevin Laws, Michael Sullivan Repeats Wednesday from 10:00-11:30am. HOUSTON B, See pg. 54 for description

gundersenhealth.org/ncptc More than 100,000 professionals trained in all 50 states and 17 countries since 2003.

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

55

COMPUTER LABS Each session is listed by time block.

TUESDAY, AUGUST 11 Schedule at a glance:

7:00-8:00 AM

Light Continental Breakfast Registration/Check-In Lone Star Foyer

8:00 AM-5:00 PM

NCMEC CVIP Lab open Live Oak Room

9:30-10:00 AM

Morning Break Refreshments Provided

10:30AM-1:30PM

COM P L A BS

Tour of the Dallas Children’s Advocacy Center Visit the Questions Booth for Tour Information

Android Cell Phone Emulator: Bluestacks & Apple Emulator Solutions Mike Duffey, Mike Sullivan This lab will teach students how to use the PC based Android emulator, Bluestacks. This emulator allows for law enforcement officers to emulate an android mobile device using the Google play store on a windows computer thus filling the void when law enforcement needs the ability to use apps such as Kik and other apps for the collection of digital evidence. Also discussed will be alternative solutions for Apple based products. Repeats Wednesday from 3:00-4:30pm. HOUSTON B

Basic Undercover Chat Investigations (Part 1 of 2) Jesse Crowe, James Valley This lab will cover basic undercover chat investigations. Presenters will discuss the tools needed to set your lab up and some of the considerations to think of. Students will be able to set computers up and troll through some specific chat sites on the Internet and learn common ways to chat to potential predators. Students will come away with the basic knowledge and capability to work undercover chat investigations. Repeats Thursday from 8:00-9:30am. STATE 1

improve workflow, and the full potential of the NetClean Analyze platform. Repeats Thursday from 8:00-9:30am. STATE 2

Must-Have Technology Tools for Investigating Crimes Against Children (Part 1 of 2) Chris Armstrong, Elizabeth Tow, Lauren Wagner Using technology to investigate crime is challenging because there are so many different ways to turn and countless products to use—this lab demonstrates some of the tools investigators should focus on. Attendees see tools that can help accomplish a wide range of tasks, including pulling out critical data from photos, using a desktop computer to simulate a tablet, and “faking” a device’s GPS to gain access to information that otherwise would have been unavailable. Attendees see how to download, install, and use portable apps in their investigations. This lab also covers resources attendees can pass along in their community safety presentations and other work with victims. **Those who bring a thumb drive with at least 3 GB of free space can copy our portable apps suite to take home. Lab open for all attendees with beginner technology skills. HOUSTON C

osTriage: Improving Workflow from the Field to the Lab and Beyond (Part 1 of 2)

Cyberbullying: Our Children, Our Problem  Jeff Rich, Scott Schofield, Eric Zimmerman

11:30 AM-1:00 PM

Lunch On Your Own

2:30-3:00 PM

Afternoon Break Refreshments Provided

6:00 PM

Dallas Police Association Hospitality Event Shuttle Transportation Provided on Ground Floor of Sheraton Hotel

56

8:00-9:30 AM

STATE 3, See pg. 54 for description

Mark Bowser, John Sedoski Repeats Thursday from 8:00-9:30am. SAN ANTONIO B, See pg. 55 for description

Recovering Volatile Data

More Data, More Problems or More Data, More Possibilities Jim Cole, Johann Hofmann This computer lab will discuss how to avoid the risk of getting bogged down by millions of digital image and video files and instead get the time and tools to focus on connecting leads, identifying victims and perpetrators and solving crime. The attendees will get hands-on experience of using the latest features of NetClean Analyze DI, software specifically designed to manage, review and analyze visual data and create intelligence from visual big data. Students will learn how Analyze DI massively reduces caseload and case turnaround time, and actively supports you to find relationships and connections between digital files to dig deeper into case material. They will also learn more about the strengths of integrating Analyze with other tools to

August 10-13, 2015

|

D a l l a s , Te x a s |

Dean Chatfield, Don Lewis This lab and lecture will address the collection of “Volatile Data” in the form of a computer’s Random Access Memory, or RAM. Volatile data is information, which Law Enforcement has historically overlooked. The presenters will use the free FTK Imager software to conduct a RAM DUMP, and then they will use a free demonstration version of FTK to open and view the contents of the Ram Dump. Open to all attendees regardless of technology skill level. STATE 4

Smartphone Forensics: Finding the App Amber Schroader Repeats Tuesday from 10:00-11:30am. HOUSTON A, See pg. 53 for description

cacconference.org

Timelining Artifacts in Criminal Cases Cynthia Gonella, Mike Stern In this lab students will use the Windows Native Registry Editor to navigate through the Windows Registry identifying and collecting artifacts pertinent to criminal cases. Important artifacts include computer name and system settings, operating system and program settings, and user specific settings. The user specific artifacts are particularly helpful to the investigator in proving what users opened certain files, folders, and programs in exploitation cases. Repeats Thursday from 8:00-9:30am. SAN ANTONIO A

10:00-11:30 AM Basic Undercover Chat Investigations (Part 2 of 2) Jesse Crowe, James Valley Repeats Thursday from 10:00-11:30am. STATE 1, See pg. 56 for description

Cell Phone Mapping with Perphound

SAN ANTONIO B

Connecting the Dots Between Multiple Cell Phones Wil Hernandez You’ve dumped cell phones belonging to a suspect, a victim, and a couple of witnesses. Who talked to whom? Who texted who? Who are their common contacts and who was at the same place at the same time? In this lab you will learn how to perform on-the-spot link analysis and visualize connections within the messages, calls, contacts, app data and geo-data between multiple mobile devices using XAMN. After going through the extraction process and analysis

STATE 2

Forensic Artifacts from SQLite Databases Cynthia Gonnella, Mike Stern Students will use SQLite database browsers to open and run queries against SQLite databases. This is helpful for obtaining Firefox and Chrome Web Browser histories, parsing iDevice records, GPS history, and various other SQLite based applications and devices. SAN ANTONIO A

Mike Duffey, Wayne Nichols Repeats Wednesday from 1:00-2:30pm. HOUSTON B, See pg. 53 for description

Must-Have Technology Tools for Investigating Crimes Against Children (Part 2 of 2) Chris Armstrong, Elizabeth Tow, Lauren Wagner HOUSTON C, See pg. 56 for description

Kevin Laws, Michael Sullivan This lab will provide a basic overview of IRC to include navigation and the logging function of the IRC client (mIRC). It will discuss building you IRC undercover persona and provide an introduction to the various chat rooms dedicated to the sexual exploitation of children. The presentation will also include tips about chatting and building your investigation based on experience. Finally, tips for court presentation will be provided, including information on presenting your evidence and jury considerations. Repeats Thursday from 8:00-9:30am. HOUSTON B

Cynthia Gonnella, Mike Stern In this lab students will use the Windows Native Registry Editor to navigate through the Windows Registry identifying and collecting artifacts pertinent to criminal cases. Important artifacts include computer name and system settings, operating system and program settings, and user specific settings. The user specific artifacts are particularly helpful to the investigator in proving what users opened certain files, folders, and programs in exploitation cases. SAN ANTONIO A

osTriage: Improving Workflow from the Field to the Lab and Beyond (Part 2 of 2)

Combating Child Exploitation Material with Project VIC Tools (Part 1 of 2)

Jeff Rich, Scott Schofield, Eric Zimmerman STATE 3, See pg. 54 for description

Smartphone Forensics: Finding the App Amber Schroader HOUSTON A, See pg. 53 for description

Tools for the Toolbox Dean Chatfield, Don Lewis This lab will introduce the investigator to a variety of free software tools to help them with their high tech investigations. The presenters will cover on scene triage tools to preview a network, recover WPA/WEP network passphrases and look for encryption or virus infection. They will also cover common everyday tools to deal with file compression and extracting data from iso files and creating DVDs. Open to all attendees regardless of technology skill level.

August 10-13, 2015

(The) Adult Undercover Persona and Introduction to Internet Relay Chat (Part 1 of 2)

Collecting Windows Registry Artifacts

ICAC Investigative Tools

STATE 4

1:00-2:30 PM

Richard Brown, Jim Cole This lab will walk through the Project Vic ecosystem of tools and how the Project Vic Hubstream hashing agent provides the VIC’s hash records to end users. Participants will get hands on experience with NetClean Analyze, setting up databases, Acquiring cases, using technologies such as PhotoDNA and Image Vector Hashing to reduce workload. Students depart with access to the robust Project VIC hash sets and will be exposed to the other tools able to leverage the hash set or the VIC Data Model such as: Magnet Forensics IEF, Blue Bear LES, Zuiz Forensics, XWays, Autopsy, NUIX, Black Bag and other tools participating in the Project Vic ecosystem. Repeats Wednesday from 8:00-9:30am.

COM P L AB S

Mark Bowser, John Sedoski This lab is for officers, investigators, and analysts who encounter cell phone evidence, and includes the acquisition and analysis of information external to the phone. Class concepts include instruction on how to request, read, and analyze Call Detail Records obtained from cellular providers and plot cellular site locations to determine the location of a suspect’s phone during a given time frame. Students will be shown techniques for tying all this information together for case reports and/or courtroom presentations. No special hardware or software is required, just a new knowledge-base to apply to cell phone cases. This lab focuses heavily on analysis and, as such, a strong working knowledge of Microsoft® Office is highly recommended. Repeats Wednesday from 1:00-2:30pm.

of a device in XRY, students will learn how to give their cell phone dumps meaning by correlating the data amongst multiple devices and matching all common data and direct communications between devices via instantly plotted connection diagrams, timelines, and mapping of geo-data. Repeats Wednesday from 3:00-4:30pm and Thursday from 10:00-11:30am.

STATE 2

1:00-2:30 PM CONT’D ON NEXT PAGE.

|

D a l l a s , Te x a s |

cacconference.org

57

1:00-2:30 PM CONT’D Intro to Macs

3:00-4:30 PM

Mike Duffey STATE 1, See pg. 55 for description

(The) Adult Undercover Persona and Introduction to Internet Relay Chat (Part 2 of 2)

Introduction to Wireless Geolocation

Kevin Laws, Michael Sullivan Repeats Thursday from 10:00-11:30am. HOUSTON B, See pg. 57 for description

Don Lewis, Dean Chatfield This course of instruction will introduce the investigator to the wireless network environment. Students will be taught how to geolocate a wireless network, then account for devices on the network. Documentation of network evidence available to the investigator will be covered. Lab suggested for attendees with intermediate technology skills. STATE 4

Life Beyond Facebook (Part 1 of 2) Elizabeth Tow, Lauren Wagner HOUSTON C, See pg. 54 for description

So You Want To Be A Cyber Sleuth? (Part 1 of 2) Jim Tanner Repeats Wednesday from 1:00-2:30pm. HOUSTON A, See pg. 54 for description

Advanced Cell Phone Interrogation Techniques: Cell Phone J-Tag Overview Mark Bowser, John Sedoski Repeats Wednesday from 10:00-11:30am. SAN ANTONIO B, See pg. 54 for description

Collecting Windows Mounted Devices Artifacts Cynthia Gonnella, Mike Stern In this lab students will use the Windows Native Registry Viewer and other tools to identify external devices that have been connected to the Windows Operating System. These skills are necessary to determine if a certain USB device (flash drives, external devices such as cameras) has ever been connected to a particular computer, and if it has, when it was first installed.

Social Media and Investigative Tools

SAN ANTONIO A

Mark Bowser, John Sedoski Repeats Wednesday from 8:00-9:30am. SAN ANTONIO B, See pg. 53 for description

Combating Child Exploitation Material with Project VIC Tools (Part 2 of 2)

Using Google in Your Investigations (Basic)

COM P L A BS

Nirupa Calvin, Denise Smith Repeats Wednesday from 8:00-9:30am. STATE 3, See pg. 55 for description

Richard Brown, Jim Cole Repeats Wednesday from 10:00-11:30am. STATE 2, See pg. 57 for description

So You Want To Be A Cyber Sleuth? (Part 2 of 2) Jim Tanner Repeats Wednesday from 3:00-4:30pm. HOUSTON A, See pg. 54 for description

Using Facebook for Investigations and Personal Use Mike Duffey This lab is geared towards those individuals who have never used Facebook or are new to Facebook and social media. Covered in this class will be setting up the account, understanding the basics and understanding what information you might want to focus on when interviewing potential suspects who are or were actively using Facebook. We will explore areas of Facebook that are sometimes overlooked during investigations. Additionally we will discuss other websites where digital Intel can be found. STATE 1

Using Google in Your Investigations (Advanced) Nirupa Calvin, Denise Smith, Cathy McGoff Repeats Wednesday from 10:00-11:30am. STATE 3, See pg. 55 for description

Utilizing Virtual Machines in ICAC Investigations Don Lewis STATE 4, See pg. 54 for description

Life Beyond Facebook (Part 2 of 2) Elizabeth Tow, Lauren Wagner HOUSTON C, See pg. 54 for description

THE TECHNOLOGY COALITION WISHES TO THANK THE CRIMES AGAINST CHILDREN CONFERENCE FOR WELCOMING US TO ITS 27TH ANNUAL GATHERING. TECHNOLOGY COALITION MEMBERS WORK TOGETHER TO COMBAT ONLINE CHILD SEXUAL EXPLOITATION. WE ARE:

AOL INC. FACEBOOK GOOGLE INC.

MICROSOFT CORPORATION PAYPAL TIME WARNER CABLE

UNITED ONLINE, INC. YAHOO! INC.

Interested in learning more or joining the effort? Visit www.technologycoalition.org for more information.

58

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

COMPUTER LABS Each session is listed by time block.

WEDNESDAY, AUGUST 12 Schedule at a glance:

7:00-8:00 AM

Light Continental Breakfast Registration/Check-In Lone Star Foyer

8:00 AM-5:00 PM

NCMEC CVIP Lab open Live Oak Room

9:30-10:00 AM

Morning Break Refreshments Provided

10:30AM-1:30PM

Tour of the Dallas Children’s Advocacy Center Visit the Questions Booth for Tour Information

Lunch On Your Own

2:30-3:00 PM

Afternoon Break Refreshments Provided

7:00 PM

Rustic Rodeo:Conference Networking Event Lone Star Ballroom

7:45 PM

Drawing for Tablet For those who attended an Exhibitor Workshops

Budget Friendly Forensics (Part 1 of 2) Jeff Shackleford Unfortunately in today’s age many agencies are still unable to fund computer forensic programs due to high costs associated with commercial software and the powerful machines they require to efficiently work. Is your budget preventing you from processing your own digital evidence? What if this presenter showed you a tool that could image hard drives, dump RAM, data carve, crack passwords, validate tools, decode the registry, prefetch, MRUs, cookies, event logs (and basically everything else you’d expect from a commercial forensic tool), and even reconstruct RAIDs? What if you could use this tool both in the lab and in the field from a thumb drive? Come see how cheap forensics can really be when you have the right tools. Repeats Thursday from 8:00-9:30am. HOUSTON A

Introduction to Windows Forensic Environment (WinFE) (Part 1 of 2) Dean Chatfield, Chris Armstrong STATE 4, See pg. 54 for description

ShellBags Explorer/Registry Explorer: Understanding the Registry and Leveraging its Contents Scott Schofield, Eric Zimmerman Repeats Wednesday from 10:00-11:30am. STATE 3, See pg. 53 for description

Social Media and Investigative Tools

Windows Memory Forensics

Justin Fitzsimmons, Elizabeth Tow, Lauren Wagner This workshop will provide students with an overview of social networking websites and how these websites can be useful to investigations. Students will also learn how to set up an investigative social networking account to search for information. This workshop will teach participants how to effectively search the social networking website, Facebook, both using the internal search features on graph search as well as using Google Advanced Operators. This workshop will cover techniques on capturing profiles for evidentiary purposes and well as mapping tools for friend networks.  Legal considerations for social media sites will be discussed including what legal steps must be taken to correctly seize and search information from social networking sites. The role of Federal privacy statutes will be explained. Additionally, hypotheticals will be used to demonstrate whether a defendant’s status as

D a l l a s , Te x a s |

Kevin Laws, Michael Sullivan HOUSTON B, See pg. 54 for description

Nirupa Calvin, Denise Smith STATE 1, See pg. 54 for description

Facebook Investigations: Searching, Saving and Addressing Legal Considerations (Part 1 of 4)

|

Finding the Hands On Offenders via IRC and Databases (Part 1 of 2)

Using Google in Your Investigations (Basic)

Richard Brown, Jim Cole STATE 2, See pg. 57 for description

August 10-13, 2015

HOUSTON C

Mark Bowser, John Sedoski SAN ANTONIO B, See pg. 53 for description

Combating Child Exploitation Material with Project VIC Tools (Part 1 of 2)

(Must be present to win)

a suspect or following an arrest might affect how information is gathered. Open to all attendees regardless of technology skill level.  

Cynthia Gonnella, Mike Stern Students will use commercially available and open source tools to collect artifacts from a Windows memory dump. Memory is often the only point where certain critical data resides such as passwords for encrypted containers that are now encrypted, instant messenger conversations, letters and other text that was never saved or cached anywhere else. Repeats Thursday from 10:00-11:30am.

