more information
Transcription
more information
Preliminary Program 20th Annual AUGUST 11-14, 2008 DALLAS, TEXAS Presented by the Dallas Children’s Advocacy Center and Dallas Police Department The Crimes Against Children Conference is presented by www.dcac.org The mission of the Dallas Children’s Advocacy Center (DCAC), one of the largest, most comprehensive Centers in the country, is to improve the lives of abused children in Dallas County and provide national leadership on child abuse issues. DCAC provides a child-sensitive environment for our unique collaborative effort with other public and private agencies in Dallas County charged with investigating child abuse cases, treating abused children and their non-offending caregivers, and bringing their offenders to justice. The Child Advocate Program incorporates our forensic interview staff and victim assistance coordinator to ensure a cooperative multidisciplinary team (MDT) approach to the investigation of child abuse cases in Dallas County for children 14 years of age and younger. DCAC provides objective, child-sensitive and defendable interviews of children alleged to be the victims of abuse, facilitates an MDT approach to the investigation of sudden unexpected child deaths, and serves child witnesses to violent crime. DCAC served more than 2,000 children in 2007 and more than 23,000 children and families since the agency’s inception in 1991. Therapy is provided for child abuse victims and nonoffending caregivers. Children benefit from individual and group counseling designed to help them cope with their trauma. Since 1991, more than 7,829 clients have received therapy at our Center. In addition to the Crimes Against Children Conference, our Education Program provides Recognizing and Reporting Child Abuse and other instruction for school personnel, social service agencies, medical and physician assistant students. We also recently launched a new education video to raise awareness of child abuse in our community. Volunteers are essential to DCAC’s mission and to the success of the Crimes Against Children’s Conference. The 2008 conference will involve more than 200 volunteers providing in excess of 2,250 hours of service. Without the dedication of volunteers from the following groups, this conference would not be possible. Thank you! Assistance League of Dallas Dallas Junior Forum Dallas Children’s Advocacy Center League Junior League of Dallas The many Dallas community volunteers who support the Dallas Children’s Advocacy Center Special thanks are extended to the DCAC Board of Trustees for their ongoing commitment to the protection of children and their support in making this conference possible. Collaborating agencies Municipal and county law enforcement agencies of Dallas County Texas Department of Family and Protective Services, Child Protective Services Division Dallas County District Attorney’s Office Children’s Medical Center of Dallas Department of Pediatrics at the University of Texas Southwestern Medical Center at Dallas join us in Dallas contents Welcome . . . . . . . . . . . . . . . . . . . . . . 1 Greetings from Dallas, We look forward to seeing you at the 20th Annual Crimes Against Children Conference in August. The planning for this year is well underway, and we think you’ll be pleased at many opportunities for learning this year: General Information . . . . . . . . . . . . . . 3 Faculty . . . . . . . . . . . . . . . . . . . . . . . . 6 Case Studies . . . . . . . . . . . . . . . . . . . 8 • The FBI continues to be a major training partner for this important event, and you can watch for informative break-out sessions on Child Sex Offender Typologies, The Use of Polygraphs in Crimes Against Children Investigations and Basic Computer Forensics. We are honored this year to have as our keynote speaker, Robert S. Mueller III, Director of the FBI. • We will hear a State of the Industry Update from the Chief Security Officer of Fox Interactive Media, Mr. Hemanshu Nigam, who will also present a Fox Interactive Media Innovation Award to a law enforcement professional during the Opening Plenary. • Again this year, we welcome back our partners from the National Center for Missing and Exploited Daily Workshop Schedules . . . . . . 10-13 Child Victim Identification Lab . . . . . 13 Computer Lab Schedule . . . . . . . . 14-15 Workshop Descriptions . . . . . . . . 16-24 Special Opportunities . . . . . . . . . . . . 25 Children, hosting a specific training track with topics including Locating Known Abductors, Attacking the Problem of Child Exploitation from Every Angle and Age Regression. • You will learn how to work with companies like MySpace, Microsoft, PayPal, Yahoo! and AOL when investigating cases. • We are pleased to have the U.S. Attorneys Office, Northern District of Texas, as a new partner. presenters Dallas Children’s Advocacy Center . . . . . . Inside Front Cover Dallas Police Department . . . . . . . . . . 2 We also welcome the National Child Protection Training Center (NCPTC). Watch for special NCPTC topics related to Crawford v. Washington, When a Child Freezes on the Witness Stand and Cross Examination of Expert Witnesses. • We will take you behind the scenes of many notable child crime cases, such as Ben Ownby/Shawn Hornbeck, and Joseph Duncan. See page 5 for a full description. • Multiple sessions are designed specifically for medical (especially Sexual Assault Nurse Examiners), social work, Child Protective Services and forensic interview professionals. sponsors Primary Sponsors: MySpace.com . . . . . . . . . . . . . . . . . . . 5 National Center for Missing & Exploited Children . . . . . . 7 enforcement attendees. All labs are available on a lottery basis through a special registration process. Office of Juvenile Justice and Delinquency Prevention . . . . . . . . . . . 9 Visit the www.cacconference.org website for more details. Sponsor Recognition . . . . . . . . . . . . . 22 • Five computer labs are available for training this year, including three labs available for non-law something here for everyone. Thank you for all that you do in our collective effort to protect and serve National Child Protection Training Center . . . . . . . . . . . . . . . . 14 the children of our nation and to prosecute those who have harmed them. Fox Valley Technical College . . . . . . 15 So come learn with us at the nation’s largest crimes against children conference. We hope there is Federal Bureau of Investigation . . . . 19 Office for Victims of Crime . . . . . . . . 21 Lynn M. Davis, President & CEO, Dallas Children’s Advocacy Center AUGUST 11-14, 2008 • DALLAS, TEXAS US Attorneys Office, Northern District of Texas . . . . . . . . 21 1 The Crimes Against Children Conference is presented by Dallas Police Department The Dallas Police Department is one of the original partner agencies supporting the work of the Dallas Children’s Advocacy Center (DCAC). Since the Center was established in 1991, the Department’s Child Abuse Squad has been housed there, helping ensure a close, cooperative working relationship among detectives, Center staff, medical experts, and Child Protective Services (CPS) professionals. The Child Abuse Squad has a variety of responsibilities including investigation of complaints of physical and sexual abuse that occur within the family and cases of fatal child abuse and neglect. The Squad also investigates incidents of suspected abuse and neglect referred to police by CPS. Dallas Child Abuse detectives work very closely with their colleagues from CPS and conduct joint inquiries in those cases where both agencies have an investigative responsibility. The Child Exploitation Squad is responsible for investigating offenses of non-familial child sexual abuse and exploitation, juvenile prostitution, non-Internet child pornography, and child abductions. Although not physically located at the DCAC, Child Exploitation Squad detectives use Center facilities on a routine basis for conducting interviews of their child victims. Detectives also refer child victims to the DCAC for therapy. The Sex Offender Compliance Squad is responsible for enforcing Texas sex offender registration laws. This squad comprises two teams—the Registration Team and the Sex Offender Apprehension Program (SOAP) Team. In 1998, the SOAP Team received the Weber Seavey Award from the International Association of Chiefs of Police as one of the most innovative law enforcement programs in the country. The Internet Crimes Against Children (ICAC) Task Force is responsible for investigating cases of webfacilitated child pornography and cases of child sexual 2 exploitation or abuse that result from contact over the Internet or other computer services. The Dallas ICAC is one of fifty-nine special Task Forces in operation across the United States supported by the Office of Juvenile Justice and Delinquency Prevention. From 1999 to 2002, the Dallas ICAC Task Force was responsible for initiating and managing Operation Avalanche, the largest Internetrelated child pornography investigation ever undertaken. Working in partnership with the United States Postal Inspection Service, the FBI, and other ICAC Task Forces across the country, customers who had subscribed to child pornography websites were identified and targeted. Information on thousands of other suspects living outside the United States was given to law enforcement agencies in their respective countries for action. The highly successful Operation Ore in Great Britain and Operation Snowball in Canada were spin-offs of the Avalanche investigation which began in Dallas. In 2003, the Dallas ICAC Task Force, again working with the FBI and the other ICAC offices, was responsible for Operation Site Key, which also identified thousands of subscribers to child pornography websites around the world. All of the units of the Dallas Police Department described above enjoy close working relationships with the Dallas office of the FBI. A Crimes Against Children Task Force was formed in 1995 which combines the resources and expertise of both agencies. This Task Force works cooperatively on all sexual exploitation cases which may involve federal violations such as computer child pornography, juvenile prostitution, and child abductions. The Dallas detectives assigned to this Task Force have been deputized as both U.S. Marshals and Special Investigators of the Texas Attorney General’s Office to assist them in the filing of criminal charges in exploitation cases. 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE general information The goal of the Crimes Against Children Conference is to provide practical instruction, using current information, the newest ideas and most successful intervention strategies, to those professionals responsible for combating the many and varied forms of crimes against children. The conference is conducted for the sole purpose of providing training to only those people employed by governmental agencies or nonprofit agencies in the fields of law enforcement, prosecution, child protective services, social work, children’s advocacy, therapy, and medicine who work directly with child victims of crime. The management of the conference reserves the right to refuse admission to any individual who does not meet this criteria. “... the premier event in the field of child sexual exploitation.” Opening Plenary Keynote Speaker: Robert S. Mueller III, Director, Federal Bureau of Investigation. Opening Plenary Industry Address: Hemanshu Nigam, Chief Security Officer, Fox Interactive Media, parent company of MySpace. — Ernie Allen, President & CEO National Center for Missing and Exploited Children CONFERENCE SCHEDULE PURCHASE ORDERS and Checks Monday morning begins with an opening session that includes After a motivating welcome, there will be 19 workshops and Select check or purchase order at time of checkout. Purchase order numbers must accompany registrations. Registrations without a purchase order number will not be processed. Our Federal ID number is 75-2303404. Checks not associated with purchase orders must be received prior to discount dates to avoid cancellation or fee increase. six interactive computer labs operating concurrently. Selected Cancellations AND SUBSTITUTIONS workshops are repeated. The most current schedule and workshop Registration cancellations may be made via the online system. Cancellation requests made before midnight July 11 will receive a full refund. Cancellation requests made before July 31 will be refunded less a $75 administrative fee. Refunds will not be made for cancellations after August 1 or for participants who register but do not attend. All refunds will be mailed after the conclusion of the conference. Transfer of registration to another person may be done without penalty via the online registration site at www.cacconference.org. Use your confirmation email and confirmation number to re-enter your registration pages. the conference keynote presentation. Along with a welcome to the conference, you’ll be provided with updated conference information and any special instructions that you may need. descriptions may be found online at www.cacconference.org. This preliminary program contains a sampling of descriptions. CONFERENCE REGISTRATION AND FEES Please register early to take advantage of lower rates. Register online at www.cacconference.org. Groups must register together to take advantage of discounts. Please contact the DCAC to inquire about space availability after July 30. Registrations will not be processed until payment is made and/or approved purchase order is received. Mail your payment with a copy of your online receipt to ensure proper credit. AUGUST 11-14, 2008 • DALLAS, TEXAS EARLY ON-SITE PACKET PICK UP We encourage you to register and pick up your conference materials Sunday evening to beat the crowd. Personnel will be on-site at the Hyatt on Sunday, August 10 from 4:00–8:00 pm. 3 CONTINUING EDUCATION Continuing education credit has been applied for on behalf of the following groups: —Texas State Board of Professional Counselors —National Board of Certified Counselors —Texas State Board of Social Worker Examiners —Sexual Assault