Lynn M. Davis, President & CEO Children’s Advocacy Center PRESENTERS Dallas Children’s Advocacy Center 2 3 Welcome to Dallas! Thank you for joining us at the 25th Annual Crimes Against Children Conference. CONTENTS In anniversary terms, we are celebrating our silver! During this time of dramatic General Information 4 cuts to the federal budget, causing other conferences to shut down, we are Maps 6 honored and grateful for the support of our partners and corporate sponsors, allowing us to be non-reliant on federal government dollars for our ongoing 25th Anniversary 10 success. And without our attendees, this would not be possible. Thank you for Opening Plenary 11 choosing this Conference for your professional training experience. We hope you Sponsors 12 enjoy your week here and take full advantage of this year’s many outstanding Monday 18 learning and networking opportunities. Here are a few of the highlights: Tuesday 24 Wednesday 32 • We are honored to have Aaron Fisher as our Keynote Speaker this year! Aaron became nationally recognized as “Victim 1,” the face Thursday 40 of the Jerry Sandusky child sex abuse scandal. In addition to Computer Labs 44 Aaron’s keynote, he, along with other child abuse survivors will be Speaker Biographies 54 presenting workshops throughout the week. Exhibitor Information 71 Make Your Own Agenda 80 • This year’s exhibitors will offer more than 75 booths of informational resources for all child abuse professionals. Some exhibitors are also providing product demonstrations on Tuesday and Wednesday in the City View rooms. Attendees who participate in a product demonstration will be entered into a drawing for a new iPad. The drawing will be held during the Silver Spur Supper In January 2013, the Dallas on Wednesday evening at 7:45 p.m. Children’s Advocacy Center • We are proud to host the Technology Coalition, where AOL Inc., moved into a brand new, Facebook, Google, Microsoft, PayPal, Time Warner Cable, Yahoo! 56,000 square foot state- Inc., and others will gather to share information about combating of-the-art facility following Internet crimes against children. The Technology Coalition will a successful $11 million have open forums for all Conference attendees on Tuesday capital campaign. We hope afternoon. you will tour the Center while • We will take you behind the scenes of many notable cases, such attending the Crimes Against as the Sandy Hook Elementary School Shooting, detailing what Children Conference. happened in Newtown, Connecticut on the day 20 children and six adults were murdered by Adam Lanza. Look for the asterisk (*) that designates all the case studies offered this week. Thank you for all that you do in our collective effort to protect and serve children around the world. Have an excellent conference experience!

Lynn M. Davis See DCAC Tour booth for President & CEO more information. Dallas Children’s Advocacy Center The Crimes Against Children Conference is presented by DALLAS CHILDREN’S ADVOCACY CENTER

The mission of the Dallas Children’s Advocacy Center (DCAC), one of the largest, most comprehensive Centers in the country, is to improve the lives of abused children in Dallas County and to provide national leadership on child abuse issues. DCAC provides a child-sensitive environment for our unique collaborative effort with other public and private agencies in Dallas County charged with investigating child abuse cases, treating abused children and their non-offending caregivers, and bringing their offenders to justice. DCAC facilitates an MDT approach to the investigation of we expanded this outreach by launching a DCAC Lecture child sexual abuse, child physical abuse, and child deaths Series, Opportunities for Empowerment, a monthly event at in Dallas County. DCAC served 2,493 children in 2012, and the new DCAC Training Facility where community members more than 30,000 children and families since the agency’s and professionals alike can gather for expert training about inception in 1991. protecting children, effective parenting, healthy families, and preventing abuse. We have developed training packages of THE FORENSIC INTERVIEW PROGRAM provides objective, our Recognizing and Reporting Child Abuse and Keeping Your child-sensitive, and legally-defendable interviews of children Children Safe curricula for organizations to purchase and alleged to be the victims of abuse, and child witnesses to utilize in their communities. Additionally, we offer free online violent crimes. In 2012, DCAC provided 1,749 forensic training at dcactraining.org. interviews. This is a 75% increase from 8 years ago. volunTeers are essential to DCAC’s mission and to the The FAMILY ADVOCATE PROGRAM provides supportive success of the Crimes Against Children’s Conference. The case management services to families during their healing 2013 conference will involve more than 100 volunteers process. Clients receive referrals to community resources, providing 1,875 hours of service. Without the dedication of and assistance completing applications for Crime Victims our volunteer groups, this conference would not be possible. Compensation. Families have access to clothing, toiletries, Thank you! and financial assistance on an as-needed basis. Families Assistance League of Dallas also receive support through school supply assistance, Dallas Junior Forum holiday programs, and other family events. Dallas Children’s Advocacy Center League TherAPy is provided for child abuse victims and Junior League of Dallas non-offending caregivers. Children benefit from individual AND The many Dallas community volunteers and group counseling designed to help them cope with their who support the Dallas Children’s trauma. In 2012, DCAC provided 11,282 therapy sessions. Advocacy Center This is a 135% increase from 8 years ago. Special thanks are extended to the DCAC Board of Trustees In addition to the Crimes Against Children Conference, our for their ongoing commitment to the protection of children EDUCATION PROGRAM provides significant community outreach to increase awareness of our cause. In 2013, and their support in making this conference possible.

CollABorATing AgenCies INCLUDE Municipal and county law enforcement agencies of Dallas County Department of Family and Protective Services, Child Protective Services Division Dallas County District Attorney’s Office Children’s Medical Center of Dallas Department of Pediatrics at the University of Texas Southwestern Medical Center at Dallas

2 August 12-15, 2013 | Dallas, Texas | cacconference.org The Crimes Against Children Conference is presented by DALLAS POLICE DEPARTMENT

The Dallas Police Department is one of the original contact over the Internet or other electronic means. partner agencies supporting the work of the The Dallas ICAC is one of sixty-one special Task Forces Dallas Children’s Advocacy Center (DCAC). Since the in operation across the supported by the Center was established in 1991, the Department’s Office of Juvenile Justice and Delinquency Prevention. Child Abuse Squad has been housed there, helping ensure a close, cooperative working relationship In 2003, the Dallas Police Department became part among detectives, Center staff, of the FBI National Innocence Lost Task medical experts, and Child Force to combat domestic trafficking of Protective Services (CPS) children. As a result of this task force professionals. The Child Abuse involvement, in November 2004, the Squad has a variety of High Risk Victims and Trafficking Team responsibilities including investi- (HRVT) was formed within the Child gation of complaints of physical Exploitation Squad to more effectively and sexual abuse that occur within deal with child victims of sex trafficking. the family and cases of fatal child Detectives assigned to the HRVT team abuse and neglect. The Squad also specialize in investigations involving the investigates incidents of suspected sexual abuse and exploitation of high abuse and neglect referred to risk multiple runaways, child victims police by CPS. Dallas Child Abuse of sex trafficking and repeat victims detectives work very closely with of sexual abuse. The Dallas HRVT team their colleagues from CPS and has developed an investigative and conduct joint inquiries in those cases where both intervention protocol and an interview agencies have an investigative responsibility. model specific to child victims of sex trafficking. The Dallas Police Department’s HRVT The Child Exploitation Squad investigates offenses team has become a national model for identifying of non-familial child sexual abuse and exploitation, and locating child victims of sex trafficking, diverting juvenile prostitution, non-Internet child pornography, them from future victimization or delinquent conduct and child abductions. Though their offices are and aggressively pursuing their exploiters. located at the main police headquarters building, Child Exploitation Squad detectives use Center facilities on All of the units of the Dallas Police Department a routine basis for conducting interviews of their child described above enjoy close working relationships victims. Detectives also refer child victims to the DCAC with the Dallas office of the FBI. A Crimes Against for therapy. The Sex Offender Compliance Squad’s Children Task Force was formed in 1995, which central responsibility is enforcement of Texas sex combines the resources and expertise of both offender registration laws. This squad comprises agencies. This Task Force works cooperatively on all two teams—Registration and the Sex Offender sexual exploitation cases which may involve federal Apprehension Program (SOAP). In 1998, the SOAP violations such as computer child pornography, Team received the Weber Seavey Award from the juvenile prostitution, and child abductions. The International Association of Chiefs of Police as one of Dallas detectives assigned to this Task Force have been the most innovative law enforcement programs in the deputized as both U.S. Marshals and Special country. The Internet Crimes Against Children (ICAC) Investigators of the Texas Attorney General’s Task Force is responsible for investigating cases of Office to assist them in the filing of criminal charges in technology-facilitated child pornography and cases exploitation cases. of child sexual exploitation or abuse that result from

August 12-15, 2013 | Dallas, Texas | cacconference.org 3 WELCOME

Welcome to the 25th Annual Crimes Against Children Conference. If you cannot find something you are looking for, please do not Welcome to Dallas! We’re so glad you’re here! We are so glad you have joined us and hope that you enjoy your hesitate to go to the HELP DESK or ask one of our Conference staff week in Dallas at this nationally and internationally-recognized or volunteers in purple t-shirts. conference! Monday morning begins with an opening session that includes the conference keynote presentation. Along with a The goal of the Crimes Against Children Conference is to provide welcome to the conference, you’ll be provided with updated practical instruction to those professionals responsible for conference information and any special instructions you may need. combating the many and varied forms of crimes against children using current information, the newest ideas, and the most After a motivating welcome, there will be 26 workshops and 9 successful intervention strategies. interactive computer labs operating concurrently. Selected work- shops are repeated. The schedule is broken down by date and time We appreciate the hard work you do, and hope you have a great in this program. Any updates to this schedule will be communicated conference experience! via information screens located throughout the conference center.

CONFERENCE SCHEDULE

SUNDAY MONDAY TUESDAY WEDNESDAY THURSDAY

7:00 - 8:15 AM 7:00 - 8:00 AM 7:00 - 8:00 AM 7:00 - 8:00 AM Continental Breakfast Continental Breakfast Continental Breakfast Continental Breakfast Registration/Check-in

8:00 AM - 5:00 PM 8:15 - 9:30 AM 8:00 - 9:30 AM 8:00 - 9:30 AM 8:00 - 9:30 AM NCMEC Opening Plenary Workshops Workshops Workshops Pre-Conference Training (pre-registration required) 10:00 - 11:30 AM 10:00 - 11:30 AM 10:00 - 11:30 AM 10:00 - 11:30 AM Workshops Workshops Workshops Workshops

11:30 AM - 1:00 PM 11:30 AM - 1:00 PM 11:30 AM - 1:00 PM 11:30 AM Lunch (on your own) Lunch (on your own) Lunch (on your own) Conference Concludes

1:00 - 2:30 PM 1:00 - 2:30 PM 1:00 - 2:30 PM Workshops Workshops Workshops

2:00 - 9:00 PM 3:00 - 4:30 PM 3:00 - 4:30 PM 3:00 - 4:30 PM BEAT THE CROWD. Workshops Workshops Workshops Conference Check-in is on the 2nd floor 5:00 - 7:00 PM 6:00 PM 7:00 PM of the Sheraton Welcome Dinner Dallas Police Silver Spur Supper Conference Center. Association A 25th Anniversary Hospitality Event Celebration

This was the most organized and well-run conference “ I have attended in my 33 years in law enforcement. - Detective from Detroit, Michigan ”

4 August 12-15, 2013 | Dallas, Texas | cacconference.org WELCOME TIPS FOR A SUCCESSFUL CONFERENCE

Welcome to Dallas! We’re so glad you’re here!

CHECK YOUR FINAL PROGRAM KNOW THE SKYBRIDGE HOURS This Final Program contains full descriptions of every case The second floor Skybridge, connecting the Sheraton Hotel study, workshop and computer lab. For short biographies to the Marriott Dallas City Center and Plaza of the Americas, of our conference speakers, see page 54. For a schedule will be open Sunday 12:00-8:00 PM and until 8:00 PM every of computer labs, please see the Lab Registration Desk evening of the Conference. Outside of these times, guests located on the third floor of the Conference Center. Any staying at the Marriott will need to cross at the street level. changes to the final program will be posted on the large screen near the registration area. Write your name inside Know your transportation options the final program cover and check at the Help Desk if it is If you want to explore a little bit of Dallas, check out Dallas misplaced. Area Rapid Transit (DART), our light rail train system. You can access DART from the Sheraton Hotel (closest stops: Pearl REMEMBER YOUR NAME BADGE and St. Paul). Learn more about the DART rail stations, as You will not be allowed into any workshops without your well as dining and shopping options on pages 6 and 7. name badge. If you misplace your name badge, please check the Help Desk to see if someone has turned it in. You will network CONFERENCE SCHEDULE need to provide a valid picture ID and $5 to replace any lost The camaraderie and networking opportunities at our name badge. conference are unparalleled. Visit the exhibitors to learn about professional resources available to you. Arrive to class early You will find the conference full of wonderful energy AND have fun! plenty of colleagues! If you have your eye on a specific class Maybe you have already heard - we know how to have a and want to ensure a seat, arrive early. Have back up work- good time! Don’t forget to attend: shops in mind in case your first choices are full. Check the • Welcome Dinner Monday evening schedule for possible repeats of the most popular classes. • Dallas Police Association Case studies will have the most seating available. We do our Hospitality Event Tuesday evening absolute best to schedule what we think may be the most popular sessions in larger rooms and will have these rooms • Silver Spur Supper Wednesday evening set up to accommodate as many people as possible. Lastly, if there is anything we can do to assist you in having a Wear layers great time in Dallas and a wonderful conference experience, Dallas in August … what can we say? It is HOT outside – please don’t hesitate to stop by the Help Desk or let one of very hot. Be prepared with layered clothes as the classrooms our staff or volunteers know. in the conference center can be chilly. Stay hydrated with plenty of water. Have a great conference!

Learn Your Way Around The DCAC Conference Team Take a few minutes to review the maps in your final pro- gram (pages 8 and 9) and learn some of the important places throughout the Sheraton Hotel and Conference Center as well as the Marriott Dallas City Center and the Plaza of the Americas. If you have a question Here are a few tips for you: during the week or need • Find the Skybridge! This connects the Sheraton additional assistance, locate Conference Center to the Marriott Dallas City one of our volunteers in the Center and fantastic lunch options at the Plaza of the Americas. QUESTION t-shirts. They • Follow the signs. Along with the hotel signage, we are here to ensure that you have done our best to provide directional signs that have a great conference! will assist you as you locate classrooms, and other events throughout the week. • If you cannot find something you are looking for, please find one of our staff or volunteers for assistance.

August 12-15, 2013 | Dallas, Texas | cacconference.org 5 DOWNTOWN HOTEL & DART INFORMATION

Just a quick walk from the Sheraton Hotel there is access to the DART Light Rail

Here are a few things to enjoy along the DART line. Start at the PEARL station (located just past the intersection of Pearl and Bryan – number 5 on the map).

West End STATION: Mockingbird STATION: RED or BLUE Line heading South towards Ledbetter/Westmoreland RED or BLUE Line heading north towards downtown Garland Stop here during a lunch break for great food from: Take this quick trip for great shopping, dining and entertainment: Chipotle, TGI Fridays, Gator’s, West End Pub, Angelika Film Center (movie theatre) Spaghetti Warehouse, Y.O. Steakhouse and more. Restaurants/Bars such as: Café Express, Trinity Hall Irish Pub, Urban Taco, Deep Ellum STATION: Cold Stone Creamery, Rockfish Seafood Grill, GREEN Line heading South towards Buckner Reikyu Sushi, Herrera’s Tex Mex and Mockingbird Taproom. Stop here to experience Dallas’ historic Deep Ellum neighborhood. Shopping at stores such as: Here are some of the great, local restaurants you will find: Urban Outfitters, American Apparel, West Elm Twisted Root Burger Co., The Angry Dog, Deep Sushi, and several small boutiques. Café Brazil, BuzzBrews and AllGood Cafe.

KLYDE WARREN PARK is a 5.2-acre urban American green space deck park built over the Airlines Woodall Rodgers Freeway and within DOWNTOWN Center walking distance of the Sheraton. The south Hotels end of the park is lined with gourmet food trucks - perfect for grabbing a quick lunch! 1 Sheraton Hotel Margaret St. Hunt Hill Bridge Perot 2 Marriott Dallas Museum Klyde Warren Park City Center Harwood N >> << Olive Routh

3 Hotel Indigo Pearl Ross Ave 4 San Jacinto 4 Fairmont Hotel 2 St. Paul >>

<< Elm 2 Akard 1 3 4 5 DART Stops in Commerce >>

Good Latimer Downtown 1 Dallas Main

1 Union Station 3 Convention Center 6 2 West End 3 Akard 4 St. Paul 5 Pearl 6 Deep Ellum

Please visit dart.org or call 214-979-1111 for information and schedules.

6 August 12-15, 2013 | Dallas, Texas | cacconference.org DINING OPTIONS

SHERATON HOTEL DINING OPTIONS Take advantage of a variety of dining options at this year’s conference. Stay in the hotel to enjoy the Sheraton restaurants:

Continental Breakfast The Kitchen Table Draft Sports Bar provided every morning from Open daily for breakfast, lunch, Open daily for lunch and dinner. 7:00-8:00 AM. and dinner Features 12 flavors of local A small number of gluten-free 6:30 AM - 10:00 PM and international draft beer options will be provided; 11:00 AM - 1:00 AM please arrive early to enjoy! Peet’s Coffee & Tea Open daily at 6:00 AM Chill: Frozen Yogurt Open daily from 11:00 AM - 4:00 PM

PLAZA OF THE AMERICAS DINING OPTIONS Follow the directional signage from the second floor of the Sheraton Hotel across the skybridge to the Plaza of the Americas. Blimpie Subs & Salads J. Pepe’s Tex Mex Plaza Donuts Broadway Pizza KFC Express Smoothie King Chez Max Kobe Kitchen Taco Bell China Dragon McDonald’s Treebirds Corner Bakery NewHaus Yumi Yogurt Higher Grounds 650 North Ziggy’s Barbecue Philly Town

Enjoy our southern hospitality! Dinner is provided each Conference evening at the following social events:

Monday: Tuesday: Wednesday: Welcome Dinner DPA Hospitality Evening Silver Spur Supper 5:00 PM 6:00 PM 7:00 PM Lone Star Ballroom Transportation provided Lone Star Ballroom See pg. 25 for details

Those attending only one or two days of the Conference should purchase tickets to the Silver Spur Supper at the Cashier’s Desk. $30/person

August 12-15, 2013 | Dallas, Texas | cacconference.org 7 SHERATON HOTEL & CONFERENCE CENTER

1ST FLOOR Conference Center

Dallas Ballrooms and Foyer Internet Cafés Main entrance to Conference Center Refreshment breaks Exhibitors

2ND FLOOR Sheraton Hotel

Austin Ballrooms Press Club Seminar Skybridge access to: 4TH FLOOR Marriott Dallas City Center Sheraton Hotel Plaza of the Americas SPECIAL REGISTRATION SEMINAR 2ND FLOOR Conference Center

Conference Store Help Desk and CEU Table Lone Star Ballrooms and Foyer Premium Exhibitors Registration Booths Walkway to Sheraton Hotel

8 August 12-15, 2013 | Dallas, Texas | cacconference.org SHERATON HOTEL & CONFERENCE CENTER

Majestic Majestic Majestic Majestic Majestic 1 2 3 4 5

ELEVATORS

Majestic Majestic Majestic 8 7 6 Majestic Majestic Majestic 11 10 9 37TH FLOOR 3RD FLOOR Sheraton Hotel Conference Center Interactive Workshops Technology Coalition Computer Lab Help Desk (closed meeting) Houston Ballrooms US Postal Inspection San Antonio Ballrooms Service training State Rooms (closed meeting)

4TH FLOOR Sheraton Hotel

City View Rooms Exhibitor Demo Workshops Fitness Center, Spa, and Pool NCMEC CVIP Lab Remington

August 12-15, 2013 | Dallas, Texas | cacconference.org 9 th Celebrating the25 Anniversary of the

25 years ago, the Crimes Against Children Conference started with just 50 local law enforcement attendees. That year, 2 speakers - Brian Killacky and Ken Lanning - provided a one-day training to the small group of officers. That training, and every Crimes Against Children Conference since, has been coordinated by Leigh Ann Lozano and Bill Walsh. This year, we have 3,000 professionals involved in the investigation, prosecution, and treatment of crimes against children attending this premiere conference.

On this 25th Anniversary, we honor your expertise and your life’s work.

Brian Killacky Ken Lanning Leigh Ann Lozano Bill Walsh

We are all better people for having known you. Thank you for your dedication and service to children everywhere. OPENING PLENARY Monday, August 12th, 8:15-9:30 AM

KEYNOTE SPEAKER: AARON FISHER

Aaron Fisher became nationally known as “Victim 1,” the face of the Jerry Sandusky child abuse scandal. He had the courage to speak up about the abuse he endured ensuring the perpetrator would face justice. Aaron has been named a hero for having struggled and persevered through the most adverse circumstances to ensure the serial child molester in his case could hurt no one else. He, along with his psychologist Michael Gillum and his mother Dawn Hennessy, co-authored Silent No More, Victim 1’s Fight For Justice Against Jerry Sandusky.

Aaron has committed himself to assisting victims of sexual abuse worldwide through his participation in the Let Go…Let Peace Come In Foundation. He is committed to speaking to large groups, including children, about sexual abuse.

Although Aaron is a busy college student and athlete, he devotes a great deal of time advocating for victims, promoting the need to address abuse and the systematic problems in society which contribute to the problem.

STATE OF THE INDUSTRY ADDRESS: JOE SULLIVAN

Joe Sullivan is the Chief Security Officer at Facebook, where he manages the information security, product security, investigations, and law enforcement relations teams, and works closely with the Legal and Privacy teams on other regulatory and privacy-related legal issues.

Prior to joining Facebook in 2008, Joe spent over 6 years working in a number of different security and legal roles at PayPal and eBay, including at different times, overseeing user safety policies, directing company relations with law enforcement, guiding eBay’s regulatory compliance efforts, and managing PayPal’s North America legal team.

Before entering the private sector, Joe spent 8 years with the United States Department of Justice.

August 12-15, 2013 | Dallas, Texas | cacconference.org 11 2013 SPONSORS & PARTNERS

THE ANNUAL CRIMES AGAINST CHILDREN CONFERENCE IS PRESENTED BY Dallas Children’s Advocacy Center and Dallas Police Department

A SPECIAL THANKS TO THIS YEAR’S CONFERENCE TRAINING PARTNERS, SPONSORS, AND SUPPORTERS.

Platinum Sponsor GOLD Sponsor THE ANNUAL CRIMES AGAINST CHILDREN CONFERENCE IS PRESENTED BY Dallas Children’s Advocacy Center and Dallas Police Department We are proud

A SPECIAL THANKS TO THIS YEAR’S CONFERENCE to honor the TRAINING PARTNERS, SPONSORS, AND SUPPORTERS. men and women who defend our nation’s children.

Platinum sponsor of the 25th Annual Crimes Against Children Conference The Technology Coalition wishes to thank the Crimes Against Children Conference for welcoming us to its 25th annual gathering. Congratulations on a major milestone!

Technology Coalition members work together to combat online child sexual exploitation. We are:

AOL Inc. EarthLink, Inc. Facebook Google Inc. Microsoft Corporation PayPal Time Warner Cable United Online, Inc. Yahoo! Inc.

Interested in learning more or joining the effort? Visit www.technologycoalition.org for more information. Established in 1984, the National Center for Missing & Exploited Children® is the leading nonprofit organization in the U.S. working with law enforcement on issues related to missing and sexually exploited children. As part of its Congressional authorization, NCMEC receives federal funding for certain core services and also utilizes private-sector support. We offer many free resources to law enforcement. Our toll-free hotline, 1-800-THE-LOST® (1-800-843-5678), has handled more than 3.7 million calls, and we have assisted law enforcement in the recovery of more than 185,000 missing children. We operate the CyberTipline, which provides a centralized mechanism for reporting suspected child sexual exploitation.

Providing proven training strategies because we know what’s at stake. The National Criminal Justice Training Center (NCJTC) provides high-quality training and technical assistance to better protect our most vulnerable citizens, enhance public safety, and improve community life.

The National Criminal Justice Training Center represents 20 years of field experience, from more than 300 criminal justice experts, and the delivery of national courses, technical assistance, and consulting services to more than 130,000 criminal justice professionals in all 50 states, U.S. territories, and abroad.

Contact us to explore these training opportunities! (855) 866-2582 | [email protected]

August 12-15, 2013 | Dallas, Texas | cacconference.org 15 IF YOU’RE INTERESTED IN... This is not a complete list of workshops. See daily agendas for all workshops offered.

CHILDREN’S ADVOCACY CENTERS FORENSIC INTERVIEWS

• (An) Advocacy Center Capital Campaign and New Building: • (A) Child’s Voice Silenced: Sexual Abuse Allegations in Child Lessons Learned Custody Cases • Building a Community Education Program for Your CAC • Corroboration in Child Abuse Investigations (Part 1 & 2) • Children’s Advocacy Center (CAC) Leadership Forum • Deception Detection • Combating Sexual Exploitation with a Multi-Agency Response • Defending the Investigative Interview • Creating a Trauma Informed Multidisciplinary Team • (The) Forensic Interviewer at Trial (Part 1 & 2) • Imperfect Leadership: Your Secret to Success • Looking Back to See the Future: Lessons from 25 Years of Child Protection (Part 1 & 2) • Improving the Case Review Process It Takes a Team (MDT) to Protect a Child • Overcoming Difficult Situations in Forensic Interviews: What • Questions Do I Ask Next? Keeping the Passion, Focusing on Mission • • Presenting Evidence in Forensic Interviews: Using the Prepare • Looking Back to See the Future: Lessons from 25 Years of Child and Predict Method Protection (Part 1 & 2) • “Priming” Children’s Disclosures: Suggestibility in Forensic • Playing Nice in the Sandbox: Developing Effective MDTs Interviews • Secondary Traumatic Stress and Multidisciplinary Team • Strategies For Forensic Interviews With Adolescents (Part 1 & 2) Functioning • To Use or Not to Use: Introducing Evidence in the Investigative • (The) Six Principles of Successful Board/CEO Partnerships Interview • Training to Work with Commercially Sexually Exploited and Domestically Trafficked Children (Part 1 & 2) CHILD PROTECTIVE SERVICES • When a Single-Session Forensic Interview Doesn’t Fit

• Accidental or Intentional: Investigator, You Figure It Out • Child Fatality Review: 35 Years Experience, Prepare for the Next 5 MEDICAL TOPICS • (A) Child’s Voice Silenced: Sexual Abuse Allegations in Child Custody Cases • Broken Bones: Not Just Sticks and Stones • Corroboration in Child Abuse Investigations (Part 1 & 2) • Build Your Case with the Help of the Forensic Nurse • CPS and Law Enforcement Working Together to Protect Drug • Firearm Injuries in the Pediatric Population Endangered Children • Five B’s of Child Physical Abuse: Bruises, Burns, Bones, Bellies, • Deception Detection and Brains (Part 1 & 2) • Hands are Not for Hitting: The Impact of Domestic Violence on • Hospitals and Missed/Missing Medical Evidence Children • It’s Not Over Yet! The Utility of Medical Follow-up for • Informal and Non-Hierarchal Institutions As Havens for Predators Child Abuse Victims • Institutional Abuse and Persons With Disabilities: Strategies for • Pediatric Head Trauma: The Evidence and the Arguments Investigators and Prosecutors • Scalds, Scorches, and Splashes: Burns in Children • Investigating Physical Abuse and Neglect: Reconstruction Techniques (Part 1 & 2) • Smoke And Mirrors: Suspecting Medical Child Abuse • Looking Back to See the Future: Lessons from 25 Years of Child • The Medical Examiner’s Perspective on Sudden Unexplained Protection (Part 1 & 2) Infant Death Investigation • (The) MDT Approach to the Investigation, Assessment and • Understanding Child Intervention of Juvenile Sex Offenders • (The) Medical Examiner’s Perspective on Sudden Unexplained Infant Death Investigation MENTAL HEALTH • Understanding Child Torture • Protecting Children by Getting Mom from Going to Gone in • Burnout and Back: A Case Study of Wellness in Action Domestic Violence Situations • Compliant Behavior of Abducted Children • Smoke And Mirrors: Suspecting Medical Child Abuse • Defending Childhood: Children Exposed To Real World Violence • Statewide Online Legal Resource and Communication Centers • Hands are Not for Hitting: The Impact of Domestic Violence on • Working Ethically with Children Children • Working with Non-Offending Parents in Child Sexual Abuse Cases • Managing Your Unit within a Healthy Environment: A Seminar for Supervisors of Individuals Exposed to Child Sexual Abuse Images

16 August 12-15, 2013 | Dallas, Texas | cacconference.org • Optimal Fitness for Child Exploitation Detectives, Prosecutors, • (The) MDT Approach to the Investigation, Assessment and and other Professionals Intervention of Juvenile Sex Offenders IF YOU’RE INTERESTED IN... • (The) Process of Play: Understanding the Effects of Trauma • Non-Compliant Sex Offenders: How the USMS Can Help State Maltreatment in Working with Young Children Through Play and Local Law Enforcement Therapy (Part 1 & 2) • Sex Offender Reentry • Real Treatment with Real Kids: Treatment for Sexually Abused • They Hide, We Seek: Sex Offender Tracking Resources for Law Children (Part 1 & 2) Enforcement • Resiliency 101: From Victim to Survivor • Traveling Sex Offenders • Secondary Trauma: Managing Our Own Well-Being • Understanding Perpetrators of Sexual Crimes Against Children • Secondary Traumatic Stress and MDT Functioning (Part 1 & 2) • Therapeutic Response: Designing Play Therapy Around a • Understanding Sex Offenders (Part 1 & 2) Neuroscientific Approach (Part 1 & 2) • Unmasking the Sexual Offender (Part 1 & 2) • Victim Impact of Adverse Childhood Experiences: Cause or Effect • Women Who Molest Children: Offender Typologies of Sexual Exploitation? • Working Ethically with Children • Youth in Crisis: The Impact of Trauma on Sexually Exploited TECHNOLOGY Minors • Beyond the Image: Victim Identification (Part 1 & 2) PROSECUTION • Child Pornography Investigations: The Gamechanger in Stopping Child Sexual Abuse • (A) Child’s Voice Silenced: Sexual Abuse Allegations in Child • Child Pornography Investigations: Time for a Change! Custody Cases • Demonstration and Discussion: NCMEC’s New XML Schema • After the First 48: From Indictment to Trial • Digital Photo Forensics: More than Meets the Eye • Confessions Without Miranda: Understanding How Confession • Estimation of Victim Age in Child Sexual Exploitation Laws Really Work (Part 1 & 2) Investigations • Ethics in Child Abuse Prosecutions • Facebook: Working with Law Enforcement • Getting the Right One: A Serial Abuser is Convicted of • GoDaddy.com: Unlocking the Information Available through (Part 1 & 2) Registrars • Informal and Non-Hierarchal Institutions As Havens for Predators: • Google: Combating Child Exploitation What Prosecutors and Investigators Must Know • Identifying and Seizing Electronic Evidence (ISEE) (Part 1 & 2) • Institutional Abuse and Persons With Disabilities: Strategies for • International Collaboration to Rescue a Child and Close a Child Investigators and Prosecutors Sex Offender Network • It’s Never Really Over: Post-Conviction Issues in Child Abuse • Internet Investigations Cases • Introduction to Technology for Sexual Assault Investigators • Jury Selection in Cases of Child Abuse • Once the Shutter Snaps: The Continued Victimization from • Jury Selection in Child Sexual Abuse Cases Child Sex Abuse Images • Opening Statements and Closing Arguments in Cases of Child • Online Protections for Criminal Justice Professionals Abuse • Questionable Child Pornography: Investigative Guidelines • Overcoming Untrue Defenses in Child Exploitation Cases • Retrieving Information from the Cloud (Legally) • Preparing Children to Testify in Court • Streamlining Forensic and Investigative Workflows (Project VIC) • (The) Pros and Cons of Going Federal • Supporting Employee Resilience: A Panel Discussion • Prosecuting Swami Ji: The False Guru • Tactical Review of Mobile Data: Field vs. Lab • Prosecuting the Improper Teacher-Student Relationship • Technology Developments: A Panel Discussion • Prosecutors and Technology: What You Need to Know • Tools in the Toolbox: Fighting Child Sexual Abuse Images Online • Prosecutor’s Forum • Understanding and Investigating Child Pornography • Rejection, Rage and Revenge: The State of Texas v. Jose Eduardo Arredondo • Understanding P2P File Sharing Investigations • Statewide Online Legal Resource and Communication Centers • Using Sanitized Images in Child Pornography Investigations • U.S. v. Michael and Rebecca Strausbaugh • What Investigators Need to Know about IPv6 • (The) Work of CEOP and its New Approach to the Prioritization of Child Sex Offending SEX OFFENDERS • Working with Yahoo! During an Investigation

• (A) Close-up Look at Female Offenders in Positions of Trust LAW ENFORCEMENT • Evidence Based Approaches to Sex Offender Management • International Collaboration to Rescue a Child and Close a Child Sex The majority of workshops are relevant to this field. Offender Network • Interviewing Sex Offenders: A Behavioral Analysis Framework

August 12-15, 2013 | Dallas, Texas | cacconference.org 17 CASE STUDIES & WORKSHOPS Each session is listed by time-block.

dollars. He bragged about always beating MONDAY, 10:00-11:30 AM the system. This case study will examine the twists and turns that identified Foley as the AUGUST 12 (THE) ACTUAL NANNY 911* child pornography, possessor, and producer, Schedule at a glance: Crystal Levonius, Shannon Miller, as well as the molester of two young male

MONDAY John Rolater victims. Repeated Thursday. What does a prosecutor do when a Capital Austin 3 7:00-8:15 AM Murder conviction is overturned on appeal Continental Breakfast and they have to retry the case six years (A) DAUNTING TASK: A REVIEW later when the original prosecutor is gone OF THE JERRY SANDUSKY Registration/Check-In and many of the witnesses are no longer INVESTIGATION* Lone Star Foyer available? Attend this case study and learn Jonelle Eshbach how the second trial resulted in a conviction This presentation will focus on the hurdles and justice prevailed. The case involved Ada to building a case against a celebrity. Those 8:15-9:30 AM Cuadros Fernandez, a nanny from Peru, who investigating allegations of Jerry Sandusky’s Opening Plenary was convicted of the Capital Murder of a sexual abuse of children faced an astounding 14-month-old child in her care. Fernandez number of barriers. This presentation will Lone Star Ballroom killed the child by striking his head against explore how investigative tools, perseverance, a kitchen cabinet door, causing severe head exemplary detective work, and good fortune injuries, while his twin brother watched. The helped build an overwhelming case that sent 9:30-10:00 AM Fifth Court of Appeals concluded that two a serial pedophile to jail for the rest of his life. Morning Break errors were made in that case that mandated Victim advocacy considerations and private Refreshments Provided reversal of the original conviction. Learn how civil attorney’s actions will be discussed. the second trial was prosecuted in spite of Additional consideration will be given to numerous obstacles. Repeated Tuesday. the role the media played in assisting and 10:00 AM-5:00 PM Lone Star C4 obstructing this investigation. Repeated NCMEC CVIP Lab open Tuesday. BUILD YOUR CASE WITH THE Lone Star B City View 8 HELP OF THE FORENSIC NURSE Sheilah Priori KENNETH BRANDT: Child abuse cases are difficult investigations. ADOPTING TO RAPE* 11:30 AM Did you know that the forensic nurse could Chris Anderson, Marcus Penwell First Floor Exhibit Hall Opens be of great assistance to you in these This presentation will discuss how a cases? The forensic nurse examiner can Craigslist enticement investigation led to play a crucial role in navigating the medical uncovering one of the most horrific child sex 11:30 AM-1:00 PM system by providing accurate statements, abuse cases in Ohio history. It will detail how Lunch photo-documentation, expert testimony, and Kenneth Brandt adopted three prepubescent medical records necessary in investigations boys from Texas and began abusing them On Your Own of crimes against children. This workshop on the drive back to Ohio. The presenters will utilize case studies to demonstrate the will discuss how Brandt used rape as a importance of the medical forensic exam punishment and how he would meet other 2:30-3:00 PM in the investigation of sexual and physical men online and allow them to also abuse Afternoon Break abuse. Repeated Thursday. the boys. Included in the workshop is a Refreshments Provided City View 6 discussion on Craigslist online investigation techniques. The presenters will also discuss CATCH ME IF YOU CAN: A CON how good communication and teamwork 5:00-7:00 PM MAN’S REVENGE* by multijurisdictional agencies led to the Eric Szatkowski rescue of the 3 boys and 155 years in prison Welcome Dinner This presentation will examine one man’s for the 3 abusers. Presentation may include Lone Star Ballroom attempt to set up another man on a child some graphic interview material. Repeated pornography charge. David Foley was a multi- Thursday. level marketer, and quintessential confidence Lone Star A3 man. He fooled everyone into believing Case Studies are marked his make-believe “wife” died years ago, IMPERFECT LEADERSHIP: YOUR with an asterisk (*) leaving him a widower with three “sons.” For SECRET TO SUCCESS decades, he defrauded scores of businesses Jonathan Schick and friends of hundreds of thousands of This workshop is an inspirational and

18 August 12-15, 2013 | Dallas, Texas | cacconference.org dramatic look at the crucial “imperfect” strategy. This workshop will illustrate the images and recordings in victim and witness skills that leaders need to know in order techniques employed by the Behavior interviews. Repeated Tuesday. to succeed in today’s high-pressured Analysis Unit and demonstrate their impact Remington environment. In this challenging seminar, on an investigation into a group of individuals participants will uncover the secrets of: how using child-modeling websites on the Internet WORKING WITH THE MEDIA making a “good” mistake can propel you to as a cover for the distribution of indecent Craig Hill greater opportunities, realizing that being an images of children. Repeated Tuesday. This workshop will discuss the importance imperfect leader is the secret to building your Lone Star C3 of developing and adhering to strict public team, why a seemingly “weak” character relations guidelines while understanding the MONDAY trait may be your ticket to success. RESPONDING TO THE ACTIVE benefits of developing a positive relationship City View 3 SHOOTING AT SANDY HOOK between law enforcement and the media. ELEMENTARY SCHOOL* City View 7 INTERNATIONAL David Kullgren COLLABORATION TO RESCUE A This case study, presented by one of the WORKING WITH YAHOO! DURING CHILD AND CLOSE A CHILD SEX first responders, will examine the initial law AN INVESTIGATION OFFENDER NETWORK* enforcement response to the Sandy Hook Chris Madsen Brian Bone, Jonathan Rouse School Shooting. It will include a step-by- This presentation will provide an overview of It started with the discovery of an image step review of how the events unfolded, the Yahoo! services and technologies, describe in New Zealand that led Australian and U.S. law enforcement response, and the lessons the types of data available to law enforcement investigators to pursue one of the most learned. The presentation will also discuss from those services and technologies, and depraved cases of child exploitation. This recommendations to law enforcement review the processes by which Yahoo! may case study will provide background on the officers on responding to an active school provide data to law enforcement, consistent recent conviction and sentencing of a US/ shooter. Repeated Tuesday. with state and federal law, including the Australian citizen for the sexual exploitation Lone Star A2 Stored Communications Act. In addition, we of a child who was adopted for the sole will review some best practices compiled by purpose of exploitation. The abuse began SECONDARY TRAUMATIC Yahoo!’s Law Enforcement Compliance Team, days after his birth, and over six years the STRESS AND MDT FUNCTIONING the folks responding to law enforcement couple offered him up for sex with at least Karen Hangartner requests for data. eight men, recording the abuse and uploading Just as working with traumatized children Austin 2 the footage to an international syndicate. and families affects individuals, this work Repeated Tuesday. can also affect how multidisciplinary teams Lone Star A4 function. This workshop will look at the research related to organizational stress, INTERNET INVESTIGATIONS discuss how secondary traumatic stress may Brian Durham, Brian Reich be reflected in MDT functioning, and how that It is essential for law enforcement to have the stress can be mitigated. Be sure to ability to collaborate quickly and effectively Seminar with Internet Service Providers to identify and visit our preserve critical evidence for investigations TRICKS OF THE TRADE: and emergent cases. This presentation will OFFENDERS, PERPETRATORS, provide easily applied steps to understand AND VICTIMS IN SEX Exhibitors! IP (Internet Protocol) based communications, TRAFFICKING gain IP Intel, interpret results, and explain Sharon Cooper, Julian Sher IP Intel to non-technical audiences (judges, This presentation will discuss the M.O. of supervisors and prosecutors). Through this offenders, the dangers of perpetrators, and presentation, attendees will gain a better methods of victimization in sex trafficking in Monday understanding of Internet communications, the U.S. Repeated Tuesday. legal requirements, investigative challenges, Lone Star C2 11:30 AM-5:00 PM and tips to request information and/or technical assistance from ISP’s and specific USING SANITIZED IMAGES requirements for Time Warner Cable. IN CHILD PORNOGRAPHY Tuesday Austin 1 INVESTIGATIONS Andi Grosvald Hamilton, Steve Tanner 7:00 AM-5:00 PM INTERVIEWING SEX OFFENDERS: Pornographic images and recordings can A BEHAVIORAL ANALYSIS be produced virtually anywhere in the FRAMEWORK world. For law enforcement agencies to file Wednesday Joe Sullivan charges in the appropriate jurisdiction, in the This presentation explores the application appropriate timeframe, investigators need to 7:00 AM-5:00 PM of behavior analysis to law enforcement gather as much information as possible from investigations of sexual crimes against the images. This workshop will offer specific children, using technology and the Internet. advice on how to overcome trauma in the The primary focus is to demonstrate that by victim interview, what to focus on in the better understanding perpetrator behavior, pornographic material to obtain case details, investigators can improve their investigative and how to use sanitized child pornography

