Speaker Biographies - National Criminal Justice Training Center

Transcription

Speaker Biographies - National Criminal Justice Training Center
2010 Internet Crimes Against Children
National Conference
Hyatt Regency
May 11 - 14, 2010
Jacksonville, FL
P
g our Ch
n
i
T
ild
EC
T
re
O
n
R
Making the Internet a Safer Place
New workshops on the latest investigative techniques
Network and learn from experts in their field
SEARCH
Table of Contents
Welcome
1
General Information
7
Conference Information
9
Plenary Session
15
Daily Activities – Lab & Lecture Schedules
23
Computer Lab Descriptions
33
Lecture Session Descriptions
41
Speaker Biographies
57
Exhibitors
79
Acknowledgements
83
PROTECTING OUR CHILDREN
N
1
2
2010 ICAC NATIONAL CONFERENCE
Welcome
The ICAC Program started in 1998 with only 10 Task Forces. Today there are 61 Task
Forces, representing more than 3,000 Federal, State, Local and Tribal law enforcement
and prosecutorial agencies.
Dear Conference Participant:
We are pleased to have you join us for the 2010 Internet Crimes Against Children (ICAC) National
Conference. This year, you are joining several hundred law enforcement investigators and
prosecutors to receive the most up-to-date training related to combating Internet crimes against
children. This year’s theme is PROTECTing our Children; Making the Internet a Safer Place.
We are excited to offer over 100 different workshop topics and over 400 hours of law enforcement
training that is a direct match to the needs of our ICAC Task Force members, their affiliates,
Federal partners and child protection professionals. We have over 100 talented speakers who
bring with them specialized experience in protecting children from online exploitation. I commend
the work that they are doing and thank them for sharing both their experience and knowledge as
we all work together to stop the exploitation of children.
The 2010 ICAC National Conference brings together local, state and federal law enforcement
investigators and prosecutors from throughout the United States, as well as internationally. The
conference provides an opportunity for networking both within and outside the planned agenda
and for establishing the relationships necessary for a successful impact at the national level.
I take this opportunity to thank the ICAC Task Force Commanders, affiliate agencies, and all our
ICAC program and federal training partners who have worked to make this conference a success.
I extend a special thanks to Fox Valley Technical College for their hard work to make this the
most successful ICAC National Conference to date.
The group gathered here for the 2010 ICAC National Conference shares a common commitment
and a goal to keep our children safe from sexual predators. In strengthening our partnerships,
sharing successful strategies and techniques, and discussing the valuable lessons learned in the
field, our success in combating Internet crimes will continue to grow.
Sincerely,
Jeff Slowikowski
Acting Administrator
Office of Juvenile Justice and Delinquency Prevention
PROTECTING OUR CHILDREN
1
ICAC Task Force Program Information
OJJDP’s Internet Crimes Against Children
Task Force Agencies
The Internet Crimes Against Children Task Force Program (ICAC program) helps state and local law enforcement
agencies develop an effective response to cyber enticement and child pornography cases. This help encompasses forensic
and investigative components, training and technical assistance, victim services, and community education.
The program was developed in response to the increasing number of children and teenagers using the Internet, the
proliferation of child pornography, and heightened online activity by predators seeking unsupervised contact with
potential underage victims. The FY 1998 Justice Appropriations Act (Pub, L. No. 105–119) directed OJJDP to create
a national network of state and local law enforcement cyber units to investigate cases of child sexual exploitation.
The ICAC program is a national network of 61 coordinated task forces representing over 3,000 federal, state, and
local law enforcement and prosecutorial agencies. These agencies are engaged in proactive investigations, forensic
investigations, and criminal prosecutions. By helping state and local agencies to develop effective, sustainable responses
to online child victimization and child pornography, OJJDP has increased their capacity to address Internet crimes
against children.
2
2010 ICAC NATIONAL CONFERENCE
ICAC Task Force Agency Contacts
Alabama
California, San Diego
Florida, Polk County Sheriff’s Office
Alabama Bureau of Investigation
Jurisdiction: Alabama
Contact: Sergeant Ricky Agerton
Phone: (334) 353-1625
E-mail: [email protected]
San Diego Police Department
Jurisdiction: San Diego, CA area
Contact: Sgt. Chuck Arnold
Phone: (858) 715-7120
E-mail: [email protected]
Polk County Sheriff’s Office
Jurisdiction: Central Florida
Contact: Lt. Gary James
Phone: (863) 297-3101
E-mail: [email protected]
Alaska
California, San Jose
Georgia
Anchorage Police Department
Jurisdiction: Alaska
Contact: Detective Sgt. Michael Couturier
Phone: (907) 786-2679
E-mail: [email protected]
San Jose Police Department
Jurisdiction: San Jose, CA area
Contact: Sgt. Randy Schriefer
Phone: (408) 277-4102
E-mail: [email protected]
Georgia Bureau of Investigation
Jurisdiction: Georgia
Contact: Sp. Agt in Charge John Whitaker
Phone: (404) 270-8870
E-mail: [email protected]
Arizona
Colorado
Hawaii
Phoenix Police Department
Jurisdiction: Arizona
Contact: Det. Sgt. Frank Kardasz
Phone: (602) 650-3170
E-mail: [email protected]
Colorado Springs Police Department
Jurisdiction: Colorado
Contact: Sgt. Bill Dehart
Phone: (719) 444-7808
E-mail: [email protected]
Hawaii Department of Attorney General
Jurisdiction: Hawaii
Contact: Kristin Izumi-Nitao
Phone: (808) 587-4114
E-mail: [email protected]
Arkansas
Connecticut
Idaho
Arkansas State Police
Jurisdiction: Arkansas
Contact: Captain John Morrow
Phone: (501) 618-8373
E-mail: [email protected]
Connecticut State Police
Jurisdiction: Connecticut
Contact: Sgt. Jim Smith
Phone: (203) 639-6407
E-mail: [email protected]
Idaho Office of Attorney General
Jurisdiction: Idaho
Contact: ICAC Investigator Jim Kouril
Phone: (208) 334-4125
E-mail: [email protected]
California, Los Angeles
Delaware
Illinois
Los Angeles Police Department
Jurisdiction: Los Angeles, CA area
Contact: Lt. Andrea Grossman
Phone: (562) 624-4028
E-mail: [email protected]
Delaware Department of Justice
Jurisdiction: Delaware
Contact: Lt. Bob Moses
Phone: (302) 739-2467
E-mail: [email protected]
Illinois Attorney General’s Office
Jurisdiction: Illinois
Contact: Deputy Chief Mike Sullivan
Phone: (312) 814-3505
E-mail: [email protected]
California, Fresno County
Florida, Broward County
Illinois - Cook County
Fresno County Sheriff’s Office
Jurisdiction: Fresno County California
Contact: Lt. Victor Wisemer
Phone: (559) 488-3904
E-mail: [email protected]
Broward County Sheriff’s Office
Jurisdiction: Southern Florida
Contact: Lt. Robert Cates
Phone: (954) 888-5256
E-mail: [email protected]
Cook County State’s Attorney’s Office
Jurisdiction: Illinois, Cook County Area
Contact: Deputy Chief Kathleen Muldoon
Phone: (773) 869-5887
E-mail: [email protected]
California, Sacramento County
Florida, Gainesville
Indiana
Gainesville Police Department
Jurisdiction: Northern Florida
Contact: Det. John Madsen
Phone: (352) 334-2561
E-mail: [email protected]
Indiana State Police
Jurisdiction: Indiana
Contact: Lt. Charles L. Cohen
Phone: (317) 232-8309
E-mail: : [email protected]
Sacramento County Sheriff’s Office
Jurisdiction: Sacramento County California
Contact: Lt. Harvey Woo
Phone: (916) 874-3030
E-mail: [email protected]
PROTECTING OUR CHILDREN
3
ICAC Task Force Agency Contacts
Iowa
Michigan
New Hampshire
Iowa Division of Criminal Investigation
Jurisdiction: Iowa
Contact: Special Agent in Charge Gerard
Meyers
Phone: (515) 965-7402
E-mail: [email protected]
Michigan State Police
Jurisdiction: Michigan
Contact: D/Sgt. Jay Poupard
Phone: (517) 336-2012
E-mail: [email protected]
Portsmouth Police Department
Jurisdiction: New Hampshire
Contact: Captain Corey MacDonald
Phone: (603) 610-7548
E-mail:[email protected]
Minnesota
New Jersey
St. Paul Police Department
Jurisdiction: Minnesota
Contact: Commander Neil Nelson
Phone: (651) 793-1045
E-mail: [email protected]
New Jersey State Police
Jurisdiction: New Jersey
Contact: Det. Sgt. 1st Class Gordon Samartino
Phone: (609) 584-5051 x 5632
E-mail: [email protected]
Mississippi
New Mexico
Mississippi Office of Attorney General
Jurisdiction: Mississippi
Contact: Assistant AG Jean Vaughn
Phone: (601) 359-3817
E-mail: [email protected]
New Mexico Attorney General’s Office
Jurisdiction: New Mexico
Contact: Special Agent in Charge Jolene Altwies
Phone: (505) 222-9023
E-mail: [email protected]
Missouri
New York
Glendale Police Department
Jurisdiction: Missouri
Contact: Lt. Joe Laramie
Phone: (314) 889-4282
E-mail: [email protected]
New York State Police
Jurisdiction: New York
Contact: Captain Frank Pace
Phone: (518) 485-2953
E-mail: [email protected]
Montana
New York City Police Department
Jurisdiction: New York, New York City Area
Contact: Lieutenant Dennis Lane
Phone: (646) 610-4740
E-mail: [email protected]
Kansas
Sedgwick County Sheriff’s Office
Jurisdiction: Kansas
Contact: Lt. Jeff Weible
Phone: (316) 337-6552
E-mail: [email protected]
Kentucky
Kentucky State Police
Jurisdiction: Kentucky
Contact: Captain Howard Logue
Phone: (502) 226-2160
E-mail: [email protected]
Louisiana
Louisiana Department of Justice
Jurisdiction: Louisiana
Contact: Deputy Director Mike Johnson
Phone: (225) 326-6138
E-mail: [email protected]
Maine
Maine State Police
Jurisdiction: Maine
Contact: Sgt. Glenn Lang
Phone: (207) 877-8081
E-mail: [email protected]
Billings Police Department
Jurisdiction: Montana
Contact: Project Coordinator Tim West
Phone: (406) 896-3295
E-mail: [email protected]
North Carolina
Nebraska
Maryland
Maryland State Police
Jurisdiction: Maryland
Contact: Lt. John Wilhelm
Phone: (410) 953-8260
E-mail: [email protected]
Nebraska State Patrol
Jurisdiction: Nebraska
Contact: Lt. John Shelton
Phone: (402) 471-8493
E-mail: [email protected]
North Dakota
Nevada
Massachusetts
Massachusetts State Police
Jurisdiction: Massachusetts
Contact: Sgt. Steve Del Negro
Phone: (413) 499-1112 x307
E-mail: [email protected]
4
NC State Bureau of Investigation
Jurisdiction: North Carolina
Contact: Special Agent in Charge Kelly Moser
Phone: (919) 716-0487
E-mail: [email protected]
Las Vegas Metropolitan Police Dept.
Jurisdiction: Nevada
Contact: Lt. Raymond Steiber
Phone: (702) 828-4598
E-mail: [email protected]
ND Bureau of Criminal Investigation
Jurisdiction: North Dakota
Contact: Special Agent Tim Erickson
Phone: (701) 328-5500
E-mail: [email protected]
2010 ICAC NATIONAL CONFERENCE
ICAC Task Force Agency Contacts
Ohio
Tennessee
Virginia
Cuyahoga County Prosecutor’s Office
Jurisdiction: Ohio
Contact: APA Frankie Goldberg
Phone: (216) 443-7847
E-mail: [email protected]
Knoxville Police Department
Jurisdiction: Tennessee
Contact: Captain Monty Houk
Phone: (865) 215-7020
E-mail: [email protected]
Virginia State Police
Jurisdiction: VA, Northern & Washington, DC
Contact: Captain Kirk Marlowe
Phone: (804) 674-2696
E-mail: [email protected]
Oklahoma
Texas, Dallas
Washington
Oklahoma State Bureau of Investigation
Jurisdiction: Oklahoma
Contact: Sp. Agt in Charge Steve Tanner
Phone: (405) 879-2613
E-mail: [email protected]
Dallas Police Department
Jurisdiction: Texas, Northern
Contact: Lt. Chesley Williams
Phone: (214) 671-4201
E-mail: [email protected]
Seattle Police Department
Jurisdiction: Washington
Contact: Captain Greg Ayco
Phone: (206) 684-4351
E-mail: [email protected]
Oregon
Texas, Southern
Oregon Department of Justice
Jurisdiction: Oregon
Contact: Assistant SAIC Ken Rueben
Phone: (503) 378-6347
E-mail: [email protected]
Office of the Attorney General of Texas
Jurisdiction: Texas, Southern
Contact: Chief of Criminal Investigations
Division David Boatright
Phone: (512) 463-3265
E-mail: [email protected]
West Virginia
Pennsylvania
Delaware County District Attorney’s Office
Jurisdiction: Pennsylvania
Contact: Lt. Dave Peifer
Phone: (610) 891-4709
E-mail: : [email protected]
Pasadena Independent School District
Jurisdiction: Texas, Houston Metro Area
Contact: Lieutenant Matt Gray
Phone: (713) 740-0045
E-mail: [email protected]
Rhode Island
Utah
Rhode Island State Police
Jurisdiction: Rhode Island
Contact: Lt. Nicholas Tella
Phone: (401) 275-5171
E-mail: [email protected]
South Carolina
South Carolina Attorney General’s Office
Jurisdiction: South Carolina
Contact: AAG Deborah Shupe
Phone: (803) 734-3797
E-mail: [email protected]
South Dakota
South Dakota Department of Justice
Jurisdiction: South Dakota
Contact: SSA Craig Price
Phone: (605) 773-3331
E-mail: [email protected]
PROTECTING OUR CHILDREN
Utah Office of Attorney General
Jurisdiction: Utah
Contact: Section Chief
Jessica Farnsworth
Phone: (801) 580-4165
E-mail: [email protected]
Vermont
West Virginia State Police
Jurisdiction: West Virginia
Contact: Sergeant Christopher Casto
Phone: (304) 293-6401
E-mail: [email protected]
Wisconsin
Wisconsin Department of Justice
Jurisdiction: Wisconsin
Contact: Director, DCI Investigative
Services David Matthews
Phone: (608) 266-1671
E-mail: [email protected]
Wyoming
Wyoming Div.of Criminal Investigation
Jurisdiction: Wyoming
Contact: Special Agent Scotty Hughes
Phone: (307) 777-5437
E-mail: [email protected]
Burlington Police Department
Jurisdiction: Vermont
Contact: Lt. Kris Carlson
Phone: (802) 540-2202
E-mail: [email protected]
Virginia
Bedford County Sheriff’s Office
Jurisdiction: Southern Virginia
Contact: Lt. Michael Harmony
Phone: (540) 586-4800
E-mail: [email protected]
5
6
2010 ICAC NATIONAL CONFERENCE
General
Information
From 2005 to 2009, the ICAC Task Forces have increased their yearly arrest
totals by 133%.
General Information
Thank you for joining us at the 2010 Internet Crimes Against Children National Conference in beautiful
Jacksonville, Florida. This year’s conference is the largest event providing training related to Internet crimes against
children to law enforcement in the nation.
Throughout the conference, we will continue to emphasize the importance of cooperation and collaboration
between federal, state and local investigators and prosecutors. Conference training will focus on the investigation
of Internet crimes against children and techniques that will help lead to the successful prosecution of these horrific
crimes.
SPECIAL EVENT
The Jacksonville Landing, located right on the banks of the St.
Johns River, welcomes attendees to the 2010 Internet Crimes
Against Children National Conference to enjoy all that the
Landing has to offer. On Wednesday night, they will feature a
live band from 7-11 pm, which will also be open to the public.
There is a great selection of restaurants and bars at the Landing.
Attendees can relax, have dinner and enjoy drinks while listening
to the music, socializing and networking! Be sure to bring your
conference ID badge. Come join in the fun at the Jacksonville
Landing!
ENJOY JACKSONVILLE
Make the most of your stay in Jacksonille,
Florida. This wonderful city has much to offer!
Visit the Jacksonville information booth on the
2nd floor of the Hyatt Regency Jacksonville
for information on social activities as well
as local attractions. You can also log on to
www.visitjacksonville.com for more ways to
make the most of your visit to Jacksonville,
Florida.
PROTECTING OUR CHILDREN
7
Local Restaurants
Restaurants within walking distance of the Hyatt Regency Jacksonville Riverfront
Restaurant Name
Northstar Substation
Bravo’s Ristorante
Einstein Bros Bagels
Ed’s Spanish American
Bay Street Cafe
Qui Sushi Rock Inn
Rig Wraps
Atrium Cafe & Grill
Jax City Cafe
Casa Dora Italian Cafe
Turtle D’s
Farah Food Mart And Deli
London Bridge Pub
Wally Dogz
Ruth’s Chris Steak House
Yogurt Creams & Things
Benny’s Steak and Seafood
Cinco De Mayo
Koja Sushi
Sakura Japan
Mill Brewery & Eatery, The
American Cafe
Twisted Martini
Calvin’s Cajun Express
Great Wraps
Flamers Charbroiled Hamburgers
Vito’s Italian Cafe
Sbarro
Hooters Jax Landing
Orange Tree Hot Dogs
Dona Maria’s Mexican
Apple A Day Deli
Southend Brewery & Smokehouse
Bourbon Bayou
Village Bread Cafe
Burrito Gallery
DBS Vending Stands
Mongos Flat Hot Grill
Chew Restaurants
8
Address
119 East Bay Street
225 East Coastline Drive
225 East Coastline Drive
233 East Bay Street
233 East Bay Street
1950 San Marco Boulevard
1 Independent Drive
1 Independent Drive
100 East Forsyth Street
108 East Forsyth Street
220 East Bay Street
345 East Bay Street
3526 San Jose Blvd
1 Sister Cities Plaza
1201 Riverplace Boulevard
1301 Riverplace Boulevard
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
2 Independent Drive
21 East Adams Street
501 East Bay Street
Ste 200, 2 Independent Drive
117 West Adams Street
Phone No.
(904) 860-5451
(904) 633-9095
(904) 634-4579
(904) 353-5891
(904) 634-0328
(904) 399-3305
(904) 247-7764
(904) 634-1811
(904) 633-9028
(904) 356-8282
(904) 353-4542
(904) 598-5231
(904) 359-0001
(904) 309-2028
(904) 396-6200
(904) 398-2712
(904) 301-1014
(904) 329-2892
904) 350-9911
(904) 353-1351
(904) 353-3538
(904) 353-4503
(904) 353-8464
(904) 354-0010
(904) 354-7876
(904) 354-7951
(904) 355-3002
(904) 355-6999
(904) 356-5400
(904) 598-0006
(904) 598-2696
(904) 647-7712
(904) 665-0000
(904) 674-6714
(904) 683-7244
(904) 598-2922
(904) 356-7142
(904) 665-0123
(904) 355-3793
Distance
0.1
0.1N
0.1N
0.1N
0.1N
0.1S
0.2NW
0.2NW
0.2N
0.2
0.2SE
0.2NE
0.2N
0.3W
0.3SW
0.3S
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3W
0.3N
0.3E
0.3W
0.4NW
2010 ICAC NATIONAL CONFERENCE
Conference
Information
In 2009, the ICAC Task Forces conducted more than 12,000 investigations
leading to the arrest of more than 3,700 individuals.
Conference Information
General Information
Check-in and Onsite Registration Hours:
As a courtesy to other attendees, please turn off (or put
on vibrate) all cellular phone and BlackBerry devices
during all sessions. Please arrive on time for all sessions.
Monday, May 10:
Tuesday, May 11:
Wednesday, May 12:
Thursday, May 13:
Friday, May 14:
For the Plenary Session, please move to the front of the
room. Please fill the seats in the front to make room
for late arrivals. All lecture sessions are filled on a first
come, first served basis. If the workshop is filled to
capacity, please check to see if it is offered at a later
time or attend your second choice workshop.
Conference Check-in and Onsite Registration
Hours/Location
Eligibility and Check-in:
This conference is limited to agencies who handle
Internet Crimes Against Children related cases and
other invited guests. All registrants of the 2010 ICAC
National Conference must check-in at the conference
registration desk located on the second floor of the
Hyatt Regency Jacksonville to pick up a name badge
and other conference materials.
Onsite Registration:
Eligible participants will be able to register onsite. Lab
session attendance will be allowed based on availability.
Lab seats not reserved during pre-registration will be
filled on a first come, first served basis on the day and
at the time the session is scheduled. Information on
available lab sessions will be provided at the ICAC
Training & Technical Assistance Exhibit Booth in the
Exhibition Hall.
Eligible participants who register onsite will also be
allowed to attend any lecture session. While participants
will be allowed into sessions, there is no guarantee that
onsite registrants will be provided conference materials
as materials are available on a limited basis.
PROTECTING OUR CHILDREN
3:00 pm – 7:00 pm
7:00 am – 4:30 pm
7:30 am – 4:30 pm
7:30 am – 4:30 pm
7:30 am – 10:00 am
Your name badge is your admission to all sessions
and must be worn at all times. If you misplace your
badge, you will be required to show a photo ID at the
conference registration desk to obtain a new badge.
Please carry your photo ID with you at all times.
Exhibitor Hours/Location:
The Exhibit Hall is located on the second floor of the
Hyatt Regency Jacksonville.
Exhibitor Hours:
Monday, May 10:
(Set up Only)
Tuesday, May 11:
Wednesday, May 12:
Thursday, May 13:
Friday, May 14:
2:00 pm – 6:30 pm
7:00 am – 5:00 pm
7:00 am – 5:00 pm
7:00 am – 5:00 pm
7:00 am –11:30 am
Speaker Information:
All 2010 ICAC National Conference speakers should
check in at the speaker registration desk on the second
floor during conference registration hours to pick up
their name badge and conference materials.
Monday, May 10:
Tuesday, May 11:
Wednesday, May 12:
Thursday, May 13:
Friday, May 14:
3:00 pm – 7:00 pm
7:00 am – 4:30 pm
7:30 am – 4:30 pm
7:30 am – 4:30 pm
7:30 am – 10:00 am
9
Conference Information (Continued)
Speaker Information (continued):
Business Services:
There will be a Speaker Ready Room located on
the second floor Sky Bridge for the duration of the
conference. This room is meant to be a quiet place
to organize your materials prior to your presentation.
Staff will be available to respond to questions.
The Hyatt Jacksonville offers a business center
conveniently located on the third floor.
Conference Site Hotel Information:
The business center offers a wide variety of services:
• Color printing
• Photocopy service
• Laser printing
• Facsimile service
• Image scanning
• PC workstations with access to the Internet
• Easy laptop interface
• General office supplies sold
• Charges conveniently billed to your room
or credit card
Hyatt Regency Jacksonville Riverfront
225 Coastline Drive East
Jacksonville, FL 32202
Ph: 904-588-1234
Fax: 904-634-4554
Parking:
Valet parking is available at the Hyatt Regency
Jacksonville Riverfront. Self-parking will be available
for the group at $8.00 per vehicle per day.
Daily hours: 7:30 a.m. - 4:00 p.m.
Fully automated, 24-hours a day.
Overflow Hotel Information:
Crowne Plaza Jacksonville Riverfront
1201 Riverplace Boulevard
Jacksonville, FL 32207
Phone: 904-398-8800
Fax: 904-398-9170
Wyndham Jacksonville Riverwalk Hotel
1515 Prudential Drive
Jacksonville, FL 32207
Ph: 904-396-5100
10
2010 ICAC NATIONAL CONFERENCE
Conference Information (Continued)
Conference Breaks:
Press
Beverages and light refreshments will be provided
during the morning and afternoon breaks in the
Exhibition Hall on the second floor of the Hyatt
Regency Jacksonville:
All members of the Press should check in at the Press
Registration booth on the second floor of the Hyatt
Regency Jacksonville prior to attending the Plenary
Session Opening Ceremony in the Grand Ballroom.
All members of the press are required to wear a Press ID
badge at all times. The Press may attend the Opening
Ceremony. The Plenary Speaker presentation is closed
to the press.
Tuesday, May 11
Continental Breakfast: 7:45 am – 8:30 am
Lunch (on own): 11:30 am – 1:00 pm
Afternoon: 2:30 pm – 3:00 pm
Wednesday, May 12
Continental Breakfast: 7:15 am – 8:00 am
Morning Beverage Break: 9:30 am – 10:00 am
Lunch (on own): 11:30 am – 1:00 pm
Afternoon Break: 2:30 pm – 3:00 pm
Thursday, May 13
Continental Breakfast: 7:15 am – 8:00 am
Morning Beverage Break: 9:30 am – 10:00 am
Lunch (on own): 11:30 am – 1:00 pm
Afternoon Break: 2:30 pm – 3:00 pm
Friday, May 14
Continental Breakfast: 7:15 am – 8:00 am
Morning beverage break: 9:30 am - 10:00 am
Visit the Internet Café
Ethernet connections will be provided for you to check your email on your laptop in our
Internet Café. The Café is located in the Exhibition Hall on the second floor of the Hyatt
Regency Jacksonville.
PROTECTING OUR CHILDREN
11
Conference Information - Floor Plan
12
2010 ICAC NATIONAL CONFERENCE
National Conference Attendance
The ICAC Task Force Program was launched in 1998 with the establishment of 10
federally funded sites. The ICAC Training & Technical Assistance Program received
funding in 2003 and was tasked with conducting the first ICAC National Conference
later that year.
Since that time, the 10 Task Forces have grown to 61 with nearly 3,000 affiliated law
enforcement agencies. The National Conference has grown from a handful of workshops
and less than 200 participants in 2003 to over 175 workshops and an estimated 1450
participatants in 2010.
This year’s conference builds upon the vital information and training programs available to
the Task Force through funding from OJJDP. The unparalleled caliber of instructors and
workshop topics makes it one of the largest and most sought after conferences anywhere.
We hope to see all of you again next year.
Notes: In 2010, we are expecting 1,450 attendees. No national conference was conducted in 2009;
funding was instead allocated to assist with coordinating the 2009 Silicon Valley ICAC Conference.
PROTECTING OUR CHILDREN
13
14
2010 ICAC NATIONAL CONFERENCE
Plenary
Session
Since 1998, the ICAC Task Forces have reviewed over 180,000 complaints of
alleged child sexual victimization.
Plenary Session
2010 Internet Crimes Against Children National Conference
Plenary Session
Tuesday, May 11, 2010
8:30 – 11:30 a.m.
Grand Ballroom
Opening Ceremony
Welcome and Opening Remarks
Mary Lou Leary
Principle Deputy Assistant Attorney General
Office of Justice Programs
Presentation of Colors
Jacksonville County Sheriff’s Office Honor Guard
National Anthem
Miss Emma Levy
Boys & Girls Clubs of Northeast Florida
Remarks by
Mary Lou Leary
Principle Deputy Assistant Attorney General
Office of Justice Programs
Frank Mackesy, Undersheriff
Jacksonville Sheriff’s Office
Representative Debbie Wasserman-Schultz
20th Congressional District of Florida (Invited)
Gary Grindler, Acting Deputy Attorney General
United States Department of Justice
Attorney General Eric Holder
Video Message
Break
Prologue
“Supporting Officer Wellness”
Plenary Speaker
“Psychological and Behavioral Characteristics
of Internet Sex Offenders”
Dr. Michael Bourke, Chief Psychologist
United States Marshals Service
PROTECTING OUR CHILDREN
15
Opening Ceremony Biographies
ERIC H. HOLDER, JR.
82ND ATTORNEY GENERAL OF THE UNITED STATES
Eric H. Holder, Jr. was sworn in as the 82nd Attorney General of the United States on February 3, 2009 by Vice
President Joe Biden. President Barack Obama announced his intention to nominate Mr. Holder on December 1,
2008.
In 1997, Mr. Holder was named by President Clinton to be the Deputy Attorney General, the first African-American
named to that post. Prior to that he served as U.S. Attorney for the District of Columbia. In 1988, Mr. Holder was
nominated by President Reagan to become an Associate Judge of the Superior Court of the District of Columbia.
