30th Annual

Providing justice and restoring hope

The printed program is generously sponsored by Twitter.

AUGUST 13–16, 2018 SHERATON HOTEL DALLAS, TX | WWW.CACCONFERENCE.ORG OF CONTENTS

Conference Tips ��������������������������������������������������������������������������� 2 Sponsors & Partners �������������������������������������������������������������������� 3 Program Overview ����������������������������������������������������������������������� 4 Opening Plenary �������������������������������������������������������������������������� 5 Frequently Asked Questions �������������������������������������������������������� 6 ...... 7 Continuing Education Information ���������������������������������������������� 10 Monday...... 11 Tuesday...... 16 Wednesday...... 22 Thursday...... 28 Computer Lab Schedule ������������������������������������������������������������ 31 Workshop Descriptions �������������������������������������������������������������� 32 Speakers...... 62 Exhibitor Information ����������������������������������������������������������������� 69 Exhibitors...... 70

The Conference Has an App!

GET SOCIAL! Attendees can use the app to access all program USE #CACC2018 TO information, complete workshop evaluations, access handouts, take notes, and create your own schedule. STAY CONNECTED WITH US. Don’t forget workshops are first-come, first-served, so choose a few options per time slot! No pre- registration required.

Download the CACC 2018 app from the Apple App @CACConference Store or Google Play Store by searching DCAC Events and selecting CACC 2018. To start using the app, WiFi password: CACC2018 select “Create Account” and unlock the app using the event code: CACC30.

Visit the Help Desk for assistance.

1 Welcome to Dallas! Thank you for choosing the 30th Annual Crimes Against Children Conference for your professional training, we are glad you are here. Here are a few reminders so you’ll have a successful week:

CACC2018 MOBILE APP Visit the App or Google Play store and search DCAC Events to download the app, if you are unable to download the app to your mobile device, the app features are available in a web browser at www.eventscribe.com/2018/CACC/.

Use the CACC app to access all program information, make a customized scheduled, access handouts, complete workshop evaluations and take notes. There is no advanced selection or registration for workshops.

SECURITY AND FIREARM POLICY CACC Name tags and badges must be worn throughout the event, no exceptions. Officers and Sheraton security will be stationed throughout the Conference and its events to ensure attendees are safe and able to focus on learning and networking.

Per hotel policy, the Sheraton prohibits the open and concealed carrying of firearms by non-law enforcement.

If you’ve chosen to bring your firearm, we ask that you keep personal firearms locked in your room safe. Do not leave your weapon unattended in your room or elsewhere. Unattended firearms will be turned over to the Dallas Police Department.

COMPUTER LABS Our hands-on computer lab trainings are back this year. We are now able to offer even more labs for non-law enforcement attendees. If you did not pre-register for the labs, visit the 3rd floor of the conference center to check for availability.

EXHIBITORS Our exhibitors offer a wide range of informational resources for all child abuse professionals. Some exhibitors also provide product demonstrations on Tuesday and Wednesday in the City View rooms. Attendees who participate in a product demonstration will be entered in a drawing for an Apple Watch. The drawing will take place on Wednesday evening at the Conference Celebration. You must be present to win!

Thank you for all that you do in our collective effort to protect and serve children around the world. Have an excellent conference experience!

2 2018 SPONSORS & PARTNERS The Annual Crimes Against Children Conference is Presented By

Providing justice and restoring hope

2018 Crimes Against Children Conference Sponsors

Diamond Sponsor Platinum Sponsor Bronze Sponsor Bronze Sponsor

2018 Crimes Against Children Conference Training Partners

3 PROGRAM OVERVIEW

Welcome to the 30th Annual Crimes Against Children Conference.

We are glad you have joined us and hope that you enjoy your week in Dallas at our internationally recognized conference! Monday morning begins with an opening session that includes the conference keynote presentations. It will also provide you with updated conference information.

During the conference, there will be to this schedule will be communicated via HELP DESK or ask one of our Conference 31 workshops and 7 interactive computer labs app notifications and information screens staff or volunteers in aqua blue t-shirts. We operating concurrently. Selected workshops located throughout the conference center. appreciate the hard work you do, and hope are repeated. The schedule is broken down If you cannot find something you are looking you have a great conference experience! by date and time in this program. Any updates for, please do not hesitate to go to the CONFERENCE SCHEDULE Please see page 31 for the Computer Lab schedule.

SUNDAY MONDAY TUESDAY WEDNESDAY THURSDAY

2:00–9:00 PM 7:00–8:15 AM 7:00–8:30 AM 7:00–8:30 AM 7:00–8:30 AM BEAT THE CROWD Light Continental Breakfast Light Continental Breakfast Light Continental Breakfast Light Continental Breakfast Conference Check-in Registration/Check-in is on the 2nd floor 8:30–9:45 AM 8:30–9:45 AM 8:30–9:45 AM of the Sheraton 8:15–9:30 AM Workshops Workshops Workshops Conference Center. Opening Plenary 10:15–11:30 AM 10:15–11:30 AM 10:15–11:30 AM 2:00–6:00 PM 10:15–11:30 AM Workshops Workshops Workshops Lab Registration is Workshops on the 3rd floor of the NOON–1:15 PM NOON–1:15 PM 11:30 AM Sheraton Conference Center NOON–1:15 PM Workshops Workshops Conference Concludes Workshops 1:45–3:00 PM 1:45–3:00 PM 1:45–3:00 PM Workshops Workshops Workshops 3:30–4:45 PM 3:30–4:45 PM 3:30–4:45 PM Workshops Workshops Workshops 5:15–6:30 PM 7:00 PM 5:15–6:30 PM Workshops CONFERENCE Workshops CELEBRATION 6:00 PM Dallas Police Association Hospitality Event Optional off-site Networking Event

4 OPENING PLENARY Monday, August 13th | 8:15–9:30 AM | Lonestar Ballroom

Keynote Speaker John Walsh

John Walsh is known internationally as a crime fighter, victims’ advocate and host of the nation’s longest-running primetime program and number-one crime-fighting show,America’s Most Wanted and CNN/HLN’s series, The Hunt with John Walsh. In continuing the fight to bring fugitives to justice, John is busy with his upcoming series,In Pursuit with John Walsh on Discovery ID which will air in early 2019. Walsh’s extensive television career has helped law enforcement capture more than 1,500 fugitives and recover more than 50 missing children. A career in fighting crime is one Walsh never expected, but justice has been his life’s mission since July 27, 1981 – the day his son, Adam, was abducted from a mall near his home in Hollywood, Florida. Adam was found murdered two weeks later. Walsh and his wife Revé turned their grief into action and without a badge or a gun, Walsh quickly became a nationally recognized leader in the fight for victims’ rights. In 1984, the Walshes and other child advocates incorporated the National Center for Missing and Exploited Children as a non-profit 501(c)(3) corporation to help find missing children and prevent child victimization. Walsh has authored three best-selling books: Tears of Rage, No Mercy and Public Enemies, which chronicle his family’s fight for justice and recount some of toughest cases he’s faced over the years.

State of the Industry Remarks Emily Vacher, Facebook

Emily Vacher joined Facebook in 2011 and is currently a Director with Facebook’s Trust & Safety team. Emily is responsible for law enforcement outreach, global safety initiatives, safety education, and security policy matters. She is currently focusing on Facebook’s AMBER Alert program and child safety issues. Emily works extensively with the National Center for Missing & Exploited Children (NCMEC) where she serves as a member of NCMEC’s executive board and the law enforcement/operations committee, and also serves as a member of NCMEC’s Team ADAM/Project Alert. Emily works closely with the International Center for Missing & Exploited Children (ICMEC) on global missing children’s issues and alert system development and training. Before she joined Facebook, Emily was a Special Agent with the Federal Bureau of Investigation (FBI) for more than a decade, specializing in crimes against children matters. Emily holds a BS from Cornell University, an MS and MPA from Syracuse University/Maxwell School of Citizenship & Public Affairs and a J.D. from Syracuse University College of Law.

Presentation of Award to Law Enforcement Professional Lou Luzynski, Watch Systems

Lou Luzynski is the co-founder and managing partner of Watch Systems, a public safety solutions firm founded in 2000 in Covington, Louisiana. Lou’s vision of enhancing community safety through technology resulted in the development of OffenderWatch, the nation’s leading sex offender management and community notification solution. OffenderWatch is used by over 3500 local, state, and federal law enforcement agencies to register 60% of sex offenders nationwide and to inform the public through agency web sites and by sending over 4 million postcards and 17 million email alerts annually. Lou works extensively with legislators, Sheriffs, state officials and victim advocacy groups to promote best practices in offender management and community notification and to educate the public of the dangers of sex offenders. Prior to Watch Systems, Lou was co-founder, President and Chief Executive Officer of Fuelman. Lou helped guide the fleet fuel startup in 1985 to a company with over 300 employees and $100 million in annual sales in 1999. Previously, Lou was a Senior Manager of audit, tax, and management consulting services at KPMG Peat Marwick for early-stage, privately-held emerging growth companies. Lou earned a B.A. in Accounting with Cum Laude honors from St. Louis University and is a Certified Public Accountant.

5 FREQUENTLY ASKED QUESTIONS

DO I HAVE TO WEAR MY NAME BADGE? SPOUSE. WHERE CAN I ACCESS CHILD CARE? Yes. For your safety, and the safety of others, you will not be permitted The conference does not provide child care nor are children allowed in access into any sessions, special events, or common areas without your the workshops or to be left unattended in the conference center. If we name badge. No exceptions. If you misplace your badge or leave it at your discover you have left your child unattended, you will be asked to leave hotel, you can purchase a new badge for $5 at the Help Desk. You will the conference until adequate care is found. Please see the concierge at need a valid picture ID. your hotel and ask about child care options.

CAN I CARRY MY FIREARM? MY HOTEL IS OFF-SITE AND I FEEL UNSAFE Our policy on firearms will remain consistent with prior years. If you’ve TRAVELING ALONE. WHAT SHOULD I DO? chosen to bring your firearm, we ask that you keep personal firearms either If you are ever uncomfortable or feel unsafe during the conference, please (a) on your person at all times, or (b) locked in your room safe. Do not visit the Help Desk and we will address your concerns. leave your weapon unattended in your room or elsewhere. Any firearms left unattended will be turned over to the Dallas Police Department. Per HOW DO I NETWORK WITH OTHER ATTENDEES? hotel policy, the Sheraton prohibits the open and concealed carrying of The camaraderie and networking opportunities at our conference are firearms by non-law enforcement. unparalleled. Visit the exhibitors to learn about professional resources available to you. See page 69 for a of exhibitor booths. CAN I TAKE PHOTOS OR VIDEOS DURING SESSIONS? Please do not record or take any photos in workshops. This is against Don’t forget to attend: our policy, and you will be asked to leave the workshop and delete any • Dallas Police Association Hospitality Event Tuesday Evening recorded content. If the issue persists beyond the first offense, you may • Conference Fiesta Wednesday Evening be asked to leave the conference. • Session Forums (See Monday’s schedule) • Use the app! Our app has a feature where you are able to share your DO I HAVE TO SIGN UP FOR CLASSES BEFOREHAND? contact information with attendees and communicate with each other No. All workshops are first-come, first-served, with the exception of within the app. Please visit the Help Desk for assistance. computer labs. If you have your eye on a specific class and want to ensure a seat, arrive early. Have back-up workshops in mind in case your first HOW DO I SUBMIT WORKSHOP FEEDBACK? choices are full. Check the schedule for possible repeats of the most In order to provide a more seamless process, all evaluations are done on popular classes. If you are interested in open computer lab seats, please the Conference app. You must complete a survey for each session attended visit the 3rd floor. in order to receive continuing education credits. If you have any specific concerns about a speaker or workshop, see the Help Desk. Otherwise, WHY IS IT SO COLD IN THE CONFERENCE CENTER? please download the app to evaluate all workshops. It is 100 degrees outside, and freezing inside. Texas is hot in August, what can we say? The hotel works their hardest to ensure the comfort of our I CAN’T FIND ANY OF THE CLASSROOMS! attendees, however the air conditioning can be difficult to regulate with The Sheraton conference center and Marriott can be very confusing to such extreme temperatures and the constant movement throughout the navigate. See pages 7-9 to access maps or ask for directions from our conference center. We are selling long-sleeved t-shirts – visit booth 76 staff in aqua blue t-shirts. to purchase yours!

HOW DO I ACCESS HANDOUTS? For all other questions, please visit the Help Desk All handouts are available on the app and the eventscribe website. Not located in the Lone Star Foyer or ask a staff member in all speakers will submit handouts, so all handouts we have been sent are an aqua shirt. available to attendees.

IF I’M A NURSING MOTHER, WHERE CAN I GO TO NURSE PRIVATELY? Privacy for nursing mothers can be found on the Skybridge next to the Question Desk. Please visit the Help Desk if you need assistance locating this room. There will be keycard access. Keycards can be accessed at the Question Desk, just next door.

I BROUGHT MY CHILD WITH ME, BUT NOT MY

6 SHERATON HOTEL & CONFERENCE CENTER

1ST FLOOR Conference Center

Cash Lunch and Seating DCAC Exhibit Booth Dallas Ballrooms Exhibitors Refreshment Breaks

Sheraton Front Desk 2ND FLOOR Sheraton Hotel NCMEC CVIP Lab Austin Ballrooms (Pearl 5) Executive Boardroom

NCMEC CVIP Lab Sheraton Front Desk Sheraton Front Desk Seminar Seminar Skybridge access to: Marriott Dallas City Center Plaza of the Americas

2ND FLOOR Conference Center

Continuing Education Sign In Exhibitors Help Desk Continuing Education Lone Star Ballrooms Sign In Premium Exhibitors Refreshment Breaks Registration Booths Registration Booths and Help Desk

7 SHERATON HOTEL & CONFERENCE CENTER

3RD FLOOR Conference Center

Computer Lab Sign Up and Help Desk Houston Ballrooms San Antonio Ballrooms State Rooms 37TH FLOOR Sheraton Hotel

Majestic Majestic Majestic Majestic Majestic 1 2 3 4 5

ELEVATORS

Majestic Majestic Majestic 8 7 6 Majestic Majestic Majestic 11 10 9

4TH FLOOR Sheraton Hotel

City View Rooms Exhibitor Workshops Fitness Center Remington

8 Technology Coalition (closed meeting)

9 CONTINUING EDUCATION

The Crimes Against Children Conference is an approved provider of Continuing Education credit on behalf of the organizations listed below. Please read the information regarding your respective field carefully to ensure you receive credit. Please visit the Continuing Education booth in the registration area to sign in EVERY DAY. If you do not sign in every day and complete the electronic survey for each session attended, either via the CACC App or online, we cannot confirm that you attended the conference, and credit may not be granted. Credit will not be granted on sign-in alone.

National Association of Social Work (NASW) Texas State Board of Examiners of Anyone seeking NASW credit must sign in every day and complete surveys. Professional Counselors (LPC) Anyone seeking LPC credit must sign in every day. License number required. State Bar of Texas (MCLE) Anyone seeking MCLE credit must sign in every day. Bar number required. Texas State Board of Social Work Examiners (LMSW) Those seeking ethics credit may visit the Continuing Education desk for a Anyone seeking LMSW credit must sign in every day. License number required. list of approved ethics courses. Texas Commission on Law Enforcement (TCOLE)* Texas Center for the Judiciary TCOLE credit will be awarded to Texas Peace Officers through the Dallas Anyone seeking CJE or Family Violence credit may visit the Continuing Police Department. Anyone seeking TCOLE credit must sign in every day. Education desk or the Special Registration area for CJE/Ethics and Family TCOLE issued personal identification number (PID) required. If you do not Violence forms and lists of approved courses of study. know your PID number, contact TCOLE at 512-936-7700.

Texas State Board of Examiners of Marriage *Out of state peace officers should submit their conference certificate to and Family Therapists (LMFT) their respective agencies for consideration of credit in their jurisdiction. Anyone seeking LMFT credit must sign in every day. License number required. You are not required to sign in daily.

CERTIFICATE OF COMPLETION You must complete a survey for each session attended, as well as the post-Conference survey, in order to receive continuing education credits. Certificates will be available post-conference via your eventscribe account. No certificates will be handed out on-site.

HOW TO RECEIVE CREDIT Your certificate will include the provider numbers for this Conference. All attendees (except Texas Peace Officers seeking TCOLE hours) are responsible for turning in their hours to their respective fields.

10 CASE STUDIES & WORKSHOPS MONDAY Each session is listed by time block. See pgs. 32–61 for workshop descriptions and pgs. 62–68 for speaker information.

Harnessing the Force Multiplier MONDAY, 10:15–11:30 AM of NCMEC’s Resources Lecture AUGUST 13 Blending in: How Offenders Schedule at a glance: Dan Mills Groom Society and Victims Dallas A2 Lecture 7:00–8:15 AM Andi Grosvald Hamilton, Human Trafficking Prevention Light Continental Breakfast Melissa Travis-Neal and Through Empowerment and Resiliency Maria Rosales-Lambert Lecture Registration/Check-In Dallas D3 Stephen M. Daley Lone Star Foyer Somerset Child Sex Trafficking in Rural America Lecture Leveraging Data From 8:15–9:45 AM Julie Pfluger and Elizabeth Altman Social Media and the Cloud Opening Plenary Cambridge to Accelerate Investigations Lone Star Ballroom Lecture Children and Young People Engaging Keith Leavitt Live Streamed in in Problematic Sexual Behavior (PSB) Dallas A3 Dallas Ballroom for Overflow Case Study Joe Sullivan Locating a Wi-Fi Moocher Dallas B Case Study 9:45–10:15 AM Dedric Jones and Mohamed Bah Break Corroborating Evidence: San Antonio A Reducing the Child’s Stress Refreshments Provided and Strengthening Your Case Model Practices in Child Lecture Sexual Abuse Prosecutions 10:00 am–5:00 PM Jim Holler Lecture Austin 2 Edward Chase NCMEC CVIP Lab Open City View 6 Decision Making in Cases of Child Sex Abuse and Multidisciplinary Approach to 11:30AM–NOON Future Contact with Children Child Pornography Investigations Break Lecture Lecture No Refreshments Provided Cory Jewell Jensen Amy Barton Dallas A1 Dallas C 1:15–1:45 PM Digital Safety, Social Media & Kids: Opening Statements and Closing Break What’s New, What’s Now, What’s Next Arguments in Cases of Child Abuse Lecture Lecture No Refreshments Provided Katie Greer Victor Vieth Plaza A Seminar 3:00–3:30 PM Family Advocate Forum Overview of the Last Thirty-Five Years Break Lecture of the Sexual Victimization of Children Refreshments Provided Mindy Jackson Lecture State 1 Kenneth Lanning Lone Star C1/C2 Google Data Disclosure Policy Lecture Perpetrators of Child Sexual Abuse: Cathy McGoff Get Tuned In Austin 1 Lecture Graham Hill Google User Services: Lone Star A4 What You Didn’t Know Was Out There Lecture Prosecuting Pimps: How to Build Lauren Wagner a Case Against a Sex Trafficker Lone Star C3 Lecture Brooke Grona-Robb Grooming Behaviors of Child Dallas D2 Molesters and Their Impact on Victims Lecture 10:15–11:30 PM continued Darrel Turner on next page Lone Star C4 11 10:15–11:30 PM continued Core Skills for Cyber Tracking Operation Hydrant: Suspects and Predators The UK Law Enforcement Response Robbie Schuster: Lecture to Non-recent Child Sexual Abuse A Little Brother’s Secret Kevin Metcalf Case Study Case Study San Antonio A Simon Bailey Chad Bryant Dallas B Plaza B/C Corroboration and the MDT in

MONDAY Child Sexual Abuse Investigations Perverted Justice: Suffer from BURNOUT, Lecture The Predator Police Chief Give’em the F.I.N.G.E.R.! Nancy Hebert and Adam Acosta Case Study Lecture Austin 2 Grace Pandithurai and Rick Sipes Mark Yarbrough Dallas C Lone Star A3 Corroboration in Child Abuse Investigations: The Difference Preventing and Responding Supervising Sex Offenders Between Justice and to Family Abductions Lecture Continued Victimization Lecture Jim Tanner Lecture Preston Findlay Dallas D1 Donald Hayden Seminar Dallas A3 Supervising Your Registry Randy & Me: A Prosecutor’s Story Lecture Don’t Let Them Leave!: of His Childhood Sexual Abuse Joel Shoultz How Family Advocates and Forensic Case Study Austin 3 Interviewers Work Together Kevin Mulcahy Lecture Lone Star A4 The Adult Undercover Persona Megan Bawcum and Kim Skidmore Lecture Reel Lies: A Failed Film Maker’s State 1 Decline into Sex Trafficking Kevin Laws Case Study City View 8 Ethics and Risk Management for Mental Health Professionals: Ingrid Arbuthnot-Stohl, Natalie D’Amico Utilizing Evidence in Forensic The Impact of the Digital Age and Catherine Crisham interviews: Homeland Security Lecture Lone Star A3 Investigation’s Prepare and Predict Tanisha Knighton Revenge Porn: A New Crime Forensic Interview Guidelines City View 8 Takes Shape Across the Country Lecture Lecture Stacey Kreitz Facilitating Forensic Interviews Shannon O’Brien Remington of Cyber Crimes Lecture Dallas A2 When Your Forensic Tools Crystal Gregory and David Foltzer Sex Over Love: A Mother’s Choice Won’t Work Remington Case Study Lecture Habon Mohamed and Jeff Shackelford Fourth Amendment Issues Elizabeth Glidewell City View 7 in Child Abuse Cases Plaza B/C Lecture Amy Russell Sexting & Cyber-Bullying: Dallas A1 Redefining Dating Violence 12:00–1:15 PM in the Social Media Age High Risk Missing Children: Lecture Abuse in the Hospital Setting: Not ‘Just a Runaway’ A Case Study Bronwyn Blake Lecture City View 7 Case Study Rebecca Butler Matthew Cox, Amy Morgan and Dallas D3 Sexting Investigations and Kassandra Slaven Appropriate Consequences Lone Star C1/C2 How to Educate Youth and Parents Lecture on Healthier Device Use and Proactive Richard Wistocki Child Physical Abuse Predator Prevention Practices Plaza A Prosecution Model Practices Lecture Lecture Jay Martin Systems Response to Human Bill Fulbright Somerset Trafficking: A Multi-Level City View 6 Education Approach Mobile/Express/Booking Alert Lecture Childsplay: Investigating and Overview Aria Flood and Jenna Cooper Closing a Darknet Child Exploitation Lecture Dallas D2 Material Forum Katie Sternberger Case Study Austin 3 The Final Straw: Graham Pease How Global Cooperation Ended Lone Star C4 One Murder or Two? an International Manhunt Case Study Case Study Crystal Levonius and Wade Hornsby Shelley Allwang and Daljit (Dolly) Gill Lone Star B Lone Star A1/A2 12 The Sex Trafficking of Minors: Help, My Images are Online!: Political and Personal Dilemmas Tools for Recovery New Ways to Help Victims of in Rescuing Children from Lecture Online Child Sexual Exploitation Online Child Sexual Abuse Jenni Thompson Lecture Lecture MONDAY Cambridge Rebecca Sternburg Robert Shilling Plaza A Dallas A2 Truth or Fiction: Red Flags and Risk Factors for Sex Trafficking How Not to Help the Defense Attorney Prevention Opportunities & Lessons Lecture in Child Sexual Abuse Cases Learned for Your Community Ada McCloud (Part 1 of 2) Lecture Dallas D1 Lecture Eliza Harrell Use of Medical Experts in Child Lawrence Braunstein State 1 Lone Star A1/A2 Physical and Sexual Abuse Cases Resolve the Unresolvable: Mobile Lecture Inside the Minds of Sex Offenders: IP Resolution and Its Use with Child Mary-Ann Burkhart The Essential Psychological Insights Protection Systems Investigations Austin 1 for all Professionals (Part 1 of 2) Lecture Using Digital Evidence to Case Study Tom Farrell Corroborate Your Investigation Joe Sullivan City View 7 Dallas B Lecture Setting Up Undercover/ Justin Fitzsimmons Interviewing At Risk Children Traveler Operations Lone Star C3 Lecture Lecture Julie Kenniston Mike Duffey 1:45–3:00 PM Remington San Antonio A Investigating Child Homicide Cases Taking the High Road: A Family Affair: (Part 1 of 2) Ethical Challenges and the A Life of Hidden Abuse Lecture Multidisciplinary Team (Part 1 of 2) Case Study Nancy Oglesby and Michael Milnor Lecture Lon Ziankoski and Karl Stonebarger Lone Star C4 Dan Powers Lone Star B Dallas A1 Kids in Court: A Non-Confrontational Approach An Introduction to the Courtroom The Holy Grail: A Female to Child Abuse Investigations Lecture International Traveling Sex Offender Lecture Eren Price, Judy Hoffman and Case Study Thomas McGreal Lidia Baeza Kevin Laws Austin 2 City View 8 Dallas D2 Advanced Cold Case, Long Term Lived to Tell: The Jennifer Schuett The Seven Steps of Missing and Unidentified Human Story (Part 1 of 2) Sexual Grooming of Children Remains Investigations Case Study Lecture Lecture Tim Cromie and Jennifer Schuett Thomas Tueller Brian Killacky Lone Star C1/C2 Dallas D3 Austin 1 Criminal Minds: Inside the Mind Missing Children via Online Luring Uber Law Enforcement Operations: of a Pedophile (Part 1 of 2) Lecture How Uber Can Assist with Lecture Bobby Ladson Criminal Investigations Jim Holler Cambridge Lecture Lone Star A4 Billy Kewell, Wade Stormer and OffenderWatch Training Searches Ana Lorena Vigil Ethical Considerations in Lecture Lone Star A3 Child Abuse Cases Joel Shoultz Lecture Austin 3 Understanding and Breaking Denial Edward Chase of Child Molesters (Part 1 of 2) Seminar On-Scene Digital Investigation Lecture Best Practices: From CyberTip Jim Tanner and Darrell Turner Five B’s of Child Physical Abuse: to Court Ready Paperwork Dallas C Bruises, Burns, Bones, Bellies, Lecture and Brains (Part 1 of 2) Richard Frawley Understanding Research and Lecture Dallas D1 Prevention Best Practices to Kristen Reeder Better Protect Children Plaza B/C Physical Child Abuse Injury Lecture Reconstruction Techniques Stacy Pendarvis Gone Rogue: A Teacher’s Perspective (Part 1 of 2) Somerset Lecture Lecture Graham Hill Robert Hugh Farley 1:45–3:00 PM continued Lone Star C3 Dallas A3 on next page 13 1:45–3:00 PM continued How Not to Help the Defense Attorney One Party Consent Phone Call: in Child Sexual Abuse Cases The Undisputed Evidence in Voir Dire: Child Sexual Abuse (Part 2 of 2) Your Investigation Lecture Lecture Lecture Marissa Aulbaugh and Lauren Hopkins Lawrence Braunstein Dave Clark City View 6 Lone Star A1/A2 Lone Star A3

MONDAY How to Grow a Family Physical Child Abuse Injury Advocate Program Reconstruction Techniques 3:30–4:45 PM Lecture (Part 2 of 2) A Predator Hiding in Plain Sight: Mindy Jackson, Yesenia Altamirano Lecture An Inside Look at the Victim-Centered and Clare Walters Robert Hugh Farley Approach to the Larry Nassar Case State 1 Dallas A3 Case Study Inside the Minds of Sex Offenders: State Prosecutor’s Forum Andrea Munford and Angela Povilaitis The Essential Psychological Insights Forum Lone Star B for all Professionals (Part 2 of 2) Carmen White and Eren Price Apple Law Enforcement Case Study City View 8 Response Forum Joe Sullivan Dallas B Taking the High Road: Lecture Ethical Challenges and the Pat Burke and Dylan Dorow Interviewing Developmentally Delayed Multidisciplinary Team (Part 2 of 2) City View 6 Child Sexual Abuse Suspects Lecture Barely Legal: Older Minors in Lecture Dan Powers Domestic Sex Trafficking Katie Petersen Dallas A1 Austin 2 Lecture The Online Enticement of Children: Jeanne Allert Interviewing: What Sex Offenders Trends and Patterns from an Dallas D2 Can Teach Us In-depth Analysis of NCMEC Children in the Digital Age Lecture CyberTipline Reports Lecture Cory Jewell Jensen Lecture Joe Laramie Lone Star C3 Stacy Jeleniewski Somerset Seminar Investigating Child Homicide Cases Collaborative Approaches to (Part 2 of 2) Understanding and Breaking Denial Addressing the Trafficking of Lecture of Child Molesters (Part 2 of 2) Children Around the World Nancy Oglesby and Michael Milnor Lecture Lecture Lone Star C4 Jim Tanner and Darrell Turner Dallas C Sarah Wentz, Nattakarn Noree Keeping Your Child Exploitation and Fitri Noviana Investigation Victim Centered VICleads by Project VIC Cambridge Lecture Lecture Criminal Minds: Alexandra “Ale” Levi Richard Brown, Arnold Guerin Inside the Mind of a Pedophile Dallas D3 and Robert O’Leary (Part 2 of 2) City View 7 Lecture Lived to Tell: The Jennifer Schuett Jim Holler Story (Part 2 of 2) Working with Victims and Witnesses Lone Star A4 Case Study with Developmental Delays and Tim Cromie and Jennifer Schuett Intellectual Disabilities Facebook 101 Lone Star C1/C2 Lecture Lecture Bill Fulbright Jason Barry Offender Watch Q/A Dallas A2 Austin 1 Lecture Adam Kirhagis Yahoo (Now Oath) and its Role in the Five B’s of Child Physical Abuse: Austin 3 Fight Against Child Trafficking Bruises, Burns, Bones, Bellies, Case Study and Brains (Part 2 of 2) Officer Safety Considerations Matt Healy Lecture in ICAC Investigations Dallas D1 Kristen Reeder Lecture Plaza B/C Michael Sullivan San Antonio A Forensic Interviewer Forum 5:15–6:30 PM Forum Once the Shutter Snaps: From Victimization to Restitution David Albert, Edward and Chelese Bibiana Dominguez Penn: Work Together, Molest Together Remington Lecture Ashley Hennekey Case Study Plaza A James Holdman Lone Star C1/C2 14 Finding Nadia: The FBI International Parental Kidnapping Investigation Spanning 20 Years and Four Countries Case Study Jennifer Romero, Shannon Enochs and Carsten Otting Austin 1 Lightning Session: Five Topics in 75-Minutes Lecture Jim Tanner and Graham Hill Lone Star B Making Something Out of Nothing: What to Do When You Have Limited Evidence Lecture Paul Wolpert and Kristin Joseph Austin 2 Randy & Me: A Prosecutor’s Story of his Childhood Sexual Abuse Case Study Kevin Mulcahy Lone Star A4 Starving for Attention: The Investigation and Prosecution of Nicole Finn Case Study Bret Lucas, Nan Horvat and Christopher Morgan Lone Star A1/A2 State v. Dunn: The Value of Grooming Evidence to Prosecute Child Sexual Abuse Cases Case Study Daniel Clark and Thomas Tueller Lone Star C4 Strangulation: The Hidden Crime in Sexual Violence and Human Trafficking of Children Lecture Kelsey McKay, Rachel Fischer and Cody Mitchell Lone Star C3 Suffer from BURNOUT, Give’em the F.I.N.G.E.R.! Lecture Mark Yarbrough Lone Star A3

15 CASE STUDIES & WORKSHOPS Each session is listed by time block. See pgs. 32–61 for workshop descriptions and pgs. 62–68 for speaker information.

Effective Sex Offender TUESDAY, 8:30–9:45 AM Registry Management: Five Ideas to Work Smarter AUGUST 14 AXIOM Essentials Schedule at a glance: Lecture (Exhibitor Workshop) Adam Kirhagis and Mike Robinson Exhibitor Workshop Austin 3 7:00–8:30 AM Geoff MacGillivray Light Continental Breakfast City View 6 Failure to Thrive: Significance, Identification Registration/Check-In Behavioral Dynamics in Child and Management Lone Star Foyer Sex Trafficking Investigations Lecture Lecture Kathleen Buckley James Hardie TUESDAY Austin 1 8:00AM–5:00 PM Dallas D3 NCMEC CVIP Lab Open Inside the Minds of Sex Offenders: Beyond the Basics: The Essential Psychological Advanced Peer Review and Insights for all Professionals 9:45–10:15 AM Self-Review Strategies for (Part 1 of 2) Break Forensic Interviewers Case Study (Part 1 of 2) Refreshments Provided Joe Sullivan Lecture Lone Star C1/C2 Julie Kenniston, Alexandra Levi 11:30AM–NOON and Amy Allen Interviewing Victims and Austin 2 Witnesses of Abduction Break Lecture No Refreshments Provided Bridging the Unbridgeable Divide: Catherine Connell and Chris Miller A Sexual Assault Prosecution in an Dallas D2 Ultra-Orthodox Jewish Community 1:15–1:45 PM (Part 1 of 2) Investigating and Prosecuting Break Case Study Criminal Neglect and No Refreshments Provided Laura Pierro and Colleen Lynch Failure to Thrive Cambridge Lecture Mary Sawicki 3:00–3:30 PM Combatting Sexual Exploitation Dallas D1 One Traffic Stop at a Time Break Lecture Investigating the Sextortion Case Refreshments Provided Greg Reyero and Michael Bourke Lecture Dallas A3 Crystal Gregory City View 8 6:00 PM Cultural Intelligence in Child Dallas Police Association Maltreatment Investigations Model Practices in Child Hospitality Event Lecture Sexual Abuse Prosecutions Amy Russell Lecture Shuttle Transportation Provided Somerset Edward Chase on Ground Floor of Sheraton Hotel Seminar Digital Safety, Social Media & Kids: What’s New, What’s Now, What’s Next One Murder or Two? Lecture Case Study Katie Greer Crystal Levonius and Wade Hornsby San Antonio A Dallas B Direct and Cross Examination Physical Child Abuse Injury of a Law Enforcement Witness Reconstruction Techniques (Part 1 of 2) (Part 1 of 2) Lecture Lecture Lawrence Braunstein, Julie Kenniston Robert Hugh Farley and Jennifer Sawyer Dallas A1 Lone Star A1/A2

16 Pursuing Child Predators: Applying Use of Medical Experts in Child Fast Digital Triage: the Latest Mobile Forensic Technology Physical and Sexual Abuse Cases Reducing Work and Risk and Techniques to Combat Crimes Lecture in Investigations Against Children (Exhibitor Workshop) Mary-Ann Burkhart Exhibitor Workshop Exhibitor Workshop Dallas A2 Ian Stevenson Rey Navarro City View 7 City View 7 Women Who Molest Children: Offender Typologies (Part 1 of 2) Hands-On Lab: AXIOM Advanced Sexually Violent Predators: Lecture (Exhibitor Workshop) More than Meets the Eye William Carson Exhibitor Workshop Case Study Lone Star A3 Craig Guymon Rachel Jordan and Maureen Whitmore City View 6 Remington How to Use a Predators Grooming Slenderman: No More Secrets 10:15–11:30 AM Techniques in Your Criminal (Part 1 of 2) Anonymization and De-Anonymization Investigation and Prosecution Case Study in Crimes Against Children Cases Lecture Gerald Habanek, Thomas Casey, Lecture Elizabeth Bigham and Daniel Clark Michelle Trussoni and Shelly Fisher Remington Don Colcolough Lone Star B Dallas D2 Inside the Minds of Sex Offenders: Solving Crimes Against Children Beyond the Basics: Advanced Peer The Essential Psychological Insights with ADF Digital Evidence Investigator, Review and Self-Review Strategies for for all Professionals (Part 2 of 2) Part 1 of 2 (Hands-on Lab) Forensic Interviewers (Part 2 of 2) Case Study Exhibitor Workshop Lecture Joe Sullivan Richard Frawley Lone Star C1/C2 Julie Kenniston City View 5 Austin 2 Interviewing: The Art of Interrogation: Bridging the Unbridgeable Divide: What Sex Offenders A 360 Degree Perspective A Sexual Assault Prosecution in an Can Teach Us (Part 1 of 2) Ultra-Orthodox Jewish Community Lecture Lecture (Part 2 of 2) Cory Jewell Jensen Kevin Navarro, Eddie Ibarra Case Study Dallas A3 and Scott Sayers Laura Pierro Dallas C Physical Child Abuse Injury Cambridge Reconstruction Techniques The Best Kept Secret: Child Physical Abuse (Part 2 of 2) Mother-Daughter Sexual Abuse Prosecution Model Practices Lecture (Part 1 of 2) Lecture Robert Hugh Farley Lecture Dallas A1 Bill Fulbright Julie Brand Seminar Lone Star C4 Randy & Me: A Prosecutor’s Story Dealing with Victim Issues in of His Childhood Sexual Abuse The Internet of Things: Understanding Sex Trafficking Cases Case Study and Using IoT to Prove Your Case Lecture Kevin Mulcahy Lecture Dallas B Brooke Grona-Robb Lauren Wagner Dallas D3 Lone Star C3 Scenario-Based Sex Offender Registry Investigations Developing Best Practice Lecture The Meika Jordan Protocols for the MDT Response Child Homicide Investigation to Child Abuse Cases Adam Kirhagis (Part 1 of 2) Austin 3 Case Study Lecture Rosalie Morales, Adrienne Owen Michael Cavilla and Darren Moss Sex Offender Registration in the and Diane Klecan Plaza B/C United States: Update and Trends City View 8 Lecture The Parenting Effect: Direct and Cross Examination Lori McPherson The Key to Successful Therapy State 1 Lecture of a Law Enforcement Witness (Part 2 of 2) Should it Hurt to be Me?: Kimberley Montgomery Lecture State 1 Understanding and Responding to Lawrence Braunstein Trauma Experienced by LGBTQ+ Youth Understanding Sex Offenders Lone Star A1/A2 Lecture (Part 1 of 2) Tanisha Knighton Lecture Somerset Jim Tanner Lone Star A4 10:15–11:30 AM continued on next page 17 10:15–11:30 AM continued Understanding Sex Offenders Drug Exposed Children: (Part 2 of 2) Intervention, Arrest and Prosecution Slenderman: No More Secrets Lecture Lecture (Part 2 of 2) Jim Tanner Marshall Davidson and Andy Meiron Case Study Lone Star A4 Dallas D3 Gerald Habanek Lone Star B Women Who Molest Children: Empathy Based Interrogation (EBI): Offender Typologies Shifting from Confession to Solving Crimes Against Children with (Part 2 of 2) Conversation to Build the ADF Digital Evidence Investigator Lecture Strongest Case (Part 2 of 2) (Hands-On Lab) William Carson Lecture Exhibitor Workshop Lone Star A3 Michael Milnor Richard Frawley Dallas C City View 5 Houston A Ethical Considerations 12:00–1:15 PM in Child Abuse Cases The Art of Interrogation: Lecture A 360 Degree Perspective (Part 2 of 2) Ages and Stages of Child Sexual Development and Behavior: Edward Chase TUESDAY Lecture Remington Kevin Navarro What’s Normal and What’s Not Dallas C Lecture How a Cat Video is Educating Lisa Schuster Teens About Sextortion The Best Kept Secret: Cambridge Lecture Mother-Daughter Sexual Abuse Apple Law Enforcement Leah Treitman and Kristy Kosak (Part 2 of 2) Dallas A3 Lecture Response Forum Julie Brand Lecture Interviewing Juvenile Lone Star C4 Pat Burke and Dylan Dorow Sex Trafficking Victims Seminar Lecture The Meika Jordan Appropriate Consequences Catherine Connell Child Homicide Investigation Austin 2 (Part 2 of 2) for Cyber-Bullying, Sexting Case Study and Other Juvenille Crimes Investigation and Prosecution Michael Cavilla and Darren Moss Lecture of Child Fatality Plaza B/C Richard Wistocki Lecture Lone Star B Robert Parrish The Perfect Pick: Victimizing Lone Star C1/C2 the Intellectually Disabled Blake Robert Johnston: Lecture Conducting a Complex Making Sense of Modern Jen Falk International Investigation Communications in Investigations Dallas A2 Case Study Lecture Lesley Hill Evan Nicholas and Alan Kin The Skinny on Investigating and Plaza B/C Dallas D1 Prosecuting Starvation Cases Lecture Blending In: How Offenders NCMEC Escalated Cybertips: Eren Price Groom Society and Victims Case Studies and Results Austin 1 Lecture Case Study Andi Grosvald Hamilton, Lindsay Marchant and Too Hot to Handle: Melissa Travis-Neal and Rebecca Sternburg Evaluating Pediatric Burns Maria Rosales-Lambert Somerset Lecture Dallas D2 Suzanne Dakil Offender Watch Q/A Dallas D1 Child Pornography and the Lecture Relationship to Contact Offending Adam Kirhagis and Joel Shoultz Tweets, Likes, and Shares: Lecture Austin 3 Advanced Social Media Joe Laramie Investigations Lone Star A4 Operation Subterfuge: Lecture An International Sextortion Case Lauren Wagner and Justin Fitzsimmons Childsplay: Investigating and Case Study Lone Star C3 Closing a Darknet Child Exploitation J. Brooke Donahue Material Forum Lone Star A3 Understanding and Using Social Case Study Networking and Computer Evidence Graham Pease Overview of the Last Thirty-Five Years Lecture Dallas A2 of the Sexual Victimization of Children Steven DeBrota Lecture San Antonio A Kenneth Lanning Lone Star C4

