28th Annual

AUGUST 8–11, 2016 SHERATON HOTEL DALLAS, TX | WWW.CACCONFERENCE.ORG

DCAC-16-019 DCAC Conference Program_07mg.indd 1 7/29/16 11:52 AM TABLE OF CONTENTS

Welcome Letter ���������������������������������������������������������������������������� 2 Sponsors & Partners �������������������������������������������������������������������� 4 Program Overview ����������������������������������������������������������������������� 5 Opening Plenary �������������������������������������������������������������������������� 6 Frequently Asked Questions �������������������������������������������������������� 7 Discover Dallas ���������������������������������������������������������������������������� 8 Dining Options ����������������������������������������������������������������������������� 9 Maps...... 10 Continuing Education Information ���������������������������������������������� 15 Monday...... 18 Tuesday...... 22 Wednesday...... 27 Thursday...... 33 Computer Lab Schedule ������������������������������������������������������������ 36 Workshop Descriptions �������������������������������������������������������������� 37 Speakers...... 61 Exhibitor Information ����������������������������������������������������������������� 68 Exhibitors...... 69

The Conference GET SOCIAL! Has an App! USE #CACC2016 TO This year, attendees can use the app to access all STAY CONNECTED WITH US. program information, complete workshop evaluations, access handouts, take notes, and create your own During the Conference, schedule. Don’t forget workshops are first-come, look for your posts on the TagBoard! first-served, so choose a few options per time slot! No pre-registration required.

Download the CACC 2016 app from the Apple App Store or Google Play Store. To start using the app, @CACConference select “Create Account” and unlock the app using the event code: CACC2016. WiFi password: CACC2016 Visit the Tech Support Desk for assistance.

1

DCAC-16-019 DCAC Conference Program_07mg.indd 2-1 7/29/16 11:52 AM LYNN M. DAVIS DAVID O. BROWN President & CEO, Dallas Children’s Advocacy Center Chief of Police, Dallas Police Department

Welcome to Dallas! On behalf of the Dallas Police Department and the citizens of Dallas, I would like to extend a warm The Dallas Police Department is one of Thank you for joining us at the 28th Annual We are excited about our Opening Plenary speakers. Sasha Joseph the original partner agencies supporting welcome to all those attending the 28th Annual Neulinger, a young survivor, speaker and film producer, will discuss his the work of the Dallas Children’s Advocacy Crimes Against Children Conference. Thank trauma and how it has shaped him in his Survivor Keynote. Emily Vacher Crimes Against Children Conference (CACC). We Center (DCAC). Since DCAC was established you for choosing this Conference for your from Facebook, our Platinum Sponsor, will give us a look at the State encourage you to take advantage of the remarkable of the Industry. And Lou Luzynski, co-founder and managing partner of in 1991, the Department’s Child Abuse Squad professional training experience. We hope you Watch Systems, Inc., our Gold Sponsor, will present an award to a law has been housed at DCAC, helping ensure training being offered this week by subject matter enforcement professional during the Opening Plenary. enjoy your week in Dallas and take advantage of a cooperative working relationship among experts from throughout the United States and the detectives, DCAC staff, medical experts, and This year’s exhibitors will offer a wide range of informational resources for world. CACC has never disappointed. The information this year’s outstanding learning and networking all child abuse professionals. Some exhibitors are also providing product Child Protective Services (CPS). The Child opportunities. Here are a few of the highlights: demonstrations on Tuesday and Wednesday in the City View rooms. Abuse Squad investigates familial physical and knowledge gained during this conference is a Attendees who participate in a product demonstration will be entered into and sexual abuse cases and cases of fatal two drawings for an iPad or a Google Nexus tablet. The drawing will be testament to its continued growth in attendees each In response to the tragic events that transpired in Dallas in July, security held during the Conference Fiesta on Wednesday evening at 7:45 p.m. child abuse and neglect. The Squad also at this year’s Conference will be of paramount importance. There will You must be present to win. investigates incidents of suspected abuse year since its conception. be additional officers on-site at the Sheraton, stationed throughout the Conference to help ensure attendees are safe and able to focus on and neglect referred to police by CPS. learning and networking. We will be even more vigilant about checking We will again take you behind the scenes of many complex investigations, In addition, we hope you also find the opportunity to name tags and badges throughout the event; you must wear your including the arrest and conviction of former Subway spokesman Jared Conference name badge; no exceptions. Fogle. We will also take you behind the scenes of the investigation and revel in the many amenities that Dallas has to offer. prosecution of our keynote speaker’s case. Look for the asterisk (*) that designates the case studies offered this week. The shopping, restaurants, and historic landmarks are Our policy on firearms will remain consistent with prior years. If you’ve chosen to bring your firearm, we ask that you keep personal firearms unparalleled. The men and women of the Dallas Police either (a) on your person at all times, or (b) locked in your room safe. We are again providing hands-on computer lab training and are now Do not leave your weapon unattended in your room or elsewhere. including more labs for non-law enforcement attendees. If you did not Department can be found throughout the conference Any firearms left unattended will be turned over to the Dallas Police register prior to arriving, visit the 3rd floor of the conference center to Department. Per hotel policy, the Sheraton prohibits the open and check for open spots. and are committed to assist you in any way to make concealed carrying of firearms by non-law enforcement. Thank you for all that you do in our collective effort to protect and serve your visit better. The conference has a mobile app this year! Attendees can use the app to children around the world. Have an excellent conference experience! access all program information, complete workshop evaluations, access Thank you for gracing us with your presence and we handouts, take notes, and make your own schedule. There is no advanced selection or registration for workshops. Visit the App or Google Play store hope you have an enjoyable time here in Dallas, Texas! and search CACC2016 to download the app!

Lynn M. Davis, David O. Brown, President & CEO Chief of Police Dallas Children’s Advocacy Center Dallas Police Department

2 3

DCAC-16-019 DCAC Conference Program_07mg.indd 2-3 7/29/16 11:52 AM 2016 SPONSORS & PARTNERS PROGRAM OVERVIEW The Annual Crimes Against Children Conference is Presented By Welcome to the 28th Annual Crimes Against Children Conference.

Providing justice and restoring hope for twenty-five years We are glad you have joined us and hope that you enjoy your week in Dallas at our

Conference Sponsors internationally recognized conference! Monday morning begins with an opening session that includes the conference keynote presentations. It will also provide you with updated conference information. Platinum Sponsor Gold Sponsor Bronze Sponsor Bronze Sponsor During the conference, there will be 27 this schedule will be communicated via HELP DESK or ask one of our Conference workshops and 10 interactive computer labs app notifications and information screens staff or volunteers in aqua blue t-shirts. We operating concurrently. Selected workshops located throughout the conference center. appreciate the hard work you do, and hope are repeated. The schedule is broken down by If you cannot find something you are looking you have a great conference experience! date and time in this program. Any updates to for, please do not hesitate to go to the

The Technology C o a l i t i o n CONFERENCE SCHEDULE Please see page 36 for the Computer Lab schedule.

SUNDAY MONDAY TUESDAY WEDNESDAY THURSDAY

2:00–9:00 PM 7:00–8:30 AM 7:00–8:30 AM 7:00–8:30 AM 7:00–8:30 AM BEAT THE CROWD Light Continental Breakfast Light Continental Breakfast Light Continental Breakfast Light Continental Breakfast Conference Check-in Registration/Check-in is on the 2nd floor of the Sheraton 8:30–9:45 AM 8:30–9:45 AM 8:30–9:45 AM 8:30–9:45 AM Conference Center. Opening Plenary Workshops Workshops Workshops

2:00–6:00 PM 10:15–11:30 AM 10:15–11:30 AM 10:15–11:30 AM 10:15–11:30 AM Lab Registration is Workshops Workshops Workshops Workshops on the 3rd floor of the Sheraton Conference Center NOON–1:15 PM NOON–1:15 PM NOON–1:15 PM 11:30 AM Workshops Workshops Workshops Conference Concludes

1:45–3:00 PM 1:45–3:00 PM 1:45–3:00 PM Workshops Workshops Workshops

Training Partners 3:30–4:45 PM 3:30–4:45 PM 3:30–4:45 PM Workshops Workshops Workshops

4:45–6:30 PM 6:00 PM 7:00 PM Meet and Greet Dallas Police Association CONFERENCE FIESTA in the Exhibit Hall Hospitality Event Dinner served until 8:30 Dinner on your own Optional off-site Networking Event

4 5

DCAC-16-019 DCAC Conference Program_07mg.indd 4-5 7/29/16 11:52 AM OPENING PLENARY FREQUENTLY ASKED QUESTIONS Monday, August 8th | 8:30–9:45 AM | Lonestar Ballroom DO I HAVE TO WEAR MY NAME BADGE? discover you have left your child unattended, you will be asked to leave Yes. For your safety, and the safety of others, you will not be permitted the conference until adequate care is found. Please see the concierge at access into any sessions, special events, or common areas without your your hotel and ask about child care options. name badge. No exceptions. If you misplace your badge or leave it at your hotel, you can purchase a new badge for $5 at the Help Desk. You will MY HOTEL IS OFF-SITE AND I FEEL UNSAFE Keynote Speaker need a valid picture ID. TRAVELING ALONE. WHAT SHOULD I DO? Sasha Joseph Neulinger If you are ever uncomfortable or feel unsafe during the conference, please CAN I CARRY MY FIREARM? visit the Help Desk and we will address your concerns. Our policy on firearms will remain consistent with prior years. If you’ve Sasha Joseph Neulinger is the co-founder and Head of Production at Step 1 Films. He is currently directing chosen to bring your firearm, we ask that you keep personal firearms either HOW DO I NETWORK WITH OTHER ATTENDEES? (a) on your person at all times, or (b) locked in your room safe. Do not his first feature-length documentary,Rewind To Fast-Forward, an autobiographical film about his life surviving The camaraderie and networking opportunities at our conference are leave your weapon unattended in your room or elsewhere. Any firearms unparalleled. Visit the exhibitors to learn about professional resources multigenerational child sexual abuse. While working to raise the finishing funds for his film, Sasha travels nationally left unattended will be turned over to the Dallas Police Department. Per available to you. See page 68 for a map of exhibitor booths. as a public speaker, advocating for reforms in child advocacy and child abuse prevention. Sasha’s TEDx Talk, Trauma hotel policy, the Sheraton prohibits the open and concealed carrying of Is Irreversible. How It Shapes Us Is Our Choice, has been viewed over 78,000 times to date, reaching survivors firearms by non-law enforcement. Don’t forget to attend: internationally. Sasha’s case, Prosecution of a Multigenerational Child Sexual Abuse Case: Ten Years in the Making, • Meet and Greet in the Exhibit Hall Monday Evening will be presented three times during the Conference. CAN I TAKE PHOTOS OR VIDEOS DURING SESSIONS? • Dallas Police Association Hospitality Event Tuesday Evening Please do not record or take any photos in workshops. This is against • Conference Fiesta Wednesday Evening our policy, and you will be asked to leave the workshop and delete any • Session Forums (See Monday’s schedule) recorded content. If the issue persists beyond the first offense, you may • Use the app! Our app has a feature where you are able to share your State of the Industry Remarks be asked to leave the conference. contact information with attendees and communicate with each other Emily Vacher, Facebook within the app. Please visit the Tech Support Booth next to the Continuing DO I HAVE TO SIGN UP FOR CLASSES BEFOREHAND? Education booth for assistance. No. All workshops are first-come, first-served, with the exception of Emily Vacher joined Facebook in 2011 and is currently a Director with Facebook’s Trust & Safety team. Emily is computer labs. If you have your eye on a specific class and want to HOW DO I SUBMIT WORKSHOP FEEDBACK? responsible for law enforcement outreach, global safety initiatives, safety education, and security policy matters. ensure a seat, arrive early. Have back up workshops in mind in case your In order to provide a more seamless process, all evaluations are done on She is currently focusing on Facebook’s AMBER Alert program and child safety issues. Emily works extensively first choices are full. Check the schedule for possible repeats of the most the Conference app. If you have any specific concerns about a speaker with the National Center for Missing & Exploited Children (NCMEC) where she serves as a member of NCMEC’s popular classes. If you are interested in open computer lab seats, please or workshop, see the Help Desk. Otherwise, please download the app to executive board and the law enforcement/operations committee, and also serves as a member of NCMEC’s Team visit the 3rd floor. evaluate all workshops. ADAM/Project Alert. Emily works closely with the International Center for Missing & Exploited Children (ICMEC) on WHY IS IT SO COLD IN THE CONFERENCE CENTER? HOW DO I GET AROUND DALLAS? global missing children’s issues and alert system development and training. Before she joined Facebook, Emily was It is 100 degrees outside, and freezing inside. Texas is hot in August, We are proud to announce Uber as the preferred transportation sponsor a Special Agent with the Federal Bureau of Investigation (FBI) for more than a decade, specializing in crimes against what can we say? The hotel works their hardest to ensure the comfort of for 2016! Dallas has many other transportation options, as well. See children matters. Emily holds a BS from Cornell University, an MS and MPA from Syracuse University/Maxwell our attendees, however the air conditioning can be difficult to regulate page 8 to read more about your transportation options. School of Citizenship & Public Affairs and a J.D. from Syracuse University College of Law. with such extreme temperatures and the constant movement throughout the conference center. We are selling long-sleeved t-shirts – visit booths I CAN’T FIND ANY OF THE CLASSROOMS! 76-78 to purchase yours! The Sheraton conference center and Marriott can be very confusing to navigate. See pages 10–12 to access maps or ask for directions from our Presentation of Award to Law Enforcement Professional HOW DO I ACCESS HANDOUTS? staff in aqua blue t-shirts. Lou Luzynski, Watch Systems All handouts are available on Dropbox AND on the app. Not all speakers will submit handouts, so all handouts we have been sent are available to WHAT DOES THE BLACK DOT ON MY NAME BADGE attendees. The access link and password to the Dropbox account were MEAN? WHAT ABOUT THE PURPLE STAR? Lou Luzynski is the co-founder and managing partner of Watch Systems, a public safety solutions firm founded emailed to each attendee before the conference. If you did not receive this The black dot means we have accounted for you to attend the Wednesday in 2000 in Covington, Louisiana. Lou’s vision of enhancing community safety through technology resulted in the email, please visit the Help Desk for access information. evening party. If you are planning to attend, but do not have a dot, don’t development of OffenderWatch, the nation’s leading sex offender management and community notification solution. worry about it, you will be fed! The purple star means that you indicated OffenderWatch is used by over 3500 local, state, and federal law enforcement agencies to register 60% of sex IF I’M A NURSING MOTHER, during online registration that you were interested in OffenderWatch’s offenders nationwide and to inform the public through agency web sites and by sending over 4 million postcards and WHERE CAN I GO TO NURSE PRIVATELY? networking opportunities. 17 million email alerts annually. Lou works extensively with legislators, Sheriffs, state officials and victim advocacy Privacy for nursing mothers can be found in Pearl 5. Please visit the Help Desk if you need assistance locating this room. There will be keycard groups to promote best practices in offender management and community notification and to educate the public of For all other questions, please visit the Help Desk access. Keycards can be accessed in Pearl 4, just next door. the dangers of sex offenders. Prior to Watch Systems, Lou was co-founder, President and Chief Executive Officer of located in the Lone Star Foyer by the registration booths Fuelman. Lou helped guide the fleet fuel startup in 1985 to a company with over 300 employees and $100 million in I BROUGHT MY CHILD WITH ME, BUT NOT MY or ask a staff member in an aqua shirt. annual sales in 1999. Previously, Lou was a Senior Manager of audit, tax, and management consulting services at SPOUSE. WHERE CAN I ACCESS CHILD CARE? KPMG Peat Marwick for early-stage, privately-held emerging growth companies. Lou earned a B.A. in Accounting The conference does not provide child care nor are children allowed in with Cum Laude honors from St. Louis University and is a Certified Public Accountant. the workshops or to be left unattended in the conference center. If we

6 7

DCAC-16-019 DCAC Conference Program_07mg.indd 6-7 7/29/16 11:52 AM DISCOVER DALLAS IF YOU CAN’T STAND THE HEAT... Dining Options within the Hotel/Conference Center

SHERATON HOTEL DINING OPTIONS

Light Continental Breakfast The Kitchen Table Draft Sports Bar Provided by the Conference every Open daily for breakfast, lunch, and Open daily for lunch and dinner morning from 7:00–8:30 AM. dinner 6:30 AM–10:00 PM 11:00 AM–1:00 AM A small number of gluten-free options Peet’s Coffee & Tea Cash Lunch – Grab & Go VISIT ONE OF OUR UNIQUE DALLAS NEIGHBORHOODS FOR LUNCH OR DINNER! will be provided; please arrive early to Open daily at 6:00 AM Offered on 1st floor of Conference Center enjoy! A SHORT WALK AWAY A SHORT UBER RIDE AWAY (0.1–0.6 miles from the Sheraton) (0.7–2 miles from the Sheraton) Americano AllGood Cafe Campisi’s Cane Rosso ENJOY OUR SOUTHERN HOSPITALITY! CBD Provisions The Cedars Social Dinner is provided Tuesday and Wednesday evenings at the following social events: Dallas Chop House Dickey’s BBQ Freshii Salads Fuzzy’s Taco Shop Lark on the Park MesoMaya TUESDAY WEDNESDAY Savor Smashburger DPA Hospitality Evening Conference Fiesta 6:00 PM 7:00 PM (Dinner Served until 8:30 PM) Twisted Root Burger Co. Spaghetti Warehouse Pizza Dinner Served TexMex Dinner Served Wild Salsa Stampede 66 Transportation provided (see pg. 26 for details) Lone Star Ballroom The Woolworth Truluck’s You must wear your name badge to both events. No exceptions.

VISIT KLYDE WARREN PARK Those attending only one or two days of the Conference, or those who have an Exhibitor Badge, A 5-acre urban park within walking distance of the Sheraton. should purchase tickets to the Conference Fiesta at the Cashier’s Desk. $30/person The park is lined with gourmet food trucks from noon–3pm daily, and offers health and fitness programs, No tickets available for purchase after 8pm on Wednesday. reading carts, and game carts full of fun activities like board games and ping-pong.

3 GREAT WAYS TO GET AROUND DALLAS PLAZA OF THE AMERICAS DINING OPTIONS Follow the directional signage from the second floor of the Sheraton Hotel across the skybridge to the Plaza of the Americas. DART LIGHT RAIL SYSTEM D-LINK BUSES M-LINE TROLLEY operates both a city rail and bus service offering These free buses run every 15 minutes, The historic and free M-line Trolley travels up convenient transport throughout Dallas, with 11am-11:30pm, Monday-Saturday. D-Link is a and down McKinney Avenue and through the Blimpie’s Subs & Salads J. Pepe’s Tex Mex Smoothie King the closest DART stop across the street from convenient way to explore the city and experience north end of downtown. The closest trolley stop Broadway Pizza KFC Express Sushi Ya the hotel at the Pearl/Arts District Station at Dallas. The closest D-link stop is located at the to the Sheraton is located at Federal St. & Olive Chez Max McDonald’s Taco Bell Bryan St. and Pearl St. A Daily DART Pass is $5. Pearl/Arts District Station at Bryan St. and Pearl St. St. a quick walk 5-minute walk or less from China Dragon NewHaus Treebirds DART operates 24-hours a day. the Sheraton. Corner Bakery Philly Town Yumi Yogurt Please visit dart.org/dlink for more information. Higher Grounds Plaza Donuts Ziggy’s BBQ Please visit dart.org or call 214-979-1111 Please visit mata.org for more information. for trip planning assistance.

8 9

DCAC-16-019 DCAC Conference Program_07mg.indd 8-9 7/29/16 11:52 AM SHERATON HOTEL & SHERATON HOTEL & CONFERENCE CENTER CONFERENCE CENTER

1ST FLOOR 3RD FLOOR Conference Center Conference Center

Cash Lunch and Seating Computer Lab Sign Up DCAC Exhibit Booth and Help Desk Dallas Ballrooms Houston Ballrooms 37TH FLOOR Exhibitors San Antonio Ballrooms Sheraton Hotel Refreshment Breaks State Rooms Technology Coalition (closed meeting)

11 10 Majestic Majestic Majestic Majestic Majestic 1 2 3 4 5

ELEVATORS

Majestic Majestic Majestic 9 8 7 6 Majestic Majestic Majestic 2ND FLOOR Charging Sheraton Hotel Station NCMEC CVIP Lab Austin Ballrooms (Live Oak Room) Executive Boardroom NCMEC CVIP Lab Executive Press Club Boardroom Question Booth Seminar Seminar Skybridge access to: Marriott Dallas City Center Plaza of the Americas 4TH FLOOR Sheraton Hotel

Special City View Rooms 2ND FLOOR Registration Conference Center Exhibitor Workshops Fitness Center Continuing Education Sign In Remington Exhibitors Help Desk Continuing Education Lone Star Ballrooms Sign In and Tech Help Desk Premium Exhibitors Refreshment Breaks Registration Booths Registration Booths and Help Desk Tech Support Booth

10 11

DCAC-16-019 DCAC Conference Program_07mg.indd 10-11 7/29/16 11:52 AM CAMBRIDGE SOMERSET

SECOND FLOORMARRIOTT CITY CENTER

3RD FLOOR We are proud

NORMANDY PLAZA BALLROOM GUEST A B OFFICE A B C to honor the BORDEAUX NICE

ALSACE CHAMPAGNE men and women THIRD FLOOR Follow signs from the Sheraton to Plaza A and Plaza B/C. who protect our nation’s children.

For professionals fighting crimes against children Presented by the Doswell Foundation

The Lecture Series is held at various times throughout the year in DCAC’s state-of-the-art training facility. The Lecture Series is designed for the sole purpose of providing training to only those people employed by governmental and nonprofit agencies in the fields of law enforcement, prosecution, child protective services, social work, children’s advocacy, therapy, probation, parole, and medicine who work directly with child victims of crime and whose intent is to help children in their healing process. SAVE THE DATES FOR THESE TRAINING SESSIONS. September 9, 2016 September 29, 2016 | 1–4 pm Investigating Suspicious Burn Injuries on Children Reducing Harsh Punishment and Physical Abuse Phylip Peltier in Culturally Diverse Families Lisa Aronson Fontes, Ph.D. September 29, 2016 | 9 am–12 pm Interviewing Culturally Diverse Families October 14, 2016 about Child Maltreatment Same Family, Different Victims: Lisa Aronson Fontes, Ph.D. The Intersection Between Child Abuse and Domestic Violence Kristen Howell, MSW

Visit dcac.org/LectureSeries for registration information. Platinum sponsor of the 28th Annual Crimes Against Children Conference

12 13

DCAC-16-019 DCAC Conference Program_07mg.indd 12-13 7/29/16 11:52 AM CONTINUING EDUCATION

The Crimes Against Children Conference is an approved provider of Continuing Education credit on behalf of the organizations listed below. Please read the information regarding your respective field carefully to assure you receive credit. Please visit the Continuing Education booth in the registration area to sign in EVERY DAY. If you do not sign in every day, we cannot confirm that you attended the conference, and credit may not be granted.

Association for Play Therapy (APT) Texas State Board of Examiners of Marriage Anyone seeking APT credit may visit the Continuing Education desk for a and Family Therapists (LMFT) list of approved play therapy courses. You must sign in when you get to Anyone seeking LMFT credit must sign in every day. License number required. the classroom. ® Texas State Board of Examiners of Professional Counselors (LPC) National Association of Social Workers (NASW) The leader in sex offender management and community notification Anyone seeking LPC credit must sign in every day. License number required. Anyone seeking NASW credit must sign in every day. Kickstart your Sex Offender Registry Handson Demonstration of Your Agency’s Processes Automated with OffenderWatch® National Board for Certified Counselors (NBCC) Texas State Board of Social Work Examiners (LMSW) Anyone seeking LMSW credit must sign in every day. License number required. 9AM 4PM Monday, Tuesday and Wednesday in Austin 3 DCAC has been approved by NBCC as an Approved Continuing Education After discussing your current statutes and processes, we will demonstrate how OffenderWatch® can improve your agency’s Provider, ACEP No. 6602. Programs that do not qualify for NBCC credit are efficiency in registering offenders, conducting verifications, performing sweeps, responding to abductions, managing homeless Texas Commission on Law Enforcement (TCOLE)* clearly identified. DCAC is solely responsible for all aspects of the program. offenders, and locating absconders. TCOLE credit will be awarded to Texas Peace Officers through the Dallas Anyone seeking NBCC credit must sign in every day. Visit the Continuing FREE Training with Sr. Law Enforcement Consultants Police Department. Anyone seeking TCOLE credit must sign in every day. Education desk for a list of approved courses of study. 9AM 4PM Monday, Tuesday and Wednesday in Austin 3 TCOLE issued personal identification number (PID) required. If you do not Our senior professional staff will be offering training sessions in Austin 3 on the following topics: Integrating community know your PID number, contact TCOLE at 512-936-7700. notifications with your social media, OffenderWatch® Training, Advance Data Collection and Crisis Management, Collaborating with State Bar of Texas (MCLE) the US Marshals and more. Please check the conference website under “Exhibitors Workshops” for a complete listing of trainings Anyone seeking MCLE credit must sign in every day. Bar number required. *Out of state peace officers should submit their conference certificate to and times. Those seeking ethics credit may visit the Continuing Education desk for a their respective agencies for consideration of credit in their jurisdiction. Workshops for Law Enforcement list of approved ethics courses. You are not required to sign in daily. Comprehensive Offender Management: Exceeding the Letter and the Spirit of the Law Texas Center for the Judiciary 8:30 AM Tuesday and 10:15 AM Wednesday in Austin 1 Anyone seeking CJE or Family Violence credit may visit the Continuing Learn how to leverage OffenderWatch® to establish best practices for sex offender management. We will discuss current policies for data collection, supervision, conducting searches and public notification and demonstration techniques for improvingyour Education desk or the Special Registration area for CJE/Ethics and Family agency’s efficiency in registering offenders, conducting verifications, performing sweeps, and managing homeless offenders. Violence forms and lists of approved courses of study. Increasing Public Safety Through Community Partnerships 10:15 AM Tuesday in Austin 1 This workshop will focus on increasing public safety and education by building better community relations through your sex offend- er management efforts. The presenters will discuss various methods to foster better communication between your agency and the CERTIFICATE OF COMPLETION public through the use of social media, mailings , seasonal press releases , tips and a variety of other programs. You will receive an e-mail from us immediately post-conference with a link to a survey. Best Practices for Managing and Monitoring your Sex Offender Registration Program Once you complete the survey, you will receive a second email containing the link leading Sheriff Voutour presenting. to your certificate. You may print your certificate from that page. 1:45 PM Wednesday in Austin 1 Sheriff Voutour of Niagara County NY will be discussing policies he has successfully implemented to efficiently monitor the manage- No certificates will be handed out on-site. ment of the counties nearly 400 sex offenders and exceed the notification expectations of his community.

Predictive Policing Analytics as Applied to Sex Offender Management HOW TO RECEIVE CREDIT 1:45 PM Tuesday, 8:30 AM Wednesday in Austin 1 Your certificate will include the provider numbers for this Conference. The presenters will review the model being used by Baltimore PD to develop a strategic plan for sex offender resource allocation. All attendees (except Texas Peace Officers seeking TCOLE hours) are responsible A key part of that plan includes enhanced enforcement and deployment strategies based on the predictive policing algorithm. for turning in their hours to their respective fields. To arrange a live demonstration for your agency after the conference, please email [email protected] © Copyright 2016 by Watch Systems, LLC. All Rights Reserved. OffenderWatch® is a registered trademark of Watch Systems. Visit www.watchsystems.com

14 15

DCAC-16-019 DCAC Conference Program_07mg.indd 14-15 7/29/16 11:52 AM The Crimes Against Children Conference is presented by DALLAS CHILDREN’S ADVOCACY CENTER DJ PHOTOBOOTH

Providing justice and restoring hope for twenty-five years MISSION 4,16 4 OUR IMPACT IN 2015 The mission of the Dallas Children’s children and their 4,031 Total Family Advocate Clients Advocacy Center (DCAC) is to non-offending improve the lives of abused children in family members 1,234 Total Therapy Clients Dallas County and to provide national were served. leadership on child abuse issues. 29,075 People educated CORE VALUES 2,117 Total forensic reviews The children come first in all that we do. 736 In-depth case discussions We operate as a seamless team. Each of us acts with a servant’s heart. VISIT DCAC’S SALES BOOTHS (76–78) TO PURCHASE EE A Conference Shirts FIESSSTTAA Short-sleeve—$15 Long-sleeve—$20 Polos—$35 FFII T

DCAC’s National Child Abuse Education Curriculum

CASINO TEX MEX

This training is designed to raise This Spanish curriculum offers The parent portion of this curriculum awareness and to spur action culturally relevant content and empowers parents with the language from the many professionals and information for Hispanic audiences and tools needed to talk with children volunteers who work with children on on recognizing and reporting child about personal safety, and explains a regular basis. This curriculum will abuse. This curriculum will educate the type of policies that should be educate child-serving professionals parents, child-serving professionals instituted at child-serving organizations or volunteers on the basic issues or volunteers on the basic issues to minimize potential for abuse. The of child abuse, how to recognize of child abuse, how to recognize child portion of this curriculum is TH physical and behavioral signs of the physical and behavioral signs of the designed for children ages 8-14 to AUGUST 10 7PM–12AM varying forms of child abuse, and varying forms of child abuse, and teach them the basics of personal Serving Tex Mex Until 8:30pm. Must wear name tag to attend. No exceptions. how to make a report. how to make a report. safety in both the real and virtual world.

Visit DCAC’s booths or trainingcenter.net for more information.

16

DCAC-16-019 DCAC Conference Program_07mg.indd 16-17 7/29/16 11:52 AM Working with Non-Offending *Kenneth Stokes: Understanding and Investigating Parents in Child Sexual Abuse Cases Web Master and Child Molester Child Pornography Dan Powers James Holdman Steven Del Negro

CASE STUDIES & WORKSHOPS MONDAY Each session is listed by time block. See pgs. 37–60 for workshop descriptions and pgs. 61–67 for speaker information. Dallas D1 Repeats Wednesday at 10:15 AM. Austin 2 Lone Star C2 US Marshals: Fugitive Sex Offender MONDAY, (The) Power of Proactive 12:00–1:15 PM Media as a Partner: High Profile Cases Investigations and Resources MONDAY 10:15–11:30 AM Caregiver Engagement Alison Feigh Thomas Bloxom, Eric Mayo AUGUST 8 Katrina Cook, Mindy Jackson Child Abuse Investigations: Seminar Repeats Tuesday at 1:45 PM. *Bianca Jones Case Study Seminar The Practical Police Response City View 7 Schedule at a glance: Edward Price Craig Miller, Jason Rodriguez Multi-Victim Cases: Identification, Repeats Wednesday at 12:00 PM. Precision Prevention Repeats Wednesday at 3:30 PM. Notification and Interviewing All In (The) Use of Tactical Polygraph with Plaza B-C (Marriott) 7:00–8:30 AM Dyann Daley Dallas A1 One Child Pornography Investigations Light Continental Breakfast Repeats Wednesday at 10:15 AM. Ale Levi Anthony Hall CPS Forum Dallas D2 *Chyenne Kircher: Solving a Tragedy Repeats Wednesday at 3:30 PM. Repeats Tuesday at 12:00 PM. Registration/Check-In Kathryn Sibley Horton Kim Castro, Wayne Jackowski Austin 1 Plaza A (Marriott) Lone Star Foyer City View 6 *Reading Between The Lines in Repeats Wednesday at 10:15 AM. A Compelling Prostitution Case Lone Star A1-A2 (A) Non-Confrontational Approach to Using Craigslist and Backpage for Digital Evidence in Child Michael McMurray, Hilary Wright Interviewing and Interrogating Child Undercover Operations 8:30–9:45 AM Abuse Prosecutions Repeats Wednesday at 12:00 PM. (The) Disturbing Underground World Abuse Suspects Jesse Crowe, James Valley Opening Plenary Justin Fitzsimmons Dallas C of “Re-Homing” Adopted Children: Thomas McGreal Lone Star C3 Lone Star C2 Lone Star Ballroom What’s Going On and What Can We Repeats Tuesday at 8:30 AM. Screening and Treatment of Do About It? Dallas D1 Utilizing NamUs to Resolve Long-Term Live Streamed in Facebook: 101 Sexually Abused Children Using Missing and Unidentified Deceased Jason Barry, Andrea Kirkpatrick Angela Goodwin, Laurel Whitney Parke Dallas Ballroom for Overflow Evidence-Based Approaches Repeats Tuesday at 10:15 AM. OffenderWatch Demo Lab: Child Cases Repeats Wednesday at 1:45 PM. Jeff Wherry, Karina Samaniego OffenderWatch Training B.J. Spamer Lone Star C4 Dallas A3 9:45–10:15 AM Remington Joel Shoultz Remington Forensic Interviewer Forum Domestically Violent Homes: Repeats Tuesday at 8:30 AM and Wednesday Sexually Violent Predators: at 3:30 PM. Break Jesse Gonzalez, Carrie Paschall The Threat of Harm to Children Texas and Beyond Austin 3 Refreshments Provided City View 8 Andrew Campbell Erin Faseler Repeats Thursday at 10:15 AM. 1:45–3:00 PM Repeats Tuesday at 12:00 PM. Giving Faces to the Nameless Lone Star A4 *Operation Misdial: Dallas A1 Accident or Inflicted: Investigator, 10:00 am–5:00 PM and Hope for the Missing How a 6th Grader Caught a Predator You Decide! Quirina Orozco, Scott Schofield Joe Mullins Ethical Considerations in Jim Sears NCMEC CVIP Lab Open Sizing It Up: Repeats Wednesday at 3:30 PM. Dallas A2 Charging Decisions Repeats Tuesday at 12:00 PM. Live Oak Room The Skinny On Failure to Thrive Todd Hornik Plaza B-C (Marriott) Lone Star A4 Google: Combating Child Exploitation Emily Lentz, Sandra Onyi Repeats Monday at 3:30 PM. Repeats Wednesday at 8:30 AM. *Prosecution of a Multi-Generational Dona Bellow, Cathy McGoff City View 6 Ages and Stages of Sexual Abuse 11:30AM–NOON Dallas A3 Child Sexual Abuse Case: Ten Years in Dallas D3 the Making Sandra Onyi, Lisa Schuster Break *Finding Tara: The Race To Save a Girl Repeats Wednesday at 12:00 PM. State Prosecutor Forum Sasha Joseph Neulinger, George Ohrin No Refreshments Provided Grooming Behaviors Among and Catch a Predator City View 7 Child Molesters and the Impact Eren Price, Carmen White Francey Hakes Repeats Tuesday at 8:30 AM and 12:00 PM. City View 7 on the Victims Repeats Tuesday at 1:45 PM. Dallas C Anti-Forensics: 1:15–1:45 PM Lone Star C4 Darrel Turner Suffer from Burnout? Prosecutors, Hearsay and Crawford Finding the Hidden Evidence Break Repeats Wednesday at 3:30 PM. Jad Saliba Give’em the F.I.N.G.E.R.! Bill Fulbright Lone Star A4 From Dispatch to Verdict II: Dallas D1 No Refreshments Provided Mark Yarbrough Continuing to Explore Corroboration Dallas D3 Repeats Tuesday at 3:30 PM, Wednesday at in Sexual Abuse Cases Knock and Talks: Maximum Results 12:00 PM, and Thursday at 8:30 AM. Apple Law Enforcement Response with Minimum Manpower Nancy Hebert, Vincenzo Santini Providing Therapeutic Support for and Forensics 3:00–3:30 PM Lone Star A3 Victims of Female Perpetrators Michael Johnson, John Pirics Repeats Wednesday at 3:30 PM. This session is restricted to law enforcement only Julie Brand Break Repeats Tuesday at 12:00 PM. Dallas B and will be open from 1:45–4:45 PM. *Turning Flight to Fight: Repeats Tuesday at 8:30 AM. Refreshments Provided Plaza A (Marriott) Executive Boardroom The Ronal Ordonez-Orosco Case Gentle Child Murder: Dallas A2 Crystal Levonius, Geeta Singeltary, Living With the Memories Suffocation/Strangulation/Drowning *Before, During, and After: Jon Hoffman Jim Holler Self-Care Information for ICAC Staff Jim Tanner Repeats Wednesday at 12:00 PM. Members and Colleagues The Abduction and Rescue of Heaven Repeats Thursday at 10:15 AM. Repeats Wednesday at 8:30 AM. and Lacy (Part 1 of 2) Dallas B Duane Bowers Lone Star C3 Lone Star A3 Kevin Norris, Mikinzie Price, Billy Turner, City View 8 Understanding the Lara Welch DON’T MISS OUT ON Microsoft Cybertips and Legal If I Only Knew Then What I Know Now! Repeats Thursday at 8:30 AM. Psychopathic Offender Melissa Snow, Thomas Stack Sexual Violence in Cyberspace: Requests Dallas C THE MEET AND GREET Melanie Malterer Dallas D2 From Abusive Images to Revenge Tracy Ingle, Sully Sullivan Repeats Wednesday at 12:00 PM. Porn Austin 1 First floor Exhibit Hall Austin 2 1:45–3:00 PM continued *It’s Coming From Inside the House: Sharon Cooper on next page Monday OffenderWatch Demo Lab: Sextortion Within the Family Repeats Monday at 3:30 PM. Lone Star C1 4:45-6:30 PM Interfaces to OffenderWatch Lisa Fletcher, Alix Skelton Joe Gauthier Repeats Wednesday at 10:15 AM. Austin 3 Lone Star B

