Current as of 6/23/17 - Updates will occur periodically

Abusive Minds Think Alike
Kristen Howell, Carrie Paschall
As investigators we know that usually where there is one form of abuse, there may likely be others. Because of this, it is imperative that we know the characteristics of the many different crimes and offenders we are investigating, as they often reside in the same home and often are the same person. This presentation will discuss some very basic dynamics of child sexual abuse and will correlate the similarities in characteristics of the crime, characteristics of the offender, disclosure process and patterns, victim grooming, recantation, and compliant victim characteristics to those that also exist in domestic violence. Attendees will be able to identify multiple similarities between these two types of offenders.
Target Audience: LE, Pros, Prob, Parole, VA, FI, CPS, CAC

Advance Data Collection and Crisis Management
David Bachemin, John Strain
This presentation will discuss setting best practices on data collection for your agency or state, and then using that information in a crisis management scenario.
Target Audience: LE, Probation, Parole

Advanced Cold Case, Long Term Missing and Unidentified Human Remains Investigations
Brian Killacky
This presentation will discuss the strategies, effort and initiative required to revisit cases involving cold cases, long term missing and unidentified human remains investigations that may have become closed, suspended, forgotten or never even initially reported to authorities.
This presentation is sponsored by the NCJTC.  
Target Audience: LE, Prosecution, Probation, Parole, CPS

Advanced Safety Planning 
Bronwyn Blake, Amanda Elkanick
In this workshop participants will learn how to help victims of intimate partner violence and sexual assault create an individualized plan to help reduce the risks they and their children face. This presentation will move beyond the basic safety plan and identify unique circumstances that require additional safety precautions and practices.
Target Audience: All Attendees

Adverse Childhood Experiences (ACE) Study: What You Need to Know to Identity, Intervene and Interrupt
Jane Straub
Experiences in childhood matter. Numerous research studies have shown how childhood stress and trauma can impact adult health. The Ace Study is the largest study investigating the health and social effects of negative childhood experiences. Now that we have the research, what can we do about it? The cycle of violence, generational poverty and abuse, homelessness, substance abuse, incarceration, perpetration and victimization of violence are all related to ACE’s. Strategies such as identification and assessment, reducing risk and exposure and nurturing resiliency and skill building are effective interventions. Changing the negative course that many children are on is our best way to prevent abuse in future generations. This presentation will increase your knowledge of trauma and provide ways to work with children, families and communities to reduce the impact of trauma.
Target Audience: All attendees

Ages and Stages of Child Sexual Abuse
Sandra Onyi, Lisa Schuster
This presentation will discuss elementary information regarding sexual abuse and how each child is affected differently depending upon their stage of development. Normal sexualized behaviors will be reviewed as well as techniques on how to make the examination and entire process more comfortable for the child. Each developmental stage (i.e., toddler, preschool age, school age, adolescent, etc.) will be explored including typical sexual contacts at the age, normal and abnormal sexual activities, and possible adverse effects on the child. The medical examination will also be reviewed according to age of the child.
Target Audience: LE, Pros, Medical, FI, Therapist, CPS, CAC

Anatomical Dolls and Diagrams
Rita Farrell, Victor Vieth 
In recent years, several researchers have challenged the utility of both anatomical dolls and diagrams in a forensic interview. Although some researchers have recommended caution or limitation on the usage of media, others have boldly called for a “moratorium” on the usage of these tools and have said those who use dolls or diagrams are engaging in conduct “eerily similar” to “ancient divination techniques.” Although there is a small body of research on the use of anatomical diagrams, there are more than 100 studies on the usage of anatomical dolls and most of this research supports their usage. The presenters will provide an overview of their recently published position paper on Anatomical Dolls and Diagrams, exploring the research to date, critique it in light of actual practice, and offer suggestions for future research on the use of media in forensic interviews.
Target Audience: Pros, FI, CAC

Anonymization/De-Anonymization/Anti-Forensics in Crimes Against Children Cases
Don Colcolough
Child predators and child pornographers are now more than ever integrating complex computer technology and Internet facilitated anonymization programming. De-Anonymization comprehension is a must for an exponentially growing number of crimes against children investigators, prosecutors as criminals are adopting these technologies prior to their illegal acts. This workshop will introduce and demonstrate state-of-the-art tools, networks, online services and techniques. Onion Routers, VPN Anonymizers, Web Beacons/Bugs will be highlighted along with other anti-forensic technologies. Legal considerations on these advanced Internet technologies will be discussed within this workshop. Criminal investigators and prosecutors should simultaneously comprehend these growing subject matters as they are being intertwined in a growing number of state, federal and US military crimes against children cases.
Target Audience: LE, Pros

Apple Law Enforcement and Response Forum (Part 1 & 2)
Pat Burke, Ryan Kubasiak
Attend this forum if you have questions about what data Apple can provide to law enforce mentor aren't sure how to extract data from a MacBook. The presenters, will answer any questions you have about how Apple can help with your investigations. This session is restricted to law enforcement only.
Target Audience: LE

Are You Ready? Preparing Children for Court
Stephanie Morris
This workshop will address those issues that stress children and caregivers in the court process and how to combat those stressors. Participants will learn strategies for preparing children for court and preparing the courts to be a child friendly environment. The presenter will discuss a child’s rights while testifying, the role of a victim advocate and law enforcement, giving a child friendly oath, and determining competency of the child witness.
Target Audience: LE, Pros, VA, FI, Therapist, CPS, CAC

Attempted Child Abductions: Tracking and Sharing the Data
Rebecca Butler
Attempted child abductions are often under reported due to the nature of these investigations. Suspect identifiers are often minimal, and the incident happens so quickly that it becomes complicated to piece together. Law enforcement is faced with the question of what information to collect and who to report that information to. This presentation will cover the steps law enforcement can take to report an attempted child abduction. The presenters will provide options and resources available to law enforcement to include critical analysis and development of suspect information. Attendees will leave this presentation with the ability to identify resources available to them and how to report and track attempted abductions in their jurisdictions.  
This presentation sponsored by the Texas Department of Public Safety Foundation. 
Target Audience: LE, Probation, Parole, VA, FI, CPS, CAC

Be Smart – Mobilyze: Gathering Data Quickly and Efficiently in Cases with Reluctant or Scared Victims or Witnesses
Ben Charnota, Justin Matasuhara
Gathering data quickly and efficiently in cases with reluctant or scared witnesses is critical to successful prosecutions. Empowering investigators as well as training high tech officers is essential as the number of mobile devices increases annually. In this case study based presentation, we will offer an innovative, reliable, powerful, and forensically sound workflow for investigators and other professionals who encounter suspects or victims. We will demonstrate how to gather data quickly, and without the need for specialized equipment, allowing investigators and child protection specialists to gain vital intelligence, safeguard witnesses and victims, and gather forensically sound evidence to act upon. All of this undertaken in the field, without the need for in-depth training, specialist investigators or relying upon over stretched colleagues in the high-tech unit.
This is an exhibitor workshop sponsored by BlackBag Technology.
Target Audience: LE, Pros, Probation, Parole, VA, FI, CPS, CAC

The Best Kept Secret in Law Enforcement: Using Fusion Centers to Protect Children
Lexi Quinney
Since 9/11, the nation has experienced the creation of more than 78 Fusion and intelligence centers across the nation. These centers were created to provide a platform to receive suspicious activity reports related to terrorism. Once received, the information is analyzed, shared and disseminated.  In 2009, the Texas Department of Public Safety began utilizing the same resources and concept to identify High Risk Threats to children. This proactive approach was implemented to assist law enforcement with identifying possible threats to children in their jurisdiction and sharing that information with other agencies. This presentation will provide options law enforcement and others have to report information that may typically go unreported, but still serves a value. It will also share examples where the collection of information and analysis has proven useful to law enforcement.
This presentation sponsored by the Texas Department of Public Safety Foundation. 
Target Audience: LE, Probation, Parole, VA, CPS, CAC

Best Practices: Working with Families of Missing Children (Part 1 & 2)
Craig Hill, Colleen Nick
Working with families of missing children can be challenging, yet it is critical for law enforcement to develop and maintain strong relationships throughout the life of the case. The willingness and ability to communicate with these families not only contributes to their ability to cope with the crisis; it can be instrumental in successfully resolving the case and bringing that child home. This presentation provides the context and perspective from the parent of a missing child, along with the emotional shock as it may relate to law enforcement's interactions with the family of a missing child.
Target Audience: LE, Pros, VA, CPS, CAC

Better Than a Confession: The Power of the One-Party Consent Phone Call (Part 1 & 2)
Dave Clarke
This presentation will discuss how to use the one-party consent phone call in criminal investigations, as well as the importance of this tool in delayed outcry cases or cases where the detective has no other evidence besides the outcry itself. This presentation will show you how to prepare your victim before the phone call and how to overcome other obstacles the detective maybe confronted with if the victim wishes not to cooperate. Case studies will be discussed in which one party consent phone calls were used to prosecute cases and also used to force the defendants to confess to the offense as well as plea their cases. This presentation will decipher through the conversations between the victim and the defendant and to understand it’s not always what is said but sometimes it’s more important as to what is not said.
Target Audience: LE, Pros, FI, CAC

Beyond Parent Engagement: Changing How Caregivers Parent
Katrina Cook 
Agencies and staff can proactively respond to and support families in crisis, family assistance,case management, assessment, and therapy. In this workshop ideas on when and how to proactively engage families across several domains will be discussed. Additionally, information will be provided on the most effective ways to encourage positive and supportive parenting among caregivers of the children we serve. Evidence-based interventions targeting parent behaviors will be identified and described. Online resources to help case workers and mental health service providers to be informed in their referrals and treatment planning will be provided.
Target Audience: VA, Therapist, CPS, CAC

Blazing through Massive Amounts of Pictures and Videos with Griffeye Analyze
Rey Navarro
The explosion and volume of digital images and videos captured by CCTV, smartphones, tablets, digital cameras, body worn cameras, and dash cams presents significant challenges to analysts, investigators, and forensic examiners. In this presentation, you will learn how to process vast amounts of multimedia data collected from multiple sources and forensic tools, automatically eliminate and prioritize information, detect and highlight critical clues through automated routines and visual navigation, and ultimately identify relationships to prosecute criminals and identify victims. Attendees will also learn about photo matching in the absence of EXIF data, object recognition in videos, and how to easily integrate Project VIC's Alert System and hashes into your ICAC-related investigations.
Target Audience: LE, Pros