18 Resolve the Unresolvable: “Evil Torrents” and the Use of Interviewing Suspects in Mobile IP Resolution and Its New Screening Technology to Child Abuse Cases (Part 1 of 2) Use with Child Protection Identify Exploitation, Abuse, Lecture Systems Investigations and Sadism (Part 1 of 2) John Combs Lecture Lecture Dallas C Tom Farrell Michael Bourke and Joe Sullivan City View 8 Lone Star A1/A2 Keeping Your Child Exploitation Investigation Victim Centered Robbie Schuster: Accident or Inflicted.... Lecture A Little Brother’s Secret Investigator YOU Decide! Alexandra “Ale” Levi Case Study Lecture Dallas A2 Chad Bryant Jim Sears Lone Star C3 Dallas A1 Kelsey Smith Case: The Investigation and Its Long-Term Sexting & Cyber-Bullying: Advanced Cold Case, Long Term Impact for Law Enforcement TUESDAY Redefining Dating Violence Missing and Unidentified Human Case Study in the Social Media Age Remains Investigations Greg Smith Lecture Lecture Lone Star B Bronwyn Blake Brian Killacky Austin 1 Seminar Lived to Tell: The Jennifer Schuett Story (Part 1 of 2) Six Keys to Conducting Effective Cultural Intelligence in Child Case Study Smartphone Forensic Investigations Maltreatment Investigations Tim Cromie and Jennifer Schuett Lecture Lecture Plaza B/C Amber Schroader Amy Russell San Antonio A City View 8 Responding to Missing Children and Child Abductions Suffer from BURNOUT, Facebook 101 (Part 1 of 2) Give’em the F.I.N.G.E.R.! Lecture Lecture Lecture Jason Barry Mark MacKizer and Marty Parker Mark Yarbrough City View 7 Lone Star A3 Lone Star A1/A2 Forensic Interviewer in the Revenge Porn: A New Crime The Perils of First Responders: Courtroom (Part 1 of 2) Takes Shape Across the Country Identifying and Managing the Lecture Lecture Impact of Workplace Trauma Rachel Burris and Jesse Gonzalez Shannon O’Brien Lecture Austin 2 Dallas D2 Suzanne Anderson, Tama Walley and Karla Auten Hands-On Lab: AXIOM Essentials Risk Assessment of Child State 1 (Exhibitor Workshop) Pornography and Online Exhibitor Workshop Solicitation Offenders Timeline Development: Geoff MacGillivray Lecture A Visual Tool to Prove Your Case City View 6 Darrel Turner Lecture Lone Star A4 Bonnie Armstrong High Risk Missing Children: Dallas A1 Not ‘Just a Runaway’ Solving Crimes Against Children with Lecture ADF Digital Evidence Investigator, VICleads by Project VIC Rebecca Butler Part 1 of 2 (Hands-on Lab) Lecture Somerset Exhibitor Workshop Richard Brown, Arnold Guerin Richard Frawley and Robert O’Leary Homicidal Drowning and City View 5 City View 7 Immersion Abuse (Part 1 of 2) Lecture Strangulation: Beyond the Virtual Rape: Andrea Zafares Obvious in Your Child Abuse Now a Possibility in Sweden Lone Star C4 Investigations and Prosecutions Case Study (Part 1 of 2) Jörgen Lindeberg Human Trafficking Prevention Lecture Dallas B Through Empowerment and Resiliency Kelsey McKay and Khara Breeden Lecture Lone Star C3 Stephen M. Daley Remington Tech Trends: 1:45–3:00 PM What is the New Evil on the Internet Identifying, Evaluating and Lecture A New Definition of Battered Child Treating Failure to Thrive Syndrome: The Pimp Daddy Batterer Ben Butler and Chris Roosenraad Lecture Plaza A Lecture Sandra Onyi and Carly Brenner Sharon Cooper Cambridge 1:45–3:00 PM continued Dallas B on next page 19 1:45–3:00 PM continued Debunking Defenses in Child Lived to Tell: The Jennifer Schuett Physical and Sexual Abuse Cases Story (Part 2 of 2) The MDT Approach to Recantation Lecture Case Study (Part 1 of 2) Mary Sawicki Tim Cromie and Jennifer Schuett Lecture Dallas A1 Plaza B/C Mary Ann Burkhart and Jerri Sites Dallas A3 Decrypting a Predator: Mobile Acquisition Uncovered: An Offender, an Encrypted Drive, The Past, Present and Future of U.S. Marshals Overview: and Victims at Home and Abroad Mobile Device Investigations A Session for USMS Users Only Case Study Lecture (Part 1 of 2) Denise Biehn Geoff MacGillivray Lecture Dallas D2 Austin 1 Joel Shoultz and Katie Sternberger Austin 3 Deterrence Strategies Organized Offenders in Child Lecture Pornography Investigations Uber Law Enforcement Operations: Kristy Kosak, Matthew Dunn Lecture How Uber Can Assist with and Joe Adcock Sharon Cooper Criminal Investigations Plaza A Dallas B

TUESDAY Lecture Billy Kewell and Wade Stormer “Evil Torrents” and the Use of Responding to Missing Children State 1 New Screening Technology to and Child Abductions (Part 2 of 2) Identify Exploitation, Abuse, Lecture Understanding Cutting Edge and Sadism (Part 2 of 2) Mark MacKizer Criminal Tradecraft Lecture Lone Star A3 Lecture Michael Bourke and Joe Sullivan Steven DeBrota Lone Star A1/A2 Should it Hurt to be Me?: Austin 1 Understanding and Responding Facebook: Combatting Attempts to Trauma Experienced by Using Virtual Machines to Use Online Platforms for LGBTQ+ Youth in an Investigation Sex Trafficking Lecture Lecture Lecture Tanisha Knighton Dean Chatfield and George Vasiliou Antigone Davis, Julie de Bailliencourt City View 8 San Antonio A and Karuna Nain Lone Star A4 Solving Crimes Against Children with What Child Molesters Can Teach Us ADF Digital Evidence Investigator About Grooming (Part 1 of 2) Forensic Interviewer in the Courtroom (Part 2 of 2) (Hands-On Lab) Lecture (Part 2 of 2) Exhibitor Workshop Cory Jewell Jensen Lecture Richard Frawley Lone Star C1/C2 Rachel Burris City View 5 Austin 2 When Faith Hurts: Recognizing and Strangulation: Beyond the Obvious in Responding to the Spiritual Impact Getting Grants Your Child Abuse Investigations and of Child Abuse Before, During and Lecture Prosecutions (Part 2 of 2) After the Forensic Interview Jim Tanner Lecture Lecture State 1 Kelsey McKay Victor Vieth Lone Star C3 Dallas D1 Hands-On Lab: AXIOM Advanced (Exhibitor Workshop) When the Victim is on the Run: Exhibitor Workshop Prosecuting Sex Trafficking Craig Guymon ATTEND Cases without the Victim City View 6 Lecture THE EXHIBITOR Brooke Grona-Robb Homicidal Drowning and Dallas D3 Immersion Abuse (Part 2 of 2) WORKSHOPS! Lecture Andrea Zafares Attendees will receive one Lone Star C4 3:30–4:45 PM entry (for each exhibitor workshop Interviewing Suspects in Children in the Digital Age Child Abuse Cases (Part 2 of 2) attended) to a drawing for 2 Apple Lecture Lecture Watches, awarded Wednesday Joe Laramie John Combs Remington evening at the social event. Dallas C You must be present to win.

20 The Complexity of Child Abuse Working with Victims and Witnesses Cases in Indian Country with Developmental Delays and Lecture Intellectual Disabilities Geri Wisner Lecture Somerset Bill Fulbright Dallas A2 The Federal Prosecution of Larry Nassar Case Study Sean Lewis 5:15–6:30 PM Lone Star B A Predator Hiding in Plain Sight: The MDT Approach to Recantation An Inside Look at the Victim-Centered (Part 2 of 2) Approach to the Larry Nassar Case Lecture Case Study TUESDAY Jerri Sites Andrea Munford and Angela Povilaitis Dallas A3 Lone Star B Truth or Fiction: Red Flags and Fatal Fires Involving Children: Risk Factors for Sex Trafficking Accidental, Homicide or Suicide? Lecture Lecture Ada McCloud Jim Holler Dallas D3 Lone Star A4 U.S. Marshals Overview: A Session for Grooming Behaviors USMS Users Only (Part 2 of 2) of Child Molesters and Lecture Their Impact on Victims Joel Shoultz Lecture Austin 3 Darrel Turner Lone Star C4 Using NamUs to Resolve Long-Term Missing and Unidentified Child Cases Michael Devlin Case Study Lecture Case Study B.J. Spamer William Carson Seminar Austin 1 What Child Molestors Can Teach Us Perpetrators of Child Sexual Abuse: About Grooming (Part 2 of 2) Get Tuned In Lecture Lecture Cory Jewell Jensen Graham Hill Lone Star C1/C2 Lone Star A3 When Did It Happen Doctor? Religious Medical Neglect and Timing of Injuries in Children Religious Medical Exemption Laws Lecture Lecture Matthew Cox Amy Barton and Alana Minton Cambridge Austin 2 When the Smoke Clears: Resiliency 101: Cross Examining the Defendant From Victim to Survivor and Defense Witnesses Lecture Lecture Julie Brand Victor Vieth Lone Star C3 Dallas D1 The Whole Truth About the Medical Who are the Victims? Diagnosis of Abusive Head Trauma Who are the Offenders? Lecture An Analysis of CVIP Data Robert Parrish Lecture Lone Star C1/C2 Shelley Allwang Victim or Offender? City View 7 Peer Recruitment and Working Undercover on the Drug Trafficking within the Kik Platform Sex Trafficking Experience Lecture Lecture Lindsey Bosso Sue Aboul-Hosn and Octavis Lampkin San Antonio A Lone Star A1/A2

21 CASE STUDIES & WORKSHOPS Each session is listed by time block. See pgs. 32–61 for workshop descriptions and pgs. 62–68 for speaker information.

Five B’s of Child Physical Abuse: WEDNESDAY, 8:30–9:45 AM Bruises, Burns, Bones, Bellies, and Brains (Part 1 of 2) AUGUST 15 A Close-up Look at Female Schedule at a glance: Lecture Sex Offenders in Positions of Trust Kristen Reeder (Part 1 of 2) Dallas D2 7:00–8:30 AM Lecture Light Continental Breakfast Julie Brand Infant and Toddler Death Investigation Dallas B (Part 1 of 2) Registration/Check-In Lecture Lone Star Foyer Advanced Trafficking Victim Denise Bertone Interviewing: Survivor Centered Lone Star A1/A2 Strategies to Elicit Evidence 8:00AM–5:00 PM and Enhance Cooperation Interviewing Child Victims on the NCMEC CVIP Lab Open (Part 1 of 2) Autism Spectrum (Part 1 of 2) Lecture Lecture Maurice Washington David Fallon 9:45–10:15 AM Somerset Remington Break Apple Law Enforcement Interviewing Suspects in Refreshments Provided Response Forum Child Abuse Cases (Part 1 of 2) Lecture Lecture 11:30 am–Noon Pat Burke and Dylan Dorow John Combs Break Seminar Plaza B/C WEDNESDAY No Refreshments Provided Child Pornography and the Investigating Child Homicide Cases Relationship to Contact Offending (Part 1 of 2) Lecture Lecture 1:15–1:45 PM Joe Laramie Nancy Oglesby and Michael Milnor Break Dallas D1 Austin 2 No Refreshments Provided Child Sexual Exploitation Investigations in the Cloud Communities on Tor Lecture 3:00–3:30 PM Lecture John Sedoski Karlene Clapp State 4 Break San Antonio A Refreshments Provided Legal Rights of Teen Direct and Cross of a Dating Violence Survivors Forensic Interviewer Bronwyn Blake 7:00 PM (Part 1 of 2) City View 6 Conference Fiesta: Lecture Conference Networking Event Lawrence Braunstein, Robin Pittman Like a Footprint in Wet Cement: and Dave Clark Understanding Adverse Childhood Lone Star Ballroom Cambridge Experience Research Lecture Effective Sex Offender Victor Vieth 7:45 PM Registry Management: Lone Star A4 Drawing for an Apple Watch Five Ideas to Work Smarter For those who attended Exhibitor Lecture Listen and Learn: An MDT Model Adam Kirhagis for Improving the Response to Workshops (must be present to win) Austin 1 Child Abuse in Indian Country Lecture Ethics and Risk Management Gina South and Geri Wisner for Mental Health Professionals: State 1 The Impact of the Digital Age Lecture NCIC: Q&A Session Tanisha Knighton Lecture City View 7 Joel Shoultz Austin 3

22 Posing and Performing: Efforts to Understanding Cutting Edge Drone Investigations 101 Deceive the Reality of Sexual Abuse Criminal Tradecraft Lecture and Exploitation (Part 1 of 2) Lecture Jerry Jones Lecture Steven DeBrota State 4 Sharon Cooper Dallas A2 Lone Star A3 Five B’s of Child Physical Abuse: Understanding Sex Offenders Bruises, Burns, Bones, Bellies, and Sex Offenders: What Judges, (Part 1 of 2) Brains (Part 2 of 2) Prosecutors, Investigators and Child Lecture Lecture Advocates Should Know (Part 1 of 2) Jim Tanner Kristen Reeder Lecture Dallas C Dallas D2 Cory Jewell Jensen Dallas A1 When Your Forensic Tools Won’t Work Fourth Amendment Issues Lecture in Child Abuse Cases Solving Crimes Against Children Jeff Shackelford Lecture with ADF Digital Evidence Investigator City View 8 Amy Russell (Part 1 of 2) Hands-on Lab Dallas A2 Exhibitor Workshop Richard Frawley Infant and Toddler Death Investigation City View 5 10:15–11:30 AM (Part 2 of 2) A Close-up Look at Female Sex Lecture Solving the Series: Offenders in Positions of Trust Denise Bertone The Case of the Creeper (Part 2 of 2) Lone Star A1/A2

(Part 1 of 2) WEDNESDAY Case Study Lecture Interviewing Child Victims on the Julie Brand Jeff Udvarhelyi and Damien Jackson Autism Spectrum (Part 2 of 2) Dallas B Lone Star B Lecture Advanced Trafficking Victim David Fallon Strangulation: Beyond the Remington Obvious in Your Child Abuse Interviewing: Survivor Centered Investigations and Prosecutions Strategies to Elicit Evidence Interviewing Suspects in (Part 1 of 2) and Enhance Cooperation Child Abuse Cases (Part 2 of 2) (Part 2 of 2) Lecture Lecture Lecture Kelsey McKay and Khara Breeden John Combs Maurice Washington Dallas A3 Plaza B/C Somerset Suffer from BURNOUT, Investigating Child Homicide Cases Give’em the F.I.N.G.E.R.! Catching Perps When All You (Part 2 of 2) Have is an Intercept Lecture Lecture Exhibitor Workshop Mark Yarbrough Nancy Oglesby Michael Staggs Dallas D3 Austin 2 City View 6 The Apple Dumpling Gang Investigating the Sextortion Case (Part 1 of 2) Child Abuse Basics for Educators Lecture Case Study Lecture Crystal Gregory and David Fultzer Crystal Levonius and Lisa Martinez Anne Darr, Penelope Gallegos and Plaza A Lone Star A4 Whitney Orndorff Lone Star C4 Live-Streaming Investigations: Children and Young People Investigative and Prosecutorial The Dark Net and Emerging Engaging in Problematic Sexual Techniques Behavior (PSB) Lecture Technologies: Where Are Teens Case Study Going and Offenders Following? Austin Berrier Lecture Joe Sullivan Dallas D3 Lone Star C1/C2 Lauren Wagner and Justin Fitzsimmons Lone Star C3 Locating a Wi-Fi Moocher Direct and Cross of a Forensic Case Study The Final Straw: Interviewer (Part 2 of 2) Dedric Jones and Mohamed Bah How Global Cooperation Ended Lecture City View 8 an International Manhunt Lawrence Braunstein Case Study Cambridge Mobile/Express/Booking Alert Overview Lecture Shelley Allwang and Daljit (Dolly) Gill Don’t Make Parents Choose: Lone Star C1/C2 Katie Sternberger Why CACs Should be Providing Austin 3 Trial Preparation and Strategy Problematic Sexual Behavior – in the Age of Social Media Cognitive Behavioral Therapy Lecture Lecture 10:15–11:30 AM continued Kelly Slaven, Katrina Cook, Shannon O’Brien and Zeus Flores on next page Jennifer Sherenian and Carrie Wright Plaza A Seminar 23 10:15–11:30 AM continued Strangulation: Beyond the Obvious in Finding Nadia: The FBI International Your Child Abuse Investigations and Parental Kidnapping Investigation Multidisciplinary Approach to Prosecutions (Part 2 of 2) Spanning 20 Years and Four Countries Child Pornography Investigations Lecture Case Study Lecture Kelsey McKay Jennifer Romero, Shannon Enochs Amy Barton and Tim Brady Dallas A3 and Carsten Otting Dallas D1 Lone Star C4 Understanding Sex Offenders NCMEC Escalated Cybertips: (Part 2 of 2) Identifying Dynamics of Abuse Case Studies and Results Lecture and Corroborative Evidence in Case Study Jim Tanner the Child Forensic Interview Lindsay Marchant and Dallas C Case Study Rebecca Sternburg Jerri Sites State 1 U.S. Marshals: Fugitive Sex Offenders Lone Star A4 and an Overview of Sex Offender Online Open Source Intelligence, Registry Differences Interviewing Developmentally Delayed Tools and Techniques within Lecture Child Sexual Abuse Suspects Crimes Against Children Cases: Justin Vickers and Tim Orava Lecture Knowing What Is Out There Austin 1 Katie Petersen Lecture Plaza B/C Don Colcolough San Antonio A It’s All in the Investigation 12:00–1:15 PM Lecture Posing and Performing: Appropriate Consequences Brandie Wade and Pamela Womack Efforts to Deceive the Reality Seminar of Sexual Abuse and Exploitation for Cyber-Bullying, Sexting and (Part 2 of 2) Other Juvenile Crimes Maintaining Your Balance: Lecture Lecture Technology Tools for Wellness Sharon Cooper Richard Wistocki Lecture Lone Star A3 Austin 2 Elizabeth Tow and Michael Sullivan

WEDNESDAY Dallas D2 Protecting Yourself in Behavioral Dynamics in Child a Technological World: Sex Trafficking Investigations Michael Devlin Case Study Digital Officer Safety Lecture Case Study and Ethical Concerns James Hardie William Carson Lecture Somerset Dallas B Lauren Wagner and Justin Fitzsimmons Bikers Against Child Abuse: Lone Star C3 Multidisciplinary Team Response Helping Empower Abused Children to Suspected Abusive Injuries Pursuing Child Predators: Lecture Lecture Applying the Latest Mobile Forensic Lock Shaffer and Scott Ryan Matthew Cox, Amy Morgan Technology and Techniques to City View 8 and Kassandra Slaven Combat Crimes Against Children Lone Star C3 (Exhibitor Workshop) Combatting Sexual Exploitation One Traffic Stop at a Time Navigating the Noise: Exhibitor Workshop Lecture Rey Navarro Using Sophisticated Techniques Greg Reyero and Michael Bourke City View 7 in Online Enticement Cases Dallas A2 Case Study Sex Offenders: What Judges, Corroboration in Child Abuse Matthew Fowler Prosecutors, Investigators San Antonio A and Child Advocates Should Know Investigations: The Difference (Part 2 of 2) Between Justice and OffenderWatch Training Searches Lecture Continued Victimization Lecture Lecture Cory Jewell Jensen Joel Shoultz Donald Hayden Dallas A1 Austin 3 Dallas D3 Solving Crimes Against Children Online Child Sexual Exploitation with ADF Digital Evidence Investigator Debunking Defenses in Child in the Philippines: The Challenges and (Part 2 of 2) (Hands-on Lab) Physical and Sexual Abuse Cases Effective Investigative Strategies Exhibitor Workshop Lecture Lecture Mary Sawicki Richard Frawley Martin Conley and Jesse Donkers Remington City View 5 Dallas A3 Solving the Series: The Case of the Perpetrators of Child Sexual Abuse: Creeper (Part 2 of 2) Get Tuned In Case Study Lecture Jeff Udvarhelyi Graham Hill Lone Star B Lone Star A1/A2 24 Scenario-Based Sex Offender You Have that SEX Case.... Investigator Bias and False Registry Investigations What Does that Mean? Allegations of Child Abuse Lecture Lecture Lecture Adam Kirhagis Jim Sears Amy Russell Austin 1 Dallas A1 Lone Star C4 State v. Dunn: Zachary Garrett: Pimp Daddy and Making Sense of Modern The Value of Grooming Evidence to His Two-Year Old Daughter Communications in Investigations Prosecute Child Sexual Abuse Cases Case Study Lecture Case Study James Holdman Evan Nicholas and Alan Kivi Daniel Clark and Thomas Tueller Lone Star B City View 8 Plaza A Making Something Out of Nothing: The Bigger Picture of Child What to Do When You Have Sex Trafficking & NCMEC: 1:45–3:00 PM Limited Evidence Trends, Patterns, and Resources A Predator Hiding in Plain Sight: Lecture for Law Enforcement An Inside Look at the Victim-Centered Paul Wolpert and Kristin Joseph Lecture Approach to the Larry Nassar Case Dallas A1 Staca Shehan Case Study City View 7 OffenderWatch Open Session for Q&A Andrea Munford and Angela Povilaitis Lecture The Disappearance of Willow Long: Lone Star B Joel Shoultz What Really Happened? Ages and Stages of Child Sexual Austin 3

Case Study WEDNESDAY Development and Behavior: Operation Dry Dock: Timothy Brown and Jeffrey Kline What’s Normal and What’s Not Lone Star C1/C2 Local Lead to International Lecture Child Rescue Effort (Part 1 of 2) The Federal Prosecution Lisa Schuster Case Study of Larry Nassar City View 7 Michael Johnson, John Pirics Case Study Criminal Minds: Inside the Mind and Steven DeBrota Sean Lewis of a Pedophile (Part 1 of 2) Dallas C Dallas C Lecture Prosecuting Pimps: How to Build a Too Hot to Handle: Jim Holler Case Against a Sex Trafficker Evaluating Pediatric Burns Plaza A Lecture Lecture Empathy Based Interrogation (EBI): Brooke Grona-Robb Suzanne Dakil Shifting from Confession to Dallas D1 Lone Star A3 Conversation to Build the Reel Lies: A Failed Film Maker’s Uber Law Enforcement Operations: Strongest Case Decline into Sex Trafficking How Uber Can Assist with Lecture Case Study Criminal Investigations Michael Milnor Ingrid Arbuthnot-Stohl, Natalie D’Amico Lecture Dallas A2 and Catherine Crisham Billy Kewell, Wade Stormer Homicidal Drowning and Lone Star C1/C2 and Ana Lorena Vigil Immersion Abuse (Part 1 of 2) State 1 Serving Multi-Victim Lecture Families within TF-CBT Using NamUs to Resolve Long-Term Andrea Zafares Lecture Missing and Unidentified Child Cases Dallas B Leslie Boutte and Lauren Copenhaver Lecture Seminar How Not to Help the Defense Attorney B.J. Spamer in Child Sexual Abuse Cases City View 6 Techniques and Technologies (Part 1 of 2) for Digital Media Investigations Utilizing Evidence in Forensic Lecture Lecture interviews: Homeland Security Lawrence Braunstein John Penn Investigation’s Prepare and Predict Lone Star A1/A2 San Antonio A Forensic Interview Guidelines Lecture Interviewing Non-English Speaking The Art of Interrogation: Families (Part 1 of 2) A 360 Degree Perspective Stacey Kreitz Lecture Cambridge (Part 1 of 2) Maria Rosales-Lambert Lecture Victim or Offender? Peer Recruitment Cambridge Kevin Navarro, Eddie Ibarra and Drug Trafficking within the Investigation and Prosecution and Scott Sayers Sex Trafficking Experience of Child Fatality Plaza B/C Lecture Lecture Sue Aboul-Hosn and Octavis Lampkin Robert Parrish Dallas D1 1:45–3:00 PM continued Lone Star A3 on next page 25 1:45–3:00 PM continued What Dr. Seuss Knows about Doing Identifying, Evaluating and THIS Job! Wellness/Survival and the Treating Failure to Thrive The International Child MDT Approach to Child Abuse! Lecture Sexual Exploitation Database: Lecture Sandra Onyi and Carly Brenner Best Practices and Latest Dan Powers City View 8 Enhancements Dallas D3 Lecture Increasing Public Safety Through Miriam Longo Community Partnerships City View 6 Lecture 3:30–4:45 PM Joel Shoultz and John Strain The Perfect Pick: Austin 1 Victimizing the Intellectually Disabled Am I The Only One Who Feels Lecture This Way? Wellness Tools For Interviewing Non-English Your Personal Toolbox Jen Falk Speaking Families Lecture Remington (Part 2 of 2) Elizabeth Tow, Michael Sullivan and Lecture Beth Medina Timeline Development: Maria Rosales-Lambert Dallas D2 A Visual Tool to Prove Your Case Cambridge Lecture Anonymization and De-Anonymization Bonnie Armstrong in Crimes Against Children Cases Investigating and Prosecuting Dallas A3 Lecture Criminal Neglect and Failure to Thrive Lecture U.S. Marshals: Overview of the Don Colcolough Dallas A2 Mary Sawicki Missing Child Unit and Resources Austin 2 Offered by the National Sex Offender Bikers Against Child Abuse: Targeting Center Helping Empower Abused Children Investigations in the Cloud Lecture Lecture Lecture Eric Mayo and Gerald Dysart Lock Shaffer and Scott Ryan John Sedoski Austin 1 Remington State 4 Using the Tactical Polygraph WEDNESDAY Child Abduction Homicides Kenneth Stokes: in Crimes Against Children Lecture Web Master and Child Molester Investigations Brian Killacky and Ron Laney Case Study Lecture Dallas A1 James Holdman Matthew Mull Lone Star C4 Somerset Criminal Minds: Inside the Mind of a Pedophile (Part 2 of 2) Mobile Device Evidence in Using Virtual Machines Lecture Peer-2-Peer Investigations in the Prosecution of a Child Jim Holler Lecture Pornography Investigation Plaza A Keith Leavitt Lecture Dallas D3 Justin Fitzsimmons and George Vasilou Developing Best Practice Dallas D2 Protocols for the MDT Response OffenderWatch Open Session for Q&A to Child Abuse Cases Lecture Virtual Currency Investigations Lecture Lecture Joel Shoultz Rosalie Morales, Adrienne Owen Austin 3 Eric Huber and Diane Klecan State 4 State 1 One Party Consent Phone Call: The Undisputed Evidence in Voir Dire: Child Sexual Abuse Gone Rogue: Your Investigation Lecture A Teacher’s Perspective Lecture Marissa Aulbaugh and Lauren Hopkins Lecture Dave Clark State 1 Graham Hill Dallas A3 What About Our Boys? Lone Star A4 Operation Dry Dock: Understanding the Challenges Homicidal Drowning Facing Male Victims of Sexual Local Lead to International Child and Immersion Abuse Rescue Effort (Part 2 of 2) Abuse and Assault (Part 2 of 2) Lecture Case Study Lecture Michael Johnson, John Pirics and Julie Brand Andrea Zafares Lone Star A4 Steven DeBrota Dallas B Dallas C What Do We Do?: School Incident Response Plans How Not to Help the Defense Sex Offenders Who Seek Work for Advocacy Centers Attorney in Child Sexual Abuse Cases with Children Overseas Lecture (Part 2 of 2) Lecture Lecture Carrie Paschall, Sarah Burns Joe Sullivan and Steve Reeves Lawrence Braunstein and Chelsea Zortman Lone Star C1/C2 Lone Star A1/A2 Austin 2 26 Sexual Abuse Medical Literature Review Lecture Matthew Cox City View 7 Spiritual Struggles of Sexually Abused Adolescents Lecture Ernest Jouriles, Renee McDonald and Katrina Cook Seminar Strangulation: The Hidden Crime in Sexual Violence and Human Trafficking of Children Lecture Kelsey McKay, Rachel Fischer and Cody Mitchell Lone Star C3 Systems Response to Human Trafficking:

A Multi-Level Education Approach WEDNESDAY Lecture Aria Flood and Jenna Cooper Somerset The Art of Interrogation: A 360 Degree Perspective (Part 2 of 2) Lecture Kevin Navarro Plaza B/C The Whole Truth About the Medical Diagnosis of Abusive Head Trauma Lecture Robert Parrish Lone Star A3 Understanding Research and Prevention Best Practices to Better Protect Children Lecture Stacy Pendarvis City View 6 When the Victim is on the Run: Prosecuting Sex Trafficking Cases Without the Victim Lecture Brooke Grona-Robb Dallas D1 Working Undercover on the Kik Platform Lecture Lindsey Bosso San Antonio A

27 CASE STUDIES & WORKSHOPS Each session is listed by time block. See pgs. 32–61 for workshop descriptions and pgs. 62–68 for speaker information.

Fatal Fires Involving Children: THURSDAY, 8:30–9:45 AM Accidental, Homicide or Suicide? Lecture AUGUST 16 A Family Affair: Schedule at a glance: Jim Holler A Life of Hidden Abuse Seminar Case Study 7:00–8:30 AM Lon Ziankoski and Karl Stonebarger How to Use a Predators Grooming Lone Star A4 Techniques in Your Criminal Light Continental Breakfast Investigation and Prosecution Registration/Check-In Abuse in the Hospital Setting: Lecture Lone Star Foyer A Case Study Elizabeth Bigham and Daniel Clark Case Study City View 7 Matthew Cox, Amy Morgan 8:00AM–Noon and Kassandra Slaven Infant and Toddler Death Investigation NCMEC CVIP Lab Open Lone Star C1/C2 (Part 1 of 2) Lecture Advanced Trafficking Denise Bertone 9:45–10:15 AM Victim Interviewing: Dallas B Survivor Centered Strategies Break to Elicit Evidence and Enhance Interviewing Child Victims on the Refreshments Provided Cooperation (Part 1 of 2) Autism Spectrum (Part 1 of 2) Lecture Lecture Maurice Washington David Fallon 10:15–11:30 AM Dallas D2 Bordeaux Workshops Bridging the Unbridgeable Divide: Kelsey Smith Case: A Sexual Assault Prosecution in an The Investigation and Its Long-Term 11:30 AM Ultra-Orthodox Jewish Community Impact for Law Enforcement Conference Concludes (Part 1 of 2) Case Study Case Study Greg Smith Laura Pierro and Colleen Lynch Lone Star C3 Austin 2 Livestreaming Investigative and Child Sex Trafficking in Rural America Prosecutorial Techniques Lecture Lecture THURSDAY Julie Pfluger and Elizabeth Altman Austin Berrier Dallas A2 Lone Star C4 Corroboration and the MDT in Nutshells (Part 1 of 2) Child Sexual Abuse Investigations Lecture Lecture Michael Bourke, Jim Tanner, Nancy Hebert and Adam Acosta Graham Hill, Darrell Turner, Remington Joe Sullivan and Greg Reyero Dallas C Decrypting a Predator: An Offender, an Encrypted Drive, Online Open Source Intelligence, and Victims at Home and Abroad Tools and Techniques within Case Study Crimes Against Children Cases: Denise Biehn Knowing What Is Out There Lone Star A1/A2 Lecture SAVE THE DATE Don Colcolough Drone Investigations 101 Houston C FOR THE 31ST Lecture Jerry Jones Operation Hydrant: The UK Law ANNUAL CRIMES State 4 Enforcement Response to AGAINST CHILDREN Non-recent Child Sexual Abuse Facilitating Forensic Interviews Case Study CONFERENCE of Cyber Crimes Simon Bailey Lecture Lone Star A3 Crystal Gregory and David Foltzer AUGUST 12-15, 2019 Somerset

28 Political and Personal Dilemmas Trial Preparation and Strategy Failure to Thrive: in Rescuing Children from Online in the Age of Social Media Significance, Identification Child Sexual Abuse Lecture and Management Lecture Shannon O’Brien and Zeus Flores Lecture Robert Shilling Austin 3 Kathleen Buckley San Antonio A Lone Star A3 Truth or Fiction: Red Flags and Risk Religious Medical Neglect and Factors for Sex Trafficking How to Educate Youth and Parents Religious Medical Exemption Laws Lecture on Healthier Device Use and Proactive Lecture Ada McCloud Predator Prevention Practices Amy Barton and Alana Minton City View 8 Lecture City View 6 Jay Martin Seminar Sex Offender Registration in the United States: Update and Trends 10:15–11:30 AM Infant and Toddler Death Investigation Lecture Advanced Trafficking Victim (Part 2 of 2) Lori McPherson Interviewing: Survivor Centered Lecture State 1 Strategies to Elicit Evidence and David Fallon Dallas B Slenderman: No More Secrets Enhance Cooperation (Part 2 of 2) (Part 1 of 2) Lecture Interviewing Child Victims on the Case Study Maurice Washington Autism Spectrum (Part 2 of 2) Gerald Habanek, Thomas Casey, Dallas D2 Lecture Michelle Trussoni and Shelly Fisher Barely Legal: Older Minors Denise Bertone Plaza B/C in Domestic Sex Trafficking Bordeaux Starving for Attention: Lecture Interviewing Victims and The Investigation and Jeanne Allert Witnesses of Abduction Prosecution of Nicole Finn City View 8 Lecture Case Study Blake Robert Johnston: Catherine Connell and Chris Miller Bret Lucas, Nan Horvat Conducting a Complex Somerset and Christopher Morgan International Investigation Lone Star B Investigator Bias and False Case Study Allegations of Child Abuse The Apple Dumpling Gang Lesley Hill Lecture

(Part 1 of 2) Austin 3 Amy Russell THURSDAY Case Study Bridging the Unbridgeable Divide: City View 6 Anne Darr, Penelope Gallegos A Sexual Assault Prosecution in an It’s All in the Investigation and Whitney Orndorff Ultra-Orthodox Jewish Community Dallas A3 Lecture (Part 2 of 2) Brandie Wade and Pamela Womack The Best Kept Secret: Case Study Lone Star A4 Mother-Daughter Sexual Abuse Laura Pierro (Part 1 of 2) Austin 2 Navigating the Noise: Lecture Using Sophisticated Techniques Child Sexual Exploitation in Online Enticement Cases Julie Brand Communities on Tor Dallas A1 Case Study Lecture Matthew Fowler The International Child Karlene Clapp Houston C Sexual Exploitation Database: San Antonio A Best Practices and Latest Nutshells (Part 2 of 2) Enhancements Collaborative Approaches to Lecture Lecture Addressing the Trafficking of Michael Bourke Children Around the World Dallas C Miriam Longo Lecture Dallas D3 Sarah Wentz, Nattakern Noree Perverted Justice: The Meika Jordan and Fitri Noriana The Predator Police Chief Child Homicide Investigation Remington Case Study Case Study Grace Pandithurai and Rick Sipes Drug Exposed Children: Lone Star A1/A2 Michael Cavilla and Darren Moss Intervention, Arrest and Prosecution Dallas D1 Lecture The Sex Trafficking of Minors: Marshall Davidson and Andy Meiron Tools for Recovery State 1 Lecture 10:15–11:30 AM continued Jenni Thompson on next page Austin 1

29 10:15–11:30 AM continued The Disappearance of Willow Long: Victim or Offender? What Really Happened? Peer Recruitment and Sex Over Love: A Mother’s Choice Case Study Drug Trafficking within the Case Study Timothy Brown and Jeffrey Kline Sex Trafficking Experience Habon Mohamed and Lone Star C4 Lecture Elizabeth Glidewell Sue Aboul-Hosn and Octavis Lampkin Lone Star C3 The Meika Jordan Austin 1 Child Homicide Investigation Sexually Violent Predators: Case Study Virtual Currency Investigations More than Meets the Eye Michael Cavilla and Darren Moss Lecture Case Study Dallas D1 Eric Huber Rachel Jordan and Maureen Whittmore State 4 Lone Star C1/C2 The Seven Steps of Sexual Grooming of Children Virtual Rape: Slenderman: No More Secrets Lecture Now a Possibility in Sweden (Part 2 of 2) Thomas Tueller Case Study Case Study Dallas D3 Jörgen Lindeberg Gerald Habanek Dallas A2 Plaza B/C Using the Tactical Polygraph in Crimes Against Children You Can’t Make This Stuff Up! The Apple Dumpling Gang (Part 2 of 2) Investigations Lecture Case Study Lecture Jim Tanner, Darrel Turner, Graham Hill Anne Darr Matthew Mull and Lawrence Braunstein Dallas A3 City View 7 Lone Star B The Best Kept Secret: Mother-Daughter Sexual Abuse (Part 2 of 2) Lecture Julie Brand Dallas A1 THURSDAY

30 COMPUTER LAB SCHEDULE

Computer labs are held on the 3rd floor of the conference center. After you check in for the conference, please visit the 3rd floor to make any changes to your computer lab schedule or to check for open lab seats. The 3rd floor will be open from 2:00–6:00 PM on Sunday. We have not listed the computer lab schedule in the program. Visit the 3rd floor or download our app to view the full computer lab schedule. Please note that the computer lab schedule differs from the regular conference schedule.