18 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 19

DCAC-16-019 DCAC Conference Program_07mg.indd 18-19 7/29/16 11:52 AM 1:45–3:00 PM continued Interagency Coordination and Improving Clinical Practice as OffenderWatch Demo Lab: TICAC: Thailand’s Robust Response to Cooperation in International Parental 3:30–4:45 PM You Gather Research Mobile/Express a Transnational Criminal Threat Building a Community Education Abduction (Part 1 of 2) Colton Kurth, Jeff Wherry Scott Freeman Khemachart Prakaihongmanee, Program for Your CAC Kendall Beels, Michelle Ford-Stepney, *Before, During, and After: The Seminar Austin 3 Tamasak Wicharaya MONDAY Luís Acuña-Pilgrim, Dianna Smoot Daniel Githens, Ann McGahuey Abduction and Rescue of Heaven and Repeats Thursday at 10:15 AM. Repeats Wednesday at 3:30 PM. Plaza A (Marriott) Lacy (Part 2 of 2) Interagency Coordination and Open, Connected and Safe: Dallas A1 Austin 1 Kevin Norris, Mikinzie Price, Billy Turner, Cooperation in International Parental Facebook’s Approach to Child Safety

MONDAY Interviewing the Reluctant Child Lara Welch Abduction (Part 2 of 2) Antigone Davis *Tracking the Bus Stop Rapist Child Sexual Abuse: Rita Farrell Repeats Thursday at 10:15 AM. Kendall Beels, Michelle Ford-Stepney, Austin 2 (Part 2 of 2) A Six-Step Framework to Repeats Tuesday at 10:15 AM. Dallas C Daniel Githens, Ann McGahuey Frederick Harris, Sheilah Priori Understanding the Perpetrators Dallas A2 Plaza A (Marriott) Protecting Our Children: Repeats Tuesday at 3:30 PM. Graham Hill Child Abduction Cases Through the Empowerment vs. Expectations Lone Star C4 Repeats Tuesday at 1:45 PM. Kids in Court Lens of a Victim Advocate It’s Never Really Over: Post-Conviction A Revolution in Children’s Safety Lone Star C2 Judy Hoffman, Eren Price Alison Feigh Issues in Child Abuse Cases Stephen Daley Wellness/Survival and the MDT City View 8 Repeats Tuesday at 12:00 PM. Laura Coats, Patricia Noble, Repeats Wednesday at 8:30 AM. Approach to Child Abuse Combating Sexual Exploitation Austin 1 Christine Womble City View 8 Dan Powers One Stop at a Time Kik Law Enforcement Operations City View 7 Repeats Tuesday at 12:00 PM. Michael Bourke, Derek Prestridge Michelle Micks, Nicole Nearing Child Sex Trafficking: Sexual Abuse in Sports (Part 2 of 2) Dallas A3 Repeats Tuesday at 3:30 PM. Repeats Thursday at 8:30 AM. Effective Strategies for Recovery (A) Multidiscipline Approach to Joe Sullivan Dallas A3 Austin 2 Planning & Victim Engagement Medical Child Abuse (Part 2 of 2) Repeats Tuesday at 3:30 PM. Melissa Snow Allison Jackson, Lynsey Nix, Dallas B Countering Child Sexual Medical Child Abuse Dallas D2 Michael Weber Exploitation @ Twitter Suzanne Dakil Repeats Tuesday at 10:15 AM. Suspect Interview Techniques in Child Twitter Staff Repeats Tuesday at 3:30 PM. Childhood Fall Injuries: Plaza B-C (Marriott) Abuse Cases Seminar Lone Star A3 Accident vs. Inflicted John Combs Jim Holler (The) National Protocol for Repeats Tuesday at 12:00 PM. *Death at a Daycare (Part 1 of 2) (A) Multidiscipline Approach to Repeats Tuesday at 12:00 PM. Sexual Abuse Medical Forensic Lone Star A4 Dale Smith, Melinda Westmoreland Medical Child Abuse (Part 1 of 2) Lone Star C2 Examinations: Pediatric Repeats Thursday at 8:30 AM. Allison Jackson, Lynsey Nix, Diane Daiber Sexual Violence in Cyberspace: Lone Star B Michael Weber (A) Close-Up Look at Female Sex Repeats Thursday at 10:15 AM. From Abusive Images to Revenge Repeats Tuesday at 8:30 AM. Offenders in Positions of Trust Remington Porn Deception and Denial Among Child Plaza B-C (Marriott) Julie Brand Sharon Cooper Molesters (Part 1 of 2) Repeats Thursday at 10:15 AM. Dallas D3 Jim Tanner, Darrel Turner OffenderWatch Demo Lab: State Dallas D1 Repeats Tuesday at 1:45 PM. Implementations of OffenderWatch Lone Star A1-A2 Lionel Hanley *Death at a Daycare (Part 2 of 2) Austin 3 Dale Smith, Melinda Westmoreland Does Race and Culture Matter When Repeats Thursday at 10:15 AM. Handling a Child Sexual Abuse Case Open and Connected: Lone Star B JJ Staples Facebook’s Approach to Resilience Repeats Thursday at 8:30 AM. for Child Safety Roles Deception and Denial Among Child Remington Maggie Cook Molesters (Part 2 of 2) Dallas A1 Jim Tanner, Darrel Turner Everything You Need To Know About Repeats Tuesday at 3:30 PM. Adobe Hosted Services, PhotoDNA Sexual Abuse in Sports (Part 1 of 2) Lone Star A1-A2 Program and Policies Joe Sullivan Yu Jin Kang, Mary Catherine Wirth Repeats Tuesday at 1:45 PM. Emerging Issues in the Dallas D2 Dallas B Field of Forensic Interviewing Rita Farrell Five B’s of Child Physical Abuse: *Tracking the Bus Stop Rapist Repeats Tuesday at 1:45 PM. Bruises, Burns, Bones, Bellies, and (Part 1 of 2) Dallas A2 Brains (Part 1 of 2) Frederick Harris, Sheilah Priori Kristen Reeder Repeats Tuesday at 1:45 PM. Ethical Considerations Repeats Wednesday at 8:30 AM. Lone Star C4 in Charging Decisions Lone Star C1 Todd Hornik *When the Bough Breaks City View 6 From Anger to Solace – A Mother’s Matthew Cox, Sandy Moreland, Journey Beyond Victimization Reynie Tinajero Five B’s of Child Physical Abuse: Mika Moulton Repeats Wednesday at 8:30 AM. Bruises, Burns, Bones, Bellies, and Repeats Wednesday at 12:00 PM. Lone Star C3 Brains (Part 2 of 2) Dallas D3 Kristen Reeder X-Ways Forensics Overview Repeats Wednesday at 10:15 AM. Eric Zimmerman Lone Star C1 City View 6

20 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 21

DCAC-16-019 DCAC Conference Program_07mg.indd 20-21 7/29/16 11:52 AM *Prosecution of a Multi-Generational CAC Response to Commercial Legal Resources For Missing, Child Sexual Abuse Case: Ten Years in Sexual Exploitation Trafficked or Sexually Exploited CASE STUDIES & WORKSHOPS the Making Beth Bouchard Children Cases Each session is listed by time block. See pgs. 37–60 for workshop descriptions and pgs. 61–67 for speaker information. Sasha Joseph Neulinger, George Ohrin Repeats Thursday at 10:15 AM. Peggy Klein, Yiota Souras Repeats Tuesday at 12:00 PM. Dallas D3 Dallas A1 Lone Star C1 TUESDAY, Gang Endangered Children *Danny Dearest: Love Thy Father and Live Streaming and Child Sex Tourism: 8:30-9:45 AM (Part 1 of 2) Providing Therapeutic Support for Thy Neighbor Dark Desires Become Reality Jabari Howard, Doug Millican Victims of Female Perpetrators Shannon Miller, Sarah Preston Anoup de Weever, Jess Donkers AUGUST 9 † Accelerate Your Digital Investigations Schedule at a glance: Repeats Wednesday at 8:30 AM. Julie Brand Repeats Wednesday at 1:45 PM. Repeats Thursday at 8:30 AM. Richard Frawley Lone Star C3 Dallas A2 Lone Star C1 Dallas A2 Repeats Tuesday at 10:15 AM, 1:45 PM, and 7:00–8:30 AM 3:30 PM. Human Trafficking and Beyond Psychological Safeguarding (The) Disturbing Underground World † Mobile Forensics: City View 5 (Part 1 of 2) Michael Bourke of “Re-Homing” Adopted Children: Modern Ways of Communication, Light Continental Breakfast TUESDAY Tanisha Knighton Repeats Tuesday at 12:00 PM. What’s Going On and What Can We Hidden and Deleted Data Registration/Check-In † Advanced Evidence Analysis for Repeats Wednesday at 1:45 PM. Dallas A3 Do About It? Lee Reiber Lone Star Foyer Internet Child Exploitation Cases Plaza B-C (Marriott) Angela Goodwin, Laurel Whitney Parke City View 6 with Magnet Forensics Responding to Child Abductions Remington Mark Stringer TUESDAY Interviewing Children with Disabilities (Part 1 of 2) (A) Multidiscipline Approach to 8:00AM–5:00 PM Repeats Tuesday at 1:45 PM. Rita Farrell William Donaldson, Joshua Wilson *(The) Fall of an Icon: The Arrest and Medical Child Abuse (Part 2 of 2) NCMEC CVIP Lab Open City View 7 Repeats Wednesday at 12:00 PM. Repeats Wednesday at 8:30 AM. Conviction of Jared Fogle (Part 2 of 2) Allison Jackson, Lynsey Nix, Michael Live Oak Room Plaza A (Marriott) Lone Star A4 Christopher Cecil, Steve DeBrota, Kevin Weber But I Love Him: When Children Love Getz, Darin Odier, Andrew Willmann Dallas D2 Their Offender, or Think They Do It’s a Crisis for Me Too! Helping Social Workers: Repeats Wednesday at 10:15 AM. 9:45–10:15 AM (Part 1 of 2) Non-Offending Parents in Child Making a Case for Safety Lone Star A1-A2 Normal to be Normal: Break Carrie Paschall, Kim Skidmore, Sexual Abuse and Learning from Jim Holler An Absence of Findings Does Not Kelly Slaven Them Dallas D3 Following the Evidence in the Mean the Absence of Abuse Refreshments Provided Repeats Wednesday at 1:45 PM. Deena Ott, Jeff Wherry Commercial Sexual Exploitation Justin Fitzsimmons, Mark Hudson † Lone Star C2 Remington Traffic Jam: Unlocking Online Data Forensic Interview Lone Star A3 to Fight Human Trafficking (Includes † Julie Kenniston 11:30AM–NOON Completing an Investigation with (A) Multidiscipline Approach to Free Trial Access to Software) Plaza A (Marriott) Not Just Pictures (Part 2 of 2) Break EnCase Forensic 8 Medical Child Abuse (Part 1 of 2) Brian Sowa Sharon Cooper, Tink Palmer No Refreshments Provided Steve Salinas Allison Jackson, Lynsey Nix, City View 6 Gang Endangered Children Repeats Wednesday at 10:15 AM. City View 8 Michael Weber (Part 2 of 2) Dallas B Dallas D2 Understanding Sex Offenders Jabari Howard, Doug Millican 1:15–1:45 PM Comprehensive Offender (Part 1 of 2) Repeats Wednesday at 10:15 AM. OffenderWatch Demo Lab: Management: Exceeding the Letter Break (A) Non-Confrontational Approach to Jim Tanner Lone Star C3 Booking Alerts/Active Contact and the Spirit of the Law Interviewing and Interrogating Child Repeats Wednesday at 8:30 AM. Scott Freeman No Refreshments Provided Joe Gauthier Abuse Suspects Dallas C Human Trafficking and Beyond Austin 3 Repeats Wednesday at 10:15 AM. Thomas McGreal (Part 2 of 2) Austin 1 Dallas D1 *Whatever it Takes: Women Who Offer Tanisha Knighton Preparing MDT Professionals to 3:00–3:30 PM Sex with Their Children to Keep Their Repeats Wednesday at 3:30 PM. Testify in Court Break (The) Darknet and Emerging NOT JUST PICTURES (Part 1 of 2) Man (Part 1 of 2) Plaza B-C (Marriott) Mary Sawicki Refreshments Provided Technologies: Where Are Teens Going Sharon Cooper, Tink Palmer Julie Peay, Joe Sullivan Austin 2 and Offenders Following? Repeats Wednesday at 8:30 AM. Repeats Wednesday at 1:45 PM. Increasing Public Safety Through Justin Fitzsimmons Dallas B Lone Star B Community Partnerships Responding to Child Abductions 6:00 PM Lone Star A3 Joel Shoultz, John Strain (Part 2 of 2) Dallas Police Association OffenderWatch Demo Lab: Austin 1 William Donaldson, Joshua Wilson Debunking Defense Myths in Abusive OffenderWatch Training Repeats Wednesday at 10:15 AM. Hospitality Event Head Trauma Cases Joel Shoultz 10:15–11:30 AM † Innovations in Incident Response for Lone Star A4 Nancy Cochrane, Angela Vickers Repeats Wednesday at 3:30 PM. Shuttle Transportation Provided † Accelerate Your Digital Investigations Crimes Against Children Dallas A1 Austin 3 Jason Sanchez Sexual Abuse Prosecution 101 on Ground Floor of Sheraton Hotel Richard Frawley Repeats Wednesday at 10:15 AM. Melinda Westmoreland Repeats Tuesday at 1:45 PM, and 3:30 PM. Engaging Friends to Build Support for Opening Statements and City View 8 Repeats Wednesday at 12:00 PM. Your Agency Closing Arguments City View 5 Lone Star C4 Becky Aguilar, Katie Overman Victor Vieth Interviewing the Reluctant Child Seminar Repeats Wednesday at 8:30 AM. But I Love Him: When Children Love † Smartphone and Tablet Forensics Their Offender, or Think They Do Rita Farrell Lone Star C4 Dallas A3 with Magnet AXIOM *(The) Fall of an Icon: The Arrest and (Part 2 of 2) Mark Stringer Conviction of Jared Fogle (Part 1 of 2) Prosecuting Child Abuse Cases with Carrie Paschall, Kim Skidmore, Kelly Keeping Children Safe: Education and Repeats Tuesday at 3:30 PM. Christopher Cecil, Steve DeBrota, Kevin Limited Evidence Slaven Prevention Series City View 7 Getz, Darin Odier, Andrew Willmann Mary Sawicki Repeats Wednesday at 3:30 PM. Char Rivette, Julia Strehlow Repeats Wednesday at 8:30 AM. Austin 2 Lone Star C2 Repeats Wednesday at 12:00 PM. 10:15–11:30 AM continued Lone Star A1-A2 Seminar on next page

22 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 23

DCAC-16-019 DCAC Conference Program_07mg.indd 22-23 7/29/16 11:52 AM 10:15–11:30 AM continued *(The) Hunt for the Tutu Girls *Three’s Company...and the Victims Child Homicide Investigations OffenderWatch Demo Lab: *Barway Collins: A Missing Child, Janet Connolly, Nicole Rye Left Behind Brian Killacky Investigative Searches and a Murdered Son and a Father Understanding Sex Offenders Repeats Wednesday at 8:30 AM. Matthew Cox, Sandy Moreland, Reynie Dallas D2 Collaborating with the US Marshals Prosecuted (Part 2 of 2) (Part 2 of 2) Dallas B Tinajero within OffenderWatch Derrick Hacker, Stephanie Revering, Jim Tanner Repeats Wednesday at 1:45 PM. Child Sexual Abuse: Joel Shoultz Amy Sweasy Repeats Wednesday at 10:15 AM. Investigating and Prosecuting Lone Star C2 A Six-Step Framework to Austin 3 Repeats Thursday at 10:15 AM. Dallas C Abusive Head Trauma Understanding the Perpetrators Lone Star C2 Nancy Cochrane (The) Use of Tactical Polygraph with Graham Hill *Operation Round Table (Part 1 of 2) *Whatever it Takes: Women Who Offer Lone Star C4 Child Pornography Investigations Dallas A3 Lisa Maher, Matt Wright Before They Were Missing: Sex with Their Children to Keep Their Anthony Hall Repeats Thursday at 8:30 AM. An In-Depth Analysis of NCMEC Data Man (Part 2 of 2) Knock and Talks: Maximum Results Austin 1 (The) Cross-Examination Survival Lone Star C3 on Abductions and Sex Crimes Julie Peay, Joe Sullivan with Minimum Manpower Game Show Stacy Jeleniewski, Jessica Kenton Repeats Wednesday at 3:30 PM. Michael Johnson, John Pirics *(The) United States of America v. Steve DeBrota, Michael Johnson, Predictive Policing Analytics as Remington Lone Star B Remington “God”: The Paul Sewell Investigation John Pirics Applied to Sex Offender Management: TUESDAY Sara Blond, Chris Duncanson Repeats Thursday at 8:30 AM. A Case Study (The) Best Kept Secret: Mother- Yahoo Child Safety Efforts *Mike Pyro: Sextortion and New Repeats Wednesday at 8:30 AM. Lone Star A1-A2 Adam Kirhagis, Jay Lathwell Daughter Sexual Abuse (Part 2 of 2) Apoorv Dutta​, Kathleen Lefstad Technologies Lone Star B Repeats Wednesday at 8:30 AM. Julie Brand Dallas D1 Paul Wolpert, Elizabeth Yusi Deception and Denial Among Child Austin 1 Repeats Wednesday at 3:30 PM.

TUESDAY Repeats Wednesday at 3:30 PM. Wellness/Survival and the MDT Molesters (Part 1 of 2) Lone Star C4 Lone Star A1-A2 Approach to Child Abuse Jim Tanner, Darrel Turner *Sexual Abuse and Death: Dan Powers Dallas C A Life Cut Short (Part 1 of 2) Bridging the Gap on the MDT 12:00–1:15 PM OffenderWatch Demo Lab: Dallas A2 Patricia Guardiola, Jason Maguire, Kristen Howell, Brandon Poor Accident or Inflicted: Investigator, Advanced Data Collection and Emerging Issues in the Field of Jim Sears, Sherre Thomas Repeats Wednesday at 1:45 PM. You Decide! Crisis Management What Engagement Rings and Forensic Interviewing Repeats Wednesday at 1:45 PM. Seminar Joe Gauthier Spanking Have in Common Rita Farrell Jim Sears Dallas B Austin 3 Dyann Daley Dallas D1 *Brittany Phillips: A Copycat Case of Dallas A3 City View 6 Sexual Abuse in Sports (Part 1 of 2) Medical Child Abuse (Part 2 of 2) Child Abduction Cases Through the *Prosecution of a Multi-Generational *Finding Tara: The Race To Save a Girl Joe Sullivan Dawn Ferguson, Ashley Rader, Lens of a Victim Advocate Child Sexual Abuse Case: Ten Years in and Catch a Predator Lone Star B Michael Weber the Making Francey Hakes Alison Feigh Repeats Wednesday at 3:30 PM. Sasha Joseph Neulinger, George Ohrin 1:45–3:00 PM Dallas A2 *Solving the Series – The Case of the City View 8 Lone Star A4 Lone Star C1 † Accelerate Your Digital Investigations Creeper (Part 1 of 2) *House of Horrors: The Mills and Akers Damian Jackson, Jeff Udvarhelyi Collaborate: Emerging Trends Child Safety: Understanding Child Richard Frawley Fatalities to Inform Practice Psychological Safeguarding Investigation Repeats Thursday at 8:30 AM. and Best Practices in Web Based Michael Bourke Repeats Tuesday at 3:30 PM. Brad Byrd, Glenn Covington Kathryn Sibley Horton Lone Star C1 Case Management Seminar City View 5 Repeats Thursday at 8:30 AM. Repeats Thursday at 10:15 AM. Matt Bochneak Lone Star A3 Tech Coalition Open Session: Start-Up Dallas D1 † Advanced Evidence Analysis for Repeats Wednesday at 1:45 PM. Sexually Violent Predators: Service Providers: The Perspective City View 6 Texas and Beyond Internet Child Exploitation Cases with Interrogating Sex Offenders: Childhood Fall Injuries: Magnet Forensics from Both Sides Accident vs. Inflicted Erin Faseler Gaining Maximum Tactical Advantage Matt Dunn, Julie Kindle, Andrea Combating Sexual Exploitation One Dallas A1 Mark Stringer (Part 1 of 2) Jim Holler Kirkpatrick, Mike Prado, Lisa Van Stop at a Time City View 7 Mike Krapfl, Jon Turbett Austin 2 Heugten, Mary Catherine Wirth, Michael Bourke, Derek Prestridge *Shahid Muslim aka “Sharp”: Repeats Wednesday at 1:45 PM. Matt Wolozyn Dallas D3 Investigating a Violent Child *Barway Collins: A Missing Child, Combating Pimps and Predators a Murdered Son and a Father Plaza B-C (Marriott) Austin 2 Using Social Media Sex Trafficker Deception and Denial Among Child Kimlani Ford, Kelly Harrison Prosecuted (Part 1 of 2) Interviewing Victims of Sextortion Technology Facilitated Crimes Molesters (Part 2 of 2) Michael Russo Derrick Hacker, Stephanie Revering, Repeats Thursday at 8:30 AM. Catherine Connell Against Children Jim Tanner, Darrel Turner Plaza B-C (Marriott) Amy Sweasy Lone Star A4 Repeats Wednesday at 12:00 PM. Steven Del Negro Dallas C Repeats Thursday at 8:30 AM. Cross-Examination Plaza A (Marriott) Dallas D3 (The) Silent Abuser: Why Neglect is Lone Star C2 3:30–4:45 PM continued Victor Vieth the Monster Hiding in the Closet † New Generation Methodologies and Repeats Wednesday at 10:15 AM. *Tracking the Bus Stop Rapist on next page Ryan Brown (The) Best Kept Secret: Mother- Tools for Beating Digital Investigation Lone Star C3 Daughter Sexual Abuse (Part 1 of 2) (Part 1 of 2) Repeats Wednesday at 10:15 AM. Case Backlog Frederick Harris, Sheilah Priori Julie Brand Enabling the Disabled: The Lone Star A3 Michael Staggs Dallas A1 Repeats Wednesday at 1:45 PM. City View 8 Investigation and Prosecution of Lone Star C4 Sexual Assaults of Persons with Suspect Interview Techniques in Child US Marshals: Fugitive Sex Offender Intellectual Disabilities Abuse Cases Now You See: A Celebration of Investigations and Resources John Combs *Brittany Phillips: A Copycat Case of Courageous Kids ATTEND THE Amy Derrick, Jen Falk Thomas Bloxom, Eric Mayo Dallas D3 Medical Child Abuse (Part 1 of 2) Elizabeth Keeley, Jaquelyn Lamont Repeats Wednesday at 10:15 AM. Remington EXHIBITOR Dawn Ferguson, Ashley Rader, Repeats Wednesday at 12:00 PM. Dallas D2 *Three Weeks of Torture: Michael Weber Seminar WORKSHOPS! Repeats Wednesday at 1:45 PM. The Murder of Zyon Thompson Attendees will receive one Facilitating Forensic Interviews of Lone Star A4 Cyber Crimes Nancy Oglesby 3:30–4:45 PM entry (for each exhibitor workshop Repeats Wednesday at 1:45 PM. Crystal Gregory † † attended) to a tablet drawing, awarded Dallas C Cellebrite Exhibitor Workshop Accelerate Your Digital Investigations Wednesday evening at the social event. Repeats Wednesday at 10:15 AM. City View 6 Richard Frawley Plaza A (Marriott) City View 5 You must be present to win.

24 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 25

DCAC-16-019 DCAC Conference Program_07mg.indd 24-25 7/29/16 11:52 AM 3:30–4:45 PM continued OffenderWatch Demo Lab: Suffer from Burnout? Community Notifications Integrated Give’em the F.I.N.G.E.R.! Digital Photo, Video and Audio with Your Social Media Mark Yarbrough CASE STUDIES & WORKSHOPS Technologies in Law Enforcement John Strain Repeats Wednesday at 12:00 PM, and Thursday Each session is listed by time block. See pgs. 37–60 for workshop descriptions and pgs. 61–67 for speaker information. John Penn II Austin 3 at 8:30 AM. Dallas A2 Lone Star A3 *Operation Round Table (Part 2 of 2) WEDNESDAY, *(The) Hunt for the Tutu Girls (The) Ethical Plea Lisa Maher, Matt Wright Taking Traffickers to Trial 8:30–9:45 AM Janet Connolly, Nicole Rye Travis Wiles Repeats Thursday at 10:15 AM. Kirsta Leeburg Melton Lone Star A4 AUGUST 10 Attorneys and Experts: Repeats Wednesday at 12:00 PM. Lone Star C3 Austin 1 Schedule at a glance: Dallas D2 Different Books, Same Page Lead or Lead Not, There is No Try *Sexual Abuse and Death: Tech Coalition Open Session: Get to Erin Faseler, Darrel Turner Dan Powers From Sticks to Flowers: A Life Cut Short (Part 2 of 2) Know the WeProtect Global Alliance to 7:00–8:30 AM Repeats Thursday at 8:30 AM. Dallas A1 Working with Parents Justifying Patricia Guardiola, Jason Maguire, End Child Sexual Exploitation Dallas D2 Light Continental Breakfast † Corporal Punishment with Scripture Jim Sears, Sherre Thomas Jacqueline Beauchere, Fred Langford, Maximizing Your Investigative Registration/Check-In † Victor Vieth Repeats Wednesday at 3:30 PM. Anjan Bose CCTV DVR Recovery with Database Capabilities Repeats Wednesday at 1:45 PM. Dallas B Dallas D1 Lone Star Foyer DVR Examiner Zach Artz, Richard Spradley Lone Star A1-A2 Jimmy Schroering City View 8 City View 7 TUESDAY Sexual Abuse in Sports (Part 2 of 2) Tech Coalition Open Session: How the CACTX Semi-Structured Joe Sullivan Technology Trends: What is the New 8:00AM–5:00 PM NOT JUST PICTURES (Part 1 of 2) Narrative Process Compares to Other Lone Star B Evil on the Internet? NCMEC CVIP Lab Open Child Homicide Investigation Sharon Cooper, Tink Palmer Nationally Recognized Interview Ben Butler, Chris Roosenraad and Prosecution Dallas B † Live Oak Room Structures Smartphone and Tablet Forensics Austin 2 Michael Milnor, Nancy Oglesby Ada McCloud with Magnet AXIOM Repeats Thursday at 8:30 AM. OffenderWatch Demo Lab: WEDNESDAY Plaza A (Marriott) Mark Stringer *Tracking the Bus Stop Rapist (Part 2 9:45–10:15 AM Lone Star C4 Process Management and City View 7 of 2) Supervision Standards Break † Interrogating Sex Offenders: Frederick Harris, Sheilah Priori Combining Mobile and Computer Joe Gauthier † Gaining Maximum Tactical Advantage Social Media Intelligence Dallas A1 Refreshments Provided Investigations with Belkasoft Austin 3 (Part 2 of 2) for Youth Cases Evidence Center: New Trends Mike Krapfl, Jon Turbett Chris Toplack and Issues Opening Statements and Repeats Wednesday at 3:30 PM. City View 8 11:30 am–Noon Yuri Gubanov Closing Arguments Plaza B-C (Marriott) Break City View 6 Victor Vieth *Solving the Series – The Case of the No Refreshments Provided Lone Star C3 Medical Child Abuse Creeper (Part 2 of 2) *(The) Fall of an Icon: The Arrest and Suzanne Dakil Damian Jackson, Jeff Udvarhelyi Conviction of Jared Fogle (Part 1 of 2) Predictive Policing Analytics as Dallas A3 Repeats Thursday at 10:15 AM. 1:15–1:45 PM Christopher Cecil, Steve DeBrota, Kevin Applied to Sex Offender Management: Lone Star C1 Getz, Darin Odier, Andrew Willmann A Case Study Break Lone Star B Adam Kirhagis, Jay Lathwell No Refreshments Provided Austin 1 Five B’s of Child Physical Abuse: Bruises, Burns, Bones, Bellies, and Protecting Our Children: 3:00–3:30 PM Brains (Part 1 of 2) Empowerment vs. Expectations A Break Kristen Reeder Revolution in Children’s Safety Dallas A2 Stephen Daley Refreshments Provided Remington The Dallas Police Association—the original, and largest Forensic Interviewer in the Courtroom police employee group for Dallas police officers with over 7:00 PM (Part 1 of 2) Responding to Child Abductions 3,500 active and retired members—will host a hospitality Rachel Burris, Carrie Paschall (Part 1 of 2) Conference Fiesta: Austin 2 William Donaldson, Joshua Wilson evening. Please join us for an opportunity to network and Conference Networking Event Plaza B-C (Marriott) meet new friends. Lone Star Ballroom Gang Endangered Children (Part 1 of 2) Sizing It Up: The Skinny On Failure Transportation to the DPA office will be provided on the Jabari Howard, Doug Millican to Thrive Ground Floor of the Sheraton Hotel, just past the Draft 7:45 PM Lone Star C1 Emily Lentz, Sandra Onyi Drawing for Tablet Seminar DALLAS POLICE ASSOCIATION Sports Bar. The office is located approximately two miles Gentle Child Murder: from the Sheraton Dallas Hotel. It is a short cab ride if you For those who attended Exhibitor Suffocation/Strangulation/Drowning Tactical Polygraph HOSPITALITY EVENING miss the bus. Workshops (must be present to win) Jim Holler Michael Bourke Lone Star C2 Dallas D1 TUESDAY, AUGUST 12 • Please enjoy your beverages before boarding the bus. Google’s Law Enforcement Request Taking Traffickers to Trial 6:00 PM There will be no alcoholic beverages allowed on the buses. System (LERS) Kirsta Leeburg Melton 1412 Griffin Street East This drop-in workshop is restricted to Dallas A3 • The last bus will leave the event at 10:45pm. law enforcement. Feedback sessions last 8:30–9:45 AM continued Pizza dinner served. approximately 20 minutes and will run • You must wear your name badge. No exceptions. continuously all day Wednesday. on next page Executive Boardroom

26 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 27

DCAC-16-019 DCAC Conference Program_07mg.indd 26-27 7/29/16 11:52 AM 8:30–9:45 AM continued Five B’s of Child Physical Abuse: (The) Silent Abuser: Why Neglect is Fatal Distraction: Kids in Cars- *Juan and Bobby Moreno: Suffer from Burnout? Bruises, Burns, Bones, Bellies, and the Monster Hiding in the Closet Prosecuting Neglectful Parents The Traffickers Around the Corner Give’em the F.I.N.G.E.R.! Treating Abuse and Trauma: Brains (Part 2 of 2) Ryan Brown Mary-Ann Burkhart Kirsta Leeburg Melton Mark Yarbrough Using Play Therapy in an Evidence- Kristen Reeder Dallas A3 Dallas A2 Repeats Thursday at 10:15 AM. Repeats Thursday at 8:30 AM. Based World (Part 1 of 4) Dallas A2 Lone Star C2 Dallas B Sueann Kenney-Noziska Tips and Strategies for Testifying From Anger to Solace – A Mother’s Plaza A (Marriott) Forensic Interviewer in the Courtroom in Court Journey Beyond Victimization Keeping Children Safe: Education and Taken in the Night: (Part 2 of 2) Stephanie Morris Mika Moulton Prevention Series Characteristics of Residential Child *(The) United States of America v. Rachel Burris, Carrie Paschall Repeats Wednesday at 3:30 PM. Lone Star A1-A2 Char Rivette, Julia Strehlow Abductions “God”: The Paul Sewell Investigation Austin 2 Dallas D1 City View 8 Mark Hilts, Joy Lynn Shelton Sara Blond, Chris Duncanson Handling Common Problems in Child Dallas A3 Lone Star A3 Gang Endangered Children Treating Abuse and Trauma: Sexual Abuse Cases *Kidnapping, Rape, and Murder: (Part 2 of 2) Using Play Therapy in an Evidence- Summer Elmazi Zachary Holly Case Study Triage 101: Understanding Sex Offenders Jabari Howard, Doug Millican Based World (Part 2 of 4) Repeats Thursday at 10:15 AM. Stephanie Morris Rapid Analysis & Acquisition (Part 1 of 2) Lone Star C1 Sueann Kenney-Noziska Lone Star C3 Repeats Thursday at 8:30 AM. of Live Data Jim Tanner Plaza A (Marriott) Lone Star C1 Jeff Shackelford † † Lone Star A1-A2 Innovations in Incident Response for How Technology Helps Us Find City View 7 Crimes Against Children Understanding and Investigating Child Needles in the Needlestack Now You See: A Celebration of Victim ID and Adobe Technology Jason Sanchez Burn Injuries Chris Priebe Courageous Kids *Turning Flight to Fight: (Part 1 of 2) City View 8 Jim Holler City View 6 Elizabeth Keeley, Jaquelyn Lamont The Ronal Ordonez-Orosco Case Jim Cole, John Penn II Repeats Thursday at 8:30 AM. Dallas D1 Crystal Levonius, Geeta Singeltary, Dallas D3 *It’s Coming From Inside the House: Lone Star C2 Interviewing Children with Disabilities Jon Hoffman Sextortion Within the Family Rita Farrell OffenderWatch Demo Lab: Lone Star A4 *When the Bough Breaks Lisa Fletcher, Alix Skelton Understanding Sex Offenders Seminar OffenderWatch Q & A WEDNESDAY Matthew Cox, Sandy Moreland, Dallas C (Part 2 of 2) John Strain Understanding the Reynie Tinajero Jim Tanner Interviewing Male Perpetrators of Austin 3 Psychopathic Offender Dallas C *Kenneth Stokes: Web Master and Lone Star A1-A2 Child Sexual Abuse Melanie Malterer Child Molester Graham Hill *Reading Between The Lines in A Lone Star C4 James Holdman Victim ID and Adobe Technology Repeats Thursday at 10:15 AM. Compelling Prostitution Case 10:15–11:30 AM Lone Star A3 (Part 2 of 2) Dallas A1 Michael McMurray (A) Victim Centered Approach to WEDNESDAY Jim Cole, John Penn II Lone Star A3 Human Trafficking Investigations *Chyenne Kircher: Solving a Tragedy Maximizing Narrative Practice Skills Dallas D3 Interviewing Victims of Sextortion Christopher Heid, Patrick Winn in the Detail Gathering Phase of a Catherine Connell Sexual Abuse Prosecution 101 Kim Castro, Wayne Jackowski Repeats Thursday at 10:15 AM. Forensic Interview Remington Melinda Westmoreland Lone Star A4 Dallas C Ada McCloud Plaza B-C (Marriott) Comprehensive Offender Dallas A1 12:00–1:15 PM Management: Exceeding the Letter Ages and Stages of Sexual Abuse and the Spirit of the Law NOT JUST PICTURES (Part 2 of 2) Sharon Cooper, Tink Palmer Sandra Onyi, Lisa Schuster Joe Gauthier Dallas B Plaza A (Marriott) Austin 1 OffenderWatch Demo Lab: *Bianca Jones Case Study Cross-Examination OffenderWatch Mobile and Edward Price Victor Vieth OffenderWatch Express Austin 2 Lone Star C3 Scott Freeman Como Reconocer y Reportar el Abuso † Austin 3 Donuts and Dongles Hacia Menores VISIT THE NCMEC CHILD VICTIM IDENTIFICATION LAB Michael Staggs (An) Overview of Children with Luís Acuña-Pilgrim City View 7 Problematic Sexual Behavior Austin 1 At this conference in August 2006, the National Center for Missing & Exploited Children (NCMEC) hosted the very first Victim Identification Lab, an initiative Enabling the Disabled: Stacey Lewis, Jimmy Widdifield *Daniel Harris, Top Gun Pilot: Repeats Thursday at 10:15 AM. designed to assist law enforcement in its efforts to rescue child victims of The Investigation and Prosecution From Maverick to Convict sex abuse. Lone Star C4 of Sexual Assaults of Persons with Paul Wolpert, Elizabeth Yusi Dallas County Schools is Intellectual Disabilities Precision Prevention Repeats Thursday at 10:15 AM. As with every year since, NCMEC is again pleased to host the Lab this year. Amy Derrick, Jen Falk Users can view sanitized photos and examine background identifiers and audio Dyann Daley Lone Star B Dallas D2 proud to partner with the clues in hopes that these items may be recognizable. You may have the piece Seminar Diving Deeper: of the puzzle that could lead to the rescue of a child victim. Facilitating Forensic Interviews of † Processing Child Exploitation Cases Using Big Data Analytics to Interpret Cyber Crimes Dallas Children’s All conference attendees are invited to participate; please have your conference Jeff Nash EXIF in NCMEC’s CVIP Crystal Gregory badge to gain entry. City View 6 Lauren Coffren, Nick Montgomery Remington Dallas D2 Advocacy Center! Responding to Child Abductions This Lab is located in the Live Oak Room and will be open all day *(The) Fall of an Icon: The Arrest and (The) Ethical Plea throughout the conference. Conviction of Jared Fogle (Part 2 of 2) (Part 2 of 2) William Donaldson, Joshua Wilson Travis Wiles Christopher Cecil, Steve DeBrota, Kevin Plaza B-C (Marriott) Dallas D3 Located in Live Oak during the following times. Getz, Darin Odier, Andrew Willmann Lone Star B MONDAY 10AM–5PM | TUESDAY 8AM-5PM dcschools.com WEDNESDAY 8AM–5PM | THURSDAY 8AM–NOON