August 12-15, 2013 | Dallas, Texas | cacconference.org 19 for their own sexual gratification. This case GOOGLE: COMBATING CHILD 1:00-2:30 PM study will detail the collaboration between EXPLOITATION NCMEC, local, state, federal, and international Einat Clarke, Ty Lim, Shantal Poovala 25 YEARS OF INVESTIGATING law enforcement agencies to successfully This workshop will provide an overview of CHILD SEXUAL EXPLOITATION prosecute Corey Loftin, and the like-minded Google’s efforts to combat child exploitation Brian Killacky, Ron Laney individuals he communicated with over the including content reporting, product safety, This workshop will discuss the issues, Internet who were also victimizing children legal process, and data disclosure policies. challenges, and techniques that have at his direction. Repeated Thursday. Lone Star C4 been utilized by law enforcement for the Lone Star A2 past 25 years when investigating the HOSPITALS AND MISSED/ sexual exploitation of children. The point CPS AND LAW ENFORCEMENT MISSING MEDICAL EVIDENCE of reference will be the law enforcement WORKING TOGETHER TO Michael Durfee, Ruby Guillen MONDAY response 25 years ago when the Crimes PROTECT DRUG ENDANGERED Hospitals provide major resources and Against Children Conference was started, CHILDREN problems, including a lack of child abuse and the progress that has been made since Milton Ayala experience. Cases may be mismanaged or then. The presenter will also discuss the This workshop’s goal is to help the poorly recorded. The presenters will discuss future changes needed in investigative participants understand the collaborative their unique data to rank hospitals, and techniques to better protect children from effort between CPS and law enforcement unique software to store and manage child crime. necessary to keep children safe when a drug abuse reports. They will explain how their Lone Star C2 warrant or arrest is planned and executed, programs address burns, intensive care, and when children are suspected to be newborn, and suspicious death. They will AFTER THE FIRST 48: FROM present in the primary scene. The workshop explain how their hospital network is built INDICTMENT TO TRIAL will cover: the mandated legislative initiative with minimal cost using existing resources Rachel Burris, Sherre Sweet for drug endangered children, the role CPS and automation. Lastly, they will discuss with In this presentation attendees will gain a plays in drug environments, and lessons the audience their successes and failures better understanding of what it takes to learned from joint investigations. Participants with hospitals and healthcare. prepare a sexual abuse case beginning will hopefully come to fully accept the notion Dallas D1 with indictment and ending in trial with a that a child living in a drug environment, verdict of guilty. The presenters will also according to the Texas Family Code, is a form IDENTIFYING AND SEIZING explore common problems and challenges of child abuse. ELECTRONIC EVIDENCE (ISEE) encountered in child sex abuse prosecutions Dallas A2 (PART 1 OF 2) as well as discuss strategies for overcoming Cynthia Gonnella them. Repeated Tuesday. ETHICS IN CHILD ABUSE This workshop is designed to instruct Lone Star A3 PROSECUTIONS participants on the basics of recognizing Patricia Hogue potential sources of electronic evidence, BEST PRACTICES: WORKING This presentation will explore some of the preparing them to respond to an electronic WITH FAMILIES OF MISSING dilemmas faced by child abuse prosecutors crime scene, and to safely and methodically CHILDREN as they grapple daily with the complexities preserve and collect items of evidentiary Kristen Anderson, Colleen Nick and horrors common to crimes against value to be used in court proceedings. This Law enforcement’s relationship with the children, and will focus on key ethical rules, presentation utilizes advanced adult learning family of a missing or exploited child guidelines, statutes, and case law that must skills and takes the participants through a can be a critical element in the course of dictate their conduct in order to fulfill their process of determining the requirements an investigation. A poor or non-existent duty to see that justice is done – so as to for an electronic search warrant and the relationship can potentially wreak havoc on insure that the rights of the innocent are considerations for a safe and thorough the case, while a positive one can contribute protected and that justified convictions execution of the electronic search warrant. to a successful outcome. In this presentation, remain so. Repeated Thursday. Repeated Thursday. you will hear first-hand from a parent whose City View 6 Austin 2 child has been missing since 1995, and receive model policy guidance from NCMEC (THE) FORENSIC INTERVIEWER INTRODUCTION TO to address this important aspect of missing AT TRIAL (PART 1 OF 2) TECHNOLOGY FOR SEXUAL child case investigations. Julie Kenniston, D. Andrew Wilson ASSAULT INVESTIGATORS Dallas D3 The first part of this presentation will focus on Steve Del Negro, Joe Laramie proper utilization of the forensic interviewer This lecture will provide an overview of the COREY LOFTIN: PRE-SCHOOL at trial. The lecture will cover the different technology that is used for sexual exploitation TEACHER, BABYSITTER, YOUTH parts of a trial, how a forensic interviewer and the types of technology-facilitated COUNSELOR, AND PREDATOR* may be used, the type of questions the crimes against children that are committed. Christopher Mercado, forensic interviewer can expect both on A discussion about the impact on victims, Alessandra Serano cross and direct examination, and tips to help how offenders are using technology, and the This presentation will detail the great lengths the forensic interviewer in preparation for challenges new technology will create, are Corey Loftin took in order to gain access to testifying. The second part will be a practical included. children. Loftin was a licensed pre-school exercise involving a direct examination, Dallas A1 teacher, an online babysitter, a church youth a cross examination, and an after action counselor, and a teacher for others like him review. who wanted to learn how to groom children Remington

20 August 12-15, 2013 | Dallas, Texas | cacconference.org INVESTIGATING PHYSICAL the world of nonprofit service: Passion and will provide an overview of the different types ABUSE AND NEGLECT: Mission. Yet, these two motivations often of technological evidence and how it may be RECONSTRUCTION TECHNIQUES become obscured by daily minutiae, and authenticated in a courtroom. The presenter (PART 1 OF 2) can even create competing priorities. In will discuss how digital evidence provides Robert Farley this challenging seminar, participants will multiple crime scenes, and common areas of This workshop focuses on non-accidental uncover practical tools to: stay focused on evidence. injuries on children and emphasizes the mission when one’s passion seems to be Dallas D2 specific techniques that can be used in conflict, know when to draw a line in the by investigators in the assessment, sand...and when not to, and ways to avoid QUESTIONABLE CHILD MONDAY investigation, and reconstruction of cases common blind spots. PORNOGRAPHY: involving soft tissue injuries such as bruises, City View 3 INVESTIGATIVE GUIDELINES lacerations, and burns. In addition, the Kenneth Lanning various weapons utilized by the offender in OPTIMAL FITNESS FOR CHILD Unfortunately, the criteria for determining child abuse situations will be identified and EXPLOITATION DETECTIVES, if a visual image is child pornography or discussed, along with the circumstances PROSECUTORS, AND OTHER not, is not clear-cut, and cannot be readily of deprived and neglected children. Lastly, PROFESSIONALS determined from what appears within the the presentation offers case illustrations Jean McAllister, Michael Sullivan “four corners” of an image. What is the that encourage hands-on participation by Burnout, vicarious trauma, and compassion precise legal difference between medical students. Repeated Tuesday. fatigue are strong indicators that exposure to images, art, innocent nudity, and what the Austin 3 child pornography is affecting you negatively, law generally refers to as lewd exhibition of but are they recognizable? How about the the genitals? This presentation will discuss IT TAKES A TEAM (MDT) more subtle clues that may indicate that the legal criteria for child pornography and TO PROTECT A CHILD the effects are creeping up on you? In this make recommendations for investigators to Ric Hertel session, you’ll learn the major and minor properly evaluate questionable images of We all know that a properly functioning changes that you may be experiencing and children. Multidisciplinary Team (MDT) is critical for what you can do to protect yourself from Lone Star A4 success in child abuse cases. The problem harm. This training is part of the Supporting is that this is not always the case. The reality Heroes in Mental Health Foundational REAL TREATMENT WITH is that MDTs are made up of individuals Training (SHIFT) wellness program funded by REAL KIDS: TREATMENT FOR from different disciplines, with different legal an OJJDP Internet Crimes Against Children SEXUALLY ABUSED CHILDREN responsibilities, different policies, procedures Task Force Training and Technical Assistant (PART 1 OF 2) and often, different goals. This presentation Grant. Tamara Hillard will discuss how to make MDTs more effective Austin 1 Based on the “evidence based and how members can work beyond their practice” of Trauma Focused-Cognitive traditional disciplines in cooperation with PERPETRATORS IN POSITIONS Behavioral Therapy, this presentation other MDT members to obtain the common OF POWER AND TRUST provides active, creative, and relationship- goals of protecting children and holding Bill Carson based intervention ideas for working with offenders accountable. Repeated Thursday. This workshop will examine child molesters sexually abused children. It will offer ideas City View 7 who actively seek out positions of power and for how to engage children and explore trust involving children. We will specifically the misperceptions that can follow a child JUST LOOKING: HOW RISKY look at those perpetrators who seek into adulthood and limit healing, and will ARE COLLECTORS OF INDECENT employment or volunteer opportunities with highlight resiliency skills and practical IMAGES OF CHILDREN? youth-serving organizations for the purpose safety/prevention ideas. Topics will include: Joe Sullivan of finding potential victims. Utilizing prison helping parents become support agents for This presentation explores one of the key interviews conducted by the presenter with their children, and creating an atmosphere questions facing professionals dealing with more than 75 convicted child molesters, this of trust and acceptance in the child-therapist sex offenders who view/download child presentation will touch on extensive research relationship. The use of case examples pornography – will they commit contact involving larger groups of offenders. We and usable techniques, and a focus on the sexual offenses? Using video extracts of will also discuss initial impressions from a “clinician as change agent,” will be highly interviews with sex offenders, Dr. Sullivan review of the infamous Boy Scout Ineligible emphasized. will provide insight into how we can better Volunteer Files, also known as the Boy Scout Seminar assess the risks posed by these offenders. Perversion Files. Repeated Wednesday. This presentation explores the thoughts and Dallas A3 1:00-2:30 PM cont’d life experiences of a young man convicted for on next page. possessing sexual images of children, and PROSECUTORS AND the nature of the risk he poses to children in TECHNOLOGY: his local community. Repeated Tuesday. WHAT YOU NEED TO KNOW Many Computer Labs are open Dallas B Justin Fitzsimmons to all Conference attendees. Child abuse cases in the 21st Century KEEPING THE PASSION, necessitate a prosecutor who has an If you are interested in attending FOCUSING ON MISSION understanding of the different types of a lab, visit the Computer Lab Jonathan Schick technological evidence. Digital evidence may Help Desk on the 3rd floor of the This workshop is an invigorating journey provide some of the strongest corroboration Conference Center. that revisits the reasons we are drawn to of children’s outcry statements. This lecture

August 12-15, 2013 | Dallas, Texas | cacconference.org 21 1:00-2:30 PM CONT’D KEEP IT DOWN, I’M TRYING 3:00-4:30 PM TO SLEEP* Crystal Levonius, Shannon Miller SILENT NO MORE: VICTIM #1’S DEFENDING CHILDHOOD: What is the appropriate charge for a mother FIGHT FOR JUSTICE AGAINST CHILDREN EXPOSED TO REAL who failed to protect her child from sexual JERRY SANDUSKY* WORLD VIOLENCE abuse and failed to report it? Prosecutors Aaron Fisher, Michael Gillum, Sharon Cooper believed that because Michelle Smith Dawn Daniels Hennessy This presentation will review results of permitted her husband to sexually abuse In this workshop, participants will hear three a 16-month task force assessment of her daughter, her horrifying actions required perspectives from those involved with one of children exposed to violence (CEV) with more consequences than someone who just the most high profile child molestation cases. recommendations for prevention and failed to act. On one occasion she even told Aaron Fisher will share his experiences, from intervention, from community policing her husband to, “Keep it down, I’m trying to MONDAY the time he met Jerry Sandusky, through the strategies, to early child and family education sleep,” while he was sexually abusing her present. His mother, Dawn Daniels Hennessy, on the role of family violence in the life of daughter. In this presentation you will learn will discuss her perspective on these events. a child. Specific agency recommendations how Smith was charged and convicted with Michael Gillum, the psychologist who will be provided for participants who seek Aggravated Sexual Assault, and sentenced to initiated and followed through with treatment to decrease family violence, community 210 years in prison. Repeated Tuesday. for Aaron Fisher and the prosecution of violence, youth violence, juvenile justice Lone Star C4 Jerry Sandusky, will review his treatment facility violence, and sexual violence involving process and fight for justice in this case. children. IDENTIFYING AND SEIZING The presenters will explain how celebrity, Dallas C ELECTRONIC EVIDENCE (ISEE) socio-economic discrimination, intimidation, (PART 2 OF 2) and politics impacted the prosecution. FACEBOOK: WORKING WITH LAW Austin 2, See pg. 20 for description The issue of managing a victim from initial ENFORCEMENT report through criminal prosecution will be Emily Vacher IMPROVING THE CASE REVIEW highlighted. Repeated Tuesday. In this workshop, the presenter will discuss PROCESS Lone Star B how Facebook works with industry partners Karen Hangartner and law enforcement to combat crimes Case review seems to be such a simple UNDERSTANDING CHILD against children. This presentation will process. You need an agenda and someone TORTURE discuss Facebook “basics,” the latest to facilitate the meeting, right? But in reality, Sharon Cooper safety and privacy controls available to case review is a complex process that often This presentation will define child torture, prevent and reduce risks for users of the provides insight into the MDT functioning. provide multiple case examples, review site, safety initiatives designed to combat The good, the bad, and the ugly can show up existing legal statutes, and underscore child exploitation, and a detailed review in the case review process, and often team investigation and medical techniques of Facebook’s on-line records request members do not have a clear understanding to negate defense strategies. Repeated system for law enforcement use. Repeated of what should happen in a meeting. In Wednesday. Wednesday. this workshop, we will discuss common Dallas C Lone Star C1 misconceptions about case review, barriers to effective case review, and strategies that UNDERSTANDING SEX (THE) FORENSIC INTERVIEWER can enrich the case review process for your OFFENDERS (PART 1 OF 2) AT TRIAL (PART 2 OF 2) MDT. Jim Tanner Remington, See pg. 20 for description City View 7 This workshop focuses professionals on the cognitive set of the “intrafamilial” GODADDY.COM: UNLOCKING INVESTIGATING PHYSICAL and “position of trust” sex offender. The THE INFORMATION AVAILABLE ABUSE AND NEGLECT: presenter will expand and clarify elements THROUGH REGISTRARS RECONSTRUCTION TECHNIQUES of investigation, prosecution, and effective Ben Butler, Joseph Hanyen (PART 2 OF 2) containment. We will discuss sex offenders’ One of the most common points of confusion Austin 3, See pg. 21 for description perceptions, ideation, grooming strategies, for investigators of online child abuse cases and cognitive processes. The impact of the is figuring out who has what information, and LAW ENFORCEMENT RESPONSE Internet and the offenders’ digital behavior will how to best go about getting it. This workshop TO MISSING/ABDUCTED be explored and explained. Participants will will attempt to clarify the confusion. The CHILDREN leave this session with a new understanding presenters will discuss the information Kristen Anderson, Craig Hill of sex offenders, their thoughts, and digital available to law enforcement through This workshop will discuss the basic steps behaviors which will enhance the ability to Registrars and Hosting Providers. They will recommended for Call-Takers, Patrol, First- investigate, prosecute, supervise, and treat also discuss recent trends and tactics in Line Supervisors, and Investigators when sex offenders. Repeated Tuesday. investigating commercial child pornography responding to a reported missing or abducted Lone Star C3 sites, and the role GoDaddy takes that can child. help in investigations. Dallas D3 Dallas D1

22 August 12-15, 2013 | Dallas, Texas | cacconference.org LESSONS LEARNED FROM CHILD TACTICAL REVIEW OF MOBILE Protocol (IP), the communications protocol ABDUCTION INVESTIGATIONS DATA: FIELD V. LAB that provides an identification and location Ron Laney, Mark Simpson Amber Schroader system for computers on networks and routes This presentation will be an interactive There are many methods when dealing with traffic across the Internet. The presenter will discussion of lessons learned in numerous mobile devices in the field and in the lab. explain some of the pros and cons for how child abduction investigations based on case This workshop will review the best tactics the protocol will help or hinder aspects of study analysis. for quick collection and analysis triage, and Internet investigations. Registration, tracking, Lone Star C2 techniques for collection and setup to start and general security aspects of IPv6 will also mobile device processing. It will also review be discussed. Repeated Thursday. MONDAY MANAGING YOUR UNIT WITHIN A common storage areas for spyware and how City View 6 HEALTHY ENVIRONMENT to spot when it is present on the device. Jean McAllister, Michael Sullivan Attendees will also review physical images WOMEN WHO MOLEST This seminar will introduce supervisors to vs. logical images, the value of both, and CHILDREN: OFFENDER effective management techniques to assure what can be gathered from each type of data TYPOLOGIES healthy longevity of exposed personnel. acquisition. Repeated Tuesday. Bill Carson This seminar is relevant to managers, Dallas A2 This workshop presents findings from 18 in any profession, who are exposed to in-depth interviews, cases from across child pornography including prosecutors, TRAVELING SEX OFFENDERS the nation, and data from other recently probation/parole, and law enforcement. This Joe Sullivan published material on women convicted training is part of the Supporting Heroes in Sex offenders who travel to sexually of molesting children. The presenter will Mental Health Foundational Training (SHIFT) exploit children in other jurisdictions have discuss past and current offender typologies wellness program funded by an OJJDP become an issue of some concern to for female child molesters, including his five Internet Crimes Against Children Task Force law enforcement and non-governmental distinct typologies that were first published in Training and Technical Assistant Grant. organizations internationally. Facilitated by 2006. Repeated Wednesday. Austin 1 the increasing ease of access for travelers Dallas A3 to the developing world, these crimes are PROSECUTOR FORUM perpetrated against some of the most Eren Price, Reynie Tinajero, vulnerable children. This presentation uses Carmen White interviews with perpetrators of sexual crimes Meet your fellow prosecutors from around against children abroad, providing insight the country, and bring your questions to an into the nature of the problem in the most informative question and answer session. popular countries, with those perpetrators This group-facilitated discussion will provide who exploit children overseas. Repeated you with options, and potential solutions, to Wednesday. your most problematic issues. Learning from Dallas B others in the field, and utilizing the experience Visit the of fellow prosecutors can often bring about UNDERSTANDING AND new perspectives. INVESTIGATING CHILD Conference Store Dallas D2 PORNOGRAPHY Steve Del Negro, Joe Laramie at the REAL TREATMENT WITH This presentation will help participants Cashier’s Desk. REAL KIDS: TREATMENT FOR gain a better understanding of what child SEXUALLY ABUSED CHILDREN pornography is, what it is not, and the (PART 2 OF 2) importance of effective investigations. This Seminar, See pg. 21 for description training will discuss the devastating and DCAC Tumbler $10 long-term impact on victims, the types of (THE) SIX PRINCIPLES OF individuals that collect child pornography, SUCCESSFUL BOARD/CEO and how it may influence their offending I STAND UP PARTNERSHIPS behaviors. This training will also provide FOR CHILDREN Jonathan Schick attendees a better understanding of how to T-shirt $10 Non-profit boards are often riddled with interview and communicate with those who political and functional challenges that collect child pornography images and videos. creep into the running of the organization, Repeated Wednesday. CACC Short sleeve conflicting with operations and inhibiting Dallas A1 T-shirt $15 effectiveness, despite everyone’s devotion to the same set of goals. This dynamic UNDERSTANDING SEX presentation shares the Six Principles that OFFENDERS (PART 2 OF 2) CACC Long sleeve can unlock an organization’s potential and Lone Star C3, See pg. 22 for description T-shirt $20 lead to successful board/CEO partnerships, uncover strategic ways to empower all WHAT INVESTIGATORS NEED TO CACC Polos $32 members of your board, and develop skills to KNOW ABOUT IPv6 effectively set achievable goals and evaluate Greg Kesner performance. This presentation will go over the basics Any 2XL shirt/polo will have an additional $3 charge. City View 3 of IPv6, the latest revision of the Internet

August 12-15, 2013 | Dallas, Texas | cacconference.org 23 CASE STUDIES & WORKSHOPS Each session is listed by time-block.

CORROBORATION IN CHILD TUESDAY, 8:00-9:30 AM ABUSE INVESTIGATIONS (PART 1 OF 2) AUGUST 13 CHILD PORNOGRAPHY Julie Kenniston, Chris Kolcharno Schedule at a glance: INVESTIGATIONS: THE Gathering details from children is an GAMECHANGER IN STOPPING important aspect of investigations. Doing this CHILD SEXUAL ABUSE in a developmentally sensitive and legally 7:00-8:00 AM Heather Steele sound manner with child victims is crucial. Continental Breakfast Myths about victims, perpetrators, child This presentation will offer techniques that pornography, and the nature of child maximize your ability to obtain corroborative Lone Star Foyer sex crimes stubbornly persist, hindering information in the case that can be used professionals in their efforts to aid child to bolster child statements and enhance victims. This presentation addresses and investigations. Repeated Wednesday. TUESDAY 8:00 AM-5:00 PM dispels those myths and demonstrates how Dallas D2 NCMEC CVIP Lab open child pornography evidence is among the City View 8 most powerful tools available to take child (A) DAUNTING TASK: A REVIEW sex predators off the streets. This workshop OF THE JERRY SANDUSKY will provide an understanding of how child INVESTIGATION* 9:30-10:00 AM pornography evidence revolutionizes the fight Dallas C, See pg. 18 for description to keep children safe from child molesters. Morning Break Repeated Wednesday. INTERROGATION: A 360° Refreshments Provided Dallas D1 PERSPECTIVE (PART 1 OF 2) Kevin Navarro, John Palmer CHILDREN’S ADVOCACY CENTER In 2010, the Federal Law Enforcement 11:30 AM -1:00 PM LEADERSHIP FORUM Training Center and the Dallas Police Lunch Lynn Davis, Gene Klein Department (DPD) initiated a joint project Join your colleagues in discussion regarding exploring interrogation methods from a On Your Own issues that CAC leaders face every day. 360° perspective. Videotaped interrogations Facilitated by two CEO’s who together have of homicide suspects were analyzed; then more than 35 years of non-profit leadership interviews of the detectives and now- 2:30-3:00 PM experience, this forum will give you the incarcerated suspects were conducted. Afternoon Break opportunity to meet with individuals who lead Those interviews explored the philosophy Refreshments Provided the nation’s children’s advocacy centers. and methodology of the detectives, and the City View 3 opinions of the suspects. This presentation will focus on principles of interpersonal 6:00 PM (A) CLOSE-UP LOOK AT dynamics, rapport building, methods by which Dallas Police Association FEMALE OFFENDERS IN a confession is elicited, and interrogation POSITIONS OF TRUST philosophy. Repeated Thursday. Hospitality Event Julie Brand Lone Star C4 Shuttle Transportation We have been slow to acknowledge that Provided on Ground Floor of some women, working in positions of trust, INTERVIEW AND INTERROGATION sexually abuse children. This workshop OF JUVENILES IN CRIMES Sheraton Hotel examines recent cases of female teachers AGAINST CHILDREN CASES found guilty of child sexual abuse, explores (PART 1 OF 2) the dynamics of these relationships, Kelly Burke, Mary Murphy, DCAC Tours and looks at ways that the gender of the James Nawoichyk Visit the DCAC Tour Booth perpetrator impacts disclosure, public According to recent research, when to sign-up! response, and sentencing. An interview with law enforcement uses traditional adult a convicted female sex offender offers unique interrogation techniques with juveniles, insight into the phenomenon of teacher- they are much more likely to obtain false Case Studies are marked adolescent sexual abuse. Participants will confessions. This workshop presents with an asterisk (*) learn proactive strategies for possible key components of IACP and OJJDP’s prevention and earlier intervention. recommended juvenile interview and Austin 3 interrogation techniques. Strategies, techniques, and cautions will be provided for analyzing behavior, developing rapport, and conducting effective interviews.

24 August 12-15, 2013 | Dallas, Texas | cacconference.org Case examples and footage of juvenile participants with a basic understanding of TRAINING TO WORK WITH interrogations will be presented to illustrate critical neurodevelopmental principles and COMMERCIALLY SEXUALLY mistakes and successful investigative discuss the impact of maltreatment on the EXPLOITED AND DOMESTICALLY techniques. Repeated Wednesday. developing brain, with a particular focus on TRAFFICKED CHILDREN Lone Star A1 young children. Further, the presenter will (PART 1 OF 2) discuss how to build an understanding of Jenia Brown, Deanna Green, Al Krok INVESTIGATING MULTI-VICTIM/ these principles into the development of play For 15 years, Girls Educational & Mentoring OFFENDER CASES therapy strategies. Services (GEMS) has served girls and young Amy Allen, Alexandra Levi, Diane Siegel Seminar women in New York City who are victims of Cases that have the potential for multiple commercial sexual exploitation (CSE) and victims and/or offenders (macro cases) are RESPONDING TO THE ACTIVE domestic trafficking (DT). In this workshop, amongst the most difficult to investigate. SHOOTING AT SANDY HOOK GEMS trainers will provide foundational When these cases also involve multiple ELEMENTARY SCHOOL* knowledge of CSE and DT of children in agencies with different jurisdictions, they can Dallas B, See pg. 19 for description regard to language, terms and definitions, require coordinated collaboration between criminal behaviors, market forces, and the federal and state partners. This workshop SEXUAL VICTIMIZATION relation of trauma bonds and Stockholm TUESDAY will provide the multi-disciplinary team OF CHILDREN: A LAW Syndrome. Participants will gain knowledge (MDT) with an understanding of how to ENFORCEMENT PERSPECTIVE of the best practices in identifying, engaging, coordinate between jurisdictions, multiple OVER 40 YEARS (PART 1 OF 2) and interviewing victims, and investigating law enforcement agencies, and NGO’s, while Kenneth Lanning DT cases. Repeated Wednesday. keeping the best interest of the victims and In the early 1970s, child sexual victimization Lone Star C2 the investigation at the forefront. was only a small part of what was then Dallas D3 commonly called “Sex Crime” investigation. 8:00-9:30 AM cont’d Over the next 40 years, relevant knowledge, on next page. INVESTIGATING PHYSICAL terminology, focus, training, and procedures ABUSE AND NEGLECT: developed. This presentation will include a RECONSTRUCTION TECHNIQUES reflective summary of investigative dynamics (PART 1 OF 2) and challenges over this time including: Dallas A2, See pg. 21 for description stranger danger, MDT response, missing and sexually exploited children, sex rings, JUST LOOKING: HOW RISKY ARE satanic ritual abuse, repressed memory, use COLLECTORS OF INDECENT of computers/Internet, sexual predators, sex IMAGES OF CHILDREN? offender registration, victimization within Lone Star B, See pg. 21 for description youth-serving organizations, compliant child victims, offender typologies, and behavioral MONEY, POWER, RELIGION, analysis. DALLAS POLICE AND SEX: THE SUSAN BROCK Lone Star C1 ASSOCIATION INVESTIGATION (PART 1 OF 2)* Matthew Long, Chris Perez SOMEBODY’S DAUGHTER: This case study will take you behind the scenes TAKING ON THE PIMPING HOSPITALITY of the investigation of Susan Brock, a female CULTURE EVENING sex offender, and the wife of an elected county Sharon Cooper, Julian Sher official. This complex investigation included In Oakland and Los Angeles, prosecutors TUESDAY, AUGUST 13, Susan’s use of technology to communicate and police revolutionize the way law PM with the victim. Further complications with enforcement deal with teenage girls on the 6:00 the case included: Brock’s adult daughter street. In Missouri, a federal prosecutor gets 1412 Griffin Street East also molesting the boy, and a year before the nation’s first ever convictions against the investigation, her husband and Mormon “Johns” under federal trafficking statutes. In The Dallas Police Association—the Church officials were aware of concerns Las Vegas, a judge sets up a special youth original, and largest police employee brought forth by the victim’s parents. The court for victims of prostitution. But how group for Dallas police officers presenters will discuss many issues with the do we fight the “pimp culture” that blames with over 3,500 active and retired case including the forensic evidence involved, the victims and turns the human traffickers members—will host a hospitality eve- the handling of the church’s involvement, and into pop icons? This workshop will share ning. Please join us for an opportunity the destruction of evidence in a Yahoo! email the lessons and insights from the updated to network and meet new friends. account. Repeated Thursday. paperback edition of Julian Sher’s latest Lone Star A4 book, “Somebody’s Daughter: The Hidden Transportation to the DPA office will Story of America’s Prostituted Children.” (THE) PROCESS OF PLAY: Lone Star A3 be provided on the Ground Floor UNDERSTANDING THE EFFECTS of the Sheraton Hotel, just past the OF TRAUMA IN WORKING WITH TACTICAL REVIEW OF MOBILE Draft Sports Bar. The office is located YOUNG CHILDREN THROUGH DATA: FIELD VS. LAB approximately two miles from the PLAY THERAPY (PART 1 OF 2) Dallas A3, See pg. 23 for description Sheraton Dallas Hotel. It is a short cab Richard Gaskill ride if you miss the bus. This presentation will help provide

August 12-15, 2013 | Dallas, Texas | cacconference.org 25 8:00-9:30 AM CONT’D WHEN A SINGLE FORENSIC and the decisions made, while always acting INTERVIEW DOESN’T FIT in the best interests of abused children. UNDERSTANDING P2P FILE Anne Lukas Miller City View 3 SHARING INVESTIGATIONS Ideally every child will engage, speak Steve Del Negro, Ron Laney clearly, and provide detailed information BURNOUT AND BACK: A CASE This workshop will provide a general regarding their experience, and this will STUDY OF WELLNESS IN ACTION understanding of peer-to-peer file sharing be accomplished within one succinct Michael Sullivan networks, commonly investigated networks, interaction. However, there are occasions Until now, losing investigators, analysts, and and the client programs that access the when the traditional model of a single forensic prosecutors to burnout was an accepted, Gnutella, eDonkey, Ares and BitTorrent interview does not fit a particular child’s but tragic, side effect of exposure to child network. Attendees will learn how files, needs. This session will describe options for pornography. In this real life case study, we specifically child pornography files, are adjusting the interview process, including an follow an investigator who nearly left the job located and shared between client programs introduction to the Multi-Session Interview due to negative effects, but found his way back accessing these networks. Attendees will (MSI) process utilized at CornerHouse. The with the help of colleagues, management, receive a general understanding of the MSI is an interview separated into multiple family, and outside support. In this case study, current P2P client programs that assist sessions, designed to meet individual needs, you will learn how to see warning signs, ICAC investigators in locating and targeting while retaining the forensic integrity of the skillfully intervene, prevent, and counteract offenders in their jurisdiction. This block will interview. the negative effects of exposure. This training also discuss related concepts, including hash Remington is part of the Supporting Heroes in Mental

TUESDAY values, geographic mapping of IP addresses, Health Foundational Training (SHIFT) wellness and the “netstat” command. (THE) WORK OF CEOP AND program funded by an OJJDP Internet Crimes Dallas A1 ITS NEW APPROACH TO THE Against Children Task Force Training and PRIORITIZATION OF CHILD SEX Technical Assistant Grant. UNDERSTANDING SEX OFFENDING Remington OFFENDERS (PART 1 OF 2) Sarah Blight Lone Star C3, See pg. 22 for description In response to the evolving threat to children CHILDREN RUNNING FROM from sexual abuse and exploitation, the Child OR RUNNING TO? THE SEX U.S. V. MICHAEL AND REBECCA Exploitation and Online Protection Centre TRAFFICKING OF MISSING STRAUSBAUGH* (CEOP) in the U.K. has modernized its form CHILDREN Daryl Bloom, Michael Corriccelli and function considerably. This workshop Angela Aufmuth, David Boatright In 2011, Canadian authorities provided a lead will share the many lessons learned on how This presentation will discuss the issue of about a child pornographic image sent from to structure the organization to meet these missing children, how they are at risk of being an address within the U.S. The information changing demands. Part of the process victims of child sex trafficking, and how the led to the Pennsylvania home of a convicted involved designing a prioritization model NCMEC’s Child Sex Trafficking Team (CSTT) can child sex offender, Michael Strausbaugh. His to enable CEOP to identify and focus its provide analytical support to law enforcement wife, Rebecca, was trying to open a home resource on tackling those offenders that in these cases. Current initiatives regarding daycare. Upon executing a search warrant of have a disproportionate impact on the children missing from care will be discussed, the residence, on scene previews revealed overall threat. This presentation charts the as well as how CSTT is working to proactively that both Michael and Rebecca were involved process of modernization and describes identify possible minor victims. Case examples in the sexual abuse of her infant niece. After the development of the target prioritization will be used to show how analysts connect the a bench trial, where Rebecca claimed her model. dots between online ads and children reported actions were the result of being a battered Lone Star A2 as missing, and how they provide technical spouse, both Michael and Rebecca were assistance to law enforcement in their efforts convicted. This case study will examine the to build cases. lessons learned from the investigation and Dallas A3 prosecution of these sexual offenders. 10:00-11:30 AM Austin 1 CORROBORATION IN CHILD (AN) ADVOCACY CENTER ABUSE INVESTIGATIONS CAPITAL CAMPAIGN AND NEW WHAT DR. SEUSS HAS TO SAY (PART 2 OF 2) BUILDING: LESSONS LEARNED ABOUT BURNOUT: COPING IN Dallas D2, See pg. 24 for description Lynn Davis, Gene Klein THE CHILD WELFARE WORLD The Dallas Children’s Advocacy Center and Dan Powers FIREARM INJURIES IN THE Project Harmony, in Omaha, Nebraska, Stress and secondary trauma can affect any PEDIATRIC POPULATION recently moved into new facilities. In this member of the team. Dr. Seuss can help us gain Reade Quinton workshop you will learn first-hand about some insight into our daily struggles, doubts, and This presentation will discuss firearm injuries these CAC leaders’ experiences, struggles, reasons we stay in this job. This workshop will in children, including wound characteristics, and successes in raising millions of dollars, discuss how the choices you make can change scene investigation, and scenarios involving and in constructing state-of-the-art facilities the direction of your day and help you survive “in children and firearms. Additional topics in an economic downturn. You will also hear our world.” You will discover how lucky you are include the limitations of the autopsy in about the importance of relationship building, to do what you do. Based on the wisdom of Dr. assessment of these wounds, and challenges the art of negotiation, and the team effort Seuss, participants will be encouraged to look at in classifying the manner of death. needed. The discussion will address the themselves, and why they do “this” for a living Austin 2 many unanticipated changes encountered, and, most of all, learn to laugh at it all.

Austin 2

26 August 12-15, 2013 | Dallas, Texas | cacconference.org INFORMAL AND NON- or forgotten. Missing Person, Child Homicide, presentation will discuss proven techniques HIERARCHAL INSTITUTIONS AS Serial Murder, and found remains cases for doing this and will show actual interviews HAVENS FOR PREDATORS will be illustrated with a contemporary where the specific method of Prepare and Roger Canaff investigative focus. Predict, when showing child pornography to Not all institutions are formal and hierarchal Austin 3 minor victims, is necessary. with headquarters, charters, and facilities. Some Dallas D3 organizations simply have cultural norms and LOOKING FOR LOVE IN constructs like “marriage and family,” “male ALL THE WRONG PLACES* (THE) PROCESS OF PLAY: bonding,” and “discipline builds character.” Amy Derrick, Carmen White UNDERSTANDING THE EFFECTS These informal institutions can promote abuse This case study will examine the investigation OF TRAUMA IN WORKING WITH and protect predators. Law enforcement and and prosecution of Thomas Eppelsheimer, YOUNG CHILDREN THROUGH allied professionals must understand these aka Tommy Gunn. He was the promotions PLAY THERAPY (PART 2 OF 2) informal and powerful cultural institutions, in agent for Club Darkside, a teen club also Seminar, See pg. 25 for description order to address abuse that occurs as a result. purporting to be a religious institution. Tommy Repeated from 3:00-4:30pm. Gunn would routinely distribute narcotics to SEXUAL VICTIMIZATION

Dallas D1 underage girls, and he was subsequently OF CHILDREN: A LAW TUESDAY convicted of raping two girls at the club. This ENFORCEMENT PERSPECTIVE INTERDICTION FOR THE case study will focus on how prosecutors OVER 40 YEARS (PART 2 OF 2) PROTECTION OF CHILDREN used the Defendant’s cell phone and the calls Lone Star C1, See pg. 25 for description (IPC): A PROACTIVE APPROACH he made from jail to convince a judge to look TO COMBATING CHILD beyond the mistakes made by teenagers SILENT NO MORE: VICTIM #1’S EXPLOITATION and at the choices made by the Defendant. FIGHT FOR JUSTICE AGAINST Cody Mitchell, Derek Prestridge Repeated Wednesday. JERRY SANDUSKY* The sad truth is that law enforcement Lone Star A2 Dallas C, See pg. 22 for description agencies are not doing all that they can to search for missing or exploited children. The MONEY, POWER, RELIGION, SUSAN POWELL WAS REPORTED presenters will discuss how your agency can AND SEX: THE SUSAN BROCK MISSING, THEN HER CHILDREN use uniformed officers to combat all types of INVESTIGATION (PART 2 OF 2)* WERE MURDERED: SHOULD WE child victimization. The presenters will share Lone Star A4, See pg. 25 for description HAVE SEEN THIS COMING?* techniques that can be coupled with routine Rich Anderson police duties, greatly increasing the likelihood ONLINE PROTECTIONS On February 5, 2012, in Graham, Washington, of identifying victimized children and their FOR CRIMINAL JUSTICE Josh Powell attacked his 2 young sons, Charlie offenders. The workshop will include PROFESSIONALS and Braden, during a CPS supervised visitation examples of cases using these interdiction Joe Laramie and then set his house on fire, killing himself techniques. Repeated Wednesday. With the ever-increasing use of social media and the boys. Powell was a suspect in the Austin 1 in our personal and professional lives, it is disappearance of his wife, Susan Powell, important to know the issues associated since she went missing in 2009. When his INTERVIEW AND INTERROGATION with these activities. Criminal justice father, with whom Powell and his sons were OF JUVENILES IN CRIMES professionals, and those who testify in court living, was arrested for possession of child AGAINST CHILDREN CASES and/or work for a government agency, are pornography in 2011, the boys were removed (PART 2 OF 2) subject to a variety of disclosures about their from the home. This case study will discuss Lone Star A1, See pg. 24 for description online use. This workshop will discuss the the issues involved in a multi-jurisdictional dangers involving the blurred lines between and multi-disciplinary investigation and the INTERROGATION: A 360° personal and professional online use. Tips challenges presented by the competing PERSPECTIVE (PART 2 OF 2) and strategies on how to avoid professional interests of criminal investigations and the Lone Star C4, See pg. 24 for description embarrassment, discipline issues, or personal child welfare system. Repeated Wednesday or family dangers with online postings will be and Thursday. INTERVIEWING SEX OFFENDERS: covered. Repeated Wednesday. Dallas B A BEHAVIORAL ANALYSIS Dallas A1 FRAMEWORK TRAINING TO WORK WITH Lone Star B, See pg. 19 for description PRESENTING EVIDENCE IN COMMERCIALLY SEXUALLY FORENSIC INTERVIEWS: USING EXPLOITED AND DOMESTICALLY INVESTIGATING PHYSICAL THE PREPARE AND PREDICT TRAFFICKED CHILDREN ABUSE AND NEGLECT: METHOD (PART 2 OF 2) RECONSTRUCTION TECHNIQUES Amy Allen, Alexandra Levi, Diane Siegel Lone Star C2, See pg. 25 for description (PART 2 OF 2) Forensic interviewers have presented certain Dallas A2, See pg. 21 for description forms of investigative evidence to victims in TRICKS OF THE TRADE: their interviews for years. However, based OFFENDERS, PERPETRATORS, LONG-TERM MISSING AND COLD on the number of cases that involve online AND VICTIMS IN SEX CASE INVESTIGATIONS and digital child exploitation, there has been TRAFFICKING Brian Killacky a growing need for investigators to present Lone Star A3, See pg. 19 for description This workshop will discuss the use of current evidence to children involved in these cases investigative and forensic principles for to facilitate identification and learn details 10:00-11:30 AM cont’d cases that have become closed, suspended, of the exploitation and possible abuse. This on next page.