SUNDAY MONDAY TUESDAY WEDNESDAY THURSDAY

2:00–9:00 PM 7:00–8:15 AM 7:00–8:30 AM 7:00–8:30 AM 7:00–8:30 AM BEAT THE CROWD Light Continental Breakfast Light Continental Breakfast Light Continental Breakfast Light Continental Breakfast Conference Check-in Registration/Check-in is on the 2nd floor of the Sheraton 8:15–9:30 AM 8:30–10:00 AM 8:30–10:00 AM 8:30–10:00 AM Conference Center. Opening Plenary Computer Labs Computer Labs Computer Labs

10:30 AM–NOON 10:30 AM–NOON 10:30 AM–NOON 10:30 AM–NOON Computer Labs Computer Labs Computer Labs Computer Labs

NOON–1:30 PM NOON–1:30 PM NOON–1:30 PM NOON Lunch On Your Own Lunch On Your Own Lunch On Your Own Conference Concludes

1:30–3:00 PM 1:30–3:00 PM 1:30–3:00 PM Computer Labs Computer Labs Computer Labs

3:30–5:00 PM 3:30–5:00 PM 3:30–5:00 PM Computer Labs Computer Labs Computer Labs

6:00 PM 7:00 PM Dallas Police Association CONFERENCE FIESTA Hospitality Event Dinner served until 8:30 Optional off-site Networking Event

SPECIAL THANKS TO THIS YEAR’S CONFERENCE COMPUTER LAB PARTNERS

Bedford County Sheriff’s Office Paraben Corporation National Criminal Justice Training Center Florida Department of Law Enforcement Illinois Office of the Attorney General SEARCH NW3C

31 WORKSHOP DESCRIPTIONS This is a comprehensive list of Workshop, Case Study, and Exhibitor Workshop Descriptions. Computer Lab descriptions can be found on the App and upstairs on the 3rd floor.

A Close-up Look at Female victim impacts in domestic minor sex trafficking discuss how Nassar hid behind a mask of respect, Sex Offenders in Positions of Trust is the physical assaults by traffickers who batter prestige, and Olympic glory. This presentation (Part 1 & 2) and the endangerment of youth when they are will cover a wide range of topics including: how to Julie Brand sold to violent and at times homicidal dates or conduct a large scale, multi-victim investigation, We have been slow to acknowledge that women buyers. This presentation will discuss the types how to make charging decisions that are the sexually abuse children. The abuse almost always of physical abuse that children experience in sex most powerful, how to best support victims who occurs within a trusted relationship between the trafficking by an offender who is in the role of are dealing with trauma uncovered decades child and a family member, a respected adult loco parentis – in place of a parent. Research later, how to identify expert witnesses, how to friend or teacher. This workshop examines has revealed numerous methods of abuse and maneuver the media attention, working with recent cases of female teachers found guilty torture definitions have been found in some plaintiff’s civil attorneys, how the unique plea of child sexual abuse. It explores the dynamics cases to be appropriate and timely. These agreement was fashioned that resulted in an of their teacher-student “relationships” and facts are helpful in charging sex traffickers and unprecedented and empowering sentencing reveals ways that the gender of the perpetrator obtaining a careful examination with a body map hearing, and other lessons we learned along impacts victim disclosures, the reporting of sex by the health care provider will be supportive the way. crimes, arrests, public response, prosecution, evidence of this new definition of the battered and sentencing. An interview with an archetypal child syndrome. Abuse in the Hospital Setting: convicted female offender will offer insights into A Case Study offenders’ personality characteristics and how A Non-Confrontational Approach Matthew Cox, Amy Morgan, these may contribute to their sexually abusive to Child Abuse Investigations Kassandra Slaven behavior with adolescents. The presenter will Thomas McGreal This presentation will review a case involving a identify unique challenges which male victims This presentation will teach and reinforce the young child admitted to the hospital for feeding face as they work to recover and to heal from fundamentals of the Wicklander-Zulawski Non- problems. During the course of the prolonged such betrayals. Participants will learn proactive Confrontational Interview and Interrogation hospitalization, the medical team started having strategies for possible prevention and earlier Method. Instruction, specific to child abuse concerns about the mother exaggerating intervention. investigations, will include proven techniques clinical symptoms. The child had unexplained to overcome resistance, offer rationalizations, episodes of hypernatremia (increased blood A Family Affair: handle denials, detect deception, and evaluate sodium levels.) A report to child welfare was A Life of Hidden Abuse truthfulness. Participants will learn to assess made and investigators identified the mother Lon Ziankoski, Karl Stonebarger, verbal and non-verbal behavior and become had been causing harm to her child in the Michael Eckler more effective at developing information and hospital. The medical complexities of the case, This case study will take you behind the scenes of obtaining admissions. Using a structured non- the outstanding detective work, and the criminal an investigation in which a 20-minute interview confrontational approach, an investigator is prosecution of the case will be reviewed by with a jailhouse informant led to uncovering 13 often able to obtain a confession without the the multidisciplinary team members who were years of sexual abuse involving multiple child suspect ever making a denial or protesting his involved in the case. victims, perpetrated by multiple suspects. Clif innocence. In addition, the resulting confession Seaway’s life of abuse was a “normal” way of life often includes information not revealed during Accident or Inflicted.... for his victims. The presentation will detail how the investigation. This workshop is sponsored Investigator YOU Decide! on-scene forensics were critical to breaking the by Wicklander-Zulawsk, an Exhibitor for the Jim Sears case wide open. The grooming process of not Crimes Against Children Conference. This presentation will present some of the recent only the children, but also of two female suspects medical findings on child abuse and discuss how will be reviewed, as well as how Seaway avoided A Predator Hiding in Plain Sight: they can be used to determine which childhood detection even after a child victim came forward. An Inside Look at the Victim-Centered injuries are most likely accidental and which are

WORKSHOP WORKSHOP Finally, the presenters will discuss the MDT Approach to the Larry Nassar Case mostly likely inflicted. The presenter will explain DESCRIPTIONS approach, state vs. federal prosecution, and Andrea Munford, Angela Povilaitis some of the common myths and misconceptions how over 500 documented days of abuse were During this session you will hear from the two about physical abuse and focus on investigative uncovered, leading to a successful prosecution. women who led the team that brought down strategies for those injuries that are inflicted. This America’s most prolific sexual perpetrator, Larry workshop will address bone fractures, burns, A New Definition of Battered Child Nassar, and who helped to empower hundreds bruises, strangulation, and inflicted head trauma. Syndrome: The Pimp Daddy Batterer of women to come forward and speak their Sharon Cooper truth while the world watched. What guided the Advanced Cold Case, Long Term There are several areas of victim impact in presenters and their team was a commitment to Missing and Unidentified Human sex trafficking of minors – coerced drugging, handling the case in a trauma-informed, victim- Remains Investigations pornography production, gang rapes and centered and offender-focused manner. The lead Brian Killacky exposure to serious infections such as HIV/ prosecutor of the Nassar state prosecutions and This presentation will discuss the strategies, AIDS. But the most life-threatening of all of the the detective in charge of the investigation, will effort and initiative required to revisit cases

32 involving cold cases, long term missing and tools and techniques. Attend this workshop and Barely Legal: Older Minors unidentified human remains investigations that learn how to build a personal toolbox that will in Domestic Sex Trafficking may have become closed, suspended, forgotten add to your resiliency and well-being. Jeanne Allert or never even initially reported to authorities. The Federal definition of human trafficking This presentation is sponsored by the National Anonymization and De-Anonymization asserts a line of demarcation at age 18, Criminal Justice Training Center (NCJTC). in Crimes Against Children Cases suggesting a clear distinction between minors Don Colcolough and adults. The crime, however, disrespects this Advanced Trafficking Child predators and child pornographers distinction and, instead, preys upon the reality Victim Interviewing: are now more than ever integrating complex that age is relative. This session grapples with Survivor Centered Strategies computer technology and Internet-facilitated the complexities and the challenges of attending to Elicit Evidence and Enhance anonymization programming. De-Anonymization to victims in the 16-21 age range: within the Cooperation (Part 1 & 2) comprehension is a must for an exponentially crime, in the legal process, and across victim Maurice Washington growing number of crimes against children services. Several case studies will be presented. This presentation is an advanced “how to” investigators, prosecutors as criminals are workshop for interviewing sexually exploited adopting these technologies prior to their Behavioral Dynamics in Child persons. It is a trauma-informed and victim- illegal acts. This vendor neutral workshop will Sex Trafficking Investigations centered presentation that will discuss introduce and demonstrate state-of-the-art tools, James Hardie breaking down issues related to sex trafficking networks, online services, and techniques. Onion Sex trafficking of children is a crime where victims; useful tactics to elicit evidence and Routers, VPN anonymizers, Web Beacons/Bugs some of the most vulnerable members of our gain cooperation; the trauma experienced by will be highlighted along with other anti-forensic society are exploited for the financial gain of the victims; the importance of developing trust and technologies. Legal considerations on these trafficker. The unique behavioral dynamics in understanding the effect trauma can have on advanced Internet technologies will be discussed these cases can present significant challenges victims; and the reactions and triggers they within this workshop. Criminal investigators and to investigators. Building upon research demonstrate during the interview process. The prosecutors should simultaneously comprehend conducted by the FBI’s Behavioral Analysis presenter will utilize audience participation and these growing subject matters as they are being Unit, this presentation will help attendees provide case examples, including audio and intertwined in a growing number of state, federal better understand these dynamics to enhance video recordings, to illustrate the points being and U.S. military crimes against children cases. their response to these cases. The presenter made. will discuss tools available for investigators, Apple Law Enforcement including the FBI’s Sex Trafficking of Juveniles: Ages and Stages of Child Sexual Response Forum An Investigative Guide for Law Enforcement, Development and Behavior: Pat Burke, Dylan Dorow which will covered in the workshop. Particular What’s Normal and What’s Not Attend this forum if you have questions about attention will be focused on sex offender typology Lisa Schuster what data Apple can provide to law enforcement. and behavior, with additional insight from the A developmental perspective will guide this The presenters will answer any questions you perspective of interacting with these offenders discussion of normative and concerning sexual have about how Apple can help with your in an undercover role. Victimology will also be behaviors during childhood. This presentation investigations. This session is restricted to law discussed to include suggestions for overcoming will discuss introductory information regarding enforcement only. barriers to prosecution in these cases. sexual development and behavior. Each developmental stage (infants, toddlers and Appropriate Consequences Best Practices: Analyzing Data preschoolers, young children, school-age for Cyber-Bullying, Sexting and from GrayKey-Unlocked iPhones children, and adolescents) will be explored Other Juvenile Crimes in CAC Investigations including normal sexual behaviors and those Richard Wistocki Rey Navarro This presentation will discuss the appropriate that could be red flags of abuse. Strategies The inability to access data on many newer DESCRIPTIONS for addressing sexual behaviors will also be consequences for children who make “mistakes” iPhone models has been a major obstacle for WORKSHOP reviewed. Finally, several case examples will in their Internet activities and the appropriate investigators working CAC cases as well as other be discussed and evaluated on a continuum of consequences that are available options to law enforcement professionals. Now, with the sexual behaviors using an interactive audience making arrests and giving them records for new capability offered by GrayKey to unlock and response system. Handouts will be provided for the rest of their lives. By attending this workshop extract data from iPhones, investigators have normative/concerning sexual behaviors at each you will learn about Juvenile Justice Online, a new options. and challenges, i.e., since the developmental stage. program that provides the ability to provide very large data sets that GrayKey can deliver a diversion to educate and train, not only the call for analysis tools that can help you search Am I The Only One Who Feels juvenile, but their parents as well. It takes a and analyze with speed and flexibility. This lab This Way? Wellness Tools For Your village to raise our children in this high tech session will share best practices for decoding, Personal Toolbox world in which our children live. This program searching, filtering and reporting on iPhone data Elizabeth Tow, Michael Sullivan, is not only a case management system, but it with a focus on the challenges faced by CAC Beth Medina is a training system for judges, prosecutors, investigators including searching for images, STOP!! – this is one presentation you won’t want probation, SRO’s, law enforcement and school chat and social media data, accessing Project to miss. Join us in an interactive presentation administrators to use. From truancy to sexting, VIC hashed images, and more. where we will explore the concerns/questions giving our kids an education and making their that you have about what this job does to your parents more responsible is what Juvenile mental health and wellness and answer them Justice Online accomplishes. with science, nutrition, emotional, and wellness

33 Beyond the Basics: law enforcement across the globe. HSI London Catching Perps When All You Have is Advanced Peer Review and assisted in identifying approximately 13% of all an Intercept (Exhibitor Workshop) Self-Review Strategies for victims in this case and will provide a unique Michael Staggs Forensic Interviewers (Part 1 & 2) insight to working with foreign law enforcement. There are cases where all we have to work with Julie Kenniston, Alexandra “Ale” Levi, is a packet capture file and small snippets of Amy Allen Blending In: How Offenders graphics or other evidence. By themselves, Current research suggests that, in addition Groom Society and Victims they aren’t nearly enough for a prosecution to training and supervision, peer review and Andi Grosvald Hamilton, in a criminal case. In this lecture and live self-evaluation are necessary to maintain and Melissa Travis-Neal, demonstration, the presenter, a forensic scientist improve preferred forensic interviewing practices. Maria Rosales-Lambert with Nuix, will show you how to reassemble the This workshop will teach participants to move Perpetrators of child sexual abuse (CSA) often payloads of the intercepted traffic into the actual beyond the basics and develop advanced gain the trust of child victims and their caregivers full files—graphics, text, email messages, and peer and self-review techniques in the areas by methodically “grooming” them. This process more—which you can then use as evidence to of enhanced rapport-building, narrative event begins with identifying potential victims, gaining proceed with a prosecution or other legal action. practice, question strategies, victim blaming the trust of children and caregivers, and breaking This is an exhibitor workshop presented by Nuix issues, quality versus quantity, reluctant youth down both of their defenses. Grooming sets USG exhibiting on the 2nd floor in booth #11. and presentation of evidence. This presentation up a relationship grounded in secrecy so that is sponsored by the National Criminal Justice the crime is less likely to be discovered and, Child Abuse Basics for Educators Training Center (NCJTC). once disclosure is made, the child is less likely Crystal Levonius to be believed. This presentation begins with If you are an educator, chances are you are Bikers Against Child Abuse: a look at how offenders groom people in a interacting with children who have been abused. Helping Empower Abused Children child’s environment—including at school and Educators are often the individuals who first Lock Shaffer, Scott Ryan religious locales—and then will examine the notice or who are made aware of the abuse. This multimedia presentation will utilize a lecture grooming of victims. Finally, the presentation There are times educators are well meaning format with Q&A discussion to educate the will focus on two separate case studies where and intend to help, but inadvertently harm audience about Bikers Against Child Abuse offenders’ grooming tactics enabled them to a case because they do not understand the (aka BACA). The organization exists to help engage in long-term sexual abuse of multiple process. This presentation will help those who support and empower severely abused children children despite red flags that came up about the are in the field to identify signs of child abuse, to not live in fear and face their perpetrators in offenders years before they were finally charged. understand the reporting requirements of abuse, court. BACA is an adjunctive intervention offered and appreciate the process that occurs from the to work collaboratively with Law Enforcement, Bridging the Unbridgeable Divide: outcry to disposition of a case. District Attorney’s Offices/Victims Services, A Sexual Assault Prosecution in an Children’s Advocacy Centers, CASA, the public Ultra-Orthodox Jewish Community Child Homicide Investigations child welfare system and any other entity. The (Part 1 & 2) Brian Killacky presenters will discuss the research supporting Laura Pierro, Colleen Lynch This workshop is for those professionals BACA and similar interventions, describe the A young boy is sexually abused by his camp conducting investigations and prosecuting impetus and history of BACA, outline the process counselor and his father turns to police. those responsible for the murder of children. for becoming a BACA member, and appropriate That seemingly ordinary decision sets off an The presenter will discuss the methods required child referrals and the levels of intervention. extraordinary result: a firestorm raging between to establish the fact a crime has been committed, Sample case studies and testimonials will also the family and their neighbors and their ultimate the process to identify those responsible and be provided. exile from their community and home. This case to prove these allegations beyond a reasonable study will delve ‘deep in the heart’ of the Ultra- doubt. Blake Robert Johnston: Orthodox Jewish Community of Lakewood, New Conducting a Complex Jersey and detail what normally occurs when Child Physical Abuse International Investigation an allegation of sexual abuse is raised, and the Prosecution Model Practices Lesley Hill lengths the Community will go to not to report Bill Fulbright Hundreds of on-line victims??? In multiple it to authorities. The presenters will describe This presentation will cover the best practices for foreign countries? OMG! Where do I start! why police were ultimately notified and take you the law enforcement officer or prosecutor who In 2014, police in Martinez CA received through the very complex investigative and legal gets the call or assignment on a child physical information that a 14 year-old female from case that became watershed in that community. abuse case, putting all involved on the same WORKSHOP WORKSHOP Presenters will discuss the internal investigation page for collection and presentation of evidence

DESCRIPTIONS Oregon, suspected of being the victim of a kidnap after grooming, was in the company of and adjudication that takes place in the Jewish necessary to succeed in holding the offender local resident Blake Robert Johnston. Police community and the overall difficulty in achieving accountable. located the victim in Johnston’s residence and open communication. The presentation will this complex investigation was initiated. The case discuss the evidence and the various motions; Child Pornography and the was adopted by HSI San Francisco, and accepted the legal need to pierce the therapist/patient Relationship to Contact Offending for federal prosecution with more than 15,000 privilege in order to admit a confession; Joe Laramie images of children located on Johnston’s devices. pervasive witness tampering and two last minute In this presentation, participants will gain a Victims were located in dozens of states, and evidence discoveries that reignited the storm. better understanding of child pornography in multiple foreign countries. How do we work See link: http://www.survivorsforjustice.org/ offenders and dispel the “it’s just pictures” with foreign law enforcement? Where do we index.php?option=com_content&view=articl myth. Attendees will hear of the devastating start? What time is it in London! This is a case e&id=809&Itemid=193 and long-term impact on victims, and research study of the Johnston investigation, and a more highlighting the possible correlation between general discussion on how to work with foreign those who collect child pornography and those

34 who molest children. The benefits of aggressive complexities of a range of scenarios that can it will introduce the Global Freedom Exchange investigations into collectors as a child sexual arise when it emerges that a child has been a model, which demonstrates the importance of abuse prevention tool will be discussed. This victim of sexual exploitation and/or has engaged multi-sector collaboration to address trafficking. presentation is sponsored by the National in PSB towards another child or an adult. Next, it will discuss efforts assisting children Criminal Justice Training Center (NCJTC). from rescue through repatriation and beyond, Children in the Digital Age concluding with a perspective on how diverse Child Protection System (CPS) Update Joe Laramie forms of trafficking are most effectively William Wiltse In an age where technology is in the hands of addressed through multidisciplinary teams. This hands-on lab is designed for currently youth of all ages, the dangers of abuse can Lastly, it will highlight challenges in supporting licensed and experienced peer-to-peer affect any child, from any background. These survivors, including reintegration and restitution, investigators and will showcase the newest dangers, ranging from cyberbullying to self- and will underscore the importance of advocacy functionality built-in to the Child Protection victimization (sexting) to sexual exploitation and collaboration with government, law System (CPS). Topics include the addition of (sextortion) and abuse can be difficult to identify. enforcement, and the private sector to provide BitTorrent and Chatstep data, Media Library and Also, preventing these digital abuses has often more comprehensive and sustainable services IRC-LE replacement via CPS Desktop integration relied upon the failed use of scare tactics, where to child survivors of sex trafficking. Together, and more. A current CPS license is not required children and teens don’t see themselves as these perspectives will highlight the differences to participate in this lab, nor will a CPS license vulnerable. This workshop will focus on the and similarities surrounding the issue of human be issued upon completion of this training. variety of digital dangers affecting our youth, the trafficking around the world and what can be best methods of obtaining disclosures along with learned from the global community about how Child Sex Trafficking in Rural America effective messaging to prevent digital abuses. best to prevent and respond to child trafficking Julie Pfluger, Elizabeth Altman This presentation is sponsored by the National with child-centered, survivor-centered strategies Many people believe that sex trafficking is what Criminal Justice Training Center (NCJTC). and solutions. they see in the movies or what they read about in the media. However, this is not what sex Childsplay: Investigating and Combatting Sexual Exploitation trafficking looks like in rural America. Situations Closing a Darknet Child Exploitation One Traffic Stop at a Time involving minors who are sex trafficking victims Material Forum Greg Reyero, Michael Bourke in rural areas of Wisconsin are more difficult to Graham Pease How can you more effectively identify victims spot, but no less dangerous or pervasive. This This case study details the process undertaken of child exploitation and trafficking during a session will provide information about what sex to investigate, infiltrate and identify the host seven-minute traffic stop? Are there indicators trafficking looks like in rural America in general, of several of the world’s largest darknet child you might be missing? Presenters from the and describe how sex trafficking is detected abuse forums. Created in 2016, Childsplay was Texas Department of Public Safety Crimes and successfully prosecuted in Wisconsin. This a home to people who have a sexual interest in Against Children Center and the United States presentation will include examples from cases children and images of their abuse. Childsplay Marshals Service will present an innovative the presenters have prosecuted and the lessons was the center piece of Warhead’s World program designed to combat all types of child they learned that are applicable in other rural accompanied by Pre-Teen Feetlove, and Private victimization during roadside encounters. They jurisdictions. Pedo Club, and its downfall is intrinsically linked will share techniques that can be coupled with to the fall of The Giftbox Exchange and other routine police practices to significantly increase Child Sexual Exploitation child exploitation forums. All of them facilitated the likelihood of identifying victimized children Communities on Tor the sharing of child exploitation material, to and their offenders. The workshop will include Karlene Clapp thousands of members. The presentation will examples of cases where officers used these This presentation will be a brief (non-technical) cover the unique challenges presented by TOR interdiction techniques to rescue children. overview of the Tor network, how it works, and and the techniques used to pierce the veil of why it complicates things for law enforcement anonymity, resulting in the identification and Core Skills for Cyber Tracking conducting investigations on child exploitation arrest of the administrators. Furthermore, the Suspects and Predators DESCRIPTIONS offenders. Data seized from one child exploitation presenter will discuss the process which led to Kevin Metcalf WORKSHOP community on Tor will be used to help shed the location of the website’s server, and highlight Cellphones and other mobile devices are light on how communities like these function to the importance of collaboration between computers that use cellular or Wi-Fi service provide child exploitation material and support international agencies. Presenters will discuss to connect to other people, the Internet, or to to their many members. Analysis of individual the legislative environment that enabled the access third-party accounts such as financial user activity as well as the community as a investigation, the practical challenges based on institutions, social media, and email. Connecting, whole will also be discussed. the experience conducting consecutive darknet communicating, and accessing leave a cyber trail investigations since 2014, and highlight the of target identifiers made up of phone numbers, Children and Young People Engaging common techniques that can lead to success. IP addresses, and user names. These target in Problematic Sexual Behavior (PSB) gations since 2014, and highlight the common identifiers provide the means of tracking a Joe Sullivan techniques that can lead to success. device using historical location data with an The problem for many professions is determining almost-up-to-real-time potential or, along whether children engaging in sexual behavior are Collaborative Approaches to with device forensic data, the means to map merely experimenting or whether the activity is Addressing the Trafficking of historical movement for less urgent cases. This problematic. This presentation uses case studies Children Around the World presentation will provide an overview of the and up-to-date research to give professionals Sarah Wentz, Nattakarn Noree, target identifiers, how information is obtained, new knowledge and skills, empowering them to Fitri Noviana and a conceptual framework to understand the undertake accurate assessments and to work This presentation will discuss challenges and interconnection of forensic and service provider in complex family situations more effectively. strategies around the global trafficking of reports. Attendees of this workshop will examine the children from three different perspectives. First,

35 Corroborating Evidence: employment; prior non-abuse related interaction served at the residence and it was determined Reducing the Child’s Stress with law enforcement; childhood; family, friends, that the child pornography images were taken in and Strengthening Your Case and co-workers; current and former paramours; the residence. A juvenile victim was identified. It Jim Holler social media and social activity. The final area was determined that the suspect’s wife, currently Corroborating evidence is evidence that tends to that will be discussed is the defenses likely raised 31 years old, was sexually abused by the suspect support a proposition that is already supported in court. These include: delay in reporting, lack when she was 15. The HSI agent immediately by some initial evidence, therefore confirming of physical or medical evidence, lack of intent, interviewed the suspect at his workplace and he the proposition. Many child sexual abuse cases attacks on the interviewer and investigation, confessed to taking nude pictures of his daughter. come down to a few facts and the child’s and attacks made against the child’s credibility. At the end of the interview even after asking testimony thus causing a huge amount of stress ALBERT if he shared CP with anyone else and on the child victim. Listening carefully to the Criminal Minds: Inside the Mind getting denials one simple question was asked, child’s testimony, as well as conducting a good of a Pedophile (Part 1 & 2) “Have you shared CP with anyone at work”? background investigation into the perpetrator, Jim Holler ALBERT said yes. SA Holdman interviewed will many times reveal very important details This workshop addresses the common Edward PENN a coworker who confessed to that are sometimes overlooked thus reducing trademarks of the preferential child molester, the producing CP and also his wife’s involvement. the child’s stress, as well as building the true pedophile and characteristics and behaviors SA Holdman interviewed Chesele PENN. She prosecution’s case. This workshop will cover that this person may have. The workshop will confessed to producing CP. A total of 5 juvenile the sometimes simple and overlooked clues that also address victim characteristics and behaviors victims were identified. After convictions ALBERT are many times present in a child’s interview by that make the child more vulnerable. This training was sentenced to 17.5 years, Chelese PENN 20 taking apart the interview piece-by-piece, word- will identify the problem of child molestation and years & Edward PENN 30 years in federal prison. by-word, to find clues such as places, sights, provide investigators with insight of what children smells, sounds, etc., that could all potentially who are victimized experience and how that Debunking Defenses in Child be corroborated with a thorough investigation. knowledge can assist in better understanding Physical and Sexual Abuse Cases the crime. The presenter will discuss how this Mary Sawicki Corroboration and the MDT in understanding assists in conducting a better This presentation will explore effective strategies Child Sexual Abuse Investigations investigation resulting in the successful arrest to combat untrue defenses in child physical Nancy Hebert and prosecution of the perpetrator. Lastly the and sexual abuse cases. The importance of a The MDT has one common goal when investigating workshop will provide important strategies about thorough law enforcement investigation in order child sexual abuse cases, i.e., to enhance a investigating the suspect and the crime scene, to debunk defenses in these types of cases will child’s credibility through the development of giving the investigator important tools needed be highlighted. The importance of utilizing an corroborating evidence. This presentation will for a successful prosecution. expert witness for the prosecution in these cases take you from the outcry to the verdict in a child will be emphasized and discussed. abuse case by providing case examples that Cultural Intelligence in Child demonstrate how unexpected evidence from Maltreatment Investigations Decision Making in Cases various disciplines can impact an investigation or Amy Russell of Child Sex Abuse and a trial. These examples will include videos, DNA, The increasing growth of racial and ethnic Future Contact with Children SANE exams, forensic interviews and how they communities and linguistic groups within Cory Jewell Jensen all contained vital corroborating evidence. Many our population, each with its own cultural Many of our current child welfare practices and times verdicts depend on the child’s credibility. traits and child rearing practices, presents family reunification policies are being challenged This presentation emphasizes ways to develop a challenge when responding to allegations by new information about “cross-over” sexual corroborating evidence to provide a safety net of child maltreatment in this country. The crimes among sex offenders, “re-offense” vs. of credibility for a child at trial. systemic response and the children and “recidivism” rates, expected treatment outcomes their families all bring their individual learned and long-term risk management. This presentation Corroboration in Child Abuse patterns of language and culture which must will provide participants with a review of recent Investigations: The Difference be understood to ensure the safety of children. findings as they relate to family decision making, Between Justice and By understanding, valuing, and incorporating contact between sex offenders and children Continued Victimization the cultural differences of America’s diverse and family reunification. Recommendations for Donald Hayden population and examining one’s own values and “case-by-case classification” and case planning The typical child abuse investigation often lacks beliefs, child maltreatment professionals can (based on empirically based risk assessment) WORKSHOP WORKSHOP

DESCRIPTIONS traditional physical evidence and children are support a system that responds appropriately will be outlined. disadvantaged in court. It is the multi-disciplinary to, and directly serves the unique needs of team’s responsibility to corroborate what the populations whose cultures may be different Decrypting a Predator: child has disclosed and act in the child’s best from the prevailing culture. An Offender, an Encrypted Drive, interest. In this workshop, we will examine why and Victims at Home and Abroad corroboration is critical to a successful and David Albert, Denise Biehn healthy outcome for the child. The presentation Edward and Chelese Penn: This case study will detail an investigation that will discuss the various sources of information Work Together, Molest Together began as an allegation of sexual misconduct that can help verify the report of child abuse. James Holdman by an ex-spouse and a delayed report of sexual These include: the victim interview, school The David Albert investigation began when he abuse by a 13-year-old girl and developed into records, social media accounts, electronic sent child pornography to a Homeland Security one with multiple victims in the U.S. and abroad. devices, family, friends, and the crime scene. Investigations (HSI) agent in Maine. A HSI agent The presentation will discuss the facilitation of Examining the suspect’s background will also be in Springfield, Missouri was contacted due to the a successful international investigation while discussed. It provides vital information, including suspect’s location. A federal search warrant was pursuing state charges, the close cooperation

36 between state and local investigators and This lab will cover the use of digital media tools including both the joys and concerns, of the prosecutors, and the multi-disciplinary approach for law enforcement scenarios. Intermediate Dallas Children’s Advocacy Center’s beginning to victim services. The presentation highlights Photoshop, Premiere and Audition will be effort to provide treatment to Children with the investigative strategies and success at taught for working with photos, video and audio. Problematic Sexual Behavior in the last year. exploiting limited electronic evidence when Attendees should leave the course comfortable The topics to be discussed will include: involving faced with a tech-savvy defendant and an with image manipulation and enhancement the multidisciplinary team in a productive way encrypted hard drive. The defendant was tools, video tools for stabilizing shaky video, (from general buy-in to the logistics of the referral convicted of local hands-on offenses but, due sanitizing videos, and the basics of working process); the Family Advocate’s broker role; and to the child sex tourism investigation, was also with enhancing audio files. Lessons should be the storming, norming and performing. Other held responsible for exploiting overseas victims applicable to a wide variety of digital media topics that will be addressed include the support in person and through on-line communication, related law enforcement tasks from forensics, necessary to provide this service in a children’s spy camera tech, and the production of child to victim identification to review of body worn advocacy center environment. pornography. Lastly, the presenters will explain camera footage. how the offender’s abuse of children required a Don’t Let Them Leave!: multi-disciplinary and a multi-agency response Digital Safety, Social Media & Kids: How Family Advocates and Forensic to fully uncover, investigate and prosecute him What’s New, What’s Now, What’s Next Interviewers Work Together for his abuse of children. Katie Greer Megan Bawcum, Kimberly Skidmore, Studies show that kids ages 8-18 are spending Veronica Faus Deterrence Strategies an average of 7.5 hours a day in front of some Often times on the day of a forensic interview, Kristy Kosak, Matthew Dunn, screen; with that, the crimes associated with the child being interviewed feels relieved, Joe Adcock these ever-changing technologies and social while the non-offending caregiver feels like As Internet companies take steps to providing media quickly follow and continue to evolve, they have been hit by a truck. In this workshop, messaging to users to prevent abuse in the maybe faster than we can keep up with them. the presenters will explain how they manage first place, industry gets limited feedback on Today, working with and keeping our youth safe to work together, starting from the day of the its effectiveness. The Technology Coalition will means being constantly aware of what they’re forensic interview and throughout the family’s host this dialogue with law enforcement, the tech doing online, which can be vitally helpful in healing process, all the while protecting the industry and NGOs on strategies for preventing daily cases, and is essential to law enforcement integrity of the investigation. They will also the onset of abuse on online platforms. work across the board. Attendees will leave this discuss how they work with law enforcement workshop with a good understanding of current and child protective services to ensure a Developing Best Practice app and social media trends, how and why family’s engagement throughout the process. Protocols for the MDT Response they’re being used, along with hot topic issue This presentation will cover the Dallas Children to Child Abuse Cases such as sexting, cyberbullying and solicitation Advocacy Center’s Family Advocate continuum Rosalie Morales, Adrienne Owen, through new mediums. of care, and will provide tips and practical advice Diane Klecan for implementing this at your center, with the Formalized agreements, such as memorandums Direct and Cross Examination of a goal being the family’s healing and successful of understanding (MOUs), are often established Law Enforcement Witness (Part 1 & 2) prosecution. This workshop’s goal is to provide by States for the multidisciplinary team (MDT) Lawrence Braunstein, Robin Pittman, a model that reflects the importance of the response to suspected child abuse cases, and Dave Clark collaboration between children advocacy center the majority of these MOUs are structured Testifying in court is usually not an endeavor staff, CPS, and law enforcement. around each agency’s roles and responsibilities which law enforcement officers look forward to. in the MDT response. Delaware has historically This workshop, presented by a defense attorney Drone Investigations 101 structured its MOU in the same manner and and a prosecutor, will deal with issues and topics Jerry Jones

lacked uniform best practice guidelines for the that arise during trial such as interrogation The popularity of recreational drone use has DESCRIPTIONS effective investigation and prosecution of child techniques, Miranda, and one-party consent risen exponentially over the last three years. WORKSHOP abuse cases. In 2017, Delaware’s Children’s telephone calls. This presentation will replicate This presentation is an introductory look into Justice Act State Task Force revised its MOU actual trial situations for law enforcement the history of drones, as well as, the potential to include six best practice protocols for the witnesses thus enabling the learning process crimes involving drones. You will see where the following types of cases: Physical Injury to a of how to be a good witness to occur in a less flight data is located and current methods to Child; Serious Physical Injury to a Child; Child anxiety provoking situation. An experienced law process that data. In addition, current Federal, Death; Child Sexual Abuse; Child Neglect; and enforcement witness will testify on direct and State, and local statutes and regulations will Juvenile Trafficking. In addition to the MOU, the cross examination, and comments as to why be discussed. Task Force updated its state statute to reflect certain questions are asked, hints on how to the current best practices and developed a answer certain questions, tips on how to protect Drug Exposed Children: mobile application for MDT members. This yourself on the witness stand, and other survival Intervention, Arrest and Prosecution workshop will discuss strategies for evolving tips for witnesses will be discussed. Marshall Davidson, Andy Meiron a MOU from a formalized agreement to best This presentation will discuss the magnitude of practice guidelines. The key elements of the Don’t Make Parents Choose: the problem of children exposed to drugs. The MOU will be presented along with the revised Why CACs Should be Providing presenters will explain the ways that children statute and mobile application. Problematic Sexual Behavior – are exposed to drugs as well as the appropriate Cognitive Behavioral Therapy responses that CPS, law enforcement, Digital Media Investigations for Kelly Slaven, Katrina Cook, prosecutors, and other professions can take Law Enforcement (Part 1 & 2) Jennifer Sherenian, Carrie Wright to help protect these children. John Penn This workshop will share the experiences,

37 Effective Sex Offender charging decisions, prosecuting difficult cases, website and contains a substantial amount Registry Management: the importance of always keeping an open mind, of potential investigative information. This Five Ideas to Work Smarter and the effects that our decisions can have on demonstration will explain how Facebook Adam Kirhagis our profession and communities. information can be searched in three In this session, the presenter will provide a brief separate and distinct ways. One method is history of sex offender registration and how Ethics and Risk Management to use Facebook graph search, which uses your agency can most efficiently and effectively for Mental Health Professionals: specific targeted terms that, when used manage these requirements. The five ideas to The Impact of the Digital Age correctly, can show investigative material. work smarter that will be discussed include: Tanisha Knighton The instructor will demonstrate how graph optimizing your office setup; effective interview This presentation will discuss how technology search works, and explain how syntax – the techniques that you should use; what to look creates as many benefits for clients as it structure of the search keywords and phrases for during address verifications; setting your creates ethical challenges for mental health – is vital to a successful search. The second agency up for successful investigations; and professionals. Ethical issues pose some method is to use URL manipulations. Once a lastly, things to consider if your agency uses of the most challenging questions mental Facebook profile has been identified, these civilians as part of the registration or verification health professionals face every day. These URL manipulations can show content from process. This workshop is presented by Watch questions or ethical dilemmas, change with this target, such as photo comments, video Systems, a Sponsor for the Crimes Against each advancement in technology and each new likes, and comparisons with friends. These URL Children Conference.‌ piece of legislation. The presenter will discuss manipulations are specific and offer information how and why mental health professionals must beyond what can be found simply by looking Empathy Based Interrogation (EBI): be mindful when managing their online presence at someone’s profile. The third method uses Shifting from Confession to whether or not they are actively using social Google advanced and Boolean operators to Conversation to Build the media. Additionally, the discussion will explain search on Facebook in a more broad sense. Strongest Case how they must understand how to appropriately Constructing a good keyword string is key to Michael Milnor address challenges they maybe faced with ensuring that investigative material is found. For years, most interrogation techniques have related to managing confidentiality and privacy The instructors will demonstrate examples of focused mainly on only getting a confession. issues, personal disclosure, dual relationships, specific syntax that should be used. Unfortunately, these techniques often backfire and documentation of electronic contact, as and shut an interview down before it can get well as issues related to their use of the Internet, Facebook: Combatting Attempts started. This presentation will discuss how to email, or texting to provide therapy. Participants to Use Online Platforms for conduct Empathy Based Interrogations (EBI). are encouraged to bring their smart phones, Sex Trafficking Without any statements by the accused, the tablets, and/or computers to participate in an Antigone Davis investigation frequently becomes more difficult. interactive training experience. In this presentation Facebook staff will share Child abusers usually want to sell a story for as information on its efforts to combat the use of long as they feel they are being believed. There is “Evil Torrents” and the Use of social media to engage in sex trafficking. They great value in keeping the conversation going and New Screening Technology to will also discuss opportunities to learn from and gaining as much information as possible before Identify Exploitation, Abuse, collaborate with other stakeholders engaged confronting them and pushing for a confession. and Sadism (Part 1 & 2) in this effort and the support of victims of sex EBI is a method which allows investigators to Michael Bourke, Joe Sullivan trafficking. get the most from an interrogation, thereby In this workshop, the presenters will introduce developing leads for corroboration and evidence- a potentially groundbreaking new instrument Facilitating Forensic Interviews gathering. EBI also increases the likelihood designed for use as a screening and interview of Cyber Crimes that the prosecutor will have a full, fleshed-out tool. They then will present the results of Crystal Gregory, David Foltzer statement by which to strategically plan their validation studies and field tests with sex This presentation will discuss each step of cross-examination. Of course, using EBI leads offender populations in the U.S. and U.K. a legally-defensible forensic interview while to confessions as well, but those become an Methods for unearthing acts of sexual depravity, working with electronic evidence whether it is added benefit instead of the only goal of this as well as identifying current and former victims, prior to or after the collection of evidence by law technique. will be discussed. enforcement. The presenters will provide case examples and techniques of gathering details Ethical Considerations Facebook 101 surrounding evidence to gain more investigative WORKSHOP WORKSHOP Jason Barry

DESCRIPTIONS in Child Abuse Cases knowledge. The presenters will focus on Edward Chase In this workshop, the presenter will discuss preparing the interviewer and victim for the use As prosecutors, we are entrusted by society with Facebook’s latest safety and privacy controls of images, chat logs, and other evidence while enormous responsibility. Decisions on whether and safety initiatives designed to disrupt and keeping with the needs of the victim. Various to proceed can be some of the most difficult prevent child exploitation. There will also be a victims’ needs will be discussed, including decisions made by the prosecuting attorney, detailed review of Facebook’s Law Enforcement emotional reactions, compliancy, relationship especially in child abuse cases, resulting in On-line Records Request System and guidelines with the offender, concerns of images being profound effects for victims, the defendant, and for interacting with their Law Enforcement distributed, and preparing for parental reactions. even society at large. Often, the only evidence Response Team. The presenters will also discuss the use of bait is the word of a child. But a difficult case does images/videos and how to inform the victim Facebook: Advanced Searching and not necessarily mean it is a case that should that the offender is not who he or she portrayed Saving Techniques (Part 1 & 2) not be prosecuted. This lecture will examine the him/herself. Lauren Wagner common ethical considerations that arise with Facebook is the largest worldwide social media

38 Failure to Thrive: 65%. In this lab, attendees will see firsthand injuries seen in cases of child physical abuse. Significance, Identification how Spotlight equips law enforcement with The discussion will be case-based and include and Management easy-to-use tools to identify at-risk children examples of abusive and non-abusive injuries. Kathleen Buckley leveraging machine learning algorithms, link The lecture will be geared for CPS workers, law Failure to thrive is a frequent finding in US analysis tools and image similarity searches. enforcement investigators, and attorneys to learn children living in poverty; up to 20% of children the basic aspects of child physical abuse injuries. less than age 4 years old. Identification can often Finding Local Offenders on Omegle be delayed or clouded by inaccurate feeding Michael Sullivan Forensic Interviewer Forum histories. The causes can range from underlying During this hands on lab students will learn Bibiana Dominguez, medical problems, lack of understanding of how to use several techniques to identify local Bernadette Yupit-Martinez routine care of infants and children, mental illness offenders using the website Omegle. During the The Forensic Interviewer Forum will present in caregivers, poverty or generalized neglect. training students will establish an undercover opportunities for networking with others in the This presentation describes the significance email address, a cloud site and created data field of forensic interviewing. This forum will host of failure to thrive for the infant or child, to populate the cloud site. After creating these forensic interviewers from around the country to presents how it is identified, key components items, the students will learn specific terms to discuss relevant topics in the field and discuss in the history which helps to determine the locate offenders on Omegle seeking to sexually current trends in best practice. underlying contributing factors and describes exploit children within their state or city. Forensic Interviewer in the Courtroom the process of intervention and management. Finding Nadia: The FBI International (Part 1 & 2) The presentation includes , case Parental Kidnapping Investigation Rachel Burris, Jesse Gonzalez studies and multiple references to assist with Spanning 20 Years and Four Countries This presentation is specifically for new or identification, intervention and management. Jennifer Romero, Shannon Enochs, relatively new forensic interviewers. It will provide Family Advocate Forum Carsten Otting an in-depth overview into best practice in record Mindy Jackson In 1996, one-year old Nadia Rougebianni was keeping and training documentation for forensic This forum will provide and opportunity for kidnapped by her father. For over 20 years, interviewers right when they enter the field. The networking with others in the field of family Nadia’s mother, Lupe, law enforcement, and the presenters will also talk about how to prepare advocacy. It will include a discussion about National Center for Missing & Exploited Children for your courtroom testimony including how to trends in the filed, barriers encountered, and (NCMEC) searched for her. Twenty-one years watch your forensic interviews in an efficient the best approaches to working with difficult after her abduction as an infant, Nadia was manner to maximize the quality of your testimony. caregivers. It will also provide support to team located in Germany, having no idea that she Attendees will learn important concepts to members in the fastest growing field in the had been taken from her birth mother. This case remember when taking the witness stand and CAC world. study is an excellent example of international will get to observe some mock direct and cross- interagency collaboration and will provide insight examination between the presenters. Lastly, Fatal Fires Involving Children: on this crime from every angle, from investigation attendees will also be given the opportunity Accidental, Homicide or Suicide? to recovery and reunification. The presenters to ask questions and participate interactively Jim Holler will discuss investigative strategies used in the if they wish. Each year nearly 4,000 children, age 14 or location of the victim across four countries, younger, are injured or killed in residential as well as the critical role that the FBI Victim Fourth Amendment Issues fires. Some children are killed in residential Services Division and NCMEC played in notifying in Child Abuse Cases fire settings as a direct result of a caregiver the victim and reuniting her with her mother. Amy Russell killing the child either before the fire or using When is a forensic interview or medical an alleged “accidental” fire to kill the child. Finding the Hands-On examination unconstitutional? Courts across the Offender in Your Jurisdiction United States are split on the issue, which has This presentation will address the duties of DESCRIPTIONS investigating officers and detectives as they Michael Sullivan forced interviewers, investigators and medical WORKSHOP begin to investigate a fatal fire involving a This lab will examine how students can identify professionals to re-examine policies concerning child. Attendees will be provided with the subjects seeking to sexually exploit children when, and under what circumstances a possible essential information on what happens to a using two different chat clients; Chatstep and child victim of maltreatment can be interviewed body subjected to fire effects and what it can Internet Relay Chat. The lab will demonstrate or examined. It is critical that professionals who tell them about the fire as well as about what how to locate offenders from the student’s investigate and prosecute allegations of child occurred before, during, and after the fire. home jurisdiction. Students will learn how to maltreatment understand the facts, holding These facts may be crucial to fire origin and create undercover personas that comply with and potential implications of due process cause determination as well as responsibility the ICAC Standards and Guidelines. They will and Fourth Amendment cases, as previous and motive in an incendiary fire. learn how to locate and trace the IP address and practices may expose investigators to civil screen names in use by the subjects engaging liability, and prosecutors may see criminal Find Child Sex Trafficking Victims in illegal activities. This lab will also examine the convictions overturned on constitutional 65% Faster alternative methods that can be used to identify grounds. This workshop examines the impact Kristin Boorse subjects who have obfuscated their IP Address. of these issues on investigators and interviewers Every day, there are thousands of children being throughout the United States. Participants will bought and sold for sex – making it easier for Five B’s of Child Physical Abuse: learn about the constitutional issues implicated abusers to exploit, advertise and abuse children Bruises, Burns, Bones, Bellies, in child abuse investigations as well as the online. With Spotlight, up to eight children per and Brains (Part 1 & 2) possible ramifications when these rights are day are identified by law enforcement and the Kristen Reeder violated. Alternative responses to child abuse investigation time involved is reduced by up to This presentation will review the variety of investigations will be discussed and evaluated.