Blocked? Now What? - Practical Tips for Interview Challenges
Cathy Davis, Jennifer Sherfield 
This presentation will review what are child driven and interviewer driven blocks that interviewers often face in their day-to-day practice. The presenters will offer practical strategies to reduce barriers to disclosure in interview and at all parts of the assessment. This training looks at proactive and reactive measures that can be utilized by the interviewer to eliminate challenges while impacting the child’s willingness and/or ability to disclose. The presenters will walk through specific case examples and review what not to do, and what to do if you find yourself getting stuck in an interview.
Target Audience: LE, FI, CPS, CAC

The Bottom Line: Why You Can’t Afford to Overlook Wellness in Your Team
Beth Medina, Michael Sullivan, Dan Powers, Elizabeth Tow 
How do you increase efficiency and production while decreasing costs – have a healthy team! Not sure where or how to start? The answer is NOW and HERE! This presentation will look at incorporating wellness from a supervisory level, focusing on setting up a wellness program for new team members and a maintenance program for current team members. Ideas will be shared from ICAC Commanders that have put wellness practices into place and mental health professionals that support the teams.
Target Audience: All Attendees

Building an Education Program for Your CAC
Luis Acuña-Pilgrim, Dianna Smoot
As part of a strategic planning process, the Dallas Children's Advocacy Center embarked on a significant community education program several years ago. Come and hear about strategies implemented to raise the profile of the agency and to become the "go to" for child abuse issues within Dallas County. In this workshop, participants will be given ideas, tools, and resources to take back to their communities, including creative ideas on what can be implemented on a limited budget and how to leverage MDT relationships to raise child abuse awareness.
Target Audience: CAC

But I love him...Investigating and Interviewing Children who are in Love with Their Offender
Kim Skidmore, Bernadette Yupit-Martinez
Investigating cases where children and teenagers who have been sexually victimized can in itself be challenging, but it can be especially challenging when they do not see themselves as a victim,but rather feels that they are in a loving relationship with the offender. The feelings they have can often create blocks to disclosure that can be difficult to overcome. Presenters Kim Skidmore and Bernadette Yupit-Martinez will offer research based suggestions to help understand these victims by exploring grooming behaviors these offenders use to exploit their victims and gain their trust. The presentation will also offer suggestions on how to ask questions in a way that can gather helpful investigative information without further complicating the emotional challenges the victim already faces. The presentation will include lecture, case study, and video clips to assist in the learning process.
Target Audience: LE, Pros, Probation, Parole, VA, FI, CPS, CAC 

But I Love Him...Treating Children who are in Love with Their Offender
Kelly Slaven
In this workshop, the presenter will discuss the clinical treatment of a compliant victim who loves their perpetrator. The Stages of Change model will be used to conceptualize the process of supporting a client/victim from a Pre-contemplative stage of change all the way into full acceptance and Maintenance. Trauma informed use of evidenced based therapies, such as Trauma Focused Cognitive Behavioral Therapy (TFCBT) and Eye Movement Desensitization and Reprocessing (EMDR) will be used in case examples as well.
Target Audience: Therapist - Beyond PhotoDNA: Detecting New Child Sexual Abuse Material 
Brad Leitch, Chris Priebe
PhotoDNA allows organizations to detect already categorized child sexual abuse material (CSAM). But with new digital content being so easy to create and distribute, worldwide there has been an epidemic trend toward never before seen CSAM spreading across the Internet. is an artificial intelligence system that uses computer vision to detect never-before classified images. The presenters are already knee-deep working with the Royal Canadian Mounted Police to refine the precision of this system, but they need your help! If you are a member of the law enforcement community or the technology industry, they need your expertise and vast knowledge to help shape this groundbreaking system.
This is an exhibitor workshop sponsored by Two Hat Security.
Target Audience: LE, Pros, Technology professionals

Child Abuse in the Army: When the Accused Wears a Uniform
David O’Dea, Eleanor Odom
The Army places extraordinary emphasis on child abuse cases, using specialized prosecution teams dedicated to bringing soldiers who harm children to justice in the military courtroom. This presentation will explore the roles of the special victim prosecutor, the special victim witness liaison, and the highly experienced civilian litigation experts who make up these teams. The presentation will benefit prosecutors and law enforcement whose communities are located near military installations and those who work with cases involving veterans. The presentation will also explain the unique challenges they face when prosecuting cases involving soldiers and children of military families, while also explaining how to effectively laise with military investigators and prosecutors.  
Target Audience: All attendees

Child Fatality Investigations
Leigh Bishop
This presentation is designed to outline best practices in pre-arrest investigative protocols for cases involving Abusive Head Trauma and other types of inflicted injuries in pre-verbal age infants and toddlers.
Target Audience: LE, Pros, Medical, CPS

Child Homicide Investigations
Brian Killacky        
This workshop is for those professionals conducting investigations and prosecuting those responsible for the murder of children. The presenter will discuss the methods required to establish the fact a crime has been committed, the process to identify those responsible and to prove these allegations beyond a reasonable doubt.
This presentation sponsored by the NCJTC. 
Target Audience: LE, Prosecution, CPS, Medical

Child Pornography and the Relationship to Contact Offending
Joe Laramie
Participants in this workshop will gain a better understanding of child pornography offenders and dispel the “it’s just pictures” myth. Attendees will hear of the devastating and long-term impact on victims, and research highlighting the possible correlation between those who collect child pornography and those who molest children. The benefits of aggressive investigations into collectors as a child sexual abuse prevention tool will be discussed. This workshop is sponsored by the NCJTC.
Target Audience: LE, Pros, Probation, Parole, VA, FI, Therapist, CPS, CAC

Child Safety Efforts at Yahoo
Matt Healy, Holly Lawrence
This presentation will provide a basic understanding of the proactive and reactive methods in which Yahoo detects and investigates content related to child exploitation and how abuse policies surrounding child safety are enforced and communicated. It will include an overview of Yahoo services, such as Yahoo Mail, Messenger and Flickr, with an emphasis on how users can interact and utilize the products, and how law enforcement may encounter these during the course of their investigations. With specific examples pulled directly from Yahoo’s E-Crimes Investigations Team cases, the presentation will describe Yahoo’s CyberTip reporting process and how child sexual abuse material may surface on these products. It will also describe Yahoo's current efforts to encourage awareness and education regarding child safety and promoting good digital citizenship.
Target Audience: LE, Pros, Probation, Parole, VA

Child Sex Trafficking in Indian Country
Josefina Sabori
This workshop will explore the dangers faced by children in Indian Country that contribute to victimization through abductions, exploitation, and maltreatment. Participants will discuss various contributing factors such as runaways and throw away children, technology facilitated crimes, luring techniques, trafficking, and the exploitation of Native American Children.
This presentation sponsored by the NCJTC. 
Target Audience: 

Child Sexual Abuse: Understanding the Perpetrators
Graham Hill
What makes the perpetrators of child sexual abuse think the way they do? For many, the answers to these questions are unimaginable, but for professionals involved in child protection those answers could provide that important clue, that vital final behavioral indicator that enables intervention before a young life is irreparably damaged. This presentation will demonstrate the origins and maintenance of perpetrator behavior. The discussion will provide essential knowledge to help professionals keep children safe. The presentation utilizes video of perpetrators speaking candidly about their behavior.
Target Audience: All attendees

Child Trafficking and Exploitation: A Prevention Perspective
Kimberly Casey, Aria Jefferson Flood
Through an interactive presentation informed by Love146 experience working with at-risk and exploited youth in diverse settings, the presenters will provide information on how systems can effectively reach and empower at-risk youth through prevention education. The focus will be on vulnerabilities among youth from all backgrounds and the connections between those vulnerabilities, and grooming tactics and recruitment. Participants will analyze case studies and vulnerability factors, and discuss how to prevent, identify, and respond to vulnerabilities, risky behaviors, or existing exploitative situations. Presenters will also model examples from the implementation of Not a Number, Love146’s child trafficking and exploitation prevention curriculum, as well as other practical programming designed to equip youth to navigate risky and exploitative situations and move beyond awareness to behavioral change.
Target Audience: LE, Pros, Probation, Parole, VA, Therapist, CPS, CAC

Childhood Fall Injuries: Accident vs. Inflicted
Jim Holler
Falls are the leading cause of unintentional injury for children. More than half of all nonfatal injuries to children are associated with falls, and falls are the leading cause of nursery product-related injuries. Head injuries are associated with the majority of severe injuries and deaths resulting from falls. Because falls are associated with a child’s curiosity and development of motor skills, children ages 10 and under are at the greatest risk of fall-related death and injury. This workshop will focus on identifying non-accidental fall injuries on children and will emphasize the specific techniques that can be used by the investigator in the assessment, investigation, and reconstruction of injuries sustained from a fall.
Target Audience: LE, Pros, Medical, FI, CPS, CAC

Childhood Neglect: Abuse is More than Skin Deep
Ryan Brown
Child Maltreatment is a terrible condition that hundreds of thousands of children suffer from in the United States alone. Of all of the forms of abuse, neglect is the most common, the most deadly, and yet the least understood. The purpose of this presentation is to introduce the audience to the statistics involving childhood neglect as well as samples and anecdotes of the various forms of neglect.
Target Audience: All attendees

Children in a Digital Age
Joe Laramie
In an age where technology is in the hands of youth of all ages, the dangers of abuse can affect any child, from any background. These dangers, ranging from cyberbullying to self-victimization (sexting) to sexual exploitation (sextortion) and abuse can be difficult to identify.  Also, preventing these digital abuses has often relied upon the failed use of scare tactics, where children and teens don’t see themselves as vulnerable. This workshop will focus on the variety of digital dangers affecting our youth, the best methods of obtaining disclosures along with effective messaging to prevent digital abuses. This workshop is sponsored by the NCJTC.
Target Audience: LE, VA, Medical, FI, Therapist, CPS, CAC

Children Who are Stalked: What You Need to Know
Jane Straub
When the word “stalking” is searched in google, quite a few results will try to compare stalking to romance, many minimize the harm and others confuse harassment with protection. Our culture uses terms such as “Stalking”, “Creeping/Creeper” and “Hanging Around” to normalize this real, extremely harmful and scary criminal act. Due to the availability and use of technology, children are becoming victims and offenders of digital crimes at earlier ages. This presentation will provide information on stalking including; the definition, statistics and prevalence, technology and the connection to children used in domestic violence situations. Links to other crimes such as exploitation, sextortion, revenge porn, sexual abuse, vandalism, identity theft and harassment will also be discussed.
Target Audience: All attendees

Combating Sexual Exploitation One Stop at a Time
Melanie Malterer, Derek Prestridge
How can you more effectively identify victims of child exploitation and trafficking during as even-minute traffic stop? Are there indicators you might be missing? Presenters from the Texas Department of Public Safety and the United States Marshals Service will present an innovative program designed to combat all types of child victimization during roadside encounters. They will share techniques that can be coupled with routine police practices to significantly increase the likelihood of identifying victimized children and their offenders. The workshop will include examples of cases where officers used these interdiction techniques to rescue children.
Target Audience: LE, Probation, Parole, VA, CPS, CAC