Nurse Examiners (SANE) —State Bar of Texas —Texas Nurses Association —Association for Play Therapy Accreditation fees are included in your registration fee. Certificates will be available at the conference information area Thursday, August 14 at 11:30 a.m. TCLEOSE CREDIT TCLEOSE credit will be awarded to Texas peace officers. Officers must provide their TCLEOSE-issued personal identification number and sign in each day to receive credit. CHILD CARE Child care is not available. Infants and children are not allowed in workshops. www.supershuttle.com/default.aspx?GC=AB48U. Regular rate from DFW International Airport is $17 to downtown Dallas hotels; discounted rate for conference attendees is $15. Attendees must book in advance and online to receive maximum discounts. One-way taxi fare from DFW Airport to downtown Dallas is approximately $47. HOTEL ACCOMMODATIONS As of this printing, our host hotel—the Hyatt Regency Dallas at Reunion—has sold out for our conference dates. We have arranged for discounted rooms and shuttle transportation at the following hotels: The Adolphus 800.221.9083 (toll free) or 214.742.8200; www.hoteladolphus.com. Special rates available for conference attendees. Identify the Dallas Children’s Advocacy Center and the Crimes Against Children Conference. For government rate rooms, request the government room block. The Magnolia, 888.915.1110 (toll-free) or 214.915.6500; www.magnoliahotels.com. Special rates available for conference attendees. Hotel Lawrence Dallas, 877.396.0334 (toll-free) or 214.761.9090, www.hotellawrencedallas.com. Special rates available for conference attendees. INTERNET C A F E Check your email during the conference, compliments of AOL. DISCOUNTED AIRFARES To obtain discounted airfare, and the best service, book your travel through Colwick Travel. Contact Colwick Travel between 8:30 am and 5:30 pm CST. Call 800.634.6883 and request the following DCAC Travel Specialists: The Dallas Convention and Visitors Bureau website may also be helpful. Visit www.dallascvb.com. Check the www.cacconference.org website for the latest information on hotel options. Lunch OPTIONS Check your conference notebook for lunchtime dining options in and near the Hyatt. Marleah Freeman Barbara Bertrand Extension 219Extension 247 [email protected] [email protected] If outside of these hours, please contact Colwick at: Phone 972.387.5757 Fax 972.404.1455 Email [email protected] American AirlinesUse AN# A5388AT Southwest AirlinesDouble booking credits applied when booked through Colwick Travel GROUND TRANSPORTATION Ground transportation from DFW International and Love Field airports will be provided by SuperShuttle at a discounted rate provided reservations are made in advance at 4 DALLAS POLICE ASSOCIATION HOSPITALITY EVENING Tuesday, August 12, 6:00 p.m. 1412 Griffin Street East The Dallas Police Association—the original, and largest police employee group for Dallas police officers with over 3,500 active and retired members—will host a hospitality evening. Please join us for an opportunity to network and meet new friends. Transportation to the DPA office will be provided on a limited schedule. The office is located approximately two miles from the Hyatt Regency Hotel. It is a short cab ride if you miss the bus. 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE Fox Interactive Media and MySpace congratulate the Crimes Against Children Conference for 20 years of excellence in ensuring the safety of our children. faculty Please visit www.cacconference.org for Faculty bios. Cindy Alexander Jon Davison Cheryl Lanktree Vanessa Sanford Olga Trujillo Ward Allen Brooke Donahue Ken Lanning Andrea Schultz Jill Trumball-Harris Kristin Anderson William Donaldson Bob Leazenby Anita Shah Keith Underwood Jim Anderst Katie Donovan Jennifer Lee John Shehan Staca Urie Chris Ard Jackie Dougher Michael Leverock Wayne Sheppard Victor Vieth Dan Armagh Derrick Driscoll James Lewis Julian Sher Michelle Voirin Elizabeth Banker Mike Duffey Gary Macnoll Demetra Soter Lauren Wagner Andy Beach Mark Everson Jennifer Mardosz Bobbie Spamer John Warnick Michael Beaver Bob Farley Ellen Magnis Steve Sucsy Felecia Wasson Michael Blades Byron Fassett Kimberly Mayfield Mike Sullivan Flint Waters Boyd Boshears Christine Feller Kim Mercer Steve Sullivan Tim West Julie Brand Anne Ferguson Kim Melia Jim Tanner Carmen White Irving Brandt Dan Ferraro Sarah Migas Reynie Tinajero Matt Whitworth John Bradley Jamie Ferrell Adrienne Mitchell Paul Tressler Bill Wiltse Larry Braunstein Martha Finnegan Laurel Mills Sarah Torres Mark Wood Mike Bruns Kevin Forder Jim Moeller Patti Toth Michael Yoon Greg Brown Jim Fottrell Mike Morris Mike Troyanski Andres Zavala Sara Brusletten Sabra Garibay Joe Mullins Sarah Buel Mike Geraghty John Myers Irish Burch Michael Gneckow Chris Newlin Jeff Burge Michael Gordon Brenda Nichols Susan Caswell Christopher Greeley Hemanshu Nigam Melanie Cervantes Rod Gregg John O’Brien Cindy Christian Steve Grocki Craig Overby James Clemente Tom Harbinson Dave Peifer Elliot Cohen Michael Harrigan Courtney Pero Conference Scholarship Fund Contributors Don Cocolough Billy Hattaway Tom Popken for their generous support: Michelle Collins Bob Hoever Dan Powers Peter Collins Patricia Hogue Eren Price Bonnie Cone Randall Huff Edward Price Catherine Connell Denielle Johnson Gary Purdue Carrie Constantin Sarah Kaleel Reade Quinton Sharon Cooper Julie Kenniston Joseph Rampolla Jennifer Corbet Roseanne Ketchmark Joy Rauls Cynthia Cordes Shing Khor Stuart Reynolds Matthew Cox Brian Killacky Tiffany Richards Cathy Crabtree Kirk King Donald Robinson Patrick Cunningham John Kuchta Susan Rodriguez Keith Daniels Ron Laney Laura Rogers Claude Davenport Jan Langbein Jon Rouse 6 Thank you to this year’s 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE National Center for Missing & Exploited Children® A powerful resource for law enforcement and a proud sponsor of the Crimes Against Children Conference www.missingkids.com The National Center for Missing & Exploited Children (NCMEC) is a private, nonprofit organization mandated by the U.S. Congress working in cooperation with the U.S. Department of Justice’s Office of Juvenile Justice and Delinquency Prevention (OJJDP). NCMEC is a vital resource for the thousands of law-enforcement agencies throughout the U.S. in the search for missing children and quest for child protection. Since its creation in 1984 through March 2008, NCMEC has handled more than 2.2 million telephone calls through its national Hotline—1.800.THE.LOST® (1.800.843.5678), handled more than 576,000 online reports through its CyberTipline® at www.cybertipline®.com; trained more than 239,600 law-enforcement and other professionals; and printed more than 43 million copies of issue-based publications. NCMEC has worked with law enforcement on more than 141,200 missing-child cases, resulting in the recovery of more than 125,000 children. NCMEC is unique. It is a child-serving nonprofit organization which has been provided access to the FBI’s National Crime Information Center (NCIC) Missing Person, Wanted Person, and Unidentified Person Files and Interstate Identification Index (III) criminal-history file; the National Law Enforcement Telecommunications System (Nlets); and the Federal Parent Locator Service (FPLS). It is also the only organization operating a 24-hour, tollfree Hotline for the recovery of missing children in cooperation with the U.S. Department of Justice. SERVICES OFFERED BY NCMEC CASE MANAGEMENT. Case Managers work with families of missing and abducted children and the investigating law-enforcement agencies to provide technical assistance, provide all available search resources, and maintain up-to-date case information. ONLINE REPORTING OF CHILD SEXUAL EXPLOITATION. The CyberTipline® is an online reporting mechanism which allows concerned individuals and Electronic Service Providers to report information online regarding child sexual exploitation. The CyberTipline operates 24 hours a day, 7 days a week and receives tips from around the world online at www.cybertipline.com and by telephone at 1.800.843.5678. CASE ANALYSIS. Case Analysis Unit Analysts track leads, identify patterns among cases, and help coordinate investigations by linking cases together using NCMEC’s database and external, public-data sources. NCMEC’s Special Analysis Unit is comprised of three analyst teams including Sex Offender Tracking, Attempted Abductions, and Research. The main duty of NCMEC’s Sex Offender Tracking Team is to serve as the information clearinghouse for any law-enforcement agency regarding noncompliant, absconded sex offenders. FORENSIC ASSISTANCE. The Forensic Assistance Unit provides support and resources to “cold” cases of AUGUST 11-14, 2008 • DALLAS, TEXAS long-term missing children and cases of unidentified human remains believed to be children or young adults. This Unit also provides computerized age progression of photographs of long-term missing children; reconstruction of facial images from morgue photographs of unidentified deceased juveniles; assistance in identifying children whose images are found in confiscated child pornography; and training in imaging applications and techniques. FAMILY ADVOCACY SERVICES. The Family Advocacy Division proactively works with families, law enforcement, family-advocacy agencies, and legal professionals to provide technical assistance regarding appropriate reunification practices for missing children, referrals, and crisis-intervention services. TRAINING. NCMEC provides training in all aspects of missing and exploited child cases. NCMEC’s investigators’ courses are conducted at regional sites; the Jimmy Ryce Law Enforcement Training Center in Alexandria, Virginia; the Missouri Law Enforcement Training Center near Kansas City, Missouri; and the Polisseni Law Enforcement Training Center in Rochester, New York. ONSITE ASSISTANCE TO LAW-ENFORCEMENT AGENCIES. Project ALERT (America’s Law Enforcement Retiree Team) is composed of skilled, retired, lawenforcement officers who travel at the request of a lawenforcement agency to provide free, on-site assistance to hard-pressed local law enforcement in difficult missing or exploited child cases. Patterned after the National Transportation Safety Board’s system for sending specialists to the site of serious transportation incidents, Team Adam sends experienced, investigative Consultants to the site of serious child abductions and cases of child sexual exploitation. PHOTO DISTRIBUTION. The Lost Child Alert Technology Resource (LOCATER) Program provides law-enforcement agencies the tools and technology necessary to rapidly disseminate missing-child images and information. LOCATER 6.8 is an advanced, Web-based, poster-creation and dissemination program offered exclusively to law-enforcement agencies free-of-charge. NCMEC also maintains upto-date databases of missing children posters online; coordinates exposure of missing-children cases through partnerships with major television networks, publications, and corporations; and coordinates features such as “broadcast” fax and targeted poster distribution to quickly disseminate vital information. THE NETSMARTZ®WORKSHOP. NetSmartz is an educational resource for children of all ages, parents, guardians, teachers, and law enforcement and uses 3-D animation, real-life stories, music, and games to teach children how to stay safer online and while in the real world. This resource may be accessed at www.NetSmartz®.org. 7 CASE STUDIES These case studies will allow conference attendees to go behind the scenes in high profile, complex cases and learn first hand from the actual investigators, prosecutors and others involved, what actually happened and not just what the media covered. You will learn how these cases were handled and the lessons that can be utilized for future investigations. CASE STUDY: BEN OWNBY/SHAWN HORNBECK CHILD ABDUCTION Presented by Mike Blades, Connie Constantin, Patrick Cunningham, Mark Wood In October of 2007, Mike Devlin was sentenced to 4 life sentences plus 170 years in prison for the 2002 kidnapping and subsequent sexual abuse of then, 11-year-old Shawn Hornbeck. This workshop will describe how a later abduction of another boy led investigators to Devlin and the recovery of his first abduction victim. This workshop will detail the arrest and prosecution of Devlin for these crimes. CASE STUDY: BLUE DIAMOND—CHILD PROSTITUTION Presented by John O’Brien, Edward Price, Lynelle Torikai, Mark Wallschlaeger This workshop will discuss the investigation and arrest of several individuals responsible for a well organized domestic, human trafficking, prostitution ring. Though based mainly in Chicago and Detroit, this enterprise reached as far as New Jersey and Hawaii. While initially the case was worked by independent police agencies and the FBI “Innocence Lost” program, this complex case was ultimately a collaborative effort of local and federal efforts. CASE STUDY: CAPTURING THE FRIEDMANS: WHO DO YOU BELIEVE? crimes that he committed that attracted national media attention. Investigators who handled this highly publicized abduction and subsequent abuse of brother and sister Dylan and Shasta Groene of Coeur d’Alene, Idaho will discuss both the horrific details of the crime, and the way law enforcement eventually caught up with Duncan. CASE STUDY: OPERATION ACHILLES Presented by Jon Rouse In this workshop, one of the lead investigators on the case will take you behind the scenes of the investigation of a global, Internet child sexual abuse network that identified over 2,500 “customers” in 19 countries. Operation Achilles was conducted through the cooperative efforts of the Australian Queensland Police, CEOP in the United Kingdom, the FBI in the United States, the BKA in Germany, the Toronto Police Service in Canada, the Department of Internal Affairs in New Zealand, Interpol and others. To date, Operation Achilles has resulted in the removal of more than 40 children from sexually abusive situations, the arrest of 22 network members globally, the closure of four commercial child exploitation websites and arrest of more than 100 offenders