28 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 29

DCAC-16-019 DCAC Conference Program_07mg.indd 28-29 7/29/16 11:52 AM From Sticks to Flowers: What the Offender Has to Tell Us: Sex From Dispatch to Verdict II: OffenderWatch Demo Lab: Tips and Strategies for Testifying in 1:45-3:00 PM Working with Parents Justifying Offenders in the School Environment Continuing to Explore Corroboration in OffenderWatch Training Court Corporal Punishment with Scripture Steve DeBrota, Michael Johnson, Sexual Abuse Cases John Strain Stephanie Morris Are You Ready? Preparing Children Victor Vieth John Pirics Nancy Hebert, Vincenzo Santini Austin 3 Remington for Court Dallas B Lone Star B Lone Star A3 Stephanie Morris *Operation Misdial: Treating Abuse and Trauma: Repeats Wednesday at 10:15 AM. Human Trafficking and Beyond *Whatever it Takes: Women Who Offer Grooming Behaviors Among How a 6th Grader Caught a Predator Using Play Therapy in an Evidence- Remington (Part 1 of 2) Sex with Their Children to Keep Their Child Molesters and the Impact on Quirina Orozco, Scott Schofield Based World (Part 4 of 4) Tanisha Knighton Man (Part 1 of 2) the Victims Lone Star C1 Sueann Kenney-Noziska (The) Best Kept Secret: Mother- Dallas D1 Julie Peay, Joe Sullivan Darrel Turner Plaza A (Marriott) Daughter Sexual Abuse (Part 1 of 2) Lone Star A1-A2 Dallas A1 Seeking Serenity Julie Brand Interrogating Sex Offenders: Gaining Crystal Levonius *Whatever it Takes: Women Who Offer Lone Star C2 Maximum Tactical Advantage Human Trafficking and Beyond Dallas D2 Sex with Their Children to Keep Their (Part 1 of 2) (Part 2 of 2) Man (Part 2 of 2) Best Practices for Managing and Mike Krapfl, Jon Turbett 3:30–4:45 PM Tanisha Knighton *Sexual Abuse and Death: Julie Peay, Joe Sullivan Monitoring Your Sex Offender Lone Star C4 Dallas D1 A Life Cut Short (Part 2 of 2) Lone Star A1-A2 Registration Program Advanced Cold Case, Long Patricia Guardiola, Jason Maguire, Jim Joe Gauthier, James Voutour † Locked, Encrypted, or Unavailable.... Term Missing and Unidentified Interrogating Sex Offenders: Sears, Sherre Thomas Working With The Media On Missing Austin 1 Now What? Human Remains Gaining Maximum Tactical Advantage Lone Star A4 and Abducted Children Cases Kevin DeLong Brian Killacky (Part 2 of 2) Craig Hill Bridging the Gap on the MDT City View 7 Austin 2 Mike Krapfl, Jon Turbett SHIFT: Supporting Heroes in Seminar Kristen Howell, Brandon Poor Lone Star C4 Mental Health Foundational Training Dallas D2 OffenderWatch Demo Lab: US (The) Best Kept Secret: Mother- (Part 2 of 2) Marshal Overview (A Session for Daughter Sexual Abuse (Part 2 of 2) *Mike Pyro: Sextortion and Dan Powers, Michael Sullivan WEDNESDAY *Brittany Phillips: A Copycat Case of USMS Attendees Only)| Julie Brand New Technologies City View 8 Medical Child Abuse (Part 1 of 2) Dan O’Donnell Lone Star C2 Paul Wolpert, Elizabeth Yusi Dawn Ferguson, Ashley Rader, Michael Austin 3 Dallas B Successfully Prosecuting a Case with Weber *Brittany Phillips: A Copycat Case of a Recanting Victim Dallas A3 Power of Prevention Medical Child Abuse (Part 2 of 2) Multi-Victim Cases: Identification, Mary-Ann Burkhart Cynthia Colin Dawn Ferguson, Ashley Rader, Notification and Interviewing Dallas D3 But I Love Him: When Children Love Michael Weber WEDNESDAY Seminar All In One Their Offender, or Think They Do Dallas A3 Ale Levi (Part 1 of 2) *Sexual Abuse and Death: City View 7 Carrie Paschall, Kim Skidmore, A Life Cut Short (Part 1 of 2) Building a Community Education Kelly Slaven Patricia Guardiola, Jason Maguire, Program for Your CAC Plaza B-C (Marriott) Jim Sears, Sherre Thomas Luis Acuna-Pilgram, Dianna Smoot Lone Star A4 Austin 1 *Child Sex Dens: Infiltrating, Raiding and Rescuing (Part 1 of 2) SHIFT: Supporting Heroes in Mental But I Love Him: When Children Love Chris Fitzpatrick Health Foundational Training Their Offender, or Think They Do Repeats Thursday at 8:30 AM. (Part 1 of 2) (Part 2 of 2) Dallas C Dan Powers, Michael Sullivan Carrie Paschall, Kim Skidmore, City View 8 Kelly Slaven Clash of the Medical Experts: Plaza B-C (Marriott) Alternative Theories in Abusive *Three Weeks of Torture: Head Trauma The Murder of Zyon Thompson Child Abuse Investigations: Justin Fitzsimmons, Mark Hudson Nancy Oglesby The Practical Police Response Lone Star C3 Lone Star C1 Craig Miller, Jason Rodriguez Dallas A2 † Collaborate: Emerging Trends and *Three’s Company...and the Victims Best Practices in Web Based Case Left Behind *Child Sex Dens: Infiltrating, Raiding Management Matthew Cox, Sandy Moreland, and Rescuing (Part 2 of 2) Matt Bochneak Reynie Tinajero Chris Fitzpatrick City View 6 Lone Star A3 Repeats Thursday at 10:15 AM. Dallas C *Danny Dearest: Love Thy Father and Treating Abuse and Trauma: Thy Neighbor Using Play Therapy in an Evidence- Corroboration: The Key to a Strong Shannon Miller, Sarah Preston Based World (Part 3 of 4) Child Exploitation Case Dallas D3 Sueann Kenney-Noziska Justin Fitzsimmons Plaza A (Marriott) Lone Star C3 Facebook: 101 † Jason Barry, Andrea Kirkpatrick Using Digital Evidence Crimes Against Children: Austin 2 More Effectively A Global Perspective by International Jim Tanner Justice Mission Following the Evidence in the Dallas A1 Vic Lacey, Melanie Martinson Forensic Interview City View 6 Julie Kenniston Dallas A2 30 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 31

DCAC-16-019 DCAC Conference Program_07mg.indd 30-31 7/29/16 11:52 AM CASE STUDIES & WORKSHOPS DJ PHOTOBOOTH Each session is listed by time block. See pgs. 37–60 for workshop descriptions and pgs. 61–67 for speaker information. I Take It Back: When a Child Recants THURSDAY, 8:30–9:45 AM Allegations of Child Sexual Abuse AUGUST 11 Carrie Paschall Attorneys and Experts: Lone Star A3 Schedule at a glance: Different Books, Same Page Erin Faseler, Darrel Turner Is He Faking it? Confronting Your 7:00–8:30 AM Dallas A2 Defendant’s Mental Health Issues Light Continental Breakfast Kendall McKimmey, Lee Pierson *Barway Collins: A Missing Child, City View 6 Registration/Check-In a Murdered Son and a Father Lone Star Foyer Prosecuted (Part 1 of 2) It’s All in the Investigation Derrick Hacker, Stephanie Revering, Brandie Wade, Pamela Womack Amy Sweasy Dallas A3 8:00AM–Noon Lone Star A1-A2 NCMEC CVIP Lab Open *Kidnapping, Rape, and Murder: *Before, During, and After: Zachary Holly Case Study Live Oak Room The Abduction and Rescue of Heaven Stephanie Morris and Lacy (Part 1 of 2) Plaza A (Marriott) Kevin Norris, Mikinzie Price, Billy Turner, 9:45–10:15 AM Lara Welch Kik Law Enforcement Operations Break Lone Star C2 Michelle Micks, Lisa van Heugten Refreshments Provided Dallas D2 Bringing Life to Evidence Based Practices (Part 1 of 2) Live Streaming and Child Sex Tourism: E 10:15–11:30 AM Laura Orr, Stacie Smith Dark Desires Become Reality E A Anoup de Weever, Jess Donkers E A City View 7 TA Workshops FFFIII SSSTT Lone Star C4 Child Homicide Investigation 11:30 AM and Prosecution Maximizing Forensic Tools for Michael Milnor, Nancy Oglesby Reliable and Efficient Review in Child Conference Concludes Dallas D3 Exploitation Investigations Robert Basanez, Christopher *Child Sex Dens: Infiltrating, Thompson Raiding and Rescuing (Part 1 of 2) City View 8 Chris Fitzpatrick Houston C *Operation Round Table (Part 1 of 2) Lisa Maher, Matt Wright (The) Cross Examination Survival Dallas B Game Show Steve DeBrota, Michael Johnson, John PCIT vs. Parenting Classes: Pirics Changing How Caregivers Parent Dallas C Katrina Cook Seminar Cybersecurity: Understanding Organized Criminal Activity Play Therapy with a Trauma CASINO TEX MEX Cynthia Gonnella Focused Lens State 1 Leslie Boutte, Kathy DuMond Dallas D1 *Death at a Daycare (Part 1 of 2) Dale Smith, Melinda Westmoreland Presenting Evidence in Victim/ SAVE THE DATE Lone Star C3 Witness Interviews (Part 1 of 2) Crystal Gregory, Kim Penna Does Race and Culture Matter When Remington FOR THE 29TH Handling a Child Sexual Abuse Case ANNUAL CRIMES JJ Staples Recognizing and Reporting Dallas A1 Child Abuse TH PM AM AGAINST CHILDREN Luís Acuña-Pilgrim AUGUST 10 7 –12 *House of Horrors: Serving Tex Mex Until 8:30pm. Must wear name tag to attend. . CONFERENCE Austin 3 No exceptions The Mills and Akers Investigation Brad Byrd, Glenn Covington 8:30–9:45 AM continued AUGUST 7–10, 2017 Lone Star A4 on next page

32 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 33

DCAC-16-019 DCAC Conference Program_07mg.indd 32-33 7/29/16 11:52 AM 8:30–9:45 AM continued *Barway Collins: A Missing Child, *Child Sex Dens: Infiltrating, Raiding Live RAM Analysis: *Solving the Series – The Case of the a Murdered Son and a Father and Rescuing (Part 2 of 2) From Acquisition to Reporting Creeper (Part 2 of 2) *Shahid Muslim aka “Sharp”: Prosecuted (Part 2 of 2) Chris Fitzpatrick Yuri Gubanov Damian Jackson, Jeff Udvarhelyi Certificates will be emailed Investigating a Violent Child Derrick Hacker, Stephanie Revering, Houston C State 1 Plaza B-C (Marriott) after you complete a Sex Trafficker Amy Sweasy Kimlani Ford, Kelly Harrison Lone Star A1-A2 (A) Close-Up Look at Female Sex Living With the Memories Tech Strategies and Innovation to post-conference survey. Lone Star C1 Offenders in Positions of Trust Jim Tanner Effectively Address Child Trafficking *Before, During, and After: Julie Brand Lone Star A4 Ziba Cranmer, Brooke Istook, Valiant *Solving the Series – The Case of the The Abduction and Rescue of Heaven Dallas A1 Richey, Malika Saada Saar Surveys will be sent Creeper (Part 1 of 2) and Lacy (Part 2 of 2) (The) National Protocol for Austin 2 Damian Jackson, Jeff Udvarhelyi Kevin Norris, Mikinzie Price, Billy Turner, *Daniel Harris, Top Gun Pilot: Sexual Abuse Medical Forensic immediately post-conference. Plaza B-C (Marriott) Lara Welch From Maverick to Convict Examinations: Pediatric TICAC: Thailand’s Robust Response to Lone Star C2 Paul Wolpert, Elizabeth Yusi Diane Daiber a Transnational Criminal Threat Suffer from Burnout? Lone Star B Seminar Khemachart Prakaihongmanee, Give’em the F.I.N.G.E.R.! Better Than a Confession: The Power Tamasak Wicharaya Mark Yarbrough of the One Party Consent Phone Call *Death at a Daycare (Part 2 of 2) *Operation Round Table (Part 2 of 2) Dallas A3 Lone Star B David Clark, Eren Price Dale Smith, Melinda Westmoreland Lisa Maher, Matt Wright City View 8 Lone Star C3 Dallas B (A) Victim Centered Approach to Task Force Approach to Violent Crimes Human Trafficking Investigations Against Children Investigations Bikers Against Child Abuse Domestically Violent Homes: (An) Overview of Children with Christopher Heid, Patrick Winn Kurt Ormberg, Derek Stigerts (BACA): A Resource for Protecting The Threat of Harm to Children Problematic Sexual Behavior Dallas C Austin 2 Abused Children Andrew Campbell Stacey Lewis, Jimmy Widdifield Mike “Gonzo” Matijevich, Lone Star A3 Lone Star C4 Understanding and Investigating Child Bruce “Rhino” Parsons, Kent Burn Injuries “Ditchwitch” Sommerfield Handling Common Problems in Child Presenting Evidence in Victim/ Jim Holler Dallas A2 Sexual Abuse Cases Witness Interviews (Part 2 of 2) Austin 1 Summer Elmazi Crystal Gregory Bringing Life to Evidence Based Dallas D2 Remington Practices (Part 2 of 2) Laura Orr, Stacie Smith Interviewing Male Perpetrators of Reporting Children Missing from Care 10:15–11:30 AM City View 7 Child Sexual Abuse to NCMEC Addressing Therapeutic Challenges in Graham Hill Leemie Kahng-Sofer the Therapy Room CAC Response to Commercial Austin 3 City View 6 Sexual Exploitation Leslie Boutte, Ana Guzmán *Juan and Bobby Moreno: Dallas D1 Beth Bouchard Austin 1 The Traffickers Around the Corner THURSDAY Are You Ready? Preparing Children Kirsta Leeburg Melton for Court Child Safety: Understanding Child Lone Star C1 Stephanie Morris Fatalities to Inform Practice Plaza A (Marriott) Kathryn Sibley Horton Dallas D3 THURSDAY

PhotoDNA & PhotoDNA Cloud Service Microsoft devotes extensive resources to help protect children—and, Figh&ng the indeed, all individuals—online. We innovate and invest in technology, collaborate with others, and educate the general public about online risks. spread of This has led to tools such as PhotoDNA and PhotoDNA Cloud Service, child sexual which enable qualified organizations to automatically detect and report exploita&on distribution of child sexual exploitation and abuse images. Both PhotoDNA and abuse and PhotoDNA Cloud Service have become key tools in the technology imagery industry's fight against online child sexual exploitation.

For more informa&on and/or to register for the PhotoDNA Cloud Service, go to: www.microsoD.com/PhotoDNA.

For technical inves&ga&ve support related to MicrosoD technologies and services to law enforcement, please contact the MicrosoD Law Enforcement Assistance Program Portal: [email protected].

To learn more about how MicrosoD approaches child and family online safety, please contact: [email protected].

34 Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) Case Studies are marked with an asterisk (*) | Exhibitor Workshops are marked with a cross (†) 35

DCAC-16-019 DCAC Conference Program_07mg.indd 34-35 7/29/16 11:52 AM COMPUTER LAB SCHEDULE WORKSHOP DESCRIPTIONS This is a comprehensive list of Workshop, Case Study, and Exhibitor Workshop Descriptions. Computer Lab descriptions can be found on the App and upstairs on the 3rd floor. Computer labs are held on the 3rd floor of the conference center. After you check in for the conference, please visit the 3rd floor to make any changes to your computer lab schedule or to check for open lab seats. Accelerate Your Digital Investigations involving cold cases, long term missing and scenario. You will find out which anti-forensic The 3rd floor will be open from 2:00–6:00 PM on Sunday. Richard Frawley unidentified human remains investigations that tactics you should be looking for, what some In this hands-on workshop, attendees will learn may have become closed, suspended, forgotten of the commonly used tools claim to do, and We have not listed the computer lab schedule in the program. how to use the newest ADF digital investigative or never even initially reported to authorities. what information can still be recovered in your Visit the 3rd floor or download our app to view the full computer lab schedule. tools. These tools cover all aspects of a digital Workshop investigations. investigation including a wider array of critical Workshop Advanced Evidence Analysis for Please note that the computer lab schedule differs from the regular conference schedule. artifacts, while maintaining automation, enhancing ease-of-use, and increasing speed Internet Child Exploitation Cases with Apple Law Enforcement Response and scalability. This workshop will cover the Magnet Forensics and Forensics set-up of an examination, scanning a suspect Mark Stringer Have questions about what data Apple can computer, and reviewing and reporting on This hands-on lab session is for forensics provide to law enforcement? Not sure how to SUNDAY MONDAY TUESDAY WEDNESDAY THURSDAY collected evidence. All attendees will receive examiners who use Magnet AXIOM in the extract data from a MacBook? Stop by to chat a FREE Evaluation Software Kit with a 90 day investigation of Internet child exploitation cases. with us! We’re here to answer any questions license. This is an exhibitor workshop by ADF This lab session will provide instruction on new you have about how we can help with your and advanced features of AXIOM that will aid investigations. This session is restricted to 2:00–9:00 PM 7:00–8:30 AM 7:00–8:30 AM 7:00–8:30 AM 7:00–8:30 AM Solutions, Inc exhibiting on the 1st floor. BEAT THE CROWD Light Continental Breakfast Light Continental Breakfast Light Continental Breakfast Light Continental Breakfast Exhibitor Workshop in the recovery and analysis of several types of law enforcement only and will be open from Conference Check-in Registration/Check-in digital evidence that are critical in these cases. 1:45–4:45 PM. is on the 2nd floor Accident or Inflicted: Investigator, Topics include: using AXIOM with Project Vic Sponsor Workshop of the Sheraton 8:30–9:45 AM 8:30–10:00 AM 8:30–10:00 AM 8:30–10:00 AM You Decide! and PhotoDNA to quickly identify illicit pictures Conference Center. Opening Plenary Computer Labs Computer Labs Computer Labs Jim Sears and videos, exporting pictures and videos Are You Ready? Preparing Children This workshop will examine many common recovered by AXIOM to NetClean for review for Court 10:30 AM–NOON 10:30 AM–NOON 10:30 AM–NOON 10:30 AM–NOON injuries found in children from the investigators and categorization, and recovering and analyzing Stephanie Morris Computer Labs Computer Labs Computer Labs Computer Labs point of view. Common trends in non-abusive browser history, parsed search queries, peer- This lecture will address issues that stress situations will be examined. The presentation to-peer file sharing, and chat threads to reveal children and caregivers in the court process NOON–1:30 PM NOON–1:30 PM NOON–1:30 PM NOON intent to lure, download, or distribute. Session and how to combat those stressors. Participants Lunch On Your Own Lunch On Your Own Lunch On Your Own Conference Concludes will challenge attendees to figure out which injuries are abusive and which are not. The attendees will receive a free trial copy of Magnet will learn strategies for preparing children for court and preparing the courts to be a child 1:30–3:00 PM 1:30–3:00 PM 1:30–3:00 PM discussion will include techniques for improving AXIOM. A special registration will be provided for Computer Labs Computer Labs Computer Labs the investigation of physical child abuse cases. this session due to limited number of computer friendly environment. The presenter will discuss Workshop work stations. This is an exhibitor workshop by a child’s rights while testifying, the role of a victim 3:30–5:00 PM 3:30–5:00 PM 3:30–5:00 PM Magnet Forensics exhibiting on the 2nd floor. advocate and law enforcement, giving a child Computer Labs Computer Labs Computer Labs Addressing Therapeutic Challenges in Exhibitor Workshop friendly oath, and determining competency of the Therapy Room the child witness. 4:45–6:30 PM 6:00 PM 7:00 PM Leslie Boutte, Ana Guzmán Ages and Stages of Sexual Abuse Workshop Meet and Greet Dallas Police Association CONFERENCE FIESTA Working with traumatized children can be Sandra Onyi, Lisa Schuster in the Exhibit Hall Hospitality Event Dinner served until 8:30 challenging. Challenges can include non-verbal This presentation will discuss elementary Attorneys and Experts: Dinner on your own Optional off-site Networking Event children, resistance, avoidance, dissociation, information regarding sexual abuse and how Different Books, Same Page weekly crises of the week, and caregiver each child is affected differently depending Erin Faseler, Darrel Turner engagement. Attendees will learn strategies and upon their stage of development. Normal Effectively presenting evidence is essential to proving your case to a factfinder, especially when DESCRIPTIONS

techniques including practical applications to sexualized behaviors will be reviewed as well WORKSHOP address trauma-related therapeutic challenges. as techniques on how to make the examination that case deals with sex offenses. But what Workshop and entire process more comfortable for the happens when that crucial evidence is technical child. Each developmental stage (i.e. toddler, and difficult to understand? This workshop will Advanced Cold Case, Long preschool age, school age, adolescent, etc.) will focus on building the professional relationship Term Missing and Unidentified be explored including typical sexual contacts at between attorney and expert inside and outside SPECIAL THANKS Human Remains the age, normal and abnormal sexual activities of the courtroom. This presentation will further Brian Killacky and possible adverse effects on the child. The provide real-life examples of attorney and expert TO THIS YEAR’S CONFERENCE COMPUTER LAB PARTNERS This presentation will discuss the strategies, medical examination will be reviewed according DOs and DONTs, as well as demonstrations effort and initiative required to revisit cases to age. of presenting challenging information in court. Workshop Workshop Bedford County Sheriff’s Office NW3C Anti-Forensics: Finding the Barway Collins: A Missing Child, DON’T MISS OUT ON Hidden Evidence a Murdered Son and a Father Illinois Office of the Attorney General Paraben Corporation THE MEET AND GREET Jad Saliba Prosecuted (Part 1 & 2) Have you ever had a suspect try to cover their Derrick Hacker, Stephanie Revering, National Criminal Justice Training Center SEARCH First floor Exhibit Hall digital tracks? There are a number of tools and Amy Sweasy techniques that individuals can use to hide This presentation will examine the disappearance Nebraska State Patrol Sedgwick County Sheriff’s Office Monday or erase their online activity. In this lecture, and subsequent murder of 10 year-old Barway 4:45-6:30 PM the presenter will highlight some commonly Collins. The case involved issues of complex used anti-forensic tools using a case study police investigation, including the use of

36 37

DCAC-16-019 DCAC Conference Program_07mg.indd 36-37 7/29/16 11:52 AM new technology, intense media and public mother-daughter incestuous relationship— vehicle. An Amber Alert was issued and the more deeply into the cognitions of therapy while teacher and youth/pastor sexual relationships. to the experience of the SEEN Coalition of the involvement and public interest and working the subtle, yet intentional violations of normal matter investigated by the FBI Detroit Divison’s remaining true to the standards of evidence In part two, Kelly Slaven will present the clinical Children’s Advocacy Center of Suffolk County, with an immigrant community. The presenters mother-child boundaries, covert and overt abuse SEMTEC Task Force. The child has never been based practices. This presentation will be treatment of a compliant victim who loves their this workshop will explore critical considerations will detail the investigation, the media relations and the psychological manipulations used to found. The instructor will provide information lecture based with experiential components. perpetrator. The Stages of Change model will be for MDTs encountering at-risk youth and child sex and the prosecution of the father for the murder. silence victims. Attendees will learn ways to on the investigation in detail and the different Each participant will be able to participate as used to conceptualize the process of supporting trafficking victims. The presenter will use case Case Study include mothers as potential perpetrators in methods and techniques used to prosecute a fully as his or her comfort level allows. a client/victim from a Precontemplative stage examples to highlight victim identification, the prevention programs and in sexual abuse no-body child homicide case against the father Workshop of change all the way into full acceptance and power of shared goals in uniting disconnected, Before, During, and After: investigations. Six key therapeutic issues for who made the initial 911 call. The father was Maintenance. Trauma informed use of evidenced cross-systems partners, and the role of the The Abduction and Rescue of Heaven recovery will be discussed. Recent cases of found guilty of first degree homicide and child Brittany Phillips: A Copycat Case of based therapies, such as Trauma Focused CAC in facilitating comprehensive CSEC and Lacy (Part 1 & 2) successful prosecutions of female offenders will abuse causing death. Lane was sentenced to Medical Child Abuse (Part 1 & 2) Cogntive Behavioral Therapy (TFCBT) and Eye interventions. The workshop will demonstrate Kevin Norris, Mikinzie Price, Billy Turner, be briefly shared. The program concludes with life in prison. This was the first no-body child Dawn Ferguson, Ashley Rader, Movment Desensitization and Reprocessing how genuine collaboration can foster positive Lara Welch a discussion of both the common dynamics and homicide case in the State of Michigan. Michael Weber (EMDR) will be used in case examples as well. results, strengthen investigations, and provide This case study details the process behind the also the critical differences between mother- Case Study Brittany Phillips presented her child as ill for years, Workshop professionals with knowledge and tools to ensure child abduction protocol that was developed by daughter and mother-son incest. The presenter leading to the needless insertion of a feeding victims are treated with dignity, support, and members of the Ardmore Police Department is both an experienced counselor and a resilient Bikers Against Child Abuse tube and numerous medical procedures. But CAC Response to Commercial connected to critical resources. and Sara’s House, the local children’s advocacy survivor of maternal sexual abuse. (BACA): A Resource for Protecting that was not enough for Brittany. In the victim’s Sexual Exploitation Workshop center, after what they learned attending the Workshop Abused Children last hospital stay, Brittany used the Internet to Beth Bouchard Crimes Against Children Conference. This case Mike “Gonzo” Matijevich, locate an article on a medical child abuse case The commercial sexual exploitation (CSEC) of CCTV DVR Recovery with study is not focused solely on the perpetrators, Best Practices for Managing and Bruce “Rhino” Parsons, Kent from Austin, Texas, and used that article as a children is a significant problem impacting every DVR Examiner but highlights the road traveled for each child Monitoring Your Sex Offender “Ditchwitch” Sommerfield blueprint to poison her daughter’s IV line and/or community. High risk and exploited youth often Jimmy Schroering victim and the individual team members on Registration Program It’s 2:00 am. A scared child awakens from a feeding tube with feces, causing her daughter go undetected and, when seen, their experiences Recovering video evidence from CCTV digital a personal level. In 2013, unfortunately the Joe Gauthier, James Voutour nightmare, absolutely sure that the person who to contract a dangerous polymicrobial blood are mislabeled as crimes, not properly identified video recorders (DVRs) can be a difficult process, protocol had to be implemented during This workshop will focus on best practices for victimized her is coming for her again. Who can infection. CPS Investigator Ashley Rader and as instances of child sexual abuse. Children’s but it doesn't have to be. DVR Examiner is a the abduction of a girl named Heaven and supervising your sex offender management she call for support? A 15-year old boy has to Investigator Michael Weber will detail the twisting Advocacy Centers can play a pivotal role in software solution for acquiring video and again a year later for the abduction of a girl program to effectively protect your citizens while testify in court. Who will stand between the boy road that led to the discovery and prosecution coordinating MDTs to combat CSEC. Referring metadata from CCTV DVRs in a forensically sound named Lacy. This presentation will outline reducing liabilities for your agency. Sheriff Voutour and his offender who is trying to intimidate the of this offense in two separate counties. Dawn the protocol development, the similarities and of Niagara County New York will be discussing boy in the hallway outside the courtroom? Who Ferguson will walk you through the two week differences in both cases, the lessons learned policies he has successfully implemented to will help him regain his personal power? Bikers trial and discuss the jury’s verdict. by the Multidisciplinary Team, and the issues efficiently monitor the management of the Against Child Abuse (BACA) is available 24/7 to Case Study confronted dealing with the families and team counties nearly 400 sex offenders and exceed help children who have been abused. They exist members after the abductions. The presenters the notification expectations of his community. for the sole purpose of empowering children to Building a Community Education strongly believe that the successful outcome Workshop not be scared of the world in which they live. Program for Your CAC in each case was directly related to what They work closely with law enforcement, CPS, Luís Acuña-Pilgrim, Dianna Smoot they learned as a team attending the Crimes Better Than a Confession: The Power district attorneys and child advocacy centers. As part of a strategic planning process, the Against Children Conference. of the One Party Consent Phone Call In this workshop you will learn all that they do Dallas Children’s Advocacy Center embarked Case Study David Clark, Eren Price and how you can use use BACA to help a child on a significant community education program This presentation will discuss how to use in need in your community. several years ago. Come and hear about Before They Were Missing: the one-party consent phone call in criminal Workshop strategies implemented to raise the profile An In-Depth Analysis of NCMEC Data investigations, as well as the importance of this of the agency and to become the “go to” for on Abductions and Sex Crimes tool in delayed outcry cases or cases where the Bridging the Gap on the MDT child abuse issues within Dallas County. In this Stacy Jeleniewski, Jessica Kenton detective has no other reliable evidence. The Kristen Howell, Brandon Poor workshop participants will be given ideas, tools NCMEC’s Case Analysis Division has been presentation will show you how to prepare your Law enforcement and mental health professionals and resources to take back to their communities, capturing data on attempted abductions, short- victim before the phone call and how to overcome must work closely together to find success on including creative ideas on what can be term abductions and sex crimes committed other obstacles the detective may be confronted complex cases of abuse. Yet, therapists and the implemented on a limited budget.

against children by individuals unknown to the with if the victim does not wish to cooperate. rest of the MDT don’t always speak the same Workshop DESCRIPTIONS children. These incidents included short-term Case studies will be discussed in which the one- language. Join a child abuse detective and a WORKSHOP abductions with or without a known sexual assault party consent phone call was used to prosecute social worker as they discuss the questions But I Love Him: When Children Love 2017 Violence Intervention and component, sexual assault without abduction, cases and force defendants to plea their case. everyone thinks you already know the answers Their Offender, or Think They Do VIP attempted abductions, indecent exposures Presenters will show how to decipher through the to. This insider’s look into our different crafts (Part 1 & 2) Prevention (VIP) Summit and suspicious incidents. All incidents were conversations between the victim and defendant will allow you to work more closely with the MDT, Carrie Paschall, Kim Skidmore, Bentonville, AR confirmed by law enforcement and only included and to understand it’s not always what is said will help you understand the impact of trauma Kelly Slaven WORKSHOP WORKSHOP if the child was not reported missing at the time during the conversations but sometimes what and the ways it may be challenging how you Interviewing children and teenagers who DESCRIPTIONS of the incident and the incident occurred solely is not said by the defendant when confronted communicate with families. This workshop will have been sexually victimized can in itself be in person. An in-depth analysis was completed with the accusations. Presenters will show how give you the tools to strengthen the human side of challenging, but it can be especially challenging and this presentation will discuss the findings the playing of the one-party consent phone your case and help more kids and their families. when the child/teen does not see themselves as a victim, but rather feels that they are in JUNE 20-22 across the child ages, focusing on event types, call sounds when played before a jury and it’s Workshop incident timing and location, offenders’ methods impact during trial. a loving relationship with the offender. The and how children escaped. Also included will be Workshop Bringing Life to Evidence Based feelings they have can often create blocks to a review of the free analytical resources offered Practices (Part 1 & 2) disclosure that can be difficult to overcome. In by NCMEC to law enforcement. Bianca Jones Case Study Laura Orr, Stacie Smith part one, the presenters will offer suggestions Workshop Edward Price This presentation will examine ways to bring life on how to ask questions in a way that can gather This case study will take you behind the scenes into the individual and group therapy room when helpful investigative information without further (The) Best Kept Secret: Mother – of D’Andre Lane, a father, who claimed two evidence based practices, such as TF-CBT, are complicating the emotional challenges the victim Daughter Sexual Abuse (Part 1 & 2) men carjacked him at gunpoint with his 2-year utilized. Participants will explore experiential already faces and will include lecture, case Julie Brand old child in the vehicle. The father reported methodologies such as mindfulness, sand tray, study and video clips to assist in the learning

SAVE THE THE DATE! SAVE 2017 This unique workshop describes the complex the suspects drove away with his child in the and empty chair (among others) as ways to move process. The case studies will cases of student/ gundersenhealth.org/ncptc