Mr. Holder, a native of New York City, attended public schools there, graduating from Stuyvesant High School where
he earned a Regents Scholarship. He attended Columbia College, majored in American History, and graduated in
1973. He graduated from Columbia Law School in 1976.
While in law school, he clerked at the N.A.A.C.P. Legal Defense Fund and the Department of Justice’s Criminal
Division. Upon graduating, he moved to Washington and joined the Department of Justice as part of the Attorney
General’s Honors Program. He was assigned to the newly formed Public Integrity Section in 1976 and was tasked to
investigate and prosecute official corruption on the local, state and federal levels.
Prior to becoming Attorney General, Mr. Holder was a litigation partner at Covington & Burling LLP in Washington.
Mr. Holder lives in Washington with his wife, Dr. Sharon Malone, a physician, and their three children.
16
2010 ICAC NATIONAL CONFERENCE
Opening Ceremony Biographies
REPRESENTATIVE DEBBIE WASSERMAN-SCHULTZ
20th CONGRESSIONAL DISTRICT OF FLORIDA
For more than seventeen years, Debbie Wasserman Schultz has dedicated her public life to working on behalf of
the people of South Florida. On January 4, 2005, she was sworn in as a member of the United States House of
Representatives
Rep. Wasserman Schultz represents Florida’s 20th Congressional district, which encompasses parts of Florida as
far north as Fort Lauderdale, and as far south as Miami Beach. Before joining the U.S. Congress, she was first a
Representative and later a Senator in the Florida State legislature.
Rep. Wasserman Schultz serves on the House Committee on Appropriations, which, in conjunction with its
Senate counterpart, makes funding decisions on every discretionary program in the federal budget. She serves as a
“Cardinal,” chairing the Legislative Branch subcommittee. She also serves on the House Judiciary Committee, which
handles issue ranging from terrorism to protection of civil liberties.
As a Chief Deputy Whip, Rep. Wasserman Schultz works to help advance important legislation. This role places her
on the leadership team of the House of Representatives. In her first term, Rep. Wasserman Schultz served as a Senior
Whip, the only freshman chosen to serve on the Whip team.
Rep. Wasserman Schultz is a person respected by her colleagues for her tenacity and her hard work on many issues.
Her first term was marked with remarkable success for a freshman member then serving in the minority. She was
one of the key leaders in the Terri Schiavo debate, and the Senate Judiciary Committee asked her to testify at the
confirmation hearing of Supreme Court Justice Samuel Alito on the topic.
Rep. Wasserman Schultz discussed the benefits of the American Recovery and Reinvestment Act with her
constituents at a town hall meeting in Weston, April 2009.
A fighter for South Florida families, Rep. Wasserman Schultz has worked hard to protect children. Some of her
accomplishments in the field include the passage of the PROTECT Our Children Act, which creates the largest law
PROTECTING OUR CHILDREN
17
Opening Ceremony Biographies
enforcement effort ever formed for the protection of children (H.R. 3845), and, the passage the Virginia Graeme
Baker Pool and Spa Safety Act (H.R. 1721) to combat childhood drowning.
Rep. Wasserman Schultz, the first Jewish Congresswoman ever elected from Florida, introduced a resolution, which
passed the House of Representatives and called on the President to declare a Jewish American Heritage Month. The
President subsequently did so, with the inaugural month in May, 2006.
Rep. Wasserman Schultz was asked by the Senate Judiciary Committee to testify during the nomination hearings for
Judge Alito in January 2006.
In March 2009, after she announced her own battle with breast cancer, Rep. Wasserman Schultz introduced the
Education and Awareness Requires Learning Young Act, or EARLY Act (H.R. 1740), a piece of legislation that
directs the Centers for Disease Control and Prevention to develop and implement a national education campaign
about the threat breast cancer poses to all young women, and the particular heightened risks of certain ethnic,
cultural and racial groups.
Rep. Wasserman Schultz was born in Long Island, NY and received her Bachelor’s and Master’s degrees from
University of Florida. She and her husband Steve live in Weston, Florida with their three children.
All of this experience serves to enhance her commitment to lower health care costs, improve the quality of education,
protect Social Security and Medicare, and provide a sensible homeland security plan to protect our citizens from the
ongoing threat of terror. She continues to fight to ensure that our first responders, our local police and firefighters,
have the tools they need to do their jobs. And she continues to take up the fight to give our troops the equipment
and compensation they deserve.
Debbie Wasserman Schultz was born in 1966 on Long Island, NY. She attended the University of Florida and
graduated with a Bachelor’s Degree in Political Science in 1988 and with a Master’s Degree in 1990. She has been
married to Steve Schultz for 17 years and together they have three children. The Congresswoman is proud to call
South Florida home where she resides with her family in Weston.
18
2010 ICAC NATIONAL CONFERENCE
Opening Ceremony Biographies
GARY GRINDLER
ACTING DEPUTY ATTORNEY GENERAL
Gary Grindler serves as the Acting Deputy Attorney General for the U.S. Department of Justice. He rejoined
the Department in 2009 as Deputy Assistant Attorney General in the Criminal Division before being appointed
in 2010 by the Attorney General to serve as the Acting Deputy Attorney General.
Prior to his return to the Department, Grindler was a partner at King & Spalding LLP in the firm’s Special
Matters/Government Investigations Practice Group where he focused on white collar criminal defense, internal
corporate investigations, money laundering and search warrant compliance, Foreign Corrupt Practices Act,
False Claims Act and whistleblower cases, and complex civil litigation.
Grindler has previously served in a number of roles at the Justice Department, including as Principal Associate
Deputy Attorney General and Counselor to the Attorney General, Deputy Assistant Attorney General in the
Civil Division, and as an Assistant U.S. Attorney in the Southern District of New York and the Northern
District of Georgia. He also represented the President of the United States in his official capacity when
depositions were taken in two Independent Counsel prosecutions arising out of the Whitewater investigation.
Grindler was also a partner in his own litigation firm, Chilivis & Grindler, where he focused on civil litigation
and white collar criminal defense. Prior to that he was an associate at Powell, Goldstein, Frazer & Murphy LLP
in the firm’s litigation department. Grindler has been selected for inclusion in the 2006-2009 editions of The
Best Lawyers in America in the area of white collar criminal defense and on the 2008-2009 Washington, D.C.,
Super Lawyers lists. In 2000, he received the Edmund J. Randolph Award in recognition of his outstanding
contributions to the Department of Justice. He received both his undergraduate and law degrees from
Northwestern University.
PROTECTING OUR CHILDREN
19
Opening Ceremony Biographies
UNDERSHERIFF FRANK MACKESY
JACKSONVILLE COUNTY SHERIFF’S OFFICE
Frank Mackesy began his career in law enforcement in 1979 and quickly rose through the ranks. From 1995 through
August 2002 he served as Chief of the Jails, Patrol, and Detective Divisions. In September 2002 he was promoted
to Director of Police Operations overseeing the day-to-day operations of the Patrol, Detective, Community Affairs
Divisions, Organized Crime and Intelligence Units.
Upon Sheriff Rutherford’s election in July 2003 he reappointed him to the rank of Director and placed him in charge
of the newly created Department of Patrol and Enforcement. He additionally tasked him with the responsibility of
coordinating the security for Super Bowl XXXIX.
In January, 2005 Sheriff Rutherford promoted him to the number two position within the agency where he currently
serves as Undersheriff.
Frank is a graduate of the FBI National Academy. He holds a Bachelors Degree and a Masters Degree in Business
Administration from the University of North Florida. Married to his wife of 28 years, Patti; they have two children;
Dana and Kevin.
20
2010 ICAC NATIONAL CONFERENCE
Opening Ceremony Biographies
MARY LOU LEARY
PRINCIPAL DEPUTY ASSISTANT GENERAL
Mary Lou Leary joined the Office of the Assistant Attorney General at the Office of Justice Programs in May 2009
when she was appointed Deputy Assistant Attorney General. She was named Principal Deputy Assistant Attorney
General in September 2009. Prior to that, she served as Executive Director of the National Center for Victims of
Crime, a private nonprofit in Washington, DC, for four years.
From 1999 to 2001, Ms. Leary’s service at the U.S. Department of Justice included acting Assistant Attorney General
for the Office of Justice Programs, Deputy Associate Attorney General for the Office of the Associate Attorney General,
and acting Director of the Office of Community Oriented Policing Services.
Ms. Leary has also served as United States Attorney, Principal Assistant and then Senior Counsel to the United States
Attorney for the District of Columbia, and Chief, Superior Court Division. Her career included extensive trial and
grand jury experience as Assistant United States Attorney in the District of Columbia and Assistant District Attorney
in Middlesex County, Massachusetts.
Dr. Michael Bourke is the Chief Psychologist for the United States Marshals Service and the head of the USMS
Behavioral Analysis Unit. He has proudly served as a federal law enforcement officer since 2000. Prior to joining the
PROTECTING OUR CHILDREN
21
Plenary Session Biographies
DR. MICHAEL BOURKE
CHIEF PSYCHOLOGIST
UNITED STATES MARSHALLS SERVICE
Dr. Michael Bourke is the Chief Psychologist for the United States Marshals Service and the head of the USMS
Behavioral Analysis Unit. He has proudly served as a federal law enforcement officer since 2000. Prior to joining the
Marshals Service he worked as a clinical psychologist for the federal prison system; from 2000 to 2006 he was assigned
to the Sex Offender Treatment Program (SOTP) and Hypersexuality Management Program (HMP) at the Federal
Correctional Institution in Butner, North Carolina, and from July 2006 to September 2008 he worked within the
Commitment and Treatment Program for Sexually Dangerous Persons (CTP) at the same institution.
Dr. Bourke is a graduate of the Department of Defense Polygraph Institute, and he has conducted several hundred
polygraph examinations of sex offenders. He is a regular consultant to federal, state, and local law enforcement
agencies on matters pertaining to sexual criminality and interviewing/interrogation techniques. He is an adjunct
faculty member at Nova Southeastern University and the U.S. Department of Defense Academy for Credibility
Assessment (DACA).
In 2008 he received a Special Recognition Award from the United Kingdom’s Child Exploitation and Online Protection
Centre (CEOP), and in 2009 he was awarded the Pro-Humanitate Literary award by the North American Resource
Center for Child Welfare.
An active researcher, Dr. Bourke serves on the editorial boards for two professional journals. His clinical and research
interests include the assessment of sexual offenders, the art of interviewing and interrogation, the detection of deception,
secondary stress among law enforcement personnel, and investigative profiling.
22
2010 ICAC NATIONAL CONFERENCE
Daily
Activities
Since 1998, the ICAC Task Forces have arrested nearly 20,000 individuals
suspected of committing a crime of child sexual exploitation.
Daily Activities - Schedule at a Glance
FRIDAY
TUESDAY
WEDNESDAY
7:00 am - 5:00 pm
Exhibition Hall
Preconvene Area
7:00 am - 5:00 pm
Exhibition Hall
Preconvene Area
7:00 am - 5:00 pm
Exhibition Hall
Preconvene Area
7:00 am - 11:30 am
Exhibition Hall
Preconvene Area
7:00 am - 4:30 pm
Registration
Preconvene Area
7:30 am - 4:30 pm
Registration
Precovene Area
7:30 am - 4:30 pm
Registration
Precovene Area
7:30 am - 10:00 am
Registration
Precovene Area
7:45am - 8:30 am
Continental Breakfast
7:15 am - 8:00 am
Continental Breakfast
7:15 am - 8:00 am
Continental Breakfast
7:15 am - 8:00 am
Continental Breakfast
8:30 – 11:30 am
Plenary Session
Grand Ballroom
8:00 – 9:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
8:00 – 9:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
8:00 – 9:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
9:30 – 10:00 am
Morning Beverage Break
Exhibition Hall
9:30 – 10:00 am
Morning Beverage Break
Exhibition Hall
9:30 – 10:00 am
Morning Beverage Break
Exhibition Hall
10:00 am – 11:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
10:00 am – 11:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
10:00 am – 11:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
11:30 – 1:00 pm
Lunch, on your own*
11:30 – 1:00 pm
Lunch, on your own*
1:00 - 2:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
1:00 - 2:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
2:30 – 3:00 pm
Afternoon Break
Exhibition Hall
2:30 – 3:00 pm
Afternoon Break &
Raffle Drawing
Exhibition Hall
11:30 – 1:00 pm
Lunch, on your own*
1:00 - 2:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
2:30 – 3:00 pm
fternoon Break
Exhibition Hall
3:00 - 4:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
3:00 - 4:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
7:00 pm
Special Event for
Conference Attendees
The Jacksonville Landing
THURSDAY
*Daily lunch options:
Lunch buffet at Trellises
Restaurant on the first floor
3:00 - 4:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
or there will also be Grab
and Go lunch available.
The Landing, conveniently
located a few blocks from
the Hyatt Regency has many
great restaurants to choose
from.
PROTECTING OUR CHILDREN
23
Tuesday, May 11, 2010 - Daily Activities & Lab Schedule
Daily
Schedule
7:00 am - 4:30 pm
Registration
Preconvene Area
7:00 am - 5:00 pm
Exhibition Hall
Preconvene Area
7:45am - 8:30 am
Continental Breakfast
8:30 am – 11:30 am
Plenary Session
Grand Ballroom
11:30 am – 1:00 pm
Lunch, on your own*
1:00 pm - 2:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
2:30 pm – 3:00 pm
fternoon Break
Exhibition Hall
3:00 pm - 4:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
Computer Lab Sessions
These are not the full titles for each session.
Full titles, speakers and descriptions can be found in their
respective areas of the program.
Session 1
1:00 – 2:30 p.m.
Session 2
3:00 – 4:30 p.m.
Apple Macintosh Forensics
Part 1 & 2
Mousselli
City Terrace 9
Basic Cell Phone Investigation
Part 1 & 2
Wykes & Williams
City Terrace 5
Cellular Phone Inv.
Williams & Wagner
Orlando
Google and Firefox
Wagner & Williams
Orlando
Facebook
Duffey
Undercover Chat Lab
Duffey & Sullivan
City Terrace 4
City Terrace 4
Locating Wireless Users
HTCI Summary Digital
Speakman
Triage Forensics
City Terrace 12 Eskridge
City Terrace 12
ICAC COPS for Investigtrs. ICAC COPS TF Commdrs.
Robert Erdely
Dave Peifer
City Terrace 11
City Terrace 11
Image Scan Training
Part 1 & 2
Winkelman & Innes
Boardroom 4
Mobile Phone Analysis:
Email Investigations
Best Practices
Tidwell
Reiber
City Terrace 6
City Terrace 6
Recovering Volatile Data
Part 1 & 2
Armstrong & Bishop
Daytona
Secure Techniques for Onsite Preview
Part 1 & 2
Newman & Scott
Undercover Chat w/AIM
Leonard
City Terrace 10
City Terrace 7
Subject Identification
McFadden
City Terrace 10
Note: NCMEC Child Victim Identification Lab
is held daily in River Terrace 2
*Lunch options: Lunch buffet at Trellises Restaurant on the first floor or there will also
be a Grab and Go lunch available. The Landing, conveniently located a few blocks
from the Hyatt Regency, has many great restaurants to choose from.
24
2010 ICAC NATIONAL CONFERENCE
Tuesday, May 11, 2010 - Daily Activities & Lecture Schedule
Lecture Sessions
These are not the full titles for each session.
Full titles, speakers and descriptions can be found in their
respective areas of the program.
Session 1
1:00 – 2:30 p.m.
Session 2
3:00 – 4:30 p.m.
Operation Digital Offense
Baker & Miller & Cumming
River Terrace 3
Undercover Chat Invest.
Gremillion & Leonard
River Terrace 3
Brianna Owns
Torpie & LaPorta
To Use or Not - Polygraph
Edwards
Grand 1
Grand 1
Craigslist Investigations
Nichols
Grand 2
Cases - Photo Sharing Sites
Devlin & Spurger
Grand 2
Metzger Case Study
Whitehead & Catt & Barnes
Grand 3
Website to Combat Chilld
Pornographer
Zerfoss
Grand 3
Case Study: Joseph Okoh
Garrett & McGuire
Grand 6
Child Pornography
Trafficking
Geraghty
Grand 6
Behavioral characteristics
of sex offenders
Bourke
Terrace Pav 1
Understanding “Sexting”
Grantham
Terrace Pav 1
Working with Yahoo
Berroya
Terrace Pav 2
Understanding the Gnutella
Network
Powell
Terrace Pav 2
Microsoft Xbox, Xbox 360
and Live!
Ard
River Terrace 1
Windows Client Forensics
Ard
River Terrace 1
Presenting the Internet
Safety Message
Laramie
Grand 7
Mentoring Opportunities
Mulcahy & Penna
Grand 7
Avoiding personal liability
Gillingham
Grand 8
Presenting Digital Evidence
McGuire
Grand 8
ICAC Investigations:
Working with the Media
Munns
St. Johns
Search and Seizure Issues in
Child Exploitation
Anderson
St. Johns
Understanding “Sexting”
Grantham
Clearwater
Technology-Facilitated
Cases Fitzsimmons & Badawy
Clearwater
Visit the Internet Café
Ethernet connections will be provided for you to check your email on your laptop in our
Internet Café. The Cafe is located in the Exhibition Hall on the second floor of the Hyatt
Regency Jacksonville.
PROTECTING OUR CHILDREN
25
Wednesday May12, 2010 - Daily Activities & Lab Schedule
Daily
Schedule
7:00 am - 5:00 pm
Exhibition Hall
Preconvene Area
7:30 am - 4:30 pm
Registration
Precovene Area
7:15 am - 8:00 am
Continental Breakfast
8:00 am – 9:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
Computer Lab Sessions
These are not the full titles for each session.
Full titles, speakers and descriptions can be found in their
respective areas of the program.
Session 1
8:00 - 9:30 a.m.
Session 2
10:00 - 11:30 a.m.
Using Firefox as an Investigative Tool
Part 1 & 2
Cohen
Basic Cell Phone Investigation
Part 3 & 4
Wykes & Williams
10:00 am – 11:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
11:30 am – 1:00 pm
Lunch, on your own*
1:00 pm - 2:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
2:30 pm – 3:00 pm
Afternoon Break
Exhibition Hall
3:00 pm - 4:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
7:00 pm
Special Event for
Conference Attendees
The Jacksonville Landing
26
Session 4
3:00 – 4:30 p.m.
City Terrace 9
Apple Macintosh Forensics
Part 1 & 2
Mousselli
City Terrace 9
City Terrace 5
Basic Cell Phone Investigation
Part 1 & 2
Wykes & Williams
City Terrace 5
Social Networking - Investigative Tools, Tips & Techs.
Part 1 & 2
Wagner & Williams
Orlando
Cellular Phone Inv.
Williams & Wagner
Orlando
Facebook
Duffey
City Terrace 4
Previewing Windows/Macs Previewing Windows/Macs
West
West
City Terrace 4
City Terrace 4
City Terrace 12
RoundUp Investigations
Part 3 & 4
Erdely, Hill & Powell
City Terrace 12
City Terrace 11
RoundUp Investigations
Part 3 & 4
Erdely, Hill & Powell
City Terrace 11
Open
City Terrace 4
9:30 am – 10:00 am
Morning Beverage Break
Exhibition Hall
Session 3
1:00 – 2:30 p.m.
RoundUp Investigations
Part 1 & 2
Erdely, Hill & Powell
RoundUp Investigations
Part 1 & 2
Erdely, Hill & Powell
Image Scan Training
Part 3 & 4
Winkelman & Innes
Macs! Acquisition &
Preliminary Analysis
Tidwell
City Terrace 6
Boardroom 4
Internet Registry Artifacts
Tidwell
City Terrace 6
Wireless Network Investigation
Part 1 & 2
Armstrong & Bishop
Daytona
Secure Techniques for Onsite Preview
Part 3 & 4
Newman & Scott
City Terrace 7
Basic Internent
Subject Identification
Investigation
McFadden
Carroll
City Terrace 10
City Terrace 10
Windows Client Forensics (Windows 7)
Part 1 & 2
Ard
City Terrace 8
Google and Firefox
Wagner & Bishop
Orlando
Image Scan Training
Part 1 & 2
Winkelman & Innes
Boardroom 4
Mobile Phone Analysis:
Best Practices
Reiber
City Terrace 6
Email Investigations
Tidwell
City Terrace 6
Knoppix as a Preview Tool
Armstrong & Bishop
Daytona
IRC Investigations
Armstrong & Williams
Daytona
Secure Techniques for Onsite Preview
Part 1 & 2
Newman & Herb Scott
City Terrace 7
The Child Protection System
Part 1 & 2
West
City Terrace 10
Windows Client Forensics (Windows 7)
Part 1 & 2
Ard
City Terrace 8
Note: NCMEC Child Victim Identification Lab
is held daily in River Terrace 2
*Lunch options: Lunch buffet at Trellises Restaurant on the first floor or there will also
be a Grab and Go lunch available. The Landing, conveniently located a few blocks
from the Hyatt Regency, has many great restaurants to choose from.
2010 ICAC NATIONAL CONFERENCE
Wednesday, May 12, 2010 - Daily Activities & Lecture Schedule
Lecture Sessions
These are not the full titles for each session.
Full titles, speakers and descriptions can be found in their
respective areas of the program.
Session 1
8:00 – 9:30 a.m.
Session 2
10:00 – 11:30 a.m.
Session 3
1:00 – 2:30 p.m.
Session 4
3:00 – 4:30 p.m.
When is Enough, Enough?
Gersh et al.
River Terrace 3
Youthful Offenders
Bronson et al.
River Terrace 3
Protecting our Nation’s
Children
Williams
River Terrace 3
ICAC / FBI Task Forces
Granozio & Laramie
Grand 1
Partnering in Crime
Moultrie & McMurry
Grand 1
Justice Across State Lines
Goldberg & Canonico
Grand 1
Brianna Owns
Torpie & LaPorta
The use of an undercover
website
Zerfoss
Grand 2
Social Networking
Investigations
West
Grand 2
Very Young Girls: Child Victims in the Commercial Sex
Industry
Attenello
Grand 2
Beyond the Image
Cole
Grand 3
Undercover Chat Invest.
Gremillion & Leonard
Grand 3
Military Resources
Trest & Dent
Grand 3
Child Exploitation Invest.
Holloway et al
River Terrace 3
Child Sex Tourism Investigations Part 1& 2
Grocki & Crane
Grand 6
Grand 1
Craigslist Investigations
Nichols
Grand 3
Online Groups: Investigations, Forensics, and Prosecutions
Part 1 & 2
Dunn & Grocki & Fottrell
Grand 6
Sex Offender Registration
Turkel
Terrace Pav 1
Federal Sentencing Issues
Blackwell & Dorhoffer & Hunt
Terrace Pav 1
Behavioral analysis of offenders Part 1 & 2
Sullivan
Encryption of a Password
Coduti & Butterfield
Terrace Pav 2
Preserving Evidence from
the Cloud
O’Neill
Terrace Pav 2
What’s Next????
Duffey
Terrace Pav 2
Web 3.0: Blending of
Augmented Reality
Rampolla
Terrace Pav 2
Web 3.0: Blending of
Augmented Reality
Rampolla River Terrace 1
Gigatribe investigations
Donahue
River Terrace 1
802.11 Explo
Basic Network
McFadden
River Terrace 1
enough.org Child Safety
Rice Hughes
Grand 7
NetSmartz Workshop
Nathan
Grand 7
Cyberbullying
Cellular Phone Forensics for Law Enforcement
Pat 1 & 2
Weber & Daniels
Grand 8
Terrace Pav 1
Costagliola River Terrace 1
Laramie
Grand 7
Encryption and
Compelling a Password
Coduti et al.
Grand 8
ICAC in Tribal
Communities
Staubs, et al.
Grand 7
Preserving Evidence from
the Cloud
O’Neill
Grand 8
ICAC Unit Supervisor
Training
Schriefer
St. Johns
Officer Safety in Internet
Operations
Hansen
St. Johns
Fourth Amendment Principles and Issues Part 1 & 2
Clancy
St. Johns
Cross-Examining the
Defense Expert
Fitzsimmons
Clearwater
Legally Limiting Defense
Discovery
Mason
Clearwater
Direct Examination of a Forensic Expert
(Lecture & Demonstration)
Fitzsimmons et al.
Clearwater
Did you know that since 2006, the ICAC Task Forces have
executed more than 22,000 search warrants?
PROTECTING OUR CHILDREN
27
Thursday, May 13, 2010 - Daily Activities & Lecture Schedules
Daily
Schedule
7:00 am - 5:00 pm
Exhibition Hall
Preconvene Area
7:30 am - 4:30 pm
Registration
Precovene Area
7:15 am - 8:00 am
Continental Breakfast
8:00 am – 9:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
9:30 am – 10:00 am
Morning Beverage Break
Exhibition Hall
10:00 am – 11:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
11:30 am – 1:00 pm
Lunch, on your own*
1:00 pm - 2:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
2:30 pm – 3:00 pm
Afternoon Break &
Raffle Drawing
Exhibition Hall
3:00 - 4:30 pm
Lab and Lecture Sessions
Various - see Workshop Schedules
Computer Lab Sessions
These are not the full titles for each session.
Full titles, speakers and descriptions can be found in their
respective areas of the program.
Session 1
8:00 - 9:30 a.m.
Session 2
10:00 - 11:30 a.m.
Using Firefox as an Investigative Tool
Part 1 & 2
Cohen
Basic Cell Phone Investigation
Part 3 & 4
Wykes & Williams
Session 3
1:00 – 2:30 p.m.
Session 4
3:00 – 4:30 p.m.
City Terrace 9
Apple Macintosh Forensics
Part 1 & 2
Mousselli
City Terrace 9
City Terrace 5
Basic Cell Phone Investigation
Part 1 & 2
Wykes & Williams
City Terrace 5
Social Networking Social Networking Investigative Tools, Tips
Investigative Tools, Tips
Wagner et al.
Orlando Wagner et al.
Orlando
Cellular Phone Inv.
Wagner & Williams
Orlando
Facebook
Duffey
Previewing Windows/Macs Previewing Windows/Macs
West
West
City Terrace 4
City Terrace 4
Open
City Terrace 4
City Terrace 4
Google and Firefox
Bishop & Williams
Orlando
Locating Rogue Wireless
HTCI Summary
Speakman
Digital Triage Forensics
City Terrace 12 Eskridge
City Terrace 12
Leveraging Linux to facilitate Digital Forensic Inv.
Part 1 & 2
Rosen
City Terrace 12
RoundUp Investigations
Part 1 & 2
Erdely, Hill & Powell
RoundUp Investigations
Part 3 & 4
Erdely, Hill & Powell
City Terrace 11
Image Scan Training
Part 3 & 4
Winkelman & Innes
Macs! Acquisition &
Preliminary Analysis
Tidwell
City Terrace 6
Boardroom 4
Internet Registry Artifacts
Tidwell
City Terrace 6
Wireless Network Investigation
Part 1 & 2
Armstrong & Bishop
Daytona
Secure Techniques for Onsite Preview
Part 3 & 4
Newman & Scott
City Terrace 7
Basic Internent
Subject Identification
Investigation
McFadden
City Terrace 10
City Terrace 10 Carroll
Windows Client Forensics (Windows 7)
Part 1 & 2
Ard
City Terrace 8
City Terrace 11
Image Scan Training
Part 1 & 2
Winkelman & Innes
Boardroom 4
Mobile Phone Analysis:
Best Practices
Reiber
City Terrace 6
Email Investigations
Tidwell
City Terrace 6
Knoppix as a Preview Tool
Armstrong & Bishop
Daytona
IRC Investigations
Armstrong & Bishop
Daytona
Secure Techniques for Onsite Preview
Part 1 & 2
Newman & Herb Scott
City Terrace 7
The Child Protection System
Part 1 & 2
West
City Terrace 10
Windows Client Forensics (Windows 7)
Part 1 & 2
Ard
City Terrace 8
Note: NCMEC Child Victim Identification Lab
is held daily in River Terrace 2
*Lunch options: Lunch buffet at Trellises Restaurant on the first floor or there will also
be a Grab and Go lunch available. The Landing, conveniently located a few blocks
from the Hyatt Regency, has many great restaurants to choose from.
28
2010 ICAC NATIONAL CONFERENCE
Thursday, May 13, 2010 - Daily Activities & Lecture Schedules
Lecture Sessions
These are not the full titles for each session.