internationally who allegedly purchased child exploitation material. CASE STUDY: STEVEN LONG Presented by Andy Beach, Jon Davison The first of this two part workshop will consist of a showing of the award winning documentary film “Capturing the Friedmans” for 1 hour and 45 minutes. The second part will consist of an interactive discussion of some of the issues raised by the film. Attendees at the second part must have seen the film either at the first half or previously and be prepared to participate in the discussion. This case presentation will outline the investigation and prosecution of Stephen Long, convicted for the sexual assault and murder of 11 year-old Kaitlyn Briana Smith. You will learn from both the investigator and the prosecutor how this criminal was identified, arrested and successfully prosecuted after dumping her battered body underneath a vacant trailer near the crime. The prosecutor will take you into the jury trial that lasted two weeks and resulted in a death sentence for Long. CASE STUDY: CASEY CROWDER—CHILD ABDUCTION CASE STUDY: UNITED STATES V. LISA MONTGOMERY Presented by Kenneth Lanning Presented by Boyd Boshears, Kim Melia This workshop will describe the arrest and conviction of Kenneth Osburn for the kidnapping and murder of 17 year-old Casey Crowder. Learn how the investigators solved this case where the teenage girl ran out of gas on the highway and her body was found 6 days later after an extensive search. The presenters will describe how both witness interviews and DNA evidence led them to the killer. CASE STUDY: JAMIE BOLIN Presented by Mike Beaver, Craig Overby, Susan Caswell This case presentation will discuss in detail the identification, arrest, trial and conviction of Kevin Ray Underwood, who confessed to the cannibalistic homicide of 10 year-old Jamie Rose Bolin in Oklahoma. You will learn how the investigators found the perpetrator, who had no prior criminal history, without the victim’s body as evidence. CASE STUDY: JOSEPH DUNCAN—CASE OVERVIEW AND COMMAND POST MANAGEMENT Presented by Jennifer Corbet, Adrienne Mitchell This case presentation will bring you into the investigation and prosecution of registered sex offender, Joseph Duncan and the horrible 8 Presented by Roseann Ketchmark, Matt Whitworth This presentation involves the capital prosecution of Lisa Montgomery for the December 2004 murder of Bobbie Jo Stinnett in Skidmore, Missouri. The defendant strangled Ms. Stinnett, who was 8 months pregnant, to death and then cut unborn infant from her womb using a kitchen knife.The defendant then kidnapped the child to claim as her own. The child was recovered by law enforcement authorities less than 24 hours later three hours away in a small town in Kansas. A federal jury imposed a death sentence against Montgomery following a month long trial in October 2007. CASE STUDY : UNITED STATES V. PAUL EDWARD SHOOK Presented by Steven Sucsy, Gary Macnoll Networking the investigation and prosecution of real-time child molestation on the Web. This case involves the investigation and prosecution of defendants who were engaged in molesting young children while they sent Webcam images of the molestation to others who were engaged in the same activity. The investigation involved multiple jurisdictions, and the case study demonstrates the advantages of multi-jurisdictional efforts. 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE Office of Juvenile Justice and Delinquency Prevention–Child Protection Division Proud sponsor of the Crimes Against Children Conference In 2000, the Office of Juvenile Justice and Delinquency Prevention created the Child Protection Division (CPD) to oversee its efforts in protecting children from abduction, exploitation, violence, abuse, neglect and other forms of victimization. OJJDP’s mandate to the protection of children is primarily derived from two sources: the Missing Children’s Assistance Act of 1984 and the Victims of Child Abuse Act of 1990. These acts, along with the Juvenile Justice and Delinquency Prevention Act, define the parameters of CPD’s mission and provide the legislative authority for the work that CPD oversees. CPD is responsible for administering all programs related to crimes against children and provides leadership and funding in the areas of prevention, intervention, treatment and enforcement. CPD promotes the effective use of policies and procedures to address the problems of missing, neglected, abused and exploited children. CPD conducts research, demonstration and service programs; provides training and technical assistance; and coordinates various activities. For further information about our office, contact: Child Protection Division Office of Juvenile Justice and Delinquency Prevention 810 7th Street, N.W., Washington, D.C. 20531 Telephone: 202.616.3637 Fax: 202.353.9093 Website: www.ojjdp.ncjrs.org AUGUST 11-14, 2008 • DALLAS, TEXAS CPD program areas include: Amber Alert Association of Missing and Exploited Children Organizations (AMECO) Child Abuse Prosecution Training and Technical Assistance Child Development– Community Policing (CD-CP) Court Appointed Special Advocate Program (CASA) Internet Crimes Against Children Task Force Program (ICAC) Local Children’s Advocacy Centers Missing and Exploited Children Training and Technical Assistance Program Model Courts Initiative National Center for Children Exposed to Violence National Center on Child Fatality Review National Resource Center and Clearinghouse (NCMEC) Parents Anonymous Project Safe Childhood Regional Children’s Advocacy Centers Safe Kids/Safe Streets— Community Approaches To Reducing Abuse and Neglect and Preventing Delinquency Safe Start Initiative School Resource Officer Training and Support 9 PRELIMINARY SCHEDULE Final schedule will be given onsite. Visit our website at www.cacconference.org for updates. monday, august 11 10:00-11:30 am Track A presented by the FBI other activities: Track B presented by NCMEC Registration and Coffee Track C presented by NCPTC Workshops shaded in BLUE are offered only once. 7:00–8:15 am 8:15–9:30 am Opening Plenary For all conference participants Keynote: Robert S. Mueller III, Director, Federal Bureau of Investigation Industry Address: Hemanshu Nigam, Fox Interactive Media Landmark Ballroom 9:30–10:00 am Morning Break 11:30 am-1:00 pm Use of Polygraph in Crimes Against Children Investigations Interviewing Compliant Victims Lewis/Leverrock Finnegan/Connell Sheppard Tanner The Best Kept Secret, Part 1 Brand Brand Presenting & Explaining Computer Forensic Evid. Trumball-Harris Welcome Reception For all conference participants 1F Introduction to Secure Digital Forensic Imaging Cooper 1G 1H 1J 2E 1K 2G Child Sexual Assault & Using the DNA Advantage 2H Cox/Mayfield/Zavalas Fassett 3G Braunstein 3H Detecting Deception Tanner 3i Breaking Down Fractures 2J Cox 3J The 5 Bs of Child Abuse, Part 2 2K Child Fatality Case Study 1L 3F Effective Courtroom Testimony for LEO: Part 2 2i Christian 3E Investigative Response to High Risk Victims: Part 2 Child Pornography and Child Abuse Killacky/Laney 3D Brand Lanning 2F The 5 Bs of Child Abuse, Part 1 Cox Price/Burch Langbein Braunstein 3C The Best Kept Secret, Part 2 The Making of a Child Abuse Detective Med. Eval. of Child Sexual Abuse: Lessons Learned Christian 3K Medical Analysis of Child Pornography 2L Cooper 3L Witch Hunt, the Backlash & Professionalism Case Study: Joseph Duncan Case Overview, Part 1 Case Study: Joseph Duncan Case Overview, Part 2 Lanning Gneckow/Robinson Gneckow/Robinson 1M Hunting the Predators: Movie Screening Sher 1N Microsoft: Working with Law Enforcement 1O 10 2D Sexual Exploitation of Children for MDT’s 1i Two Decades of Sexual Exploitation Investigations Harbinson The Link Between Domestic Violence & Child Abuse Fassett 3B Effective Use of Forensic Interviews at Trial Effective Courtroom Testimony for LEO: Part 1 Managing High Risk Offenders in the Community Ferrell 2C Investigative Response to High Risk Victims: Part 1 Online Grooming Killacky/Laney 5:00–7:00 pm 1E 3A Crawford v. Washington: Part 2 Lee/Rouse Resilency 101: From Victim to Survivor Allen 2B A Close-Up Look at the Ever-Shrinking World 1D Boshears/Melia Anderson/Urie Harbinson Protecting Yourself & Your Family on the Internet 2A Hoever Vieth 1C Casey Crowder: Child Abduction Case Study Linking Non-Compliant Sex Offenders to Child Victim. Crawford v. Washington: Part 1 2:30-3:00 pm FBI Meeting Mandatory for all FBI attendees. Optional for FBI Speakers. 1B 3:00–4:30 pm Locating Known Abductors Cross Examination in Cases of Child Abuse Brown 4:45–6:00 pm 1A Behaviorally-based Interviewing Strategies Lunch On your own Afternoon Break 1:00-2:30 pm 2M 3M Case Study: Lisa Montgomery, Part 1 Case Study: Lisa Montgomery, Part 2 Whitworth/Ketchmark/Cordes 2N Whitworth/Ketchmark/Cordes 3N The Adam Walsh Act: Anational Endeav. to Prot. Children & Fam. Strategies for Strengthening CAC Multidisciplinary Teams Rogers Crabtree 2O Witness Tampering of Children, Part 1 Buel 3O Witness Tampering of Children, Part 2 2P Buel 3P Investigating & Prosecuting Child Pornography MySpace: Working with Law Enforcement ICAC Task Force: Resource for Law Enforcement Armagh/Mullins Kaleel/Nigam/Mardosz Peifer/Laney 1P 2Q 3Q Violent Criminal Apprehension Program (VICAP) The Virtual Global Task Force: An Internat. LE Perspective Working with Yahoo! in Online Child Protection Investigation Harrigan Davenport Banker 1Q 2R 3R AUGUST 11-14, 2008 • DALLAS, TEXAS PRELIMINARY SCHEDULE Final schedule will be given onsite. Visit our website at www.cacconference.org for updates. tuesday, august 12 8:00-9:30 am 10:00-11:30 am 1:00-2:30 pm Child Abduction Response Plan Basic Computer Forensics in CAC Cases Child Sex Offender Typologies, Part 1 Donaldson Shah Clemente 4A 5A 3:00–4:30 pm Child Sex Offender Typologies, Part 2 6A Clemente 7A Locating Known Abductors other activities: Behaviorally-based Interview Strategies Attacking the Problem of Child Exploitation Hoever Sheppard Collins 7:00–8:00 am Investigating & Prosecuting Cases ... Non-Verbal Child. Opening Statements and Closing Arguments Continental Breakfast Reunion Foyer Vieth Vieth Managing High Risk Offenders in the Community Investigating & Prosecuting Child Pornography Ethical Challenges and the MDT Team, Part 1 Ethical Challenges and the MDT Team, Part 2 9:30–10:00 am Brown Armagh/Mullins Powers Powers Morning Break Exploring the Impact of Trauma: Part 1 11:30 am–1:00 pm Trujillo 4B 4C 4D 5B Trujillo 6B Cross Examination of Expert Witnesses 5C 5D Exploring the Impact of Trauma: Part 2 4E DNA, CODIS & NCMEC’s Children’s DNA Collection Effective Courtrm Testimony for Therapists, Part 2 7B Invest. and Prosecut. Cases of Emotional Maltreatment Harbinson 6C 6D Exploring the Victim’s Experience 5E Spamer Vieth 7C 7D Effectively Advocating for Children’s Advocacy Centers Trujillo 6E 7E Lunch On your own Effective Courtrm Testimony for Therapists, Part 1 4F 5F 1:00-4:00 pm Team Approach to Invest. & Pros. Child Sex. Abuse, Pt 1 Team Approach to Invest. & Pros. Child Sex. Abuse, Pt 2 Recent Research Affecting Child Abuse Invest., Part 1 Recent Research Affecting Child Abuse Invest., Part 2 Price/Burch/Burge Price/Burch/Burge Newlin Newlin Mandatory Meeting for US Marshalls 2:30–3:00 pm Afternoon Break 6:00 pm Dallas Police Association Social see page 4 for details 4G Invest. Response to Dom. Prostitution & Traffic, Part 2 Case Study: US v. Paul Edward Shook Fassett Fassett Macnoll/Sucsy 4H Invest. Phys. Abuse & Neglect: Reconstruction Tech., Part 1 Invest. Phys. Abuse & Neglect: Reconstruction Tech., Part 2 Current Challenges: Taint and Crawford Farley/Laney Farley/Laney Tressler/Laney 4i 5i ICAC Task Force: A Resource for Law Enforcement Runaways and Child Abuse: A Renewed Perspective Peifer/Laney Nichols 4J Anderst 4K 4L Christian 5K 5L 4M Case Study: Operation Achilles Rouse 4N Braunstein 5M Wasson 7F 7G Field Search for Mac 6H Tanner 7H How Not to Help the Defense Attorney 6i Child Pornography and Child Abuse Braunstein 7i Invest. & Prosecut. Bulletin Board Child Porn. Cases 6J Grocki 7J The Making of a Child Abuse Detective Anderst 6K Abuse by Burning Effective Courtroom Test. for SANE Nurses, Pt 2 Effective Courtroom Test. for SANE Nurses, Pt 1 6G Medical Neglect The 5 Bs of Child Abuse, Part 2 The 5 Bs of Child Abuse, Part 1 Braunstein/Ferrell Killacky 6F 5J Two Decades of Sexual Exploitation Investigations Christian Killacky/Laney 7K Abuse by Burning Purdue 6L Purdue 7L Medical Exam. Perspective on Child Fatalities, Part 1 Medical Exam. Perspective on Child Fatalities, Part 2 Quinton Quinton 6M 7M Case Study: Green Iguana Travel and NAMBLA Case Study: Ben Ownby/Shawn Hornbeck, Part 1 Blades/Wood Case Study: Ben Ownby/Shawn Hornbeck, Part 2 Blades/Wood Mitchell/Corbet Constantin/Cunningham 6N Constantin/Cunningham 5N 7N Case Study: Lisa Montgomery, Part 1 Case Study: Lisa Montgomery, Part 2 Case Study: Capturing the Friedman’s, Part 1 Case Study: Capturing the Friedman’s, Part 2 Whitworth/Ketchmark/Cordes 4O Whitworth/Ketchmark/Cordes 5O Lanning Lanning URL Histories: The Mother Lode of Information Working with Crime Victims Compensation in Texas EBay/Pay Pal: Working with Law Enforcement Forensic Interviewer Forum Tanner Cone Cervantes Burch 4P Buel 4Q Medical Analysis of Child Pornography Cooper 5P AOL: Working with Law Enforcment Conducting a Community Safety Audit AUGUST 11-14, 2008 • DALLAS, TEXAS 5H Jury Selection Sanford/Schultz/Torres Invest. Response to Dom. Prostitution & Traffic, Part 1 Medical Neglect Workshops shaded in BLUE are offered only once. 5G What’s That Dog Doing in My Playroom? Rauls 4R Colcolough 6P Conducting a Community Safety Audit 5Q Buel “Caught in the Web” Lecture Online Grooming Sher Cooper 5R Operation Fairplay Lecture, Part 1 Operation Fairplay Lecture, Part 2 A Close-Up Look at the Ever-Shrinking World Waters Waters Lee/Rouse 4S 6O 5S 7O 7P Law Enforcement Investigators Forum 6Q Nichols/Farley 7Q Digital Evidence Search and Seizure 6R Gregg 7R Back to the Future: Using an Undercover Website 6S Kuchta 7S PRELIMINARY SCHEDULE Final schedule will be given onsite. Visit our website at