38 39

DCAC-16-019 DCAC Conference Program_07mg.indd 38-39 7/29/16 11:52 AM manner. In this session, we will demonstrate how conducting investigations and prosecuting information in neuroscience and how trauma investigation. They will discuss the red flags grant reporting compliance; Mitigate security Belkasoft product! This is an exhibitor workshop to recover evidence quickly and easily from a those responsible for the murder of children. impacts the brain and behavior to better for investigators, social workers and school risks while ensuring a user-friendly experience; by Belkasoft exhibiting on the 2nd floor. DVR hard drive or forensic image. We will also The presenter will discuss the methods understand these child victims. Law enforcement personnel in this case; the mistakes made during Leverage emerging trends in software automation Exhibitor Workshop briefly discuss the technical processes behind required to establish the fact a crime has been is currently the primary way children are being the initial investigation; the interviewing tactics to reduce effort while increasing productivity and DVR Examiner. This is an exhibitor workshop committed, the process to identify those recovered and extracted from traffickers. How employed; efforts for identifying resources client care quality. At the end of this workshop, Como Reconocer y Reportar el Abuso by DME Forensics exhibiting on the 2nd floor. responsible and to prove these allegations that first interaction with law enforcement through various law enforcement entities; the you will be better equipped to evaluate your Hacia Menores Exhibitor Workshop beyond a reasonable doubt. goes will paint all future engagement. The inter-agency coordination; and lastly, discuss existing case management system or to identify Luís Acuña-Pilgrim Workshop presenter will provide real life examples of best what could have been done differently in best practices for implementing a new solution. Presentation in Spanish/Presentación en español. Child Abduction Cases Through the practices in recovery planning considerations this case. Exhibitor Workshop El maltrato de niños es un grave problema Lens of a Victim Advocate Child Safety: Understanding Child that can increase rapport, victim cooperation Case Study en cual la comunidad Hispana no recibe la Alison Feigh Fatalities to Inform Practice and increase the possibility of successful Combating Pimps and Predators información adecuada y necesaria de como How can victim advocates be used to effectively Kathryn Sibley Horton investigations and prosecutions. Clash of the Medical Experts: Using Social Media reconocer y reportar el abuso hacia menores. En guide parents and family members through what Every child abuse and neglect fatality represents Workshop Alternative Theories in Abusive Michael Russo esta presentación descubriremos las señales de is often called “a parent’s worst nightmare?” an immeasurable loss to the family and to the Head Trauma The workshop will focus on how victims of human advertencia y los efectos que puedan padecer los Coverage of child abduction is often reactionary, community. There is an obligation to learn Child Sexual Abuse: Justin Fitzsimmons, Mark Hudson sex trafficking are often initially contacted and menores que han sido víctimas de abuso sexual, focused on a specific case, and leaves the from those deaths to improve our casework, A Six-Step Framework to A case example of abusive head trauma will groomed by perpetrators on social media. During abuso físico, negligencia, abuso emocional y de audience feeling helpless to protect. This session our prevention and intervention strategies and Understanding the Perpetrators be presented by a child abuse pediatrician the training, many of the current social media violencia doméstica. Se compartirán procesos highlights the academic study and learning build sustainable relationships between agencies Graham Hill highlighting the need for a thorough medical outlets where victims are being recruited will para manejar la revelación sobre el abuso around the topic of Child Abduction with an within the safety net for children and families. In July 2015 the FBI stated that child sex abuse evaluation and diligent investigation. This will be be identified. Various indicators pimps and hacia menores. Se hablará de la importancia intentional focus around patterns that emerge, This presentation will highlight changes and is at epidemic levels where tens of thousands followed by a summary of the theories that are predators often use to find their future victims de reportar a las autoridades cualquier abuso de profiles of abductors and targets, and replicable practices implemented to address child fatalities of children are believed to be sexually exploited commonly used by opposing medical experts will be discussed and analyzed. Participants menores y establecer políticas en organizaciones prevention strategies. Advocates will be better and the risk factors that are often associated in America each year. So what makes the to discount a diagnosis of abusive head trauma, will learn how to create an undercover social que trabajan con menores. El taller ofrecerá prepared to respond to the needs of the child, with child maltreatment including mental health, perpetrators of child sexual abuse think the and an explanation of why these theories are media profile to combat various types of crimes información que es culturalmente relevante the family and the greater community if one of substance abuse, domestic violence, and repeat way they do? For many, the answers to these difficult to apply to actual cases of abusive head pimps and predators routinely commit using para audiencias Hispanas. these high profile cases occurs in their community. involvement by child protective services. We questions are unimaginable but for professionals trauma. A prosecutor will then present strategies the Internet. Workshop Workshop will also discuss the impact of supervisors and involved in child protection those answers could and techniques for court prep and court-room Workshop managers in addressing child safety and the provide that important clue, that vital final presentation of information from the witnesses Completing an Investigation with Child Abuse Investigations: critical role that community partners serve in behavioural indicator that enables intervention for both the prosecution and defense. Resources Combating Sexual Exploitation One EnCase Forensic 8 The Practical Police Response keeping children safe. You will walk away with before a young life is irreparably damaged. This and literature references will be provided for Stop at a Time Steve Salinas Craig Miller, Jason Rodriguez tools to support your work with children, youth presentation will demonstrate the origins and the attendees. Michael Bourke, Derek Prestridge EnCase F orensic 8 features new investigation This presentation will focus on best practices and families. maintenance of perpetrator behaviour and utilise Workshop How can you more effectively identify victims workflows that enable examiners of any for first responders, school resource officers, Workshop video of perpetrators speaking candidly about of child exploitation and trafficking during a skill level to easily complete common tasks and administrators to handle child abuse cases. their behavior. (A) Close-Up Look at Female Sex seven-minute traffic stop? Are there indicators associated with a triage or comprehensive Actual case examples will be given to focus on Child Sex Dens: Infiltrating, Workshop Offenders in Positions of Trust you might be missing? Presenters from the investigation. EnCase Forensic 8 delivers the what helps or hinders an effective child abuse Raiding and Rescuing (Part 1 & 2) Julie Brand Texas Rangers and the United States Marshals usability investigators have been requesting. This case investigation. Issues will be discussed Chris Fitzpatrick Childhood Fall Injuries: We have been slow to acknowledge that Service will present an innovative program includes default conditions, improved reporting, that may arise from first responding officers, This presentation will examine the investigative Accident vs. Inflicted females sexually abuse children but some designed to combat all types of child victimization updated support for internet artifacts, and school administrators, investigators, and non- techniques which led to the identification of Jim Holler women, working in “positions of trust,” are during roadside encounters. They will share enhanced bookmarking capabilities. During this governmental agency assistance. Attendees multiple child sex dens in the Philippines. HSI Falls are the leading cause of unintentional injury perpetrators. This workshop examines recent techniques that can be coupled with routine session we will walk through EnCase Forensic will walk away with simple and effective tools Portland agents identified children as young for children. Nearly one-third of all fall-related cases of female teachers found guilty of sexual police practices to significantly increase the 8, demoing the new features and improved to handle even the most complex of child as two years old being sexually molested and visits to hospital emergency rooms are children abuse or assault. It explores the dynamics of their likelihood of identifying victimized children usability Forensic 8 delivers. Throughout the abuse investigations. trafficked daily for paying customers worldwide. ages 14 and under. More than half of all nonfatal teacher-student “relationships” and reveals ways and their offenders. The workshop will include session you will notice many of the usability Workshop Through undercover, online communications injuries to children are associated with falls, and that the gender of the perpetrator impacts victim examples of cases where officers used these enhancement added to Forensic 8 making the agents were able to discover, and ultimately, falls are the leading cause of nursery product- disclosures, the reporting of sex crimes, arrests, interdiction techniques to rescue children. produce easier to use. We encourage attendees

Child Homicide Investigation infiltrate a closely protected community of related injuries. The severity of a fall-related injury public response, prosecution and sentencing. Workshop to download and install Forensic 8 prior to the DESCRIPTIONS and Prosecution offenders and communicate with the main is determined by the distance of the fall and the An interview with an archetypal convicted session and come prepared with questions. WORKSHOP Michael Milnor, Nancy Oglesby target(s) over a period of several months. The landing surface. Head injuries are associated female sex offender (conducted in Colorado, Combining Mobile and Computer After this session, participants will understand Child homicide is not only emotional for presenter will discuss the collaborative efforts with the majority of severe injuries and deaths Oct. 2011), offers insights into the sexual abuse Investigations with Belkasoft the features and benefits of EnCase Forensic investigators and prosecutors, but also some of with international law enforcement agencies and resulting from falls. Because falls are associated of adolescent males by adult female perpetrators. Evidence Center: New Trends and 8. This is an exhibitor workshop by Guidance the most difficult investigations and prosecutions. the strategies implemented, to include innovative with a child’s curiosity and development of motor The presentation willl identify unique challenges Issues Software exhibiting on the 2nd floor. This presentation will discuss methods of real-time international surveillance operations skills, children ages 10 and under are at the which male victims face as they work to recover Yuri Gubanov Exhibitor Workshop WORKSHOP WORKSHOP establishing timelines and dealing with parents and international undercover operations, which greatest risk of fall-related death and injury. This and to heal from such betrayals. Participants will With many thousands of applications, hundreds DESCRIPTIONS and families, (who are often suspects.) The led to the arrest of the multiple targets in the workshop will focus on identifying non-accidental learn proactive strategies for possible prevention of data types and the abundance of file formats Comprehensive Offender presenters will discuss the importance of the Philippines and the rescue of numerous children fall injuries on children and will emphasize the and earlier intervention. one can be easily lost. What data to look for, and Management: Exceeding the Letter physical evidence as well as the sponaneous under their control. specific techniques that can be used by the Workshop where to search for it? How to find Skype chat IP and the Spirit of the Law statements made at the scene to first responders. Case Study investigator in the assessment, investigation, and addresses? How to decrypt WhatsApp mobile Joe Gauthier The art of interrogation and interview in these reconstruction of injuries sustained from a fall. Collaborate: Emerging Trends app history? How to determine IP addresses, This workshop will be a comprehensive look difficult investigations will also be discussed Child Sex Trafficking: Workshop and Best Practices in Web Based used by a suspect? How to prove that a particular at strategies to help agencies exceed both the in detail. Finally, the team approach between Effective Strategies for Recovery Case Management picture has been viewed and by what user? letter and the spirit of sex offender management the prosecution and law enforcement will be Planning & Victim Engagement Chyenne Kircher: Solving a Tragedy Matt Bochneak, Tyler Lannom Learn about new Belkasoft Evidence Center and public notification statutes. The presenters stressed in all successful investigations. Melissa Snow Kim Castro, Wayne Jackowski In this workshop, technology experts will discuss 2016—one of the most advanced forensic will discuss data collection standards, effective Workshop Child sex trafficking cases are complex and This presentation is a case study of a cold case the various concerns and benefits of using web- tools on the market allowing you to discover public communication policies as well as how and the victims are riddled with trauma, distrust investigation of a missing 14-year-old child based case management software, including: hundreds types of evidence in just a few clicks. when to adopt heightened supervision policies. Child Homicide Investigations of systems, and are often reluctant or unable named Chyenne Kircher. The presenters will Avoid the pitfalls and maximize the benefits of Analyze existing files, discover deleted data, find A demonstration of techniques to help improve Brian Killacky to disclose abuse. Attendees will be provided present the initial facts of the missing child paperless systems; Understand how to glean RAM memory artifacts and investigate mobile your agency’s efficiency and effectiveness when This workshop is for those professionals with an overview of the latest groundbreaking investigation that later developed into a homicide insights from data analytics, while ensuring devices in a live demo session using flagship conducting verifications, sweeps and managing

40 41

DCAC-16-019 DCAC Conference Program_07mg.indd 40-41 7/29/16 11:52 AM homeless offenders will also be included in violence. We will discuss our work with local themselves. Harris also attempted to sextort but the autopsy later revealed she died from Digital Photo, Video and Audio Does Race and Culture Matter When this workshop. This class is recommended for officials to rescue the victims and ensure their over 75 others over a period of years. The an overdose of diphenhydramine, the active Technologies in Law Enforcement Handling a Child Sexual Abuse Case supervisors, investigators. SOR registration full restoration, physically and mentally. We will presentation will detail how investigators tied ingredient in Benadryl. Many believed Fraser had John Penn II JJ Staples personnel, prosecutors, probation and also provide a unique perspective from former Harris to repeated attempts to obstruct the nothing to do with Clara’s death. Parents, whose This lecture will look at new technologies that can We must ask ourselves: How does child parole staff. law enforcement officers on working these types investigation from jail by creating a fictitious children attended the daycare, decided to have help with existing law enforcement challenges sexual abuse differ in the African American Workshop of crimes for a human rights non-profit. This is persona who took responsibility for setting up their children tested. Ultimately, 14 other children as well as new technologies for the future. From community? Or, Is the problem of child sexual an exhibitor workshop by International Justice Harris in an attempt to steal his wife. The study tested positive for diphenhydramine. Fraser was image manipulation tools like Photoshop, to abuse considered to be the same as other Corroboration: The Key to a Strong Mission exhibiting on the 1st floor. also will detail the trial issues that were had prosecuted for murder and endangering a child. live video face manipulation, and background communities? This workshop will delve into the Child Exploitation Case Exhibitor Workshop by the prosecuting team and overcoming the Case Study audio enhancement a wide variety of new differences in the African American community Justin Fitzsimmons defense computer forensic expert who provided developments in digital media are poised to from those of other communities. Although there Supporting a child’s disclosure through Cross-Examination inaccurate testimony. Finally, details will be Debunking Defense Myths in Abusive bring new techniques to law enforcement. In will be many similarities and overlap of African corroborative evidence is essential in child Victor Vieth provided about how Harris attempted to sell state Head Trauma Cases addition to law enforcement uses, this lecture American children that have been sexually abuse investigations and prosecutions. This In this workshop, students will learn the keys secrets to foreign governments if they broke him Nancy Cochrane, Angela Vickers will also look at potential criminal uses of new abused, the participants will be charged with presentation covers the potential areas to to a successful cross-examination. They will out of jail. See this link for more information. Throughout the prosecution of abusive head and upcoming technologies. We’ll look at drawing their own conclusions. discover corroborative evidence, and explains the learn how to prepare and gain a thorough Case Study trauma cases, professionals are oftentimes desktop, cloud and mobile technologies and Workshop importance of technology—based corroboration. understanding of the case. Including the dealing with untrue medical defenses leave attendees with techniques they can apply The audience is shown detailed examples of how evidence to be presented by both sides, drafting Danny Dearest: Love Thy Father and propounded by the defense team. This workshop today as well as be prepared for what’s coming. Domestically Violent Homes: statements made during the disclosure leads cross-examination topics and questions and Thy Neighbor will focus on the most common defenses that Workshop The Threat of Harm to Children to corroborative evidence. understanding the limitations of cross- Shannon Miller, Sarah Preston prosecutors face in these types of cases, what Andrew Campbell Workshop examination. Finally students will learn concrete In July 2009, one of Minor’s victims made an they truly mean, and how to overcome them. (The) Disturbing Underground World This presentation will discuss the threats of examples of how to box the witness into a corner. outcry of sexual abuse. Faced with no physical Workshop of “Re-Homing” Adopted Children: harm to children associated with living in a home Countering Child Sexual Exploitation Workshop evidence and directly conflicting accounts What’s Going On and What Can We where domestic violence occurs. Though these @ Twitter by another child, the case stalled. In June Deception and Denial Among Child Do About It? (Part 1 & 2) vulnerable victims are at risk for all types of Twitter Staff (The) Cross-Examination Survival 2014, another of Minor’s victims walked into Molesters (Part 1 & 2) Angela Goodwin, Laurel Whitney Parke child maltreatment, this presentaion will focus In this workshop, we will discuss how Twitter Game Show the police department and opened the flood Jim Tanner, Darrel Turner As stories involving unregulated child custody primarily on the risks for substantial emotional works in tandem with NGOs, technology Steve DeBrota, Michael Johnson, gates to Minor’s sadistic and controlling abuse Dr. Tanner and Dr. Turner have presented transfers (“re-homing”) continue to arise, it’s harm and cover topics such as: the various companies and law enforcement on ways to John Pirics that spanned several years and jurisdictions. independently of one another on the topic of high time that we talk about this complex forms of emotional maltreatment, toxic stress, eradicate child sexual exploitation online. We This demonstration workshop will use a game Minor sexually, physically, and mentally abused detecting deception among child molesters. issue and how to address it. This workshop weakened attachment, “unavailable parenting,” will also provide an overview of our service show format to teach forensic examiners and his victims by using sexual acts as a form of This presentation combines the work of both will examine all facets of this dangerous practice the effects of witnessing threats or violence and give context around what makes Twitter sex crime detectives how to testify about punishment. Minor was subsequently convicted professionals and includes preliminary findings where parents are seeking new homes for their against animals living within the home, caregiver unique. Additionally, we will share the latest tools computer forensic issues, or the results of of the continuous sexual abuse of three young from exciting ongoing research designed to adopted children through unregulated networks risk factors for domestic violence and emotional designed to help users stay safe and in control of witness interviews, without making brutal children, including the victim who made the create a rating instrument for interviewers to use such as Internet chat rooms, and relinquishing maltreatment, how to identify victims, and what their Twitter experience. Finally, we will provide cross-examination mistakes. It will also original outcry. This case study will focus on the to assess patterns of deception frequently used custody to strangers outside the purview of to do once victims have been identified. some insight into what a Twitter CyberTip report provide prosecutors and investigators with complex issues and strategic decisions required by adults who offend sexually against children. regulatory entities. The discussion will include Workshop looks like, how the information is presented ideas concerning how to use computer forensic when prosecuting Minor, including charging The presentation will be an introduction to means tracking concerns, current legislative actions and answer some frequently asked questions. evidence in the most effective ways, even with decisions, unique DNA issues, and evidentiary of detecting deception and will include video taken by states, possible solutions through Donuts and Dongles Workshop skilled defense counsel. and witness complications. clips from actual interviews with offenders that various approaches, and case examples. Michael Staggs Workshop demonstrate various deception patterns in action. Join Nuix for free donuts – (and an informational CPS Forum Case Study Attendees at the workshop will be invited to share Workshop their experiences and perspectives regarding workshop)! At this session, you will receive a Kathryn Sibley Horton Cybersecurity: Understanding (The) Darknet and Emerging the “re-homing” of adopted children. The goal free Investigation & Response trial dongle, Is an ethical dilemma keeping you up at night? Organized Criminal Activity Technologies: Where Are Teens Going Digital Evidence in Child Abuse walk through software set-up, and process a Does working with abused and neglected kids of this workshop is to raise awareness of this Cynthia Gonnella and Offenders Following? Prosecutions issue and to collaboratively develop solutions. test case using Nuix software. This is a great affect your own parenting? Has a high-profile In this lecture, students will learn about cyber Justin Fitzsimmons Justin Fitzsimmons Workshop opportunity to learn more about our solutions, case or a child fatality caused you to think about terminology and cyber threats facing law As the internet continues to evolve new layers This workshop will discuss strategies and ask questions, and understand why Nuix is

seeking employment at a big-box store? It’s a enforcement today, such as the direct threats populate where offenders commit criminal suggestions for investigating and prosecuting Diving Deeper: Using Big Data unique in the investigations industry. Come for DESCRIPTIONS hard job and we all know it! Let’s talk about by hacktivist groups like Anonymous. Students offenses. One such area is known as the Darknet. child abuse cases by exploiting every advantage Analytics to Interpret EXIF in the donuts—stay for the Nuix knowledge! This WORKSHOP the problems and celebrate the solutions. Join learn how cybercriminals are employing the Participants will learn how the Darknet works found in the digital “paper trail” that offenders NCMEC’s CVIP is an exhibitor workshop by Nuix exhibiting on fellow CPS workers from around the country Internet to attack state and local governments and how potential criminal activity is facilitated leave behind. Be it constructing a timeline Lauren Coffren, Nick Montgomery the 2nd floor. in a lively session about these and other topics and conduct organized cybercrime activity. on the Darknet is crucial to investigating based on cellphone ping data, using metadata Hidden “behind” digital images and videos may Exhibitor Workshop you may choose to discuss. Delivered by experienced ICAC investigators and prosecuting child exploitation cases. In associated with digital images to prove a location, be crucial information to assist in identifying Forum and a Professor of Cybersecurity, this block of addition, new software applications are being or forensic analysis of storage media for deleted victims of child sexual abuse. Many people are Emerging Issues in the Field of WORKSHOP WORKSHOP instruction was adapted from NW3C's Basic added to mobile phones and tablets daily. This files, the digital landscape is fertile ground for aware of the importance of serial numbers, date Forensic Interviewing DESCRIPTIONS Crimes Against Children: Network Intrusion Investigations Cybersecurity presentation will demonstrate several of the the well-trained investigator and prosecutor. timestamps and GPS coordinates to linking child Rita Farrell A Global Perspective by International 235 Course. newer applications for mobile devices that are Tips for bolstering the strength of the state’s The field of forensic interviewing is ever changing. Justice Mission exploitation files together. Now working with Workshop popular for teenagers. Participants will learn case in the investigative stage, at trial, and on data analytics and uncovering 56,000 known This presentation will discuss emerging issues Vic Lacey, Melanie Martinson about vault applications and the ability to secretly appeal will be stressed. Key issues in drafting in the field including; new research, use of Please join us for a look at crimes against data fields, the analysis of EXIF metadata across Daniel Harris, Top Gun Pilot: store information. search warrants for digital evidence will also be diagrams, forensic interviewing protocols, children in the developing world and how cases can be much less daunting and much From Maverick to Convict Workshop discussed, along with steps investigators and introducing evidence into interview, and peer International Justice Mission (IJM) is fighting more efficient. NCMEC’s recent implementation Paul Wolpert, Elizabeth Yusi prosecutors must follow to ensure compliance of big data analytics has uncovered numerous review and mentoring. to combat this horrific violence. The presentation This case study will detail the investigation Death at a Daycare (Part 1 & 2) with the federal (now some states as well) Workshop will take a look inside child sexual assault, child case connections helping law enforcement by Homeland Security Investigations and Dale Smith, Melinda Westmoreland Electronic Communications Privacy Act. successfully identify these child victims. Case sex trafficking, online sexual exploitation, and the Bedford County ICAC of Daniel Harris, a The case study will focus on the prosecution of a Workshop examples, EXIF definitions and discussions, and the slavery of children that is plaguing many US Navy Top Gun fighter pilot and US Naval well-known home daycare owner, Marian Fraser, demonstrations of the newly developed tools countries around the world and the work IJM Academy graduate, who devised a “sextortion” in Waco, Texas. On March 4, 2013, four month and in-house analytics performed on all files is doing with host nation law enforcement to scheme to force ten underage girls, aged 12–17 old Clara Felton died in Fraser’s care. Initially, submitted to NCMEC will be shown. arrest and prosecute the perpetrators of this years old, to take nude photos and videos of it was presumed she died from natural causes, Workshop 42 43

DCAC-16-019 DCAC Conference Program_07mg.indd 42-43 7/29/16 11:52 AM Enabling the Disabled: Everything You Need To Know About federal investigators led to the rescue and obtain case-specific details will be discussed. testimony. Attendees will also learn important enhance a child’s credibility through the The Investigation and Prosecution Adobe Hosted Services, PhotoDNA identification of 14 children. Workshop concepts to remember when taking the witness development of corroborating evidence. This of Sexual Assaults of Persons with Program and Policies Case Study stand and will get to observe some mock direct presentation consists of real life case examples Intellectual Disabilities Yu Jin Kang, Mary Catherine Wirth Following the Evidence in the and cross examination between the presenters. that demonstrate how unexpected evidence Amy Derrick, Jen Falk At Adobe, we frequently hear, “I didn’t know Fatal Distraction: Kids in Cars – Forensic Interview Attendees will also be given the opportunity will impact an investigation or a trial. These Approximately 6.5 million people in the United Adobe had hosted services,” from law Prosecuting Neglectful Parents Julie Kenniston to ask questions and participate interactively examples will include how graphic videos, DNA States have an intellectual disability. Children and enforcement officers and prosecutors Mary-Ann Burkhart This presentation will provide information if they wish. collection, SANE exams, information from adults with an intellectual and or developmental investigating the CyberTips we submit. This Each year, too many of our children are left on maximizing corroboration in child abuse Workshop forensic interviews, and how what seemed disability often make the perfect targets for a workshop will teach you everything you need alone in cars, resulting in tragic outcomes. This investigations by asking the right questions insignificant became vital corroborating sexually violence offense. They also provide a to know about Adobe’s recent transformation workshop will discuss the most common reasons in the forensic interview. Topics include: how From Anger to Solace – A Mother’s evidence. Many times verdicts depend on unique set of challenges in the investigation from desktop software provider into a global why this happens, what happens to children to incorporate questions about grooming, Journey Beyond Victimization the child’s credibility. This presentation and prosecution of sexual assault cases. This cloud services provider, our many hosted who are victims of hypo or hyperthermia, the assessing the use and impact of social media, Mika Moulton emphasizes ways to develop corroborating presentation will address best practices for the services and apps for editing, storing and history of prosecuting cases of parental neglect addressing externally derived information, This presentation reveals the thoughts that evidence to provide a safety net of credibility investigation of these types of cases as well as sharing photos and videos online, our PhotoDNA or child homicide in these types of cases, and and creating questions about traditional and most parents of missing children have about for a child at trial. This is an evolving presentation provide strategies for successful prosecution. program, and our US and international law tips for investigating and prosecuting these nontraditional evidence. the police and their investigation. You will hear containing new case examples resulting in Workshop enforcement response processes and policies. highly preventable cases. Reasons for going Workshop first-hand from a mother who lived every parent’s corroborating evidence. Workshop forward with these types of cases will also be worst nightmare. As you listen to her story, you Workshop Engaging Friends to Build Support for explored. Forensic Interviewer Forum will learn how to break the wall of scrutiny that Your Agency Facebook: 101 Workshop Jesse Gonzalez, Carrie Paschall parents have toward police. You will learn what From Sticks to Flowers: Becky Aguilar, Katie Overman Jason Barry, Andrea Kirkpatrick This interactive forum will present you with mistakes to avoid and how to give the family Working with Parents Justifying Engaging friends and supporters of your In this workshop, the presenters will discuss Finding Tara: The Race To Save a Girl an opportunity to network with others in the the resources this presenter wishes she would Corporal Punishment with Scripture agency’s mission through hands-on volunteer the latest safety and privacy controls, safety and Catch a Predator field of forensic interviewing. In attendance have had or known. The common mistakes that Victor Vieth opportunities greatly increases the likelihood initiatives designed to disrupt and prevent child Francey Hakes will be Forensic Interviewers from around the were made by the first responders should not As the legal definition of reasonable force of their sustained financial support. In this exploitation, a detailed review of Facebook’s Law This presentation will take attendees behind country getting together to discuss relevant be common. You will gain knowledge on how continues to contract, there is increasing workshop you will learn how the Dallas Children’s Enforcement On-line Records Request System the scenes of the dramatic worldwide search topics in the field and discuss current trends and to educate your department and yourself and tension between criminal justice/child protection Advocacy Center engagement team starts and guidelines for interacting with the Facebook for one little girl after pornographic pictures of best practices. how to properly respond to a missing and/or professionals and parents who physically relationships with supporters through social Law Enforcement Response Team. her being threatened at knifepoint surfaced Forum abducted child case. discipline their children based on religious media and outreach programs, builds them Workshop half a world away in New Zealand. The clear Workshop beliefs. Using a case study, this workshop through events, and deepens that relationships link between collecting child pornography and Forensic Interviewer in the Courtroom offers concrete guidelines for MDTs working through volunteer opportunities - all with hope Facilitating Forensic Interviews of hands-on offending will be explored in two (Part 1 & 2) From Dispatch to Verdict II: with caretakers whose physical discipline of that this activity will inspire loyal donors. Cyber Crimes federal case examples. Attendees will learn Rachel Burris, Carrie Paschall Continuing to Explore Corroboration in their children exceeds the law but is rooted in This presentation is specifically for new or Workshop Crystal Gregory about the focus required to search for victims Sexual Abuse Cases their interpretations of scripture. This presentation will discuss each step of appearing in the images of child sexual abuse relatively new forensic interviewers. It will provide Nancy Hebert, Vincenzo Santini Workshop Ethical Considerations in Charging a legally-defensible forensic interview while and see clear evidence of what drives child sex an in-depth overview into best practice in record What do law enforcement, CPS, forensic Decisions working with electronic evidence, whether it is offenders to abuse children and how some are keeping and training documentation for forensic interviewers, therapists, SANE nurses, and Gang Endangered Children (Part 1 & 2) Todd Hornik prior to or after the collection of evidence by law so desperate to abuse children they will travel interviewers. The presenters will also discuss prosecutors have in common when it comes Jabari Howard, Doug Millican The exercise of executive authority in the charging enforcement. The presenter will provide case thousands of miles to do so. The presenter will how to prepare for your testimony, including to child sexual abuse? They are all MDT We all know being in a gang can get you killed. of criminal cases is an awesome responsibility examples and techniques of gathering details offer insight into the minds of these predators how to watch your forensic interviews in an members who within their independent Those who participate in gang activity also pose that needs to be circumscribed by thoughtful, surrounding evidence to gain more investigative and display some of their own words, photos, efficient manner to maximize the quality of your disciplines ensure a child’s well-being and a risk to those around them. We hear about analytic and often difficult decision making. As a knowledge. The presenter will focus on preparing and the evidence that brought them down. prosecutor responsible for filing cases how can the interviewer and victim for the use of images, Case Study you best maintain your rightful position as an chat logs, and other evidence while keeping with initiator of charges? As an officer investigating the needs of the victim. Various victims’ needs Five B’s of Child Physical Abuse: cases, how can you best present your work to will be discussed, including emotional reactions, Bruises, Burns, Bones, Bellies, and THE TECHNOLOGY COALITION WISHES TO your partners in prosecution to help them make compliancy, relationship with offender, concern Brains (Part 1 & 2) THANK THE CRIMES AGAINST CHILDREN DESCRIPTIONS good decisions in an efficient manner? How of images being distributed, and preparing for Kristen Reeder WORKSHOP can prosecutors and law enforcement officers parental reactions. The presenter will also This talk will review the variety of injuries seen CONFERENCE FOR WELCOMING US TO ITS work together to secure justice for victims and discussion the use of bait images/videos and in cases of child physical abuse. The discussion 28TH ANNUAL GATHERING. appropriate results in court? Lecturing from how to inform the victim that offender is not will be case based and include examples of an ethics standpoint and with a breadth of who he or she portrayed him/herself. abusive and non-abusive injuries. The lecture experience filing both general criminal and child Workshop will be geared for CPS workers, law enforcement WORKSHOP WORKSHOP abuse and sexual assault cases about what can investigators, and attorneys to learn the basic

DESCRIPTIONS TECHNOLOGY COALITION MEMBERS WORK TOGETHER TO and cannot, should and should not be done, (The) Fall of an Icon: The Arrest and aspects of child physical abuse injuries. COMBAT ONLINE CHILD SEXUAL EXPLOITATION. WE ARE: DDA Hornik will strive to provide a thoughtful Conviction of Jared Fogle (Part 1 & 2) Workshop approach to the highly charged and time focused Christopher Cecil, Steve DeBrota, Kevin world of initiating child abuse cases. Getz, Darin Odier, Andrew Willmann Following the Evidence in the DROPBOX GOOGLE SNAPCHAT Workshop This case study will explore the investigative Commercial Sexual Exploitation steps and forensic analysis which cumulatively Forensic Interview FACEBOOK LINKEDIN TWITTER (The) Ethical Plea led to the arrests and convictions of former Julie Kenniston Travis Wiles Subway spokesman Jared Fogle and former This presentation will provide content that GODADDY MICROSOFT YAHOO! This workshop explores common ethical issues Jared Foundation Executive Director Russell forensic interviewers should incorporate in that arise during plea negotiations in child Taylor. Specifically, it will discuss how the case interviews of minors suspected as trafficking PAYPAL abuse cases. Attendees will receive guidance was handled, what steps were taken to uncover and/or internet crimes victims. The focus will in identifying ethical dilemmas while navigating additional crimes of the offenders, and the be on non-caregiver cases. Commercial sexual the practicalities of plea agreements. lessons learned. The case study will illustrate exploitation interviews will be compared and Interested in learning more or joining the effort? Visit www.technologycoalition.org for more information. Workshop how great teamwork between city, state, and contrasted to intrafamilial cases. Strategies to

44 45

DCAC-16-019 DCAC Conference Program_07mg.indd 44-45 7/29/16 11:52 AM innocent bystanders being victimized, but what process and data policies. multi-offender case as well as the forensics to the successful identification and location for program evaluation. missing children; Locating children and abducting do we know about the children who are exposed Workshop issues they encountered and lastly how “Peter of two victims of child exploitation. Through Workshop parents in the US identified in incoming Hague to this culture everyday? Members of criminal Gilbert” was finally correctly identified through the collaboration of international and multi- cases; Preventing abductions and abductions- street gangs are getting younger. Gang members Google’s Law Enforcement Request the use of a body search warrant. jurisdictional law enforcement efforts two minor Increasing Public Safety Through in-progress from the US; Teamwork “lessons model behaviors that glamorize violence to the System (LERS) Case Study children, that had been repeatedly abused and Community Partnerships learned” between the State Department and children around them. Popular culture and social Have you heard of Google’s new Law Enforcement exploited by Michel Brown, were identified. This Joel Shoultz, John Strain INTERPOL Washington. media have made it “cool” to be in a gang. For Request System? If so, great! We’d love to hear How the CACTX Semi-Structured case study began with images being posted of This workshop will focus on increasing public Workshop law enforcement, dealing with a crimes involving about your experience! Don’t have an account? Narrative Process Compares the lower half of two prepubescent females safety and education by building better street gangs can present its own challenges. If No problem! We’ll show you how to set one to Other Nationally Recognized being sexually abused by an adult male. Agents community relations through your sex offender Interrogating Sex Offenders: that crime involves a child, the challenge is even up! We’ll have schwag! This drop-in workshop Interview Structures utilized both “good old fashion police work” and management efforts. The presenters will discuss Gaining Maximum Tactical Advantage greater. This presentation will give participants is restricted to law enforcement. Feedback Ada McCloud modern techniques seen on TV shows like “CSI” various methods to foster better communication (Part 1 & 2) an understanding of the fundamentals of gang sessions last approximately 20 minutes and There are now fewer differences between the to identify and locate the victims. In conventional between your agency and the public through the Mike Krapfl, Jon Turbett recognition, documentation and investigation. will run continuously all day Wednesday. nationally recognized forensic interview training investigations you may have identified a target use of social media, mailings , seasonal press This presentation will identify the limitations of The discussion will focus on identifying and Sponsor Workshop structures, due in large part to research of the and once you complete your investigation find releases, tips and a variety of other programs. current law enforcement training in interview addressing the issues surrounding gang- NICHD process. Although the field is more united that target had live victims. This case was just Workshop and interrogation and describe how those endangered children. Grooming Behaviors Among in practice recommendations, some differences the opposite. limitations adversely affect the investigation Workshop Child Molesters and the Impact still exist and interviewers should be familiar Case Study Innovations in Incident Response for of sex offense crimes. The workshop will on the Victims with the various interview structures accepted Crimes Against Children introduce an evidence-based model of Gentle Child Murder: Darrel Turner across the country. This session will focus I Take It Back: When a Child Recants Jason Sanchez interview and interrogation practiced by the Suffocation/Strangulation/Drowning This workshop will discuss grooming behaviors on the Children’s Advocacy Centers of Texas’ Allegations of Child Sexual Abuse Yaana’s Mobile Investigation & Data Acquisition presenters that maximizes current research Jim Holler engaged in by child molesters in order to secure Semi-Structured Narrative Process and how it Carrie Paschall System (MIDAS) meets multiple challenges that and legal advantages for officers. This model Gentle homicides encompass smothering, victims and prevent disclosure. Grooming of the compares to other accepted interview structures. Investigating cases involving children and Law Enforcement Agencies face today. Current will be presented in the context of a sex abuse strangulation and drowning and are the second environment (family, friends) in order to facilitate We will also explore questions prosecutors teenagers who have been sexually victimized methods and processes for critical investigations investigation involving a former law enforcement most common type of child murder and the most abuse will also be addressed. The preliminary may ask on direct examination to help courts can be challenging, but it can be especially are tedious and extremely slow, marred with officer and no physical evidence, a scenario difficult for investigators to discover. In most findings from ongoing current research by the understand more about the particular structure challenging when the child later recants their manual paperwork causing miscommunication that is not often likely to produce a conviction. cases there is no evidence of any type of trauma presenter on grooming will be presented. Video an interviewer/CAC/MDT uses in conducting initial allegations. Many in the field become and inefficiency between the field investigators The presenters will address the interview and and there are no tests at autopsy that could help clips from actual interviews/evaluations of sex forensic interviews. This session is intended for concerned about the credibility of both the child and the command staff. MIDAS provides a unique interrogation tactics that produce the slightest determine this type of death and many cases offenders will be utilized to provide examples anyone interested in an overview of the various and the case once this occurs and it becomes mobile application along with a fully integrated edge with sex offenders. are ultimately listed as Sudden Infant Death of grooming behaviors “from the mouths of the models or those who may be asked to testify difficult for the MDT to know what to do next. Command Center system. The MIDAS mobile Workshop Syndrome (SIDS) when in fact it was murder. offenders.” Videos with victims will be utilized to about interview structures. As a result, many times cases are not pursued application offers a user-friendly, intuitive, and These cases are most likely discovered through examine the psychological and behavioral effects Workshop and children are left in situations that put them a case-oriented approach to instantly capturing Interviewing Children with Disabilities admission from caregivers or witness accounts. of grooming and abuse that exist often long at risk for re-victimization. This presentation and organizing various types of data (photos, Rita Farrell Many of these murders come when caregivers after the abuse has stopped (i.e., recantation, How Technology Helps Us Find will discuss recantation and its place in the videos, voice recordings, and notes) using Professionals charged with interviewing children simply use their hand, pillow, or blanket to restrict delayed disclosure). Needles in the Needlestack normal process of disclosure, how to investigate standard smartphones or tablets. The MIDAS for alleged abuse are likely to encounter children the infant’s oxygen intake causing asphyxia and Workshop Chris Priebe a recant and when and how to interview a child mobile application distributes the captured with developmental disabilities or other special death. This training is a comprehensive overview Chris Priebe from Two Hat presents a sneak peek who has recanted. A case study with excerpts data in real-time from the field to the MIDAS needs. In this presentation, rates of victimization of investigating gentle homicides in children and Handling Common Problems in Child into how some large technology companies are from forensic interviews will be used to assist Command Center system, which then processes of children with special needs are provided, will cover in detail suffocation, strangulation, Sexual Abuse Cases finding and preventing suicidal calls-for-help, in meeting learning objectives. the field data instantly using advanced text, factors that increase risk of abuse for children and drowning homicides and will provide the Summer Elmazi grooming, and child exploitative content. How Workshop image, and video analytics capabilities, allowing with disabilities are discussed, children’s investigator with the knowledge they will need This presentation will explore problems that often do reports get triaged internally, and how can analysts to rapidly review, create leads, and abilities to recount information are described, to successfully conduct this type of homicide. arise in the investigation and prosecution of child we make this process as instant as possible for If I Only Knew Then What I Know Now! assign tasks to critical points of interest. MIDAS and strategies for the interview process are Workshop sexual abuse cases. The dialogue will include technology companies and law enforcement? Melissa Snow, Thomas Stack allows the incident response team to focus on covered. Topics related to the interview include examples of issues commonly encountered by This is an exhibitor workshop by Two Hat This presentation will highlight lessons learned the critical details of a case by eliminating the the importance of data-gathering before the Giving Faces to the Nameless and prosecutors during trial and strategies members exhibiting on the 1st floor. from law enforcement and services providers significant overhead of manual data gathering interview, techniques to accommodate for