Full titles, speakers and descriptions can be found in their
respective areas of the program.
Session 1
8:00 – 9:30 a.m.
Session 2
10:00 – 11:30 a.m.
Session 3
1:00 – 2:30 p.m.
Session 4
3:00 – 4:30 p.m.
Gigatribe investigations
Donahue River Terrace 3
Undercover Chat
Gremillion & Leonard
River Terrace 3
Social Networking
Investigations
West
Grand 1
Understanding “Sexting”
Grantham
Grand 1
Cellular Phone Forensics
Part 1 & 2
Weber & Daniels
Grand 1
Raymer Case Study
Carry
Grand 2
Federal Sentencing Issues
Blackwell & Dorhoffer & Hunt
Facebook: Working with
Law Enforcement
Vichinsky & Wu Grand 2
Craigslist Investigations
Nichols
Grand 2
Patterns and Trends
Feller
River Terrace 3
Grand 2
Patterns and Trends
Feller
River Terrace 3
Adobe Photoshop, Digital Imaging and Law Enforcement
Part 1 & 2
Penn
Grand 3
Online Groups: Investigations, Forensics, and Prosecutions
Part 1 & 2
Dunn & Grocki & Fottrell
Grand 3
Domain Name System
Frailties
Geraghty
Grand 6
Case Study: Joseph Okoh
Garrett & McGuire
Grand 6
ICAC / FBI Task Forces
Granozio & Laramie
Grand 6
Proving Your Child
Pornography Case
King & Bridbord
Grand 6
Women who sexually offend using technology
Part 1 & 2
Hill
Terrace Pav 1
Behavioral analysis of offenders Part 1 & 2
Sullivan
Web 3.0: Blending of
Augmented Reality
Rampolla
Terrace Pav 2
Beyond the Image
Microsoft COFEE
Pancoast
Terrace Pav 2
Windows 7 Forensics
Jones
River Terrace 1
Windows 7 Forensics
Jones
River Terrace 1
Fourth Amendment Principles and Issues Part 1 & 2
Clancy
River Ter 1
Utilizing Non-Profit
Organizations
Staubs & Jolley-Kabi Grand 7
NCMEC Resources
Sirkel
Grand 7
Protecting Youth Online
Community Outreach
Hancock
Carroll
Proving Your Child
Pornography Case
King & Bridbord
Grand 8
Forensic Dicussion Group
Holloway et al.
Grand 8
Detection of Encryption
on Live Systems
Johnson
Grand 8
OJJDP Grant Management
Bronson et al.
St. Johns
Legally of Sexually
Exploitative Images
Mason
St. Johns
SHIFT: Supporting Heroes in mental health Foundation
Stevenson & Arnold
St. Johns
Computer Forensics for
Prosecutors
Fitzsimmons
Clearwater
Grooming Evidence
Fitzsimmons & Badawy
Clearwater
Cole
Terrace Pav 2
Terrace Pav 1
Grand 7
Evolving Search and
Seizure Issues
Anderson
Clearwater
Microsoft COFEE
Pancoast
Terrace Pav 2
Grand 7
Detection of Encryption
on Live Systems
Johnson
Grand 8
Charging Decisions and
Pre-trial Motions
Cauthorn
Clearwater
Did you know that the ICAC Task Forces have conducted more
than 71,000 computer forensic examinations since 199?.
PROTECTING OUR CHILDREN
29
Friday, May 14, 2010 - Daily Activities & Lab Schedule
Computer Lab Sessions
Daily
Schedule
These are not the full titles for each session.
Full titles, speakers and descriptions can be found in their
respective areas of the program.
7:00 am - 5:00 pm
Exhibition Hall
Preconvene Area
7:30 am - 4:30 pm
Registration
Precovene Area
7:15 am - 8:00 am
Continental Breakfast
8:00 am – 9:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
9:30 am – 10:00 am
Morning Beverage Break
Exhibition Hall
10:00 am – 11:30 am
Lab and Lecture Sessions
Various - see Workshop Schedules
Session 1
8:00 - 9:30 a.m.
Session 2
10:00 - 11:30 a.m.
Apple Macintosh Forensics
Part 1 & 2
Cohen
City Terrace 9
Basic Cell Phone Investigation
Part 3 & 4
Wykes & Williams
City Terrace 5
Social Networking - Investigative Tools, Tips
Part 1 & 2
Wagner et al.
Facebook
Duffey
Orlando
Undercover Chat
Duffey & Sullivan
City Terrace 4
City Terrace 4
Leveraging Linux to facilitate Digital Forensic Inv.
Part 1 & 2
Rosen
City Terrace 12
Locating Rogue Wireless
HTCI Summary
Speakman
Digital Triage Forensics
City Terrace 11
Eskridge
City Terrace 11
Image Scan Training
Part 3 & 4
Winkelman & Innes
Boardroom 4
Macs! Acquisition &
Preliminary Analysis
Tidwell
City Terrace 6
Internet Registry Artifacts
Tidwell
City Terrace 6
Recovering Volatile Data
Part 1 & 2
Armstrong & Bishop
Daytona
Secure Techniques for Onsite Preview
Part 3 & 4
Newman & Scott
Undercover Chat w/AIM
Leonard
City Terrace 10
The Child Protection System
Part 1 & 2
West
City Terrace 7
Subject Identification
McFadden
City Terrace 10
City Terrace 8
Note: NCMEC Child Victim Identification Lab
is held daily in River Terrace 2
Conference Certificates
Students must complete the overall conference evaluation form and submit it at the Conference
Registration Desk in order to receive the conference certificate. This can be done any time after
Thursday, May 13th at 12 noon.
30
2010 ICAC NATIONAL CONFERENCE
Friday, May 14, 2010 - Daily Activities & Lecture Schedule
Lecture Sessions
These are not the full titles for each session.
Full titles, speakers and descriptions can be found in their
respective areas of the program.
Session 1
8:00 - 9:30 a.m.
Session 2
10:00 - 11:30 a.m.
Understanding BitTorrent
Liberatore & Levine
River Terrace 3
Understanding BitTorrent
Liberatore & Levine
River Terrace 3
Mobile Social Networking
Cohen
Grand 1
Justice Across State Lines
Goldberg & Canonico
Grand 1
Understanding “Sexting”
Grantham
Grand 2
Metzger Case Study
Whitehead & Catt & Barnes
Grand 2
What use is research?
Wolak
Grand 3
Case Study: Joseph Okoh
Garrett & McGuire
Grand 3
Patterns and Trends
Feller
Grand 6
Facebook: Working with
Law Enforcement
Vichinsky & Wu Grand 6
Women who sexually offend using technology
Part 1 & 2
Hill
Terrace Pav 1
Understanding the Gnutella
Network
Powell
Terrace Pav 2
Linux for First Responders
Pancoast
Terrace Pav 2
Microsoft COFEE
Open
Pancoast
River Terrace 1
Community Outreach
Carroll
PROTECTING OUR CHILDREN
Grand 7
River Terrace 1
McGruff SafeGuard
Ohlenbush
Grand 7
Windows 7 Forensics
Jones
Grand 8
Open
ICAC Unit Supervisor
Training
Schriefer
St. Johns
Officer Safety in Internet
Operations
Hansen
St. Johns
Grooming Evidence
Fitzsimmons & Badawy
Clearwater
Sentencing Issues
Grand 8
Cauthorn
Clearwater
31
32
2010 ICAC NATIONAL CONFERENCE
Computer Lab
Sessions
From 2006 to 2010, the ICAC Task Forces rescued more than 4,500 children
from sexual exploitation, child abuse and neglect.
Computer Labs - Table of Contents
Page Lab Name
34. Apple Macintosh Forensics Part 1 & 2
34. Basic Cell Phone Investigation utilizing the NW3C
“Perphound(TM)” utility Part 1 - 4
34. Basic Internet Investigation
34. Cellular Phone Investigations and Field Tools
34. Email Investigations
34. Facebook - The Whole Enchilada
35. Google and Firefox as Investigative Tools
35. HTCI Summary Digital Triage Forensics
35. ICAC COPS for Investigators
35. ICAC COPS for Task Force Commanders
35. Image Scan Training Part 1 - 4
35. Internet Registry Artifacts
36. IRC Investigations
36. Knoppix as a Preview Tool
36. Leveraging Linux to Facilitate Digital Forensic
Investigations Part 1 & 2
36. Locating Rogue Wireless Users
36. Macs! Acquisition & Preliminary Analysis
36. Mobile Phone Analysis: Best Practices
37. NCMEC Child Victim Identification Lab
37. Previewing Windows & MAC Computers
37. Recovering Volatile Data Part 1 & 2
37. RoundUp Investigations Part 1 - 4
37. Secure Techniques for Onsite Preview (STOP) with the
TUX4N6(TM) Previewing and Triage tool Part 1 - 4
37. Social Networking - Introduction and Proactive
Investigations
38. Social Networking - Investigative Tools, Tips and
Techniques Part 1 & 2
38. Subject Identification – General Searches and
Public Records
38. The Child Protection System Part 1 & 2
38. Undercover Chat Investigations Using AIM
(AOL Instant Messenger)
38. Undercover Chat Lab
38. Using Firefox as an Investigative Tool Part 1 & 2
39. Windows Client Forensics (Windows 7) Part 1 & 2
39. Wireless Network Investigation Part 1 & 2
PROTECTING OUR CHILDREN
Room: River Terrace 2
NCMEC is proud to offer all registered participants at this
year’s Conference a glimpse into the Victim Identification
Lab– a powerful law enforcement tool designed to locate
child victims. Many children have been rescued from
further sexual abuse because a clue in the background of
sexually abusive images led to their location. Within this
interactive lab, computers will be available for participants
to access background identifiers and audio clues in hopes
that these items may be recognizable to Lab participants.
Accompanying each sanitized picture will be a real-time
message thread where participants can post their comments.
You may have the piece of the puzzle that could lead to the
rescue of a child victim. NOTE: All registered conference
attendees are invited to participate in this Lab; however, due
to the sensitivity of this issue, please make sure to wear your
conference badge and bring proof of identity to gain entry.
Lab hours:
Tuesday:
Wednesday
Thursday
Friday
11:30 am – 5pm
7:30 am – 5pm
7:30 am – 5pm
7:30 am – 12 pm
33
Computer Labs
Apple Macintosh Forensics
Part 1 & 2
Tuesday, May 11th - 1:00 pm - 4:30 pm
Wednesday, May 12th - 1:00 pm - 4:30 pm
Thursday, May 13th - 1:00 pm - 4:30 pm
Friday, May 14th - 8:00 am - 11:30 am
Room: City Terrace 9
Nathan Mousselli
An overview of Apple Macintosh Forensics to consist of basic imaging and examination techniques; Operating System
structure including the ‘Library’ folders, internet history,
sqlite and plist examination.
Basic Cell Phone Investigation utilizing the NW3C
“Perphound(TM)” utility
Part 1 - 4
Tuesday,May 11th - 1:00 pm
Wednesday, May 12th - 11:30 am
Wednesday, May 12th - 1:00 pm
Thursday, May 13th - 11:30 am
Thursday, May 13th - 1:00 pm
Friday, May 14th - 11:30 am
Room: City Terrace 5
Justin Wykes & Matthew Williams
This is a full day condensed version of NW3C’s two day
BCPI course. This course will include lecture and lab emphasizing the gathering, analysis, and mapping of cell phone
tower and activity logs.
Basic Internet Investigation
Wednesday, May 12th - 8:00 am
Thursday, May 13th - 10:00 am
Room: City Terrace 10
Bill Carroll
This presentation was developed to teach patrol, detectives
and supervisors how to use basic internet skills to conduct
searches on the internet. Rural law enforcement works with
the ICAC TFs and receive training. It is infrequent that they
get calls for assistance so some of those skills they acquire
during training are lost. This course is designed to illustrate
how some of these skills can be adapted into regular duties
to enhance their investigations.
Cellular Phone Investigations and Field Tools
Tuesday, May 11th - 1:00 pm
Wednesday, May 12th - 1:00 pm
Thursday, May 13th - 1:00 pm
Room: Orlando
34
James Williams & Lauren Wagner
This workshop will introduce students to cellular devices
and discuss the many aspects that cellular devices have on
investigations. Seizure and examination of devices will also
be discussed as well as an overview of field tools used for
data extraction. Students will complete hands-on exercises
and the use of field tools to extract data from cellular devices.
Email Investigations
Tuesday, May 11th - 3:00 pm
Wednesday, May 12th - 3:00 pm
Room: City Terrace 6
Thursday, May 13th - 3:00 pm
Buddy Tidwell
Email is one of the most significant sources of evidence in
the vast majority of today’s forensic and eDiscovery investigations, and yet, most forensic tools do a fairly poor job of
dealing with it. Many corporate and forensic investigators
have had to go outside the industry entirely to find email
analysis tools that can sufficiently handle the most common
corporate email servers and formats, including Exchange
and Lotus Notes. This lab will introduce AccessData’s new
technological approach to tackle these issues and deliver
true enterprise-class email investigative capabilities. The lab
will pay particular attention to the analysis of email using
FTK 2, focusing on filtering, sorting, bookmarking and reporting of data found in a variety of popular email clients
found in corporate and personal email clients today.
Facebook - The Whole Enchilada
Tuesday, May 11th - 1:00 pm
Wednesday, May 12th - 8:00 am
Room: City Terrace 4
Thursday, May 13th - 8:00 am
Friday, May 14th - 8:00 am
Mike Duffey
This Lab will cover using Facebook from the creation of a
Facebook page to using Facebook. Students will learn what
information will be available to them when legal process is
served, what Facebook captures, what they keep, how to
identify “uniquely” a person’s profile and photo or group.
Also, how various applications can affect a user and where
else to find Facebook information without having a Facebook profile. This class is for the new Facebook user and up.
This Lab is for law enforcement attendees only. Part 1 &
2 must be attended and completed in consecutive blocks.
2010 ICAC NATIONAL CONFERENCE
Computer Labs
Google and Firefox as Investigative Tools
Tuesday, May 11th - 3:00 pm
Wednesday, May 12th - 3:00 pm
Thursday, May 13th - 3:00 pm
Room: Orlando
Lauren Wagner & James Williams
This workshop will teach students how to effectively use
Google and Mozilla Firefox as investigative tools. Students
will complete hands-on exercises using Google Advanced
Operators as well as Firefox add-ons.
HTCI Summary Digital Triage Forensics
Tuesday, May 11th - 3:00 pm
Thursday, May 13th - 10:00 am
Room: City Terrace 12
Room: City Terrace 11
Thomas Eskridge
This class discusses the need and the tools available to triage digital evidence. With the growth of the use of digital
evidence our current system has become overwhelmed. The
background and proper use of DTF discussed will open options for investigators involved in these cases.
ICACCOPS for Investigators
Tuesday, May 11th - 1:00 pm
Room: City Terrace 11
Robert Erdely
www.icaccops.com is a website developed by Pennsylvania and Massachusetts ICAC Task Forces as a tool to assist
ICAC investigators. As of April 12, 2010, police officers had
posted more than 142 million records of offenders associated with child pornography. Investigators can benefit from
the use of the site regardless of the P2P tool they are using. This block of instruction will show investigators how to
identify offenders recently seen in their jurisdiction as well
as identifying the worst offenders. Investigators will also be
taught how to place alerts on IP addresses and GUIDs so
they will be notified when the offender comes online. This
will allow an investigator the ability to collect first hand information about the offender. An investigator will also be
shown how to track offenders whose IP addresses change
frequently.
ICACCOPS for Task Force Commanders
Tuesday, May 11th - 3:00 pm
Room: City Terrace 11
Dave Peifer
PROTECTING OUR CHILDREN
www.icaccops.com is a website developed by Pennsylvania and Massachusetts ICAC Task Forces as a tool to assist
ICAC investigators and Task Force Commanders. Currently
the site has more than 142 million records of offenders associated with child pornography. TFCs will be shown how
to see the IP addresses sharing child pornography in their
jurisdiction and map those transactions in real time. The
site will aid them in determining the scope of the problem
in their jurisdiction and assist in targeting the worst offenders. TFCs will be shown administrative functions including
displaying the users and their activities, and coordinating
investigations. The site also provides a method to quickly
keep track of the number of ICAC Cases, Search warrants,
and arrests. Finally, commanders will be shown how to approve user to access the system.
Image Scan Training
Part 1 - 4
Tuesday, May 11th - 1:00 pm
Wednesday, May 12th - 11:30 am
Wednesday, May 12th - 1:00 pm
Thursday, May 13th - 11:30 am
Thursday, May 13th - 1:00 pm
Friday, May 14th - 11:30 am
Room: Boardroom 4
Thad Winkelman & Jim Innes
Image Scan is a component system that allows field investigators to accurately view a variety of graphics formats on
a subject’s computer - while making absolutely no changes
to any files.
Internet Registry Artifacts
Wednesday, May 12th - 10:00 am
Thursday, May 13th - 10:00 am
Friday, May 14th - 10:00 am
Room: City Terrace 6
Buddy Tidwell
The session provides students with the knowledge and skills
necessary to conduct an effective Internet-based investigation of the Microsoft Windows registry. This advanced,
hands-on intensive course is intended for Forensic Investigators, Law Enforcement Personnel, Network Administrators,
and Security Professionals who desire a greater understanding of the collection, and analysis of Internet trace evidence.
Topics to be addressed will include: • Linking removable
media to an operating system environment • Gaining access to live registry files protected by the Windows environment • User activity related to recent folders, files, and ap-
35
Computer Labs
plications • Protected Storage System Provider information,
from Internet Explorer (Version 6), such as auto-completed
form data, user names, passwords, and search queries.
IRC Investigations
Wednesday, May 12th - 3:00 pm
Thursday, May 13th - 3:00 pm
Room: Daytona
Christopher Armstrong & James Williams
This lab teaches the new investigator the basics of Internet
Relay Chat, focusing on the software set up to install and
capture potential evidence. Students will be taught how to
set up and implement the chat program MRIC. Additionally, students will be provided with a demonstration of a
new investigative IRC tool developed by TLO.
Knoppix as a Preview Tool
Wednesday, May 12th - 1:00 pm
Thursday, May 13th - 1:00 pm
Room: Daytona
Christopher Armstrong & David Bishop
Lecture and Lab: Students will be provided with a Knoppix
CD and an overview of Knoppix, a Linux tool. The students
will learn how to conduct a forensically sound search of a
suspect computer with Knoppix. The students will then be
shown how to copy suspected evidence to an external storage device, creating a evidence report for court purposes.
Leveraging Linux to facilitate Digital Forensic
Investigations
Part 1 & 2
Thursday, May 13th - 1:00 pm - 4:30 pm
Friday, May 14th - 8:00 am - 11:30 am
Room: City Terrace 12
Andrew Rosen
Using a Linux Live CD to triage, assess, search, image, authenticate and analyze computer data storage devices in a
forensically sound manner. Learn how to conduct digital
investigations and examinations using free and open source
tools, mated P2P tools and tips for testifying. This is an advanced lab. Attendees must have already attended the Operation Fairplay Lab or been previously trained in ‘Peer Precision’ through Wyoming DCI. Part 1 & 2 must be attended
and completed in consecutive blocks.
Locating Rogue Wireless Users
Tuesday, May 11th - 1:00 pm - 2:30 pm
36
Thursday, May 13th - 8:00 am
Room: City Terrace 12
Friday, May 14th- 8:00 am
Room: City Terrace 11
Sean Speakman
This lab will demonstrate the ability to locate users connected to a wireless network with minimal equipment and experience. While conducting search warrants on peer to peer
cases, it is only a matter of time before you will encounter
a situation where the suspect is stealing wireless Internet.
With this knowledge you will be able to track them down
quickly and accurately.
Macs! Acquisition & Preliminary Analysis
Wednesday, May 12th - 8:00 am
Thursday, May 13th - 8:00 am
Room: City Terrace 6
Friday, May 14th - 8:00 am
Buddy Tidwell
The Macintosh platform continues to gain in popularity
and market share. This has increased the likelihood of forensic investigators accustomed to Windows-based computers encountering a Mac. This presentation will provide the
experienced Windows forensic investigator with a broad approach to the acquisition and analysis of Macintosh computers. Topics to be covered include: • Accessing the hard
drive • Target Disk Mode • GPT partitioning • BootCamp
partitions • Virtual Machines • The User folder • The Library Folder • Browser artifacts • Plist files Attendees will
leave with information on some acquisition options and
with information enabling them to identify the most common areas in which evidence may be located in the OS X
environment.
Mobile Phone Analysis: Best Practices
Tuesday, May 11th - 1:00 pm
Wednesday, May 12th - 1:00 pm
Thursday, May 13th - 1:00 pm
Room: City Terrace 6
Lee Reiber
This course will discuss best practices and procedures for the
acquisition, preservation, examination, analysis, and reporting of digital information found on mobile phones. These
procedures will be discussed in relation to criminal, intelligence and corporate security cases.
NCMEC Child Victim Identification Lab
2010 ICAC NATIONAL CONFERENCE
Computer Labs
Tuesday, May 11th 1:00 pm
Friday, May 14th 11:30 am
Room: River Terrace 2
NCMEC is proud to offer all registered participants a
glimpse into the Victim Identification Lab – a powerful law
enforcement tool designed to locate child victims. Many
children have been rescued from further sexual abuse because a clue in the background of sexually abusive images
led to their location. Within this interactive lab, computers
will be available for participants to access background identifiers and audio clues in hopes that these items may be recognizable to Lab participants. Accompanying each sanitized
picture will be a real-time message thread where participants
can post their comments. You may have the piece of the
puzzle that could lead to the rescue of a child victim. Due
to the sensitivity of this issue, please make sure to wear your
conference badge and bring proof of identity to gain entry.
Recovering Volatile Data
Part 1 & 2
Tuesday, May 11th - 1:00 pm - 4:30 pm
Friday, May 14th - 8:00 am - 11:30 am
Room: Daytona
Christopher Armstrong & David Bishop
Lecture and Lab: This lab covers the collection of “Volatile
Data”, data which Law Enforcement has historically overlooked or ignored. Students will be provided with free software resources they can use to collect and view the Volatile
Data or RAM from a running computer.
RoundUp Investigations
Part 1 - 4
Wednesday, May 12th - 8:00 am - 4:30 pm
Thursday, May 13th - 8:00 am - 4:30 pm
Room: City Terrace 11
Wednesday, May 12th - 8:00 am - 4:30 pm
Room: City Terrace 12
Robert Erdely & Michael Hill & D. Matthew Powell
Course Title: P2P investigation course using RoundUp
software. Prerequisite course: Understanding the Gnutella
Network / Child Exploitation Website. Students will receive
instruction on how to use the Gnutella Network to conduct
child exploitation investigations. At the conclusion of this
training, students will have the tools and training necessary
to conduct these pro-active investigation on the Gnutella
network, giving them the ability to investigate persons
sharing child pornography in their respective jurisdictions.
Students completing the 4-part RoundUp lab are strongly
PROTECTING OUR CHILDREN
encouraged to attend the ICAC COPS for Investigators lab
and the Understanding the Gnutella Network lecture session. To attend this lab you must work for a law enforcement or prosecutorial agency that is an ICAC task force or
affiliate.
Secure Techniques for Onsite Preview (STOP) with
the TUX4N6(TM) Previewing and Triage tool
Part 1 - 4
Tuesday, May 11th
Wednesday, May 12th
Wednesday, May 12th
Thursday, May 13th
Thursday, May 13th
Friday, May 14th
Room: City Terrace 7
Nick Newman & Herb Scott
A condensed version of NW3C’s two day STOP course using the TUX4N6(TM) tool. This is a full day event consisting of Lectures and Lab, emphasizing forensically sound
on-scene previewing techniques.
Social Networking - Introduction and Proactive
Investigations
Thursday, May 13th - 8:00 am
Thursday, May 13th - 10:00 am
Room: Orlando
Lauren Wagner & James Williams
This workshop will provide students with an overview of social networking websites and how these websites can be useful to investigations. Students will also learn how to set up
an investigative social networking account. This workshop
will also cover proactive techniques for social networking
websites, specifically the “My #1 Friend is a Cop” program,
which can be started in the students’ respective jurisdictions.
This workshop is designed for beginners.
Social Networking - Investigative Tools, Tips and
Techniques
Part 1 & 2
Wednesday, May 12th - 8:00 am - 11:30 am
Friday, May 14th - 8:00 am - 11:30 am
Room: Orlando
Lauren Wagner & James Williams
This workshop will teach participants how to effectively
search social networking websites (predominately MySpace,
Facebook, and Twitter) using Google Advanced Operators.
37
Computer Labs
This workshop will also cover techniques on capturing profiles for evidentiary purposes and well as mapping tools for
friend networks in both MySpace and Facebook.
Subject Identification – General Searches and Public Records
Tuesday, May 11th - 3:00 pm
Wednesday, May 12th - 10:00 am
Thursday, May 13th - 8:00 am
Friday, May 14th - 10:00 am
Room: City Terrace 10
Matthew McFadden
This lab will address how to use public information available
on the internet to search for subjects to establish leads and
gather information on a target.
The Child Protection System
Part 1 & 2
Wednesday, May 12th - 1:00 pm - 4:30 pm
Thursday, May 13th - 1:00 pm - 4:30 pm
Room: City Terrace 10
Friday, May 14th- 8:00 am
Room: City Terrace 8
Kevin West
This hands-on training will provide the investigator with
the latest innovations in Peer to Peer undercover operations.
This free system represents a major change in how law enforcement can easily locate offenders in their jurisdiction,
monitor the offender locally and conduct a digital undercover investigation. TLO (Part One)-Child Protection System: Beyond Fairplay will provide the investigator with an
update on what is going on with TLO and the Child Protections System. The Child Protection System is the on-line
and newest version of Peer to Peer Investigations and gives
investigators an Interface to the Peer to Peer Undercover
database system. TLO- (Part Two) Forensic Scan: On-site
preview tool will give the investigators an overview of the
new Forensic preview tools that are being distributed to investigators who need to do on-site previews.
Undercover Chat Investigations Using AIM (AOL
Instant Messenger)
Tuesday, May 11th - 1:00 pm
Friday, May 14th - 8:00 am
Room: City Terrace 10
Tony Leonard
This lab is designed to introduce experienced undercover
38
chat investigators to the AIM chat client. Topics covered
will include web-based AIM chat rooms, locating child sexspecific chat environments, using multiple (linked) screen
names for investigations, and configuring AIM for undercover chat operations.
Undercover Chat Lab
Tuesday, May 11th - 3:00 pm
Friday, May 14th - 10:00 am
Room: City Terrace 4
Mike Duffey & Michael Sullivan
Creating an undercover persona in Yahoo and AIM chat
clients. Engaging possible sexual predators of children in
a chat session that will develop evidence of criminal activity. This training will also provide the students with skills to
identify the offender on the other end of the chat session.
Using Firefox as an Investigative Tool
Part 1 & 2
Wednesday, May 12th - 8:00 am - 11:30 am
Thursday, May 13th - 8:00 am - 4:30 pm
Room: City Terrace 9
Eliott Cohen
This lab will introduce attendees to the Firefox browser
(web) and how it can be a valuable tool during online investigations. Technology facilitated crimes are often linked
to internet activity through a browser. Persons engaging in
these crimes often leave valuable investigative leads scattered
about the internet and their browser. Social networking sites
have allowed criminals to hide in plain view, while limiting access to their information. We often unwittingly expose
information about ourselves while online. Using Firefox
browser may help identify investigative leads not present in
other browsers. This lab show learners discuss some differences between IE, Google Chrome and Firefox. Finally, this
lab will provide learners with ways to enhance the discovery
and validate information developed throughout their investigation through a hands on experience.
Windows Client Forensics (Windows 7)
Part 1 & 2
Wednesday, May 12th - 8:00 am - 11:30 am
Wednesday, May 12th - 1:00 pm - 4:30 pm
Thursday, May 13th - 8:00 am - 11:30 am
Thursday, May 13th - 1:00 pm - 4:30 pm
Room: City Terrace 8
Christopher Ard
2010 ICAC NATIONAL CONFERENCE
Computer Labs
This session will provide students with deep insight into the
latest Microsoft Operating System Windows 7. Students
will have an opportunity to learn via hands on exercises
with the very technologies that they will encounter in future investigations. Topics focus on items such as BitLocker
Full Volume Encryption, Virtualization, Media Technology,
Volume Shadow Copy, USB storage device analysis, Thumbcache, Recycle bin, SuperFetch, Internet Explorer, Event
Logging, NTFS File System Details, Windows Desktop
Search artifacts, and others.
