more information

Transcription

more information
Preliminary Program
20th Annual
AUGUST 11-14, 2008 DALLAS, TEXAS
Presented by the
Dallas Children’s Advocacy Center
and Dallas Police Department
The Crimes Against Children Conference is presented by
www.dcac.org
The mission of the Dallas Children’s Advocacy Center (DCAC),
one of the largest, most comprehensive Centers in the country,
is to improve the lives of abused children in Dallas County and
provide national leadership on child abuse issues. DCAC provides
a child-sensitive environment for our unique collaborative effort
with other public and private agencies in Dallas County charged
with investigating child abuse cases, treating abused children
and their non-offending caregivers, and bringing their offenders
to justice.
The Child Advocate Program incorporates our forensic
interview staff and victim assistance coordinator to ensure a
cooperative multidisciplinary team (MDT) approach to the
investigation of child abuse cases in Dallas County for children
14 years of age and younger.
DCAC provides objective, child-sensitive and defendable
interviews of children alleged to be the victims of abuse, facilitates
an MDT approach to the investigation of sudden unexpected child
deaths, and serves child witnesses to violent crime.
DCAC served more than 2,000 children in 2007 and more than
23,000 children and families since the agency’s inception in 1991.
Therapy is provided for child abuse victims and nonoffending caregivers. Children benefit from individual and
group counseling designed to help them cope with their trauma.
Since 1991, more than 7,829 clients have received therapy at
our Center.
In addition to the Crimes Against Children Conference, our
Education Program provides Recognizing and Reporting
Child Abuse and other instruction for school personnel, social
service agencies, medical and physician assistant students. We
also recently launched a new education video to raise awareness
of child abuse in our community.
Volunteers are essential to DCAC’s mission and to the
success of the Crimes Against Children’s Conference. The 2008
conference will involve more than 200 volunteers providing
in excess of 2,250 hours of service. Without the dedication of
volunteers from the following groups, this conference would not
be possible. Thank you!
Assistance League of Dallas
Dallas Junior Forum
Dallas Children’s Advocacy Center League
Junior League of Dallas
The many Dallas community volunteers
who support the Dallas Children’s Advocacy Center
Special thanks are extended to the DCAC Board of Trustees
for their ongoing commitment to the protection of children and
their support in making this conference possible.
Collaborating agencies
Municipal and county law enforcement agencies of Dallas County
Texas Department of Family and Protective Services, Child Protective Services Division
Dallas County District Attorney’s Office
Children’s Medical Center of Dallas
Department of Pediatrics at the University of Texas Southwestern Medical Center at Dallas
join us in Dallas
contents
Welcome . . . . . . . . . . . . . . . . . . . . . . 1
Greetings from Dallas,
We look forward to seeing you at the 20th Annual Crimes Against Children Conference in August.
The planning for this year is well underway, and we think you’ll be pleased at many opportunities for
learning this year:
General Information . . . . . . . . . . . . . . 3
Faculty . . . . . . . . . . . . . . . . . . . . . . . . 6
Case Studies . . . . . . . . . . . . . . . . . . . 8
• The FBI continues to be a major training partner for this important event, and you can watch for
informative break-out sessions on Child Sex Offender Typologies, The Use of Polygraphs in Crimes Against
Children Investigations and Basic Computer Forensics. We are honored this year to have as our keynote
speaker, Robert S. Mueller III, Director of the FBI.
• We will hear a State of the Industry Update from the Chief Security Officer of Fox Interactive
Media, Mr. Hemanshu Nigam, who will also present a Fox Interactive Media Innovation Award to
a law enforcement professional during the Opening Plenary.
• Again this year, we welcome back our partners from the National Center for Missing and Exploited
Daily Workshop Schedules . . . . . . 10-13
Child Victim Identification Lab . . . . . 13
Computer Lab Schedule . . . . . . . . 14-15
Workshop Descriptions . . . . . . . . 16-24
Special Opportunities . . . . . . . . . . . . 25
Children, hosting a specific training track with topics including Locating Known Abductors, Attacking
the Problem of Child Exploitation from Every Angle and Age Regression.
• You will learn how to work with companies like MySpace, Microsoft, PayPal, Yahoo! and AOL
when investigating cases.
• We are pleased to have the U.S. Attorneys Office, Northern District of Texas, as a new partner.
presenters
Dallas Children’s
Advocacy Center . . . . . . Inside Front Cover
Dallas Police Department . . . . . . . . . . 2
We also welcome the National Child Protection Training Center (NCPTC). Watch for special
NCPTC topics related to Crawford v. Washington, When a Child Freezes on the Witness Stand and Cross
Examination of Expert Witnesses.
• We will take you behind the scenes of many notable child crime cases, such as Ben Ownby/Shawn
Hornbeck, and Joseph Duncan. See page 5 for a full description.
• Multiple sessions are designed specifically for medical (especially Sexual Assault Nurse Examiners),
social work, Child Protective Services and forensic interview professionals.
sponsors
Primary Sponsors:
MySpace.com . . . . . . . . . . . . . . . . . . . 5
National Center for
Missing & Exploited Children . . . . . . 7
enforcement attendees. All labs are available on a lottery basis through a special registration process.
Office of Juvenile Justice and
Delinquency Prevention . . . . . . . . . . . 9
Visit the www.cacconference.org website for more details.
Sponsor Recognition . . . . . . . . . . . . . 22
• Five computer labs are available for training this year, including three labs available for non-law
something here for everyone. Thank you for all that you do in our collective effort to protect and serve
National Child Protection
Training Center . . . . . . . . . . . . . . . . 14
the children of our nation and to prosecute those who have harmed them.
Fox Valley Technical College . . . . . . 15
So come learn with us at the nation’s largest crimes against children conference. We hope there is
Federal Bureau of Investigation . . . . 19
Office for Victims of Crime . . . . . . . . 21
Lynn M. Davis, President & CEO, Dallas Children’s Advocacy Center
AUGUST 11-14, 2008 • DALLAS, TEXAS
US Attorneys Office,
Northern District of Texas . . . . . . . . 21
1
The Crimes Against Children Conference is presented by
Dallas Police Department
The Dallas Police Department is one of the original
partner agencies supporting the work of the Dallas
Children’s Advocacy Center (DCAC). Since the Center
was established in 1991, the Department’s Child Abuse
Squad has been housed there, helping ensure a close,
cooperative working relationship among detectives,
Center staff, medical experts, and Child Protective
Services (CPS) professionals. The Child Abuse Squad has
a variety of responsibilities including investigation of
complaints of physical and sexual abuse that occur within
the family and cases of fatal child abuse and neglect. The
Squad also investigates incidents of suspected abuse and
neglect referred to police by CPS. Dallas Child Abuse
detectives work very closely with their colleagues from
CPS and conduct joint inquiries in those cases where both
agencies have an investigative responsibility.
The Child Exploitation Squad is responsible for
investigating offenses of non-familial child sexual abuse
and exploitation, juvenile prostitution, non-Internet
child pornography, and child abductions. Although not
physically located at the DCAC, Child Exploitation
Squad detectives use Center facilities on a routine basis for
conducting interviews of their child victims. Detectives
also refer child victims to the DCAC for therapy.
The Sex Offender Compliance Squad is responsible
for enforcing Texas sex offender registration laws. This
squad comprises two teams—the Registration Team and
the Sex Offender Apprehension Program (SOAP) Team. In
1998, the SOAP Team received the Weber Seavey Award
from the International Association of Chiefs of Police as
one of the most innovative law enforcement programs in
the country.
The Internet Crimes Against Children (ICAC)
Task Force is responsible for investigating cases of webfacilitated child pornography and cases of child sexual
2
exploitation or abuse that result from contact over the
Internet or other computer services. The Dallas ICAC is
one of fifty-nine special Task Forces in operation across
the United States supported by the Office of Juvenile
Justice and Delinquency Prevention. From 1999 to 2002,
the Dallas ICAC Task Force was responsible for initiating
and managing Operation Avalanche, the largest Internetrelated child pornography investigation ever undertaken.
Working in partnership with the United States Postal
Inspection Service, the FBI, and other ICAC Task Forces
across the country, customers who had subscribed to
child pornography websites were identified and targeted.
Information on thousands of other suspects living outside
the United States was given to law enforcement agencies in
their respective countries for action. The highly successful
Operation Ore in Great Britain and Operation Snowball
in Canada were spin-offs of the Avalanche investigation
which began in Dallas. In 2003, the Dallas ICAC Task
Force, again working with the FBI and the other ICAC
offices, was responsible for Operation Site Key, which also
identified thousands of subscribers to child pornography
websites around the world.
All of the units of the Dallas Police Department described
above enjoy close working relationships with the Dallas
office of the FBI. A Crimes Against Children Task Force
was formed in 1995 which combines the resources and
expertise of both agencies. This Task Force works cooperatively on all sexual exploitation cases which may involve
federal violations such as computer child pornography,
juvenile prostitution, and child abductions. The Dallas
detectives assigned to this Task Force have been deputized
as both U.S. Marshals and Special Investigators of the
Texas Attorney General’s Office to assist them in the
filing of criminal charges in exploitation cases.
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
general information
The goal of the Crimes Against Children Conference is to provide practical instruction,
using current information, the newest ideas and most successful intervention strategies,
to those professionals responsible for combating the many and varied forms of crimes
against children.
The conference is conducted for the sole purpose of providing training to only those people
employed by governmental agencies or nonprofit agencies in the fields of law enforcement,
prosecution, child protective services, social work, children’s advocacy, therapy, and medicine
who work directly with child victims of crime. The management of the conference reserves
the right to refuse admission to any individual who does not meet this criteria.
“... the premier
event in the field
of child sexual
exploitation.”
Opening Plenary Keynote Speaker: Robert S. Mueller III, Director, Federal Bureau
of Investigation.
Opening Plenary Industry Address: Hemanshu Nigam, Chief Security Officer, Fox
Interactive Media, parent company of MySpace.
— Ernie Allen,
President & CEO
National Center
for Missing and
Exploited Children
CONFERENCE SCHEDULE
PURCHASE ORDERS and Checks
Monday morning begins with an opening session that includes
After a motivating welcome, there will be 19 workshops and
Select check or purchase order at time of checkout. Purchase order
numbers must accompany registrations. Registrations without
a purchase order number will not be processed. Our Federal ID
number is 75-2303404. Checks not associated with purchase orders
must be received prior to discount dates to avoid cancellation or
fee increase.
six interactive computer labs operating concurrently. Selected
Cancellations AND SUBSTITUTIONS
workshops are repeated. The most current schedule and workshop
Registration cancellations may be made via the online system.
Cancellation requests made before midnight July 11 will receive
a full refund. Cancellation requests made before July 31 will
be refunded less a $75 administrative fee. Refunds will not be
made for cancellations after August 1 or for participants who
register but do not attend. All refunds will be mailed after the
conclusion of the conference. Transfer of registration to another
person may be done without penalty via the online registration
site at www.cacconference.org. Use your confirmation email and
confirmation number to re-enter your registration pages.
the conference keynote presentation. Along with a welcome to the
conference, you’ll be provided with updated conference information
and any special instructions that you may need.
descriptions may be found online at www.cacconference.org. This
preliminary program contains a sampling of descriptions.
CONFERENCE REGISTRATION AND FEES
Please register early to take advantage of lower rates. Register
online at www.cacconference.org. Groups must register together
to take advantage of discounts.
Please contact the DCAC to inquire about space availability
after July 30. Registrations will not be processed until payment is
made and/or approved purchase order is received. Mail your payment
with a copy of your online receipt to ensure proper credit.
AUGUST 11-14, 2008 • DALLAS, TEXAS
EARLY ON-SITE PACKET PICK UP
We encourage you to register and pick up your conference materials
Sunday evening to beat the crowd. Personnel will be on-site at the
Hyatt on Sunday, August 10 from 4:00–8:00 pm.
3
CONTINUING EDUCATION
Continuing education credit has been applied for on behalf of the
following groups:
—Texas State Board of Professional Counselors
—National Board of Certified Counselors
—Texas State Board of Social Worker Examiners
—Sexual Assault Nurse Examiners (SANE)
—State Bar of Texas
—Texas Nurses Association
—Association for Play Therapy
Accreditation fees are included in your registration fee. Certificates
will be available at the conference information area Thursday,
August 14 at 11:30 a.m.
TCLEOSE CREDIT
TCLEOSE credit will be awarded to Texas peace officers. Officers
must provide their TCLEOSE-issued personal identification
number and sign in each day to receive credit.
CHILD CARE
Child care is not available. Infants and children are not allowed
in workshops.
www.supershuttle.com/default.aspx?GC=AB48U.
Regular rate from DFW International Airport is $17 to downtown
Dallas hotels; discounted rate for conference attendees is $15.
Attendees must book in advance and online to receive maximum
discounts. One-way taxi fare from DFW Airport to downtown
Dallas is approximately $47.
HOTEL ACCOMMODATIONS
As of this printing, our host hotel—the Hyatt Regency Dallas
at Reunion—has sold out for our conference dates. We have
arranged for discounted rooms and shuttle transportation at the
following hotels:
The Adolphus 800.221.9083 (toll free) or
214.742.8200; www.hoteladolphus.com.
Special rates available for conference attendees. Identify the Dallas
Children’s Advocacy Center and the Crimes Against Children
Conference. For government rate rooms, request the government
room block.
The Magnolia, 888.915.1110 (toll-free) or
214.915.6500;
www.magnoliahotels.com. Special rates available for
conference attendees.