Hope for the Missing of a multidisciplinary team can use to improve Exhibitor Workshop in working together on child sex trafficking processes.This is an exhibitor workshop by particular disabilities during the interview, and DESCRIPTIONS Joe Mullins the quality of cases files with the courts. to engage survivors, increase success of Yaana exhibiting on the 2nd floor. suggestions to continue to address the child’s WORKSHOP NCMEC’s Forensic Services Unit (FSU) has Workshop Human Trafficking and Beyond investigations, prosecutions and long-term Exhibitor Workshop needs after the interview is complete. been assisting law enforcement since 1990. (Part 1 & 2) victim success. Workshop In that time they have: resolved over 2,000 House of Horrors: Tanisha Knighton Workshop Interagency Coordination and cases with age progression images, completed The Mills and Akers Investigation This workshop will focus on the different types Cooperation in International Parental Interviewing Male Perpetrators of hundreds of facial reconstructions from skeletal Brad Byrd, Glenn Covington of missing persons, analyze the profiles and Improving Clinical Practice as You Abduction (Part 1 & 2) Child Sexual Abuse WORKSHOP WORKSHOP remains, and performed hundreds of soft tissue This case study will detail the investigation of a vulnerability factors of “victims,” recruitment Gather Research Kendall Beels, Michelle Ford-Stepney, Graham Hill DESCRIPTIONS reconstructions from morgue photos. These are married couple, Bailey and Elizabeth Mills, who and grooming tactics used by traffickers of Colton Kurth, Jeff Wherry Daniel Githens, Ann McGahuey Interviewing those suspected of child sexual only a few of the many services FSU can provide operated a day care and mentoring program for both sexual trafficking and labor trafficking, The Research Institute of the Dallas Children’s The State Department’s Office of Children’s abuse is a skill that can only be acquired and law enforcement. This presentation will educate children. As it turned out, the husband was a terminology and rules associated with the Advocacy Center is collaborating with the its Issues is the US Central Authority (USCA) under enhanced by continual practice. This presentation the audience on what they can do, walk through two time registered sex offender and also his pimping subcultures, provide tips on how to clinical staff to engage parents and children the 1980 Hague Abduction Convention. The uses interviews with perpetrators and case study the process of how its done, highlight successful wife’s pimp. The investigation revealed that the identify and interact with “victims.” as together we design tailored treatment plans USCA handles international parental abductions material to demonstrate the presentation styles case examples, and how they can help bring the husband had sexually molested 11 children and Workshop and track outcomes. Attend this presentation from the US (outgoing), to the US (incoming) and of these offenders and highlights the techniques lost home and give the nameless their identity. recorded the acts with his cell phone camera, and check out our tools and outcomes, and its Prevention Branch is dedicated to preventing that can work when interviewing men suspected Workshop including some in which his wife participated. (The) Hunt for the Tutu Girls feel free to use these same tools in your outgoing abductions. Interagency coordination of child sexual abuse. Such information is vital Bailey also arranged for another person to have Janet Connolly, Nicole Rye setting. The presentation will do the following: is crucial; the Department works closely with if professionals are to effectively engage with Google: Combating Child Exploitation sex with three of the children in his care. The This case study will take you behind the scenes identify screening tools for initial and ongoing INTERPOL Washington, the FBI, DHS/CBP, and those suspected of child sex crimes. Dona Bellow, Cathy McGoff case was further complicated when two of the of a victim identification investigation. NCMEC assessment; match screening outcomes with state/local law enforcement agencies. This Workshop This is a workshop that will provide on overview victims mistakenly identified this man as “Peter titled the group of images, discovered by evidence-based outcomes; discuss how to chart presentation will review interagency roles and of Google’s efforts to combat child exploitation, Gilbert” from a press release. The presenters will agents on the dark web, as “Tutu Girls.” This progress from session to session and over longer cases by discussing the following: Outgoing including content reporting, product safety, legal discuss their investigation of this multi-victim/ was a “reverse” type of investigation which led periods of time and suggest uses for these data abductions, such as NCIC entries on reported

46 47

DCAC-16-019 DCAC Conference Program_07mg.indd 46-47 7/29/16 11:52 AM Interviewing the Reluctant Child which systems have neglected the psychological Juan and Bobby Moreno: discuss the coordination with numerous agencies Kik Law Enforcement Operations Legal Resources For Missing, Rita Farrell needs of non-offending parents; discuss myths The Traffickers Around the Corner including those in the United States and foreign Michelle Micks, Nicole Nearing Trafficked or Sexually Exploited This workshop offers concrete guidance for and controversies which complicate the non- Kirsta Leeburg Melton countries. The presenter will discuss deportation This presentation will provide an overview of Kik’s Children Cases forensic interviewers or investigators called on offending parent’s ability to be supportive; review This presentation presents the case that almost rather than extradition, evidence collection in a processes and resources for law enforcement Peggy Klein, Yiota Souras to interview a child who is reluctant or fearful of the needs of non-offending parents; discuss wasn’t. If not for the persistence of a probation foreign country and additional charges in the in criminal investigations. The Law Enforcement Cases involving missing, abducted, sexually making a disclosure. The presenter will discuss ideas for engagement of parents and share officer, two brutal traffickers who kidnapped, Western District of Missouri that led to a 120- Operations team will discuss how Kik works, new exploited, and trafficked children are often different blocks and challenges that may come findings from qualitative research with non- tied down, drugged, raped and sold a 13 year-old year sentence of Stokes who admitted to sexually product features, data that may be available legally and factually complex and can span up and students will review forensic interview offending parents at follow-up. girl for weeks, might never have been brought abusing children for almost 60 years. pursuant to legal process, and provide an update multiple jurisdictions, including domestic and video clips and discuss. Workshop to justice. The presentation will outline the Case Study on the team’s initiatives to keep teens safe on Kik. international jurisdictions. As the nation’s Workshop challenges surmounted to obtain an investigation, Workshop clearinghouse on missing and sexually exploited It’s All in the Investigation the handicaps that accompany a 10 month-old Kidnapping, Rape, and Murder: children issues, NCMEC provides assistance to Interviewing Victims of Sextortion Brandie Wade, Pamela Womack crime scene, a lack of forensic evidence, key Zachary Holly Case Study Knock and Talks: Maximum Results law enforcement, prosecutors, social services, Catherine Connell This workshop will focus on the steps needed witnesses with significant criminal history, and Stephanie Morris with Minimum Manpower and other professionals on cases involving crimes Sextortion refers to the broad category of to not only to secure a conviction, but sustain the complications that come with trying a “first” This case study will explore the investigation Michael Johnson, John Pirics against children. This presentation discusses sexual exploitation in which abuse of power a conviction. Brady evidence, discovery issues of anything in your region. The case study will and prosecution of Zachary Holly, who took a This workshop will draw from several years of NCMEC’s legal resources from the moment a is the means of coercion and can be coupled and how they affect all members of the MDT, empower participants to tackle human trafficking six year-old girl from her bed in the middle of the experience in child exploitation investigations missing child is reported or a sexual exploitation with the threatened release of sexual images or not just the prosecutors, will be discussed. This cases that rely on witnesses that in typical child night. Holly lived next door and his wife provided that have been initiated by consensual contact report is intaked until the missing/exploited child information. Because the method of coercion is presentation is for any multidisciplinary team abuse cases might be considered unreliable or child care for the young girl. He took the girl to (knock and talks). The presenters will provide is located, identified, recovered, and provided usually non-physical these cases are sometimes member to help gain an understanding of why unpresentable in court. Learn how presenters an abandoned house then raped her before successful techniques to gain and maintain with victim services, including family support thought of as less egregious than cases with prosecutors ask for everything in your file and embraced their case and witness weaknesses, strangling her with her pajama pants. He then consent, tips on maximizing the interview, and restitution. Topics include domestic and hands on offenses. This block of instruction the serious consequences of failing to disclose built a charging, jury selection and trial strategy joined in on the search for her the next morning. methods for triaging knock and talk targets, international family abductions, overcoming will focus on the dynamics of sextortion, the information to the defense, even accidentally. around them, ultimately convincing two juries to This presentation will take a look at the work of and overall strategies for the different types of Fourth Amendment challenges, potential liability victims, the forensic interview and special case Workshop bring justice to the traffickers around the corner. the Child Abduction Response Team, handling situations and individuals that are encountered. of online advertising companies in child sex considerations when a large number of victims Case Study the media response to the number one trending This information will be blended with examples trafficking cases, restitution in child pornography are involved. It’s Coming From Inside the House: story on Yahoo! on Thanksgiving Day 2012, from cases that the presenters have worked cases, and legislative technical assistance. Workshop Sextortion Within the Family Keeping Children Safe: Education and navigating the invocation of the right to counsel, together, many of which have resulted in child Workshop Lisa Fletcher, Alix Skelton Prevention Series supporting the victims family, and preparing rescues and significant sentences. Investigating and Prosecuting Abusive This case study discusses how an investigation Char Rivette, Julia Strehlow for a death penalty trial from the beginning of Workshop Live RAM Analysis: Head Trauma into the sexual abuse of a 14-year old by her It is well-known that sexual abuse and the investigation. From Acquisition to Reporting Nancy Cochrane father uncovered a twisted scheme he had misconduct can occur in child-centered Case Study Lead or Lead Not, There is No Try Yuri Gubanov Abusive head trauma cases are among the concocted to groom her for this abuse which activities and youth programs. In 2015, Chicago Dan Powers A lot of essential evidence is often discarded most challenging cases for investigators and was as heinous and exploitative as the hands- Children’s Advocacy Center and Chicago Park Kids in Court Do you want to be known as the Yoda or with a single pull of a plug. The computer’s prosecutors. This workshop will focus on on abuse itself. The elaborate plan included the District collaborated to impact the safety of Judy Hoffman, Eren Price Darth to your organization? Would you like to volatile memory (RAM) contains valuable tips for investigating these cases, focus on creation a false persona to pose as an online over 200,000 children through the “Keeping For over 20 years, the Dallas County District convey wisdom or deliver fear as part of your evidence that may be lost momentarily with understanding the medical science behind the boyfriend, an imaginary mother, sextortion, and Children Safe” Prevention Education Program. Attorney’s Office has collaborated with leadership style? You cannot deny that Darth improper acquisition. The computer’s RAM diagnosis to determine the whodunit, and work even a fake suicide. The presenters will discuss Through both in-person and online training, community volunteers from the National Council Vader’s leadership style gets results, but Force may contain recent chats and conversations, with both lay and expert witnesses to put forth the conversion of a state prosecution into a and administrative consultation, “Keeping of Jewish Women to make testifying in court choking may not be the best way to lead your InPrivate browsing sessions, cached the best case possible. federal prosecution and the benefits of doing Children Safe” addresses risk factors for sexual a little less scary for children by hosting Kids team. As leaders in “our world” we are faced passwords and decryption keys that unlock Workshop so, the investigative steps taken at each level, abuse on both an individual and organizational in Court, a Saturday session at the courthouse with challenge of needing to influence many access to otherwise unbreakable encrypted and federal prosecutorial strategies. level. This workshop will provide participants for kids and families. This presentation, by a different types of people. The team looks to disk volumes. This workshop will discuss Is He Faking it? Confronting Your Case Study with knowledge about primary sexual abuse prosecutor and a community volunteer, will you to lead with knowledge, compassion and the following: proper acquisition of a running Defendant’s Mental Health Issues prevention and Chicago CAC’s “Keeping Children include suggestions on starting your own empathy. You have a choice, use the force or PC; volatile memory capturing techniques on Kendall McKimmey, Lee Pierson It’s Never Really Over: Post-Conviction Safe” series, tools and materials to add to a program and lessons learned from 20 years go to the dark side. unlocked, locked and sleeping computers; This session will address a defendant’s mental Issues in Child Abuse Cases prevention tool box, and an understanding of of experience. Workshop dealing with latest developments in Microsoft, health issues from the beginning, middle and Laura Coats, Patricia Noble, how to take this information back to your child Workshop Apple and *nix operating systems that prevent DESCRIPTIONS the end of trial. We will cover common mental Christine Womble advocacy center and help make prevention memory dumping; tools used for capturing WORKSHOP illness diagnoses and how they impact a criminal The case does not end when judgment is routine in youth-serving organizations in case. We will discuss the competency, insanity entered. Months, years, and even decades communities across the country. later, defendants challenge their convictions, and the potential impact of a mental health Workshop diagnosis on your proceedings. alleging countless violations of the law and/or Workshop their constitutional rights. While some claims Kenneth Stokes: Web Master and SAVE THE DATE AUGUST 7–10, 2017 WORKSHOP WORKSHOP have merit, most do not. This workshop will Child Molester DESCRIPTIONS It’s a Crisis for Me Too! Helping Non- present an overview of the post-conviction James Holdman Offending Parents in Child Sexual process, including direct appeal and habeas. The This case study details the investigation of 9th Annual Abuse and Learning from Them presenters will address claims commonly raised Kenneth Stokes, a registered sex offender living Deena Ott, Jeff Wherry in child abuse cases (indictment considerations, in the Philippines, producing and distributing This session will focus on the significant role of actual innocence, prosecutorial misconduct, large amounts of child porn all over the world and non-offending parents in the recovery of sexually ineffective assistance of counsel) and discuss sexually abusing children daily. The investigation abused children. Myths and controversies in the issues that law enforcement and prosecutors details the presenter’s initial contact with Stokes field which complicate the response of parents should be aware of when charging an offense through a Craigslist ad and chats that set the will be discussed, as well as the needs of non- and preparing a case for trial. hook on an evil monster. What followed was offending parents. Also, lessons learned from Workshop distribution of child porn to Missouri and a six- follow-up with parents will be shared. The month online conversation that led to Stokes presentation will do the following: review the inviting the presenter in an undercover capacity SM importance of social support in the recovery of to his chain link barb wire fenced compound on sexually abused children; examine the ways in Cebu Island, Philippines. The case study will 48 49

DCAC-16-019 DCAC Conference Program_07mg.indd 48-49 7/29/16 11:52 AM memory dumps: kernel-mode operation is your investigation. This is an exhibitor workshop and distrust which can derail high profile cases. what really matters is the amount of supported across the country and sometimes internationally. truthfulness. Participants will learn to assess essential;dealing with acquisition footprint; by AccessData exhibiting on the 2nd floor. When partnerships aren’t working, members of applications. Beyond all doubt, all the vital Discussions of protocols and venues for these verbal and non-verbal behavior and become analyzing acquired memory dump: types of Exhibitor Workshop the media can revictimize the families and law evidence is stored in apps: contacts, group and options will be presented using case examples more effective at educing information and evidence to be found; tools and techniques to enforcement officers working to resolve these private chats, plans, geo coordinates, cache and as well as the presenters experience. obtaining admissions. Using a structured non- be used and other related issues. Maximizing Forensic Tools for high pressure cases. This session will feature much more. But it is not enough to parse apps Workshop confrontational approach, an investigator is often Workshop Reliable and Efficient Review in Child interviews with families of the missing about databases: in many cases you need to decrypt able to obtain a confession without the suspect Exploitation Investigations best case and worst case media experiences in and retrieve securely stored data in apps, like (The) National Protocol for ever making a denial or protesting his innocence. Live Streaming and Child Sex Tourism: Robert Basanez, Christopher their loved one’s case and how law enforcement Whatsapp, Snapchat, Telegram, etc. Moreover, Sexual Abuse Medical Forensic In addition, the resulting confession often includes Dark Desires Become Reality Thompson contributed positively and negatively to their the situation with apps is constantly changing: Examinations: Pediatric information not revealed during the investigation. Anoup de Weever, Jess Donkers This presentation will discuss tools, techniques, media experiences. Strategies and resources popular apps are updated almost every week and Diane Daiber Workshop This presentation will provide an insight into the and tips for Investigators to conduct on-scene to help build positive media relationships will forensic software manufacturers have to catch This workshop will discuss the Pediatric world of transnational child sex offenses/child triaging and/or in-lab computer forensics in be shared. up with it adding support for newer versions. A Protocol that is designed to provide guidance Normal to be Normal: sex tourism and livestream webcam sex. It will child exploitation investigations. Incorporating Workshop variety of supported applications also matters: to health care providers and multidisciplinary An Absence of Findings Does Not explain the various ways in which transnational osTriage, Internet Evidence Finder (IEF), Forensic criminals prefer to choose unknown apps to teams responding to child victims of sexual Mean the Absence of Abuse child sex offenders are able to sexually abuse Toolkit (FTK), and Griffeye (NetClean) Analyze to Medical Child Abuse communicate. This is why support for popular assault to fulfill the medical forensic healthcare Justin Fitzsimmons, Mark Hudson minors abroad – from the situational to the perform the most reliable and efficient evidence Suzanne Dakil apps is not enough. This is an exhibitor workshop needs of the children following sexual abuse. A child abuse pediatrician will describe the preferential offender and the “well doer.” But review possible. This presentation will focus on the signs/ by Oxygen Forensics exhibiting on the 2nd floor. The presentation: 1.) review the necessity medical evaluation for a child suspected of there’s also the world of virtual travel: livestream Workshop symptoms and diagnosis of medical child abuse Exhibitor Workshop for a Pediatric Protocol; 2.) discuss the use having been sexually abused with emphasis webcam sex. The presentation will detail this (formerly known as Munchausen Syndrome by of medical and multidisciplinary child sexual on why physical and laboratory findings are emerging trend where a paying customer Maximizing Narrative Practice Skills Proxy). Participants will learn of famous cases (A) Multidiscipline Approach to abuse experts to shape the evidence-based often absent. A prosecutor will also describe can order custom made sexual abuse and in the Detail Gathering Phase of a that were successfully identified and prosecuted Medical Child Abuse (Part 1 & 2) practice recommendations found in the Pediatric strategies and techniques for court preparation torture of children for his own pleasure; a way Forensic Interview as well as the many difficulties in the diagnosis. Allison Jackson, Lynsey Nix, Protocol; 3.) illustrate the components of the when a case of suspected child sexual abuse for pedophiles to bring their darkest desires Ada McCloud Workshop Michael Weber Pediatric Protocol, including supplemental with a “normal” exam is being presented for civil to life. From an operational perspective the An interviewer’s job—to listen to a child—is Medical Child Abuse is a form of physical material useful to the practicing clinician; and hearing or criminal trial. Resources and literature presenters will discuss issues of probable cause, achieved through the implementation of narrative Microsoft Cybertips and Legal and emotional abuse that can include the 4.) outline the recommendations in the Pediatric references will be provided for the attendees. evidence gathering and the need for international seeking questions. For years forensic interviewer Requests exaggeration, fabrication, and/or induction Protocol with regard to the clinician caring for Workshop cooperation, illustrated by two case examples. training programs have emphasized event Tracy Ingle, Sully Sullivan of symptoms, resulting in excessive and child sexual abuse victim. All members of an Workshop narrative practice in rapport and stressed that This presentation will be a high level view of unnecessary, harmful, or potentially harmful MDT will benefit from attending this presentation. NOT JUST PICTURES (Part 1 & 2) the same skillful narrative seeking questions Microsoft products and services, connectivity medical care. Different from Factitious Disorder Workshop Sharon Cooper, Tink Palmer Living With the Memories be used in the detail gathering phase of to the OneDrive and SKYPE, as well as by Proxy, Medical Child Abuse focuses on the NOT JUST PICTURES is a documentary which Jim Tanner interviews. However, there is often a tendency for understanding PhotoDNA, and how Microsoft condition of the child, as opposed to the mental New Generation Methodologies and provides a voice to the silenced children and People working crimes against children see interviewers to prematurely use “wh” questions, reports detected hashes to NCMEC. We will also health condition of the caregiver. Perpetrators Tools for Beating Digital Investigation families when abusive images have been and hear many things they would rather not. more direct questions, and/or anatomical tools go over what Microsoft can offer in regards to of medical child abuse are often sympathetic, Case Backlog produced, at times distributed, and often remain These memories can have a disturbing effect in order to clarify what they have heard and legal requests about our services, and products. engaging, and manipulative, making it difficult Michael Staggs in circulation via information and communication on professionals and their families. Based on fill in the gaps before the child finishes her/ Workshop to identify these vulnerable victims. Participants Digital forensic investigation teams are drowning technology (ICT). From the USPIS case of abusive his 46 years’ experience working in criminal his narrative. This session will focus on how can expect to learn warning signs and ways in case backlogs as the number of investigations films before the Internet, which tragically resulted justice, Dr. Tanner explains what’s behind the to gather complete narrative accounts from Mike Pyro: to identify a case of medical child abuse, as with a digital evidence component continue to in a triple suicide in one family to the present secondary trauma of working these cases and children before seeking clarification through Sextortion and New Technologies well as medical diagnoses and required grow, coupled with the ever-increasing size of day, when families and survivors continue to provides simple but effective steps we can take questions or interview tools. It will also review Paul Wolpert, Elizabeth Yusi follow-up care. The presenters will explain data repositories and number of devices. As a remain wary of ongoing interest noted in victim to help us live with these stories and images the “whys” of narrative practice in rapport and This case study will detail the investigation investigative strategies that have resulted in result, important leads are not identified in a cyberstalking of what were thought to be closed once we have seen and heard them. You owe it the various question types. of “Mike Pyro” aka Robert Scott Jr. and his criminal prosecutions and convictions, as well timely manner, leaving offenders free to victimize cases, participants will learn of the difficulties to yourself and your family to attend this session. Workshop scheme to persuade five different women to as successful adjudications in family court. others as investigations languish. Come learn in forensic intervewing when images exist, the Workshop produce child pornography with seven different Strategies for addressing the children’s medical how Nuix's next generation methodologies and role that images play in sex trafficking and more Maximizing Your Investigative children between one and five years old for and emotional needs after removal from their portfolio of tools will help forensic examiners recently sexual assault, and how families cope Locked, Encrypted, or Unavailable.... Database Capabilities the promise of money. The presenters will caregivers will also be discussed. The presenters clear up digital evidence case backlogs by years later, even when there are infant victims. DESCRIPTIONS Now What? Zach Artz, Richard Spradley cover the investigation of Scott and detail how will use real experiences to provide guidance streamlining continuous case processing, data This documentary is segmented to be used for WORKSHOP Kevin DeLong In the fast paced onslaught of data available in they were able to connect him to the activity in identifying, investigating, and prosecuting reduction and culling, forensic practitioner review, training regarding specific types of exploitation, Getting information from today’s devices is the investigative process one must view it from since the entire scheme was conducted over allegations of medical child abuse, and highlight and case agent review. Take advantage of the to assist agencies’ responses to community challenging and manufacturers have only made two perspectives - Historical and real time. In a cell phone using free texting applications or some challenges one may face when tackling solutions available today to automate as much sentinal events, suicide prevention and to assist this more difficult with new forms of encryption working a cold case, historical data suffices, “apps.” The presenters will cover the prosecution these complex cases. of the process as possible and only review the in understanding victim impact. and device locks. Narrowing down what you are but if it is a recently opened case then having strategies as the defendants were located over Workshop data that is most likely to yield relevant results. Workshop WORKSHOP WORKSHOP looking for and then exploring the different ways the most current up-to-the-minute information the course of several months, and lessons This is an exhibitor workshop by Nuix exhibiting DESCRIPTIONS it can be stored is critical to digital investigations. is a must. In this session you will learn how to learned as this investigation involved the use Multi-Victim Cases: on the 2nd floor. Now You See: This session will show anyone who deals with maximize the use of investigative databases and of new technologies to communicate online Identification, Notification and Exhibitor Workshop A Celebration of Courageous Kids chat data, email, app data, location information, learn the intricacies of the data industry in order without the use of any computers. Attendees Interviewing All In One Elizabeth Keeley, Jaquelyn Lamont or social media, alternative ways to collect the to help keep you ahead of the game. are guaranteed to walk away in disbelief after Ale Levi (A) Non-Confrontational Approach to In 2012, 15-year old “Sara” became the first data by thinking “outside the device” and by Exhibitor Workshop listening to and viewing this presentation. More and more common is the case where your Interviewing and Interrogating Child young survivor photographed for the Now You using advanced extraction methods. Once the Case Study suspect/target is enticing minors to self-produce Abuse Suspects See (NYS) project. She had been preparing to data/information is acquired, now what? This Media as a Partner: High Profile Cases pictures of themselves, producing images/videos Thomas McGreal testify at trial and decided to write words of session will also show that centralizing the Alison Feigh Mobile Forensics: of them without their knowledge, using sextortion This presentation will teach and reinforce the encouragement to other kids who might be information for analysis is critical in creating Media partners can be some of our greatest Modern Ways of Communication, methods or baiting them in with a false identity. fundamentals of the Wicklander-Zulawski Non- suffering from abuse. Since that day, over 130 the complete picture and understanding what allies in the search for missing children. When Hidden and Deleted Data In this workshop the presenter will discuss Confrontational Interview and Interrogation children, teens, family and caregivers have joined occurred. From deep dives to surface analysis, partnerships are working, the media can be a Lee Reiber different options on how and when to identify Method. Instruction, specific to child abuse NYS which displays their courageous eyes and understanding and presenting the data is key in powerful tool to help find the missing and provide Several years ago, forensic software and notify victims and the use of the forensic investigations, will include proven techniques words of strength. The project also now sponsors powerful and effective prevention messages. manufacturers prided themselves on the amount interview to make an all in one phase of the to overcome resistance, offer rationalizations, the Now You See Bravery Awards at which the Sadly, some reporters also contribute to the fear of device profiles they supported. Nowadays investigation, especially when you have victims all handle denials, detect deception and evaluate kids and their teams of professionals reunite

50 51

DCAC-16-019 DCAC Conference Program_07mg.indd 50-51 7/29/16 11:52 AM to celebrate the courage it takes to survive and OffenderWatch Demo Lab: OffenderWatch Demo Lab: Wymer and two female co-conspirators. This about appropriate referrals, assessments, and and psychographic traits. By understanding disclose abuse and then continue on with the Mobile/Express US Marshal Overview (A session for presentation will detail how community outreach treatment components specific to PCIT. these traits the center is able to partner with criminal justice system. Take this workshop to Scott Freeman USMS users only) and the heads up actions of a 6th grade student Workshop community resources to appropriately target learn about several of the kids and cases involved A demonstration of the new version of Dan O’Donnell led to the investigation, trial, and sentencing the at risk groups. in NYS and to be inspired by the resilience a OffenderWatch Mobile and answering questions A session for USMS users only. This session of Jason Wymer and his co-conspirators in a Play Therapy with a Trauma Workshop child displays when supported by family and on how various agencies are using Mobile and will be presented in the Offender Watch case that showcases the importance of good Focused Lens staff. This workshop will also challenge you to Express. This session will be presented in the Demonstration Lab and Lounge. task force partnerships, good partnerships with Leslie Boutte, Kathy DuMond Predictive Policing Analytics as think about how you and your colleagues can Offender Watch Demonstration Lab and Lounge. Sponsor Workshop the community, and efficacy of the polygraph In this interactive workshop, the presenters will Applied to Sex Offender Management: celebrate bravery in your agency or area. Sponsor Workshop in investigating child pornography. teach the therapy rationale behind both TF-CBT A Case Study Workshop Open and Connected: Case Study and Play Therapy. The attendees will learn how Adam Kirhagis, Jay Lathwell OffenderWatch Demo Lab: Facebook’s Approach to Resilience for to integrate its components into play therapy This workshop will review a pilot project OffenderWatch Demo Lab: OffenderWatch Q&A Child Safety Roles Operation Round Table (Part 1 & 2) while maintaining fidelity to the TF-CBT model. performed by OffenderWatch, ROMI Analytics Advanced Data Collection and John Strain Maggie Cook Lisa Maher, Matt Wright Presenters will demonstrate specific techniques and the Baltimore Police Department. The Crisis Management An open session to answer any questions you Facebook has a global team exposed to Operation Round Table is a case study involving and activities that clinicians can use in the play presenters will review the methodology of the Joe Gauthier have on OffenderWatch. This session will be potentially traumatic content while engaged the investigation of an enterprise dedicated to therapy room. model and how the model is being used by A discussion of setting best practices on data presented in the Offender Watch Demonstration in the mission of protecting minors. A popular the production, distribution and advertisement Workshop the Baltimore Police Department to develop a collection for your agency or state and then Lab and Lounge. phrase at Facebook is, “nothing at Facebook of child pornography. The presentation will strategic plan for sex offender resource allocation. using that information for crisis management. Sponsor Workshop is someone else’s problem.” Their philosophy cover case overview, investigative techniques, Power of Prevention A key part of this plan includes enhanced This session will be presented in the Offender towards the mental health of employees who forensics analysis/artifacts, prosecution Cynthia Colin enforcement and deployment strategies based Watch Demonstration Lab and Lounge. OffenderWatch Demo Lab: work on child safety embodies this phrase. Over strategies, and lessons learned. In June 2013, Ever wanted to stop crime before it happens? on the predictive policing algorithm. This class Sponsor Workshop OffenderWatch Mobile and the last six years, they’ve worked to compile Homeland Security Investigations New Orleans You can! Learn about the power of prevention by is recommended for supervisors, investigators. OffenderWatch Express resources and tools to create an environment and the U.S. Postal Inspection Service arrested attending this session. NCMEC has developed SOR registration personnel, prosecutors, OffenderWatch Demo Lab: Scott Freeman where employees who have consistent exposure the creator and administrator of a TOR child prevention resources including publications (law probation and parole staff. Booking Alerts/Active Contact Scott Freeman will be demonstrating the new to child safety issues are able to thrive at and pornography website. The creator/administrator enforcement manuals and tips sheets) to help Workshop Scott Freeman version of OffenderWatch Mobile and answering outside of work. Come learn the ins and outs used a “bait video” designed to entice minor children, families and communities not only to An overview of Booking Alerts and Active contact questions on how various agencies are using of what hasn’t worked and what has, including male victims into producing child pornography be prepared, but to be proactive. Additionally, Preparing MDT Professionals to including a discussion of how agencies are Mobile and Express. This session will be resources, trainings, environmental factors, and videos using webcams and distributed the NCMEC offers two free prevention programs, Testify in Court putting these two tools to work. This session presented in the Offender Watch Demonstration a program Facebook has developed internally videos to members of his enterprise using his NetSmartz Workshop and KidSmartz, which can Mary Sawicki will be presented in the Offender Watch Lab and Lounge. create a culture of resilience. websites and other online methods. As a result be used in communities nationwide. NetSmartz This workshop will focus on tips for MDT Demonstration Lab and Lounge. Sponsor Workshop Workshop of the investigation, eleven individuals were addresses online issues including cyberbullying professionals when they are called to testify Sponsor Workshop indicted in the Eastern District of Louisiana for and sexting for children ages 5–17. This offers in court. There will be a discussion on how to OffenderWatch Demo Lab: Open, Connected and Safe: their participation in the enterprise; others were many easy-to-use resources, like customizable properly review relevant materials and prepare OffenderWatch Demo Lab: OffenderWatch Training Facebook’s Approach to Child Safety arrested and charged worldwide. More than presentations and interactive videos. KidSmartz, for your pre-trial meeting with the attorney that Community Notifications Integrated Joel Shoultz Antigone Davis 1478 unique leads were distributed and 300 designed for children ages 5–10, replaces the will be conducting your examination in court. with Your Social Media An overview on OffenderWatch. Training topics This presentation will provide an overview of child victims were identified and/or rescued as old “stranger danger” concept with a broader In addition, there will be a focus on how to be John Strain include best practices for initial registration Facebook’s efforts to combat child exploitation a result of the investigation. perspective on personal safety. KidSmartz also sufficiently detailed in your testimony and how A discussion of how OffenderWatch can help verifications/re-registrations, running including information of its content policies, tools Case Study offers a wide variety of resources, including to withstand a vigorous cross examination. Use increase your citizen awareness through email, investigative searches. This session will be to safeguard and report, and resources, as well animated videos and a presentation. of specific examples in both criminal and civil seasonal campaigns, and Facebook. This presented in the Offender Watch Demonstration as its cross-industry initiatives, efforts to disrupt (An) Overview of Children with Workshop proceedings will be utilized to further understand session will be presented in the Offender Watch Lab and Lounge. access to contraband images, and global multi- Problematic Sexual Behavior what is entailed when you testify in court. Demonstration Lab and Lounge. Sponsor Workshop stakeholder work. Stacey Lewis, Jimmy Widdifield (The) Power of Proactive Workshop Sponsor Workshop Workshop Children with problematic sexual behavior are a Caregiver Engagement OffenderWatch Demo Lab: heterogeneous group. Designed for professionals Katrina Cook, Mindy Jackson Presenting Evidence in Victim/ OffenderWatch Demo Lab: Process Management and Opening Statements and from a variety of disciplines (social work, law The goal of this workshop will be to discuss how Witness Interviews (Part 1 & 2)

Interfaces to OffenderWatch Supervision Standards Closing Arguments enforcement, juvenile justice, mental health), agencies and staff can respond to and support Crystal Gregory, Kim Penna DESCRIPTIONS Joe Gauthier Joe Gauthier Victor Vieth this presentation will provide research-based families in an effort to engage families and Homeland Security Investigations’ “Prepare WORKSHOP Q&A session to talk about various types of An overview of our Quality Management Process, In this workshop students will learn of the information on children with problematic sexual improve outcomes. Despite various barriers that and Predict Method,” developed by HSI interfaces available to OffenderWatch. This how we run assessments on agencies and a importance of effective strategies and themes behavior and strategies to promote provision of impede caregivers’ ability to initiate engagement Forensic Interview Specialists, addresses the session will be presented in the Offender Watch handout for key things every agency should for opening statements and closing arguments comprehensive services to these children, child on their own, agencies and staff can take steps ever-evolving exploitation cases that are being Demonstration Lab and Lounge. monitor. This session will be presented in the in child abuse cases. Students will learn a theme victims, and their families in a way that preserves to enhance engagement. Service areas to be investigated by HSI and other law enforcement Sponsor Workshop Offender Watch Demonstration Lab and Lounge. for presenting their case. They will learn specific the family and promotes effective healing. discussed include general advocacy, screening/ agencies. While maintaining the basic principles WORKSHOP WORKSHOP Sponsor Workshop arguments to persuade a jury that a child is telling Workshop assessment, crisis management, therapy, and of a legally-defensible forensic interview, the DESCRIPTIONS OffenderWatch Demo Lab: the truth. They will learn to debunk common long-term case management. method stems from experience, research-based Investigative Searches and OffenderWatch Demo Lab: defenses in child abuse cases. PCIT vs. Parenting Classes: Workshop protocols and lessons learned. This presentation Collaborating with the US Marshals State Implementations of Workshop Changing How Caregivers Parent will provide information for those individuals who within OffenderWatch OffenderWatch Katrina Cook Precision Prevention interview victims/witnesses in child exploitation Joel Shoultz Lionel Hanley Operation Misdial: In this workshop evidence regarding the Dyann Daley investigations and discuss how the evidence An overview of how to run various types of A 30-minute discussion of key factors a state How a 6th Grader Caught a Predator effectiveness of various parent programs This presentation will discuss risk terrain can be utilized in both the investigative process searches within OffenderWatch and collaborating needs to consider when looking to change their Quirina Orozco, Scott Schofield will be provided. An argument for the use of modeling, a criminology risk analysis program, as well as for the prosecution. The presenters with the US Marshals from within OffenderWatch. state sex offender management tool. The session What began as an Internet Safety presentation Parent-Child Interaction Therapy (PCIT) with which The Center for the Prevention of Child will use a combination of methodology and This session will be presented in the Offender will then break out to answer your state specific to a class of 6th graders led to an investigation children and caregivers will be presented. PCIT Maltreatment is using to predict specific case examples. Watch Demonstration Lab and Lounge. questions. This session will be presented in the that ultimately involved almost every aspect of is an evidence-based practice that involves areas where child maltreatment will occur by Workshop Sponsor Workshop Offender Watch Demonstration Lab and Lounge. child pornography investigation. A misdialed positive parenting skill development and live geographically layering risk factors. Through Sponsor Workshop text message led to weeks of undercover chats, coaching of caregivers practicing skills with the use of consumer analytics, profiles are able State and Federal search warrants, a polygraph their children. The audience will gain information to be created for those within the determined examination, and the ultimate arrest of Jason risk areas based on common behavioral