Community Prevention: Trends, Tools and Lessons Learned
Eliza Harrell
We all want to stop crimes against children before they ever happen. And increasingly our agencies and organizations are asked to help educate our communities on how to do this, but our time and attention is often drawn elsewhere. In this session, you will get a quick refresher on trending prevention topics, along with easy-to-use tools, current resources and lessons learned to help you build or enhance prevention efforts in your community.
Target Audience: LE, VA, CPS, CAC

Como Reconocer y Reportar El Abuso Hacia Menores 
Ray Lara
This Spanish presentation offers culturally relevant content and information for Spanish speaking audiences on recognizing and reporting child abuse. This curriculum will educate child-serving professionals or volunteers on the basic issues of child abuse, how to recognize physical and behavioral signs of the varying forms of child abuse, and how to make a report.
Target Audience: CAC

Complete Field Forensic Investigation Unit - MediaClone SuperImager® Plus
Ezra Kohavi
Capturing crucial digital evidence in the field has to be very quick and sometimes there isn’t enough time to perform a full data capture. Using Windows Drive Emulator (Virtualization) to preview the Suspect drive, and perform a quick targeted data capture increases demands. In other cases, there is also the need to perform an onsite full forensic analysis. In all cases, the Suspect media can include Drives, Flash Media, Cellphone/Tablets, and Unopened Laptops. The SuperImager Plus line of products is a powerful hardware platform that runs Linux/Windows OS that allows the investigator to perform all of these tasks. This presentation will demonstrate some of the functionality of the product line and its applications. The presenter will walk through some of the application screens and run a sample live data capture to demonstrate the speed, versatility and multi-use of the unit.
This is an exhibitor workshop sponsored by MediaClone, Inc.
Target Audience: LE, Pros, Technology Professionals

Comprehensive Offender Management: Exceeding the Letter and the Spirit of the Law
Joey Gauthier
This workshop will be a comprehensive look at strategies to help agencies exceed both the letter and spirit of sex offender management and public notification statutes. The presenter will discuss data collection standards, effective public communication policies, as well as how and when to adopt heightened supervision practices. A demonstration of techniques to help improve your agencies efficiency and effectiveness when conducting verification's, sweeps and managing homeless offenders will also be included in this workshop. This workshop is recommended for supervisors, investigators, prosecutors, probation, parole and anyone that handles sex offender registration.
Target Audience: LE, Pros, Probation, Parole

Conducting Multi-Agency Traveler Operations
John Madsen
This presentation will discuss the training, tactical, supervisory, and logistical considerations for conducting a successful multi-agency operation targeting travelers and human trafficking patrons. Case examples, chat techniques, and statistics will be presented to illustrate the operations of the North Florida ICAC model.
Target Audience: LE, Pros

Conducting Successful Consensual Monitoring of Telephone Calls in Child Sex Abuse Investigations
Robert Young
This presentation will discuss how to successfully use the controlled phone call to solve child sexual assault cases where evidence is often lacking or weak. By learning the lawful, warrant less, and successful techniques, protocols, and strategies discussed in this workshop attendees will be able to utilize the control call to gather admissions, gain insight into the offender before interviewing, corroborate outcry details, and begin the healing process for the victim. Post-call interrogation strategies will also be discussed. Successful calls will be played during the presentation and equipment, preparation, and best practices will be discussed.
Target Audience: LE, Pros, CPS

Coordinated Family Support Services: NCMEC's Family Advocacy Division (Part 1 &2)
Abby Potash, Shannon Traore
This presentation will provide an overview about how the Family Advocacy Division (FAD) works with families in crisis at NCMEC to support their recovery and healing. The presenters will discuss how FAD supports the analytical and case management work at NCMEC by coordinating all aspects of a family's emotional and mental health care. Case studies of reunification will be discussed, through the personal lens of a searching parent, as FAD tackles the time, distance and emotion that can prevent families from healing and moving forward in a healthy way. The gaps in family and support services that are seen nationally are discussed as NCMEC introduces participants to the services of FAD and Team HOPE, and the notion that families are searching for appropriate resources and will always fight for justice for their child.
Target Audience: All attendees

The Cost and Resources Necessary for Offender Registration, Verification and Monitoring: An Interactive Focus Group 
Mike Cormaci, John Strain
This presentation will be looking at survey results and evaluating costs and resources necessary for offender registration, verification and monitoring on both a local and statewide level.
Target Audience: LE, Probation, Parole

Countering Child Sexual Exploitation @Twitter 
Twitter Staff
In this workshop, the presenters will highlight how Twitter works with Non-Governmental Organizations (NGO), other technology companies and law enforcement towards the eradication of online child sexual exploitation (CSE). Included in this presentation will be a discussion of Twitter CyberTips and Guidelines for Law Enforcement.
Target Audience: LE, Pros

Countering Technology-Based Criminal Defenses within Crimes Against Children Cases
Don Colcolough
There are a growing number of technology-based legal defenses being cultivated by defense attorneys and their subject matter experts across the United States. This workshop is for prosecutors and the investigators who work technology facilitated crimes against children cases. Prosecutors, their supporting investigators and computer forensic technicians should comprehend these defenses and how to counter them. Malicious software defenses, Trojan Horse defenses, Wi-Fi defenses and compromised Internet account defenses are several examples of this workshops focus. Even confusion is a defense within these criminal cases at this point. Also, this workshop covers common objections used by both prosecutors and defense attorneys when fact and expert witnesses are in court offering testimony.
Target Audience: LE, Pros, VA

Courtroom Psychology: How to be a Good Witness and Survive in the Courtroom (Part 1 & 2)  
Lawrence Braunstein
This presentation is designed for the expert and lay (fact) witness, and will “demystify” the trial process. It will address and explain the different layers of action in the courtroom, how to “read” it and how to effectively respond. Issues such as body language,the importance of what you say and how you say it, demonstrative evidence and effective presentation, the trial as theater, establishing a level of comfort in the courtroom, how to defend yourself on cross examination and how to protect yourself in the witness box (when no one else will). The more comfortable and confident a witness is in the courtroom, the more effective their testimony can be.
Target Audience: All attendees

Commercial Sexual Exploitation of Children (CSEC) Protocol and CACs: An Always Moving Target
Elizabeth Mendoza
In this workshop attendees will learn about the development of a CSEC protocol at a child advocacy center and how it changed the ‘who’ of the MDT and normal case process. Attendees will hear about the challenges of developing a protocol when new agencies come on board and successes through relationship building.
Target Audience: LE, Pros, FI, CPS, CAC

CPS Forum:  Detective, Can You Hear Me Now?
Alfred Birtz
Communication, communication, communication; this is the backbone of all that we do. Inter agency communication is vital to a strong working relationship. This forum will examine common issues with the breakdown in communication between child protective services and law enforcement in the multi-disciplinary team setting. We will discuss ideas and ways to better your understanding of what law enforcement needs/means/wants and how you can ensure that you are maintaining an open dialogue about your understanding and the needs of your own agency throughout an investigation.
Target Audience: CPS

Creative Corroboration in Child Abuse Cases
Bill Fulbright
Identifying, gathering and presenting corroborating evidence is the key to avoiding the dreaded "he said - she said" scenario, and to successfully prosecuting child abusers. This presentation will detail various types of corroborating evidence that must be considered in a child abuse investigation, particularly following a disclosure of sexual abuse. The attendees will come away with a good outline that will assist experienced and inexperienced investigators and prosecutors at each step of a case.
Target Audience: LE, Pros, FI, CPS

Victor Vieth
In this workshop, you will learn the keys to a successful cross-examination. The presenter will discuss how to prepare and gain a thorough understanding of the case. You will learn about Including the evidence to be presented by both sides, drafting cross-examination topics and questions and understanding the limitations of cross-examination. Finally, you will learn concrete examples of how to box the witness into a corner.
Target Audience: Pros

Cultural Considerations in Working with Trauma
Al Killen-Harvey
Traumatic experiences often elicit a wide variety of responses from those who are impacted. What is often missing in the investigation, screening and treatment of trauma cases is an exploration of the cultural factors that may have been at play. This workshop will explore why we oftentimes are uncomfortable and or unprepared to "welcome" culture into our trauma responding organizations and agencies. Through both a didactic and experiential approach this workshop will attempt to create a more culturally inclusive and inquisitive approach to trauma work.
Target Audience: LE, VA, Medical, FI, Therapist, CPS, CAC

The Dark Net and Emerging Technologies: Where are Teens Going and Offenders Following?
Justin Fitzsimmons, Lauren Wagner
As the internet continues to evolve new layers populate where offenders commit criminal offenses. One such area is known as the Dark Net. Participants will learn how the Darknet works and how potential criminal activity is facilitated on the Darknet is crucial to investigating and prosecuting child exploitation cases. In addition, new software applications are being added to mobile phones and tablets daily. This presentation will demonstrate several of the newer applications for mobile devices that are popular for teenagers. Participants will learn about vault applications and the ability to secretly store information.
Target Audience: LE, Pros, Probation, Parole, VA, FI, Therapist, CPS, CAC

The Dark Side of P2P Apps and Shared Content in the Forensics Landscape
Jamie McQuaid
More and more illicit content is being shared via P2P (Peer to Peer) apps and more advanced techniques such as streaming are making these investigations more difficult. Developing the right techniques to examine those apps is imperative. In this presentation, a forensic expert will discuss the implications of the growing popularity of P2P apps for chatting, sharing files, streaming video and live content. He will explain how the growing use of mobile apps and Internet is impacting the ubiquity of content being shared and viewed on P2P apps and networks. You will learn how to investigate these apps and content in child exploitation cases, and understand how people are trying to cover their use of P2P.
Target Audience: LE

Dealing with Difficult Victims in Human Trafficking Cases
Brooke Grona-Robb, Roquel Mayhorn, Victor Vasquez
Perhaps the hardest part of addressing human trafficking cases is dealing with the victim's issues. Yet victims are crucial to human trafficking cases and are often unstable, uncooperative, and difficult in court. In Dallas County, they have a trifold approach--caseworker, investigator, and prosecutor. In this presentation we will discuss how each role is necessary to find, prepare, and deal with troubled victims. We will discuss how we approach victims, from the initial investigation through the prosecution of the case. Working with trafficking victims to prepare them for trial requires a knowledge of their individual trauma experience, interpersonal dynamics, their needs, and their recovery process. The presenters will discuss why addressing witness issues and anticipating the unexpected is crucial for a successful prosecution.
Target Audience: LE, Pros, VA, CAC 