August 12-15, 2013 | Dallas, Texas | cacconference.org 27 10:00-11:30 AM CONT’D or willing to win custody at all costs. As a will provide an overview of the basics of result, the potential for allegations to be Discourse Analysis, a lexical and syntactical UNDERSTANDING SEX pre-judged as non-credible must always be approach to analyzing statements. Using OFFENDERS (PART 2 OF 2) considered in order to prevent a child’s return clear examples, Dr. Tanner will explain how Lone Star C3, See pg. 22 for description to the custody of the offender. This workshop a respondent’s shifts in words and grammar will discuss how to distinguish between can point interviewers to “hot spots” in a credible and non-credible allegations of statement that need to be probed. You will sexual abuse in custody cases so that they never listen to a conversation or interview can be successfully investigated. Repeated the same way again. Repeated Wednesday. 1:00-2:30 PM Thursday. Lone Star B (THE) ACTUAL NANNY 911* Dallas D2 Dallas D3, See pg. 18 for description DYNAMICS OF CHILD SEX COMBATING SEXUAL TRAFFICKING: TOTAL SYSTEM AFTER THE FIRST 48: FROM EXPLOITATION WITH A RESPONSE INDICTMENT TO TRIAL MULTI-AGENCY RESPONSE Byron Fassett, Ron Laney Lone Star A2, See pg. 20 for description Hania Cardenas, Michelle Guymon, Participants will be provided with information Jessica Midkiff on the dynamics of child sex trafficking (THE) BEST KEPT SECRET: Over the past several years, Los Angeles and characteristics and profile of both MOTHER-DAUGHTER SEXUAL County has seen a significant increase in the victim and the offender/trafficker. cases of domestic sex trafficking of youth. This presentation will define the high risk TUESDAY ABUSE (PART 1 OF 2) Julie Brand In an effort to respond to this issue, in 2012 victim and demonstrate the correlation and This workshop describes the complex the County implemented a multi-agency commonalities between the chronic runaway, mother-daughter incestuous relationship— system response for the identification and repeat victims of sexual abuse, and the child the subtle, yet intentional, violations of treatment of sexually trafficked youth within victimized through sex trafficking. With the normal mother-child boundaries and the juvenile justice system. The goal was information provided, participants will be the psychological manipulations used to to implement a coordinated multi-agency able to develop and implement investigative silence victims. Attendees will learn ways protocol that provides prevention outreach, strategies, techniques, and protocols to to include mothers as potential perpetrators comprehensive treatment, and placement successfully identify high risk victims, in prevention programs and in sexual services in lieu of detention. This workshop identify past victimization, and prevent or abuse investigations. Six key therapeutic will provide an overview of the response reduce their high risk behavior through a issues for recovery will be discussed. The system from the perspective of probation, collaborative team approach. program concludes with a discussion of both the courts, and survivor advocates. The Lone Star A1 the shared dynamics and the differences workshop will address specific case studies, between mother-daughter and mother-son barriers, and successes of the program. FIVE B’S OF CHILD PHYSICAL incest. The presenter is both an experienced Lone Star C2 ABUSE: BRUISES, BURNS, counselor and a resilient survivor of maternal BONES, BELLIES, AND BRAINS sexual abuse. Repeated Wednesday. CONFESSIONS WITHOUT (PART 1 OF 2) Dallas C MIRANDA: UNDERSTANDING Matthew Cox HOW CONFESSION LAWS REALLY This presentation will review the variety BROKEN BONES: NOT JUST WORK (PART 1 OF 2) of injuries seen in cases of possible child STICKS AND STONES John Bradley abuse. The discussion will be case based and Reena Isaac Confessions are a critical part of a successful include examples of abusive and non-abusive Skeletal fractures are very often seen in child abuse prosecution. Too many times, injuries. The lecture will be geared for CPS child abuse. This presentation will provide an however, investigators fail to get a confession, workers, law enforcement investigators, and overview of the anatomical and biochemical or make a mistake during the process. This attorneys to learn the basic aspects of child features of bones. It will also provide the basis presentation explains the Fifth Amendment physical abuse. for potential biomechanics involved in skeletal Privilege Against Self-Incrimination and Lone Star C3 injuries, highlight various types of accidental other laws that must be followed to obtain and non-accidental pediatric fractures, and an admissible confession. The presentation GETTING THE RIGHT ONE: A provide case scenarios of pediatric skeletal focuses on the many circumstances under SERIAL ABUSER IS CONVICTED injuries. Repeated Thursday. which an investigator can obtain a confession OF MURDER (PART 1 OF 2)* Austin 2 without ever invoking the defendant’s rights Judith Beechler, Jeff Case, under Miranda v. . In addition, the Staley Heatley, Nancy Nemer (A) CHILD’S VOICE SILENCED: presentation includes a discussion of pretext This case study will examine the investigation SEXUAL ABUSE ALLEGATIONS IN phone calls to the defendant and includes and subsequent conviction at trial of Tommy CHILD CUSTODY CASES numerous recorded examples. Repeated Castro, a serial abuser of women and children, Autumn Fox Wednesday. for murdering his girlfriend’s five year-old An allegation of child sexual abuse, within Lone Star C1 daughter. You will hear how prosecutors the context of a child custody case, poses overcame the many obstacles they faced, unique challenges and always raises red DECEPTION DETECTION including the fact that the abused girlfriend flags for law enforcement, prosecutors, Jim Tanner initially gave a false confession to having CPS, and other child abuse professionals. Improve your interview skills. Learn how to committed the crime herself. The presenters Too often, the parent reporting the abuse tell when someone is editing something out will discuss how they educated the jurors is perceived as histrionic, manipulative, of a written or verbal statement. This session on domestic violence, overcame the false

28 August 12-15, 2013 | Dallas, Texas | cacconference.org confession, used the testimony of Castro’s jurors in cases of child abuse. Cases in which leverage new, but available, technologies prior victims, and obtained a life sentence for the outcome largely relies on the assessment like PhotoDNA, smart hashing, visual similar the real killer. Repeated Wednesday. of the child’s credibility versus the credibility searching, and automated processes. This Lone Star A4 of the accused will be emphasized. methodology will allow agencies to quickly Dallas A2 and efficiently manage and review large image INTERNATIONAL and video seizures. This allows agencies to COLLABORATION TO RESCUE A PREPARING CHILDREN TO adopt a “No Child Left Behind” approach CHILD AND CLOSE A CHILD SEX TESTIFY IN COURT to investigations, increasing the ability to OFFENDER NETWORK* Stephanie Smith identify and rescue more child victims and Lone Star A3, See pg. 19 for description The demands of the legal process create apprehend more serious offenders. Project special challenges for the children who must VIC started at the 2012 ICAC conference. (THE) MEDICAL EXAMINER’S testify in court. This workshop will consider The project participants include ICAC’s and PERSPECTIVE ON SUDDEN these challenges from the child’s perspective federal agencies working together with non- UNEXPLAINED INFANT DEATH and provide tips for practitioners on how to profits and private partnerships. INVESTIGATIONS help anticipate the particular stressors in Austin 1

Reade Quinton each case and what to do to help children TUESDAY This workshop focuses on the Sudden deal with these factors so that she/he can SUPPORTING EMPLOYEE Unexplained Infant Death Investigation focus. Attention will also be given to helping RESILIENCE: A PANEL (SUIDI) “Top 25” produced by the Centers the child “debrief” after trial testimony and DISCUSSION for Disease Control (CDC). The “Top 25” prepare for the sentencing hearing. Ben Butler, Lanae Holmes, represents the top 25 most important pieces Remington Kenneth Logan of information that the medical examiner This session will explore various ways to needs in order to facilitate an appropriate PSYCHOLOGICAL support employees who have exposure to death investigation and interpret autopsy MALTREATMENT AND online child abuse images in the course of findings (or lack thereof). The discussion MANIPULATION: CASE their work. Part of the discussion will focus will include common autopsy findings in EXAMPLES FOR MDT CHILD on the publication recently compiled by “SIDS” or “SUIDI” cases, and emphasize ABUSE TEAMS The Technology Coalition: The Employee the importance of scene investigation, doll Sharon Cooper Resilience Guidebook for Handling Child reenactment, and communication between This presentation will provide definitions of Sexual Abuse Images. It presents a set of various investigating agencies and the psychological maltreatment, discuss several practices and guidelines around content medical examiner. case examples of victim manipulation in child handling procedures and other practices that Dallas D1 abuse, and review the concept of vulnerable will help employees who are on the frontlines victims. Fraud and/or extortion have not been in the fight against online child sexual (A) NON-CONFRONTATIONAL recognized in the past as mitigating factors in exploitation. Panelists will include: Ben Butler, APPROACH TO INTERVIEWING child abuse. However, further consideration GoDaddy, Lanae Holmes, NCMEC, and Kenny AND INTERROGATING CHILD is indicated as will be demonstrated in these Logan, PayPal. ABUSE SUSPECTS (PART 1 OF 2) cases. Austin 3 Dennis Nebrich Dallas B This presentation will teach the Wicklander- THERAPEUTIC RESPONSE: Zulawski Non-Confrontational Interview and (A) SLAP ON THE WRIST WON’T DESIGNING PLAY THERAPY Interrogation Method. Instruction, specific MAKE HIM STOP: EFFECTIVE AROUND A NEUROSCIENTIFIC to child abuse investigations, will include TECHNIQUES TO DETER DEMAND APPROACH (PART 1 OF 2) proven techniques to overcome resistance, Linda Smith, Ken Penrod Richard Gaskill offer rationalizations, handle denials, detect Research has shown that the sex trafficking This workshop will discuss how neuroscience deception, and evaluate truthfulness. industry thrives in cultures that sympathize has greatly expanded play therapists’ Participants will learn to assess verbal and with Johns. This presentation will focus on knowledge in the past two decades. The non-verbal behavior and become more developing techniques to more effectively presentation will include how neuroscience effective at obtaining admissions. Using a deter demand within the commercial sex principles help modify treatment techniques structured, non-confrontational approach, industry. The presenters will explore the to be more neurobiologically targeted, and an investigator is often able to obtain a various types of buyers (aka Johns), their developmentally sensitive, to affected brain confession without the suspect ever making profiles and belief systems, and their regions. It will also include how play therapists a denial or protesting his innocence. In traumatic impact on child victims. The are able to assess functional disorganization, addition, the resulting confession often presenters will also provide instruction on and prescribe treatments affecting those includes information not revealed during the how to set up successful John stings, review regions, that will greatly benefit emotionally investigation. Repeated Wednesday. operations and Internet tactics. Repeated troubled children. Lone Star C4 Wednesday. Seminar Dallas A3 OPENING STATEMENTS AND CLOSING ARGUMENTS IN CASES STREAMLINING FORENSIC AND 1:00-2:30 PM cont’d OF CHILD ABUSE INVESTIGATIVE WORKFLOWS on next page. Victor Vieth (PROJECT VIC) This workshop will cover the art of developing Richard Brown, James Cole effective themes and theories to present to This proof of concept project seeks to

August 12-15, 2013 | Dallas, Texas | cacconference.org 29 1:00-2:30 PM CONT’D will discuss how new technologies, such as INFORMAL AND NON- on-scene preview and officer safety, should HIERARCHAL INSTITUTIONS AS UNMASKING THE SEXUAL drive a paradigm shift toward early action. HAVENS FOR PREDATORS OFFENDER (PART 1 OF 2) Additionally, the presentation will discuss Dallas D1, See pg. 27 for description Veronique Valliere the countervailing interests of legal issues Sexual offenders present difficult and and danger to the community in determining (THE) MDT APPROACH TO THE complicated issues for investigation, when to arrest and when to wait. INVESTIGATION, ASSESSMENT, treatment, and management. Denial, victim Austin 1 AND INTERVENTION OF blaming, aggression, and blatant, chronic JUVENILE SEX OFFENDERS deception are inherent to interactions CONFESSIONS WITHOUT Dan Powers with sexual offenders. Most importantly, MIRANDA: UNDERSTANDING This workshop will explore the dynamics sexual offenders constantly re-enact HOW CONFESSION LAWS REALLY and challenges juvenile sex offenders pose the victim-offender relationship in many WORK (PART 2 OF 2) to the multi-disciplinary team. We will review contexts, including the relationship with the Lone Star C1, See pg. 28 for description types of juvenile sex offenders and will investigator. This training is designed to help suggest a consistent approach to dealing professionals develop an understanding of DEMONSTRATION AND with them from investigation through on- the sexual offense dynamics and deviant DISCUSSION: NCMEC’S NEW going treatment. It will emphasize the MDT arousal patterns, and the manipulations and XML SCHEMA approach as a solution to solving the unique techniques of the offender. Michelle Collins, Shantal Poovala problems these cases bring to the system. The This session will feature a demonstration of different roles of the professionals involved TUESDAY Dallas A1 how to implement the new XML standard for in these types of cases will be examined as USING SANITIZED IMAGES NCMEC’s CyberTipline. This will be especially well as suggestions on how a standardized IN CHILD PORNOGRAPHY useful for operational and engineering approach will benefit the professionals, the INVESTIGATIONS participants. Panelists will include: Michelle offenders, and the family. City View 3, See pg. 19 for description Collins (NCMEC), Shantal Poovala (Google). Dallas D2 City View 3 (A) NON-CONFRONTATIONAL FIVE B’S OF CHILD PHYSICAL APPROACH TO INTERVIEWING ABUSE: BRUISES, BURNS, AND INTERROGATING CHILD 3:00-4:30 PM BONES, BELLIES, AND BRAINS ABUSE SUSPECTS (PART 2 OF 2) (THE) BEST KEPT SECRET: (PART 2 OF 2) Lone Star C4, See pg. 29 for description MOTHER-DAUGHTER SEXUAL Lone Star C3, See pg. 28 for description ABUSE (PART 2 OF 2) ONCE THE SHUTTER SNAPS: Dallas C, See pg. 28 for description GETTING THE RIGHT ONE: A THE CONTINUED VICTIMIZATION SERIAL ABUSER IS CONVICTED FROM CHILD SEX ABUSE IMAGES BREAKING MYTHS AND OF MURDER (PART 2 OF 2)* Jennifer Lee PRESENTING FACTS ABOUT Lone Star A4, See pg. 28 for description This workshop will discuss the production of CHILD ABDUCTION AND images and video files in child sexual abuse EXPLOITATION HUMAN TRAFFICKING: A GUIDE cases and highlight ways professionals David Boatright, Shannon Posern FOR LAW ENFORCEMENT working in all areas of the child abuse field Have you heard that all online predators Ron Laney, Jim Walters can help locate these victims. Based on data are old men hiding in basements? What This workshop will provide law enforcement from NCMEC’s Child Victim Identification about the one that only strangers abduct with the information necessary to properly Program, information regarding risk children? If you work in crime prevention and understand, recognize, and investigate factors for victimization, case examples victim advocacy, I am sure you hear many cases involving human trafficking and child demonstrating how victims are identified, myths from your audiences in community exploitation. and the continued re-victimization some presentations. In this workshop, we will help Lone Star A1 of these children face will be discussed. presenters dispel common myths about child Participants will learn about NCMEC’s many abduction and exploitation and incorporate JURY SELECTION IN CASES OF resources available for child sexual abuse current statistics. We will also discuss CHILD ABUSE cases including Look Familiar Reports and methods for teaching prevention to parents, Stephanie Smith CVIP’s Victim Identification Lab. Repeated children, teens, and communities. Repeated In this workshop, prosecutors will learn Wednesday. Thursday. effective use of voir dire, and other tools, in Lone Star A3 Dallas A3 selecting jurors in cases of child sexual or physical abuse. SEXUALLY MOTIVATED CHILD PORNOGRAPHY Remington ABDUCTION AND MURDER INVESTIGATIONS: TIME Joe Sullivan FOR A CHANGE! KEEP IT DOWN, I’M TRYING While comparatively rare in relation to the Daryl Bloom, Michael Corricelli TO SLEEP* other ways in which children are sexually When law enforcement began investigating Dallas D3, See pg. 22 for description exploited, the sexually motivated abduction and prosecuting Internet facilitated child and murder of children is an area lacking exploitation offenses, officers generally did research insights. This presentation explores not arrest the offenders at the time of the the motivations behind the sexually motivated search warrant or interview. This presentation abduction and murder of children. Using

30 August 12-15, 2013 | Dallas, Texas | cacconference.org several case studies, the issues are explored that bold approach? Michelle Guymon will probing insightful discussion about the through the accounts and experiences of the discuss the LA County approach and Julian commercial sexual exploitation of children perpetrators, providing a unique insight into Sher, author of “Somebody’s Daughter,” will (CSEC). After the viewing, audience members this crime. Repeated Wednesday. explain their work in a national perspective. will have the opportunity to ask questions and Lone Star B Lone Star A2 react to themes raised in the film. Repeated Wednesday. SMOKE AND MIRRORS: TECHNOLOGY DEVELOPMENTS: Lone Star C2 SUSPECTING MEDICAL A PANEL DISCUSSION CHILD ABUSE John Brzozowski, Chris Roosenraad VICTIM IMPACT OF ADVERSE Lisa Creamer, Reena Isaac This session, presented by the Technology CHILDHOOD EXPERIENCES: Medical Child Abuse (formerly known as Coalition, will include a review of current CAUSE OR EFFECT OF SEXUAL Munchausen syndrome by proxy) is a form of and future trends in Internet technology EXPLOITATION? child abuse that may present in many forms, with a focus on technical issues that Sharon Cooper ranging in severity and extent. The condition can have an impact on Internet criminal This presentation will discuss the effect of involves a full spectrum of presentations; investigations. Topics to include: IPv6, Carrier adverse childhood experiences as cited by however, at the core, each presentation Grade NAT (CGN), virtual currency, and the the Adverse Childhood Experiences (ACE) TUESDAY involves a child who is receiving unnecessary, underground economy. Presentation will be Study. In particular, participants will discuss or potentially harmful, medical treatment geared towards a non-technical audience; ACE scores as a factor in child sexual at the instigation of the caretaker. In these all invited. Panelists will include: Chris exploitation or as a result. In either case, the events, the medical system is the instrument Roosenraad, Time Warner Cable and John long-term health impact should be described that is being manipulated to inflict harm on Brzozowski, Comcast. in every court testimony regarding the victim a child. This presentation aims to create a Austin 3 impact of child sexual exploitation. greater understanding of this type of abuse Dallas B by discussing three recent case studies THERAPEUTIC RESPONSE: and subsequent medical assessments, and DESIGNING PLAY THERAPY WHAT’S THE PASTOR DOING documenting the diagnosis of this condition. AROUND A NEUROSCIENTIFIC HERE? TEN POTENTIAL ROLES Repeated Thursday. APPROACH (PART 2 OF 2) FOR A THEOLOGIAN ON THE MDT Austin 2 Seminar, See pg. 29 for description Victor Vieth This workshop discusses potential roles SURVIVING THE STREETS: UNMASKING THE SEXUAL for clergy on the MDT. These roles include: HOW LOS ANGELES TURNED OFFENDER (PART 2 OF 2) consulting with investigators and prosecutors THE TABLES ON CHILD SEX Dallas A1, See pg. 30 for description on cases of institutional abuse, working with TRAFFICKING mental health professionals in addressing Michelle Guymon, Julian Sher VERY YOUNG GIRLS: GEMS spiritual injuries, serving as community Across America, young girls forced into DOCUMENTARY SCREENING leaders in the prevention of child abuse, and prostitution are often arrested and jailed as WITH Q & A addressing the vicarious trauma of other criminals. But in Los Angeles, the County Jenia Brown, Deanna Green, Al Krok MDT members. Probation Department worked with police, Girls Educational and Mentoring Services Dallas A2 prosecutors, and the courts to protect sex (GEMS) will screen their documentary trafficking victims, not punish them. How did “Very Young Girls.” The critically acclaimed they pull it off? What can other cities learn from documentary is used as a backdrop for

VISIT THE NCMEC CHILD children. Within this interactive lab, Located in City View 8 computers will be available for partici- during any of the following times: VICTIM IDENTIFICATION LAB pants to access background identifiers and Many children have been rescued from audio clues in hopes that these items may Monday 10:00-5:00 further sexual abuse because a clue in the be recognizable or familiar to Lab partici- Tuesday 8:00-5:00 background of child pornography images pants. Accompanying each sanitized picture Wednesday 8:00-5:00 led to the location of their abuse. Partnering will be a real-time message thread where with the Internet Crimes Against Children participants can post their comments and Thursday 8:00-12:00 Task Forces and federal law enforcement suggestions. You may have the piece of the agencies, the National Center for Missing puzzle that could lead to the rescue of a & Exploited Children is proud to bring the child victim. “Victim Identification Lab” back to the Dallas Crimes Against Children Conference NOTE: All registered conference attendees for a seventh year. NCMEC will offer all are invited to participate in this Lab; however registered participants at this year’s due to the sensitivity of this issue, please Conference a glimpse into this powerful make sure to wear your conference badge law enforcement tool designed to rescue and bring proof of identity to gain entry.

August 12-15, 2013 | Dallas, Texas | cacconference.org 31 CASE STUDIES & WORKSHOPS Each session is listed by time-block.

DIGITAL PHOTO FORENSICS: WEDNESDAY, 8:00-9:30 AM MORE THAN MEETS THE EYE Neal Krawetz, Allan Smith AUGUST 14 (THE) BEST KEPT SECRET: Digital cameras are everywhere. High-quality Schedule at a glance: MOTHER-DAUGHTER SEXUAL photo-editing software is common, and free ABUSE (PART 1 OF 2) online services make it trivial to distribute Lone Star A1, See pg. 28 for description modified images. This creates a problem: 7:00-8:00 AM how can you tell if a picture is showing Continental Breakfast BEYOND THE IMAGE: VICTIM something real? Is it computer generated or IDENTIFICATION (PART 1 OF 2) modified? Being able to distinguish fact from Lone Star Foyer Richard Brown, James Cole fiction in a systematic way is essential. This This presentation will cover the techniques workshop covers some common and not- currently used to analyze the images, videos, so-common forensic methods for extracting 8:00 AM-5:00 PM and audio material depicting child sexual information from digital pictures. You will not NCMEC CVIP Lab open exploitation. Learn how law enforcement only be able to distinguish real images from City View 8 tries to see beyond the victim and identify computer generated ones, but also identify the clues that can focus the investigation how they were created. Repeated Thursday. and lead to the rescue of child victims. Lone Star C1 9:30-10:00 AM Learn techniques to enhance images and Morning Break dig deeper into the materials that may (AN) EYE TOWARDS optimize law enforcement’s practices. CONVICTION: FROM DISPATCH

WEDNESDAY Refreshments Provided This presentation will use actual cases to TO VERDICT highlight the skill set. D. Andrew Wilson Dallas A1 From the time of dispatch, until a verdict is 11:30 AM -1:00 PM announced in court, law enforcement officers Lunch CHILD PORNOGRAPHY should keep an eye on the goal of obtaining On Your Own INVESTIGATIONS: THE a successful conviction at trial. This session GAMECHANGER IN STOPPING will provide tips on how law enforcement CHILD SEXUAL ABUSE officers can continue to improve their case 2:30-3:00 PM Remington, See pg. 24 for description all the way through trial. The lecture will Afternoon Break discuss common tactics used to obtain Refreshments Provided CONFESSIONS WITHOUT incriminating evidence against suspects, MIRANDA: UNDERSTANDING how law enforcement officers can prepare HOW CONFESSION LAWS themselves and their cases for trial, how 7:00 PM REALLY WORK (PART 1 OF 2) law enforcement officers should deal with th Dallas A3, See pg. 28 for description non-responsive, non-cooperative, or difficult Silver Spur Supper: A 25 prosecutors, and tips to make the law Anniversary Celebration CREATING A TRAUMA enforcement officers’ experience on the Lone Star Ballroom INFORMED MDT stand less painful. This session is for both Karen Hangartner uniformed street officers and detectives. The Children’s Advocacy Center (CAC) model Repeated Thursday. 7:45 PM was born from a desire to create a system Austin 3 Drawing for iPad response to child sexual abuse that would For those who attended an not inflict additional trauma on the child and HANDS ARE NOT FOR HITTING: family. Since that time, research on child THE IMPACT OF DOMESTIC Exhibitor Demonstration trauma has increased exponentially. We VIOLENCE ON CHILDREN (Must be present to win) will discuss this research and explore the Jan Langbein effects of trauma on Multidisciplinary Team Domestic violence is a devastating social (MDT) professionals and how trauma might problem that impacts all segments of DCAC Tours be affecting team functioning. Additionally, society. Although awareness regarding the Visit the DCAC Tour Booth we will discuss ways to use this information effects of family violence is increasing, to sign-up! to examine current processes and create a the understanding of the ramifications of more trauma informed MDT. domestic violence often focuses on the City View 3 primary victims. Studies indicate that millions Case Studies are marked of children witness the abuse of a parent or with an asterisk ( ) caregiver each year. Research also shows * that domestic violence may be the number

32 August 12-15, 2013 | Dallas, Texas | cacconference.org one indicator of child abuse and neglect. This Offender Targeting Center, can assist law STRATEGIES FOR FORENSIC workshop explores the effects witnessing enforcement with investigations involving INTERVIEWS WITH domestic violence has on children. Repeated non-compliant sex offenders. ADOLESCENTS (PART 1 OF 2) from 3:00-4:30. Dallas D3 Anne Lukas Miller Austin 1 Conducting forensic interviews with (A) NON-CONFRONTATIONAL adolescents presents opportunities and HUMAN TRAFFICKING: A APPROACH TO INTERVIEWING challenges not found with younger children. SURVIVOR’S PERSPECTIVE AND INTERROGATING CHILD Adolescents are neither children nor adults, Holly Austin Smith ABUSE SUSPECTS (PART 1 OF 2) but often a confusing combination of both. The presenter of this workshop is a survivor Lone Star C4, See pg. 29 for description Advances in brain research provide insight of both child sexual abuse and sex trafficking. into how brain development and hormones She will discuss the relationship between the (AN) OVERVIEW OF RUNAWAY impact adolescent behavior, emotions, and two forms of victimization, the mindset of a AND HOMELESS YOUTH (RHY) decision-making. Combining basic principles “willing victim,” and the complex reasons for PROGRAMS of adolescent brain development with them staying with their traffickers. Repeated TC Cassidy, John Robertson practical experience yields unique strategies from 1:00-2:30. This workshop will consist of an overview and techniques for conducting forensic Lone Star C3 of the RHY programs and services provided interviews with adolescents. This session by each program type (Street Outreach, will provide strategies for meeting the needs INSTITUTIONAL ABUSE Basic Center, Transitional Living/Maternity of adolescents while addressing the unique AND PERSONS WITH Group Homes). The workshop will provide challenges forensic interviewers may face DISABILITIES: STRATEGIES an overview of the FYSB Network of Support as they work to gather details in a respectful FOR INVESTIGATORS AND system with a focus on National Safe Place’s manner. PROSECUTORS Runaway and Homeless Youth Training Dallas D1 WEDNESDAY Roger Canaff, Mary Wambach and Technical Assistance Center, National Study after study confirms the terrible reality Runaway Safeline, and the Runaway and TOOLS IN THE TOOLBOX: that children with physical, cognitive, and/ Homeless Youth Management Information FIGHTING CHILD SEXUAL ABUSE or emotional/psychological disabilities are System. Participants will gain knowledge IMAGES ONLINE abused and neglected at far greater rates than of services available, how to locate and Michelle Collins children without such disabilities. This abuse access services for all RHY, and will have the NCMEC’s efforts, fighting online child sexual happens within homes and in the community, opportunity to learn about current evidence- abuse, go well beyond the CyberTipline. but can be especially rampant in institutions based and promising practices currently Working globally with industry and law meant to house, teach, and nurture disabled being utilized with survivors of human enforcement to protect child victims, NCMEC children. This presentation will present how trafficking. encourages a multi-faceted approach to law enforcement and allied professionals Dallas A2 attack this problem. Attend this workshop can best react to abuse when it occurs in and learn about the many tools used around these settings. This includes communicating REJECTION, RAGE AND the world to reduce the amount of child with abused children, witnesses, and their REVENGE: THE STATE OF TEXAS sexual abuse material online. Highlighted families, and also interacting effectively with V. JOSE EDUARDO ARREDONDO* topics will include PhotoDNA, blocking and institutional employees and leaders during Isidro Alaniz, Marisela Jacaman filtering, industry reporting, and the policy an investigation. Repeated from 3:00-4:30. The prosecution of Jose Eduardo “Lalo” implications of each. Repeated from 3:00- Dallas D2 Arredondo, a teenager who kidnapped, 4:30. sexually abused, and murdered Lone Star A4 LOOKING BACK TO SEE THE baby Katherine Cardenas, required a FUTURE: LESSONS FROM 25 multidisciplinary and strategic combination TRAINING TO WORK WITH YEARS OF CHILD PROTECTION of forensic investigation, visual presentation, COMMERCIALLY SEXUALLY (PART 1 OF 2) and cutting-edge application of the law. This EXPLOITED AND DOMESTICALLY Rita Farrell, Michael Johnson, Amy case study will provide a lesson for police TRAFFICKED CHILDREN Russell, Stephanie Smith, Victor Vieth and prosecutors, starting with effective (PART 1 OF 2) This workshop reviews the past 25 years visual presentation during the opening Lone Star C2, See pg. 25 for description of child protection in the United States, statement, branching into the use of DNA noting the progress that has been made evidence, surveillance videos, and telephone UNDERSTANDING CHILD and the challenges still to overcome. The recordings to outline the State’s proof. TORTURE presenters offer a “sneak peek” at the next Finally, the review of the sentencing phase Lone Star B, See pg. 22 for description 25 years offering concrete suggestions to be includes special considerations for obtaining addressed by MDTs in that time. maximum punishment of juvenile capital 8:00-9:30 AM cont’d Lone Star A2 offenders. Repeated Thursday. on next page. Lone Star A3 NON-COMPLIANT SEX OFFENDERS: HOW THE USMS (A) SLAP ON THE WRIST WON’T TH ANNIVERSARY CAN HELP STATE AND LOCAL MAKE HIM STOP: EFFECTIVE CELEBRATION LAW ENFORCEMENT TECHNIQUES TO DETER 25 Lance Eastwood, Mike Wagner DEMAND Wednesday, This workshop provides an overview of how Austin 2, See pg. 29 for description the U.S. Marshals, along with its National Sex 7 PM - Midnight

August 12-15, 2013 | Dallas, Texas | cacconference.org 33 8:00-9:30 AM CONT’D of being deprived of water as a cruel form 10:00-11:30 AM of punishment. This case study will detail the successful prosecution of his abuser, which UNDERSTANDING ACCIDENTAL OR INTENTIONAL? resulted from the hard work of the multi- PERPETRATORS OF SEXUAL INVESTIGATOR, YOU FIGURE IT disciplinary team that investigated this case. CRIMES AGAINST CHILDREN OUT The presenters will discuss key points for (PART 1 OF 2) Ron Laney, Jim Sears the successful investigation and prosecution Joe Sullivan This workshop will show you how to look of this type of horrific child abuse. Repeated Professionals who enhance their knowledge at burns, breaks, and bruises in a way that Thursday. of offender behavior can recognize situations will help you decide if they were accidental Lone Star A3 where children might be at risk or engage or intentionally inflicted. These techniques more effectively with perpetrators, victims, will assist you in conducting successful DOMESTIC SEX TRAFFICKING: and their families. When we understand the investigations for law enforcement, court, THE CHICAGO APPROACH complexity and subtleties of the problem, we and CPS purposes. This presentation is Brigid Brown can better implement policies and procedures based on the new Fox Valley course being This workshop will outline an innovative within our organizations and ensure effective developed to train investigators nationwide. approach to domestic sex trafficking of safeguarding for all. Using video interviews Dallas A2 women and girls in the United States, with with sex offenders, this presentation provides an emphasis on collaboration and proactive insights into the motivations, thoughts, and (THE) BEST KEPT SECRET: investigations within an behaviors of child sex offenders. MOTHER-DAUGHTER SEXUAL framework. We will examine the multi-tiered Dallas C ABUSE (PART 2 OF 2) system of sex trafficking, a larger organized Lone Star A1, See pg. 28 for description tier where disputes are resolved, and the YOUTH IN CRISIS: THE IMPACT enforced boundaries and general rules of the OF TRAUMA ON SEXUALLY BEYOND THE IMAGE: VICTIM business. We will outline the collaborative EXPLOITED MINORS IDENTIFICATION (PART 2 OF 2) approach between local, state, and federal Elizabeth Scaife Dallas A1, See pg. 32 for description law enforcement in covert investigations. The This workshop will explore the impact caused feasibility of duplicating this model in smaller by chronic and intense trauma on children, BUILDING A COMMUNITY jurisdictions will be discussed as well as WEDNESDAY and review psychological disorders and EDUCATION PROGRAM FOR best practices for implementation. Repeated behavioral symptoms commonly associated YOUR CAC Thursday. with sexually exploited children. Attendees Ellen Magnis, Autumn Williams Lone Star B will be provided tips on identifying and As part of a strategic planning process, the interacting with victims by implementing Dallas Children’s Advocacy Center embarked FACEBOOK: WORKING WITH LAW simple strength-based and trauma-informed on a significant community education ENFORCEMENT practices, with direction on how to implement program several years ago. In this workshop Lone Star C1, See pg. 22 for description an effective assessment tool. you will hear about strategies implemented Seminar to raise the profile of the agency and to INTERDICTION FOR THE become the “go to” for child abuse issues PROTECTION OF CHILDREN (THE) ZAHRA BAKER HOMICIDE within Dallas County. Participants will learn (IPC): A PROACTIVE APPROACH INVESTIGATION (PART 1 OF 2)* about tools and resources to take back TO COMBATING CHILD Clyde Deal, Thurman Whisnant to their communities, including creative EXPLOITATION This case study will examine the homicide ideas on what can be implemented on a Remington, See pg. 27 for description investigation of 10-year-old Zahra Baker, a limited budget. Think you don’t have time to child who had previously been diagnosed with educate those in your community? You are IT STARTED WITH A NOTE* cancer, leaving her with a hearing impairment leaving dollars on the table and uninformed Nancy Hebert, Todd Hoff and the loss of a leg. What started as a community members in the jury box. This case study will examine the MDT missing child investigation changed direction Austin 2 investigation into the sexual abuse by a when her prosthetic leg was found a few predator who quit his job to move cross- weeks later. This presentation will detail this CONFESSIONS WITHOUT country to live with the mother of two small complex investigation that includes an early, MIRANDA: UNDERSTANDING girls. The initial outcry of the abuse came in phony ransom note and the investigator’s use HOW CONFESSION LAWS REALLY the form of a note. As the case progressed, of cell phone evidence to establish timelines WORK (PART 2 OF 2) twists and turns were presented, including and locations of suspects. The case will Dallas A3, See pg. 28 for description the discovery of: sex toys, disturbing discuss the positive outcomes that take place video footage of news clippings from prior when local, state, and federal agencies work CRUEL AND UNUSUAL murdered child abduction cases, and the hand-in-hand. The presentation will include PUNISHMENT: DEATH BY defendant wearing children’s clothing. The the challenges of the case and lessons DEHYDRATION* jail calls revealed that the victims’ mother learned. Repeated Thursday. Marci McClellan Curry, Carmen White still loved the defendant and tried to help him. Dallas B According to medical experts, it took three The case study will include portions of the to five days for 10-year-old Jonathan James forensic interviews, forensic medical exams, to die from dehydration. They testified jail phone calls, video footage, and pictures of that he died a grueling death that involved recovered evidence, and concludes with an cardiac arrest, multiple organ failure, blood unusual case resolution. Repeated Thursday. poisoning, and muscle breakdown as a result Austin 3

34 August 12-15, 2013 | Dallas, Texas | cacconference.org IT’S NOT OVER YET! THE UTILITY SUSAN POWELL WAS REPORTED OF MEDICAL FOLLOW-UP FOR MISSING, THEN HER CHILDREN 1:00-2:30 PM CHILD ABUSE VICTIMS WERE MURDERED: John Bickel, Marcella Donaruma SHOULD WE HAVE SEEN THIS CORROBORATION IN CHILD This presentation will discuss the benefits COMING?* ABUSE INVESTIGATIONS of follow-up medical evaluations for child Lone Star A4, See pg. 27 for description (PART 1 OF 2) victims, caseworkers, and investigators. Lone Star A3, See pg. 24 for description These children can have developmental THEY HIDE, WE SEEK: SEX and behavioral problems complicating OFFENDER TRACKING DEFENDING THE INVESTIGATIVE their placement out of the abusive home. RESOURCES FOR LAW INTERVIEW Communicating a child’s past medical ENFORCEMENT Amy Russell history of abuse, their current medical Dannah Vardaman The MDT can be utilized to effectively defend needs, and putting the injuries in context of With thousands of registered sex offenders in the investigative interview at trial. This the evolving histories provided by caretakers the U.S., whose whereabouts are unknown, presentation will identify common areas under investigation, can be coordinated by a linking them to open and unsolved missing/ of attack by opposing counsel, as well as follow-up assessment. The presenters will exploited child cases is of great potential techniques to address these challenges. describe how medical child abuse teams can benefit. This presentation will focus on how Case law and research will be discussed help caseworkers and investigators form an the Sex Offender Tracking Team (SOTT®) at to demonstrate specific points in the integrated and coherent response to child NCMEC is working to bring together a variety presentation. The speaker will also discuss abuse victims. Repeated from 3:00-4:30. of resources to assist law enforcement in how to identify common areas of defense Dallas D2 locating noncompliant sex offenders. The attacks, develop strategies to address presentation includes techniques on utilizing defense attacks, and identify ways forensic WEDNESDAY JURY SELECTION IN CHILD specific online open source searches. Case interviewers can assist in defending the SEXUAL ABUSE CASES examples will be used. SOTT can assist with interview. Sherre Sweet compliance checks, comprehensive reports City View 3 This workshop will discuss issues and on specific offenders, and ongoing support challenges facing the prosecutor in selecting after an operation is completed. FIGHTING PIMPS: THE a jury in a child sexual abuse case. This Dallas D3 STRUGGLE TO SAVE OUR session will include topics such as the DAUGHTERS recanting victim, the young-child witness, TRAINING TO WORK WITH Christopher Baughman the lack of medical and physical evidence, COMMERCIALLY SEXUALLY This workshop will examine the ever-evolving and punishment issues. EXPLOITED AND DOMESTICALLY landscape of trafficking crimes and offer City View 3 TRAFFICKED CHILDREN investigative strategies to combat them. The (PART 2 OF 2) presenter will discuss the reality of the pimp/ LOOKING BACK TO SEE THE Lone Star C2, See pg. 25 for description prostitute culture and will refute the common FUTURE: LESSONS FROM 25 misconceptions and media propaganda YEARS OF CHILD PROTECTION UNDERSTANDING about the sex trade. Techniques and best (PART 2 OF 2) PERPETRATORS OF SEXUAL practices for investigating and convicting Lone Star A2, See pg. 33 for description CRIMES AGAINST CHILDREN human traffickers will be presented. Lastly, (PART 2 OF 2) techniques for providing teens with tools (A) NON-CONFRONTATIONAL Dallas C, See pg. 34 for description to protect themselves will be discussed. APPROACH TO INTERVIEWING Repeated Thursday. AND INTERROGATING CHILD WORKING WITH NON- Lone Star C2 ABUSE SUSPECTS (PART 2 OF 2) OFFENDING PARENTS IN CHILD Lone Star C4, See pg. 29 for description SEXUAL ABUSE CASES GETTING THE RIGHT ONE: A Dan Powers SERIAL ABUSER IS CONVICTED ONCE THE SHUTTER SNAPS: This workshop will review types of non- OF MURDER (PART 1 OF 2)* THE CONTINUED VICTIMIZATION offending parents and suggest a consistent Lone Star A2, See pg. 28 for description FROM CHILD SEX ABUSE approach in dealing with them, from IMAGES investigation through on-going treatment. 1:00-2:30 PM cont’d Lone Star C3, See pg. 30 for description Your actions can “make or break it” for the on next page. next professional dealing with the parent. ONLINE PROTECTIONS We will discuss the range of emotions FOR CRIMINAL JUSTICE professionals may feel as well as the “do’s PROFESSIONALS and don’ts” of dealing with non-offending Have you downloaded Austin 1, See pg. 27 for description parents, emphasizing the need for a collaborative, consistent approach. your handouts? STRATEGIES FOR FORENSIC Seminar Handouts for workshops INTERVIEWS WITH are online at ADOLESCENTS (PART 2 OF 2) (THE) ZAHRA BAKER HOMICIDE Dallas D1, See pg. 33 for description INVESTIGATION (PART 2 OF 2)* www.conferenceondemand.net/ Dallas B, See pg. 34 for description dcac/cac2013