52 53

DCAC-16-019 DCAC Conference Program_07mg.indd 52-53 7/29/16 11:52 AM Processing Child Exploitation Cases and how the courts are still dealing with the Reading Between The Lines in A Response Plan (CARP), offender characteristics, The presentation will cover the life of the mother continue to be notified of the presence of the Jeff Nash issue of the Confrontation Clause today. Compelling Prostitution Case victimology, and best practices. The instructors and suspect before the birth, what occurred the sexually explicit images in cyberspace. Processing child exploitation cases is Workshop Michael McMurray, Hilary Wright will also discuss the multitude of resources the day of her birth, and the subsequent investigation Workshop complicated, time consuming and stressful. This case study will take you through the FBI can provide to assist in the investigation of both the mother’s sexual abuse and the A typical case of one million files could easily Protecting Our Children: prosecution of Pierre McDaniel, a pimp who of these cases. baby’s death. The discussion will include the Sexually Violent Predators: consume 6 months of work, but using the Empowerment vs. Expectations A sold the dream of love to a teen mom. The Workshop problems encountered during the investigation Texas and Beyond techniques described in this session, the job Revolution in Children’s Safety presenters will show how the one-party consent as well as the mistakes that were made along Erin Faseler can be completed in less than a week. This Stephen Daley call between the victim and the defendant was Screening and Treatment of Sexually the way. Lastly the presenters will share their Approximately 20 states and the federal presentation will show how these cases can be Is prevention or protection part of your mission? presented to the jury. They will discuss how Abused Children Using Evidence- respective perspectives on the case and the government have enacted Sexually Violent processed for court presentation most efficiently Are you tired of responding after the crime? using the expertise of a veteran detective helped Based Approaches legal proceedings following the investigation. Predator laws. This workshop will discuss and with significantly reduced stress. Topics If you could be more proactive (fight back) in the jurors read between the lines to determine Jeff Wherry, Karina Samaniego Case Study the development of the civil commitment covered will include: carving image, video addition to responding and recovery, would the meaning behind the defendant’s careful This workshop will present a transactional model process, as well as a brief synopsis of sexually and text files from case evidence, efficiently you? If you answered “YES” to any of these statements. This presentation will cover the topic for understanding the impact of sexual abuse and Sexual Abuse in Sports (Part 1 & 2) violent predator laws across the country. This categorizing files, extracting and matching questions, attend this workshop, because, of having a law enforcement officer with years of placement on children in the foster care system. Joe Sullivan presentation will further discuss the procedures faces found in the case, analyzing files to find “Together, We Can!” We will share an evidence- experience in domestic human trafficking cases Differential diagnosis and misdiagnosis will be Sheldon Kennedy is an NHL star who shocked for civil commitment, building a case for civil relationships within the case evidence and to based methodology and a revolutionary formula testify for the first time as an expert. addressed utilizing research and clinical findings. the sport of ice hockey when he revealed he commitment, legal challenges currently facing other cases, and preparing for court presentation. (P+C+S=PE) that is working today, in prevention Case Study Evidence-based screening and assessment will had been sexually molested as a child by his sexually violent predator laws, and issues that This is an exhibitor workshop by Bluebear LES and as a therapeutic response to predatory be discussed with protocols offered as examples. coach. Sheldon has since dedicated his life to commonly arise when trying these cases. exhibiting on the 2nd floor. victimization. This presentation will detail an Recognizing and Reporting Evidenced-based treatments will be reviewed challenging organizations and institutions to Workshop Exhibitor Workshop education not based on expectations, but Child Abuse with special emphasis on designing treatments better protect children. He will speak about instead providing personal skill development Luís Acuña-Pilgrim in response to assessment findings. Implications his experiences and the lessons which need to Shahid Muslim aka “Sharp”: Prosecuting Child Abuse Cases with and opportunity for our children to be safer in This presentation is designed for those seeking for systems reform and program evaluation will be learned about protecting children in sports. Investigating a Violent Child Limited Evidence this world today. Don’t all children deserve the training for professionals working with children on be discussed. Joe Sullivan is a forensic psychologist who Sex Trafficker Mary Sawicki “opportunity” to live safer in our world today? a regular basis. The Recognizing and Reporting Workshop evaluates adults accused of sexually abusing and Kimlani Ford, Kelly Harrison This workshop will discuss strategies and Attend this workshop and learn how to make Child Abuse session educates child-serving exploitation children. He will profile the man who Shahid Hassan Muslim, aka “Sharp,” was a suggestions for prosecuting cases with limited that happen. professionals on the basic issues of child abuse, Seeking Serenity abused Sheldon and illustrate how perpetrators pimp who operated a prostitution ring in North evidence. Tips for bolstering the strength of Workshop how to recognize physical and behavioral signs Crystal Levonius manipulate organizations and institutions to Carolina, South Carolina, Georgia, and Florida the case in the investigative stage, child trial of the varying forms of child abuse, and how to Sometimes it is a struggle not to allow your work facilitate the sexual abuse of children. Whether involving at least 12 minor girls and young women. preparation stage and at trial will be stressed. Providing Therapeutic Support for make a report. The presenter will discuss the to affect your body, your mind, your home, your you are involved in sports as a coach a volunteer Muslim preyed on vulnerable minors and young Maximizing the effectiveness of search warrants Victims of Female Perpetrators realities of child abuse detailing the prevalence of marriage, and your children. It can be a struggle or a parent of a child you need to face some of women and recruited them to work as prostitutes, and witness interviews will be discussed. Use of Julie Brand abuse in all communities, who perpetrators are, to protect yourself and your family from the reality the uncomfortable truths this presentation will promising them a “family” they did not have. expert witnesses in cases with limited evidence Victims of female-perpetrated sexual abuse face and how they gain access to children through of the world as we know it. In this presentation, reveal. During the conference, a documentary He used advertising on Backpage.com almost will be highlighted. unique gender-based challenges throughout a process called grooming. The presentation a prosecutor will discuss the personal impact titled Swift Current which details Sheldon’s story exclusively to find clients and imposed strict rules Workshop their recovery. From The Adverse Childhood will cover best practices for responding to a that child abuse cases can take on a person and will be screened. and enforced those rules with psychological Experiences (ACE) Study, we learned that for disclosure of abuse, what conversations should – the best practices we can use to minimize any Workshop torment and brutal beatings. Investigators Prosecution of a Multi-Generational the 16% of males who reported being sexually and shouldn’t – take place, the role of children’s negative affects brought on by this job. used unique strategies to build evidence that Child Sexual Abuse Case: Ten Years in abused, nearly 40% of the time their abusers advocacy centers, and more. Workshop Sexual Abuse Prosecution 101 included cooperation from Backpage.com that the Making were female. Of the 25% of women who Workshop Melinda Westmoreland had never been done before or since. Even after Sasha Joseph Neulinger, George Ohrin reported sexual abuse, only 6% of the time Self-Care: This presentation will focus on the basics of his arrest and incarceration, Muslim still imposed Sasha was abused over a four-year period by their perpetrators were female. Most of these Reporting Children Missing from Care Help Yourself So You Can Help Others child sexual abuse prosecution. This will include his will on his victims and attempted to obstruct two uncles and one male cousin, but did not crimes go unreported. The stigma, confusion, to NCMEC Duane Bowers case evaluation and case preparation. The prosecution efforts. This case study will discuss disclose the abuse until he realized his younger and shame can silence victims for decades. Leemie Kahng-Sofer This presentation discusses the short and long- presentation will take you through what to do the law enforcement team’s strategy to convict sister was also being abused. This case study This workshop examines therapeutic issues This session will discuss recent federal term physiological, psychological and behavioral when a sexual abuse case lands on your desk. a man who was regarded in the news as the will examine the lengthy investigation and for male and female victims of both familial legislation, namely the Preventing Sex Trafficking effects of exposure to child pornography content Workshop “most violent and inhumane human trafficker

prosecution of this case, which lasted from and non-familial female offenders, offers key and Strengthening Families Act, P.L. 113-183 and information, including current brain-science ever seen in North Carolina. DESCRIPTIONS 1998-2006; all three relatives were arrested dos and don’ts for providing beneficial “trauma (H.R. 4980), and its mandate for social service information. New research on effective support Sexual Violence in Cyberspace: Case Study WORKSHOP and prosecuted in this time. The arrest of one informed care” and explores meaningful self agencies to immediately report children missing for first responders is presented. Warning From Abusive Images to Revenge of the perpetrators gained worldwide attention care for professionals. The presenter is also a from foster care to law enforcement and NCMEC. signs indicating a traumatic response to single Porn SHIFT: Supporting Heroes in Mental when he was identified as Howard Nevison, a resilient survivor of maternal incest. In that context, the session will highlight various and cumulative exposures to CP content are Sharon Cooper Health Foundational Training respected cantor at one of the most in influential Workshop resources offered by NCMEC to help locate and discussed as are the methods of communicating Sexual violence in cyberspace continues (Part 1 & 2) synagogues in the world, Temple Emanuel in New recover children missing from care, including these warning signs to others. A resiliency based to morph from the olden days of amateur Dan Powers, Michael Sullivan WORKSHOP WORKSHOP York City. This presentation will discuss how the Psychological Safeguarding potential child sex trafficking victims. model is presented as a wellness tool, and photography and occasional photo shopping, Team taught by a mental health professional DESCRIPTIONS case was put together and proceeded through Michael Bourke Workshop specific do’s/don’ts are discussed on ways to to the present, when gang rapes are posted and an ICAC professional, this course offers prosecution despite many roadblocks. This presentation focuses on ensuring the view CP content. A question and answer session online, victims are blackmailed through spyware, those exposed to child sexual exploitation Case Study psychological well-being of investigative and Responding to Child Abductions at the end of the presentation allows for more trafficking in images within the context of DMST material and/or may often interact with child support personnel who work in the field of (Part 1 & 2) specific information for each participant. victimization and cyberstalking and harassment sex offenders (law enforcement officers, forensic Prosecutors, Hearsay and Crawford sexual abuse and exploitation. The presenters William Donaldson, Joshua Wilson Workshop occurs with fulfilled threats of posting of explicit analysts, prosecutors, etc.) the opportunity Bill Fulbright review the extant literature in the area of This block of instruction is presented by the images in adult pornography sites by offenders to learn about the negative effects that may Since the 2004 case of Crawford v. Washington, secondary traumatic stress and vicarious FBI’s Child Abduction Rapid Deployment Sexual Abuse and Death: who are sometimes thousands of miles away. occur as a result of exposure to child sexual the face of prosecution has been constantly traumatization and summarize important issues (CARD) Team and the Behavioral Analysis Unit A Life Cut Short (Part 1 & 2) This presentation will provide discussions exploitation materials and ways to mitigate those challenged as the courts wrestle with what for investigators, prosecutors, probation officials, for investigators responding to the potential Patricia Guardiola, Jason Maguire, Jim regarding victim impact, the concept of complex negative effects. Workshop includes interactive constitutes a violation of the 6th Amendment treatment providers, and others who are exposed stranger abduction of a child. This course is Sears, Sherre Thomas trauma, discussions regarding family and tools and techniques for building resilience Confrontation Clause. This workshop will discuss to disturbing media in the course of their work. designed to provide the critical initial actions This case study will examine the ongoing sexual community support of victims and long term and thorough discussion of vicarious trauma, the original decision, what was left undecided, Also addressed are ways to build resilience and to law enforcement professionals responding abuse of a teenage girl by a family member and ongoing implications when families and victims burnout, compassion fatigue and the way the the use of effective coping strategies. to these events. Instructors will provide case her subsequent pregnancy that resulted in her brain processes traumatic material. Workshop examples and discuss the FBI’s Child Abduction giving birth to her baby Brianna in a porta potty. Workshop

54 55

DCAC-16-019 DCAC Conference Program_07mg.indd 54-55 7/29/16 11:52 AM The Silent Abuser: Why Neglect is the there is a darker side to the online world -- from throughout the course of the year and a half short case studies will be discussed as well as Task Force Approach to Violent Crimes anyone who wants to know where the Internet Monster Hiding in the Closet bullying to self-harm to child abuse/abduction. long investigation. excerpts from actual interviews with suspects. Against Children Investigations is going. This session is made possible by the Ryan Brown This presentation will highlight how social Case Study Workshop Kurt Ormberg, Derek Stigerts Technology Coalition. Childhood Neglect is the number one form of media intelligence can have a positive impact The presentation will cover the history of VCAC Workshop maltreatment that young victims are exposed in mitigating some of the risk while helping to State Prosecutor Forum Tactical Polygraph task forces, investigative priorities, how to initiate to. However, despite its numbers, it is one of decrease the number and nature of crimes and Eren Price, Carmen White Michael Bourke a task force, and best investigative practices. Tech Strategies and Innovation to the most perplexing and misunderstood of negative behavior against children. This is an If you came to the conference hoping to discuss This presentation discusses the use of Instructors will provide real task force experience, Effectively Address Child Trafficking all calamities that a child in need faces. The exhibitor workshop by Media Sonar exhibiting a specific case with someone, please bring your “tactical polygraphs,” examinations that focus short case presentations demonstrating task Ziba Cranmer, Brooke, Istook, Valiant effects of neglect can range from social isolation on the 2nd floor. questions and ideas to this interactive session on identifying undetected sexual criminality force successes. Richey, Malika Saada Saar to physical health issues to even death. The Exhibitor Workshop moderated by experienced local prosecutors. committed by individuals who view child Workshop Technology is used extensively by traffickers, awareness of neglect can not be overlooked. Find out how other prosecutors handle your exploitation material. The technique has predators, and sex buyers to sexually exploit The purpose of this workshop is the educate the Social Workers: particular concern. Be prepared to meet your been remarkably successful in identifying Tech Coalition Open Session: Get to children. Whether it is websites for posting audience on the different forms of neglect, the Making a Case for Safety colleagues and brainstorm ideas as attendees victims of hands-on abuse. The presenter will Know the WePROTECT Global Alliance advertisements or sex buyer review boards, risk factors and red flags for neglect, the proper Jim Holler have the opportunity to address your questions. summarize the findings from a study conducted to End Child Sexual Exploitation the Internet has become a huge liability for investigation into neglect, and the outcomes of Each day thousands of social workers make Learn about challenges your colleagues face by personnel from the Behavioral Analysis Unit of Jacqueline Beauchere, Fred Langford, law enforcement because of how easily it neglect on the victim. Neglect can come is all home visits in the United States and during these and how they overcome those issues. the US Marshals Service, the Office of the U.S. Anjan Bose facilitates exploitation. In this session, learn shapes and sizes and each investigation should visits they investigate allegations of abuse and Forum Attorney, the US Postal Inspection Service, the Protecting children online is a critical goal we about innovative tactics and partnerships being be tailored to the child. sexual assault, update safety plans for children, FBI, and the United States Secret Service. The all share. Now, thanks to bold efforts by the implemented in Seattle for turning the Internet Workshop and monitor on-going foster care. Social workers Successfully Prosecuting a Case with presentation will include a discussion for why UK and UAE governments, numerous NGOs, and technology at large from liabilities into assets. are at risk for hostile behavior from the public a Recanting Victim the technique works and suggested guidance and many in industry, we now have a formal Presenters will discuss tech-based projects to Sizing It Up: when visiting clients at hotels, apartments or Mary-Ann Burkhart on the application of the findings. organization for coordinating efforts across all display deterrence ads in response to online The Skinny On Failure to Thrive homes in unfamiliar or dangerous locations, Recantation is a common occurrence in cases Workshop sectors to do just that. The WePROTECT Global searches for children, target young men at risk Emily Lentz, Sandra Onyi especially at night. They have often been involving child victims. This presentation will Alliance to End Child Sexual Abuse Online is for sex buying with social media, and enhance This talk will bring insight into the different assaulted with knives and fists while attempting explore the most common reasons for recantation, Taken in the Night: Characteristics of the new, combined entity formed by the UK- law enforcement’s focus on the demand for categories for failure to thrive. It will walk to visit homes where parents are facing various ways in which child abuse professionals can work Residential Child Abductions led WePROTECT Children Online initiative children through Internet stings, as well as a attendees through proper ways to identify court actions, or where children are being placed together to avoid and prevent our child victims Mark Hilts, Joy Lynn Shelton and the Global Alliance Against Child Sexual recent case involving the seizure of a buyer whether the condition is related to a medical into foster care. Most of these home visits are from recanting, and strategies for working the Children abducted from inside a residence can Abuse Online. Whether you are a member of review board in Seattle. or environmental cause. It will help to better made by a single social worker, without a radio cases in which recantation does occur. be a source of great panic for a community and law enforcement, a new industry player, or part Workshop facilitate understanding of what growth curves or other means of adequate communications Workshop give the perception that the four walls of one’s of a child protection NGO, come learn how you are appropriate according to the child’s age and and social workers have been assaulted and/ home offer little or no protection from offenders and your organization can join the WePROTECT Technology Facilitated Crimes how to interpret the growth chart. It will emphasis or killed while making such home visits. This Suffer from Burnout? who kidnap children. The FBI’s Behavioral Global Alliance and help make a difference on a Against Children the importance of a detailed diet history and use workshop will address safety concerns from Give’em the F.I.N.G.E.R.! Analysis Unit will share the results of a recent global stage on this important issue. This session Steven Del Negro of dietitian to properly manage child’s condition. the law enforcement perspective by providing Mark Yarbrough study of residential child abduction cases. This is made possible by the Technology Coalition. This training will provide an overview of the This workshop will discuss burnout, which Case examples will be utilized to illustrate each social workers with important safety related presentation is particularly appropriate for law Workshop technology that is being used for sexual category of failure to thrive and management and information that they can utilize each time they affects millions of Americans each year and enforcement officers who may be confronted exploitation and what types of technology the importance of nutritional assessment and make a home visit on their own. The workshop has been called “the disease of our civilization.” with a report of a child missing from their Tech Coalition Open Session: facilitated crimes against children are committed. determination of caloric needs will be discussed. will provide social workers with ways they can Professionals who help protect children have a residence and often initially must consider all Start-Up Service Providers: A brief overview of the impact on victims and high risk of developing burnout. But there’s good Workshop identify potentially harmful conditions and defuse potential explanations to include an investigation The Perspective from Both Sides how technology is used by offenders and the volatile situations when encountered. news—burnout can be healed. The presenter, into a possible intruder who kidnapped the child. Matt Dunn, Lisa van Heugten, Mary challenges new technology will create. Smartphone and Tablet Forensics Workshop a former 20-year elected district attorney, Using case examples, common characteristics Catherine Wirth, Matt Wolozyn Workshop with Magnet AXIOM personally experienced burnout and then of this unique type of child abduction as well Child sexual exploitation content finds its way Mark Stringer Solving the Series – The Case of the conquered it. He has since become a “burnout as investigative considerations will be shared. to a wide variety of online platforms. There are Three Weeks of Torture: This hands-on lab session is for forensics Creeper (Part 1 & 2) expert” and has written and published on the Workshop unique challenges to combating this material The Murder of Zyon Thompson examiners who use Magnet AXIOM in the Damian Jackson, Jeff Udvarhelyi subject and has taught thousands of people for service providers who are new to the space. Michael Milnor, Nancy Oglesby

investigation of Internet child exploitation cases. During the summer of 2013, 27 year-old Gilbert how to overcome burnout. Attendees will be Taking Traffickers to Trial Law enforcement also faces challenges in Zyon Thompson, three years old, was left by his DESCRIPTIONS This lab will provide instruction on how to best Chavarria terrified residents in North San Diego laughing, and at the same time learning Mark’s Kirsta Leeburg Melton investigating cases on an ever increasing area mother in the care of family friends. Over the WORKSHOP use Magnet AXIOM to find, analyze, and report County after he forced entry into several homes F.I.N.G.E.R. philosophy to help themselves or “Child prostitute,” “drug-addict” and “criminal of products and services. This moderated panel course of three weeks, three adults subjected more smartphone Internet and App evidence. and sexually assaulted nine children between their co-workers avoid and/or recover from history” are not words that prosecutors like to discussion seeks to share the perspectives of Zyon to military style punishments of extreme Learn how to search, parse, and carve for the ages of 4 to 15 while they were asleep. Burnout. This is a training that you won’t want have associated with the victims in their cases. both the service providers and law enforcement. exercising and stretching. Zyon was also sprayed hundreds of artifact types automatically, and how Chavarria’s sexual assaults occurred in some to miss! But they also don’t mean that a victim is not This session is made possible by the Technology with bleach and beaten. His torture culminated to narrow down artifact data and analyze it for instances while the children were asleep in Workshop worth fighting for, or her case unwinnable. This Coalition. one evening in which he was force fed crab WORKSHOP WORKSHOP the best results. Session attendees will receive the same bed and/or room as their parents. workshop will focus on the practical aspects of Workshop seasoning and was water boarded. His body DESCRIPTIONS a free trial copy of Magnet AXIOM. A special Once in the children’s’ bedrooms, Chavarria Suspect Interview Techniques in Child trying human trafficking cases with child victims. could no longer handle this treatment and for registration will be provided for this session due would cut and remove the children’s pajamas Abuse Cases Participants will learn to turn their weaknesses Tech Coalition Open Session: two days they watched him suffer, seizing and to limited number of computer work stations. and underwear as they slept. During the initial John Combs into strengths in voir dire, build corroborative Technology Trends: What is the New vomiting, afraid to take him to the hospital Check back for link to register soon! This is investigation(s) DNA was identified at two This workshop will discuss interviewing suspects evidence after the initial investigation, structure Evil on the Internet? because of the obvious injuries to his body. Zyon an exhibitor workshop by Magnet Forensics separate crime scenes in two separate cities. in physical and sexual abuse cases involving trial to emphasize case strengths, and Ben Butler, Chris Roosenraad was finally dropped at the emergency room by exhibiting on the 2nd floor. Chavarria’s eventual arrest was the first in San children. It will address the the importance support witnesses who are alternately fearful, This presentation will review current and the teenage son of one of the perpetrators and of rapport building and learning about the Exhibitor Workshop Diego County stemming from a familial DNA uncooperative, hostile and desperate for change. future trends in Internet technology with a quickly died from kidney failure and dehydration. match, according to the prosecutor. This case suspect’s “stressors.” Once those “stressors” Most of all this workshop will challenge us to focus on technical issues that can have an This case study will show how the case was Social Media Intelligence for study will detail the exhaustive investigative have been identified, developing a “theme” in change the culture from one that identifies with impact on Internet criminal investigations. investigated and eventually prosecuted against Youth Cases efforts preceding and following Chavarria’s arrest order to give the suspect an “out” and obtaining a and honors perpetrators to one that provides Topics to include the growth in end-to-end the three adults. Chris Toplack to include: the development of a major case confession. Suggestions for detecting deception safety, security and justice for the survivors of encryption, persistent monitoring, IPv6, NAT, Case Study Social media and youth go together hand-in- strategy while working in partnership with other and confronting deception will be given. Several trafficking. CGN, the “Internet of Things,” TOR, the rise hand in terms of communicating and connecting investigative agencies, post-arrest interview Workshop of “2 factor authentication,” and the growth of with friends and family. However, like anything, strategy and the significant lessons learned “multipathing.” This presentation is designed for

56 57

DCAC-16-019 DCAC Conference Program_07mg.indd 56-57 7/29/16 11:52 AM Three’s Company...and the Victims rape of a child as she walked to the school bus traumatized individuals using both posttraumatic them in distinguishing the difference between enterprise of Paul Sewell (aka “God”), a bounty Using Craigslist and Backpage for Left Behind stop in the early morning hours of December play metaphors & directive play therapy intentional and accidental burns. It will also assist hunter and former youth detention officer in Undercover Operations Matthew Cox, Sandy Moreland, 2010 in Killeen Texas. Unfortunately, this was interventions. Case examples, demonstration, the investigator by providing methods that can Reading, Pennsylvania. Sewell used several Jesse Crowe, James Valley Reynie Tinajero not the first time a child had been taken from & lecture will be utilized to demonstrate the be used in recreating the incident to help prove methods to recruit, coerce and force dozens This presentation will involve the set up of This case study will detail how a connection on the bus stop and raped in this town in central clinical application of play therapy with victims. or disprove the caregiver’s statements as to how of girls, many of whom were underage, into labs and operations when using Craigslist and Mocospace led to a mother of three moving in Texas. The presenters will discuss the medical Workshop the burns were sustained. prostitution. His most effective method was Backpage. Personnel needs will be discussed as with a man she has just met and the fatal child aspects of a pediatric sexual assault exam as it Workshop his ability to convince his victims that he was well as safety concerns. Examples will be given abuse that followed. The tragedy started when related to this case. They will also discuss how Triage 101: Rapid Analysis & a law enforcement officer and that he had of small local and large state-wide operations. the mother moved her children into the home of law enforcement was able to track a serial rapist Acquisition of Live Data Understanding and Investigating the assistance of local police. Sewell was Posting and responding to ads with certain this man and his present live-in-girlfriend and with the help of the forensic nurse, a brave nine Jeff Shackelford Child Pornography friends with a cop who was knowledgeable techniques will also be discussed. Students will her child. The man, Clezel Mughni, took the year-old little girl, the sketch artist, a live line up Investigators in the field need the ability to rapidly Steven Del Negro of the operation and maintained a “love nest” learn about Bit Coins and how they affect posting role of disciplinarian to the extreme, beating and the use of hypnosis during the investigation. triage digital evidence with both proficiency and This presentation will provide the attendee with in Sewell’s horrific row home where victims ads. Also, students will learn about the proper and eventually killing one child and causing Detective Harris brings a wealth of experience expediency. Unfortunately, many investigators an understanding of child pornography and the were trafficked. Sewell branded his victims equipment needs for success to overcome some life threatening injuries to his toddler sister. and will discuss lessons learned as the lead approach “on-scene triage” with a multitude of effects of Child sexual abuse. The technology with tattoos, molested his niece, forced two of of the barriers involved in the operations. The presenters will discuss the investigation investigator in this case. tools (software overkill.) Many common tools used, the scope of the problem as it pertains to his own children to clean up after appointments, Workshop and prosecution of both the abuser and the Case Study require investigators to manipulate unfamiliar the internet, the impact that it has on a victim, and forced their mother into prostitution to win mother who failed to protect her children. In this antivirus programs in order to function correctly, and the risk levels associated with the child custody. This presentation will highlight the Using Digital Evidence presentation you will learn from the presenters Traffic Jam: Unlocking Online Data and oftentimes, these “forensic” tools update pornography offender will also be discussed. inter-agency, and inter-disciplinary, cooperation More Effectively the medical complications encountered and legal to Fight Human Trafficking (Includes critical time stamp information of previewed Workshop and coordination that led to the uncovering of Jim Tanner and investigative issues faced in preparing for Free Trial Access to Software) files. Come see a much easier, faster and safer Sewell’s crimes and the prosecution of “God” In today’s world every sex offender generates two separate trials for the murderer and the one Brian Sowa approach to on-scene triage that won’t leave a Understanding Sex Offenders and his accomplices. digital evidence. Often much of the value of this who watched and failed to protect. Each day, thousands of internet classified ads path of destruction throughout your evidence. (Part 1 & 2) Case Study evidence is lost in the process of prosecution, Jim Tanner Case Study are used to market unlawful activities. Behind Attendees will be shown step-by-step instruction supervision and treatment. In this session we many of these ads are underage victims of sex on how they can rapidly locate the proverbial This session focuses professionals on the US Marshals: Fugitive Sex Offender will demonstrate easy, time efficient methods TICAC: Thailand’s Robust Response to trafficking and the organized criminals who “needle in the haystack,” (literally within a few cognitive set of the intrafamilial and position of Investigations and Resources of looking at digital evidence which provide a Transnational Criminal Threat exploit them. Learn about an intelligence and minutes), and also, how they can automatically trust sex offender. We will expand and clarify Thomas Bloxom, Eric Mayo professionals with an enhanced understanding Khemachart Prakaihongmanee, time-saving tool to combat these crimes and validate what changes their favorite triage tool elements of investigation, prosecution and This presentation will cover topics related of the offender. Whether you are a forensic Tamasak Wicharaya identify exploited victims. Traffic Jam, our web- or tools are making to any particular system. effective containment. We will discuss sex to the U.S. Marshals Service and its efforts specialist, investigator, prosecutor, supervising Trafficking in persons in general, and the based tool, allows users to follow-up on tips and Workshop offenders’ perceptions, ideation, grooming to work with state, local and other federal agent, or therapist, you will walk away from this sex trafficking of minors in particular, has identifies new high-potential leads in readily strategies and cognitive processes. The impact agencies to identify, locate and apprehend session knowing how to organize and utilize received significant attention in the Kingdom available data that is much too large for humans Turning Flight to Fight: of the Internet and the offenders’ digital behavior unregistered or non-compliant sex offenders. digital evidence to enhance your duties. Using of Thailand. Over the last year, the Royal Thai to sift through. Benefits include the ability to The Ronal Ordonez-Orosco Case will be explored and explained. Participants will Specifically, the presenters will discuss the U.S. actual case information, we will show how to Government has been working with foreign track criminals and victims using previously Crystal Levonius, Geeta Singeltary, leave this session with a new understanding Marshals role as it relates to the Adam Walsh make simple changes in the way digital evidence law enforcement counterparts and drawing on known numbers and images; Reduce man- Jon Hoffman of sex offenders, their thoughts and digital Act, International Megan’s Law, registered sex is presented which will provide you with valuable their own expertise to formulate a robust, multi- hours in investigations by leveraging prompt Ordonez-Orosco lived with his niece and her behaviors which will enhance the ability to offender compliance checks, missing children information you are not currently getting. agency and multidisciplinary response to the and comprehensive summaries of suspicious family. He raped his niece when she was 11 investigate, prosecute, supervise and treat cases and the variety of resources available to Workshop growing transnational criminal threat of Internet- activity exposed in online data; Proactively and 12 years old. After the last incident, the sex offenders. state and local agencies through the National facilitated crimes against children. The creation review local alerts for suspicious content within then 12-year-old victim discovered she was Workshop Sex Offender Targeting Center, the Sex Offender Utilizing NamUs to Resolve Long-Term of the TICAC, Thailand’s Internet Crimes Against mounds of daily postings. This session provides pregnant. The victim was taken from the home Tracking Team and USMS district offices located Missing and Unidentified Deceased Children Task Force, represents a milestone in training, live demonstration, and access for law of her non-believing mother and placed in foster Understanding the across the United States. Child Cases the enforcement of human trafficking crimes. enforcement members, as well as highlighting care. After the birth of the victim’s child, a DNA Psychopathic Offender Workshop B.J. Spamer In this workshop participants will hear from previous success stories.Traffic Jam - Unlocking test supported that her uncle, Ordonez–Orosco, Melanie Malterer This workshop will discuss the forensic, some of Thailand’s most recognized experts in Online Data to Fight Human Trafficking, includes was the father of the child. It also included other Psychopathy has been referred to as “…the (The) Use of Tactical Polygraph with analytical, and investigative resources available the crimes against children portfolio to combat free trial access to software. This is an exhibitor interesting findings. At trial the victim collapsed single most important clinical construct in Child Pornography Investigations through the National Missing and Unidentified child victimization, including Internet-facilitated workshop by Marinus Analytics, LLC exhibiting and was almost unable to testify. Attendees the criminal justice system” (Hare, 1996) and Anthony Hall Persons System (NamUs) to resolve long-term DESCRIPTIONS child sexual exploitation, sex trafficking and on the 1st floor. will learn about DNA issues and the hurdles by others as “the most important and useful This presentation will discuss how the use missing and unidentified deceased child cases. WORKSHOP international child sex tourism. Exhibitor Workshop prosecutors overcame to get the victim to talk. psychological construct yet discovered for of the polygraph can assist investigators in Forensic topics will include best practices for the criminal justice policies” (Harris, Skilling and Workshop They will also understand how to work with determining whether persons of interest in collection and use of biometric records, such Treating Abuse and Trauma: victims who lose everything because of their Rice, 2001.) This workshop provides compelling child pornography investigations may have gone as dental radiographs, DNA samples, and Tips and Strategies for Testifying Using Play Therapy in an Evidence- outcry, and how to turn a victim’s instinct of support for these claims and sheds light on the “hands on” with a child. The term “hands on” fingerprint cards. Analytical services will be in Court Based World, Parts 1-2 flight in to one of fight. importance of understanding and identifying describes the propensity of an individual to have discussed, including NCIC offline searches and WORKSHOP WORKSHOP Stephanie Morris Sueann Kenney-Noziska Case Study psychopathy in criminal offenders. The audience sexually abused a child. This presentation will advanced searching of the NamUs databases DESCRIPTIONS This lecture will address testifying as both a lay There is often a disconnect between evidence- will learn about the construct of psychopathy, include statistical data obtained from various to locate potential leads. Case studies will be and expert witness in child abuse investigations. based protocols and actual clinical practice. Understanding and Investigating Child its relationship to risk assessment and officer studies detailing the rate which individuals provided to illustrate successful case resolutions. Participants will discuss tips for avoiding This workshop will emphasize the integration Burn Injuries safety, and prevalence rates in society and convicted of the collection and distribution of Workshop testifying and for maintaining their credibility as of play therapy in a trauma-informed manner Jim Holler prison populations. Common myths about child pornography will sexually abuse children witnesses. The lecture will also provide tips and within core components of evidenced-based Infants and toddlers are most likely to be burned psychopathy will be debunked. The audience based on those individual’s admissions (A) Victim Centered Approach to tools for testifying effectively at pretrial hearings treatments. An emphasis will be placed on intentionally. Child abuse burn victims are will be given strategies for the identification of during treatment. The presenter will discuss Human Trafficking Investigations and trial. Participants will leave better equipped trauma-informed play therapy interventions typically under the age of 10 with the majority psychopathic traits in offenders and how to utilize the importance of observations made by Christopher Heid, Patrick Winn to defend their investigations and interviews. to reduce posttraumatic symptoms & promote of them being under the age of 2. Immediate this information in law enforcement contexts. investigators and how proper communication This presentation will discuss the Maryland State Workshop healing, growth, & recovery. Research, studies, identification of intentional burn victims by Workshop with the polygraph examiner will increase the Police Child Recovery Unit’s victim centered & literature pertaining to trauma’s impact on those individuals first responding to the call chances of success when determining whether approach to human trafficking investigations Tracking the Bus Stop Rapist the brain, treatment of posttraumatic stress, for assistance is crucial because most of the (The) United States of America v. an individual has had the opportunity to sexually particularly those involving juvenile victims. (Part 1 & 2) & trauma-informed treatment will be reviewed. victims are unable to speak for themselves. This “God”: The Paul Sewell Investigation abuse a child. Since 2011, the Maryland State Police has been Frederick Harris, Sheilah Priori Attendees will learn strategies for addressing workshop will provide law enforcement officers Sara Blond, Chris Duncanson Workshop successful in locating and providing assistance This case study will detail the abduction and the complex treatment needs of abused & and CPS workers with information that will assist This case study details the human trafficking to juvenile victims through partnerships