COM P L AB S

11:30AM-1:00PM

8:00-9:30 AM

SAN ANTONIO A

10:00-11:30 AM Advanced Cell Phone Interrogation Techniques: Cell Phone J-Tag Overview Mark Bowser, John Sedoski Repeats Tuesday from 3:00-4:30pm and Wednesday from 10:00-11:30am. SAN ANTONIO B, See pg. 54 for description

cacconference.org

59

Budget Friendly Forensics (Part 2 of 2) Jeff Shackleford Repeats Thursday from 10:00-11:30am. HOUSTON A, See pg. 59 for description

Combating Child Exploitation Material with Project VIC Tools (Part 2 of 2) Richard Brown, Jim Cole STATE 2, See pg. 57 for description

Facebook Investigations: Searching, Saving and Addressing Legal Considerations (Part 2 of 4) Justin Fitzsimmons, Elizabeth Tow, Lauren Wagner HOUSTON C, See pg. 59 for description

Finding the Hands On Offenders via IRC and Databases (Part 2 of 2) Kevin Laws, Michael Sullivan HOUSTON B, See pg. 54 for description

Introduction to Windows Forensic Environment (WinFE) (Part 2 of 2) Dean Chatfield, Chris Armstrong STATE 4, See pg. 54 for description

ShellBags Explorer/Registry Explorer: Understanding the Registry and Leveraging its Contents Scott Schofield, Eric Zimmerman STATE 3, See pg. 53 for description

Using Google in Your Investigations (Advanced)

COM P L A BS

Nirupa Calvin, Denise Smith, Cathy McGoff STATE 1, See pg. 55 for description

Windows Live Triage Collecting Volatile System State Cynthia Gonnella, Mike Stern SAN ANTONIO A, See pg. 54 for description

1:00-2:30 PM Cell Phone Mapping with Perphound Mark Bowser, John Sedoski SAN ANTONIO B, See pg. 57 for description

Early Detection of Physical Child Abuse Training for First Responders and Medical Professionals Dyann Daley The medical community fails to recognize or report early signs of child maltreatment an astonishing 50-75% of the time. As physical abuse tends to escalate over time, the recognition of these early findings is critical for prevention of fatal physical abuse. Can you spot the signs? 60

Join us for an interactive course designed for first responders and the medical community. Included are virtual simulated patient encounters to test and improve your ability to recognize child maltreatment. This lab is open to all attendees. Repeats Wednesday from 3:00-4:30pm and Thursday from 10:00-11:30am. STATE 2

Facebook Investigations: Searching, Saving and Addressing Legal Considerations (Part 3 of 4) Justin Fitzsimmons, Elizabeth Tow, Lauren Wagner HOUSTON C, See pg. 59 for description

Field Triage and Data Acquisition (Part 1 of 2) Dean Chatfield, Chris Armstrong This lab and lecture will address the collection of potential evidence from running devices at the scene of a search warrant or a Probation/ Parole search using tools such as Field Search and osTriage. Open to all attendees regardless of technology skill level.   STATE 4

3:00-4:30 PM Android Cell Phone Emulator: Bluestacks & Apple Emulator Solutions Mike Duffey, Mike Sullivan HOUSTON B, See pg. 56 for description

Connecting the Dots Between Multiple Cell Phones Wil Hernandez Repeats Thursday from 10:00-11:30am. SAN ANTONIO B, See pg. 57 for description

Early Detection of Physical Child Abuse Training for First Responders and Medical Professionals Dyann Daley Repeats Thursday from 10:00-11:30am. STATE 2, See pg. 60 for description

Facebook Investigations: Searching, Saving and Addressing Legal Considerations (Part 4 of 4) Justin Fitzsimmons, Elizabeth Tow, Lauren Wagner HOUSTON C, See pg. 59 for description

Forensic Artifacts from Wireless Routers Cynthia Gonnella, Mike Stern SAN ANTONIO A, See pg. 54 for description

ICAC Investigative Tools Mike Duffey, Wayne Nichols HOUSTON B, See pg. 53 for description

IP GEO Location: Tools and Tactics Greg Kesner Repeats Wednesday from 3:00-4:30pm. STATE 3, See pg. 53 for description

So You Want To Be A Cyber Sleuth? (Part 1 of 2) Jim Tanner

Field Triage and Data Acquisition (Part 2 of 2) Dean Chatfield, Chris Armstrong STATE 4, See pg. 60 for description

IP GEO Location: Tools and Tactics Greg Kesner STATE 3, See pg. 53 for description

So You Want To Be A Cyber Sleuth? (Part 2 of 2) Jim Tanner HOUSTON A, See pg. 54 for description

HOUSTON A, See pg. 54 for description

Using Craigslist to Identify Child Sex Predators

Using Craigslist to Identify Child Sex Predators

Jesse Crowe, James Valley STATE 1, See pg. 60 for description

Jesse Crowe, James Valley This lab will cover the basic of pro-active and reactive Online Craigslist Operations. Students will learn how to setup small and large scale operations. Students will also be able to go online and learn how to conduct operations from beginning to end. They will also learn what equipment and resources are needed. Hands-on instruction will be conducted throughout the session. Repeats Wednesday from 3:00-4:30pm.

Windows Event Log Artifacts Cynthia Gonnella, Mike Stern SAN ANTONIO A, See pg. 55 for description

STATE 1

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

COMPUTER LABS Each session is listed by time block.

THURSDAY, AUGUST 13 Schedule at a glance:

7:00-8:00 AM

Light Continental Breakfast Registration/Check-In Lone Star Foyer

8:00 AM-NOON

NCMEC CVIP Lab open Live Oak Room

9:30-10:00 AM

Morning Break Refreshments Provided

11:30 AM

Conference Concludes

8:00-9:30 AM

10:00-11:30 AM

(The) Adult Undercover Persona and Introduction to Internet Relay Chat (Part 1 of 2)

(The) Adult Undercover Persona and Introduction to Internet Relay Chat (Part 2 of 2)

Kevin Laws, Michael Sullivan HOUSTON B, See pg. 57 for description

Basic Undercover Chat Investigations (Part 1 of 2) Jesse Crowe, James Valley STATE 3, See pg. 56 for description

Budget Friendly Forensics (Part 1 of 2) Jeff Shackleford HOUSTON A, See pg. 59 for description

Cyberbullying: Our Children, Our Problem  Mark Bowser, John Sedoski SAN ANTONIO B, See pg. 55 for description

Forensic Child Abuse Imagery Recovery Tool William Wiltse STATE 1, See pg. 54 for description

More Data, More Problems or More Data, More Possibilities

Timelining Artifacts in Criminal Cases Cynthia Gonella, Mike Stern SAN ANTONIO A, See pg. 57 for description

Basic Undercover Chat Investigations (Part 2 of 2) Jesse Crowe, James Valley STATE 3, See pg. 56 for description

Budget Friendly Forensics (Part 2 of 2) Jeff Shackleford HOUSTON A, See pg. 59 for description

Child Protection System (CPS) Update William Wiltse STATE 1, See pg. 53 for description

Connecting the Dots Between Multiple Cell Phones Wil Hernandez SAN ANTONIO B, See pg. 57 for description

Early Detection of Physical Child Abuse Training for First Responders and Medical Professionals Dyann Daley STATE 2, See pg. 60 for description

Windows Memory Forensics Cynthia Gonnella, Mike Stern SAN ANTONIO A, See pg. 59 for description

SAVE THE DATE AUGUST 8-11, 2016

COM P L A BS

Jim Cole, Johann Hofmann STATE 2, See pg. 56 for description

Kevin Laws, Michael Sullivan HOUSTON B, See pg. 57 for description

SM

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

61

SPEAKER BIOGRAPHIES Speakers are listed alphabetically by last name.

Visit cacconference.org for full biographies. AMY ALLEN is currently a Forensic Interview Specialist for the Department of Homeland Security (DHS). With DHS she works cases involving child exploitation, human trafficking, and human rights violations. Amy lectures frequently to law enforcement, children’s protective services, judges, and the community on child exploitation and human trafficking. CHRISTOPHER ANDERSON is the executive director of MaleSurvivor, a nonprofit organization that provides male survivors of sexual abuse and their loved ones hope, healing, and support. He speaks about the unique challenges male survivors face, and about the need for greater partnership between professionals and survivors across disciplines. DEBRA ANDERSON is the Director of Connections, a mental health program dedicated to early intervention services for children and families at the Project Harmony Child Protection Center in Omaha, Nebraska. She and her staff coordinate referrals for mental health services from schools and medical clinics, provide evidence based training for mental health professionals, and work to increase community capacity in serving children and families in need. CHRIS ARMSTRONG is a High-Tech Crime Training Specialist in the High-Tech Crime Training Services department of SEARCH, where he coordinates and provides training on hightech crime investigations and forensics. He is a national expert on investigating peer-to-peer networks that facilitate the distribution of child pornography. Chris served in law enforcement for 27 years before joining SEARCH.

S PE A KE RS

SALEH AWADALLAH has been an attorney since 1994, and joined the Prosecutor’s Office in 1998. As supervisor of the Major Trial Unit, he is responsible for the intake, charging, supervision, and assignment of all homicide, including capital murder, cases and all felony sexual assault and child abuse cases in Cuyahoga County. MICHAEL BACHMANN is Associate Professor of Criminal Justice, the department’s Internship Director, and the Editor-in-Chief of The Journal of Technology and Crime. His research spans all facets of the intersection of high technology and the law, ranging from computer hacker subcultures and ethics to the facilitation of

62

crime investigations through geospatial mapping applications. AMY BAILEY is the State Child Fatality Review Coordinator at the Texas Department of State Health Services. Before returning to Austin, Amy spent seven years working at the Injury Prevention Center of Greater Dallas as the Dallas County Child Death Review Team Coordinator. She recently collaborated on a manuscript published in the journal Injury Prevention on Truancy and Injury-Related Mortality. BRETT BANNER has been a Special Agent with the Federal Bureau of Investigation for the past 15 years and investigates Violent Crimes Against Children, including the possession, distribution, production and advertisement of child pornography. He is currently assigned to the Milwaukee Division Child Exploitation Task Force. MICHAEL BARKER has been a Special Agent with the FBI since 2008 and primarily works Crimes Against Children matters. Prior to joining the FBI, he worked as a clinician for the Department of Children and Family Service in Idaho where he provided behavioral analysis, counseling, and analytical services forchild protection and endangerment cases, with a primary focus on endangered youths. JASON BARRY is the Trust and Safety Manager for North America at Facebook. He is responsible for managing law enforcement relationships, including incoming requests and outgoing case referrals, as well as law enforcement security policy matters. Jason was a Special Agent with Homeland Security Investigations prior to joining Facebook. JACQUELINE BEAUCHERE is the Chief Online Safety Officer at Microsoft. She is responsible for all aspects of Microsoft’s online safety strategy, including cross-company policy creation and implementation, influence over consumer safety features and functionality, and communications to and engagement with a variety of external audiences. KENDALL BEELS is a ten-year veteran and Special Agent with the Diplomatic Security Service. She is currently assigned to the Criminal Investigative Liaison Branch where she is the liaison agent who is assigned to Consular Affairs-

August 10-13, 2015

|

D a l l a s , Te x a s |

Office of Children’s Issues and to the National Center for Missing and Exploited Children. She is a Task Force Officer with the FBI’s Violent Crimes Against Children Section-Major Case Coordination Unit. DONA BELLOW is a Legal Assistant who joined Google a year ago and has been working as a Child Safety Lead on the Legal Removals team, which handles reviews of child sexual abuse imagery and reporting to NCMEC. Dona has been involved in tooling and policy improvements of workflow for reviewers as well as wellbeing initiatives. NAKISHA BIGLOW is the Forensic Interview Team Lead for the Dallas Children’s Advocacy Center where she has been for the past 6 years. Nakisha and has conducted over 2,000 forensic interviews of children and has received over 1,000 hours of training in the child abuse field. She has also testified in both civil and criminal courts as a fact and expert witness of child sexual abuse. KELLY BLACKBURN is an assistant district attorney in Montgomery County, Texas where he serves as chief of the Trial Bureau. In 2010, he joined the Montgomery County District Attorney’s Office, where he has served as a chief prosecutor in multiple district courts, as chief of the Public Integrity Division, and in 2014 he was promoted to his current position. KAREN BLACKWELL is currently employed as a Child/Adolescent Forensic Interviewer with the FBI. She is primarily assigned to the South Central Region of the United States providing consultation and interviews for FBI agents, Assistant United States Attorney’s and other federal and state law enforcement agencies. Previously, Karen led the Denver Children’s Advocacy Center’s Forensic Interview and Evaluation Program.

ALL HANDOUTS ARE AVAILABLE ON DROPBOX. The access link and password were emailed before the conference. If you did not receive this email, please visit the Help Desk for information on accessing handouts.

cacconference.org

TERRI BOTTERBUSCH is a Special Agent with Homeland Security Investigations (HIS) in Tampa, Florida. She has investigated child exploitation crimes since 2006. Her investigations focus on child pornography production, distribution, and possession. She has been involved in numerous ICAC traveler operations and her various undercover personas continuously troll the Internet for predators interested in engaging in sex with children. MICHAEL BOURKE serves as the head of the Behavioral Analysis Unit for the U.S. Marshals Service. Prior to joining the Marshals Service he worked as a clinical psychologist for two sex offender treatment programs within the federal prison system. A graduate of DoDPI, he has conducted several hundred polygraph examinations with sex offenders. MARK BOWSER has worked for NW3C since March of 2008, bringing with him over 30 years of law enforcement experience and over 10 years of computer forensic investigative experience. He is responsible for supporting the U.S. Great Lakes region of NW3C and is providing support and instruction for all of NW3C’s offerings. JOHN BRADLEY, a former police officer, is the founder, CEO, and Chief Technical Officer of SiQuest Corporation, specializing in the research and development of leading Internet forensic software tools. John is the creator of Internet Examiner® Toolkit, featuring FaceDNA™ biometric facial recognition, a court approved and industry recognized investigative toolset that is fast becoming the tool of choice by law enforcement.

LAWRENCE BRAUNSTEIN is a partner in the law firm of Braunstein & Zuckerman, Esqs, in White Plains, New York, and an Adjunct Professor of Law at Hofstra University Law School. His practice focuses on matrimonial and family law and related criminal litigation. Since 1999 he has served on the faculty of the NYPD Sex Crimes and Child Abuse Investigation Course.

GUS BURNS is a Detective Sergeant with the St. Lawrence County Sheriff’s Office, Canton, New York where he is assigned to investigate Major Crimes. He supervises criminal investigations at the Sheriff’s Office and instructs in Firearms, Miranda rights, and Sex Crimes at the Regional Police Academy. Gus is a Child Forensic Interviewer in sex crimes and abuse of children.

RICHARD BROWN joined the International Centre for Missing & Exploited Children-ICMEC and serves Project VIC as the Project Coordinator. Project VIC is an international image video hash sharing initiative that has allowed investigators to swiftly process hundreds of images and videos from seized hard drives on criminal cases in order to identify and rescue these new potential victims.

RACHEL BURRIS is an Assistant District Attorney in the Dallas County District Attorney’s Office in the Child Abuse Division. Currently, her responsibilities include coordinating physical and sexual abuse investigations for all of Dallas County law enforcement as well as acting as the liaison between the District Attorney’s Office and the Dallas Children’s Advocacy Center.

SYLVIA BRUNI is the executive director of the Children’s Advocacy Center of Laredo-Webb County. The Center has gained recognition throughout the community as a leader in protecting and healing children. The CACs crowning achievement is radKIDS LAREDO, a safety education and violence prevention program that is steadily growing systemically across the community and surrounding areas. CIERRA BUCKMAN is the Senior Research Program Coordinator in the Moore Center for the Prevention of Child Sexual Abuse at Johns Hopkins Bloomberg School of Public Health. She currently coordinates multiple national research projects, ranging from a survey of the collateral consequences of juvenile sex offender registration and notification policies to a preliminary study of young adults living with attraction to minors. IRISH BURCH serves as the Chief of Partner Operations at the Dallas Children’s Advocacy Center where she is directly responsible for overseeing the forensic interview team and coordinating and facilitating relationships with 30 partner agencies. Her first-hand knowledge in investigating cases, interviewing children, and working with a variety of disciplines, assists her in effectively managing the needs of the multidisciplinary team. MARY-ANN BURKHART is the director of the National Center for Prosecution of Child Abuse. She is a career prosecutor with more than 20 years of courtroom experience in the area of abuse and neglect of special victims, from child and elder, in Miami, Florida and Baltimore, Maryland.

August 10-13, 2015

|

D a l l a s , Te x a s |

ROBYN BUSBY is a detective with the Plano Police Department and has been in law enforcement for 19 years. For the past three years, she has been assigned to the Crimes Against Persons Unit. Robyn has investigated numerous cases involving murder, kidnapping, robbery, and assault offenses. BEN BUTLER is the Director of Security Operations for GoDaddy.com, where his team members have become experts and industry leaders in dealing with all forms of network abuse including spam, phishing, hacking, copyright violation, child exploitation issues, illegal pharmacies, and the network security problems that often accompany such abuses. NIRUPA CALVIN is an investigator in Google’s Trust and Safety team that is responsible for the protection of Google revenue, users, and brand. Her area of expertise is child safety investigations, wherein she investigates cases where it appears a child may be in immediate danger or if a user’s conduct appears to be that of a producer who has access to children. ROGER CANAFF is a widely known child protection and anti-violence against women advocate, legal expert, author, and public speaker. A career Special Victims prosecutor, he has devoted his legal career to the eradication of violence against women and children. He has worked as a prosecutor in Alexandria, Virginia, the Bronx, New York, and as an Assistant Attorney General with the state of New York as well as a Senior Attorney with the National District Attorneys Association, Child Abuse Unit. 

cacconference.org

SP E AK E RS

FREDERICK BRAGG is a Special Agent and 24-year veteran of the FBI currently assigned to criminal matters at the Syracuse, NY, Resident Agency. He is also the Primary NCAVC coordinator for the Albany Division and a firearms instructor. His previous temporary duty assignments include Legat Ottawa, Washington, DC, and Bagram, Afghanistan.

STACEY BRITTAIN is a Licensed Clinical Social Work Supervisor in Therapy Services at The Harris County Children’s Assessment Center (CAC). As a therapist she provides individual, group, family, and play therapy to victims of child sexual abuse. She co-facilitates therapeutic services for domestic human trafficking victims through the development of Project LIBERTY.

63

LAURA CARROLL joined the National Center for Missing & Exploited Children more than eight years ago and is currently the Supervisor of the Child Sex Trafficking Team. This team was established to provide comprehensive analytical services to law enforcement investigations, as well as link cases of possible child sex trafficking victims to missing child cases known to NCMEC.

JIM COLE is the National Program Manager for Victim Identification for Homeland Security Investigations. As a Special Agent and Digital Forensic Agent he has been conducting child sexual exploitation investigations for the past nine years. Jim is part of an international working group conducting Victim Identification investigations worldwide. 

DEAN CHATFIELD is a High-Tech Crime Training Specialist in the High-Tech Crime Training Services department of SEARCH. His areas of expertise include digital forensics and previewing tools. Following a 25-year career in law enforcement, he honed his digital evidence skills at the National White Collar Crime Center (NW3C) before joining SEARCH in 2013.

JOHN COMBS is a detective with the Round Rock Police Department and has been in law enforcement for 23 years. For the last 15 years, his primary responsibilities have been the investigation of physical and sexual abuse of children. He holds a master peace officer license, instructor’s license and special investigators license from TCOLE.

ELIZABETH CIACCIA is an assistant state’s attorney with the Cook County State’s Attorney Office in Chicago and has been a prosecutor for fifteen years. She is currently assigned to the Sexual Assault and Domestic Violence Crimes Division, and the Internet Crimes Against Children Task Force where she focuses on the prosecution of child pornography, indecent solicitation of children and sexual assault cases.

SHARON COOPER is a Developmental and Forensic Pediatrician who cares for children with disabilities as well as those who have been victims of crimes. She retired from the U.S. Army Medical Corps and holds faculty positions at the University of North Carolina at Chapel Hill School of Medicine and the Uniformed University of Health Sciences at Bethesda, Maryland.

EINAT CLARKE is a Senior Corporate Counsel at Google Inc. specializing in data disclosure, the Electronic Communications Privacy Act, and child protection. She is Google’s representative to various industry coalitions on child safety including the Technology Coalition and the Financial Coalition Against Child Pornography.

S PE A KE RS 64

LAURA COATS joined the Appellate Division of the Dallas County District Attorney’s Office in 2001. As an appellate prosecutor, she represents the State of Texas in direct appeals and other post-conviction litigation from felony cases, including numerous child abuse cases. In addition, Laura also frequently represents the State and Child Protective Services in appeals from parental rights terminations and juvenile adjudications. LAUREN COFFREN is the Program Manager of the Child Victim Identification Program (CVIP) at the National Center for Missing & Exploited Children (NCMEC) in Alexandria, Virginia. She is responsible for ensuring successful operational duties and growth of the program allowing NCMEC to assist agencies with child pornography cases across the country and locate and identify unknown child victims featured in sexually abusive images.

MATTHEW COX is a board certified child abuse pediatrician working at University of Texas Southwestern Medical School and Children’s Health. He serves as the medical director of the REACH Program at Children’s Health which evaluates more than 2,000 children each year due to concerns of abuse or neglect. JACOB CRATER is currently a Child Protective Services caseworker II for Rusk County, Texas where he is a caseworker for children who have been removed by the State. He works with children and their parents toward ensuring their safety upon returning home or terminating their parental rights.