Deception and Denial Patterns Among Adult Child Molesters (Part 1 & 2)
Jim Tanner, Darrel Turner
Dr. Tanner and Dr. Turner have both presented independently of one another on the topic of deception and denial among child molesters.  Dr. Tanner teaches on detecting deception in general and among sex offenders and Dr. Turner presents research findings from exciting ongoing research designed to create a rating instrument for interviewers to use to assess patterns of deception and denial frequently used by adult child molesters. The presentation is a two-part session that introduces the rating instrument and includes video clips from actual interviews with offenders that demonstrate these various denial patterns in action. In addition, these interviews are tactically analyzed to demonstrate the various methods of deception used.
Target Audience: LE, Pros, Probation, Parole, FI, CPS, CAC 

A Deeper Look: What Can We Learn from Child Abduction Offenders?
Adrienne Isom, Kerri Reifel
Child abductions, while rare, can understandably result in panic within a community. Law enforcement is faced with managing the panic while focusing their efforts on the safe recovery of the child and apprehension of the offender. In this presentation, the FBI's Behavioral Analysis Unit will share investigative considerations from their analysis of child abduction offenders. The overview will also include the findings from a review of cases in which a child was abducted from inside their home. Using case examples and offender interview clips, investigators will gain a greater understanding of offender behavior and motivation.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Defying the Unknown Application Probability
Lee Reiber
With the number of currently available apps doubling the population of Los Angeles, it is no wonder many mobile forensic examiners are bewildered at where to start in their forensic examinations. There is not a single solution available that will even come close to supporting all of the apps available to a user. Come to this session to gain an understanding of their storage formats and walk away with the knowledge the power is in your hands to elevate your mobile forensic examinations.
This is an exhibitor workshop sponsored by Oxygen Forensics. 
Target Audience: LE, Pros

Demonstration of OffenderWatch Mobile, Express and Booking Alerts
Scott Freeman
This presentation will demonstrate the new version of OffenderWatch Mobile and answer questions on how various agencies are using Mobile Express and Booking alerts to streamline their processes.
Target Audience: LE, Probation, Parole

Digital Forensic Analysis of Chat Apps, Popular Among Children
James Cooksey, Yuri Gubanov
There are literally hundreds of internet chat applications today for different platforms, including computers, mobiles, tablets and game devices. Among them there are ones you haven't even heard about. Some of such apps are very popular among youngsters. On this session we will go through several chat programs and explain how they store their data, is there a possibility to recover deleted chats, how to find sent or received files, media, calls or SMSes. This session is aimed to everyone who is doing digital forensic analysis of devices owned by victims or suspects.
Target Audience: LE, Pros

"Don’t Tell Me About Predators Teach Me What to Do to STOP Them!"
Stephen Daley
Is prevention or protection part of your mission? Are you tired of responding after the crime? If you could be more proactive (fight back) in addition to responding and recovery (trying to catch up), would you? If you answered “YES” to any of these questions, join us, because, “Together, We Can”! We will share an evidence based methodology and a revolutionary formula that is working today, in prevention and as a therapeutic response to predatory victimization. An education not based on expectations, but instead providing personal skill development and opportunity for our children to be safer in this world today.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Effective Communication and Influence Through the Use of NLP Techniques
John Pizzuro
This presentation will discuss NLP which stands for neuro-linguistic programming, which focuses on an understanding of human behavior and how to effectively communicate and influence the people around them. Individuals and team success depends upon the ability of individuals to communicate with others, face to face, as well as virtually. Whether your speaking to a victim, witness, suspect, patient or co-worker, every interaction with another person determines how you are perceived and every interaction is an opportunity to develop trust and exert positive influence. This presentation develops your ability to focus on your outcome and develop your message for clarity and impact, while understanding how individuals communicate. The communications and influence skills covered in this presentation will increase your ability to exercise choice and control for every type of conversation.
Target Audience: All Attendees

Emerging Issues and Insights Related to Child Pornography Cases Based on CyberTipline Reports
Yiota Souras, Rebecca Sternburg
To date, the National Center for Missing & Exploited Children has received over 17 million reports relating to child sexual exploitation images and videos submitted by the public and electronic service providers to NCMEC’s CyberTipline. Building on years of experience assisting with thousands of reports, join staff from our Office of Legal Counsel and from our Exploited Children Division team for an in-depth look at the CyberTipline. Topics will include: how reports are received and processed, the holding in U.S. vs. Ackerman and specific challenges to anticipate and address in the aftermath of this decision, and free legal resources and technical assistance available from NCMEC.
Target Audience: LE, Pros

Emerging Issues in the Field of Forensic Interviewing
Rita Farrell
The field of forensic interviewing is ever changing. This presentation will discuss emerging issues in the field including; new research, use of diagrams, forensic interviewing protocols,introducing evidence into interview, and peer review and mentoring.
Target Audience: LE, Pros, VA, FI, CPS, CAC

Ethical Considerations in Child Abuse Investigation and Prosecution
Edward Chase
As prosecutors, we are entrusted by society with enormous responsibility. Charging decisions can be some of the most difficult decisions made by the prosecuting attorney, especially in child abuse cases, resulting in profound effects for victims, the defendant, and even society at large.Often, the only evidence is the word of a child. Or in physical abuse cases, merely identifying the correct perpetrator of the crime can be difficult. But a difficult case does not necessarily mean it is a case that should not be prosecuted. This lecture will examine the common ethical considerations that arise with charging decisions and beyond.
Target Audience: LE, Pros, VA, FI

Ethics, Please! Or Ethics, Please?: Demystifying Boundaries and Dual Relationships
Tanisha Knighton
As mental health professionals, we have all been faced with situations where it was unclear if a boundary has been crossed or an unethical dual relationship exists. In these situations, we must rely on internal cues and personal characteristics to assist us in our decision making process. This interactive presentation is designed help professionals navigate ethical decisions regarding boundary violations, boundary crossings, and dual relationships. By reviewing various ethical codes and case studies, an understanding of the main arguments for and against dual relationships, judicious boundary crossings and non-sexual dual relationships can be gained.
Target Audience: VA, FI, Therapist, CPS, CAC

Facebook: 101
Jason Barry
In this workshop, the presenter will discuss the latest safety and privacy controls, safety initiatives designed disrupt and prevent child exploitation, a detailed review of Facebook’s Law Enforcement On-line Records Request System and guidelines for interacting with our Law Enforcement Response Team.
Target Audience: LE, Pros, Probation, Parole

Facilitating Experiential Trauma Information: A Real Change in the Conversation
Russell Strand
The Forensic Experiential Trauma Interview (FETI), designed to improve facilitation of critical information from trauma victims, has proven to be a game changer in the investigation and prosecution of many forms of violence, including child abuse and adult sexual abuse. Use of the FETI process in domestic violence cases is also extremely promising for increasing successful interventions, investigations and prosecutions. This interview technique draws on the best practices of child forensic interviews, critical incident stress management, and neuroscience -- combining them all into a simple three-pronged approach that unlocks the trauma experience in a way that we as professionals can better understand. This two-part presentation will address the neuroscience research, trauma memory and recall and will provide practical application of the FETI process.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Facilitating Forensic Interviews of Cyber Crimes
Crystal Gregory
This presentation will discuss each step of a legally-defensible forensic interview while working with electronic evidence, whether it is prior to or after the collection of evidence by law enforcement. The presenter will provide case examples and techniques of gathering details surrounding evidence to gain more investigative knowledge. The presenter will focus on preparing the interviewer and victim for the use of images, chat logs, and other evidence while keeping with the needs of the victim. Various victims' needs will be discussed, including emotional reactions, compliancy, relationship with offender, concern of images being distributed, and preparing for parental reactions. The presenter will also discuss the use of bait images/videos and how to inform the victim that offender is not who he or she portrayed him/herself.
Target Audience: LE, Pros, FI

FBI's Operation Rescue Me/Endangered Child Alert Programs
Amanda Strickland
Operation Rescue Me (ORM) is a strategic partnership between the FBI's Violent Crimes Against Children Section and NCMEC. ORM is an aggressive program which focuses on utilizing image analysis to determine the identities of child victims depicted in sexual exploitation material. The Endangered Child Alert Program (ECAP) is a proactive approach to identifying unknown individuals involved in the sexual abuse of children and the production of child pornography. ECAP seeks national and international exposure of unknown adults whose faces and/or distinguishing characteristics are visible in child exploitation images. This presentation will include an overview of the programs, case examples of successful identifications and provide attendees with tips and tools to conduct victim identification investigations.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Female Genital Mutilation in the United States
Kristen Acton, Kerry Sparks
This presentation will discuss the emerging threat of the practice of female genital mutilation (FGM) in the United States. While not a new practice, the U.S. Government and the FBI’s International Human Rights Unit recently made preventing and combating FGM a priority in order to safeguard children. The presentation will detail key facts regarding FGM, including education on the various types of FGM, health effects, and prevalence within certain ethnic communities. The presenters will discuss methods of performing the procedure, potential medical concerns, and typical justifications for having FGM performed. Additionally, the presenters will discuss legal and jurisdictional issues when investigating FGM cases, the current threat and prevalence of FGM within the United States, and the FBI’s strategy to combating FGM. (This presentation may include some graphic and sensitive material, to include video clips of survivor testimony.)  
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC
See this link: 

Five Bs of Child Physical Abuse: Bruises, Burns, Bones, Bellies,and Brains (Part 1 & 2)
Kristen Reeder
This presentation will review the variety of injuries seen in cases of child physical abuse. The discussion will be case based and include examples of abusive and non-abusive injuries. The lecture will be geared for CPS workers, law enforcement investigators, and attorneys to learn the basic aspects of child physical abuse injuries.
Target Audience: LE, Pros, CPS

Forensic Experiential Trauma Interviews and Application to Child Forensic Interviews
Julie Kenniston, Russel Strand
Child interview forensic techniques have been a topic of substantial research for several decades. Recent advances in our understanding of neuroscience and trauma memory has informed additional research and practice. The Forensic Experiential Trauma Interview (FETI) was developed using sound child forensic interview techniques such as open-ended and non-leading questions, impact & experience aspects of critical incident stress debriefings and what we now know about the advances in neuroscience, memory, and trauma memory. This presentation will address the concepts and application of FETI as they may relate to child forensic interviews. The two interview approaches will be compared and contrasted. Concerns for interviewers trained in both methodologies will be addressed. Participants should have completed forensic interview training and FETI training prior to attending this session.
This workshop is co-sponsored by the NCJTC.
Target Audience: All attendees