Hotel Lawrence Dallas, 877.396.0334 (toll-free) or
214.761.9090, www.hotellawrencedallas.com. Special
rates available for conference attendees.
INTERNET C A F E
Check your email during the conference,
compliments of AOL.
DISCOUNTED AIRFARES
To obtain discounted airfare, and the best service, book your travel
through Colwick Travel.
Contact Colwick Travel between 8:30 am and 5:30 pm CST.
Call 800.634.6883 and request the following DCAC Travel
Specialists:
The Dallas Convention and Visitors Bureau website may also
be helpful. Visit www.dallascvb.com.
Check the www.cacconference.org website for the latest
information on hotel options.
Lunch OPTIONS
Check your conference notebook for lunchtime dining options in
and near the Hyatt.
Marleah Freeman
Barbara Bertrand
Extension 219Extension 247
[email protected]
[email protected]
If outside of these hours, please contact Colwick at:
Phone
972.387.5757
Fax
972.404.1455
Email
[email protected]
American AirlinesUse AN# A5388AT
Southwest AirlinesDouble booking credits
applied when booked
through Colwick Travel
GROUND TRANSPORTATION
Ground transportation from DFW International and
Love Field airports will be provided by SuperShuttle at a
discounted rate provided reservations are made in advance at
4
DALLAS POLICE ASSOCIATION
HOSPITALITY EVENING
Tuesday, August 12, 6:00 p.m.
1412 Griffin Street East
The Dallas Police Association—the original, and largest police
employee group for Dallas police officers with over 3,500 active
and retired members—will host a hospitality evening. Please
join us for an opportunity to network and meet new friends.
Transportation to the DPA office will be provided on a limited
schedule. The office is located approximately two miles from the
Hyatt Regency Hotel. It is a short cab ride if you miss the bus.
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
Fox Interactive Media and MySpace congratulate the Crimes
Against Children Conference for 20 years of excellence in
ensuring the safety of our children.
faculty
Please visit www.cacconference.org for Faculty bios.
Cindy Alexander
Jon Davison
Cheryl Lanktree
Vanessa Sanford
Olga Trujillo
Ward Allen
Brooke Donahue
Ken Lanning
Andrea Schultz
Jill Trumball-Harris
Kristin Anderson
William Donaldson
Bob Leazenby
Anita Shah
Keith Underwood
Jim Anderst
Katie Donovan
Jennifer Lee
John Shehan
Staca Urie
Chris Ard
Jackie Dougher
Michael Leverock
Wayne Sheppard
Victor Vieth
Dan Armagh
Derrick Driscoll
James Lewis
Julian Sher
Michelle Voirin
Elizabeth Banker
Mike Duffey
Gary Macnoll
Demetra Soter
Lauren Wagner
Andy Beach
Mark Everson
Jennifer Mardosz
Bobbie Spamer
John Warnick
Michael Beaver
Bob Farley
Ellen Magnis
Steve Sucsy
Felecia Wasson
Michael Blades
Byron Fassett
Kimberly Mayfield
Mike Sullivan
Flint Waters
Boyd Boshears
Christine Feller
Kim Mercer
Steve Sullivan
Tim West
Julie Brand
Anne Ferguson
Kim Melia
Jim Tanner
Carmen White
Irving Brandt
Dan Ferraro
Sarah Migas
Reynie Tinajero
Matt Whitworth
John Bradley
Jamie Ferrell
Adrienne Mitchell
Paul Tressler
Bill Wiltse
Larry Braunstein
Martha Finnegan
Laurel Mills
Sarah Torres
Mark Wood
Mike Bruns
Kevin Forder
Jim Moeller
Patti Toth
Michael Yoon
Greg Brown
Jim Fottrell
Mike Morris
Mike Troyanski
Andres Zavala
Sara Brusletten
Sabra Garibay
Joe Mullins
Sarah Buel
Mike Geraghty
John Myers
Irish Burch
Michael Gneckow
Chris Newlin
Jeff Burge
Michael Gordon
Brenda Nichols
Susan Caswell
Christopher Greeley
Hemanshu Nigam
Melanie Cervantes
Rod Gregg
John O’Brien
Cindy Christian
Steve Grocki
Craig Overby
James Clemente
Tom Harbinson
Dave Peifer
Elliot Cohen
Michael Harrigan
Courtney Pero
Conference
Scholarship Fund
Contributors
Don Cocolough
Billy Hattaway
Tom Popken
for their generous support:
Michelle Collins
Bob Hoever
Dan Powers
Peter Collins
Patricia Hogue
Eren Price
Bonnie Cone
Randall Huff
Edward Price
Catherine Connell
Denielle Johnson
Gary Purdue
Carrie Constantin
Sarah Kaleel
Reade Quinton
Sharon Cooper
Julie Kenniston
Joseph Rampolla
Jennifer Corbet
Roseanne Ketchmark
Joy Rauls
Cynthia Cordes
Shing Khor
Stuart Reynolds
Matthew Cox
Brian Killacky
Tiffany Richards
Cathy Crabtree
Kirk King
Donald Robinson
Patrick Cunningham
John Kuchta
Susan Rodriguez
Keith Daniels
Ron Laney
Laura Rogers
Claude Davenport
Jan Langbein
Jon Rouse
6
Thank you to this year’s
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
National Center for Missing & Exploited Children®
A powerful resource for law enforcement and
a proud sponsor of the Crimes Against Children Conference
www.missingkids.com
The National Center for Missing & Exploited Children (NCMEC) is a private, nonprofit organization mandated by the
U.S. Congress working in cooperation with the U.S. Department of Justice’s Office of Juvenile Justice and Delinquency
Prevention (OJJDP). NCMEC is a vital resource for the thousands of law-enforcement agencies throughout the U.S. in
the search for missing children and quest for child protection. Since its creation in 1984 through March 2008, NCMEC
has handled more than 2.2 million telephone calls through its national Hotline—1.800.THE.LOST® (1.800.843.5678),
handled more than 576,000 online reports through its CyberTipline® at www.cybertipline®.com; trained more than
239,600 law-enforcement and other professionals; and printed more than 43 million copies of issue-based publications.
NCMEC has worked with law enforcement on more than 141,200 missing-child cases, resulting in the recovery of more
than 125,000 children. NCMEC is unique. It is a child-serving nonprofit organization which has been provided access
to the FBI’s National Crime Information Center (NCIC) Missing Person, Wanted Person, and Unidentified Person
Files and Interstate Identification Index (III) criminal-history file; the National Law Enforcement Telecommunications
System (Nlets); and the Federal Parent Locator Service (FPLS). It is also the only organization operating a 24-hour, tollfree Hotline for the recovery of missing children in cooperation with the U.S. Department of Justice.
SERVICES OFFERED BY NCMEC
CASE MANAGEMENT. Case Managers work with
families of missing and abducted children and the
investigating law-enforcement agencies to provide
technical assistance, provide all available search
resources, and maintain up-to-date case information.
ONLINE REPORTING OF CHILD SEXUAL
EXPLOITATION. The CyberTipline® is an online
reporting mechanism which allows concerned
individuals and Electronic Service Providers to report
information online regarding child sexual exploitation.
The CyberTipline operates 24 hours a day, 7 days
a week and receives tips from around the world
online at www.cybertipline.com and by telephone at
1.800.843.5678.
CASE ANALYSIS. Case Analysis Unit Analysts
track leads, identify patterns among cases, and help
coordinate investigations by linking cases together
using NCMEC’s database and external, public-data
sources. NCMEC’s Special Analysis Unit is comprised
of three analyst teams including Sex Offender
Tracking, Attempted Abductions, and Research. The
main duty of NCMEC’s Sex Offender Tracking Team
is to serve as the information clearinghouse for any
law-enforcement agency regarding noncompliant,
absconded sex offenders.
FORENSIC ASSISTANCE. The Forensic Assistance
Unit provides support and resources to “cold” cases of
AUGUST 11-14, 2008 • DALLAS, TEXAS
long-term missing children and cases of unidentified
human remains believed to be children or young
adults. This Unit also provides computerized age
progression of photographs of long-term missing
children; reconstruction of facial images from morgue
photographs of unidentified deceased juveniles;
assistance in identifying children whose images are
found in confiscated child pornography; and training
in imaging applications and techniques.
FAMILY ADVOCACY SERVICES. The Family
Advocacy Division proactively works with families, law
enforcement, family-advocacy agencies, and legal
professionals to provide technical assistance regarding
appropriate reunification practices for missing children,
referrals, and crisis-intervention services.
TRAINING. NCMEC provides training in all aspects
of missing and exploited child cases. NCMEC’s
investigators’ courses are conducted at regional sites;
the Jimmy Ryce Law Enforcement Training Center in
Alexandria, Virginia; the Missouri Law Enforcement
Training Center near Kansas City, Missouri; and
the Polisseni Law Enforcement Training Center in
Rochester, New York.
ONSITE ASSISTANCE TO LAW-ENFORCEMENT
AGENCIES. Project ALERT (America’s Law Enforcement
Retiree Team) is composed of skilled, retired, lawenforcement officers who travel at the request of a lawenforcement agency to provide free, on-site assistance
to hard-pressed local law enforcement in difficult
missing or exploited child cases. Patterned after the
National Transportation Safety Board’s system for
sending specialists to the site of serious transportation
incidents, Team Adam sends experienced, investigative
Consultants to the site of serious child abductions and
cases of child sexual exploitation.
PHOTO DISTRIBUTION. The Lost Child Alert
Technology Resource (LOCATER) Program provides
law-enforcement agencies the tools and technology
necessary to rapidly disseminate missing-child
images and information. LOCATER 6.8 is an advanced,
Web-based, poster-creation and dissemination
program offered exclusively to law-enforcement
agencies free-of-charge. NCMEC also maintains upto-date databases of missing children posters online;
coordinates exposure of missing-children cases
through partnerships with major television networks,
publications, and corporations; and coordinates
features such as “broadcast” fax and targeted poster
distribution to quickly disseminate vital information.
THE NETSMARTZ®WORKSHOP. NetSmartz is an
educational resource for children of all ages, parents,
guardians, teachers, and law enforcement and uses
3-D animation, real-life stories, music, and games
to teach children how to stay safer online and while
in the real world. This resource may be accessed at
www.NetSmartz®.org.
7
CASE STUDIES
These case studies will allow conference attendees to go behind the
scenes in high profile, complex cases and learn first hand from the actual
investigators, prosecutors and others involved, what actually happened
and not just what the media covered. You will learn how these cases were
handled and the lessons that can be utilized for future investigations.
CASE STUDY: BEN OWNBY/SHAWN HORNBECK CHILD ABDUCTION
Presented by Mike Blades, Connie Constantin, Patrick Cunningham, Mark Wood
In October of 2007, Mike Devlin was sentenced to 4 life sentences
plus 170 years in prison for the 2002 kidnapping and subsequent
sexual abuse of then, 11-year-old Shawn Hornbeck. This workshop
will describe how a later abduction of another boy led investigators to
Devlin and the recovery of his first abduction victim. This workshop
will detail the arrest and prosecution of Devlin for these crimes.
CASE STUDY: BLUE DIAMOND—CHILD PROSTITUTION
Presented by John O’Brien, Edward Price, Lynelle Torikai, Mark Wallschlaeger
This workshop will discuss the investigation and arrest of several
individuals responsible for a well organized domestic, human
trafficking, prostitution ring. Though based mainly in Chicago
and Detroit, this enterprise reached as far as New Jersey and
Hawaii. While initially the case was worked by independent police
agencies and the FBI “Innocence Lost” program, this complex case
was ultimately a collaborative effort of local and federal efforts.
CASE STUDY:
CAPTURING THE FRIEDMANS: WHO DO YOU BELIEVE?
crimes that he committed that attracted national media attention.
Investigators who handled this highly publicized abduction and
subsequent abuse of brother and sister Dylan and Shasta Groene of
Coeur d’Alene, Idaho will discuss both the horrific details of the crime,
and the way law enforcement eventually caught up with Duncan.
CASE STUDY: OPERATION ACHILLES
Presented by Jon Rouse
In this workshop, one of the lead investigators on the case will take
you behind the scenes of the investigation of a global, Internet
child sexual abuse network that identified over 2,500 “customers”
in 19 countries. Operation Achilles was conducted through the
cooperative efforts of the Australian Queensland Police, CEOP in
the United Kingdom, the FBI in the United States, the BKA in
Germany, the Toronto Police Service in Canada, the Department
of Internal Affairs in New Zealand, Interpol and others. To date,
Operation Achilles has resulted in the removal of more than 40
children from sexually abusive situations, the arrest of 22 network
members globally, the closure of four commercial child exploitation
websites and arrest of more than 100 offenders internationally who
allegedly purchased child exploitation material.
CASE STUDY: STEVEN LONG
Presented by Andy Beach, Jon Davison
The first of this two part workshop will consist of a showing of the
award winning documentary film “Capturing the Friedmans” for 1
hour and 45 minutes. The second part will consist of an interactive
discussion of some of the issues raised by the film. Attendees at
the second part must have seen the film either at the first half or
previously and be prepared to participate in the discussion.
This case presentation will outline the investigation and prosecution
of Stephen Long, convicted for the sexual assault and murder of
11 year-old Kaitlyn Briana Smith. You will learn from both the
investigator and the prosecutor how this criminal was identified,
arrested and successfully prosecuted after dumping her battered
body underneath a vacant trailer near the crime. The prosecutor
will take you into the jury trial that lasted two weeks and resulted
in a death sentence for Long.