www.cacconference.org for updates. wednesday, august 13 other activities: 8:00-9:30 am 10:00-11:30 am Case Study: Casey Crowder Child Abduction The Basics of Conducting Wireless Internet Invest. Boshears/Melia Reynolds 8A 1:00-2:30 pm Case Study: Jamie Bolin 9A Attacking the Problem of Child Exploitation Victim Notification: Protecting Rights Feller/Johnson 8B Collins 3:00–4:30 pm Beaver/Caswell/Overby Case Study: Green Iguana Travel and NAMBLA 10A Linking Non-Compliant Sex Offenders 9B Anderson/Urie Mitchell/Corbet 11A Age Regression 10B Mullins 11B Maryland v. Craig Revisited: Establ. Legal Basis Show Me the Money: A Guide to the Grant Applic. When A Child Freezes on the Witness Stand The Impact of Child Abuse on Spirituality ... Continental Breakfast Reunion Foyer Harbinson Richards Harbinson Veith Recent Developments Relevant to Investigations Surviving Sexual Molestation 9:30–10:00 am Myers Warnick Morning Break Eff. Courtroom Testimony for CPS Invest., Part 1 Eff. Courtroom Testimony for CPS Invest., Part 2 8E 9E Lunch On your own Integrative Treatment of Complex Trauma (ITCT): Pt. 1 Integrative Treatment of Complex Trauma (ITCT): Pt. 2 Defensive Tactics for Non-Law Enf. Prof., Part 1 Defensive Tactics for Non-Law Enf. Prof., Part 2 Lanktree Lanktree Popken/Hattaway Popken/Hattaway 2:30–3:00 pm Invest. Phys. Abuse & Neglect: Reconstruction Tech., Part 1 Invest. Phys. Abuse & Neglect: Reconstruction Tech., Part 2 Ask Me No Questions And I’ll Tell You No Lies What Makes You Think That? Assessing Subjectivity Farley/Laney Farley/Laney Everson Everson 7:00–8:00 am 11:30 am–1:00 pm Afternoon Break 7:00 pm Conference Party see last page for details 8C 8D 8F 8G 8H Civil Litigation in CPS Cases 8i Workshops shaded in BLUE are offered only once. 9F 9G Greeley 10C Presenting Behavioral Evid. in a Crim. Trial, Part 1 Presenting Behavioral Evid. in a Crim. Trial, Part 2 Powers/Voirin Powers/Voirin 10D Stewards of Children, Part 2 Magnis/Ferguson Magnis/Ferguson Braunstein The Virtual Global Task Force: An Internat. LE Perspective The Impact of Domestic Violence on Children Davenport Langbein 9i 11D Stewards of Children, Part 1 10E 10F 10G Effective Courtroom Testimony LEO: Part 1 9H 11C 11E 11F 11G Effective Courtroom Testimony for LEO: Part 2 10H Braunstein 11H The Adam Walsh Act 10i Forder/Yoon 11i Psychology of the Offender, Part 1 Psychology of the Offender, Part 2 Current Challenges Taint & Crawford Demystifying the Myths of Child Sexual Assault ... P. Collins P. Collins Tressler Ferrell 8J 9J 10J 11J Eff. Courtroom Testimony for Forensic Interviewers, Part 1 Eff. Courtroom Testimony for Forensic Interviewers, Part 2 Recent Developments Relevant to Investigations Current Challenges: Taint and Crawford Braunstein Braunstein Myers Tressler 8K 9K 10K 11K Pediatric Injuries: Are They Abusive or Not? Child Fatalities and Serious Physical Injury Cases ... Pediatric Injuries: Are They Abusive or Not? Interv. Children Who Have Witnessed a Violent Crime Soter Toth Soter Brusletten 8L Operation Guardian West: Eff. Sex Offender Round-Up Med. Eval. of Child Sexual Abuse: Lessons Learned Troyanski/Anderson Cox 8M 9L 9M 10L 11L Med. Exam. Persp. on Child Fatalities, Pt. 1 Med. Exam. Persp. on Child Fatalities, Pt. 2 Quinton Quinton 10M 11M Case Study: Blue Diamond Child Prostitution, Part 1 Case Study: Blue Diamond Child Prostitution, Part 2 Case Study: Ben Ownby/Shawn Hornbeck, Part 1 Blades/Wood Case Study: Ben Ownby/Shawn Hornbeck, Part 2 Blades/Wood O’Brien/Ed Price O’Brien/Ed Price Constantin/Cunningham 10N Constantin/Cunningham 11N 8N 9N Case Study: Capturing the Friedman’s, Part 1 Case Study: Capturing the Friedman’s, Part 2 DNA: Do We Automatically Win? State-of-the-Art Child Interviewing Lanning Lanning White Toth 8O Introduction to the Virtual World of Second Life Rampolla Tanner 8P Er. Price/Wasson 9P Field Search for Mac 8Q Tanner 9Q Anatomical Dolls: An Effective Tool Cyber Bullying & Online Harrass.: Train the Trainer Migas 9O Prosecutors Forum Inside the Mind of a Sex Offender 12 9D Shaken Baby Syndrome: Truths and Myths Munchausen Syndrome by Proxy Greeley 9C 8R Brusletten CyberTipline Reports: From Receipt to Arrest Paraphilias Other than Pedophilia ... Shehan/Duffey Lanning 10P Kenniston/Laney Kenniston/Laney Ferraro Operation Fairplay Lecture, Part 2 Managing the Sexually Violent Predator Waters Waters Wasson 9S 11P On vs. In: Developmentally Sensitive Interview., Part 2 10Q Computer Forensics 9R 11O On vs. In: Developmentally Sensitive Interview., Part 1 Operation Fairplay Lecture, Part 1 8S 10O 11Q Protecting Yourself & Your Family on the Internet 10R Tanner 11R FBI RCFL ReviewNet Program 10S Gregg 11S PRELIMINARY SCHEDULE Final schedule will be given onsite. Visit our website at www.cacconference.org for updates. thursday, august 14 8:00-9:30 am 10:00-11:30 am Case Study: Joseph Duncan Case Overview, Part 1 Case Study: Joseph Duncan Case Overview, Part 2 Gneckow/Robinson Gneckow/Robinson 12A CyberTipline Reports: From Receipt to Arrest NetSmartz other activities: Donovan 7:00–8:00 am Defending the Investigative Interview in Court Web Wise Kids Continental Breakfast Reunion Foyer Vieth Mercer 9:30–10:00 am Bradley Morning Break Solving the Unsolvable Case & Proving It, Pt 1 11:30 am Garibay/Houge Conference Evaluations collected, Certificates distributed Workshops shaded in BLUE are offered only once. 12B 12C Shehan/Duffey 12D 13C Bradley 13D Solving the Unsolvable Case & Proving It, Part 2 12E Garibay/Houge Drug Endangered Children Children’s Program Kit Sanford/Pero Sanford/Pero 12F 13E 13F Child Fatality Review in Texas Therapists Forum 12G Garrabrant/Konstas/Stephen13G Child Fatalities and Serious Physical Injury Cases State-of-the-Art Child Interviewing Toth Toth 12H 13H On vs. In: Developmentally Sensitive Interview., Part 1 On vs. In: Developmentally Sensitive Interview., Part 2 Kenniston/Laney Kenniston/Laney 12i 13i Psychology of the Offender Part 1 Psychology of the Offender, Part 1 P. Collins P. Collins 12J 13J What Makes You Think That? Assessing Subjectivity Ask Me No Questions And I’ll Tell You No Lies Everson Everson 12K 13K Integrative Treatment of Complex Trauma (ITCT), Pt. 1 Integrative Treatment of Complex Trauma (ITCT), Pt. 2 Lanktree Lanktree 12L Greeley 13L Shaken Baby Syndrome: Truths and Myths Munchausen Syndrome by Proxy 12M Greeley 13M Case Study: Green Iguana Travel and NAMBLA Case Study: Jamie Bolin Mitchell/Corbet Beaver/Caswell/Overby 12N Sexual Exploitation of Children for MDT Lanning 13N Runaways and Child Abuse: A Renewed Perspective 12O SANE Nurses Forum Nichols NCMEC will offer all registered participants at this year’s Conference a glimpse into this powerful law enforcement tool designed to rescue children. Within this interactive lab, computers will be available for participants to access background identifiers and audio clues in hopes that these items may be recognizable or familiar to Lab participants. Accompanying each sanitized picture will be a real-time message thread where participants can post their comments and suggestions. You may have the piece of the puzzle that could lead to the rescue of a child victim. NOTE: All registered conference attendees are invited to participate in this Lab; however due to the sensitivity of this issue, please make sure to wear your conference badge and bring proof of identity to gain entry. 13O 13P Case Study: Steven Long Investigative Resources of the US Marshals Beach/Davison Brandt 12Q 13Q Cyber Bullying & Online Harrass.: Train the Trainer The Canadian Response to Child Sexual Exploitation Migas Sullivan 12R 13R MySpace Case Study Computer Forensics Ferraro Many children have been rescued from further sexual abuse because a clue in the background of child pornography images led to the location of their abuse. Partnering with the Internet Crimes Against Children Task Forces and federal law enforcement agencies, the National Center for Missing & Exploited Children is proud to bring the “Victim Identification Lab” back to the Dallas Crimes Against Children Conference for a third year. CPS Investigators Forum 12P AUGUST 11-14, 2008 • DALLAS, TEXAS 13B Confessions w/o Miranda Texas Child Abuse Laws Alexander/Powers 13A NCMEC Child Victim Identification Lab 12S 13S 13 computer labs Workshops shaded in BLUE are offered only once. Visit our website at www.cacconference.org for the updated schedule and for information about special registration for labs. monday, august 11 Lab Locations: Track V: Cotton Bowl Track W: Sanger Track X: Moreno Track Y: Pryor Track Z: Reverchon 10:00–11:30 am Special thanks to the Internet Crimes Against Children Task Force Creating Your Own MySpace Page Kaleel Wiltse Morning Break 11:30 am–1:00 pm Lunch On your own 2:30–3:00 pm Afternoon Break Lab Locations: Track V: Cotton Bowl Track W: Sanger Track X: Moreno Track Y: Pryor Track Z: Reverchon 9:30–10:00 am Sullivan/Bruns 1Y Brown/West Waters/Huff/Leazenby Dougher/Donahue/Gordon 5W Geraghty Using the GNU Watch Toolkit, Part 1 Using the GNU Watch Toolkit, Part 2 Field Search, Part 1 Windows Forensic Gems: Windows XP, Part 1 Ard/Moeller Windows Forensic Gems: Windows XP, Part 1 4Y Image Scan v3.0, Part 1 Gregg 4X Ard/Moeller Image Scan v3.0, Part 2 4Z Gregg Daniels/Wagner 6V Duffey/Khor Ard/Moeller 3Y Cohen 3Z Waters/Huff/Leazenby 7V Advanced Website Investigations, Part 2 Geraghty 7W Field Search, Part 2 6X Brown/West 7X Using Google, MySpace & Firefox Browser, Part 2 6Y MySpace Investigations, Part 1 5Z 3X Operation Fairplay Lab, Part 1 Using Google, MySpace & Firefox Browser, Part 1 4Y Brown/West 3:00–4:30 pm 6W Brown/West 3W Using the Firefox Browser as an Invest. Tool, Part 2 1:00–2:30 pm Dougher/Donahue/Gordon 4W Wiltse 2Y Operation Fairplay Lab, Part 1 5V Geraghty Microsoft XBox Forensics, Part 2 2Z Advanced Website Investigations, Part 1 4X 2X Ard/Moeller Cohen 3V Field Search, Part 2 Using the Firefox Browser as an Invest. Tool, Part 1 1Z Sullivan/Bruns Advanced Website Investigations, Part 2 2W eP2P: The FBI’s Peer to Peer Invest. Tool, Part 2 11:30 am–1:00 pm Afternoon Break Sullivan/Bruns 2V Microsoft XBox Forensics, Part 1 Conducting Undercover Chat Rm. Invest., Part 2 4V Geraghty eP2P: The FBI’s Peer to Peer Invest. Tool, Part 1 Wiltse 2:30–3:00 pm 1X 10:00–11:30 am Conducting Undercover Chat Rm. Invest., Part 1 Sullivan/Bruns Field Search, Part 1 Introduction to Second Life 8:00–9:30 am Morning Break Lunch On your own 1W Capture Software West Conducting Undercover Chat Rm. Invest., Part 2 Advanced Website Investigations, Part 1 Using Screen for the use of their computer equipment in support of this conference! Rampolla tuesday, august 12 1V Using the GNU Watch Toolkit 9:30–10:00 am 3:00–4:30 pm Conducting Undercover Chat Rm. Invest., Part 1 The Online Investigator’s Toolbelt Geraghty 1:00–2:30 pm Daniels/Wagner 7Y MySpace Investigations, Part 2 6Z Duffey/Khor 7Z The National Child Protection Training Center (NCPTC) is a partnership between the National Association to Prevent Sexual Abuse of Children (NAPSAC) and Winona State University (WSU). NCPTC provides training, technical assistance and publications to front line child protection professionals throughout the United States. In addition, NCPTC provides technical assistance to undergraduate and graduate programs seeking to improve the education provided to future child protection professionals. In partnership with CornerHouse, NCPTC also assists in the development and maintenance of forensic interview training programs utilizing the RATAC® forensic interviewing protocol. To contact NCPTC, call 507-457-2890 or visit our web site at www.ncptc.org. To contact NAPSAC, call 651-340-0537 or visit our web site at www.napsac.us. 14 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE computer labs Workshops shaded in BLUE are offered only once. Visit our website at www.cacconference.org for the updated schedule and for information about special registration for labs. wednesday, august 13 Lab Locations: Track V: Cotton Bowl Track W: Sanger Track X: Moreno Track Y: Pryor Track Z: Reverchon 9:30–10:00 am Morning Break 11:30 am–1:00 pm Lunch On your own 2:30–3:00 pm Afternoon Break Thursday, august 14 Lab Locations: Track V: Cotton Bowl Track W: Sanger Track X: Moreno Track Y: Pryor Track Z: Reverchon 9:30–10:00 am Morning Break 11:30 am Conference Evaluations collected, Certificates distributed 8:00–9:30 am 1:00–2:30 pm Who Did It? Pinning Down the Offender, Part 1 Who Did It? Pinning Down the Offender, Part 2 Operation Fairplay Lab, Part 1 Fottrell Fottrell Waters/Huff/Leazenby 8V 9V eP2P: The FBI’s Peer to Peer Invest. Tool, Part 1 eP2P: The FBI’s Peer to Peer Invest. Tool, Part 2 IRC Investigations Part 1 Dougher/Donahue/Gordon 8W Dougher/Donahue/Gordon 9W Rampolia MySpace Investigations, Part 1 MySpace Investigations, Part 2 Cell Phone Forensics, Part 1 Duffey/Khor 8X Mac Analysis Duffey/Khor 9X Internet Registry Artifacts Underwood 8Y Image Scan v3.0, Part 1 Underwood 9Y Image Scan v3.0, Part 2 Gregg 8Z 8:00–9:30 am Gregg 9Z 10:00–11:30 am 3:00–4:30 pm Operation Fairplay Lab, Part 2 10V 11V IRC Investigations Part 2 10W Daniels/Wagner Waters/Huff/Leazenby Rampolia 10W Cell Phone Forensics, Part 2 10X Daniels/Wagner 11X Microsoft XBox Forensics, Part 1 Microsoft XBox Forensics, Part 2 Ard/Moeller Ard/Moeller 10Y 11Y Using the Firefox Browser as an Invest. Tool, Part 1 Using the Firefox Browser as an Invest. Tool, Part 2 Cohen Cohen 10Z 11Z Fox Valley Technical College’s Criminal Justice Child Protection Training Center is dedicated to helping the youngest Operation Fairplay Lab, Part 1 Waters/Huff/Leazenb Operation Fairplay Lab, Part 2 12V IRC Investigations Part 1 Rampolla Waters/Huff/Leazenby victims of crimes, our children. 