August 12-15, 2013 | Dallas, Texas | cacconference.org 35 1:00-2:30 PM CONT’D in a number of ways. This lecture will discuss they are often abused themselves. To combat the types of defenses used in child sexual this problem, professionals must feel a sense HOSTAGE IN A BUNKER assault cases and how to effectively combat of urgency to create a safe environment for (PART 1 OF 2)* the defenses during the investigation and at the child. This presentation will discuss ideas Tim Crooks, Steve Richardson trial. and strategies that will allow you to use your You watched it on TV, but if you attend this Dallas A2 sense of urgency to prepare the mother for presentation you will learn what actually the long “marathon” of leaving the violent happened behind the scenes in the case PERPETRATORS IN POSITIONS relationship and protecting her children. of Jimmy Lee Dykes during a weeklong OF POWER AND TRUST Repeated Thursday. standoff in February 2013, in . Before Dallas D3, See pg. 21 for description Austin 2 barricading himself and a 5-year old boy in an underground bunker, Dykes abducted the (THE) PROS AND CONS OF GOING RETRIEVING INFORMATION child from a school bus and killed the driver. FEDERAL FROM THE CLOUD (LEGALLY) This case study will examine how multiple Aaron Covey, Mandy Griffith, Abigail Abraham law enforcement agencies came together to Aisha Saleem, Randy Watkins What legal process do you need to obtain work through this tragedy and bring it to a This workshop will discuss the pros and information from cloud providers, and how is successful conclusion with the boy’s rescue cons of bringing child exploitation cases the law evolving? In this workshop you will and Dykes’ death. Repeated Thursday. for federal prosecution. Topics will include learn about the Electronic Communications Lone Star B various federal charges, punishment ranges, Privacy Act, the latest federal and state case and asset forfeiture, considering a federal law, pending federal legislation, and state HUMAN TRAFFICKING: A case to assist with difficult victim issues. The statutes that affect your ability to obtain SURVIVOR’S PERSPECTIVE presenters include an experienced detective information from cloud providers. Lone Star C3, See pg. 33 for description who regularly brings cases for federal Dallas D2 consideration, an experienced FBI agent who INTERVIEW AND INTERROGATION routinely works with local law enforcement, SCALDS, SCORCHES, AND OF JUVENILES IN CRIMES and two federal prosecutors who worked SPLASHES: BURNS IN CHILDREN AGAINST CHILDREN CASES as assistant district attorneys. Repeated Matthew Cox Thursday. This workshop will review the medical aspects

WEDNESDAY (PART 1 OF 2) Dallas A1, See pg. 24 for description Dallas D1 of pediatric burn injuries including the classic forced immersion burns, accidental spills, INVESTIGATIONS OF MISSING/ PROSECUTING SWAMI JI: THE and unusual burn injuries. The lecture will be ABDUCTED CHILDREN FALSE GURU* given from the perspective of a child abuse (PART 1 OF 2) Cathy Compton, Amy Lockhart, pediatrician. William Donaldson, Mark Hilts Shyama Rose, Jeri Skrocki Austin 3 In this presentation, members of the FBI’s This case study details the investigation, Behavioral Analysis Unit (BAU) will discuss prosecution, and flight of Swami Ji, leader SECONDARY TRAUMA: both motivations and investigative strategies of one of the largest Hindu temples in the MANAGING OUR OWN for the investigation of missing/abducted U.S. He used his position as the supposed WELL-BEING child cases. The presenters will incorporate celibate leader of Barsana Dham, to molest Teresa White actual case examples into their discussion. children. In 2008, three of his victims found Much has been written about secondary Repeated Thursday. the courage to come forward. Presenters trauma and compassion fatigue, which has Lone Star C4 will discuss combating the multi-million been described as “the stress resulting from dollar defense of this child predator. After a helping or wanting to help a traumatized or JUVENILE PROSTITUTION long parade of defense PR campaigns, over suffering person.” This workshop focuses on INVESTIGATIONS: FROM THE a dozen attorneys, delay tactics, threats to the effect of both general work stress and MOUTHS OF OFFENDERS AND victims, witnesses, and prosecutors, the secondary traumatic stress resulting from VICTIMS trial began in 2011. The Swami’s massive intense interaction with victims of childhood Terri Patterson defense machine was ultimately no match trauma. You will learn specific ways to This presentation will address behavioral for the profound truth of the victims, and he counteract the negative impact of this stress issues present in juvenile sex trafficking was convicted. His flight during the trial and to reduce the emotional cost of caring. investigations, including unique victim the continued federal manhunt for him will be Repeated Thursday. and offender dynamics. Interviews with discussed. Repeated Thursday. Remington incarcerated offenders and victims will be Lone Star A1 incorporated into the presentation. Results SEX OFFENDER REENTRY of ongoing research at the FBI’s Behavioral PROTECTING CHILDREN BY Greg Brown Analysis Unit will also be presented. GETTING MOM FROM GOING TO Across the country, communities are Lone Star A4 GONE IN DOMESTIC VIOLENCE struggling with safe and effective sex offender SITUATIONS reentry issues. This workshop will discuss OVERCOMING UNTRUE Kristen Howell the challenges with sex offender reentry, how DEFENSES IN CHILD Protecting children who live in a home to focus limited resources looking at effective EXPLOITATION CASES with domestic violence is frustrating and approaches, and how to partner with law Justin Fitzsimmons challenging for law enforcement, CPS, and enforcement, victim services, probation and Defense attorneys attack the investigation child advocates. Children in these settings are parole, and the community. and prosecution of child sexual assault cases not only exposed to the violence they witness, Dallas A3

36 August 12-15, 2013 | Dallas, Texas | cacconference.org TIMOTHY RICHERT: TEACHER, making models inherent in working with IT’S NOT OVER YET! THE UTILITY PREDATOR, AND MASTER children. The presenters are local university OF MEDICAL FOLLOW-UP FOR MANIPULATOR* professionals with experience providing play CHILD ABUSE VICTIMS Justin Keiter, Jennifer Richert therapy and conducting research in regional Dallas D2, See pg. 35 for description Timothy Richert fantasized about sexually elementary schools. abusing his daughter before she was born Seminar KIDS IN CONFINEMENT: or even had a name. We know this because PROSECUTING CASES OF he recorded these fantasies as he rubbed his SEXUAL ABUSE IN JUVENILE AND wife Jennifer’s belly. Everything in Richert’s ADULT DETENTION FACILITIES life, from his choice of employment as a 3:00-4:30 PM Viktoria Kristiansson schoolteacher to his desire to have children, Sexual abuse in correctional facilities is a was all done to aid his sexual abuse of CORROBORATION IN CHILD crime and a human rights violation, with grave children. When his first daughter outcried, ABUSE INVESTIGATIONS individual and communal consequences. no charges were filed. Then his youngest (PART 2 OF 2) This presentation will discuss the unique daughter outcried. How did Timothy Richert Lone Star A3, See pg. 24 for description vulnerabilities inherent in confinement manipulate CPS case workers, police facilities, discuss the dynamics and offenders officers, and prosecutors? Hear Jennifer DECEPTION DETECTION who perpetrate the abuse, and provide Richert, his ex-wife, explain how she felt like Dallas B, See pg. 28 for description strategies for investigating and prosecuting the criminal, what a Texas jury did, and what cases, particularly those that are affected by many experts in the field of Child Abuse say EVIDENCE BASED APPROACHES intimidation, and thus involve recanting or they’ve heard of, but never seen. Warning: the TO SEX OFFENDER MANAGEMENT unavailable witnesses. This presentation was video portion of this case study is graphic in Greg Brown developed by AEquitas through a partnership nature. Repeated Thursday. This workshop will focus on the evidence with the National Prison Rape Elimination Act WEDNESDAY Dallas B based practices used in assessing, targeting (PREA) Resource Center. services, and managing sex offenders. Dallas A2 TRAVELING SEX OFFENDERS There is strong research supporting the Dallas C, See pg. 23 for description importance of these practices. This workshop LOOKING FOR LOVE IN ALL THE will highlight the research and focus on WRONG PLACES* UNDERSTANDING AND best practices for a multidisciplinary team Lone Star A1, See pg. 27 for description INVESTIGATING CHILD approach. PORNOGRAPHY Dallas A3 OVERCOMING DIFFICULT Austin 1, See pg. 23 for description SITUATIONS IN FORENSIC GETTING THE RIGHT ONE: A INTERVIEWS: WHAT QUESTIONS WHEN A BACKGROUND CHECK SERIAL ABUSER IS CONVICTED DO I ASK NEXT? IS NOT ENOUGH: THE STATE OF OF MURDER (PART 2 OF 2)* Rita Farrell PROTECTION EFFORTS IN YOUTH Lone Star A2, See pg. 28 for description This workshop will provide both lecture and SERVING ORGANIZATIONS group discussion. Participants will learn how Mike Johnson HANDS ARE NOT FOR HITTING: to overcome difficult situations during forensic In the fall of 2012, the Boy Scouts of THE IMPACT OF DOMESTIC interviews and handle tough questions. Upon America (BSA) collaborated with APSAC VIOLENCE ON CHILDREN entering the workshop, participants will have and NCPTC, to host a symposium for key Austin 1, See pg. 32 for description a chance to write down difficult situations leadership of youth-serving organizations in they have encountered and the presenter and the U.S., Canada, and . Youth serving HOSTAGE IN A BUNKER participants will find solutions and practical organizations are challenged to prevent (PART 2 OF 2)* tools that can be used in the future. abuse in their ranks. This workshop will Lone Star B, See pg. 36 for description Dallas D1 summarize these threats, including youth on youth offending, questionable vs. illegal INSTITUTIONAL ABUSE 3:00-4:30 PM cont’d sexual behavior by youth, online predation AND PERSONS WITH on next page. and grooming, and helping staff, parents, and DISABILITIES: STRATEGIES volunteers make their program one that will FOR INVESTIGATORS AND scare off prospective offenders. PROSECUTORS HAVE YOU VISITED Lone Star C1 Remington, See pg. 33 for description KLYDE WARREN PARK?

WORKING ETHICALLY WITH INTERVIEW AND INTERROGATION This park is an CHILDREN OF JUVENILES IN CRIMES urban green space Pedro Blanco, Ryan Holliman, AGAINST CHILDREN CASES within walking distance (PART 2 OF 2) Joel Muro, Victoria Stickley of the Sheraton. Too often children are not afforded rights and Dallas A1, See pg. 24 for description privileges that are automatically afforded to adults. This workshop introduces and INVESTIGATIONS OF MISSING/ It has multiple discusses the ethical issues and concerns ABDUCTED CHILDREN gourmet food trucks, that arise as professionals work with child (PART 2 OF 2) perfect for lunch! victims. Attendees will gain an understanding Lone Star C4, See pg. 36 for description of ethical guidelines, principles, and decision- See map on pg. 6

August 12-15, 2013 | Dallas, Texas | cacconference.org 37 3:00-4:30 PM CONT’D STATEWIDE ONLINE incarceration may have been appropriate. LEGAL RESOURCE AND This presentation will look at several PEDIATRIC HEAD TRAUMA: COMMUNICATION CENTERS: recent cases in the media, and will identify THE EVIDENCE AND THE Tools for Effective opportunities where law enforcement ARGUMENTS Prosecutions education, inter-agency coordination, and Matthew Cox Barbara Elias-Perciful, offender focused investigations could This lecture will review the key aspects Patricia Hogue have resulted in stronger prosecution and of suspected abusive head trauma (aka Explore how child abuse professionals prevention of future victimization. shaken baby syndrome). The lecture are using Online Legal Resource and Lone Star A4 will cover basic anatomy, suspected Communication Centers – innovative, mechanisms of injury, the clinical Internet-based resources designed to VERY YOUNG GIRLS: GEMS presentation, and the medical evaluation. improve child abuse case outcomes. The DOCUMENTARY SCREENING Cases will be used to illustrate the medical non-profit Texas Lawyers for Children (TLC) WITH Q & A evidence supporting a diagnosis of AHT has created its Online Center methodology, Lone Star C2, See pg. 31 for description and the common arguments encountered providing “one-stop” access to resources in criminal court proceedings. within a state, including immediate access WOMEN WHO MOLEST Austin 3 to case law, statutes, forms, practice tips, CHILDREN: OFFENDER medical and psychological information. TYPOLOGIES PROSECUTING THE IMPROPER Online Centers support and connect Dallas D3, See pg. 23 for description TEACHER-STUDENT a state’s child abuse professionals: RELATIONSHIP judges, attorneys, CPS, CASA, and CACs, Shequitta Kelly, Reynie Tinajero allowing them to share expertise to No parent expects the teacher will abuse improve individual case outcomes and their children when they send them to court system processes for abused and school. This workshop will review how neglected children. Austin 2 CEU FAQs some teachers/coaches manipulate and abuse students. The presentation TO USE OR NOT TO USE:

WEDNESDAY will address and discuss the patterned When will I receive behaviors used on victims and the long INTRODUCING EVIDENCE IN lasting effects it has on them. There will also THE INVESTIGATIVE INTERVIEW my certificate? be a discussion about the misperception Amy Russell that victims hold about their relationship Introduction of externally derived No certificates will be handed with the teacher. This lecture will provide information in interviews is touted as both out on-site. Within two weeks, suggestive and beneficial. MDT members tips on how to successfully investigate and post conference, you will receive prosecute this type of case. must understand the implications of its use Lone Star C1 on both the case and the child. One of the an email with a link to a survey. challenges facing interviewers is when, Once you complete the survey, RESILIENCY 101: FROM VICTIM if ever, to show a child evidence during you will be sent a second email the interview. This evidence may include TO SURVIVOR containing the link to print your Julie Brand reports from others, medical records, Some victims of childhood abuse chat logs, or photographs, collected from conference certificate. perpetuate the cycle; others grow to a crime scene or from additional sources. be safe, nurturing adults. How can we This workshop outlines the advantages influence which path they will choose? and disadvantages of using evidence This workshop identifies seven key steps during the interview and offers guidelines to becoming a resilient survivor—steps and suggestions for interviewers. that can help a victim overcome trauma City View 3 How do I receive and develop a “survivor’s perspective.” my CEUs? Attendees will learn how to use the TOOLS IN THE TOOLBOX: FIGHTING CHILD SEXUAL “language of resiliency” to identify and When you receive your reinforce victims’ strengths, positively ABUSE IMAGES ONLINE impacting their self-perceptions. The Lone Star C3, See pg. 33 for description conference certificate, you will presenter is both an experienced counselor also receive a document with the and a resilient survivor of maternal sexual TROUBLESHOOTING THE CEU information on it, such as the SYSTEM RESPONSE TO CHILD abuse. sponsor accreditation numbers. Seminar EXPLOITATION Louis Morlier You must submit your certificate SEXUALLY MOTIVATED Recent headlines have identified sexual to your respective accrediting ABDUCTION AND MURDER abuse perpetrators who target minors and agency to receive credit. CACC Dallas C, See pg. 30 for description other vulnerable populations. Perhaps most troubling about these cases is the moment does not submit these for you. when it is revealed that the perpetrator had similar previous violations, for which

38 August 12-15, 2013 | Dallas, Texas | cacconference.org

CASE STUDIES & WORKSHOPS Each session is listed by time-block.

associated with pimping, analyze the impact THURSDAY, 8:00-9:30 AM of chronic and intense trauma on youth, and learn tips on identifying and interacting with AUGUST 15 BROKEN BONES: NOT JUST victims. Schedule at a glance: STICKS AND STONES Lone Star C2 Dallas A2, See pg. 28 for description ETHICS IN CHILD ABUSE 7:00-8:00 AM BUILD YOUR CASE WITH THE PROSECUTIONS HELP OF THE FORENSIC NURSE City View 6, See pg. 20 for description Continental Breakfast City View 7, See pg. 18 for description Lone Star Foyer (AN) EYE TOWARDS CONVICTION: COMPLIANT BEHAVIOR OF FROM DISPATCH TO VERDICT ABDUCTED CHILDREN Austin 2, See pg. 32 for description 8:00 AM-12:00 PM Ron Laney, Carol Ryan NCMEC CVIP Lab open When children become trapped in a cycle FIGHTING PIMPS: THE of deception and abuse, they often cope STRUGGLE TO SAVE OUR City View 8 with their exploitation based upon their DAUGHTERS personality and upbringing. Compliant Austin 3, See pg. 35 for description 9:30-10:00 AM behavior is a survival strategy that develops HOSTAGE IN A BUNKER Morning Break when victims feel threatened. Lindsey Ryan was a 14-year old girl who willingly left (PART 1 OF 2)* Refreshments Provided home with a 56-year-old felon. Was this Lone Star B, See pg. 36 for description a case of a teenage runaway, or was this a life-threatening situation of predatory IDENTIFYING AND SEIZING 11:30 AM manipulation? In this presentation, Lindsey’s ELECTRONIC EVIDENCE (ISEE) Conference Concludes mother will discuss outside vs. inside (PART 1 OF 2) perspectives of this case. She will also Dallas A3, See pg. 20 for description discuss ways police and other professionals THURSDAY Case Studies are marked can positively impact the investigation, the INTERROGATION: A 360° with an asterisk (*) family, and the recovered victim. PERSPECTIVE (PART 1 OF 2) Dallas A1 Lone Star A4, See pg. 24 for description

COREY LOFTIN: PRE-SCHOOL INVESTIGATIONS OF MISSING/ TEACHER, BABYSITTER, YOUTH ABDUCTED CHILDREN COUNSELOR, AND PREDATOR* (PART 1 OF 2) Lone Star A1, See pg. 20 for description Lone Star C3, See pg. 36 for description

DIGITAL PHOTO FORENSICS: IT’S NEVER REALLY OVER: POST- MORE THAN MEETS THE EYE CONVICTION ISSUES IN CHILD Lone Star C4, See pg. 32 for description ABUSE CASES SAVE Laura Coats, Russell Wilson, DOMESTIC MINOR SEX Christine Womble TRAFFICKING: IDENTIFYING AND The case does not end when judgment is THE RESPONDING TO AMERICA’S entered. Months, years, and even decades PROSTITUTED YOUTH later, defendants are challenging their DATE (PART 1 OF 2) convictions, alleging countless violations of for the Elizabeth Scaife their constitutional rights. While some claims 26th Annual Domestic minors constitute the largest have merit, most do not. This workshop will number of trafficking victims in the present an overview of the most commonly Crimes Against successful post-conviction claims (actual Children U.S. This presentation will address the profiles of trafficking victims, explore the innocence, prosecutorial misconduct, Conference vulnerabilities that put children at risk of ineffective assistance of counsel) and discuss being commercially sexually exploited, and issues that law enforcement and prosecutors August 11-14, 2014 review the four primary manifestations of should be aware of as they prepare their child sex trafficking. Attendees will learn the cases for trial. recruitment and grooming tactics used by Remington various traffickers, terminology and culture

40 August 12-15, 2013 | Dallas, Texas | cacconference.org MONEY, POWER, RELIGION, WHAT INVESTIGATORS NEED Unaccompanied Minors Registry (UMR), a joint AND SEX: THE SUSAN BROCK TO KNOW ABOUT IPv6 effort of NCMEC and FEMA, will be presented. INVESTIGATION (PART 1 OF 2)* City View 3, See pg. 23 for description The UMR is a free, online data collection tool Lone Star A3, See pg. 25 for description that makes the swift reunification of children (THE) ZAHRA BAKER HOMICIDE a top priority by creating a central location PLAYING NICE IN THE SANDBOX: INVESTIGATION (PART 1 OF 2)* to store and retrieve information on children DEVELOPING EFFECTIVE MDTs Lone Star A2, See pg. 34 for description separated as a result of a disaster. Rita Farrell, Mike Johnson City View 6 This workshop summarizes the history of developing MDTs in the United States and CRUEL AND UNUSUAL then, armed with that history, discusses the 10:00-11:30 AM PUNISHMENT: DEATH BY ten greatest challenges facing MDTs today, DEHYDRATION* offering concrete suggestions for MDTs in BREAKING MYTHS AND Lone Star A1, See pg. 34 for description meeting these challenges. PRESENTING FACTS ABOUT Dallas D2 CHILD ABDUCTION AND DOMESTIC MINOR SEX EXPLOITATION TRAFFICKING: IDENTIFYING AND “PRIMING” CHILDREN’S Dallas D3, See pg. 30 for description RESPONDING TO AMERICA’S DISCLOSURES: SUGGESTIBILITY PROSTITUTED YOUTH IN FORENSIC INTERVIEWS CATCH ME IF YOU CAN: (PART 2 OF 2) Amy Russell A CON MAN’S REVENGE* Lone Star C2, See pg. 40 for description Children’s suggestibility is still heavily Austin 2, See pg. 18 for description debated in the field of child maltreatment, DOMESTIC SEX TRAFFICKING: and research continues to demonstrate CHILD FATALITY REVIEW: THE CHICAGO APPROACH that children can be misled to make false 35 YEARS EXPERIENCE, Austin 3, See pg. 34 for description statements. However, claims researchers PREPARE FOR THE NEXT 5 make about the riskiness of certain interview Deanne Tilton Durfee, Michael Durfee, ESTIMATION OF VICTIM AGE IN techniques continue to hit off-mark when Randy Harris CHILD SEXUAL EXPLOITATION compared with trained interviewer practice. Child Fatality Review with multiagency INVESTIGATIONS This session will discuss current studies teams began in 1978, and Domestic Cindy Murphy on suggestibility, compare research to best Violence Fatality Review followed. We now The Internet and digital photography THURSDAY practice recommendations, and identify have more resources and more conflict. technologies have played a significant role techniques to defend against attacks of the The next decade will bring: computer in the proliferation and availability of child interview. protocols, local data to line staff, and grief pornography. Digital forensic examiners Dallas D1 and trauma services for children, family, and are increasingly tasked with investigating professionals. This workshop will discuss criminal sexual exploitation cases, and (THE) PROS AND CONS how, in the future, we will work more with are often placed in the position of gate- OF GOING FEDERAL domestic violence fatality review, review keeper to the criminal justice system when Austin 1, See pg. 36 for description nonfatal severe cases, read more studies, determining whether an image/movie experience more news scandals, and be features an individual whose age fits their PROSECUTING SWAMI JI: exposed to anger from the community and jurisdiction’s statutory definition of “child” THE FALSE GURU* political officials. Bring your experience or “minor.” In this workshop, the presenter Lone Star C1, See pg. 36 for description and learn to work with more resources and will cover her Master’s dissertation research, more political, professional and community giving a multidisciplinary overview of human PROTECTING CHILDREN BY tensions. ability to estimate child age, and will present GETTING MOM FROM GOING TO Remington a technique for child age estimation from GONE IN DOMESTIC VIOLENCE digital images. SITUATIONS (A) CHILD’S VOICE SILENCED: Lone Star C4 Dallas D3, See pg. 36 for description SEXUAL ABUSE ALLEGATIONS IN CHILD CUSTODY CASES 10:00-11:30 AM cont’d REJECTION, RAGE AND Dallas D1, See pg. 28 for description on next page. REVENGE: THE STATE OF TEXAS V. JOSE EDUARDO ARREDONDO* CHILDREN SEPARATED FROM Dallas B, See pg. 33 for description THEIR FAMILIES BY DISASTERS AND THE UNIDENTIFIED MINORS SECONDARY TRAUMA: REGISTRY Certificates will be emailed MANAGING OUR OWN John Bischoff, Sharon Hawa after you complete a WELL-BEING This presentation will discuss the technical post-conference survey. Seminar, See pg. 36 for description assistance the NCMEC can offer to law enforcement agencies and emergency SUSAN POWELL WAS REPORTED management, disaster relief organizations, MISSING, THEN HER CHILDREN social services agencies, and the faith-based WERE MURDERED: SHOULD WE Surveys will be sent two weeks community to manage the task of reunifying after the conference. HAVE SEEN THIS COMING?* children who have been separated from their Dallas C, See pg. 27 for description parents or legal guardians. Additionally, the

August 12-15, 2013 | Dallas, Texas | cacconference.org 41 10:00-11:30 AM CONT’D victimization. Discussion will include collaboration between federal, state and common perceptions and understandings of local law enforcement in child exploitation- EVIDENCE-BASED PRACTICES how past childhood victimization can impact related investigations. It will also provide an EMPLOYED BY RHY PROGRAMS the likelihood of, and response to, a child in overview of a working interagency model, WITH VICTIM-SURVIVORS OF the next generation being sexually abused. SPEED (Sexual Predator and Exploitation HUMAN TRAFFICKING This presentation addresses psychological Enforcement Detail) comprised of agents TC Cassidy, John Robertson factors, incidence rates, and therapeutic from Homeland Security Investigations, the This workshop will provide participants with opportunities amidst the fallout, for both Albuquerque Police Department, Bernalillo an overview of some of the evidence-based mother and child. County Sheriff’s Office, and the New Mexico practices (EBP) currently being utilized by Seminar Attorney General’s Office. In addition, runaway and homeless youth (RHY) programs, the attendees will learn the legal issues serving victim-survivors of human trafficking. PRACTICE MAKES PERFECT: and advantages of collaboration while Participants will hear emerging information WHAT YOU NEED TO examining prior child pornography, Craigslist, related to EBP and best/promising practices KNOW ABOUT ATTEMPTED motherless, and sex traveler investigations. currently being utilized by RHY programs. ABDUCTIONS Austin 1 The presentation will also discuss existing Jessica Kenton EBP that increase the likelihood of successful This presentation will review offender (THE) ZAHRA BAKER HOMICIDE service provision for victim-survivors. Lastly, demographics as well as the most common INVESTIGATION (PART 2 OF 2)* participants will be provided an opportunity lures used by offenders committing Lone Star A2, See pg. 34 for description to discuss the practices identified in the attempted abductions of children, including survey to gain clarity on what is working with sexual assaults, suspicious incidents, and the target population. unreported short term abductions. Trends, Dallas D2 patterns, and statistics will be reviewed, along with a discussion on how most children The Crimes HOSTAGE IN A BUNKER get away from offenders. The presentation Against Children (PART 2 OF 2)* will include a review of the free resources Lone Star B, See pg. 36 for description offered by NCMEC to law enforcement when they are investigating cases of missing and Conference KENNETH BRANDT: abducted children. is honored ADOPTING TO RAPE* City View 7 Dallas B, See pg. 18 for description to welcome SMOKE AND MIRRORS: IDENTIFYING AND SEIZING SUSPECTING MEDICAL ELECTRONIC EVIDENCE (ISEE) CHILD ABUSE Dallas A2, See pg. 31 for description THURSDAY (PART 2 OF 2) Dallas A3, See pg. 20 for description TIMOTHY RICHERT: TEACHER, INTERROGATION: A 360° PREDATOR, AND MASTER PERSPECTIVE (PART 2 OF 2) MANIPULATOR* as the Dallas C, See pg. 37 for description Lone Star A4, See pg. 24 for description Gold Sponsor INVESTIGATIONS OF MISSING/ WHO WOULD HE BE TODAY? ABDUCTED CHILDREN A FAMILY PERSPECTIVE* for our (PART 2 OF 2) Jane Christman, Ron Laney Lone Star C3, See pg. 36 for description On August 31, 1987, Jane VanLuchene 25th Anniversary Christman received a phone call that changed Conference. IT STARTED WITH A NOTE* her family’s life forever. Her 8-year-old son Lone Star C1, See pg. 34 for description was missing. He was found 36 hours later deceased - kidnapped, raped, and murdered IT TAKES A TEAM (MDT) by a repeat sex offender. Since that time she TO PROTECT A CHILD has worked with legislators in Montana to City View 3, See pg. 21 for description change laws to keep sex offenders in prison and to keep children safe. She has worked MONEY, POWER, RELIGION, with her oldest son, Derek, to establish a Many Computer Labs are open AND SEX: THE SUSAN BROCK non-profit organization, Ryan United. In this to all Conference attendees. INVESTIGATION (PART 2 OF 2)* workshop she will share with you a family Lone Star A3, See pg. 25 for description perspective of your worst nightmare. If you are interested in attending Dallas A1 a lab, visit the Computer Lab (A) PEBBLE IN THE POND: Help Desk on the 3rd floor of (A) WORKING PARTNERSHIP FOR FACTORS IN MULTI- the Conference Center. GENERATIONAL SEXUAL ABUSE MORE EFFECTIVE CHILD SEXUAL Tamara Hillard EXPLOITATION INVESTIGATIONS This presentation explores the phenomenon Eric Bonza, Steve Walsh of “second generation” child sexual abuse This workshop will focus on effective

42 August 12-15, 2013 | Dallas, Texas | cacconference.org RESOURCE PORTAL We hope you downloaded your handouts before arriving here! If not, you can get them when you return home and through June 2014.

REMEMBER THAT WE ARE NOT PROVIDING HANDOUTS ON SITE.

Also, a few weeks post conference, you may login and view some of our most popular sessions captured via video. www.conferenceondemand.net/dcac/cac2013

All available at no additional charge to you August 1, 2013 to July 1, 2014

because of the generous support of Computer Labs Each session is listed by time-block.

and Gnutella 2 file sharing networks. MONDAY, 10:00-11:30 AM Students will learn how to install, configure, and use the ePhex tool to investigate the AUGUST 12 ANONYMIZATION AND distribution of child pornography on these Schedule at a glance: INVESTIGATIVE TECHNIQUES networks. The ePhex tool works with the Mat Henley, Greg Kesner ICACCOPS website. Prerequisites: Students This lab will be an exercise in setting up, must possess a strong working knowledge using, and investigating popular anonymizer of IP addresses, ports, hash values, and 7:00-8:15 AM technologies. A general understanding of the have experience conducting on-line child Continental Breakfast Internet and familiarity with anonymizers is exploitation investigations. Registration/Check-In preferred for attendees. Repeated Tuesday. Houston B Lone Star Foyer San Antonio A MOBILE DEVICES’ LOGICAL AND BECOME A GOOGLE JEDI: SAVE PHYSICAL DATA 8:15-9:30 AM YOURSELF FROM INFORMATION Amber Schroader Opening Plenary OVERLOAD Learning how to process mobile devices can Chris Armstrong, Lauren Wagner be intimidating. Learn how easy processing Lone Star Ballroom This computer lab will teach students how to mobile phones can be with triage techniques effectively use Google to filter search results as well as doing full image processing. Learn to relevant and useable information. Students the value of logical vs. physical data when 9:30-10:00 AM will complete hands-on exercises using it comes to mobile devices. Standard mobile Morning Break Google Boolean and advanced Operators. phones as well as smart phones will be used Refreshments Provided Repeated Wednesday. in this lab. Repeated Tuesday. State 4 Houston A 10:00 AM-5:00 PM CHILD PROTECTION SYSTEM 2: PALTALK AND PICPASTE UPDATE Mike Duffey, Mike Sullivan NCMEC CVIP Lab open Stephen Anders, Chauncy Wilder This lab instruction will teach investigators City View 8 Designed for currently licensed and how to work in an undercover capacity experienced peer-to-peer investigators, to chat with suspects seeking to sexually this presentation will showcase the newest exploit a child. The use of the software 11:30 AM functionality built-in to the Child Protection PalTalk will allow investigators to interact First Floor Exhibit Hall Opens System (CPS). Beyond its updated interface, with the suspect from the investigator’s the new CPS features include real-time home jurisdiction and provide undercover LABS analytics such as automatic job launching images via a third party website. Repeated

COMPUTER 11:30 AM-1:00 PM (based on region), email/SMS notification Thursday. Lunch of suspect’s online status, and the long Houston C awaited GUID tracking ability. This lab is for On Your Own demonstration only. A current CPS license is not required. 2:30-3:00 PM State 1 1:00-2:30 PM Afternoon Break FIREFOX ADD ONS: FREE FORENSIC IMPLICATIONS OF Refreshments Provided RESOURCES TO ENHANCE YOUR WINDOWS 8 PC REFRESH INVESTIGATIONS Glynn LeBlanc Elizabeth Tow, James Williams During this lab, the presenter will review 5:00-7:00 PM This computer lab will teach students how artifacts left behind when a user refreshes a Welcome Dinner to effectively use Mozilla Firefox add-ons Windows 8 PC. This function is built into all Lone Star Ballroom as investigative tools. These add-ons can versions of Windows 8 and allows the user offer time saving solutions to day-to-day to restore the PC to factory default or some investigation tasks. Repeated Wednesday. previous state. This will include a look at State 3 how the user initiates the process and what artifacts are left behind when the operation is ICAC-P2P EPHEX complete. Repeated Tuesday. INVESTIGATIONS (PART 1 OF 3) State 2 Rob Erdely, David Peifer, Joe Versace This three-part lab is designed to introduce experienced investigators to the Gnutella

44 August 12-15, 2013 | Dallas, Texas | cacconference.org FORENSIC SCAN 2 (PART 1 OF 2) operate in a traditional Windows environment Stephen Anders, Chauncey Wilder and run their preview tools against a suspect 3:00-4:30 PM This lab-based training introduces the next computer. This lab and lecture will provide generation of the field triage tool, Forensic the attendee with the skills and software FORENSIC SCAN 2 (PART 2 OF 2) Scan. This class will provide investigators necessary to create a WinFE image, which State 1, See pg. 45 for description with free software designed to quickly can be booted by either CD or USB device. examine suspect hard drives for contraband. Students will also have the opportunity to GPS INFORMATION (PART 2 OF 2) The tool will find previously identified child practice booting a “suspect computer” with San Antonio A, See pg. 45 for description sexual abuse material by hash value and their WinFE and run preview tools. **Note: will then allow the investigator to review Due to Windows licensing rules, students will ICAC-P2P EPHEX other material based on the likelihood of create their CD and USB thumb drives using a INVESTIGATIONS (PART 3 OF 3) finding locally produced movies and images 30-day evaluation copy of Windows. Houston B, See pg. 44 for description of child sexual abuse. The software uses State 4 new innovations including flesh detection, INTRODUCTION TO MOBILE pattern recognition, and proximity reference NO CHILD LEFT BEHIND: THE DEVICE DATA RECOVERY to quickly reveal images most likely of NEED FOR A VICTIM CENTRIC (PART 2 OF 2) unidentified local victims. Repeated Thursday. MODEL (PART 1 OF 2) State 3, See pg. 45 for description State 1 Rich Brown, James Cole Child exploitation crimes are increasing, and INTRODUCTION TO WINDOWS GPS INFORMATION (PART 1 OF 2) in times of “doing more with less,” forensic FORENSIC ENVIRONMENT Justin Wykes examiners have focused on extracting (WINFE) (PART 2 OF 2) This workshop is designed to familiarize enough evidence to prosecute the offenders State 4, See pg. 45 for description attendees with the vast amount of location before moving onto the next case. This information present on GPS devices. Through practice inherits the risk of leaving the images NO CHILD LEFT BEHIND: THE a series of presentations and hands- of victims undetected on hard drives only to NEED FOR A VICTIM CENTRIC on exercises, attendees will acquire the be placed in evidence lockers. This session MODEL (PART 2 OF 2) knowledge and skills necessary to extract will explore a paradigm shift in policing that Houston C, See pg. 45 for description and analyze data associated with GPS- applies new technologies such as Microsoft enabled technologies. Repeated Thursday. PhotoDNA and NetClean Analyze, new ON-SITE PREVIEW USING San Antonio A thought process and changes in workflow TUX4N6™ (PART 2 OF 2) that will make sure law enforcement “leaves Houston A, See pg. 45 for description ICAC-P2P EPHEX no child behind.” INVESTIGATIONS (PART 2 OF 3) Houston C USING GOOGLE IN YOUR Houston B, See pg. 44 for description INVESTIGATIONS (ADVANCED) ON-SITE PREVIEW USING Nirupa Calvin, Miles Rutkowski INTRODUCTION TO MOBILE TUX4N6™ (PART 1 OF 2) If you have attended the basic Google lab, DEVICE DATA RECOVERY Nicholas Newman or are familiar with Google services, this (PART 1 OF 2) This presentation will provide an overview advanced level workshop will provide you COMPUTER with additional insight and valuable tips to Lauren Wagner, James Williams of an on-site digital device preview as LABS This lab will introduce students to cellular well as an introduction to using NW3C’s conduct online investigations. The instructors devices and discuss the many aspects TUX4N6™ digital triage/preview program. will review investigative techniques and tools that mobile devices have on investigations. Using TUX4N6™, a program free to law using many of Google’s services (Google+, Students will learn the basic terminology enforcement, participants will learn how to AdWords, AdSense, Wallet, Analytics, Voice) and a cadre of resources that can be used conduct on-site triage/preview, using both that can be used to supplement your current during a mobile device data recovery. Also, manual methods and automated processes. investigative process. Get ready to learn by considerations for mobile device seizure Repeated Thursday. doing! Repeated Wednesday. will be discussed in depth. Students will be Houston A San Antonio B introduced to various tools that are available for mobile device data recovery, and will USING GOOGLE IN YOUR WINDOWS SHORTCUTS: also be introduced to using CelleBrite UFED INVESTIGATIONS (BASIC) A DEEP DIVE Logical specifically. Students will complete a Nirupa Calvin, Miles Rutkowski Glynn LeBlanc hands-on exercise using CelleBrite as a field This basic level lab will give investigators In this lab, the presenter will review the tool to extract data from cellular devices. This insight and valuable tips to conduct online structure of link files and then dive deep lab is designed for beginners. investigations. The instructors will review into artifacts not well known. He will also State 3 investigative techniques and tools using review new functions in Win 7 & 8 related many of Google’s services (Search, Image to shortcuts. In this hands-on lab, students INTRODUCTION TO WINDOWS Search, Google Account, Gmail, YouTube, will create files, create link files, and track FORENSIC ENVIRONMENT Blogger) that can be used to supplement changes related to them as the file is (WINFE) (PART 1 OF 2) your current investigative process. Get ready manipulated. Repeated Wednesday. Chris Armstrong, Don Lewis to learn by doing! Repeated Wednesday. State 2 The Windows Forensic Environment (WinFE) San Antonio B is a new bootable forensic environment. WinFE does not mount the suspect’s hard drive, which will allow investigators to

August 12-15, 2013 | Dallas, Texas | cacconference.org 45 Computer Labs Each session is listed by time-block.