CASE STUDY: CASEY CROWDER—CHILD ABDUCTION
CASE STUDY: UNITED STATES V. LISA MONTGOMERY
Presented by Kenneth Lanning
Presented by Boyd Boshears, Kim Melia
This workshop will describe the arrest and conviction of Kenneth
Osburn for the kidnapping and murder of 17 year-old Casey
Crowder. Learn how the investigators solved this case where the
teenage girl ran out of gas on the highway and her body was found 6
days later after an extensive search. The presenters will describe how
both witness interviews and DNA evidence led them to the killer.
CASE STUDY: JAMIE BOLIN
Presented by Mike Beaver, Craig Overby, Susan Caswell
This case presentation will discuss in detail the identification,
arrest, trial and conviction of Kevin Ray Underwood, who
confessed to the cannibalistic homicide of 10 year-old Jamie Rose
Bolin in Oklahoma. You will learn how the investigators found
the perpetrator, who had no prior criminal history, without the
victim’s body as evidence.
CASE STUDY: JOSEPH DUNCAN—CASE OVERVIEW AND COMMAND
POST MANAGEMENT
Presented by Jennifer Corbet, Adrienne Mitchell
This case presentation will bring you into the investigation and
prosecution of registered sex offender, Joseph Duncan and the horrible
8
Presented by Roseann Ketchmark, Matt Whitworth
This presentation involves the capital prosecution of Lisa Montgomery
for the December 2004 murder of Bobbie Jo Stinnett in Skidmore,
Missouri. The defendant strangled Ms. Stinnett, who was 8 months
pregnant, to death and then cut unborn infant from her womb using
a kitchen knife.The defendant then kidnapped the child to claim as
her own. The child was recovered by law enforcement authorities
less than 24 hours later three hours away in a small town in Kansas.
A federal jury imposed a death sentence against Montgomery
following a month long trial in October 2007.
CASE STUDY : UNITED STATES V. PAUL EDWARD SHOOK
Presented by Steven Sucsy, Gary Macnoll
Networking the investigation and prosecution of real-time child
molestation on the Web. This case involves the investigation and
prosecution of defendants who were engaged in molesting young
children while they sent Webcam images of the molestation to
others who were engaged in the same activity. The investigation
involved multiple jurisdictions, and the case study demonstrates
the advantages of multi-jurisdictional efforts.
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
Office of Juvenile Justice and Delinquency Prevention–Child Protection Division
Proud sponsor of the Crimes Against Children Conference
In 2000, the Office of Juvenile Justice and Delinquency Prevention
created the Child Protection Division (CPD) to oversee its efforts
in protecting children from abduction, exploitation, violence,
abuse, neglect and other forms of victimization. OJJDP’s mandate
to the protection of children is primarily derived from two sources:
the Missing Children’s Assistance Act of 1984 and the Victims
of Child Abuse Act of 1990. These acts, along with the Juvenile
Justice and Delinquency Prevention Act, define the parameters of
CPD’s mission and provide the legislative authority for the work
that CPD oversees.
CPD is responsible for administering all programs related to
crimes against children and provides leadership and funding in
the areas of prevention, intervention, treatment and enforcement.
CPD promotes the effective use of policies and procedures
to address the problems of missing, neglected, abused and
exploited children. CPD conducts research, demonstration and
service programs; provides training and technical assistance; and
coordinates various activities.
For further information about our office, contact:
Child Protection Division Office of Juvenile Justice
and Delinquency Prevention
810 7th Street, N.W., Washington, D.C. 20531
Telephone: 202.616.3637
Fax: 202.353.9093
Website: www.ojjdp.ncjrs.org
AUGUST 11-14, 2008 • DALLAS, TEXAS
CPD program areas include:
Amber Alert
Association of Missing and Exploited
Children Organizations (AMECO)
Child Abuse Prosecution Training
and Technical Assistance
Child Development–
Community Policing (CD-CP)
Court Appointed
Special Advocate Program (CASA)
Internet Crimes Against Children
Task Force Program (ICAC)
Local Children’s Advocacy Centers
Missing and Exploited Children
Training
and Technical Assistance Program
Model Courts Initiative
National Center for Children
Exposed to Violence
National Center on
Child Fatality Review
National Resource Center
and Clearinghouse (NCMEC)
Parents Anonymous
Project Safe Childhood
Regional Children’s Advocacy Centers
Safe Kids/Safe Streets—
Community Approaches To
Reducing Abuse and Neglect
and Preventing Delinquency
Safe Start Initiative
School Resource
Officer Training and Support
9
PRELIMINARY SCHEDULE Final schedule will be given onsite. Visit our website at www.cacconference.org for updates.
monday,
august 11
10:00-11:30 am
Track A presented
by the FBI
other activities:
Track B presented
by NCMEC
Registration and Coffee
Track C presented
by NCPTC
Workshops shaded in
BLUE are offered
only once.
7:00–8:15 am
8:15–9:30 am
Opening Plenary
For all conference
participants
Keynote:
Robert S. Mueller III,
Director, Federal Bureau
of Investigation
Industry Address:
Hemanshu Nigam,
Fox Interactive Media
Landmark Ballroom
9:30–10:00 am
Morning Break
11:30 am-1:00 pm
Use of Polygraph in Crimes
Against Children Investigations
Interviewing Compliant
Victims
Lewis/Leverrock
Finnegan/Connell
Sheppard
Tanner
The Best Kept Secret,
Part 1
Brand
Brand
Presenting & Explaining
Computer Forensic Evid.
Trumball-Harris
Welcome Reception
For all conference
participants
1F
Introduction to Secure
Digital Forensic Imaging
Cooper
1G
1H
1J
2E
1K
2G
Child Sexual Assault &
Using the DNA Advantage
2H
Cox/Mayfield/Zavalas
Fassett
3G
Braunstein
3H
Detecting Deception
Tanner
3i
Breaking Down Fractures
2J
Cox
3J
The 5 Bs of Child Abuse,
Part 2
2K
Child Fatality Case Study
1L
3F
Effective Courtroom
Testimony for LEO: Part 2
2i
Christian
3E
Investigative Response to
High Risk Victims: Part 2
Child Pornography and
Child Abuse
Killacky/Laney
3D
Brand
Lanning
2F
The 5 Bs of Child Abuse,
Part 1
Cox
Price/Burch
Langbein
Braunstein
3C
The Best Kept Secret,
Part 2
The Making of a Child
Abuse Detective
Med. Eval. of Child Sexual
Abuse: Lessons Learned
Christian
3K
Medical Analysis of Child
Pornography
2L
Cooper
3L
Witch Hunt, the Backlash &
Professionalism
Case Study: Joseph Duncan
Case Overview, Part 1
Case Study: Joseph Duncan
Case Overview, Part 2
Lanning
Gneckow/Robinson
Gneckow/Robinson
1M
Hunting the Predators:
Movie Screening
Sher
1N
Microsoft: Working with Law
Enforcement
1O
10
2D
Sexual Exploitation of
Children for MDT’s
1i
Two Decades of Sexual
Exploitation Investigations
Harbinson
The Link Between Domestic
Violence & Child Abuse
Fassett
3B
Effective Use of Forensic
Interviews at Trial
Effective Courtroom
Testimony for LEO: Part 1
Managing High Risk
Offenders in the Community
Ferrell
2C
Investigative Response to
High Risk Victims: Part 1
Online
Grooming
Killacky/Laney
5:00–7:00 pm
1E
3A
Crawford v. Washington:
Part 2
Lee/Rouse
Resilency 101: From Victim
to Survivor
Allen
2B
A Close-Up Look at the
Ever-Shrinking World
1D
Boshears/Melia
Anderson/Urie
Harbinson
Protecting Yourself & Your
Family on the Internet
2A
Hoever
Vieth
1C
Casey Crowder: Child
Abduction Case Study
Linking Non-Compliant Sex
Offenders to Child Victim.
Crawford v. Washington:
Part 1
2:30-3:00 pm
FBI Meeting
Mandatory for all FBI
attendees. Optional
for FBI Speakers.
1B
3:00–4:30 pm
Locating Known Abductors
Cross Examination in Cases
of Child Abuse
Brown
4:45–6:00 pm
1A
Behaviorally-based
Interviewing Strategies
Lunch
On your own
Afternoon Break
1:00-2:30 pm
2M
3M
Case Study:
Lisa Montgomery, Part 1
Case Study:
Lisa Montgomery, Part 2
Whitworth/Ketchmark/Cordes 2N
Whitworth/Ketchmark/Cordes 3N
The Adam Walsh Act: Anational
Endeav. to Prot. Children & Fam.
Strategies for Strengthening
CAC Multidisciplinary Teams
Rogers
Crabtree
2O
Witness Tampering of
Children, Part 1
Buel
3O
Witness Tampering of
Children, Part 2
2P
Buel
3P
Investigating & Prosecuting
Child Pornography
MySpace: Working with Law
Enforcement
ICAC Task Force: Resource
for Law Enforcement
Armagh/Mullins
Kaleel/Nigam/Mardosz
Peifer/Laney
1P
2Q
3Q
Violent Criminal Apprehension
Program (VICAP)
The Virtual Global Task Force:
An Internat. LE Perspective
Working with Yahoo! in Online
Child Protection Investigation
Harrigan
Davenport
Banker
1Q
2R
3R
AUGUST 11-14, 2008 • DALLAS, TEXAS
PRELIMINARY SCHEDULE Final schedule will be given onsite. Visit our website at www.cacconference.org for updates.
tuesday,
august 12
8:00-9:30 am
10:00-11:30 am
1:00-2:30 pm
Child Abduction Response
Plan
Basic Computer Forensics
in CAC Cases
Child Sex Offender
Typologies, Part 1
Donaldson
Shah
Clemente
4A
5A
3:00–4:30 pm
Child Sex Offender
Typologies, Part 2
6A
Clemente
7A
Locating Known Abductors
other activities:
Behaviorally-based Interview
Strategies
Attacking the Problem of
Child Exploitation
Hoever
Sheppard
Collins
7:00–8:00 am
Investigating & Prosecuting
Cases ... Non-Verbal Child.
Opening Statements and
Closing Arguments
Continental Breakfast
Reunion Foyer
Vieth
Vieth
Managing High Risk
Offenders in the Community
Investigating & Prosecuting
Child Pornography
Ethical Challenges and the
MDT Team, Part 1
Ethical Challenges and the
MDT Team, Part 2
9:30–10:00 am
Brown
Armagh/Mullins
Powers
Powers
Morning Break
Exploring the Impact
of Trauma: Part 1
11:30 am–1:00 pm
Trujillo
4B
4C
4D
5B
Trujillo
6B
Cross Examination
of Expert Witnesses
5C
5D
Exploring the Impact
of Trauma: Part 2
4E
DNA, CODIS & NCMEC’s
Children’s DNA Collection
Effective Courtrm Testimony
for Therapists, Part 2
7B
Invest. and Prosecut. Cases
of Emotional Maltreatment
Harbinson
6C
6D
Exploring the Victim’s
Experience
5E
Spamer
Vieth
7C
7D
Effectively Advocating for
Children’s Advocacy Centers
Trujillo
6E
7E
Lunch
On your own
Effective Courtrm Testimony
for Therapists, Part 1
4F
5F
1:00-4:00 pm
Team Approach to Invest. &
Pros. Child Sex. Abuse, Pt 1
Team Approach to Invest. &
Pros. Child Sex. Abuse, Pt 2
Recent Research Affecting
Child Abuse Invest., Part 1
Recent Research Affecting
Child Abuse Invest., Part 2
Price/Burch/Burge
Price/Burch/Burge
Newlin
Newlin
Mandatory Meeting
for US Marshalls
2:30–3:00 pm
Afternoon Break
6:00 pm
Dallas Police
Association Social
see page 4 for details
4G
Invest. Response to Dom.
Prostitution & Traffic, Part 2
Case Study: US v. Paul
Edward Shook
Fassett
Fassett
Macnoll/Sucsy
4H
Invest. Phys. Abuse & Neglect:
Reconstruction Tech., Part 1
Invest. Phys. Abuse & Neglect:
Reconstruction Tech., Part 2
Current Challenges:
Taint and Crawford
Farley/Laney
Farley/Laney
Tressler/Laney
4i
5i
ICAC Task Force: A Resource
for Law Enforcement
Runaways and Child Abuse:
A Renewed Perspective
Peifer/Laney
Nichols
4J
Anderst
4K
4L
Christian
5K
5L
4M
Case Study: Operation
Achilles
Rouse
4N
Braunstein
5M
Wasson
7F
7G
Field Search for Mac
6H
Tanner
7H
How Not to Help the
Defense Attorney
6i
Child Pornography and
Child Abuse
Braunstein
7i
Invest. & Prosecut. Bulletin
Board Child Porn. Cases
6J
Grocki
7J
The Making of a Child
Abuse Detective
Anderst
6K
Abuse by Burning
Effective Courtroom Test.
for SANE Nurses, Pt 2
Effective Courtroom Test.
for SANE Nurses, Pt 1
6G
Medical Neglect
The 5 Bs of Child Abuse,
Part 2
The 5 Bs of Child Abuse,
Part 1
Braunstein/Ferrell
Killacky
6F
5J
Two Decades of Sexual
Exploitation Investigations
Christian
Killacky/Laney
7K
Abuse by Burning
Purdue
6L
Purdue
7L
Medical Exam. Perspective
on Child Fatalities, Part 1
Medical Exam. Perspective
on Child Fatalities, Part 2
Quinton
Quinton
6M
7M
Case Study: Green Iguana
Travel and NAMBLA
Case Study: Ben Ownby/Shawn
Hornbeck, Part 1 Blades/Wood
Case Study: Ben Ownby/Shawn
Hornbeck, Part 2 Blades/Wood
Mitchell/Corbet
Constantin/Cunningham 6N
Constantin/Cunningham
5N
7N
Case Study:
Lisa Montgomery, Part 1
Case Study:
Lisa Montgomery, Part 2
Case Study: Capturing the
Friedman’s, Part 1
Case Study: Capturing the
Friedman’s, Part 2
Whitworth/Ketchmark/Cordes 4O
Whitworth/Ketchmark/Cordes 5O
Lanning
Lanning
URL Histories: The Mother
Lode of Information
Working with Crime Victims
Compensation in Texas
EBay/Pay Pal: Working with
Law Enforcement
Forensic Interviewer Forum
Tanner
Cone
Cervantes
Burch
4P
Buel
4Q
Medical Analysis of
Child Pornography
Cooper
5P
AOL: Working with Law
Enforcment
Conducting a Community
Safety Audit
AUGUST 11-14, 2008 • DALLAS, TEXAS
5H
Jury Selection
Sanford/Schultz/Torres
Invest. Response to Dom.