39 Getting Grants Dashboard, My Activity, and Google Takeout of child sexual exploitation images and videos. Jim Tanner a powerful tool for law enforcement if they Together with our partners, NCMEC is bridging Responding to Requests for Proposals (RFPs) is can convince a suspect to hand over the login the gap for victims, bringing technology and part of most agencies’ tasks. Based on 46 years credentials to their Google Accounts on consent. industry together to help remove these images of successfully competing for grant funding (with This lecture will address both how to access this from circulation online and change the narrative a 99% success rate), the presenter will share data and legal considerations associated with on the nature of the distribution of exploitation simple steps he uses to ensure his proposals Google user data. imagery. are well received. Developing unique responses within a systematic approach greatly enhances Grooming Behaviors High Risk Missing Children: the chance of being awarded grant funding. of Child Molesters and Not ‘Just a Runaway’ Through the use of actual proposal examples, Their Impact on Victims Rebecca Butler attendees will learn 12 steps that enhance Darrel Turner Missing and runaway children are one of the award prospects. When and how to effectively This presentation focuses on grooming behaviors most vulnerable populations law enforcement use checklists, tables, call outs, and stylistic engaged in by child molesters for the purposes officers encounter. Once missing, these children formatting to help the reviewer understand of gaining and keeping access to victims and are more prone to abuse, sexual violence, and projects will also be covered. preventing disclosure. Grooming techniques, can become ideal targets for sex traffickers. types of grooming, and the effect of grooming This presentation will provide criteria that can Gone Rogue: A Teacher’s Perspective on victim behavior and disclosure of abuse are be used to establish if a child is considered Graham Hill examined here. This presentation presents high risk missing. It will share newly designed When a teacher ‘crosses the line’ with a pupil, current research findings by Dr. Turner, and reporting procedures that can be adopted by the media and society tend to view their behavior videos of interviews with actual offenders and other law enforcement agencies nationwide. in the abstract often focusing on the failure of victims are used to provide real-life examples The presentation will also describe the benefit the school to protect its students rather than of the principles discussed. of applying analytical techniques to locate the perpetrator or victim. This presentation these children. This presentation will address examines the perspective of a male teacher Hands-On Lab: AXIOM Advanced challenges and gaps that prevent an expeditious that engaged in a sexually abusive relationship (Exhibitor Workshop) recovery of these missing children and what with one of his female pupils. The presenter Craig Guymon agencies can do to close these gaps. The will use video interviews with the teacher to In this hands-on lab, we will explore advanced presenter will share case examples outlining contextualize the abuse and gain insight into recovery acquisitions, how AXIOM leverages the techniques that have led to the recovery his perspectives before, during, and after the machine learning for faster examinations, hex of children since being implemented in Texas. abuse became known. decoding, how to use profiles, how to leverage our Connections features for relationship Homicidal Drowning and Google Data Disclosure Policy linking, and more! We will specifically focus Immersion Abuse (Part 1 & 2) Cathy McGoff on how these analysis features can be utilized Andrea Zafares This presentation provides an overview of for Internet crimes again children cases. This This presentation will describe in detail six types Google’s services and technologies, including is an exhibitor workshop presented by Magnet of water immersion abuse involving children. Gmail, YouTube and Voice. In addition to Forensics exhibiting on the 2nd floor in booth #3. After attending this workshop, attendees will describing the types of data available to be able to distinguish each type of immersion law enforcement from those services and Harnessing the Force Multiplier abuse, how they can happen, and what factors technologies, the presenters will review the of NCMEC’s Resources generally contribute to the abuse. The presenter policies and processes by which Google may Dan Mills will explain how caretakers can make the abuse provide data to law enforcement, consistent The National Center for Missing & Exploited seem accidental. Lastly the presenter will ® with state and federal law, including the Stored Children offers a remarkably diverse array of discuss how Munchausen by Proxy apparent Communications Act. resources to law enforcement, child-serving life threatening events can easily be created professionals, parents, children, and other by forced water aspiration. This workshop is a Google User Services: government agencies that are crucial to help must for anyone who will ever investigate a child What You Didn’t Know Was Out There solve cases of missing and/or exploited children. abuse involving a scalding burn or drowning Lauren Wagner, Justin Fitzsimmons This presentation will highlight what agencies event of a child. Everyone with a Google account has access to need to know to bring these resources to bear WORKSHOP WORKSHOP a robust history of information through Google in their investigations and to implement various How a Cat Video is Educating DESCRIPTIONS Dashboard, My Activity, and Google Takeout. prevention programs in their communities. Teens About Sextortion Google Dashboard shows information such Participants will learn about NCMEC case support Leah Treitman, Kristy Kosak as search history, location history, payments and analytical resources, the CyberTipline®, Last year, Thorn and Facebook teamed up to profile, and if the user has an Android phone programs designed to identify potential victims, educate minors about content sextortion on you can even see what apps are installed and additional training opportunities and community social media platforms. They created a video and track the phone’s location live. My Activity will prevention initiatives. web resources that work to create awareness show all of the Google Account information in among young teens about the common tactics a chronological order. Google Takeout allows Help, My Images are Online!: used in grooming and sextortion, de-stigmatize a Google Account user to download a copy of New Ways to Help Victims of the issue, and promote open conversations with their Google data. While most of this history Online Child Sexual Exploitation trusted adults so that they have a stronger safety and tracking information can be disabled or Rebecca Sternburg net to help prevent sextortion and a trusted deleted, much of it is on by default and users This NCMEC presentation will cover the new ally if something feels bad or goes wrong. In are not aware to go delete it. This makes Google initiatives and assistance available to victims this presentation you will learn who Thorn

40 and the Online Safety team at Facebook are, attacks a child emotionally. Improving a child’s be able to incorporate grooming evidence into and how they’ve worked together in the past. emotional intelligence is an essential component their criminal investigations and prosecutions The presenters will discuss the research they our curriculum addresses over others. of the defendants. conducted on content sextortion prior to the campaign development, and walk you through How to Grow a Human Trafficking Prevention the creation process, including how they Family Advocate Program Through Empowerment and Resiliency sourced message and resources. And finally, Mindy Jackson, Yesenia Altamirano, Stephen M. Daley we’ll discuss our results, as well as expansion Clare Walters Is prevention or protection part of your mission? plans for 2018. Family Advocate programs are growing and Are you tired of responding after the crime? building a significant role within the CAC world. If you could be more proactive (fight back) in How Not to Help the Defense Attorney In this presentation you will learn how the Dallas addition to responding and recovery (trying to in Child Sexual Abuse Cases Children’s Advocacy Center has grown their catch up), would you? If you answered “YES” (Part 1 & 2) program from one family advocate to 14 in six to any of these questions, join us, for “this Lawrence Braunstein years and how they have significantly expanded workshop. We will share an evidence-based This workshop, presented by a defense attorney the services family advocates provide for methodology and some revolutionary formulas (who was once a prosecutor), will acquaint law clients. These daily services include: increased that are working today, in prevention and as a enforcement, prosecutors, medical practitioners, engagement on the day of the forensic interview, therapeutic response to predatory victimization. mental health practitioners, child protection screenings assessing for trauma symptoms An education not based on expectations, but caseworkers and victim assistance agency before beginning therapy, ongoing case instead providing personal skill development personnel with the intimate workings of the management and case navigation with weekly and opportunity for our children to be safer in defense in child sexual abuse cases. The following therapy clients, children’s programming in the this world today. Don’t all children deserve the issues will be discussed: the preparation of a waiting rooms and long-term case management “opportunity” to live safer in our world today? defense case, investigative techniques, pretrial to follow up with families after services. The And is it not “Our Responsibility” to teach and motion practice and discovery, examinations presenters will also discuss the special services protect them? Let’s share how? before trial, jury selection, defense trial strategy, their program includes, i.e., evening groups, demonstrative evidence, trial exhibits, cross Holiday Program, Back to School program, Identifying Dynamics of Abuse examination techniques, and courtroom Summer Camps, Court Readiness, and Court and Corroborative Evidence in psychology. By having a broad overview of Accompaniment. the Child Forensic Interview both pretrial and trial procedures, and how the Jerri Sites defense will approach its preparation during each How to Map Pings, IPs, Social Media, This case study illustrates the dynamics of phase of the litigation, the expert and lay (fact) and Other Location Data (Part 1 & 2) abuse and the importance of identifying witness will be better prepared in understanding Kevin Metcalf corroborative evidence from the child forensic their individual role in the proceedings, and Cellphones and other mobile devices are interview. By viewing videoclips of the forensic better prepared to maximize their participation computers that use cellular or Wi-Fi service interview of a 12-year-old victim of child sexual in the overall litigation. to connect to other people, the Internet, or to abuse, participants will engage in a process access third-party accounts such as financial by which they not only focus on the child’s How to Educate Youth and Parents institutions, social media, and email. Connecting, disclosure of abuse and possible physical on Healthier Device Use and Proactive communicating, and accessing leave a cyber trail evidence, but also identify the dynamics of Predator Prevention Practices of target identifiers made up of phone numbers, the child victim’s relationship with the offender, Jay Martin IP addresses, and user names. These target offender manipulation, and other points to be Attendees to this session will learn about the identifiers provide the means of tracking a corroborated. non-profit Digital Futures Initiative (DFi) program device using historical location data with an Identifying, Evaluating and which started in 2009 using evidence-based almost-up-to-real-time potential or, along with DESCRIPTIONS strategies. The presentation will discuss how device forensic data, the means to map historical Treating Failure to Thrive WORKSHOP the curriculum progresses by grade level, how movement for less urgent cases. In this hands- Sandra Onyi, Carly Brenner to become a certified teacher and how to on lab, participants will receive step-by-step This presentation will discuss the issue of failure implement the program in any local jurisdiction guidance in preparing, analyzing, connecting, to thrive (FTT) and provide its medical definition. or school. DFi’s passion is keeping students and and mapping data from target identifier The presenters will review FTT case studies parents educated and proactive in their own reports along with other data often found in with near death outcomes and the importance safety while navigating the world on devices. an investigation case file. Some experience of a collaborative approach in handling them. DFi was created to deliver digital life skills to with would be beneficial but Attendees will gain an understanding of FTT and students and parents in an innovative, consistent not required. its many variations that they may encounter. The way. Lessons are designed by curating the presentation will also discuss ways to identify best content available then compiling it into How to Use a Predators Grooming the origin of FTT (medical vs. environmental), FREE curriculum for any school or group. The Techniques in Your Criminal review growth and recommended ages program includes the self-paced online training, Investigation and Prosecution of use and discuss the medical work-up for FTT PowerPoints, videos, presenter notes and in- Elizabeth Bigham, Daniel Clark and medical follow-up. Lastly, the Importance class activities needed to start teaching. Today’s This presentation will discuss the basic types of of nutritional assessment and determination of children are the first generation of digital natives grooming techniques that are used by predators, caloric needs in these case will be discussed. making them more globally aware, however how they are utilized with the victim, and how there are more issues with the lack of digital they assist in the sexual abuse of a child. After Increasing Public Safety Through guidance and misinformation flooding their attending this workshop attendees will be able Community Partnerships devices in an instant. Internet exploitation to utilize what is learned from the techniques and Joel Shoultz, John Strain

41 This workshop will focus on increasing public and technology-facilitated child abuse and Interviewing Non-English Speaking safety and education by building better exploitation, it is crucial that teams are mindful Families (Part 1 & 2) community relations through your sex offender of the differences in child victims. One population Maria Rosales-Lambert management efforts. Attendees will learn that requires much planning prior to the interview Professionals are faced with many challenges various methods to foster better communication is “at risk” children. This presentation defines “at when interviewing adults and children whose between your agency and the public through the risk” children as those where suspicion of abuse first language is not English. It is critical in use of social media, mailings, seasonal press or exploitation is high but there is no outcry. determining what language in which to conduct releases, tips and a variety of outreach efforts. Techniques for these interviews will be offered. the interview and when it is necessary to utilize This presentation is sponsored by the National interpreters. The objective of this workshop is for Infant and Toddler Death Investigation Criminal Justice Training Center (NCJTC). attendees to learn how to best determine what (Part 1 & 2) language is best to conduct the interview, how Denise Bertone Interviewing Child Victims on the to utilize interpreters properly for investigative This presentation will discuss sudden infant Autism Spectrum (Part 1 & 2) interviews, particularly with children. In this death syndrome (SIDS), child abuse and the vast David Fallon, Lynne Wilson-Bruchet workshop, attendees will learn the difference gray area between the two. The importance of This presentation will discuss the vulnerability between consecutive and simultaneous good interviews and detailed scene investigation of children on the spectrum and strategies to interpreting. They will also learn how to guide are paramount, but how is this done when the conduct a successful interview without adding to an interview when using an interpreter. Lastly, parents are so nice and so grief stricken? Is that the child’s stressors. This expanded and updated attendees will learn how to properly select and doll reenactment really necessary? What does presentation will address specific issues that train interpreters. the pathologist mean that they can’t determine may arise when law enforcement, CPS, attorneys a cause of death when the circumstances seem or other professionals are asked to interview Interviewing Suspects in so obvious. What does the doctor mean when child victims/witnesses on the Autism Spectrum. Child Abuse Cases (Part 1 & 2) they say retinal hemorrhages and petechiae The co-presenters will draw on their combined John Combs and what do those signs indicate anyway? Is experience to provide specific and pragmatic This presentation is about interviewing bedsharing really that dangerous and when guidance to attendees, to include practical life- suspects in child abuse cases. It will focus does it become a crime? How can it be that the experience as a parent of special needs children on the importance of rapport building and emergency room doctor said it was SIDS and and as an interviewer of both typical and special learning about the suspect’s stressors. the medical examiner says they saw trauma? needs children. The presentation will include Theme development, detecting deception and During this lecture attendees will walk down the interview footage. confronting the deception will be discussed. investigative path with the presenter and arrive Several short case studies will be presented, with with some knowledge and confidence in how Interviewing Developmentally Delayed actual interview excerpts, in order to show how it we can better serve these children. Child Sexual Abuse Suspects works and what to look for. These cases include Katie Petersen physical abuse of an infant, long-term sexual Inside the Minds of Sex Offenders: This presentation will be from a law enforcement abuse involving a step-father and daughter, the The Essential Psychological perspective, identifying techniques and sexual abuse of a three year-old by a step-father, Insights for all Professionals questions taken from child forensic interview and the sexual abuse involving a father and (Part 1 & 2) methods in order to interview developmentally a daughter. The use of consensual-overhear Joe Sullivan delayed suspects in child sexual abuse cases. recorded phones calls with the suspect will If we don’t understand how individuals sexually The presenter will discuss how gathering be discussed. The presenter will explain when exploit children and groom the protective adults in information using developmentally sensitive and to use this tool, who should make the call and their world we cannot effectively interview them legally sound methods will help elicit accurate developing a “theme” prior to making the call. or implement child safeguarding. Professionals information, minimize the potential for false Actual excerpts from two case studies will be who enhance their knowledge of offender confessions, hold offenders accountable, and used as examples. behavior can recognize situations where children will later assist other professionals in evaluating might be at risk or engage more effectively with the suspect’s competency. Interviewing Victims and perpetrators, victims and their families. When we Witnesses of Abduction understand the complexity and subtleties of the Interviewing Juvenile Catherine Connell, Chris Miller problem we can better implement policies and Sex Trafficking Victims This lecture will address the interview, a critical procedures within our organizations and ensure Catherine Connell component in investigations involving witnesses WORKSHOP WORKSHOP This workshop will address the fundamental

DESCRIPTIONS effective safeguarding for all. Referencing newly and victims in abduction cases. Dynamics published research from 2017 and 2018, this and most critical component of investigations of witnesses and recovered victims will be presentation will reveal the most contemporary involving child/adolescent victims of commercial discussed and what the interview barriers may insights into offender motivation and behavior. sexual exploitation - the interview of the victim. look like. Who should conduct the interview, the Using video interviews with sex offenders, this Participants will learn about the FBI’s forensic timing of the interview and reunification will also presentation also provides insights into the interviewing protocol and how it is utilized when be addressed. motivations, thoughts and behaviors of child interviewing these victims. Victim dynamics and sex offenders. barriers that impact the victims’ reluctance to Interviewing: What Sex Offenders disclose will be addressed. This presentation Can Teach Us Interviewing At Risk Children will provide participants with tools and skills Cory Jewell Jensen Julie Kenniston necessary to identify and overcome the This presentation examines the relationship As child forensic interviewers and children challenges of these difficult interviews. between confession rates and sex offender advocacy centers become more connected to characteristics (ie., offender age, relationship Internet Crimes Against Children (ICAC) cases to victim, personality type, offense history and

42 prior experience with the criminal justice system). Introduction to Open Source Digital necessary to reach the level of proof beyond a In addition, several studies that examined the Forensics (Part 1 & 2) reasonable doubt. effectiveness of various interviewer styles Dean Chatfield (investigator demeanor and approach) will be This lab will demonstrate and teach Autopsy®, Investigating the Sextortion Case reviewed. Lastly, the presenter will provide which is an automated environment that has Crystal Gregory, David Foltzer anecdotal comments (from 121 admitting adult the core analysis features needed by law A growing trend in online child exploitation involves male sex offenders) related to the thoughts enforcement to conduct an investigation of the use of social media and chat platforms. and concerns they had while they were digital media, such as hard drives, memory Many targets utilize bait personas to deceive and initially being interviewed by detectives. Their cards, or mobile devices. Autopsy® has been coerce minors into self-producing pornographic comments focus on the reason they declined to developed by Basis Technology and an open images and videos. Threats of exposure of be interviewed, lied about their sexual offending, source community. Autopsy® is available FREE previous victimization continue the abuse and or confessed. Video clips will also be used to of charge. Students will receive an introduction can include the introduction of additional victims. illustrate some of the specific skills used by to the software and how they can utilize it during This collaborative presentation will discuss police to enable offenders to confess, along their investigations to assist with the recover of sextortion investigations with an emphasis on with recommendations for specific interview digital evidence. Attendees should have a basic special victim considerations. Recent case comment/questions from 26 veteran child abuse understanding of computer forensics. studies will be included. detectives from 10 law enforcement agencies in Oregon. Introduction to Undercover Chat Investigation and Prosecution (Part 1 & 2) of Child Fatality Introduction to Digital Triage Jim Valley Robert Parrish with WinFE (Part 1 & 2) This lab will provide an introduction and overview The variety of ways caregivers abuse and Dean Chatfield of basic undercover chat investigations. The ultimately cause fatal injuries to children The Windows Forensic Environment (WinFE) is presenters will discuss the tools needed to set continues to expand, with high-profile reports of a new bootable forensic environment. WinFE up a lab, as well as the related issues that should children starved to death, tortured, or subjected does not mount the suspect’s hard drive which be considered while doing so. Students will learn to incredible forms of physical abuse. This will allow investigators to operate in a traditional how to configure computers for chat and then presentation will focus on the essentials of a Windows environment and run their preview visit some specific chat sites on the Internet. child fatality investigation necessary to allow tools against a suspect computer. This lab and The discussion will demonstrate common ways a successful child welfare case or a criminal lecture will provide the attendee with the skills to chat to potential predators. The latter half of prosecution followed by a discussion of how to and software necessary to create a WinFE the class will have students going to selected prove these cases in the courtroom. image which can be booted by either CD or USB chat sites and actually using the techniques Investigations in the Cloud device. Students will also have the opportunity they learned in the class. to practice booting a “suspect computer” with John Sedoski their WinFE and run preview tools. **Note: Due Investigating and Prosecuting With information migrating from our control to to Windows licensing rules students will create Criminal Neglect and Failure to Thrive that of service providers, investigators need to their CD and USB thumb drives using a 30-day Mary Sawicki be aware of where this information is, how to evaluation copy of Windows. This presentation will emphasize what obtain it, and what investigative strategies can encompasses neglect and failure to thrive in be implemented to address the challenges of Introduction to Internet Relay Chat child abuse cases. A special emphasis will be obtaining data and evidence from cloud based (IRC) on meeting the challenges of investigating and platforms. This workshop will cover information Kevin Laws prosecuting these types of cases. Utilizing expert on identifying, collecting, and requesting items This lab will provide a basic overview of IRC witnesses in these cases will be highlighted. stored in the cloud.

to include navigation and the logging function DESCRIPTIONS Investigator Bias and False of the IRC client (mIRC). The presenter will Investigating Child Homicide Cases WORKSHOP demonstrate how to build your IRC undercover (Part 1 & 2) Allegations of Child Abuse persona and introduce you to the various chat Nancy Oglesby, Michael Milnor Amy Russell rooms dedicated to the sexual exploitation Child homicide cases are some of the most While fabricated accounts of abuse, particularly of children. Tips about chatting and building difficult cases to investigate not only because sexual abuse of children, are relatively rare, your investigation based on the presenter’s of the emotions involved, but also because responses to child abuse allegations by child experience will be discussed. Lastly, suggestions they often first appear to be accidents. This is protection professionals may be impacted for court presentation, including presenting your one area of the law in which you must not only by personal biases and expectations. This evidence and jury considerations will be provided. prove who did the crime, but often if it is even is particularly true of cases involving female a crime at all. This presentation will cover the sexual offenders, allegations in the context of Introduction to Macs entire investigation from scene preservation divorce and custody disputes and youth who Mike Duffey to interrogation. We will also discuss specific self-produce images. This presentation will During this lab students will be given an overview challenges in certain types of cases, including explore these biases and discuss research on of the Apple computer and abusive head trauma. A case study will be the prevalence and incidence of such cases, as learn how to use a Apple computer. This lab is woven throughout the presentation of a child well as how to responsibly conduct interviews intended for those who are brand new to using a torture/homicide case to illustrate many of the and investigations in such cases. Apple computer or for those who are considering principles being discussed. This presentation It’s All in the Investigation purchasing one. A comparison between the will be team taught by a career law enforcement Brandie Wade, Pamela Womack Windows and Apple Operating Systems will officer and prosecutor, providing each unique This workshop focuses on discovery and also be discussed. viewpoint to these investigations and what is

43 the importance of communication between coordination with numerous agencies, both in developing standard operating procedure prosecutors and their partners including the United States as well as other countries. and training. This workshop is presented by law enforcement, Child Protective Services, Lastly the presenter will discuss deportation Cellebrite, a Sponsor for the Crimes Against therapists, forensic interviewers, medical versus extradition, evidence collection in foreign Children Conference.‌ personnel, etc. It will include a basic countries and the additional charges filed in understanding of discovery laws and Brady vs. Missouri that led to a 120-year sentence for Lightning Session: Maryland. It will also explain who is considered Stokes who admitted to sexually abusing children Five Topics in 75-Minutes “the State” for the purposes of discovery and for almost 60 years. Jim Tanner, Graham Hill Brady to gain an understanding that we are all Do you want solid information fast? This is the in this together. This presentation is for anyone Kids in Court: session to attend. The presenters join forces a part of the multidisciplinary team to help gain An Introduction to the Courtroom to provide an information packed, fast-paced an understanding of what and why prosecutors Eren Price, Judy Hoffman, Lidia Baeza session covering five important topics: Grooming, ask for everything you have, and how what law For over 20 years, the Dallas County District Targeting Children, Distorted Thinking, Self- enforcement and other partners have in their file Attorney’s Office has collaborated with Conditioning Among Sex Offenders, and Sex can have seriously impact the course of a case. community volunteers from the National Council Offender Digital Behavior. Essential information of Jewish Women to make testifying in court will be presented on each topic and accompanied Keeping Your Child Exploitation a little less scary for children by hosting Kids by handouts which provide extended information. Investigation Victim Centered in Court, a Saturday session at the courthouse Join us for a “TED talk” on steroids. Alexandra “Ale” Levi for kids and families. This presentation, by a Unfortunately, we can fall short of keeping our prosecutor, a community volunteer and a victim Like a Footprint in Wet Cement: child exploitation investigations victim-centered, advocate, will include suggestions on starting Understanding Adverse Childhood even while rescuing, recovering, and identifying your own program and lessons learned from 20 Experience Research victims. This workshop will focus on how we years of experience. Victor Vieth can maintain victim-centered investigations, The ongoing Adverse Childhood Experiences beginning with the identification of victims, all the Legal Rights of Teen Dating (ACE) studies out of Kaiser Permanente and the way through the victim interview. The presenter Violence Survivors Center for Disease Control suggest that childhood will explain and present this information through Bronwyn Blake maltreatment and family dysfunction are major lecture, case examples and class discussion. This workshop is designed to help advocates risk factors for the leading causes of illness, and allies identify the various legal remedies death and poor psychological adjustment in the Kelsey Smith Case: for teen survivors of dating violence. The issues United States. Cumulative adverse childhood The Investigation and Its Long-Term covered in this presentation include: youth rights events have a role in poor physical health, Impact for Law Enforcement to healthcare, dating violence and sexual assault, problematic health risk behaviors, learning Greg Smith emancipation, civil and criminal suits, age of challenges, behavior problems and disease. This presentation will discuss the Kelsey Smith consent, sexual harassment, Title IX laws, duty This presentation will introduce attendees to abduction and murder case, which occurred in to report, and what options are available if a teen this research and discuss the importance all Kansas and received national attention. The case is in a violent relationship. professionals working to address childhood has been featured in multiple documentaries maltreatment to have a holistic approach to on national and international television. The Leveraging Data From addressing a child’s needs. presenter is Kelsey’s father and he will highlight Social Media and the Cloud the evidence, law enforcement response, and the to Accelerate Investigations Listen and Learn: An MDT Model technology considerations that eventually led to Keith Leavitt for Improving the Response to the arrest and conviction of Kelsey’s murderer. With 71% of people using their mobile devices Child Abuse in Indian Country Issues discussed will include cellular device to access social media, the need to access this Gina South, Geri Wisner location techniques, suspect interview cues, data during criminal investigations has become This workshop provides a model for practitioners multi-jurisdictional considerations, and law imperative. In this interactive session, we will who are interested in reaching abuse victims enforcement/victim advocate response. provide an update on the emerging opportunity to within Native American tribes. American Indian legally obtain digital evidence from private social communities have long been identified as an Kenneth Stokes: media and cloud sources. The presentation underserved population, and many regional Web Master and Child Molester will review the relevance of cloud data to MDT’s have attempted to connect, often without WORKSHOP WORKSHOP James Holdman investigations, the types of information that can achieving successful results. With a focus on DESCRIPTIONS This case study details the investigation of be uncovered, best practices for collecting and culturally-appropriate contacts, participants will Kenneth Stokes, a registered sex offender living managing evidence, legal considerations and leave with a plan to reach the American Indian in the Philippines, who produced and distributed due process, and sample warrant templates. The tribes within their vicinity. large amounts of child pornography all over the session will review case studies from agencies world and sexually abused children daily. The that have adopted cloud extraction technology to Lived to Tell: presenter will discuss his initial contact with reduce the cycle times associated with waiting for The Jennifer Schuett Story Stokes through a Craigslist ad and the chats that service providers to fulfill request. The presenter (Part 1 & 2) set the hook on an evil monster. What followed will also show how data from cloud and social Tim Cromie, Jennifer Schuett was distribution of child porn to Missouri and a media accounts can “complete the puzzle” in This case study will detail the story of one of the six-month online conversation that led to Stokes investigations by complementing information presenters, Jennifer Schuett, who was kidnapped inviting the presenter, in an undercover capacity, obtained from the device itself. Finally, we as an eight-year old, brutally raped, had her throat to his highly-secured compound on Cebu Island, will share recommendations for incorporating cut and was left for dead in a field. The challenges Philippines. The case study will discuss the this technology into a forensic operation by faced in the initial investigation which included

44 a severely injured and traumatized child victim, basic mechanisms for wellness and; 3. respond to an online luring missing child incident. and when multiple agencies, including the FBI, incorporating technology into everyday wellness. are involved will be examined. Jennifer will share Mobile Acquisition Uncovered: her memory of that night, her desire to find her Making Sense of Modern The Past, Present and Future of attacker, and moving on with her life. How time Communications in Investigations Mobile Device Investigations became both an obstacle and an advantage in Evan Nicholas, Alan Kivi Geoff MacGillivray an 18- year old investigation will be discussed. This presentation will provide an overview As manufacturers continue to improve device The use of the media, including America’s Most of the National Domestic Communication security and encryption, we ask, “Where will Wanted, to find possible witnesses and clues will Assistance Center (NDCAC) including its the most valuable data reside? What can you do be reviewed. The presentation will explain how mission, goals and programs. It will highlight to both acquire and analyze it effectively?” This DNA identified a possible suspect and the steps NDCAC’s tools, services, and training that is presentation will discuss the past, present, and taken to connect him to the crime. Jennifer will provided to law enforcement at no cost. This future of mobile investigations and explains how presentation will also provide students with an talk about highs and lows of the investigation and these trends may shape your investigations. In understanding of new communications services, dealing with multiple detectives over the years. particular, the presenter will explore alternative applications, technologies, and how they impact She will describe her experiences, becoming the acquisition methods and will de-mystify mobile law enforcement investigations. The session “Survivor,” and her desire to motivate survivors forensic acquisition tools and techniques so that includes an overview of the challenges these and the professionals who work within the system. you will be better equipped to get more value services present as well as the capabilities from your toolset. This workshop is presented Live-Streaming Investigations: available to law enforcement. by Magnet Forensics a conference sponsor. Investigative and Prosecutorial Making Something Out of Nothing: Techniques Mobile Device Evidence in What to Do When You Have Peer-2-Peer Investigations Austin Berrier Limited Evidence This presentation will discuss the growth of live- Keith Leavitt streaming and video-conferencing platforms as Paul Wolpert, Kristin Joseph Only a few years ago the idea of using a mobile a means for offenders to conduct live abuse of This presentation will cover various case device to download child exploitation material children as well as share, distribute and view examples of situations where the investigators using peer-2-peer (P2P) technology was not child abuse material. Attendees will learn about had limited or no actual evidence from much of a concern, but now applications that the various platforms being used by offenders seizures due to the offenders getting rid of allow offenders to access Torrent, Gnutella and and the specific pros and cons of each. The their computers or they attempted to destroy eMule networks are readily available. While presenter will discuss the investigative and evidence after the fact, but were still able to the iOS platform has resisted vetting a P2P prosecutorial concerns and strategies, and pursue prosecutions against the individuals. The application, Android devices fully support solutions and guidance will be provided. Finally, discussion will cover: lessons learned; tactics applications that can access, search, and a brief case study will highlight the techniques that can be employed, which included cell site download material from P2P networks. The used by illustrating success and failure. tracking; and the importance of timely follow broadening availability of faster cellular up on additional lead information after their networks, and large memory capacities has Locating a Wi-Fi Moocher investigations progressed from initial offender resulted in investigators faced with P2P cases Dedric Jones, Mohamed Bah contact. This presentation is intended to inform involving only mobile devices. This presentation This presentation will discuss ways to locate a the audience as well as provoke conversation demonstrates how investigators/examiners can bad-actor who is using public Wi-Fi networks on “thinking outside the box”. use Cellebrite tools to conduct fast, on-scene for illicit purposes. In 2017, Homeland Security examinations and full forensic examinations of Investigations Nogales agents investigated a Michael Devlin Case Study devices utilizing P2P applications to download suspect who was distributing child pornography William Carson and store child exploitation material. Attendees material from a chained-brand hotel. The agents This case study examines the life, history and

will learn to examine popular P2P applications DESCRIPTIONS used electronic surveillance tactics to locate psychological motives of Michael Devlin, one and arrest the suspect. The presenters will of the most notorious child kidnappers of the for application data and common download WORKSHOP discuss the electronic surveillance equipment past decade. Following his convictions, Devlin locations. Attendees will also learn to use new and techniques utilized in this case and to locate was interviewed, in-depth, separately by the Cellebrite features to conduct advanced multi- and identify suspects using Wi-Fi that belongs presenter and two FBI profilers. The presentation media examinations using file-hashing, filtering, to another. includes material learned from these interviews, and EXIF data to quickly locate child exploitation with audio of Devlin discussing his childhood, his material and potential victims. This workshop Maintaining Your Balance: sexual attraction to young boys, his abduction is presented by Cellebrite, a Sponsor for the Technology Tools for Wellness fantasies, and the eventual kidnappings of Shawn Crimes Against Children Conference.‌ Elizabeth Tow, Michael Sullivan, Hornbeck in 2002 and Ben Ownby in 2007. Beth Medina Mobile/Express/Booking Alert How do law enforcement professionals maintain Missing Children via Online Luring Overview Katie Sternberger their success? They use technology to enhance Bobby Ladson their wellness! This workshop will look at There has been a disturbing trend over the past This session will provide a demonstration of some available technology that can help law several years of children being lured online. OffenderWatch Mobile, Express and Booking enforcement professionals maintain their edge These cases often end with horrible outcomes for Alerts. It will also include a Q&A on how various both on the job and at home by focusing on the the children, including abduction, captivity, and agencies are implementing these applications. following objectives: 1. exploring technology other types of victimization. This presentation This workshop is presented by WatchSystems, based tools for dealing with different types of will look at case examples as well as discuss a Sponsor for the Crimes Against Children stress reactions; 2. providing helpful technology strategies and tactics to quickly identify and Conference.‌