DYANN DALEY is a physician and the executive director for Cook’s Center for Prevention of Child Maltreatment where she is seeking innovative, practical ways to approach prevention of child maltreatment. With nearly a decade of experience as a pediatric anesthesiologist with Cook Children’s Medical Center, she has extensive personal experience caring for children seriously injured by abuse. STEPHEN DALEY is currently the CEO/Director of Training for the radKIDS Personal Empowerment Safety Education and Life Skills Organization. He is a national leader in safety education and violence prevention for children. Steve is a retired law enforcement veteran who returned to education to continue the battle against predatory violence. ANTIGONE DAVIS is Head of Global Safety at Facebook, where she works with internal teams at Facebook and with external safety organizations to ensure that Facebook remains a leader in online safety and that policymakers understand the steps Facebook takes to promote safety online. Antigone also spearheads the efforts of Facebook’s Safety Advisory Board, a team of leading safety organizations from around the world who provide Facebook with cutting edge research and advice on best practices. LYNN DAVIS has been the President and CEO of the Dallas Children’s Advocacy Center (DCAC) since 2005. He leads the executive team, creates the vision and direction of the Center, and manages the overall organization. Under Lynn’s leadership, DCAC has served more families, educated more professionals and raised more funds than at any other time in its history. Lynn holds an MBA from the University of Texas at Dallas.

JESSE CROWE has conducted hundreds of investigations into the online sexual exploitation of children. Jesse has extensive investigative experience in peer-to-peer and online undercover chat cases. He works for the Wisconsin Department of Justice – Division of Criminal Investigation and oversees the ICAC unit for the Western Region of Wisconsin.

DANIEL DAWSON is a special agent with the Major Crimes Unit of the Iowa Division of Criminal Investigation. He is responsible for investigating complex death investigations, sexual assaults, kidnappings and officer involved shootings. He is also a special agent with the US Army Criminal Investigation Command where he most recently served as team chief for a group of special agents in Afghanistan.

MARCI MCCLELLAN CURRY is an Assistant District Attorney in Dallas County, Texas. Immediately after law school, she joined the Dallas County District Attorney’s Office and has been a prosecutor there for almost ten years. Of those ten years, over four years were devoted to prosecuting child abuse cases involving sex abuse, injuries to children and capital murder.

KIMBERLY DAY is the Deputy Director for the National Children’s Alliance, the professional association and accrediting body for more than 750 Children’s Advocacy centers in the U.S. and abroad. Her previous experience includes coordination of the Maine Child Death & Serious Injury Review Panel, the Maine Citizen Review Panel and Maine Child Abuse Action Network.

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

ESTHER DEBLINGER is co-founder and codirector of the Child Abuse Research Education and Service (CARES) Institute and a professor of psychiatry at Rowan University School of Osteopathic Medicine. In collaboration with Drs. Judith Cohen and Anthony Mannarino, she developed and extensively tested Traumafocused Cognitive Behavioral Therapy (TFCBT), a treatment approach that has evolved as the standard of care for youth and their families impacted by trauma. AMY DERRICK is currently the Chief of the Sexual Assault Unit at the Dallas County District Attorney’s Office. She has been with the Dallas DA’s office for more than ten years and has been prosecuting felonies for nine years. During that time, more than six years have been spent prosecuting sexual assault cases exclusively. CAROLINE DIEMAR is the Coordinator of the South Central Child Advocacy Center and the New Haven Multidisciplinary Team which provides oversight of the inter agency coordination in case management of child sexual and severe physical abuse cases. Caroline works closely with partnering professionals to ensure that every case is handled in a child friendly and efficient manner. WILLIAM DONALDSON is a Supervisory Special Agent with the FBI’s Behavioral Analysis Unit III, which is responsible for providing assistance to law enforcement agencies involved in the investigation of crimes involving child victims including child abduction, murder, and sexual exploitation. He has been with the unit since 2006.

RICHARD DRINKWATER is a 30-year law enforcement veteran, most recently serving as Detective Constable – Forensic Computing and Network Investigator at the Cheshire Constabulary Hi Tech Crime Unit. He has deep knowledge as a forensics investigator having experience on varied casework including child abuse, fraud, organized crime and murder investigations. MIKE DUFFEY is a Special Agent Supervisor with the Florida Department of Law Enforcement. He is currently assigned to the Cyber High Tech

conducted thousands of child abuse investigation training seminars for the US Department of Justice and INTERPOL.

SUMMER ELMAZI has been a prosecutor with the Dallas County District Attorney’s Office for more than seven years. She is a felony trial prosecutor and is currently assigned to the Child Abuse Division, prosecuting cases of sexual and physical abuse of children.

RITA FARRELL serves as the Forensic Interview Specialist of the Gundersen National Child Protection Training Center. She manages the Arkansas forensic interview training program, and the development of advanced training courses and programs for forensic interviewers. Rita currently conducts forensic interviews and serves as an expert witness on child sexual abuse.

HEATHER EMMANUEL is a Certified Public Accountant (CPA) in the state of Texas and Chief Financial Officer at the Dallas Children’s Advocacy Center (DCAC). She was a director with PricewaterhouseCoopers LLP, and specialized in providing assurance and business advisory services for Fortune 50 companies. She was also a member of the National Diversity Team during her tenure.

ERIN FASELER is the Civil Commitment Division Chief of the Special Prosecution Unit, which is responsible for the Civil Commitments of sexually violent predators in Texas. She reviews all cases referred to the Special Prosecution Unit for potential civil commitment proceedings and initiates and pursues civil commitment proceedings pursuant to Chapter 841 of the Texas Health and Safety Code.

RONEN ENGLER is Cellebrite Inc’s Senior Manager of Technology & Innovation. Ronen ensures that Cellebrite’s forensics-focused R&D teams issue new features and releases to meet customer needs. Having worked in Fortune 1000 companies and startups, he has nearly 20 years of practical electrical engineering experience.

ALISON FEIGH serves as the program manager for the Jacob Wetterling Resource Center, a program of Gundersen National Child Protection Training Center. She began working with families of missing children in 2001 and continues to coordinate advocacy and prevention programs for JWRC.

COLIN FAGAN currently supervises the Special Victim’s Unit of the Jackson County Sheriff’s Office and is also assigned as an FBI Task Force Officer and Digital Evidence Forensic Examiner with the Southern Oregon High-Tech Crimes Task Force. He has been an instructor and consultant for Fox Valley Technical College AMBER Alert training program since 2009. ANNA FARAGLIA is an Assistant Prosecuting Attorney in the Major Trial Unit in the Cuyahoga County Prosecutor’s Office in Cleveland, Ohio. She specializes in prosecuting cases of violence and abuse against women or children. Anna has investigated sexual abuse allegations against Catholic priests, has successfully prosecuted high-profile murder cases, and was part of the team that prosecuted Ariel Castro. ROBERT FARLEY was the commanding officer of the Cook County Sheriff’s Police, Child Exploitation Unit in Chicago. He is a highly decorated detective and Deputy US Marshal with more than 28 years of experience investigating and supervising child abuse crimes. He is an internationally recognized expert in child abuse investigation techniques and has

August 10-13, 2015

|

D a l l a s , Te x a s |

CHRISTINE FELLER is an Internet Safety Specialist within the High Tech Crimes Bureau of the Illinois Office of the Attorney General, where she provides education on exploitation, cyberbullying, sexting, and piracy in relation to technologies used by children. Additionally, she assesses and disseminates NCMEC CyberTipline leads to police agencies across the state. JASON FINE is an Assistant District Attorney with the Dallas County District Attorney’s Office. Jason received his law degree from the University of Miami in 2006. He spent a substantial portion of his career at the DA’s Office exclusively prosecuting child abuse cases ranging from Indecency to Capital Murder, and is currently assigned to the Felony Division. JUSTIN FITZSIMMONS is a Program Manager in the High-Tech Crime Training Services department of SEARCH. He helps coordinate a national program that provides expert technical assistance and training to local, state, and federal justice and public safety agencies on the role that digital evidence plays in criminal investigations. He is a national expert in the areas of technology-facilitated exploitation of children and domestic minor sex trafficking.

cacconference.org

SP E AK E RS

REBECCA DREKE is the deputy director of the Stalking Resource Center (SRC) at the National Center for Victims of Crime. Rebecca develops original curriculum and provides training for law enforcement, prosecutors, and victim service providers on stalking, including the use of technology to stalk, campus stalking and stalking and sexual assault.

Crimes unit within FDLE Headquarters. Mike is responsible for statewide computer crime investigations including Internet crimes against children, computer forensics and network intrusions.

65

ZEUS FLORES is an IT professional with nearly two decades of experience. In 2010, he left his long-time career in the private sector for the public sector, where he could use his talents in the fight against technology facilitated child exploitation. Flores currently supervises the forensic lab for the Office of the Illinois Attorney General’s High Tech Crime Bureau. MICHELLE FORD-STEPNEY serves as a supervisory INTERPOL analyst for INTERPOL Washington. She is responsible for managing operations and administration for the Human Trafficking and Child Protection division. This division maintains direct contact with counterparts in 190 other member countries and with over 18,000 US law enforcement agencies, facilitating police-to-police communications and providing assistance with criminal investigations. ZEKE FORTENBERRY is a felony prosecutor at the Collin County District Attorney’s office and has tried more than 140 jury trials, including three Capital Murder cases. Zeke is an adjunct faculty member at SMU School of Law in Dallas and has taught at the National Institute of Trial Advocacy’s Building Trial Skills course. He also presents at the Texas District and County Attorneys Association bi-annual Prosecutor Trial Skills course. EDWARD FREYER is a retired FBI special agent with 35 years of investigative experience. Eddie is the former Undersheriff of Walla Walla County, Washington and is currently a senior consultant with California POST as the project manager of the Robert Presley Institute of Criminal Investigation.

S PE A KE RS 66

ROB FREYER is an assistant district attorney in Montgomery County, Texas where he serves as chief of the Major Crimes Division. As an assistant district attorney, he has served in multiple misdemeanor and district courts. Rob has tried over 130 felony cases to verdict and is also Board Certified in Criminal Law by the Texas Board of Legal Specialization. SHERRY FRIEDLANDER founded A Child Is Missing (ACIM) in 1997. ACIM provides free assistance to law enforcement in early recovery of missing children, the disabled, and the elderly. At the request of law enforcement, ACIM activates a rapid-response neighborhood alert program utilizing high-tech communication systems. The system works in concert with the Amber, Silver, and Blue Alert systems.

JOE GAUTHIER is the Director of Client Services for Watch Systems and oversees all their territory, account, and sales management activities. Joe and his team are also tasked with client consultation services to identify best practices as well as new products and services designed to help law enforcement professionals meet the letter as effectively and efficiently as possible. NATHAN GEORGE is a Country Officer in the Incoming Abductions Branch of the Office of Children’s Issues at the U.S. Department of State. Nathan first came to the State Department in 2013 as a Presidential Management Fellow. He received his Doctor of Jurisprudence (J.D.) Degree from Indiana University Maurer School of Law. DANIEL GITHENS is a Prevention Officer with the Office of Children’s Issues in the Department of State. His portfolio includes the Western Hemisphere and the Midwest domestic region. During his time with the Department, Daniel has worked on intercountry adoptions, incoming abductions, and preventing abductions. RYAN GLOVER is LEA AID’s Regional Account Manager and Trainer. Ryan trains and helps develop the LETS system to meet customer needs for covert internet operations. Ryan has been with LEA AID since 2008. CYNTHIA GONNELLA has been employed with NW3C since 2007. In 2014, Cynthia was assigned team lead and developer of NW3C’s first Cybersecurity course for law enforcement. Cynthia and her team developed a 5-day class – Basic Network Intrusion Investigations (BNII). Cynthia has 20 plus years in law enforcement, with over 16 years in computer forensics. JESSE GONZALEZ has more than 12 years of experience in the child abuse field and has spent ten of them at the Dallas Children’s Advocacy Center. She currently supervises the Forensic Interview Department and has conducted over 3,300 forensic interviews of sexual and physical abuse victims including witnesses to violent crimes. She frequently testifies as an expert witness to these criminal cases. CRYSTAL GREGORY is a Forensic Interview Specialist for Homeland Security Investigations (HSI). She travels nationally and internationally to conduct forensic interviews of victims for ongoing federal investigations including victims of cyber-crimes, human trafficking, and child sex

August 10-13, 2015

|

D a l l a s , Te x a s |

tourism. She also provides case consultation for cases involving victims for HSI Special Agents, prosecutors, and law enforcement agencies at the state and local level. BROOKE GRONA-ROBB is an Assistant District Attorney in Dallas County, Texas, and has prosecuted cases involving human trafficking and Internet crimes since November 2005. She is the Deputy Chief Prosecutor of the Organized Crime Division and has supervised the Human Trafficking and Internet Crimes Against Children Unit for 9 years. PETER HAHN is a detective sergeant with the Los Angeles Sheriff’s Department assigned to the Special Victims Bureau (SVB). Peter has worked as a child abuse investigator and supervisor for the past eight years. He investigates cases involving sex registrants and the online exploitation of children. FRANCEY HAKES is CEO of her own consulting firm, providing advice, counsel and expert witness services to firms, law enforcement, governments, industry, non-profits and others on national security and the protection of children. She was the country’s first National Coordinator for Child Exploitation Prevention and Interdiction, a post appointed by the U.S. Attorney General and was responsible for creating the inaugural U.S. strategy addressing child sexual exploitation. RACHEL HAPPEL joined the FBI as a Child/ Adolescent Forensic Interviewer in November 2012. She provides forensic interviews, expert testimony, case assistance, and training to FBI personnel, United States Attorneys, and other federal, state, and local agencies. Prior to joining the FBI, Rachel was an Instructor in the Department of Psychology at Missouri State University and a forensic interviewer with a child advocacy center. FREDERICK HARRIS is currently assigned as a police detective at the Killeen Police Department, Major Crimes, focusing on homicides. He is responsible for investigating homicides and physical/sexual abuse related to children and adults. He is a certified forensic hypnotist in the State of Texas and has assisted witnesses and victims recall vital information resulting in arrests of suspects. NANCY HEBERT is the chief prosecutor over the Special Victims - Crimes Against Children and Domestic Violence Divisions for the Montgomery County DA Office. Nancy offices

cacconference.org

at the Children’s Safe Harbor, the children’s advocacy center in Conroe, Texas, where she works closely in a coordinated effort with the agencies investigating child abuse from the inception of the investigation through case resolution and trials. MELISSA HEMZACEK is an Internet safety specialist with the High Tech Crimes Bureau of the Illinois Attorney General’s Office. In this position, she provides education on exploitation, cyberbullying, and sexting in relation to technology use by youth. Prior to joining the Attorney General’s office, Melissa spent eight years in the public school system as a teacher and social worker. WIL HERNANDEZ joined Mobile Forensics in 2015 after retiring from the Florida Department of Law Enforcement. His ascent to the rank of Captain included assignments to multiple Internet Crimes Against Children (ICAC) Task Forces, supervisory roles in Cyber High Tech and Cybercrime Units, and teaching courses for NW3C and FBI CART. MARK HILTS has been assigned to the behavioral analysis program since 1995, and has consulted with investigators and prosecutors on serial murders, child abductions, sexual assaults, and other violent crimes. He is one of the authors of the FBI’s Child Abduction Response Plan, and is the co-author of two publications on false allegations of child abduction.

ROBERT HOEVER is NCMEC’s Director of Special Programs within the Missing Children Division. He manages NCMEC’s role in the AMBER Alert Program, and serves as a liaison to the 53 Missing-Child Clearinghouses and to Tribal Law Enforcement. Additionally, he assists with any other special projects assigned by the Vice President, such as missing children with special needs program. TODD HOFF is a 14-year veteran and detective sergeant with the Montgomery County Sheriff’s Office Crimes Against Children Division. He was

JOHANN HOFMANN works as a product manager and law enforcement liaison at NetClean Technologies. He has more than eight years’ experience in applied image and video analysis gained in the specialist field of crime investigations. Johann manages NetClean’s Analyze product range, which is specifically designed for and aimed at law enforcement agencies investigating crime that involves reviewing and managing visual data (image and video). JIM HOLLER has served as chief of police for the past sixteen years of the Liberty Township Police Department in Adams County, Pennsylvania. He retired as the chief of police to continue consulting in the areas of child abuse in 2007. As police chief, he was involved with the investigations of homicides, unattended deaths, rapes, child abuse, and child sexual assaults. LAUREN MCDERMOTT HOPKINS is an assistant district attorney in Collin County, Texas assigned to the Crimes Against Children Division. In this division, she concentrates solely on cases involving the physical or sexual abuse of children, ranging from injury to continuous sexual assault of a child. KATHRYN SIBLEY HORTON is the Division Administrator for the Texas Department of Family and Protective Services - Office of Child Safety. The Office of Child Safety’s goal is to help carry out prevention/intervention programs to address fatal and serious child abuse and neglect by reviewing child fatalities, assessing root causes, providing technical assistance, and developing strategies to bring together local agencies to reduce child abuse and neglect.

leads and directs the Clinical Services team, the Family Assistance team, the Research Institute and the volunteer services team. DARREN HUBBARD is the Law Enforcement Operations Manager at Snapchat, where he oversees the development of policies and procedures for handling law enforcement and civil requests for Snapchat user data. Darren has extensive experience dealing directly with law enforcement agencies on a range of topics, including CSAM matters, and has testified as a prosecution witness before numerous federal and state courts and grand juries. PAUL JACKSON is a Senior Assistant District Attorney in Johnston County North Carolina. Over the course of his career as a Superior Court Prosecutor, he has prosecuted many different types of criminal cases. Though he still handles a variety of cases in Superior Court, he has primarily specialized in domestic violence, sexual assault, child abuse, and child homicide cases for approximately thirteen years. MICHEAL JIMERSON is the elected county and district attorney of Rusk County, Texas. He was first elected in 2005, after ten years in private practice. Micheal began his career seeking protective orders for the local domestic violence shelter and later offering legal advice to the local Children’s Advocacy Center. He is a fellow of the State Bar Foundation, a founding fellow of the Texas Prosecutors Society and a former TDCAA board member. MICHAEL JOHNSON has been in law enforcement for twenty years - eleven years with a large metropolitan police department and nine years with Homeland Security Investigations as a Special Agent. He has spent the past eight years investigating child exploitation full-time and is a computer forensic examiner.

JABARI HOWARD is a 12-year veteran and a Detective in the Gang Unit of the Dallas Police Department. He is currently assigned to the ATF Violent Crimes Group, which conducts state and federal investigations on criminal street gangs and criminal organizations. He is a North Regional Director for the Texas Gang Investigators Association and in 2014 Governor Rick Perry appointed him to the board of directors of the Texas Violent Gang Task Force.

GEOFFREY KELLER is currently a child abuse prosecutor for the Dallas County District Attorney’s Office. He was with the Dallas DA’s office from 2004-2008 and in the child abuse division from 2007-2008. He then left and was a criminal defense attorney before returning to the office at the child abuse unit in 2015. Geoff is also an Army Reserve JAG officer and has been actively involved with the Army’s sexual assault emphasis over the last several years.