Prostitution & Traffic, Part 1
Medical Neglect
Workshops shaded in
BLUE are offered
only once.
5G
What’s That Dog Doing in
My Playroom?
Rauls
4R
Colcolough
6P
Conducting a Community
Safety Audit
5Q
Buel
“Caught in the Web” Lecture
Online Grooming
Sher
Cooper
5R
Operation Fairplay Lecture,
Part 1
Operation Fairplay Lecture,
Part 2
A Close-Up Look at the
Ever-Shrinking World
Waters
Waters
Lee/Rouse
4S
6O
5S
7O
7P
Law Enforcement
Investigators Forum
6Q
Nichols/Farley
7Q
Digital Evidence Search
and Seizure
6R
Gregg
7R
Back to the Future: Using
an Undercover Website
6S
Kuchta
7S
PRELIMINARY SCHEDULE Final schedule will be given onsite. Visit our website at www.cacconference.org for updates.
wednesday,
august 13
other activities:
8:00-9:30 am
10:00-11:30 am
Case Study: Casey Crowder
Child Abduction
The Basics of Conducting
Wireless Internet Invest.
Boshears/Melia
Reynolds
8A
1:00-2:30 pm
Case Study: Jamie Bolin
9A
Attacking the Problem of
Child Exploitation
Victim Notification:
Protecting Rights
Feller/Johnson
8B
Collins
3:00–4:30 pm
Beaver/Caswell/Overby
Case Study: Green Iguana
Travel and NAMBLA
10A
Linking Non-Compliant
Sex Offenders
9B
Anderson/Urie
Mitchell/Corbet
11A
Age Regression
10B
Mullins
11B
Maryland v. Craig Revisited:
Establ. Legal Basis
Show Me the Money: A
Guide to the Grant Applic.
When A Child Freezes on
the Witness Stand
The Impact of Child Abuse
on Spirituality ...
Continental Breakfast
Reunion Foyer
Harbinson
Richards
Harbinson
Veith
Recent Developments
Relevant to Investigations
Surviving Sexual
Molestation
9:30–10:00 am
Myers
Warnick
Morning Break
Eff. Courtroom Testimony for
CPS Invest., Part 1
Eff. Courtroom Testimony for
CPS Invest., Part 2
8E
9E
Lunch
On your own
Integrative Treatment of
Complex Trauma (ITCT): Pt. 1
Integrative Treatment of
Complex Trauma (ITCT): Pt. 2
Defensive Tactics for
Non-Law Enf. Prof., Part 1
Defensive Tactics for
Non-Law Enf. Prof., Part 2
Lanktree
Lanktree
Popken/Hattaway
Popken/Hattaway
2:30–3:00 pm
Invest. Phys. Abuse & Neglect:
Reconstruction Tech., Part 1
Invest. Phys. Abuse & Neglect:
Reconstruction Tech., Part 2
Ask Me No Questions And
I’ll Tell You No Lies
What Makes You Think That?
Assessing Subjectivity
Farley/Laney
Farley/Laney
Everson
Everson
7:00–8:00 am
11:30 am–1:00 pm
Afternoon Break
7:00 pm
Conference Party
see last page for details
8C
8D
8F
8G
8H
Civil Litigation in CPS Cases
8i
Workshops shaded in
BLUE are offered
only once.
9F
9G
Greeley
10C
Presenting Behavioral Evid.
in a Crim. Trial, Part 1
Presenting Behavioral Evid.
in a Crim. Trial, Part 2
Powers/Voirin
Powers/Voirin
10D
Stewards of Children, Part 2
Magnis/Ferguson
Magnis/Ferguson
Braunstein
The Virtual Global Task Force:
An Internat. LE Perspective
The Impact of Domestic
Violence on Children
Davenport
Langbein
9i
11D
Stewards of Children, Part 1
10E
10F
10G
Effective Courtroom
Testimony LEO: Part 1
9H
11C
11E
11F
11G
Effective Courtroom
Testimony for LEO: Part 2
10H
Braunstein
11H
The Adam Walsh Act
10i
Forder/Yoon
11i
Psychology of the Offender,
Part 1
Psychology of the Offender,
Part 2
Current Challenges Taint &
Crawford
Demystifying the Myths of
Child Sexual Assault ...
P. Collins
P. Collins
Tressler
Ferrell
8J
9J
10J
11J
Eff. Courtroom Testimony for
Forensic Interviewers, Part 1
Eff. Courtroom Testimony for
Forensic Interviewers, Part 2
Recent Developments
Relevant to Investigations
Current Challenges: Taint
and Crawford
Braunstein
Braunstein
Myers
Tressler
8K
9K
10K
11K
Pediatric Injuries: Are They
Abusive or Not?
Child Fatalities and Serious
Physical Injury Cases ...
Pediatric Injuries: Are They
Abusive or Not?
Interv. Children Who Have
Witnessed a Violent Crime
Soter
Toth
Soter
Brusletten
8L
Operation Guardian West:
Eff. Sex Offender Round-Up
Med. Eval. of Child Sexual
Abuse: Lessons Learned
Troyanski/Anderson
Cox
8M
9L
9M
10L
11L
Med. Exam. Persp. on Child
Fatalities, Pt. 1
Med. Exam. Persp. on Child
Fatalities, Pt. 2
Quinton
Quinton
10M
11M
Case Study: Blue Diamond
Child Prostitution, Part 1
Case Study: Blue Diamond
Child Prostitution, Part 2
Case Study: Ben Ownby/Shawn
Hornbeck, Part 1 Blades/Wood
Case Study: Ben Ownby/Shawn
Hornbeck, Part 2 Blades/Wood
O’Brien/Ed Price
O’Brien/Ed Price
Constantin/Cunningham 10N
Constantin/Cunningham 11N
8N
9N
Case Study: Capturing the
Friedman’s, Part 1
Case Study: Capturing the
Friedman’s, Part 2
DNA: Do We Automatically
Win?
State-of-the-Art Child
Interviewing
Lanning
Lanning
White
Toth
8O
Introduction to the Virtual
World of Second Life
Rampolla
Tanner
8P
Er. Price/Wasson
9P
Field Search for Mac
8Q
Tanner
9Q
Anatomical Dolls: An
Effective Tool
Cyber Bullying & Online
Harrass.: Train the Trainer
Migas
9O
Prosecutors Forum
Inside the Mind of a Sex
Offender
12
9D
Shaken Baby Syndrome:
Truths and Myths
Munchausen Syndrome
by Proxy
Greeley
9C
8R
Brusletten
CyberTipline Reports: From
Receipt to Arrest
Paraphilias Other than
Pedophilia ...
Shehan/Duffey
Lanning
10P
Kenniston/Laney
Kenniston/Laney
Ferraro
Operation Fairplay Lecture,
Part 2
Managing the Sexually
Violent Predator
Waters
Waters
Wasson
9S
11P
On vs. In: Developmentally
Sensitive Interview., Part 2
10Q
Computer Forensics
9R
11O
On vs. In: Developmentally
Sensitive Interview., Part 1
Operation Fairplay Lecture,
Part 1
8S
10O
11Q
Protecting Yourself & Your
Family on the Internet
10R
Tanner
11R
FBI RCFL ReviewNet
Program
10S
Gregg
11S
PRELIMINARY SCHEDULE Final schedule will be given onsite. Visit our website at www.cacconference.org for updates.
thursday,
august 14
8:00-9:30 am
10:00-11:30 am
Case Study: Joseph Duncan
Case Overview, Part 1
Case Study: Joseph Duncan
Case Overview, Part 2
Gneckow/Robinson
Gneckow/Robinson
12A
CyberTipline Reports: From
Receipt to Arrest
NetSmartz
other activities:
Donovan
7:00–8:00 am
Defending the Investigative
Interview in Court
Web Wise Kids
Continental Breakfast
Reunion Foyer
Vieth
Mercer
9:30–10:00 am
Bradley
Morning Break
Solving the Unsolvable
Case & Proving It, Pt 1
11:30 am
Garibay/Houge
Conference
Evaluations collected,
Certificates distributed
Workshops shaded in
BLUE are offered
only once.
12B
12C
Shehan/Duffey
12D
13C
Bradley
13D
Solving the Unsolvable
Case & Proving It, Part 2
12E
Garibay/Houge
Drug Endangered Children
Children’s Program Kit
Sanford/Pero
Sanford/Pero
12F
13E
13F
Child Fatality Review in Texas
Therapists Forum
12G
Garrabrant/Konstas/Stephen13G
Child Fatalities and Serious
Physical Injury Cases
State-of-the-Art Child
Interviewing
Toth
Toth
12H
13H
On vs. In: Developmentally
Sensitive Interview., Part 1
On vs. In: Developmentally
Sensitive Interview., Part 2
Kenniston/Laney
Kenniston/Laney
12i
13i
Psychology of the Offender
Part 1
Psychology of the Offender,
Part 1
P. Collins
P. Collins
12J
13J
What Makes You Think That?
Assessing Subjectivity
Ask Me No Questions And
I’ll Tell You No Lies
Everson
Everson
12K
13K
Integrative Treatment of
Complex Trauma (ITCT), Pt. 1
Integrative Treatment of
Complex Trauma (ITCT), Pt. 2
Lanktree
Lanktree
12L
Greeley
13L
Shaken Baby Syndrome:
Truths and Myths
Munchausen Syndrome
by Proxy
12M
Greeley
13M
Case Study: Green Iguana
Travel and NAMBLA
Case Study: Jamie Bolin
Mitchell/Corbet
Beaver/Caswell/Overby
12N
Sexual Exploitation of
Children for MDT
Lanning
13N
Runaways and Child Abuse:
A Renewed Perspective
12O
SANE Nurses Forum
Nichols
NCMEC will offer all registered
participants at this year’s Conference
a glimpse into this powerful law
enforcement tool designed to rescue
children. Within this interactive
lab, computers will be available for
participants to access background
identifiers and audio clues in hopes
that these items may be recognizable
or familiar to Lab participants.
Accompanying each sanitized
picture will be a real-time message
thread where participants can post
their comments and suggestions.
You may have the piece of the
puzzle that could lead to the rescue
of a child victim.
NOTE: All registered conference attendees
are invited to participate in this Lab;
however due to the sensitivity of this
issue, please make sure to wear your
conference badge and bring proof of
identity to gain entry.
13O
13P
Case Study: Steven Long
Investigative Resources of
the US Marshals
Beach/Davison
Brandt
12Q
13Q
Cyber Bullying & Online
Harrass.: Train the Trainer
The Canadian Response to
Child Sexual Exploitation
Migas
Sullivan
12R
13R
MySpace Case Study
Computer Forensics
Ferraro
Many children have been rescued
from further sexual abuse because
a clue in the background of child
pornography images led to the
location of their abuse. Partnering
with the Internet Crimes Against
Children Task Forces and federal law
enforcement agencies, the National
Center for Missing & Exploited
Children is proud to bring the
“Victim Identification Lab” back to
the Dallas Crimes Against Children
Conference for a third year.
CPS Investigators Forum
12P
AUGUST 11-14, 2008 • DALLAS, TEXAS
13B
Confessions w/o Miranda
Texas Child Abuse Laws
Alexander/Powers
13A
NCMEC
Child Victim
Identification Lab
12S
13S
13
computer labs
Workshops shaded in
BLUE are offered
only once.