Wireless Network Investigation
Part 1 & 2
Wednesday, May 12th - 8:00 am - 11:30 am
Thursday, May 13th - 8:00 am - 11:30 am
Room: Daytona
Christopher Armstrong & David Bishop
Lecture and Lab: This topic will introduce wireless technology and teach the attendee how to gather pre search warrant
evidence and evidence from the network at the scene. A portion of this topic will be a hands on lab, setting up wireless
routers, along with collecting evidence in the form of data
from the router.
PROTECTING OUR CHILDREN
39
40
2010 ICAC NATIONAL CONFERENCE
Lecture
Sessions
Since 1998, the ICAC Task Forces have conducted more than 41,000 Internet
Safety presentations, reaching more than 3.5 million parents, teachers and
children.
Lecture Sessions - Table of Contents
Page
Lecture Name
43. “Brianna Owns”: An Interagency Approach to Child
Victim Identification
43. 802.11 Explo
43. Adobe Photoshop, Digital Imaging and Law
Enforcement Part 1 & 2
43. Avoiding Personal Liability in Computer Searches
43. Basic Networking and Incident Response
43. Behavioral Analysis of Offenders Part 1 & 2
43. Behavioral characteristics of Sex Offenders
43. Beyond the Image: The Analysis of Child Sexual
Exploitation Images and Videos
44. Case Study: Joseph Okoh: Why the Howard Soccer
Coach Should Have Spent More Time on the Field
and Less on the Computer
44. Cellular Phone Forensics for Law Enforcement
Part 1 & 2
44. Charging Decisions and Pre-trial Motions: Other
Crimes Evidence; Discovery Issues
44. Child Pornography Trafficking via Usenet Groups
44. Child Sex Tourism Investigations Part 1 & 2
45. Community Outreach/Developing the ICAC
Relationship
45. Community Outreach: Actions Steps to Empower
Youth to be Web Wise in the Mobile World
45. Computer Forensics for Prosecutors: What Every
Prosecutor Needs to Know.
45. Craigslist Investigations
45. Cross-Examining the Defense Expert: Turning the
Defense Expert into Your Expert
45. Cyberbullying - A Message of Prevention and
Response
45. Detection of Encryption on Live Systems
45. Developing Effective Opening Statements and
Closing Arguments In Technology-Facilitated Child
Sexual Exploitation Cases
46. Direct Examination of a Forensic Expert
(Demonstration)
46. Direct Examination of a Forensic Expert (Lecture)
46. Discussion Panel: Youthful Offenders
46. Domain Name System Frailties and Their Impact on
Child Pornography Investigations
46. Encryption and Compelling a Password
46. Enough.org - Child Safety
PROTECTING OUR CHILDREN
Page
Lecture Name
46. Evolving Search and Seizure Issues in Child
Exploitation Cases
46. Facebook: Working with Law Enforcement
46. Exploitation Cases
46. Examining the Commercial Sexual Exploitation of
Children Part 1 & 2
47. Federal Sentencing Issues
47. Forensic Discussion Group: Is Field Initiated Forensics
the Answer to Backlogs?
47. Forensic Evidence: When is Enough, Enough?
47. Fourth Amendment Principles and Issues Part 1 & 2
47. Gigatribe Investigations
47. Grooming Evidence: Presenting it in Court and
Limitations on Its Use
47. ICAC / FBI Task Forces
48. ICAC in Tribal Communities Discussion Group: How
Do We Get an MOU?
48. ICAC Investigations: Working with the Media
48. ICAC Unit Supervisor Training
48. Investigation and Prosecution of Cases from Photo
Sharing Sites (Flicker/Photobucket)
48. Investigation of Suspects in Social Networking
48. Investigations Discussion Group: What’s on the
Horizon for Child Exploitation Investigations
48. Justice Across State Lines: An Inter-Jurisdictional
Prosecution (State of Ohio v. Ingram)
48. Legally Limiting Defense Discovery of Sexually
Exploitative Images of Children
49. Linux for First Responders
49. McGruff SafeGuard
49. Mentoring Opportunities for Educating Young
Students on Internet Safety
49. Metzger Case Study
49. Microsoft COFEE
49. Microsoft Xbox, Xbox 360 and Live! Investigations
49. Military Resources in Child Exploitation Investigations
50. Mobile Social Networking
50. NCMEC Resources
50. NetSmartz Workshop: Tools to Teach Internet Safety
50. Officer Safety in Internet Operations: Operational
Planning
50. OJJDP Grant funding and Managing the ICAC Task
Force
41
Lecture Sessions - Table of Contents (continued)
Page
Lecture Name
50. Online Groups: Investigations, Forensics, and
Prosecutions Part 1 & 2
50. Operation Digital Offense
51. Partnering in Crime: Ways to Successfully Coordinate
Federal and State Child Exploitation Prosecutions
51. Patterns and Trends in Online Victimization
51. Presenting the Internet Safety Message
51. Preserving Evidence from the Cloud
51. Protecting our Nation’s Children
51. Protecting Youth Online: Internet Safety, Security,
and Ethics
51. Proving Your Child Pornography Case and Meeting
Common Defenses with Computer Forensics
52. Richard Raymer Case Presentation
52. Sentencing Issues
52. Sex Offender Registration and Enforcement
52. SHIFT: Supporting Heroes in Mental Health
Foundation Training A Workshop for
Professionals Exposed to Child Sexual Abuse
Images at Work Part 1 & 2
52. The Use of an Undercover Website to Combat the
Child Pornographer
52. To Use or Not Use the Polygraph Examination
Technique in Crimes against Children
Investigations
53. Undercover Chat Investigations
53. Understanding “Sexting” and What Can Be
Done About It
53. Understanding the BitTorrent File Sharing Network
53. Understanding the Gnutella Network
53. Utilizing Non-Profit Organizations to Expand the
Reach of the ICAC Program
53. Web 3.0: Blending of Augmented Reality and
Virtual Worlds
53. Very Young Girls: Child Victims in the Commercial
Sex Industry Part 1 & 2
54. What Use Is Research? Research Findings About
ICAC What’s Next????
54. Windows 7 Forensics
54. Windows Client Forensics (Windows XP)
54. Women Who Sexually Offend Using Technology
Part 1 & 2
42
Page
Lecture Name
54. Working with a Computer Forensic Examiner and
Presenting Digital Evidence
54. Working with Yahoo! on Child Exploitation
Investigations
2010 ICAC NATIONAL CONFERENCE
Lecture Sessions
INVESTIGATIONS
“Brianna Owns”: An Interagency Approach to Child Victim Identification
Tuesday, May 11th - 1:00 pm
Wednesday, May 12th - 3:00 pm
Room: Grand Ballroom 1
Jennifer Torpie & Steve LaPorta
This unique case study demonstrates how the efforts to identify one at-risk child depicted in a series of child pornography
led to the identification of eighteen additional victims. The alleged suspect exploited adolescent boys via MySpace by posing
as an adolescent girl. The suspect used deception, bribes, and
even threats, to coerce his victims into self-producing graphic
images of child pornography. This case study illustrates how
the suspect used the Internet to recruit both victims and likeminded offenders. Participants will learn the investigative steps
taken to identify the suspect along with the valuable information revealed by the forensic examination of the evidence. This
case illustrates what can happen when multiple law enforcement agencies and NCMEC’s Exploited Children Division
work collaboratively towards a shared goal.
be used by criminals to protect themselves from law enforcement will be addressed. Attendees of previous years sessions
will find all new information. Law enforcement attendees will
be provided access to law enforcement only training resources.
Avoiding Personal Liability in Computer Searches
Tuesday, May 11th - 1:00 pm
Room: Grand Ballroom 8
Charles Gillingham
This class will cover federal privacy laws that affect personal
civil liability to law enforcement officers. It will also review
the relevant law unique to the search and seizure of electronic
evidence
Basic Networking and Incident Response
Wednesday, May 12th - 3:00 pm
Room: River Terrace 1
Matthew McFadden
This lecture will address how to respond to networked computers and how to perform an incident response in order to collect
sufficient evidence for an investigation.
Behavioral Analysis of Offenders
802.11 Explo
Wednesday, May 12th - 1:00 pm
Room: River Terrace 1
Vincent Costagliola
Wireless technology has fundamentally changed law enforcement tracking and intercepts paradigms. With the pervasive
deployment of wireless technology, nefarious elements have
latched on with sophisticated and effective techniques to exploit wireless. Despite these threats, organizations are deploying Wi-Fi technology at a break-neck pace allowing nefarious
elements to hide in the wireless ether. The presenter will focus
on the use of the common tools used in the commission of unlawful acts. This will be demonstrated through use of historical
events such as the Mumbai attacks, various child exploitation
cases, FISA and terrorism circumstances and events.
Part 1 & 2
Wednesday, May 12th - 1:00 pm
Thursday, May 13th - 1:00 pm
Room: Terrace Pavilion 1
Joe Sullivan
Behavioral Characteristics of Sex Offenders
Tuesday, May 11th - 1:00 pm
Room: Terrace Pavilion 1
Michael Bourke
This session will describe psychological and behavioral characteristics of sex offenders, especially Internet sexual offenders.
The presentation will address motivational pathways, risk assessment, and the correlation between child pornography and
hands-on sex offenders. The implications of “crossover” also
will be discussed.
Adobe Photoshop, Digital Imaging and Law Enforcement
Part 1 & 2
Thursday, May 13th - 8:00 am
Room: Grand Ballroom 3
John Penn
Adobe Systems scientist & solutions architect, John Penn II,
will be showing to Law Enforcement for the first time, many
brand new Photoshop and other new Adobe technologies and
techniques. Techniques valuable in ICAC and other law enforcement investigations will be demonstrated. It will provide
law enforcement with a balanced understanding of the benefits
and costs of digital evidence in their cases. Techniques that can
PROTECTING OUR CHILDREN
Beyond the Image: The Analysis of Child Sexual Exploitation Images and Videos
Wednesday, May 12th - 8:00 am
Room: Grand Ballroom 3
Thursday, May 13th- 10:00 am
Room: Terrace Pavilion 2
James Cole
This class will discuss and demonstrate the analysis of child
sexual exploitation images and videos. Learn how to see beyond the victim and identify the clues that can focus the investigation and lead to the rescue of child victims and the ar43
Lecture Sessions
rest of abusers or prove the abuse in the courtroom. Learn how
to identify seemingly innocuous items that can turn out to be
critical clues to solving the case. This class will use real cases to
highlight the skill set including the image analysis conducted
to help identify the victim of the “Vicky” series, one of the
most prolific and highly traded series of child pornography on
the Internet. This class will use sanitized images of child sexual
exploitation material.
Case Study: Joseph Okoh: Why the Howard Soccer Coach
Should Have Spent More Time on the Field and Less on the
Computer
Tuesday, May 11th - 1:00 pm
Thursday, May 13th - 1:00 pm
Room: Grand Ballroom 6
Friday, May 14th- 10:00 am
Room: Grand 3
Tom Garrett & Rusty McGuire
Joseph Okoh left his place just outside of D.C. to meet what
he thought was a 13 year-old child for sex in a rural Virginia
county. Never did he think a small rural county in Virginia had
recently launched a comprehensive Child Safety Initiative “CSI
Louisa.” His season as Howard’s soccer coach recently ended
and his freedom for the next 14 years ended that day. This
presentation will begin with information on the child enticement investigation, review the powerful impact of digital trial
presentation, online investigative techniques and sentencing issues that were used to apprehend and convict Okoh. While this
course will focus on the Okoh trial, other trials prosecuted by
the presenter will be used to demonstrate the learning objectives.
Cellular Phone Forensics for Law Enforcement
Part 1 & 2
Wednesday, May 12th - 8:00 am
Room: Grand Ballroom 8
Thursday, May 13th- 1:00 pm
Room: Grand 1
Michael Weber & Keith Daniels
Cellular phone technology has become a pervasive tool used
by child sexual predators. Thus, cell phone forensics is a crucial
component of child sexual predator investigations. This lecture will cover the different cellular phone technologies, both
here and abroad. It will focus on and demonstrate the various techniques law enforcement agencies can use to triage and
capture digital media from cell phones. This will include how
and where to find potential evidence from a variety of devices
relevant to child sexual predator investigations. Attendees will
also learn about standard procedures for the forensic acquisition, preservation, examination, analysis, and reporting of digital information present on cell phones. Finally, the lecture will
44
discuss some of the counter-cell phone forensic techniques that
are currently being used.
Charging Decisions and Pre-trial Motions: Other Crimes
Evidence; Discovery Issues
Thursday, May 13th - 3:00 pm
Room: Clearwater
Alison Cauthorn
This lecture session will focus on the different elements of
charging technology-facilitated child sexual exploitation cases.
The presenter will focus on the different types of charges that
can be brought in these cases as well as the evidence necessary
to support different levels of charges. The presenter will also
talk about the use of presenting other acts evidence through
Motion in Limine practice, as well as effective arguments for
persuading judges to admit the crucial evidence of intent or
motive. Finally, the lecture will also touch on discovery issues
under the Adam Walsh Act for state prosecutors.
Child Pornography Trafficking via Usenet Groups
Tuesday, May 11th - 3:00 pm
Room: Grand Ballroom 6
Michael Geraghty
The mass distribution of child abuse images and movies is efficiently carried-out via the Internet’s Usenet newsgroups to
a vast audience around the world. Much like other distribution methods - peer-to-peer networks and the IRC, extremely
large digital collections of multimedia files documenting the
abuse of children can be obtained in a very short time, with
relative ease and little fear of being caught. This module will
provide students with a thorough explanation of the Usenet
Newsgroups and their role in the exploitation of children on
the Internet. Topics covered will include the technological
make-up of the Usenet, the propagation of child abuse images
and movies via news servers, as well as, investigative techniques
that can be used to combat these crimes.
Child Sex Tourism Investigations
Part 1 & 2
Wednesday, May 12th - 8:00 am
Room: Grand Ballroom 6
Steven Grocki & Deborah Crane
This lecture will focus on Child Sex Tourism Investigations.
This will provide an overview of applicable federal statutes, to
include venue considerations. The lecture will cover investigative techniques, recovering evidence, foreign law enforcement
cooperation, obtaining the defendant from the foreign jurisdiction, and witness consideration.
Community Outreach/Developing the ICAC Relationship
Friday, May 14th - 8:00 am
2010 ICAC NATIONAL CONFERENCE
Lecture Sessions
Room: Grand Ballroom 7
Bill Carroll
This presentation illustrates developing a mission statement
unique to the particular ICAC Task Force, with objectives, timelines and deliverables consistent with the grant application. The
example followed by the Oregon ICAC will be demonstrated as
follows: First Phase: Developing affiliates and working relationships with law enforcement, prosecutors. Second Phase: Developing partnerships with schools and community groups. Third
Phase: Developing relationships with Community Corrections.
Community Outreach: Actions Steps to Empower Youth to
be Web Wise in the Mobile World
Thursday, May 13th - 3:00 pm
Room: Grand Ballroom 7
Esther Cookson & Micah Smith
This session explores educational, pro-active approaches that
bring digital and mobile safety education into your community. Attendees will be introduced to a customizable action steps
plan for schools and your community that address responsible
use of digital technology and the dangers youth face: textual
harassment, sexting, chat roulette and teen domestic violence.
We will address ways you can leverage community partnerships through the media and local grants to start initiatives in
your own community. Attendees of this workshop will be introduced to the new interactive role-playing cell phone safety
game, “It’s Your Call” and receive free trial licenses to the game.
class is especially aimed towards investigators who have UC
chat experience.
Cross-Examining the Defense Expert: Turning the Defense
Expert into Your Expert
Wednesday, May 12th - 8:00 am
Room: Clearwater
Justin Fitzsimmons
This lecture will discuss the common defenses raised by defense
computer forensic examiners. Students will be given different
practical methods for cross-examining the defense expert. Students will also be given tips on how to use the defense expert to
prove the validity of their own expert. Finally, students will be
able to ask various questions using their own cases for possible
areas of cross-examination.
Cyberbullying - A Message of Prevention and Response
Wednesday, May 12th - 1:00 pm
Room: Grand Ballroom 7
Joe Laramie
Computer technology can allow kids and teens to be faceless
or anonymous. This workshop will give a perspective of how
technology can facilitate cyberbullying and what messages can
be taught to prevent victimization. Tips and best practices to
the response by schools and law enforcement to this issue will
also be covered.
Detection of Encryption on Live Systems
Computer Forensics for Prosecutors: What Every Prosecutor Needs to Know.
Thursday, May 13th - 8:00 am
Room: Clearwater
Justin Fitzsimmons
This will be a basic instruction class in the elements of a computer forensics examination. Students will be given a report and
walk through it step-by-step to demonstrate what evidence is
included in the report and how that evidence can be effectively
used to successfully prosecute technology-facilitated child sexual exploitation cases.
Craigslist Investigations
Tuesday, May 11th - 1:00 pm
Room: Grand Ballroom 2
Wednesday, May 12th - 3:00 pm
Room: Grand Ballroom 3
Wayne Nichols
Craigslist has seen a growing trend where suspects are posting and seeking out juveniles to have sexual contact with. The
Henderson, NV Police Department will discuss their proactive
methods that have been very successful for them in 2009. This
PROTECTING OUR CHILDREN
Thursday, May 13th - 1:00 pm
Thursday, May 13th - 3:00 pm
Room: Grand Ballroom 8
Jeremiah Johnson
This is a lecture with demonstration of the Live Encryption
and Analysis Program, LEAP(TM) tool, developed through a
partnership of NW3C, West Virginia State Police, and West
Virginia University. The LEAP(TM)tool will identify common
encryption utilities that may be present on a live computer system.
Developing Effective Opening Statements and Closing Arguments In Technology-Facilitated Child Sexual Exploitation Cases
Tuesday, May 11th - 3:00 pm
Room: Clearwater
Justin Fitzsimmons & Rami Badawy
In this lecture session students will be instructed on various
themes that can be used in creating an opening statement and
closing argument. The instructor will focus on the ingredients
necessary for making both a persuasive opening statement as
well as closing argument. The instructor will demonstrate how
45
Lecture Sessions
to weave technological evidence into both openings and closings to make them more powerful.
Direct Examination of a Forensic Expert (Demonstration)
Wednesday, May 12th - 3:00 pm
Room: Clearwater
Encryption and Compelling a Password
Wednesday, May 12th - 8:00 am
Room: Terrace Pavilion 2
Wednesday, May 12th- 1:00 pm
Room: Grand 8
Justin Fitzsimmons & Micah Smith
This session will contain the direct examination of a computer
forensic examiner. It will cover the basics of laying the foundation for the forensic examiner as an expert witness; effectively
presenting the nuts and bolts of a computer examination; and
explaining different analogies for computer forensic examinations and demonstrating how to persuasively present digital
evidence in court. The class will be interactive with frequent
breaks to allow students to ask questions.
Philip Coduti & Robert Butterfield
During this discussion, you will be briefed on a recent case of
sexual exploitation of a child and how the suspect was compelled by court order to enter his password. The crime involved
a live victim along with manufacture and distribution of child
pornography. The digital evidence in this case included encrypted partitions on two separate hard drives. The discussion
will also cover information on encryption methods, the feasibility of cracking them, and the significance of the wording in
the court order.
Direct Examination of a Forensic Expert (Lecture)
Enough.org - Child Safety
Wednesday, May 12th - 1:00 pm
Room: Clearwater
Wednesday, May 12th - 8:00 am
Room: Grand Ballroom 7
Justin Fitzsimmons
This class will focus on the necessary requirements to lay the
foundation for calling a computer forensic examiner as an expert witness at trial. The course will discuss the different aspects
of a forensic expert’s testimony and give tips on effectively presenting this evidence at trial.
Donna Rice Hughes
Improve Internet Safety Trainings and meet OJJDP public education requirements with new OJJDP funded Internet Safety
101 multi-media program (4 part DVD, workbook, website).
Developed to educate, equip and empower parents, educators
and law enforcement to protect children from pornography,
predators, cyberbullies and to keep kids safe on social networking sites, gaming and mobile devices. Contains poignant stories
and advice from industry leaders, psychologists, law enforcement, victims, parents, kids and a convicted sex offender. Can
be used as plug ‘n play or tailored, with or without facilitator,
small and large audiences.
Discussion Panel: Youthful Offenders
Wednesday, May 12th - 1:00 pm
Room: River Terrace 3
Will Bronson & Antonio Sutton & David Ferris & Allison
Turkel & Will Favrot
This panel discussion will discuss the nuances associated with
investigating, prosecuting, and supervising youth involved with
the manufacture, distribution, and/or possession of child pornography. Panelist will include an investigator, an attorney, and
a juvenile probation representative.
Domain Name System Frailties and Their Impact on Child
Pornography Investigations
Thursday, May 13th - 8:00 am
Room: Grand Ballroom 6
Michael Geraghty
From domains containing non-Latin characters to unlimited
gTLDs, 2010 will present investigators with new challenges
in carrying out online child sexual exploitation investigations.
This module will provide students with an overview of upcoming domain name system changes and their impact on ICAC
investigations. Students will also be introduced to the role of
the Internet Corporation for Assigned Names and Numbers
(ICANN) as it relates to Internet governance.
46
Evolving Search and Seizure Issues in Child Exploitation
Cases
Tuesday, May 11th - 3:00 pm
Room: Saint John’s
Thursday, May 13th- 1:00 pm
Room: Clearwater
James Anderson
Participants will be provided with an overview of privacy and
search and seizure issues that arise in the investigation and prosecution of cases involving computer facilitated sexual exploitation of children. Emphasis will be on recent court rulings
and how the holdings in those cases might impact investigative
protocols.
Facebook: Working with Law Enforcement
Thursday, May 13th - 1:00 pm
Room: Grand Ballroom 2
Friday, May 14th- 10:00 am
Room: Grand 6
2010 ICAC NATIONAL CONFERENCE
Lecture Sessions
Alex Vichinsky & Jeff Wu
Facebook staff presentation on how their site works, what they
do to prevent issues/reduce risk for teens, and how they work
with law enforcement.
Federal Sentencing Issues
a result, investigators, prosecutors and forensic examiners are
facing a dilemma: When is enough forensic evidence enough?
During this presentation, participants will hear the perspectives
of three law enforcement officials: a prosecutor, investigator
and forensic examiner discussing how much evidence is enough
for a successful prosecution.
Wednesday, May 12th - 10:00 am
Room: Terrace Pavilion 1
Thursday, May 13th- 10:00 am
Room: Grand 2
Fourth Amendment Principles and Issues
Part 1 & 2
Kevin Blackwell & Alan Dorhoffer & Kim Hunt
This session will discuss issues related to child exploitation offenses and how these offenders are sentenced in the federal system. The presentation will discuss both the offense characteristics of these offenses and the offender characteristics of individuals convicted of these offenses. The session also will include
a discussion on the effects of post-Adam Walsh changes to the
federal statutes and the sentencing guidelines. The presentation will highlight sentencing trends in the number of federal
child exploitation cases sentenced, the sentence lengths, and
the types of sentences imposed in these cases. The presenters
will discuss future research plans that will investigate recidivism among offenders previously sentenced under federal child
pornography statutes, with a special emphasis on the degree to
which former offenders reoffend with a new sex crime.
Thomas Clancy
A review of the basic principles regarding applicability and
satisfaction of the Fourth Amendment as they relate to ICAC
investigations, including the requirements for search warrants,
the proper execution of warrants, and the application of selected warrant exceptions under which searches are considered
reasonable. Will include review of pertinent court decisions
and updates, as appropriate, on particular decisions impacting
search and seizure of digital evidence.
Forensic Discussion Group: Is Field Initiated Forensics the
Answer to Backlogs?
Thursday, May 13th - 10:00 am
Room: Grand Ballroom 8
Chris Holloway & Eric Devlin & Nathan Mousselli & David Johnson
This discussion group will explore the future of the computer forensic process. Attendees will hear about innovative approaches to conducting on scene forensic exams, as well as have
the opportunity to discuss their own approaches to conducting
forensics. This is a discussion group, so attendees are strongly
encouraged to ask questions and participate in the group dialogue.
Forensic Evidence: When is Enough, Enough?
Wednesday, May 12th - 10:00 am
Room: River Terrace 3
Jeffrey Gersh & Justin Fitzsimmons & Mike Duffey & Michael Sullivan
Three years ago, the average household only had one computer.
Today, a typical home will have multiple computers, as well as
numerous other devices that could contain child pornography.
In addition, the size and volume of media storage devices are
getting larger and larger. This has created a large backlog for forensic examiners, sometimes spanning six or more months. As
PROTECTING OUR CHILDREN
Wednesday, May 12th - 1:00 pm
Room: Saint John’s
Thursday, May 13th- 1:00 pm
Room: River Terrace 1
Gigatribe Investigations
Wednesday, May 12th - 10:00 am
Room: River Terrace 1
Thursday, May 13th- 10:00 am
Room: River Terrace 3
J. Brooke Donahue
Gigatribe Investigations - this lecture will cover how the Gigatribe application works, jurisdictional considerations of target identification, elements to support indictment counts, and
general forensics.
Grooming Evidence: Presenting it in Court and Limitations on Its Use
Thursday, May 13th - 10:00 am
Friday, May 14th - 8:00 am
Room: Saint John’s
Justin Fitzsimmons & Rami Badawy
This session will focus on what grooming evidence is and how
it can be introduced at trial. The session will instruct students
on the various jurisdictions where grooming evidence has been
allowed and the different ways it can help prove the elements of
a charge. The session will conclude by showing the students the
limitations on this type of evidence.
ICAC / FBI Task Forces
Wednesday, May 12th - 8:00 am
Room: Grand Ballroom 1
Thursday, May 13th- 10:00 am
47
Lecture Sessions
Jim Granozio & Joe Laramie
Co-presenting with ICAC representative regarding FBI Cyber
Crime Task Force Program and the benefits it offers.
when you obtain it. The second part is how to take these types
of investigations and develop a case that can be brought for
successful prosecution including identifying the suspect, tying
the posts and images to that suspect, and identifying victims
of the abuse.
ICAC in Tribal Communities Discussion Group: How do
we get an MOU?
Investigation of Suspects in Social Networking
Room: Grand Ballroom 6
Wednesday, May 12th - 3:00 pm
Room: Grand Ballroom 7
Amy Staubs & David Matthews & Gregory Ayco & Richard
VanBoxtel & Amy Evans
This session will be an open dialogue on building collaborative
relationships between the ICAC task forces and tribal communities. Discussion will touch on: • the scope of technology-facilitated crimes against children in Indian Country, • the need
for public awareness/community education on Internet safety,
• investigative capacity and training needs of tribal law enforcement, and • how to work with the tribal council to obtain an
MOU.
ICAC Investigations: Working with the Media
Tuesday, May 11th - 1:00 pm
Room: Saint John’s
Hugh Munn
Presentation featuring PowerPoint, videos, etc. to discuss the
most effective ways for working with the media involving
ICAC investigations. This lecture will include a review of the
fractured and re-structured news media and how the role of
social media has become a key tool in crafting a message that
will ensure better cooperation and productivity with the media.
ICAC Unit Supervisor Training
Wednesday, May 12th - 8:00 am
Friday, May 14th - 8:00 am
Room: Saint John’s
Randy Schriefer
Intro on what to expect from the ICAC Unit Supervisor Training class and some key issues
Investigation and Prosecution of Cases from Photo Sharing
Sites (Flicker/Photobucket)
Tuesday, May 11th - 3:00 pm
Room: Grand Ballroom 2
Eric Devlin & Gary Spurger
This class is a how-to for investigators on child exploitation
and child pornography cases that arise out of photo sharing
websites (including Photobucket/Flicker). The first part to be
covered includes how those types of reports are received, how to
initiate your investigation, what type of information you need
and how to obtain it, and what to do with the information
48
Wednesday, May 12th - 10:00 am
Room: Grand Ballroom 2
Thursday, May 13th- 8:00 am
Room: Grand 1
Kevin West
This course will cover how to research suspects on social networking sites, how to record the information properly, and
how to plan and prepare your court orders for social networking sites.