Forensic Interviewer Forum 
Bibiana Dominguez, Jesse Gonzalez, Kim Skidmore
The Forensic Interviewer Forum will present opportunities for networking with others in the field of forensic interviewing. This forum will host forensic interviewers from around the country to discuss relevant topics in the field and discuss current trends in best practice.
Target Audience: FI

Forensic Interviewer in the Courtroom (Part 1 & 2)
Rachel Burris, Carrie Paschall
This presentation is specifically for new or relatively new forensic interviewers. It will provide an in-depth overview into best practice in record keeping and training documentation for forensic interviewers right when they enter the field. The presenters will also talk about how to prepare for your testimony including how to watch your forensic interviews in an efficient manner to maximize the quality of your testimony. Attendees will also learn important concepts to remember when taking the witness stand and will get to observe some mock direct and cross examination between the presenters. Attendees will also be given the opportunity to ask questions and participate interactively if they wish to.
Target Audience: FI

Forensic Pathology and the Investigation of Sudden Unexpected Infant and Child Deaths (Part 1 & 2)
Candace Schoppe
Understanding the needs of the forensic pathologist is an important skill for those involved in investigating the deaths of infants and young children. Despite close working relationships, information needs are not always well-communicated between the pathologists and the investigators. Gaps in information may result in an undetermined ruling on cause and manner of death, which heavily rely on scene and investigative information in the pediatric population. This lecture will cover the basics of medicolegal death investigation and the pediatric autopsy. Emphasis will be given to the “SUIDI Top 25” which details the 25 most important pieces of investigative information needed by the forensic pathologist prior to beginning the autopsy, as compiled by the CDC for SUID investigators.
Target Audience: LE, Pros, CPS

From Sticks to Flowers: Working with Parents Justifying Corporal Punishment with Scripture
Victor Vieth
As the legal definition of reasonable force continues to contract, there is increasing tension between criminal justice/child protection professionals and parents who physically discipline their children based on religious beliefs. Using a case study, this workshop will offer concrete guidelines for MDTs working with caregivers whose physical discipline of their children exceeds the law but is rooted in their interpretations of scripture.
Target AudienceLE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

From the Mouth of Babes: What Kids are Telling us about Delayed Disclosures
Allison Alstott, Elizabeth Mendoza
As research shows, disclosure of sexual abuse is a process and happens along a continuum. Many factors play a role in the process of disclosure including family relationships, lack of parental support, fear of consequences, etc. In this workshop, the presenters will review information obtained during the forensic interview directly from the child regarding their delayed disclosure. Attendees will obtain further insight on children’s reluctance to disclose and discuss how interviewers and multi-disciplinary team members can navigate through the disclosure process with kids and families.
Target AudienceLE, Pros, Probation, Parole, VA, FI, Therapist, CPS, CAC

Gentle Child Murder: Suffocation/Strangulation/Drowning (Part 1 & 2)
Jim Holler
Gentle homicides encompass smothering, strangulation and drowning and are the second most common type of child murder and the most difficult for investigators to discover. In most cases, there is no evidence of any type of trauma and there are no tests at autopsy that could help determine this type of death and many cases are ultimately listed as Sudden Infant Death Syndrome (SIDS) when in fact it was murder. These cases are most likely discovered through admission from caregivers or witness accounts. This presentation is a comprehensive overview for investigating gentle homicides in children and will cover in detail suffocation, strangulation, and drowning homicides and will provide the investigator with the knowledge they will need to successfully conduct this type of homicide.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, CPS, CAC

Get Involved!: CPS Leadership's Role on the Multi-Disciplinary Team
George Cannata, Matthew Gilbert
CPS Supervisors, Program Directors, and others in leadership positions struggle to find their place on the Multi-Disciplinary Team. The Dallas Children’s Advocacy Center now has a CPS Program Director and CPS Program Administrator co-located with staff at the center. This provides a multi-layer support structure for CPS field staff and supervisors investigating the most serious cases of child abuse and neglect and the partner agencies with whom we work and are accountable. This workshop will teach CPS leaders how to become and stay engaged with their local Children’s Advocacy Center through executive team collaboration, board participation, and development of knowledgeable and skilled field staff and supervisors.
Target AudienceCPS

Google: Combating Child Exploitation
Alexander Gee
This is a workshop that will provide an overview of Google's efforts to combat child exploitation, including content reporting, product safety and deterrence efforts.
Target Audience: All attendees

Google Data Disclosure Policy
Cathy McGoff
This presentation provides an overview of Google’s services and technologies, including Gmail, YouTube and Voice. In addition to describing the types of data available to law enforcement from those services and technologies, the presenters will review the policies and processes by which Google may provide data to law enforcement, consistent with state and federal law, including the Stored Communications Act. The presentation will also provide a demo of the Law Enforcement Response System (LERS) where law enforcement can securely submit legal process and download their productions.
Target Audience: LE, Pros, Probation, Parole

Google User Services: What You Didn't Know Was Out There
Justin Fitzsimmons, Lauren Wagner
Everyone with a Google account has access to a robust history of information through Google Dashboard, My Activity, and Google Takeout. Google Dashboard shows information such as search history, location history, payments profile, and if the user has an Android phone you can even see what apps and installed and track the phone's location live. My Activity will show all of the Google Account information in a chronological order. Google Takeout allows a Google Account user to download a copy of their Google data. While most of this history and tracking information can be disabled or deleted, much of it is on by default and users are not aware to go delete it. This makes Google Dashboard, My Activity, and Google Takeout a powerful tool for law enforcement if they can convince a suspect to hand over the login credentials to their Google Accounts on consent. This lecture will address both how to access this data and legal considerations associated with Google user data.  
Target Audience: LE, Pros, Probation, Parole

Grooming Behaviors of Child Molesters and the Impact on Victims
Darrel Turner
This workshop will discuss grooming behaviors engaged in by child molesters in order to secure victims and prevent disclosure. In addition, grooming of the environment (family, friends) in order to facilitate abuse is discussed. Findings from in-press research by Dr. Turner on grooming will be presented. Video clips from actual interviews/evaluations of sex offenders will be utilized to provide examples of grooming behaviors "from the mouths of the offenders." Videos with victims will be utilized to examine the psychological and behavioral effects of grooming and abuse that exist often long after the abuse has stopped (i.e., recantation, delayed disclosure).
Target AudienceLE, Pros, Probation, Parole, VA, FI, Therapist, CPS, CAC

Harnessing the Force Multiplier of NCMEC's Resources
Dan Mills
The National Center for Missing & Exploited Children® offers a remarkably diverse array of resources to law enforcement, child-serving professionals, parents, children, and other government agencies that are crucial to help solve cases of missing and/or exploited children. This presentation will highlight what agencies need to know to bring these resources to bear in their investigations and to implement various prevention programs in their communities. Participants will learn about NCMEC analytical resources, the CyberTipline®, programs designed to identify potential victims, and additional free training opportunities.
Target Audience: LE, Pros, Probation, Parole, FI, Therapist, CPS, CAC

High Crimes, High Times: How to Investigate and Prosecute Drug-Endangered Children
Jenni Morse, Kristen Reeder
After seeing a dramatic spike in the number of children testing positive for methamphetamines and amphetamines, the presenters decided to change the way we handled their cases. This workshop will discuss those efforts and educate prosecutors, law enforcement, CPS workers and medical staff in how to identify, test, and investigate these cases so that the prosecution can receive the strongest case possible. The presenters will also discuss how to incorporate these drug-endangered children cases into your MDT model.
Target Audience: LE, Pros, VA, Medical, CPS, CAC

High Risk Missing Children: Not "Just a Runaway"
Rebecca Butler
Missing and runaway children are one of the most vulnerable populations law enforcement officers encounter and these children are more prone to abuse, sexual violence, and can become ideal targets for sex traffickers. This presentation will provide criteria that can be used to establish if a child is considered high risk missing. It will share newly designed reporting procedures that can be adopted by other law enforcement agencies nationwide. The presentation will also describe the benefit of applying analytical techniques to locate these children. This presentation will address challenges and gaps that prevent an expeditious recovery of these missing children and what agencies can do to close these gaps. This new concept will help alleviate the case load of investigators, as well as serve as a resource. The presenter will share case examples outlining the techniques that have led to the recovery of children since being implemented in Texas.
Target Audience: LE, Probation, Parole, VA, FI, Therapist, CPS, CAC

Homicidal Drowning and Immersion Abuse (Part 1 & 2)
Andrea Zaferes
This presentation will describe in detail the six types of immersion abuse. The presenter will explain how to distinguish each type of immersion abuse; how they can happen; and what factors generally contribute to the abuse. Participants will also learn how abusers can make the abuse seem accidental. Lastly the discussion will explain how Munchausen by Proxy and other apparent life threatening events can easily be created by forced water aspiration.
Target Audience: LE, Pros, FI, CPS

How Not to Help the Defense Attorney in Child Sexual Abuse Cases or How to Make Friends with the Fox in the Hen House (When You are the Hen) (Part 1 & 2)
Lawrence Braunstein
This presentation, presented by a defense attorney (and former prosecutor), will acquaint law enforcement, prosecutors, medical practitioners, mental health practitioners, child protection caseworkers and victim assistance agency personnel with the intimate workings of the defense in child sexual abuse cases: the preparation of a defense case, investigative techniques, pretrial motion practice and discovery, examinations before trial, jury selection, defense trial strategy, demonstrative evidence, trial exhibits, cross examination techniques, and courtroom psychology. By having a broad overview of both pretrial and trial procedures, and how the defense will approach its preparation during each phase of the litigation, the expert and lay (fact) witness will be better prepared in understanding its individual role in the proceedings, and better prepared to maximize its participation in the overall litigation.
Target AudienceLE, Pros, VA, Medical, FI, CPS, CAC

How the US Marshals Service Can Assist you with Investigating Crimes Against Children 
Frank Conner, Jerry Dysart, Mike Wagner, Rebekah Young
This presentation will provide an overview of the United States Marshals Service resources that are available to any state/local/tribal/territorial partners to assist them in protecting our most vulnerable population, i.e., children. Among the topics to be discussed will be the USMS core mission under the Adam Walsh Act: resources provided by the National Sex Offender Targeting Center: International Megan's Law; USMS new authority for critically missing children; and operational assistance provided to state/local partners, and more.
Target AudienceLE, Pros, Probation, Parole, VA, CPS, CAC

How to Make Your Forensic Investigations Efficient with EnCase Forensic, EnCase Mobile Investigator and Tableau TX1
Jeff Hedlesky, Raj Udeshi
Investigators have an increasing backlog of cases to process. This workshop will demonstrate how investigations can be completed quickly and efficiently with new mobile acquisition and review capabilities, investigation pathways, the integration with Project VIC, and fast forensic imaging. The presenters will examine the digital investigation workflow and how investigators can be benefited in their day-to-day tasks from implementing these practices.
This is an exhibitor workshop sponsored by Guidance Software.
Target Audience: LE