Visit our website at www.cacconference.org for the updated schedule and for information about special registration for labs.
monday,
august 11
Lab Locations:
Track V: Cotton Bowl
Track W: Sanger
Track X: Moreno
Track Y: Pryor
Track Z: Reverchon
10:00–11:30 am
Special thanks to
the Internet Crimes
Against Children
Task Force
Creating Your Own
MySpace Page
Kaleel
Wiltse
Morning Break
11:30 am–1:00 pm
Lunch
On your own
2:30–3:00 pm
Afternoon Break
Lab Locations:
Track V: Cotton Bowl
Track W: Sanger
Track X: Moreno
Track Y: Pryor
Track Z: Reverchon
9:30–10:00 am
Sullivan/Bruns 1Y
Brown/West
Waters/Huff/Leazenby
Dougher/Donahue/Gordon 5W
Geraghty
Using the GNU
Watch Toolkit, Part 1
Using the GNU
Watch Toolkit, Part 2
Field Search,
Part 1
Windows Forensic Gems:
Windows XP, Part 1
Ard/Moeller
Windows Forensic Gems:
Windows XP, Part 1
4Y
Image Scan v3.0,
Part 1
Gregg
4X
Ard/Moeller
Image Scan v3.0,
Part 2
4Z
Gregg
Daniels/Wagner 6V
Duffey/Khor
Ard/Moeller
3Y
Cohen
3Z
Waters/Huff/Leazenby 7V
Advanced Website
Investigations, Part 2
Geraghty
7W
Field Search,
Part 2
6X
Brown/West
7X
Using Google, MySpace &
Firefox Browser, Part 2
6Y
MySpace Investigations,
Part 1
5Z
3X
Operation Fairplay Lab,
Part 1
Using Google, MySpace &
Firefox Browser, Part 1
4Y
Brown/West
3:00–4:30 pm
6W
Brown/West
3W
Using the Firefox Browser
as an Invest. Tool, Part 2
1:00–2:30 pm
Dougher/Donahue/Gordon 4W
Wiltse
2Y
Operation Fairplay Lab,
Part 1
5V
Geraghty
Microsoft XBox Forensics,
Part 2
2Z
Advanced Website
Investigations, Part 1
4X
2X
Ard/Moeller
Cohen
3V
Field Search,
Part 2
Using the Firefox Browser
as an Invest. Tool, Part 1
1Z
Sullivan/Bruns
Advanced Website
Investigations, Part 2
2W
eP2P: The FBI’s Peer to Peer
Invest. Tool, Part 2
11:30 am–1:00 pm
Afternoon Break
Sullivan/Bruns
2V
Microsoft XBox Forensics,
Part 1
Conducting Undercover
Chat Rm. Invest., Part 2
4V
Geraghty
eP2P: The FBI’s Peer to Peer
Invest. Tool, Part 1
Wiltse
2:30–3:00 pm
1X
10:00–11:30 am
Conducting Undercover
Chat Rm. Invest., Part 1
Sullivan/Bruns
Field Search,
Part 1
Introduction to
Second Life
8:00–9:30 am
Morning Break
Lunch
On your own
1W
Capture Software
West
Conducting Undercover
Chat Rm. Invest., Part 2
Advanced Website
Investigations, Part 1
Using Screen
for the use of their
computer equipment
in support of
this conference!
Rampolla
tuesday,
august 12
1V
Using the GNU
Watch Toolkit
9:30–10:00 am
3:00–4:30 pm
Conducting Undercover
Chat Rm. Invest., Part 1
The Online Investigator’s
Toolbelt
Geraghty
1:00–2:30 pm
Daniels/Wagner 7Y
MySpace Investigations,
Part 2
6Z
Duffey/Khor
7Z
The National Child Protection Training Center (NCPTC) is a partnership between the National Association to Prevent Sexual Abuse of Children
(NAPSAC) and Winona State University (WSU). NCPTC provides training, technical assistance and publications to front line child protection
professionals throughout the United States. In addition, NCPTC provides technical assistance to undergraduate and graduate programs seeking to
improve the education provided to future child protection professionals. In partnership with CornerHouse, NCPTC also assists in the development and
maintenance of forensic interview training programs utilizing the RATAC® forensic interviewing
protocol. To contact NCPTC, call 507-457-2890 or visit our web site at www.ncptc.org. To contact
NAPSAC, call 651-340-0537 or visit our web site at www.napsac.us.
14
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
computer labs
Workshops shaded in
BLUE are offered
only once.
Visit our website at www.cacconference.org for the updated schedule and for information about special registration for labs.
wednesday,
august 13
Lab Locations:
Track V: Cotton Bowl
Track W: Sanger
Track X: Moreno
Track Y: Pryor
Track Z: Reverchon
9:30–10:00 am
Morning Break
11:30 am–1:00 pm
Lunch
On your own
2:30–3:00 pm
Afternoon Break
Thursday,
august 14
Lab Locations:
Track V: Cotton Bowl
Track W: Sanger
Track X: Moreno
Track Y: Pryor
Track Z: Reverchon
9:30–10:00 am
Morning Break
11:30 am
Conference
Evaluations collected,
Certificates distributed
8:00–9:30 am
1:00–2:30 pm
Who Did It? Pinning Down
the Offender, Part 1
Who Did It? Pinning Down
the Offender, Part 2
Operation Fairplay Lab,
Part 1
Fottrell
Fottrell
Waters/Huff/Leazenby
8V
9V
eP2P: The FBI’s Peer to Peer
Invest. Tool, Part 1
eP2P: The FBI’s Peer to Peer
Invest. Tool, Part 2
IRC Investigations
Part 1
Dougher/Donahue/Gordon 8W
Dougher/Donahue/Gordon 9W
Rampolia
MySpace Investigations,
Part 1
MySpace Investigations,
Part 2
Cell Phone Forensics,
Part 1
Duffey/Khor
8X
Mac Analysis
Duffey/Khor
9X
Internet Registry Artifacts
Underwood 8Y
Image Scan v3.0,
Part 1
Underwood
9Y
Image Scan v3.0,
Part 2
Gregg 8Z
8:00–9:30 am
Gregg 9Z
10:00–11:30 am
3:00–4:30 pm
Operation Fairplay Lab,
Part 2
10V
11V
IRC Investigations
Part 2
10W
Daniels/Wagner
Waters/Huff/Leazenby
Rampolia
10W
Cell Phone Forensics,
Part 2
10X
Daniels/Wagner
11X
Microsoft XBox Forensics,
Part 1
Microsoft XBox Forensics,
Part 2
Ard/Moeller
Ard/Moeller
10Y
11Y
Using the Firefox Browser as
an Invest. Tool, Part 1
Using the Firefox Browser as
an Invest. Tool, Part 2
Cohen
Cohen
10Z
11Z
Fox Valley Technical College’s
Criminal Justice Child
Protection Training Center
is dedicated to helping the youngest
Operation Fairplay Lab,
Part 1
Waters/Huff/Leazenb Operation Fairplay Lab,
Part 2
12V
IRC Investigations
Part 1
Rampolla
Waters/Huff/Leazenby
victims of crimes, our children.
13V
12W
Rampolla and the National Center for Missing &
13W
Who Did It? Pinning Down
the Offender, Part 2
Fottrell
Fottrell
12X
13X
Windows Forensic Gems:
Windows XP, Part 1
Windows Forensic Gems:
Windows XP, Part 2
Ard/Moeller
Ard/Moeller
12Y
Internet Email and Chat
In cooperation with the Office of Juvenile
Justice and Delinquency Protection,
IRC Investigations
Part 2
Who Did It? Pinning Down
the Offender, Part 1
Underwood
AUGUST 11-14, 2008 • DALLAS, TEXAS
10:00–11:30 am
13Y
Exploited Children, FVTC offers training to
thousands of juvenile justice professionals
on issues that are critical
to the safety and security of children
across the country.
Visit www.fvtc.edu for more information.
Vista Internet
Artifacts
12Z
Underwood
13Z
15
preliminary workshop descriptions
as of time of printing.
Workshops are listed in alphabetical order. For updated workshop descriptions, visit our website at www.cacconference.org
ABUSE BY BURNING
Presented by Gary Purdue
This workshop will focus on the evaluation
of children with inflicted burn injuries.
Basics of burn injury will be discussed
along with the specific aspects of abuse.
(The) Adam Walsh Act: Sex Offender
Registration & Notification Act & Failure
to Register Offenses
Presented by Kevin Forder, Michael Yoon
Includes an overview of U.S. Department of
Justice and U.S. Marshals Service (USMS)
sex offender apprehension initiatives and
registration requirements established under
the Adam Walsh Act, with a particular
focus on the new federal felony offense for
failure to register as a sex offender. Enables
effective investigation and prosecution of
unregistered sex offenders using the new
federal statute.
Age Regression Images: How it Works
Presented by Joe Mullins
NCMEC’s Forensic Assistance Unit (FAU)
offers a wide range of services to law
enforcement. The most recent addition to
our list is providing age regression images
to officers working the chat rooms. The
purpose of these images is to serve as bait
to flush out the pedophiles that are online
soliciting our children. The FAU has
provided hundreds of images that have been
very effective in assisting law enforcement
with these cases. This presentation will
demonstrate the process of creating these
images, success stories and serve as a tutorial
to law enforcement about the kinds of
images to submit for regression.
Ask Me No Questions And I’ll Tell You No
Lies: Leading And Suggestive Questions In
The Child Forensic Interview
Presented by Mark Everson
There is an on-going debate in the field
of child forensic interviewing about what
is considered a leading vs. a suggestive
question and whether such questions can
appropriately be used. This workshop will
present specific definitions for leading and
suggestive questions and will offer practical
cautions and guidelines for their use. It
will also describe a three-part method for
assessing interview suggestiveness.
Attacking the Problem of Child Exploitation
from Multiple Angles
Presented by Michelle Collins
The problem of online child sexual
exploitation has reached epic proportions.
It is an unfortunate reality that there is no
16
way to arrest our way out of this problem.
This session will provide participants with
information on how a multi-disciplinary
approach has increased effectiveness and
ultimately protected countless children.
In addition to learning about the extensive
efforts of NCMEC’s Exploited Child Unit
and law enforcement agencies, participants
will see demonstrations of innovative steps
taken by the Internet industry, financial
institutions, research facilities and our
international counterparts.
Behaviorally-Based Interviewing Strategies
Presented by Wayne Sheppard
This workshop will provide the participant
with 1) a brief overview of traditional
interviewing and interrogating techniques
(listening skills, direct vs. passive
questioning, interview vs. interrogation,
cognitive interviewing) utilized by law
enforcement officers in the field and 2)
an in-depth look at the importance of
the application of behaviorally based
interviewing
strategies
(non-verbal
messages in behavior, para-logical
reasoning, incremental behaviors) by
officers tasked with trying to obtain the
admission or confession from the offender.
(The) Canadian Response to Child Sexual
Exploitation
Presented by Steve Sullivan
The Office of the Federal Ombudsman for
Victims of Crime was established in March
2007 and an ongoing theme of our work
is the commercial and sexual exploitation
of children. The Office prepared a series
of recommendations for the federal
government on Internet facilitated child
sexual exploitation. Every child sexual
abuse image is an opportunity to identify
a child and the recommendations will
focus on legislative reforms necessary to
identify and rescue victims. In addition,
the recommendations will highlight
the unique emotional and privacy issues
that child victims of Internet crimes
experience.
Case Study: Ben Ownby/Shawn Hornbeck
Child Abduction
For description, see page 8
Case Study: Blue Diamond—Child Prostitution
(The) Best Kept Secret: Mother-Daughter
Sexual Abuse
For description, see page 8
Presented by Julie Brand
CASE STUDY: Capturing the Friedmans:
This workshop describes the complex
mother-daughterincestuousrelationship—
the subtle, yet intentional violations of
normal mother-child boundaries, covert
and overt abuse and the psychological
manipulations used to silence victims.
Attendees will learn ways to include
mothers as potential perpetrators in
prevention programs and in sexual
abuse investigations. Six key therapeutic
issues for recovery will be discussed. The
program will conclude with a discussion
of the shared dynamics and also the
differences between mother-daughter and
mother-son incest. The presenter is both
an experienced counselor and a resilient
survivor of maternal sexual abuse.
Who Do You Believe?
Breaking Down Abusive Fractures
Case Study: Steven Long
Presented by Matthew Cox
This workshop will be a case based
discussion on the mechanisms of injury
and types of forces required to cause
certain skeletal injuries in children.
Topics will include fracture types such
as spiral, transverse, rib, skull, and
metaphyseal corner fracture.
For description, see page 8
Case Study: Casey Crowder—Child Abduction
For description, see page 8
Case Study: Jamie Bolin
For description, see page 8
Case Study: Joseph Duncan—Case Overview
and Command Post Management
For description, see page 8
Case Study: Operation Achilles
For description, see page 8
For description, see page 8
Case Study: U.S. v. Lisa Montgomery
For description, see page 8
Case Study : U.S. v. Paul Edward Shook
For description, see page 8
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
Caught in the Web: Inside the Police Hunt to
Rescue Children from Online Predators
Presented by Julian Sher
Award-winning author Julian Sher
spent two years following the work
of the FBI, ICE, NCMEC and police
agencies around the world. Senator
John Kerry called it “a must-read for
parents, policy makers, prosecutors, and
anyone who cares about our kids.” Dr.
Sharon W. Cooper praised the extremely
educational and riveting writing by a
superb investigative journalist.” Come
share the lessons and insights for police,
prosecutors and educators.
Child Fatalities and Serious Physical Injury
Cases: Improving the 1st Response
Presented by Patti Toth
What first responders do (or don’t do)
in the critical first hours after a sudden
unexplained or unexpected child death or
serious physical injury often determines
whether we accurately identify inflicted
versus accidental injuries or natural deaths.
A WA State project recently developed
statewide guidelines and training for
first responders. The resulting userfriendly guidelines are called the
C-POD, which stands for the key
principles that should guide any first
responder: Collaboration, Preservation,
Observation and Documentation. This
workshop will review the C-POD
Guidelines and training, as well as the
CDC’s new SUIDI (Sudden Unexplained
Infant Death Investigation) evidence
collection form.