KRISTEN HOWELL has worked in the field of social work and family violence for the past 18 years. She is currently the Chief Programs Officer at Dallas Children’s Advocacy Center. She

JULIE KENNISTON is the executive director of The Center for Family Solutions in Hamilton, Ohio and an independent contractor and trainer presenting on interviewing, investigation and prosecu-

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

SP E AK E RS

KYLE HOERTSCH is currently the Task Force Commander for the Sacramento Sexual Assault Felony Enforcement (SAFE) Task Force. The SAFE Task Force is a multiagency/ multijurisdictional team responsible for registering, monitoring, investigating and arresting the second highest sex offender population in the State of California. As a collateral duty, Kyle has been the Department’s License Plate Reader (LPR) Program Administrator since 2013.

awarded the 2004 Peace Officer of the Year by the Chamber of Commerce for the Humble area and the 2008 Outstanding Officer Award by the East Montgomery County Improvement District.

67

tion of child abuse and exploitation cases. Julie is currently working closely with the Internet Crimes Against Children task force in Southwest Ohio and the Human Trafficking Task Force. JESSICA KENTON is the Supervisor of the Case Analysis Unit (CAU) at the National Center for Missing & Exploited Children (NCMEC). The CAU provides analytical support to NCMEC Case Managers and Law Enforcement nationwide in their efforts to recover missing and abducted children, identify human remains believed to be children and track attempted abductions of children by unknown adults. GREG KESNER has over twenty years of experience working for the FBI in the technical arena for collection systems meant to collect data pursuant to lawful legal process or from consent of the user. This area encompasses both criminal statutes, as well as many National security statutes in the U.S. and abroad. BRIAN KILLACKY is a consultant for the Amber Alert Technical Assistance Program. He spent 12 years with the Cook County State Attorney’s Office where he was a sergeant and investigator within the Investigations Bureau serving in the Complex Murder and Cold Case Homicide Units which served metropolitan Chicago. JAMES KILPATRICK is a National Program Manager currently assigned to the Department of Homeland Security (DHS), Homeland Security Investigations (HSI), Cyber Crimes Center (C3), and Child Exploitation Investigation Unit (CEIU) in Fairfax, Virginia. In this position, he focuses on Dark Web investigations and coordinates major cases with foreign and domestic law enforcement agencies.

S PE A KE RS

ANDREA KIRKPATRICK is the Associate General Counsel of Security at Facebook where she is responsible for supporting the Security team and counseling the company on issues related to law enforcement response, user and child safety, and data security. Prior to joining Facebook, Andrea spent four years working on the Legal team at Yahoo where she supported and managed the International Law Enforcement Response team. GENE KLEIN is a social worker and the Executive Director of Project Harmony. Under his direction, Project Harmony has become a national model in responding to child maltreatment. In addition to providing key medical and evaluation services of child abuse victims, Project Harmony is now a leader in delivering training to the child

68

welfare work force. The agency delivers state of the art- best practice training to more than 8,000 professionals on an annual basis. DEBORAH KLEYPAS has worked in healthcare for more than 40 years and has been a forensic nurse examiner for the past 13 years. She is the coordinator of the Baylor Scott & White Health Forensic Program, a position she has held since 2004. She educates healthcare professionals, law enforcement, judicial system professionals, child and adult protective service professionals and members of the community on abuse and family violence. TANISHA KNIGHTON worked as a social worker with the Cuyahoga County Department of Children and Family Services from 19982013. She was then appointed to manage the Missing Persons Unit of Cuyahoga County Sheriff’s Department. She serves as a liaison between law enforcement, social service organizations, and the public to ensure missing citizens of Cuyahoga County safely return. MIKE KRAPFL is a Special Agent in Charge in the Major Crimes Unit with the Iowa Division of Criminal Investigation. Mike has been in law enforcement for 23 years, working the last 15 years with the Iowa DCI and 8 years with a municipal police department. Mike is an instructor with The CTK Group, a research and instruction group that provides interview and interrogation training to officers in the Midwest. ALAN KROK currently works as a consultant with Girls Educational and Mentoring Services (GEMS) of New York providing trainings throughout the country to teach law enforcement officers protocol and investigative techniques in commercial exploitation of children investigations. He previously worked for the Chicago Police Department in the Special Investigations Unit. CARRIE LANDAU is a Special Agent and 12year veteran of the FBI. She works on a Violent Crime Squad and is assigned to the South Resident Agency in Orland Park, specializing in investigations involving Crimes Against Children. Carrie is an Assistant Team Leader for the Crisis Negotiation Team, Chicago FBI, and was recently selected as a member of the Child Abduction Rapid Deployment Team. JAN LANGBEIN is the Chief Executive Officer of Genesis Women’s Shelter & Support in Dallas. Recognized as a national expert on the effects of domestic violence, Jan conducts

August 10-13, 2015

|

D a l l a s , Te x a s |

training, keynote, and workshop programs for local, state, and national conferences, social and civic organizations, and corporations. Jan provides expert testimony in court cases and trains professionals to enhance their efforts to end violence against women. MARY LANGER has been a child abuse prosecutor for 15 years and currently heads the Juvenile and Domestic Relations (J&DR) District Court Unit of the Richmond Commonwealth’s Attorney Office, prosecuting the most complex cases of physical and sexual abuse of children and domestic violence. She is an adjunct professor at the University of Richmond Law School. KEN LANNING is a consultant in the area of crimes against children. He was a special agent with the FBI for more than 30 years and was assigned to the FBI Behavioral Science Unit at the FBI Academy for 20 of those years. He is the 2009 recipient of the Lifetime Achievement Award for Outstanding Service from the National Children’s Advocacy Center. KEVIN LAWS is a Special Agent and the Program Manager responsible for managing Child Exploitation Training for Homeland Security Investigations. Kevin has authored and served more than 120 search warrants pertaining to child exploitation. He has taught classes on online undercover investigations and child exploitation investigative techniques to many agents and investigators. PAUL LAYMAN serves as an assistant director of the Human Trafficking & Child Protection Division within INTERPOL Washington, the US National Central Bureau (USNCB), a component of the US Department of Justice. He is responsible for managing operations, initiatives, and administration of this Division as well as a liaison between his employing agency, the US Immigration & Customs Enforcement, and INTERPOL. GLYNN LEBLANC is an accomplished professional examiner, instructor, and manager. Glynn has experience in computer forensic methods and best practices, information systems security and investigations, most recently as Director of Business Development in Training and Senior Instructor at AccessData. JANE LEE works on the Legal Policy team at Twitter, primarily focusing on policy and compliance issues surrounding requests for user information. Prior to joining Twitter, she worked

cacconference.org

as an attorney at Bay Area Legal Aid, practicing in the fields of housing, public benefits and consumer law.

the forensic computer lab and was responsible for all aspects of digital evidence, from collection through analysis.

BEN LEMERE is the CEO and Co-Founder of Berla Corporation. Under Ben’s leadership, Berla successfully continues to support the Department of Defense, Homeland Security and Law Enforcement community while also beginning to establish roots in the commercial realm. He is a widely recognized subject matter expert in digital forensics, GPS forensics and vehicle cybersecurity, with more than 15 years of military and federal government service.

SEAN LI is a Legal Operations Specialist at Dropbox, Inc., and is a founding member of the team at Dropbox that handles child safety and law enforcement requests. He’s been at Dropbox for over three years and splits his time between working on policy initiatives to address new issues and programming projects to make the operational side easier.

EMILY LENTZ is a registered dietitian at Children’s Health Dallas. She is currently a dietitian in the ARCH center, which is composed of several clinics including REACH (Referral and Evaluation of at Risk Children), WIN Clinic (Weight, Intervention and Nutrition of FTT patients), Low Birth Weight Clinic, and Foster Care Clinic. ALE LEVI is the lead Forensic Interview Specialist (FIS), for Homeland Security Investigations (HSI) and has conducted over 4000 victim interviews. In 2009, she became the first FIS for HSI and has established guidelines and protocols for the HSI Forensic Interview Program. Her cases span the globe and she travels both domestically and internationally, conducting victim interviews, and has assisted other federal agencies such as the Department of State and the FBI. CRYSTAL LEVONIUS is the chief prosecutor in the Crimes Against Children Division at the Collin County, Texas District Attorney’s Office. She prosecutes cases involving child victims, which range from Indecency with a Child to Capital Murder.

DON LEWIS is a High-Tech Crime Training Specialist in the High-Tech Crime Training Services department of SEARCH. He has widespread knowledge of digital forensics, including photo imaging and analysis. Before joining SEARCH in 2012, he served for 23 years with the Lakewood (Colorado) Police Department, most recently as its Forensic Computer Analyst. He ran

SONIA LUCERO works for Nevada Child Seekers, which advocates for prevention, identification, and location efforts on behalf of missing and exploited children. She has been with the organization for four years, serving as case manager and director of operations. She is also a licensed PSR (psychosocial rehabilitation) and BST (basic skills trainer) worker. MARK MACKIZER is a Supervisory Special Agent with the FBI’s Behavioral Analysis Unit III, which is responsible for providing behaviorallybased operational support and training to law enforcement agencies involved in the investigation of child abductions, mysterious disappearances of children, child homicide and child sexual victimization. ROB MADDOX brings a unique blend of public and private sector experience to Magnet Forensics. As a former senior instructor for AccessData Group, Rob specialized in the development and delivery of the Internet and Windows forensics classes to a global audience of forensics practitioners. Rob has also served as a computer crime specialist for the National White Collar Crime Center (NW3C), where he developed and delivered digital forensics training to local and state law enforcement. DANIELLE MADERA is a staff psychologist at The Harris County Children’s Assessment Center (CAC). Dr. She provides individual, group, family, and play therapy as well as psychological evaluations to victims of child sexual abuse. Dr. Madera co-facilitates therapeutic services for domestic human trafficking victims through the development of Project LIBERTY.

August 10-13, 2015

|

D a l l a s , Te x a s |

JOSHUA MARTIN is a program specialist in the Alternative Response program​with Child Protective Services, and is a Licensed Professional Counselor in the State of Texas. He began his career as a therapist working with children and families in an inpatient psychiatric facility. Joshua subsequently became the clinical manager for juvenile justice​programs. He later​ transitioned to a mental health and substance abuse policy specialist with the Texas Dept. of State​Health Services. LISA MARTINEZ is a Bi-lingual Forensic Interviewer for the Children’s Advocacy Center of Collin County. Lisa has conducted over 2500 Spanish and English forensic interviews. She is also the training coordinator for the CACCC Training Institute. Lisa has presented about interviewing children and working with Hispanic immigrants. ERIC MAYO is a Senior Inspector and has been a Deputy U.S. Marshal since 2004. He transferred to the District of Arizona’s Phoenix Office in 2013, where he was a member of the AZ Child Predator Apprehension Team and the AZ WANTED Fugitive Task Force. Eric is currently assigned to the National Sex Offender Targeting Center. CATHY MCGOFF is the Senior Manager for Law Enforcement and Information Security in Google’s Legal Department. She has spent the past 10 years building Googles subpoena compliance team and creating the legal online operations team that encompasses global legal removals, trademark complaints and legal investigations support. In her current role, Cathy is the point of contact for law enforcement questions regarding Googles data disclosure policies. THOMAS MCGREAL retired from the Chicago Police Department, as a homicide detective, with more than 29 years of service. After retirement, he was hired by the Cook County State’s Attorney as an investigator in the Post-Conviction Unit. He is a certified forensic interviewer and is currently employed by Wicklander-Zulawski & Associates as a speaker/consultant.

cacconference.org

SP E AK E RS

DANIEL LEWIS is an assistant district attorney in Collin County, Texas assigned to the Crimes Against Children Division. He prosecutes cases involving the sexual or physical abuse of children, ranging from Indecency with a Child and Injury to a Child, to Continuous Sexual Abuse of a Child and Capital Murder.

CHENGOS LIM works on the Dropbox Legal Operations team, which handles government data requests and child safety issues. She has a background in child safety initiatives, specifically the detection and disruption of grooming behavior on social media platforms.

MELANIE MALTERER is a Supervisory Psychologist for the Behavioral Analysis Unit (BAU) of the U.S. Marshals Service. She has conducted several hundred psychopathy assessments using the Psychopathy Checklist-Revised (PCLR) and Screening Version (PCL:SV) with male and female criminal offenders on probation and parole and in state and federal prisons and psychiatric hospitals.

69

LORI MCPHERSON serves as a senior policy advisor in the SMART Office for the US Department of Justice, Office of Justice Programs. Prior to joining the SMART staff, she served as a senior attorney at the National District Attorneys’ Association (NDAA) where she was the Child Sexual Exploitation program manager. LAWRENCE MEYER is a Special Agent and a 28-year veteran of the FBI. Since 2007 he has been assigned to the crimes against children program and has investigated child abductions and crimes involving the online exploitation of children falling within the FBl’s Innocent Images investigative program. Lawrence is an online undercover agent and serves as the coordinator for the Jacksonville Child Exploitation Task Force. ERIKA MILLER is the Director of Internet Safety at WebWatcher, a division of Awareness Technologies. Her role at WebWatcher is to identify child Internet trends and educate parents of these trends and how best to protect their children online in order to ensure their safety. Erika is also responsible for building alliances with leading organizations who promote Internet safety including the National PTO and BeSure Consulting. DOUG MILLICAN has been a prosecutor with the Dallas County District Attorney’s Office for 10 years. In his time as a prosecutor, he has been assigned to the Child Abuse Division and Gang Unit. As a child abuse prosecutor, Doug prosecuted cases of sexual and physical abuse against children. While in the gang unit, Doug focused on prosecuting violent offenses involving members of criminal street gangs and gang-related conduct.

S PE A KE RS 70

SANDY MORELAND is a 26-year veteran in law enforcement and holds a Master’s Certification as a Peace Officer in the State of Texas. She has served at the Dallas County District Attorney’s Office as a Senior Sergeant Investigator for over 15 years. Sandy spent seven of those years in the Juvenile Division and the past eight years in the Child Abuse Division. Her cases range from Sexual Abuse to Capital Murder. MARSHAL MORGAN is an Assistant U.S. Attorney for the District of Puerto Rico. He is currently the Coordinator of the recently created Crimes Against Children and Human Trafficking Unit. He has personally prosecuted more than 125 cases involving the sexual exploitation of minors and human trafficking.

JONATHAN MORRIS is a Board Certified Radiologist and CAQ Neuroradiologist who codirects the 3D printing Anatomic Modeling Lab at The Mayo Clinic in Rochester, MN. His group has been developing techniques to incorporate real time additive manufacturing into the clinical workflow of a large quaternary referral center. Special interests are in the use of additive manufacturing as a demonstrable aid in the fields of forensic pathology specifically in pediatric trauma. SEAN MORRISSEY is the CEO of Katana Forensics who has a background in the U.S. Army and law enforcement. After his career in law enforcement, Mr. Morrissey was a military adviser in Africa, instructor of forensics at DC3, and a mobile device examiner at the US State Department. Mr. Morrissey has authored books in forensics and still continues to support law enforcement throughout the U.S.  EDGARDO MOTTA is a Manufacturer Specialist in a Medtronics pharmaceutical in Puerto Rico. He was born and raised in Aibonito, Puerto Rico. At the age of seven while studying at the San Jose Catholic School, he was introduced to Father Israel. Father Israel gave him gifts, attention, winning his trust, and ultimately sexually abused him. When he found the courage to speak up, he found himself and his family harassed by the congregation. KEVIN MULCAHY works as an assistant US attorney in Detroit and serves as Chief of the General Crimes Unit. As chief, he oversees the Project Safe Childhood program, as well as supervising gun, drug, and other federal prosecutions. For his own caseload, Kevin focuses on child exploitation crimes, including production of child pornography cases and traveler cases. LINDSAY NAEDER joined Autism Speaks Family Services in 2012. She is currently responsible for directing the National Autism Response Team, as well leading Autism Speaks’ Safety & Wandering Prevention Initiatives. Lindsay and her team provide critical access to information, tools, and resources. KEVIN NAVARRO spent 31 years with the Dallas Police Department. In his last 15 years, he was assigned to the Dallas Police Academy where he developed curriculum and provided advanced instruction in topical areas. He is also responsible for designing dynamic, realistic force-on-force scenario based training for inservice officers in the Dallas Police Department.

August 10-13, 2015

|

D a l l a s , Te x a s |

NICOLE NEARING is a Trust and Safety Ambassador at Kik, Interactive Inc. and is responsible for engaging directly with law enforcement agencies to provide assistance and educational seminars regarding Kik’s policies and procedures for child exploitation investigations. She is actively involved in creating processes and tools to support law enforcement as well as other child safety initiatives. CHRIS NEWLIN is the Executive Director of the National Children’s Advocacy Center where he is responsible for providing leadership and management and participating in national and international training and leadership activities. He has worked in both urban and rural Children’s Advocacy Centers and currently serves on many boards. JENNIFER NEWMAN is the Senior Program Strategist for NCMEC’s Child Victim Identification Program (CVIP). She works to help improve the daily processes within CVIP to assist law enforcement and prosecutors with rescuing children and securing convictions in child pornography crimes. In addition, Jennifer provides assistance across the entire Exploited Children Division with special projects and policy development. WAYNE NICHOLS is a Detective working for the Henderson, NV Police Department. He has been in law enforcement for more than 12 years. During his tenure, he has been assigned to the department’s Computer Crime Unit where he has been a forensic examiner and has conducted proactive enticement and P2P investigations. SHANNON O’BRIEN is an assistant attorney general for the State of Illinois, serving in the High Tech Crimes Bureau and working on Illinois ICAC cases around the state. She has prosecuted child pornography and sexual abuse cases for the last five years, both in Illinois and in Florida where she worked as an assistant State attorney in Orlando for six years before moving to Illinois in 2013. KERRY O’CONNELL is an assistant district attorney in the New York County District Attorney’s Office. Kerry has prosecuted many high profile cases in Manhattan, serving her office in the Trial Division as a line assistant, senior trial counsel, a member of the Sex Crimes Unit, Chief of the Child Abuse/Family Violence Bureau, and she is currently a bureau chief supervising 50 trial attorneys.

cacconference.org

NANCY OGLESBY has been a prosecutor for 17 years and is currently the Deputy Commonwealth’s attorney supervising the Juvenile and Domestic Relations Court team for Henrico County. She has handled thousands of domestic violence, child abuse, and sexual assault cases in her career. She has also trained many professionals on these types of cases. SANDRA ONYI is a certified pediatric nurse practitioner specializing in child abuse and primary care. She has worked in the child abuse field from a medical position since 2002. Sandra is currently employed at Children’s Health Dallas in the REACH (Referral and Evaluation of at Risk Children) Clinic. She is the SANE coordinator for the hospital and is a reviewer of the Journal of Pediatric Healthcare. ALEK PACHECO is a Special Agent with Homeland Security Investigations and a member of the Puerto Rico Crimes Against Children Task Force. He has been assigned to the Child Exploitation Investigations Group for the past 8 years. He has trained law enforcement officers, prosecutors, and government officials in Argentina, Colombia, El Salvador, and Puerto Rico. JOHN PALMER is a Senior Instructor in the Behavioral Science Division at the Federal Law Enforcement Training Center. He retired from the Dallas Police Department after 28 years of service. John served as a homicide detective for 15 years, and as an instructor at the Dallas Police Department’s in-service academy regarding investigative topics.