Investigations Discussion Group: What’s on the Horizon
for Child Exploitation Investigations
Wednesday, May 12th - 8:00 am
Room: River Terrace 3
Chris Holloway & Matthew Dunn & Michael Geraghty &
Michael Sullivan
This discussion group will examine the new and emerging ways
offenders are attempting to exploit children. Panelists will present on the emerging technologies and Internet applications on
the horizon, as well as discussing the investigative techniques
used to infiltrate them. This is a discussion group, so attendees
are encouraged to ask questions, share their experiences, and
offer information on other technologies not discussed by the
panel.
Justice Across State Lines: An Inter-Jurisdictional Prosecution (State of Ohio v. Ingram)
Wednesday, May 12th - 1:00 pm
Friday, May 14th - 10:00 am
Room: Grand Ballroom 1
Frankie Goldberg & Jesse Canonico
In 2009, Assistant Prosecuting Attorneys Frankie Goldberg
and Jesse Canonico of the Cuyahoga County Prosecutor’s Office and the Ohio ICAC Task Force teamed with members of
ICAC Task Forces in South Carolina, Georgia and Utah to
successfully prosecute a case that spanned at least four different
states over 7 years. Interstate cooperation between these Task
Forces led to the location of vital witnesses and key evidence
that helped to secure a 10-year prison sentence.
Legally Limiting Defense Discovery of Sexually Exploitative Images of Children
Wednesday, May 12th - 10:00 am
Room: Clearwater
2010 ICAC NATIONAL CONFERENCE
Lecture Sessions
Thursday, May 13th- 10:00 am
Room: St. Johns
Donald Mason
An examination of statutory and rule-based constraints on the
disclosure and discovery of images of child sexual exploitation
in criminal cases, including review of relevant state and federal
case law and discussion of related practical and case management considerations.
Linux for First Responders
Friday, May 14th - 10:00 am
Room: Terrace Pavilion 2
Scott Pancoast
This is a lecture with demonstration on identifying and the initial handling of various Linux systems.
Metzger Case Study
Tuesday, May 11th - 1:00 pm
Wednesday, May 12th - 3:00 pm
Room: Grand Ballroom 3
Thursday, May 14th- 10:00 am
Room: Grand 2
Donald Whitehead & Jeffery Catt & Jennifer Barnes
Case study of a 53 year old who was found to be molesting
and videotaping/photographing 7 central Indiana girls between
the ages of 8-13. He was also running a sophisticated home
network of computers using TruCrypt. A live acquisition was
performed on-scene with successful results. Around 1 million
images of child pornography were recovered as well as original
video tapes of the victims.
Microsoft COFEE
McGruff SafeGuard
Friday, May 14th - 10:00 am
Room: Grand Ballroom 7
Ellen Ohlenbush
McGruff SafeGuard monitors and controls kids’ online activity, including: Facebook, MySpace, AOL, MSN, and Yahoo.
The product controls sites that kids are accessing. The Service
alerts parents and caregivers to potentially dangerous behavior,
such as cyber bullying, Internet predators, drug use or criminal activity. The service allows you to conveniently review your
children’s activities using a secure website, or to be notified of
potentially dangerous situations via cell phone & email alerts.
Mentoring Opportunities for Educating Young Students on
Internet Safety
Tuesday, May 11th - 3:00 pm
Room: Grand Ballroom 7
Carol Mulcahy & Cheryl Penna
The Berkshire District Attorney’s Office will showcase their
Student Mentor Internet Safety Program created in conjunction with the Massachusetts ICAC. The program utilizes the
Netsmartz Workshop, an interactive educational safety resource from NCMEC and the Boys & Girls Clubs of America.
The mentor program trains high school students to train their
younger peers, in grades K-2, basic Internet safety lessons using 3-D interactive video, positive behavior discussions and
arts and crafts activities. Attendees will be given the tools to
re-create this program in their own community. All program
materials will be provided including program description brochures, education standards, materials for schools and parents,
performance measure surveys and retention outcomes. Participants will be given tips on strategies for program development
and overcoming implementation hurdles.
PROTECTING OUR CHILDREN
Thursday, May 13th - 1:00 pm
Thursday, May 13th - 3:00 pm
Room: Terrace Pavilion 2
Friday, May 14th- 8:00 am
Room: River Terrace 1
Scott Pancoast
Lecture and demonstration of the Microsoft COFEE tool for
the collection of volatile data from a running system.
Microsoft Xbox, Xbox 360 and Live! Investigations
Tuesday, May 11th - 1:00 pm
Room: River Terrace 1
Christopher Ard
The Xbox and Xbox 360 enjoy a large following by both children and adults. These devices have the potential to store information that may be pivotal to an investigation and must be
handled in the same way as other computer based evidence.
This session will introduce investigators to the Xbox, Xbox 360
and the Live! Service. We will also discuss the unique capabilities of these devices —VOIP, Video Conferencing, Social
Networking and others. In addition, we will explore some of
the investigative techniques that must be employed to conduct
a successful investigation of these devices.
Military Resources in Child Exploitation Investigations
Wednesday, May 12th - 1:00 pm
Room: Grand Ballroom 3
Eric Trest & William Dent
This presentation will provide an overview of Military Criminal Investigative Organizations (MCIO) as they relate to
child exploitation investigations and operations within the
Department of Defense. There will be a discussion regarding
the unique resources and capabilities of the MCIO community and how their access and global presence can benefit your
organization. Additionally, the Defense Computer Forensic
49
Lecture Sessions
Laboratory (DCFL) Forensic Data Extraction (FDE) section
will demo a triage tool to extract pictures, movies, internet history, electronic mail, chat, and limited registry information in
cases involving digital evidence. The tool extracts data in a userfriendly interface and will be releasable to all law enforcement
who attends the presentation.
tions available for kids, tweens, teens, and parents and guardians.
Mobile Social Networking
Kenneth Hansen
Operational planning for Internet Undercover Operations. Assessing risk management for the typical offender. Planning for
search warrants and knock and talks. Arrest site selection and
review of the information available in chat logs
Friday, May 14th - 8:00 am
Room: Grand Ballroom 1
Eliott Cohen
Mobile devices have become a huge part of our everyday lives.
As a result, we have integrated/allowed many activities, once
performed only from home, to be performed on these devices. Little thought is often given to our personal area network
(PAN) which we broadcast a signal and/or what information
we have voluntarily given up in order to allow the use of applications (third party) on our mobile devices. This block will introduce participants to popular mobile social networking tools.
It will discuss how these mobile device applications provide a
virtual window into a user’s day-to-day activities, to include but
not limited to: real time geo-tracking, automatic uploads to image sharing sites and peer-to-peer file sharing. Discuss investigative strategies which should be considered when investigating
persons immersed in mobile social networking.
NCMEC Resources
Thursday, May 13th - 10:00 am
Room: Grand Ballroom 7
Thomas Sirkel
This workshop will provide the participants with updated information on the many remarkable and diverse array of resources
offered to investigators of Internet Crimes Against Children,
parents, community members, and other professionals by the
National Center for Missing & Exploited Children. It will also
include examples of our nationally known NetSmartZ videos
and special music to enhance the learning process. The tools
provided by this workshop are vital to the successful investigation and prosecution of Internet Crimes Against Children.
NetSmartz Workshop: Tools to Teach Internet Safety
Wednesday, May 12th - 10:00 am
Room: Grand Ballroom 7
Laurie Nathan
Discover cutting edge technology and invaluable safety information to provide kids, tweens, and teens with the necessary
tools to navigate the Internet and make safer decisions online.
Find out how zombies can teach kids how to handle cyberbullying, how a rapping robot encourages digital citizenship, and
how real-life stories can impact that hard-to-reach teen audience. Each participant will receive copies of the latest presenta50
Officer Safety in Internet Operations: Operational Planning
Wednesday, May 12th - 10:00 am
Friday, May 14th - 10:00 am
Room: Saint John’s
OJJDP Grant Funding and Managing the ICAC Task Force
Thursday, May 13th - 8:00 am
Room: Saint John’s
Will Bronson & Chris Holloway
In this session, participants will review OJJDP grant program
administrative requirements and discuss effective strategies
for managing Internet Crimes Against Children (ICAC) Task
Force Programs. Topics will cover a variety of grant issues, to
include: post award grant activities; basic reporting requirements; American Reinvestment and Recovery Act reporting requirements; resources for effective grant management; and the
ICAC Portal, including a functionality demonstration.
Online Groups: Investigations, Forensics, and Prosecutions
Part 1 & 2
Wednesday, May 12th - 1:00 pm
Room: Grand Ballroom 6
Thursday, May 13th- 1:00 pm
Room: Grand 3
Matthew Dunn & Steven Grocki & James Fottrell
This lecture will provide an overview of investigations, forensics, and prosecutions of online groups. Online groups present
a unique challenge to law enforcement in identifying members,
capturing evidence, and making appropriate prosecutorial determinations. The lecture will focus on several recent international investigations that have successfully identified and prosecuted numerous individuals involved in Internet forums and
social networking groups that were dedicated to the advertisement and distribution of child pornography.
Operation Digital Offense
Tuesday, May 11th - 1:00 pm
Room: River Terrace 3
Larry Baker & Rex Miller & Ethan Cumming
Operation Digital Offense was an FBI undercover operation
targeting Richard Fleming, a renowned computer security expert who was affiliated with an international child pornography
2010 ICAC NATIONAL CONFERENCE
Lecture Sessions
production and distribution ring known as Star Kids. Star Kids
members victimized hundreds of pre-pubescent males over an
extended period of time. Numerous members of this ring utilized sophisticated encryption tools, browser wiping programs,
and identity anonymizers to conceal their illegal activities. This
case study will show how the FBI utilized all the investigative
tools in its arsenal, to include many sophisticated and “lowtech” approaches not commonly used in child sexual exploitation investigations, to overcome Fleming’s sophisticated defenses and take down the last standing member of this ring.
Partnering in Crime: Ways to Successfully Coordinate Federal and State Child Exploitation Prosecutions
Wednesday, May 12th - 10:00 am
Room: Grand Ballroom 1
Richard Moultrie & Kevin McMurry
Richard S. Moultrie, Jr., Assistant United States Attorney for
the Northern District of Georgia, and Kevin T. McMurry,
Assistant District Attorney for the Coweta County, Georgia,
District Attorney’s Office, will discuss factors for determining
when child exploitation offenses originating on the local law
enforcement level, should be considered for exclusive federal
prosecution or dual prosecution by both entities. AUSA Moultrie and ADA McMurry will share strategies for successfully coordinating this effort, including a recent case study in which
their respective offices collaborated in the federal conviction of
a former emergency room doctor for the federal offense of child
pornography production. The defendant had originally been
charged by local law enforcement officers for the offense of attempted aggravated child molestation, and related offenses.
Patterns and Trends in Online Victimization
Thursday, May 13th - 8:00 am
Thursday, May 13th - 3:00 pm
Room: River Terrace 2
Friday, May 14th - 8:00 am
Room: Grand 6
Christine Feller
This session will demonstrate recent patterns and trends of
online victimization mined from NCMEC data as well as intriguing law enforcement investigations. Topics will include the
vulnerabilities of children using online gaming, cellular devices,
virtual communities and social networking. In addition, this
session will explore the difficult issue of “self-exploitation” that
is increasing in prevalence across the country. Various industry
efforts to reduce online child victimization will be presented.
Presenting the Internet Safety Message
Tuesday, May 11th - 1:00 pm
Room: Grand Ballroom 7
PROTECTING OUR CHILDREN
Joe Laramie
Presenting Internet safety to kids, teens and parents requires
connecting with each audience in a different way. Participants
will gain an understanding of the issues and difficulties, and get
tips and best practices to presenting to each of these groups.
Attendees will be provided with resources and materials to help
present this prevention message in their own schools and community.
Preserving Evidence from the Cloud
Wednesday, May 12th - 10:00 am
Room: Terrace Pavilion 2
Wednesday, May 12th- 3:00 pm
Room: Grand 8
Kelli O’Neill
This lecture will inform the audience about recent trends to
put digital records and other evidence at third party Application Service Providers (in the Cloud). It will provide solution
including California search warrant language and law that allows for the seizure, preservation and examination of digital
evidence from the Cloud.
Protecting our Nation’s Children
Wednesday, May 12th - 3:00 pm
Room: River Terrace 3
Timothy A. Williams
This presentation will focus on how INTERPOL Washington
processes, reviews, and electronically publishes INTERPOL’s
Red, Blue, Yellow Notices in coordination with appropriate law
enforcement agencies.
Protecting Youth Online: Internet Safety, Security, and
Ethics
Thursday, May 13th - 1:00 pm
Room: Grand Ballroom 7
Marsali Hancock
Understand the current risks and hot topics youth are facing
online and with other connected technology such as cellphones
(four main risks youth face online include giving out personal
information, pornography online, violent or hateful content,
and cyberbullying), and receive access to the iKeepSafe resources and presentations that you can tailor to specifically fit the
needs of your community at no cost. Create a community that
builds a generation of responsible, ethical and resilient digital
citizens.
Proving Your Child Pornography Case and Meeting Common Defenses with Computer Forensics
Thursday, May 13th - 8:00 am
Room: Grand Ballroom 8
Thursday, May 13th- 3:00 pm
51
Lecture Sessions
Room: Grand 6
Damon King & Johnathan Bridbord
Prosecutors, investigators, and computer forensics examiners
will learn how to effectively use computer forensics in child
pornography cases. Forensic methodology and points of evidence in computer systems, as well as how to analyze this data
and incorporate it as part of the overall case, will be covered.
Students will also be taught how to use computer forensic techniques to meet most common defenses.
Richard Raymer Case Presentation
Thursday, May 13th - 8:00 am
Room: Grand Ballroom 2
Dennis Carry
Trippinkid69: The case study of now third-time convicted sex
offender Richard Lee Raymer. This case involved the cooperation of multiple agencies and local media allowing for a more
detailed investigation by ICAC rather than a lesser crime suspected. The resulting investigation with ICAC and cooperation
by other agencies allowed for a victim rescue and a third sex
offense conviction for the offender. During Raymer’s previous
prison incarceration, he made notes in journals during his sex
offender treatment program indicating his desires for 10 year
old boys and his intentions when released from prison.
Sentencing Issues
Friday, May 14th - 10:00 am
Room: Saint John’s
Alison Cauthorn
During this lecture students will be shown various methods
for achieving significant sentences in technology-faciliated
child sexual exploitation cases. The session will focus on different methods to educate the judiciary on the horrible nature of
these crimes as well as provide different approaches for securing appropriate sentences. The presenter will focus on effective
themes to be employed as well as resources, from NGO’s as well
as the research, to attack the belief that these are “just picture”
cases.
Sex Offender Registration and Enforcement
Wednesday, May 12th - 8:00 am
Room: Terrace Pavilion 1
Allison Turkel
This lecture will provide a brief history of sex offender registration laws. An overview of the Sex Offender Registration and
Notification Act(SORNA)will be provided. Current issues
and topics related to sex offender registration, notification and
management will be discussed.
52
SHIFT: Supporting Heroes in Mental Health Foundation
Training A Workshop for Professionals Exposed to Child
Sexual Abuse Images at Work
Part 1 & 2
Thursday, May 13th - 1:00 pm
Room: Saint John’s
Jane Stevenson & Chuck Arnold
This three hour course will offer exposed individuals (Law Enforcement Officers, Analysts, Prosecutors) the opportunity to
learn about the causes and symptoms trauma that may occur as
a result of their duties. Participants will learn how to develop
effective coping strategies to deal with the negative effects of
trauma. In addition the exposed individual will be given the
tools to create a supportive work environment, effectively utilize mental health support and tools to create support for their
families and their peers.
The Use of an Undercover Website to Combat the Child
Pornographer
Tuesday, May 11th - 3:00 pm
Room: Grand Ballroom 3
Wednesday, May 12th- 8:00 am
Room: Grand 2
D. Todd Zerfoss
This block will take a look at how an undercover website can
benefit child pornography investigators and a few of the success stories that were made possible because of the use of an
undercover website.
To Use or Not Use the Polygraph Examination Technique in
Crimes against Children Investigations
Tuesday, May 11th - 3:00 pm
Room: Grand Ballroom 1
Steven Edwards
This module will provide the attendee with a basic understanding of the polygraph examination procedure and how it can be
used most effectively in crimes committed against children. It
will provide the attendee with what information a polygraph
examiner will need to conduct the most effective examination.
The participants will be provided with what is expected of them
in their investigative and interview strategies to insure the best
possible polygraph examination outcome. Various examination techniques will be discussed and what method(s) are best
in cases involving victims and suspects in crimes committed
against children. The presentation will include some case examples as well as the theories of polygraph techniques.
2010 ICAC NATIONAL CONFERENCE
Lecture Sessions
Undercover Chat Investigations
Understanding the Gnutella Network
Tuesday, May 11th - 3:00 pm
Thursday, May 13th - 1:00 pm
Room: River Terrace 3
Wednesday, May 12th- 10:00 am
Room: Grand 3
Tuesday, May 11th - 3:00 pm
Friday, May 14th - 8:00 am
Room: Terrace Pavilion 2
Chad Gremillion & Tony Leonard
This is an overview of emerging chat environments such as
Meebo and Facebook, the latest ways that predators are communicating in these environments, and discuss ways to capture
evidence. We will also discuss the latest updates and new features in AIM and Yahoo!
Understanding “Sexting” and What Can Be Done About It
Tuesday, May 11th - 1:00 pm
Room: Clearwater
Tuesday, May 11th - 3:00 pm
Room: Terrace Pavilion 1
Thursday, May 13th- 10:00 am
Room: Grand 1
Friday, May 14th - 10:00 am
Room: Grand 2
Priscilla Grantham
Examination of the production and dissemination of self-exploitative images by juveniles, with discussion of the incidence
of such behaviors and related concerns, explanation of why
such self-produced images may or may not constitute child
pornography, review of relevant laws and public policies, and
discussion of evolving response options available to investigators, prosecutors, courts, and schools.
Understanding the BitTorrent File Sharing Network
Friday, May 14th - 8:00 am
Friday, May 14th - 10:00 am
Room: River Terrace 3
Marc Liberatore & Brian Levine
Peer-to-peer (p2p) file-sharing networks are extensively used
for acquisition and distribution of images of child sexual exploitation. In this talk, we provide an introduction to BitTorrent, the most popular p2p application on the Internet. We
will describe how the system works, and how users leverage the
network to find and share content. We will then review sources
of evidence present in BitTorrent networks for use in child pornography investigations. We will draw analogies and points of
comparison to Gnutella and similar Internet investigations. We
will detail the challenges that law enforcement will face when
investigating BitTorrent.
PROTECTING OUR CHILDREN
D. Matthew Powell
This module will begin with a review of IP addresses, ports,
hash functions and geolocation technology. It will move into
an introduction to and demonstration of Gnutella P2P software applications. Participants will see the abilities of the P2P
networks to quickly circulate child sexual abuse images in the
global environment. The operation of the Gnutella P2P network and clients will be explained. A breakdown of the common clients involved in trafficking child pornography and used
during investigations will be discussed and trace evidence will
be explained. Globally Unique Identifiers (GUIDs), Push Proxies and network traffic will also be explained.
Utilizing Non-Profit Organizations to Expand the Reach of
the ICAC Program
Thursday, May 13th - 8:00 am
Room: Grand Ballroom 7
Amy Staubs & Wendy Jolley-Kabi
Learn how ICAC task forces are utilizing credible non-profit
organizations to support ICAC goals and objectives. Members
of the Association of Missing and Exploited Children’s Organizations (AMECO), actively support ICAC task forces and
other law enforcement agencies by delivering prevention and
education on Internet safety. Additionally, AMECO member
organizations have established partnerships with law enforcement to: maintain contact with families of missing children
(including runaways) and provide updates to investigators; assist with volunteer recruitment, training, and retention; and
support and coordinate large-sale search efforts.
Very Young Girls: Child Victims in the Commercial Sex
Industry
Part 1 & 2
Wednesday, May 12th - 1:00 pm
Room: Grand Ballroom 2
Allison Attenello
This presentation explores domestic trafficking and the commercial sexual exploitation of children (CSEC). Participants
will have the opportunity to view the 2007 Showtime Documentary “Very Young Girls,” an expose of human trafficking
that follows thirteen and fourteen year old American girls as
they are seduced, abused, and sold on New York’s streets by
pimps, and treated as adult criminals. Using the themes raised
in the film, the presentation examines who CSEC victims are,
as well as how law enforcement can identify and engage with
53
Lecture Sessions
these victims. The presentation highlights best practices for law
enforcement working with CSEC victims and emphasizes utilizing a victim-centered approach during investigation.
Web 3.0: Blending of Augmented Reality and Virtual
Worlds
Wednesday, May 12th - 8:00 am
Room: River Terrace 1
Wednesday, May 12th - 3:00 pm
Thursday, May 13th - 8:00 am
Room: Terrace Pavilion 2
Joseph Rampolla
Augmented Reality (AR) is a new high-tech science that is on
the verge of creating a technological explosion. The blending
of AR and Virtual Worlds creates negative opportunities for
technology to shape our society. The explosion of iPhone apps
are already utilizing AR technology. GPS and cell towers’ coordinates have created a live social networking phenomenon that
is likely to thrive in our broadband society. We will review these
cutting-edge applications, and demonstrate how the use of this
technology creates potential dangers in our world, highlighting
the opportunities for predators to exploit others — particularly
our children. Attendees will benefit from understanding the
magnetism of the dark side for adolescents and how predators
can capitalize on this new high-tech playground.
What Use Is Research? Research Findings About ICAC
Friday, May 14th - 8:00 am
Room: Grand Ballroom 3
Janis Wolak
OJJDP funded research by the Crimes against Children Research Center gives a “big picture” of the law enforcement
response to technology-facilitated child sexual exploitation
crimes and supports the direction of many ICAC programs.
For example, findings show that arrests have increased in all
categories of crimes (child pornography, undercover chat,
crimes with identified victims). Proactive initiatives are generating more arrests. More offenders are being incarcerated and
sentences are longer. This presentation will describe findings
about offenders, victims and dynamics of crimes. It will also
include discussion about child pornography offenders (How
many child pornography investigations catch child molesters
and which undercover operations are most productive for that
purpose? Are offenders caught in peer-to-peer investigations
different from those caught other ways?).
What’s Next????
Wednesday, May 12th - 1:00 pm
Room: Terrace Pavilion 2
Mike Duffey
This class will focus on new technologies that are affecting or
54
possibly will be affecting child exploitation investigations. Also
discussed will be legal issues and ways the various technologies can be used by suspects with regards to child exploitation
investigations.
Windows 7 Forensics
Thursday, May 13th - 8:00 am
Thursday, May 13th - 10:00 am
Room: River Terrace 1
Friday, May 14th- 8:00 am
Room: Grand 8
Jerrold Jones
Overview of the changes implemented by Microsoft’s latest version of the Windows operating system, Windows 7.
Windows Client Forensics (Windows XP)
Tuesday, May 11th - 3:00 pm
Room: River Terrace 1
Christopher Ard
This session will provide students with an understanding of
the Windows XP operating system beyond what the current
forensic analysis tools can provide. Topics focus on potential
evidentiary data such as log files, the Windows registry, system
restore points, EFS, building a reliable timeline, USB storage
device analysis, hidden data and Windows and Office metadata, Prefetch, and file system analysis.
Women Who Sexually Offend Using Technology
Part 1 & 2
Thursday, May 13th - 8:00 am
Friday, May 14th - 8:00 am
Room: Terrace Pavilion 1
Graham Hill
This presentation will look at the ways in which women are using technology to facilitate their exploitation of children. The
content will include video footage of interviews with women
who have offended using technology and explores what behavior analysis can offer professionals in these cases.
Working with a Computer Forensic Examiner and Presenting Digital Evidence
Tuesday, May 11th - 3:00 pm
Room: Grand Ballroom 8
Rusty McGuire
Most cases involve some aspect of digital evidence or the Internet. Often the prosecutor and judges are new to this evolving
area of the law. This workshop will focus on how to prepare a
forensic examiner for trial, how to qualify an examiner as an
expert and how to present digital evidence to a jury. This lecture will cover: 1. Understanding the capabilities of a computer
2010 ICAC NATIONAL CONFERENCE
Lecture Sessions
forensic examiner and how to prepare the examiner for trial. 2.
Understanding how to effectively present testimony and how
to address the defense team’s tactics 3. Deciding if you need an
expert and how to qualify them. Sample voir dire questions will
be provided to qualify an expert.
Working with Yahoo! on Child Exploitation Investigations
Tuesday, May 11th - 1:00 pm
Room: Terrace Pavilion 2
Jon Berroya
This class will provide law enforcement agents with a detailed
explanation of Yahoo!’s policies and procedures for detecting
and deterring online child sexual exploitation, including what
data we report to the National Center for Missing and Exploited Children (NCMEC). We will cover Yahoo!’s most popular
services and describe our data retention policies for subscriber
information and content on our network. Finally, we will provide a primer on the Stored Communications Act and how that
Act influences the types of data we can and will disclose in response to varying types of legal process.
PROTECTING OUR CHILDREN
55
56
2010 ICAC NATIONAL CONFERENCE
Speaker
Biographies
Since 1998, more than 250,000 law enforcement officers, prosecutors and other
professionals have received training from the ICAC Task Force Program.
Speaker Biographies
James Anderson
Chuck Arnold
Assistant United States Attorney
U.S. Attorney’s Office - Cheyenne Wyoming
Jim Anderson is an Assistant United States Attorney stationed
in Cheyenne, Wyoming. Jim has been a prosecutor for 30
years, having served the past fifteen years as an AUSA. His
current duties involve prosecuting cases involving the use
of technology to exploit children, federal firearm violations,
narcotics offenses, and white collar crime. In addition to his
prosecution duties, Jim is an instructor at the Wyoming Law
Enforcement Academy and frequently instructs on legal
issues arising in child exploitation cases at ICAC training
programs. Jim obtained his undergraduate degree from
Gonzaga University, in Spokane, Washington and his law
degree from the University of Wyoming, College of Law
located in Laramie, Wyoming.
Unit Commander, San Diego ICAC
San Diego Police Department
Chuck Arnold is the Unit Commander of the San Diego
Internet Crimes Against Children Task Force, a position he
has held for the past three and a half years. Born and raised
in San Diego, he has been with SDPD for 29 years where
he has worked a variety of patrol, traffic, Investigative and
administrative positions.
Christopher Ard
Investigative Consultant
Microsoft
Chris Ard has been with Microsoft for over 10 years. He
is an Investigative Consultant with Microsoft’s Cybercrime
Consulting and Training team. His primary responsibility
is delivering Internet investigation and computer forensic
training to government law enforcement organizations and
providing consulting services on difficult forensics issues.
Allison Attenello
Training & Technical Assistance Manager
Girls Educational & Mentoring Services (GEMS)
Allison is the Training and Technical Assistance Manager
at GEMS where she develops and conducts trainings on
the commercial sexual exploitation of children (CSEC).
She works closely with CSEC survivors to ensure that their
experiences, ideas and insights are reflected in GEMS’
training curricula. After earning her Masters degree in Global
Affairs, she spent several years working as a project manager
for the United Nations-affiliated University for Peace in
Costa Rica. There she developed graduate level curricula
focusing on the intersections between gender, identity, and
peace building. Prior to joining GEMS, Allison served as
the Program Director for Girls Learn International where
she conducted trainings to foster girls’ empowerment and
advocate for girls’ human rights.
Christopher Armstrong
Hi Tech Crime Training Specialist
SEARCH
Mr. Armstrong is a High-Tech Crime Training Specialist
in the High-Tech Crime Training Services department
of SEARCH, where he coordinates and provides training
on high-tech crime investigations and forensics. Mr.
Armstrong retired from the San Diego Police Department
in 2006 after more than 27 years of service. When he
retired, he was Lead Investigator for the ICAC grant in
San Diego County. In this role, he was involved in both
proactive and reactive investigations, forensic investigations,
computer maintenance, office network and networking
hardware, and grant financial planning. Immediately prior
to his ICAC assignment, he spent 6-plus years as a Child
Abuse Investigator, investigating every type of child abuse,
including child homicides.