Children’s Program Kit
Presented by Vanessa Sanford, Courtney Pero
The Children’s Program Kit was created
through a collaboration of SAMHSA
and NACoA (National Association for
Children of Alcoholics). The kit is a
tool for treatment providers and helping
professionals to utilize when working
with children of addicted parents, in
an effort to provide age-appropriate
education about addiction, assist in the
identification and healthy expression
of emotions, and empower them new
coping skills. The Texas Alliance for Drug
Endangered Children (TADEC) feels
very strongly that all children removed
from volatile drug environments must
receive support services to address their
psychosocial needs. The audience will
receive a curriculum manual with videos.
(A) Close-up Look at the Ever-Shrinking
World
Presented by Jennifer Lee, Jon Rouse
Many children never disclose the fact
that they were sexually abused and
pornographically photographed. As this
crime knows no borders, neither can the
law enforcement response. The United
AUGUST 11-14, 2008 • DALLAS, TEXAS
States has an unprecedented number of
experienced law enforcement agencies
working in conjunction with NCMEC
in the active hunt for these victims.
In addition, an increasing number of
countries have created specialized law
enforcement teams tasked with Victim
Identification. This session will be copresented by NCMEC and Queensland
Police Service (Australia). It will
present several illustrations of how child
victims have been identified all over the
world because of images seized by U.S.
investigators. In addition, participants
will learn how they can become more
involved in the complex search for these
child victims.
Conducting a Community Safety Audit to
Improve Child Safety
Presented by Sarah Buel
It turns out we can greatly improve
victim services by asking the question
of each community agency, “How does
this (practice, policy, rule etc.) enhance
or diminish victim safety and offender
accountability?” By reviewing successful
evaluations of police, prosecutor, shelter,
legal aid, and other relevant family
violence programs, there is much to be
learned. The workshop will discuss how
to replicate a community safety audit
of victims’ services programs with no
funding or to obtain a grant to do so.
CyberTipline Reports: From Receipt to
Arrest
Presented by John Shehan, Mike Duffey
This session will be co-presented by
NCMEC & an experienced ICAC
Investigator. Participants will be
provided information on NCMEC’s
CyberTipline, including how it can
generate, de-conflict, and corroborate
cases related to computer-facilitated
crimes against children. An in-depth
overview of CyberTipline reports will be
included with a detailed explanation of
the reports sent to law enforcement. An
investigator will walk the participants
through the steps necessary to identify
the location of the suspect and specific
computer involved in the investigation.
Specifics will be shared on how to
secure evidence of criminal behavior
from electronic service providers (ESPs).
Samples of court orders and subpoenas
along with the ESP Compliance Guides
will be given out to the participants.
Actual case examples will be utilized
throughout this presentation to illustrate
the learning objectives of this session.
Defensive Tactics for Non-Law Enforcement
Professionals
Presented by Thomas Popken, Billy Hattaway
This session will provide information
and examples of defensive tactics that
may be utilized in the event a situation is
encountered that requires self defense.
Detecting Deception
Presented by Jim Tanner
Improve your interview skills. Learn
how to tell when someone is editing
something out of a verbal or written
statement. This session will cover the
basics of Discourse Analysis, a lexical
and syntactical approach to analyzing
statements. Using clear examples, Dr.
Tanner will explain how shifts in words
and grammar by respondents can point
interviewers to “hot spots” in a statement
that need to be probed. You will never
listen to a conversation the same way
again if you attend this session.
Digital Evidence: Search And Seizure 2008
Presented by Rod Gregg
This course is for first responders to a
digital evidence crime scene. It is for
patrol officers, investigators serving
search warrants, and crime scene
personnel charged with identifying,
collecting, packaging, transporting and
storing digital evidence. The course is
continuously updated to include current
technology, unusual technology and best
practices at the digital crime scene. At the
conclusion of the course, attendees will
receive a CD of the presentation that can
be adapted for their agency. This course
will not be on the final conference CD.
You must attend the course to receive it.
DNA, CODIS and the NCMEC DNA Registration
Project
Presented by B.J. Spamer
This workshop will explain the
importance of DNA collection and the
Combined DNA Index System (CODIS)
to missing and unidentified person
investigations. DNA and DNA profiling
will be explained, with a discussion of
nuclear DNA, mitochondrial DNA, and
obtaining appropriate reference DNA
samples. CODIS will be discussed, with
an emphasis on the different levels and
indexes within CODIS and how they can
and cannot be searched. The NCMEC
DNA Registration Project will be
explained and DNA identification case
studies will be provided. Resources to
have missing and unidentified person
DNA profiles loaded into CODIS at no
cost will be provided.
17
Drug Endangered Children
Presented by Vanessa Sanford, Courtney Pero
Drug endangered children are those
children who suffer physical or
psychological harm or neglect resulting
from exposure to illegal drugs or persons
under the influence of illegal drugs or
exposure to dangerous environments
where drugs are being manufactured
or chemicals used to make drugs are
accessible. Topics will include: Safety and
Awareness in Volatile Drug Environments
& Investigating Drug Endangered
Children cases, Child Protective Services
Role in Drug Endangered Children cases,
Medical Issues for the Drug Endangered
Child, Prosecuting Drug Endangered
Child cases, Psychosocial Issues of the
Drug Endangered Child, Sustaining Local
DEC Alliances, and Data Collection.
Effectively Advocating for Children’s
Advocacy Centers
Presented by Joy Rauls
Making child maltreatment a priority
issue requires getting the attention
of public officials at the local, state
and national level. This session will
provide an insider’s perspective on
how lawmakers think, act and react
to advocacy initiatives in the face of
the information and issue overload
they face every day. Effective strategies
for successfully getting the attention
of lawmakers and local community
leaders, in an effort to elevate the issue
of children’s advocacy centers to the top
of their lists, will be outlined.
Ethical Challenges and the
Multidisciplinary Team:
Taking the High Road
Presented by Dan Powers
There are many benefits of working in a
multidisciplinary team. This workshop
will examine ethical issues as they apply
to members of multidisciplinary teams.
Any decision made in a case has ethical
implications for the team, and reflects
the decision maker’s sensitivity and
commitment to the team concept. Each
member of a team that is affected by a
decision will deal with the consequences
of that decision. This concept reinforces
our professional obligation to make all
reasonable efforts to anticipate possible
consequences and take steps to avoid
unjustified harm to others.
Examining the Victim’s Experience
(Enhancing Your Investigations
and Prosecutions)
Presented by Olga Trujillo
This interactive session will examine the
struggles criminal justice professionals
face in handling child sexual abuse cases
and explore efforts that can be undertaken
to improve their ability to investigate
18
these cases. This workshop will be a
blend of question and answer as well
as case study. Participants will identify
how a victim might behave during an
investigation or prosecution, explore what
can be done to improve the investigation
and enhance offender accountability.
The workshop will also examine some of
the efforts and resources that can assist
participants in working with survivors–
from interviewing to referring to services.
Exploring the Impact of Trauma (Enhancing
your Investigations and Prosecutions)
Presented by Olga Trujillo
Olga Trujillo is a survivor of child
physical, sexual abuse and rape. These
experiences created a range of mental
health disorders that made her vulnerable
to further victimization and unaware
of the issues she had to maneuver on a
daily basis. After undergoing an intense
journey to understand the impact the
violence had on her life, she began to
address the challenges she faced from
Dissociative Identity Disorder, Panic
& Anxiety Disorders, Post Traumatic
Stress Disorder and Depression. In this
workshop she will bring her experience
of trauma into the room to help
participants explore how trauma may
have an impact on their investigations
and prosecutions of child abuse cases.
Through an interactive workshop
participants will assess how they address
the issue of trauma and examine whether
they should and if so, how they might do
so. Through this workshop participants
will identify challenges to incorporating
trauma information into their response
to these crimes and their victims.
Field Search for Mac
Presented by Jim Tanner
Field Search for Windows (FSWin) has been
in use by more than 2,000 officers for several
years. This “Live Box Examination Tool”
has proven to be a valuable addition to law
enforcement’s computer forensic tool box.
This session will be the FIRST nationally
available introduction to Field Search Mac
(FSMac). This software application runs
live on Mac OS X and matches the tools
available in FSWin. FSMac is designed for
non-technical users to quickly and easily
reveal the target’s computer usage. FSMac
is available free to all law enforcement
agencies through NLECTC-RM.
(The) Five Bs of Child Abuse
Presented by Cindy Christian
This workshop will provide you with
more information than you care to know
about physical injuries from child abuse
and neglect. We will cover common
and uncommon injuries and medical
mimickers of abuse as well.
Hunting the Predators:
Special Movie Screening
Presented by Julian Sher
A special screening of a one-hour
documentary written and directed by
Julian Sher, based on his book “Caught
in the Web.” For the first time, cameras
take viewers behind the scenes as
investigators from the U.S., the UK
and Canada use the latest high-tech
techniques in image analysis, undercover
work and infiltration to break up online
international rings of child abusers.
Followed by a discussion on how you can
better use the media to get the message
out about protecting children.
Inside the Mind of a Sex Offender
Presented by Jim Tanner
Seventy percent of all convicted sex
offenders are placed on probation. They
live in our communities. This session
will draw on Dr. Tanner’s extensive
experience working with and supervising
sex offenders in the community. We
will examine how they view the world,
how they pick and groom victims,
how they groom the environment
and professionals, the unique dangers
of Internet Offenders, and strategies
for containment. Investigators and
supervising officers will gain valuable
insights into offender behavior.
Integrative Treatment of Complex Trauma
(ITCT): An Empirically-Based, Comprehensive
Model for Treatment with Abused Children
and Adolescents in Varied Settings
Presented by Cheryl Lanktree
This
workshop
will
present
comprehensive, multi-modal therapy
approaches of the treatment model,
Integrative Treatment of Complex
Trauma (ITCT) for children and
adolescents with complex trauma due to
multiple traumatic exposures, i.e., sexual
abuse, physical abuse, and/or family
violence compounded by attachment
issues associated with caretaker neglect,
abandonment, or loss. Interventions are
assessment-driven, component-based,
and incorporate directive play therapy,
cognitive therapy, exposure therapy, and
relational treatment. ITCT is effective in
clinical and school settings and addresses
individual needs of clients according
to cultural background, age, gender,
symptoms, needs, and self capacities.
ITCT treatment guides are available
describing interventions and tools.
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
Federal Bureau of Investigation
Proud sponsor of the Crimes Against Children Conference
The FBI’s Innocent Images National Initiative (IINI) is
an intelligence driven, proactive, multi-agency investigative
operation to combat the proliferation of child pornography/child
sexual exploitation facilitated by online computers. To proactively
combat this crime problem, IINI undercover operations are
being conducted in FBI field offices by task forces that combine
the resources of the FBI with other federal, state, and local law
enforcement agencies. The mission of the IINI is to reduce the
vulnerability of children to acts of sexual exploitation and abuse
which are facilitated through the use of computers; to identify
and rescue witting and unwitting child victims; to investigate
and prosecute sexual predators who use the Internet and other
online services to sexually exploit children for personal or financial
gain; and to strengthen the capabilities of federal, state, local, and
international law enforcement through training programs and
investigative assistance.
The mission of the Crimes Against Children (CAC) Program is
to develop a nationwide capacity for the FBI to provide a rapid and
effective investigative response to reported federal crimes involving
the victimization of children; reduce the vulnerability of children
to acts of sexual exploitation and abuse; reduce the negative impacts
of domestic/international parental rights disputes; and strengthen
the capabilities of federal, state and local law enforcement through
training programs and investigative assistance. The CAC program
addresses investigations including non-ransom child abductions;
domestic and international parental kidnappings; child prostitution; sexual/physical abuse of children occurring on government
reservations; sexual exploitation of children; child sex tourism; and
the National Sex Offender Registry. Each of the FBI’s 56 field offices
has designated CAC Coordinators who work with local, state,
tribal, and federal authorities. CAC Coordinators have established
multiagency CAC Resource Teams capable of effectively investigating and prosecuting incidents that cross legal, geographical,
and jurisdictional boundaries, and enhance the interagency sharing
of intelligence. The CAC program, in conjunction with the
Justice Department’s Child Exploitation and Obscenity Section
and the National Center for Missing and Exploited Children, is
responsible for the Innocence Lost National Initiative, which is
designed to address the problem of child prostitution in the U.S.
The FBI’s Crimes Against Children Unit, in coordination with
the Behavior Analysis Unit-3, created regional Child Abduction
Rapid Deployment (CARD) Teams. CARD Teams are a proactive
endeavor designed to deploy investigators with demonstrated,
proven experience in CAC matters, particularly non-family child
abductions, as a rapid onsite response to provide investigative,
AUGUST 11-14, 2008 • DALLAS, TEXAS
technical and resource assistance to state and local law enforcement
during the most critical time following a child abduction.
The National Center for the Analysis of Violent Crime
(NCAVC) has designated its Behavioral Analysis Unit-3 (BAU3) to specifically provide operational assistance in all crimes
against children matters to include: crime analysis and profiles
of unknown offenders; investigative, interview, prosecutive
and media strategies; major case management; search warrant
assistance; and expert testimony. Assistance to law enforcement
agencies is provided through “criminal investigative analysis,” a
process of reviewing crimes from both a behavioral and investigative perspective. It involves reviewing and assessing the facts of
a criminal act, interpreting offender behavior, and interaction with
the victim, as exhibited during the commission of the crime, or
as displayed in the crime scene. To further enhance its behavioral
support of operational requests, BAU-3 also conducts behavioral
research in many areas involving child victims. The BAU-3
staff produced the “Child Abduction Response Plan” to assist
investigators faced with these challenging and time-sensitive
investigations. Requests for NCAVC assistance should be made
through the NCAVC coordinator designated in your local FBI
Field Office.