58 59

DCAC-16-019 DCAC Conference Program_07mg.indd 58-59 7/29/16 11:52 AM developed with the FBI’s Child Exploitation Task lecture includes providing teachers and school Working With The Media On Missing Force and local non government organizations. officials with reasons to rapidly and effectively and Abducted Children Cases The presenters will discuss their investigative report criminal activity or suspicious behaviors Craig Hill SPEAKERS strategies as well as the cooperation they have in the school environment. Effective communication is crucial during any Speakers are listed alphabetically by last name. Visit cacconference.org/speakers for biographies or download our app! with several non profit groups in Maryland. The Workshop major event, especially a missing or abducted presenters will also discuss a federal prosecution child; otherwise public fear and panic can prevail. that began with a 14-year old child that led to Whatever it Takes: Women Who Offer Realizing the public relies heavily on the media Luis Acuña-Pilgrim Kristin Boorse Christopher Cecil the arrest and prosecution of five suspects. Sex with Their Children to Keep Their for information, this presentation is designed Education Specialist Senior Product Manager Detective Sergeant Workshop Man (Part 1 & 2) to identify the importance of developing and Dallas Children’s Advocacy Center Thorn Indiana State Police Julie Peay, Joe Sullivan adhering to strict public relations guidelines Victim ID and Adobe Technology Professionals often struggle to understand and understanding the benefits of three critical Becky Aguilar Beth Bouchard Dean Chatfield (Part 1 & 2) why some women will collaborate with the stages that should be followed while working Volunteer Engagement Specialist SEEN Program Manager High-Tech Crime Training Specialist Jim Cole, John Penn II sexual abuse of their children to maintain their with the media. Developing a positive relationship Dallas Children’s Advocacy Center Children’s Advocacy Center of Suffolk County SEARCH In this workshop you will see how victim relationship with a man who is sexually interested while using all national, local and social media Zach Artz Michael Bourke David Clark identification specialists at HSI utilize cutting in their children. This case study explores the as a powerful tool is also discussed. edge technology to bring out details and clues issues for women who make this choice. Using Whooster Chief, Behavioral Analysis Unit Detective Workshop United States Marshals Service Dallas Police Department used to track down victims and offenders of child video of a forensic interview with a mother Rhino BACA abuse material. You will also learn how Adobe convicted of sexual crimes involving her child, X-Ways Forensics Overview President, Dallas Chapter Leslie Boutte Einat Clarke Creative Cloud and other tools are helping in the this presentation outlines the investigation and Eric Zimmerman Bikers Against Child Abuse Intern Coordinator/Therapist Senior Counsel fight against child exploitation with technology analyses the woman’s account. The presenters This presentation will cover how X-Ways Dallas Children’s Advocacy Center Google Inc. breakthroughs in their tools. will highlight how behavior analysis techniques Forensics can be used for common forensic Michael Barker Workshop can help in the interview process to maximize tasks including imaging, finding data via filters Supervisory Special Agent Duane Bowers Laura Coats the engagement of the subject. and searching, and generating reports. X-Ways FBI NCMEC Safeguard Consultant Assistant District Attorney Wellness/Survival and the MDT Case Study Forensics has many unique features that will Approach to Child Abuse National Center for Missing & Exploited Dallas County District Attorney’s Office also be covered including PhotoDNA support, Jason Barry Children Dan Powers When the Bough Breaks extensive data recovery options, and more. Trust and Safety Manager Nancy Cochrane Dr. Seuss helps us gain some insight to our daily Matthew Cox, Sandy Moreland, Attendees will see how X-Ways can be used to Facebook Julie Brand Principal Criminal Attorney struggles, doubts and the reasons we stay in Reynie Tinajero streamline the exam process, allowing examiners Principal Sacramento District Attorney’s Office this job. In this workshop we will discuss the One morning, Joniah Baker, a healthy 11-month to do more in less time. Robert Basanez CAPER Consulting places you go, the choices you make and how old baby, was left alone with his father Jonathan Workshop Special Agent Lauren Coffren they give us the courage to move mountains. You while the mother was at work. Later that day, FBI Travis Bright Program Manager, CVIP will discover how lucky you are to do what you when the mother returned home, she realized Yahoo Child Safety Efforts Google National Center for Missing & Exploited do. Whether you like them here or there, stress that her son was in trouble. Joniah was rushed to Apoorv Dutta​, Kathleen Lefstad Jacqueline Beauchere Children will find you anywhere. Come enjoy an hour or the hospital but he died two days later. Doctors This presentation will provide a basic Chief Online Safety Officer Ryan Brown two if even if you’re old or if even if you’re new. found 26 marks on his tiny body, including understanding of the proactive and reactive Microsoft Clinical Associate Professor Jim Cole Workshop burns, bite marks, broken ribs, and a subdural methods in which Yahoo detects and investigates University of Oklahoma College of Medicine, Special Agent hemorrhage. There is no doubt that Joniah’s final content related to child exploitation and how Kendall Beels Department of Pediatrics Homeland Security Investigations What Engagement Rings and day was one of sheer torture. The presenters abuse policies surrounding child safety are Special Agent Spanking Have in Common will detail both the criminal and the medical enforced and communicated. It will include an US Department of State Mary-Ann Burkhart John Combs Dyann Daley investigation that followed. The prosecution overview of Yahoo services, such as Yahoo Director, Child Abuse Prosecution Project Detective This presentation will discuss the history of Dona Bellow Association of Prosecuting Attorneys Round Rock Police Department resulted in a conviction for Capital Murder for Mail, Messenger and Flickr, with an emphasis Legal Assistant II corporal punishment, how the modern day Joniah’s father for killing his infant son. on how users can interact and utilize the Google Rachel Burris Catherine Connell culture of corporal punishment was developed, Case Study products, and how law enforcement may Assistant District Attorney Child/Adolescent Forensic Interviewer and what religious text has to say about it. It encounter these during the course of their Robert Benson was also cover the data and research that Working with Non-Offending Parents Dallas County District Attorney’s Office FBI investigations. With specific examples pulled Detective/Media Forensic Examiner shows the escalation of corporal punishment to in Child Sexual Abuse Cases directly from Yahoo’s E-Crimes Investigations Richland Police Department Ben Butler Janet Connolly physical abuse. Dan Powers Team cases, the presentation will describe Director, Digital Crimes Unit Special Agent Workshop This workshop is intended for interviewers, Yahoo’s CyberTip reporting process and how Monika Bickert GoDaddy.com Homeland Security Investigations police officers, CPS workers, probation officers, child sexual abuse material may surface on Facebook What the Offender Has to Tell Us: attorneys, judges, social workers, therapists these products. It will also describe Yahoo’s Sex Offenders in the School Brad Byrd Katrina Cook and anyone else dealing with abused children current efforts to encourage awareness and Sara Blond Detective/I.C.A.C. Task Force Director of Parent Services WORKSHOP WORKSHOP Environment and their non-offending parents. It will review education regarding child safety and promoting Special Agent DESCRIPTIONS Harnett County Sheriff’s Office Dallas Children’s Advocacy Center Steve DeBrota, Michael Johnson, types of non-offending parents and suggest good digital citizenship. FBI John Pirics a consistent approach in dealing with them Workshop Nirupa Calvin Maggie Cook The defendant in United States v. Darrell Hughes from investigation through on-going treatment. Thomas Bloxom Investigator, Investigations & Users Protection Program and Partnerships Manager, Online was a long-term school counselor and treatment Your actions can “make or break it” for the next Senior Inspector Google Safety provider for teens in a local community. After his professional dealing with the parent. We will United States Marshals Service Facebook SPEAKERS apprehension for producing child pornography discuss the range of emotions professionals may Andrew Campbell with multiple victims, he was convicted and feel as well as the “do’s and don’ts” of dealing Matt Bochneak Research Specialist/Statewide Education Sharon Cooper agreed to participate in video recorded interviews with non-offending parents, emphasizing the Network Ninja Program Coordinator Developmental and Forensic Pediatrician about his criminal tradecraft and previously need for a collaborative, consistent approach Indiana University School of Medicine Developmental & Forensic Pediatrics, P.A. successful methods to avoid detection. This when dealing with them. workshop will show portions of these interviews Workshop Kim Castro Wendell Cosenza and provide public information for parents, Special Agent Supervisory Special Agent teachers, and school administrators to use in FBI FBI training and education efforts. The goal of this

60 61

DCAC-16-019 DCAC Conference Program_07mg.indd 60-61 7/29/16 11:52 AM Glenn Covington Kevin DeLong Justin Fitzsimmons Patricia Guardiola Judy Hoffman Stacy Jeleniewski Special Agent Business Analyst for Digital Forensics Program Manager, High-Tech Crime Training Child Trauma Counselor Community Volunteer Research Analyst, Exploited Child Division Homeland Security Investigations AccessData Services Irving Police Department Dallas County District Attorney’s Office National Center for Missing & Exploited SEARCH Children Matthew Cox Amy Derrick Yuri Gubanov Johann Hofmann Associate Professor of Pediatrics Assistant District Attorney Lisa Fletcher CEO and Founder Director Michael Johnson University of Texas Southwestern Medical Dallas County District Attorney’s Office Assistant United States Attorney Belkasoft Griffeye Special Agent School United States Attorney’s Office, Northern Homeland Security Investigations William Donaldson District of New York Ana Guzmán James Holdman, Jr. Ziba Cranmer Supervisory Special Agent Therapist Special Agent Leemie Kahng-Sofer Executive Director FBI Kimlani Ford Dallas Children’s Advocacy Center Homeland Security Investigations Case Management Supervisor, Demand Abolition Assistant US Attorney Missing Children Division Jesse Donkers US Attorney’s Office Derrick Hacker Jim Holler National Center for Missing & Exploited Jesse Crowe Inspector, Coordinator of International Affairs Lieutenant Consultant Children Special Agent in Charge National Police of the Netherlands – Dutch Michelle Ford-Stepney Crystal Police Department Holler Training Wisconsin Department of Justice Child Exploitation Team Supervisory Analyst Yu Jin Kang INTERPOL Washington Francey Hakes Todd Hornik Trust and Safety Manager Diane Daiber Mike Duffey CEO Deputy District Attorney Adobe Systems Incorporated Pediatric Training Specialist Special Agent Supervisor Richard Frawley Francey Hakes Consulting Monterey County District Attorney’s Office International Association of Forensic Nurses Florida Department of Law Enforcement Digital Forensic and Training Specialist Elizabeth Keeley ADF Solutions, Inc. Anthony Hall Jabari Howard Assistant District Attorney Suzanne Dakil Kathy DuMond Sergeant Detective Suffolk County District Attorney’s Office Assistant Professor of Pediatrics and Child Abuse Therapist Scott Freeman Maryland State Police Dallas Police Department Pediatrics Dallas Children’s Advocacy Center WatchSystems Sueann Kenney-Noziska UT Southwestern/Children’s Health Lionel Hanley Kristen Howell Child and Adolescent Therapist Chris Duncanson Bill Fulbright WatchSystems Chief Programs Officer Play Therapy Corner, Inc. Dyann Daley Special Agent County Attorney Dallas Children’s Advocacy Center Executive Director FBI Ravalli County Attorney’s Office Frederick Harris Julie Kenniston The Center for Prevention of Child Homicide Detective Mark Hudson Executive Director Maltreatment led by Cook’s Children’s Matt Dunn Joe Gauthier Killeen Police Department Executive Director The Center for Family Solutions Assistant Special Agent in Charge Director of Client Services Midwest Regional Child Advocacy Center Stephen Daley Homeland Security Investigations, Dallas OffenderWatch Kelly Harrison Jessica Kenton CEO/Director of Training Special Agent Tracy Ingle Supervisor, Case Analysis Unit radKIDS Inc 501c3 Apoorv Dutta Kevin Getz Homeland Security Investigations (ICE-HSI) Senior Director for Law Enforcement and National National Center for Missing & Exploited E-Crime Investigator Detective Security (LENS) Team Children Antigone Davis Yahoo! Indiana State Police Nancy Hebert Microsoft Head of Global Safety Policy Prosecutor Greg Kesner Facebook Summer Elmazi Daniel Githens Montgomery County District Attorney’s Office James Isaacs President Assistant District Attorney Prevention Officer Detective GDK Consulting LLC Anoup de Weever Dallas County District Attorney’s Office US Department of State Christopher Heid Dearborn Police Department Inspector - Financial Crimes Expert Corporal Brian Killacky National Police of the Netherlands – Dutch Jen Falk Cynthia Gonnella Maryland State Police Brooke Istook Consultant Child Exploitation Team Assistant District Attorney Computer Crime Instructor Director of Strategy and Operations Amber Alert Technical Assistance Dallas County District Attorney’s Office National White Collar Crime Center Mat Henley Thorn Steve DeBrota Director of Threat Operations Julie Kindle Senior Litigation Counsel Rita Farrell Jesse Gonzalez UBER Wayne Jackowski Criminal Analyst – Oklahoma ICAC United States Attorney’s Office – Southern Forensic Interview Specialist Forensic Interviewer Supervisor Special Agent Oklahoma State Bureau of Investigation District of Indiana Gundersen National Child Protection Training Dallas Children’s Advocacy Center Wil Hernandez FBI Center Technical Software Engineer Adam Kirhagis Steve Del Negro Angela Goodwin MSAB Allison Jackson Detective Sergeant Consultant Erin Faseler Director of Investigations Division Chief, Freddie Mac Foundation Child Baltimore Police Department NCJTC Civil Commitment Division Chief Child Protective Services Craig Hill & Adolescent Protection Center and Associate Special Prosecution Unit Retired Deputy Chief of Police/Consultant Professor of Pediatrics, The George Washington Andrea Kirkpatrick Courtney Gregoire National Center for Missing & Exploited University School of Health Sciences Associate General Counsel of Security Alison Feigh Microsoft Children Children’s National Health Systems Facebook Program Manager Jacob Wetterling Resource Center Crystal Gregory Graham Hill Damian Jackson Peggy Klein HANDOUTS AVAILABLE ON Forensic Interview Specialist Criminologist Detective Counsel, Litigation DROPBOX AND THE APP Dawn Ferguson Department of Homeland Security KLIK Protective Services Escondido Police Department/San Diego ICAC National Center for Missing & Exploited SPEAKERS Assistant District Attorney Task Force Children Visit the Help Desk for Tarrant County District Attorney’s Office Chad Gremillion Mark Hilts Dropbox access information Lieutenant Supervisory Special Agent Mindy Jackson Tanisha Knighton or the Tech Support Booth Chris Fitzpatrick Louisiana State Police FBI-BAU-III Director of Support Services Consultant/Trainer Special Agent SPEAKERS for App assistance. Dallas Children’s Advocacy Center Knighton Consulting Group, LLC Homeland Security Investigations Sev Guardado Jon Hoffman Facebook Detective Financial Crimes Mike Krapfl Plano Police Department Special Agent in Charge Iowa Division of Criminal Investigation

62 63

DCAC-16-019 DCAC Conference Program_07mg.indd 62-63 7/29/16 11:52 AM Colton Kurth Melanie Malterer Doug Millican Nancy Oglesby Brandon Poor Jeff Rich Clinical Intake/Assessment Specialist/Clinician Supervisory Psychologist Assistant District Attorney Deputy Commonwealth’s Attorney Detective, Crimes Against Children Detective Dallas Children’s Advocacy Center United States Marshals Service Dallas County District Attorney’s Office Henrico County Commonwealth Attorney’s Grand Prairie Police Department Plano Police Department Office Vic Lacey Melanie Martinson Michael Milnor Dan Powers Char Rivette International Director of Investigations & Law Director of Cyber Investigations and Data Fusion Chief of Police George Ohrin Senior Vice President/Clinical Director Executive Director Enforcement Development International Justice Mission Altavista Police Department Detective (Retired) Children’s Advocacy Center of Collin County Chicago Children’s Advocacy Center International Justice Mission Lower Merion Township Police Mike Matijevich Nick Montgomery Mike Prado Jason Rodriguez Jaquelyn Lamont BACA Texas State Secretary Software Engineer Sandra Onyi Associate Deputy Assistant Director Lieutenant, Field Operations Division Forensic Interviewer/Director of Youth and Safety Bikers Against Child Abuse Palantir Technologies, Inc. Pediatric Nurse Practitioner Homeland Security Investigations Dallas ISD Police Department Outreach Children’s Health Dallas Suffolk County District Attorney’s Office Eric Mayo Sandy Moreland Khemachart Prakaihongmanee Chris Roosenraad Senior Inspector Senior Sergeant/Investigator Kurt Ormberg Deputy Director of the Bureau of Foreign Affairs Treasurer Fred Langford United States Marshals Service Dallas County District Attorney’s Office Supervisory Special Agent and Transnational Crime Technology Coalition Deputy CEO FBI Department of Special Investigation (DSI), Internet Watch Foundation Mike McCarter Stephanie Morris Thailand Michael Russo Microsoft Violence Prevention and Intervention Specialist Quirina Orozco Vice/Human Trafficking Detective Jay Lathwell Gundersen National Child Protection Training Prosecutor Sarah Preston Chandler Police Detective CEO Ada McCloud Center Sacramento County District Attorney’s Office Assistant District Attorney ROMI Analytics Program Administrator Collin County District Attorney’s Office Nicole Rye Children’s Advocacy Center of Texas Mika Moulton Laura Orr Special Agent Kevin Laws Founding Director LFMT-A Derek Prestridge Homeland Security Investigations Special Agent (Retired) Ann McGahuey Christopher’s Clubhouse Dallas Children’s Advocacy Center Lieutenant K & S Teaching and Consulting, LLC Country Officer Texas Rangers – Texas Crimes Against Malika Saada Saar US Department of State Joe Mullins Deena Ott Children Center Senior Counsel on Civil and Human Rights Kathleen Lefstad Forensic Imaging Specialist Long Term Case Manager Google Policy Manager Cathy McGoff National Center for Missing & Exploited Dallas Children’s Advocacy Center Eren Price Yahoo! Senior Manager for Law Enforcement and Children Assistant District Attorney Jad Saliba Information Security Katie Overman Dallas County District Attorney’s Office Founder and CTO Emily Lentz Google Jeff Nash Business Intelligence Specialist and Project Magnet Forensics Registered Dietician Director, Product Management Manager Edward Price Children’s Health Thomas McGreal BlueBear LES Dallas Children’s Advocacy Center Detective Sergeant/Task Force Officer Steve Salinas Instructor Michigan State Police/FBI SEMTEC Task Force Senior Product Marketing Manager Alexandra “Ale” Levi Wicklander-Zulawski & Associates, Inc Nicole Nearing Tink Palmer Guidance Software Forensic Interview Specialist Senior Law Enforcement Operations Analyst Founder Mikinzie Price Homeland Security Investigations Kendall McKimmey Kik Interactive, Inc. Marie Collins Foundation Executive Director Karina Samaniego Estrada Assistant District Attorney – Mental Health C/SARA Foundation Clinical Intake/Research Specialist Crystal Levonius Dallas County District Attorney’s Office Sasha Joseph Neulinger Laurel Whitney Parke Dallas Children’s Advocacy Center Assistant District Attorney Head of Production Policy Attorney Chris Priebe Collin County District Attorney’s Office Michael McMurray Step 1 Films Department of Family and Protective Services CEO Jason Sanchez Detective Two Hat Senior Operations Analyst Ben Lewis Dallas Police Department Wayne Nichols Carrie Paschall Yaana Technologies Computer Crime Specialist Detective Director of Forensic Services Sheilah Priori National White Collar Crime Center Cynthia Mejia Colin Henderson Police Department Dallas Children’s Advocacy Center Sexual Assault Medical Management Vincenzo Santini Outreach Coordinator, Partnerships US Army Assistant District Attorney Stacey Lewis National Center for Missing & Exploited Lynsey Nix Julie Peay Montgomery County District Attorney’s Office Counseling Services Supervisor, Licensed Children Assistant Attorney General Special Agent Ashley Rader Clinical Social Worker Office of the Attorney General for the District Homeland Security Investigations CPS Investigator IV/Alternative Response Mary Sawicki Lena Pope Kirsta Melton of Columbia Department of Family and Protective Services Senior Attorney Deputy Criminal Chief of the Human Trafficking John Penn II Association of Prosecuting Attorneys Child Chengos Lim and Transnational/Organized Crime Section Patricia Noble Senior Architect Law Enforcement Technologies Kristen Reeder Abuse Prosecution Project Content Safety Manager Office of the Texas Attorney General Assistant District Attorney Adobe Child Abuse Pediatrician Dropbox Dallas County District Attorney’s Office Children’s Health Andy Scheff Michelle Micks Kim Penna Dropbox Timothy Lott Law Enforcement Operations Analyst Kevin Norris Forensic Interview Specialist Lee Reiber Director, High-Tech Crime Training Services Kik Interactive, Inc. Deputy Chief Department of Homeland Security COO Scott Schofield SEARCH Ardmore Police Department Oxygen Forensics Special Agent Craig Miller Lee Pierson FBI SPEAKERS Jason Maguire Chief of Police Dan O’Donnell Assistant District Attorney – Chief, Mental Health Stephanie Revering Detective Dallas ISD Police Department OffenderWatch Division Chief of Police Amber Schroader Irving Police Department Dallas County District Attorney’s Office Crystal Police Department CEO Shannon Miller Darin Odier Paraben Corporation Assistant District Attorney, Crimes Against Detective, TFO SPEAKERS Lisa Maher John Pirics Valiant Richey Special Agent Children Division Indianapolis Metro Police Department, FBI Detective Senior Deputy Prosecuting Attorney Jimmy Schroering Louisiana Department of Justice Collin County District Attorney’s Office Carmel Police Department King County Prosecuting Attorney’s Office Co-Founder and President – Research & Development DME Forensics

64 65

DCAC-16-019 DCAC Conference Program_07mg.indd 64-65 7/29/16 11:52 AM Lisa Schuster Yiota Souras Amy Sweasy Brandie Wade Jimmy Widdifield, Jr. Pamela Womack Licensed Psychologist Senior Vice President and General Counsel Senior Assistant County Attorney Assistant District Attorney Licensed Professional Counselor Investigator Children’s Health, Children’s Medical Center National Center for Missing & Exploited Hennepin County Attorney Dallas County District Attorney’s Office Center on Child Abuse and Neglect Dallas County District Attorney’s Office Dallas Children Jim Tanner Lauren Wagner Travis Wiles Christine Womble Jim Sears Brian Sowa President High-Tech Crime Training Specialist Assistant District Attorney Assistant District Attorney Sergeant Vice President of Business Development KBSolutions SEARCH Dallas County District Attorney’s Office Dallas County District Attorney’s Office Irving Police Department (Retired) Marinus Analytics Sherre Thomas Michael Weber Andrew Willmann David Wren Jeff Shackelford B.J. Spamer Assistant District Attorney, Chief of CDC 5 Investigator Special Agent Founder & CEO Digital Forensic Specialist Director, NamUs Forensic and Analytical Services Dallas County District Attorney’s Office Tarrant County District Attorney’s Office FBI PassMark Software PassMark Software UNT Health Science Center/NamUs Christopher Thompson Lara Welch Joshua Wilson Hilary Wright Joy Lynn Shelton Richard Spradley Special Agent Forensic Interviewer Supervisory Special Agent Assistant District Attorney Crime Analyst Whooster FBI C/SARA Foundation FBI Dallas County District Attorney’s Office FBI – Behavioral Analysis Unit - III Crimes Against Children Thomas Stack Reynie Tinajero Melinda Westmoreland William Wiltse Matt Wright Human Trafficking Policy Analyst Deputy Chief Prosecutor Assistant Criminal District Attorney Executive Vice President Special Agent Joel Shoultz Maryland Governor’s Office on Crime Control Dallas County District Attorney’s Office Tarrant County District Attorney’s Office Child Rescue Coalition Homeland Security Investigations OffenderWatch and Prevention Chris Toplack Jeffrey Wherry Patrick Winn Mark Yarbrough Kathryn Sibley Horton Michael Staggs Client Success Manager Research Institute Director, Diplomate in Clinical Special Agent Motivational Speaker/Author PEI – Director of Research and Safety Senior Sales Engineer Media Sonar Psychology, ABPP FBI Self Texas Department of Family and Protective Nuix Dallas Children’s Advocacy Center Services Jon Turbett Mary Catherine Wirth Elizabeth Yusi JJ Staples Special Agent Carmen White Associate General Counsel, Director Assistant United States Attorney Geeta Singletary CEO Iowa Division of Criminal Investigation Assistant District Attorney of Trust & Safety US Attorney’s Office - Eastern District of Assistant District Attorney JJ Staples Enterprises Dallas County District Attorney’s Office Adobe Systems Incorporated Virginia Collin County District Attorney’s Office Billy Turner Michael Stern Corporal Tamasak Wicharaya Matt Wolozyn Eric Zimmerman Alix Skelton Computer Crime Instructor Ardmore Police Department Lieutenant General, Assistant Commissioner Senior Cyber Threat Investigator Senior Director Special Agent National White Collar Crime Center General LinkedIn Kroll Cyber Security FBI Darrel Turner Royal Thai Police Derek Stigerts Clinical and Forensic Psychologist Paul Wolpert Kim Skidmore Detective Private Practice Special Agent Forensic Interviewer Sacramento Police Department Homeland Security Investigations Dallas Children’s Advocacy Center Jeff Udvarhelyi John Strain Detective Kelly Slaven National Business Development Specialist Escondido Police Department/San Diego ICAC Director of Clinical Services OffenderWatch Task Force Dallas Children’s Advocacy Center Julia Strehlow James Valley THANK YOU TO THIS YEAR’S CONFERENCE Dale Smith Education and Outreach Manager Lieutenant Assistant District Attorney Chicago Children’s Advocacy Center Brown County Sheriff’s Office SCHOLARSHIP FUND CONTRIBUTORS Tarrant County District Attorney’s Office Mark Stringer Lisa van Heugten Denise Smith Forensics Trainer Manager, Law Enforcement Operations FOR THEIR GENEROUS SUPPORT Investigator, Investigations & Users Protection Magnet Forensics Kik Interactive, Inc. Google Joe Sullivan Damien Vaught Director of Behaviour Analysis and Forensic Stacie Smith Microsoft Psychology Therapist Mentor Forensic Services (Ireland) Dallas Children’s Advocacy Center Joseph Versace Programmer/Analyst Michael Sullivan Dianna Smoot Ontario Provincial Police Deputy Chief (Retired) Director of Community Education National Criminal Justice Training Center Dallas Children’s Advocacy Center Angela Vickers Medical Director

Sully Sullivan SPEAKERS Melissa Snow Sutter Medical Center Microsoft Cybertips and Legal Requests Child Sex Trafficking Program Specialist Microsoft National Center for Missing & Exploited Victor Vieth Children Senior Director and Founder Gundersen National Child Protection Training

SPEAKERS Kent Sommerfield Center BACA Texas State Vice President Bikers Against Child Abuse James Voutour Sheriff Niagara County Sheriff’s Office

66 67

DCAC-16-019 DCAC Conference Program_07mg.indd 66-67 7/29/16 11:52 AM EXHIBITOR INFORMATION EXHIBITORS EXHIBITORS

AccessData Atola Technology Berla Corporation www.accessdata.com www.atola.com www.berla.co EXHIBITOR SCHEDULE AccessData Group has pioneered software FAST FORENSIC IMAGING, EVEN WITH Berla’s team of digital forensic and cyber security to support digital forensics and e-discovery DAMAGED DRIVES! Get more digital evidence experts stays ahead of the curve providing MONDAY WEDNESDAY for more than 25 years. Over that time, the faster with the first and only forensic data solutions for extracting data used to solve cases, TUESDAY FIRST FLOOR: 7:00 AM-6:30 PM FIRST FLOOR: 7:00 AM-5:00 PM company has grown to provide both stand- acquisition tool that works with both good and and preventing vehicle network breaches before BOTH FLOORS: 7:00 AM-5:00 PM alone and enterprise-class solutions that damaged hard drives. Atola Insight Forensic can they occur. SECOND FLOOR: 7:00 AM-6:30 PM SECOND FLOOR: 7:00 AM-3:00 PM synergistically work together to support both retrieve data from drives so badly damaged no 2nd Floor, Booth 15 criminal investigations and civil eDiscovery. other device can even detect them. It is also AccessData® offers comprehensive coverage the only forensic imager that can perform BIS Digital Inc. Exhibit Hall | 1st Floor | Dallas Foyer of the EDRM, from identification through final diagnostics. Atola created Insight Forensic in www.bisdigital.com review and production. With a single product collaboration with military and law enforcement BIS has the unique ability to integrate Exhibit Hall 45 64 65 84 85 platform and shared backend database built on agencies, private investigators and forensic communication, recording and multi-media the company’s forensics technology, Forensic experts from around the world. We have system solutions with computers, networks, 1ST FLOOR 46 63 66 83 86 Toolkit® (FTK®), the company’s eDiscovery completely automated the entire forensic data sound systems, video systems, camera Dallas Foyer 000000 BREAK AREA BREAK AREA BREAK AREA solutions help litigation teams control the recovery process including diagnosing, imaging, and video recording systems, presentation 47 62 67 82 87 Break Area 101- volumes of data, mitigate risk associated with data recovery and reporting. Visit our booth technology systems, hearing impaired devices, 104 000000 48 61 68 81 88 data movement and reduce eDiscovery spend. for a quick demo to see why so many forensic digital audio and video recording software and More than 130,000 customers in corporations, professionals rely on Insight Forensic for their operating systems for our customer’s mission 000000 49 60 69 80 89 100 law firms, law enforcement and government most important work. critical applications. From concept to completion, 0 .oo. 0 agencies around the world, rely on AccessData 2nd Floor, Booth 23 BIS Digital provides total turnkey solutions and software solutions. integrated systems based upon the specific 000000 50 59 70 79 90 99 2nd Floor, Booth 37 Attorney General of Texas Crime needs of our users. BIS has a solid reputation Victim Services Division for reliable service, expertise in the industry and 000000 51 58 71 78 91 98 ADF Solutions, Inc. www.texasattorneygeneral.gov a knowledgeable detail orientated sales staff. Stop-N-Go Lunch Counter www.adfsolutions.com The Crime Victims’ Compensation Program is Our thoroughly trained in-house technicians 77 52 57 72 92 97 ADF Solutions, is the market leader in media dedicated to ensuring that victims of violent and service department are available 24/7/365 53 56 73 76 93 96 exploitation and digital forensic triage tools used crime are provided financial assistance for crime for direct online support as well as on-site for scanning computers and peripheral devices. related expenses that might not be covered emergency service. 54 55 74 75 94 95 Leveraging an intelligence-led approach, these by other resources. The fund can help eligible 2nd Floor, Booth 33 easy-to-use tools rapidly extract actionable victims pay for medical or counseling bills or intelligence to help identify and capture cover the cost of a funeral for a loved one who BlackBag Technologies ESCALATORS from Second Floor Exhibit Hall suspects who are a threat to public safety or has been killed. www.blackbagtech.com • 1111 11 BlackBag Technologies develops innovative 1 1K\ national security, and accelerate prosecution 1st Floor, Booth 81 ENTRANCE1�ui��1 1111 11 1 of criminals. These proven tools are actively forensic acquisition and analysis software for used by field operatives in defense, intelligence, Belkasoft Mac OS X, iPhone/iPad, Windows and Android law enforcement, border security, and other www.belkasoft.com devices. Our software is used by hundreds government agencies worldwide. Founded in 2002, Belkasoft is a global leader of federal, state, and local law enforcement Exhibit Hall 1st Floor, Booth 64 in digital forensics technology, known for their agencies around the world for criminal sound and comprehensive forensic tools. With investigations, as well as leading corporations 2ND FLOOR Association of Prosecuting Attorneys’ a team of professionals in digital forensics, data and consultants handling HR investigations Lone Star Foyer Exhibit Hall | 2nd Floor | Lone Star Foyer Child Abuse Prosecution Project recovery and reverse engineering, Belkasoft and eDiscovery matters. We also develop and www.apainc.org/child-abuse- focuses on creating technologically advanced deliver expert forensic training and certification prosecution-project yet easy-to-use products for investigators and programs, designed for both novice and 12 11 10 9 5678 4 123 EXIT to The Child Abuse Prosecution Project of the forensic experts to make their work easier, faster, experienced forensic professionals. Courses Skybridge Association of Prosecuting Attorneys is proud and more effective. With this focus in mind, include classroom instruction, demonstration, to be part of the 28th Annual Crimes Against Belkasoft introduces their flagship product, and practical hands-on experience to 44 Children Conference. This Project, a VOCA- Belkasoft Evidence Center – an easy-to-use, accommodate a variety of learning styles and funded training and technical assistance integrated solution for collecting and analyzing maximize the learning experience. Most notably, 43 resource for child abuse prosecutors and allied digital evidence from mobile and computer we offer free tool training for BlackLight, our professionals, recently unveiled its project goals devices. Customers in law enforcement, police, premiere forensic analysis software. 42

Registration for this year. Stop by our booth to obtain an military, business, intelligence agencies, and 2nd Floor, Booth 19 13 14 18 19 23 24 28 29 33 35 36 38 inaugural copy of our newsletter, Lex Enfants, forensic laboratories in 70+ countries worldwide 41 and learn more about how APA’s Child Abuse use Belkasoft Evidence Center to fight homicide, Bluebear LES 15 20 25 30 34 37 Prosecution Project can help you help the most crimes against children, drug trafficking, www.bb-les.ca 40 Our LACE software is designed to enable an 1617 2122 2627 3132 vulnerable of our victims: our children. data leakage, fraud, and other online and ESCALATORS to First Floor Exhibit Hall investigator to review all visual content (images & 39 1st Floor, Booth 68 offline crimes. 2nd Floor, Booth 21 videos) of confiscated devices quickly, efficiently, and with minimal stress. Fully compatible with Project-Vic, LACE is the ideal replacement for existing C4All installation with minimal training.