How to Survive Cross Examination for Forensic Interviewers: It’s Not What You Say, It’s How You Say It (Part 1 & 2)
Lawrence Braunstein, Julie Kenniston 
Successful child sexual abuse prosecutions depend in large part on the quality of the forensic interview of the child, and the testimony of the forensic interviewer. This presentation will focus on the various protocols used during the interview process, disclosure as a process or event, forensic linguistics, videotaping of forensic interviews, and how to best present your testimony in the courtroom both on direct examination and cross examination. The goal of the presentation is to "re-educate" forensic interviewers to understand and consider how what they do in the forensic interview room/CAC will "play out" in the courtroom.
This workshop is co-sponsored by the NCJTC.
Target Audience: LE, Pros, FI, CPS, CAC

Human Trafficking and Beyond (Part 1 & 2)
Tanisha Knighton
This workshop will focus on the different types of missing persons, analyze the profiles and vulnerability factors of “victims”, recruitment and grooming tactics used by traffickers of both sexual trafficking and labor trafficking, terminology and rules associated with the pimping subcultures, provide tips on how to identify and interact with “victims."
Target Audience: LE, Pros, Probation, Parole, VAFI, Therapist, CPS, CAC

I Can't Hear You!: What Happens When Police and CPS Don't Communicate
Alfred Birtz, Sabra Garibay
This presentation will examine what happens when good communication goes bad. This case study will detail a child abuse investigation conducted by the Dallas Police Department and the Texas Department of Family and Protective Services. The presenters will examine where the breakdown in communication occurred and how it impacted the investigation from initial onset through the prosecution. The presentation will discuss how to identify and correct communication breakdowns as they occur in order to ensure that they do not have an impact later on in the investigation.      
Target Audience: LE, Pros, CPS, CAC

I Take It Back: Investigating Recantations
Russell Strand
Child abuse, sexual assault, and domestic violence – what do these all have in common? Often the perpetrator is the same, these crimes are frequently traumatic to their victims, and the impact is generally harmful. Another common distinction between these reported crimes – the victim often recants their initial complaint either partially or completely. All recantations should be properly investigated to determine if the recantation itself is true or false. A case determination should not be made until a proper investigation as to the facts and circumstances of the recantation. This presentation will increase understanding of the dynamics surrounding recantations. Case studies and research about this vital topic will be presented along with practical tips and investigative steps to take to ensure a proper case determination.
Target Audience: All attendees

I Take It Back: When a Child Recants Allegations of Sexual Abuse 
Carrie Paschall 
Investigating cases of children and teenagers who have been sexually victimized can be challenging, but it can be especially challenging when the child later recants their initial allegations. Many in the field become concerned about the credibility of both the child and the case once this occurs and it becomes difficult for the MDT to know what to do next. Many times cases are not pursued and children are left in situations that put them at risk for re-victimization. This presentation will discuss recantation and its place in the normal process of disclosure, howto investigate a recant and when and how to interview a child who has recanted. A case study with excerpts from forensic interviews will be used to assist in meeting learning objectives.
Target AudienceAll Attendees

Identification, Notification and Interviewing All in One
Ale Levi
More and more common is the case where your suspect/target is enticing minors to self-produce pictures of themselves, producing images/videos of them without their knowledge, using sextortion methods or baiting them in with a false identity. This presentation will discuss new investigative techniques regarding how to locate victims while minimizing the impact on the victim and family; how and when to identify the victims of child exploitation; and how to notify the families of the child exploitation through the use of the forensic interview process. These techniques are helpful with cases ranging from one victim to those with multi-victims spanning the globe. Discussions of protocols and venues for these options will be presented using case examples as well as presenters experience.
Target Audience: LE, Pros, FI, CPS

The Importance of Truth Verification in Child Sexual Abuse Cases
Jerry Crotty 
Some of the most difficult confessions for law enforcement officers involve crimes against children. These types of cases are unique, because suspects are in fear of the immediate change of life and the stigma that is attached to the crime of offending against a child. The Manatee County Sheriff's Office developed a technique that incorporated the use of the Computer Voice Stress Analyzer in their investigations to obtain a 90%+ confession rate. This agency uses truth verification in the investigation of all sex crimes. This technique has served to identify offenders in cold cases through confessions as well as to clear innocent people under suspicion. The technique has also been utilized to assist CPS investigators in their cases. This presentation will provide an overview of CVSA and how it works. Actual case studies and interview techniques will be discussed during this presentation.
Target AudienceLE, Prosecution, CPS

Improper Relationships
Crystal Levonius, Shannon Miller, Brandon Wonacott
There are increasing numbers of cases filed where a teacher or other educator is a perpetrator and a student is the victim. Often, victims of these crimes are easily identifiable and become the subjects of ridicule within a school. Presenters will discuss investigations, charging decisions, and the prosecution of educators for sexual related crimes. Several cases will be discussed along with the unique issues they each presented.  
Target Audience: All attendees

Initial Response to Unexplained Child Death Investigations
Jim Sears
Most child deaths appear natural or accidental, but sometimes it is later determined that foul play was involved. This presentation will take you from the initial response to a child death or unconscious child and show you how to properly investigate the case from the very beginning.  The discussion will include information on using your multi-disciplinary team to make your cases stronger and ensure important issues are not overlooked. The presenter will also discuss the utilization of information and evidence found during your initial scene response and using that information to move the investigation forward. Lastly, the presenter will include information the medical examiner, doctors, and other members of the MDT will need to make rational and logical decisions on the death of the child.
Target Audience: LE, Pros, FI, CPS, CAC

Insights from the Virtual Global Task force International Online Child Sexual Exploitation Police Personnel Health and Wellness Study: Taking Care of the Protectors
Roberta Sinclair
The Virtual Global Taskforce (VGT) is an international police alliance dedicated to the protection of children from online sexual exploitation and transnational child sex offences and is comprised of national law enforcement agencies, private partners and non-government agencies. Understanding the unique stressors of working in online child sexual exploitation units, the VGT commissioned the Psychological Care International Research Project, led by the Royal Canadian Mounted Police. This global study provides empirical data such that law enforcement agencies and employees can take a more proactive approach in safeguarding and maintaining employee psychological wellbeing. Over 650 participants responded to the survey, including both current and past employees, and representing over 10  countries. Preliminary findings in this critical area of policing will be presented.
Target AudienceAll attendees

The Internet of Things: Understanding and Using IoT to Prove Your Case
Justin Fitzsimmons, Lauren Wagner
The Internet of Things refers to physical devices having the capability to connect to the Internet to send and receive signals and data. As technology evolves into every facet of our daily lives, it is important that MDT’s develop an understanding of what devices are IoT capable and potentially what information may be recoverable to assist in investigations, prosecutions or adjudications. Participants will learn what devices are currently IoT, emerging technology for IoT, and ways to detect what may be contained on IoT devices. Issues of search and seizure for IoT devices will also be discussed.
Target Audience: LE, Pros, Probation, Parole

Interpreting Child Sex Trafficking CyberTipline Reports and Resources Available for Law Enforcement
David Eliff
This presentation will demonstrate the National Center for Missing and Exploited Children's (NCMEC) resources available to investigators working to identify and recover victims of child sex trafficking. Attendees will become familiar with the free analytical resources provided by the Child Sex Trafficking Team (CSTT) at NCMEC, who process hundreds of online advertisements a month, as assist NCMEC CST Case Managers by providing analytical support for missing cases assigned to them. At law enforcement's request, CSTT can also assist by completing comprehensive analytical reports regarding possible child victims and their traffickers to provide technical assistance and support to their child sex trafficking investigations.
Target Audience: LE, Pros, Probation, Parole, VA, FI, Therapist, CPS, CAC

INTERPOL and the Fight against Global Child Exploitation
Drew Viney
This lecture provides insight into the INTERPOL Crimes Against Children Team and the role it plays in the global fight against child exploitation. In this increasingly technology-driven and therefore borderless crime type it is critical for every law enforcement agency to ‘act locally while thinking globally’. The aim of this presentation is to raise awareness of how INTERPOL can assist you with identifying offenders and their victims throughout the world. There will be discussion in relation to a number of initiatives and projects, including the International Child Sexual Exploitation database (ICSE), an ever-expanding collection of seized and cataloged child abuse material. This platform allows investigators to securely share data with colleagues, conduct image and video analysis and comparisons against current holdings and leverage the collective expertise of the global law enforcement community. Some short case studies will be discussed to illustrate the successes that can be achieved through INTERPOL-facilitated cooperation.
Target Audience: LE

Interrogating Sex Offenders: Gaining Maximum Tactical Advantage (Part 1 & 2)
Mike Krapfl, Jon Turbett 
This presentation will identify the limitations of current law enforcement training on interview and interrogation and describe how those limitations adversely affect the investigation of sex offense crimes. It will introduce an evidenced-based model of interview and interrogation practiced by the presenters that maximizes current research and legal advantages for officers.  This model will be presented in the context of a sex abuse investigation involving a former law enforcement officer and no physical evidence…a scenario that is not often like to produce a conviction. The presenters will address the interview and interrogation tactics that produce the slightest edge with sex offenders.
Target AudienceLE, Pros

Interviewing Child Victims with Disabilities (Part 1 & 2)
Scott Modell
Studies have long established that children with disabilities are disproportionately criminally victimized. Specifically, the rate of violence experienced by children with disabilities is triple the rate compared to children without disabilities. Many significant barriers exist, both real and perceived, that limit investigation and prosecution of these cases. Understanding and communicating effectively with children with disabilities who come into contact with the criminal justice system are necessary skills for child protective services, law enforcement,children’s advocacy center staff, and other social service personnel. The participants in this workshop will develop a broader understanding of children with disabilities as well as new strategies for effective interviewing and communicating. Video clips of real individuals with disabilities are integrated into the presentation to maximize the effectiveness of the training.
Target AudienceLE, Pros, FI, CPS, CAC

Interviewing Male Perpetrators of Child Sexual Abuse
Graham Hill
Interviewing those suspected of child sexual abuse is a skill that can only be acquired and enhanced by continual practice. This presentation uses interviews with perpetrators and case study material to demonstrate the presentation styles of these offenders and highlights the techniques that can work when interviewing men suspected of child sexual abuse. Such information is vital if professionals are to effectively engage with those suspected of child sex crimes.
Target AudienceLE, Pros, Probation, Parole, CPS