45 Model Practices in Child meetings with subjects involved in the sexual computer examiners and field investigators and Sexual Abuse Prosecutions exploitation of minors. The presentation will will demonstrate cutting-edge technology for Edward Chase use actual chats, along with audio and video recovering child abuse imagery from digital This workshop will examine model practices recordings, to highlight the challenges and devices. Revolutionary in nature, this application for the investigation and prosecution of child techniques used in cases involving enticement will locate 100% of known child exploitation sexual abuse cases. Topics will include creative and sex trafficking crimes. A trial, in which imagery cataloged in Project VIC, even from corroboration, evaluating the forensic interview, the sophisticated techniques discussed in this unallocated space, and requires only minimal scientific and medical evidence, presenting workshop, was introduced for the first time in effort by the examiner. The use of this technology expert witnesses at trial, anticipating common Federal Court will be discussed. This successful translates into significant time savings for your defenses at trial, and arguments for cases with prosecution resulted in a 30-year sentence ever-increasing forensics backlog. limited evidence. This workshop will provide for the defendant. Lastly, the common issues, real world, useful tips for the investigation and pitfalls, and best practices in chat investigations Nutshells (Part 1 & 2) prosecution of sexual abuse cases. will be presented. Michael Bourke “Nutshells” consists of numerous presentations Multidisciplinary Approach to NCIC: Q&A Session that follow a “TED talk” format. Each speaker Child Pornography Investigations Joel Shoultz will present for 10-15 minutes on a topic of their Amy Barton, Tim Brady This session will address how states are choosing. The audience may hear abbreviated This presentation will highlight the value of both managing their NCIC reporting requirements versions of longer presentations the speakers the investigator and medical expert in child through OffenderWatch. Topics that will be have given during the conference, or they pornography investigations. The investigator discussed include: an overview of NCIC functions may learn about ideas and best practices that will discuss augmenting hands-on child abuse in OffenderWatch; audit support as well as the are interesting or instructive but can be fully crimes with child pornography investigations status on rollout of NCIC 3.0. This workshop is addressed in a shorter presentation format. and the role of child pornography investigations presented by WatchSystems, a Sponsor for the “Nutshells” will begin with non-technological in attempting to prevent hands-on crimes. The Crimes Against Children Conference.‌ issues; as the sessions progress they will physician will discuss the techniques which increasingly focus on technological subjects. can be used when evaluating a child victim to NCMEC Escalated Cybertips: determine if the child has seen child pornography Case Studies and Results NW3C Utility Suite as part of their abuse or been made to be a Lindsay Marchant, Rebecca Sternburg Jerry Jones subject in the production of child pornography. This presentation will discuss the implementation This lab will teach attendees about the NW3C The presenters will describe how to effectively of NCMEC’s new tools and technology methods Utility Suite which makes otherwise-costly use a medical expert to age the victim and to assist the ICAC Task Forces in triaging and industry standard digital investigative forensic confirm the victim is indeed a minor. The value prioritizing cybertips by providing key information software easily available to law enforcement of the established partnership between the to law enforcement quickly. Recipients of officers at no cost. This comprehensive suite investigator and medical expert will be reinforced, these escalated cybertips have found them delivers a powerful and convenient suite of tools and tips on how to establish this relationship to contain high quality actionable information. that can aid many types of investigations from will be discussed. The presenters will discuss several short case HEX viewing/searching, decoding date/time studies describing the escalated cybertip stamps (APFS), to extracting a USN Journal Multidisciplinary Team Response information, the subsequent investigation and into a spreadsheet. to Suspected Abusive Injuries the results. Matthew Cox, Amy Morgan, Offender Watch Q/A Kassandra Slaven NCMEC’s CVIP Lab Adam Kirhagis, Joel Shoultz Utilizing a multidisciplinary approach to child Many children have been rescued from further This is an open session to answer any questions abuse investigations can facilitate the transfer sexual abuse because a clue in the background you have about OffenderWatch. It will also include of more accurate and applicable information of child pornography images which led to the hands-on training on sex offender registrations among team members. This presentation location of their abuse. NCMEC is proud to and verifications in the OffenderWatch system. will incorporate a series of cases, including host the Victim Identification Lab, an initiative This workshop is presented by Watch Systems, physical injuries and genital trauma, to illustrate designed to assist law enforcement in its a Sponsor for the Crimes Against Children a successful multidisciplinary approach to efforts to identify child sexual abuse victims. Conference.‌ suspected child abuse. It will also include case Participants can view sanitized photos and WORKSHOP WORKSHOP examine background identifiers in hopes that OffenderWatch Training Searches

DESCRIPTIONS examples of missed abuse or misdiagnosis of Joel Shoultz abuse to illustrate ways to improve the quality these items may be recognizable. You may This session will focus on searches and best of your multidisciplinary team. have the piece of the puzzle that could lead to the rescue of a child victim. All conference practices for maintaining your data, and how Navigating the Noise: attendees are invited to participate; please to optimize search functionality. Using Sophisticated Techniques have your conference badge to gain entry. No Officer Safety Considerations in in Online Enticement Cases pre-registration needed. This lab is located in ICAC Investigations Matthew Fowler the Live Oak Room and will be open all day Michael Sullivan This presentation will explore the use of throughout the conference. In the last decade the trading of child sophisticated techniques in online chat pornography has exploded on the Internet. It is investigations. Several cases will be highlighted Neula: The Future of CSE Forensics not uncommon to see three to six thousand IP that show varying circumstances investigators William Wiltse addresses per state, per month, involved in the faced during chatting and face-to-face This hand-on lab is designed for both forensic trading of child pornography. With this volume of

46 activity how can law enforcement make sure their phone call was used to prosecute cases or in Don Colcolough resources are being used to identify hands-on some cases encouraged defendants to plead This vendor neutral workshop will cover offenders and rescue children currently being guilty in their cases. The presenter will show how fundamental aspects of comprehending and sexual exploited? This workshop will look at the to decipher the conversations and to understand integrating open source online intelligence/ studies conducted by Dr. Michael Bourke and Dr. it is not always what is said, but sometimes what information, tools, and compelling search engine Joe Sullivan. The presenter will discuss how the is not said by the defendant. This presentation techniques in order to learn how to leverage free results of their work may aid law enforcement in will discuss the various obstacles that detectives platforms, databases, and web applications rescuing children and providing insight into the will have to sometimes overcome before using to strengthen crimes against children cases. underlying criminal activity while also examining this investigative tool as well as how to properly Attendees will learn little-known facts and officer safety and mental well-being issues. prepare their victim to make the phone call. techniques in order to optimize results within This presentation is sponsored by the National two major search engines, (Google and Bing) Criminal Justice Training Center (NCJTC). Online Child Sexual Exploitation in and more importantly, understand free web- the Philippines: The Challenges and based and stand-alone applications which will Once the Shutter Snaps: Effective Investigative Strategies support your investigations and prosecutions. From Victimization to Restitution Martin Conley, Jesse Donkers Attendees will learn by seeing a demonstration Ashley Hennekey The U.S.Department of Homeland Security, exploring real-time open source data/information This presentation by NCMEC staff will discuss Homeland Security Investigations (HSI) and and then applying that information to criminal victims of child sexual exploitation imagery. the National Police of the Netherlands – Dutch case examples. If you would like to know what From the initial abuse and its documentation, Child Exploitation Team have joined forces is “out there” that will advance you crimes to distribution and investigation, and ultimately in the fight against online sexual exploitation against children case, please attend this new to rescue and restitution, these victims have of children in the Philippines, also known as presentation focusing on new but little-known an army fighting for them, including hotlines, Livestreaming. Children as young as two- technologies. NGOs, industry, and law enforcement, among years-old are sexually molested and trafficked others. In this workshop you will learn about daily for paying customers worldwide. Globally, On-Scene Digital Investigation the path these files take from a victim-centered law enforcement agencies face numerous Best Practices: From CyberTip standpoint, including new research on who challenges in conducting effective investigations to Court Ready Paperwork the victims and offender are, the impact of into these types of cases in the Philippines. This Richard Frawley the images and videos on survivors as well as presentation will provide attendees with a greater As an investigator following up on cases such new efforts to remove images and videos from understanding of these challenges and the local as CyberTips, you know that every scene you the Internet to help with the victims’ healing. context in the Philippines. Attendees will learn arrive on will likely have multiple digital devices The role of NCMEC’s CyberTipline and Child how, through undercover online communications, that require investigation. You also know that Victim Identification Program, along with their HSI Special Agents in Portland, Maine are able simply collecting the devices and sending them resources for investigators, will be discussed to discover and ultimately infiltrate closely to a Digital Forensic Laboratory can hinder your in depth. protected communities of offenders and investigation due to backlogs and delays and communicate with targets. The presenters will may mean that your suspect remains free, One Murder or Two? discuss their international collaborative efforts thereby threatening community safety. In this Crystal Levonius, Wade Hornsby and the strategies implemented leading to the workshop, the presenter will share the benefits Pallavi Dhawan, the mother of a 10-year old boy, dismantling of several child sex dens in the of rapid on-scene collection and analysis, was charged with his murder after his lifeless Philippines, the criminal prosecution of the something that is increasingly important in child body was found in a bathtub at the family home. members and the rescue of dozens of children. exploitation cases, since many cases require While law enforcement continued to investigate, timely intelligence as it is critical to public safety. the mother’s supporters argued that police had Online Investigative Tools The presenter will explain the Collect, Analyze a cultural bias and the victim actually died of Mike Duffey and Report process, which includes: how to DESCRIPTIONS congenital medical issues and that no crime has This lab will introduce attendees to important quickly determine evidence that is relevant to WORKSHOP occurred. Before the case could be resolved, tools needed to successfully document web- your case; visualize and save case specific items the mother murdered her husband and took her based evidence, as well as what is needed of evidentiary value; and create prosecutorial own life leaving many questions unanswered. to conduct proactive investigations online. A ready reports to backup your decisions. This This case study will discuss the mistakes variety of tools and resources will be discussed session is perfect for investigators, examiners, made by law enforcement during the initial to include: preferred web browser, browser add- prosecutors or any professional involved in digital report and response. The presenters will also ons, saving web-based evidence, preferred evidence cases related to child exploitation. This discuss combatting defense strategies, dealing online search sites, and the necessity of Google workshop is presented by ADF Solutions, Inc., with media bias and dealing with mentally ill (including Gmail, Gmail labs and Google Images). a conference sponsor. perpetrators. Attendees will also learn about EXIF data viewers and EXIF data scrubbers. It is recommended Opening Statements and Closing One Party Consent Phone Call: that all attendees establish an undercover Gmail Arguments in Cases of Child Abuse The Undisputed Evidence in account prior to attending the lab (*during the Victor Vieth Your Investigation setup, please make your identity OVER the age In this presentation attendees will learn the art Dave Clark of 21). of developing effective themes and theories This presentation will discuss how and when to to present to jurors in cases of child abuse. use the one-party consent phone call in criminal Online Open Source Intelligence, Particular emphasis will be placed on cases investigations as well as the best strategies and Tools and Techniques within in which the outcome largely relies on the techniques behind the phone calls. Case studies Crimes Against Children Cases: assessment of the child’s credibility versus the will be discussed in which the one-party consent Knowing What Is Out There credibility of the accused.

47 Operation Dry Dock: targeting of juveniles. The discussion will in the field by providing a simple to use yet Local Lead to International include how online predators have evolved from forensically sound tool that can provide details of Child Rescue Effort traditional traveling offenses and sextortion, crimes in minutes rather than hours, days, weeks Michael Johnson, John Pirics, to an engagement in large-scale, organized or months. Providing evidence while on-scene Steven DeBrota conspiracies responsible for hundreds of victims. leads to better interviews, more confessions, Operation Dry Dock began as an investigation This case study will detail Operation Subterfuge, and ultimately better cases. This lecture/lab into a single user of a social media platform. A which was an international effort with many law will provide a detailed overview of the software consensual encounter with the suspect led to enforcement partners around the world. The tool, osTriage, for the beginner to advanced the discovery of a network of people involved in focus of this session is to look at the victims user. Forensic artifacts will be explored and the trafficking of child abuse material, many of and how they were groomed and manipulated will open your eyes to a better method in which them hands-on offenders. In the days and weeks by these predators. we can solve crimes. This training session will following; the analysis of seized device, active provide licensing for osTriage v2.5 to sworn law online undercover work, and communication/ Organized Offenders in Child enforcement officers. cooperation from global law enforcement Pornography Investigations partners led to the arrest of producers of child Sharon Cooper Overview of the Last Thirty-Five Years abuse material, managers of the distribution In the 2017 landmark Canadian Centre for of the Sexual Victimization of Children network and the rescue of child victims of sexual Child Protection Survivor’s Survey, of now adult Kenneth Lanning abuse worldwide. The resulting prosecutions survivors of sexually abusive online images, From Intrafamilial Abuse, Missing Children, led to significant sentences and restitution more than 50% of victims reported multiple Satanic Ritual Abuse, Seduction/Grooming, to victims of sexual abuse both foreign and offenders who abused and produced images. Technology Facilitated Cases, Youth-Serving domestic. This presentation will demonstrate the Organized sexual abuse is under-reported and Organizations, Compliant Child Victims, Human utilization of a number of investigative techniques clearly not fully recognized in child pornography Trafficking, to #MeToo -- This presentation is an including: consensual encounters/searches, investigations. This presentation will define overview of the professional experiences of an consensual take-over of online suspect accounts, organized sexual abuse and discuss the three FBI agent who worked through the spectrum of the cooperation State, Federal and global law different types – networked, institutional, and sexual victimization of children as it evolved over enforcement in a real-time child rescue effort, familial. Direct quotes from victim survivors the past thirty-five years. Important observations, and rapid/proactive victim identification and will assist in the understanding of offender insights, and investigative distinctions will be triage. behaviors for investigators. At least three discussed. case examples will be provided to illustrate Operation Hydrant: The UK Law this form of sexual exploitation. Participants Paltalk Enforcement Response to will review indicators that should broaden their Michael Sullivan Non-recent Child Sexual Abuse investigation to assure that there is no error in This lab will examine how students can use Simon Bailey the extent of the offender base. the Paltalk chat client and identify suspects In 2012, revelations of child sex offenses seeking to sexually exploit children. The lab committed by celebrity Jimmy Savile rocked OSForensics Triage Certification will demonstrate how to locate offenders and the United Kingdom (UK). The phenomenon Course – OSFTC (Part 1 & 2) document the illegal activity. Students will learn that followed presented one of the greatest Jeff Shackelford how to create undercover personas that comply challenges ever faced by UK law enforcement. The OSForensics Triage Certification (OSFTC) with the ICAC Standards and Guidelines. This This presentation will outline the policing was created for law enforcement investigators lab will also examine the alternative methods response to the mass reporting of non-recent and forensic examiners who conduct digital that can be used to identify their IP Address. child sexual abuse in the UK. Many of the evidence triage and digital evidence collection Perpetrators of Child Sexual Abuse: crimes that had taken place occurred within in the field. This condensed version of the Get Tuned In institutions and were committed by individuals traditional course will be fast-paced and consist Graham Hill who had public prominence. These suspects of two parts: 1) Lecture/Lab, and 2) Review/ How do perpetrators develop and maintain their often held a position of trust, power or influence, Test. The presentation will prepare students deviant sexual arousal towards children? This which they used to access and abuse children. to pass the OSFTC certification exam which presentation explores the myths about their Many of these offenders crossed geographical will be administered at the end of the class. behavior and highlights the information that boundaries and the victims were often abused Successful students will receive the OSFTC designation and accompanying certificate at child protection professionals need to know to

WORKSHOP WORKSHOP by multiple offenders. In 2014, in order to evaluate risk and effectively intervene to protect DESCRIPTIONS coordinate the response, the UK introduced a no cost. (Students attending this presentation children. This presentation uses video interviews national coordinating operation called Operation should have a basic foundation in digital evidence with perpetrators to illustrate points of learning. Hydrant. This presentation will describe this triage and collection concepts.) approach, the lessons learned, and the osTriage: Improving Workflow from Perverted Justice: successes achieved in this investigation. It will the Field to the Lab and Beyoind The Predator Police Chief detail a case study relating to child sexual abuse Jeff Rich Grace Pandithurai, Rick Sipes in football and how the police service became Now more than ever, there is a digital element This case study details the investigation and better positioned to respond. to every crime. Computers are commonplace prosecution of Kevin Coffey, Chief of Police in Maypearl, Texas. Coffey used his position as Operation Subterfuge: and are used to facilitate criminal behavior at a police officer in various counties to groom An International Sextortion Case an alarming rate. Locating evidence of these not only victims, but also entire communities. J. Brooke Donahue crimes in digital world can be cumbersome and After a botched sting operation, Coffey’s This presentation will cover the evolution of complicated. osTriage has revolutionized the arrogance and his own words led investigators online predatory behavior and tactics in the methods in which investigators find evidence

48 to the named victim in the case. Coffey’s to better differentiate between what appears to make a successful case. The presenter will phones and computers showed investigators to be “attention seeking sexualized behaviors” discuss charging decisions, trial preparation, the depths of his nature as a predator, which versus child victimization. accomplice testimony, defense strategies, and included multiple victims, over many years. The witness preparation. She will also discuss how presenters will discuss not only how working Preventing and Responding working with trafficking victims to prepare them with other agencies in this case helped unlock to Family Abductions for trial requires a knowledge of their individual corroborating and forensic evidence, but also Preston Findlay trauma experience, interpersonal dynamics, their how it presented issues in the discovery and This presentation provides an overview of needs, and their recovery process. Lastly, she trial process. the legal framework and discusses specific will address witness issues and how anticipating mechanisms available to prevent a domestic the unexpected is crucial for a successful Physical Child Abuse Injury or international family abduction from occurring prosecution. Reconstruction Techniques and to recover a child who has been taken (Part 1 & 2) wrongfully across state lines or international Prosecutors and Social Media: Robert Farley borders. Clear composite case examples drawn Advanced Searching This presentation will focus on non-accidental from decades of data will help break down Lauren Wagner and Justin Fitzsimmons injuries of children and will emphasize the the complex intersection of domestic family This lab will explore various social networking specific techniques that can be used by the law, interstate and uniform jurisdictional rules, sites and potential evidence recoverable from investigator in the assessment, investigation criminal law, and international treaties that can those sites for the use in child maltreatment and reconstruction of cases involving soft tissue apply to family abductions and help attendees cases. Participants will learn various techniques injuries such as bruises, lacerations and burns. identify potential issues before a problem occurs. that can be used to not only identify profiles In addition, the various weapons utilized by the of people involved in the case, but also how offender in child abuse situations will also be Prevention Opportunities & Lessons to utilize the connections between people to identified and discussed. The workshop will Learned for Your Community explore more potential corroborative evidence. also address the circumstances and evaluation Eliza Harrell Also legal aspects of social media evidence of neglected children. Lastly, the presenter will Learn about the power of prevention by collection will be discussed. offer case illustrations that encourage hands-on attending this session outlining free, engaging participation by the attendees. and effective resources available to help build Protecting Yourself in your community efforts to stop crimes against a Technological World: Political and Personal Dilemmas children before they happen. Attendees will learn Digital Officer Safety in Rescuing Children from about publications, presentations, and activities and Ethical Concerns Online Child Sexual Abuse they can utilize to help children, families and Lauren Wagner, Justin Fitzsimmons Robert Shilling communities to protect themselves online and Nothing is more important than officer safety, This is a very interactive, audience participation in person. Lessons learned through NCMEC’s whether on the street or on the computer. In this presentation where we will discuss and explore outreach and education efforts will also be workshop students learn how they leave traces some of the political and personal dilemmas shared, with opportunities to dive in on real- of themselves when visiting websites, what that face law enforcement in rescuing children life challenges faced by professionals working information can be traced, and how to ensure that from online child sexual abuse. Specialized law every day to keep kids safe. they are not compromising their safety or their enforcement officers from around the world work investigations by broadcasting this information. with child sexual abuse images obtained from Project VIC: Victim ID and Exposure This lecture covers website data, IP tracing, cell the Internet, Darknet or stored on the computers Reduction with Griffeye DI phone considerations, Bluetooth snarfing, and of pedophiles. The images obtained are used Eric Oldenburg and Rich Brown home wireless networks. Most importantly, this for victim identification, rescue, and offender This lab will introduce students to Project VIC session will show students how to search social and Griffeye Analyze DI, and how to obtain and apprehension. The identification methods are media and find the traces of themselves that DESCRIPTIONS effective, but they can present some complicated integrate the Project VIC hash sets. Students be found online by suspects, defense experts, WORKSHOP political and personal dilemmas that need to will learn workflow techniques to increase and the media. The audience sees examples be considered. productivity, locate possible victims and reduce pulled from various media sites that could cause exposure to exploitative material. ethical issues and to highlight common pitfalls of Posing and Performing: Efforts to social media use by professionals. Hypotheticals Deceive the Reality of Sexual Abuse Prosecuting Pimps: are given to encourage audience participation and Exploitation (Part 1 & 2) How to Build a Case and interaction in determining whether social Sharon Cooper Against a Sex Trafficker media use crosses an ethical boundary. Privacy Results of a recent landmark survey of survivors Brooke Grona-Robb issues are also addressed. (This presentation is of child sexual abuse images reveals a large This presentation is designed to assist limited to Law Enforcement, Probation, Parole number of techniques used by sex offenders prosecutors and investigators who are and Prosecutors only.) to make abusive images appear to be self- tackling human trafficking cases, from initial generated or fraudulently benign in nature. investigation to post-conviction. It will explain Pursuing Child Predators: Actual quotes of instructions given to children will how a team approach involving prosecutors, Applying the Latest Mobile Forensic be provided in this presentation as well as many law enforcement, and victim advocates allows Technology and Techniques to examples of sexualized themes. Participants will for simultaneous goals of rescuing victims and Combat Crimes Against Children review descriptions by survivors and then learn prosecuting their offenders to the fullest extent. (Exhibitor Workshop) of specific American cases that exactly mirror This workshop will help prosecutors work with Rey Navarro the descriptions of victims from around the world. law enforcement to investigate cases involving Rapid changes in technology, communications This review will hone the skills of investigators trafficking, and to gather the evidence necessary and social media have created daunting

49 challenges for law enforcement investigators publicly use new password breaking capabilities. solutions that have made previously unresolvable working to prevent crimes against children, Presenters will discuss how to navigate a multi- cases resolvable. This will include a number making it essential to have the best technologies state investigation, timid witnesses, hostile of actual case studies to illustrate the value and methods. The growth of social media and perpetrators, legal labyrinths, use of social media of the solutions. This presentation will outline apps has created new opportunities for predators to harass and intimidate victims/investigators, how a similar approach could be adopted in to contact and develop exploitive relationships and technological challenges that test even the other countries and provide an insight into how with children. Offenders can possess massive most seasoned investigators. See link: https:// the Child Rescue Coalition’s CPS software has collections of images so processing and analyzing www.justice.gov/usao-wdwa/pr/seattle-area- been utilized to resolve hundreds of cases. (A the volume of data is a daunting challenge. man-convicted-17-federal-felonies-scheme- computer lab on using CPS software is being Popular apps let offenders send messages exploit-young-women-and-juveniles and https:// offered during the conference. Check the with photo and video attachments, which are www.seattlepi.com/seattlenews/article/Sex- schedule for dates and times.). unrecorded in carrier call detail records. Other Trafficking-Teen-Seattle-12408855.php apps let users hide images they don’t want Responding to Missing Children others to see or find, and have messages self- Religious Medical Neglect and and Child Abductions (Part 1 & 2) destruct. This session will share information on Religious Medical Exemption Laws Mark MacKizer, Marty Parker best practices in mobile forensics being used by Amy Barton, Alana Minton This workshop is presented by the FBI’s Child ICAC teams and task forces, and will include a This presentation will address the legal and Abduction Rapid Deployment (CARD) Team and briefing on Project VIC, which is facilitating law medical definitions of medical neglect, and how the Behavioral Analysis Unit for investigators enforcement efforts in 40+ nations. This is an that may vary depending upon the local statute. responding to the report of a missing child exhibitor workshop by MSAB exhibiting on the The multidisciplinary response to a child medical and a potential abduction. This presentation 2nd floor in booth #41. neglect report will be discussed, including when is designed to provide the critical initial actions and how to compel medical care for a child. to law enforcement professionals responding to Randy & Me: A Prosecutor’s Story The presenters have the unique perspective these events. The presenter will provide case of his Childhood Sexual Abuse of having been child abuse professionals in examples and discuss the FBI’s Child Abduction Kevin Mulcahy states without religious medical exemption Response Plan (CARP), offender characteristics, This presentation will recount Kevin’s own law, but now are both professionals in a state victimology, and best practices. He will also story of sexual exploitation at the hands of his with religious medical exemption statutes. The discuss the multitude of resources the FBI can soccer coach, Randy. But, it will not be merely challenge this creates for medical neglect cases provide to assist in the investigation of these a retelling of the past. Instead, the presentation will be discussed, as will the child morbidity and cases. will address lessons learned from his case by mortality consequences of child medical neglect. combining Kevin’s experience both as a victim Revenge Porn: A New Crime and a long-time prosecutor of child exploitation Resiliency 101: Takes Shape Across the Country cases. Knowing what he knows now, Kevin From Victim to Survivor Shannon O’Brien believes there are lessons to be learned from Julie Brand “Revenge Porn”, or non-consensual sharing his story for the investigator (Kevin’s was great), Some victims of childhood abuse perpetuate of private images, has become a well-known the prosecutor (Kevin’s was terrible), and the the cycle of violence. Some victims self destruct. problem around the country in recent years, and forensic interviewer (Kevin did not have one). Yet others become safe, nurturing, emotionally as media coverage has increased, so too has Beyond these (hopefully) useful lessons, the healthy adults. How can we influence which path the interest of legislators around the country. presentation will provide plenty of time for they will follow? This presentation identifies The number of states that have passed laws questions from attendees. Given the nature of seven key steps that can help victims to criminalizing such behavior has exploded. As our work, we don’t often get to ask questions overcome trauma and to develop a “survivor’s these new laws come into effect, investigators (beyond factual questions) of our child victims. perspective.” Attendees will learn how to use and prosecutors need to understand what types This presentation will provide that opportunity. the “language of resiliency” to identify and to of behavior are covered by the laws, how to reinforce victims’ strengths thereby positively present them to judges and juries, and the likely Reel Lies: A Failed Film Maker’s impacting both their self-perceptions and their constitutional challenges that will be faced. This Decline into Sex Trafficking life scripts. Participants will learn how to foster workshop will discuss why it is important to Ingrid Arbuthnot-Stohl, Natalie D’Amico, resiliency in their clients’ lives and also in their understand how these crimes apply to minors, Catherine Crisham own. The presenter is both an experienced both as victims and perpetrators, and how these This case study will explore how a middle- counselor and a resilient survivor of maternal new laws may present a charging alternative WORKSHOP WORKSHOP

DESCRIPTIONS aged, unsuccessful movie and music producer sexual abuse. from other offenses that may label minors as perpetrated a fraud that lured women and teens sex offenders for the rest of their lives. into prostituting themselves for the hope of fame Resolve the Unresolvable: and fortune. David Delay seduced and recruited Mobile IP Resolution and Its Risk Assessment of Child females online by promising them a starring Use with Child Protection Pornography and Online role in his “documentary” on escorting where Systems Investigations Solicitation Offenders the payoff was $20 million and a spin off show Tom Farrell Darrel Turner with a major Hollywood production company. This presentation will discuss the increasing This presentation addresses best practices The catch? All they had to do was prostitute issues being faced worldwide by child sexual in psychological risk assessments of child themselves for a year and pay Delay weekly abuse investigators due to the increase in use pornographer and online solicitation offenders “production fees.” What they didn’t know was that of mobile broadband and mobile devices. The - cases that are occurring with more frequency it was all a lie. This unique pimping enterprise presenter will outline the problem being faced each year. The presenter will discuss his ongoing offered numerous investigative and prosecutorial and describe how a combined approach in research in this field, provide case examples, challenges and was one of the first cases to the United Kingdom has developed innovative and use video and audio recordings of actual

50 offenders for the purposes of providing real- in traditional crimes. Topics will include the Sex Offenders Who Seek Work life examples for attendees. Comparisons with new SEARCH add-on (a replacement for the with Children Overseas contact offender risk assessments will also be SEARCH Investigative Toolbar), available for Joe Sullivan, Steve Reeves explored with an emphasis on what the main Firefox, Chrome, and Safari; The SEARCH People seek employment with children overseas differences should be in contact and non-contact Internet Service Provider (ISP) List to find legal for a variety of reasons. Sex offenders often risk assessments. Lastly, frequently misused contacts for investigative purposes; technology regard overseas work as a soft target for gaining arguments and misrepresentation of research guides that cover current investigative trends; access to vulnerable children. This presentation (e.g., Seto, CPORT) made by defense experts and our online video presentation series, webinar will illustrate some ongoing research which will be explored and countered. offerings and podcast series. Save the Children UK are conducting alongside Mentor Forensic Services to explore ways in Robbie Schuster: Serving Multi-Victim which organizations can inform their recruitment A Little Brother’s Secret Families within TF-CBT policies and procedures and reduce their Chad Bryant Leslie Boutte, Lauren Copenhaver vulnerability to infiltration by people with a sexual This case study will detail the investigation of In situations of abuse, it is not uncommon for interest in children. Robbie Schuster, who molested his teenage more than one child within a family to experience step-brother for several years in Nebraska trauma. When resources are limited, clinicians Sex Offenders: What Judges, and Iowa. Schuster also befriended his step- may find themselves the sole provider for a Prosecutors, Investigators and Child brother’s teenage friends and began sexually family of multiple victims. Clinicians working with Advocates Should Know (Part 1 & 2) molesting them, which resulted in his conviction these families often face additional challenges Cory Jewell Jensen and sentencing to two years in prison. When the in treatment that include multiple reactions Sex crime investigators, criminal justice step-brother, now an adult, feared Schuster’s to the trauma, diverse family dynamics and professionals, probation officers, child welfare pending release would result in more victims, he varying case management needs. Children workers and child advocates should be familiar decided to report his own abuse over the years living in the home who were not victimized are with the various theories about the etiology of to authorities. This led to Schuster’s conviction frequently impacted by the abuse and can exhibit pedophilia and development of pro-offending of 24 counts of sexual abuse involving seven dysregulation as well. Within these families there attitudes, plus the more typical patterns of known male juveniles over a ten-year period. is the unique opportunity for group healing in a sexual offending committed by both juvenile The case study will detail the difficulties in family setting. In this workshops, the presenters and adult sex offenders. This presentation investigating a delayed sexual assault involving will provide strategies for working with families will highlight (via video taped interviews with multiple jurisdictions and multiple victims, the within the fidelity of Trauma Focused Cognitive various sex offenders) some of the more common importance of thorough investigations, utilizing Behavioral Therapy and will review how clinicians pathways to developing deviant sexual interests collateral contacts, staying close to the victims can involve safe caregivers and siblings in the and criminal sexual behavior patterns. In addition, and their family, establishing time lines and therapy process. the presenter will review various studies that developing a modus operandi. The presenter will examined the number of detected vs. undetected also detail the consequences of a plea deal that Setting Up Undercover/ offenses occurring in our communities, the true kept Schuster off of the sexual offender registry, Traveler Operations rate of false allegations and the average degree not believing a child’s disclosure of sexual abuse, Mike Duffey of “cross-over” or “crime switching” behavior and a lack of research into a suspect’s past. This lecture will provide attendees with sex offenders engage in that go undetected. information and tactical considerations The misconceptions about “re-offense” and Scenario-Based Sex Offender when setting up large-scale undercover chat “recidivism” rates and the expected outcomes Registry Investigations operations using houses, apartments along with for sex offender treatment will also be reviewed. Adam Kirhagis, Mike Robinson secondary take down locations. The presenters Learn through real-world scenarios how to more will also discuss issues including financial cost, Sex Over Love: A Mother’s Choice

efficiently manage your investigations. This personnel, planning time frame, lessons learned Habon Mohamed, Elizabeth Glidewell DESCRIPTIONS session’s training topics include the following: and how to ensure having a successful operation. This case study will detail the investigation and WORKSHOP utilizing your registry information while searching This presentation is sponsored by the National prosecution of Miranda Kelso, a mother charged other databases; running radial searches; Criminal Justice Training Center (NCJTC). with sexually abusing her three-year old son. The incorporating NCMEC, NSOTC, SOTT into case began when Kelso’s estranged husband your investigations; tips on conducting Field Sex Offender Registration in the turned in videos of her masturbating in front of Searches and coordinating multi agency sweeps United States: Update and Trends her son, but Kelso claimed she was a victim of and lastly collaborating with the U.S. Marshals. Lori McPherson domestic violence and was coerced into making This workshop is presented by Watch Systems, This presentation will provide participants with the videos. The investigation ultimately showed a Sponsor for the Crimes Against Children an overview of the state, territory, and tribal sex a consensual BDSM relationship, not domestic Conference.‌ offender registration systems within the United violence. Among the challenges the presenters States. In addition, the role of federal standards will discuss are how to handle defenses, not SEARCH.org Investigative Resources (SORNA) and national-level databases housing often raised in child sexual abuse cases, such Dean Chatfield and George Vasiliou sex offender information will be discussed. as battered women’s syndrome and duress, SEARCH has offered technology-driven solutions Participants will also gain knowledge about drawing a distinction between domestic violence to the law enforcement community for over 40 the special issues of sex offender registration and BDSM, and overcoming the common years. This presentation will explore the cutting for persons convicted in military courts, as well misconception that sexual perpetrators are edge services and products SEARCH uses to as trending legal and policy issues of interest to always men. aid investigators in crimes with digital evidence. the practitioner such as retroactive application, These resources also provide guidance on juvenile registration, and the international utilizing technology to corroborate evidence tracking of registered sex offenders.

51 Sexting & Cyber-Bullying: had been sexually assaulting children for decades Slenderman. When the day arrived, they lured Redefining Dating Violence and even requested castration on the eve of trial. Peyton into the woods and stabbed her 19 times in the Social Media Age While both men only received single convictions, and left her to die. They were caught hiking Bronwyn Blake through good investigation, it was discovered along a highway en route to where they believed Teen dating violence can take many forms, that both men had quadruple the number of Slenderman had a mansion that they could both verbal and physical, and has evolved to victims initially known. This presentation will live in. In this case study the presenters will include social media. In the age of sexting and focus on how the special prosecutors rely on discus interviewing twelve-year-old suspects cyber-bullying it is all too easy for an abuser the work of the original investigation, as well as for attempted homicide and how to handle their to demand sexually explicit materials, send a present-day investigation for civil commitment parents and the international media attention unsolicited communication, or blackmail with purposes. that this type of case attracts. They will also sexual content. This presentation will explore the address the issues that arose at the suspect’s issue and discuss the laws that are currently in Should it Hurt to be Me?: court hearings and throughout the judicial place to protect young people from teen dating Understanding and Responding process. Lastly, they will discuss the forensic violence and cyber-bullying. to Trauma Experienced by interview of the victim during her recovery at LGBTQ+ Youth a local hospital. Sexting Investigations and Tanisha Knighton Appropriate Consequences LGBTQ+ youth experience trauma at higher rates Smartphone Evidence: Teens & Apps Richard Wistocki than their same age non-LGBTQ+ peers. These Amber Schroader This workshop will discuss how to investigate traumas include a variety of both structural and Data from a smartphone is crucial to Sexting cases to identify those involved. You will interpersonal traumas which can include; bullying, understanding the minds of generation Z. learn how to investigate various social media intimate partner violence, physical/sexual abuse, Come and learn what data can be found and platforms and find out who the perpetrators are as well as societal stigma, bias and rejection. where. Data acquisition will be demonstrated in Sextortion cases. The presenter will examine Professionals oftentimes fail to recognize and from Android devices as well as Apple devices. the five areas of where sexted images are stored meet the needs of traumatized LGBTQ+ youth This lab will focus on the analysis of data from and how to eradicate the images. Attendees which can result in poor engagement, ineffective these devices for popular Apps used by teens will learn what the appropriate consequences treatment and in some cases, the perpetuation of and others and how to locate this data on these should be in these cases and how to institute the youth’s traumatic experiences. To ensure that smartphones. such consequences in an online Restorative LGBTQ+ youth receive the care they deserve, Justice/Diversion Program. Finally, the student professionals need to create safe spaces and Social Media and will learn how to send the sexted images to familiarize themselves with the issues facing Open Source Intelligence NCMEC/CVIP, in our effort to curtail the spread traumatized LGBTQ youth. John Sedoski of the sexted images. As criminal use of the Internet becomes more and Six Keys to Conducting Effective more sophisticated, law enforcement’s ability to Sexual Abuse Medical Smartphone Forensic Investigations locate and act on publicly available information Literature Review Amber Schroader is more crucial than ever. Investigators must be Matthew Cox As every investigator knows, smartphones able to turn information from varied sources The medical component of child sexual abuse have increasingly become a part of criminal into actionable intelligence as quickly and is fraught with misconceptions, myths and investigations in both criminal and civil arenas. efficiently as possible. This lab session will misunderstandings. This lecture will cover the The good news is that additional insights and cover mainstream social media sites as well important published medical literature that potential evidence is available on these devices as third-party websites that can allow for quicker demonstrates that it is common for children that can be the key to finding the data needed identification of potentially relevant information. to have normal genital examinations despite a to complete an investigation. The bad news clear disclosure of sexual contact. The presenter is that investigators have an entire new set Solving Crimes Against Children will discuss “it’s normal to be normal,” “normal of challenges including encryption, acquiring with ADF Digital Evidence Investigator, doesn’t mean nothing happened,” and the effect a physical image, understanding the various Part 1 & 2 (Hands-on Lab) of repeated penetration on the female sexual file systems, Apps and all of their data, and Richard Frawley organ. the potential that the suspect may remotely *** All lab attendees will receive a complimentary wipe the data off the mobile device before it is 90-Day ADF Software License Key *** Sexually Violent Predators: examined. The headaches are endless, but so More and more police and sheriff departments WORKSHOP WORKSHOP More than Meets the Eye are using ADF’s Digital Evidence Investigator

DESCRIPTIONS are the rewards. This presentation will present Rachel Jordan, Maureen Whittmore ways to conduct effective forensic examinations (DEI) software to quickly capture the relevant Approximately 20 states, the District of of cellphones. evidence they need to prosecute child predators. Columbia and the federal government have Join Rich Frawley, a law enforcement officer for enacted Sexually Violent Predator (SVP) laws. Slenderman: No More Secrets 22 years, to learn how agencies around the world This presentation will focus on SVP laws and (Part 1 & 2) use DEI to rapidly (within minutes) collect and specific case examples of pedophilic, sexually Gerald Habanek, Thomas Casey, analyze digital evidence on suspect computers. violent predators, issues that commonly arise Michelle Trussoni, Shelly Fisher DEI lets officers make quick decisions on-scene when trying these cases, and an analysis of This presentation will discuss a shocking case to determine if a suspect should be taken into the investigation process. The following two from 2014, where two twelve-year-old girls custody, thereby protecting families, victims representative case examples will be reviewed attempted to kill their classmate Payton Leutner. and the public. Rich will show how officers can during this presentation. Robert Russells had a They planned and researched for six months to rapidly Collect, Analyze and Report with DEI: how long history of going to any length to satisfy his stab Peyton in her sleep at a party. They hoped to quickly determine evidence that is relevant to diaper fetish with young boys. Richard Barnes to become proxies for the fictional character, your case; visualize and save case specific items