68 69

DCAC-16-019 DCAC Conference Program_07mg.indd 68-69 7/29/16 11:52 AM LACE is a fully supported, robust and stable of missing, abducted and exploited children. including Internet dangers and cyber bullying. quietly while providing emotional support and FBI Behavioral Analysis Unit a mission-critical foundation of applications Client-Server software that can process 1M The goal of CMACO is to provide a platform The program was guided and inspired by the acceptance. Research has proven that contact www.fbi.gov that have been deployed on an estimated 25 images in less than 3 hours with over 90% for communication and collaboration between Internet Crimes Against Children Task Force, with a therapy dog can lower blood pressure, The FBI’s Behavioral Analysis Unit 3 (BAU-3) million endpoints and work in concert with other EXHIBITORS automated categorization. This includes the these organizations. Through training, technical and has won 4 national awards for children’s decrease the heart rate and calm other anxiety provides behaviorally-based operational support leading enterprise technologies from companies capability to automatically categorize images and assistance, travel scholarships and web- education and social issues. related symptoms that are often associated and training to law enforcement agencies such as Cisco, Intel, Box, Dropbox, Blue Coat videos with its Image Mark zero false positive based meeting opportunities, CMACO creates 1st Floor, Booth 73 with the type of emotional trauma victims involved in the investigation of crimes against Systems, and LogRhythm. Our field-tested and visual matching and also detect, extract, and a community where non-profits share best have experienced. child victims. BAU-3 staff members also conduct court-proven solutions are used with confidence match faces. practices and resources with others who doing Cortexflo 1st Floor, Booth 91 research intended to gain a better understanding by 74 of the Fortune 100 and hundreds of EXHIBITORS 2nd Floor, Booth 5 similar work. Membership is free for non-profits www.cortexflo.com of the motivations and behaviors of offenders agencies worldwide. working on missing, abducted, and exploited Cortexflo is an innovative, easy to use system DeliverFund who target children. Insights gained through 2nd Floor, Booth 27 Book Woman children’s issues. CMACO is a project of The built specifically to photograph and video www.deliverfund.org BAU-3 research are refined into investigative 1st Floor, Booths 46–47 Center for Innovation and Resources Inc. and forensic medical examinations. It also provides DeliverFund is a registered nonprofit organization suggestions and techniques, which are Hawk Analytics is funded by the Office of Juvenile Justice Advocacy Centers with a secure process to (501c3) comprised of individuals from the used in support of BAU-3’s operational and www.hawkanalytics.com Callyo and Delinquency Prevention. Find out more store and archive cases as well as the ability to highest level of the US Special Operations and training missions. Hawk Analytics’ feature product, CellHawk, www.callyo.com at www.cmaco.org. automatically encrypt content for peer review. Intelligence Communities. DeliverFund disrupts 1st Floor, Booth 99 extracts rapid answers and compelling visual Callyo is the world’s #1 mobile phone technology 1st Floor, Booth 62 It has been designed to be as non-intimidating global Human Trafficking Markets by combining evidence from cell phone call detail records for law enforcement to catch and prosecute as possible to children and to minimize any uniquely qualified personnel with the best FBI Violent Crimes Against Children (CDRs) and other location-based data. Get child predators, human traffickers, and those Child Welfare Information Gateway further trauma by reducing the duration of technologies, and then leveraging them in new www.fbi.gov Answers: Turn all your raw data into meaningful who would exploit our children. www.childwelfare.gov the examination. ways to reach and rescue the victims of human The mission of the Violent Crimes Against answers. Save Time: An analysis that took 8 2nd Floor, Booth 43 Child Welfare Information Gateway provides 1st Floor, Booth 60 trafficking. We partner with law enforcement Children program is to provide a rapid, hours in Microsoft Streets and Trips was redone access to timely, practical resources that help to provide the additional data and intelligence proactive, and comprehensive capability to in CellHawk in less than 30 minutes. Canine Companions for Independence child welfare, adoption, and related professionals Crimes Against Children Conference/ that they need to do their jobs: to save lives counter all threats of abuse and exploitation to 1st Floor, Booth 65 www.cci.org protect children and strengthen families. DCAC Sales Booth and rescue those unable to find a way out on children which may be investigated under the Help is a four-legged word. Founded in 1975, 1st Floor, Booth 84 www.dcac.org their own. We are law enforcement’s biggest jurisdiction and authority of the FBI. The VCAC HTCI EDAS FOX Canine Companions for Independence is a non- Stop by the Crimes Against Children’s supporter and we advocate on their behalf by collaborates with Federal, State, local, tribal, www.edasfox.com profit organization that enhances the lives of Children’s Advocacy Centers of Conference/DCAC sales booth to purchase your outlining strategic intelligence opportunities that and international partners through investigative A leading provider of forensic computers to the people with disabilities by providing highly trained Texas, Inc. conference t-shirts and sweatshirts, as well as allow their success rate in rescue and arrests assistance, training, intelligence-sharing and law enforcement community for over 9 years, assistance dogs and ongoing support to ensure www.cactx.org our nationally relevant child abuse education to be that much higher. technical support. the EDAS FOX systems are designed and built quality partnerships. Headquartered in Santa ™ Children’s Advocacy Centers of Texas, materials. We offer video-based curriculum 1st Floor, Booth 93 1st Floor, Booth 98 for your workflow process. Led by a retired Rosa, California, Canine Companions is the Inc. (CACTX) is the statewide membership packages for mandated reporters, Spanish law enforcement officer who began his career largest non-profit provider of assistance dogs, association representing all local children’s speakers, parents, and children. Want to see Digital Intelligence, Inc. FIVE O Gear, LLC in digital criminal investigations over 20 years and is recognized worldwide for the excellence advocacy centers in the Lone Star state. the curriculum in action? Attend Recognizing and www.digitalintelligence.com www.fiveogear.com ago, EDAS FOX continues it’s leadership by of its dogs, and the quality and longevity of the Founded in 1994 with a membership of 13 Reporting Child Abuse on Thursday at 8:30AM Digital Intelligence is the industry recognized FIVE O Gear LLC is owned and operated by backing our machines with an unprecedented matches it makes between dogs and people. The local centers, today the CACTX membership and our Spanish Recognizing and Reporting, leader in the design and manufacture of digital Christian Cops from Knoxville, TN. This company 3 year warranty. Stop by our booth to check out result is a life full of increased independence roster includes 69 developing and established Como Reconocer y Reportar el Abuso Hacia forensic workstations. A pioneer in the industry provides the newest emblem for law enforcement the EDAS FOX. and loving companionship. centers in large urban cities as well as in small Menores on Wednesday at Noon for a chance for over 15 years, their innovative designs and and proudly represents the selfless heroes that 2nd Floor, Booth 18 1st Floor, Booth 49 rural communities. Our membership reflects the to win a complimentary curriculum set. versatile selection of systems, write blockers serve and protect our community 24/7/365. The vast diversity of Texas, all with their own unique 1st Floor, Booths 76–78 and peripheral items provide any forensic unit emblem is sold on Faith based t-shirts, hats, International Association of Cellebrite Inc. approaches to fulfilling our shared mission of their exact needs. bags, knives, patches, decals, license plates, Forensic Nurses www.cellebrite.com protecting and providing for children. Dallas Police Explorers 1st Floor, Booth 90 watches and much more. www.forensicnurses.org Cellebrite is the world leader in delivering 2nd Floor, Booth 26 www.dallaspoliceexplorers.com 1st Floor, Booths 87–88 The International Association of Forensic cutting-edge mobile forensic solutions. Cellebrite The Dallas Police Explorer program is for DME Forensics Nurses provides leadership in forensic nursing provides flexible, field-proven and innovative Columbia Southern University young people aged 14–21 who are interested www.dmeforensics.com Griffeye by developing, promoting, and disseminating cross-platform solutions for lab and field via www.columbiasouthern.edu in law enforcement as a possible career. DME Forensics is an innovative technology and www.griffeye.com information and education internationally. The its UFED Pro and UFED Field Series. The Columbia Southern University provides an Explorers participate in weekly meetings that services company focused on providing software, We provide the world’s premier intelligence and Association has two technical assistance projects company’s comprehensive Universal Forensic alternative to the traditional university experience teach them about law enforcement, as well training and digital & multimedia evidence visual big data platform for collecting, processing, funded by the Office on Violence Against Women Extraction Device (UFED) is designed to meet for busy, working adults. CSU offers online as life skills to prepare them to become the analysis to the criminal justice and civil litigation analyzing, visualizing and managing images and around the National Protocol for Sexual Assault the challenges of unveiling the massive amount associate, bachelors and master’s degrees leaders of tomorrow. Explorers compete in law communities. Our flagship software product, videos. Analyze is the leading technical solution Medical Forensic Exams Adult/Adolescent of data stored in the modern mobile device. The and certificate programs in fields such as fire enforcement competitions around the country, DVR Examiner, has revolutionized the process to efficiently process large volumes of images and the new Pediatric Protocol. For more UFED Series is able to extract, decode, analyze administration, occupational safety and health, exposing them to leadership opportunities. of recovering video evidence from DVRs and is and videos, screen out irrelevant digital files and information visit www.iafn.org, www.safeta.org and report data from thousands of mobile criminal justice, public administration and Community service is required and becomes used by hundreds of federal, state, local and aid the user in identifying the most pertinent and www.kidsta.org. devices, including, smartphones, legacy and business administration. With affordable tuition instilled as a character trait with our Explorer international law enforcement agencies. Many material through automated routines and visual 1st Floor, Booth 80 feature phones, portable GPS devices, tablets, rates, textbooks provided by the CSU Book Grant youth and is a leadership quality the Dallas Police DVRs you may encounter have archaic menu navigation, and is used by law enforcement memory cards and phones manufactured with and flexible online classes, CSU understands Explorer program embraces. The program is systems and frustratingly slow exports. DVR agencies worldwide. International Justice Mission Chinese chipsets. With more than 30,000 units the concerns of adult learners. Our dedicated funded by donations made to the Dallas Police Examiner allows you to recover video from the 2nd Floor, Booths 39–40 www.ijm.org deployed across 100 countries, UFED Series staff and expert faculty follow the university’s Youth Foundation. DVR hard drive directly. This allows you to save International Justice Mission is a global is the primary choice for forensic specialists. principles of providing excellent service and an 1st Floor, Booth 66 time, bypass passwords and recover evidence Guidance Software organization of law enforcement professionals, 2nd Floor, Booths 28–29 adaptable learning experience to ensure student from non-functioning DVRs in a forensically www.guidancesoftware.com social workers, lawyers, and activists working to success. Visit www.ColumbiaSouthern.edu or DCAC Animal Assisted sound manner. With over 30 years combined At Guidance, we exist to turn chaos and the protect the poor from violence in the developing Center for Missing and Abducted call 800-977-8449 to learn more! Therapy Program experience in the digital & multimedia evidence unknown into order and the known–so that world, addressing cases of online crimes against Children’s Organization (CMACO) 1st Floor, Booth 59 www.dcac.org/therapy field, our team has the expertise required to companies and their customers can go about children, trafficking, and slavery. Our work www.cmaco.org At the Dallas Children’s Advocacy Center, assist you in this fast changing discipline. their daily lives without worry or disruption, happens by rescuing victims, bringing criminals The Center for Missing and Abducted Children’s Connect2annica therapy dogs offer a unique form of support to 2nd Floor, Booth 34 knowing their most valuable information is to justice, restoring survivors, and strengthening Organizations (CMACO) is an organization www.connect2annica.com children and families. Therapy dogs are different safe and secure. Makers of EnCase®, the justice systems. dedicated to providing support to non- Connect2annica specializes in educating from service dogs in that they do not provide gold standard in digital investigations and 1st Floor, Booth 63 profits who serve families and communities children to the dangers of modern day threats, physical assistance but do their work by sitting endpoint data security, Guidance provides

70 71

DCAC-16-019 DCAC Conference Program_07mg.indd 70-71 7/29/16 11:52 AM INTERPOL Washington Complete Field Forensic Investigation Unit. The Midwest Regional Children’s National White Collar Crime state of the art technology to obtain evidence operatives that lead coordinated identification www.justice.gov/interpol-washington Forensic investigator can perform multiple tasks Advocacy Center Center – NW3C in real time. and extraction efforts. Once victims are rescued, INTERPOL Washington, the United States on the same unit: Multiple Forensic Parallel www.mrcac.org www.nw3c.org 1st Floor, Booths 101–104 a process involving justice for the perpetrators EXHIBITORS National Central Bureau, serves as the designated Simultaneous Imaging with extreme speed Midwest Regional CAC is committed to providing For more than three decades, NW3C has and recovery for the survivors begins. We work representative to the International Criminal up to 31GB/min, Cellphone Data Extraction, affordable, accessible, and cost-effective supported state, local, federal and tribal law Nuix with local law enforcement and prosecutors by Police Organization (INTERPOL) on behalf of Triage Data Collection, Virtual Drive Emulator, training methods for MDTs utilizing the latest enforcement and prosecutorial and regulatory www.nuix.com assisting them with hard assets, technology, the Attorney General. INTERPOL Washington is Full Forensic Analysis all in one easy to carry technology and research to deliver timely, agencies efforts to prevent, investigate and Nuix protects, informs, and empowers society financial assistance, training, and expertise in the official U.S. point of contact in INTERPOL’s case. The great benefit of the device is that it relevant and impactful programs. prosecute economic and high-tech crime. NW3C, in the knowledge age. Leading organizations undercover operations. EXHIBITORS worldwide, police-to-police communications consolidates many forensic tools in one unit. 1st Floor, Booth 55 a nonprofit organization, is funded primarily by around the world turn to Nuix when they 1st Floor, Booth 95 and criminal intelligence network. A component As a Forensic imaging unit: The unit is running grants through congressional appropriations need fast, accurate answers for investigation, of the U.S. Department of Justice (DOJ), very efficient Linux application, easy to use, MSAB from the U.S. Department of Justice, Bureau cybersecurity incident response, insider threats, Oxygen Forensics INTERPOL Washington is co-managed by the all with touchscreen icons, in multiple session www.msab.com of Justice Assistance. By continually evolving litigation, regulation, privacy, risk management, www.oxygen-forensics.com U.S. Department of Homeland Security (DHS) operations, parallel computation, optimized for MSAB is the pioneer in forensic technology to meet law enforcement’s needs in today’s and other essential challenges. Nuix makes Oxygen Forensics is the worldwide leading maker pursuant to a Memorandum of Understanding multi-core CPU, and in extremely fast imaging for mobile device examination. With offices digital age, NW3C delivers no-cost, cutting- small work of big data volumes and complex of the advanced forensic data examination tools that ensures a continuing commitment to the operation which can be crucial for field operation. worldwide, and our products in over 100 edge classroom and online trainings in areas file formats. Our solutions combine advanced for mobile devices. The company is dedicated to guidance and oversight of the organization and As a platform, the investigator can use the unit countries, we have a global reach. The company of cybercrime, financial crime and intelligence technology with the extensive knowledge of delivering the most universal forensic solution reinforces its role in effectively sharing and to run many tasks like Cellphone Data Extraction has been involved with mobile communications analysis. In the past five years, more than our global team of industry experts. We bring covering the widest range of mobile devices exchanging international criminal investigative and Full Forensic Analysis on the captured data, since 1984 and has a singular focus on the 40,000 law enforcement professionals have data to life with clarity and intelligence to solve running Android, iOS, Blackberry, Windows and humanitarian assistance information. with better performance than a laptop and it forensic recovery of data from mobile devices. attended classroom trainings and over 24,000 critical business problems, reduce crime, and Phone, Symbian and other operating systems. 2nd Floor, Booth 16 saves the need to carry laptops with many Please inquire about our free workshop during have taken advantage of the online trainings. secure and manage information. Oxygen Forensics customers include US and write-blockers. the conference. 1st Floor, Booth 89 2nd Floor, Booths 7–8 European federal and state agencies, such as the K&S Teaching and Consulting, LLC 1st Floor, Booth 67 2nd Floor, Booth 14 IRS, US Army, US Department of Defense (DOD), www.kandsteaching.com Navajo Jewelry and Crafts OffenderWatch US Department of Justice, US Department If you or your organization are looking for a week Media Sonar National Criminal Justice Training Specializing in handcrafted sterling silver jewelry www.watchsystems.com of Homeland Security, US Department of long, hands-on online undercover chat training, www.mediasonar.com Center of Fox Valley Technical College made by family and extended family from the OffenderWatch® is the nation’s leading Transportation, US Postal Service, US Supreme consider us. I designed and began teaching my Media Sonar is a leading social media monitoring www.ncjtc.org Navajo, Zuni, and Santo Domingo tribes of New sex offender management and community Court, European Commission, and many others. “On-line Undercover Chat Investigations” course and online data discovery platform. Social media The National Criminal Justice Training Center Mexico. Handcrafted with all natural stones and notification solution. Over 3,500 Federal, We also work with Big Four companies, like approximately 8 years ago. I have taught this data monitoring and analysis provides a great (NCJTC) of Fox Valley Technical College, one of shell, turquoise, onyx, opals, spiny oyster shell, State, and local law enforcement agencies PricewaterhouseCoopers, Ernst & Young and course in various states across the United States. opportunity to support a holistic discovery the leading national criminal justice educators, and many others. utilize OffenderWatch to manage over 60% of many others. I have also taught various courses concerning process, whether that is helping to diffuse offers expert facilitated training and technical 1st Floor, Booth 54 the nation’s registered sex offenders. Watch 2nd Floor, Booth 24 the sexual exploitation of children all over the potentially volatile situations from escalating, assistance. Flexible, diverse and innovative Systems is a proven technology partner and world: Mexico, Peru, Russia, China and Spain. or as a tool to help with investigations. Consider child protection courses are available to Network Ninja consultative resource to law enforcement Paraben Corporation 1st Floor, Booth 75 the possibilities and improved decision-making federal, state, tribal, and local criminal justice www.networkninja.com delivering solutions that ensure statutory www.paraben.com capabilities that come as a result of being able to professionals. Training topics include: Bullying Network Ninja’s “Collaborate” product is a compliance, increase agency efficiency, and Paraben has been a foundation in solutions Magnet Forensics interact accurately and in real-time with location and Cyber Bullying, Child Abuse, Child Homicide, customizable case management software effectiveness, and reduce IT costs while for mobile devices, smartphones, email, and www.magnetforensics.com and non-location based data aggregated from Commercial Sexual Exploitation of Children, for non-profits and social services agencies. providing the most timely and accurate safety gaming system forensics. Paraben has been Magnet Forensics is a global leader in the major social media networks in to a single, Computer Facilitated Crimes Against Children, Used by Children’s Advocacy Centers and Rape information the public. forging new approaches for dealing with digital development of digital forensics software that easy-to-use platform. Media Sonar has proven Forensic Interviewing, Human Trafficking, Treatment Centers nationwide, it can be deployed 2nd Floor, Booth 1 evidence from logical and physical images of recovers evidence from computers, smartphones successes in helping to stop crisis scenarios Missing and Abducted Children, Underage on an individual or statewide basis to manage smartphone to development into the Forensics and tablets. The company’s flagship product, including child pornography, self-harm, including Alcohol and Drug Use, Youth Focused Community everything from initial intake to prosecution Office of Justice Programs of Things (FoT). Paraben supports end to end Internet Evidence Finder™(Magnet IEF), was suicide prevention, human trafficking and gang Policing, and Youth Suicide Prevention. Through outcome – sophisticated reporting, too. www.ojp.gov solutions for digital evidence. created by a former police officer and forensic related activities to name just a few. Visit us at community partnership, NCJTC training and 2nd Floor, Booths 31–32 The Office of Justice Programs (OJP) provides 2nd Floor, Booth 9 examiner who recognized the need for a tool to www.mediasonar.com for more information. technical assistance programs have increased innovative leadership to federal, state, local, help digital forensics professionals find, analyze, 2nd Floor, Booth 38 awareness of crimes against children. North Texas Regional Computer and tribal justice systems, by disseminating Parabon Snapshot DNA Phenotyping and report digital evidence. Since its inception in 1st Floor, Booths 85–86 Forensics Laboratory state-of-the art knowledge and practices snapshot.parabon-nanolabs.com 2011, Magnet IEF has quickly become a trusted Microception, Inc. www.rcfl.gov/north-texas across America, and providing grants for the Snapshot is a revolutionary new forensic DNA solution for thousands of customers working in www.microception.com National Missing and Unidentified The primary mission of the North Texas Regional implementation of these crime fighting strategies. analysis service that accurately predicts the the world’s top law enforcement, government, Meta, the next generation of interview recording, Persons System (NamUs) Computer Forensic Laboratory (NTRCFL) is Therefore, OJP does not directly carry out law physical appearance and ancestry of an unknown military, and corporate organizations. It evidence and case management platform, is www.namus.gov to serve the computer forensics needs of all enforcement and justice activities. Instead, OJP person from DNA. It can also determine kinship is currently used by 2,700 public safety a web-based application framework whose The National Missing and Unidentified Persons law enforcement agencies and departments works in partnership with the justice community between DNA samples out to six degrees of organizations in 92 countries. modules share common services such as System (NamUs) offers free forensic, analytical, in the North Texas Region. The NTRCFL to identify the most pressing crime-related relatedness. Snapshot is ideal for generating 2nd Floor, Booth 3 access control, data authentication, security, and investigative resources to law enforcement will provide quality technical and scientific challenges confronting the justice system and investigative leads, narrowing suspect lists, and licensing, syslog, audit trails, notification, backup, agencies, medical examiners, and coroners investigative capabilities, forensic services, and to provide information, training, coordination, identifying unknown remains. Marinus Analytics, LLC and internationalization. The modules include: across the United States to resolve missing expert testimony. Our services help support and innovative strategies and approaches for 2nd Floor, Booth 20 www.marinusanalytics.com MetaCase™– Case management that is simple, and unidentified person cases. With funding investigations that are reliant upon digital addressing these challenges. Created by Marinus Analytics in 2011, Traffic powerful, and customizable. MetaInterview™– from the National Institute of Justice, NamUs evidence, namely through the acquisition, 1st Floor, Booth 83 PassMark Software – OSForensics Jam is a revolutionary software tool that Interview room recording that integrates with provides forensic anthropology, forensic preservation, examination, and presentation www.osforensics.com empowers law enforcement in their fight against MetaCase. MetaForms™– Forms management odontology, fingerprint examination, and DNA of digital information in computers and other Operation Underground Railroad PassMark Software is a privately owned software sex trafficking. including an easy forms designer, import, profiling for upload to the Combined DNA electronic devices. The NTRCFL will provide www.ourrescue.org development group founded in 1998. PassMark 1st Floor, Booth 45 export, publishing of surveys, and export or Index System (CODIS), all at NO COST to training to agencies and departments in the Operation Underground Railroad is a non-profit specializes in a range of products including one-click graphical charting of data. MetaCase investigating agencies. proper techniques for seizing, storing, and that was created in December 2013. We’ve OSForensics. OSForensics is a robust computer MediaClone bundled with MetaForms is called MetaTrack.™ 1st Floor, Booth 79 analyzing digital evidence. In appropriate cases, gathered the world’s experts in extraction forensics toolkit that rivals all other existing www.media-clone.net MetaImage™– Image management for the NTRCFL will assist in ongoing investigations operations and in anti-child trafficking efforts solutions in both features and functionality, as MediaClone, Inc. – the manufacturers of CSI photographers. of computer crime and cyber terrorism, using to bring an end to child slavery. O.U.R.’s well as cost. With our unique approach to digital Computer Forensic Tools and IT Solutions. 1st Floor, Booth 72 Underground Jump Team consists of former CIA, investigation, OSForensics gives investigators The SuperImager Plus line of products is a Law Enforcement, Navy SEALs, and Special Ops a complete, “turn-key” computer forensics

72 73

DCAC-16-019 DCAC Conference Program_07mg.indd 72-73 7/29/16 11:53 AM solution with features including: Advanced SEARCH SRT Wireless mobile devices and other digital media. Compact state and local levels, affordable training and organizations to aid in the fight against illegal Drive Imaging, Automatic Volume Shadow www.search.org www.srtgrp.com and easy to learn, the tools offer non-experts exemplary member support. content. We have done extensive work with Copy Support, Instant Deleted File Recovery SEARCH’s High-Tech Crime Training Services SRT Wireless, the commercial and law the ability to acquire data in a forensic manner. 1st Floor, Booth 69 large international crime-fighting organizations. EXHIBITORS (MFT), Customized Data Carving, Ultra-Fast is comprised of a team of experts who provide enforcement company within The SRT Group, Teel Technologies strives to offer the highest Videntifier’s state of the art camera identification Drive Indexing & Search Features, Advanced technical assistance and training to local, state, helps federal, state and local law enforcers level of customer service and quality products Tri-Tech Forensics allows law enforcement agencies to investigate File System Browser, Email Viewer, Raw Disk and federal justice and public safety agencies do their jobs better with investigative to its customers. www.tritechforensics.com whether images found on networks have been Viewer, Internal Web Browser, SQLite Browser, nationwide. Through training classes, technical technologies that are faster, easier, smarter, 1st Floor, Booth 97 Our mission at TRITECH FORENSICS is to taken with cameras linked with illegal actives VM Mounting, Recent Activity (Triage) & System workshops and hands-on assistance, SEARCH and more affordable. In fact, SRT Wireless is provide state-of-the-art products and supplies to and to investigate whether individual devices EXHIBITORS Information features, Prefetch Viewer, Event trains and assists investigators in methods to the leading provider of Wi-Fi signal technology Texas A&M University-Commerce forensics professionals in all arenas. From field have been linked to illegal content or visual Log Viewer, and many more. You can even prevent, detect, and investigate instances of and training for law enforcement purposes, www.tamuc.edu/msac to lab to court to detention facilities, TRITECH evidence. Videntifier has its roots in the database install it all to a USB drive for live-analysis in individuals using technology to exploit children. including access point and station discovery, Need a Graduate Degree to advance your career? FORENSICS is your partner for exceptional laboratories of Reykjavik University, Iceland. the field. No hassles. No gimmicks. Only $799. Training courses are offered nationwide through surveillance, interception and targeting. SRT The Master of Science in Applied Criminology products at reasonable prices. To browse First Floor, Booth 96 OSForensics…Digital investigation for a new era. SEARCH’s outreach training program. These Wireless has recently begun advanced Wi-Fi Program is designed to meet the needs of working our product line, please visit our website at 2nd Floor, Booth 10 efforts focus on systems security, computer training for law enforcement with the addition professionals seeking promotional opportunities tritechforensics.com. Vigilant Solutions forensics, digital data recovery, and investigations of the Certified Wireless Network Professional or administrative positions in the criminal justice 2nd Floor, Booth 36 www.vigilantsolutions.com Pen-Link, Ltd. involving the Internet, social networking sites, offerings. Additionally, SRT offers operational industry. The program is 100% ONLINE and Vigilant Solutions’ license plate recognition (LPR) www.penlink.com local area networks, and online child exploitation. support in Wi-Fi situations with our equipment students can earn their degree in as little as Two Hat offering includes mobile and fixed LPR camera www.communitysift.com In business for over 25 years, Pen-Link, Ltd. 1st Floor, Booth 92 and personnel at the scene with your agents/ 18 months. Students can specialize in General systems, commercially generated LPR data, provides law enforcement and intelligence officers/deputies. We are the only truly complete Criminology, Criminal Justice Administration & Two Hat is pioneering new ways to automate hosted LPR analytics, and more. Vigilant’s facial agencies with state-of-the-art software and Sirchie solution for Wi-Fi based investigations. Management, or Homeland Security. Contact online safety. Their flagship product, Community recognition offering consists of a hosted gallery Sift, empowers human moderation through best- systems for the collection, storage, and analysis www.sirchie.com 2nd Floor, Booth 11 Louis Lufkin for more information. Louis.Lufkin@ of over 14 million known individuals, hosted of telephonic- and IP-based communications. For 89 years and counting and in more than 120 tamuc.edu or 903-468-8226. in-class automation. The advanced software acts software for matching images of unknown Pen-Link’s software and systems are widely countries, we continue to be a trusted partner to SUMURI LLC. 2nd Floor, Booth 17 as a protective layer for social platforms, keeping individuals against the gallery, and software for recognized as industry standards, with the global law enforcement, security, education, www.sumuri.com trolls, cyberbullying, and hate speech at bay. real-time monitoring of existing video cameras thousands of licensed law enforcement and and public service communities. Our customers SUMURI is a leading worldwide provider of Texas Department of Public Safety Community Sift currently services communities for known individuals of interest. Learn more intelligence users in federal, state, and local work to make communities safer using Sirchie solutions for digital evidence and computer www.joindps.com spanning over 195 countries worldwide and is at vigilantsolutions.com. agencies worldwide. Pen-Link systems are products and vehicles to respond, investigate, forensic Training, Hardware, Software and Texas Department of Public Safety is now taking under contract to process 4 billion messages 2nd Floor, Booth 12 widely favored because they not only excel at analyze, support, and educate. All levels of Services. SUMURI is also the developer of applications for Trooper Trainee 2017 Recruit a day. ® intelligence gathering and live collection, but they government, law enforcement, corrections, the industry standard PALADIN Forensic Schools. 1st Floor, Booth 82 (The) VIRTUS Programs, NCS Risk also bring to bear a powerful suite of reporting medical systems, educational institutions, Suite, RECON for Mac OS X, CARBON 1st Floor, Booth 100 Services, LLC and analytical tools; the type of functionality security firms, corporations, and more employ Virtual Forensic Suite and TALINO Forensic United States Marshals Service www.virtus.org that is essential in drilling down through today’s Sirchie solutions, such as our forensic evidence Workstations. SUMURI LLC was founded in Texas Legal Services Center/LASSA www.usmarshals.gov VIRTUS® is the brand name that identifies best- extensive data sets to reveal relationships that collection kits, to reduce uncertainty in their 2010 by Steve Whalen, a retired State Trooper, www.tlsc.org The United States Marshals Service is the practices training programs designed to help might otherwise go undetected. environment. Our commitment is unwavering to and a longtime active member and supporter LASSA, Legal Aid for Survivors of Sexual Assault, nation’s oldest law enforcement agency. The prevent wrongdoing and promote “rightdoing” 1st Floor, Booth 70 help our customers eliminate uncertainty they of the law enforcement and forensic community is a legal hotline available to callers seven days first Congress created it in 1789 in the same within organizations to both prevent and properly face in today’s challenging world. Knowledge through projects such as the PALADIN Forensic a week. Trained attorneys answer the hotline legislation that created the federal judicial respond to child abuse. Using training programs SANS Institute gained through Sirchie training enhances their Suite. What most do not know is that PALADIN allowing the survivor to speak immediately with system. The primary function of the U.S. www.sans.org skills and inspires confidence to address every was developed to assist in the fight against the an attorney. This makes Texas Legal Services Marshals Service was to support the federal SANS is the most trusted and, by far, the challenge. Day in/day out, trust and rely on Sexual Exploitation of Children. Center program unique in the state of Texas. courts by serving subpoenas, summonses, writs, The caller may choose to be anonymous or may warrants, making arrests and handling all federal largest provider of cyber security training and Sirchie to help get the job done right, each and 2nd Floor, Booth 41 certification to professionals at governments and every time. choose to complete a more detailed intake if prisoners. Since the passage of the Adam Walsh more extensive services are desired. All services Act in 2006, the U.S. Marshals Service has commercial institutions world-wide. Renowned 2nd Floor, Booth 25 Teel Technologies SANS instructors teach over 50 different courses www.teeltech.com are free of charge and available to survivors of arrested over 93,000 fugitive sex offenders, at more than 200 live cyber security training Social Solutions Teel Technologies is today’s leading provider of sexual assault in the state of Texas. and conducted over 2100 compliance and events as well as online. www.socialsolutions.com Mobile Device and Digital Forensic tools, training 1st Floor, Booth 48 enforcement operations with its state and local 2nd Floor, Booth 22 Social Solutions Global (SSG), creators of Efforts and examination services for local, state and partners. In addition, the U.S. Marshals Service to Outcomes (ETO®) and Apricot software, is federal law enforcement customers. Offering TexProtects: The Texas Association for has recovered 654 children in “Operation Pickup” SDFI – TeleMedicine LLC the leading provider of software solutions for a comprehensive selection of solutions for the Protection of Children while arresting 538 fugitives. www.sdfi.com both nonprofit and public sector organizations, complete laboratory work and field operations, www.texprotects.org 2nd Floor, Booth 13 The SDFI-TeleMedicine System is a turnkey turning good intentions into measurable as well as a broad training curriculum that Our mission is to reduce and prevent child abuse photodocumentation and video solution. outcomes while connecting people to social includes Advanced Chip-off, JTAG, ISP, SQLite, and neglect through research, education and V2 Interview Room Recording ATTEND THE Investigators use SDFI Camera Systems to services. We equip organizations to drive Programming for Forensics, Field Operative advocacy. We effect change by organizing www.v2advocate.com easily shoot forensic pictures and video in performance by demonstrating the usefulness training, and more. Teel Technologies provides and educating our members to advocate for The V2 Digital Interview Room Recording EXHIBITOR the visible light and in the ultraviolet dark. All of data at all levels, including to the funding examiners in the lab and field with the tools increased investments in evidence-based child Management System was designed specifically SDFI Camera Systems include AES 256-bit community. and skills needed to successfully investigate abuse prevention programs, CPS reforms, and for the needs of Children’s Advocacy Centers. It is WORKSHOPS! treatment programs to heal abuse victims. a complete system with an easy to use interface advanced encryption software tools so you can 2nd Floor, Booth 30 store images in your own environment securely, 1st Floor, Booth 74 and one button start/stop recording. System Attendees will receive SDFI Image Management Software with forensic SpeakWrite Don’t forget to purchase your options include a complete turnkey solution for TMPA one entry (for each exhibitor tools and a SDFI Secured HIPAA Compliant File www.speakwrite.com conference t-shirts multiple interview rooms and a software solution Portal (a conduit) to forward forensic pictures, US based transcription of audio and video www.tmpa.org designed around your existing hardware. workshop attended) to video and forms to anyone who needs them. Visit interviews, statements and voice reports. Secure (short and long-sleeved), With over 24,000 members, the mission of TMPA 2nd Floor, Booth 44 a tablet drawing, awarded www.SDFI.com for more information. and confidential, 24/7/365 service that is on and polos, at is to protect the rights and interests of Texas law Wednesday evening at 2nd Floor, Booth 6 demand and pay as you go. No minimum usage enforcement officers by providing the best legal VIDENTIFIER or contract requirements. assistance in the country, effective lobbying at www.videntifier-security.com the social event. BOOTHS 76–78 Videntifier provides visual search engines to 2nd Floor, Booth 42 on the first floor exhibit hall! leading law enforcement / defense agencies and You must be present to win.

74 75

DCAC-16-019 DCAC Conference Program_07mg.indd 74-75 7/29/16 11:53 AM and an optional online platform with resources, Whooster Winds of Fire Ent tracking and compliance functionality to assist www.whooster.com www.johnborgstedt.com communities, these training programs empower Whooster™ the Investigative Database and As a victim of one of the worst cases of child staff, volunteers and others to “do the right thing” Software Platform provides Real-time Person abuse in the history of Texas, John Borgstedt has when it comes to protecting youth. Training and Phone Data using proprietary algorithms been able not only to survive, but to thrive. Now Options: All VIRTUS training programs are linking and matching billions of public, private an award winning author, motivational speaker, comprehensive and multi-dimensional with and telephone record data sets. Our current and child advocate, his life’s mission has become instructor-led training, train-the-facilitator products, Whooster Basic, Plus and Web, are a journey of partnering with organizations, like EXHIBITORS certification, education and awareness videos. telephone centric identity verification tools that yours, in order to fulfill his dream of saving one Separate trainings are available for religious and deliver valuable investigative data directly to law child at a time. The extensive abuse and neglect non-religious entities, who want to educate their enforcement agencies. It is a mobile and web that John suffered, along with the subsequent communities on the reality of victimization and based reverse cell phone identity service and life choices and experiences, allow audiences exploitation of children, along with prevention the data Whooster provides is the most current of all demographics to connect personally with training, healing interventions and an action plan available on the market today. The mobile service his journey from darkness to light. He shares for proper response. VIRTUS® Online platform: is conducted all via text messaging so no App his heart-breaking account of his small, bruised Regularly-scheduled continuing education and is required to download. Any law enforcement body clinging to life, his struggle as a teenager state-of-the-art web-based training courses official that has a cell phone with texting fighting to overcome seemingly insurmountable are available and consistently updated on the capabilities can utilize Whooster™. odds, and his entrance into adulthood as a VIRTUS Online platform. 1st Floor, Booth 71 warrior for the young and innocent, protecting 1st Floor, Booth 50 them from a similar childhood of hell on earth. Wicklander-Zulawski & Associates, Inc. John’s story of transformation and relational Voice Products, Inc. www.w-z.com nature inspire listeners to examine their own www.voiceproducts.com Wicklander-Zulawski & Associates, Inc. (WZ) lives and motivate them toward becoming agents Voice Products Inc. has been in business for provides standard and customized training in of change in the lives of the hurting, abused, over 25 years with local sales and service, as multiple techniques of interview and interrogation and forgotten. well as 24/7 live support. We offer the latest including the WZ Non-Confrontational Method, 1st Floor, Booth 58 technologies for your recording needs as well the Behavioral Analysis Interview, Cognitive as iRecord technologies for child advocacy Interviewing and the Accusatory Method. WZ’s Yaana interview recording. nonconfrontational method is proven to be more www.yaanatech.com 2nd Floor, Booth 4 effective in reducing denials, eliciting reliable Yaana Technologies is a leading global provider information and developing the truth than of intelligent compliance solutions and services Waldorf University alternative interviewing techniques. Investigators with accurate data retention, sophisticated www.waldorf.edu are taught to use the most appropriate method for security and unique analytical capabilities. Our Waldorf University offers online Regionally each case and subject, to eliminate the innocent solutions offer our customers a cost effective Accredited Associates through Masters from the guilty and to ensure statements will path to address the complexities related degrees in over 30 degree programs. These be admissible at trial. WZ conducts over 400 to meeting compliance needs in the rapidly programs include Criminal Justice, Emergency onsite seminars each year and has trained over evolving information communications and cloud Management, Business Administration, 200,000 law enforcement professionals. markets worldwide. Organizational Leadership, Fire Science 2nd Floor, Booth 2 2nd Floor, Booth 35 Administration, and Communications. We are approved for federal funding, books are included, and only one $35 fee. We also have a campus located in Forest City, Iowa. 1st Floor, Booth 94

SAVE THE DATE AUGUST 7–10, 2017 9th Annual

SM

76 77

DCAC-16-019 DCAC Conference Program_07mg.indd 76-77 7/29/16 11:53 AM Providing justice and restoring hope

PRESENTED BY The Dallas Children’s Advocacy Center & Dallas Police Department

DCAC-16-019 DCAC Conference Program_07mg.indd 78 7/29/16 11:53 AM