JANA PARKER is the Senior Marketing and Engagement Specialist at the Dallas Children’s Advocacy Center. In this role she manages the year-round strategic marketing and public relations strategies to increase the profile of DCAC and its unique role in the community. She also maintains viral social marketing pieces and updates to DCAC’s social media accounts. MARTY PARKER has been a Special Agent with the FBI for more than 16 years. She has worked Crimes Against Children, including child abductions, child sex tourism and juvenile sex

CARRIE PASCHALL is the Director of Forensic Services at the Dallas Children’s Advocacy Center where she oversees the forensic interview team. Carrie has conducted over 5,300 interviews of children and is often called upon by prosecutors to testify as an expert witness in forensic interviewing, disclosure, grooming and recantation. TERRI PATTERSON has been assigned to the FBI’s Behavioral Analysis Unit III since 2010, and has investigated and consulted on a variety of crimes against children matters. She has conducted research in the area of juvenile sex trafficking and is an author of the FBI’s recently published Sex Trafficking of Juveniles: An Investigative Guide. JENNIFER PERESIE has been an assistant United States Attorney for the Middle District of Florida since 2010. She focuses on child exploitation crimes. Prior to joining the USAO, she practiced at a law firm specializing in commercial litigation in Washington, D.C. and clerked for the U.S. Court of Appeals for the Eighth Circuit. RUSSELL PETTY currently serves as the Senior National Outreach Coordinator at the National Center for Missing & Exploited Children (NCMEC). In this capacity, Russell is responsible for developing and maintaining relationships with national, state, and local organizations, agencies, as well as groups representing educators, law enforcement, and other key stakeholders throughout the U.S. JOHN PIRICS is a detective and a 20-year veteran of the Carmel Police Department. He has spent over half of his career investigating crimes against children, and he has been assigned to the Hamilton County Metro Child Exploitation Task Force for the past eight years. SHANTAL RANDS POOVALA has been working on the child safety team at Google for the past 12 years. She manages the teams that handle the reporting of child sexual abuse to NCMEC and process user data disclosure requests from law enforcement. Shantal is the Chairperson for the Technology Coalition for Child Safety and serves on the Board of Directors for a California accredited Child Advocacy Center.

August 10-13, 2015

|

D a l l a s , Te x a s |

DAN POWERS is the Senior Vice President and Clinical Director for Children’s Advocacy Center of Collin County in Plano, Texas. He supervises a staff of 22 therapists and clinical interns providing no cost services to victims of child abuse and their non-offending family members. He has more than 25 years’ experience working in the field of child abuse. DEREK PRESTRIDGE has served with the Texas Department of Public Safety for 20 years. In 2013, Derek promoted to Lieutenant and is currently assigned to the Texas Ranger Division as the Lieutenant of the Texas Crimes Against Children Center. With the Department’s Education Training and Research Division. There, he helped implement the Interdiction for the Protection of Children (IPC) program. EREN PRICE is currently the Chief Prosecutor for the Child Abuse Division for the Dallas County District Attorney’s office. Her current and previous responsibilities have included supervising other prosecutors, coordinating all physical and sexual abuse investigations and prosecution efforts for all Dallas County law enforcement, the trial of complex cases, and the liaison between the District Attorney’s Office and the Dallas Children’s Advocacy Center.  SHEILAH PRIORI is the Sexual Assault Medical Management Team program director for the US Army at Fort Hood, Texas. Her team is responsible for providing comprehensive care to active duty service members seeking medical assistance following a sexual assault. Sheila has more than ten years’ experience in the field of forensic nursing, has conducted hundreds of sexual assault examinations and has testified as an expert witness in several of those cases. CINDY PULCHER is the chief prosecutor over Internet Crimes Against Children for the Montgomery County District Attorney’s Office. She is board certified in criminal law and has tried several child abuse cases. Cindy often speaks at area schools and events in an effort to raise awareness for Internet safety. IAN QUINN serves as the Deputy Assistant Director for the Investigative Services Division and the Head of the Cyber Crimes Center (C3) within U.S. Immigration and Customs Enforcement’s Homeland Security Investigations (HSI). He oversees HSI investigative and programmatic efforts toward combatting online child exploitation. 

cacconference.org

SP E AK E RS

KEVIN PAPINEAU is a major crimes detective with the Elk Grove Police, CA Police Department. He has been a detective with the Elk Grove CA Police Department since the department’s inception in 2006. Kevin was previously a detective and deputy sheriff with the Sacramento County Sheriff’s Department for 13 years.

trafficking cases, for almost her entire career. Marty is a member of the FBI’s Child Abduction Rapid Deployment Team (CARD), and is also a member of the Bay Area Child Exploitation Task Force with Oakland Police Department.

71

READE QUINTON is a board certified forensic pathologist and is an Associate Professor of the Department of Pathology at UT Southwestern Medical Center in Dallas, Texas. He is the Deputy Chief medical examiner of the Southwestern Institute of Forensic Sciences (SWIFS), and the director of the Forensic Pathology fellowshiptraining program. Reade is the current Chair of the Texas Child Fatality Review Team. GALINA RABOTENKO is the marketing director of Oxygen Forensics Inc. She is responsible for providing leadership and management in the planning and selection of a wide range of information technology solutions. Galina is experienced in team management as well as product management. DALIA RACINE is a deputy chief assistant district attorney with the DeKalb County District Attorney’s Office in Decatur, Georgia. She prosecutes Human Trafficking and Commercially Sexually Exploited Children cases in the Metro Atlanta area. Recently, she was tasked with starting the Human Trafficking Unit in her district attorney’s office and to formulate a countywide response to this issue. KRISTEN REEDER works as a child abuse pediatrician with the REACH (Referral and Evaluation of At-Risk Children) Team at Children’s Medical Center in Dallas and Plano. Through her work, she medically evaluates children with concerns of physical and sexual abuse, neglect, and failure to thrive.

S PE A KE RS

ASHLEY REYNOLDS had just turned 14 years-old when she was asked by a purported 16 year-old boy to “friend” her on MySpace. This began two years of victimization by an unknown predator who extorted her for explicit images. In 2009 her mother found these images, resulting in a report to the National Center for Missing and Exploited Children. Ashley has since become an advocate for all of her perpetrator’s victims. JEFF RICH is a detective assigned to the Plano, Texas Police Department’s Family Violence Unit as a child abuse and violent crimes investigator. As a member of the multidisciplinary team, Jeff has investigated more than 4,500 child abuse and child exploitation cases. He also investigates Internet crimes against children and conducts online child exploitation investigations as a Special Deputy U.S. Marshal assigned to the FBI’s Innocent Images Task Force. MIKE ROBINSON has been with the Vanderburgh County Sheriff’s Office since 2004. He

72

has held the position of the Sex or Violent Offender Registration Coordinator for the past four years as part of his assignment to the Criminal Investigation Section. In that capacity, Mike oversees the day-to-day operations of the offender registry, as well as conducting training for new deputies on registry requirements and protocols. STEWART ROBINSON is a senior counsel for the U.S. Department of Justice (DOJ). He has handled and supervised thousands of criminal prosecutions and investigations as an assistant district attorney, an assistant U.S. attorney, principal deputy director of DOJ’s Office of International Affairs, DOJ’s representative to the European Union in Brussels, and the US prosecutor assigned to Eurojust in The Hague. CHRIS ROOSENRAAD is responsible for all areas of customer security for Time Warner Cable. In addition to his work at TWC, he has taught classes on computer security at several levels, most recently a class on bots & malware at Williams College. Chris is a board member on several industry organizations, including the Technology Coalition against online child exploitation. AMY RUSSELL is executive director of Gundersen National Child Protection Training Center, providing programmatic oversight, training and technical assistance for child protection professionals. She also serves as an expert witness in state and federal courts and as a pro bono attorney for children in dependency court. She has provided counseling to child victims of abuse and worked with multiple children’s advocacy centers and multidisciplinary teams. SUE RYAN is a program attorney with the Stalking Resource Center. She provides technical assistance and training on stalking to law enforcement, prosecutors, victim service providers, and other professionals. Sue also conducts legal research and analysis on current state and federal stalking laws, case law, and legislation. JAD SALIBA is a former digital forensics investigator who left policing in 2011 to devote his time to developing software solutions that dramatically improve the process of recovering and analyzing Internet evidence left behind on computers, smartphone, and tablets. As Magnet Forensics CTO, Jad remains focused on researching new methods of recovering an analyzing all types of digital evidence for forensic investigations.

August 10-13, 2015

|

D a l l a s , Te x a s |

JASON SANCHEZ is an Operations Analyst at Yaana Technologies and a frequent attendee to law enforcement technology conferences. Jason has 13 years of experience focused on customer support, operations analysis, user experience, and product training. For the past 3 years, Jason has focused on law enforcement technologies, globally working with federal, state, and local agencies. JONATHAN SCHICK is the president of GOAL Consulting. He helps organizations unlock their potential. His clients include the American Red Cross, United Way, Girls Incorporated, Gilda’s Club Worldwide, and the Dallas Children’s Advocacy Center. As the author of The Nonprofit Secret: Six Principles of Successful Board/CEO Partnerships, Jonathan holds an appointment as adjunct professor at the University of North Texas. CANDACE SCHOPPE is a forensic pathologist at the Southwestern Institute of Forensic Sciences and Assistant Professor of Pathology at the UT Southwestern Medical School in Dallas, Texas. She completed both forensic and neuropathology/cardiac pathology fellowships in New York City. Candace is board certified in anatomic, clinical, and forensic pathology. She currently serves on the Child Death Review Committee for Dallas County. AMBER SCHROADER has been a driving force for innovation in digital forensics for the past two decades. She has developed over two dozen software programs designed for the purpose of recovering digital data from mobile phones, computer hard drives, email, and live monitoring services. She coined the concept of the “360-degree approach to digital forensics.” LISA SCHUSTER is a pediatric psychologist in the REACH (Referral and Evaluation of At-Risk Children) Clinic at Children’s Medical Center Dallas where she specializes in working with suspected victims of child maltreatment. In this role, she assesses children and adolescents for difficulties in social-emotional or behavioral functioning and evaluates safety, adjustment, and psychosocial risk factors. CAROL SCHWEITZER has been working at the National Center for Missing & Exploited Children (NCMEC) since 2006. The majority of her time has been in the Forensic Services Unit specializing in cold cases of missing and unidentified children. She currently provides direct support to medical examiners and law enforcement on unidentified deceased child cases.

cacconference.org

LINDA SEABROOK is currently an Attorney Advisor with the Victim-Witness Staff of the Executive Office for United States Attorneys (EOUSA). In that role, she provides legal and policy guidance, technical legal assistance, and training for the United States Attorneys’ offices on the statutes, policies, and regulations regarding victims of federal offenses. JIM SEARS has been a law enforcement officer for more than 30 years working with the Irving Police Department. He is the supervisor for the Domestic Violence, Child Abuse, and Youth Service Units at the Irving Family Advocacy Center. JOHN SEDOSKI is a Computer Crime Specialist for the National White Collar Crime Center (NW3C). He has provided thousands of hours of training to numerous state, local, and federal law enforcement personnel in topics ranging from basic identifying and seizing of electronic evidence to the analysis of artifacts found in a variety of file systems and operating systems. JEFF SHACKELFORD is a special agent and the Director of Digital Forensics at the Arkansas Attorney General’s Office and serves as regional president for the High Tech Crime Network. A 15-year law enforcement veteran, he has been an active member in the digital forensics, cyber-crime, and ICAC arenas for the past eight years and is certified in computer and cell phone forensics. JULIAN SHER is an investigative journalist and the author of six books. His most recent book, “Somebody’s Daughter: The Hidden Story of America’s Prostituted Children and the Battle to Save Them,” was hailed as “the most definitive account of sex trafficking of children in the United States.” He also wrote the book “Caught in the Web” about Internet child predators.

ALIX SKELTON is a Special Agent with the Federal Bureau of Investigation and has been assigned to the Albany Division, Syracuse Resident Agency, where she works Violent Crimes Against Children focusing on Child Pornography, Child Sex Trafficking, and Enticement mat-

JASON SKRDLANT is a 15-year veteran of the Oakland Police Department. He was assigned to the Vice and Child Exploitation Unit from 20092012 and is currently on his second assignment back in that unit. Jason has investigated dozens of Internet facilitated crimes against children and adults to include prostitution, sexual assault, kidnapping, and robbery. DENISE SMITH is an investigator in Google’s Trust and Safety team that is responsible for the protection of Google revenue, users and brand. Her area of expertise is child safety investigations, wherein she investigates cases where it appears a child may be in immediate danger or if a user’s conduct appears to be that of a producer who has access to children. TYLER SMITH is an Assistant United States Attorney in the Eastern District of New York. For three years, he was one of the District’s Project Safe Childhood Coordinator. He has been responsible for handling some of his Office’s most high profile child exploitation prosecutions. DIANNA SMOOT is the Director of Community Education at the Dallas Children’s Advocacy Center. In this role she oversees the development and implementation of child protection training geared to child-serving organizations, community members, and children. She also coordinates the DCAC Lecture Series, a workshop series for child protection professionals. TAMMY SNEED is the Director of Gender Responsive Adolescent Services for the Department of Children and Families. Over the past several years Tammy has focused her efforts on Commercial Sexual Exploitation of Children and Domestic Minor Sex Trafficking. Tammy leads the HART (Human Anti-trafficking Response Team) for the state of Connecticut. AARON SPIVACK has been a Special Agent with the FBI since 2006 investigating Crimes Against Children. He has years of experience interviewing subjects and victims of child sex abuse crimes. Aaron is an undercover agent who has met with subjects both online and in person, resulting in dozens of arrests for charges spanning from child exploitation to attempted kidnapping and conspiracy to murder.

Enterprises. She began her career in the insurance industry, rising through the ranks into management. Her goal is to educate children and adults sexual abuse. Along with her corporate career, she has also been featured in several national television and radio commercials. JOHN STARR leads the Minor & Content team at Twitter, which focuses on issues related to child sexual exploitation, as well as other safety and privacy policies pertaining to minors. Prior to joining Twitter, John spent five years with the FBI where he managed the development and nationwide launch of the FBI Safe Online Surfing Internet Challenge. JULIE STAUFFER is a forensic interviewer and trainer with CornerHouse, where she conducts forensic interviews with children and vulnerable adults regarding allegations of abuse or witnessing of violent crimes. She is a co-developer of the CornerHouse Multisession Forensic Interview process: a modification of the forensic interviewing process designed to meet the needs of very young children or children with other special needs. CHAD STEEL is an adjunct professor at George Mason University, where he teaches digital behavioral analysis as part of their master’s program in computer forensics. He has been involved in hundreds of digital investigations, and publishes an annual list of terms strongly associated with child pornography for law enforcement use in digital forensics. DANIEL STEELE is currently assigned to the Denver Police Department’s Criminal Investigative Division. He is a Sergeant and the supervisor of the Rocky Mountain Innocence Lost Task Force and has drafted Denver Police Policy and Procedure concerning prostitution enforcement, human sex trafficking, and asset forfeiture. Daniel has also been featured as a human sex trafficking expert in numerous public media arenas. MIKE STERN is a retired 28 year veteran law enforcement officer. Mike has been a Computer Crime Instructor with NW3C since February 2007. During his tenure, he has instructed in the areas of computer forensics, cell phone investigation/interrogation, GPS investigation and advanced wireless investigation. He has also instructed classes in MAC and iOS device investigations. He is currently assisting in the creation of a class on Basic Network Intrusion Investigations (BNII).

SP E AK E RS

JOEL SHOULTZ started in 2008 as WatchSystems’ first Account Manager. He works with clients in several states to ensure that OffenderWatch is meeting the needs and goals of local and state law enforcement agencies, as well as their citizens. Joel has been a key player in their state implementations as well as guiding their clients through setting up NCIC exchanges.

ters. Alix works closely with the United States Attorney’s Office for the Northern District of New York to identify and prosecute perpetrators.

JJ STAPLES is a child sexual abuse advocate, published author, survivor, and CEO of Staples

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

73

PAMELA STRATIGAKIS is an Assistant State’s Attorney in Cook County, Chicago. She is currently assigned to the Sexual Assault & Domestic Violence Division, and the Internet Crimes Against Children Task Force where she focuses on technology facilitated sex crimes against children. In the Internet Crimes Against Children Unit she prosecutes technology facilitated crimes against children.

JIM TANNER has 44 years of experience working with sex offenders. He is a nationally recognized and court certified expert on sex offenders, grooming, and digital sexual behavior. He provides training for ICAC, NLECTC, USDOJ, HTCIA, ATSA, U.S. Courts, and many other agencies each year. He is sworn staff in Colorado and serves as the forensic examiner for the 20th Judicial District Probation Department.

NATHAN STUMP is an Assistant U.S. Attorney in the Southern District of Illinois. He previously served as the Project Safe Childhood Coordinator for the Middle District of Alabama and has successfully prosecuted dozens of child exploitation cases, including peer-to-peer distribution, obscenity, sextortion, and the first case ever to be tried under the federal antigrooming statute.

JOSHUA TEPFER is a Staff Attorney with the Exoneration Project in Chicago. Josh has been involved with more than ten exonerations of convicted men, including many involving false confessions. Josh lectures and writes frequently on issues related to interrogations, confessions, and wrongful convictions.

EDWARD SUK is Executive Director of the National Center for Missing & Exploited Children/New York Regional Office. He coordinates NCMEC’s bi-annual Northeast Tribal Summit on Child Exploitation, is former chairman of the New York State Children’s Alliance (NYSCA), past president of the National Children’s Alliance (NCA), and has served on the NYS Governor’s Advisory Board on Interactive Media and Youth Violence. JOE SULLIVAN is a Forensic Psychologist specializing in providing Behavior Analysis and Offender Profiling advice to law enforcement investigations into sexual crimes against children. He is a lecturer and senior research fellow in Criminology and Forensic Psychology. He is involved in several longitudinal research projects exploring perpetrator behavior.

S PE A KE RS 74

MICHAEL SULLIVAN is a thirty-six year veteran of law enforcement. He was the Deputy Chief of the Investigations Division for the Illinois Attorney General’s Office and the ICAC Task Force Commander for almost ten years. He is the author of two books, Safety Monitor and Online Predators, which focus on the use of computers to victimize children. PETRA TALENS is an analyst working for the Criminal Investigations Unit of the Dutch National Child Exploitation Team. As an analyst, she applies different methods to create an insight into the criminal activities of individual suspects and into the structure of online child exploitation networks. She works extensively with various experts in the field in developing new analyzing methods and tools.

SHERRE THOMAS is an Assistant District Attorney in Dallas County, Texas. Sherre is currently the Deputy Chief of the Child Abuse Division. For nine years, Sherre has prosecuted felony crimes involving the sexual and physical abuse of children, including death from abuse. She also trains prosecutors on child abuse issues and successful child abuse prosecutions and investigations. REYNIE TINAJERO is a Deputy Chief with the Dallas County District Attorney’s Office. He has spent 14 years prosecuting cases in the Child Abuse Division where he is now one of two deputy chiefs in charge of 13 prosecutors. As a Deputy Chief, he supervises younger prosecutors as well as trying his own cases. The majority of his cases are child death cases. CAROL TODD is Amanda Todd’s mother. Amanda took her own life at age 15 after her never-ending struggle as a victim of cyberbullying and exploitation. Since that day, Carol has courageously taken a stand and shared Amanda’s story with her community and the world. She has become a global advocate sharing the voice of her beloved daughter and increasing awareness of bullying in all forms and mental health issues in our youth. ELIZABETH TOW is a High-Tech Crime training specialist in the High-Tech Crime Training Services Department of SEARCH, where she coordinates and provides training on high-tech crime investigations. Before joining SEARCH, she spent five years in local law enforcement where she gained experience in curriculum development and training and ICAC peer-to-peer investigations.