52 of evidentiary value; and create prosecutorial and investigators hoping to start undercover the way investigations and prosecutions are ready reports to backup your decisions. This engagements on Tor. It is not intended to currently handled as a result. session is perfect for investigators, examiners, cover undercover engagements techniques. prosecutors or any professional involved in digital This workshop will give investigators a basic Strangulation: Beyond the evidence cases related to child exploitation. introduction to working in Tor. It will include a Obvious in Your Child Abuse Part 1: Preparing Collection Key, Live Scan, Boot discussion on the advantages of virtual machines Investigations and Prosecutions Scan, Review Analysis, Configuring for CE Cases for covert online engagement. It will also cover (Part 1 & 2) Part 2: Configuring a Scan, Keywords, Hashsets, installation and use of Pidgin and tox, including Kelsey McKay, Khara Breeden Scanning EO1, Analysis and Reporting configuring it to route over Tor. An introduction Although statutes criminalizing asphyxiation are This is an exhibitor workshop presented by to GnuPG (GPG/PGP), the installation of a client, passing nationally, the initial focus has been on ADF Solutions, Inc exhibiting on the 2nd floor and how to use gnupg in a CEM community. It intimate partner violence. Better understanding in booth #7. will also cover where to find boards to target. of this crime has unveiled another vulnerable This lab is targeted at people who are new to population, i.e., infants, children and teens. Solving the Series: The Case of the Tor based engagements, and designed to equip New light is being cast on its prevalence in Creeper (Part 1 & 2) them with the tools they are most likely to come child abuse, revealing the failure of the criminal Jeff Udvarhelyi, Damian Jackson across. It will not cover online engagement, or and civil justice systems to identify, investigate, During the summer of 2013, 27 year-old Gilbert online engagement techniques. prosecute and medically treat this lethal and Chavarria terrified residents in North San Diego serious assault. This workshop provides County after he forced entry into several homes Starving for Attention: guidelines on identifying non-fatal injuries and sexually assaulted nine children between the The Investigation and and deaths that are missed or mistakenly ages of four to 15 while they were asleep. During Prosecution of Nicole Finn classified as unintentional or accidental. This the initial investigation(s) DNA was identified Bret Lucas, Nan Horvat, presentation will discuss the following related at two separate crime scenes in two separate Christopher Morgan to strangulation investigations: Interviewing cities. Chavarria’s eventual arrest was the first This case study details the investigation and and investigative techniques; how to properly in San Diego County history resulting from a prosecution of Nicole Finn for the kidnapping and utilize the palm cards for first responders; the familial DNA match. This case study will detail starvation murder of her children. The presenters use of strangulation supplements for follow- the exhaustive investigative efforts preceding will describe the years of deterioration within up investigation and forms to provide medical and following Chavarria’s arrest to include: the the family that ultimately led to the death of one documentation and treatment. Attendees will development of a major case strategy while 16-year old child and the near death of two of receive valuable resources and an opportunity to working in partnership with other investigative her siblings. The presenters will examine the participate in a mock investigation on the proper agencies, post-arrest interview strategy, and legal complexities of prosecuting a parental utilization of these tools on-scene or during the significant lessons learned throughout kidnapping case where the room the children an interview or prosecution. Findings from the the course of the 18 month-long investigation. were confined in was not locked and the children CJA pilot project (Pediatric Strangulation MDT An update, including the case resolution and were allowed to attend school. The presentation Training) will be introduced to highlight the need Gilbert’s sentencing from January 2018, will will further examine the “system” failures that for investing in a more collaborative approach also be provided. allowed adoptive parents to systematically and systematic change. starve and torture their children for years Spiritual Struggles of without intervention which led to one of the Strangulation: The Hidden Sexually Abused Adolescents most highly publicized cases in Iowa history. The Crime in Sexual Violence and Ernest Jouriles, Renee McDonald, presenters will also discuss the complexities of Human Trafficking of Children Katrina Cook charging a case that involved years of abuse and Kelsey McKay, Rachel Fischer, Do sexually abused adolescents experience manipulation, working on a multi-disciplinary Cody Mitchell spiritual struggles, such as feeling they can’t turn investigation involving medical, mental health, Strangulation is known for its effectiveness DESCRIPTIONS to God? Are beliefs about their relationship to school and CPS entities and overcoming venue to gain powerful control over a victim and WORKSHOP God or a higher power affected by the abuse, and challenges due to heavy pre-trial publicity. (This its frequent overlap with sexual perpetration. are those beliefs relevant to their psychological presentation will include graphic material). This presentation discusses the often-missed adjustment? This presentation describes a study opportunity to identify the co-occurrence of conducted at the Dallas Children’s Advocacy State v. Dunn: strangulation in child sexual abuse, something Center, examining sexually abused adolescents’ The Value of Grooming Evidence to that is commonly overlooked in investigations. spiritual beliefs and struggles. The discussion Prosecute Child Sexual Abuse Cases There is a risk of repeated strangulation of will focus on the implications of the study’s Daniel Clark, Thomas Tueller trafficked children by both the pimp and the john. findings for clinicians who work with abused This case study will explain how a civil lawsuit Pimps strangle to gain necessary compliance adolescents, and how clinician knowledge about for fraud became the corroborative catalyst in and control over a trafficked child. Financial an adolescent’s spiritual struggles might aid a child sexual abuse criminal prosecution. It incentive for both the pimp (who can upcharge to clinical efforts. will discuss how you can use the investigation add strangulation to a sex act) and the trafficked and presentation of grooming evidence to victim (who must meet a daily quota) may result Starting a Tor Investigation corroborate delayed disclosures in order to in multiple strangulations per day, and repeated Graham Pease raise the percentage of successful sexual abuse exposure by multiple perpetrators. Despite This lab is a beginners guide to getting started prosecutions. On video, one of the main victims the severe trauma impact, human trafficking investigating in Tor, for child exploitation material in this prosecution will share her perspective on curriculums and screening tools in child abuse (CEM) on Windows. This workshop aims to the grooming techniques that were used on her. fail to capture the existence and impact of this demonstrate some of the basic software used This case study will share mistakes, lessons particular type of assault. This workshop will by online child sex offenders in Tor communities, learned, and how an entire region has changed discuss how and why professionals need to

53 be more proactive in looking for, identifying, lens of prevention. The presenters will also the decision maker’s sensitivity and commitment collaborating and preventing this type of violence. provide information on how to effectively to the team concept. Each member of a team Identification of these events will enable law employ a multi-level education approach - a that is affected by a decision will deal with the enforcement and the medical communities to critical component for effectively addressing consequences of that decision. This concept better serve this vulnerable population. trafficking and exploitation. Through nuanced reinforces our professional obligation to make trainings with professionals, caregivers, and all reasonable efforts to anticipate possible Suffer from BURNOUT, youth, Love146 and United Against Human consequences and take reasonable steps to Give’em the F.I.N.G.E.R.! Trafficking have developed tools to create an avoid unjustified harm to others. Mark Yarbrough entire-system response to trafficking, ensuring Burnout affects millions of Americans each as many people as possible are informed and Tech Tools for Prosecutors year and has been called “the disease of our know how to respond. The presentation’s focus Lauren Wagner and Justin Fitzsimmons civilization.” The unhappiness and detachment will be on vulnerabilities and the connections This computer lab, designed specifically for burnout causes can threaten your job and your between those vulnerabilities, grooming tactics prosecutors, will introduce software and relationships. But there’s good news - burnout and recruitment, and opportunities to respond methodologies that can be used by prosecutors. can be healed. The presenter, a former 20-year to risky behaviors or existing abusive and/or Topics will include Firefox add-ons, such as Video elected District Attorney, personally experienced exploitative situations in a trauma informed way. Downloadhelper (to save videos from YouTube burnout, learned how to successfully overcome and other websites), and Screegrab (to save or it, and went from “Burnout” to “On Fire!” He Tackling the Online Child Sexual copy websites). Also included will be Google has since become a “burnout expert” and has Abuse Threat: A U.K. Coordinated searching techniques (Boolean operators) written and published on the subject. Mark is an Law Enforcement Response to make searching for information much for entertaining, motivating and inspiring speaker. Simon Bailey, Robert Jones efficient and reliable. Google advanced operators, Audience members will learn the definition of Online Child Sexual Abuse (CSA) represents such as site: (to search only particular websites) Burnout and the symptoms thereof. But more one of the most significant challenges for and filetype: (to search only particular filetypes), importantly, attendees will be laughing, and at law enforcement both in terms of scale and as well as Google services such as Images (to the same time learning how to apply Mark’s complexity. Since 2013, the UK has been on a search only images as well as reverse image F.I.N.G.E.R. philosophy to help themselves or significant journey to revolutionize its response, searching techniques) and Scholar (to search their co-workers avoid and/or recover from led by a strategic collaboration between the only legal journals) will also be covered. Also in Burnout. This is a training that you won’t want National Crime Agency (NCA) and the National Google we will talk about all the data saved that to miss! Police Chiefs Council (NPCC). The presentation can be viewed in ‘Dashboard’ and ‘My Activity’. will provide attendees with an understanding Other software that will be introduced includes: Supervising Sex Offenders of how the United Kingdom has developed a Jing (screenshot and screencast software), Jim Tanner coordinated law enforcement response to tackle VLC (for playing movies), Irfanview (for viewing Sex offenders present unique supervision issues online CSA. The presenters will discuss how images), and Audacity (for audio editing). for Probation and Parole. The combination of information and intelligence is disseminated manipulation skills, splitting, control issues, and effectively from National referrals to target Tech Trends: What is the New Evil on the public’s fear makes them challenging and offenders and safeguard children through local the Internet often labor-intensive clients. In this workshop, multi-agency arrangements. Particular attention Ben Butler and Chris Roosenraad The presenter draws on more than four decades will be focused during this workshop on the The Technology Coalition will host this review of of experience to explore approaches and tools opportunity for UK law enforcement to increase current and future trends in Internet technology that assist the Supervising Officer in managing its targeting of High Harm offenders posing the with a focus on technical issues that can have an this complex caseload. greatest risk to children, including a key role for impact on Internet criminal investigations. Topics industry and others in designing out preventable to include IPv6, Content Delivery Networks Supervising Your Registry offending. Attendees will gain specific insight (CDN), Cloudfare, as well as other DNS issues Joel Shoultz from the perspective of National law enforcement and investigative speedbumps. This presentation This session will focus on best practices for leads, with reference to operational case studies, is designed for anyone who wants to know where maintaining your sex offender registry. The in developing a full system approach to tackling the Internet is going. presenter will discuss key items to be looked the threat of online child sexual exploitation at on a quarterly or yearly timetable as well and abuse. Techniques and Technologies as how to work with OffenderWatch staff to for Digital Media Investigations WORKSHOP WORKSHOP update school districts, points, parcels and John Penn

DESCRIPTIONS Taking the High Road: 911 files. This workshop is presented by Watch Ethical Challenges and the This presentation will examine techniques and Systems, a Sponsor for the Crimes Against Multidisciplinary Team (Part 1 & 2) tools useful in investigations involving digital Children Conference.‌ Dan Powers photo, video and audio evidence. Techniques There are many benefits of working in a discussed will include media review, analysis, Systems Response to Human multidisciplinary team, but it also brings ethical and enhancement; a look at image manipulation Trafficking: A Multi-Level challenges as a result of conflicting values and techniques and applications in different crime Education Approach roles. This workshop will examine ethical issues types. The focus of the discussion will be crimes Aria Flood, Jenna Cooper as they apply to members of multidisciplinary against children cases, but will include references Through an interactive presentation informed by teams. Ethical principles are the fundamental to broader law enforcement applications. New Love146 and United Against Human Trafficking’s ground rules of decision making, not just factors technologies, including machine learning experience working with at-risk and exploited to consider. Any decision made in a case has advancements, for law enforcement will also youth, the presenters will review basic concepts ethical implications for the team, and reflects be discussed. of human trafficking and exploitation from the

54 The Adult Undercover Persona investigations. Six key therapeutic issues for of the newer applications for mobile devices that Kevin Laws recovery will be discussed. Recent cases of are popular for teenagers. Participants will also This presentation will assist the investigator with successful prosecutions of female offenders will learn about vault applications and the ability to preparing a usable adult undercover persona for be briefly shared. The program concludes with secretly store information. online investigations. The presenter will discuss a discussion of both the common dynamics and the various pitfalls associated with using the also the critical differences between mother- The Disappearance of Willow Long: adult persona in undercover investigations daughter and mother-son incest. The presenter What Really Happened? and provide a “work around” for these pitfalls. is both an experienced counselor and a resilient Timothy Brown, Jeffrey Kline During the workshop the presenter will build survivor of maternal sexual abuse. This case study will detail how the investigation a complete profile that is usable for online into the disappearance of seven-year old Willow investigations. Lastly, the presenter will discuss The Bigger Picture of Child Long turned into one of the most horrific child several tried and true profiles that have been Sex Trafficking & NCMEC: sex assault/murder cases in Southern Illinois used successfully for numerous investigations Trends, Patterns, and Resources history. The presenters will discuss how as well as previewing actual chat conversations for Law Enforcement Willow’s uncle, who was babysitting her at the used during these investigations. Staca Shehan time, initially interacted with law enforcement This presentation will demonstrate a high-level and eventually become a suspect in the case. The Apple Dumpling Gang (Part 1 & 2) overview of the National Center for Missing The presenters will also discuss how good Anne Darr, Penelope Gallegos, & Exploited Children’s (NCMEC’s) resources communication with the community and other Whitney Orndoff available to investigators working to identify agencies proved essential to the success of the This presentation will provide an overview of and recover victims of child sex trafficking. investigation. There will also be a discussion of the case involving “The Apple Dumpling Gang” Attendees will become familiar with the free the investigative and interrogation techniques which yielded the largest sentence of a human analytical resources provided by the Child Sex utilized in this case. Lastly, the presenters will trafficker in U.S. history (472 years-LIFE). The Trafficking Team (CSTT) at NCMEC, who process share some of the signs that investigators should discussion will highlight the use of the high hundreds of online advertisements a month, and look for when trying to decipher the truth from risk model and the human trafficking victim assist NCMEC missing child case managers by lies when dealing persons of interest. identification tool, which initiated the case due providing analytical support. Furthermore, this to the identification of the first victim. The case presentation will discuss the Children Missing The Federal Prosecution study will incorporate the investigation, long- from Care Act (aka Preventing Sex Trafficking of Larry Nassar term victim assistance efforts/services, and and Strengthening Families Act) and its impact Sean Lewis intelligence efforts, demonstrating the multi- on trends seen by NCMEC and CSTT in their This case study will discuss how the discovery disciplinary team approach. caseloads across multiple reports types. of a hard drive in trashcan ultimately led to a 60-year federal sentence for Larry Nassar. The The Art of Interrogation: The Complexity of Child Abuse presenters will discuss how federal authorities A 360 Degree Perspective (Part 1 & 2) Cases in Indian Country collaborated with state and local authorities, Kevin Navarro Geri Wisner and how understanding each entities’ strengths This workshop will present effective strategies and Indian Country is regularly portrayed by and opportunities yielded optimal results. The techniques for conducting suspect interrogations. Hollywood as having romantic, ecological, and presenters will also discuss the importance of a In a collaborative effort between the Dallas stoic characterizations of life. In reality, Tribal close working relationship between prosecutors Police Department’s Training and Homicide people have suffered generations of abuse and and forensic examiners; the importance of Units and the Federal Law Enforcement Training exploitation and continue to endure many of the thinking strategically about federal charging Center (FLETC) Behavioral Science Division, highest rates of victimization and substance and detention; and how understanding and this video intensive workshop was developed abuse in the country. This presentation will leveraging broad principles of federal sentencing

to examine successful interrogation techniques. provide an outline of current Tribal investigative leads to accountability for the full scope of a DESCRIPTIONS

The presentation offers a unique perspective in practices and explore a variety of practical defendant’s misconduct. WORKSHOP the art of interrogation by incorporating three and cultural considerations that will improve parts: the actual interrogation video, video professional collaborations and support victims The Final Straw: interviews from the detective who conducted and families from Tribal communities. How Global Cooperation Ended the interrogation and video interviews of the an International Manhunt convicted killer from their Texas Prison Unit. The Dark Net and Emerging Jonathon Coats, Shelley Allwang, Technologies: Where Are Teens Daljit (Dolly) Gill The Best Kept Secret: Going and Offenders Following? Many children never disclose the fact that Mother-Daughter Sexual Abuse Lauren Wagner, Justin Fitszimmons they were sexually abused and had that (Part 1 & 2) As the internet continues to evolve new layers abuse memorialized in photos and/or video. Julie Brand populate where offenders commit criminal As this crime knows no borders, neither can This unique workshop describes the complex offenses. One such area is known as the Dark the law enforcement response. The success mother-daughter incestuous relationship, the Net. In this workshop, participants will learn how of interagency collaboration is highlighted subtle, yet intentional violations of normal the Darknet works and how potential criminal in this case study of a two-year worldwide mother-child boundaries, covert and overt activity is facilitated on the Darknet is crucial to victim identification effort that spanned from abuse and the psychological manipulations used investigating and prosecuting child exploitation the U.S. to Australia. The presenters will take to silence victims. Attendees will learn ways cases. In addition, new software applications you through the journey to find the six-year-old to include mothers as potential perpetrators are being added to mobile phones and tablets female victim, including leads from countless in prevention programs and in sexual abuse daily. This presentation will demonstrate several law enforcement agencies across the world.

55 Just as the case seemed to grow cold, new prosecutions or adjudications. Participants will To better understand this complex form of clues were uncovered, further narrowing the learn what devices are currently IoT, emerging online victimization and help inform prevention jurisdiction and leading to the receipt of critical technology for IoT, and ways to detect what may and intervention efforts, NCMEC analyzed information from an Electronic Service Provider. be contained on IoT devices. Issues of search over 6,500 online enticement reports made You will learn how the identification of this one and seizure for IoT devices will also be discussed. to the CyberTipline in 2015. This session child victim in Southern Australia led to post- will focus on the overall patterns and trends arrest undercover efforts spurring over 60 new The MDT Approach to Recantation found in this in-depth analysis, including those investigations, including some back in the U.S. (Part 1 & 2) regarding offenders’ goals (e.g. sex, explicit Jerri Sites, Mary-Ann Burkhart images) and tactics (e.g. grooming, threats), The Holy Grail: A Female Recantation is prevalent in child sexual abuse the child/offender relationship (e.g. unknown, International Traveling Sex Offender cases, especially when the abuser is someone acquaintance, familial), the online locations Kevin Laws close to the family or from within the home. used to commit this crime and the aftermath/ Theresa Goddard was encountered on a social This presentation will provide research-based outcomes for child victims. Furthermore, networking website where her profile page listed information focusing on identifying risk factors important variations between online enticement the blatant need to enter into an “Incest Family.” and ways to reduce the risk of recantation; sub-types (e.g. sextortion) and child age/gender Undercover communications indicated that she practical steps for the MDT to take in the event groups will also be discussed. was living in British Columbia, Canada. After recantation does occur; and considerations for several hours of “Skype Chat” communication moving forward with prosecution. The Parenting Effect: was conducted, Goddard revealed her sadistic The Key to Successful Therapy interest in the enslavement of a child and to have The Meika Jordan Jen Spivey and Colton Kurth a child purely for the use as a sex object. She Child Homicide Investigation Clinical research demonstrates the critical value eventually flew from Canada to Virginia where Michael Cavilla, Darren Moss of parent involvement to the success of a child’s she was subsequently arrested. This case study In November 2011, six-year-old Meika Jordan healing. Presenters will discuss highlights from will identify the possible pitfalls of chatting real sustained horrific physical and mental abuse relevant evidence-based treatment research time with an offender. The presenter will also in the family home before she was eventually and how these treatments have been shown discuss in detail the problems encountered murdered by her step-mother and biological to produce effective results when parents are working with foreign law enforcement and the father. An intense nine-month homicide actively involved in the treatment process. Using difficulty identifying a subject in a very short investigation followed, including a wiretap and clinical examples to explore practical applications, time frame. a police undercover operation, culminating in presenters will draw upon experience and the arrest and charges of first degree murder training in TF-CBT, PCIT, and PSB-CBT to The International Child against both caregivers. This presentation details emphasize the benefits of parent engagement Sexual Exploitation Database: the police investigation, including the many in treatment. Attendees will learn the benefits Best Practices and Latest roadblocks and challenges that investigators of engaging parents pre-treatment and effective Enhancements faced along the way towards a successful and creative ways to engage caregivers as you Miriam Longo conclusion. This 11-month police investigation prepare them for the treatment process. This workshop will discuss the International Child relied heavily on the medical evidence, wiretap, Sexual Exploitation Database (ICSE) which is a and a police undercover operation to solidify The Perfect Pick: powerful Interpol intelligence and investigation charges against both caregivers. The purpose of Victimizing the Intellectually Disabled tool which allows specialized investigators to this case study is to detail some of the challenges Jen Falk analyze and share data with investigators across facing police investigators when a child is abused Approximately 6.5 million people in the United the world. The ICSE database uses sophisticated and/or murdered while in the care of more than States have been diagnosed with an intellectual image and video comparison software to make one person. Furthermore, the presentation will disability. Children and adults with an intellectual connections between victims, abusers and reinforce the importance of how crucial it is and or developmental disability often make the environments. The application allows certified that the police investigators work closely with perfect targets for a sexually violence offense. investigators to investigate new material, the medical professionals and family agencies They also provide a unique set of challenges comparing it against child sexual exploitation to secure evidence when investigating abuse in the investigation and prosecution of sexual images seized world wide and stored in the against children. assault cases. This presentation will address database. This presentation will discuss best best practices for the investigation of these practices to use it, success stories and the The Online Enticement of Children: types of cases as well as provide strategies for WORKSHOP WORKSHOP Trends and Patterns from an

DESCRIPTIONS latest enhancements. evidence gathering, charging decisions and In-depth Analysis of NCMEC successful prosecution. The Internet of Things: Understanding CyberTipline Reports and Using IoT to Prove Your Case Stacy Jeleniewski The Perils of First Responders: Lauren Wagner, Justin Fitzsimmons The National Center for Missing & Exploited Identifying and Managing the The Internet of Things (IoT) refers to physical Children (NCMEC) operates the CyberTipline, Impact of Workplace Trauma devices having the capability to connect to the nation’s centralized reporting system for Suzanne Anderson, Tama Walley, the Internet to send and receive signals and suspected child sexual exploitation. In 2017 Karla Auten data. As technology evolves into every facet alone, the CyberTipline received more than In this informative presentation, first responders of our daily lives, it is important that MDT’s 10 million reports, which uniquely positions will learn about the subtle ways in which develop an understanding of what devices are NCMEC to identify patterns and trends in child traumatic stress can affect our daily functioning. IoT capable and potentially what information sexual exploitation, such as the increasing Participants will complete a self-screening to may be recoverable to assist in investigations, and evolving online enticement of children. determine levels of internal stress and will learn

56 how to identify triggers, and process trauma consequences, and even death. In order to to help understand the burn mechanics. Caution: using evidence-based techniques suitable for ensure justice for these victims, collaboration This lecture will include graphic images that may use in an individual or group setting. Participants with a multidisciplinary team is essential. be disturbing to some viewers. will have the opportunity to experience An experienced trial prosecutor will discuss techniques to reduce tension and stress while lessons learned in investigating, prosecuting Trial Preparation and Strategy learning how to actively engage resources. and convicting several defendants for this act in the Age of Social Media of torture on children of different ages. Shannon O’Brien, Zeus Flores The Seven Steps of The wealth of information available about victims, Sexual Grooming of Children The Whole Truth About the Medical witnesses, and defendants on social media Thomas Tueller Diagnosis of Abusive Head Trauma platforms continues to change and challenge This presentation will help you understand the Robert Parrish the way prosecutors (and defense attorneys) seven steps of grooming, including how sexual Despite a very few vocal physicians and others prepare for trial. Prosecutors need to be aware of predators identify and target their victims. The who claim there is a problem with the validity of what information is out there, how to find it, what presenter, relying on his training and years the diagnosis of Abusive Head Trauma (AHT) in motions may be available to control and limit of personal experience, will help you feel infants and children, the diagnosis is supported how it is used in trial, and how to best prepare confident as you prepare for legal testimony by over 1,000 peer-reviewed articles and was your witnesses for trial testimony, including so that both judge and jury will understand recently shown to be almost universally accepted cross examination by defense counsel. This the role of grooming behaviors. This workshop by those who actually diagnose the cause of workshop will teach attendees how to maximize will also help resolve the misinformation and child head injuries. This presentation will focus their social media searches on witnesses by misconceptions about grooming behaviors. on what those who handle AHT cases, and its providing hands-on tips and examples. They The information provided will also help both perpetrators, need to know about the current will also discuss suggestions on pre-trial motion; the client and clinician pinpoint critical warning state of research, the truth about claims of a how to protect your witnesses (when you can) signs that can go unrecognized. Finally, this controversy, and how such cases should be and how to prepare them (when you can’t) presentation will help you not only intellectually handled in both the child welfare and criminal throughout trial preparation. understand but help you take to heart how vital justice systems. your comprehension of these behaviors will be Truth or Fiction: Red Flags and important in victims’ lives and their treatment. Timeline Development: Risk Factors for Sex Trafficking A Visual Tool to Prove Your Case Ada McCloud The Sex Trafficking of Minors: Bonnie Armstrong Over the last several years there has been Tools for Recovery Child abuse cases have many documents and an increased focus on commercial sexual Jenni Thompson facts to analyze, process and then evaluate to exploitation of youth. Many federal, state, and The sex trafficking of minors has become one of make a determination. Most MDT members nonprofit organizations have information on their our nation’s top concerns in the last few years. become quite skilled at developing narrative websites listing common characteristics of the NCMEC reports that the number of runaways timelines, but many of the important facts of victims of sexual exploitation. Many who are likely being trafficked has risen from one the case become buried in the narrative. Visual have been created to educate the public and in seven to one in five. An increase in legislative timelines offer a way to take complex case facts professionals regarding the Red Flags and Risk efforts, community awareness campaigns, and present them in a simplified, linear manner Factors for CSEY. What if we are wrong? What do creation of task forces, and funding for victim using distinct visual cues such as color, style, we really know about the youth who are victims services has been paramount in addressing and emphasis. When sharing the case with team of sexual exploitation? What are the survivors this issue. Missing children who are believed members, timelines offer a case “snap-shot” to telling us? In this session we will take a hard to have run away of their own free will, with no quickly understand the case. In court, visual look at the vulnerabilities that put youth at risk solid evidence of coercion, luring, or forceful timelines have been noted by jurors as the single and the red flags that help professionals and

removal from their homes or last known location, most important visual shown that helped them nonprofessionals identify those who are at risk DESCRIPTIONS ultimately become the lowest of our collective understand the case and be convinced. The of exploitation or are being exploited – we may WORKSHOP priorities. Law enforcement places tremendous timeline developed must be visually interesting, even expose a myth or two. effort into identifying and rescuing children cohesive, and convincing and include basic who are being sex trafficked by running covert elements such as the date, timeframe, victim, Tweets, Likes, and Shares: operations online, in hotels, and on the streets. witnesses, the suspect, and other key elements Advanced Social Media But one major piece of evidence is missing of the case. This presentation will discuss the Investigations from this effort. This session takes a closer creation of timelines and timelines examples will Lauren Wagner, Justin Fitzsimmons look at indicators that suggest a runaway is be shared with the group to compare/contrast Social media is a common part of everyday life, a possible victim of sex trafficking, and will different methods and styles. so there is little surprise that it has become provide specifics on how law enforcement can commonplace to investigations. However, there use runaway reports to initiate human trafficking Too Hot to Handle: are capabilities within social media websites investigations. Evaluating Pediatric Burns that are little-known within the Crimes Against Suzanne Dakil Children community. This lecture will detail how The Skinny on Investigating and Pediatric burns can range from mild to life- three specific social media searches can be used Prosecuting Starvation Cases threatening. In this lecture, attendees will to enhance the investigation and prosecution Eren Price learn about common burn types (scald, object, of cases. Topics discussed will be using the Depriving a child of food is a particularly chemical) and how to differentiate accidental geocode: search in Twitter to find tweets from heinous method of child physical abuse and from abusive injuries. The presenter will discuss a specific latitude and longitude, using site: in can result in long-term physical and emotional how the medical team can work with investigators Google to search specific social media websites,

57 and using URL manipulations in Facebook to find or fugitive sex offenders, and enhance their Understanding and Using Social photo likes and comments from a target profile. ability to locate critically missing children. The Networking and Computer Evidence U.S. Marshals Service is the nation’s oldest and Steven DeBrota Twitter Investigations most versatile federal law enforcement agency This presentation will explain how to identity, Lauren Wagner and Dean Chatfield and has served the country since 1789. understand, and use social networking evidence Twitter has quickly become the go-to medium for during the investigation and later in court. The today’s instant communication, proven by the fact Uber Law Enforcement Operations: class material will include how to effectively that there are 5,000 tweets per second. In this How Uber Can Assist with create accurate trial exhibits that educate hands-on computer lab, Twitter searching will be Criminal Investigations the jury while avoiding mistakes. The goal introduced to allow searching for Twitter profiles, Billy Kewell, Wade Stormer of this workshop is to provide the attendees tweet keywords and hashtags, tweets within a The presentation will provide an overview of with practical advice and tools to efficiently particular date range, and even searching for what Law Enforcement Operations is at Uber, understand and use the large amount of tweets from a particular latitude and longitude. the two teams that comprise LE Operations (LE complex data we obtain from multiple devices These Twitter searching techniques will include Response and LE Outreach), the responsibilities and sources. both standard and hidden Boolean operators, of each of those teams, and how they often ensuring that investigators have access to the collaborate to engage law enforcement. It will Understanding Cutting Edge best possible evidence. educate the audience on how the Uber platform Criminal Tradecraft works, the different products within the Uber Steven DeBrota U.S. Marshals Overview: platform including riders, drivers, trips, and so Internet social networking and high technology A Session for USMS Users Only on. Specifically, the presenters will show what have fundamentally changed human behavior (Part 1 & 2) type of information is collected on the Uber and criminal tradecraft. To protect minors and Joel Shoultz, Katie Sternberger platform, how that information is available to law adults, we must understand the social networking This session is for USMS users only. It will enforcement, and how to obtain that information revolution to formulate effective reactions. This provide an overview of data available to USMS during an investigation and/or a critical incident. includes a continuing effort to examine how personnel and how to run various types of The presentation will also highlight specific cases impact offenders use emerging communication, searches within OffenderWatch. It will also where Uber’s data and our team’s cooperation high technology, and social networking tools as include an introduction as to how our mobile with law enforcement was a crucial component part of their criminal tradecraft. This presentation app is used in sweeps and provide hands-on in solving a particular case or responding to a will help attendees to differentiate offenders training on the mobile app including how to use critical incident. based upon their tradecraft to promote more the application with agencies that are not using accurate danger assessments for targeting OffenderWatch. This workshop is presented UC Calling Apps purposes. The content of the presentation by Watch Systems, a Sponsor for the Crimes Mike Duffey will include mass child pornography sharing Against Children Conference.‌ During this lab students will be taught how to methods, data encryption, cell phone tracking, use multiple platforms for communicating and cloud storage, web-based communications, U.S. Marshals: Fugitive Sex Offenders sms messaging with suspects. This includes applications, and traditional tools. and an Overview of Sex Offender Text now, Sidline, Google voice, Callyo. The Registry Differences presenter will also discuss the exporting of this Understanding Research and Justin Vickers, Tim Orava information along with the pro’s and con’s of Prevention Best Practices to This presentation will cover topics related to the each method. Students will need to either create Better Protect Children U.S. Marshals Service and its efforts to work a new UC email account or use an existing UC Stacy Pendarvis with state, local and other federal agencies to email account. Schools, organizations, and communities identify, locate and apprehend unregistered or have tried awareness campaigns, prevention non-compliant sex offenders and investigate Understanding and Breaking Denial programs, and other efforts to protect children violations of 18 USC §2250. Additionally, the of Child Molesters (Part 1 & 2) from abuse and victimization. However, many presentation will focus on discussing some Jim Tanner, Darrel Turner organizations are using outdated, untested significant differences with state sex offender Drawing on thousands of interviews and decades methods and programs. This workshop will registration requirements and public websites, of experience, the presenters will describe the explain what the latest research says about including who has to register, what duration, cognitive and strategic differences between polyvictimization and school-based prevention and who is posted on public websites. honest individuals and those attempting to be and how it impacts prevention best practices. WORKSHOP WORKSHOP deceptive. Using videos of offenders during

DESCRIPTIONS CAC staff, MDT members, and educators will U.S. Marshals: Overview of the interviews, they will identify and explain ten learn what’s new in prevention and how to Missing Child Unit and Resources newly discovered ways guilty parties uniquely incorporate it into their programs and services Offered by the National Sex Offender frame their statements when they are denying to better protect all children from bullying, Targeting Center child molestation. Methods of breaking through cyberbullying, all types of abuse, and digital Eric Mayo, Gerald Dysart the offender’s denial will be presented along dangers. This presentation will cover topics related to with hints on the strategic and tactical use of the resources of the U.S. Marshals Service, evidence in interviews. Regardless of how long Understanding Sex Offenders National Sex Offender Targeting Center, the you’ve been interviewing suspects, you’ll walk (Part 1 & 2) enforcement of the International Megan’s Law, away with a few new tools in your belt after Jim Tanner and the mission of the United States Marshals attending this workshop. This presentation will focus attendees attention Service, Missing Child Unit. The presentation on the cognitive set of the intrafamilial and will offer investigators tools and resources that position of trust sex offender. We will expand will aid in their investigations of non-compliant

58 and clarify elements of investigation, prosecution to resolve long-term missing and unidentified Using Virtual Machines and effective containment. We will discuss sex child cases across the country. Attendees will in the Prosecution of a Child offenders’ perceptions, ideation, grooming be provided with an in-depth overview of the Pornography Investigation strategies and cognitive processes. The impact newly-upgraded NamUs database technology, to Justin Fitzsimmons, Timothy Lott of the Internet and the offenders’ digital behavior include the enhanced searching, case mapping, This lecture, designed for both forensic examiners will be explored and explained. Participants will and case management tools within NamUs and prosecutors , will demonstrate how virtual leave this session with a new understanding 2.0. Attendees will also be provided with best machines can be used in the prosecution of child of sex offenders, their thoughts and digital practices for the collection and submission of pornography cases. By using a virtual machine behaviors which will enhance the ability to DNA, dental, and fingerprint information, and a forensic examiner can create a real world investigate, prosecute, supervise and treat sex case studies will be provided to illustrate the replica of a suspect’s computer to more easily offenders. effective use of NamUs resources to resolve show the process of downloading, saving, and cases. storing of suspect images. This replica can then Use of Medical Experts in Child be used by prosecutors to show the steps taken Physical and Sexual Abuse Cases Using NOX Emulator by a suspect to obtain and save this material. Mary-Ann Burkhart Michael Sullivan and Chris Meehan We are oftentimes now having to use medical In this lab students will learn how to install and Utilizing Evidence in Forensic expert testimony to prove not only what happened use NOX emulator so they can use a computer interviews: Homeland Security and how something happened, but also to prove in place of a smartphone. Students will create Investigation’s Prepare and Predict the absence of evidence and debunk defense accounts for use on NOX, Gmail, and then Forensic Interview Guidelines myths. This workshop will discuss that evidence visit the Play Store to install the applications Stacey Kreitz to be introduced through expert testimony in KIK, Grindr and Fake GPS. Using these APPS, Utilizing forensic interviews in investigations both physical and sexual abuse cases and how the students will see how the computer now that involve victims and witness is necessary; to partner with your medical expert to prove mirrors the use of a smartphone and allows being prepared to utilize evidence collected negative evidence in child abuse cases. The the investigator to geo-locate to their home in an investigation during a forensic interview presenter will also discuss working with your jurisdiction. is crucial. Homeland Security Investigation’s medical expert to debunk the most common Prepare and Predict Guidelines (PPG) will equip defense myths in child physical and sexual Using the Tactical Polygraph in established forensic interviewers with the tools abuse cases. Crimes Against Children necessary to utilize evidence presentation in Investigations investigations involving child sexual abuse, child Using Digital Evidence to Matthew Mull pornography, sextortion, enticement and human Corroborate Your Investigation A tactical polygraph is one administered as trafficking. PPG instructs forensic interviewers Justin Fitzsimmons soon as possible after the point of first contact on working with law enforcement officers with This presentation and demonstration explores the with a suspect in order to gather immediately- selecting and preparing evidence for use in various elements of crimes that might be used to actionable information. This workshop will a forensic interview. In addition, Prepare and support the investigation and prosecution of child discuss how the tactical polygraph in the Predict Guidelines utilizes a hypothesis testing physical and sexual exploitation cases. It covers context of child exploitation cases, can assist framework that minimizes trauma, maximizes both technical and non-technical evidence at with conducting a more complete and truthful information obtained, minimizes contamination various crime scenes and demonstrates how interview regarding the facts of the offense of memory while maintaining the integrity of the there is usually evidence left behind that points under investigation and the individual’s history investigative process. to the offender’s knowledge and intent in child of offenses against children. However, the true exploitation cases. target of a tactical polygraph is not the initial VICleads by Project VIC offense, such as possession/distribution of child Richard Brown, Arnold Guerin, Using Google in Your Investigations pornography, solicitation of a minor, or human Robert O’Leary DESCRIPTIONS

(Part 1 & 2) trafficking, but rather other crimes against Project VIC’s newest initiative VICleads brings WORKSHOP Nirupa Calvin, Cathy McGoff and children that are known only to the suspect the Tip & Lead investigation closer to the search, Denise Smith and his or her victims. As a result, the tactical seizure, victim rescue ecosystem of Project VIC This hands-on lab will give investigators polygraph can be thought of as a “screening” Attend this lecture and see how partnerships insight and valuable tips to conduct online examination used to uncover other undisclosed have teamed up to map out a process in which investigations. The instructors will review criminal acts involving the sexual abuse of forensic and case management reporting data case studies, investigative techniques and children. systems can use API’s and external data to tools using many of Google’s services (Search, enhance analysis, reporting and grading of leads. Image Search, Google Account, Gmail, YouTube, Using Virtual Machines The presenters will discuss a derivative of data Wallet etc.) that can be used to supplement in an Investigation to assist in scientifically understanding the larger your current investigative process. Get ready to Dean Chatfield, George Vasiliou issues within selected operating areas. This will learn by doing! The presentation also includes Virtual Machines offer an easy way to create be a lecture on design, theory and execution a presentation on Data Disclosure. a sandbox environment. By using a sandbox with a first look by NUIX and Hubstream environment, there are less concerns about Using NamUs to Resolve Long-Term vulnerabilities of online investigations, such as Victim or Offender? Missing and Unidentified Child Cases viruses and tracing. This lecture will introduce Peer Recruitment and B.J. Spamer software that can be used to create a virtual Drug Trafficking within the Funded and administered by the National Institute machine and talk about specifics its regarding Sex Trafficking Experience of Justice, the National Missing and Unidentified use. Sue Aboul-Hosn, Octavis Lampkin Persons System (NamUs) offers free resources