INTERNET EXPLORER 10 TUESDAY, 8:00-9:30 AM ARTIFACTS Glynn LeBlanc AUGUST 13 ADOBE PHOTOSHOP AND IE 10 is the latest browser released by Schedule at a glance: DIGITAL MEDIA TOOLS FOR LAW Microsoft and has been forced out to users ENFORCEMENT through Windows update. This browser (PART 1 OF 2) changes the way it stores TIF and history. IE 7:00-8:00 AM James Cole, John Penn 10 can also run in two modes on Windows 8 Continental Breakfast This presentation will cover new machines and depending on how it is run, the advancements in digital media analysis using artifacts will be stored in different locations. Lone Star Foyer Adobe Photoshop, Premiere and other tools. In this hands-on lab, the presenter will New techniques will include dealing with illustrate the new challenges with examining camera shake related blur, image resolution, a computer with IE 10 installed. Repeated 8:00 AM-5:00 PM and image enhancement. It will specifically Wednesday. NCMEC CVIP Lab open focus on technologies and techniques related State 2 City View 8 to investigation of crimes against children with an emphasis on victim identification. INTRODUCTION TO INTERNET It will also cover imaging issues related to INVESTIGATION (PART 1 OF 4) 9:30-10:00 AM undercover investigations of online crimes. Chris Armstrong, Don Lewis, Elizabeth Morning Break Houston C Tow During this one-day lab, investigators will Refreshments Provided ANONYMIZATION AND gain an understanding of computer crime INVESTIGATIVE TECHNIQUES and Internet investigation. We will cover basic Houston A, See pg. 44 for description website investigation, including finding legal 11:30 AM-1:00 PM contact information, registrar information, Lunch FACEBOOK #USINGIT and mining the website for additional On Your Own Mike Duffey information and leads. Also covered will be This computer lab is geared towards those IP addressing, photo searching and property individuals who have never used Facebook data, basic FireFox Addons, and basic Google 2:30-3:00 PM or are new to Facebook. This class will cover searching. This will be a hands-on lab and is Afternoon Break setting up an account, understanding the restricted to law enforcement only. basics, and understanding what information State 4 Refreshments Provided might be available to the along with how applications work with MACINTOSH IMAGING BASICS LABS DCAC Tours your profile and account settings. Repeated (PART 1 OF 2) COMPUTER Wednesday. Kurt Petro Visit the DCAC Tour Booth State 1 In this lab, attendees will learn the available to sign-up! methods for forensically imaging a ICAC-P2P ARES INVESTIGATIONS Macintosh® computer while also becoming (PART 1 OF 4) aware of the unique challenges this task 6:00 PM Rob Erdely, David Peifer, Joe Versace may present on certain Macintosh® models. Dallas Police Association This one-day training program is designed Repeated Wednesday. to introduce experienced investigators to San Antonio B Hospitality Event the ARES file-sharing network. Students Shuttle Transportation Provided will learn how to install, configure, and use PERPHOUND™ on Ground Floor of the Roundup-ARES tool to investigate the DEMONSTRATION Sheraton Hotel distribution of child pornography on the ARES Nicholas Newman, Justin Wykes network. The ARES investigative tool was This presentation will demonstrate the developed by the Ontario Provincial Police features and capabilities of NW3C’s and works with the ICACCOPS website. PerpHound™ tool. This tool, which is free Prerequisites: Students must possess a to law enforcement, simplifies the analysis strong working knowledge of IP addresses, of location information found in Call Detail ports, hash values, and have experience Records by merging Cell Tower Records conducting on-line child exploitation with Call Detail Records then creating a investigations. Repeated Wednesday. file that can be opened in most available Houston B mapping utilities. Repeated Wednesday. San Antonio A

46 August 12-15, 2013 | Dallas, Texas | cacconference.org SOCIAL MEDIA INVESTIGATIONS: (A) LOOK AT WINDOWS 8 persona and introduce you to the various chat SEARCHING PROFILES, SAVING IMMERSIVE APPLICATIONS rooms dedicated to the sexual exploitation of Computer Labs DATA, AND ADDRESSING LEGAL Glynn LeBlanc children. Tips about chatting and building CONSIDERATIONS (PART 1 OF 4) In this lecture and lab, the presenter your investigation based on experience will be Justin Fitzsimmons, Lauren Wagner, will examine the Windows 8 Immersive provided. Suggestions for court presentation James Williams Applications front-end view, disk structures, will be discussed, including presenting your This full-day lab will provide an overview of where local data is cached, and the Windows evidence and jury considerations. Repeated social networking websites and how these settings affecting these applications. Wednesday. websites can be useful to investigations. Immersive applications run similar to phone Houston A Students will learn how to set up an applications and all data and settings are investigative social networking account, and self-contained in the programs file structure. ADVANCED GIGATRIBE learn how to effectively search these sites, By examining a Windows 8 image file, (PART 1 OF 2) using both the internal search features on these artifacts are revealed to the forensic Jeff Rich, Eric Zimmerman the social networking websites and the examiner. Repeated Wednesday. This lab will cover advanced tools to make Google Advanced Operators. This workshop State 2 investigating Gigatribe easier. This class will cover techniques on capturing profiles assumes familiarity with Gigatribe. Due to for evidentiary purposes as well as mapping MACINTOSH IMAGING BASICS the information, which will be presented, this tools for friend networks. The role of Federal (PART 2 OF 2) class is limited to law enforcement personnel privacy statutes will be explained, legal San Antonio B, See pg. 46 for description only. considerations for social media sites will Houston C be discussed, including what legal steps MOBILE DEVICES’ LOGICAL AND must be taken to correctly seize and search PHYSICAL DATA CHILD PROTECTION SYSTEM 2: information from social networking sites. Houston A, See pg. 44 for description UPDATE Hypotheticals will be used to demonstrate State 1, See pg. 44 for description whether a defendant’s status as a suspect, SOCIAL MEDIA INVESTIGATIONS: or following an arrest, might affect how SEARCHING PROFILES, SAVING ICAC-P2P ARES INVESTIGATIONS information is gathered. Facebook will be DATA, AND ADDRESSING LEGAL (PART 3 OF 4) the main social networking website covered CONSIDERATIONS (PART 2 OF 4) Houston B, See pg. 46 for description in this session, but other social networking State 3, See pg. 47 for description websites will also be touched upon. INTRODUCTION TO iDEVICE State 3 WIRELESS NETWORK FORENSICS (PART 1 OF 2) INVESTIGATIONS (PART 1 OF 3) Kurt Petro Nicholas Newman, Justin Wykes In this lab, attendees will learn methods This lecture focuses on techniques and for acquiring data from iOS® devices (iPod 10:00-11:30 AM methodologies used in conducting a detailed Touch®, iPhone®, and iPad®). Students will wireless site survey and locating wireless use forensically sound tools and techniques ADOBE PHOTOSHOP AND devices connected to wireless networks. to analyze potential evidence from iOS COMPUTER DIGITAL MEDIA TOOLS FOR LAW Topics covered will include: case studies devices, including information from built-in

ENFORCEMENT (PART 2 OF 2) detailing the challenges presented to law applications as well as popular third-party LABS Houston C, See pg. 46 for description enforcement related to wireless networks, applications. Repeated Wednesday. wireless networking standards, an overview San Antonio B ICAC-P2P ARES INVESTIGATIONS of free and low-cost hardware and software (PART 2 OF 4) solutions (and their limitations), the process INTRODUCTION TO INTERNET Houston B, See pg. 46 for description for conducting a detailed site survey INVESTIGATION (PART 3 OF 4) (including how to discover hidden wireless State 4, See pg. 46 for description INTRODUCTION TO INTERNET networks), how to efficiently locate wireless INVESTIGATION (PART 2 OF 4) devices connected to wireless networks, and SOCIAL MEDIA INVESTIGATIONS: State 4, See pg. 46 for description relevant legal concerns and considerations. SEARCHING PROFILES, SAVING Repeated Wednesday. DATA, AND ADDRESSING LEGAL INTRO TO MACS San Antonio A CONSIDERATIONS (PART 3 OF 4) Mike Duffey State 3, See pg. 47 for description This block of instruction is aimed at those individuals who are inexperienced using an Apple computer. Covered in this block of 1:00-2:30 PM 1:00-2:30 PM cont’d instruction will be the comparison between on next page. the PC world and the Mac world, using (THE) ADULT UNDERCOVER virtual machines on a Mac, and the iLife PERSONA AND INTRODUCTION applications- iPhone, iMovie, Photo Booth, TO INTERNET RELAY CHAT and various Mac hot keys and short cuts. (PART 1 OF 2) Repeated from 3:00-4:30. Mike Sullivan State 1 This lab will provide a basic overview of IRC, including navigation and the logging function of the IRC client (mIRC). The presenter will explain how to build your IRC undercover

August 12-15, 2013 | Dallas, Texas | cacconference.org 47 1:00-2:30 PM CONT’D

WINDOWS 8 FILE HISTORY ARTIFACTS Glynn LeBlanc During this lab the presenter will review the new File History feature in Windows 8. Students will learn about the function of this new backup process from a users’ perspective through the forensic analysis of artifacts found in local and remote locations. The module will conclude with identifying NW3C is dedicated to supporting law other key artifacts stored locally that may corroborate other findings pertaining to File enforcement in the prevention, investigation, History backups. Repeated Wednesday. State 2 and prosecution of economic and high-tech

WIRELESS NETWORK crime by providing comprehensive instruction INVESTIGATIONS (PART 2 OF 3) San Antonio A, See pg. 47 for description through our trainings and resources.

For more information, 3:00-4:30 PM visit www.nw3c.org, (THE) ADULT UNDERCOVER and follow us on PERSONA AND INTRODUCTION TO INTERNET RELAY CHAT Facebook and Twitter. (PART 2 OF 2) Houston A, See pg. 47 for description

ADVANCED GIGATRIBE (PART 2 OF 2) Houston C, See pg. 47 for description

FORENSIC IMPLICATIONS OF WINDOWS 8 PC REFRESH State 2, See pg. 44 for description

ICAC-P2P ARES INVESTIGATIONS (PART 4 OF 4) LABS Houston B, See pg. 46 for description COMPUTER INTRO TO MACS State 1, See pg. 47 for description DALLAS POLICE ASSOCIATION INTRODUCTION TO iDEVICE FORENSICS (PART 2 OF 2) San Antonio B, See pg. 47 for description HOSPITALITY EVENING Dinner Provided INTRODUCTION TO INTERNET INVESTIGATION (PART 4 OF 4) TUESDAY, AUGUST 13, 6:00 PM State 4, See pg. 46 for description 1412 Griffin Street East SOCIAL MEDIA INVESTIGATIONS: The Dallas Police Association—the original, and largest police employee SEARCHING PROFILES, SAVING group for Dallas police officers with over 3,500 active and retired DATA, AND ADDRESSING LEGAL members—will host a hospitality evening. Please join us for an CONSIDERATIONS (PART 4 OF 4) opportunity to network and meet new friends. State 3, See pg. 47 for description Transportation to the DPA office will be provided on the Ground Floor of WIRELESS NETWORK INVESTIGATIONS (PART 3 OF 3) the Sheraton Hotel, just past the Draft Sports Bar. The office is located San Antonio A, See pg. 47 for description approximately two miles from the Sheraton Dallas Hotel. It is a short cab ride if you miss the bus.

48 August 12-15, 2013 | Dallas, Texas | cacconference.org SPECIAL THANKS to this year’s Conference Training and Computer Lab Partners

National Criminal Justice Bedford County Training Center Sheriff’s Office

National White Collar Illinois Office of the Crime Center (NW3C) Attorney General

Sedgwick County AccessData Sheriff’s Office

SEARCH

August 12-15, 2013 | Dallas, Texas | cacconference.org 49 Computer Labs Each session is listed by time-block.

(THE) RECOVERY OF VOLATILE WEDNESDAY, 8:00-9:30 AM DATA (PART 1 OF 2) Chris Armstrong, Don Lewis AUGUST 14 BECOME A GOOGLE JEDI: SAVE This lab and lecture will address the collection Schedule at a glance: YOURSELF FROM INFORMATION of “Volatile Data” in the form of a computer’s OVERLOAD Random Access Memory, or RAM. Volatile State 3, See pg. 44 for description data is information which law enforcement has historically overlooked. We will use the 7:00-8:00 AM FIELD SEARCH (PART 1 OF 2) free FTK Imager software to conduct a RAM Continental Breakfast Greg Brown, Jim Tanner DUMP, then use a free demonstration version Lone Star Foyer This lab will train attendees on the use of of FTK to open and view the contents of the Field Search software, available free to law Ram Dump. enforcement and governmental agents. Field State 4 8:00 AM-5:00 PM Search is a Windows-based, live-box tool NCMEC CVIP Lab open used for “Knock and Talk,” consent searches, USING GOOGLE IN YOUR and post-conviction monitoring of computer INVESTIGATIONS (BASIC) City View 8 use. With more than 10,000 users worldwide, State 1, See pg. 45 for description it is a well-recognized investigation and 9:30-10:00 AM triage tool. Participants will receive full WINDOWS SHORTCUTS: working copies of Field Search v 4.0. Field A DEEP DIVE Morning Break Search. State 2, See pg. 45 for description Refreshments Provided Houston A

ICAC-P2P ARES INVESTIGATIONS 11:30 AM-1:00 PM (PART 1 OF 4) 10:00-11:30 AM Lunch Houston B, See pg. 46 for description On Your Own FIELD SEARCH (PART 2 OF 2) MACINTOSH IMAGING BASICS Houston A, See pg. 50 for description (PART 1 OF 2) San Antonio B, See pg. 46 for description FIREFOX ADD ONS: FREE 2:30-3:00 PM RESOURCES TO ENHANCE YOUR Afternoon Break osTRIAGE: A NEXT GENERATION, INVESTIGATIONS Refreshments Provided ON-SCENE PREVIEW TOOL (PART State 3, See pg. 44 for description 1 OF 2) LABS Jeff Rich, Eric Zimmerman ICAC-P2P ARES INVESTIGATIONS

COMPUTER 7:00 PM This lab will provide instruction on osTriage, (PART 2 OF 4) Silver Spur Supper: A 25th why it was written, how to use it, and what it Houston B, See pg. 46 for description Anniversary Celebration can do for you. In short, osTriage will quickly find, extract, and display key information INTERNET EXPLORER 10 Lone Star Ballroom from a computer which will enable to you ARTIFACTS get a better first interview and conduct State 2, See pg. 46 for description 7:45 PM a better search. Some of the information Drawing for iPad extracted includes operating system details, MACINTOSH IMAGING BASICS registry details, USB device history, browser (PART 2 OF 2) For those who attended an history for all major browsers, search engine San Antonio B, See pg. 46 for description Exhibitor Demonstration search terms, cloud storage applications, (Must be present to win) encryption, P2P and other applications, and osTRIAGE: A NEXT GENERATION, passwords. osTriage displays thumbnails of ON-SCENE PREVIEW TOOL images and videos and categorizes images/ (PART 2 OF 2) DCAC Tours videos against a list of over 500,000 SHAs of Houston C, See pg. 50 for description Visit the DCAC Tour Booth interest and 300+ keywords. Any contraband to sign-up! can be copied off the target computer with a (THE) RECOVERY OF VOLATILE few clicks. Repeated from 1:00-4:30. DATA (PART 2 OF 2) Houston C State 4, See pg. 50 for description

PERPHOUND™ DEMONSTRATION USING GOOGLE IN YOUR San Antonio A, See pg. 46 for description INVESTIGATIONS (ADVANCED) State 1, See pg. 45 for description

50 August 12-15, 2013 | Dallas, Texas | cacconference.org WIRELESS NETWORK analysis/review of a variety of netbooks, Computer Labs INVESTIGATIONS laptops, desktops, and servers. Repeated (PART 1 OF 3) Thursday. San Antonio A, See pg. 47 for description State 1 (A) LOOK AT WINDOWS 8 Thank you to IMMERSIVE APPLICATIONS 1:00-2:30 PM State 2, See pg. 47 for description this year’s APPS EMULATOR osTRIAGE: A NEXT Mike Duffey, Mike Sullivan GENERATION, ON-SCENE conference This lab will allow investigators to use the PREVIEW TOOL (PART 1 OF 2) Emulator to install APPs on a computer Houston C, See pg. 50 for description scholarship that were previously only available on smart phones. Through this technology, WIRELESS NETWORK fund the investigator will appear to the INVESTIGATIONS suspect to be using a smart phone. (PART 2 OF 3) contributors This method allows the investigator to San Antonio A, See pg. 47 for description use all evidence-gathering tools on the computer to document contact with the for their suspect. Repeated Thursday. Houston A 3:00-4:30 PM generous FIELD TRIAGE AND DATA BECOME A GOOGLE JEDI: support. ACQUISITION (PART 1 OF 2) SAVE YOURSELF FROM Chris Armstrong, Don Lewis INFORMATION OVERLOAD This lab and lecture will address the State 3, See pg. 44 for description collection of potential evidence from running devices at the scene of a search FACEBOOK #USINGIT warrant or a Probation/Parole search Houston A, See pg. 46 for description using tools such as Field Search, osTriage and SPADA, a bootable law enforcement FIELD TRIAGE AND DATA friendly Linux Tool. ACQUISITION (PART 2 OF 2) State 4 State 4, See pg. 51 for description

ICAC-P2P ARES ICAC-P2P ARES INVESTIGATIONS INVESTIGATIONS COMPUTER

(PART 3 OF 4) (PART 4 OF 4) LABS Houston B, See pg. 46 for description Houston B, See pg. 46 for description

INTRODUCTION TO iDEVICE INTRODUCTION TO iDEVICE FORENSICS (PART 1 OF 2) FORENSICS (PART 2 OF 2) San Antonio B, See pg. 47 for description San Antonio B, See pg. 47 for description

INVESTIGATIVE USB APPS IT’S ALL ONES AND ZEROS Elizabeth Tow, James Williams (PART 2 OF 2) This computer lab will teach students State 1, See pg. 51 for description how to download, install and use portable apps as an investigative tool. Firefox and osTRIAGE: A NEXT related add-ons, LightScreen, and other GENERATION, ON-SCENE programs will be covered. PREVIEW TOOL (PART 2 OF 2) State 3 Houston C, See pg. 50 for description

IT’S ALL ONES AND ZEROS WINDOWS 8 FILE HISTORY (PART 1 OF 2) ARTIFACTS Andrew Rosen State 2, See pg. 48 for description Windows, Macintosh, and Linux are more similar than not. Investigators frequently WIRELESS NETWORK encounter a wide variety of computer INVESTIGATIONS technologies. This lab and lecture will (PART 3 OF 3) provide attendees with free software San Antonio A, See pg. 47 for description tools and information to enable the rapid and safe assessment, acquisition, and

August 12-15, 2013 | Dallas, Texas | cacconference.org 51 Computer Labs Each session is listed by time-block.

can only be solved through digital evidence. THURSDAY, 8:00-9:30 AM Come try your skills, have some fun, win some prizes, and learn a bit about digital AUGUST 15 FORENSIC SCAN 2 evidence in crimes. You must participate in Schedule at a glance: (PART 1 OF 2) part one and part two. State 1, See pg. 45 for description Houston B

GPS INFORMATION 7:00-8:00 AM (PART 1 OF 2) Continental Breakfast San Antonio A, See pg. 45 for description 10:00-11:30 AM Lone Star Foyer IT’S ALL ONES AND ZEROS APPS EMULATOR (PART 1 OF 2) Houston A, See pg. 51 for description 8:00 AM-12:00 PM San Antonio B, See pg. 51 for description NCMEC CVIP Lab open FORENSIC SCAN 2 ON-SITE PREVIEW USING (PART 2 OF 2) City View 8 TUX4N6™ (PART 1 OF 2) State 1, See pg. 45 for description Houston C, See pg. 45 for description 9:30-10:00 AM GPS INFORMATION PALTALK AND PICPASTE (PART 2 OF 2) Morning Break Houston A, See pg. 44 for description San Antonio A, See pg. 45 for description Refreshments Provided SO YOU WANT TO BE A CYBER IT’S ALL ONES AND ZEROS SLEUTH? (PART 1 OF 2) (PART 2 OF 2) 11:30 AM Greg Brown, Jim Tanner San Antonio B, See pg. 51 for description Conference Concludes This lab is for those who always wanted to try solving a crime through digital evidence. ON-SITE PREVIEW USING No experience necessary, but participants TUX4N6™ (PART 2 OF 2) Thanks should at least know how to use Windows® Houston C, See pg. 45 for description and Google®. In part one, we train you on several tools you will use to solve a crime. SO YOU WANT TO BE A CYBER for Part two is a tongue-in-cheek mystery that SLEUTH? (PART 2 OF 2) coming! Houston B, See pg. 52 for description LABS COMPUTER SAVE THE DATE August 11-14, 2014

52 August 12-15, 2013 | Dallas, Texas | cacconference.org Computer Labs

Since opening our doors in 1991, the Dallas Children’s Advocacy Center has provided international leadership to child abuse professionals around the world through our Annual Crimes Against Children Conference. This year, we are bringing the expertise of these professionals in for one-day trainings at the DCAC Lecture Series, Opportunities for Empowerment. The Dallas Children’s Advocacy Center’s brand new 56,000 sq. ft. facility has a 200 seat, state-of-the art training center that will be used for hosting workshops throughout the year. The DCAC Lecture Series will provide professionals opportunities to hear from some of the nation’s best-known speakers dealing with crimes against children. Additionally, we host monthly events where community members and parents can gather for training and enlightening discussion about protecting children, effective parenting, healthy families, and preventing abuse in our community. For more information, see dcac.org. SPEAKER BIOGRAPHIES Speakers are listed alphabetically by last name.

ABIGAIL ABRAHAM is an assistant Division where he has been for the last 12 has worked with all levels of law enforcement, general counsel in the Public Safety and years. Chris oversees the detectives, property providing analytical information and available Criminal Investigations Division within AOL’s room, and DARE/SRO programs. He is also resources for their investigations. Legal Department. She oversees criminal a graduate of the FBI National Academy, investigations that affect AOL, manages Northwestern University School of Police MILTON AYALA has more than 25 compliance to civil and criminal legal Staff and Command (SPSC), and the Police years of experience in leadership and processes and any litigation that results, and Executive Leadership College. management positions in the private sector, addresses policy and legislative matters state, and federal governments. In the federal pertaining to criminal matters and release KRISTEN ANDERSON joined the government, he achieved the position of Chief of member information. Before joining AOL, National Center for Missing and Exploited of Social Work, VA Hospital. Presently, he is Abigail was an assistant attorney general in Children (NCMEC) in 2005. As the Executive employed as the Substance Abuse Program the High Tech Crimes Bureau of the Illinois Director of Training and Outreach, she Specialist with the Texas Department of Attorney General’s Office where she was oversees the development and delivery of Family and Protective Services. His clinical responsible for prosecuting computer and NCMEC curriculum to law enforcement and strengths are in social work, child welfare, technology-related crimes, designing and other service providers working in the area mental health, and substance abuse offering training, and working on legislation. of child victimization. Kristen has been a treatment. He holds an MSW from Columbia speaker and trainer regarding sex offenders University. He is a licensed master social ISIDRO ALANIZ is the District Attorney and child-victimization issues across the worker and a licensed chemical dependency for the 49th Judicial District of Texas. He was United States and internationally since 2005. counselor in the state of Texas. first elected in 2008 and was re-elected in 2012 without opposition. Isidro received his RICH ANDERSON is the supervising CHRISTOPHER BAUGHMAN heads Texas law license in 1995. He is also licensed attorney for the Special Assault Unit of the Pandering Investigation Team (PIT) in the United States District Courts for the the King County Prosecuting Attorney’s and Human Trafficking Task Force in Las Southern and Districts of Texas, Office at the Regional Justice Center in Vegas, where his team has arrested and the United States Court of Appeals for the Kent, Washington. The Special Assault Unit convicted several of the city’s wealthiest Fifth Circuit and the United States Supreme handles cases involving sexual assault and and most violent criminals. Their success Court, and is board certified in Criminal Law. the physical abuse of children in the largest caught national attention, and Chris was county in the state of Washington. In April subsequently featured in Dateline’s Vegas AMY ALLEN is a Forensic Interview 2012, he served on a Child Fatality Review Undercover, MSNBC’s Vegas Undercover Raw, Specialist with the Department of Homeland Committee, which convened for the purpose and episodes of National Geographic’s Sex Security (DHS). During her career she has of evaluating any issues regarding training, For Sale: American Escort. Chris teaches conducted more than 4,000 interviews of policies, or social work practice that may pandering investigations to other departments children and adolescents in sexual assault have been relevant to the deaths of Charlie across the nation, including members of the cases and has testified in court on more and Braden Powell. FBI, IRS, and Federal Parole and Probation than 300 occasions as an expert. With DHS, Agencies. He is also author of the best selling she works cases involving child exploitation, CHRIS ARMSTRONG is a High-Tech true crime human trafficking series, “Off the human trafficking, and human rights Crime Training Specialist in the High-Tech Street.” violations, and lectures frequently on child Crime Training Services Department of exploitation and human trafficking. Amy has SEARCH, where he coordinates and provides JUDITH BEECHLER is an Assistant traveled recently to Cambodia, South Africa training on high-tech crime investigations Professor of Counseling at Midwestern State and Haiti to interview victims of child sex and forensics. He retired from the San Diego University, Wichita Falls, Texas. She has tourism cases. Police Department in 2006 after more than 27 worked with victims and survivors of domestic years of service. When he retired, he was lead violence since 1991, and has assisted the

SPEAKERS STEPHEN ANDERS has been with the investigator for the ICAC grant in San Diego District Attorney of Wilbarger County on Southern Virginia (SOVA) Internet Crimes County. In this role, he was involved in both trials in which domestic violence has been a Against Children (ICAC) Task Force since proactive and reactive investigations, forensic factor. Judith has also served on the Board 2008. He is a Virginia certified general investigations, computer maintenance, office of Directors for Family Rescue Services and instructor and has taught numerous P2P network and networking hardware, and grant on the Nebraska State Domestic Violence/ and UC Chat classes to law enforcement and financial planning. Sexual Assault Coalition. She currently serves prosecutors. Stephen currently supervises on the Board of Directors for First Step, Inc. in four investigators at the Bedford County ANGELA AUFMUTH has been with the Wichita Falls. Sheriff’s Office, all assigned to the SOVA- National Center for Missing and Exploited ICAC Task Force. Children (NCMEC) since 1999. She is currently JOHN BICKEL worked at CPS in an the Program Manager of the Special Analysis Intensive Family Services unit for 4 years CHRISTOPHER ANDERSON is a Unit (SAU), comprised of the analytical and has spent the past 11 years at Texas 28-year veteran and Captain with the Troy teams of the Sex Offender Tracking Team Children’s Hospital working in the Emergency Police Department in Ohio. He is currently (SOTT), Child Sex Tracking Team (CSTT), and Center and the Child Protective Health assigned as the head of the Investigative Research. During her career at NCMEC, she Clinic. He is now the Community Outreach

54 August 12-15, 2013 | Dallas, Texas | cacconference.org Coordinator for the Child Abuse Pediatrics of the newly created Criminal Investigations BRIGID BROWN is an Assistant State’s Team. In this role, he builds workshops for Division for the Attorney General. Attorney currently assigned to the Human SPEAKER BIOGRAPHIES key community constituencies that focus Trafficking Unit of the Cook County State’s on building partnerships aimed at reducing BRIAN BONE has been an Inspector Attorney’s Office in Chicago, Illinois. In this child abuse and neglect. John’s current focus with the U.S. Postal Inspection Service since role, she prosecutes human trafficking is working with parents to improve their 2007 and is currently assigned to the U.S. related cases and serves as a member of the psychosocial conditions such as intimate Department of Justice’s Child Exploitation Cook County Human Trafficking Task Force. partner violence, mental illness, and everyday and Obscenity Section in Washington, D.C. Brigid has also worked in both the child stress management. Currently, he is licensed During his tenure, he has been assigned to protection and juvenile delinquency divisions as a Licensed Clinical Social Worker and work on child exploitation investigations of the Juvenile Justice Bureau. She joined the Board Approved Clinical Supervisor in the for USPIS on various federal and state task Cook County State’s Attorney’s Office in 2006 State of Texas. forces. In his current capacity, he conducts and has extensive experience working with complex child exploitation investigations with vulnerable youth. JOHN BISCHOFF is currently the a national scope, and performs computer Executive Director of the Missing Children forensic examinations in support of these GREG BROWN has worked in the Division for the National Center for Missing investigations. corrections field for over 25 years with most and Exploited Children (NCMEC). Within this of his experience working as a specialized role, he is responsible for the oversight of ERIC BONZA is a special agent with officer and supervisor for domestic violence all missing child cases, reporting processes, Homeland Security Investigations in and sex offenders. He is the lead probation and staff. In addition, he is responsible for Albuquerque, NM, currently assigned to instructor for the U.S. Department of the establishment of the federally mandated investigate child exploitation related crimes. Justice’s SMART Office/Fox Valley Technical National Emergency Child Locator Center. He has investigated a variety of state and College Comprehensive Approach to Sex This program is designed to expand NCMEC federal level child exploitation related crimes Offender Management (CASOM) program. resources in support of a national disaster and has worked heavily with the Albuquerque Greg trains probation/parole and law response and large-scale child reunification Police Department and the New Mexico enforcement around the country on evidence effort. Attorney General’s Office to create a joint based practices in assessment, investigation, local/federal-working group under the ICAC sentencing, and supervision/reentry of sex PEDRO BLANCO is an Assistant task force in New Mexico. Eric holds an MS offenders. Greg is also a Certified Computer Professor in the Counseling program at Texas in Intelligence Analysis from the University of Forensic Examiner, and trains probation/ Woman’s University. He has a well-established Detroit Mercy. parole and law enforcement in field computer history of research in play therapy; several forensics and computer monitoring. of these studies have focused on childhood JOHN BRADLEY is a lawyer with academic achievement and play therapy in substantial experience in criminal law. He JENIA BROWN is the Training and the schools. He is also a significant volunteer has served as elected district attorney, Technical Assistance Coordinator at Girls in the Denton and Ponder Independent School assistant district attorney, general counsel Educational and Mentoring Services Districts, which has laid the groundwork for for the Criminal Justice Committee of (GEMS) in New York City. She conducts conducting research and providing needed the Texas Senate, law enforcement and trainings and provides technical assistance therapeutic services to local children. prosecutor liaison for the Texas Punishment for legal professionals, law enforcement, Standards Commission, and briefing and and social service professionals on the DARYL BLOOM has been with the research attorney for the Texas Court of issues of commercial sexual exploitation of Department of Justice since 1994 and is an Criminal Appeals. He is board certified in children (CSEC) and domestic trafficking. Assistant United States Attorney (AUSA) in the both criminal law and criminal appellate law Jenia received an MA in Organizational Middle District of Pennsylvania since 2002. In by the Texas Board of Legal Specialization Leadership from Lewis University. Jenia has this assignment, he has directed numerous and currently works as a national trainer and worked in sectors such as juvenile justice,

investigations and prosecuted a variety of appellate lawyer. He has served on the board child welfare, education, and grassroots SPEAKERS sexual exploitation of children crimes. Daryl of directors for Children’s Advocacy Centers movement projects, which have inspired her teaches at the National Advocacy Center and of Texas and was president for 10 years of drive to prevent and address the commercial lectures at experienced attorney and agent the Williamson County Children’s Advocacy sexual exploitation and trafficking of youth. trainings. He is a 1994 graduate of Villanova Center board. University School of Law. RICHARD BROWN joined the JULIE BRAND holds a Master’s degree in International Centre for Missing and DAVID BOATRIGHT is a 33-year Counseling and enjoyed a 25-year career as Exploited Children (ICMEC) in 2004. He is the veteran of Texas law enforcement and serves a school counselor. Now she uses her unique Law Enforcement and Technology Liaison as the Executive Director for the National perspective as both counselor and survivor, to and serves as the program manager for Center for Missing and Exploited Children speak and write about maternal incest. She international deployments of PhotoDNA for (NCMEC), Texas Regional Office. Prior to combines research data, professional insights, law enforcement. Rich is a retired Bureau coming to NCMEC David served 26 years in and her personal experiences to enlighten Chief in the . He Texas government, primarily with the Office participants about the reality of mother- has held positions in the High Technology of the Attorney General (OAG). During his daughter sexual abuse. Her resiliency workshop Crimes Unit, the Electronic Surveillance Unit, career with the OAG he oversaw the criminal offers proven strategies for helping victims of the Training Bureau, and retired as the Chief investigative work of the cyber crimes, ICAC, childhood maltreatment and interpersonal of Intelligence Management. Most of his fugitive apprehension, special investigations, violence to become strong, healthy survivors. 25 years of law enforcement have been in money laundering, and human trafficking Julie’s presentations focus on the power of serving technology focused investigations or efforts. From 2003 to 2010, he served as chief resiliency and healing in all of our lives. support of such investigations.

August 12-15, 2013 | Dallas, Texas | cacconference.org 55 JOHN BRZOZOWSKI is a fellow at ROGER CANAFF is a widely known adhere to Federal legislation, and regulations Comcast Cable, where he has headed their child protection and anti-violence against and programmatic standards for federally transition to IPv6 since 2005. John is also women advocate, legal expert, author, and funded runaway and homeless youth (RHY) the co-chair of the IETF IPv6 operations group public speaker. As a career Special Victims programs nationwide. She has supported RHY and the Consumer Electronics IPv6 working prosecutor, he has devoted his legal career programs in the identification and delivery of group. to the eradication of violence against women services to runaway and homeless youth, and children. He has worked as a prosecutor, including victims of Commercial Sexual KELLY BURKE is the Program Manager an Assistant Attorney General with the state Exploitation and Trafficking, as well as Labor for Juvenile Justice and Child Protection at of New York, and a Senior Attorney with the Trafficking. the International Association of Chiefs of National District Attorneys Association, Child Police (IACP) where she addresses policy Abuse Unit. He has also trained U.S. Army JANE CHRISTMAN is the mother of a and operational challenges facing law prosecutors on Special Victims cases as a boy who was abducted and murdered. On enforcement and develops resources for Highly Qualified Expert. August 31, 1987, Jane Christman received protecting children and youth, and addressing a phone call that changed her family forever. youth crime, delinquency, and victimization. HANIA CARDENAS is currently a Director Her 8-year-old son was missing. He was She previously worked at the National Center under the Placement Services Bureau with found 36 hours later deceased after being for Missing and Exploited Children (NCMEC) the Los Angeles Probation Department. Prior kidnapped, raped and murdered by a repeat for eight years, supporting law enforcement to her current assignment, she worked in the sex offender. Since that time she has worked in missing and sexually exploited children Adult Bureau and managed a gender-specific with legislators in Montana to change laws cases. Kelly spent three years at the Child probation supervision program for Pregnant to keep sex offenders in prison and to keep Exploitation and Online Protection Center and Parenting Teens. Prior to her work with children safe. Jane has worked with her (CEOP), in London, England where she was the LA County Probation Department, Hania oldest son, Derek, to establish a non-profit instrumental in starting up the UK’s first worked in the Welfare Fraud unit with the organization, Ryan United. national policing agency for child exploitation. Orange County District Attorney’s Office. She earned her Master’s in Archaeology, but her EINAT CLARKE is an attorney at Google RACHEL BURRIS is an Assistant District focus on child welfare and juvenile justice Inc. specializing in data disclosure, the Attorney in Dallas County, Texas. She received inspired her to begin her career in public Electronic Communications Privacy Act, and her law degree from Texas Tech University service. She is a member of the Innocence child protection. Prior to Google she worked at School of Law in 2004 and joined the Dallas Lost LA Task Force as well as the co-manager Cooley LLP where her practice was generally County District Attorney’s Office. For more for the DMST Project for LA County Probation. focused on litigation, e-Discovery, white- than five years, she prosecuted felony crimes collar crimes, trade secrets, commercial involving the sexual and physical abuse of BILL CARSON is Chief of Police for the disputes, and child advocacy. Einat received children. Rachel is now the chief prosecutor Maryland Heights Police Department. He has her law degree from Santa Clara University in a Criminal District Court of Dallas County. more than 34 years of experience as a police School of Law in 2004, and is admitted to She often lectures at local conferences and officer in the St. Louis metropolitan area, and practice in California. trains prosecutors on child abuse issues, has served 16 years in criminal investigation successful child abuse prosecutions and units as a detective, a supervisor, and a LAURA COATS has been an Assistant investigations. commander. Bill served eight years as a District Attorney in the Appellate Section of Deputy Commander with the Major Case the Dallas County District Attorney’s Office for BEN BUTLER is the Director of Network Squad of Greater St. Louis and is an active 12 years. She handles cases on direct appeal Abuse for GoDaddy.com. He and his team member of the Missouri State Child Fatality and in post-conviction habeas proceedings, have become experts and industry leaders in Review Panel. He has a Masters Degree in including many child abuse cases. In addition dealing with all forms of network abuse. Ben Criminology and Criminal Justice from the to her criminal docket, she also represents comes from a strong technical background University of Missouri. the State in appeals from CPS parental rights including several years as a network and email terminations and juvenile cases. administrator at a Fortune 500 company. His JEFF CASE is the Chief Investigator for team plays a critical role in network security the 46th Judicial District Attorney. His duties JAMES “JIM” COLE is the National and digital crime investigations. include the investigation and preparation of all Program Manager for Victim Identification felony cases within Wilbarger, Hardeman, and for Homeland Security Investigations. As a

SPEAKERS NIRUPA CALVIN is an investigator Foard counties, Texas. Case has investigated Special Agent and Digital Forensic Agent he in Google’s Trust and Safety team that is numerous violent crimes including family has been conducting child sexual exploitation responsible for the protection of Google violence homicides. He has previously served investigations for the past nine years and revenue, users, and brand. Her area of as Chief Deputy of the Wilbarger County prior to that was a detective working violent expertise is child safety investigations, Sheriff’s Office. crimes, including child sexual abuse and wherein she investigates cases where it homicide. Jim has been involved in numerous appears a child may be in immediate danger TC CASSIDY is the Director of the child sexual exploitation investigations and or if a user’s conduct appears to be that of Runaway and Homeless Youth Training the rescue of child victims over his past 19 a producer who has access to children. She and Technical Assistance Program. She years of law enforcement. is also actively involved in some of Google’s oversees the planning, development, delivery, key online child safety initiatives. Nirupa coordination, and evaluation of technical MICHELLE COLLINS is responsible for earned her Master’s Degree in Computer assistance and information services. She NCMEC’s operations relating to sexual crimes Science and Technology from the University also oversees the development and delivery committed against children. During her 15 of Madras, India. of workshops and clinics, interpretation and years with NCMEC, she has been instrumental effective implementation of programs that in guiding the growth of the CyberTipline®

56 August 12-15, 2013 | Dallas, Texas | cacconference.org and spearheading the creation of the MATTHEW COX is a board certified child CLYDE DEAL is a Deputy Chief and 28– Child Victim Identification Program®. This abuse pediatrician working at UT Southwestern year veteran of the Hickory Police Department program continues to assist law enforcement Medical School and Children’s Medical Center in North Carolina. As a Sergeant, he assisted agencies and prosecutors in conducting child Dallas. He serves as the medical director of in the implementation of the pilot project pornography investigations and identifying the REACH Program at Children’s Medical that introduced community based policing unknown child victims featured in sexually Center of Dallas, which evaluates more than to the city. Clyde is a graduate of the 195th exploitive images. She received a Master 2,000 children each year due to concerns of Session of the FBI National Academy and a of Arts in criminology from the University of abuse or neglect. member of the International Association of Maryland, College Park. Chiefs of Police and the North Carolina Police LISA CREAMER is the Assistant Director Executive Association. CATHY COMPTON is a criminal of the Child Abuse Pediatrics Program at prosecutor who has worked in Hays County, Texas Children’s Hospital in Houston, Texas, STEVE DEL NEGRO retired as a Texas since 1998. She is a graduate of Loyola which sees over 2,500 cases of suspected sergeant after serving 29 years with the Law School in Los Angeles, California and is child abuse each year. She oversees all Massachusetts State Police. Steve was the licensed in both California and Texas. Cathy aspects of the Child Abuse Program as well Commander for the ICAC Task Force for the helped create the Family Justice Division of as the Children’s Assessment Center Medical last 12 of those years, where he provided the Hays County District Attorney’s Office and Clinic for victims of sexual abuse. Lisa is a training to law enforcement, coordinated has served as its Division Chief since 2008. member of the Harris County Child Fatality and conducted ICAC investigations, provided She is an experienced trial attorney who Review Team and has provided education public awareness presentations, and was specializes in the prosecution of felony level to law enforcement, CPS, and health care the state contact for the National Center for family violence and sexual assaults of both providers throughout the Houston area, as Missing and Exploited Children Cybertips. He children and adults. well as on a regional and national basis. is a graduate of the FBI National Academy 198th session. Steve is an instructor for ICAC SHARON COOPER is a medical TIM CROOKS is a 12-year veteran of Training and TA program in ICAC Investigative doctor who has spent more than 35 years the Dale County Alabama Sheriff’s Office, Techniques, Knoppix, Yahoo undercover working in the area of child maltreatment, and currently serves as an investigator. techniques, Cybertip manager Peer-to-Peer with a particular interest in child sexual In addition to investigative duties, he is Investigations, and TUX4N6. exploitation. She has provided training responsible for enforcing Alabama’s Sex nationally and internationally to all members Offender Registration and Notification Act for AMY DERRICK has been a Dallas County of multidisciplinary teams as well as judges, the county. Tim is a retired Marine with 23 felony prosecutor for more than eight years. psychologists, military commanders, years of active duty service. She spent five years exclusively prosecuting and university leaders. Sharon actively child sexual assaults, child injuries, and evaluates and treats victims and provides MARCI MCCLELLAN CURRY is an child deaths. Amy is currently the Chief of recommendations regarding prevention. Assistant District Attorney in Dallas County, the Dallas County District Attorney’s office Texas. She received her law degree from Sexual Assault Division, which prosecutes all MICHAEL CORRICELLI has been a the Texas Tech School of Law, and joined sexual assaults against victims age 17 and federal agent for more than 19 years and the Dallas County District Attorney’s office older. She frequently provides training to law is a U.S. Postal Inspector who specializes where she has been a prosecutor for almost enforcement and has presented numerous in proactive undercover operations and eight years. For the past four years, she times at this conference and for the Texas investigating the exploitation of children has solely prosecuted child abuse cases District and County Attorney’s Association. where there is a nexus to the mail. He holds involving sex abuse, injuries to children, and a Master’s Degree in Forensic Sciences capital murder. She has provided trainings for WILLIAM “ROCKY” DONALDSON is from the George Washington University, and medical professionals, law enforcement, and a Supervisory Special Agent assigned to completed a prestigious yearlong fellowship prosecutors on child abuse issues and has Behavioral Analysis Unit III in the FBI’s in Forensic Medicine with the Armed Forces presented multiple times at this conference National Center for the Analysis of Violent SPEAKERS Institute of Pathology. and other conferences nationwide. Crime within the Critical Incident Response Group. Prior to his selection for BAU III, AARON COVEY has been a Special LYNN M. DAVIS assumed the role of SSA Donaldson served in the Indianapolis Agent for the FBI since January 2004. Upon President and CEO of the Dallas Children’s Division’s Muncie Resident Agency. Before graduating the Academy, he was assigned Advocacy Center in 2005. He leads the his career with the FBI, SSA Donaldson was to the Denver field office working National executive team, creates the vision and a police officer for the City of Atlanta Police Security and criminal cyber investigations direction of the Center, and manages the Department. He received a master’s degree to include Internet Crimes Against Children. overall organization. Under Lynn’s leadership, from Ball State University in Muncie, Indiana. Aaron is the Internet Crimes Against Children DCAC has served more families, educated Coordinator for the Dallas Division and is more professionals, and raised more funds currently assigned to the Child Exploitation than at any other time in DCAC history. Prior to Task Force. He is also a forensic examiner DCAC, Lynn was the President/CEO of Dallas and an instructor for the FBI, teaching other Challenge, Inc. for 16 years. He coordinated law enforcement personnel how to conduct the growth and expansion of this non-profit investigations on peer-to-peer networks substance abuse organization. Lynn holds an using osTriage and how to conduct forensic MBA from the University of Texas at Dallas examinations of digital medium. and an MS from the University of .