PROTECTING OUR CHILDREN
Gregory Ayco
Captain
Seattle Police Department
Captain Greg Ayco has been with the Seattle Police
Department for 30 years. Captain Ayco has commanded
numerous sections within the Seattle Police Department
including Domestic Violence/Sexual Assault, Gang Unit
and the Vice Section. He has been the Washington State
ICAC Task Force Commander for the past 10 years. He is
also the King County Regional AMBER Alert Coordinator.
Rami Badawy
Senior Attorney and Chief of Publications
National District Attorneys Association
Mr. Badawy is a Senior Attorney and Chief of Publications
for the National Center for the Prosecution of Child Abuse
at the National District Attorneys Association. He oversees
outreach in the areas of child homicide, physical abuse, and
57
Speaker Biographies
the Crawford line of cases. Mr. Badawy trains on a variety
of topics, including the link between domestic violence and
child abuse, cultural competency in the investigation and
prosecution of child abuse and domestic sex trafficking of
minors.
Larry Baker
Special Agent
FBI
Special Agent (SA) Larry Baker has been an agent of the
Federal Bureau of Investigation (FBI) for eleven years. SA
Baker has served his entire career with the FBI in San Antonio,
Texas. As a field agent, SA Baker has worked a variety of
federal violations in the fields of Public Corruption, Civil
Rights, White Collar Crime, Cyber Crime, and Crimes
Against Children. His collateral duties include being a
fitness advisor and a member of the San Antonio Division’s
SWAT Team.
Jennifer Barnes
Sergeant
Indiana State Police
Sergeant Jennifer Barnes is a 15 year veteran with the Indiana
State Police. She is a graduate of Purdue University where she
received her BS in Computer Science and MS in Industrial
Management. Prior to joining the Indiana State Police, Sgt
Barnes was employed in the computer industry for 11 years.
In 2003 she was assigned to the Criminal Investigation
Division, Cyber Crime Unit where she conducts digital
media forensic examinations on computers and cellular
devices. As part of the Indiana ICAC she also participates
in numerous search warrants doing “on-scene” forensics.
Additionally, she assists with the management / training of
the Department’s Digital Media Recovery Specialist officers
who perform “on-scene” forensic triage exams.
Jon Berroya
Legal Director, Global Law Enforcement and Security
Yahoo! Inc.
David Bishop
HiTech Crime Training Specialist
SEARCH
Mr. David I. Bishop is a High-Tech Crime Training
Specialist in the High-Tech Crime Training Services
Program of SEARCH, where he coordinates and provides
58
training on high-tech crime investigations and forensics.
Before joining SEARCH in 2009, Mr. Bishop served in the
Grass Valley PD for 25 years. He worked most recently as a
patrol sergeant and led the agency’s special incident team and
various community- and problem-oriented policing teams.
Mr. Bishop has considerable experience in communications
and information systems planning, implementation,
management, and support. While at the Grass Valley PD,
he was responsible for the implementation, configuration,
administration, and maintenance of the department’s
network environment, including servers, workstations, and
user profiles.
Kevin Blackwell
Senior Research Associate
United States Sentencing Commission
Kevin is a Senior Policy Analyst at the United States
Sentencing Commission where he has worked for over 19
years. Kevin has worked extensively on child sexual abuse
and other violent crimes at the Commission during his time
at the Commission. He also has authored papers on disparity
in sentencing. Prior to his employment at the Commission,
Kevin worked at the Pennsylvania Commission on
Sentencing. Kevin holds degrees in Chemical Engineering
and Sociology from Bucknell University and the Pennsylvania
State University.
Michael Bourke
Chief Psychologist
United States Marshals Service
Dr. Michael Bourke is the Chief Psychologist for the
United States Marshals Service and the head of the USMS
Behavioral Analysis Unit. Prior to joining the Marshals
Service he worked as a clinical psychologist for the federal
prison system; from 2000 to 2006 he was assigned to the
Sex Offender Treatment Program and Hypersexuality
Management Program at the Federal Correctional Institution
in North Carolina. From July 2006 to September 2008, he
worked within the Commitment and Treatment Program for
Sexually Dangerous Persons at the same institution. In 2008
he received a Special Recognition Award from the United
Kingdom’s Child Exploitation and Online Protection
Centre, and in 2009 he was awarded the Pro-Humanitate
Literary Award by the North American Resource Center for
Child Welfare.
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
Johnathan Bridbord
Lead CFS
U.S. Department of Justice, Criminal Division
Johnathan Bridbord is a Lead Computer Forensic Specialist
in the High Technology Investigative Unit located within
CEOS in the Criminal Division of the United States
Department of Justice. Among his duties, Mr. Bridbord
conducts forensic analysis of seized computer systems and
media, provides investigative and analytical support to
prosecutors and law enforcement agents to identify online
child pornography offenses, and develops strategies for
gathering electronic evidence. Prior to joining Criminal
Division, Mr. Bridbord was the Senior Forensic Examiner
at a prominent litigation consulting firm where he provided
data forensic consultation in support of litigation and
investigative matters.
Will Bronson
Program Manager
US. Dept. of Justice, OJJDP
Will D. Bronson, Jr., currently serves as a Program Manager
with the Child Protection Division, Office of Juvenile Justice
and Delinquency Prevention (OJJDP), U.S. Department
of Justice. As part of his duties, Will is responsible for comanaging a portfolio of grants and cooperative agreements
from the Department of Justice to units of state and local
governments and non-profit organizations that include
projects such as the Internet Crimes Against Children
(ICAC) Program, the Child and Youth Safety Program, and
various mental health programs affecting at-risk children.
Prior to joining OJJDP, Will worked as the Director of
Operations for VA Pyxis, Inc., a private human services
agency.
Robert Butterfield
Senior Special Agent
US Immigration and Customs Enforcement
Senior Special Agent Robert Butterfield graduated from
the Western Illinois University with a degree in Law
Enforcement. In 1998, he went to work for the US
Immigration as a Special Agent in Chicago, where he worked
in the human trafficking group. In 2007, SSA Butterfield
transitioned to the Computer Forensics unit, in what is now
known as the Immigration and Customs Enforcement a
division of the Department of Homeland Security (DHS).
Rob is currently in the SAC Chicago ICE regional forensics
lab. He has completed advanced coursework and training in
PROTECTING OUR CHILDREN
Guidance Software’s ENCASE, Access Data’s FTK, IACIS,
Paraben and more. He is an AccessData Certified Examiner,
along with BCERT, PCERT and A+. SSA Butterfield is a
member of HTCIA.
Jesse Canonico
Assistant Prosecuting Attorney
Cuyahoga County Prosecutor’s Office, Ohio ICAC Task
Force
Jesse Canonico is a graduate of The Ohio State University
(1998, Journalism) and the Cleveland Marshall College of
Law (2003, J.D.), and has been employed as an Assistant
Prosecuting Attorney in the Cuyahoga County (Ohio)
Prosecutor’s Office since 2004. Canonico is a member of the
office’s Major Trial Unit, which handles all murder, rape and
child victim prosecutions. Within that Unit, Canonico is
assigned to the Ohio Internet Crimes Against Children Task
Force, which prosecutes all cases involving the creation and
distribution of child pornography online as well as online
child sexual predators. Canonico has tried more than 60
cases as a first-chair prosecutor.
Bill Carroll
Lead Consultant
Carroll Consulting LLC
Bill was employed in the Criminal Justice field for the past
thirty-five years, retiring November 2008, with the last ten
years in an executive management position. The last four
years of my career with the Oregon Department of Justice,
I acted as the Oregon ICAC Task Force Commander. As
a participating member of the national ICAC, I served on
the policies and procedures committee. In 2008, Carroll
Consulting LLC was formed. Services include: Contracting
as an instructor for Fox Valley Technical College Unit
Supervisors Course and Knock and Talk. I am also
recognized as a qualified instructor for Surviving an audit
and Community Outreach and Education. Currently, I am
contracted with FVTC to assist with the development of a
First Responder Course for Electronic Crimes.
Dennis Carry
Detective
Washoe County Sheriff’s Office, Nevada ICAC
Detective Dennis Carry has over 14 years of law enforcement
experience with much of this experience assigned as a full
time detective to the Internet Crimes against Children
Task Force and related investigations. Detective Carry is
59
Speaker Biographies
also a computer forensic examiner and with his experience
in these roles, he’s investigated hundreds of investigations
throughout Northern Nevada. In addition to ICAC,
Detective Carry is a Task Force Officer with the FBI’s
Innocent Images Initiative. Detective Carry often testifies to
the Nevada State Legislature and Statutory Boards relating
to the investigation of high tech crimes and online child
exploitation.
Jeffery Catt
Detective
Kokomo Police Department
I am a 21 year veteran police officer. I have spent the last 7
years in the area of computer forensics, running our local
computer lab for area law enforcement. I am Certified
through the Department of Defense and Federal Law
Enforcement Training Center. I have attended numerous
courses on computer forensics such as EnCase and FTK. I
have participated in numerous search warrants where I assist
with on scene computer forensics.
Alison Cauthorn
Assistant Prosecuting Attorney
Washington County Ohio Prosecutor’s Office
B.A. Ohio Wesleyan University, 1986, Magna Cum Laude,
Phi Beta Kappa; J.D. The Ohio State University, 1989. I have
worked as an Assistant Prosecuting Attorney in Washington
County Ohio since 1990. I do appellate work, search
warrants, investigative subpoenas, provide other advice or
investigative assistance and training to law enforcement. I
also provide civil representation to county and township
clients. I teach basic peace officer training legal courses part
time and assist with teaching the legal aspects of Electronic
Surveillance (wiretap) through the Ohio Peace Officer
Training Academy to officers who must be certified to
apply for Ohio wiretap warrants. I prepare and co-counsel
complex felony cases, including child pornography/child
sex abuse cases.
Thomas Clancy
Director and Research Professor
National Center for Justice and the Rule of Law,
University of Mississippi School of Law
Tom Clancy, Director of the National Center for Justice
and the Rule of Law at Ole Miss, has taught a variety of
criminal law and procedure subjects at numerous major
60
law schools. He has more than 25 years of legal experience,
including serving as Chief of the Post Conviction Unit in
the State’s Attorney’s Office for Prince George’s County,
Maryland and as an Assistant Attorney General for the
State of Maryland in the Criminal Appeals Division. He
has briefed and argued over 900 criminal appeals cases and
has extensive trial and post conviction litigation experience.
He has written extensively on the Fourth Amendment and
lectures frequently at judicial, law enforcement, and other
conferences on search and seizure, cyber crime and other
criminal law and procedure topics.
Philip Coduti
Special Agent
U.S. Immigration and Customs Enforcement
Eliott Cohen
Sergeant
Maryland State Police
Eliott Cohen is an 11 year veteran with the Maryland State
Police. As an investigator assigned to the Computer Crimes
Section/MD ICAC Task Force, he had been responsible
for investigating a diversity of crime of related to high
technology, primarily online child sexual exploitation for
the past 7 years. Mr. Cohen has been recognized as having
exceptional knowledge in the area of computer and Internet
related investigations by Maryland courts and his peers. He
regularly instructs federal, state and local law enforcement
on how conduct computer/Internet related investigations.
He also educates children, parents, counselors and school
administration about the risks users face and how their
online presence exposes them to a variety of predators; more
specifically sexual predators.
James Cole
Senior Special Agent / Digital Forensic Agent
Department of Homeland Security, U.S. Immigration
and Customs Enforcement, Office of Investigations
James “Jim” Cole is a Senior Special Agent and Digital
Forensic Agent with the Department of Homeland Security,
U.S. Immigration and Customs Enforcement. He has been
assigned to a child sexual exploitation unit for the past seven
years and prior to that was a detective working violent crimes
including child sexual abuse and homicide. SSA Cole helped
initiate the Inter-agency Child Exploitation Prevention
Team (INTERCEPT), a tri-county task force devoted to
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
the pro-active investigation of non-traditional child sexual
exploitation and conducts computer forensics for federal
prosecutions arising from the team. Jim has been involved
in numerous child sexual exploitation investigations over his
past 17 years of law enforcement.
Esther Cookson
Director of Strategic Initiatives and Product Development
Web Wise Kids
Esther Cookson serves as the Director of Strategic
Initiatives and Product Development for Web Wise Kids,
a national, non-profit organization. She has over a decade
of experience working in the nonprofit sector on behalf of
children and families. Her particular expertise is in planning
and implementing community initiatives, leading the
development of interactive resources for K-12 students,
training adults and equipping them to help prevent the
online victimization of children, and developing partnerships
with both the public and private sector. Web Wise Kids
has games to empower youth to make wise choices in the
digital world through interactive and fun activities instead
of through a lecture.
Vincent Costagliola
VP Information Systems
SR Technologies
Vincent Costagliola’s technical background includes 15
years experience in software development platforms as
well as an extensive knowledge of systems integration and
business analytics. Mr. Costagliola is an active member of
young AFCEANS, AFCEA, HTCIA, InfraGard, as well as
an appointed member to the national AFCEA Technology
Committee. Vincent holds a BS in Electrical Engineers with
an emphasis on Computer Engineering.
investigations with a focus on Child Sex Tourism cases. I
also coordinate training classes and conferences for field
agents involved in child exploitation investigations.
John Cromwell
Strategic Access Technologies, LLC
John Cromwell is an experienced Cellular Forensics
instructor serving Law Enforcement, Military Special
Forces, and other U.S. organizations. He has conducted
numerous trainings worldwide and has developed doctrinal
cell-phone forensics certification courses. John has also
produced real-world training exercises used by U.S. Special
Forces and other U.S. organizations. Prior to joining
NEKASG & Strategic Access Technologies, John served as
a liaison between U.S. Intelligence and the United States
Army. He is also experienced in Electronic Warfare and
Signals Intelligence Systems operations and training.
Ethan Cumming
Special Agent
Federal Bureau of Investigation
Special Agent Ethan G. Cumming joined the FBI in 2004
and was first assigned to the San Antonio, Texas division.
While in San Antonio, SA Cumming investigated a
variety of matters involving child sexual exploitation, child
pornography, computer intrusions, Internet fraud, and
intellectual property rights. In 2009, SA Cumming was
reassigned to the FBI’s Honolulu, Hawaii, division and
designated the office’s Innocent Images Coordinator. Prior
to entering government service, SA Cumming served as
Director of Information Technology for a Washington, DC
firm, and has worked closely with technology since a young
age.
Keith Daniels
Deborah Crane
Senior Special Agent
US Immigration and Customs Enforcement
I began my career in 1987 with legacy U.S. Customs Service
and have worked all aspects of Customs law including drug
smuggling, arms smuggling, money laundering and asset
forfeiture. Since January 2007, I have been assigned to the
ICE Headquarters Child Exploitation Section at the Cyber
Crimes Center (C3) in Fairfax, Virginia, as a National
Program Manager. In this position, I am responsible for
overseeing various programs and operations that are being
conducted in the field relative to Child Exploitation
PROTECTING OUR CHILDREN
Cellular Technologies Engineer
Strategic Access Technologies
Mr. Keith Daniels is a Cellular Technologies Engineer with
Strategic Access Technologies, where he provides training
and technical support to law enforcement in the area of
Cellular mobile devices. He prepares training materials,
teaches cellular phone data recovery courses and speaks at
conferences throughout the United States. Prior to joining
Strategic Access Technologies as a Cellular Technologies
Engineer, Mr. Daniels was a High Tech Crime Training
Specialist with SEARCH Group Inc.
61
Speaker Biographies
William Dent
Alan Dorhoffer
Special Agent
Defense Computer Forensic Laboratory (DCFL)
Special Agent William Dent is a civilian agent and computer
crime investigator with the Air Force Office of Special
Investigations (AFOSI). He is currently the Chief, Forensic
Data Extraction (FDE) section, Defense Cyber Crime
Center (DC3), Defense Computer Forensics Laboratory
(DCFL). SA Dent has over 30 years of service to the U.S.
Air Force (twenty years of active duty and over ten years as a
civilian). Twenty two years of service has been as an AFOSI
agent.
Deputy Director, Office of Education
United States Sentencing Commission
Alan Dorhoffer is the Deputy Director of the Office of
Education and Sentencing Practice at the United States
Sentencing Commission. He has conducted hundreds of
training programs for judges, attorneys, law clerks, staff
attorneys, and probation officers on federal sentencing
issues. Mr. Dorhoffer has been the Chair of numerous
policy teams, including the Child Pornography, Firearms,
and Criminal History Teams. Furthermore, he analyzes
U.S. Supreme Court, appellate court, and district court
decisions interpreting the federal sentencing guidelines. Mr.
Dorhoffer was an Adjunct Professor at the George Mason
School of Law. He previously served as a law clerk to the
Honorable Edmund A. Sargus in Columbus, Ohio.
Eric Devlin
Assistant District Attorney
Houston Metro Internet Crimes Against Children Task
Force / Harris County District Attorney’s Office
Eric Devlin serves as the Chief Prosecutor of the Child
Exploitation and Cybercrime Section of the Harris County
District Attorney’s Office and the Deputy Commander of
the Houston Metro Internet Crimes Against Children Task
Force. A 2001 graduate of South Texas College of Law,
Eric Devlin is one of the founders of the Houston ICAC
Task Force, and in 2009 was awarded named one of the
outstanding Child Abuse Prosecutors for the State of Texas
by the Child Advocacy Centers of Texas. Since the creation
of the Task Force, he has investigated and prosecuted more
than 600 cases of child exploitation of children.
J. Brooke Donahue
Supervisory Special Agent
FBI
SSA Donahue is a twelve year veteran of the FBI and has
been investigating child sexual exploitation offenses for
six years. He currently serves as a Program Manager in the
Innocent Images National Initiative Unit providing oversight
of the Innocent Images sub-program for the field offices.
He is the FBI’s primary subject matter expert on Gigatribe
investigations and pioneered the development of an interagency national law enforcement operation to combat the
distribution of child pornography through Gigatribe. He
routinely provides training to domestic and international
law enforcement organizations on LimeWire and Gigatribe.
62
Mike Duffey
Special Agent
Florida Department of Law Enforcement
Mike Duffey is a Special Agent with the Florida Department
of Law Enforcement. Mike is currently assigned to the
Computer Crime Center in Tallahassee, Florida where he
is responsible for statewide computer crime investigation.
Mike’s law enforcement experience includes working for the
Tallahassee PD and the Florida Department of Insurance.
Mike is a graduate of Florida State University School
of Criminology. Mike’s current cases include network
intrusion cases, Phishing scams and unauthorized access to
a network system. Mike has been involved with conducting
online undercover Child Exploitation investigations both
within the United States and overseas. Mike has conducted
trainings with MySpace and Facebook along with other
training to other Child Exploitation Detectives around the
world.
Matthew Dunn
Section Chief
US Immigration and Customs Enforcement
Matt Dunn became the Section Chief for the ICE Child
Exploitation Section (CES) in May 2009. The CES is
responsible for managing the ICE Child Exploitation
Program, providing operational and programmatic support
to ICE field offices (both domestic and foreign). The CES
is a fully operational component and initiates national/
international investigations. Mr. Dunn has been assigned
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
to the CES since February 2005. Prior to this assignment,
Mr. Dunn worked in the ICE Office of Professional
Responsibility. Mr. Dunn began his career in federal law
enforcement in June 1998 with the U.S. Department of
Transportation, Office of Inspector General.
and “Traveler” cases in 1996 as a sex crimes investigator
with the Redondo Beach California Police Department. In
1999 Tom co-founded the South Bay Regional Computer
Forensics Laboratory (Los Angeles County).
Mike Evans
Training Coordinator
ICAC Training and Technical Assistance
Edwards currently is a private contractor working for entities
such as Fox Valley Technical College, the University of
Tennessee and several other clients. In this role he assists in
the development of training, facilitates training and evaluates
training related to crimes against children, cybercrime
and financial crime. He retired from the Georgia Bureau
of Investigation in April 2005 after 32 years of service. In
his last assignment he was the Special Agent in Charge of
the Financial Investigations Unit and the Commander of
the ICAC Task Force. Edwards is certified and trained as a
polygraph examiner, fraud examiner, police instructor, and
police manager. As a polygraph examiner he has interviewed
numerous child victims and child sexual predators.
Chief of Police
Squaxin Island Police
Chief Michael Evans started in law enforcement in 1991
as a reserve officer with the City of Lacey, WA Police Dept.
Several years later he was hired by the Squaxin Island Tribal
Police Department. Mike is a federally certified narcotics
and community policing trainer. In 2001, Mike was
promoted to Sergeant and shortly thereafter to Lieutenant.
Mike was promoted to Chief of Police in April of 2006.
He is currently serving on the Washington Board on Law
Enforcement Training, Standards, and Education and also
serves on the MACECOM (Dispatch) Governance and
Legislative Boards. Mike is currently the President of the
Northwest Association of Tribal Enforcement Officers. The
Squaxin Island Police Department is actively involved in the
Seattle ICAC.
Robert Erdely
Robert Favrot
Corporal
PA State Police
Robert Erdely is the supervisor of the computer crime unit
in Pennsylvania. He has been a trooper for over 18 years,
11 of which was assigned to the computer crime unit. The
University of Massachusetts, Massachusetts State Police
and Pennsylvania State Police were part of the RoundUp
development team. He has various forensic certifications,
Cisco certifications, Microsoft certifications, CompTIA
certifications and his CISSP.
Investigator
Louisiana Attorney General’s Office
I have been employed as a Deputy Sheriff in West Baton
Rouge Parish, Louisiana for the past 19 years. I currently
hold the rank of Sergeant. I have been assigned to the
High Technology Crime Unit with the Louisiana Attorney
General’s Office for the past 3 years. As a member of ICAC
I have had the opportunity to investigate numerous internet
crimes involving child pornography and child exploitations.
I have been a part of co-founding a pilot juvenile offenders
diversion program which focuses on the rehabilitation
process of juvenile offenders possessing child pornography.
Steven Edwards
Thomas Eskridge
COO
Tom Eskridge is the Chief Operations Officer and Partner
of the High Tech Crime Institute. (HTCI) Tom Eskridge
retired after 28 plus years in law enforcement. During his
lengthy law enforcement career Tom worked as a patrol
officer, training officer, traffic officer, detective, Sergeant and
retired as the administrative Lieutenant for the Redondo
Beach California Police Department. Tom has trained law
enforcement and military personnel since 1999 in the field
of high tech/Internet based investigations and computer
forensics. Tom began working computer Child Exploitation
PROTECTING OUR CHILDREN
Christine Feller
Program Manager, Child Victim Identification Program
National Center for Missing and Exploited Children
Christine Feller is the Program Manager of the Child Victim
Identification Program at the National Center for Missing
& Exploited Children in Alexandria, Virginia. Ms. Feller
has been with the Exploited Children Division at NCMEC
since 2002, where she started as a CyberTipline analyst. In
July 2003, Ms. Feller joined CVIP, where she now manages a
staff of approximately thirteen analysts. This program serves
63
Speaker Biographies
a dual mission, (1) to help prosecutors secure convictions by
proving that a real child is depicted in child pornography
images; and (2) to assist law enforcement in locating
unidentified child victims. She has provided extensive
technical assistance to law enforcement in the United States,
as well as abroad on cases of child sexual exploitation.
David Ferris
Investigator
Louisiana Department of Justice High Technology Crime Unit
I have been in law enforcement 10 years and in a child
exploitation capacity for 3 years. I am currently a
supervisor in the Louisiana Attorney General’s Office,
High Technology Crime Unit. During that time I have
conducted thousands of hours of instruction and operations
in undercover investigations. I have received a Bachelors of
Psychology from Ashford University in Clinton, Iowa. I am
also a United States Marine Corps veteran having served in
Iraq. I have been certified as an expert in Undercover Peer
to Peer investigations, Cybercrimes, and Child exploitation
in the state of Louisiana. Recently I have been a part of cofounding a pilot juvenile offender’s diversion program which
focuses on the rehabilitation process of juvenile’s offenders
possessing child pornography.
the section’s High Technology Investigative Unit. Among
his duties, Mr. Fottrell conducts forensic examinations of
seized computer systems and media, provides investigative
and analytical support to prosecutors and law enforcement
agents to identify online child pornography and obscenity
offenses, develops strategies for gathering electronic
evidence.
Tom Garrett
Commonwealth’s Attorney
Following his graduation from the University of Richmond,
Tom served in the United States Army. While in the
Army, he was deployed overseas in support of Operation
Joint Endeavor. Following his service in the Army, Tom
entered the T.C. Williams Law School at the University
of Richmond. Prior to being elected Commonwealth’s
Attorney, Tom served as an Assistant Attorney General
under Bob McDonnell where he prosecuted complex whitecollar and internet crimes. During this time he also served
as a Special Assistant United States Attorney. Tom is a strong
believer in protecting children. His child safety initiative
“CSI Louisa” has brought dozens of predators to justice in
his two years in office. He put Louisa on the map in Virginia
as a place where not to prey on children.
Michael Geraghty
Justin Fitzsimmons
Senior Attorney
National District Attorneys Association
Justin Fitzsimmons is a Senior Attorney with NDAA’s
National Center for Prosecution of Child Abuse in
Alexandria, Virginia. He organizes national conferences on
the topic of technology-facilitated child sexual exploitation.
Additionally, he also trains at other national conferences
and state and local seminars on the subject of technologyfacilitated child sexual exploitation.
James Fottrell
Assistant to the Chief for Computer Forensics and
Investigations at Department of Justice
Department of Justice
James Fottrell is the Assistant to the Chief for Computer
Forensics and Investigations for the Child Exploitation and
Obscenity Section in the Criminal Division of the United
States Department of Justice. In this role, Mr. Fottrell
oversees the staff of Computer Forensics Specialist within
64
Executive Director, Technology Services Division
NCMEC
Mike is the Executive Director of the Technology Services
Division for the National Center for Missing & Exploited
Children. In this capacity he is responsible for overseeing
the Center’s enterprise information technology systems and
services. Mike has previous corporate and law enforcement
experience, which includes a position as the vice president
of High Technology Investigations at Prudential Financial.
At Prudential, he was responsible for carrying out and
supervising all computer related investigations for Prudential.
He is a former New Jersey State Trooper and is responsible
for the formation and development of the NJSP’s High
Technology Crimes Investigations Unit, which has garnered
international accolades for its expertise in computer crime
investigations.
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
Jeffrey Gersh
Program Manager
OJJDP, USDOJ
Jeffrey Gersh is a Program Manager for the U.S. Department
of Justice’s Office of Juvenile Justice and Delinquency
Prevention (OJJDP), where he is responsible for managing
several States’ Internet Crimes Against Children (ICAC)
Task Forces, as well as the National Center for Missing &
Exploited Children. While working in the Child Protection
Division of OJJDP, Mr. Gersh also manages several federallyfunded research and evaluation initiatives in the areas of
commercial sexual exploitation of children, internet crimes
against children, missing and exploited children and other
child protection issues. Mr. Gersh has published articles,
presented papers and taught on several topics associated
with criminal justice and law enforcement evaluation, crime
analysis, crime mapping and corrections.
Charles Gillingham
Deputy District Attorney
Santa Clara County District Attorney’s Office
Charles Gillingham has been a Deputy District Attorney
with the Santa Clara County District Attorney’s Office since
1994. He has been on multiple trial assignments including
misdemeanors, narcotics, domestic violence and sexual
assault. He has handled the prosecution of three-strike,
attempted murders, robberies, sexual assaults, child molest,
homicide and death penalty cases. Mr. Gillingham was
the assigned prosecutor on the San Jose, California ICAC
Task Force for three years and prosecuted numerous child
pornography and child exploitation cases. Mr. Gillingham
has taught many courses for local law enforcement. He is a
member of the U.S. Attorney for the Northern District of
California Child Pornography Task Force.
Frankie Goldberg
Director Ohio ICAC, Assistant Prosecuting Attorney
Ohio ICAC
Frankie Goldberg is a graduate of Cleveland-Marshall College
of Law and has been employed as an Assistant Prosecuting
Attorney in the Cuyahoga County (Ohio) Prosecutor’s
Office since 1991. She has served in numerous roles that
have included: Director of Special Projects, a member of
the Cold Case Task Force, and also was responsible for
the development, coordination, and implementation of
the Northern Ohio Elder Protection Training Council, a
PROTECTING OUR CHILDREN
40-county training of more than 1,000 federal, state and
local law enforcement funded by a grant from the U.S.