August 10-13, 2015

|

D a l l a s , Te x a s |

LEAH TREITMAN is the Program Coordinator for Thorn: Digital Defenders of Children. She works on many of Thorn’s programs, which are focused on using technology to prevent and combat child sexual exploitation. Thorn does this work by conducting research, developing tech tools, creating deterrence programs, and managing a technology task force that brainstorms and implements new solutions to this problem.  LISA TU is a research analyst with Marinus Analytics, whose mission is to deliver cutting edge research to law enforcement, lawmakers, and non-profits, keeping them ahead of criminals and providing them with investigative tools to fight crime and track victims of human trafficking. JONATHAN TURBETT is a Special Agent with the Iowa Division of Criminal Investigation assigned to the Gaming Unit. After five years, he was reassigned to the Major Crimes Unit, where he has worked since 2005. Jon has investigated a significant number of felony level offenses, including homicides, human trafficking, and fraud. He is an instructor at the Iowa Department of Public Safety Academy and the Iowa Law Enforcement Academy. DARREL TURNER is a clinical forensic psychologist employed in private practice. He has worked in the Federal Prison System and continues to assist attorney and law enforcement agencies with training, consultation, and details regarding undercover sex crimes and narcotics. Dr. Turner has been qualified as an expert witness in federal court with a specialty in forensic psychology and sex offending. BRANT UNGERER is a Detective with the Milwaukee Police Department with over 20 years in Law Enforcement. He worked in the Sensitive Crimes Unit investigating sexual assaults and child abuse cases, and for the past four years he has been a full time Task Force Officer with the FBI Milwaukee office, investigating Child Exploitation offenses. MONICA URBANIAK is the Clinical Director for the Dallas Area Rape Crisis Center. In addition to helping survivors heal through therapy and support, Monica dedicates time to training clinicians, advocates, and community members on issues related to sexual violence, including effective treatment practices, the impact of trauma on survivors and systems, and social/ cultural issues in sexual assault treatment and advocacy.

cacconference.org

VIVIANA URDANETA is a Bilingual Therapist and functions as one of the Assistant Clinical Directors at Genesis Women’s Shelter & Support, where she works with adult and child victims of domestic violence in the shelter, transitional housing, and the long-term counseling center. Viviana provides individual, family, and group therapy. She advocates for clients, promotes domestic violence education, and assists in managing a staff of 15 clinicians. EMILY VACHER joined Facebook in 2011 and is currently Trust & Safety Manager with Facebook’s Security team. Emily is responsible for law enforcement outreach, global safety initiatives, safety education, and security policy matters. She is currently focusing on Facebook’s AMBER Alert program and child safety issues.

DANNAH VARDAMAN joined the National Center for Missing & Exploited Children more than eleven years ago and is currently the Supervisor of the Sex Offender Tracking Team (SOTT). SOTT is dedicated to supporting all types of law enforcement and state sex offender registries in identifying and locating noncompliant registered sex offenders. JUSTIN VICKERS is a Chief Inspector and works in the U.S. Marshals Service’s Sex Offender Investigations Branch providing program area oversight and support to U.S. Marshals’ District Offices in the states of Texas, Oklahoma, Arizona, and New Mexico. The majority of his career has been spent working in and supervising fugitive apprehension task forces. VICTOR VIETH serves as the Executive Director Emeritus of Gundersen National Child Protection Training Center headquartered in Winona, MN. In this position, Victor develops long-term strategies for expanding programs, teaches, publishes, creates programs, and works on public policy issues related to child protection. He has trained thousands of child-protection professionals on topics pertaining to child abuse investigations, prosecutions, and prevention.

VERONIQUE VALLIERE is a clinical and forensic psychologist who has worked with offenders and victims of interpersonal violence for more than 25 years. She is the owner of two outpatient practices – one for victims and one for violent offenders – and is a member of Pennsylvania’s sexual offender assessment board. She has trained for the FBI, DOJ, DOD, as well as testified as an expert across the country and for the military.

LAUREN WAGNER is a High-Tech Crime training specialist in the High-Tech Crime Training Services Department of SEARCH where she performs tasks related to training local, state, and federal agencies on computer technology issues with criminal justice applications. She is a recognized national expert on the role that social networking websites can play in law enforcement investigations, and has authored numerous white papers for investigators.

MADELEINE VAN DER BRUGGENS is an expert on sex crimes working for the Dutch Child Exploitation Team of the National Police of the Netherlands. In this role, she delivers training and gives behavioral investigative advice for local and federal child pornography and child abuse investigations. She regularly consults on matters such as interviewing techniques, threat and risk assessments and offender profiling.

MICHAEL WEBER is an investigator with the Tarrant County District Attorney’s Office and has been a police officer for 31 years, including ten years investigating crimes against children. He has investigated approximately 15 cases of medical child abuse since 2009, including six cases, which resulted in arrest and prosecution of the offender.

LISA VAN HEUTGEN is a trust and safety ambassador at Kik, Interactive Inc. and is responsible for engaging directly with law enforcement agencies to provide assistance and educational seminars regarding Kik’s policies and procedures for child exploitation investigations. She is actively involved in creating processes and tools to support law enforcement as well as other child safety initiatives.

MELINDA WESTMORELAND is a prosecutor with the Tarrant County District Attorney’s Office in Fort Worth, Texas. She has been with the District Attorney’s Office for more than eight years. Melinda is assigned to the Special Victims Unit, which specializes in the prosecution of child sexual and physical abuse, child homicides and violent crimes to the elderly and disabled. She has provided training to prosecutors, law enforcement, Child Protective Services, and medical personnel.

August 10-13, 2015

|

D a l l a s , Te x a s |

JEFF WHERRY directs the Research Institute of the Dallas Children’s Advocacy Center. The Research Institute provides leadership on the effectiveness of interventions, investigations, longterm outcomes, and prevention services for child abuse victims. Jeff was the CEO of the St. Louis CAC, where he was involved in outpatient work with sexually abused children and research. CARMEN WHITE is an Administrative Chief Prosecutor at the Dallas County District Attorney’s Office. In this role, she supervises the Child Abuse Division, the Animal Cruelty Unit as well as 12 felony court prosecutors. She served in the Child Abuse Division for over ten years where she prosecuted crimes against children. Carmen speaks nationally on issues of child abuse. JIMMY WIGGINS is an investigator with the County Attorney’s Office in Montgomery County, Texas where he assists in the investigation and prosecution of juvenile crime. In this role, Jimmy has helped prepare cases involving juvenile sexual offenders and routinely works with law enforcement from the inception of a case through the final prosecution. AUTUMN WILLIAMS  is the Curriculum Specialist at the Dallas Children’s Advocacy Center. In this educational role she focuses on preventing child abuse by developing child protection curriculum and providing professional training and consulting to child-serving organizations. The curriculum previously available only locally is now nationally-relevant and available through the launch of the DCAC Training Center. ERIN WILLIAMSON is the Survivor Support Coordinator for Love146. Within this role, Erin sits on the New Haven MDT and has led the development, implementation, and operation of Love146’s aftercare program for child survivors of human trafficking. She has more than 10 years of direct service, program management, and applied research experience in the fields of social service and criminal justice.

cacconference.org

SP E AK E RS

JAMES VALLEY is a Lieutenant for the Brown County Sheriffs’ Office. He has been a law enforcement officer for the past 20 years. In 2001 he developed an Undercover Internet Chat and Internet Crimes against Children Program at the Door County Sheriff’s Department and Brown County Sheriff’s Office. He has also developed a multi-jurisdictional Internet Crimes against Children Task Force.

STEVE WHALEN is the CEO and founder of SUMURI, a leading provider of training and services relating to digital evidence and computer forensics worldwide. Steve has developed and delivered forensic training to thousands of investigators and examiners around the world. Steve is also the developer of the successful Macintosh Forensic Survival Courses and developer of the popular PALADIN and RECON forensic software.

75

WILLIAM WILTSE has been a police officer for the past 23 years and is sworn with the Palm Beach County Sheriff’s Office. He is currently employed by Child Rescue Coalition in Boca Raton, Florida, where he directs the development of software tools targeting those who create and disseminate child pornography over the Internet. He specializes in software development and conducts forensic computer exams for cases involving child sexual exploitation GERI WISNER is a citizen of the Muscogee (Creek) Nation and a former U.S. Marine. Currently she is the Tribal Prosecutor for the Pawnee Nation and Wyandotte Tribe of Oklahoma, the Executive Director for the Native American Children’s Alliance (NACA) and a partner with the Allen & Wisner law firm. Along with her prosecutorial duties, Geri presents nationally, addressing criminal justice issues specific to Indian Country.

AMY ZACHARIAS is an assistant county attorney in the Pottawattamie County Attorney’s Office and has more than 11 years of experience in criminal law as a defense attorney and a prosecutor. She is responsible for felony and misdemeanor child abuse prosecutions along with kidnappings, felonious assaults, and arsons. SEAN ZADIG is the Senior Manager of the Yahoo E-Crime Investigations Team, located in Sunnyvale, CA. Sean and his team investigate a variety of abuse of Yahoo services or harm to Yahoo users, including child abuse material. He was previously an investigator at Google, and a federal agent with the NASA Office of Inspector General for seven years.

ERIC ZIMMERMAN is an FBI Special Agent assigned to the cyber squad of the Salt Lake City FBI field office where he has been investigating child pornography and computer intrusions since 2008. He is a member of the Utah ICAC and has provided training and assistance to dozens of local, state, federal, and international law enforcement agencies. Eric has developed several computer programs to aid in the investigation and prosecution of child exploitation matters that are used around the world.

THANK YOU TO THIS YEAR’S CONFERENCE SCHOLARSHIP FUND CONTRIBUTORS FOR THEIR GENEROUS SUPPORT

RICHARD WISTOCKI is a detective and 25year veteran of the Naperville Police Department. For the past 19 years he has been assigned as an Internet Crimes Investigator. He is responsible for the investigation of child exploitation, Cyberbullying, computer tampering, harassment through electronic communication, and computer fraud. Richard is a member of the U.S. Secret Service Computer Crimes Task Force. ALI WOLF is the Training and Technical Assistance manager at Girls Educational and Mentoring Services (GEMS) in New York City. She manages curriculum development, facilitates trainings, and provides technical assistance to legal professionals, law enforcement and social service professionals on the issues of commercial sexual exploitation and domestic trafficking of youth. CHRISTINE WOMBLE is an Assistant District Attorney with the Appellate Division of the Dallas County District Attorney’s Office. Christine received her Texas law license in 2005. She is also licensed in the Supreme Court of the United States. As an appellate prosecutor, Christine handles direct appeals and post-conviction litigation in capital and non-capital cases. MARK YARBROUGH was elected to five terms as the Lamb County District Attorney. He served for 20 years, prosecuting everything from death penalty cases to sexual assault and domestic violence cases. At the end of 2012, Mark retired as District Attorney and travels the country giving motivational speeches regarding Burnout. He has also written and been published on the subject of Burnout. 76

August 10-13, 2015

|

D a l l a s , Te x a s |

cacconference.org

EXHIBITOR INFORMATION EXHIBITOR SCHEDULE MONDAY:

WEDNESDAY:

TUESDAY:

FIRST FLOOR: 7:00 AM-6:30 PM SECOND FLOOR: 7:00 AM-6:30 PM

FIRST FLOOR: 7:00 AM-5:00 PM SECOND FLOOR: 7:00 AM-3:00 PM

BOTH FLOORS: 7:00 AM-5:00 PM

1ST FLOOR

Conference Center

COMPLIMENTARY 5 - MINUTE MASSAGES! MONDAY,TUESDAY, & WEDNESDAY

11:00 AM - 3:00 PM FIRST FLOOR EXHIBIT HALL DRAWING AS OF

Dallas Childrens Advocacy Center

6/30/

Drawing Started on:

August 10-13, 2015

3/25

BOOTH LEGEN

Sheraton Dallas Hotel / Lone Star Foyer~2nd Floor Dallas, Texas

33-10'x10

BUILDING LEGE

1a

1

Conference Center

2 3

Registration

2ND FLOOR

11

10

8

9

7a

7

6

4

5

3

2

1

EXIT

31 30 29 12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

11a

28

11b

27a

EXIT

EXIT

EXIT

EXIT

JOB NUMBER:

EXIT

LOUNGE

INNOVATION DEDICATE

EXIT TO GARAGE

EXIT

27b

306115

SELLING AE:

Brad Hobson PRODUCING AE:

Brad Hobson PARKING

SCALED TO F

DISCLAI

EVERY EFFORT HAS BE ENSURE THE ACCUR INFORMATION CONTA FLOORPLAN. HOWEVER N EITHER EXPRESSED OR MADE WITH RESPECT TO T IF THE LOCATION OF BUIL UTILITIES OR OTHER AR COMPONENTS OF TH

AccessData

EXHIBITORS Atola Technology

AccessData Group has pioneered digital forensics and litigation support for more than 20 years. Over that time, the company has grown to provide both stand-alone and enterprise-class solutions that can synergistically work together to enable both criminal and civil eDiscovery of any kind, including digital investigations, computer forensics, legal review, compliance, auditing and information assurance. More than 130,000 customers in law enforcement, government agencies, corporations and law firms around the world rely on AccessData software solutions, and its premier digital investigations products and services. AccessData Group is also a leading provider of digital forensics training and certification, with its AccessData Certified Examiner® (ACE®) and Mobile Phone Examiner Certification AME programs. 2ND FLOOR, BOOTH 12

Get more evidence faster with the first and only forensic data acquisition tool that works with both good and damaged media. Atola Insight Forensic can work with drives so damaged no other device can even detect them. Atola created Insight in collaboration with law enforcement agencies, private investigators and forensic experts from around the world. Not only is Insight Forensic the most powerful and quickest imager available, it is so simple to use. Very little, or no training, is required to be up and running in minutes. We have completely automated the entire hard drive recovery process: diagnosing, imaging and data recovery. Come visit our exhibit booth for a demonstration to see why so many forensic professionals rely on Insight for their most important work. 2ND FLOOR, BOOTH 18

ADF Solutions, Inc.

Attorney General of Texas Crime Victim Services Division

ADF Solutions, is the market leader in media exploitation and digital forensic triage tools used for scanning computers and peripheral devices. Leveraging an intelligence-led approach, these easyto-use tools rapidly extract actionable intelligence to help identify and capture suspects who are a threat to public safety or national security, and accelerate prosecution of criminals. These proven tools are actively used by field operatives in defense, intelligence, law enforcement, border security, and other government agencies worldwide. 1ST FLOOR, BOOTH 51

Airbnb.com

EXHIBITORS 78

Founded in 2008 and based in San Francisco, Airbnb.com is a trusted online community marketplace for people to list and book unique accommodations around the world. Airbnb is a global company that connects people to unique travel experiences in more than 34,000 cities and 190 countries. Come by Airbnb’s booth to meet the Company’s law enforcement liaison, learn how Airbnb responds to data requests from law enforcement, and pick up some Airbnb goods. Airbnb supports law enforcement, and we look forward to meeting you. Airbnb.com is a pioneer in the Sharing Economy, which is built on the centuries old practice of sharing assets. This economy has come on so powerfully that regulators and economists are still struggling to understand its impact. But one thing is clear: many of these companies have people engaging in behaviors considered risky by some groups, including law enforcement. People are hopping into strangers’ cars and welcoming them into their spare rooms. The majority of these interactions between strangers are problem free, but human behavior is unpredictable. This is when Airbnb works with law enforcement. 1ST FLOOR, BOOTH 70

The Crime Victims’ Compensation Program is dedicated to ensuring that victims of violent crime are provided financial assistance for certain crime related expenses. The fund can help eligible victims pay for medical or counseling bills or cover the cost of a funeral for a loved one who has been killed. 1ST FLOOR, BOOTH 58

relevant to nearly every digital forensics investigation, and is extremely helpful to accident reconstruction and insurance fraud investigation as well. Berla embraces ingenuity, innovation and creativity, and is focused on the future. The team takes great pride in solving tomorrow’s challenges, today. 1ST FLOOR, BOOTH 87

BIS Digital Inc. BIS has the unique ability to integrate communication, recording and multi-media system solutions with computers, networks, sound systems, video systems, camera and video recording systems, presentation technology systems, hearing impaired devices, digital audio and video recording software and operating systems for our customer’s mission critical applications. From concept to completion, BIS Digital provides total turnkey solutions and integrated systems based upon the specific needs of our users that include concept and planning, engineering of solutions and systems, purchase of product, installation, personal product and service training, and on-going support and service. 2ND FLOOR, BOOTH 21

Bluebear LES

The FBI’s Behavioral Research and Instruction Unit 3 (BRIU-3), formally known as the FBI’s Behavioral Analysis Unit 3, provides behaviorally-based operational support and training to law enforcement agencies involved in the investigation of crimes against child victims. BRIU-3 staff members also conduct research intended to gain a better understanding of the motivations and behaviors of offenders who target child victims. Insights gained through BRIU-3 research are refined into investigative suggestions and techniques, which are used in support of BAU3’s operational and training missions. 1ST FLOOR, BOOTH 86

Bluebear LES is focused on forensic solutions in the fight against Online Child Exploitation. Our objective is to design and develop software that gives law enforcement the solutions they need to do their jobs effectively, efficiently and successfully. BlueBear’s flagship product is called LACE. LACE is designed specifically to enable an investigator to review all visual content (images & videos) of a confiscated computer quickly, efficiently, and with minimal stress. The majority of the process is fully automated requiring only nominal input from the user such that investigators can do a complete and thorough analysis, rapidly create reports for court prosecution, and then immediately move on to the next case. LACE uses a superbly integrated solution to quickly process the overwhelming load of image and video evidence routinely associated with child exploitation cases. 2ND FLOOR, BOOTH 5

Berla

BookWoman

The Behavioral Research and Instruction Unit (BRIU - 3)

Since 2008, Berla has been a pioneer in the digital forensics field. With its origins in maritime, aviation, and handheld GPS devices, Berla’s repertoire has expanded to include mobile devices, media exploitation, vehicle system forensics and vehicle cyber security. Located in the DC area, Berla is made up of a small, forward-thinking team with varied skill sets and backgrounds. The company has strong ties to the Department of Defense, Homeland Security and Law Enforcement communities, and is developing roots within the commercial realm. Berla strives to educate and support investigators during a time of vehicle cyber security uncertainty. Vehicle forensics is a newly emerging field, and Berla provides continuous solutions for clients as the technology develops. Vehicle forensics is proving

August 10-13, 2015

|

D a l l a s , Te x a s |

BookWoman is an independent feminist bookstore located in Austin, Texas. We specialize in providing diverse and unique resources in support of the mental health and cultural needs of women and children across their lifespan. Additionally, we curate and provide books and educational materials in support of conferences, presenters and attendees. We have been a community and statewide resource for 40 years. 1ST FLOOR, BOOTHS 33-34

Callyo See what ICAC investigators nationwide are using to capture text messages and call recordings during traveler and sting operations. Callyo’s Virtual Investigation PhonesTM (VIP) are saving detectives time and money by eliminating the need

cacconference.org

to purchase “burner” phones and recording devices for undercover operations. Detectives can instantly generate new, recorded phone lines with voice and SMS capabilities in any area code that links to their existing cell phones. VIPs can also be used to make 3-Way controlled calls between a detective, a victim, and your suspect. 2ND FLOOR, BOOTH 30