13V 12W Rampolla and the National Center for Missing & 13W Who Did It? Pinning Down the Offender, Part 2 Fottrell Fottrell 12X 13X Windows Forensic Gems: Windows XP, Part 1 Windows Forensic Gems: Windows XP, Part 2 Ard/Moeller Ard/Moeller 12Y Internet Email and Chat In cooperation with the Office of Juvenile Justice and Delinquency Protection, IRC Investigations Part 2 Who Did It? Pinning Down the Offender, Part 1 Underwood AUGUST 11-14, 2008 • DALLAS, TEXAS 10:00–11:30 am 13Y Exploited Children, FVTC offers training to thousands of juvenile justice professionals on issues that are critical to the safety and security of children across the country. Visit www.fvtc.edu for more information. Vista Internet Artifacts 12Z Underwood 13Z 15 preliminary workshop descriptions as of time of printing. Workshops are listed in alphabetical order. For updated workshop descriptions, visit our website at www.cacconference.org ABUSE BY BURNING Presented by Gary Purdue This workshop will focus on the evaluation of children with inflicted burn injuries. Basics of burn injury will be discussed along with the specific aspects of abuse. (The) Adam Walsh Act: Sex Offender Registration & Notification Act & Failure to Register Offenses Presented by Kevin Forder, Michael Yoon Includes an overview of U.S. Department of Justice and U.S. Marshals Service (USMS) sex offender apprehension initiatives and registration requirements established under the Adam Walsh Act, with a particular focus on the new federal felony offense for failure to register as a sex offender. Enables effective investigation and prosecution of unregistered sex offenders using the new federal statute. Age Regression Images: How it Works Presented by Joe Mullins NCMEC’s Forensic Assistance Unit (FAU) offers a wide range of services to law enforcement. The most recent addition to our list is providing age regression images to officers working the chat rooms. The purpose of these images is to serve as bait to flush out the pedophiles that are online soliciting our children. The FAU has provided hundreds of images that have been very effective in assisting law enforcement with these cases. This presentation will demonstrate the process of creating these images, success stories and serve as a tutorial to law enforcement about the kinds of images to submit for regression. Ask Me No Questions And I’ll Tell You No Lies: Leading And Suggestive Questions In The Child Forensic Interview Presented by Mark Everson There is an on-going debate in the field of child forensic interviewing about what is considered a leading vs. a suggestive question and whether such questions can appropriately be used. This workshop will present specific definitions for leading and suggestive questions and will offer practical cautions and guidelines for their use. It will also describe a three-part method for assessing interview suggestiveness. Attacking the Problem of Child Exploitation from Multiple Angles Presented by Michelle Collins The problem of online child sexual exploitation has reached epic proportions. It is an unfortunate reality that there is no 16 way to arrest our way out of this problem. This session will provide participants with information on how a multi-disciplinary approach has increased effectiveness and ultimately protected countless children. In addition to learning about the extensive efforts of NCMEC’s Exploited Child Unit and law enforcement agencies, participants will see demonstrations of innovative steps taken by the Internet industry, financial institutions, research facilities and our international counterparts. Behaviorally-Based Interviewing Strategies Presented by Wayne Sheppard This workshop will provide the participant with 1) a brief overview of traditional interviewing and interrogating techniques (listening skills, direct vs. passive questioning, interview vs. interrogation, cognitive interviewing) utilized by law enforcement officers in the field and 2) an in-depth look at the importance of the application of behaviorally based interviewing strategies (non-verbal messages in behavior, para-logical reasoning, incremental behaviors) by officers tasked with trying to obtain the admission or confession from the offender. (The) Canadian Response to Child Sexual Exploitation Presented by Steve Sullivan The Office of the Federal Ombudsman for Victims of Crime was established in March 2007 and an ongoing theme of our work is the commercial and sexual exploitation of children. The Office prepared a series of recommendations for the federal government on Internet facilitated child sexual exploitation. Every child sexual abuse image is an opportunity to identify a child and the recommendations will focus on legislative reforms necessary to identify and rescue victims. In addition, the recommendations will highlight the unique emotional and privacy issues that child victims of Internet crimes experience. Case Study: Ben Ownby/Shawn Hornbeck Child Abduction For description, see page 8 Case Study: Blue Diamond—Child Prostitution (The) Best Kept Secret: Mother-Daughter Sexual Abuse For description, see page 8 Presented by Julie Brand CASE STUDY: Capturing the Friedmans: This workshop describes the complex mother-daughterincestuousrelationship— the subtle, yet intentional violations of normal mother-child boundaries, covert and overt abuse and the psychological manipulations used to silence victims. Attendees will learn ways to include mothers as potential perpetrators in prevention programs and in sexual abuse investigations. Six key therapeutic issues for recovery will be discussed. The program will conclude with a discussion of the shared dynamics and also the differences between mother-daughter and mother-son incest. The presenter is both an experienced counselor and a resilient survivor of maternal sexual abuse. Who Do You Believe? Breaking Down Abusive Fractures Case Study: Steven Long Presented by Matthew Cox This workshop will be a case based discussion on the mechanisms of injury and types of forces required to cause certain skeletal injuries in children. Topics will include fracture types such as spiral, transverse, rib, skull, and metaphyseal corner fracture. For description, see page 8 Case Study: Casey Crowder—Child Abduction For description, see page 8 Case Study: Jamie Bolin For description, see page 8 Case Study: Joseph Duncan—Case Overview and Command Post Management For description, see page 8 Case Study: Operation Achilles For description, see page 8 For description, see page 8 Case Study: U.S. v. Lisa Montgomery For description, see page 8 Case Study : U.S. v. Paul Edward Shook For description, see page 8 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE Caught in the Web: Inside the Police Hunt to Rescue Children from Online Predators Presented by Julian Sher Award-winning author Julian Sher spent two years following the work of the FBI, ICE, NCMEC and police agencies around the world. Senator John Kerry called it “a must-read for parents, policy makers, prosecutors, and anyone who cares about our kids.” Dr. Sharon W. Cooper praised the extremely educational and riveting writing by a superb investigative journalist.” Come share the lessons and insights for police, prosecutors and educators. Child Fatalities and Serious Physical Injury Cases: Improving the 1st Response Presented by Patti Toth What first responders do (or don’t do) in the critical first hours after a sudden unexplained or unexpected child death or serious physical injury often determines whether we accurately identify inflicted versus accidental injuries or natural deaths. A WA State project recently developed statewide guidelines and training for first responders. The resulting userfriendly guidelines are called the C-POD, which stands for the key principles that should guide any first responder: Collaboration, Preservation, Observation and Documentation. This workshop will review the C-POD Guidelines and training, as well as the CDC’s new SUIDI (Sudden Unexplained Infant Death Investigation) evidence collection form. Children’s Program Kit Presented by Vanessa Sanford, Courtney Pero The Children’s Program Kit was created through a collaboration of SAMHSA and NACoA (National Association for Children of Alcoholics). The kit is a tool for treatment providers and helping professionals to utilize when working with children of addicted parents, in an effort to provide age-appropriate education about addiction, assist in the identification and healthy expression of emotions, and empower them new coping skills. The Texas Alliance for Drug Endangered Children (TADEC) feels very strongly that all children removed from volatile drug environments must receive support services to address their psychosocial needs. The audience will receive a curriculum manual with videos. (A) Close-up Look at the Ever-Shrinking World Presented by Jennifer Lee, Jon Rouse Many children never disclose the fact that they were sexually abused and pornographically photographed. As this crime knows no borders, neither can the law enforcement response. The United AUGUST 11-14, 2008 • DALLAS, TEXAS States has an unprecedented number of experienced law enforcement agencies working in conjunction with NCMEC in the active hunt for these victims. In addition, an increasing number of countries have created specialized law enforcement teams tasked with Victim Identification. This session will be copresented by NCMEC and Queensland Police Service (Australia). It will present several illustrations of how child victims have been identified all over the world because of images seized by U.S. investigators. In addition, participants will learn how they can become more involved in the complex search for these child victims. Conducting a Community Safety Audit to Improve Child Safety Presented by Sarah Buel It turns out we can greatly improve victim services by asking the question of each community agency, “How does this (practice, policy, rule etc.) enhance or diminish victim safety and offender accountability?” By reviewing successful evaluations of police, prosecutor, shelter, legal aid, and other relevant family violence programs, there is much to be learned. The workshop will discuss how to replicate a community safety audit of victims’ services programs with no funding or to obtain a grant to do so. CyberTipline Reports: From Receipt to Arrest Presented by John Shehan, Mike Duffey This session will be co-presented by NCMEC & an experienced ICAC Investigator. Participants will be provided information on NCMEC’s CyberTipline, including how it can generate, de-conflict, and corroborate cases related to computer-facilitated crimes against children. An in-depth overview of CyberTipline reports will be included with a detailed explanation of the reports sent to law enforcement. An investigator will walk the participants through the steps necessary to identify the location of the suspect and specific computer involved in the investigation. Specifics will be shared on how to secure evidence of criminal behavior from electronic service providers (ESPs). Samples of court orders and subpoenas along with the ESP Compliance Guides will be given out to the participants. Actual case examples will be utilized throughout this presentation to illustrate the learning objectives of this session. Defensive Tactics for Non-Law Enforcement Professionals Presented by Thomas Popken, Billy Hattaway This session will provide information and examples of defensive tactics that may be utilized in the event a situation is encountered that requires self defense. Detecting Deception Presented by Jim Tanner Improve your interview skills. Learn how to tell when someone is editing something out of a verbal or written statement. This session will cover the basics of Discourse Analysis, a lexical and syntactical approach to analyzing statements. Using clear examples, Dr. Tanner will explain how shifts in words and grammar by respondents can point interviewers to “hot spots” in a statement that need to be probed. You will never listen to a conversation the same way again if you attend this session. Digital Evidence: Search And Seizure 2008 Presented by Rod Gregg This course is for first responders to a digital evidence crime scene. It is for patrol officers, investigators serving search warrants, and crime scene personnel charged with identifying, collecting, packaging, transporting and storing digital evidence. The course is continuously updated to include current technology, unusual technology and best practices at the digital crime scene. At the conclusion of the course, attendees will receive a CD of the presentation that can be adapted for their agency. This course will not be on the final conference CD. You must attend the course to receive it. DNA, CODIS and the NCMEC DNA Registration Project Presented by B.J. Spamer This workshop will explain the importance of DNA collection and the Combined DNA Index System (CODIS) to missing and unidentified person investigations. DNA and DNA profiling will be explained, with a discussion of nuclear DNA, mitochondrial DNA, and obtaining appropriate reference DNA samples. CODIS will be discussed, with an emphasis on the different levels and indexes within CODIS and how they can and cannot be searched. The NCMEC DNA Registration Project will be explained and DNA identification case studies will be provided. Resources to have missing and unidentified person DNA profiles loaded into CODIS at no cost will be provided. 