August 12-15, 2013 | Dallas, Texas | cacconference.org 57 MARCELLA DONARUMA is currently abuse programs. He initiated a committee for of online investigations resulting in both an assistant professor of pediatrics at the Helfer Society that will connect with major state and federal prosecutions across the Texas Children’s Hospital/Baylor College health systems nationally to address fatal and country. He is a certified forensic examiner of Medicine within the section of Pediatric severe child abuse and neglect. who continues to perform forensic exams on Emergency medicine. She specializes in the seized computer systems and other media diagnosis and management of child abuse BRIAN DURHAM is the Director for local, state, and federal law enforcement. and neglect with responsibilities in The of Security Operations for Time Warner He is certified in both state and federal courts Children’s Assessment Center medical clinic, Cable. He leads efforts to respond to legal as a forensic expert. the hospital inpatient consult service, and demands Time Warner Cable receives the outpatient Child Protective Health Clinic. from law enforcement agencies seeking JONELLE ESHBACH has been a Marcella also serves as the Director of Baylor’s the production of subscriber data and/or prosecutor in Pennsylvania for 24 years. ACGME-accredited fellowship in Child Abuse technical assistance with lawfully authorized Her trial and appellate experience includes Pediatrics. She attended medical school at electronic surveillance. In addition, Brian capital , public corruption, and adult Baylor College of Medicine in Houston, Texas, coordinates intra-company working groups and child sexual abuse. While appointed and later pursued a Fellowship in Child Abuse focusing on technology, policy, and public/ to the Public Corruption unit, she focused and Forensic Pediatrics at St. Louis Children’s private sector relationships. Prior to joining on elected officials and law enforcement Hospital. Time Warner Cable, he served as Director officers who had violated the law and the of NeuStar’s Legal Compliance and Risk public’s trust. She served on several boards MIKE DUFFEY has been an Inspector with Management Solutions. He is a graduate of and chaired the statewide Medical-Legal the Department of Law Enforcement George Mason University with an MBA in Advisory Board on Child Death. After the since 2002 and has served 18 years as a management. successful conclusion of Commonwealth law enforcement officer. He is responsible of PA v. Gerald Sandusky, she assumed her for statewide computer crime investigations LANCE EASTWOOD joined the current duties in the Office of Chief Counsel including Internet crimes against children. He United States Marshals Service (USMS), of the Food and Drug Administration. has worked with multiple international law Investigative Operations Division (IOD) in enforcement agencies, federal, state, and February 2006. In August 2008, he was ROBERT FARLEY is a thirty-year local agency task forces in conducting Internet reassigned to the Office of the Director, veteran of the Cook County Sheriff’s Police crimes against children investigations. He where he worked for the agency Chief of Department in Chicago, Illinois. As a highly has completed his Microsoft Certified System Staff. In December 2010, Lance returned decorated Detective, Child Exploitation Unit Administrator course work and teaches police to Investigative Operations to work as an Supervisor and Deputy United States Marshal, officers, nationally and internationally, on Intelligence Research Specialist assigned to he has had more than 28 years experience properly conducting online child exploitation the National Sex Offender Targeting Center investigating and supervising all aspects investigations. (NSOTC). His primary responsibilities involve of child abuse crimes. As an internationally supporting investigations of non-compliant, recognized expert, consultant, author and DEANNE TILTON DURFEE directs the fugitive sex offenders, particularly through instructor in child abuse investigation LA County Inter Agency Council on Child Abuse the use of intelligence derived from online techniques, Robert has conducted training and Neglect (ICAN). ICAN formed the first and social media sources. Lance holds seminars for many professionals both Child Death Review Team in 1978, became his Bachelor’s and Master’s degrees from nationally and internationally on behalf the National Center for Child Fatality Review, Monmouth University. of INTERPOL and the U.S. Department of and helped spread teams internationally. Defense. She chaired the US Advisory Board, which BARBARA ELIAS-PERCIFUL is an published A Nation’s Shame: Fatal Child attorney and the Director of Texas Loves RITA FARRELL has 13 years of experience Abuse and Neglect in the United States. Children, Inc. (“TLC”). She is a past Chair working with child abuse investigations as She also served on USDOJ Commissions, of the Texas State Bar’s Committee on Forensic Interviewer and Executive Director addressing Pornography and Children Child Abuse and Neglect and currently of a child advocacy center. She has conducted Exposed to Violence. ICAN programs include serves on the Collaborative Council for the more than 1,500 child interviews, testified in Safe Surrender, Safe Sleep, Multiagency Texas Supreme Court Permanent Judicial many court cases, and has trained for the Child Abuse Data, and a unique multi-agency Commission for Children, Youth, and Families. ChildFirst program in Indiana since 2002. Rita data system to connect agencies serving the In 1995, Barbara founded TLC, a nonprofit currently serves as the Forensic Interview

SPEAKERS same child. organization dedicated to preventing child Specialist of NCPTC at the Southern Regional abuse through legal advocacy and education. Center. Rita manages the ChildFirst Arkansas MICHAEL DURFEE, MD, Child TLC created Texas Lawyers for Children, program and the development of advanced Psychiatrist, designed the first Child Death which provides interactive, statewide, training courses, programs, and peer reviews Review team in 1978. He co-founded the internet-based assistance to Texas judges for forensic interviewers. ICAN National Center on Child Fatality Review and attorneys handling child abuse and that brought teams to all states and multiple neglect cases. BYRON FASSETT is a sergeant and countries. Other work addressed preschool 32-year veteran with the Dallas Police aged molested children, children and STD, ROBERT ERDELY has been a member of Department, who has specialized in prenatal substance abuse, and trauma for the Pennsylvania State Police since 1991. He conducting investigations involving the survivors of fatal family violence. Current work currently is assigned to the Bureau of Criminal sexual exploitation of children for the past includes the California Hospital Network (CHN) Investigations/Computer Crime Unit where he 23 years. He co-developed and started with 136 hospitals in a peer support group for is the supervisor of the computer crime unit the Internet Crimes Against Children Team child abuse programs. ICAN CHN is developing and the state run task force. Robert is also and the High Risk Victims and Trafficking software and programs to automate child an investigator who has conducted hundreds Team (HRVT) in the department’s Child

58 August 12-15, 2013 | Dallas, Texas | cacconference.org Exploitation Squad. The HRVT Team RICHARD GASKILL is the Clinical the United States Attorney’s Office in the Eastern specializes in investigations involving the Director of Sumner Mental Health in District of Texas in 2009 where she is working as sexual abuse and exploitation of high-risk/ Wellington, Kansas and has worked in the Project Safe Childhood Coordinator prosecuting multiple runaways, child victims of sex community mental health for 35 years. He is a cases involving child sexual exploitation. trafficking, and repeat victims of sexual Licensed Clinical Psychotherapist, Registered abuse. He has presented both nationally and Play Therapist-Supervisor, an Infant Mental RUBY GUILLEN was a foster child in internationally on sex trafficking of children Health Clinical Mentor, and teaches play LA County. Now with a Masters in Social with regard to dynamics, investigative, and therapy at Wichita State University. In 2004, Work, she works for CPS as an investigator intervention techniques for law enforcement, he was named a Fellow of the Child Trauma with law enforcement, hospitals, and the prosecutors, and NGO’s. Academy; in 2005, he was Head Start coroner. She uses a second degree in Partner of the Year in Kansas, and in 2006, Computer Information Systems to expedite AARON FISHER became nationally he was awarded the Regional Administrator’s investigations, adding mobile technology for known as “Victim 1,” the face of the Jerry Leadership Award for ACF Region VI of the real time data collection and resources for Sandusky child abuse scandal. He had the Department of Health and Human Services. line staff in the field. Her last 8 years with courage to speak up about the abuse he investigation involved thousands of cases, endured ensuring the perpetrator would MICHAEL GILLUM is a licensed 100 different hospitals and clinics, and face justice. He has been named a hero for psychologist who has devoted much of his several thousand health professionals. having struggled and persevered through the career to serving children through private most adverse circumstances to make sure practice and with community MICHELLE GUYMON is currently the the serial pedophile in his case could hurt agencies, law enforcement, and other human Director of the Specialized Enforcement no one else. He, along with his psychologist service agencies. In June 2012, he received Operations unit with Los Angeles County Michael Gillum and his mother Dawn Daniels, the 2012 Pennsylvania Psychological Probation Department. Michelle is a frequent co-authored Silent No More, Victim 1’s Fight Association, Psychology in the Media Award. presenter and trainer regarding child abuse For Justice Against Jerry Sandusky. Aaron Michael was instrumental in the prosecution and sexual exploitation strategies for working has also committed himself to assisting of Jerry Sandusky. He co-authored a New with youth in the Probation system. She is an victims of sexual abuse worldwide through York Times Best Seller, Silent No More, Victim advocate for children at risk, and a Probation his participation in the Let Go…Let Peace 1’s Fight For Justice Against Jerry Sandusky, Department representative with the Los Come In Foundation. He has provided with Aaron Fisher and Aaron’s mother, Dawn. Angeles Child Exploitation Task Force. Ms. a public relations video concerning the Michael is also board director of a private Guymon has been designated as the Project Foundation and advocates frequently. Aaron foundation that supports and guides victims Manager for the DMST program within the is committed to speaking to groups, including of child sexual abuse. Los Angeles County Probation Department. children, about sexual abuse. CYNTHIA GONNELLA has been a ANDI GROSVALD HAMILTON is an JUSTIN FITZSIMMONS is a nationally Computer Crimes Instructor with NW3C Agent with the Oklahoma State Bureau of recognized legal authority on technology- since 2007. She has 20 years of experience Investigation (OSBI). She is assigned to the facilitated crimes against children. Prior in law enforcement and 13 in computer Child Abuse Response Team as a forensic to joining SEARCH Group he was a Senior forensic investigations. She is a Certified interviewer and investigator where she Attorney with the National District Attorneys Forensic Computer Examiner (CFCE) through specializes in child sexual abuse cases. In Association’s (NDAA’s) National Center for the International Association of Computer November 2009, Andi received the Legion of Prosecution of Child Abuse. He managed Investigative Specialists (IACIS). In 2012, Merit award from the OSBI for her investigative the technology-facilitated child exploitation she earned her Master of Science Degree in work and trainings. For more than a decade, unit and organized national conferences of Cybersecurity – Intelligence and Forensics she has taught forensic interview techniques technology-facilitated crimes. He trains at at Utica College, where she is currently an for the American Professional Society on the other conferences on the subject of sexual adjunct instructor in the program. Abuse of Children. and physical crimes against children. Before SPEAKERS joining NDAA, he was the supervisor of the DEANNA GREEN is the Training and KAREN HANGARTNER, LGSW, is Special Prosecutions Unit of the Kane County Technical Assistance Manager at Girls Outreach Coordinator for the Southern State Attorney’s Office. Educational and Mentoring Services (GEMS) Regional Children’s Advocacy Center in New York City. She conducts trainings (SRCAC). Karen has been with the National AUTUMN FOX graduated from the and provides technical assistance for legal Children’s Advocacy Center since 2003, University of Kansas School of Law. Following professionals, law enforcement and social first in the Prevention Department before law school, she opened her own practice in service professionals on the issues of beginning work with the SRCAC. As 2000, where she focuses on high conflict commercial sexual exploitation of children Outreach Coordinator, Karen is responsible custody cases and appellate work. For two (CSEC) and domestic trafficking. Deanna for developing and delivering training years, she also served as a Special Assistant is committed to youth advocacy and urban for Children’s Advocacy Centers and Attorney General for the State of Kansas. affairs. multidisciplinary teams across 16 states and She is a frequent lecturer on domestic law, the District of Columbia. She also presents at ethics, and appellate law and has lectured in MANDY GRIFFITH is an Assistant United state and national conferences on Secondary Kansas, Missouri, and Colorado. Autumn has States Attorney in the Eastern District of Texas. Traumatic Stress, Trauma Informed MDTs, also published a number of articles including, She worked in the Dallas County District Attorney’s Team Functioning, Leading in an MDT “An Eagle Soaring: The Jurisprudence of Office from 2003 to 2009 where she was Environment, Grant Writing, and Conflict on Justice Antonin Scalia,” 19 Campbell Law assigned to the Child Abuse Division for more Teams. Review 223 (1997). than 2 years and prosecuted cases involving child physical and sexual abuse. Mandy joined

August 12-15, 2013 | Dallas, Texas | cacconference.org 59 JOSEPH HANYEN has been with works closely in a coordinated effort with the a reported missing or abducted child and the GoDaddy since 2001, and has been in the agencies investigating child abuse from the benefits of working with the media during field of network abuse and security since inception of the investigation through case these investigations. 2005. Although he specializes in Child resolution and trials. Exploitation investigations, he also has TAMARA HILLARD, LICSW, is a extensive experience in combatting spam, MAT HENLEY manages the eCrime Consultant-Trainer, providing regional and fighting rogue Internet pharmacies, financial Investigations and Intelligence group at national trainings on psychotherapy and fraud, malware, and hacking. Facebook. He joined Facebook in April of treatment issues regarding childhood sexual 2011. His team is responsible for gathering abuse. She has also served as the Clinical RANDALL HARRIS is an attorney in intelligence, gaining attribution and enforcing Treatment Specialist/Clinical Director of California who has been practicing Juvenile against those who abuse Facebook and Children’s Cove: The Cape Cod and Islands Dependency Law since 1992. In addition to its global community. With a broad abuse Child Advocacy Center, since June 2000. being a trial attorney, Randy also developed landscape, including child safety, spam, Tamara takes an active and creative multiple award winning computer systems for and fraud issues, the team has successfully approach to evidence-based, Trauma the County of Los Angeles. In his spare time, stopped hundreds of criminals around the Focused Cognitive-Behavioral treatment. Randy teaches Trial Advocacy at Abraham world. Prior to Facebook, Mat was the Director She currently works with adults, children, Lincoln University School of Law. His work of Technical Investigations within eBay’s and families, providing brief assessment, with multi-agency computerized records Global Information Security organization, treatment, EMDR, consultation/supervision, on fatal and severe abuse cases provides a making up the original Information Security parenting education, and national/regional model for the ICAN Child Death Review Team. organization at eBay. trainings, with a specific focus on recovering from childhood sexual abuse and the building SHARON HAWA began her emergency DAWN DANIELS HENNESSY, Aaron of resilience and “active prevention skills.” management career with the American Red Fisher’s mother, co-authored Silent No Cross in Greater NY following the tragedies More, Victim 1’s Fight For Justice Against MARK HILTS is currently assigned as a of 9/11. She spent the next 12 years working Jerry Sandusky, along with Aaron and his Supervisory Special Agent with the FBI’s and volunteering with the Red Cross disaster psychologist Michael Gillum. Dawn is the Behavioral Analysis Unit 3 (BAU-3), which response units in both NY and later at their mother of three and has been very involved in is a component of the National Center for HQ in Washington D.C. Sharon also spent her children’s school experiences. Dawn has the Analysis of Violent Crime (NCAVC). He many years working for the NYC Office been instrumental in developing community is responsible for providing assistance to of Emergency Management as a human support for students who face challenges in law enforcement agencies involved in the services planner and member of the external the school system. She has long advocated investigation of crimes against children. affairs unit, helping to coordinate assistance for equal and fair treatment for all, and anti- He has been assigned to the NCAVC since during several large-scale emergencies in bullying policies and procedures. Although 1995, and has consulted with hundreds the NYC area. Sharon has a vast knowledge Dawn was recently married and spends a of investigators and prosecutors on serial of disaster planning and operations great deal of time with her family, she also murders, child abductions, and sexual management, coordinating response efforts devotes herself to advocacy by speaking at assaults. Mark has over 31 years of law and training large work forces. public events. enforcement experience, including 25 years as an FBI special agent, and 6 years as a STALEY HEATLY has served as the RIC HERTEL is the elected Prosecuting police officer with the Plano, Texas Police District Attorney for the 46th Judicial Attorney in Ripley County, Indiana. He has Department. District since 2006. As the sole attorney in been faculty for the National District Attorney’s his office, he handles all felony cases from Association (NDAA), teaching trial advocacy, TODD HOFF is a detective with the intake through appeal. Staley is a member sexual assault, domestic violence, train the Montgomery County Sheriff’s Office, Crimes of the public policy committee of the Texas trainer, and civil liability. He has presented Against Children Division. He has been with Council on Family Violence and is a member for the Indiana Coalition Against Domestic the Sheriff’s Office for more than 12 years. of the board of directors of First Step, Inc., a Violence (ICADV) on expert testimony and Todd was awarded the 2004 Peace Officer domestic violence shelter. He is also on the sexual assault. He has also taught at the of the Year by the Chamber of Commerce for board of directors of the Texas District and National Symposium for Child Abuse in the Humble area, and the 2008 Outstanding County Attorney’s Association. Staley has Huntsville on the MDT. He was instrumental Officer Award by the East Montgomery trained police officers and prosecutors in SPEAKERS in starting Indiana’s first regional CAC that County Improvement District. He holds an the investigation and prosecution of family serves 6 rural counties. Mr. Hertel currently Advanced Peace Officer Certification and violence cases. serves on the CAC’s board of directors. has investigated hundreds of cases involving child abuse. NANCY HEBERT is the Chief Prosecutor CRAIG HILL retired after 35 years over the Crimes Against Children and of service as a Deputy Chief of Police in PATRICIA HOGUE is the Special Domestic Violence Divisions for the Leawood, Kansas, and currently serves as the Projects Attorney for Texas Loves Children, Montgomery County D.A. Office. Nancy Associate Director of Training and Outreach Inc., a nonprofit organization that provides is board certified in criminal law and has for the National Center for Missing and resources and support to attorneys and tried many child abuse cases. Nancy offers Exploited Children (NCMEC). Having worked judges who handle child abuse cases. As a presentations to PTO/PTA organizations and several crimes against children cases during former prosecutor with Dallas County for children in an effort to increase awareness his career, he is currently presenting training nearly 14 years, Patricia handled several and Internet safety, and educate professionals to law enforcement personnel throughout the hundred-child abuse cases. As Division on mandatory reporting. Nancy offices at country, regarding the recommended policy Chief from 1999-2006, she had oversight of the CAC, Children’s Safe Harbor, where she and procedures for those first responders to the Division’s staff and the 1,200+ pending

60 August 12-15, 2013 | Dallas, Texas | cacconference.org felony child abuse cases. She received her MARISELA JACAMAN is the First JESSICA KENTON is a Senior Analyst in J.D. from University of Houston Law Center, Assistant District Attorney for the 49th the Case Analysis Unit (CAU) at the National and has held her Texas Law license since Judicial District in Laredo, Texas. She Center for Missing and Exploited Children 1990. received her Texas law license in 1993 and (NCMEC). The CAU provides analytical is licensed in the US District Court for the support to NCMEC case managers and RYAN HOLLIMAN is currently a core Southern District of Texas. She has served law enforcement in their efforts to recover faculty member at Walden University in the as a Criminal Justice Instructor at Laredo missing children, identify the unidentified mental health-counseling program. He has Community College and as a Director of the deceased, and track attempted abductions. a wide range of clinical experience working Webb County Bar Association. Jessica started at NCMEC in 2009 tracking with children through play therapy, activity and analyzing attempted abductions. therapy, psycho educational assessment, MIKE JOHNSON is a retired 28- Currently, she specializes in deceased child and filial therapy. Dr. Holliman has been year veteran of the Plano, Texas Police cases, cold cases, and long term missing involved in research developing play therapy Department where he investigated child child cases. Prior to NCMEC, Jessica served assessment instruments and investigating abuse for 24 years. In August 2010, he in the U.S. Army Reserves, and completed her the impact of play therapy on academic became the Director of Youth Protection for Master’s degree in Forensic Psychology. achievements. the Boy Scouts of America and now works closely with BSA executives to help ensure GREG KESNER is an Internet Security LANAE HOLMES is a Licensed Clinical the safety of all Scouting members. Mike Expert, with over 20 years of experience, Social Worker and is the Senior Family is a founding member of the Collin County working for the FBI in the technical area for Advocacy Specialist for the Family Advocacy Children’s Advocacy Center, has served collection systems, meant to collect data Division of the National Center for Missing on the National Board of Directors for the pursuant to lawful legal process or from & Exploited Children (NCMEC). In her role at American Professional Society on the Abuse Consent of the user. This area encompasses NCMEC, Lanae provides direct services and of Children (APSAC), and was past President both criminal statutes, as well as many support to families of missing and exploited of the APSAC Texas State Chapter. National security statutes both in the U.S. and children and manages the Safeguard abroad. This required the development of an Program for NCMEC staff exposed to child JUSTIN KEITER is currently assigned as expert knowledge base in architecting data pornography content during their daily work. the Chief Prosecutor in the Major Narcotics collection systems for use on the Internet, Lanae has participated in numerous trainings Division of the Harris County District collecting covert communications, and and conferences; teaching the benefits of Attorney’s Office in Houston, Texas. He is selecting data from private networks. the Safeguard Program and addressing the actively involved in the prosecution of child therapeutic needs for missing and exploited sexual assault cases and he handles some BRIAN KILLACKY recently retired children and their families. larger grand jury investigations of child from the Cook County State Attorney’s predators. Office (CCSAO) and is now an investigative KRISTEN HOWELL, MSW, has worked consultant and instructor in , in the field of social work and family violence SHEQUITTA KELLY is an Assistant Missing Person, Homicide, and Sexual for the past 17 years. She is currently working District Attorney in Dallas County, Texas. Exploitation of children. Before retiring, Brian as Director of Development for Salesmanship She received her law degree from Indiana was a Sergeant in Investigation Bureau Club Youth and Family Centers, a non-profit University in 2003. After graduating, supervising the Complex Murder, DNA, and that helps at-risk children develop, repair, Shequitta subsequently joined the Allen Wrongful Conviction Units from 2010-2013. and maintain social and emotional health. County prosecutor’s office where she For 12 years prior he was a Chicago Police The programs include therapeutic services, prosecuted domestic violence cases for Detective and Investigator with the CCSAO in a laboratory school for at-risk children, and six years. In 2009, she joined the Dallas the Cold Case Murder Unit. From 1990-1998, training for thousands of education and District Attorney’s office where she currently Brian was a Violent Crimes and Homicide mental health professionals each year. She prosecutes child abuse cases involving both Detective with CPD, and from 1986-2002, he trains and speaks nationally on the impact of physical and sexual abuse. was a Hostage Negotiator with the CPD SWAT SPEAKERS violence and trauma on families. Unit. He presented at the first Crimes Against JULIE KENNISTON is the Director of Children Conference. REENA ISAAC is a child abuse Training and Education at Butler County pediatrician with the Child Abuse Pediatrics Children Services in Hamilton, Ohio, and the GENE KLEIN, LCSW, is the Executive Team at Texas Children’s Hospital in volunteer Executive Director of The Center for Director of Project Harmony, a non-profit child Houston, TX. She is an Assistant Professor Family Solutions. Julie trains for the Office of welfare agency providing services to enhance at Baylor College of Medicine and staff Juvenile Justice and Delinquency Prevention, the quality of child abuse investigations. physician at the Harris County Children’s the American Professional Society on the He has more than 24 years of experience Assessment Center Medical Clinic. At Texas Abuse of Children (APSAC), the National in agencies serving children and families. Children’s, she assists in the Child Protection District Attorneys Association, and the Ohio Gene serves on the board of directors for the medical consultation service in identifying, Attorney General sponsored Finding Words National Children’s Alliance in Washington, evaluating, and diagnosing suspected child Ohio. She also coordinates and trains the D.C., the Nebraska Foster Care Review Board, maltreatment cases. Dr. Isaac has conducted Child Forensic Interviewing Training for The the Governor’s Commission for the Protection several medical investigations of suspected Childhood Trust. She was previously a Sexual of Children, and the Omaha Archdiocese medical child abuse cases, and has testified Abuse Investigator for Hamilton County Review Board for the Protection of Children. as an expert witness in both family and Department of Human Services where criminal court. she conducted more than 3,000 forensic interviews.

August 12-15, 2013 | Dallas, Texas | cacconference.org 61 CHRIS KOLCHARNO is currently a to teach law enforcement officers protocol APSAC, and the 2009 recipient of the Lifetime detective with the Lackawanna County and investigative techniques in CSEC Achievement Award for Outstanding Service District Attorney’s Office, supervising the investigations. from the National Children’s Advocacy Center. Special Victims Unit. He has been exclusively He presented at the first Dallas Crimes investigating crimes against children DAVID KULLGREN is a 12-year Against Children Conference. since 2001. He is a certified trainer for the veteran of the Newtown Police Department Pennsylvania Municipal Police Officer’s and currently holds the rank of Sergeant. JOE LARAMIE retired as a Lieutenant Education and Training Commission and a His collateral duties include motor vehicle after 31 years of service from the Glendale, member of the Pennsylvania State Police accident investigator, coordination of the MO Police Department in 2010, where he was Area II Computer Crime Task Force, the Citizen Police Academy and the Police assigned as the Commander of the Missouri Pennsylvania ICAC Task Force, and the FBI Explorers. Prior law enforcement experience Internet Crimes Against Children (ICAC) Task Scranton Resident Agency. Chris had the first includes the Federal Bureau of Prisons and Force since 2003. From 2010-2011, he asset forfeiture seizure in the Commonwealth the Candlewood Marine Patrol. He was the was Administrator of the Missouri Attorney of Pennsylvania from a child abuse case, patrol supervisor and responded to the General’s Computer Forensics Lab. Joe is a radio station from a preferential child Sandy Hook School shooting. His goal is to a nationally known speaker on the topic of molester. This seizure was the reason for the educate fellow law enforcement on lessons online crimes against children, technology asset forfeiture provision, which was written learned from this event related to the initial safety, and cyber bullying. into Pennsylvania’s version of Jessica’s law. law enforcement response to this event. GLYNN LEBLANC is a senior instructor for NEAL KRAWETZ has a Ph.D. in RONALD LANEY was the Senior Advisor AccessData, specializing in the investigation Computer Science and more than 25 years of to the Administrator on Law Enforcement and examination of computer-related crime. computer security experience. His research and Victimization Issues from 2010 until his Before joining AccessData, he served 17 focuses on anti-anonymity technologies, retirement in December 2011. Prior to that years in the Gonzales Police Department with a focus on digital document and photo position, he was the Associate Administrator and Ascension Parish Sheriff’s Office, where forensic technologies. Dr. Krawetz runs of the Child Protection Division, administering he formed the Computer Crimes Unit in Hacker Factor Solutions (www.hackerfactor. projects, programs, and initiatives related 2001. Glynn has conducted high tech crime com), a company dedicated to security- to crimes against children and children investigations and digital evidence analysis oriented research and solutions. He is the exposed to violence. From 1993-2000, he since 2001, as both a sworn law enforcement author of three books and numerous articles, served as the Director of the Missing and officer and a private sector consultant. He and is a popular speaker at local and national Exploited Children’s Program. From 1981- has also been active in the education of law conferences. In 2012, Dr. Krawetz founded 1993 as OJJDP’s Law Enforcement Program enforcement officers, government agents, the FotoForensics.com online service, where Manager, he developed a series of national and military investigators as a member of the the public can to try out digital photo forensic law enforcement training programs that are IACIS Training Committee and Certification tools. still offered throughout the country today. Committee.

VIKTORIA KRISTIANSSON is an JAN LANGBEIN currently serves as JENNIFER LEE is the Senior Program Attorney Advisor for AEquitas: The Prosecutors’ Executive Director of Genesis Women’s Strategist for NCMEC’s Child Victim Resource on Violence Against Women. Prior Shelter and Support in Dallas. She is Identification Program (CVIP). She has to joining AEquitas, Vikki served as a Deputy responsible for overseeing the agency’s spent the past 12 years fighting the sexual Attorney General and Special Assistant to internal and external operations as well as exploitation of children. In 2002, she assisted the Attorney General of New Jersey. She funding and community education. Jan has in the creation and development of the Child originally joined New Jersey’s Department conducted training, keynote, and workshop Victim Identification Program, after working of Law and Public Safety as a prosecutor programs for numerous local and national as an analyst for the CyberTipline. In 2007, specializing in human trafficking in the Major colleges, social and civic organizations, and Jennifer relocated to Oregon where she now Crimes Bureau of the Division of Criminal corporations. For more than 20 years, she works to help improve the daily processes Justice. She also served as a Senior Attorney has been an activist in efforts to end violence within CVIP to assist law enforcement and for the National Center for the Prosecution of against women. In 2008, Jan served as the prosecutors with rescuing children and Violence Against Women, and as an Assistant Senior Policy Advisor to the Director of the securing convictions in child pornography District Attorney in Philadelphia, where she United States Department of Justice, Office crimes.

SPEAKERS focused on the prosecution of cases involving on Violence Against Women (OVW). Jan sexual assault, intimate partner violence, and is the recipient of the FBI Director’s 2012 ALEXANDRA LEVI is a Forensic child sexual and physical abuse. Community Leadership Award. Interview Specialist (FIS) for Homeland Security Investigations (HSI). She has been a ALAN KROK worked for the Chicago KENNETH LANNING was a Special social worker focusing on child abuse related Police Department for 26 years in the Special Agent with the FBI for more than 30 years issues since 1998, working as a forensic Investigations Unit and was a member of the and was assigned to the FBI Behavioral interviewer, and a psychotherapist. With HSI, Cook County Internet Crimes Against Children Science Unit at the FBI Academy most of she works with all victims of crime, focusing Task Force investigating cases of commercial that time. He has been involved in training, primarily on investigations involving child sexual exploitation of children (CSEC), child research, and case consultation in the area exploitation and human trafficking. Ale also pornography, and Internet related cases of sexual victimization of children for 40 provides consultation and training for HSI involving children. He is currently working years. Kenneth is the 1990 recipient of the agents and other federal, state and local law as a consultant with Girls Educational and Jefferson Award for Research from the enforcement and other organizations around Mentoring Services (GEMS) of New York, University of Virginia, the 1996 recipient of the world. providing trainings throughout the country the Outstanding Professional Award from

62 August 12-15, 2013 | Dallas, Texas | cacconference.org CRYSTAL LEVONIUS is the Chief office, Matthew regularly participates in Colorado’s Sex Offender Management Board, Prosecutor in the Crimes Against Children trials involving child crimes because of his serving as Director of the Colorado Coalition Division at the Collin County District Attorney’s commitment to Arizona’s children. He trains Against Sexual Assault, and serving as Office. She prosecutes cases involving child law enforcement and fellow prosecutors on Program Director for an agency that assisted victims, ranging from Indecency with a Child all aspects of child crime investigations. professionals with developing resilience to to Capital Murder. Crystal earned her JD in secondary trauma. two years from Southwestern University TIMOTHY LOTT is a Training Specialist School of Law in 1999, as part of the SCALE in the High-Tech Crime Training Services CHRISTOPHER MERCADO has program. While a student, she was a member Department of SEARCH, The National been a Special Agent with U.S. Immigration of the Trial Advocacy Honors Program and Consortium for Justice Information and and Customs Enforcement (ICE), Homeland interned in the Crimes Against Peace Officer’s Statistics, where he provides training on Security Investigations (HSI), in San Diego, Section of the Los Angeles County District high-tech crime investigations and forensics CA since 2009. He is currently assigned to Attorney’s Office. Crystal has been in Collin to local, state, and federal justice and public the HSI San Diego Cyber Crimes group, and is County since 2004. safety agencies. Tim has advanced training a full time member of the San Diego Internet in computer forensics investigations and data Crimes Against Children (ICAC) task force. DON LEWIS is a High-Tech Crime Training recovery. He was assigned to the Sacramento His duties include investigating criminal Specialist in the High-Tech Crime Training Valley Hi-Tech Crimes Task Force, where he violations relating to child exploitation and Services Department of SEARCH, The conducted probation compliance checks on the possession, receipt, distribution, and National Consortium of Justice Information offenders who were placed on probation for production of child pornography. and Statistics. Before joining SEARCH in offenses involving the possession of child 2012, he served for 23 years with the pornography, stalking through the use of JESSICA MIDKIFF was exploited from Lakewood (Colorado) Police Department, social networking sites or cellular devices, the ages of 11-21 on the streets of L.A. most recently as a Forensic Computer and identity theft. until she was finally able to escape with the Analyst. Don ran the forensic computer lab help of the Mary Magdalene Project. After and was responsible for all aspects of digital CHRIS MADSEN is the Legal Director, connecting with the Mary Magdalene Project, evidence, from collection through analysis. U.S. Compliance & Security at Yahoo!, where and beginning her own path of healing and He was also a Police Imaging and Technology his responsibilities include advising on recovery, Jessica decided that she wanted to Specialist, which involved analyzing images compliance with law enforcement requests honor the second chance she had been given and creating imaging policies. for user data. Prior to joining Yahoo!, Chris by giving back to girls who were currently spent five years with the Department of trapped in the commercial sex trade. TY LIM is a Team Lead on the Legal Justice where he advised the FBI on the legal Jessica completed her program at the Mary Investigations Support team at Google Inc. authorities available to obtain user data from Magdalene Project and joined the staff as a specializing in data disclosure, the Electronic companies like Yahoo!. youth advocate and program assistant for the Communications Privacy Act, and child domestic minor sex trafficking program. protection. Mr. Lim graduated with a Bachelor ELLEN MAGNIS is the Chief of of Arts degree in Political Science, Asian External Affairs for the Dallas Children’s ANNE LUKAS MILLER is a Forensic American Studies, and Ethnic Studies from Advocacy Center. She oversees the agency’s Interviewer and Training Coordinator for the University of California, Berkeley in 2005. educational efforts, marketing/PR, and Corner House. Since joining the staff in legislative relationships. She is responsible 1993, she has conducted more than 3,500 AMY LOCKHART is an Assistant Criminal for the Crimes Against Children Conference, interviews with children, adolescents, and District Attorney in Hays County, Texas. She is including coordination of key partners and vulnerable adults. She has trained thousands an experienced trial attorney who specializes sponsors. In 2012, Ellen was selected as one of multidisciplinary professionals from across in prosecuting crimes against children. of 20 non-profit leaders in North Texas to the globe in forensic interviewing skills. Anne participate in The Op-Ed Project. The goal of is directly involved in the ongoing process of

KENNETH LOGAN has been a member the experience was for women to lend their reviewing research and literature, as well as SPEAKERS of the PayPal Anti Child Exploitation (ACE) voices to discuss their causes on a larger developing and implementing trainings. Prior team, as both an agent and a manager. stage. Ellen participated in an international to Corner House, Anne had more than 10 years In his current role as Senior Investigator, webchat with and had an Op-Ed published in experience in juvenile probation, residential he is responsible for creating/maintaining The Guardian and Al Jazeera English. She is treatment, and county-administered social logical models to detect transactions related now a frequent contributor to The Huffington services. to illegal goods/services. In addition to Post. Ellen has an undergraduate degree in the development of detection models, he Interdisciplinary Studies and an MBA from continues to manage the ACE team and the University of Texas at Dallas. participate in several industry coalitions dedicated to the eradication of online child JEAN MCALLISTER owns her own exploitation. business, JGM Consulting LLC, providing training and consultation regarding MATTHEW LONG is the Major Offender interpersonal violence and trauma. She serves Bureau Chief of the Pinal County Attorney’s as an expert witness in sexual assault, child Office in Arizona. Despite being a supervisor sexual abuse, child abuse, domestic violence, of this bureau, he maintains a full case load victim trauma reactions, and offender enabling him to prosecute violent crimes management. Her experience includes including capital cases. Although no longer supervising a domestic violence shelter, assigned to the Special Victims Unit of his counseling trauma victims, administering