Interviewing the Reluctant Child
Rita Farrell
This workshop offers concrete guidance for forensic interviewers or investigators called on to interview a child who is reluctant or fearful of making a disclosure. The presenter will discuss different blocks and challenges that may come up and students will review forensic interview video clips and discuss.
Target AudienceLE, FI, CPS, CAC

Interviewing Travelers
Mike Duffey
This lecture will provide students with considerations when interviewing individuals who travel to meet undercover officers. Discussed will be types of approaches to use, interviewing styles, overcoming potential defenses and solidifying your case during the interview. Sample video interviews will be used along with possibly integrating themes into your interview.
Target Audience: LE, Pros

Investigating Child Sexual Assault Cases
Mike Milnor, Nancy Oglesby
Child abuse cases should never be prosecuted with only, “he said, she said,” evidence. It is imperative that a child’s statement of abuse be corroborated in as many areas as possible. This workshop will discuss the multiple pieces of evidence that can be obtained during a sexual assault investigation. Attendees will learn how to make a “corroboration checklist,” and to dissect the child’s statement for areas to gather evidence. This presentation will enable investigators, prosecutors, and associated child abuse professionals to surround a child’s statement with layers of credible, corroborating evidence, and witness testimony to present the strongest possible case at trial.
Target AudienceLE, Pros, CPS

Investigating Serious Injury and Fatal Child Abuse Cases (Part 1 & 2)
Mike Milnor, Nancy Oglesby
Child abuse investigations can be extremely difficult for several reasons. The level of medical knowledge necessary is more than most crimes because often the victim can't or won't tell what happened. This session will cover in-depth procedures for investigating serious injury and fatal child abuse cases. The first part will discuss an overview that is applicable to any child abuse investigation with an emphasis on a multi-disciplinary response. The second part will cover investigation techniques specific to certain types of abuse,including those most often explained as accidents such as burns, failure to thrive/neglect, and abusive head trauma. It is intended primarily for law enforcement officers and cps investigators, but it will include a prosecutor's perspective throughout so that the likelihood of success at trial is increased.
Target AudienceLE, Pros, CPS

Investigating Sexual Misconduct in Schools: What You Must Know About Title IX and K-12 Institutions
Rebecca Leitman Veidlinger
While Title IX is most readily associated with college sexual assault, K-12 institutions are also subject to the federal mandate prohibiting sex discrimination in education. In the K-12 setting,sex discrimination can manifest itself as sexual harassment, gender-based bullying, and sexual assault. Like institutions of higher educations, school districts nationwide must be working to prevent, address and remedy sexual violence that impacts their educational community, an obligation that extends far beyond what most districts are currently doing. In this workshop,attendees will learn about how Title IX functions at the K-12 level, including what prevention efforts are required, how investigations are conducted, and what remedies are required under federal law. Attendees will further learn about potential intersection and overlap of schools’ Title IX investigations and criminal investigations, and how to partner with—rather than work against—those doing the Title IX work at K-12 institutions.
Target AudienceLE, Pros, FI, VA, CPS

Investigating Starvation: A Brutal Form of Abuse
Stephanie Morris
This presentation is a basic primer on what starvation as a form of child maltreatment. It will include discussing what it looks like: what a child experiences when food and water are withheld: and how to approach the crime scene and presenting the case in court.
Target AudienceLE, Pros, VA, FI, CPS, CAC

Investigative Database Discoveries
Zach Artz, Richard Spradley
Come join the Whooster team for an extensive overview of Whooster’s investigative data delivery platforms, learn how to effectively interpret phone query results, discuss our law enforcement centric partnerships/integrations and also gain free trial access to these products following the session. Whooster™ provides over 900 agencies, and their law enforcement investigators, access to our industry unique phone number database delivering the most current data available on the market today.
This is an exhibitor workshop sponsored by Whooster.
Target Audience: LE, Pros, Probation, Parole, VA, FI, CPS, CAC

Investigative Searches and Collaborating with the US Marshals within OffenderWatch
John Strain, Dan O’Donnell
This workshop is an overview of how to run various types of searches within OffenderWatch and collaborate with the US Marshals through the OffenderWatch network.
Target Audience: LE, Probation, Parole

It’s Not Easy Being Green, or Do This for a Living
Dan Powers
This motivational talk is meant to provide you with the insight and knowledge to help survive in a job no one else really understands. Others “outside the business” don’t want to hear about this stuff! You can clear a restaurant with a discussion of what you did that day. We see and hear things on a daily basis our mom and dad never told you existed in this world. Participants will learn how dynamic determination and working as a member of THE TEAM will help you survive in “our world”. Participants will be encouraged to look at themselves, why they do “this” for a living and most of all learn to laugh at it all.
Target AudienceAll Attendees

Kids in Court
Judy Hoffman, Eren Price
For over 20 years, the Dallas County District Attorney's Office has collaborated with community volunteers from the National Council of Jewish Women to make testifying in court a little less scary for children by hosting Kids in Court, a Saturday session at the courthouse for kids and families. This presentation, by a prosecutor and a community volunteer, will include suggestions on starting your own program and lessons learned from 20 years of experience.
Target AudiencePros, VA, Therapist, CPS, CAC

Knock and Talks: Maximum Results with Minimum Manpower   
Michael Johnson, John Pirics  
This presentation will draw from several years of experience in child exploitation investigations that have been initiated by consensual contact (knock and talks). The presentation will provide successful techniques to gain and maintain consent, tips on maximizing the interview, methods for triaging knock and talk targets, and overall strategies for the different types of situations and individuals that are encountered. This information will be blended with examples from cases that the presenters have worked together, many of which have resulted in child rescues and significant sentences.
Target Audience: LE, Probation, Parole

Lead or Lead Not, there is No Try
Dan Powers
Do you want to be known as the Yoda or Darth to your organization? Would you like to convey wisdom or deliver fear as part of your leadership style? You cannot deny that Darth Vader’s leadership style gets results, but Force choking may not be the best way to lead your team. As leaders in “our world” we are faced with challenge of needing to influence many different types of people. The team looks to you to lead with knowledge, compassion and empathy. You have a choice, use the force or go to the dark side. Attend this presentation and learn how to do it.
Target AudienceLE, Prosecution, Probation, Parole, VA, CPS, CAC

Life Without Parole: Using Trauma Focused Cognitive Behavioral Therapy and the Trauma Narrative for Criminal Prosecution of Child Sexual Abuse
Kelly Slaven, Brandie Wade
This workshop will appeal to mental health professionals and attorneys working in a multidisciplinary team to promote justice and healing for the victims of child abuse. The use of assessment and the evidence based treatment of Trauma Focused Cognitive Behavioral Therapy is not just useful in healing families, but also in prosecuting crimes against children. In this presentation, prosecutors will learn how to best utilize the mental health professional's testimony and treatment to contribute to a guilty verdict.
Target AudienceLE, Pros, VA, Therapist, CPS, CAC

Lightning Session: Five Topics in 75 minutes
Graham Hill, Jim Tanner
Do you want solid information fast? This is the session to attend. The presenters join forces to provide an information packed, fast paced session covering five important topics: Grooming, Targeting Children, Distorted Thinking, Self-Conditioning Among Sex Offenders, and Sex Offender Digital Behavior. This workshop will provide essential information will be presented on each topic and accompanied by handouts which provide extended information. Join us for a "TED talk" on steroids.
Target AudienceLE, Pros, Probation, Parole, VA, FI, Therapist, CPS, CAC

Live Analysis: ‘5-Minute Forensics’ in P2P Cases
Jeff Shackelford
Law enforcement investigators are encountering more digital evidence than ever before. Unfortunately, this translates to more backlogs for the forensic labs and longer waits for the investigators. But what if you could find everything you needed on-scene at the suspect’s house by conducting a basic, automated forensic exam in a matter of minutes? In this presentation,attendees will learn how anyone (including non-technical personnel), can utilize a simple methodology to rapidly and automatically simulate a full computer forensic exam in just five minutes or less...including tasks like data carving, password extraction, registry analysis, timeline creation and report generation. And the best part is that you will leave here with the tools and techniques to do this successfully on your own.
Target AudienceLE

Long-Term Missing Children: NCMEC’s Summit and Guide for Law Enforcement  
Leemie Kahng-Sofer, Robert Lowery
This presentation will discuss long-term missing child cases and recoveries that provided the catalyst to NCMEC’s Long-Term Missing Child Summit of 2014. Each of the eight different summit tracks and corresponding guide chapters, addressing topics such as risk assessment; investigative methodologies related to long-term missing children and unidentified remains; offender and victim behavior; forensic and biometric considerations; and missing child family dynamics will be covered.
Target Audience: LE, Pros

Magnet AXIOM 101: Fundamentals
Christopher Vance
This lab will provide an overview of Magnet AXIOM and its features, including Project VIC and/or CAID files, Photo DNA, and skin tone analysis, all aiding in the expedient identification of potential crime victims. Attendees will work with our forensics experts to process a case understanding the requirements for expediency and thoroughness when dealing with underage victims. AXIOM enables Examiners to compartmentalize all data sources into one concise and complete review tool, which gets straight to the artifacts necessary to solve cases dealing with children and missing persons. Lastly, our experts will guide everyone through our collaborative reporting and reviewing.
This is an exhibitor lab sponsored by Magnet Forensics.
Target Audience: LE

Magnet AXIOM 201: File System Analysis
Christopher Vance
In this lab, attendees will explore the new and more powerful features of Magnet AXIOM for analysis, including examining multiple pieces of evidence simultaneously. Attendees will use AXIOM’s Profiles feature, which allows the examiner to tag specific information in their case to a single suspect or multiple suspects, and then dig into filtering and sorting. Our forensics experts will instruct how to create artifacts for niche data stores, and how to use our file system keyword searching for the best results. Filtering in AXIOM is almost immediate and will aid in discovering key pieces of information quickly. Attendees will use our customized reporting features to build reports that are convenient and easily consumable to their stakeholders without need for rebuilding, or restructuring. This is an exhibitor lab sponsored by Magnet Forensics.
This is an exhibitor lab sponsored by Magnet Forensics.
Target Audience: LE

Medical Child Abuse: The Medical Evaluation and How to Use it for the MDT Evaluation
Arne Graff
This workshop will discuss medical child abuse, a much more common identified concern in children with chronic diseases. The presentation will detail when to suspect it, know what medical staff can offer in its evaluation and discuss how to involve medical staff in the evaluation, as well as how to help avoid getting to this point of abuse.
Target AudienceLE, Prosecution, Medical, CPS, CAC