Dept. of Justice. Moreover, Ms. Goldberg has successfully
prosecuted high profile elder exploitation crimes including
financial, physical and sexual abuse.
Jim Granozio
Supervisory Special Agent
FBI
SSA James Granozio is the Program Manager for the Cyber
Crime Task Force Program under the FBI’s Cyber Division.
He is responsible for overseeing 46 cyber crime task forces
nationwide encompassing over 270 full and part time task
force officers.
Priscilla Grantham
Senior Research Counsel
National Center for Justice and the Rule of Law
Ms. Grantham has worked as senior research counsel for
the National Center for Justice and the Rule of Law at the
University of Mississippi School Of Law since 2006. Prior
to joining the NCJRL, Ms. Grantham was associated with
the United States Attorney for the Northern District of
Mississippi as a research attorney, where she primarily handled
issues regarding the Fourth Amendment and the Federal
Sentencing Guidelines. Ms. Grantham is a graduate of the
University of Mississippi School Of Law where she received
her J.D. She has developed and presented legal training for
law enforcement officers, judges and prosecutors in various
subjects related to the Fourth Amendment, computer crime
and computer-related criminal investigations.
Chad Gremillion
Senior Trooper
Louisiana State Police
Senior Trooper Chad Gremillion has been a member of
the Louisiana State Police for the past 11 years and has
investigated crimes against children for the past 6 years.
Trooper Gremillion’s undercover chat investigations has led
to the prosecution of cases in both state and federal court
in Louisiana and throughout the Nation. He is currently an
instructor for Fox Valley Technical College on undercover
chat investigations. For his work in child exploitation
investigations, he was the recipient of the “2006 Plainclothes
Trooper of the Year”.
65
Speaker Biographies
Steven Grocki
Assistant Deputy Chief for Litigation
U.S. Department of Justice - Child Exploitation and
Obscenity Section
Steven Grocki is currently the Assistant Deputy Chief for
Litigation at the Department of Justice’s Child Exploitation
and Obscenity Section (CEOS) in Washington, DC.
CEOS leads the Department of Justice in its endeavor to
continuously improve the enforcement of federal child
exploitation laws and prevent the exploitation of children
and families. In his capacity as Assistant Deputy Chief for
Litigation, Mr. Grocki supervises CEOS’ 15 trial attorneys.
CEOS’ team of attorneys actively prosecute all federal crimes
relating to the exploitation of children, provide advice and
training to federal prosecutors, law enforcement personnel,
and Department of Justice officials.
Marsali Hancock
President
iKeepSafe.org - Internet Keep Safe Coalition
As president of iKeepSafe.org, Marsali Hancock speaks
nationally and internationally on digital citizenship issues.
Recently, Ms Hancock received the Family Online Safety
Institute (FOSI) Award for Outstanding Achievement and
was a panelist and moderator at FOSI’s 2009 conference.
She participated in the planning and execution of the
PointSmart.ClickSafe. Summit and currently serves
on its Blue Ribbon Task Force, exploring and making
recommendations for industry best practices. She’s a
member of the Obama administration’s Online Safety &
Technology Working Group and on the advisory boards of
the Washington and London-based Family Online Safety
Institute, and GetNetWise.org (a project of the Internet
Education Foundation in Washington).
Kenneth Hansen
Detective
Midvale Police Department
Ken worked for the Salt Lake City Police department as
an officer and sergeant for 26 years. He gained experience
in Patrol, Traffic, SWAT, Vice, Gangs and as a Public
Information Sergeant. He graduated from FBI SWAT School
in Camp Pendleton, California and the California Highway
Patrol Motorcycle Operations School. In 1990, he started
the Metro Gang Unit in Salt Lake County and received the
Police Chief ’s Award for Excellence for his supervision of the
66
Metro Gang Unit and the Salt Lake City Police Vice Squad.
After 27 years of service as a U.S. Army Combat Medic,
Combat Medic instructor and Licensed Practical Nurse
he retired from the United States Army Reserve in 2006.
He maintains his nursing license. Ken graduated from the
United States Army NREMT and Nursing Schools.
Michael Hill
Sergeant
Massachusetts State Police
Sergeant Michael Hill has been a Massachusetts State
Police Officer since 1993. In his career he has investigated
homicides, unattended deaths, rapes, child abuse, child
sexual assaults, and other major crimes. Sergeant Hill has
had extensive training and experience with the seizure
and forensic examination of computers. Sergeant Hill has
computer forensic certifications as an Encase Certified
Examiner (EnCE), Seized Computer Evidence Recovery
Specialist (SCERS), and a Certified Forensic Computer
Examiner (CFCE). Sergeant Hill has been a member of the
Massachusetts Internet Crimes Against Children (ICAC)
Task Force since 2000. He has conducted numerous reactive
and proactive investigations involving the exploitation of
children on the Internet.
Graham Hill
Detective Chief Superintendent
Child Exploitation & Online Protection Centre
Graham is currently the head of CEOP’s Behavioural Analysis
Unit. It specializes only in understanding the behaviour of
people suspected of having a sexual interest in children.
Graham brings with him 25 years service, the majority of
which have been spent within the Criminal Investigation
Department, Major Crime and specialist teams. Since 2001,
Graham has assisted with law enforcement training on the
issues of understanding, interviewing, preparing strategies
for interviewing child sex offenders and investigating
serious sexual crimes against children. In addition to
providing training in the UK, he has undertaken training
internationally for European law enforcement agencies,
Interpol, Europol and the UK Foreign and Commonwealth
Office in South East Asia and America.
Chris Holloway
Program Manager
US Department of Justice, Office of Juvenile Justice and
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
Delinquency Prevention
Chris Holloway is a Program Manager with the Office of
Juvenile Justice and Delinquency Prevention’s (OJJDP)
Child Protection Division. For nearly ten years, Chris has
managed the Internet Crimes Against Children (ICAC)
Task Force program, as well as other initiatives focused on
reducing the sexual exploitation of children.
Kim Hunt
Senior Research Associate
United States Sentencing Commission
Dr. Kim Steven Hunt has over nineteen years of experience
in the field of criminal sentencing policy and research. He is
a Senior Research Associate at the United States Sentencing
Commission. Previously, he worked on sentencing reform
efforts in the District of Columbia, Maryland and Virginia.
Dr. Hunt has led research studies of sentencing guidelines,
risk assessment, and correctional forecasting. He is currently
studying the recidivism rates of federally-sentenced offenders
and correlates of recidivism.
Jim Innes
Detective Sergeant
Grandview Police Department
Detective Sergeant Jim Innes has been with the Grandview
Missouri Police Department for 25 years, 21 of which as a
Detective. Jim has been involved with computer forensics
since 2002. His most recent assignment is with the FBI
Heart of America Regional Computer Forensic Laboratory
in Kansas City Missouri as a certified Forensic Examiner.
David Johnson
Officer
San Jose Police Department
David has been an Officer with the San Jose Police
Department for 28 years. He has been working with
computer evidence for the past 3 years as part of the Silicon
Valley ICAC Task Force.
Jeremiah Johnson
Computer Crime Specialist
National White Collar Crime Center
Mr. Johnson joined the National White Collar Crime
Center in October 2005 as a Computer Crime Specialist.
He has recently been certified by SANS as a GIAC Security
Essentials professional. His last year focus was Computer
PROTECTING OUR CHILDREN
Security and Digital Investigative Techniques. He has
seven years experience fixing and repairing computers. Mr.
Johnson was contracted by Dell to perform a Department
of Defense grade (5220.22-M) data wipe for ALLIANT
TECH SYS INC on over 500 machines. ATK is an advanced
weapon and space system company and is the nation’s
largest producer of conventional munitions, serving both
military and commercial markets. As a help desk employee
for Holiday Builders, a company with over 600 employees,
Mr. Johnson was responsible for receiving and responding
to all help desk calls.
Wendy Jolley-Kabi
Executive Director
Wendy Jolley-Kabi, the Executive Director of AMECO,
has worked in the nonprofit sector for over 15 years in
the United States and Southern Africa. She has served in
a variety of direct care and management positions working
with medically-ill homeless individuals, developmentally
disabled adults, disabled individuals falling through the
cracks of homeless provider systems, grassroots community
groups, HIV+ and abused younger children and displaced
children. Wendy is a returned Peace Corps Volunteer who
served in Lesotho and then remained in the country working
with children in need of care. She is a founding member
and Past President of the Lesotho Non-Governmental
Organization Coalition for Children’s Rights.
Jerrold Jones
Computer Crime Specialist
National White Collar Crime Center
Jerry Jones is retired from the law enforcement community
after almost 31 years with the Police Bureau in Portland
Oregon and is currently an instructor for NW3C. During
his career Jerry worked various assignments and has 14 years
experience in investigative functions. For the last three years
Jerry has been a full time computer forensics examiner for the
Detective Division and was assigned to the FBI Northwest
Regional Computer Forensics Lab. In this capacity he has
examined media in numerous cases including hard drives, cell
phones, PDAs, and other electronic storage devices. He has
significant experience in computer forensics, investigations,
and vehicular assault/fatal accident reconstruction. Jerry has
been involved in cases on both a national and local level.
67
Speaker Biographies
Damon King
Deputy Chief
U.S. Department of Justice - Child Exploitation and
Obscenity Section
Damon King is Deputy Chief for the Child Exploitation and
Obscenity Section (CEOS) in the Criminal Division of the
United States Department of Justice. In this capacity, Mr.
King supervises more than a dozen prosecutors as well as the
High Technology Investigative Unit (HTIU), a special unit
within CEOS consisting of computer forensic specialists
who team with expert prosecutors to ensure the Department
of Justice’s capacity and capability to prosecute the most
complex and advanced offenses against children committed
online. Before joining CEOS as a prosecutor in 2001, Mr.
King served for more than six years as a prosecutor in the
United States Army Judge Advocate General’s Corps and
as a Special Assistant United States Attorney in the Eastern
District of Virginia.
Steve LaPorta
Sergeant
Gloucester County Prosecutor’s Office - New Jersey State
Police ICAC Task Force
Sergeant Steven LaPorta oversees the High Tech Crimes
Unit with the Gloucester County Prosecutor’s Office and
is an affiliate of the New Jersey State Police – ICAC Task
Force. Sergeant LaPorta has been assigned to this unit since
its inception in October 2004, and has been trained in the
investigation of computer use in the exploitation of children
and in the methods of digital forensic analysis. Sergeant
LaPorta has participated in numerous investigations, both
proactive and reactive, which have resulted in apprehension
and prosecution of suspects attempting to exploit or solicit
sexual acts with children.
Joe Laramie
Lieutenant
Glendale PD - Missouri ICAC
Lieutenant Joe Laramie is a 31 year veteran of the Glendale,
Missouri Police Department, with more than 28 years
experience in the area of child protection. He is a certified
Police Juvenile Specialist and former DARE officer, and
since 2003 has been the Program Director for the Missouri
Internet Crimes Against Children (ICAC) Task Force. He
has served on the National ICAC Task Force Executive
Committee and was a member of Missouri Governor
Blunt’s 2007 Cyber Harassment Task Force. He currently
68
serves on the Advisory Board to the National Coalition to
Prevent Child Sexual Exploitation and as an advisor to the
Internet Keep Safe (IKeepSafe) Coalition.
Tony Leonard
Lieutenant
Smyrna Police Deparrtment
Anthony Leonard has served with the Smyrna Police
Department since 1995. He is currently assigned to the
Criminal Investigations Division. Lt. Leonard formed the
Smyrna Police Department’s Computer Crimes Unit, which
he currently supervises. He is responsible for overseeing
the investigation of all the agency’s ICAC cases, computer
forensic examinations, and investigations into computerrelated crimes. He also maintains a case load of his own,
consisting primarily of peer-to-peer investigations and
undercover chat investigations. Since 1998, Tony has served
as a part-time instructor at the North Central Georgia Law
Enforcement Academy and the Clayton Regional Law
Enforcement Academy, conducting over 1,500 hours of
classroom and hands-on training.
Brian Levine
Associate Professor
University of Massachusetts Amherst
Brian Levine is an Associate Professor in the Dept. of
Computer Science at the University of Massachusetts
Amherst. He received a PhD in Computer Engineering
from the University of California, Santa Cruz in 1999. His
research focuses on digital forensics, mobile systems, and
the Internet, and he has published more than 60 papers on
these topics. Brian’s active funding includes awards from
the Nation Institute of Justice Electronic Crime program;
the National Science Foundation (NSF) programs on
Trustworthy Computing, Networking (NETS), GENI
testbed development; and DARPA’s Disruption Tolerant
Networking program. He received a CAREER award in
2002 for work in peer-to-peer networking, one of NSF’s
most prestigious awards for new faculty.
Marc Liberatore
Research Scientist
University of Massachusetts Amherst
Marc Liberatore is a Research Scientist at the University of
Massachusetts Amherst, working in the field of network
security. He received his Ph.D. in Computer Science from
the University of Massachusetts Amherst in 2008. He has
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
also served as a Mellon Postdoctoral Fellow at Wesleyan
University in Connecticut.
Keith Lockhart
VP, Training
AccessData
As Director of Training, Keith is responsible for the
development of forensic and encryption training solutions
for local, state, federal, and international law enforcement
agencies as well as worldwide corporate entities involved
in the prevention, investigation and prosecution of hightechnology crime. Prior to joining AccessData, Keith served
as a computer crime specialist at the National White Collar
Crime Center (NW3C) in Fairmont, WV. Keith served as
program manager of the INET (Internet Trace Evidence
Recovery & Analysis) course providing the framework
of complex research and design for its development and
maintenance.
Donald Mason
Associate Director and Research Professor
National Center for Justice and the Rule of Law,
University of Mississippi School of Law
Don Mason is Associate Director of the National Center
for Justice and the Rule of Law (NCJRL) and a Research
Professor at the University of Mississippi (Ole Miss) School
of Law. After receiving his B.A. and law degrees from the
University of Iowa, he started his law career as a county
prosecuting attorney in Iowa and then for twelve years
directed the statewide agency and nonprofit association
that provide training and technical assistance for Iowa
prosecutors. Prior to joining the NCJRL in 2003, he was a
municipal court judge in West Virginia and worked six years
for the National White Collar Crime Center developing
and presenting legal training on computer crime and related
criminal investigations.
David Matthews
Director
Wisconsin Department of Justice
David Matthews is the Director of the Wisconsin DCI
Investigative Services Bureau. He is responsible for the
management of the Wisconsin ICAC Task Force in addition
to his other duties. Prior to his current assignment Director
Matthews worked as a Special Agent assigned to the WI
ICAC Task Force since 1995 where his duties included
online investigations in the P2P network as well as forensic
PROTECTING OUR CHILDREN
computer examinations in addition to general cyber crimes
investigations. Director Matthews has been a police officer
since 1978.
Matthew McFadden
Department of Defense Cyber Crime Center
Matthew McFadden, Department of Defense Cyber Crime
Center; Defense Cyber Investigation Training Academy
(DCITA). As a member of the Network Investigation
Section, Mr. McFadden researches, develops, and instructs
in areas of forensics in network investigations and intrusions.
Matthew has spent several years in the field of Information
Technology specializing in Information Assurance and
Security, Network Intrusion/Penetration, and Forensics.
Matthew has performed research projects, consulted,
presented, and has worked in Network and System
Administration. He also holds industry IT certifications,
a Bachelors of Science in Network Security, a Masters of
Science in Information Security, and is also a candidate
for his Doctorate of Computer Science in Digital System
Security.
Rusty McGuire
Deputy Commonwealth’s Attorney
County of Louisa
Rusty McGuire is a career prosecutor that has served at
the local, state, and federal level. He has dedicated the last
7 years of his career to technology crimes and protecting
children from internet predators. He brought many of
Virginia’s worst internet predators to justice, prosecuted
our Nation’s first felony SPAM case, and helped organize
AG Bob McDonnell’s highly acclaimed Internet Safety Task
Force. Super Lawyers Magazine recognized and featured
Rusty in their 2007 “Rising Stars” edition. Rusty helped
develop the Attorney General’s “Safety Net” program which
is used as model to educate parents and minors on Internet
Safety. He has published numerous articles on legal subjects
ranging from Internet safety to capital murder.
Kevin McMurry
Assistant District Attorney
District Attorney’s Office Coweta Judicial Circuit
Rex Miller
Special Agent
Federal Bureau of Investigation
Rex Miller is a Special Agent (SA) with the Federal Bureau
69
Speaker Biographies
of Investigation (FBI). SA Miller has been an Agent with
the FBI since May 2004. SA Miller is currently assigned
to the Cyber Crimes unit in San Antonio, Texas, and is the
Innocent Images Coordinator for the San Antonio Division
of the FBI. SA Miller is part of the San Antonio’s Evidence
Response Team and works with other members on the team
in the preservation and documentation of crime scenes. He
is a licensed Professional Engineer and holds a Bachelors of
Science degree in Civil Engineering from New Mexico State
University, New Mexico. Preceding his appointment as an
Agent of the FBI, he was employed as a Forensic Engineer
for over 10 years.
serving as Victim Assistance Advocate, Child Sexual Assault
Team Coordinator and Education Coordinator. In 2003
she was appointed Director of Community Outreach and
Education where she is responsible for the implementation
of crime prevention and awareness education and training.
Ms. Mulcahy worked with prevention experts to create the
District Attorney’s Bullying Prevention Initiative which
partners with schools countywide to combat bullying and
harassment. In 2006, she collaborated with the Massachusetts
ICAC Task Force to create a student mentoring internet
safety pilot program for young students that now serves as a
model for the state.
Richard Moultrie
Assistant United States Attorney
US Attorney’s Office
Richard S. Moultrie, Jr. has been an Assistant United States
Attorney for 14 years. He currently serves as the Human
Trafficking Coordinator for the United States Attorney’s
Office in the Northern District of Georgia. He has handled
a variety of federal offenses, including child exploitation
offenses, child pornography production and distribution,
and RICO violations.
Hugh Munn
Crisis Communications and Public Relations lecturer
University of South Carolina, School of Journalism and
Mass Communications
Hugh Munn specializes in law enforcement media relations
and crisis communications techniques. He is retired after
26 years as chief spokesman with the S.C. State Law
Enforcement Division (SLED) and currently serves as a
public relations and crisis communications lecturer for
the University of South Carolina’s School of Journalism
and Mass Communications. Munn has presented law
enforcement training programs in more than 45 states and
Puerto Rico.
Nathan Mousselli
Special Agent
Department of Homeland Security - Immigration &
Customs Enforcement
Nathan Mousselli is a Special Agent with the Department of
Homeland Security, Immigration and Customs Enforcement
(ICE) in New York City. He has 13 years of combined Law
Enforcement and Military (United States Marine Corps)
experience. Prior to his law enforcement career, Nathan was
a computer operations manager, information technology
(IT) specialist and network administrator. Nathan graduated
from The Pennsylvania State University and is a Certified
Forensic Computer Examiner (CFCE) by the International
Association of Computer Investigative Specialist. He holds
numerous other certifications. Nathan has testified as an
expert witness in federal court and has conducted exams
on PCs, Macs, iPhones, RAIDs, PDAs and numerous other
storage devices.
Carol Mulcahy
Director of Community Outreach and Education
Berkshire District Attorney
Carol Mulcahy joined the District Attorney’s staff in 1992,
70
Laurie Nathan
Manager of National Outreach and Partnerships
NetSmartz Workshop/NCMEC
Laurie Nathan is the Manager of National Outreach and
Partnerships for NetSmartz Workshop, a program of the
National Center for Missing & Exploited Children. She
brings a background in child exploitation and child abuse
prevention to the fight against child endangerment online.
Recently, Laurie’s focus has been on spreading awareness
of the importance of Internet safety education. Laurie is
an alumna of Emory University in Atlanta, GA where she
graduated with highest honors in Psychology.
Nick Newman
Computer Crime Specialist
National White Collar Crime Center
Nicholas R. Newman has been with the National White
Collar Crime Center since January of 2006. He started
off as an intern and quickly moved up the ranks of the
Computer Crimes Section. In a little over six months, he
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
was promoted to Computer Crime Specialist. Dedication
and overachievement is nothing out of the ordinary for CCS
Newman; he’s been doing it since he was barely old enough
to have a driver’s license.
Wayne Nichols
Detective
Henderson Police Department
I have been a Detective for over 2 years. I have over 350
hours in training in the area of Forensics (EnCase and
FTK), undercover operations, P2P (Wyoming and TLO)
and I specialize in proactive Craigslist investigations, which
from 2009 to date, I have made 14 arrests. My cases are
prosecuted both a state and federal level.
Kelli O’Neill
Special Agent
California Department of Justice
Kelli ONeill is a Special Agent with the California
Department of Justice, Bureau of Medi-Cal Fraud and
Elder Abuse. Kelli is currently assigned as lead agent of the
Department of Justice, Computer Forensics Lab. She was
a Sworn California Peace Office for 14 years. She designed
and built DOJ, Medi-Cal Fraud Computer Forensics Lab
(CFIT).
Ellen Ohlenbush
President
McGruff SafeGuard
Ms. Ohlenbush is President of McGruff SafeGuard.
Partnering with the National Crime Prevention Council,
McGruff monitors & controls kids’ online activity. A
frequent speaker on Internet risks for families & the
technologies available to protect them, she recognizes when
our children are online, their neighborhood is global. This is
a challenge for parents and law enforcement as they attempt
to protect our children. McGruff developed a technology
that provides children with a safer experience. Our mission
is to give parents the ability to parent in this global
neighborhood. While ensuring children have access to the
benefits of the internet along with bringing the community
together to build awareness & ensure that law enforcement
& parents work together for the best experience.
Scott Pancoast
Cyber Crime Specialist
National White Collar Crime Center
PROTECTING OUR CHILDREN
Mr. Pancoast, a graduate of Western Washington University,
completed 16 years of government service that included
12 years as an investigator with the Washington State
Office of the Attorney General. During his tenure with
the Washington State office of the Attorney General, Mr.
Pancoast worked in Criminal Justice Division, Economic
Crimes Unit, in the Consumer Protection Division, and in
the High Tech Unit. Prior to his work with the Washington
State office of the Attorney General, Mr. Pancoast was a Tax
Auditor with the Washington State Department of Labor
and Industries and the Washington State Department of
Revenue.
Dave Peifer
Lieutenant
Delaware County District Attorney’s Office
Detective Lieutenant David Peifer, Delaware County
Criminal Investigation Division (CID) is a member and
the supervisor of a Task Force (Operation Triad) which
directs its efforts in the area of Internet Crimes Against
Children (ICAC) and is comprised of federal, state, and
local law enforcement. The task force is responsible for
conducting undercover online investigations, responding
to complaints regarding children sexually exploited via
the Internet, conducting community education programs,
and monitoring the Internet for the bartering in child
pornography. Lieutenant Peifer has been a law enforcement
officer for 29 years and the supervisor of the Delaware
County District Attorney’s Criminal Investigation Division’s
Child Abuse Unit for 10 years.
John Penn
Sr. Solutions Architect- Intelligence, Investigation & Law
Enforcement Technologies
Adobe Systems Inc
John Penn II is Senior Solutions Architect for Intelligence,
Investigation and Law Enforcement Technologies at Adobe
Systems, in San Jose, California. He spent 11 years at Adobe
as a Senior Computer Scientist working on Photoshop and
is now focused on the development of tools, techniques and
training for the intelligence and law enforcement community
as well as for the National Center for Missing and Exploited
Children. Mr. Penn has a history in the technology
sector extending 30 years. He has been working to foster
communication between law enforcement and industry.
He hopes his efforts will build a better understanding of
law enforcement challenges in industry, and bring a better
71
Speaker Biographies
understanding of technology to the law enforcement and
judicial system.
Cheryl Penna
Youth Education & Prevention Specialist
Berkshire District Attorney
Cheryl Penna has been employed at the Berkshire District
Attorney’s Office for 18 years, first as a Victim Assistance
Advocate and later as a Senior Advocate. She was appointed
Child Sexual Assault Unit Program Coordinator, becoming
a member of the Sexual Assault Intervention Network
(SAIN). In 2005 Ms. Penna joined the Community
Outreach & Education Program to train local K-12 school
professionals on bullying, harassment and hate crimes as
part of the Massachusetts Safe Schools Initiative. In 2007
she became a Youth Education & Prevention Specialist.
Ms. Penna graduated from Westfield State College with a
Bachelor of Science Degree in education and a minor in
psychology. She has worked as a special education teacher,
remedial education specialist, and in-school suspension
supervisor.
D. Matthew Powell
Trooper First Class
Pennsylvania State Police
Trooper D. Matthew Powell became a member of the
Pennsylvania State Police in 1996. He is currently assigned as
a Computer Crime Investigator with the Pennsylvania State
Police Bureau of Criminal Investigation. He is responsible
for both the forensic analysis of computer systems and the
investigation of computer related crimes. Trooper Powell
currently holds certifications as CFCE, EnCE, ACE and A+.
He is a member of the Pennsylvania State Police, Computer
Crime Task Force and the Pennsylvania ICAC Task Force.
He also provides instruction to all of the PSP Area Computer
Crime Task Forces and has instructed numerous other law
enforcement agencies as an instructor for the ICAC Task
Force.
Joseph Rampolla
Lieutenant
Park Ridge Police Department
Joseph Rampolla has been a law enforcement officer for
fifteen years. Joseph holds a Bachelor of Arts degree in
Law & Society from Ramapo College of New Jersey. He
became a police officer in 1995 and currently holds the rank
of Lieutenant for the Park Ridge Police Department. He
has supervised numerous criminal investigations within the
department and oversees the Detective Bureau. In 2003
he was assigned to a regional computer crimes task force.
He has successfully completed training offered by county,
state and federal agencies as well as leading technology
companies with a focus in the areas of computer forensics,
Internet child exploitation, cyber-bullying, cyber counterterrorism, human trafficking, and Peer-to-Peer file sharing
investigations.
Lee Reiber
CEO
Mobile Forensics Inc
Lee Reiber is CEO of Mobile Forensics Inc, the leading non
vendor training company in the US specializing in mobile
forensics. Mobile Forensics Inc recently became the mobile
phone training company for AccessData and trains on cell
phone forensics. Lee Reiber is a frequent writer for the Law
Officer Magazine on cell phone forensics and has been
featured in many newspapers from the New York Times
to the Washington Post. Lee worked for the Boise Police
Department for almost fifteen years where he conducted
forensic exams of computers and mobile devices prior to
leaving in late 2009. Some of Lee’s memberships include:
The International Association of Computer Investigative
Specialists, High Technology Crime Investigation
Association and a Mobile Forensics Certified Examiner.
Donna Rice Hughes
President
Enough Is Enough
Donna Rice Hughes, President of Enough Is Enough (EIE),
is an internationally known Internet safety expert, author,
and speaker. Under her leadership and vision, EIE created
the Internet Safety 101 program with the U.S. Department
of Justice. She is also the executive producer, host, and
instructor of the Internet Safety 101 DVD series. Donna
has been a featured guest on leading national broadcasts
including Dateline, The Today Show, The O’Reilly Factor,
Oprah and 20/20, having given more than 3,500 media
interviews. She has testified numerous times before the
United States Congress and served on the 2008 COPA
Commission, the 2006 Virginia AG’s Internet Safety Task
Force and the 2008 Internet Safety Technical Task Force,
formed by the U.S. Attorneys General.
Andrew Rosen
72
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
CEO/CTO
ASR Data Acquisition & Analysis, LLC
As a Forensic Computer Scientist, Andrew Rosen offers
unique litigation support services to the Legal, Law
Enforcement and Investigative communities. With over
twenty years of experience in the recovery of computer
data and forensic examination (computer forensics), Rosen
regularly provides expert testimony in federal and state
courts. Along with training attorneys and law enforcement
officials in computer investigation techniques, Rosen
frequently speaks and writes on emerging matters in the
field. In summary, Rosen has a worldwide reputation for
developing cutting edge computer crime investigative tools
and is frequently consulted by other professionals in the
industry.