59 Today commercially sexually exploited encountered in Dallas County. The topics that happens in our community, it is important that children (CSEC) are no longer invisible and will be covered in this presentation include CACs begin to plan a response in the unfortunate we are stepping up to better understand their the use of media during voir dire and general event it does occur. Attend this workshop and experiences and to meet their needs. We know topics to cover in all sexual abuse cases. The learn how the Dallas Children’s Advocacy Center that common risk factors include histories of presentation will include time at the end for Q&A started the discussion in Texas and subsequently sexual and physical abuse, being a runaway, and hypotheticals. organized a committee who developed a and dysfunctional families. We also know that response plan and how this information has been often high-risk and exploited children have been What About Our Boys? Understanding proactively shared with local school districts and involved with multiple systems and agencies and the Challenges Facing Male Victims law enforcement agencies. Tips on how to start are vulnerable in a variety of ways. However, of Sexual Abuse and Assault a similar discussion in your area and organizing many CSEC victims are being exploited through Julie Brand a coordinated response will be shared. multiple avenues by their trafficker, not just Male victims, whether children, adolescents or sexually. Exploiters coerce and manipulate their adults, often face horrendous gender bias in What Dr. Seuss Knows about Doing victims to also recruit their peers and to sell divulging their sexual abuse. Society is still in THIS Job! Wellness/Survival and drugs. Does this make the victim an offender? denial that “real men” can even be victims of the MDT Approach to Child Abuse! In this presentation attendees will hear from sexual assault (especially when the perpetrator Dan Powers a survivor advocate that had to do all three to is female.) This ignorance serves to inhibit males Dr. Seuss helps us gain some insight to our daily survive from the young age of 14 and better from disclosing their victimization and may even struggles, doubts, and the reasons we stay in understand the path to secondary victimization. keep “mandated reporters” from reporting sex this job. In this workshop we will discuss the crimes involving male victims. Ignorance and places you go, the choices you make and how Virtual Currency Investigations minimization of the problem impede victims’ they give us the courage to move mountains. In Eric Huber opportunities for intervention and for recovery. this workshop you will discover how lucky you Virtual currencies are the economic fuel of In this presentation we’ll discuss male sexual are to do what you do. Whether you like them the underground economy and the dark web. victimization, the unique challenges men face, here or there, stress will find you anywhere. Proficiency in the investigation of blockchain and the seven myths that keep male victims silent. Come enjoy an hour or two if even if you’re old technology is no longer optional and is a critical We’ll examine the stats and facts, recognizing or if even if you’re new. component in being an effective investigator how “The Adverse Childhood Experiences (ACE) of Internet crimes against children and other Study” finally validates what many professionals When Did It Happen Doctor? criminal activity. In this lab attendees will gain have long believed about the frequency and the Timing of Injuries in Children an understanding of blockchain and its common resulting trauma of male sexual victimization. Matthew Cox forms within the criminal underworld such as It is imperative in determining the cause of Bitcoin, Litecoin, and Monero. What Child Molesters Can Teach Us injuries in children to understand both the About Grooming (Part 1 & 2) mechanism of injury and the onset of symptoms. Virtual Rape: Cory Jewell Jensen Physical injuries, such as bruises, burns, Now a Possibility in Sweden In this workshop, participants will examine (via fractures, abdominal trauma and head trauma Jörgen Lindeberg film clips of interviews with various types of all have a variety of presenting manifestations This case study will examine the investigation of sex offenders) some of the specific strategies that can make it challenging to determine when a 41-year-old Swedish man who was convicted offenders report using to target, seduce and the injury occurred. This presentation will utilize of rape and sentenced to 10 years in prison exploit children and adults. Information was case studies to illustrate key historical features for coercing young teenagers in United States, collected from approximately 1,600 sex offenders and medical findings that can help determine Canada and the UK to perform sexual acts in who were involved in long-term, court mandated the likely timing of the injury. front of webcams by threatening them and their sex offender treatment. Topics include offender families. The case is a win for the police and descriptions of “grooming” tactics and how and When Faith Hurts: Recognizing and the prosecutors and has been a real challenge why they did the following: targeted certain Responding to the Spiritual Impact for the court. Today it is only the sexual children, families and youth serving agencies; of Child Abuse Before, During and predators imagination that sets the limits on seduced child victims and adult caretakers: and After the Forensic Interview their behavior. Technology knows no limits or inhibited disclosure, detection and reporting. Victor Vieth borders so investigators have to adapt their A variety of video clips, research studies and This workshop will provide an overview of the mindset accordingly. For the first time in Sweden, anecdotal interview data from numerous sex impact of child abuse on the spirituality of victims. and possibly the world, this case resulted in a offenders will be utilized to illustrate each stage The workshop will provide concrete suggestions WORKSHOP WORKSHOP conviction for rape of a child without any actual of grooming behavior for overcoming interviewing blocks that may DESCRIPTIONS physical contact between the perpetrator and the result from the spiritual concerns of children and victim. This is a case that has been called virtual What Do We Do?: School Incident otherwise responding to this issue before, during, or digital rape previously. The presentation will Response Plans for Advocacy Centers and after the forensic interview. The workshop discuss the Swedish investigation, international Carrie Paschall, Sarah Burns, includes a discussion on coordinating medical cooperation between Swedish Police, FBI, Chelsea Zortman and mental health care with pastoral care. RCMP, UK Police and the Swedish penal code So far in 2018 there have been seven confirmed that makes it possible for a rape conviction in incidents of firearm attacks in a school, five of When the Smoke Clears: sextortion cases that takes place online. which resulted in injury or death. This is just one Cross Examining the Defendant example of violence that can occur in a school and Defense Witnesses Voir Dire: Child Sexual Abuse setting resulting in criminal investigation and Victor Vieth Marissa Aulbaugh, Lauren Hopkins a potential response required from your local This workshop details the art and science of This presentation will cover voir dire in child children’s advocacy center (CAC). While we all preparing for and conducting a cross examination sexual abuse trials and some of the typical issues hope that an incident of school violence never of a suspect or lay defense witnesses in cases of child maltreatment. While the content of this

60 presentation is primarily for prosecutors and NCMEC’s Child Victim Identification Program in the Philippines. This case study will describe child protection attorneys, other MDT members (CVIP) data provides insight into trends in those these investigations conducted by Oath, which may also gain a deeper understanding of cross who sexually abuse and exploit children, and then have been referred to law enforcement and have examination practices by attending. choose to memorialize it in images and videos. In resulted in a significant number of buyers and this presentation, information, data and statistics sellers being arrested worldwide, with dozens When the Victim is on the Run: on topics such as differences in familial and of children rescued. Prosecuting Sex Trafficking non-familial cases and egregiousness of sexual Cases without the Victim content will be covered. You Can’t Make This Stuff Up! Brooke Grona-Robb Jim Tanner, Darrel Turner, Graham Hill, This presentation will focus on analyzing child sex Women Who Molest Children: Lawrence Braunstein trafficking investigations to make a determination Offender Typologies (Part 1 & 2) You’ve worked hard all week and learned a lot. of how to go forward without the victim. The William Carson Now let us destroy some brain cells and send discussion will explain how investigators can This workshop begins with findings that were you home with a grin on your face. Join some approach a case, with identification of suspects learned from in-depth interviews with eighteen of our zanier presenters for a fun session as and corroboration of victims in mind, so as to women who had been convicted of molesting they collectively shake their heads and take improve the chances that case may be able to children, but goes well beyond that to include a light-hearted look at experiences even they proceed regardless of whether the victim is cases from across the nation as well as data couldn’t believe. available to testify. the presenter will explain from other recently published material on this how working to develop accomplice testimony, topic. The presenter will discuss past and current You Have that SEX Case.... and evaluating their culpability is an important offender typologies for female child molesters, What Does that Mean? component of this analysis. Lastly, how analyzing including his five distinct typologies that were Jim Sears the evidence, organizing the case, and preparing first published in 2006. This workshop will examine child sexual assault the jury are the key components of a successful investigations and the issues involved with these prosecution will be discussed. Working Undercover on the cases. The presenter will discuss what society Kik Platform thinks of these cases and what investigators When Your Forensic Tools Won’t Work Lindsey Bosso must know to overcome those “beliefs.” Using Jeff Shackelford This presentation will cover from start to finish up-to-date medical studies, the presenter will Commercial tools make our jobs easier and how to conduct your own successful Kik discuss what can be learned from the medical are typically the first choice we turn to in live operation. Topics will include: how to acquire an exam. The importance of the forensic interview analysis situations, but can you rely on them undercover device suitable for chatting; storing/ and what to take from it will be examined. Lastly, to work in every scenario you encounter? For capturing evidence while on Kik; the utilization using the MDT to help in your investigation and example, how would you deploy your traditional of ruses in cellular based investigations; sending what each part brings to help will be discussed. triage tools on a live computer with damaged leads to law enforcement both locally and or disabled USB ports? Thankfully you’re not abroad; and presenting the best case possible Zachary Garrett: Pimp Daddy completely out of luck as there are two powerful, for a successful prosecution. This lecture will and His Two-Year Old Daughter (yet overlooked), in-built tools that can save also include case study examples deriving from James Holdman the day. In addition to not costing you a dime, the 18-month long operation the presenter This case study details the investigation they both come pre-installed as part of the conducted. of Zachary Garrett, a father of a two-year- Windows Operating System. I’m talking about old daughter and six-month-old son who the Windows PowerShell and Command Prompt. Working with Victims and Witnesses was advertising on Craigslist looking to find Many people may be aware that you can use with Developmental Delays and individuals and couples to take part in various these tools to gather basic information, but did Intellectual Disabilities sex acts to fulfill his fantasies. The presenter you know that you can also use these tools to Bill Fulbright will explain how he contacted, communicated detect full disk encryption, recover BitLocker Child victims and witnesses can be both a and eventually met Garrett in an undercover DESCRIPTIONS keys, extract passwords, review Prefetch files, challenge and a joy to work with throughout capacity to verify the criminal activity. During the WORKSHOP display USB device history and much more? the investigation and trial process. Many of meeting, Garrett offered to allow the presenter Attendees will also learn how to automate these the child victims and witnesses we encounter the opportunity to sexually abuse his daughter. commands for basic investigative purposes, and also struggle with developmental disabilities, The presenter will discuss what should have will also receive a free “Quick Start” field guide intellectual disabilities, and the impacts of been be an easy prosecution and the rescue of to using PowerShell and CMD commands for trauma in their lives. This presentation will cover two children, but was not. What did occur was live analysis situations. practical approaches to successfully work with declination of prosecution by federal authorities these children, often turning their vulnerabilities in Kansas and state charges filed by a Kansas Who are the Victims? into strengths in the prosecution of offenders. Prosecutor with a suggestion of probation for Who are the Offenders? Garret. The presenter will explain how he was An Analysis of CVIP Data Yahoo (Now Oath) and its Role in the able to secure federal charges on Garrett in the Shelley Allwang Fight Against Child Trafficking Western District of Missouri in an attempt to In an effort to better serve law enforcement and Matt Healy prevent a guilty plea on state charges in return inform the field of child pornography offending, Like many technology firms, Yahoo (now for probation. Lastly, the presenter will discuss the National Center for Missing & Exploited Oath) has dedicated significant resources to how the state prosecution sent Garrett to prison Children (NCMEC) has partnered with both combatting child abuse and trafficking on its for 25 years. the Thorn Foundation and a team of expert platforms. One area which has not yet been researchers to analyze over a decade of victim detailed publicly has been its investigative and offender data. Designated as the national efforts, which first began in 2014 and continue clearinghouse for child pornography cases, today, to identify the buyers and sellers of child pornography emanating from trafficked victims

61 SPEAKERS Speakers are listed alphabetically by last name. Visit cacconference.org/speakers for biographies or download our app!

Sue Aboul-Hosn Mohamed Bah Tim Brady Regional Human Trafficking Supervisory Special Agent/ Detective Prevention Coordinator Computer Forensic Analyst Boise Police Department Florida Department of Children and Families Homeland Security Investigations Julie Brand Adam Acosta Simon Bailey Principal Detective Chief Constable CAPER Consulting Montgomery County Pct. 3 Constable’s Office National Police Chief’s Council – (Child Abuse Prevention, Education, Recovery) United Kingdom Joe Adcock Lawrence Braunstein Detective, Crimes Against Children Jason Barry Attorney Flower Mound Police Department Trust and Safety Manager Braunstein & Zuckerman, Esqs. Facebook Amy Allen Khara Breeden Forensic Interview Specialist Amy Barton Executive Director Department of Homeland Security Child Abuse Pediatrician Harris County Forensic Nurse Examiners Children At Risk Evaluation Services, Jeanne Allert St. Luke’s Children’s Hospital Carly Brenner Founder and Executive Director Registered Dietitian The Samaritan Women Megan Bawcum Children’s Health Family Advocate Children’s Medical Center Dallas Shelley Allwang Dallas Children’s Advocacy Center Program Manager, Richard Brown Child Victim Identification Program Austin Berrier Director National Center for Special Agent Project VIC Missing & Exploited Children Homeland Security Investigations Timothy Brown Yesenia Altamirano Denise Bertone Special Agent Bilingual Family Advocate Retired Deputy Coroner Illinois State Police Dallas Children’s Advocacy Center Los Angeles Department of Medical Examiner – Coroner Chad Bryant Elizabeth Altman Sergeant Assistant United States Attorney Denise Biehn Lancaster County Sheriff’s Office – United States Department of Justice Supervisory Special Agent Lincoln, NE Western District of Wisconsin FBI/Portland Kathleen Buckley Suzanne Anderson Elizabeth Bigham Pediatric Nurse Practitioner Assistant Clinical Director Special Agent The Center for Miracles Dallas Children’s Advocacy Center Georgia Bureau of Investigation Pat Burke Ingrid Arbuthnot-Stohl Bronwyn Blake Privacy & Law Enforcement Compliance Special Agent Legal Director Apple Federal Bureau of Investigation Texas Advocacy Project Mary-Ann Burkhart Bonnie Armstrong Kristin Boorse Director – Child Abuse Prosecution Project Executive Director Director of Product Management Association of Prosecuting Attorneys The Shaken Baby Alliance Thorn Sarah Burns Marissa Aulbaugh Lindsey Bosso Chief Marketing Officer Assistant District Attorney Special Agent Dallas Children’s Advocacy Center Dallas District Attorney’s Office DHS/HSI Rachel Burris Karla Auten Michael Bourke Assistant District Attorney Therapist Chief, Behavioral Analysis Unit Dallas County District Attorney’s Office Dallas Children’s Advocacy Center United States Marshals Service Ben Butler Lidia Baeza Leslie Boutte Director of Global Policy

SPEAKERS Victim Advocate Assistant Clinical Director GoDaddy.com Dallas County District Attorney’s Office Dallas Children’s Advocacy Center Rebecca Butler Criminal Intelligence Analyst Texas Department of Public Safety

62 Nirupa Calvin Lauren Copenhaver Dylan Dorow Investigator Therapist Digital Crimes Investigator Google Inc Dallas Children’s Advocacy Center Apple / Information Security William Carson Matthew Cox Mike Duffey Chief of Police St. Luke’s Health System Special Agent Supervisor Maryland Heights Police Department Florida Department of Law Enforcement Catherine Crisham Thomas Casey Assistant United States Attorney Matthew Dunn Detective Department of Justice Assistant Special Agent in Charge Waukesha Police Department Homeland Security Investigations, Dallas Tim Cromie Michael Cavilla Detective Sergeant Gerald Dysart Sergeant/Detective Dickinson Police Department Senior Inspector Calgary Police Service U.S. Marshals Service Jesse Crowe Edward Chase Special Agent in Charge Shannon Enochs Senior Attorney Wisconsin Department of Justice Special Agent Association of Prosecuting Attorneys’ Federal Bureau of Investigation Child Abuse Prosecution Project Suzanne Dakil Medical Director, REACH Program Jen Falk Dean Chatfield UT Southwestern Assistant District Attorney High-Tech Crime Training Specialist Dallas County District Attorney’s Office SEARCH Stephen Daley CEO / Founder radKIDS David Fallon Karlene Clapp Personal Empowerment Safety Education Special Agent Supervisory Special Agent radKIDS Inc 501c3 DHS Homeland Security Investigations U.S. DOJ – FBI Natalie D’Amico Robert Hugh Farley Daniel Clark Detective Consultant in Crimes against Children Prosecuting Attorney Redmond Police Department Farley International Bonneville County Prosecutor’s Office Anne Darr Tom Farrell Dave Clark Victim Specialist Intelligence Officer Detective FBI Norfolk and Suffolk Constabulary Dallas Police Department Marshall Davidson Preston Findlay Don Colcolough Special Investigations Program Administrator Counsel, Missing Children Division Founder Department of Family and Protective Services National Center for Tactical Technology, LLC Missing & Exploited Children Antigone Davis John Combs Director, Global Head of Safety Policy Rachel Fischer Detective Facebook Forensic Nurse Examiner & Educator Round Rock Police Department Memorial Hermann Martin Conley Julie de Bailliencourt Shelly Fisher Special Agent Safety Policy Manager EMEA Detective United States Department of Homeland Facebook Waukesha Police Department Security, Homeland Security Investigations Steven DeBrota Justin Fitzsimmons Catherine Connell Deputy Chief of General Crimes Unit Program Manager Child/Adolescent Forensic Interviewer US Attorney’s Office, SEARCH FBI Southern District of Indiana Aria Flood Katrina Cook Bibiana Dominguez Prevention Advisory Specialist Director of Clinical Services Forensic Interview Love146 Dallas Children’s Advocacy Center Dallas Children Advocacy Center Zeus Flores Jenna Cooper J. Brooke Donahue Supervisor, CERT SPEAKERS Director of Programs Supervisory Special Agent Illinois Attorney General’s Office United Against Human Trafficking FBI David Foltzer Sharon Cooper Jesse Donkers Special Agent Developmental and Forensic Pediatrician; Detective Inspector Homeland Security Investigations Adjunct Pediatric Staff National Police of the Netherlands Department of Pediatrics Matthew Fowler UNC – Chapel Hill, School of Medicine Special Agent FBI

63 Richard Frawley Donald Hayden Mindy Jackson Digital Forensic Specialist Supervisory Special Agent Director of Support Services ADF Solutions, Inc. US Army Criminal Investigation Division Dallas Children’s Advocacy Center Bill Fulbright Matt Healy Stacy Jeleniewski Ravalli County Attorney Sr. E-Crime Investigator Senior Research Specialist Ravalli County (Montana) Attorney’s Office Oath Inc. National Center for Missing & Exploited Children Penelope Gallegos Nancy Hebert TFO-FBI Chief Prosecutor, Special Victims Unit – Cory Jewell Jensen State Patrol Crimes Against Children Division Senior Consultant District Attorney’s Office – CBI Consulting Inc Daljit Gill Montgomery County, Texas Detective Michael Johnson Seattle Police Department Ashley Hennekey Special Agent Project Specialist, Homeland Security Investigations Elizabeth Glidewell Child Victim Identification Program Detective National Center for Dedric Jones Waxahachie Police Department Missing & Exploited Children Special Agent Homeland Security Investigations Randall Gohn Graham Hill Special Agent Director Jerry Jones Louisiana Bureau of Investigation (LBI) KLIK Protective Services Cyber Crime Specialist Cyber Crime Unit NW3C Lesley Hill Jesse Gonzalez Special Agent Robert Jones Director of Forensic Services Department of Homeland Security, Deputy Director Dallas Children’s Advocacy Center Homeland Security Investigations CEOP – National Crime Ageny Katie Greer Judy Hoffman Rachel Jordan CEO Community Volunteer Attorney KL Greer Consulting National Council of Jewish Women Harris County District Attorney’s Office Crystal Gregory James Holdman Kristin Joseph Forensic Interview Specialist Special Agent Special Agent Homeland Security Investigations ICE – Homeland Security Investigations Homeland Security Investigations Brooke Grona-Robb Jim Holler Ernest Jouriles Assistant District Attorney Consultant (Retired Police Chief) Professor, Department of Psychology Dallas County, Texas Holler Training Southern Methodist University Andi Grosvald Hamilton Lauren Hopkins Julie Kenniston, MSW, LSW Special Agent Assistant District Attorney Program Manager Oklahoma State Bureau of Investigation Dallas County District Attorney’s Office NCJTC/FVTC Arnold Guerin Wade Hornsby Billy Kewell Technology and Innovation Manager Detective Law Enforcement Liaison – RCMP Canadian Police Centre for City of Frisco Police Department U.S. Central/Canada Missing and Exploited Children Uber Nan Horvat Craig Guymon Assistant Polk County Attorney Brian Killacky Polk County Attorney’s Office, Detective Sergeant (Retired) Gerald Habanek Des Moines, Iowa Amber Alert Technical Assistance Lieutenant Waukesha Police Department Eric Huber Adam Kirhagis Vice President Detective Sergeant James Hardie NW3C Baltimore Police Department Supervisory Special Agent Federal Bureau of Investigation Eddie Ibarra Alan Kivi Detective Out Reach Training Coordinator Eliza Harrell Dallas Police Department NDCAC Director of Education, Outreach, Training & Prevention Damian Jackson Diane Klecan Program Director for Client Services SPEAKERS National Center for Detective Missing & Exploited Children Dallas Police Department Children’s Advocacy Center of Delaware

64 Jeffrey Kline Miriam Longo Lori McPherson Special Agent Criminal Intelligence Officer Senior Policy Advisor Illinois State Police INTERPOL USDOJ/OJP/SMART Tanisha Knighton Bret Lucas Chris Meehan National Trainer Assistant Polk County Attorney Investigator Knighton Consulting Group LLC Polk County Attorney’s Office, Collin County Sheriff’s Department Des Moines, Iowa Kristy Kosak Andy Meiron Digital Marketing Manager Colleen Lynch DFPS Investigations Program Director Thorn Lieutenant Department of Family and Protective Services Ocean County Prosecutor’s Office Stacey Kreitz Kevin Metcalf Forensic Interview Specialist Geoff MacGillivray Deputy Prosecuting Attorney Homeland Security Investigations VP, Product Management 4th Judicial District of Arkansas Magnet Forensics Colton Kurth Chris Miller Therapist Mark MacKizer Special Agent Dallas Children’s Advocacy Center Supervisory Special Agent FBI FBI Bobby Ladson Dan Mills Supervisory Case Manager Lindsay Marchant Program Manager National Center for Missing Exploited Children Assistant Special Agent in Charge National Center for Georgia Bureau of Investigation Missing & Exploited Children Octavis Lampkin Survivor Advocate Lisa Martinez Michael Milnor University Student Director of Case Management Chief (Retired) and Forensic Services Justice 3D Ron Laney CAC of Collin County CAC Advisory Committee Member Alana Minton National Criminal Justice Training Center/FVTC Jay Martin Lead Deputy Attorney General Director of Curriculum & Training Health and Human Services Division of the Kenneth Lanning Digital Futures Initiative/ Idaho Office of the Attorney General Consultant (Retired FBI) Douglas County Sheriff’s Office CAC Consultants Cody Mitchell Eric Mayo Texas Ranger Joe Laramie Chief Inspector Texas Department of Public Safety Program Manager U.S. Marshals Service NCJTC Habon Mohamed Ada McCloud Assistant County & District Attorney Kevin Laws Program Specialist Ellis County & District Attorney Special Agent (Retired) Texas Deparment of Family Homeland Security Investigations and Protective Services Tim Moniot Magnet Forensics Keith Leavitt Molly McDade Senior Trainer Developer Human Trafficking Sergeant Rosalie Morales Cellebrite Inc. Multnomah County Sheriff’s Office Chief Policy Advisor Office of the Child Advocate Alexandra Levi Renee McDonald Forensic Interview Specialist Associate Dean and Professor, Amy Morgan Department of Homeland Security Department of Psychology Detective Southern Methodist University Boise Police Department Crystal Levonius Chief Felony Prosecutor Cathy McGoff Christopher Morgan Collin County District Attorney’s Office Senior Manager, Law Enforcement Detective and Information Security West Des Moines Police Department Sean Lewis Google Inc Assistant United States Attorney Darren Moss U.S. Attorney’s Office, Thomas McGreal Sergeant Detective SPEAKERS Western District of Michigan Speaker/Consultant Calgary Police Service Wicklander-Zulawski & Associates Jörgen Lindeberg Kevin Mulcahy Detective Inspector Kelsey McKay Survivor of Child Sexual Abuse Swedish Police, Consultant Prosecutor National Operations Department McKay Training & Consulting, LLC

65 Matthew Mull Adrienne Owen Eren Price Captain Domestic Violence Assistant District Attorney Texas Department of Public Safety – Policy & Training Coordinator Dallas County District Attorney’s Office CID Polygraph Unit Delaware State Police Kristen Reeder Andrea Munford Grace Pandithurai Assistant Professor Detective Lieutenant Assistant County and District Attorney University of Texas Michigan State University Police Department Ellis County and District Attorney Office Southwestern Medical Center Karuna Nain Marty Parker Steve Reeves Safety Policy Programs Manager Supervisory Special Agent Director of Child Safeguarding Facebook Federal Bureau of Investigation Save the Children Kevin Navarro Robert Parrish Greg Reyero Detective (Retired) Deputy Salt Lake County District Attorney Sergeant Dallas Police Department Salt Lake County District Attorney’s Office Texas Department of Public Safety Rey Navarro Carrie Paschall Jeff Rich Director Chief Investigative and Investigator MSAB Support Services Officer Plano Police Department / FBI Dallas Children’s Advocacy Center Evan Nicholas Mike Robinson Supervisory Special Agent Graham Pease Detective Mike Robinson FBI Detective Senior Constable Vanderburgh Sheriff’s Office, Indiana Not supplied Nattakarn Noree Jennifer Romero Senior Social Worker & Director of Aftercare Stacy Pendarvis Victim Specialist A21 Thailand Program Director FBI Monique Burr Foundation for Children Fitri Noviana Chris Roosenraad Down to Zero Program Manager John Penn Treasurer Plan International Indonesia Sr. Architect Law Enforcement Technologies Technology Coalition Adobe Shannon O’Brien Maria Rosales-Lambert Assistant Attorney General Katie Petersen Director / Bi-lingual Forensic Interviewer Illinois Attorney General’s Office Detective Oklahoma Interviewing Services, Inc. Missoula Police Department Nancy Oglesby (Missoula, Montana) Amy Russell Career Prosecutor Executive Director Justice 3D Julie Pfluger Arthur D. Curtis Children’s Justice Center Assistant United States Attorney Eric Oldenburg U.S. Department of Justice – U.S. Attorney’s Scott Ryan Law Enforcement Liaison – Office – Western District of Wisconsin Dean & Jenkins Garrett Professor North America The University of Texas at Arlington – Griffeye Laura Pierro School of Social Work Deputy Executive Assistant Prosecutor Robert O’Leary Ocean County Prosecutor’s Office Mary Sawicki Principal Solutions Consultant Senior Attorney Nuix, NNA John Pirics Association of Prosecuting Attorneys Detective Sandra Onyi Carmel Police Department Jennifer Sawyer CPNP Assistant District Attorney Childrens Health Children’s Medical Center Robin Pittman Dallas County District Attorney’s Office Dallas Assistant District Attorney Dallas County District Attorney’s Office Scott Sayers Tim Orava Detective Senior Inspector Angela Povilaitis Dallas Police Department U.S. Marshals Service Staff Policy Attorney (& former state prosecutor) Amber Schroader Whitney Orndorff Michigan Domestic & Sexual Violence CEO Analyst Treatment & Prevention Board Paraben Corporation FBI Dan Powers Jennifer Schuett Victim Advocate SPEAKERS Carsten Otting Chief Operating Officer Kriminalhauptkommissar Children’s Advocacy Center of Collin County Justice for Jennifer Polizei Saarland

66 Lisa Schuster Gina South Leah Treitman Licensed Psychologist Attorney Online Safety Programs Children’s Medical Center The Manuel Diaz Law Firm, and the and Partnerships Manager Native American Children’s Alliance Facebook Jim Sears Sergeant (Retired) B.J. Spamer Michelle Trussoni Irving Police Department Director Detective National Missing and Unidentified Persons Waukesha Police Department John Sedoski System (NamUs) – UNT Health Science Center High-Tech Crime Liaison Thomas Tueller National White Collar Crime Center (NW3C) Jen Spivey Owner, Clinical Director Therapist Idaho Supreme Court Jeff Shackelford Dallas Children’s Advocacy Center Domestic Violence Evaluator Applications Engineer Expert Witness PassMark Software Michael Staggs Tueller Counseling Services, Inc. & Senior Sales Engineer Unified HealthCare of Idaho Lock Shaffer Nuix Texas State Puplic Relations Officer Darrel Turner Bikers Against Child Abuse (BACA) Katie Sternberger Clinical and Forensic Psychologist Product Manager Turner Forensic Psychology Staca Shehan Watchsystems Executive Director Jeff Udvarhelyi National Center for Rebecca Sternburg Detective Missing and Exploited Children Program Manager Escondido Police Department NCMEC Jennifer Sherenian Jim Valley Problematic Sexual Behavior Coordinator Ian Stevenson Lieutenant Dallas Children’s Advocacy Center Brown County Sheriffs Office Karl Stonebarger Robert Shilling Senior Investigator George Vasiliou Head of Crimes Against Children (Retired) New York State Police SEARCH INTERPOL Wade Stormer Justin Vickers Joel Shoultz Law Enforcement Liaison – U.S. East Chief Inspector Senior Account Manager Uber U.S. Marshals Service WatchSystems John Strain Victor Vieth Rick Sipes National Business Development Specialist Senior Director & Founder Chief Felony Prosecutor, 443rd District Court WatchSystems Gundersen National Child Protection Ellis County & District Attorney’s Office Training Center Joe Sullivan Jerri Sites Director of Behaviour Analysis Ana Lorena Vigil Outreach Coordinator and Forensic Psychology Law Enforcemenet Liaison – Southern Regional CAC Forensic Training Solutions Latin America and the Caribbean Uber Kimberly Skidmore Michael Sullivan Assistant Director of Forensic Services Program Manager Brandie Wade Dallas Children’s Advocacy Center Fox Valley Technical College Assistant District Attorney Dallas County District Attorney’s Office Kassandra Slaven Jim Tanner Deputy Prosecuting Attorney President Lauren Wagner Ada County Prosecutor’s Office KBSolutions High-Tech Crime Training Specialist SEARCH Kelly Slaven Jenni Thompson Chief Clinical Officer Director of Legislation and Education Tama Walley Dallas Children’s Advocacy Center Polly Klaas Foundation Therapist Dallas Children’s Advocacy Center Denise Smith Elizabeth Tow Investigator Program Manager Clare Walters SPEAKERS Google Inc The Innocent Justice Foundation Family Advocate Dallas Children’s Advocacy Center Greg Smith Melissa Travis-Neal Executive Director Agent Maurice Washington Kelsey Smith Foundation, Inc. Oklahoma Attorney General’s Office Detective/FBI Task Force Officer Seattle Police Department VICE/HRV Unit FBI Child Exploitation Task Force

67 Sarah Wentz Paul Wolpert Lon Ziankoski Program Coordinator, Human Rights Special Agent Special Agent Vital Voices Global Partnership Homeland Security Investigations Homeland Security Carmen White Pamela Womack Chelsea Zortman Administrative Prosecutor Criminal Investigator Forensic Interviewer Dallas County District Attorney’s Office Dallas County District Attorney’s Office Dallas Children’s Advocacy Center Maureen Whittmore Carrie Wright Attorney Director of High Risk Youth Special Prosecution Unit Dallas Children’s Advocacy Center William Wiltse Mark Yarbrough President Motivational Speaker/Author Child Rescue Coalition Give’em the F.I.N.G.E.R. Geri Wisner Bernadette Yupit-Martinez Executive Director Forensic Interviewer Native American Children’s Alliance Dallas Children Advocacy Center Richard Wistocki Andrea Zaferes Detective (Retired) Investigator Naperville Police Department Dutchess County Medical Examiner Office/ RIPTIDE SPEAKERS

68 EXHIBITOR INFORMATION

EXHIBITOR SCHEDULE WEDNESDAY MONDAY TUESDAY FIRST FLOOR: 7:00 AM-5:00 PM BOTH FLOORS: 7:00 AM-5:00 PM BOTH FLOORS: 7:00 AM-5:00 PM SECOND FLOOR: 7:00 AM-3:00 PM

Exhibit Hall | 1st Floor | Dallas Foyer

Exhibit Hall 45 64 65 84 85

1ST FLOOR 46 63 66 83 86 Dallas Foyer 000000 BREAK AREA BREAK AREA BREAK AREA 47 62 67 82 87 Break Area 101- 000000 104 48 61 68 81 88

000000 49 60 69 80 0 .oo. 0 89 100

000000 50 59 70 79 90 99

000000 51 58 71 78 91 98 Stop-N-Go Lunch Counter 52 57 72 77 92 97

53 56 73 76 93 96

54 55 74 75 94 95

ESCALATORS from Second Floor Exhibit Hall • 1111 11 1 1K\ ENTRANCE1�ui��1 1111 11 1

Exhibit Hall 2ND FLOOR Lone Star Foyer Exhibit Hall | 2nd Floor | Lone Star Foyer

12 11 10 9 5678 4 123 EXIT to Skybridge

44

43

42 Registration 13 14 18 19 23 24 28 29 33 35 36 38 41 15 20 25 30 34 37 40 1617 2122 2627 3132 ESCALATORS to First Floor Exhibit Hall 39

69 EXHIBITORS

AccessData Association of Prosecuting Attorneys’ Online operates as a completely customizable http://www.accessdata.com/ Child Abuse Prosecution Project education and management system for SRO’s Whether it’s for investigation, litigation or http://www.childabuseprosecution. and/or administrators who are guiding children compliance, AccessData® offers you powerful apainc.org/ who get caught up in Sexting and Cyber-Bullying. solutions that put the power of forensics in your The Association of Prosecuting Attorneys is This approach ensures the child and their parent hands. For more than 30 years, AccessData pleased to offer a training and technical resource receives education and reform specific to the has worked with more than 130,000 customers for child abuse prosecutors and their multi- mistakes they have made. By introducing content in industries from government to legal, from disciplinary teams. The Child Abuse Prosecution aligned to each mistake (drugs abuse, sexting, corporations to international business, to Project, a VOCA-funded project through OJJDP, truancy, and many more) the child experiences understand and focus on your unique collection- is staffed with a team of child abuse professionals stories and examples related to their challenges. to-analysis needs. The result? Products that and is readily available to provide consultation, The system also supplies the Juvenile Officer empower faster results, better insights, and technical assistance and training. with tools and a fully integrated learning more connectivity.For more information, visit #69 management system (LMS) to assign writing www.accessdata.com. assignments, research, Juvenile Justice Online #13 Atola Technology educational videos, tasks, apology letters, and http://www.atola.com/ many other items to enrich the child’s education Ace Technology Partners FAST FORENSIC , EVEN WITH and ultimately transform a bad decision into http://www.acetechpartners.com DAMAGED DRIVES! Get more digital evidence revolutionary learning experience. Ace Technology Partners is in our 35th year faster with ATOLA INSIGHT FORENSIC. The #53 of business and 20th year of work in Digital first and only forensic data acquisition tool that Forensics. We are known across the globe for gets data from both good and even damaged Belkasoft the fastest password cracking systems and hard drives and it’s one-button simple to use! http://belkasoft.com/ digital forensic workstations for e-discovery. Come see a demonstration and find out why Founded in 2002, Belkasoft is a global leader Challenge our system architects to design your digital forensic professionals from government, in digital forensics technology, known for their optimized Forensic solution or use our standard military and law enforcement agencies around sound and comprehensive forensic tools. With models. We are ISO 9001:2015 Certified and our the world choose INSIGHT FORENSIC as their a team of professionals in digital forensics, data workstations are the only models in the world main imaging tool. recovery and reverse engineering, Belkasoft certified by EPEAT for environmental friendly #19 focuses on creating technologically advanced materials, energy efficiency and responsible yet easy-to-use products for investigators and disposal. We hold multiple federal contracts, Attorney General of Texas Crime forensic experts to make their work easier, faster, including GSA Schedule 70, NASA SEWP V, Victim Services Division and more effective. With this focus in mind, Air Force NetCents2 Products and are the http://www.texasattorneygeneral.gov/ Belkasoft introduces their flagship product, only Forensic Workstation vendor with a Prime The Crime Victims’ Compensation Program is Belkasoft Evidence Center – an easy-to-use, NASPO Valuepoint Contract for State and Local dedicated to ensuring that victims of violent integrated solution for collecting and analyzing customers. crime are provided financial assistance for crime digital evidence from mobile and computer #17 related expenses that might not be covered devices. Customers in law enforcement, by other resources. The fund can help eligible police, military, business, intelligence agencies, ADF Solutions, Inc victims pay for medical or counseling bills or and forensic laboratories in 130+ countries http://www.adfsolutions.com/ cover the cost of a funeral for a loved one who worldwide use Belkasoft Evidence Center to ADF Solutions is the leading provider of digital has been killed. fight homicide, crimes against children, drug forensic and media exploitation tools. These #81 trafficking, data leakage, fraud, and other online tools are used for processing and analyzing and offline crimes. Belkasoft LLC is a U.S.- computers, external drives, drive images, and Be Sure Consulting based company with offices in California. Our other media storage (USB flash drives, memory http://JuvenileJusticeOnline.com mailing address is 1016 Middle Ave #6, Menlo cards, etc.). ADF forensic tools are all about Juvenile Justice Online was created to supply Park CA 94025. all School Administrators, Law Enforcement speed, scalability, ease-of-use, and relevant #32 results. The tools have a proven track record Officers, Juvenile Officers, Judges, and in reducing forensic backlogs, streaming digital Attorneys with an alternative to Suspension, BIS Digital Inc. investigations and rapid access to digital Expulsion, or Arrest. Juvenile Justice Online http://bisdigital.com/ evidence and intelligence. Our customers include takes aspects of restorative justice and From concept to completion, BIS Digital provides law enforcement, defense and other government education transforming it into a robust online total turnkey solutions and integrated systems agencies worldwide. education tool designed guide children back based upon the specific needs of our users that #7 onto the right path. This online Diversion tool include concept and planning, engineering of can be used by juvenile officers and SRO’s to solutions and systems, purchase of product, give the child who’s made a poor choice an installation, personal product and service opportunity to learn from that mistake without training, and on-going support and service. entering the judicial system. Juvenile Justice #33

70 BlackBag Technologies criminal cases. Building Hope Today works to CloudScale365, Inc., a supporter of the fight http://www.blackbagtech.com/ create awareness of the prevalence of childhood against child abuse and neglect. BlackBag® Technologies is a developer of sexual abuse, reveal its lasting effects and EXHIBITORS innovative forensic acquisition, triage, and safeguard those at risk. In addition to providing CloudScale365, Inc is an IT Services company analysis software for Windows, Android, iPhone/ support to victims and families. providing SaaS and hosted cloud services to iPad, and Mac OS X devices. The company’s #25 enterprises globally. With a USA-based support flagship product, BlackLight, has been adopted team, CloudScale365 delivers quality, cost- worldwide by many digital forensics examiners Callyo effective technology support focused on as a primary analysis tool. Mobilyze, BlackBag®’s http://callyo.com/ customer success. groundbreaking mobile device triage tool, Callyo is the world’s #1 mobile phone technology #58 empowers virtually all law enforcement for law enforcement to catch and prosecute personnel, with or without specialized child predators, human traffickers, and those Columbia Southern University experience, to capably triage and report on who would exploit our children. http://www.columbiasouthern.edu/ data from smartphones. In addition to software, #43 Columbia Southern University offers online ® associate, bachelor and master degrees, in BlackBag also develops and delivers expert Cellebrite forensic training and certification programs, fields such as public administration, criminal http://www.cellebrite.com designed to meet the needs of law enforce- justice and organizational leadership. With Cellebrite: Digital Intelligence for a Safer World ment, military and private sector examiners. affordable tuition rates, textbooks provided Digital data plays an increasingly important Taught by an elite team with considerable law at no cost and flexible online classes, the CSU role in investigations and operations of all kinds, enforcement and digital forensics experience, format meets the needs of adult learners. CSU and making data accessible, collaborative and the courses are tailored to address to realistic, also allows up to 75 percent of undergraduate actionable is what Cellebrite does best. As multi-platform scenarios simulating the daily courses and 50 percent of graduate courses the global leader in digital intelligence with challenges of digital evidence. to be transferred into the desired degree plan. more than 60,000 licenses deployed in 150 #38 Visit www.ColumbiaSouthern.edu to learn more! countries, we provide law enforcement, military #59 Bluebear LES and intelligence, and enterprise customers http://www.bb-les.ca with the most complete, industry-proven Converus, Inc. BlueBear is a boutique software shop focused range of solutions for digital forensics, triage http://www.converus.com on forensic software solutions for Law and analytics. By enabling access, sharing Converus provides scientifically validated Enforcement. BlueBear’s flagship product is and analysis of digital data from mobile credibility assessment technologies. ® called LACE. LACE is a unique tool designed devices, social media, cloud, computer and EyeDetect detects deception at 86% to assist investigators in the automated other sources, Cellebrite products, solutions, accuracy in 30 minutes by analyzing eye ™ categorization of media evidence files (images services and training help customers build and other behaviors. IdentityDetect detects & videos) that have been seized or confiscated. the strongest cases quickly, even in the most falsified identities at 91% accuracy in less This unique tool has been created to significantly complex situations. Cellebrite: providing digital than 3 minutes by analyzing subtle variations reduce the amount of time required, by an intelligence for a safer world. in the motor nervous system responses. ™ investigator, to analyze and categorize seized #28 IntegrityDetect identifies the most trustworthy individuals at 80% accuracy in 6 minutes by images, videos, text and audio files found on Children’s Advocacy Centers of Texas computer and hard drives. analyzing a person’s implicit associations. http://www.cactx.org/ #5 These technologies help protect countries, Children’s Advocacy Centers of Texas, Inc. corporations and communities from corruption, BookWoman (CACTX), a 501(c)3 non-profit organization, crime and threats. Converus is headquartered http://www.ebookwoman.com is the statewide membership association in Lehi, Utah, USA. Visit: www.converus.com. BookWoman is an independent feminist representing 70 local CACs in Texas. It is the #82 bookstore located in Austin, Texas. We specialize mission of CACTX to support Texas CACs, in in providing diverse and unique resources in partnership with local communities and agencies CovertTrack Group, Inc. support of the mental health and cultural needs investigation and prosecuting child abuse, in http://www.coverttrack.com of women and children across their lifespan. order to restore the lives of children who have CovertTrack is the Law Enforcement leader Additionally, we curate and provide books and been abused. in tracking and undercover surveillance. educational materials in support of conferences, #15 CovertTrack offers several tracking and mobile phone technology solutions. presenters and attendees. We have been a CloudScale365, Inc. community and statewide resource for 40 years. #90 http://www.futurtrak.com www.ebookwoman.com. FuturTrak is a cloud-based children’s advocacy #46 case management service developed for Don’t forget to purchase your Building Hope Today Foundation operational and financial efficiency. CAC conference t-shirts http://www.buildinghopetoday.org serves victims of child abuse through advocacy, (short and long-sleeved), Building Hope Today works with law enforcement, treatment, and investigation services. FuturTrak and polos, at health and legal professionals to train and provides an easy to use, customizable, secure educate about the steps of grooming and help service for teams to consolidate, organize, and BOOTH 76 quantify evidence of grooming to strengthen share case information, files, and calendars. Futurtrak is developed and provided by on the first floor exhibit hall!