The mission of the Office for Victim Assistance (OVA) is to
ensure that victims of crimes investigated by the FBI are afforded
the opportunity to receive the services and notification as required
by Federal law and the Attorney General Guidelines on Victim
and Witness Assistance. The FBI recognizes not only the necessity
of providing for the legal rights of victims but the benefits that
effective and timely victim assistance brings to investigations. The
OVA applies three major principles in performing its mission: (1)
doing what the law requires; (2) doing what will help victims and
enhance their ability to participate in the investigative process; and
(3) using innovative, flexible, and practical methods to accomplish
its goals. The OVA provides program oversight, direction,
and guidance to the field offices and FBIHQ entities to include
compliance with the statutory and AGG requirements regarding
all aspects of notification for victims of crimes investigated by
the FBI. The unit is responsible for managing the day-to-day
operational aspects of the Victim-Witness Assistance Program and
ensuring that all victims of crimes investigated by the FBI are
identified, offered assistance, the opportunity to afforded services,
and notifications specified by statute. In addition, the OVA is
responsible for providing training and information that helps
to equip FBI agents, Evidence Recovery Teams, and other FBI
personnel to work effectively with victims.
19
Introduction to Secure Digital Forensic
Imaging
Presented by Ward Allen
This extraordinary “INTERACTIVE” 90
minute event defines the intricate values
of forensic digital pictures through the use
of graphic side-by-side on-screen sample
comparisons and interactive classroom
discussions including information about
JPG and RAW files. By defining the
seven attributes of both “good” & “bad”
digital pictures,” forensic pictures can be
analyzed, evaluated and judged instantly
during a forensic examination. This
objective evaluation should be used, onsite, to determine the need for additional
pictures. Examples of “focused and unfocused” pictures, “properly framed and
poorly framed” pictures, “properly lighted
and improperly lighted” pictures along
with “overexposed, properly exposed, and
underexposed” pictures will be compared
and discussed openly.
Introduction to the Virtual World of
Second Life
Investigative Resources of the USMS for
Crimes Against Children Cases (Including
Locating Fugitives Using Electronic
Surveillance Techniques)
Munchausen Syndrome by Proxy:
An introduction to the Hinterland
of Child Abuse
Presented by Irving Brandt, Kirk King
This talk will be an introduction to
Munchausen Syndrome by Proxy (MSbP).
Statistics will be presented and cases
will be discussed. An evaluation process
will be outlined. This process will focus
on looking at alternative explanations
to MSbP as well as documentation of
findings. The pros and cons of covert
video surveillance will be discussed.
This workshop will outline investigative
resources the USMS provides in crimes
against children cases. This workshop
will also explore electronic surveillance
techniques used in locating fugitives
Linking Non-Compliant Sex Offenders to
Child Victimization Cases
Presented by Kristin Anderson, Staca Urie
With as many as 100,000 registered sex
offenders in the United States whose
whereabouts are unknown, expanding our
ability to link open and unsolved missing/
exploited child cases to these offenders is of
great potential benefit. This presentation
will focus on how NCMEC is working
to bring together a variety of resources
to assist law enforcement in locating sex
offenders and identify case linkages across
broad time and geographic parameters.
Cases examined include child abductions,
attempted abductions and relationships to
online solicitation/exploitation incidents
Presented by Joseph Rampolla
Locating Known Abductors
Second Life, the virtual world created by
Linden Labs, is growing every day. It is
not a video game but a virtual world that
parallels our real lives (1st Life). Facebook
and YouTube rule young kids lives but
Second Life is possibly the newest biggest
threat that teens will be facing. When the
video game Grand Theft Auto -San Andreas
Fault first came out, parents were outraged
at the adult content which caused quite a
controversy. Second Life is much worse,
and the most frightening thing about it
for kids is that it is live (in real time). The
characters are real people from all walks
of life.
Presented by Robert Hoever
Investigating Physical Abuse and Neglect:
Reconstruction Techniques
Presented by Matthew Cox
Presented by Robert Farley, Ron Laney
This seminar will focus on non-accidental
injuries on children and will emphasize
the specific techniques that can be used
by the investigator in the assessment,
investigation and reconstruction of cases
involving soft tissue injuries such as
bruises, lacerations and burns. In addition,
the various weapons utilized by the
offender in child abuse situations will also
be identified and discussed. The seminar
will also address the circumstances and
evaluation of deprived and neglected
children. Lastly, the curriculum offers
case illustrations that encourage hands on
participation by the student.
20
Explores investigative strategies and
resources for the investigator to utilize in an
effort to local and apprehend abductors of
children once they have been identified.
(The) Making of a Child Abuse Detective
Presented by Brian Killacky, Ron Laney
What it takes to become a detective
assigned to a crimes against children unit.
Individual investigative assessments,
targeting specific crimes of violence
against children and issues that will
make the investigator better suited to
investigate these complex crimes.
Medical Evaluation of Child Sexual Abuse:
Lessons Learned
Lessons Learned will review the basic medical
findings of child sexual abuse examinations.
Topics will include the frequency and types
of medical findings including forensic
evidence collected, genital injuries, and
sexually transmitted infections. The lecture
will incorporate numerous case examples to
illustrate the key learning points.
(The) Medical Examiner’s Perspective
on Child Fatalities
Presented by Reade Quinton
Topics of this workshop include
investigation and autopsy findings in
sudden unexpected infant death (SUID)
cases, abusive injuries including head
trauma, neglect, Munchausen Syndrome
by Proxy, and determination/classification
of cause and manner of death.
Presented by Christopher Greeley
NetSmartz: The Latest Trends in Internet
Safety: Social Networking, Cyberbullying,
Webcams
Presented by Katie Donovan
NetSmartz is a free, interactive educational
safety resource from the National Center
for Missing & Exploited Children
(NCMEC) that uses age-appropriate,
3-D activities to teach children, tweens,
and teens how to be safer online. The
NetSmartz Workshop has recently
updated Internet safety presentations
geared to educate tweens, teens, and
parents/communities. They are intended
for use by members of the ICAC, School
Resource Officers, school administrators,
teachers, police officers, and others who
engage in public education activities
within their communities.
Operation Guardian West: An Effective Sex
Offender Round Up Operation
Presented by Michael Troyanski, Kristin Anderson
A multi-jurisdictional approach to sex
offenders who have failed to register and/
or maintain registration. This ongoing
investigation was designed to operate
as a multi phased operation including
current situational assessment for
local/state/federal agencies, compliance
investigations, securing prosecution, and
maintaining the forward momentum.
Operation Fairplay - Lecture
Presented by Flint Waters
You will get techniques to dramatically
improve your search warrant results.
This block will identify advances
in P2P undercover operations using
software provided by investigators from
throughout the country. Attendees
will learn to use real-time queries to
identify high volume traders in their
own jurisdiction. This block will
include discussion of search warrant
challenges and defense tactics related
to IP-based investigations. This is an
advanced session. Attendees should have
a solid background in IP investigations
and a practical understanding of
P2P technologies.
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
Office for Victims of Crime
Proud supporter of the Crimes Against Children Conference
Once again, the Office for Victims of Crime (OVC) is pleased to support the
Dallas Crimes Against Children Conference. This conference brings together
the key professionals needed to develop an effective, multidisciplinary
response to child abuse and other crimes perpetrated against children. OVC
is committed to efforts to expand our capacity to assist crime victims and to
provide leadership in changing attitudes, policies, and practices to promote
justice and healing for all victims of crime. OVC works with national,
international, state, military and tribal victim assistance and criminal justice
agencies, as well as other professional organizations to promote access to the
justice system and comprehensive services for crime victims.
OVC was created by the U.S. Department of Justice in 1983 and formally
established by Congress in 1988 through an amendment to the Victims of
Crime Act of 1984 (VOCA). As prescribed by VOCA, OVC is responsible for
administering the Crime Victims Fund (Fund)—a major source of funding
for victim service programs throughout the country, and the sole source of
funding for OVC discretionary activities. The Fund is made up of fines and
penalty assessment imposed on federal criminal defendants. Each year millions
of dollars are collected and deposited into the Fund to support programs
authorized under VOCA.
and prosecution of child abuse, including cases that occur in Indian country.
OVC has provided funding to support the National Children’s Alliance to
establish children’s advocacy centers on Indian Reservations through its
federal division.
We encourage you to take advantage of two national resources OVC has
established for the field. The Office for Victims of Crime Resource Center
(OVCRC) produces, collects, maintains and disseminates comprehensive
information and resources for victim service providers and allied professionals.
Ask OVCRC for up-to-date research and statistics, victim-related publications,
other information, resources and referrals. The OVC Training and Technical
Assistance Center (TTAC) tailors assistance to your program’s individual
needs. Through consultation with TTAC’s professional staff, mentors and
expert consultants, help is available to identify and secure speakers for
conferences and workshops, provide training on victim’s issues, find facilitators
for focus groups and strategic planning meetings, and access other tools and
skill-building activities aimed at effectively working with crime victims. To
access OVCRC call 1.800.851.3420 (TTY 1.877.712.9279), or for TTAC call
1.866.682.8822 (TTY 1.866.682.8880). We also invite you to visit OVC’s
comprehensive website on the Internet at www.ovc.gov.
OVC allocates a significant amount of funding to address crimes against
children and to respond to children who witness violence. Funds made available
to states under the VOCA victim assistance program—which responds to
victims of child abuse—are a funding priority area. With discretionary funding
available from the Fund, OVC provides funding to improve the investigation
U.S. Attorneys Office, Northern District of Texas
The threat of sexual predators soliciting children for physical sexual contact is well-known and serious; the danger
of the production, distribution, and possession of child pornography is equally dramatic and disturbing.
In 2006, the Department of Justice launched Project Safe Childhood (PSC), an important initiative to combat
the proliferation of technology-facilitated sexual exploitation crimes against children. Through a well-informed
and well-trained network of federal, state and local law enforcement agencies and advocacy organizations, PSC
coordinates efforts to protect our children by investigating and prosecuting online sexual predators. For more
information regarding PSC and the impact community-based efforts have made, please visit the PSC website at
www.projectsafechildhood.gov.
Our response to these crimes must be comprehensive, coordinated, and robust and my office is proud to partner
with Dallas Children’s Advocacy Center and the Dallas Police Department with the 20th Annual Crimes Against
Children Conference.
AUGUST 11-14, 2008 • DALLAS, TEXAS
Richard B. Roper
United States Attorney
Northern District of Texas
21
20th Annual
Sponsor Recognition
(As of date of printing)
We extend our gratitude to the following sponsors of the 20th Annual Crimes Against Children Conference.
Platnum Sponsor
U.S. Attorneys Office, Northern District of Texas
DCAC League
22
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
Pediatric Injuries: Are They Abusive
or Not?
Recent Research Affecting Child Abuse
Investigation and Prosecution
Presented by Demetra K. Soter
Presented by Chris Newlin
This workshop will attempt to teach normal
childhood injuries and child development,
and how this helps to evaluate injuries. This
will help you determine when an injury is
more than likely abuse, neglect, accidental,
or cannot be determined.
Presenting Behavioral Evidence
in a Criminal Trial
Presented by Dan Powers, Michelle Voirin
The unique partnership of therapist
and lawyer will discuss the difficulty
of preparing a child abuse victim for
the criminal trial. The workshop will
discuss the unique challenges for DA’s in
dealing with child abuse victims. We will
discuss consistent and inconsistent victim
behaviors and attendees will understand
the importance of building a relationship
with the child. We will also discuss trial
strategies and utilization of expert and
fact witnesses. The CAC model will be
highlighted as a tool to minimize potential
problems.
Protecting Yourself and Your Family
On The Internet
Presented by Jim Tanner
Join a Cyber Crime Analyst as he explains
how the dark side of the Internet can hurt
you and how to defend yourself from
cyber attacks. In plain English, we’ll cover
purging personal information from data
mines; establishing good security on your
computer and home network; avoiding
common problems like cross site scripting,
trojans and worms; and emerging threats.
If you own a computer, do yourself a favor
and attend this session.
Psychology of the Offender: Pedophilia,
Paraphilias & Online Offenders
Presented by Peter Collins
This workshop will discuss the relationship
between pedophilia and the online offender.
Current research, as well as cross associated
sexual deviances will be discussed.
Recent Developments Relevent to
Investigation and Prosecution
of Child Abuse
Presented by John Myers
This workshop will address recent
developments relevant to investigation
and litigation of child abuse and neglect.
Subjects covered include the most recent
medical and psychological research that
has an impact on testimony from children
and medical evidence of maltreatment. The
workshop will offer detailed treatment of
the admissibility of hearsay in child abuse
cases, with particular emphasis on the
impact of Crawford v. Washington on the
admissibility of hearsay.
AUGUST 11-14, 2008 • DALLAS, TEXAS
The emergence of quality child abuse
research over the past 20 years has
vastly informed our practice. However,
with the tremendous quantity of this
research and the overwhelming demands
of frontline professionals, a widening
gap between the research and practice
has developed. This presentation
will introduce participants to recent
research which impacts the frontline
delivery of services and challenge them
to incorporate this into their practice.
This is a fast-paced, practical workshop
for those who are committed to the
highest quality of services for our most
vulnerable children.