Canine Companions for Independence Canine Companions for Independence is a nonprofit organization that enhances the lives of people with disabilities by providing highly trained assistance dogs and ongoing support through quality partnerships. We train and place four types of assistance dogs: service dogs, skilled companions, hearing dogs and facility dogs in mastering over 40 specialized commands. Skilled companion dogs enhance independence for children with physical, cognitive and/or developmental disabilities. These dogs are trained to work with children under the guidance of a facilitator, typically a parent or legal guardian, who handles and cares for the assistance dog. Facility dogs are expertly trained dogs partnered with a facilitator working in a health care, education, visitation or criminal justice setting. Facility dogs can encourage and foster feelings of calm and security for clients in stressful or traumatic visitation or criminal justice settings. 1ST FLOOR, BOOTH 36

Cellebrite Inc. Since 2007, the Cellebrite UFED has provided complete, standalone mobile forensics to investigative professionals worldwide. The UFED incorporates physical, logical and file system extraction, decoding and analysis of data and passwords from thousands of legacy and feature phones, smartphones, portable GPS devices, and tablets. It is regularly updated with ground-breaking physical extraction capabilities for the world’s most popular platforms. Stop by our booth to learn more. 2ND FLOOR, BOOTHS 22-23

The Center for Missing and Abducted Children’s Organizations (CMACO)

Child Welfare Information Gateway provides access to timely, practical resources that help child welfare, adoption, and related professionals protect children and strengthen families. 1ST FLOOR, BOOTH 81

Maltreatment: Interviewing the Suspect and the Caretaker” September 29, 2015. 1ST FLOOR, BOOTHS 64-65

Dallas Police Department Explorers

Children’s Advocacy Centers™ of Texas, Inc. (CACTX) is the statewide membership association representing all local children’s advocacy centers in the Lone Star state. Founded in 1994 with a membership of 13 local centers, today the CACTX membership roster includes 68 developing and established centers in large urban cities as well as in small rural communities. Our membership reflects the vast diversity of Texas, all with their own unique approaches to fulfilling our shared mission of protecting and providing for children. 2ND FLOOR, BOOTH 15

The Dallas Police Explorer Program is designed to introduce teens ages 14-20 to the career path of law enforcement. The Dallas program is an unfunded 501.c.3 organization that has around 150 participating kids in the program. The program sells Dallas PD memorabilia as a way to raise funds for the program. The explorers use these funds for uniforms, equipment and travel costs for competitions. The explorers participate in ride-a-longs with officers, competing in competitions, community service activities and public service activities. Many of our explorers go on to pursue careers with the Dallas Police Department and other law enforcement organizations. 2ND FLOOR, BOOTH 27

Conference on Crimes Against Women

DCAC Animal Assisted Therapy Program

Children’s Advocacy Centers of Texas, Inc. 

The 11th Annual Conference on Crimes Against Women will be held April 4-6, 2016 in Dallas, Texas at the Dallas Sheraton Hotel. We recognize that crimes against women are unique in nature and we seek to bring together all front-line professionals who respond to these crimes to arm them with the most effective, relevant, and up-to-date tools available to battle this epidemic. Stop by our booth and register for a chance to win a free registration to the 2016 conference. You won’t want to miss CCAW! 1ST FLOOR, BOOTH 55

At DCAC, therapy dogs offer a unique form of support to children and families. Therapy dogs are different from service dogs in that they do not provide physical assistance but do their work by sitting quietly while providing emotional support and acceptance. Research has proven that contact with a therapy dog can lower blood pressure, decrease the heart rate and calm other anxiety related symptoms that are often associated with the type of emotional trauma victims have experienced. 1ST FLOOR, BOOTH 78

connect2annica

DME Forensics

connect2annica is a grassroots organization that specializes in alerting children to the dangers of modern day threats like Internet predators, bullying, racial prejudice, and texting while driving. We use a children’s book series main character, Annica, as our “Smokey the Bear” or “McGruff the Crime Dog” to give law enforcement, educators, and parents a way to start conversations with children about the threats that exist every day in this techno world. It is designed to be a first point of contact and resource for professionals and children. 1ST FLOOR, BOOTH 59

Crimes Against Children Conference/ DCAC  Stop by the Crimes Against Children’s Conference/ DCAC exhibit booth to purchase your conference t-shirts, as well as our nationally relevant child abuse education materials. We offer video-based curriculum packages for mandated reporters, Spanish speakers, parents, and children. In addition to hosting the Crimes Against Children Conference, DCAC also offers yearround learning opportunities in our training facility. We bring expert trainers from around the nation to offer half or full day workshops relevant to all child abuse professionals. Coming up in September - Robert Farley will present “Physical Child Abuse Injury Reconstruction Techniques” and “Critical Conversations for Child

August 10-13, 2015

|

D a l l a s , Te x a s |

DME Forensics is an innovative consulting company focused on video and image forensics with an emphasis on the analysis of surveillance digital video recorders (DVRs). Our flagship product, DVR Examiner, has revolutionized the process of recovering video evidence from DVRs. Coming summer of 2015 we will be expanding our line of software products to include Vehicle Examiner. This easy to use search tool will change the way investigators determine the make/model of an unknown vehicle. With over 25 years of combined experience, our instructors and examiners can offer expertise in a variety of digital and multimedia evidence analysis areas. DME Forensics provides local and onsite training, laboratory casework, and consulting to the civil and criminal justice community. 1ST FLOOR, BOOTH 43

EDAS FOX EDAS FOX has been providing hardware and software options to the digital media forensics field for over 8 years. Each of our EDAS FOX computers come with 3 year warranties, giving you peace of mind for the life cycle of your machine. 2ND FLOOR, BOOTH 14

cacconference.org

EXHIBITORS

The Center for Missing and Abducted Children’s Organizations (CMACO) is an organization dedicated to providing support to non-profits who serve families and communities of missing, abducted and exploited children. The goal of CMACO is to provide a platform for communication and collaboration between these organizations. Through training, technical assistance, travel scholarships and web-based meeting opportunities, CMACO creates a community where non-profits share best practices and resources with others who do similar work. Membership is free for non-profits working on missing, abducted and exploited children’s issues. CMACO is a project of The Center for Innovation and Resources Inc. and is funded by the Office of Juvenile Justice and Delinquency Prevention. 1ST FLOOR, BOOTH 67

Child Welfare Information Gateway

79

FBI - Violent Crimes Against Children The mission of our Violent Crimes Against Children program is threefold: first, to decrease the vulnerability of children to sexual exploitation; second, to develop a nationwide capacity to provide a rapid, effective, and measured investigative response to crimes against children; and third, to enhance the capabilities of state and local law enforcement investigators through programs, investigative assistance, and task force operations. Our strategy involves using multi-disciplinary and multi-agency teams to investigate and prosecute crimes that cross legal, geographical, and jurisdictional boundaries; promoting and enhancing inter-agency sharing of intelligence, specialized skills, and services; and widely offering our victim/ witness services. All for the express purpose of protecting our nation’s greatest asset—our children. 1ST FLOOR, BOOTH 85

GOAL Consulting Group GOAL Consulting Group is your premier strategic planning and executive coaching agency. With offices in Texas and New York, the consulting team includes Jonathan Schick (New York City), Juliet Morphew (Dallas/Fort Worth) and Mary Connolly (New Jersey). At GOAL (which stands for GOvernance And Leadership) we are committed to the success of the board, leadership, and staff of nonprofit organizations, associations, schools and government agencies. Our Core Services are: Board Workshops, Development and Restructuring, Strategic Planning Retreats and Implementation, Motivational Speaking and Workshops, Executive Coaching and Board/CEO Support, Staff Development and Team-Building tools. Find out more online or call 214-587-3960. 1ST FLOOR, BOOTH 48

Gundersen National Child Protection Training Center  Gundersen National Child Protection Training Center (Gundersen NCPTC) works to end all forms of child maltreatment through education, training and prevention while advocating for and serving children, adult survivors and communities. As leaders in the field since 2003, more than 100,000 child protection professionals have been trained on topics pertaining to child abuse investigations, prosecutions and prevention. 2ND FLOOR, BOOTH 16

HDREdge

EXHIBITORS 80

Need to know WHO belongs to a phone number? Whooster is a reverse cell append product conducted all via text messaging designed for law enforcement officials. Whooster not only provides number-toname capabilities, but also a cell phone directory function. Information is returned directly to the investigator within 5-7 seconds. 1ST FLOOR, BOOTH 32

High Tech Crime Institute The High Tech Crime Institute (HTCI) is a global leader in the mobile device forensic analysis market, featuring its D.A.R.T. PRO + MapLink software, which imports mobile device data/CDRs then maps and analyzes

the information. HTCI is also a global leader in digital/ cellular forensics training with courses encompassing the full spectrum of Media Forensics and Investigations. HTCI takes pride in offering cutting edge essential training and software to Law Enforcement and Military personnel throughout the world. 2ND FLOOR, BOOTH 1A

INTERPOL Washington INTERPOL Washington, the United States National Central Bureau, serves as the designated representative to the International Criminal Police Organization (INTERPOL) on behalf of the Attorney General. INTERPOL Washington is the official US point of contact in INTERPOL’s worldwide, police-to-police communications and criminal intelligence network. A component of the US Department of Justice (DOJ), INTERPOL Washington is co-managed by the US Department of Homeland Security (DHS) pursuant to a Memorandum of Understanding that ensures a continuing commitment to the guidance and oversight of the organization and reinforces its role in effectively sharing and exchanging international criminal investigative and humanitarian assistance information. INTERPOL Washington operates 24/7/365 and supports more than 18,000 local, state, federal, and tribal law enforcement agencies in the United States as well as their foreign counterparts that seek assistance in criminal investigations that extend beyond their national borders. 1ST FLOOR, BOOTH 53

JJ Staples Enterprises, LLC Author and Child Advocate, JJ Staples shares her published fictional book entitled Deflowered Lyric. This novel brings attention to child sexual abuse through glimpsing the childhoods of three main characters. Their journey through life reveals brokenness and yet strength that are intertwined and expressed in a poetic prose. Each chapter starts with a lyrical poem to introduce the life stages of the characters. Although the topic of child sexual abuse is a somewhat forbidden and a hidden conversation, Deflowered Lyric introduces the readers to a cadence, which marches towards healing through exposing and acknowledging the secret sin to forgiving the reprobate. A strong religious faith by the character, Lyric, provides the roadmap to recovery. Deflowered Lyric has received the title of ‘Award-Winning Finalist’ in the “Fiction: African-American” category of the 2014 USA Best Book Awards. It also has received many positive reviews and accolades on the websites of Amazon and Goodreads. The author wishes to use exposure to bring immediate attention to the need of protecting our children from sexual abuse. She is dedicating the remainder of her life to walking and fulfilling her life’s purpose. She joins many of you as she attempts to PROTECT OUR CHILDREN! 1ST FLOOR, BOOTH 56

Julian Sher - “Somebody’s Daughter” JULIAN SHER – BOOK AUTHOR. Come meet and talk with Julian Sher, an award-winning investigative journalist and the author of two books featured

August 10-13, 2015

|

D a l l a s , Te x a s |

regularly at the Dallas Crimes Against Children Conference: “Somebody’s Daughter: The Hidden Story of America’s Prostituted Children and the Battle to Save Them” was hailed as “the most definitive account of sex trafficking of children in the United States.” He also wrote the book “Caught in the Web” about Internet child predators. His analysis and reporting on child abuse has been featured in the New York Times, USA Today and Readers’ Digest. He will be speaking about his books at four sessions at this year’s conference on Tuesday and Wednesday. Julian is the Senior Producer for “the fifth estate” the premier investigative TV program in Canada for the Canadian Broadcasting Corporation. 1ST FLOOR, BOOTH 35

Katana Forensics Research and Development Corporation Katana Forensics is a software and training company. We develop software for mobile devices. Our flagship program, Lantern 4 was specifically designed for acquisition and analysis of Mobile Devices. Katana Forensics continues to develop other free tools for investigators and examiners. In 2015 Katana Forensics has opened a Research and Development center in California which the main focus is to develop new technologies and software for mobile devices. 2ND FLOOR, BOOTH 17

LawMate America LawMate America provides top of the line, covert video cameras, GPS tracking, countermeasures products, self-defense items, and a full assortment of investigative related equipment. 2ND FLOOR, BOOTHS 1-2

LEA AID LETS is a phone company exclusively for Law Enforcement. The LETS MRP system allows agents to capture phone calls, text messages and picture messages from any phone. 1ST FLOOR, BOOTH 46

Magnet Forensics Magnet Forensics is a global leader in the development of digital forensics software that recovers evidence from computers, smartphones and tablets. Our flagship product, INTERNET EVIDENCE FINDER™ (IEF), was created by a former police officer and forensic examiner who recognized the need for a tool to help digital forensics professionals find, analyze and report digital evidence. Since its creation, IEF has quickly become a trusted solution for thousands of customers working in the world’s top law enforcement, government, military and corporate organizations. 2ND FLOOR, BOOTH 3

Marinus Analytics Traffic Jam is the flagship product hosted by Marinus Analytics. This tool provides actionable leads and empowers law enforcement and victim services agents to follow up on tips and build their sex trafficking and prostitution cases, using evidence gleaned from the massive amounts of publicly

cacconference.org

available classifieds online. Its capabilities, originally developed at Carnegie Mellon University, are based on machine learning algorithms and advanced data structures. At Marinus Analytics, we place these cutting edges technologies in the hands of law enforcement and victim services in a usable, digestible format, to harness the power of data online to build their investigations. The tool is operational in the United States and Traffic Jam has successfully been used for tracking suspects, pimps, victims, finding underage persons, building timelines of movement, generating new leads for building cases, gathering intelligence for suspect/victim interviews and observing overall trends in the supply-base of the adult services industry. 1ST FLOOR, BOOTH 80

The Mayo Clinic 3D printing has continued to expand within the field of medicine. The Mayo Clinic in Rochester, Minnesota has incorporated this technology into our clinical work flow turning cross sectional images, including CT and MRI, into patient specific accurate life size models using additive manufacturing. Specifically, we will display several 3D printed models of varied pathologies. For non-medical personnel it provides an easily understandable depiction of the injury sustained. At our booth, the attendee will be able to see the educational benefits of 3D printing for varied disciplines including law enforcement, judicial system, forensic pathology, forensic radiology and all who work with abused children. 1ST FLOOR, BOOTH 47

Media Sonar Technologies Inc. Media Sonar allows public safety organizations to leverage social media for the purposes of investigations, pro-active policing, security and events, and school safety. 1ST FLOOR, BOOTH 71

Microception, Inc. VideOversight-Forensic Interview Recording and Case Management solution for Child Advocacy Centers. 1ST FLOOR, BOOTH 72

Midwest Regional CAC

Navajo Jewelry & Crafts

MSAB takes responsibility for supporting our customers with the best possible solutions for mobile forensics. This means that we also need to stay ahead of the game; with our products and services, with our vision and energy, with our people and how we do things. We are the pioneers of our industry.  Our promise is simple: MSAB – When you want to stay ahead. 2ND FLOOR, BOOTH 13

We specialize in authentic handcrafted sterling silver jewelry made by family and extended family from the Navajo, Zuni, and Santo Domingo tribes of New Mexico. All items are made with natural stones or shells and set in sterling silver. 1ST FLOOR, BOOTH 41

NW3C National White Collar Crime Center

NDAA’s National Center for Prosecution of Child Abuse provides training, technical assistance and publications to child abuse prosecutors and allied professionals in the field. 1ST FLOOR, BOOTH 74

NW3C provides a nationwide support system for law enforcement and regulatory agencies involved in the prevention, investigation and prosecution of economic and high-tech crime. We deliver training in computer forensics, cyber and financial crime investigations and intelligence analysis. We conduct original research on all facets of white collar crime. 1ST FLOOR, BOOTH 76

National Children’s Advocacy Center

Netclean

The mission of the National Children’s Advocacy Center (NCAC) is to Model, Promote, and Deliver Excellence in Child Abuse Response and Prevention through Service, Education, and Leadership. The NCAC is the birthplace of the Children’s Advocacy Center (CAC) model; and since opening its doors more than 29 years ago has served as a model for almost 1,000 CAC’s operating throughout the United States and in 19 countries. In addition to providing local services to children and families, the NCAC is one of the leading global organizations providing training and technical assistance to child abuse response professionals.  1ST FLOOR, BOOTH 49

Conquer Caseload and Accomplish More - The proliferation of smartphones, digital cameras, cheap storage devices and cloud services has soared the volume into huge quantity involved in digital forensic investigations. Most investigative tools lack the capabilities to intelligently deal with large quantities of image and video files. As a result, investigators are forced to go through the slow and laborious process of manually reviewing millions of seized files, regardless of whether it’s pertinent or not. Analyze DI helps cut costs through significant reductions in investigators’ workload and increases efficiency. However, more importantly, it increases the quality of investigations by freeing up time and putting better tools in the hands of the investigator. 2ND FLOOR, BOOTHS 27A-27B

National Center for Prosecution of Child Abuse

National Criminal Justice Training Center (NCJTC) of Fox Valley Technical College The National Criminal Justice Training Center (NCJTC) of Fox Valley Technical College, one of the leading national criminal justice educators, offers expert facilitated training and technical assistance. Flexible, diverse and innovative child protection courses are available to federal, state, tribal, and local criminal justice professionals. Training topics include: Bullying and Cyber Bullying, Child Abuse, Child Homicide, Commercial Sexual Exploitation of Children, Computer Facilitated Crimes Against Children, Forensic Interviewing, Human Trafficking, Missing and Abducted Children, Underage Alcohol and Drug Use, Youth Focused Community Policing, Youth Suicide Prevention through Community Partnership. NCJTC training and technical assistance programs have increased awareness of crimes against children and affected significant, positive changes in the communities we serve. Invite us to your community today. 1ST FLOOR, BOOTHS 68-69

August 10-13, 2015

|

D a l l a s , Te x a s |

North Texas Regional Computer Forensic Laboratory The primary mission of the North Texas Regional Computer Forensic Laboratory (NTRCFL) is to serve the computer forensics needs of all law enforcement agencies and departments in the North Texas Region. The NTRCFL will provide quality technical and scientific investigative capabilities, forensic services, and expert testimony. Our services help support investigations that are reliant upon digital evidence, namely through the acquisition, preservation, examination, and presentation of digital information in computers and other electronic devices. The NTRCFL will provide training to agencies and departments in the proper techniques for seizing, storing, and analyzing digital evidence. In appropriate cases, the NTRCFL will assist in ongoing investigations of computer crime and cyber terrorism, using state of the art technology to obtain evidence in real time. 1ST FLOOR, BOOTHS 88-91

EXHIBITORS

Midwest Regional CAC is committed to providing affordable, accessible, and cost-effective training methods for MDTs utilizing the latest technology and research to deliver timely, relevant and impactful programs. Our mission is to promote and support widespread, consistent implementation of evidencebased practices and a multidisciplinary approach to child abuse investigation, assessment, intervention and prosecution, ensuring effective outcomes for child abuse victims and their families. Through our work we build capacity by elevating the expertise of child abuse professionals and improving the sustainability of multidisciplinary teams, Children’s Advocacy Centers and Chapters. 1ST FLOOR, BOOTH 62

MSAB

cacconference.org

81

Nuix North America Nuix is a technology company that frees the intelligence trapped inside unstructured big data. We have created the world’s most advanced engine for indexing, searching, analyzing and extracting knowledge from all kinds of human-generated and machine data so people can make fact-based decisions. The patented Nuix Engine conquers the difficult file formats that make unstructured data hard to access and understand. Its unique parallel processing framework and powerful analytics capabilities transform any volume of data into valuable information at extraordinary speed and with forensic precision. Organizations around the world use Nuix software to solve sophisticated challenges including digital investigation, cybersecurity, eDiscovery, information governance, email migration and privacy. And the list of uses is always growing because our customers expect us to make the impossible possible. 2ND FLOOR, BOOTHS 6-7

OffenderWatch® OffenderWatch® is the nation’s leading sex offender management and community notification solution. Over 3500 Federal, State, and local law enforcement agencies utilize OffenderWatch to manage over 60% of the nation’s registered sex offenders. Watch Systems is a proven technology partner and consultative resource to law enforcement delivering solutions that ensure statutory compliance, increase agency efficiency and effectiveness, and reduce IT costs while providing the most timely and accurate safety information the public. 2ND FLOOR, BOOTH 20

Office of Justice Programs The Office of Justice Programs (OJP) provides federal leadership in enhancing the Nation’s ability to prevent and reduce crime. Programs administered through OJP’s bureaus and offices support Federal, state, and local efforts to address crime, improve the criminal and juvenile justice systems, increase awareness of crimerelated issues, and meet the needs of crime victims. 1ST FLOOR, BOOTH 79

Oklahoma Association of Chiefs of Police The Oklahoma Association of Chiefs of Police provides training for all law enforcement through two week classes throughout the year and one annual conference. 1ST FLOOR, BOOTH 45

Oxygen Forensics

EXHIBITORS 82

Founded in 2000, Oxygen Forensics is the worldwide leading maker of the advanced forensic data examination tools for smartphones and other mobile devices. The company is dedicated in delivering the most universal forensic solution covering the widest range of mobile devices running Android, iOS, Blackberry, Windows Phone, Symbian and other operating systems. Law enforcement and government agencies, institutions, corporations and private investigators, help desk personnel, and thousands of

private consumers rely on Oxygen Forensics products to ensure evidence availability in the event of mobile devices data analysis and recovery. As a result, Oxygen Forensic® Suite receives great response at forensic conferences, exhibitions and trainings, and occupies a spot in the top of the list in relevant tests for extracting more data than competitors. 2ND FLOOR, BOOTH 19

SEARCH Group, Inc. 