71 Cyan Forensics the Explorer’s Education, Encourage their discussion, provides forums, and increases http://www.cyanforensics.com/ participation in a wide variety of service situational awareness through strategic Cyan Forensics has a new generation of digital activities, Enhance the Explorer’s preparation partnerships, and the sharing of technical forensic tools that scan devices for illegal for future roles as citizens, leaders and future information and know-how. Through the NDCAC, material in minutes. As well as dramatically law enforcement officers. the law enforcement community has access accelerating processing in the lab, these #52 to investigative tools, technical information, tools allow rapid triage on-site, helping to find advanced training, and service provider evidence early and prioritize further analysis. Digital Futures Initiative information that can aid their investigations EXHIBITORS #31 http://www.DFiNow.org at no cost. Digital Futures Initiative (www.DFiNow.org) is a #73 DA Technology non-profit that provides free, in-class curriculum http://datechnology.net (lessons, activities, instructor’ notes, training/ EZ Child ID, Inc. DA Technology provide universal wireless certification) on digital citizenship, relationships, http://www.ezchildid.com solutions for any business use, office use, on substance use & distracted driving. We provide EZ Child ID Inc. has created the nations most field and self use. Office supplies as extended the necessary tools and training programs comprehensive digital fingerprinting child batteries for any electronic device as computers, for educators, law enforcement (SROs) and identification system. In creating EZ Child ID iPads, laptops, telephones and any mobile phone parents to help them instruct kids on safer, card program, we worked directly with police device, wireless headsets that designed for more responsible internet and mobile use, and agencies and with National MasoniCHIP. We meeting that gives the ability to communicate to better manage specific problems that can have worked with law enforcement officials to between few users in the same time with the arise—including cyberbullying, sexting, online ensure that our EZ Child ID digital fingerprinting distance of up to 10 meters. Solar chargers predators, substance abuse, loss of emotional system is up to their standards. We capture all that match any electronic device which is great intelligence, distracted driving and more. the vital information required by the Amber Alert for emergency cases or outdoors use, also we system. Our system produces a child ID card carry 3 in 1 cables for any electronic devices, Stop by and get access to the most complete and child ID CD. Unlike our competition, our wireless speakers and much more. curriculum available for you to teach – all for system even records a digital video with voice, #89 FREE. and it is saved in digital avi format. #48 #62 Dallas Children’s Advocacy Center www.dcac.org Digital Intelligence, Inc FBI Violent Crimes Against Children Stop by the Crimes Against Children’s http://www.digitalintelligence.com/ http://www.fbi.gov/investigate/violent- Conference/DCAC sales booth to purchase Digital Intelligence is the industry leader in crime/cac your conference t-shirts and polos, as well as providing hardware for practitioners of Digital The mission of the Violent Crimes Against our nationally relevant child abuse education Forensics and eDiscovery. Offering specialized Children program is to provide a rapid, proactive, materials. We offer video-based curriculum workstations, write blockers, duplicators as well and comprehensive capability to counter all packages for mandated reporters, Spanish as software and training, Digital Intelligence has threats of abuse and exploitation to children speakers, parents, and children as well as been providing products and services across which may be investigated under the jurisdiction a new training geared towards leadership in the globe for nearly 20 years. and authority of the FBI. The VCAC collaborates child-serving organizations. Stop by our booth #35 with Federal, State, local, tribal, and international to learn more! partners through investigative assistance, #76 DME Forensics training, intelligence-sharing and technical http://dmeforensics.com/ support. Dallas Children’s Advocacy Center DME Forensics is an innovative technology #99 www.dcac.org company focused on providing digital and At the Dallas Children’s Advocacy Center, multimedia evidence solutions to the criminal therapy dogs offer a unique form of support to and civil justice communities. We develop children and families. Therapy dogs are different technologies that assist investigators in a ATTEND THE from service dogs in that they do not provide variety of cases, such as: terrorism, civil unrest, physical assistance but do their work by sitting homicide, property crimes, and child exploitation. EXHIBITOR quietly while providing emotional support and #34 acceptance. Research has proven that contact WORKSHOPS! with a therapy dog can lower blood pressure, DOJ National Domestic decrease the heart rate and calm other anxiety Communication Assistance Center Attendees will receive related symptoms that are often associated (NDCAC) one entry (for each with the type of emotional trauma victims have http://ndcac.fbi.gov exhibitor workshop The United States Department of Justice, experienced. attended) to a drawing for #92 National Domestic Communications Assistance Center (NDCAC) helps mitigate a wide array 2 Apple Watches, awarded Dallas Police Department Explorers of technical issues currently affecting the Wednesday evening at the http://dallaspolice.net/communitys/ law enforcement community regarding social event. policeExplorers communications services and technologies The goals and objectives of the Dallas through law enforcement collaboration and You must be present to win. Police Enforcement Program are to: Further in-house expertise. The NDCAC facilitates

72 Federal Bureau of Investigation - eliminate and prioritize information, detect all source, shared knowledge bank on human Behavioral Analysis Unit and highlight critical clues as well as identify trafficking activity, human traffickers and their http://www.fbi.gov relationships. TECHNOLOGY HAS CREATED networks, and the central dissemination and EXHIBITORS The Behavioral Analysis Unit 3 provides THE PROBLEM, BUT IT CAN ALSO PROVIDE coordination point for law enforcement, select operational support to local, state, federal THE ANSWER. nonprofits and the professionals working to end and international law enforcement agencies #39 modern day slavery. Our iHTAC collaborators investigating crimes committed against child include Marinus Analytics, Shadow Dragon victims. Guardian Group Cyber Intelligence, Kaseware, TRAC, Securus, #98 http://www.theguardiangroup.org LexisNexis, IBM and A21. Guardian Group (GG) is committed to an #66 Forensic Computers Inc aggressive, comprehensive approach to taking http://www.forensiccomputers.com the full fight to human trafficking. The first part INTERPOL Washington Forensic Computers, Inc (FCI) has been of our strategy focuses on providing training to http://www.justice.gov/ engineering and constructing premium, the travel and hospitality industries. The service interpol-washington custom-made forensic workstations since industry is where the predators hide and it is an INTERPOL Washington, the United States 1999. Designed for maximum performance area we need to expose. The second part of the National Central Bureau, serves as the and reliability, our forensic towers are the strategy is active involvement and assistance in designated representative to the International most rigorously tested and well-supported the pursuit and apprehension of criminals. GG’s Criminal Police Organization (INTERPOL) on workstations on the market. We are here to elite team of experienced professionals work with behalf of the Attorney General. INTERPOL help with your digital forensic needs—software, law enforcement and special agencies, primarily Washington is the official U.S. point of contact hardware, workstations, and more. by augmenting their intelligence needs, so that in INTERPOL’s worldwide, police-to-police #10 they can apprehend and incarcerate predators communications and criminal intelligence involved in human trafficking. With that strategy network. A component of the U.S. Department GeoTime by Uncharted Software in mind, we offer several specified programs we of Justice (DOJ), INTERPOL Washington is co- http://www.geotime.com implement and execute. managed by the U.S. Department of Homeland GeoTime is a powerful visual analysis and Security (DHS) pursuant to a Memorandum mapping software for law enforcement, used Guardian Group’s mission is to prevent and of Understanding that ensures a continuing primarily for investigative cases involving call disrupt the sex trafficking of women and children commitment to the guidance and oversight of the detail records, mobile forensic data, GPS, while enabling partners to identify victims and organization and reinforces its role in effectively location-tracking data, and social media data. predators in the United States. sharing and exchanging international criminal Uncover movements that disputes an alibi, or #96 investigative and humanitarian assistance demonstrates criminal intent and/or geographic information. proximity to key events. Hawk Analytics #16 http://www.hawkanalytics.com/ GeoTime can find in your data to answer these Hawk Analytics’ feature product, CellHawk, It’s a Hoot! questions: extracts rapid answers and compelling visual Interactive, Fun, Trendy Jewelry! Essential oil • What significant events happened in this evidence from cell phone call detail records jewelry and car difuzers, lockets,snap jewelry geographic area in the last X time frame? (CDRs) and other location-based data. Get and a beautiful collection of necklaces and • Which telephone numbers has the source Answers: Turn all your raw data into meaningful earrings. number contacted most frequently? answers. Save Time: An analysis that took 8 #60 • Which telephone numbers do several target hours in Microsoft Streets and Trips was redone numbers have in common? in CellHawk in less than 5 minutes. Justice 3D • Which numbers were in the same area when #14 http://www.justice3d.com/ they were in contact? Justice 3D provides advanced training and • Is there a trend or pattern in the series of HTCI Edas Fox consulting to law enforcement, prosecutors events? http://www.edasfox.com/ and other allied professionals in the areas of child • Has this type of event occurred here or For over 10 years we have supported the ICAC abuse, sexual assault and domestic violence. somewhere else in the last Y period of time? community with their digital forensics needs, The company’s team of trainers are career law including our line of Forensic Computers, the enforcement officers, prosecutors, advocates Currently used by HIDTA’s, fusion centers, EDAS FOX. Led by a retired law enforcement and medical experts. We offer both single and national defense organizations and law officer who began working online child multi-day trainings and will gladly customize enforcement agencies worldwide for criminal exploitation cases in 1996, EDAS FOX is them to fit your agency’s needs. investigations, intel analysis, surveillance uniquely qualified to be your partner. #71 #18 operations and courtroom presentation. K&S Teaching and Consulting LLC #74 International Human Trafficking http://www.kandsteaching.com/ Griffeye Analysis Center We specialize in Undercover Chat Investigations http://www.griffeye.com/ http://www.deliverfund.org/ training, customized 1-5 day courses or expert The world’s premier platform for accumulating DeliverFund’s International Human Trafficking witness testimony dealing with child exploitation knowledge and building intelligence. The Analyze Analysis Center (iHTAC) provides collection, cases. I have been teaching since 2006, when Platform helps you process and analyze large integration, analysis and dissemination of human I was the primary instructor for the Immigration amounts of image and video data, automatically trafficking intelligence. It serves as the central and Customs Enforcement (ICE) “On-line

73 Undercover Investigations” course for 2006 that acquires, analyzes and shares evidence House International providing victim services for and 2007 instructing nearly 200 agents. In 2010, from smartphones, computers, the cloud, and sex trafficking survivors in Cambodia, Thailand I designed and began teaching a week long “On- IoT related devices. Magnet Forensics has been and Haiti. line Undercover Chat Investigations” course. I helping examiners and investigators fight crime, #83 have taught this course in various states across protect assets, and guard national security the United States.I have also taught various since 2011. Monique Burr Foundation for Children courses concerning the sexual exploitation of #3 http://www.mbfprevention children all over the world: Mexico, Peru, Russia, education.org EXHIBITORS China and Spain. Marinus Analytics, LLC The Monique Burr Foundation for Children, a #75 http://www.marinusanalytics.com/ nonprofit in Jacksonville, Florida, provides MBF Created by Marinus Analytics in 2011, Traffic Prevention Education Programs to schools and Kaseware Jam is a revolutionary software tool that organizations to educate and empower students http://www.kaseware.com empowers law enforcement in their fight against and adults to protect children from bullying, Kaseware provides cutting edge incident, sex trafficking. cyberbullying, all types of abuse and exploitation, investigation, and analytical software, including #65 digital abuse, and other digital dangers. graph analytics and social media forensics and targeting. Kaseware was founded by former Microception, Inc. The programs, including MBF Child Safety FBI Special Agents with extensive experience http://www.microception.com/ Matters™ for elementary school and MBF in investigating crimes against children. The Meta, the next generation of interview recording, Teen Safety Matters™ for middle school, are Kaseware platform is offered as a configurable evidence and case management platform, is research-based, practical, easy to implement, web-based solution that facilitates collaboration a web-based application framework whose and trusted and endorsed by schools, parents, and information sharing while still protecting modules share common services such as and experts, including Erin Merryn of Erin’s Law. sensitive data. access control, data authentication, security, They are available at a minimal cost nationwide. #85 licensing, syslog, audit trails, notification, Visit www.mbfpreventioneducation.org for backup, internationalization, and other common more information. Logicube Inc. administrative services. The modules include: #72 https://www.logicube.com MetaCase-Case management that is simple, Logicube® is a global manufacturer of digital powerful, and customizable MetaInterview- MSAB forensic imaging and hard drive duplication Interview room recording that integrates with http://www.msab.com/ solutions. Logicube’s world-class innovation MetaCase MetaTrack-Forms, data collection MSAB is a world leader in mobile forensics delivers feature-rich to government, military, & reporting MetaScope-Exam room recording technology designed to help law enforcement education, and security organizations world-wide. MetaImage-Digital image management. customers unlock, extract, decode and #80 analyze data from mobile devices, mainly Our digital forensic solutions, including our mobile phones. Our products – including XRY flagship Forensic Falcon-NEO, set a new Million Kids – Riverside Co for extraction, XAMN for analysis and XEC for standard of excellence in forensic imaging Anti Human Trafficking Task Force management – are considered to be standards devices. We’ve worked closely with our http://www.millionkids.org/ in the field and are used in over 100 countries. customers and developed products that US AND GLOBAL TRAINING SERVICES Having fast, effective and affordable mobile deliver innovative design, high performance ON HUMAN TRAFFICKING, SEXTORTION, forensic capabilities is essential for conducting and technologically advanced features that meet SOCIAL MEDIA EXPLOITATION AND CHILD successful investigations into crimes against the complex challenges faced in today’s digital PORNOGRAPHY: Million Kids serves as the children. And many ICAC teams across the forensic investigations. Training and Outreach Coordinator for the U.S. rely on us to support them. In addition, Riverside County Anti Human Trafficking Task our products are Project VIC compliant, helping Visit us at http://www.logicube.com to learn Force. We published: Exploited: The Grooming investigators sift through high volumes of more. of America’s Teenagers. We broadcast two images faster and more easily. #26 radio shows. A Global WEEKLY Internet Human #41 Trafficking Training Program to 170 countries. Exploited: Crimes and Technology on 590 National Center for Missing & Made for Freedom AM throughout Southern California. We have Exploited Children Made for Freedom is a social enterprise which trained over 100,000 government agencies, http://www.missingkids.org is building a lifestyle brand that appeals to the law enforcement, corporate leaders and civic The National Center for Missing & Exploited socially conscious consumer. All of our products groups. We offer training services on human Children® is a non-profit 501(c)(3) corporation are made by human trafficking survivors and trafficking, sextortion, child pornography and whose mission is to help find missing children, those at risk. We provide dignified employment social media exploitation throughout the U.S reduce child sexual exploitation, and prevent while spreading awareness. Our mission is to and globally. Opal Singleton served on the POST child victimization. Since 1984, NCMEC has end human trafficking. panel for developing human trafficking training served as the national clearinghouse and #70 throughout California. She is an instructor at USC resource center for families, victims, private Price Institute for Safe Communities training organizations, law enforcement and the public Magnet Forensics law enforcement and the USC School of Social on issues relating to missing and sexually http://www.magnetforensics.com/ Work for Los Angeles Police Department and the exploited children. Magnet Forensics is a global leader in the Los Angeles Fire Leadership training Academy. #49 development of digital investigation software Million Kids serves as a Board member for Rapha

74 National Criminal Justice Training attended classroom trainings and over 24,000 Stress Analyzer (CVSA®), the most widely used Center of Fox Valley Technical College have taken advantage of the online trainings. truth verification system in the USA. The CVSA http://ncjtc.fvtc.edu/ #56 is successfully used by numerous ICAC Task EXHIBITORS The National Criminal Justice Training Center Force and Special Victim Units across the USA. (NCJTC) of Fox Valley Technical College, Navajo Jewelry & Crafts The CVSA has been scientifically proven to be one of the leading national criminal justice Specializing in handcrafted sterling silver greater than 98% accurate, and is currently used educators, offers expert facilitated training southwest Indian jewelry. Made by family and by over 2,000 agencies worldwide. and technical assistance. Flexible, diverse extended family from the Navajo, Zuni, and Santo #12 and innovative child protection courses are Domingo tribes of New Mexico. All jewelry is available to federal, state, tribal, and local handcrafted with natural stones and shells all Ntrepid Corporation criminal justice professionals. Training topics set in sterling silver. http://ntrepidcorp.com include: Bullying and Cyber Bullying, Child #54 Ntrepid is a mission-driven provider of cutting- edge technology solutions for government and Abuse, Child Homicide, Commercial Sexual Net Transcripts, Inc. Exploitation of Children, Computer Facilitated enterprise to discreetly and safely conduct http://www.nettranscripts.com Crimes Against Children, Forensic Interviewing, sophisticated online operations in the most In business since 1988, Net Transcripts is Human Trafficking, Missing and Abducted hostile online environments. We leverage the nation’s leading provider of Transcription Children, Underage Alcohol and Drug Use, Youth our deep experience in the national security and Translation services specifically to Law Focused Community Policing, and Youth Suicide community to anticipate our customers’ needs Enforcement and Criminal Justice agencies – Prevention. Through community partnership, and provide solutions before the requirements including Child and Family Welfare services. NCJTC training and technical assistance are expressed. Our heavy investment in R&D We specialize in the verbatim transcription of programs have increased awareness of crimes allows us to stay ahead of the rapidly changing multi-speaker interviews and interrogations, against children and affected significant, positive internet landscape. Ntrepid’s innovative including child forensic interviews and other changes in the communities we serve. Invite solutions empower advanced online research, recordings involving two or more people. We also us to your community today. Visit ncjtc.org for analysis, and data collection, while obscuring provide transcription of single-speaker dictated more information. organizational identity and protecting your investigative reports, case notes, interview #50 mission. summaries and other supplemental recordings – #84 National Missing and Unidentified all of which serves to save caseworkers’ valuable Persons System (NamUs) time. Additionally, we provide transcription and Nuix USG http://www.namus.gov/ translation of most foreign languages, offering http://www.nuixusg.com The National Missing and Unidentified Persons multiple service levels to fit your budget. Nuix USG understands the DNA of data at System (NamUs) offers free forensic, analytical, enormous scale and the unique needs of the and investigative resources to law enforcement For all of your transcription needs or just your U.S. Government. Our software pinpoints the agencies, medical examiners, and coroners overflow, our scaleable operation is non- critical information the U.S. Government needs to across the United States to resolve missing disruptive to your current procedural and anticipate, detect, and act on cybersecurity, risk, and unidentified person cases. With funding staffing situation. The savings are significant, and compliance threats. Our intuitive platform from the National Institute of Justice, NamUs and there are no upfront costs or minimum use identifies hidden connections between people, provides forensic anthropology, forensic requirements of any kind. Hundreds of local, state objects, locations, and events – providing real- odontology, fingerprint examination, and DNA and federal agencies have proven the numerous time clarity, control, and efficiency to uncover profiling for upload to the Combined DNA Index advantages of using our service. We have an the key facts and their context. System (CODIS), all at NO COST to investigating impressive list of references for your review. #11 We are pleased to offer your agency a free trial agencies. OffenderWatch® #79 of our service so that you can experience the many benefits of outsourcing your transcription http://www.offenderwatch.com/ National White Collar Crime Center to Net Transcripts, or to compare our service OffenderWatch® is the nation’s leading (NW3C) and what the cost would have been, to that of sex offender management and community http://www.nw3c.org any vendor(s) you may currently use. notification solution. Over 3,500 Federal, For more than three decades, NW3C has #55 State, and local law enforcement agencies supported state, local, federal and tribal law utilize OffenderWatch to manage over 60% of enforcement and prosecutorial and regulatory Network Ninja the nation’s registered sex offenders. Watch agencies efforts to prevent, investigate and http://www.networkninja.com/ Systems is a proven technology partner and prosecute economic and high-tech crime. NW3C, Customizable case management software for consultative resource to law enforcement a nonprofit organization, is funded primarily by non-profits and social services agencies. From delivering solutions that ensure statutory grants through congressional appropriations Intake through Prosecution Outcome, CACs run compliance, increase agency efficiency, and from the U.S. Department of Justice, Bureau on Collaborate. Network Ninja is honored that effectiveness, and reduce IT costs while of Justice Assistance. By continually evolving Collaborate has been chosen as the solution providing the most timely and accurate safety to meet law enforcement’s needs in today’s across TX for all CACs throughout the state! information the public. digital age, NW3C delivers no-cost, cutting- #22 #1 edge classroom and online trainings in areas NITV Federal Services, LLC Office of Justice Programs of cybercrime, financial crime and intelligence NITV Federal Services is the manufacturer and http://www.ojp.gov analysis. In the past five years, more than sole source for the patented Computer Voice OJP provides innovative leadership to federal, 40,000 law enforcement professionals have 75 state, local, and tribal justice systems, by that was created in December 2013. Since licensing that is incomparably fast, easy to use, disseminating state-of-the art knowledge and then, we’ve gathered the world’s experts in and completely portable. OSForensics is used practices across America, and providing grants extraction operations and in anti-child trafficking by investigators, probation and parole officers, for the implementation of these crime fighting efforts to bring an end to child slavery. O.U.R.’s forensic examiners and cyber security specialists strategies. Because most of the responsibility Underground Jump Team consists of former CIA, around the globe. Our customer’s will tell you that for crime control and prevention falls to law Law Enforcement, Navy SEALs, and Special Ops our software saves them days, and even weeks’ enforcement officers in states, cities, and operatives that lead coordinated identification worth of time on cases when compared to other neighborhoods, the federal government can and extraction efforts. Once victims are rescued, solutions on the market. Whether you’re looking EXHIBITORS be effective in these areas only to the extent that a comprehensive process involving justice for to outfit a single investigator, your forensics it can enter into partnerships with these officers. the perpetrators and recovery and rehabilitation lab, or an entire state’s ICAC task force, we Therefore, OJP does not directly carry out law for the survivors begins. We work with local law have a licensing model to fit every budget and enforcement and justice activities. Instead, OJP enforcement and prosecutors by assisting and every need. Stop by our booth today and see works in partnership with the justice community providing them with hard assets, technology, firsthand how OSForensics can improve your to identify the most pressing crime-related financial assistance, training, and expertise in workflow, make your job easier, and save your challenges confronting the justice system and undercover operations. We work as a private/ agency thousands of dollars per year in the to provide information, training, coordination, public partnership with these Agencies to process. OSForensics… Digital investigation and innovative strategies and approaches for combat child sex trafficking within their local for a new era. addressing these challenges. jurisdiction. It is time for private citizens and #42 #57 organizations to rise up and help. It is our duty as a free and blessed people. Passware Inc. OpenText #45 http://www.passware.com http://www.guid.com Founded in 1998, Passware, Inc. is the world OpenText is the leader in Enterprise Information Oxygen Forensics leader in password recovery, decryption, Management (EIM). Our products enable http://www.oxygen-forensic.com and encrypted electronicevidence discovery businesses to grow faster, lower operational Oxygen Forensics was founded in 2000 as software. Law enforcement and government costs, and reduce information governance and a PC-to-Mobile Communication software agencies, institutions, corporations andprivate security risks by improving business insight, company. This experience has allowed our investigators, help desk personnel, and impact and process speed. Our OpenText™ team of mobile device experts to become thousands of private consumers rely on EnCase™ and Tableau Hardware products are the unmatched in understanding mobile device Passware softwareproducts to ensure data gold standard for digital forensic investigations. communication protocols. With this knowledge, availability in the event of lost or unknown Together, they provide solutions for the entire we have built innovative techniques into our passwords. Passware customersinclude many case lifecycle – from triage to reporting. Oxygen Forensic® Detective allowing our users Fortune 100 companies and various US federal to access much more critical information than and state agencies, such as the IRS, US Army,US OpenText™ EnCase™ Forensic is the industry competing forensic analysis tools. We offer Department of Defense (DOD), US Department gold standard for triaging, collecting and the most advanced forensic data examination of Justice, US Department of Homeland Security, investigating digital forensic evidence for tools for mobile devices and cloud services. USDepartment of Transportation, US Postal internal investigations and law enforcement. Our company delivers the universal forensic Service, US Secret Service, US Senate, and The EnCase evidence file format has been cited solution covering the widest range of mobile US Supreme Court. or mentioned in more than 100 court opinions devices running iOS, Android, Windows Phone, #20 and EnCase Forensic has been named the SC BlackBerry and many others. Magazine “Best Computer Forensic Solution” #24 PenLink every year since 2010 for its speed, flexibility http://www.penlink.com and functionality. Paraben Corp PenLink has been in the business of providing http://www.paraben.com communications surveillance collection systems OpenText™ provides a range of digital forensic Paraben has been a foundation in solutions for more than 30 years. Our software brings hardware devices – including Tableau Forensic for mobile devices, smartphones, email, and organized information to the forefront and Duplicators and Forensic Bridges (write- gaming system forensics. Paraben has been pulls together a more visual landscape of data, blockers) – as a powerful complement to the forging new approaches for dealing with digital giving clarity to complex data for people who OpenText EnCase™ Forensic and Endpoint evidence from logical and physical images of need impactful answers now. Whether loading Investigator software solutions. The Tableau smartphone to development into the Forensics historically collected data or live-collecting from TX1 is OpenText’s fastest and most advanced of Things (FoT). Paraben supports end-to-end virtually any communications service provider, duplicator with imaging compatibility for all solutions for digital evidence. our solutions—PLX, PenLink8, LINCOLN2 common media types. Tableau forensic hardware #9 and Xnet—enable our users to easily ingest devices have won the Forensic 4:Cast “Best and normalize native file formats or delivery PassMark Software / OSForensics Computer Forensic Hardware Tool” every year standards, regardless of the data’s magnitude. http://www.osforensics.com/ since 2009 by helping to solve the challenges During analysis, our products normalize across OSForensics, by PassMark Software, is a full- of forensic data acquisition. multiple data sets, find commonalities, and featured, easy to use, computer forensic and #23 deconflict targets and cases. PenLink is live-analysis (triage) software with an industry- headquartered in Lincoln, Nebraska, and Operation Underground Railroad leading low price tag. Oftentimes referred to as is home to most of our approximately 100 http://www.ourrescue.org/ the “Swiss-Army knife of forensics”, OSForensics employees; we also have offices in Boulder, Operation Underground Railroad is a non-profit offers users the first no non-sense, dongle-free Colorado, and Washington D.C. For more

76 information, please visit www.penlink.com. teaches survivors the keys to helping overcome Teel Technologies #64 past abuse, traumatic events and major setbacks. http://www.teeltech.com/ His story will inspire you and help you discover the Teel Technologies – Dedicated to Digital Forensics EXHIBITORS SEARCH Group, Inc. secret to overcoming your own personal darkness Since 2006 – Teel Technologies is today’s http://www.search.org so you can begin to turn YOUR Negative into a leading provider of Mobile Device and Digital SEARCH’s High-Tech Crime Training Services Positive!Dr. Williams is on the Administrative Forensic tools, training and examination services is comprised of a team of experts who provide Leadership Team at Baylor College of Medicine for local, state and federal law enforcement technical assistance and training to local, state, located in the Texas Children’s Hospital in the customers. Offering a comprehensive selection and federal justice and public safety agencies heart of the Texas Medical Center in Houston, of solutions for complete laboratory work and nationwide. Through training classes, technical Texas. Dr. Williams is a well-known accomplished field operations, as well as a broad training workshops and hands-on assistance, SEARCH public speaker/trainer. He also specializes in curriculum that includes Advanced Chip-off, trains and assists investigators in methods to leadership training, team building excellence JTAG, ISP, SQLite, Flasher Box and Bootloader, prevent, detect, and investigate instances of and time management skills. Programming for Forensics, Field Operative individuals using technology to exploit children. #91 training, and more, Teel Technologies provides Training courses are offered nationwide through examiners in the lab and field with the tools SEARCH’s outreach training program. These SMU and DCAC Research Collaborative and skills needed to successfully investigate efforts focus on systems security, computer http://www.dcac.org mobile devices and other digital media. With forensics, digital data recovery, and investigations The DCAC and Southern Methodist University offices and classrooms in Norwalk, Connecticut, involving the Internet, social networking sites, (SMU) are partners in a research collaborative that Fredericksburg, Virginia, and Canadian offices in local area networks, and online child exploitation. focuses on the long-term effectiveness of treating Victoria, British Columbia, and Toronto, Ontario, For more information, visit www.search.org/ child victims and children’s advocacy centers. Teel Technologies strives to offer the highest programs/hightech. #87 level of customer service and quality products #61 SpeakWrite to its customers. Products represented include, but not limited to: Detego, Magnet, CFID, UFED, ShadowDragon LLC http://www.speakwrite.com Oxygen, Belkasoft, Elcomsoft, Wiebetech, DVR http://www.shadowdragon.io US based transcription of audio and video Examiner, JBC Soldering, Pros-Kit, Sentry Air, ShadowDragon develops digital tools that simplify interviews, statements and voice reports. Secure Tagarno and the TeelTech line of JTAG/ISP and the complexities of modern investigations and confidential, 24/7/365 service that is on Chip-off Kits. that involve multiple online environments and demand and pay as you go. No minimum usage #37 technologies. Developed by seasoned cyber or contract requirements. investigators, these solutions strengthen the #63 Texas A&M University capabilities of in house teams by enabling College of Nursing SUMURI LLC the easy and safe collection, correlation and http://nursing.tamhsc.edu/ http://www.sumuri.com verification of diverse artifacts on the open, The Graduate Forensic Health Care Certificate SUMURI LLC was founded in 2010 by Steve closed and deep web. curriculum will prepare graduates from multiple Whalen, a retired State Trooper, and a longtime disciplines to excel in this rapidly developing active member and supporter of the law ShadowDragon solutions are used globally by field by drawing from a broad body of academic enforcement and forensic community through U.S-based and international law enforcement, knowledge in forensic health care to assist projects such as the PALADIN Forensic Suite. government, military and intelligence victims of violence and trauma. The graduate- What most do not know is that PALADIN was organizations, and Fortune 50 companies. level curricula is available to post-baccalaureate developed to assist in fight against the Sexual #67 and post-master’s professionals including, but Exploitation of Children. SUMURI is a leading not limited to, health care providers, hospital Shattered By The Darkness worldwide provider of solutions for digital and community-based social workers, protective http://www.shattered evidence and computer forensic Training, service investigators, law enforcement personnel bythedarkness.com Hardware, Software and Services. SUMURI and prosecutors. The course instruction is It has taken Dr. Gregory Williams over 30 years to is also the developer of the industry standard delivered online allowing students to balance begin unveiling the horrors of what happened to PALADIN Forensic Suite, RECON for Mac OS career, family and other responsibilities while him throughout his entire childhood. Dr. Williams X, CARBON Virtual Forensic Suite and TALINO advancing their education. A Bachelor of Science has recently written a book chronicling his Forensic Workstations. in Nursing is not required to apply. childhood and the sexual abuse that he endured #8 #36 at the hands of his father until he was almost 17 Susteen, Inc. years old. The book was released in July of 2018 Texas Legal Services Center/LASSA http://susteen.com and is entitled, “Shattered By The Darkness: http://www.tlsc.org/ Susteen pioneered mobile forensics with their Putting the Pieces Back Together After Child LASSA, Legal Aid for Survivors of Sexual Assault, Secure View product and continues to lead the Abuse.” Dr. Williams has a dynamic relatable is a legal hotline available to callers seven days way with cutting edge pincode/passcode/pattern approach when sharing his story nation-wide to a week. Trained attorneys answer the hotline breaking technology and fast acquisitions of cell teachers, physicians, counselors, social workers, allowing the survivor to speak immediately with phone forensic data. Keep an eye out for our parents and victims. He shares life changing an attorney. This makes Texas Legal Services upcoming Field Acquisition Device, as we will lessons learned from his years of abuse along Center program unique in the state of Texas. be showcasing it at our booth! with insight to survivors who are dealing with The caller may choose to be anonymous or may #86 their own inner pain and doubts. Dr. Williams choose to complete a more detailed intake if

77 more extensive services are desired. All services nationwide, in person or online. TIN endeavors Britain’s leading universities. are free of charge and available to survivors of to improve the communication between provider #30 sexual assault in the state of Texas. and client through its comprehensive language #88 and consulting services. Videntifier Technologies ehf. #94 http://flickrdemo.videntifier.com Texas Youth and Runaway Hotline Videntifier supports law enforcement to quickly http://www.dfps.state.tx.us/ United States Marshals Service analyse large amount of digital media for criminal youth_hotline http://www.usmarshals.gov/ case processing and victim identification. EXHIBITORS The Texas Youth and Runaway Hotline provides As America’s first federal law enforcement 24/7 confidential assistance through calls, agency, the United States Marshals Service Videntifier builds upon a unique and patent- text and chats to youth, parents, guardians (USMS) is considered the nation’s police force. protected database technology that allows for and caregivers in times of crisis and conflict. The USMS protects the judicial process; the extremely fast visual comparison of millions Statewide resources include emergency shelter, cornerstone of American democracy. Providing of images or videos. Several algorithms are counseling and family services. Call or text 800- federal judicial security; apprehending fugitives supported all based on visual fingerprinting, 989-6884. Chat @ texasyouth.org and non-compliant sex offenders; securing and either on the content or the camera. #97 transporting federal prisoners from arrest to incarceration; executing federal court orders; flickrdemo.videntifier.comvui.videntifier. The Securus Foundation seizing and managing assets acquired comdemo.videntifier.com http://www.thesecurusfoundation.org. through illegal means; and assuring the www.videntifier.comwww.videntifier-security. The Securus Foundation is a non-profit safety of endangered government witnesses com organization, formed exclusively for charitable and their families is our mission. The USMS #68 and educational purposes within the meaning uses this influence and reach gained through of Section 501(c)(3) of the Internal Revenue its accomplished history and broad authority Voice Products Inc. Code including, but not limited to, advancing to collaborate with other federal, state, local, http://www.voiceproducts.com education, relief of the poor, distressed, and and international law enforcement agencies, as Voice Products Inc. has been in business for underprivileged, and lessening the burdens of well as with concerned citizens and members over 26 years with sales and service throughout government. of the judiciary, to form a united front against the Mid-West. We offer the latest technologies #21 crime. in child advocacy interview recording, body #6 worn cameras and all areas of NextGen 911 Tizlo Health recording, all backed with 24/7 live support. http://www.tizlo.com V2 Interview Room Recording Voice products Inc. understands the importance At Tizlo, our goal is to bring the highest quality http://www.v2advocate.com/ of time critical recording. everyday use products into your lifestyle. The V2 Digital Interview Room Recording #4 Our promise is to provide you with the best Management System was designed specifically experience a consumer should have. With our for the needs of Children’s Advocacy Centers. Waldorf University industry-leading warranty program, Tizlo will It is a complete system with an easy to use http://www.waldorf.edu/ fully back its product and we’ll always be by interface and one button start/stop recording. Waldorf University is a regionally accredited your side. We will continue to grow and better System options include a complete turnkey university offering both online and on campus ourselves as we become a part of your life and solution for multiple interview rooms and a options. We offer Associates through Master’s your home. software solution designed around your existing degrees in over 20 different disciplines. For #95 hardware. the online programs, we offer free evaluations, #44 free transcript service, free books, and one Translation & Interpretation Network time $35 fee. http://www.tintranslation.com VAST Screening Technologies #93 Translation & Interpretation Network (“TIN”) was http://www.vastscreening.com started in 1999 in response to the language VAST – Validated Automated Screening Wicklander-Zulawski needs of Dallas-Fort Worth’s growing multi- Technology – A New Era in Integrity Screening. & Associates, Inc. cultural community. TIN offers a wide variety of The VAST system provides a unique, innovative http://www.w-z.com/ interpretation, translation, training and consulting and unbiased method of screening large Wicklander-Zulawski & Associates, Inc. services, weaving together human touch and numbers of people rapidly, by accurately (WZ) provides standard and customized technology to ensure the best results. Our highlighting those individuals who demonstrate training in multiple techniques of interview services are tailored to meet the specific needs signs of deception. and interrogation including the WZ Non- of many industries, including education, medical, Confrontational Method, the Selective Interview business, social service and legal. TIN offers VAST is the ultimate screening solution which Technique, the Participatory Approach, Fact- face-to-face, phone, on-demand 24/7 OPI and can be used in all market environments such Finding Interviews, and Cognitive Interviewing. VRI interpreting services, as well as conference as pre-employment, border control, fraud, WZ’s non-confrontational method is proven to interpreting. Translation services are available in terrorism and the detection of criminality. be more effective in reducing denials, eliciting all languages. TIN has a wide array of consulting reliable information and developing the truth services and strategies. TIN’s professional VAST works in any language and is extremely than alternative interviewing techniques. development trainings are for new, experienced, cost efficient, taking only 20 minutes to Investigators are taught to use the most and dual-role interpreters. They are provided complete. It has been validated by one of appropriate method for each case and subject,

78 to employ WZ’s dynamic communications skills to obtain the truth accurately, to substantiate admissions and close more successful investigations. #2 ZetX http://zetx.com/ From the minute a target number is identified, to the moment it is presented to a jury, ZetX covers every aspect. Free Phone Look Up, search warrants, mapping and analysis, court presentations, tower dumps, training and more; ZetX sets itself apart with TRAX™, the most accurate investigative database, which adds up to time saved and cases solved quickly.TRAX recognizes call detail records from any provider, and automatically maps call information in a unique visual display. TRAX is a completely web-based solution, so no software installation is required and it is accessible from any mobile or desktop device. ZetX Phone Lookup and de-confliction has the ability to immediately link crimes committed across the country. After entering a phone number, ZetX Phone Lookup will display the current provider, carrier legal compliance phone number, and any available subscriber information. At the permission of investigating parties, ZetX will notify each detective of like number inquiries. ZetX is committed to providing the most coveted cellular technology training available. ZetX provides a series of basic to advanced level courses, including a Certification Course and Custom Courses. #27

79 SAVE THE DATE AUGUST 12–15, 2019

31st Annual

SM

80