August 12-15, 2013 | Dallas, Texas | cacconference.org 63 SHANNON MILLER received her and skills to assist in the successful DENNIS NEBRICH CFI® is currently Bachelor of Arts from State investigation and prosecution of criminal a Special Agent for the Arizona Attorney University in 1996 and her JD from South cases involving digital evidence. She earned General’s Office and has been an instructor Texas College of Law in 2000. She served as her Master’s Degree in Forensic Computing for Wicklander-Zulawski & Associates, Inc. a prosecutor for the Brazoria County District and Cyber Crime Investigation through since 2000. In 2007, Dennis retired from the Attorney’s Office in both the misdemeanor University College, Dublin. Phoenix Police Department after 32 years and felony trial divisions from 2002-2006. In of service. He held a variety of positions 2006, she joined the Collin County Criminal MARY MURPHY is a Detective including Detective, Detective Supervisor, District Attorney’s Office, where she has Lieutenant with the Rockland County District and Sergeant in the Professional Standards served as a misdemeanor court chief and a Attorney’s Office and has been a sworn law Bureau. As a Certified Forensic Interviewer, felony prosecutor. Shannon joined the Crimes enforcement officer since 1978. When she Dennis has taught interview and interrogation Against Children Division in 2008, where she was a detective, assigned to the Special at the Phoenix Police Academy and at local, uses her trial skills and passion for justice to Victims Unit, she investigated and assisted in state, and federal agencies throughout the protect child victims of crime. the prosecution of crimes against the most country. Dennis has also presented at law vulnerable in our society. Mary is currently enforcement conferences including the CODY MITCHELL is a Texas Ranger the Director of the Spirit of Rockland Special National Symposium on Child Abuse in 2011 and has been a Texas Peace Officer for Victims Center in Suffern, New York. She is a and the Southern Illinois Child Death Review approximately 13 years. He has served as a state and municipal certified police instructor Task Force in 2012. Peace Officer, including Patrol, Investigations, on general topics, as well as a certified and as a Criminal Interdiction Officer. Cody instructor in New York State Children’s NANCY NEMER is an Assistant Attorney has served the past 6 years with the Texas Justice Task Force, Forensic Interviewing General with the Criminal Prosecutions Department of Public Safety, and is currently Best Practices. Division, Violent Crime and Major Offender assigned to the Texas Ranger Division. He is Section, of the Texas Attorney General’s responsible for major investigations in the KEVIN NAVARRO is a retired detective Office. She is responsible for providing legal central counties of Texas. During his service with 31 years of service to the Dallas advice and assistance to local prosecutors with the Texas Department of Public Safety, Police Department. The last 15 years of his and law enforcement agencies throughout Ranger Mitchell has worked closely with the career, he was assigned to the Dallas Police Texas. Nancy’s duties entail the performance NCMEC, FBI, Behavioral Analysis Unit-3 and Academy where he developed curriculum of all phases of criminal prosecution from Texas Attorney General’s Office to develop and provided advanced instruction in topical investigation through trial and appellate and implement the Interdiction for the areas including interrogation, use of force, processes, including, but not limited to, Protection of Children (IPC) program. principles of criminal investigation, and conducting highly complex and sensitive officer survival. Kevin began his career in Grand Jury investigations and presentations LOUIS “CHIP” MORLIER is a professor 1981 and after 6 years as a patrol officer, and developing evidence through witness of criminal justice at Pennsylvania State he joined the department’s Crimes Against interviews. University. His areas of expertise include child Person Division where he investigated felony exploitation and commercial sex trafficking. assaults and family violence. In 1989, he NICHOLAS NEWMAN has specialized His research focuses on the use of social joined the Homicide Unit where he served in network forensics, penetration testing, and ecological theory and routine activities theory for 7 years. Kevin was the lead detective on wireless site survey for more than a decade. to explain lapses in the criminal justice 108 homicide cases while assigned to the In addition to his expertise with wireless response to child abuse allegations. Homicide Unit and successfully cleared 80% networks, Mr. Newman is the team lead for of those cases. NW3C’s Wireless Network Investigations JOEL MURO is an Associate Professor computer forensic course, and has trained and Program Coordinator for the Counseling JAMES NAWOICHYK is the Director more than 4,000 law enforcement officers program at Texas Woman’s University. His of Campus Safety at St. Thomas Aquinas in forensic tools and methodologies ranging current research focuses on the incorporation College (STAC). Previously, he worked for from basic device recognition to advanced of play therapy in school counseling, and the Orangetown Police Department, serving filesystem analysis and cybersecurity. Mr. the impact of play therapy services in the with the Orangetown Detective Bureau. He Newman is also the creator of NW3C’s schools. Joel is also a significant volunteer conducted juvenile and adult investigations. TUX4N6™ forensic tool. He holds a Bachelor in the Denton Independent School District, Certifications include: FBI Basic /Advanced of Science Degree in Information Systems

SPEAKERS which has laid the groundwork for conducting Fingerprint, Advanced Latent Techniques Security, as well as the CEH, Network+, and research and providing therapeutic services and Basic Photography Courses; NYPD A+ certifications. to local children. Homicide Investigation and Sex Crimes/ Child Abuse Investigation Courses; NYS COLLEEN NICK is the mother of Morgan CINDY MURPHY is a detective with the Criminal Investigators Course, Juvenile Nick who was 6 years-old when she was City of Madison, WI Police Department and Officers Course, Police Instructor Course, kidnapped from a Little League baseball has been in law enforcement since 1985. Ethnical Awareness Moderator, and D.A.R.E. game on June 9, 1995. After this tragedy, She is a certified forensic examiner, and has Certification. He retired as the Command Colleen formed the Morgan Nick Foundation been involved in computer forensics since Sergeant Major Camp Smith Training Site, in 1996 and serves as full-time Executive 1999. Cindy has directly participated in the New York Army National Guard. He received Director. The foundation assists thousands examination of hundreds of hard drives, cell his Master’s in Public Administration from of families in crisis, providing intervention, phones, and other items of digital evidence Marist College. support, and reunification to children and pursuant to criminal investigations. She has their families. Colleen was a co-creator of testified as a computer forensics expert in Team H.O.P.E. and now serves as a senior state and federal court, using her knowledge team coordinator, providing immediate and

64 August 12-15, 2013 | Dallas, Texas | cacconference.org ongoing support to families. She also serves can play in the prevention and investigation examiner for McKeesport Police Department on the Board of Directors for the National of Internet crimes against children. John has for four years. Kurt has earned a number of Center for Missing and Exploited Children helped develop advanced victim identification certifications during his career; including and travels the nation to provide training to tools and techniques and train police officers GCFA, CFCE, MCSE, Network +, and A+. law enforcement about the issue of missing and federal agents on their implementation. and exploited children. His overarching mission is to foster better SHANTAL POOVALA has been working communication between law enforcement on Child Safety issues at Google for the JOHN PALMER is a 26-year veteran of and the software industry and to promote a past 10 years. During this time she has the Dallas Police Department. He served as better understanding of the challenges both project managed Engineering, Product, and a DPD Homicide Detective for 15 years, and face. Legal efforts to build cutting-edge tools and a Detective in the Felony Assault Unit. John develop procedures and systems to eliminate has presented at the Michigan Prosecuting KENNETH PENROD is a sergeant and child sexual abuse images from Google’s Attorney’s association and at the Crimes has been a police officer for 25 years. He is products. She manages Google’s operational Against Children Conference. He has been a currently the supervisor of the Montgomery relationship with NCMEC, and reporting for regular guest speaker and adjunct instructor County Police Vice and Intelligence Unit. child sexual abuse images. Poovala also at the Federal Law Enforcement Training He has held his current position for the engages directly with law enforcement Centers (FLETC) on the topic of Advanced past 6 years. Prior to this assignment, he agencies to provide assistance and training Interview and Interrogation. John has held supervisory assignments in both the with investigation and reporting of child served as a past member on the National Homicide and Internal Affairs Division. sexual abuse images. Advisory Board of the FBI Violent Criminal Before his promotion in 2004, Kenneth held Apprehension Program (ViCAP). assignments as a detective in Homicide, SHANNON POSERN began working Robbery, Criminal Investigations Division, and for the National Center for Missing and TERRI PATTERSON is a Supervisory Special Investigations Division. Exploited Children (NCMEC), Texas Regional Special Agent (SSA) who entered the FBI in Office in 2008 and currently serves as the 1997 and was assigned to the Miami Division MARCUS PENWELL is a 10-year Program Manager for the state of Texas. In where she investigated violent crime and veteran of the Franklin County Sheriff’s Office this role, she is in charge of promoting and Crimes Against Children (CAC). She later and has been a detective in the Special implementing the many safety initiatives of supervised the Miami Division’s first CAC Investigations Unit since 2008. Since this NCMEC including NetSmartz, Take 25, and squad and served as a Program Manager assignment, he has worked with the Franklin the Campaign Against Sexual Exploitation at FBI Headquarters before being assigned County Internet Crimes Against Children Task (C.A.S.E.). She has also given countless to the National Center for the Analysis of Force, conducting online child enticement, presentations on internet and real world Violent Crime (NCAVC), where she serves child sexual abuse, and child pornography safety to a variety of audiences including as Unit Chief of the Behavioral Analysis cases. Marcus is a cross-designated law enforcement, corporate employees, Unit III. Terri holds a Ph.D. in Psychology. task force officer with the Department of educators, parent organizations, teens, and She has conducted research in the area of Homeland Security Investigations, and he has children. witness memory and behavioral indicators successfully investigated federal production, of deception and is currently engaged in distribution, and receipt of child pornography DAN POWERS, LCSW, serves as Senior research on the behavioral aspects of child cases resulting in the rescue of several Vice President and Clinical Director for prostitution and international child sex children from sexually abusive homes. He Children’s Advocacy Center of Collin County tourism. is currently working on a Masters Degree in in Plano, Texas. He supervises a staff of 22 Forensic Psychology. therapists and clinical interns providing no DAVID PEIFER has been a law cost services to victims of child abuse and their enforcement officer for 29 years and the CHRIS PÉREZ is a 16-year veteran of non-offending family members. Dan has more supervisor of the Delaware County District the Chandler Police Department in Arizona. than 20 years of experience working within the

Attorney’s Criminal Investigation Division’s Sergeant Perez is a seasoned sex crimes field of child abuse, sex offenders, and family SPEAKERS Child Abuse Unit for 10 years. He has received investigator and adjunct college professor violence. Dan has presented at major national more than 900 hours of training in the field of who has investigated numerous complex and regional conferences and is best known child physical and sexual abuse as well as cases and worked undercover online. He for his presentations on wellness and survival the use of the Internet by sexual offenders to has managed media and investigative for child abuse professionals. He is a member seduce, entice, and gain access to children strategies for high media interest cases and of the Texas Children’s Justice Act Task Force for the purpose of sexual exploitation. His collaborated with numerous municipal and and in 2011, was appointed by Governor Perry experience includes areas of investigation Federal agencies. as the presiding officer of the Texas Office of that deal with child pornography and the Violent Sex Offender Management. characteristics of various child molester KURT PETRO is a Computer Crime profiles. He is currently on the board of Specialist with the National White Collar Crime directors for the National ICAC Program and Center’s (NW3C) Computer Crime Section Co-Chairman of the training committee. (CCS). He is the Team Lead for the Macintosh and iDevice curriculum and also teaches a JOHN PENN II, Senior Solutions Architect number of the CCS courses; including WinArt, for Law Enforcement Technologies at Adobe IDRA, BDRA, STOP, and BCPI. Prior to his in San Jose, California, has spent more than tenure at NW3C, Kurt worked for two years three decades writing software. Most recently, at Hewlett-Packard (HP) providing computer he spent 11 years working at Adobe as a forensic, eDiscovery, data recovery, and Senior Computer Scientist on Photoshop. incident response services to HP and outside He is currently focusing on the role software clients. He was also a non-sworn forensic

August 12-15, 2013 | Dallas, Texas | cacconference.org 65 DEREK PRESTRIDGE is a Sergeant with Sector Security. Before beginning his career JOHN ROLATER has been an Assistant the Texas Department of Public Safety where in the private sector, Brian was with the Criminal District Attorney for Collin County he has served for 17 years. He is currently Bergen County Prosecutor’s Office as a and Chief of the Appellate Division since assigned to the Department’s Education Detective in the Special Victim’s Squad 2007. John has been involved in the post- Training and Research. In this assignment where he concentrated on conducting on-line conviction litigation of several high-profile he has worked closely with NCMEC and FBI undercover investigations that involved the capital cases. He has led reinvestigations Behavioral Analysis Unit-3 to develop and sexual exploitation of children. and represented the State in litigation related implement the Interdiction for the Protection to exonerations. John has been a legislative of Children (IPC) program. Derek has been JEFF RICH has been assigned to the Plano, liaison for both the Collin and Dallas County recognized for his efforts in various forms of Texas Police Department’s Family Violence Criminal District Attorneys and he has taught interdiction and has been recognized by the Unit as a Child Abuse and Violent Crimes continuing legal education courses for NCMEC Texas Regional Office as a recipient Investigator since 2000. Detective Rich TDCAA, the State Bar of Texas, the Center for of the Texas Children’s HERO Award in 2010. investigates Internet crimes against children American and International Law, the Texas and conducts online child exploitation Center for the Judiciary, and UT-CLE. He is EREN PRICE is an Assistant District investigations as a Special Deputy U.S. Board Certified in Criminal Appellate Law by Attorney in the Dallas County District Marshal assigned to the FBI’s Innocent the Texas Board of Legal Specialization. Attorney’s office where she has been Images Task Force. Jeff has received the assigned to the Child Abuse Division for the Child Advocate of the Year award from the CHRIS ROOSENRAAD is the director of past 11 years. Her current responsibilities Collin County Children’s Advocacy Center Systems Applications at Time Warner Cable, include coordinating all physical and sexual and was presented with the U.S. Department as well as co-chairman of the Message/ abuse investigations and prosecution efforts of Justice Eagle Award for his efforts in Malware/Mobile Anti-Abuse Working Group. for all Dallas County law enforcement, the the investigation of online crimes against trial of complex cases, as well as acting as a children. SHYAMA ROSE finally testified against liaison between the District Attorney’s Office her sexual abuser, Prakashanand Saraswati, and the Dallas Children’s Advocacy Center. STEVE RICHARDSON is the Special in 2011 after waiting more than three years Agent-in-Charge of the FBI’s Mobile Division. for trial. Along with two other complaining SHEILAH PRIORI is a Forensic Nurse From 1991 until 1996, he served as a witnesses, she abandoned the Hindu cult Examiner for the Scott & White Hospital special agent with the Tennessee Bureau of and the family she was born into to pursue Emergency Department in Temple, Texas. She Investigation (TBI), where he received both justice. Due to her testimony, Prakashanand is a Board Member of the Children’s Advocacy the TBI Medal of Valor and the TBI Employee was convicted but escaped to India. Shyama Center in Belton, Texas and a member of the of the Year awards. In 2011, Steve was now survives in New York City as a security Central Texas Family Violence Task Force promoted into the FBl’s Senior Executive professional and a speaker for RAINN. where she participates in a multidisciplinary Service in the Inspection Division, where he team regarding domestic violence in the Bell served as an inspector with the Office of ANDREW ROSEN has over twenty years County area. Sheila is active in educating Inspections. He earned a Masters of Business of experience in Data Forensics and regularly the medical, law enforcement, military, and Administration degree from Duke University’s provides software, training and assistance to advocate communities on the role of the Fuqua School of Business. International, Federal, State and Local Law forensic nurse examiner. In addition to her Enforcement Agencies. The creator of EnCase nursing duties, she provides expert testimony JENNIFER RICHERT is an involved and numerous other data forensic tools and on cases with which she has been involved. mother of three children and also a high the lead examiner of the Enron investigation, school teacher. She is telling her story of Rosen provides unique insights and solutions READE QUINTON is a board certified trying to find justice for her children while to the challenges of conducting data forensic forensic pathologist employed by the divorcing a sexual predator. Jennifer is examinations. Southwestern Institute of Forensic Sciences sharing her story for the first time with the (SWIFS) in Dallas, Texas and is an Associate public at this year’s Conference. JONATHAN ROUSE is a 29-year veteran Professor of the Department of Pathology Detective Inspector with the Queensland at UT Southwestern Medical Center. He is JOHN ROBERTSON has managed Police Service in Australia. He is a member the medical examiner representative to the federal grants through the office of of the State Crime Operations Command Dallas County Child Death Review Team and Administration of Children and Families to: Task Force Argos, which is responsible for investigating Internet related victimization of SPEAKERS the Texas State Child Fatality Review Team, build capacity in emergency youth shelters and was awarded the 2013 Lt. Bill Walsh to serve minor victims of human trafficking, children. Throughout his career, Jon has been Service Award for his work with abused build infrastructure resiliency in grassroots involved in several international child sexual and neglected children in Dallas County. organizations in southwest Florida, and abuse and child pornography investigations Dr. Quinton is the director of the Forensic provide training and technical assistance to including Operations Conduit, Koala, Achilles, Pathology training program at SWIFS. emergency shelters serving runaway and and Wickerman. homeless youth in the United States. He has BRIAN REICH is the Director of Security served on numerous working groups for AMY RUSSELL is the deputy director Operations for Time Warner Cable with state and federal governments to develop for the National Child Protection Training responsibility for New York City and New new partnerships and solutions to the threats Center in St. Paul, Minnesota, where she Jersey. Brian was recently appointed to serve facing youth. John has strengths in online provides training and technical assistance as a member of NCMEC’s Law Enforcement training content development and delivery for child abuse professionals. She also Council and Operations Committee and systems and issue advocacy for issues facing serves as a pro bono attorney for children has lectured throughout the nation on the at-risk youth. in dependency court. Amy has worked with topic of Child Protection Policies for Private victims of violence and trauma in several

66 August 12-15, 2013 | Dallas, Texas | cacconference.org capacities, including, but not limited to Children’s Advocacy Center. He is a dynamic book Caught in the Web, about Internet extensive counseling and support work with speaker who is often a featured presenter child predators. His analysis and reporting child victims of abuse and as victim/witness at major conferences throughout the U.S. on child abuse has been featured in the coordinator in a U.S. Attorney’s office. In and Canada. Jonathan holds a Master’s New York Times, USA Today, and Readers’ addition, she has authored several articles degree in Educational Administration from Digest. Julian has addressed conferences on forensic interviewing and is a trainer on Boston College. In addition, he is an adjunct of educators, parents, childcare advocates, issues related to child maltreatment and professor at the University of North Texas. prosecutors, police, and judges. He works for crime-related trauma. the Toronto Star, Canada’s largest daily. AMBER SCHROADER is the CEO of MILES RUTKOWSKI works as a legal Paraben Corporation and has been a driving DIANE SIEGEL is a Forensic Interview analyst with Google’s Online Product Support force for innovation in digital forensics for the Specialist for Homeland Security Team. This is his second time presenting at past 20 years. She has developed software Investigations (HSI) where she is responsible the Crimes Against Children Conference. programs designed for the purposes of for conducting forensic interviews both recovering digital data from hand-held domestically and internationally, providing CAROL RYAN is the parent of a child devices, computer hard drives, and large- case consultation, case review, and trainings who was abducted. She speaks regularly at scale computer networks capable of storing for HSI agents and law enforcement. child safety conferences and emphasizes data from several thousand computers. Diane’s duties include case consultation and educating audiences about victim compliant Amber continues to bring forth new and coordination for a broad range of federal behavior and teaching ways to support exciting technology to the computer forensic crimes, providing direct services for victims families during reunification. Carol holds community. She coined the concept of the and identifying and establishing relationships a national advocate certification and is a “360-degree approach to digital forensics,” with key service providers. Prior to HSI, Diane trained parenting coach. She is also under pushing for a big-picture consideration of the was a bilingual forensic interviewer, clinical contract with NCMEC working as a Team digital evidence acquisition process. advocate, and outreach manager at the Hope consultant. Team Hope is a program Chicago Children’s Advocacy Center. that provides support and empowerment to JIM SEARS is a 28-year veteran of the families with missing or exploited children. To Irving Police Department. He has been MARK SIMPSON is a 32-year retired date, Carol has assisted nearly five thousand assigned to the Irving Family Advocacy veteran of the Arlington, Texas Police parents. Center since 2002. Jim has served as an Department. At the time of his retirement, instructor, investigator, and supervisor for he was the supervisor of the Crimes AISHA SALEEM is an Assistant United child abuse crimes since the 1990’s. Jim Against Persons Unit where he managed all States Attorney in the Northern District is on the course development team for the homicides, robberies, adult missing persons, of Texas. She worked as a Dallas County Shaken Baby Alliance and is an instructor for and kidnapping investigations. In 2004, he prosecutor for more than five years before Advanced Investigative Techniques through implemented the Department’s Cold Case joining the United States Attorney’s Office, the Texas Municipal Police Association. He Homicide Unit. He is a two-time recipient where she has worked a variety of criminal has taught throughout the State of Texas and of the department’s “Distinguished Service cases, including child exploitation offenses. is now on the curriculum development team Award,” and has been awarded the “Life for Fox Valley, assisting in forming a national Saving Award.” In 2007, he was named ELIZABETH SCAIFE is the Director of child abuse program. the United States Department of Justice Training at Shared Hope International. She “Law Enforcement Officer of the Year.” trains law enforcement, service providers, ALESSANDRA SERANO is an Assistant Since his retirement, Sergeant Simpson and community members across the U.S. Attorney in the Criminal Division and works as an independent consultant with U.S. on the issue of domestic minor sex the Project Safe Childhood Coordinator, Fox Valley Technical College teaching trafficking (DMST) and manages the ongoing primarily responsible for the coordination criminal investigative case management development and implementation of training of prosecutions of all child exploitation internationally. curriculum for diverse audiences. In addition offenses charged in the San Diego District. SPEAKERS to training, Elizabeth regularly provides Alessandra graduated from the University of JERI SKROCKI is a lieutenant with the technical assistance to juvenile justice and Miami School of Law in 1999. Prior to law Hays County Sheriff’s Office in San Marcos, child welfare agencies on how to improve school, she was a Deputy Probation Officer Texas. She has specialized in cases involving identification and response to minor victims. in Riverside County. In 2012, she received the physical abuse and sexual exploitation of She previously worked undercover with other the Attorney General’s Award for outstanding children since 1995. Jeri was instrumental professionals to document sex trafficking, community partnership to promote public in assisting the formation of a Children’s appearing most recently on a nationally safety, and in 2013, she received the “Top Advocacy Center for her community known recognized program, “Our America with Lisa Prosecutor” award from Women in Federal as Roxanne’s House. She is a Master Peace Ling.” Law Enforcement (WIFLE) for her work in Officer and conducts training across the state human trafficking cases. involving child abuse and neglect. She has JONATHAN SCHICK is president of testified in numerous felony trials and has GOAL Consulting. In his book The Nonprofit JULIAN SHER is an award-winning been qualified by the courts as an expert in Secret, he shares the secrets that can unlock investigative journalist and the author of six her field. an organization’s potential. His track record books. His most recent book, Somebody’s of successfully guiding organizational growth Daughter: The Hidden Story of America’s and change is built on his experience as the Prostituted Children and the Battle to Save founder of two nonprofits and a consultant for Them, was hailed as “the most definitive hundreds more. Jonathan’s clients include the account of sex trafficking of children in American Red Cross, United Way, and Dallas the United States.” Julian also wrote the

August 12-15, 2013 | Dallas, Texas | cacconference.org 67 ALLAN SMITH, Vice President of AELIUS of Chicago and ran a $200 million product successful child abuse prosecutions and Technologies, is a retired Master Sergeant line in the corporate world before bringing investigations. Sherre is currently the deputy with 20 years of service in the U.S. Army. He her analytical background to bring justice chief of the Child Abuse Division. has 25 years experience in unique technology to sexually abused children and preventing R&D, planning, and implementation. In his future sexual assault. Heather’s organization ERIC SZATKOWSKI has been a Special current position at AELIUS, Allan manages seeks funding for law enforcement agencies Agent with the Wisconsin Department of and directs the development of secure pursuing child pornography investigations Justice for 22 years, and is currently the communications and digital media forensics nationwide, educates justice professionals Deputy Commander for the Wisconsin ICAC tools. His company is a strategic partner and the public about child pornography, Task Force. He has specialized in online with Dr. Neal Krawetz, helping to provide and provides mental health and wellness child exploitation investigations since 1999. FotoForensics to NCMEC. training to professionals exposed to child He has been responsible for the arrest of pornography at work. hundreds of offenders, many of whom were HOLLY AUSTIN SMITH is a survivor of captured in undercover sting operations. child sex trafficking and an advocate against VICTORIA STICKLEY is a graduate Eric is also the coordinator of the Wisconsin all forms of human trafficking. She works research assistant at Texas Woman’s ICAC Investigation School, which he helped with survivors and anti-human trafficking University in the Counseling and Development establish in 2010. The school provides annual organizations across the country. Holly is program. She recently graduated with her training for personnel of law enforcement requested on a regular basis to provide master’s degree and is currently applying to affiliate agencies in Wisconsin. testimony and input to law enforcement several doctoral programs. In addition to her officials, social service providers, human research, she has also volunteered in Denton JIM TANNER, PhD, has been a justice trafficking task forces, and journalists. When and Ponder Independent School District to system professional since 1970. He obtained she isn’t speaking, Holly is writing for her provide therapeutic services to local children. his PhD in Cognitive Social Psychology from weekly column with the Washington Times the University of Illinois, specializing in Communities and working on an academic JOE SULLIVAN, PhD, is the Director of Phenomenology and Criminology. He is an book about child sex trafficking and Mentor Forensic Services, an organization internationally recognized expert in cognitive commercial sexual exploitation of children in specializing in providing consultancy and sets and sex offender management. He is America. training in Behavior Analysis, Child Protection, sworn staff in Colorado and serves as the and Professional Sexual Misconduct issues. computer forensic examiner for the 20th LINDA SMITH is a former Congresswoman He is a registered Forensic Psychologist and Judicial District Probation Department. Dr. and the Founder and Executive Director of began collaborating with law enforcement Tanner was responsible for the creation Shared Hope International (SHI), supporting in 1996. He has received a Chief Constables of Field Search, a free forensic software care, shelter, education, and vocational Commendation for his contribution to the application in use internationally. He was training in 7 countries worldwide. SHI investigation into the sexually motivated the primary author of the Structured Sex provides leadership in education and training, abduction and murder of a child in 2001. Offender Treatment Review (SSOTR) in use prevention strategies, research, and policy Since 2006, Dr. Sullivan has been employed nationally to monitor sex offenders’ behavior. initiatives focused on domestic minor sex as a Consultant and Forensic Psychologist trafficking. As an expert on the issue, Linda in the Behavior Analysis Unit in the Child STEVE TANNER is an Assistant Agent has testified before Congress, presented at Exploitation and Online Protection Centre, UK. in Charge for the Oklahoma State Bureau national and international forums, and has of Investigation and the Commander of been published in news outlets and journals MICHAEL SULLIVAN is a thirty- the Internet Crimes Against Children Task around the world. year veteran of law enforcement and is Force for Oklahoma. He oversees more than currently assigned as the Deputy Chief of four-dozen task force affiliates throughout STEPHANIE SMITH is a former deputy the Investigations Division for the Illinois Oklahoma. Under his leadership, dozens prosecutor with experience in cases including Attorney General’s Office and is the ICAC Task of child pornography suspects have been child sexual abuse, sexual exploitation, Force Commander. Mike is the author of two convicted and previously unknown victims neglect, and physical injury including books, Safety Monitor and Online Predators, have been identified. For his investigative death. She worked closely with her former which focus on the use of computers to successes, Steve has received several jurisdiction’s ICAC team and participated victimize children. He is the co-creator of the awards, including Agent of the Year in 2003. in the Project Safe Childhood program. A SAFEKIDS program in conjunction with the He also served 22 years in the United States

SPEAKERS former faculty member for ChildFirst (Finding Microsoft Corporation, which is a course of Air Force. Words) Indiana, she helped train front-line instruction for children from 4th to 5th grade professionals and assisted other prosecutors on the dangers of the Internet. REYNIE TINAJERO is the Deputy Chief with technical assistance requests on case of the Child Abuse Division in the Dallas presentation and strategy. In 2009, she SHERRE SWEET is an assistant County District Attorney’s Office. He received became Regional Director of the National district attorney in Dallas County, Texas. his law degree from Texas Tech University in Child Protection Training Center at NorthWest She received her law degree from Texas 1998 and immediately began prosecuting in Arkansas Community College. Wesleyan University School of Law in 2002. Dallas County. Reynie has been in the Child Immediately after graduation, Sherre joined Abuse Division since September 2000. HEATHER STEELE is President and CEO the Dallas County District Attorney’s Office. of the Innocent Justice Foundation, a non- For seven years, she has prosecuted felony ELIZABETH TOW is a High-Tech Crime profit founded to maximize child pornography crimes involving the sexual and physical Training Specialist in the High-Tech Crime investigative capacity in the US, and thereby abuse of children. Sherre has lectured at Training Services Department of SEARCH, significantly reduce child sexual abuse. numerous local conferences and trains where she coordinates and provides training She earned her MBA from the University prosecutors on child abuse issues and on high-tech crime investigations. Before

68 August 12-15, 2013 | Dallas, Texas | cacconference.org joining SEARCH in 2010, she spent five years States, and Britain. His newest program is government, to establish a comprehensive in local law enforcement as a Public Safety Roundup Ares, an investigative tool for the child abduction recovery program in Mexico. Dispatcher for the Grass Valley (California) Ares P2P network. Jim is also the director of the Border and Helena (Montana) Police Departments. Resource Group, a non-profit group made up VICTOR VIETH serves as the Executive of law enforcement and military personnel EMILY VACHER joined Facebook in 2011 Director of the National Child Protection who donate time, expertise, and resources and is currently the Trust & Safety Manager Training Center (NCPTC), a state of the art to assist communities in developing safe for The Americas. She is responsible for training complex on the campus of Winona havens for abused, exploited and trafficked managing law enforcement relations, State University (WSU). NCPTC includes five women and children. including incoming requests and outgoing moot court rooms, four forensic interview case referrals, as well as law enforcement rooms, and a “mock house” used to conduct MARY WAMBACH is an administrator and security policy matters. Prior to joining simulated child abuse investigations. and advocate who has headed two DV/SA Facebook, Emily was a Special Agent with the NCPTC staff provides intensive instruction agencies, worked as a Consultant Trainer/ FBI for more than a decade, leading a broad for undergraduate students and current Writer with SafePlace, Austin, and has range of federal investigations. Specializing professionals in the field on how to better published articles and materials regarding in Crimes Against Children matters, Emily recognize, react, and respond to children who abuse of deaf children and adults. Her was assigned to the Innocent Images are being abused. Victor earned his JD from focus is on pedophiles and other offenders National Initiative and the Child Abduction Hamline University School of Law (HUSL). who often target children and adults with Rapid Deployment Team. Emily holds an MS disabilities. Currently at the Deaf and Hard and MPA from Syracuse University and a JD LAUREN WAGNER is a High Tech Crime of Hearing Center in Corpus Christi, Mary is from Syracuse University College of Law. Training Specialist in the Training Services also a Consultant/Panelist with the Disability- Department of SEARCH where she performs Abuse/CAN-Do collaborative. Her goal is to VERONIQUE VALLIERE, PHD, has her tasks related to training local, state, and familiarize Investigators with information and doctorate in Clinical Psychology from Rutgers federal agencies on computer technology techniques that will apprehend offenders. University, and is licensed in Forensic issues with criminal justice applications. Psychology. She has more than 25 years She provides technical assistance to law RANDY WATKINS is a detective with the experience with violent offenders and their enforcement agencies in active cases, Fort Worth Police Department, Crimes Against victims, including domestic violence, sexual prepares training materials, teaches Children Unit. He has investigated computer violence, child abuse, and substance abuse. SEARCH investigative courses, and speaks crimes (Online Solicitation of Minor and Dr. Valliere also serves on the Pennsylvania at conferences throughout the U.S. Lauren Possession/Promotion of Child Pornography) Sexual Offender Assessment Board and is an ICI certified instructor and received a cases since 2002. In doing so, Randy has had has been reappointed four times. She 2009 “Excellence in Training” award from the opportunity to testify in numerous state has published on the treatment of sexual California POST. and federal trials in different jurisdictions. offenders and presented at international and national conferences. She has trained MIKE WAGNER is a Senior Inspector THURMAN WHISNANT is a Captain the Department of Defense, testified in front assigned to the National Sex Offender and a 19-year veteran of the Hickory Police of the United States Congress on issues of Targeting Center. Since joining the US Department in North Carolina. Throughout sexual assault, and has been qualified as an Marshal Service (USMS) in 1996, Mark has his career, he has served in the capacity of expert witness. served in the Northern District of Ohio and road officer, criminal investigator, supervisor, USMS Headquarters. While in Ohio, he was a and commander. Thurman has continued his DANNAH VARDAMAN joined NCMEC member of the Northern Ohio Violent Fugitive graduate studies at the University of Virginia. nine years ago, and went on to become the Task Force since its creation in 2003. He Thurman is a graduate of the 230th Session Senior Analyst in the Background Check Unit. received his Bachelor of Science degree in of the FBI National Academy and is a member Dannah is currently the Supervisor of the Criminal Justice from Bowling Green State of the North Carolina Law Enforcement

Sex Offender Tracking Team (SOTT®) in the University. Association and the North Carolina Police SPEAKERS Special Analysis Unit. SOTT is dedicated to Executive Association. supporting all law enforcement agencies and STEVE WALSH is a detective with the state sex offender registries in identifying Albuquerque Police Department working in CARMEN WHITE is currently the Chief and locating noncompliant registered sex the Child Exploitation Detail and has been for Prosecutor of the Child Abuse Division of offenders. She is a graduate from Eastern 3 years. He has been a detective for a total of the Dallas County District Attorney’s Office. Kentucky University with a Bachelor of 8 years. Steve worked as a detective in the The Child Abuse Division prosecutes child Science degree in Criminal Justice. Valley Anti-Street Terrorism Unit for 5 years sexual and physical abuse cases including prior to coming to the Child Exploitation Detail. child deaths. Carmen attended Harvard Law JOSEPH VERSACE is a programmer He is currently working as a task force officer School where she received her JD in 1999. with the Ontario Provincial Police, Child with Homeland Security Investigation in the Carmen began her law practice in the area Sexual Exploitation Section. In his four years Sexual Predator Exploitation Enforcement of civil law. However, in 2001, she pursued with the section, he has developed programs Detail (SPEED). her passion to become a prosecutor. She has to expedite the investigative process relating been at the Dallas County District Attorney’s to child pornography cases. In 2011, Joseph JIM WALTERS is the Assistant Chief of Office since 2001 and exclusively prosecuting was presented the OPP Accolade Award for Police at Southern Methodist University and child abuse cases for nearly ten years. Innovation and Creativity for his hard work Director of the SMU Center for Public Safety and dedication to the Ephex project. Ephex Training. He is the USDOJ Liaison for Training is an investigative aid in Peer-to-Peer (p2p) and Technical Assistance to the AMBER investigations. It is currently used at more Alert Southern Border Initiative (SBI). SBI is than 80 agencies in Canada, the United a joint program created with the Mexican

August 12-15, 2013 | Dallas, Texas | cacconference.org 69 TERESA WHITE spent 20 years working Throughout his career, he has specialized provided training and assistance to dozens with children and families in the mental in the prosecution of sexual assault cases. of local, state, federal, and international law health field before joining the training team From 2005-2010, Andy was assigned to the enforcement agencies. Eric has a degree in at the Texas Department of Family and Clark County Child Advocacy Center where he Computer Science and has developed several Protective Services (DFPS) in 2000. She is a handled the prosecution of cases involving computer programs to aid in the investigation member of the Certification and Leadership severe physical abuse and sexual abuse and prosecution of child exploitation matters. Training Team where her best days on of children. During his tenure as the Child the job are the ones in which she watches Advocacy Center Prosecutor, Andy integrated students have new insights, share new the multi-disciplinary team approach into ideas, and leave her workshops with a plan an effective tool to be utilized at trial. As the to implement their new knowledge. Teresa is County Prosecutor, he continues to represent a Licensed Chemical Dependency Counselor the State of Ohio in homicide, rape, and other and a Licensed Child Care Administrator. She complex or unusual trials. earned an M.Ed. in Counseling and Education. RUSSELL WILSON is the Special Fields CHAUNCEY WILDER has been with Bureau Chief and supervises the Conviction the Southern Virginia (SOVA) ICAC Task Force Integrity Unit at the Dallas County District since 2008, and is the senior investigator Attorney’s Office. He graduated from the On its Silver in the unit. He is a Virginia DCJS certified College of Law at the University of Oklahoma general instructor and is the primary in 1995 and has been board certified in Anniversary, instructor for P2P investigations within the criminal law since 2003. With 17 years SOVA-ICAC. Chauncey is an instructor for of experience, having served as both a the Crimes both the Beyond FairPlay and Roundup tools prosecutor and a defense attorney, Russell for P2P investigations. has handled a variety of State and Federal Against Children cases at both the trial and appellate level. AUTUMN WILLIAMS is the Director He has also served as a guest lecturer for Conference of Community Education at the Dallas numerous legal seminars throughout the Children’s Advocacy Center (DCAC). In this years topics pertaining to the practice of law. wishes to thank role, she focuses on preventing child abuse by providing professional training to child- CHRISTINE WOMBLE is an Assistant the thousands of serving organizations, as well as presenting District Attorney with the Dallas County an informative parent education curriculum District Attorney’s Office. Christine received presenters who on how to keep children safe from harm. her Texas law license in 2005. She is also Prior to this position, Autumn worked as a licensed in the Supreme Court of the United have participated in Forensic Interviewer at DCAC, where she States. As an appellate attorney, Christine conducted nearly 500 forensic interviews of handles direct appeals and post-conviction this event over the sexual and physical abuse victims for Dallas writs of habeas corpus. County law enforcement agencies and CPS. past 25 years. She has also testified in court as an expert JUSTIN WYKES joined the National witness in these criminal cases. White Collar Crime Center (NW3C) in 2006 The conference as a Computer Crime Specialist. He spent JAMES WILLIAMS is a High-Tech five years as a Special Agent for US Army would not be the Crime Training Specialist in the High- Counterintelligence, and the last two of those Tech Crime Training Services Department years were spent as a computer forensic great success of SEARCH, The National Consortium of examiner for the Cyber Counterintelligence Justice Information and Statistics, where he Activity (CCA). CCA has a worldwide that it is without coordinates and provides training on high- jurisdiction, and is the US Army’s primary tech crime investigations and forensics to counterintelligence investigative agency our speakers

SPEAKERS local, state, and federal justice and public in computer forensics. As a Special Agent safety agencies. He is also a detective for CCA, Justin conducted multi-agency sharing their time, with the Sacramento County Sheriff’s investigations in security compromises, Department, working for the Sacramento espionage, and terrorism. He earned his experience, and Internet Crimes Against Children (ICAC) Task Certified Forensic Computer Examiner Force. Additionally, he is an instructor for Fox (CFCE) from the International Association of expertise with our Valley Technical College and the Sacramento Computer Investigative Specialists in 2008. Sheriff’s Basic Recruit Training Academy. attendees. ERIC ZIMMERMAN is a Special Agent D. ANDREW WILSON became the assigned to the Cyber Crimes Squad of the Clark County Ohio Prosecuting Attorney in Salt Lake City FBI field office where he has January of 2011. He began his employment been investigating child pornography and THANK YOU! as an Assistant Prosecuting Attorney with the computer intrusions for the past three years. Clark County Prosecutor’s Office in 2002. He is a member of the Utah ICAC and has

70 August 12-15, 2013 | Dallas, Texas | cacconference.org EXHIBIT HALL INFORMATION The Exhibit Hall is located on the ground floor of the Sheraton Conference Center

Exhibitor Schedule COMPLIMENTARY Monday: 5-MINUTE MASSAGES! First floor: 11:30 AM-5:00 PM Second floor: 7:00 AM-5:00 PM Tuesday, 11:00 AM-3:00 PM First floor Exhibit Hall Tuesday: Both floors: 7:00 AM-5:00 PM Author’s Corner Wednesday: First floor: 7:00 AM-5:00 PM Private book signing by conference speakers Second floor: 7:00 AM-3:00 PM throughout the week.