17 Drug Endangered Children Presented by Vanessa Sanford, Courtney Pero Drug endangered children are those children who suffer physical or psychological harm or neglect resulting from exposure to illegal drugs or persons under the influence of illegal drugs or exposure to dangerous environments where drugs are being manufactured or chemicals used to make drugs are accessible. Topics will include: Safety and Awareness in Volatile Drug Environments & Investigating Drug Endangered Children cases, Child Protective Services Role in Drug Endangered Children cases, Medical Issues for the Drug Endangered Child, Prosecuting Drug Endangered Child cases, Psychosocial Issues of the Drug Endangered Child, Sustaining Local DEC Alliances, and Data Collection. Effectively Advocating for Children’s Advocacy Centers Presented by Joy Rauls Making child maltreatment a priority issue requires getting the attention of public officials at the local, state and national level. This session will provide an insider’s perspective on how lawmakers think, act and react to advocacy initiatives in the face of the information and issue overload they face every day. Effective strategies for successfully getting the attention of lawmakers and local community leaders, in an effort to elevate the issue of children’s advocacy centers to the top of their lists, will be outlined. Ethical Challenges and the Multidisciplinary Team: Taking the High Road Presented by Dan Powers There are many benefits of working in a multidisciplinary team. This workshop will examine ethical issues as they apply to members of multidisciplinary teams. Any decision made in a case has ethical implications for the team, and reflects the decision maker’s sensitivity and commitment to the team concept. Each member of a team that is affected by a decision will deal with the consequences of that decision. This concept reinforces our professional obligation to make all reasonable efforts to anticipate possible consequences and take steps to avoid unjustified harm to others. Examining the Victim’s Experience (Enhancing Your Investigations and Prosecutions) Presented by Olga Trujillo This interactive session will examine the struggles criminal justice professionals face in handling child sexual abuse cases and explore efforts that can be undertaken to improve their ability to investigate 18 these cases. This workshop will be a blend of question and answer as well as case study. Participants will identify how a victim might behave during an investigation or prosecution, explore what can be done to improve the investigation and enhance offender accountability. The workshop will also examine some of the efforts and resources that can assist participants in working with survivors– from interviewing to referring to services. Exploring the Impact of Trauma (Enhancing your Investigations and Prosecutions) Presented by Olga Trujillo Olga Trujillo is a survivor of child physical, sexual abuse and rape. These experiences created a range of mental health disorders that made her vulnerable to further victimization and unaware of the issues she had to maneuver on a daily basis. After undergoing an intense journey to understand the impact the violence had on her life, she began to address the challenges she faced from Dissociative Identity Disorder, Panic & Anxiety Disorders, Post Traumatic Stress Disorder and Depression. In this workshop she will bring her experience of trauma into the room to help participants explore how trauma may have an impact on their investigations and prosecutions of child abuse cases. Through an interactive workshop participants will assess how they address the issue of trauma and examine whether they should and if so, how they might do so. Through this workshop participants will identify challenges to incorporating trauma information into their response to these crimes and their victims. Field Search for Mac Presented by Jim Tanner Field Search for Windows (FSWin) has been in use by more than 2,000 officers for several years. This “Live Box Examination Tool” has proven to be a valuable addition to law enforcement’s computer forensic tool box. This session will be the FIRST nationally available introduction to Field Search Mac (FSMac). This software application runs live on Mac OS X and matches the tools available in FSWin. FSMac is designed for non-technical users to quickly and easily reveal the target’s computer usage. FSMac is available free to all law enforcement agencies through NLECTC-RM. (The) Five Bs of Child Abuse Presented by Cindy Christian This workshop will provide you with more information than you care to know about physical injuries from child abuse and neglect. We will cover common and uncommon injuries and medical mimickers of abuse as well. Hunting the Predators: Special Movie Screening Presented by Julian Sher A special screening of a one-hour documentary written and directed by Julian Sher, based on his book “Caught in the Web.” For the first time, cameras take viewers behind the scenes as investigators from the U.S., the UK and Canada use the latest high-tech techniques in image analysis, undercover work and infiltration to break up online international rings of child abusers. Followed by a discussion on how you can better use the media to get the message out about protecting children. Inside the Mind of a Sex Offender Presented by Jim Tanner Seventy percent of all convicted sex offenders are placed on probation. They live in our communities. This session will draw on Dr. Tanner’s extensive experience working with and supervising sex offenders in the community. We will examine how they view the world, how they pick and groom victims, how they groom the environment and professionals, the unique dangers of Internet Offenders, and strategies for containment. Investigators and supervising officers will gain valuable insights into offender behavior. Integrative Treatment of Complex Trauma (ITCT): An Empirically-Based, Comprehensive Model for Treatment with Abused Children and Adolescents in Varied Settings Presented by Cheryl Lanktree This workshop will present comprehensive, multi-modal therapy approaches of the treatment model, Integrative Treatment of Complex Trauma (ITCT) for children and adolescents with complex trauma due to multiple traumatic exposures, i.e., sexual abuse, physical abuse, and/or family violence compounded by attachment issues associated with caretaker neglect, abandonment, or loss. Interventions are assessment-driven, component-based, and incorporate directive play therapy, cognitive therapy, exposure therapy, and relational treatment. ITCT is effective in clinical and school settings and addresses individual needs of clients according to cultural background, age, gender, symptoms, needs, and self capacities. ITCT treatment guides are available describing interventions and tools. 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE Federal Bureau of Investigation Proud sponsor of the Crimes Against Children Conference The FBI’s Innocent Images National Initiative (IINI) is an intelligence driven, proactive, multi-agency investigative operation to combat the proliferation of child pornography/child sexual exploitation facilitated by online computers. To proactively combat this crime problem, IINI undercover operations are being conducted in FBI field offices by task forces that combine the resources of the FBI with other federal, state, and local law enforcement agencies. The mission of the IINI is to reduce the vulnerability of children to acts of sexual exploitation and abuse which are facilitated through the use of computers; to identify and rescue witting and unwitting child victims; to investigate and prosecute sexual predators who use the Internet and other online services to sexually exploit children for personal or financial gain; and to strengthen the capabilities of federal, state, local, and international law enforcement through training programs and investigative assistance. The mission of the Crimes Against Children (CAC) Program is to develop a nationwide capacity for the FBI to provide a rapid and effective investigative response to reported federal crimes involving the victimization of children; reduce the vulnerability of children to acts of sexual exploitation and abuse; reduce the negative impacts of domestic/international parental rights disputes; and strengthen the capabilities of federal, state and local law enforcement through training programs and investigative assistance. The CAC program addresses investigations including non-ransom child abductions; domestic and international parental kidnappings; child prostitution; sexual/physical abuse of children occurring on government reservations; sexual exploitation of children; child sex tourism; and the National Sex Offender Registry. Each of the FBI’s 56 field offices has designated CAC Coordinators who work with local, state, tribal, and federal authorities. CAC Coordinators have established multiagency CAC Resource Teams capable of effectively investigating and prosecuting incidents that cross legal, geographical, and jurisdictional boundaries, and enhance the interagency sharing of intelligence. The CAC program, in conjunction with the Justice Department’s Child Exploitation and Obscenity Section and the National Center for Missing and Exploited Children, is responsible for the Innocence Lost National Initiative, which is designed to address the problem of child prostitution in the U.S. The FBI’s Crimes Against Children Unit, in coordination with the Behavior Analysis Unit-3, created regional Child Abduction Rapid Deployment (CARD) Teams. CARD Teams are a proactive endeavor designed to deploy investigators with demonstrated, proven experience in CAC matters, particularly non-family child abductions, as a rapid onsite response to provide investigative, AUGUST 11-14, 2008 • DALLAS, TEXAS technical and resource assistance to state and local law enforcement during the most critical time following a child abduction. The National Center for the Analysis of Violent Crime (NCAVC) has designated its Behavioral Analysis Unit-3 (BAU3) to specifically provide operational assistance in all crimes against children matters to include: crime analysis and profiles of unknown offenders; investigative, interview, prosecutive and media strategies; major case management; search warrant assistance; and expert testimony. Assistance to law enforcement agencies is provided through “criminal investigative analysis,” a process of reviewing crimes from both a behavioral and investigative perspective. It involves reviewing and assessing the facts of a criminal act, interpreting offender behavior, and interaction with the victim, as exhibited during the commission of the crime, or as displayed in the crime scene. To further enhance its behavioral support of operational requests, BAU-3 also conducts behavioral research in many areas involving child victims. The BAU-3 staff produced the “Child Abduction Response Plan” to assist investigators faced with these challenging and time-sensitive investigations. Requests for NCAVC assistance should be made through the NCAVC coordinator designated in your local FBI Field Office. The mission of the Office for Victim Assistance (OVA) is to ensure that victims of crimes investigated by the FBI are afforded the opportunity to receive the services and notification as required by Federal law and the Attorney General Guidelines on Victim and Witness Assistance. The FBI recognizes not only the necessity of providing for the legal rights of victims but the benefits that effective and timely victim assistance brings to investigations. The OVA applies three major principles in performing its mission: (1) doing what the law requires; (2) doing what will help victims and enhance their ability to participate in the investigative process; and (3) using innovative, flexible, and practical methods to accomplish its goals. The OVA provides program oversight, direction, and guidance to the field offices and FBIHQ entities to include compliance with the statutory and AGG requirements regarding all aspects of notification for victims of crimes investigated by the FBI. The unit is responsible for managing the day-to-day operational aspects of the Victim-Witness Assistance Program and ensuring that all victims of crimes investigated by the FBI are identified, offered assistance, the opportunity to afforded services, and notifications specified by statute. In addition, the OVA is responsible for providing training and information that helps to equip FBI agents, Evidence Recovery Teams, and other FBI personnel to work effectively with victims. 19 Introduction to Secure Digital Forensic Imaging Presented by Ward Allen This extraordinary “INTERACTIVE” 90 minute event defines the intricate values of forensic digital pictures through the use of graphic side-by-side on-screen sample comparisons and interactive classroom discussions including information about JPG and RAW files. By defining the seven attributes of both “good” & “bad” digital pictures,” forensic pictures can be analyzed, evaluated and judged instantly during a forensic examination. This objective evaluation should be used, onsite, to determine the need for additional pictures. Examples of “focused and unfocused” pictures, “properly framed and poorly framed” pictures, “properly lighted and improperly lighted” pictures along with “overexposed, properly exposed, and underexposed” pictures will be compared and discussed openly. Introduction to the Virtual World of Second Life Investigative Resources of the USMS for Crimes Against Children Cases (Including Locating Fugitives Using Electronic Surveillance Techniques) Munchausen Syndrome by Proxy: An introduction to the Hinterland of Child Abuse Presented by Irving Brandt, Kirk King This talk will be an introduction to Munchausen Syndrome by Proxy (MSbP). Statistics will be presented and cases will be discussed. An evaluation process will be outlined. This process will focus on looking at alternative explanations to MSbP as well as documentation of findings. The pros and cons of covert video surveillance will be discussed. This workshop will outline investigative resources the USMS provides in crimes against children cases. This workshop will also explore electronic surveillance techniques used in locating fugitives Linking Non-Compliant Sex Offenders to Child Victimization Cases Presented by Kristin Anderson, Staca Urie With as many as 100,000 registered sex offenders in the United States whose whereabouts are unknown, expanding our ability to link open and unsolved missing/ exploited child cases to these offenders is of great potential benefit. This presentation will focus on how NCMEC is working to bring together a variety of resources to assist law enforcement in locating sex offenders and identify case linkages across broad time and geographic parameters. Cases examined include child abductions, attempted abductions and relationships to online solicitation/exploitation incidents Presented by Joseph Rampolla Locating Known Abductors Second Life, the virtual world created by Linden Labs, is growing every day. It is not a video game but a virtual world that parallels our real lives (1st Life). Facebook and YouTube rule young kids lives but Second Life is possibly the newest biggest threat that teens will be facing. When the video game Grand Theft Auto -San Andreas Fault first came out, parents were outraged at the adult content which caused quite a controversy. Second Life is much worse, and the most frightening thing about it for kids is that it is live (in real time). The characters are real people from all walks of life. Presented by Robert Hoever Investigating Physical Abuse and Neglect: Reconstruction Techniques Presented by Matthew Cox Presented by Robert Farley, Ron Laney This seminar will focus on non-accidental injuries on children and will emphasize the specific techniques that can be used by the investigator in the assessment, investigation and reconstruction of cases involving soft tissue injuries such as bruises, lacerations and burns. In addition, the various weapons utilized by the offender in child abuse situations will also be identified and discussed. The seminar will also address the circumstances and evaluation of deprived and neglected children. Lastly, the curriculum offers case illustrations that encourage hands on participation by the student. 