Randy Schriefer
SVICAC Commander
San Jose Police Department
Sergeant Randy Schriefer has been a police officer for 16
years. During his law enforcement career, Randy has worked
a variety of assignments including patrol, field training
officer, motor officer, motor officer instructor, family and
workplace violence investigator, patrol sergeant, robbery
investigator/sergeant and sexual assaults sergeant. Randy
is currently the ICAC Commander for the Silicon Valley
Internet Crimes Against Children Task Force. In addition
to his role as the SVICAC Commander, Randy oversees the
San Jose Police Departments Child Exploitation Detail and
is an on-call sergeant for the departments sexual assault unit
and tactical negotiations team. Randy is also responsible
for organizing and hosting the annual Silicon Valley ICAC
conference.
Herb Scott
Computer Crime Specialist
National White Collar Crime Center
Herb Scott joined the staff of the NW3C, on April 1,
2004, bringing with him over 34 years of law enforcement
experience and over two years of computer forensic
experience. Herb began his investigative career with the Army
Security Agency, in 1963, branching out into assignments
with other Intelligence agencies. He was trained as a linguist
in the German and South Vietnamese languages. After five
years in the Army, he worked as a Private Investigator until he
joined the Jacksonville, Florida, Police Department/Sheriff’s
PROTECTING OUR CHILDREN
Office (JSO) in 1970. During his 26 ½ years with the JSO,
Herb worked “Mod Squad” details, Patrol Division, Undercover Narcotics, Burglary, Robbery and Homicide. He was
the recipient of numerous commendations and citations.
Thomas Sirkel
Associate Director of Training & Outreach
National Center for Missing & Exploited Children
Thomas G. Sirkel is currently employed by the National
Center for Missing & Exploited Children as an Associate
Director of Training & Outreach. He is responsible for the
teaching & facilitating of the Protecting Children Online and
Protecting Victims of Child Prostitution courses nationwide.
He retired in October 2008 from the Los Angeles County
Sheriff’s Department after more than 39 years of service. He
retired as Operations & Training Lieutenant for the Special
Victims Bureau where he supervised and managed six teams
of Child/Sexual Abuse detectives. He also was the Program
Manager for the Los Angeles County SAFE Team.
Micah Smith
Detective
Linn County Sheriff’s Office
Micah Smith is the Computer Crimes Detective for the
Linn County Sheriff’s Office in Albany, Oregon, primarily
investigating computer-facilitated child sex crimes, and
undercover peer-to-peer file sharing investigations, as well
as conducting computer forensics examinations for Linn
County and neighboring agencies. Detective Smith’s forensic
specialty has focused on the Mac operating system, as well as
Windows forensics using EnCase. Smith is a recipient of the
2005 NCMEC Law Enforcement Award, serves as a faculty
instructor for the National District Attorneys Association,
is a frequent presenter at Internet safety conferences
throughout the Northwest, and is in charge of the Sheriff’s
Office Internet safety program TechSmartz tasked with
keeping kids safer online.
Sean Speakman
Detective
Polk County Sheriff’s Office
Speakman began his career at the Sheriff’s Office in the
IT Department and left after 6.5 years. He returned as a
deputy and shortly after proceeded as a Computer Crimes
Detective. He has worked in this capacity for over 3 years.
Speakman is a forensic examiner and has extensive IT
73
Speaker Biographies
experience including network administration, security and
email administration and hardware repair.
Gary Spurger
Sergeant
Harris County Constable, Precinct 4
Sgt. Gary Spurger has been in Law Enforcement for
approximately 20 years and with the Harris County
Constables Office, Precinct 4 for the past 17 years. During
that time Sgt. Spurger has been in the patrol division as a K9
Handler, Crime Scene Photographer, Videographer, Traffic
Unit, Certified Field Training Officer and is certified by the
Texas Commission on Law Enforcement Officers Standards
and Education as an Instructor and Firearms Range Master.
Sgt. Spurger holds a Master Peace Officers License and is
on the TCLEOSE appointed board to create a certification
process for CyberCrimes Investigators in the State of Texas.
National Crime Squad Occupational Health and Welfare
department where her responsibilities included supporting
the health and wellbeing of specialist law enforcement
officers both nationally and internationally. As a Research
Fellow to Bramshill College, Jane has carried out several
studies relating to psychological support for investigators.
Joe Sullivan
Principal Forensic Behavioural Analyst
Behaviour Analysis Unit, CEOP
Joe is the Principal Psychologist with the Child Exploitation
and Online Protection Centre (CEOP) in the UK. CEOP
is a national law enforcement agency which specialises in
crimes against children. The Behaviour Analysis Unit (BAU)
where Joe is based offers specialist advice and assistance to
investigations into child sexual abuse and has been involved
in a number of high profile investigations over the last eight
years.
Amy Staubs
Program Manager
OJJDP
Amy Staubs works for the Office of Juvenile Justice and
Delinquency Prevention’s (OJJDP) Child Protection
Division, where she is responsible for managing the Internet
Crimes Against Children (ICAC) Task Force Program, the
Missing and Exploited Children Training and Technical
Assistance Program and the Association of Missing and
Exploited Children’s Organizations (AMECO). She also
co-manages the Child Protection in Tribal Communities
Program. Prior to joining OJJDP, Ms. Staubs has 14 years
of experience working on federal grants related to program
development and coordination and delivery of training and
technical assistance. She has worked on national, state, local
and tribal initiatives on issues including victim services,
crime/substance abuse prevention, youth development, and
adolescent health.
Michael Sullivan
Deputy Chief
Illinois Attorney General’s Office
Deputy Chief Sullivan is a thirty year veteran of law
enforcement and holds a Bachelor’s Degree in Law
Enforcement Administration. He is assigned to the
Investigations Division for the Illinois Attorney General’s
Office and the ICAC Task Force Commander. He is
the author of Safety Monitor, which focuses on the use
of computers to victimize children and the SAFEKIDS
program in conjunction with the Microsoft Corporation.
He has received numerous awards for his work including
the Medal of Valor.
Antonio Sutton
Deputy Director of Court Services
Norfolk Juvenile and Domestic Relations District Court
Services Unit
Jane Stevenson
Occupational Health and Welfare Consultant
Workplace Wellbeing
Jane Stevenson, founder of Workplace Wellbeing, is a highly
experienced nurse consultant. Jane is currently Welfare
Consultant to several UK Government Agencies as well as
to the Innocent Justice Foundation in the USA. She also
leads on the Module in Occupational Health for Remote
Medical Practitioners with the Royal College of Surgeons
Faculty of Health. Jane spent seven years as Head of the
74
Buddy Tidwell
Senior Instructor
AccessData
Buddy specializes in the investigation of computer related
crimes and recovery and preparation of digital evidence.
Buddy served as a Lab Manager and Senior Computer
Forensic Examiner at the Joint Computer Forensics Lab for
Law Enforcement in Middle Tennessee and as a criminal
investigator for the District Attorney Generals Office where
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
he was the lead investigator in hundreds of CyberCrime
incidents and complex felony investigations. Buddy
regularly provides hands on training to law enforcement
agencies and private sector examiners around the globe in
the investigation of computer-related offenses.
Jennifer Torpie
Analyst
Delaware County ICAC Task Force
Jennifer G. Torpie has been an Analyst with the Delaware
County Internet Crimes Against Children (ICAC) Task
Force since September 2008. Analyst Torpie manages
CyberTipline leads for the state of Pennsylvania and
provides outreach to parents and students on Internet safety.
She is also involved in proactive investigations involving
commercially available child pornography. Prior to joining
the ICAC, Torpie was employed at the National Center
for Missing & Exploited Children (NCMEC) in both the
Exploited Children Division and the Missing Children
Division. At NCMEC, Torpie received extensive training
in investigative methods regarding Internet-facilitated child
sexual exploitation and child abductions.
Eric Trest
Special Agent
Naval Criminal Investigative Service - DoD
Representative to NCMEC
Eric Trest has been a Special Agent with the Naval Criminal
Investigative Service (NCIS) since 2005. He is currently
assigned as the Department of Defense Representative to
the National Center for Missing and Exploited Children
(NCMEC). Prior to his appointment at NCMEC SA
Trest was assigned to NCISHQ as the Child Exploitation
Investigations and Operations Desk Officer. Formally, SA
Trest was a member of the Family and Sexual Violence Unit
(F&SVU), at Marine Corps Base, Camp Pendleton, CA,
and a member of the San Diego Internet Crimes against
Children (SDICAC) Task Force. Prior to NCIS SA Trest
was an Analyst with the NCMEC, Exploited Child Unit
and Police Officer for the City of Evanston, IL.
Allison Turkel
Senior Policy Advisor
DOJ/Office of Sex Offender Sentencing Monitoring,
Apprehending, Registering and Tracking (SMART)
Allison Turkel serves as a senior policy advisor in the USDOJ
SMART Office. Previously,she served as the Director of the
PROTECTING OUR CHILDREN
NDAA’s National Center for Prosecution of Child Abuse
where she managed and supervised program activities and
staff. She also provided training and technical assistance on
child abuse, maltreatment, sexual exploitation, computer
facilitated crimes against children and domestic violence.
Prior to coming to NDAA, she was an Assistant State’s
Attorney in McLean County, IL. Before that, she was an
A.D.A. in the N. Y. County D.A.’s Office for 9 ½ years. She
tried a wide variety of felony cases including narcotics, child
physical and sexual abuse and homicides. Prior to becoming
a prosecutor, she was a police officer for 8 years
Richard VanBoxtel
Chief
Oneida Police Department
Richard Van Boxtel is an enrolled member of the Oneida
Tribe of Indians of Wisconsin and the Chief of Police for
the Oneida Police Department in Oneida, Wisconsin. Rich
began his law enforcement career at the Oneida Police
Department in 1992 as a patrol officer. In 1995, he was
promoted to Sergeant and has held other interim positions
in the department as Lieutenant and Assistant Chief.
Rich has an Associate Degree in Criminal Justice - Law
Enforcement from Northeast Wisconsin Technical College,
a Bachelors Degree in Public Services Administration from
Silver Lake College, and a Masters Degree in Management
and Organizational Behavior from Silver Lake College.
Alex Vichinsky
Law Enforcement Response Analyst
Facebook
Lauren Wagner
High Tech Crime Training Specialist
SEARCH
Ms. Lauren Wagner is a High Tech Crime Training Specialist
in the Training Services Department of SEARCH where she
performs tasks related to training local, state and federal
agencies on computer technology issues with criminal
justice applications. She provides technical assistance to
law enforcement agencies in active cases, prepares training
materials, teaches SEARCH investigative courses and speaks
at conferences throughout the U.S. Ms. Wagner is an ICIcertified instructor and received a 2009 “Excellence in
Training” award from California POST.
75
Speaker Biographies
Kevin West
Detective
Cary Police Department
Kevin West is the former head of the NC ICAC (retired in
January 2009) and now works for Cary Police Department
in an undercover on-line capacity in Internet Crimes Against
Children. He has a four year degree in criminal justice from
Brigham Young University. Kevin has a 31 year background
in Law Enforcement with a large emphasis on Crimes
Against Children and Internet Crimes Against Children. He
has worked all walks of law enforcement investigations and
management in the law enforcement sector. He is a graduate
of the FBI National Academy and has taught Internet
Crimes Against Children classes all over the United States
and also Internationally.
Tim West
Commander
Montana ICAC Task Force
Tim West started his law enforcement career as a Patrol
Officer in 1984 with the El Paso, Texas Police Department.
In 1987 he was hired by the Portsmouth, NH Police
Department as a Patrol Officer. In 1991 Mr. West became
a Detective and was assigned to the Juvenile Division.
As a Juvenile Detective, Mr. West was involved in the
investigation of juvenile delinquent cases as well as the
prosecutor for the Juvenile Division. He spent nine years
as the department’s lead investigator of child sexual and
physical abuse cases. During the course of his nine years, Mr.
West was responsible for interviewing hundreds of children
who were the victims of abuse, along with interviewing the
suspects who were involved.
Donald Whitehead
Lieutenant
Kokomo Police Department
I am a 25 year veteran of the Kokomo Police Department,
currently assigned as a Lieutenant in the Computer
Forensics Lab. I have been a member of the Indiana ICAC
for approximately 7 years and have participated in hundreds
of cases involving the victimization of children.
department of SEARCH, The National Consortium for
Justice Information and Statistics, where he coordinates
and provides training on high-tech crime investigations and
forensics to local, state and federal justice and public safety
agencies.
Timothy A. Williams
Director
INTERPOL WASHINGTON
Timothy A. Williams commenced his appointment in
October 2009 as the Director of INTERPOL Washington
(U.S. National Central Bureau), a subcomponent of the
U.S. Department of Justice. As the Director of INTERPOL
Washington, Mr. Williams acts on behalf of the Attorney
General as the official representative to the International
Criminal Police Organization located in Lyon, France. He
also directs all operations, policies and procedures related to
INTERPOL Washington.
Matthew Williams
Computer Crime Specialist
National White Collar Crime Center
Mr. Williams graduated from West Virginia University with
a Bachelor of Science degree in Computer Science and a
graduate certificate in Computer Forensics. He has also
received CompTIA’s A+ and Security+ certifications and will
complete his Master’s degree in 2010. Matt has been with
NW3C for two years. He has assisted in the development
of basic and advanced computer forensics courses ranging
from incident response and operating systems to network
intrusion and mobile device forensics. He has also done
extensive research on the topics of information security
management, cell phone networks, computer security, and
cyber law. He is currently instructing NW3C courses to
local, state, and federal law enforcement agencies throughout
the country.
Thad Winkelman
Corporal
Shawnee County Sheriff’s Department
Janis Wolak
James Williams
High Tech Crime Training Specialist
SEARCH
Mr. Williams is a High-Tech Crime Training Project
Instructor in the High-Tech Crime Training Services
76
Senior Researcher
Crimes against Children Research Center, UNH
Janis Wolak, J.D., is a Senior Researcher at the Crimes against
Children Research Center, University of New Hampshire.
She has directed US national studies about youth Internet
2010 ICAC NATIONAL CONFERENCE
Speaker Biographies
use and Internet safety, including national surveys of law
enforcement agencies about crimes related to the Internet,
funded by the US Department of Justice, OJJDP. She is the
author and co-author of numerous reports, book chapters,
and peer-reviewed articles about youth victimization, youth
Internet use, online predation, child pornography and
other Internet-related sex crimes, written with colleagues
David Finkelhor and Kimberly Mitchell, CCRC. She has
provided training and served on expert panels nationally
and globally in the field of Internet safety.
Justin Wykes
Computer Crime Specialist
National White Collar Crime Center
Mr. Wykes joined the National White Collar Crime Center
in December 2006 as a Computer Crime Specialist. He is
currently responsible for the development and updating
of the “Basic Cell Phone Investigations” and “Fast
Cyberforensic Triage” courses, and is an instructor for the
ISEE, STOP, BDRA, NTFS, NTOS, and BOTS courses.
Mr. Wykes was also the NW3C team-lead on the validation
and update Microsoft’s COFEE tool, version 1.1.2. He
has ten years experience building, fixing and repairing
computers, and earned his A+ certification in September
of 2006. After earning a Bachelor of Science degree from
Grand Valley State University in Criminal Justice, with an
emphasis in Law Enforcement, Mr. Wykes spent five years
as a Special Agent for US Army Counterintelligence.
D. Todd Zerfoss
Senior Special Agent/National Program Manager
Department of Homeland Security Immigration and
Customs Enforcement Cyber Crimes Center. I have been
employed as a Special Agent for United States Immigration
and Customs Enforcement since the agency’s creation
in March 2003. Prior to that time, I was employed as a
Special Agent for the United States Customs Service from
September 2000 through March 2003. Prior to becoming
a Special Agent with the United States Customs Service,
I was employed by the United States Immigration and
Naturalization Service for approximately five years. As
a Senior Special Agent for ICE, my primary duty was
investigating and prosecuting child exploitation cases. In
December of 2009 I was promoted and transferred from
the Resident Agent in Charge/Fort Myers, FL office to ICE
Head Quarters Cyber Crimes Center in Fairfax, VA where I
am a National Program Manager for the Child Exploitation
Section.
PROTECTING OUR CHILDREN
77
78
2010 ICAC NATIONAL CONFERENCE
Exhibitors
In partnership with the National Center for Missing & Exploited Children
(NCMEC), the ICAC Task Forces have received and processed more than
55,000 CyberTipline reports.
Exhibitors
Adobe
For 25 years, Adobe Systems has been a trusted partner
to government organizations around the globe. With
consistency, government organizations look to Adobe to
help better create, edit, visualize and share information with
practically everyone in the world. In the quest to become
open and transparent, government organizations use Adobe
solutions to more efficiently and effectively interact with
citizens, employees and other constituents. Whether faced
with publishing official government documents, providing
citizens with a forum to participate in policy review, or
reducing the complexity of enrolling for benefits, agencies
turn to Adobe for trusted solutions to a wide variety of
people-centric, government challenges.
Access Data
AccessData has pioneered digital investigations for more
than twenty years, providing the technology and training
that empower law enforcement, government agencies and
corporations to perform thorough computer investigations
of any kind with speed and efficiency.
AMECO
Founded in 1994, AMECO is an association of missing and
exploited children’s organizations in the U.S. and Canada;
AMECO’s mission is to build and nurture an international
association of credible, ethical, and effective nonprofit
organizations that serve missing and exploited children,
their families and law enforcement.
BackBone Security
The SARC is a Center of Excellence in digital steganography
research and development within Backbone Security. The
SARC has established the world’s largest commercially
available repository of digital steganography applications,
fingerprints, and signatures and has developed industry
leading computer forensics and network security steganalysis
tools for detecting and extracting information hidden with
digital steganography applications.
units deployed and hundreds of thousands of end users.
Our products have been deployed reliably and effectively
throughout the world, and used for both commercial data
synchronization and forensic data analysis..
Computer Cop Software Corp
Today the number one concern of parents is: “What are my
children doing on the computer?” This tool enables parents
to review what their children have been doing online. It
does not block access to sites, but rather reviews what sites
children have gone to on the web.
Digital Certainty
Digital Certainty draws upon advanced defense research
to create cyber security and forensics products for law
enforcement and commercial security users. Digital
Certainty’s flagship product, Wi-Fi Investigator, is now in
the hands of defense and law enforcement customers.
Fernico
Fernico’s ZRT Video Mobile Phone Examination System is
the leading method to manually extract evidential data and
report this information from any mobile device. Fernico’s
FAR, is the premier automated forensic Blu-Ray system for
archiving evidential data and acquiring large quantities of
seized discs.
Forensic Computers, Inc.
Forensic Computers, Inc is owned and managed by retired
Air Force Office of Special Investigations Computer Crime
Investigators. We focus on providing high quality forensic
workstations, forensic related equipment, and software to
the computer forensic community. Forensic Computers has
provided equipment and training to a number if ICAC task
force units.
HTCI
Forensic categorization solutions for Law Enforcement.
As a global leader in the field of Computer Crime
Investigation and Computer Forensics, HTCI is uniquely
qualified to provide expert instruction, proactive security
management and computer forensic platforms to both the
private and public sectors.
Cellebrite USA
Immigration and Customs Enforcement
BlueBear LES
Established in 1999, CelleBrite is the leader in cellular
phone synchronization technologies, with over 70,000
PROTECTING OUR CHILDREN
Formed in 2003 as part of the federal government’s response
to the 9/11 attacks, ICE’s mission is to protect the security of
79
Exhibitors
the American people and homeland by vigilantly enforcing
the nation’s immigration and customs laws. ICE combines
innovative investigative techniques, new technological
resources and a high level of professionalism to provide a
wide range of resources to the public and to our federal,
state and local law enforcement partners.
InfinaDyne
We specialize in computer forensics. CD/DVD Inspector
is used throughout the world by law enforcement agencies,
forensics investigators, and government agencies to analyze
and extract CD and DVD media.
Innovative Business Products
Innovative Business Products (IBP) is a Minneapolisheadquartered company that delivers recording media
products and offers related duplication equipment and
publishing systems – specifically for the digital forensics and
law enforcement markets - through a high-touch, customer
service-friendly experience.
ICAC Training & Technical Assistance Program
The ICAC Training & Technical Assistance Program offers
regional, specialized and technical assistance training to
federal, state and local prosecutors, probation and parole
officers and law enforcement investigators at locations
throughout the country so that participants can take
advantage of the valuable information conveyed during our
Programs in the most cost-effective manner possible.
email or cell phone to potentially dangerous behavior.
The
National
District
Attorneys
Association
The National District Attorneys Association is the oldest
and largest professional organization representing criminal
prosecutors in the world. Its members come from the offices
of district attorneys, state’s attorneys, attorneys general,
and county and city prosecutors with responsibility for
prosecuting criminal violations in every state and territory
of the United States.
National Law Center for Children and Families
The National Law Center for Children and Families (NLC)
is a non-profit law center formed in 1991 which has since
served as an agent of change and education in the areas of
child sexual exploitation.
National White Collar Crime Center (NW3C)
The mission of the NW3C is to provide training, investigative
support and research to agencies and entities involved in the
prevention, investigation and prosecution of economic and
high-tech crime.
NetSmartz
National Center for Missing & Exploited Children, has
been a leader in the Internet safety education field since
2001. NetSmartz offers free, interactive, educational safety
resources to help teach children ages 5-17 how to be safer
online and in the real world.
Intelligent Computer Solutions
Office of Juvenile Justice & Delinquency Prevention
Intelligent Computer Solutions (ICS) the technology leader
in high speed hard drive duplication has applied its technology
(based on its US patent 6,131,141) to the development of
the most advanced tools in Computer Forensic. ICS Data
acquisition tools have become the known standard within
Law Enforcement Agencies World Wide and are being used
wherever data acquisition and analysis takes place.
OJJDP provides national leadership, coordination, and
resources to prevent and respond to juvenile delinquency
and victimization.
McGruff SafeGuard
McGruff SafeGuard is a free subscription service that
intelligently monitors, filters and controls children’s online
activity, including: e-mail, chat, instant messaging, Web site
visits, MySpace, Google, Facebook, AOL, MSN & Yahoo.
Once installed, SafeGuard automatically alerts parents by
80
Paraben
Paraben Corporation was founded in 1999 and quickly
established itself as a leader in specialized digital forensic
software with its release of PDA Seizure in early 2002.
Paraben then released Cell Seizure, the first commercial tool
for performing cell phone forensics
2010 ICAC NATIONAL CONFERENCE
Exhibitors
Pen-Link
Strategic Access Technologies
In business for over 20 years, Pen-Link, Ltd. provides Law
Enforcement and Intelligence agencies with state-of-the-art
software and systems for the collection, storage, and analysis
of telephonic- and IP-based communications.
Strategic Access Technologies has emerged as industry
leaders specializing in tailored, comprehensive solutions
to meet local and state law-enforcement agencies need
for exploitation, computer forensic and cyber security
requirements. SAT’s National-level experience tethered
with state-of-the-art assets allows our staff to quickly and
efficiently react to customer needs worldwide. SAT is an
affiliate of NEK Advanced Securities Group, Inc. (NEK),
a leading global provider of security, training and technical
services to commercial, defense, and government sectors,
and a member of the NEK Group of Companies.
Rimage
Rimage Corporation (Nasdaq NMS: RIMG) is the world’s
leading provider of integrated CD-R/DVD-R (recordable)
publishing systems, required for producing discs with
customized digital content on an on-demand basis.
SEARCH
SEARCH, The National Consortium for Justice Information
and Statistics, is a nonprofit membership organization
created by and for the states. Since 1969, SEARCH’s
primary objective has been to identify and help solve the
information management problems of state and local justice
agencies confronted with the need to exchange information
with other local agencies, state agencies, agencies in other
states, or with the federal government.
Social Shield
We specialize in internet monitoring tools for parents,
specifically within social networks to understand where kids
are active online, who they are speaking with and friends
with, and what they are saying.
SpectorSoft
SpectorSoft is the recognized leader and pioneer in the
PC and Internet monitoring software market. More than
500,000 parents and 50,000 businesses, government
organizations, schools, and law enforcement agencies
have purchased SpectorSoft products to help keep kids
safe online, and to prevent Internet abuse, data loss, and
compliance violations in the workplace.
SR Technologies
SR Technologies supports federal, state and local law
enforcement with purpose-built suite of tools for 802.11
access point and station discovery, surveillance, interception
and targeting.
PROTECTING OUR CHILDREN
Technology Pathways
Technology PathwaysTM makes the ProDiscover® family of
computer forensic software. ProDiscover includes solutions
for computer investigations, incident response, security
auditing, and electronic discovery.
The Innocent Justice Foundation
The Innocent Justice Foundation is a non-profit organization
whose mission is to provide support to Internet Crimes
Against Children (ICAC)task forces in the area of child
pornography investigations.
Tracker Products
At Tracker Products, we design browser-based bar code
tracking software that intuitively adapts to the specific
needs of each of our customers. Law enforcement agencies
from Maine to California, The United States Armed Forces,
Institutions of higher learning, e-discovery units and
countless other industries have found Tracker Products’
infinitely customizable tracking environment to be an
indispensable tool in their quest for accurate chain-ofcustody and asset management.
USDOJ - COPS
COPS provides community policing resources for law
enforcement. Participants can get our problem solving
guides that address topics affecting all communities.
The U.S. Marshals Service
The U.S. Marshals Service was tasked with important new
responsibilities in 2006 under the Adam Walsh Child
81
Exhibitors
Protection and Safety Act. This legislation designated the
U.S. Marshals as the lead federal agency tasked with locating
fugitive sex offenders who fail to register or do not comply
with their state’s registry requirements.
Vere Software
Vere Software was founded to build tools upon concepts
that already exist for, and are commonly accepted about,
online evidence collection and preservation.
Web Wise Kids
Web Wise Kids is a unique organization that offers fun,
challenging and interactive simulations based on real-life
criminal cases—MISSING, Mirror Image, Airdogs and It’s
Your Call.
Whats What?
www.whatswhat.me is a social networking website designed
for tweens. The mission of the site is to help educate children
on how to behave safely on the Internet and in particular,
on social networking sites so that they are prepared for sites
such as Facebook.
82
2010 ICAC NATIONAL CONFERENCE
Acknowledgements
From 2005 to 2009, the number of complaints reviewed by the ICAC Task
Forces, related to the prostitution of children and the commercial sexual exploitation of children, has increased by more than 746%.
Acknowledgements
THANKS TO OUR PARTNERS
The U.S. Department of Justice’s Office of Justice Programs would like to thank the following
organizations and offices for their ongoing efforts to support the ICAC Task Force Program in
protecting children from sexual exploitation.
Our partners include:
The Internet Crimes Against Children Task Forces
National Center for Missing & Exploited Children
U.S. Department of Justice
Criminal Division
Federal Bureau of Investigation
Office of the Attorney General
Office of the Deputy Attorney General
Office of Juvenile Justice and Delinquency Prevention
Offices of the U.S. Attorneys
U.S. Marshals Service
U.S. Immigration and Customs Enforcement
U.S. Postal Inspection Service
U.S. Secret Service
Naval Criminal Investigative Service
U.S. Army Criminal Investigative Command
U.S. Air Force Office of Special Investigations
PROTECTING OUR CHILDREN
83
Acknowledgements
SPECIAL THANKS TO THE ICAC TASK FORCE TRAINING PROVIDERS
The U.S. Department of Justice’s Office of Justice Programs would also like to extend special thanks to the ICAC
training providers who have worked together to develop and deliver training most pertinent to the mission of the
ICAC Task Force Program and this year’s conference curriculum. Our training providers include:
Fox Valley Technical College Internet Crimes Against Children
Training & Technical Assistance Program
Girls Education and Mentoring Services
National Center for Justice and the Rule of Law, The University of Mississippi School of Law
National District Attorneys Association
National White Collar Crime Center
SEARCH, Inc.
The Innocent Justice Foundation
Computer Lab Donors
The conference organizers send a sincere thanks to the organizations and agencies who donated their computer labs
to the conference. Your donations contributed to the success of the lab sessions. We acknowledge and thank the
following for their donations:
Florida Department of Law Enforcement
FVTC’s ICAC Training & Technical Assistance Program
National Center for Missing & Exploited Children
SEARCH, Inc.
South Carolina Attorney General’s Office
84
2010 ICAC NATIONAL CONFERENCE
Thank you to everyone who helped
make this conference a success!
Together, we will
Protect our Children . . .
Making the Internet a Safer Place
This project is supported by Grant # 2009-MC-CX-K055 awarded by the OJJDP, OJP,
US DOJ. Points of view or opinions in this document are those of the author and do
not necessarily represent the official position or policies of the US DOJ.