Paraben Corporation specializes in technologies for investigations of all types of digital data from smartphones, hard drives, gaming systems, and more. Paraben has been an established leader in the digital forensics and investigation technology field since 1999. With a wide range of products designed for consumers to government organizations, Paraben’s technology and training push innovation with new approaches and new techniques to gather the most digital data possible. 2ND FLOOR, BOOTH 8

SEARCH’s High-Tech Crime Training Services is comprised of a team of experts who provide technical assistance and training to local, state, and federal justice and public safety agencies nationwide. Through training classes, technical workshops and hands-on assistance, SEARCH trains and assists investigators in methods to prevent, detect, and investigate instances of individuals using technology to exploit children. Training courses are offered nationwide through SEARCH’s outreach training program. These efforts focus on systems security, computer forensics, digital data recovery, and investigations involving the Internet, social networking sites, local area networks, and online child exploitation. SEARCH also offers distance learning courses with content ranging from teaching basic computer skills to more advanced skills in online social network investigations. These self-administered courses are available to individuals with law enforcement or justice affiliation. 1ST FLOOR, BOOTH 54

Pen-Link, Ltd.

Silent Shield, LLC

Paraben Corporation

In business for over 25 years, Pen-Link, Ltd. provides Law Enforcement and Intelligence agencies with state-of-the-art software and systems for the collection, storage, and analysis of telephonic and IP-based communications. Pen-Link’s software and systems - PLX, Pen-Link 8, LINCOLN, and Xnet - are widely recognized as industry standards, with thousands of licensed Law Enforcement and Intelligence users in federal, state, and local agencies worldwide. Pen-Link systems are widely favored because they not only excel at intelligence gathering and live collection, but they also bring to bear a powerful suite of reporting and analytical tools; the type of functionality that is essential in drilling down through today’s extensive data sets to reveal relationships that might otherwise go undetected. 1ST FLOOR, BOOTH 57

Play it Safe!® Child Abuse Prevention Do you provide child abuse education? Play It Safe!® is an Evidence Informed, age appropriate child sexual abuse risk reduction program for Prekindergarten through 12th grade students. Each grade level’s unique program speaks to children in a way they can best learn, to identify abusive behavior and take safe action in threatening situations. It is provided one classroom at a time with curricula that have been researched, written and scripted over a 30-year period by The Women’s Center of Tarrant County. Program topics for elementary aged children include identifying different kinds of touch and using the safety rule; and healthy relationships, sexting and abuse of power for middle/high school. The curriculum is now for sale for use outside of Tarrant County, Texas. Written to be presented in an interactive classroom setting, it is also appropriate for individual home use. Purchase just one grade level, or a bundle of grades. Included are that grade level’s scripted curriculum, Tips for Successful Delivery, a pre/post test, a 10-20 minute DVD created for Play it Safe!®, and coloring books and dolls. 1ST FLOOR, BOOTH 66

August 10-13, 2015

|

D a l l a s , Te x a s |

Silent Shield’s team includes former law enforcement officers, software programmers, hardware developers and other elite professionals. Our mission is to proactively develop and consistently deliver pioneering technology that empowers innovation, addresses needs, streamlines processes, and increases efficiencies at reasonable prices. We faithfully serve, provide unwavering support, and deliver reliable products to law enforcement, military operations, government entities and others in the pursuit of truth and justice. 2ND FLOOR, BOOTH 11A

SiQuest SiQuest is a world leader in the development of Internet forensic software that simplifies and expedites the discovery, analysis and reporting of digital evidence. Their flagship product, Internet Examiner® Toolkit™ (IXTK) is the multilingual tool of choice by digital forensic practitioners from government, law enforcement, corporate and national security, business law, cyber training and higher learning education. Recognized by SC Magazine as Industry Innovator 2014, IXTK features ‘online’ Internet investigative functionality with ‘live’ discovery, and ‘real-time’ capture and documentation capabilities. Designed by a former 17-Year veteran police Sergeant with expert witness experience in Canada and the USA, IXTK produces compelling, court-approved results that demystify computer evidence for juries, judges and lawyers. Supported artifacts include, but are not limited to, browser activity, email and instant messaging, file sharing, cloud services, social media, multimedia, and mobile device applications . With its innovative new FaceDNA™ biometric facial recognition and face hashing add-on, IXTK now offers investigators a new weapon in the fight against crimes against children, cyberbullying and identifying wanted and missing persons. 2ND FLOOR, BOOTH 9

cacconference.org

Sirchie Sirchie manufactures high quality forensic science and crime scene investigation products and customized special purpose vehicles and provides hands-on training for the law enforcement community around the globe. Since 1927 and in more than 120 countries, law enforcement and investigation professionals use Sirchie products daily to help investigate criminal activity and find justice. Sirchie adheres to strict manufacturing standards and has the depth and breadth of product lines to meet the challenges law enforcement faces today. Sirchie specializes in custom designing and manufacturing of forensic evidence collection kits, such as DNA/Buccal Swab Collection, Sexual Assault (Victim/Suspect) Kits, Gunshot Residue Kits, Blood/ Alcohol Kits and other crime scene and biological specimen collection kits. What sets Sirchie apart is our people and their commitment to providing world class customer service with every experience. 1ST FLOOR, BOOTH 63

SpeakWrite US based transcription of suspect/witness interviews, voice reports 24/7/365. Secure and confidential, pay as you go, no minimum usage or contract requirements. 2ND FLOOR, BOOTH 29

SRT Wireless  The leading provider of Wi-Fi signal technology and training for law enforcement/military purposes, including access point and station discovery, surveillance, interception and targeting. The SRT Group of companies was established to deliver mission-critical satellite, Wi-Fi, and aviation and services to government and law enforcement. 2ND FLOOR, BOOTH 10

SUMURI SUMURI is a world renowned leader in Digital Forensic and eDiscovery solutions. SUMURI is the developer of PALADIN, RECON for Mac OS X and CARBON Virtual Forensic software. Additionally, SUMURI is the creator of the TALINO Forensic, eDiscovery and Cryptanalysis Workstations. Our team is expertly credentialed and unsurpassed in their knowledge of digital forensics, mobile forensics, eDiscovery, litigation support and training. SUMURI is focused on implementing concise strategies to achieve your company’s goals and objectives without compromising our core values of honesty and integrity. 2ND FLOOR, BOOTH 28

(The) Texas Department of Criminal Justice Victim Services Division

Texas Young Lawyers Association Texas Young Lawyers Association (TYLA) helps those in need through pro bono activities and community education, participates in communities and schools, and aids young lawyers. TYLA’s uncommon leaders show that when TYLA takes on an issue, nothing is too large. TYLA’s committees are always busy providing easy to understand information about the law. TexProtects, The Texas Association for the Protection of Children TexProtects is a statewide, membershipdriven organization that aims to reduce and prevent child abuse and neglect through research, education, and advocacy. The organization is autonomous and nonpartisan and effects change by organizing and educating its members to advocate for increased investments and implementation of research-based best practices around child abuse prevention, Child Protective Services reforms and treatment programs that heal child abuse victims. 1ST FLOOR, BOOTH 84

TexProtects: The Texas Association for the Protection of Children TexProtects is a statewide, membership-driven organization that aims to reduce and prevent child abuse and neglect through research, education, and advocacy. The organization is autonomous and nonpartisan and effects change by organizing and educating its members to advocate for increased investments and implementation of research-based best practices around child abuse prevention, Child Protective Services reforms and treatment programs that heal child abuse victims. 1ST FLOOR, BOOTH 61

TMPA TMPA is the Voice of Texas Law Enforcement. 1ST FLOOR, BOOTH 82

TRITECH DIGITAL FORENSICS Focusing on efficacy, accuracy, and scalability, TRITECH Digital FORENSICS’ Velocity DF line of products are built with the best and latest technology platforms and components, and offer the cost-effective means to build a state-of-theart digital forensics lab. We are proud to partner with some of the biggest names in the DF arena, including Cellebrite, ADF Solutions, AccessData, CRU Dataport, WiebeTech, Tableau, and Guidance Software. Our Velocity Digital Forensics product line includes all-in-one Mobile Triage Kits that allow for capture and viewing of the suspect data at the scene on both cell phones and USB computer devices, Workstations for examiners/investigators to

August 10-13, 2015

|

D a l l a s , Te x a s |

utilize during discovery, Storage Towers for both longterm storage and secure live access to all cases, and our much talked aboutDataCenter Lab Solution that allows an agency to perform all of the tasking data processing into the lab on servers. Additionally, we design and install Interview Management Solutions, including best-in-breed audio/visual equipment, and have developed a unique Mobile Interview Kit created to encourage children to feel more calm and free to share during difficult interviews. 2ND FLOOR, BOOTH 26

TRITECH FORENSICS A leader in the forensics market, TRITECH FORENSICS provides evidence collection and crime scene investigation products to crime laboratories and crime scene investigators throughout the world. With 30 years of experience, we are the nation’s most proficient developer and manufacturer of forensic kits. We are committed to providing our customers with state-of-the-art forensics products at affordable prices. It is our goal, through our research and development program, to continue to develop superior products to aid in all aspects of crime scene investigation and crime laboratory analysis. We are continuously evaluating our product offerings, seeking innovative answers to developing needs, and updating supplies to keep in step with a constantly changing field. We know how important our products are to the forensics community, from investigation to prosecution – that is why our slogan, Identify. Collect. Preserve., represents the mission of our customers. 2ND FLOOR, BOOTH 25

University College Dublin University College Dublin is Ireland’s largest university with 30,000 students, from 124 countries. For 10 years UCD has run a law enforcement-only online Masters degree, designed for investigators. The program is delivered part-time by distance-learning, with annual exams for students held in the USA, or Dublin or the Netherlands. Students become part of an international network of 485+ students/graduates in 57 countries. Most students take 3 core modules. They then choose from 12 module options. Graduate Diploma, Certificate and single modules are available. UCD also offers the online MSc in Digital Investigation & Forensic Computing and conducts research and training through the UCD Centre for Cyber Crime and Investigation, Europe’s leading centre for research and education in cybersecurity, cybercrime and digital forensics. 1ST FLOOR, BOOTH 73

Don’t forget to purchase your conference t-shirts, polos, and water bottles at

BOOTHS 64-65

on the first floor exhibit hall!

cacconference.org

EXHIBITORS

The TDCJ VSD Victim Notification System (VNS) utilizes a confidential database to provide VNS registrants with notifications regarding the status of an offender, including the parole review process. The TDCJ VSD Notification Section provides information to crime victims regarding parole review procedures and processes Victim Impact Statement (VIS) forms and protest material. The TDCJ VSD Victim Offender Mediation Dialogue assists crime victims in exercising

their right to request to initiate a mediation/dialogue with the offender responsible for their violent victimization. The TDCJ VSD Texas Crime Victim Clearinghouse (TxCVC) program revises the VIS form, collects VIS statistics from district and county attorneys’ offices, develops VIS Recommended Processing Procedures and develops Crime Victim Assistance Standards. 1ST FLOOR, BOOTH 75

83

U.S. Marshals Service

Vigilant Solutions

Yaana Technologies

The USMS is the federal government’s lead law enforcement agency responsible for investigating sex offender registration violations and related offenses in connection with a violation of the Adam Walsh Child Protection and Safety Act, passed by Congress on July 27, 2006. As part of the Act, the USMS Sex Offender Investigations Branch is given three primary responsibilities: assisting state, local, tribal, and territorial authorities in the location and apprehension of non-compliant and fugitive sex offenders; investigating violations of the act for federal prosecution; and assisting in the identification and location of sex offenders relocated as a result of a major disaster. The National Sex Offender Targeting Center (NSOTC), serves as a resource to assist federal, state, local, tribal, territorial, and foreign law enforcement agencies in enforcing sex offender registration laws. The NSOTC is comprised of three units (Investigations, Intelligence and Behavioral Analysis) that work together to supplement registration enforcement efforts and provide a clearinghouse for information related to all sex offender investigations. 1ST FLOOR, BOOTH 42

Vigilant Solutions provides innovative technology solutions (license plate readers, facial recognition, LPR data and analytics) that help law enforcement protect officers, families and communities. 2ND FLOOR, BOOTH 11

Yaana Technologies is a leading global provider of intelligent Compliance Solutions with accurate data retention, sophisticated security, and unique analytical capabilities. Our solutions offer our customers a cost-effective path to address the complexities related to meeting compliance needs in the rapidly evolving information-communications and cloud markets worldwide. 1ST FLOOR, BOOTH 52

USA Certified Interpreters & Translators  In a criminal or civil case a Spanish or other foreign language AV - Audio/Video - may be introduced into evidence. A TT - Transcription Translation - of such recording is the best legal tool a prosecutor or law enforcement agency has that will stand up to scrutiny in the courtroom and that meets the legal evidentiary standards. A bilingual transcript is comprised of 2 parts: 1) A word-for-word transcript of source language in the original recording, and 2) the corresponding translation into English. The final product of this process is a two-column page placing both the foreign-language transcription and the English translation side by side, so that easy reference and checking for accuracy is possible. At USAitt we have the professional knowledge and technical experience to enhance recordings that appear unintelligible or inaudible, overlapping voices or multiple layers of noise mingled with dialogue. Regardless of the issue we, at USAitt.com have the professional team, equipment and in house technical support to be able to read and modify to read most AV files. Multiple satisfied clients endorse and recommend us because we are reliable, provide expeditious work and offer what we believe are the best rates in the national market. 1ST FLOOR, BOOTH 60

V2 Interview Room Recording

EXHIBITORS 84

Voice Products Inc. Voice Products Inc. has been in business for over 23 years with local sales and service throughout the Midwest. We offer the latest technologies for your recording needs with 24/7 live support. We offer the Child Advocacy Interview Recording equipment and software iRecord. 2ND FLOOR, BOOTH 4

Waldorf College Waldorf College offers regionally accredited residential and online Associate, Bachelor’s, and Master’s degrees in fields such as Criminal Justice, Homeland Security, Fire Science, Occupational Safety, and more. 1ST FLOOR, BOOTH 77

WebWatcher WebWatcher, the #1 rated Parental & Employee Monitoring Software, offers a full family of monitoring software compatible with PC, Mac, iPhone, Android & BlackBerry. All WebWatcher products install easily in 5 minutes or less, are undetectable and thus tamper proof. All recorded data is sent to a secure webbased account which allows you to monitor kids and employees at your convenience from any computer. WebWatcher allows you to monitor multiple devices (such as a PC and an iPhone) from the same user interface so you get one unified view. 1ST FLOOR, BOOTH 83

ZiuZ Forensics ZiuZ is a leading innovative company in the development and application of high-grade technology in visual intelligence. We are a commercial company with a socially responsible attitude. We want our products to contribute to solving issues relevant to society, so we create practical, userfriendly solutions for police and security services, and for the medical world. Our VizX2 software has been developed so that a detective can quickly and specifically search through large volumes of photos and videos, typically found in child sexual abuse cases. The program is comprehensively set up to quickly process footage and be easy to use. Thanks to VizX2 a single detective can work through some 500,000 photos and hours of video a day with just a minimum number of mouse clicks. The architecture is so advanced that the system can easily handle bulk volumes (10 million photos and hundreds of hours of video) without any loss of speed. 2ND FLOOR, BOOTH 7A

Wicklander-Zulawski & Associates, Inc Wicklander-Zulawski & Associates, Inc. (WZ) provides standard and customized training in multiple techniques of interview and interrogation including the WZ Non-Confrontational Method, the Behavioral Analysis Interview and the Accusatory Method. WZ’s method is proven to reduce objections and denials, and provides more reliable information compared to the direct positive interrogation methods. Investigators are taught how to elicit relevant information and actionable intelligence, obtain cleaner admissions, use the most appropriate method for each case and subject, and ensure the defendant’s statements will be admissible at trial. WZ conducts over 350 onsite seminars each year and has trained over 100,000 law enforcement professionals. 2ND FLOOR, BOOTH 24

V2 Interview Room Recording System is a complete digital interview room recording management system designed with advanced features specific for Children’s Advocate Centers and Law Enforcement. The system provides for recording and long-term storage of multiple simultaneous interviews and incorporates built-in tamper protection watermark technology. 2ND FLOOR, BOOTH 31

August 10-13, 2015

ATTEND THE EXHIBITOR WORKSHOPS! Attendees will receive one entry (for each exhibitor workshop attended) to a tablet drawing, awarded Wednesday evening at the social event. You must be present to win.

|

D a l l a s , Te x a s |

cacconference.org

RUSTIC RODEO WEDNESDAY, AUGUST 12 TH 7 PM-MIDNIGHT

CASINO

DJ

CASH BAR

Serving Supper until 8:30 Must wear name tag to attend. No exceptions.

View more...

Comments

Copyright © 2017 PDFSECRET Inc.