20 Explores investigative strategies and resources for the investigator to utilize in an effort to local and apprehend abductors of children once they have been identified. (The) Making of a Child Abuse Detective Presented by Brian Killacky, Ron Laney What it takes to become a detective assigned to a crimes against children unit. Individual investigative assessments, targeting specific crimes of violence against children and issues that will make the investigator better suited to investigate these complex crimes. Medical Evaluation of Child Sexual Abuse: Lessons Learned Lessons Learned will review the basic medical findings of child sexual abuse examinations. Topics will include the frequency and types of medical findings including forensic evidence collected, genital injuries, and sexually transmitted infections. The lecture will incorporate numerous case examples to illustrate the key learning points. (The) Medical Examiner’s Perspective on Child Fatalities Presented by Reade Quinton Topics of this workshop include investigation and autopsy findings in sudden unexpected infant death (SUID) cases, abusive injuries including head trauma, neglect, Munchausen Syndrome by Proxy, and determination/classification of cause and manner of death. Presented by Christopher Greeley NetSmartz: The Latest Trends in Internet Safety: Social Networking, Cyberbullying, Webcams Presented by Katie Donovan NetSmartz is a free, interactive educational safety resource from the National Center for Missing & Exploited Children (NCMEC) that uses age-appropriate, 3-D activities to teach children, tweens, and teens how to be safer online. The NetSmartz Workshop has recently updated Internet safety presentations geared to educate tweens, teens, and parents/communities. They are intended for use by members of the ICAC, School Resource Officers, school administrators, teachers, police officers, and others who engage in public education activities within their communities. Operation Guardian West: An Effective Sex Offender Round Up Operation Presented by Michael Troyanski, Kristin Anderson A multi-jurisdictional approach to sex offenders who have failed to register and/ or maintain registration. This ongoing investigation was designed to operate as a multi phased operation including current situational assessment for local/state/federal agencies, compliance investigations, securing prosecution, and maintaining the forward momentum. Operation Fairplay - Lecture Presented by Flint Waters You will get techniques to dramatically improve your search warrant results. This block will identify advances in P2P undercover operations using software provided by investigators from throughout the country. Attendees will learn to use real-time queries to identify high volume traders in their own jurisdiction. This block will include discussion of search warrant challenges and defense tactics related to IP-based investigations. This is an advanced session. Attendees should have a solid background in IP investigations and a practical understanding of P2P technologies. 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE Office for Victims of Crime Proud supporter of the Crimes Against Children Conference Once again, the Office for Victims of Crime (OVC) is pleased to support the Dallas Crimes Against Children Conference. This conference brings together the key professionals needed to develop an effective, multidisciplinary response to child abuse and other crimes perpetrated against children. OVC is committed to efforts to expand our capacity to assist crime victims and to provide leadership in changing attitudes, policies, and practices to promote justice and healing for all victims of crime. OVC works with national, international, state, military and tribal victim assistance and criminal justice agencies, as well as other professional organizations to promote access to the justice system and comprehensive services for crime victims. OVC was created by the U.S. Department of Justice in 1983 and formally established by Congress in 1988 through an amendment to the Victims of Crime Act of 1984 (VOCA). As prescribed by VOCA, OVC is responsible for administering the Crime Victims Fund (Fund)—a major source of funding for victim service programs throughout the country, and the sole source of funding for OVC discretionary activities. The Fund is made up of fines and penalty assessment imposed on federal criminal defendants. Each year millions of dollars are collected and deposited into the Fund to support programs authorized under VOCA. and prosecution of child abuse, including cases that occur in Indian country. OVC has provided funding to support the National Children’s Alliance to establish children’s advocacy centers on Indian Reservations through its federal division. We encourage you to take advantage of two national resources OVC has established for the field. The Office for Victims of Crime Resource Center (OVCRC) produces, collects, maintains and disseminates comprehensive information and resources for victim service providers and allied professionals. Ask OVCRC for up-to-date research and statistics, victim-related publications, other information, resources and referrals. The OVC Training and Technical Assistance Center (TTAC) tailors assistance to your program’s individual needs. Through consultation with TTAC’s professional staff, mentors and expert consultants, help is available to identify and secure speakers for conferences and workshops, provide training on victim’s issues, find facilitators for focus groups and strategic planning meetings, and access other tools and skill-building activities aimed at effectively working with crime victims. To access OVCRC call 1.800.851.3420 (TTY 1.877.712.9279), or for TTAC call 1.866.682.8822 (TTY 1.866.682.8880). We also invite you to visit OVC’s comprehensive website on the Internet at www.ovc.gov. OVC allocates a significant amount of funding to address crimes against children and to respond to children who witness violence. Funds made available to states under the VOCA victim assistance program—which responds to victims of child abuse—are a funding priority area. With discretionary funding available from the Fund, OVC provides funding to improve the investigation U.S. Attorneys Office, Northern District of Texas The threat of sexual predators soliciting children for physical sexual contact is well-known and serious; the danger of the production, distribution, and possession of child pornography is equally dramatic and disturbing. In 2006, the Department of Justice launched Project Safe Childhood (PSC), an important initiative to combat the proliferation of technology-facilitated sexual exploitation crimes against children. Through a well-informed and well-trained network of federal, state and local law enforcement agencies and advocacy organizations, PSC coordinates efforts to protect our children by investigating and prosecuting online sexual predators. For more information regarding PSC and the impact community-based efforts have made, please visit the PSC website at www.projectsafechildhood.gov. Our response to these crimes must be comprehensive, coordinated, and robust and my office is proud to partner with Dallas Children’s Advocacy Center and the Dallas Police Department with the 20th Annual Crimes Against Children Conference. AUGUST 11-14, 2008 • DALLAS, TEXAS Richard B. Roper United States Attorney Northern District of Texas 21 20th Annual Sponsor Recognition (As of date of printing) We extend our gratitude to the following sponsors of the 20th Annual Crimes Against Children Conference. Platnum Sponsor U.S. Attorneys Office, Northern District of Texas DCAC League 22 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE Pediatric Injuries: Are They Abusive or Not? Recent Research Affecting Child Abuse Investigation and Prosecution Presented by Demetra K. Soter Presented by Chris Newlin This workshop will attempt to teach normal childhood injuries and child development, and how this helps to evaluate injuries. This will help you determine when an injury is more than likely abuse, neglect, accidental, or cannot be determined. Presenting Behavioral Evidence in a Criminal Trial Presented by Dan Powers, Michelle Voirin The unique partnership of therapist and lawyer will discuss the difficulty of preparing a child abuse victim for the criminal trial. The workshop will discuss the unique challenges for DA’s in dealing with child abuse victims. We will discuss consistent and inconsistent victim behaviors and attendees will understand the importance of building a relationship with the child. We will also discuss trial strategies and utilization of expert and fact witnesses. The CAC model will be highlighted as a tool to minimize potential problems. Protecting Yourself and Your Family On The Internet Presented by Jim Tanner Join a Cyber Crime Analyst as he explains how the dark side of the Internet can hurt you and how to defend yourself from cyber attacks. In plain English, we’ll cover purging personal information from data mines; establishing good security on your computer and home network; avoiding common problems like cross site scripting, trojans and worms; and emerging threats. If you own a computer, do yourself a favor and attend this session. Psychology of the Offender: Pedophilia, Paraphilias & Online Offenders Presented by Peter Collins This workshop will discuss the relationship between pedophilia and the online offender. Current research, as well as cross associated sexual deviances will be discussed. Recent Developments Relevent to Investigation and Prosecution of Child Abuse Presented by John Myers This workshop will address recent developments relevant to investigation and litigation of child abuse and neglect. Subjects covered include the most recent medical and psychological research that has an impact on testimony from children and medical evidence of maltreatment. The workshop will offer detailed treatment of the admissibility of hearsay in child abuse cases, with particular emphasis on the impact of Crawford v. Washington on the admissibility of hearsay. AUGUST 11-14, 2008 • DALLAS, TEXAS The emergence of quality child abuse research over the past 20 years has vastly informed our practice. However, with the tremendous quantity of this research and the overwhelming demands of frontline professionals, a widening gap between the research and practice has developed. This presentation will introduce participants to recent research which impacts the frontline delivery of services and challenge them to incorporate this into their practice. This is a fast-paced, practical workshop for those who are committed to the highest quality of services for our most vulnerable children. Resiliency 101: From Victim to Survivor Presented by Julie Brand Some victims of childhood abuse perpetuate the cycle; others grow to be safe, nurturing adults. How can we influence which path they will choose? This workshop identifies seven key steps to becoming a resilient survivor—steps that can help a victim to overcome trauma and to develop a “survivor’s perspective.” Attendees will learn how to use the “language of resiliency” to identify and reinforce victims’ strengths, positively impacting their self-perceptions. The presenter is both an experienced counselor and a resilient survivor of maternal sexual abuse. Runaways and Child Abuse: A Renewed Perspective Presented by Brenda Nichols Appropriate for law enforcement, CPS, prosecutors and therapists. Attendees will gain broader understanding of why “runaways” react and respond in the manners in which they do. Will provide an understanding as to how jurors need to be educated when they are met with a non-compliant victim so they can develop understanding and compassion for a “delinquent” who is yet a victim. Through the use of examples from actual cases and visual media, attendees will have their perspectives renewed. Sexual Exploitation of Children for Multidisciplinary Teams Presented by Kenneth Lanning This presentation is intended to make MDT workers and others more knowledgeable about the nature and manifestation of the sexual exploitation of children. The frequent confusion created by calling the same thing by different names and different things by the same name will be examined. Included will be basic discussions of topics such as child pornography, child sex rings, use of computers, paraphilias, and the grooming process. Cases that overlap common stereotypes will be discussed. Shaken Baby Syndrome: The Truths and Myths Presented by Christopher Greeley This talk will focus on the medical findings seen in victims of abusive head trauma. This talk will also address some of the areas of debate; specifically short falls, medical conditions, onset of symptoms and medical mimics. After the talk, attendees should be able to understand the medical findings seen in abusive head injury. The attendee will be able to understand how to sort through the potential alternative explanations for the findings as well as understand which explanations are unsupported by the medical literature. Show Me the Money: A Guide to the Grant Application Process Presented by Tiffany Richards Attendees will learn the basics of applying for federal grants to assist with the development of programs related to sex offender management, child exploitation, Internet safety, and similar topics. Supplemental information will be provided on how to find state, corporate, and foundation grants. This presentation will cover all stages of the grant application process, from searching for funding opportunities to submitting a completed application. Search methodology, the use of keywords, and dos and don’ts will be discussed. Attendees will also receive a list of resources to help develop grant applications in the future. State-of-the-Art Child Interviewing: Changes, Best Practices, and Current Issues Presented by Patti Toth This workshop will examine changes over the last 25 years in what’s considered state-of-the-art child interviewing. Despite agreement about many basic principles, there are still some significant controversies. Among these are whether to routinely include interview instructions or ground rules whether to discuss and elicit a promise to tell the truth, whether and how to use body drawings and anatomical dolls, whether to engage in narrative practice at the beginning, and how to introduce the topic of suspected abuse. Discussion will spotlight the structure, elements, and evolution of some of the most wellknown interview protocols and present several examples. 