Aaron Fisher book signing of Silent No More: Victim 1’s Fight for Justice Against Jerry Sandusky Internet Cafes will be available Compliments of Books-A-Million Exhibit Booth Google & Time Warner Cable. Monday, 2:30 PM Refreshments provided daily during workshop breaks 7:00-8:00 AM (excluding Monday) 9:30-10:00 AM 2:30-3:00 PM

Thank you to our PREMIUM Level Exhibitors! (Located on the 2nd floor)

Callyo Nuix North America, Inc. Children’s Advocacy Centers™ of Texas, Inc. Paraben Corp. Dallas Police Explorer Post #3194 SEARCH Group, Inc. Forensic Store, Inc. SpeakWrite FVTC-National Criminal Justice Training Center The Innocent Justice Foundation immixGroup TRITECH Digital FORENSICS INTERPOL - Washington TRITECH FORENSICS LawMate America United States Marshals Service Magnet Forensics V2 Interview Room Recording MySafePage, Inc. Voice Products, Inc. National Missing and Unidentified Persons System Wicklander-Zulawski & Associates, Inc. NetClean

August 12-15, 2013 | Dallas, Texas | cacconference.org 71 EXHIBITOR DEMONSTRATIONS

ADF TRIAGE-EXAMINER video, text-message and call-log evidence and video are reviewed. Moreover, once TRAINING INCLUDES FREE they believed was on the device. In this a victim is identified, the investigating SOFTWARE LICENSE (PART 1 & 2) session, Detective Cindy Murphy details how department may not have the capability Harry Parsonage, Paul Tew she repaired the iPhone’s damaged Home to relay the intelligence to other regional, Attendees will learn how to use Triage- button and used Cellebrite’s UFED Ultimate to national, and international police agencies, Examiner, an automated, targeted digital make a full physical image, which netted the saving those agencies countless hours forensic tool. This includes set-up of a deleted evidence needed to make the case. attempting to identify the same victim. This targeted scan, scanning a suspect computer, Tuesday, 1:00-2:30 presentation demonstrates immixGroup’s and reviewing and reporting on collected City View 6 Criminal Investigative Tracking Tool (iCrITT) evidence. We will also look briefly at how and NetClean’s Analyze DI, a unique joint agencies in the US have successfully CHILDREN’S CARELINK: solution empowering investigators with: employed the tool to improve efficiency in HARNESSING TECHNOLOGY TO • Improved data management, their digital forensic investigations. Attendee END CHILD ABUSE collaboration, and analysis capabilities pre-requisite: Advanced knowledge of digital Molly O’Neill, Ken Ortbals • Enhanced image and text deconfliction forensic tools. The workshop is designed for First Call recognizes the tremendous difficulty • Enriched capabilities to fully leverage experienced digital forensic examiners or for Child Advocacy Centers to track cases robust media analysis, categorization, investigators who regularly use forensic tools. from referral through prosecution. We’ve and criminal intelligence collection ADF Triage Examiner is not that complicated seen the number of cases continue to grow as efforts to use, however the class will be fast-paced funding becomes an even greater challenge. The solution greatly reduces the amount and participants will need know techniques Staff members are seeing a greater demand of images requiring review and provides and terms like “identifying a file by header”, on their time as they work with Investigative increased efficiencies, thus strengthening “the path to a user profile”, “MD5 Hash”, MDT teams and families to advocate on evidence for the court and enhancing “file parser”, “regular expression” and more. behalf of children. Executives are seeing a available time to combat child exploitation All eligible attendees (Federal, State and greater demand for data to support outcomes violators more effectively. local law enforcement and ICAC Task Force and funding. First Call developed Children’s Wednesday, 10:00–11:30 members) will receive a six-month license to CareLink as a cost-effective software City View 6 Triage-Examiner FREE of charge. solution to a growing caseload and a need

PRE-REGISTRATION WAS REQUIRED. for access to and sharing of data across Monday, 1:00-4:30 organizations. We will demonstrate how we HOW WE CAUGHT 41 CHILD Tuesday, 8:00-11:30 can save time for staff members, provide PREDATORS IN ONE WEEK Tuesday, 1:00-4:30 increased information to executives, and Chris Bennett, Amy Harvill Learn how one Sheriff’s Office netted 41 child Wednesday, 8:00-11:30 produce outcomes consistent with National predator arrests in a single week, concluding City View 5 Children’s Alliance standards. on Father’s Day this June. Detective Amy Tuesday, 3:00-4:30 Harvill, of Florida’s Polk County Sheriff’s CASE STUDY: SOLVING A City View 7 Office, will walk through their methodology, SHAKEN BABY CASE WITH tactics, and challenges faced during this CELLEBRITE UFED ENHANCING CHILD VICTIM monumental operation. The training session Cindy Murphy, Detective, Madison, IDENTIFICATION will also cover new technologies such as Wisconson Police Department Claude Davenport, Johann Hofmann Callyo, which is used for the creation of Virtual After the principal suspect in a shaken With the ever increasing amount of media Investigation phone numbers that record, baby case crushed his iPhone, investigators data seizures and present media reviewing capture, and organize your communication believed they had no hope of retrieving the methods, it is inevitable that not all images WIN A NEW iPAD

Visit any of our Exhibitor Demo Workshops for entry to an iPad drawing at Wednesday’s Silver Spur Supper.

72 August 12-15, 2013 | Dallas, Texas | cacconference.org EXHIBITOR DEMONSTRATIONS with each predator for the prosecutor. • Secure digital textual data processing, The elementary school age programs will be Attendees will receive complimentary access searching, deconfliction, collaboration, previewed and will be available for purchase to these tools for use in their next operation. external data assimilation, reporting, outside of Tarrant County in 2014. Middle and Wednesday, 1:00-2:30 and data retention high school presentations will be added in City View 6 • Secure digital image and video 2014. processing image identification and Tuesday, 10:00-11:30 INTERNET ARTIFACT AUTOPSY classification, image deconfliction, and City View 7 Jad Saliba, Founder & CTO of Magnet image retention Forensics Tuesday, 8:00-9:30 TRACKING ILLEGAL ACTIVITY When recovering data for digital City View 6 THROUGH A WIRELESS investigations, let’s face it – certain Internet NETWORK artifacts are harder to find. While some NUIX INVESTIGATIONS: Carolyn Carter, Fluke Networks applications leave files that can be recovered SIMPLIFYING CASE ANALYSIS You’ve done everything right. You obtained relatively easily using forensics techniques, Craig Guymon the subscriber data through legal process. others leave little behind. You may not even Investigations frequently involve many You did surveillance and confirmed that the know they’re there and end up missing devices including: multiple computers, mobile name on the subscriber information resides key evidence that could be critical to your devices, and a variety of digital storage media, at the residence. You did a search for open investigations. In this session, we’ll arm you as well as difficult-to-access corporate wireless and identified several in the area, with knowledge and techniques required to data formats and storage systems. Nuix’s but you still have to start where the legal recover those misunderstood, harder-to- advanced electronic investigation technology process tells you to start. Your team hits the find artifacts, explaining how they’re stored, is engineered to index, triage, identify, door and secures the location so the interview where you can find them and how you analyze, and bring to the surface critical can begin. In a very short period of time you can interpret the data to know what really evidence across entire data sets, regardless realize the wireless network is unsecured happened. of the file type or size. In addition, Nuix can and the person you are interviewing is not the Wednesday, 1:00-2:30 automatically identify key intelligence items offender. Someone makes the comment, “We City View 7 such as email addresses and phone, social hit the wrong house.” However, the fact is you security, and credit card numbers. have hit the right house. You could not have THE NEXT STEP IN COMBATING Tuesday, 3:00-4:30 started any place else. You have to start at the CHILD EXPLOITATION IN THE City View 6 location identified as the subscriber. In this INTERNET AGE demonstration you will learn how to quickly Claude Davenport, Jerahd Hollis, PLAY IT SAFE! CHILD ABUSE determine if the wireless network located Johann Hofmann PREVENTION, ONE GRADE in a specific residence is open (running no Kids today are more tech savvy than ever. AT A TIME security) or secured (running WEP or WPA) Unfortunately, so are the pedophiles who MaryJane Themudo without entering the building. In addition, you prey on them. Learn how a unique technology Play It Safe!™ is an Evidence Informed, will learn how to quickly locate the suspect solution helps law enforcement officers and specialized, age appropriate child sexual access point and any wireless device(s) prosecutors from all jurisdictions address abuse risk reduction program for children associated with it. This demonstration will and overcome the specific challenges ages pre-school through 12th grade, as well provide an overview of the technology used inherent in battling online child exploitation. as their parents, teachers and caregivers. It in this procedure and include hands-on with This workshop explores how investigators is provided one classroom at a time with a the Fluke Networks AirCheck Wi-Fi Tester. can more effectively link thousands of pieces curriculum that has been researched, written This demonstration would be beneficial to of criminal evidence and quickly identify and scripted over a 30 year period by The investigators and prosecutors as it will deal tangible targets, while simultaneously Women’s Center of Tarrant County. Each with the identification of a compromised deconflicting specific information with other grade level’s program, from pre-kindergarten wireless network and the legality of the investigators and agencies utilizing the iCrITT- to 12th grade, speaks to children in a way wireless technology being used. enabled “Hash Cloud.” See how investigators they can best learn and respond. Play It Tuesday, 10:00-11:30 can greatly reduce the amount of media Safe!™ reduces risk by teaching children City View 6 they need to review while improving their to identify abusive behavior, and provides data and media management, internal and tools children need to be safe including external agency collaboration, and analysis specific, age appropriate actions to take in capabilities to more effectively identify new threatening situations. It also provides a safe All Exhibitor Demonstrations child victims, as well as find, track, and arrest forum for children to outcry and disclose more perpetrators. abuse, trains care-giving adults to recognize are located on the 4th floor This solution is designed specifically for law possible signs of child sexual victimization of the Sheraton Hotel. enforcement professionals, covering two and to take the necessary steps to support major areas of electronic evidentiary data a child’s outcry and recovery. If you provide critical to the pursuit of criminal activity: child abuse education – this demo is a must!

August 12-15, 2013 | Dallas, Texas | cacconference.org 73 EXHIBITORS

AccessData can help eligible victims pay for medical or three years, it is the only business of its kind www.accessdata.com counseling bills or cover the cost of a funeral in the country, having helped raise money AccessData has pioneered computer forensics for a loved one who has been killed. for various departments and organizations and litigation support for more than 25 years through fundraisers and specially designed and is the maker of FTK and Summation. Over BIS Digital, Inc. artwork and prints. this time, the company has grown to provide www.BISDigital.com a family of stand-alone and enterprise-class Our primary business is the purchase, Callyo solutions that enable digital investigations sales, and service of digital audio and video www.callyo.com of any kind, including computer forensics, recording equipment. BIS provides the latest Callyo’s Virtual Investigation Phone (VIP) is incident response, e-discovery, legal review, digital recording technology to more than the tool of choice for ICAC investigators and IP theft, compliance auditing and information 4,000 customers including more than 2,000 online child predator operations worldwide. assurance. More than 130,000 users in courtroom systems, major corporate and Detectives can instantly generate new law enforcement, government agencies, local businesses, hospitals, federal, state, and recorded phone lines for just $5 with voice corporations, and law firms around the world local government agencies including courts, and SMS capabilities in any area code that rely on AccessData software solutions and municipal county and city chambers, meeting link to their existing cell phones. VIPs can its premier digital investigations and hosted and department offices, public safety and law also be used to make 3-Way Controlled review services. AccessData is also a leading enforcement, universities and schools, law Calls between a detective, a victim, and a provider of digital forensics and litigation firms, and medical offices. suspect. No apps, digital tape recorders support training and certification. or special software is required. Callyo for Bluebear LES Skype provides a simple and secure way to ADF Solutions www.bb-les.ca record video chats between investigators www.adfsolutions.com BlueBear is a private company focused and targets, capturing audio, video, and chat Advanced Digital Forensic Solutions, Inc. on forensic solutions in the fight against messages. Callyo Locate covertly locates (ADF Solutions), is the market leader in media online Child Exploitation. BlueBear’s flagship your suspects with just an E-mail Address or exploitation and cyber forensic triage tools product is called LACE. This software suite Skype Username. used for scanning computers and peripheral enables investigators to efficiently categorize devices. Leveraging an innovative approach, vast amounts of image and video data Canine Companions for these easy-to-use tools rapidly extract from confiscated computers, dramatically Independence actionable intelligence to help identify and reducing the time and resources required www.cci.org capture suspects who are a threat to public to bring a case to court. Using advanced Founded in 1975, Canine Companions for safety or national security, and accelerate biometric analysis, faces found in images Independence is a non-profit that provides prosecution of criminals. These proven are automatically extracted and compiled to four types of highly trained assistance dogs, tools are actively used by field operatives create lists of victims or suspects matched free of charge. Canine Companions’ Facility in defense, intelligence, law enforcement, against existing facial databases. Dogs are expertly trained and partner with a border security, and other government facilitator working in a health care, visitation, agencies worldwide. Books-A-Million or education setting. Facility Dogs are www.booksamillion.com trustworthy in professional environments and Alvarez and Marsal Books-A-Million, Inc. is one of the nation’s can perform commands designed to motivate www.alvarezandmarsal.com leading book retailers and sells on the clients with special needs, and encourage Alvarez and Marsal is a global leader in digital Internet. The Company operates more than feelings of security for clients in a visitation forensics training and consulting services. We 253 stores in 33 states. The Company setting (i.e. a courtroom). Facilitators are offer the Cellebrite Mobile Phone Forensics operates large superstores under the names working professionals responsible for course, Mastering Macintosh Forensics, Books-A-Million, Books & Co., and 2nd & handling the Facility Dog, and are committed Incident Response for both Windows and Charles and traditional bookstores operating to serving clients with special needs. Macintosh, and EnCase I, II, Enterprise and the under the names Bookland and Books-A- EnCE prep course. Our instructors train both Million. The common stock of Books-A- Cellebrite USA domestically and internationally, and have Million, Inc. is traded on the NASDAQ Global www.cellebriteusa.com taught national police forces in more than 40 Select Market under the symbol BAMM. Visit www.ufedseries.com countries and many Fortune 100 companies us at 2:30 pm on Monday to purchase Silent Since 2007, the Cellebrite UFED has provided how to strengthen their information security No More: Victim 1’s Fight for Justice Against complete, standalone mobile forensics to defenses. Jerry Sandusky, and have it signed by the investigative professionals worldwide. The E X HIBITORS authors. UFED incorporates physical, logical, and file Attorney General of Texas system extraction, decoding and analysis of www.oag.state.tx.us Box Five Police Art data and passwords from legacy and feature The Crime Victims’ Compensation Program is Box Five Police Art offers unique, personalized phones, smartphones, portable GPS devices, dedicated to ensuring that victims of violent artwork for peace officers and Departments and tablets. It is regularly updated with ground- crime are provided financial assistance for throughout North America. Having worked breaking physical extraction capabilities for certain crime-related expenses. The fund with more than 60 departments in the last the world’s most popular platforms.

74 August 12-15, 2013 | Dallas, Texas | cacconference.org Children’s Advocacy Centers of Dallas Police Explorer Post #3194 networks and easily determine if the wireless Texas, Inc.™ The Dallas Police Explorer Program is network is operating with open or secured www.cactx.org designed to give young people, ages 14-21, access. AirCheck allows law enforcement Children’s Advocacy Centers™ of Texas, an inside look into the police profession, and officers to quickly track down and locate Inc. (CACTX) is the statewide membership develop future police officers. We accomplish suspect access points and wireless devices association representing all local children’s this goal by providing training, knowledge, associated with the wireless network. Fluke advocacy centers (CACs) in Texas. Founded in and first-hand experience to these youth Networks’ mission is to provide innovative 1994 with a membership of 13 local centers, with ride-outs, competitions, and community solutions for network installation, monitoring, today the CACTX membership roster includes service. Our program survives through and analysis within global enterprises and 66 developing and established centers. merchandise sales within the department carriers. The company’s comprehensive Our membership reflects the vast diversity and at special events. line of solutions provides network installers, of Texas, all with their own approaches to owners, and maintainers with superior vision, fulfilling our shared mission of protecting and Dallas Police Mounted Unit combining speed, accuracy, and ease of use providing for children. The Dallas Police Mounted Unit has to optimize network performance. proudly served the Crimes Against Children Conference on Crimes Against Conference for almost twenty years. After Forensic Store, Inc. Women a two-year absence, we are proud to be www.forensicstore.com www.conferenceCAW.org back! We offer the same high quality items The Forensic Store is a reseller for brands The Conference on Crimes Against Women as before with new logos! We have a variety such as HTCI, Cellebrite, Oxygen, Paraben, recognizes that crimes against women are of DPD and Mounted Unit logos on apparel OS Forensics, ADF, and many others. We have unique in nature and must be regarded as such as shirts, hats, SWEATSHIRTS, mugs, the latest technology in forensic investigation, such. We seek to bring together all front-line challenge coins, pins, and more. We have mobile device analysis, and data recovery. professionals that respond to these crimes many colors and sizes from Toddler to 4XL. The Forensic Store sets the industry standard and arm them with the most effective, for both warranties and service on software relevant, and up-to-date tools available Fernico and forensic machines. The E.D.A.S. fox line to battle this epidemic. The 9th Annual www.fernico.com of computers is completely customizable and Conference on Crimes Against Women will Fernico’s ZRT 2 is the leading system for the boasts a three year parts and labor warranty. be held March 31-April 2, 2014 at the Dallas manual investigation of cell phones. As smart HTCI’s cutting edge mobile analysis tool, Sheraton Hotel. Stop by our booth and register phones become smarter it is an impossible DART gives users’ bar none support from the for a chance to win a free registration to the task for cell phone forensic software tools actual software developers. It is the Forensic conference in 2014. to support every new phone and the 100% Store’s mission to provide customers with extraction of all the evidence. ZRT 2 has an the best service before, during, and after the CornerHouse OCR capability that will automatically read sale of any product. www.cornerhousemn.org text messages and phone numbers directly CornerHouse is committed to improving the from photographs. Fernico’s FAR ProX is FVTC-National Criminal Justice assessment and investigation of child abuse. the premier automated Blu-ray archiving Training Center Since 1989, CornerHouse has provided and acquisition system. With a proven www.ncjtc.org forensic interviews, medical examinations, combination of world class robotic reliability The National Criminal Justice Training family support, and facilitation of the MDT. and easy to use software, it acquires large Center (NCJTC) is one of the leading national Twenty years ago, CornerHouse developed a quantities of optical media, and archives trainers and educators in the field of criminal forensic interview protocol, and subsequently evidential data or CCTV content to Blu-ray for justice today. NCJTC leverages the skills developed training programs around that long term storage. and abilities of more than 300 experienced protocol. CornerHouse training curriculums criminal justice professionals as well as are based on both research and practice. The First Call Alcohol/Drug Prevention the resources developed over our 20-year courses are designed to produce competent & Recovery history of providing training and technical forensic interviewers who can defend www.firstcallkc.org assistance. Participants receive ongoing their interviews in court, effective team First Call created Children’s CareLink, support through our comprehensive criminal members, and informed mandated reporters. an electronic child advocacy record and justice collaboration portal, which provides CornerHouse Training Programs include: web-based solution, to track your client’s access to an array of online training and Basic Forensic Interview Training, Advanced case from the initial referral through case resource materials. NCJTC offers a wide Forensic Interview Training, MultiSession prosecution. Children’s CareLink is used by range of training and technical assistance

Forensic Interview Training, Mandated many Child Advocacy Centers across the programs designed to meet the needs of E X HIBITORS Reporter Training, Minimal Facts Training, country. We partner with your organization to individual agencies and organizations. and Consultation Services. develop a cost-effective technology solution that works for you. First Call provides Crime Victims’ Institute assistance to organizations, helping interpret www.crimevictimsinstitute.org and use data to provide increased grant- The focus of the Crime Victims’ Institute at funding opportunities. EXHIBITORS cont’d Sam Houston State University is to improve on next page. services to crime victims in Texas through Fluke Networks research. www.flukenetworks.com Fluke Networks’ AirCheck Wi-Fi Tester provides law enforcement with a tool to quickly identify compromised wireless

August 12-15, 2013 | Dallas, Texas | cacconference.org 75 immixGroup information. INTERPOL Washington’s mission MaleSurvivor www.immixgroup.com/le is to coordinate U.S. law enforcement actions www.malesurvivor.org immixGroup delivers strategic IT services to and responses, ensuring that they are MaleSurvivor is committed to preventing, government and law enforcement customers. consistent with U.S. interests and law, as healing, and eliminating all forms of sexual We deliver cloud and IT support services, well as INTERPOL policies, procedures, and victimization of boys and men through and a new software designed for supporting regulations. support, treatment, research, education, online criminal investigations. immixGroup’s advocacy, and activism. Criminal Investigative Tracking Tool (iCrITT) Julian Sher - “Somebody’s delivers on all 23 DOJ NIDS requirements, Daughter” Micro Systemation automates investigative processes, and www.juliansher.com www.msab.com provides complete and efficient automated Come meet investigative journalist Julian Micro Systemation (MSAB) is the global deconfliction. Leading organizations focused Sher, and pick up autographed copies of his leader in forensic technology for mobile on child protection are looking at iCrITT as books, “Somebody’s Daughter: The Hidden device examination. We have been involved the foundation for all their child exploitation Story of America’s Prostituted Children” and with mobile communications since 1984, and analysis and tracking needs. “Caught in the Web: Inside the Police Hunt to now have a singular focus on the forensic Rescue Children from Online Predators.” recovery of data from mobile devices. The The Innocent Justice Foundation core business today produces a product www.innocentjustice.org Katana Forensics, Inc. called XRY which has the capability to www.shiftwellness.org www.katanaforensics.com recover deleted data from smart-phones, The Innocent Justice Foundation is a non- Katana Forensics, Inc. is a veteran owned mobile phones, 3G modems, GPS, and profit that supports child pornography global software firm that specializes in Tablet devices. Building on that foundation investigation units nationwide with free mobile device and Mac forensics. We service we have recently released XAMN, our latest grant writing services for law enforcement law enforcement, military, corporations, innovation, to provide smart-phone analytics agencies, public education on the true nature and law firms. Our philosophy is to develop to our customer base. and scope of child pornography, and the forensic applications that are cost effective SHIFT mental health and wellness program. and preserve performance. Lantern 3 is our Midwest Regional CAC flagship application. Lantern was developed www.childrensmn.org International Association of Digital as an intuitive forensic tool that produces Midwest Regional CAC’s mission is to Forensics Investigators the most data in a timely fashion, allowing enhance the knowledge base and expertise of www.IADFI.org investigators and examiners to review a MDTs that investigate and treat child sexual The International Association of Digital greater amount of actionable evidence. abuse including medical, law enforcement, Forensics Investigators is a network for Katana Forensics also developed the Lantern child protection, forensic interviewers, victim Computer Forensics, Digital Forensics and Reader, the first iPad reader app that made advocates, and mental-health professionals. eDiscovery Investigators, Law Enforcement, reports portable while maintaining security. Midwest Regional CAC is committed to Private Investigators, Attorneys, Legal providing affordable, accessible, and cost- Professionals, Security Professionals, LawMate America effective training methods for MDTs utilizing Consultants, Service Providers, and Software www.lawmateamerica.com the latest technology and research to deliver Developers to network together. The purpose LawMate America is a division of SpyTeK relevant and impactful programs. We offer of this organization is to foster the exchange Wholesale Imports And The Spy Exchange a variety of online courses and training to of information and share ideas related to and Security Center. LawMate brand give your team the latest knowledge and current trends in the areas of digital forensics, products are sold through carefully selected techniques to provide the best quality care to Internet security, and criminal investigations. authorized dealers who understand LawMate victims of child abuse. Our mission is to focus on the research and Brand products. LawMate is innovative development of software, hardware and in the creation of professional grade Mosaic Family Services techniques that enrich the tool set used by covert video, countermeasures, and audio www.mosaicservices.org Computer and Digital Forensics Investigators. products. LawMate America is the exclusive Mosaic Family Services is committed to American agent for LawMate Brand products serving survivors of human trafficking and INTERPOL Washington and maintains a network of authorized other human rights abuses that impact www.usdoj.gov/interpol-washington LawMate dealers. LawMate America is part Dallas multicultural communities. Mosaic INTERPOL Washington, the U.S. National of a wide Network of authorized LawMate provides comprehensive services to Central Bureau, serves as the designated representatives around the world. survivors, including legal representation, representative to the International Criminal shelter, counseling, and case management. Police Organization (INTERPOL) on behalf of Magnet Forensics Mosaic’s staff, which is fluent in more than the Attorney General. INTERPOL Washington is www.magnetforensics.com 25 languages, serves as a cultural bridge for the official U.S. point of contact in INTERPOL’s Magnet Forensics is a global leader in survivors of crime. worldwide, police-to-police communications the development of software solutions for and criminal intelligence network. INTERPOL digital forensic professionals that assist in MySafePage, Inc.

E X HIBITORS Washington is co-managed by the U.S. building the best possible cases. Our flagship www.mysafepage.net Department of Homeland Security (DHS) software, Internet Evidence Finder (IEF), MySafePage was designed with one goal in pursuant to a Memorandum of Understanding was developed by a former police officer mind: to protect you and your family at all costs that ensures a continuing commitment to the and forensic examiner who recognized the from any emergency or crisis (unexpected guidance and oversight of the organization need for an easy to use, comprehensive tool medical illness, automobile accidents, lost and reinforces its role in effectively to perform digital investigations on digital loved ones, abductions). Our safety network sharing international criminal investigative media. was designed around the latest technology

76 August 12-15, 2013 | Dallas, Texas | cacconference.org to offer you and your loved ones the fastest, persons, and concerned citizens can access Nuix North America, Inc. most efficient way to receive live information information in NamUs to assist in the www.nuix.com from emergency professionals within resolution of unsolved cases. NamUs also Nuix’s powerful, intuitive information seconds of an emergency hitting your family. provides data management and forensic management technologies make it possible With our program, emergency professionals resources for missing and unidentified to search, investigate, and actively manage will have all the tools, information, and cases at no cost to investigating agencies or unstructured data sets of any size or resources available to assist you through searching family members. NamUs is funded complexity. This enables you to respond your emergency when they arrive on the by the National Institute of Justice and quickly and effectively to litigation or scene. managed by the UNT Health Science Center. regulatory action, mitigate risk, reduce costs, and extract value from your data. National Center for Prosecution National Offender Registry of Child Abuse www.OffenderRegistry.com Office of Justice Programs www.ndaa.org The National Offender Registry (NOR) is www.ojp.usdoj.gov In 1985, the National District Attorneys committed to increasing communication and The Office of Justice Programs (OJP) Association recognized the unique awareness between agencies in the U.S. In provides federal leadership in enhancing challenges of crimes involving child victims, 2012, the NOR developed web based RSO the Nation’s ability to prevent and reduce and established the National Center for tracking software in joint effort with local law crime. Programs administered through OJP’s Prosecution of Child Abuse (NCPCA). enforcement. bureaus and offices support federal, state, NCPCA’s mission is to reduce the number of and local efforts to address crime, improve victimized and exploited children by assisting National White Collar Crime Center the criminal and juvenile justice systems, prosecutors and allied professionals www.nw3c.org increase awareness of crime-related issues, laboring on behalf of victims. To achieve The National White Collar Crime Center and meet the needs of crime victims. its goal of enhancing the effectiveness of (NW3C) supports law enforcement in the the investigation and prosecution of child prevention, investigation, and prosecution Paraben Corp. abuse, NCPCA has articulated the following of economic and high-tech crime through www.paraben.com four objectives: 1) Host national, regional, training and analytical support and research. Since 2001, Paraben’s mobile solutions have and local training on basic and advanced rocketed to the top as the most cost effective training, utilizing evidence-based and victim- Navajo Jewelry & Crafts option with both logical and physical support centered practices; 2) Provide immediate, Specializing in Native American jewelry in a single tool. Paraben has continued with comprehensive technical assistance; 3) handcrafted by family and extended family mobile support for smart devices, flip phones, Develop and distribute publications on a members. All jewelry is crafted in sterling and pay as you go phones all in a single range of child maltreatment topics; and 4) silver with natural stones, and shells by suite. Paraben’s solutions for hard drives Contribute to coordination efforts to improve artists from the Navajo, Zuni, and Santo include Parben’s Stick tools for detection of resource delivery. Domingo Tribes of New Mexico. illicit content, to the more complex lab suites. Paraben’s P2 Commander has emerged as National Child Protection Net Transcripts, Inc. a leader for hard drive processing with its Training Center www.nettranscripts.com robust database, strong e-mail processing www.ncptc.org Net Transcripts is the nation’s leading engines, and ability to look at a variety of The National Child Protection Training provider of confidential and secure Web- different file systems. Center (NCPTC) works to end child abuse based Transcription and Translation services and neglect through education, training, for Law Enforcement and Criminal Justice Pearls with Purpose awareness, prevention, advocacy, and the agencies. Without any upfront investment www.pearlswithpurpose.com pursuit of justice. NCPTC is a non-profit or commitments, they provide proven Pearls with Purpose Foundation strives organization that focuses on educational investigative efficiencies, operational toward rescuing victims of poverty in curriculum development and training for improvements and significant budgetary underdeveloped countries by training women over 40,000 child protection professionals savings. We provide specialists for fast, in the art of jewelry-making and operation of across the country. NCPTC also focuses on accurate, and secure multi-speaker their own micro-enterprise business. Since education through our programs: the Jacob investigative interviews and single-speaker 2002, Wendy Bird and volunteers have Wetterling Resource Center, the Center dictated narratives for all forms of criminal worked to rescue families from poverty. for Effective Discipline, and the National investigations and protective services. All Her Foundation works in tandem with their Association to Prevent the Sexual Abuse transcripts are processed domestically, easy sister business, Pearl Partners, to offer items of Children. NCPTC’s training facilities are to use, and extremely cost efficient. hand-crafted by women in the Philippines, E X HIBITORS located at Winona State University and India, and Cambodia. Necklaces, bracelets, Northwest Arkansas Community College. NetClean earrings, and rings are made and offered www.netclean.com at affordable prices. As you purchase the National Missing and NetClean is the leading developer of jewelry they make, you join our quest to Unidentified Persons System technical solutions to stop the spread of change lives worldwide. www.namus.gov child sexual abuse material. Multinational NamUs is a national clearinghouse for companies, government agencies, Internet information related to missing person and service providers, and law enforcement EXHIBITORS cont’d unidentified decedent cases across the U.S. professionals worldwide use our solutions. on next page. Through secure online databases, medical We are experts in what we do and develop examiners, coroners, law enforcement our technology in conjunction with partners officers, family members of missing and police authorities.

August 12-15, 2013 | Dallas, Texas | cacconference.org 77 Pen-Link, Ltd. Uninsurable Child, Orphan Benefits, Memorial a national network of protection for victims. www.penlink.com Benefits, Reward Programs, and Heroes Hall Shared Hope has authored assessments, a For over 20 years, Pen-Link, Ltd. provides of Fame. Our Roth IRA’S and Annuities never national report on child sex trafficking, and a Law Enforcement and Intelligence agencies drop below 1% and we do not charge any state by state analysis on legislation. Shared with software and systems for the collection, management fees. All monies paid out for Hope has also produced a training guide and storage, and analysis of telephonic, and IP- disability income for an on-the job or off DVD for law enforcement, a practitioner’s based communications. Pen-Link’s software the-job injury are tax free. We have 1st day guide and intake tool for providers, and a and systems – Pen-Link 8, LINCOLN, and coverage, will pay up to 1 year per injury and prevention resource for youth and educators, Xnet – are widely recognized as industry pay in addition to any other coverage. Family Chosen. standards, with thousands of licensed law and spouse riders are available on most of enforcement and intelligence users. Pen- our policies. Silicon Forensics Link systems are favored because they excel siliconforensics.com at intelligence gathering and live collection, Salesmanship Club Youth and Silicon Forensics provides innovative, and bring a powerful suite of reporting and Family Centers custom designed forensic workstations, field analytical tools; the type of functionality that www.salesmanshipclub.org response kits, and storages for today’s high is essential in drilling down through today’s Salesmanship Club Youth and Family Centers tech forensics investigators. We also have an extensive data sets to reveal relationships programs provide access to quality education experienced hard drive data recovery team that might otherwise go undetected. and mental health services for children in and in-house, class 5 environment clean order to develop academic competency, room. Play it Safe! Child Abuse social-emotional health, resilience, and Prevention perseverance in the face of life’s challenges. Silpada Designs Jewelry www.playitsafe.org Our team of 30 therapists and psychologists www.mysilpada.com/beth.moller Play It Safe!™ is an Evidence Informed, age offer individual and group therapy, play Hip-classic, .925 sterling silver. Handcrafted appropriate child sexual abuse risk reduction therapy, family therapy, parenting classes, from artisans worldwide and backed with program for children, parents, teachers, and an after-school therapeutic program for pre- a life-time warranty. Silpada was founded caregivers. It provides classrooms with a teens and teens, and an early-childhood 16 years ago by two stay at home moms curriculum that has been researched and therapeutic program. All services are in Kansas. They wanted to create a way scripted by The Women’s Center of Tarrant offered in English and Spanish. Annually, to empower women. Headquarters are in County. Each grade level’s program speaks Salesmanship Club trains thousands of Lenexa, KS. to children in a way they can best learn and mental health professionals and educators respond. Play It Safe!™ teaches children how in innovative approaches to serving the SpeakWrite to identify abusive behavior, and provides needs of children. We host our second annual www.speakwrite.com/lawenforcement tools children need to be safe. It also provides Changing the Odds Conference on September SpeakWrite provides human-powered a safe forum for children to outcry and 26 & 27, 2013. transcription and digital documentation disclose abuse, trains adults to recognize solutions to law firms, state government possible signs of child abuse and take the SEARCH agencies, law enforcement operations, necessary steps to support a child. www.search.org insurance, and other private sector users. SEARCH’s High-Tech Crime Training Services With more than 50,000 clients nationwide, Point Duty trains and assists investigators in methods SpeakWrite is the nation’s largest provider of www.pointduty.com.au to prevent, detect, and investigate instances non-medical transcription. Utilizing a network Point Duty is a software development of individuals using technology to exploit of US-based typists, along with SpeakWrite’s company with a range of products allowing children. Training courses are offered innovative software tools, completed law enforcement agencies to capture data nationwide through SEARCH’s outreach documents are delivered via email in three related to crimes committed on Peer to Peer training program. These efforts focus on hours, 24/7, year-round. networks and social media. With over 100 Peer systems security, computer forensics, digital to Peer networks active on the Internet, Point data recovery, and investigations involving SRT Wireless Duty prides itself on continually expanding the the Internet, social networking sites, local www.srtgrp.com number of networks the system can search. area networks, and online child exploitation. We are the leading provider of Wi-Fi signal The system also provides investigators with SEARCH also offers distance learning courses technology and training for law enforcement/ the latest in productivity tools and can be with content ranging from teaching basic military purposes, including access point and linked directly to IBM’s Analyst Notebook or computer skills to more advanced skills in station discovery, surveillance, interception, other data analytics packages as required. online social network investigations. These and targeting. The SRT Group of companies self-administered courses are available to was established to deliver mission-critical Police & Firemens’ Insurance individuals with law enforcement or justice satellite, Wi-Fi, and aviation services to Association affiliation. government and law enforcement. www.pfiadfw.org Police & Firemens’ Insurance Association is Shared Hope International Texas Lawyers for Children

E X HIBITORS a fraternal, non-profit association providing www.sharedhope.org www.texaslawyersforchildren.org life insurance, disability income, accident Shared Hope International is committed to Texas Lawyers for Children (TLC) operates an protection, Roth IRA’S, annuities, and ending the commercial sexual exploitation of innovative, 1-stop source of legal, medical, cancer plans to our members. All of our women and children. Shared Hope provides and psychological information and tools, representatives are active or retired police leadership in awareness and training, offered free to Texas judges and attorneys officers and fire fighters. All members receive prevention strategies, restorative care, who handle cases involving abused and free fraternal benefits such as: Scholarships, research, and policy initiatives to mobilize neglected children. TLC’s Online Legal

78 August 12-15, 2013 | Dallas, Texas | cacconference.org Resource and Communication Center also technology platforms and components and VIDENTIFIER Technologies offers secure, private communication tools offer the cost-effective means to build a www.videntifier.com that enable judges and attorneys statewide digital forensics lab. Our Velocity Digital Videntifier assists police authorities and to pose questions, share expertise, and Forensics product line includes: Mobile Triage Internet companies to automatically identify discuss ideas for court improvement with Kits that allow for capture and viewing of the child abuse content, stored on hard drives, their respective peers statewide. suspect data at the scene on cell phones saving forensic investigators time that and USB computer devices; workstations for is otherwise spent on manual watching. Texas Young Lawyers Association examiners/investigators to utilize during For Internet companies it can help them www.tyla.org discovery; storage towers for long-term investigate online storage and server Texas young Lawyers Association (TYLA) storage and secure live access to all cases; platforms. It can process content on the helps those in need through pro bono activities and our DataCenter Lab Solution that allows fly, e.g. when uploaded to or transferred and community education, participates in an agency to perform all of the tasking between platforms. Videntifier combines communities and schools, and aids young data processing into the lab on servers. blazingly fast data mining technology with lawyers. TYLA’s uncommon leaders show Additionally, we design and install Interview high-end Computer Vision methods. Thus it that when TYLA takes on an issue, nothing is Management Solutions, including audio/ can quickly identify and isolate known child too large. TYLA’s committees are always busy visual equipment, and have developed abuse content solely based on the visual providing easy to understand information a unique Mobile Interview Kit created to information. about the law. encourage children to feel more calm and free to share during difficult interviews. Voice Products Inc. TexProtects www.voiceproducts.com www.texprotects.org TRITECH FORENSICS Voice Products Inc. has been in business TexProtects, the Texas Association for www.tritechusa.com for more than 23 years. We offer 24/7 live the Protection of Children, is a statewide TRITECH FORENSICS provides evidence support, 911/Radio, Call Logging, Child membership organization advocating on collection and crime scene investigation Advocacy Interview Recording, Court Room behalf of abused and neglected children. products to crime laboratories and crime Recording, and Body Worn Cameras for TexProtects educates its members, and the scene investigators. We are committed to Police Officers. , on solutions to reduce providing our customers with forensics child abuse, improve the CPS system, and products at affordable prices. It is our goal, Wicklander-Zulawski & heal child victims. TexProtects leads the effort through our research and development Associates, Inc. that ensures all child advocacy organizations program, to continue to develop superior www.w-z.com speak with one voice. TexProtects initiated The products to aid in all aspects of crime scene Wicklander-Zulawski & Associates, Inc. Texas Child Protection Roundtable, bringing investigation and crime laboratory analysis. (WZ) provides standard and customized together research experts, advocates, and We are continuously evaluating our product training in multiple techniques of interview program providers with child protection offerings, seeking innovative answers to and interrogation including the WZ Non- expertise in order to develop consensus and developing needs, and updating supplies to Confrontational Method, the Behavioral promote a public policy priority agenda in keep in step with a constantly changing field. Analysis Interview, Selective Interviewing unity. Techniques, Cognitive Interviewing, and the United States Marshals Service Accusatory Method. Each of our seminars Thomson Reuters www.usmarshals.gov is taught by experienced, Certified Forensic clear.thomsonreuters.com The USMS is the federal government’s Interviewer (CFI) instructors who provide Thomson Reuters provides information lead , responsible a proven approach that empowers you intelligence for businesses and professionals. for investigating sex offender registration to effectively and efficiently interview the CLEAR is the next generation research tool violations in connection with a violation of the abuser, and protect the child. from Thomson Reuters with a robust collection Adam Walsh Child Protection and Safety Act. of both public and proprietary records, now As part of the Act, the USMS Sex Offender with expanded criminal coverage, including Investigations Branch is given three primary photos, and mobile enhancements for smart responsibilities: assisting state, local, tribal, Visit any of our phones. Web Analytics, a feature within and territorial authorities in the location and CLEAR, instantly searches and categorizes apprehension of non-compliant and fugitive Exhibitor Demo social network sites, blogs, news sites, and sex offenders; investigating violations of the watchlists. CLEAR brings you important Act for federal prosecution; and assisting in Workshops information on a person or business and the identification and location of sex offenders E X HIBITORS shows associations between individuals and relocated as a result of major disaster. for entry to an iPad businesses. drawing at V2 Interview Room Recording TMPA www.v2advocate.com Wednesday’s www.tmpa.org V2 Interview Room Recording System is a TMPA is the voice of Texas law enforcement. complete digital interview room recording Silver Spur Supper. Since 1950, we have been protecting the management system designed with rights and interests of Texas peace officers. advanced features specific for Children’s Advocacy Centers and Law Enforcement. The See pg. 72 for TRITECH Digital FORENSICS system provides for recording and long-term Exhibitor Demonstrations www.tritechdf.com storage of multiple simultaneous interviews TRITECH Digital FORENSICS’ Velocity DF and incorporates built-in tamper protection line of products are built with the latest watermark technology.

August 12-15, 2013 | Dallas, Texas | cacconference.org 79 MAKE YOUR AGENDA

Use this page to make your agenda for the week. Be sure to select 1st and 2nd choices for each time.

10:00 - 11:30 AM WORKSHOP/CLASSROOM

1:00 - 2:30 PM WORKSHOP/CLASSROOM

MONDAY 3:00 - 4:30 PM WORKSHOP/CLASSROOM

8:00 - 9:30 AM WORKSHOP/CLASSROOM

10:00 - 11:30 AM WORKSHOP/CLASSROOM

1:00 - 2:30 PM WORKSHOP/CLASSROOM TUESDAY

3:00 - 4:30 PM WORKSHOP/CLASSROOM

8:00 - 9:30 AM WORKSHOP/CLASSROOM

10:00 - 11:30 AM WORKSHOP/CLASSROOM

1:00 - 2:30 PM WORKSHOP/CLASSROOM

WEDNESDAY 3:00 - 4:30 PM WORKSHOP/CLASSROOM

8:00 - 9:30 AM WORKSHOP/CLASSROOM

10:00 - 11:30 AM WORKSHOP/CLASSROOM THURSDAY