Resiliency 101: From Victim to Survivor
Presented by Julie Brand
Some victims of childhood abuse perpetuate the cycle; others grow to be safe,
nurturing adults. How can we influence
which path they will choose? This
workshop identifies seven key steps to
becoming a resilient survivor—steps
that can help a victim to overcome
trauma and to develop a “survivor’s
perspective.” Attendees will learn how
to use the “language of resiliency”
to identify and reinforce victims’
strengths, positively impacting their
self-perceptions. The presenter is both
an experienced counselor and a resilient
survivor of maternal sexual abuse.
Runaways and Child Abuse:
A Renewed Perspective
Presented by Brenda Nichols
Appropriate for law enforcement, CPS,
prosecutors and therapists. Attendees
will gain broader understanding of why
“runaways” react and respond in the
manners in which they do. Will provide
an understanding as to how jurors need
to be educated when they are met with
a non-compliant victim so they can
develop understanding and compassion
for a “delinquent” who is yet a victim.
Through the use of examples from actual
cases and visual media, attendees will
have their perspectives renewed.
Sexual Exploitation of Children
for Multidisciplinary Teams
Presented by Kenneth Lanning
This presentation is intended to
make MDT workers and others more
knowledgeable about the nature and
manifestation of the sexual exploitation of
children. The frequent confusion created
by calling the same thing by different
names and different things by the same
name will be examined. Included will
be basic discussions of topics such as
child pornography, child sex rings,
use of computers, paraphilias, and the
grooming process. Cases that overlap
common stereotypes will be discussed.
Shaken Baby Syndrome:
The Truths and Myths
Presented by Christopher Greeley
This talk will focus on the medical
findings seen in victims of abusive
head trauma. This talk will also address
some of the areas of debate; specifically
short falls, medical conditions, onset of
symptoms and medical mimics. After
the talk, attendees should be able to
understand the medical findings seen in
abusive head injury. The attendee will be
able to understand how to sort through
the potential alternative explanations for
the findings as well as understand which
explanations are unsupported by the
medical literature.
Show Me the Money: A Guide to the Grant
Application Process
Presented by Tiffany Richards
Attendees will learn the basics of
applying for federal grants to assist with
the development of programs related
to sex offender management, child
exploitation, Internet safety, and similar
topics. Supplemental information will be
provided on how to find state, corporate,
and foundation grants. This presentation
will cover all stages of the grant application
process, from searching for funding
opportunities to submitting a completed
application. Search methodology, the use
of keywords, and dos and don’ts will be
discussed. Attendees will also receive a
list of resources to help develop grant
applications in the future.
State-of-the-Art Child Interviewing:
Changes, Best Practices,
and Current Issues
Presented by Patti Toth
This workshop will examine changes
over the last 25 years in what’s
considered
state-of-the-art
child
interviewing. Despite agreement about
many basic principles, there are still
some significant controversies. Among
these are whether to routinely include
interview instructions or ground rules
whether to discuss and elicit a promise
to tell the truth, whether and how to
use body drawings and anatomical dolls,
whether to engage in narrative practice
at the beginning, and how to introduce
the topic of suspected abuse. Discussion
will spotlight the structure, elements,
and evolution of some of the most wellknown interview protocols and present
several examples.
23
Strategies For Strengthening
CAC Multidisciplinary Teams
Presented by Cathy Crabtree
At the core of the children’s advocacy
center (CAC) model is a complex
multidisciplinary team approach to
investigation, prosecution, protection
and intervention of child maltreatment
cases. Over the course of the past two
decades, as the number of CACs in
the nation has continued to grow,
much has been learned about the
inherent challenges this team approach
presents as well as effective strategies
for establishing and maintaining
successful teams, despite the natural
transitions CAC teams experience and
the interdisciplinary conflict inherent in
the model.
Two Decades of Child Sexual Exploitation
Investigations
Presented by Brian Killacky, Ron Laney
This block deals with historical and
current issues centering on the Sexual
Exploitation of children. Beginning with
the first year of the CAC conference, this
will illustrate issues centering around
the sexual exploitation of children and
how legislation, the mechanisms to
molest and investigative strategies have
changed in the past twenty years.
URL Histories: The Mother Lode
of Information
Presented by Jim Tanner
When you surf the Internet, your browser
records all the sites you visit. These
Uniform Resource Locators (URL or URI
– Uniform Resource Indicators) provide
us with a detailed map of Internet use.
Most examiners understand how to
interpret these records. However, most
examiners miss a wealth of information
available through simple approaches to
these records. This session will explain
how to approach these records to gain a
deeper understanding of cyber criminal
behavior. While the session will focus on
sex offenders, the tools and approach work
equally well for any type of cyber crime.
Victim Notification: Protecting Rights in
Child Exploitation Cases
Presented by Christine Feller, Denielle Johnson
Child victims who were sexually
exploited and photographed experience
the additional trauma of knowing
that their abuse has been permanently
memorialized in images. Federal
law clearly states that victim rights
must be upheld while seeking to hold
criminals accountable for their actions.
A streamlined process exists between
NCMEC, OVA & CEOS to ensure that
federal investigators and prosecutors
have the necessary resources to ensure
victim notification in their child
24
exploitation cases. Participants will learn
the step-by-step process that begins at
the time the victim is identified as well
as what “victim notification” entails.
The FBI’s Office of Victim’s Assistance
(OVA) provides notification to these
victims (or guardians) and NCMEC
works as the conduit of information for
investigators. Additionally, participants
will hear how CEOS maintains victim
impact statements that can be used to
give a human voice to otherwise silent
pictures.
Violent Criminal Apprehension Program
Presented by Michael Harrigan
Participants will learn about a program
designed to assist law enforcement in the
identification and matching of similar
cases based upon case and crime scene
characteristics, modus operandi, and other
related investigative information. The
ViCAP database serves as the nation’s most
comprehsnive collection of information
related to both solved and unsolved criminal
activity related to homicide, attempted
homicide, missing persons, kidnapping,
child abduction, unidentified persons, and
sexual assaults (child and adult). Case entry
into the database is made via the FD-676,
Crime Analysis Report. ViCAP Crime
Analysts examine case submissions along
with crime data and patterns to identify
potential similarities among crimes, create
investigative matrices, develop timelines,
identify homicide and sexual assault trends
and patterns, and match missing person
records to unidentified person records. More
than 1,200 state and local law enforcement
agencies actively participate in the program
and regularly submit cases to ViCAP.
What Makes You Think That? Assessing
Subjectivity and Bias in Professional
Judgments About Abuse
Presented by Mark Everson
Professionals viewing the same evidence
often arrive at very different conclusions
about the validity of child sexual abuse
allegations. When discrepant opinions
between evaluators cannot be explained
by variations in training or experience,
the most common explanation involves
the likely intrusion of subjective factors,
including personal bias, in the decision
making process. This workshop will
examine the issue of subjectivity in
professional judgments about abuse. New
research will be presented that identifies
and quantifies specific subjective factors
that influence forensic decisions in
child sexual abuse assessments. The
implications of these findings for
training and forensic practice will also
be discussed.
What’s That Dog Doing in My Playroom? Using
Animal Assisted Therapy in a CAC
Presented by Andrea Schultz, Sarah Torres,
Vanessa Sanford
This session provides an overview of using
Animal Assisted Therapy in a CAC setting.
Topics will include how to propose, develop,
and implement an AAT program. Enlisting
the support of the multidisciplinary team and
general liability issues will also be discussed.
Therapeutic activities and techniques will be
presented and case examples will be used to
demonstrate how animals are incorporated
into both individual and group therapy
sessions. The process of how to train and
register a therapy dog will be discussed.
(The) Witch Hunt, the Backlash,
and Professionalism
Presented by Kenneth Lanning
This presentation will operationally
define the terms “witch-hunt” and
“backlash.” Although thought by
most to be polar opposites, the many
characteristics these extremes have
in common will be discussed. This
presentation will advocate that the best
way to counteract the influence of the
so-called “backlash” and “witch-hunt”
is not to become defensive or to imitate
their tactics, but rather to recognize the
existence of both while simply doing
one’s job in a professional manner.
Witness Tampering of Children
in Family Violence Cases
Presented by Sarah Buel
Although witness tampering of children
is prolific in family abuse cases, it is a
rarely charged, prosecuted, or sentenced
offense. By examining practices, statutes,
and cases involving child victims of
witness tampering, we will discuss
important next steps. Although the
Crawford and Davis cases make it even
more difficult to hold the perpetrators
responsible, there are a number of
strategies that can be implemented to
better protect children.
Working with Yahoo! in Online Child
Protection Investigations
Presented by Elizabeth Banker
This workshop will provide Internet
Crimes Against Children and other
law enforcement investigators with
information about how they may work
with Yahoo! in their investigations. The
topics covered will include an overview
of Yahoo! services, data available in
investigations and the legal framework
for requesting data, Yahoo!’s child
pornography reporting process, and an
overview of Yahoo!’s online child safety
efforts.
20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE
special opportunities
FBI’s “Innocence Lost”
Child Prostitution
Database
Thousands of children are victimized through prostitution each year. Many
of these children are never reported missing and are arrested under an adult
alias. The FBI has developed and launched the Innocence Lost Database (ILD),
a centralized database for national child prostitution data, on Law Enforcement
On-line (LEO). The ILD assists Innocence Lost Task Forces as well as local, state,
and federal law enforcement agencies in identifying child victims of prostitution;
sharing biographical information regarding possible subjects and victims of
child prostitution; and building enterprise-level investigations.
The FBI, together with NCMEC, and DOJ’s Child Exploitation and Obscenity
Section, launched the Innocence Lost National Initiative in 2003 to combat
domestic child prostitution. Investigations have focused on nationally networked
pimps who transport women and children to profitable locations across the U.S.
If you are a law enforcement officer assigned to work Vice, Sex Crimes,
Trafficking or Missing Children cases, please stop by the FBI Innocence Lost
Lab to experiment with the newly launched Innocence Lost Child Prostitution
Database. The ILD contains photos of juvenile and adult victims; pimps; vehicles;
and biographical data which can be searched and retrieved. You may recognize a
missing child and be the key to bringing them home.
NOTE: All sworn law enforcement attendees are invited to participate in this lab.
Due to the sensitivity of the material, please make sure to wear your conference
badge and bring proof of identity to gain entry.
Cell Phone
Investigation Kiosk (CPIK)
The North Texas Regional Computer Forensics Laboratory (NTRCFL) is
participating in a pilot project with the RCFL-National Program Office for
cell phone examinations (Cell Phone Investigation Kiosk - CPIK). The
concept of this project is to provide the tools and techniques for investigators
to obtain actionable logical file information quickly without going through
the process of a time-consuming full forensic examination.
During the conference, the NTRCFL will provide a CPIK where credentialed
LE investigators can test drive the concept with evidence cell phones that
they brought with them. The CPIK will be hosted by a certified FBI cell
phone examiner during certain hours of the conference. The CPIK will
include instruction and the data extraction software and hardware and
photographic setup for taking cell phone screen shots. The CPIK includes a
workstation (computer, monitor, and printer), DVD/CD copying device and
the appropriate software for the workstation.
AUGUST 11-14, 2008 • DALLAS, TEXAS
Field Search for Mac
Field Search for Windows (FSWin) has been in use by more than
2,000 officers for several years. This “Live Box Examination
Tool” has proven to be a valuable addition to law enforcement’s
computer forensic tool box. This session will be the FIRST
nationally available introduction to Field Search Mac (FSMac).
This software application runs live on Mac OS X and matches
the tools available in FSWin. You will receive free software by
attending this session. Please check schedule for times.
Operation Fairplay Computer Training
and Lecture
The Wyoming ICAC will be conducting Operation Fairplay computer
lab training and licensing this year at the Dallas conference. They
will be providing the latest innovations in this investigative tool
including one new application that will be released in Dallas. If
you have been unable to get into a Fairplay training previously,
you should definitely consider adding this to the workshops that
you attend at the conference. If you have already been trained on
prior versions of the current Fairplay operation, like Peer Precision,
you should consider attending the lecture workshop to see the latest
tools in action
North Texas Regional Computer
Forensic Lab Tour
FBI Supervisory Special Agent Mike Morris,
Director of the North Texas Regional Computer
Forensics Laboratory is will lead two interactive
lectures at the NTRCFL on Tuesday and Wednesday
after lunch in the first 90-minute slot. This session will be a frank
discussion with the Director of the first federally-funded American
Society of Crime Laboratory Directors (ASCLD) accredited lab for
Digital Evidence. He will discuss the steps towards preparation to
become an accredited digital evidence lab. As an ASCLD inspector, he’ll
offer advice to agencies that are considering ASCLD accreditation. The
session will conclude with a tour of the North Texas RCFL. Just take a
short ride on the DART light rail or walk to the West End for lunch and
then meet at the NTRCFL for the session.
For more information about the lab, go to: http://www.ntrcfl.org
25
Join us for the Annual CAC Social
Wednesday, August 13
Landmark Ballroom
7 pm – 2 am
Everything is
Bigger
in Texas
Whether this is your first rodeo or
you’ve ridden the trail before—
bring your ten-gallon hat
and mosey on down
for this boot-scootin’,
mechanical bull-ridin’,
Texas-size hoedown.
FREE for registered conference participants.
Guest tickets available for a fee.
Non profit Org.
U.S. Postage
PAID
Dallas Children’s Advocacy Center
P.O. Box 720338
Dallas, Texas 75372-0338
The mission of the
Dallas Children’s Advocacy Center
is improving the lives of
abused children in Dallas County
and providing national leadership
on child abuse issues.
Dallas Texas
PERMIT No. 2138