23 Strategies For Strengthening CAC Multidisciplinary Teams Presented by Cathy Crabtree At the core of the children’s advocacy center (CAC) model is a complex multidisciplinary team approach to investigation, prosecution, protection and intervention of child maltreatment cases. Over the course of the past two decades, as the number of CACs in the nation has continued to grow, much has been learned about the inherent challenges this team approach presents as well as effective strategies for establishing and maintaining successful teams, despite the natural transitions CAC teams experience and the interdisciplinary conflict inherent in the model. Two Decades of Child Sexual Exploitation Investigations Presented by Brian Killacky, Ron Laney This block deals with historical and current issues centering on the Sexual Exploitation of children. Beginning with the first year of the CAC conference, this will illustrate issues centering around the sexual exploitation of children and how legislation, the mechanisms to molest and investigative strategies have changed in the past twenty years. URL Histories: The Mother Lode of Information Presented by Jim Tanner When you surf the Internet, your browser records all the sites you visit. These Uniform Resource Locators (URL or URI – Uniform Resource Indicators) provide us with a detailed map of Internet use. Most examiners understand how to interpret these records. However, most examiners miss a wealth of information available through simple approaches to these records. This session will explain how to approach these records to gain a deeper understanding of cyber criminal behavior. While the session will focus on sex offenders, the tools and approach work equally well for any type of cyber crime. Victim Notification: Protecting Rights in Child Exploitation Cases Presented by Christine Feller, Denielle Johnson Child victims who were sexually exploited and photographed experience the additional trauma of knowing that their abuse has been permanently memorialized in images. Federal law clearly states that victim rights must be upheld while seeking to hold criminals accountable for their actions. A streamlined process exists between NCMEC, OVA & CEOS to ensure that federal investigators and prosecutors have the necessary resources to ensure victim notification in their child 24 exploitation cases. Participants will learn the step-by-step process that begins at the time the victim is identified as well as what “victim notification” entails. The FBI’s Office of Victim’s Assistance (OVA) provides notification to these victims (or guardians) and NCMEC works as the conduit of information for investigators. Additionally, participants will hear how CEOS maintains victim impact statements that can be used to give a human voice to otherwise silent pictures. Violent Criminal Apprehension Program Presented by Michael Harrigan Participants will learn about a program designed to assist law enforcement in the identification and matching of similar cases based upon case and crime scene characteristics, modus operandi, and other related investigative information. The ViCAP database serves as the nation’s most comprehsnive collection of information related to both solved and unsolved criminal activity related to homicide, attempted homicide, missing persons, kidnapping, child abduction, unidentified persons, and sexual assaults (child and adult). Case entry into the database is made via the FD-676, Crime Analysis Report. ViCAP Crime Analysts examine case submissions along with crime data and patterns to identify potential similarities among crimes, create investigative matrices, develop timelines, identify homicide and sexual assault trends and patterns, and match missing person records to unidentified person records. More than 1,200 state and local law enforcement agencies actively participate in the program and regularly submit cases to ViCAP. What Makes You Think That? Assessing Subjectivity and Bias in Professional Judgments About Abuse Presented by Mark Everson Professionals viewing the same evidence often arrive at very different conclusions about the validity of child sexual abuse allegations. When discrepant opinions between evaluators cannot be explained by variations in training or experience, the most common explanation involves the likely intrusion of subjective factors, including personal bias, in the decision making process. This workshop will examine the issue of subjectivity in professional judgments about abuse. New research will be presented that identifies and quantifies specific subjective factors that influence forensic decisions in child sexual abuse assessments. The implications of these findings for training and forensic practice will also be discussed. What’s That Dog Doing in My Playroom? Using Animal Assisted Therapy in a CAC Presented by Andrea Schultz, Sarah Torres, Vanessa Sanford This session provides an overview of using Animal Assisted Therapy in a CAC setting. Topics will include how to propose, develop, and implement an AAT program. Enlisting the support of the multidisciplinary team and general liability issues will also be discussed. Therapeutic activities and techniques will be presented and case examples will be used to demonstrate how animals are incorporated into both individual and group therapy sessions. The process of how to train and register a therapy dog will be discussed. (The) Witch Hunt, the Backlash, and Professionalism Presented by Kenneth Lanning This presentation will operationally define the terms “witch-hunt” and “backlash.” Although thought by most to be polar opposites, the many characteristics these extremes have in common will be discussed. This presentation will advocate that the best way to counteract the influence of the so-called “backlash” and “witch-hunt” is not to become defensive or to imitate their tactics, but rather to recognize the existence of both while simply doing one’s job in a professional manner. Witness Tampering of Children in Family Violence Cases Presented by Sarah Buel Although witness tampering of children is prolific in family abuse cases, it is a rarely charged, prosecuted, or sentenced offense. By examining practices, statutes, and cases involving child victims of witness tampering, we will discuss important next steps. Although the Crawford and Davis cases make it even more difficult to hold the perpetrators responsible, there are a number of strategies that can be implemented to better protect children. Working with Yahoo! in Online Child Protection Investigations Presented by Elizabeth Banker This workshop will provide Internet Crimes Against Children and other law enforcement investigators with information about how they may work with Yahoo! in their investigations. The topics covered will include an overview of Yahoo! services, data available in investigations and the legal framework for requesting data, Yahoo!’s child pornography reporting process, and an overview of Yahoo!’s online child safety efforts. 20th ANNUAL CRIMES AGAINST CHILDREN CONFERENCE special opportunities FBI’s “Innocence Lost” Child Prostitution Database Thousands of children are victimized through prostitution each year. Many of these children are never reported missing and are arrested under an adult alias. The FBI has developed and launched the Innocence Lost Database (ILD), a centralized database for national child prostitution data, on Law Enforcement On-line (LEO). The ILD assists Innocence Lost Task Forces as well as local, state, and federal law enforcement agencies in identifying child victims of prostitution; sharing biographical information regarding possible subjects and victims of child prostitution; and building enterprise-level investigations. The FBI, together with NCMEC, and DOJ’s Child Exploitation and Obscenity Section, launched the Innocence Lost National Initiative in 2003 to combat domestic child prostitution. Investigations have focused on nationally networked pimps who transport women and children to profitable locations across the U.S. If you are a law enforcement officer assigned to work Vice, Sex Crimes, Trafficking or Missing Children cases, please stop by the FBI Innocence Lost Lab to experiment with the newly launched Innocence Lost Child Prostitution Database. The ILD contains photos of juvenile and adult victims; pimps; vehicles; and biographical data which can be searched and retrieved. You may recognize a missing child and be the key to bringing them home. NOTE: All sworn law enforcement attendees are invited to participate in this lab. Due to the sensitivity of the material, please make sure to wear your conference badge and bring proof of identity to gain entry. Cell Phone Investigation Kiosk (CPIK) The North Texas Regional Computer Forensics Laboratory (NTRCFL) is participating in a pilot project with the RCFL-National Program Office for cell phone examinations (Cell Phone Investigation Kiosk - CPIK). The concept of this project is to provide the tools and techniques for investigators to obtain actionable logical file information quickly without going through the process of a time-consuming full forensic examination. During the conference, the NTRCFL will provide a CPIK where credentialed LE investigators can test drive the concept with evidence cell phones that they brought with them. The CPIK will be hosted by a certified FBI cell phone examiner during certain hours of the conference. The CPIK will include instruction and the data extraction software and hardware and photographic setup for taking cell phone screen shots. The CPIK includes a workstation (computer, monitor, and printer), DVD/CD copying device and the appropriate software for the workstation. AUGUST 11-14, 2008 • DALLAS, TEXAS Field Search for Mac Field Search for Windows (FSWin) has been in use by more than 2,000 officers for several years. This “Live Box Examination Tool” has proven to be a valuable addition to law enforcement’s computer forensic tool box. This session will be the FIRST nationally available introduction to Field Search Mac (FSMac). This software application runs live on Mac OS X and matches the tools available in FSWin. You will receive free software by attending this session. Please check schedule for times. Operation Fairplay Computer Training and Lecture The Wyoming ICAC will be conducting Operation Fairplay computer lab training and licensing this year at the Dallas conference. They will be providing the latest innovations in this investigative tool including one new application that will be released in Dallas. If you have been unable to get into a Fairplay training previously, you should definitely consider adding this to the workshops that you attend at the conference. If you have already been trained on prior versions of the current Fairplay operation, like Peer Precision, you should consider attending the lecture workshop to see the latest tools in action North Texas Regional Computer Forensic Lab Tour FBI Supervisory Special Agent Mike Morris, Director of the North Texas Regional Computer Forensics Laboratory is will lead two interactive lectures at the NTRCFL on Tuesday and Wednesday after lunch in the first 90-minute slot. This session will be a frank discussion with the Director of the first federally-funded American Society of Crime Laboratory Directors (ASCLD) accredited lab for Digital Evidence. He will discuss the steps towards preparation to become an accredited digital evidence lab. As an ASCLD inspector, he’ll offer advice to agencies that are considering ASCLD accreditation. The session will conclude with a tour of the North Texas RCFL. Just take a short ride on the DART light rail or walk to the West End for lunch and then meet at the NTRCFL for the session. For more information about the lab, go to: http://www.ntrcfl.org 25 Join us for the Annual CAC Social Wednesday, August 13 Landmark Ballroom 7 pm – 2 am Everything is Bigger in Texas Whether this is your first rodeo or you’ve ridden the trail before— bring your ten-gallon hat and mosey on down for this boot-scootin’, mechanical bull-ridin’, Texas-size hoedown. FREE for registered conference participants. Guest tickets available for a fee. Non profit Org. U.S. Postage PAID Dallas Children’s Advocacy Center P.O. Box 720338 Dallas, Texas 75372-0338 The mission of the Dallas Children’s Advocacy Center is improving the lives of abused children in Dallas County and providing national leadership on child abuse issues. Dallas Texas PERMIT No. 2138