Microsoft Cyber tips and Legal Requests
Tracy Ingle, Jeff Lilleskare, Matthew Sullivan
This presentation will provide a high-level overview of Microsoft products and services, including connectivity to One Drive and Skype. The presenters will also provide an understanding of Photo DNA and how Microsoft reports detected hashes to NCMEC. The discussion will also go over what Microsoft may provide in response to legal demands about their services and products.
Target AudienceLE, Pros, Probation, Parole

Mobile Data: How It Impacts Your Investigations
Kipp Loving
Mobile devices are our lifeline between friends, peers and families but also a powerful crime-fighting tool. Mobile devices will store photos, text messages, videos, web browsing information and GPS coordinates that are valuable information for law enforcement, victim advocates and others who are tasked with providing protection to victimized children. In this workshop, the presenter will discuss the difference between mobile, infotainment, telematics data and how these devices influence an investigation. The presenter will break down how a predator uses mobile devices to facilitate the ability to find, exploit and maintain the manipulation of its victims. Attendees will learn how to identify and seize the digital devices. They will hear real world examples and cases that the presenter conducted in his 17 years as an Internet Crimes Against Children Investigator. Lastly, he will discuss current technological advances in the area of mobile forensics and how to recover vital digital evidence, acquire valuable intelligence and leads.
Target AudienceAll attendees

Multidisciplinary Team Forum
Iris Burch
This interactive forum will present you with an opportunity to hear from and network with representatives from other MDT coordinators and other members of the disciplines that comprise a MDT. In attendance, will be MDT representatives, CPS, Law Enforcement, and Medical professionals all in one place to discuss the good, the bad and the ugly when it comes to building and managing a healthy multidisciplinary team.
Target AudienceAll attendees

Multi-Disciplinary Teams and Child Sex Trafficking: What You Need to Know
Joe Laramie
The Multi-Disciplinary Team (MDT) approach is the standard response to child sexual abuse, yet the MDT approach for responding to child sex trafficking requires a different and more flexible approach. This workshop will provide an overview of child sex trafficking indicators and identify the approach teams can take to include new members, as well as steps toward altering the team’s methodology and procedures for this new type of case and victim. This workshop will provide information relevant to professionals serving on the MDT, or anyone serving at-risk youth.
This presentation is sponsored by the NCJTC.
Target Audience: LE, Pros, VA, FI, CPS, CAC

Myth Busters: Breaking Down Common Misconceptions About Victim Disclosures, Traumatic Memories, and Problematic Behaviors
Leslie Boutte, Ana Guzmán
In an effort to more effectively work with sexual abuse victims and their families, it is important to have an understanding of common myths regarding sexual abuse. Delayed disclosures, the process of disclosure, recants, memory discrepancies, and problematic victim behaviors can be frustrating for law enforcement, CPS, prosecutors, and mental health professionals. In this workshop, presenters will break down common myths in an effort to facilitate a non-judgmental and collaborative approach to investigating and treating child sexual abuse cases.
Target AudienceLE, Pros, VA, Medical, Therapist, CPS, CAC

NCMEC Referrals: Finding a Way Forward
Cathal Delaney
This workshop will be based on the Europol experience of dealing with and disseminating NCMEC referrals for 18 partner countries. This presentation will provide an explanation of where improvements can be made through the entire chain of the referrals system to benefit the investigators who are assigned to work those leads. It will include a description of how NCMEC referrals are created and dealt with by the referring platforms, how they are distributed through NCMEC and then translated into working intelligence packages for law enforcement and the stages along the way.
Target Audience: LE

Network Ninja & ‘Collaborate for CACs of TX’ Demo & Case Study
Matt Bochneak
In this workshop, the presenter will discuss the ins and outs of software implementations, from interview and discovery to training, and detail how Network Ninja & Children's Advocacy Centers of Texas worked together to quickly and scalably implement Collaborate for CACs throughout the state. The discussion will include both single-site and statewide demos as well as a Q&A session. Network Ninja's “Collaborate” product is customizable case management software for non-profits and social services agencies, and has functionality specifically tailored for advocacy centers of all shapes and sizes. 
This is an exhibitor workshop sponsored by Network Ninja.
Target Audience: LE, Pros, VA, Medical, FI, Therapist, CPS, CAC

Noncompliant Sex Offenders and the Military
Brian Healy, Katrina Mitchell
This presentation will explore the partnership between the Sex Offender Tracking Team (SOTT) at the National Center for Missing and Exploited Children (NCMEC) and the Department of Defense (DoD) at the National Sex Offender Targeting Center (NSOTC). We will outline US Military post adjudication sex offender registration requirements and will detail the free resources available to you in an ever-expanding effort to assist in locating noncompliant sex offenders, specifically those offenders who have a nexus to the United States Military. This can include offenders who may have served in or have some other direct link to the military, as well as offenders who may have a more indirect association to the military. Finally, this presentation will provide case examples on which SOTT and DoD liaisons have provided assistance and the outcomes that have followed.
Target Audience: LE, Pros, Probation, Parole, CAC

Offender Watch Q/A
David Bachemin, John Strain, Kathy Taylor
An open session to answer any questions you have on OffenderWatch.
Target Audience: LE, Probation, Parole

OffenderWatch Training on Best Practices for Supervising Your Sex Offender Registry
David Bachemin, Joel Shoultz
This session will focus on best practices for maintaining your registry. We will discuss key items to be looked at on a quarterly or yearly time table as well as how to work with our staff to update school districts, points, parcels and 911 files.
Target Audience: LE, Probation, Parole

OffenderWatch Training on Investigative Searches
Kathy Taylor, Joel Shoultz
This session will focus on conducting searches in OffenderWatch. The instructors will be going over search parameters used is several recent cases and the best practices for maintaining your data to optimize search functionality.
Target Audience: LE, Probation, Parole

OffenderWatch Training on Law Enforcement Community Outreach, Notifications and Integrating These Efforts with Social Media
Joel Gauthier, Kathy Taylor
This workshop will be a discussion of how OffenderWatch can help increase citizen awareness through email, seasonal campaigns, and Facebook.
Target Audience: LE, Probation, Parole

OffenderWatch Training on Managing the Verification Process
Joel Shoultz, John Strain
We will discuss best practices for managing your verification cycles as well as using Offender Watch’s many verification tools, like calendars and various reports to simplify the process.
Target Audience: LE, Probation, Parole

OffenderWatch Training on Process Management and Supervision Standards
Joey Gauthier, Joel Shoultz
This workshop is an overview of our Quality Management Process, how we run assessments on agencies and a handout for key things every agency should monitor.
Target Audience: LE, Probation, Parole

Officer Safety Considerations in ICAC Investigations

Michael Sullivan
In the last decade the trading of child pornography has exploded via the use of the Internet. It is not uncommon to see three to six thousand IP Addresses per state, per month, involved in the trading of child pornography. With this volume of activity how can law enforcement make sure their resources are being used to identify hands-on offenders and rescue children currently being sexual exploited. This workshop will look at the studies conducted by Dr. Michael Bourke and Dr. Joe Sullivan. How the results of their work may aid law enforcement in rescuing children and providing insight into the underlying criminal activity and officer safety and mental well-being issues.
Target Audience: LE, Prob, Parole

Once the Shutter Snaps: From Victimization to Restitution
Shelley Allwang
This presentation will bring attention to the production of images and video files in child sexual abuse. From the abuse and its documentation, to distribution and investigation, and ultimately to rescue and restitution, child sexual exploitation images form part of an ecosystem that involves NCMEC, industry, and law enforcement, among others. Come learn about the path these files take from a victim-centered standpoint, and how your help and participation in the “chain” is pivotal to rescuing children featured in child sexual abuse images. The role of NCMEC’s CyberTipline and Child Victim Identification Program, how they interact and are connected, along with their resources for investigators, will be discussed in depth. Case studies will be used to highlight the concepts.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Officer Safety in ICAC Investigations
Michael Sullivan
In the last decade the trading of child pornography has exploded via the use of the Internet. It is not uncommon to see three to six thousand IP Addresses per state, per month, involved in the trading of child pornography. With this volume of activity how can law enforcement make sure their resources are being used to identify hands-on offenders and rescue children currently being sexual exploited? This workshop will look at the studies conducted by Dr. Michael Bourke and Dr. Joe Sullivan. The presenter will discuss how the results of their work may aid law enforcement in rescuing children and providing insight into the underlying criminal activity and officer safety and mental well-being issues.
This presentation is sponsored by the NCJTC.
Target Audience: LE, Probation

Opening Statements and Closing Arguments
Victor Vieth
In this workshop, you will learn the importance of effective strategies and themes for opening and closing arguments in child abuse cases. You will also will learn a theme for presenting your case. The presenter will provide specific arguments to persuade a jury that a child is telling the truth. Lastly, you will learn how to debunk common defenses in child abuse cases.
Target AudiencePro 

Organizing and Using Social Networking Evidence at Trial
Steve DeBrota
This presentation will show how to organize social networking evidence to further an investigation and then present the results at trial. The goal is to show how to create and use exhibits that effectively explain sometime complicated social networking and computer forensic evidence show that jurors with different levels of computer sophistication can understand what they are seeing. The presentation will show real world case exhibits from several different cases involving individual defendants and collective case involving conspiracies.
Target Audience: LE, Pros

Overcoming Encryption of Evidence in Criminal Investigations
Henry Hermann
The rising volume and quality of encryption poses increasingly significant challenges to investigators when handling information on devices and on the Internet. This trend is unlikely to abate any time soon, and finding legal remedies is often protracted, if not impossible, e.g. due to the global nature of crimes against children. Presenting the SciEngines RIVYERA platform, this workshop will show how modern technology can be leveraged to tackle this problem. It is demonstrated how this solution, and its scalability to supercomputer level, can be employed to crack encryption schemes and recover passwords, providing Law Enforcement with a cost-efficient and easy-to-use capability in their tool chest for combating crime. 
This is an exhibitor workshop sponsored by SciEngines.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Parts of the Whole: How Analysts and Investigators Work Together to Combat Human Trafficking
Jessica Garcia Leal, Clayton Platt
Human trafficking cases involve complex case development and analysis - this presentation aims to demonstrate how an effective relationship between an investigator and an analyst can enhance your overall investigation. From developing the initial tip,to expanding an ongoing case, to jump starting stalled cases, and even preparing your case for trial. The presenters will discuss specific tactics, techniques, and procedures used for identification of victims and traffickers, using both open source and proprietary databases, telephone forensics, interviewing, the importance of deconfliction, working with service providers and NGOs, information sharing and networking, etc. that are often keys to successful investigations.
Target AudienceLE, Pros, Probation, Parole, FI, CPS

Pediatric Fractures: How to Evaluate for Maltreatment
Arne Graff
This workshop will review different types of pediatric fractures, as well as the risks and concerns that should prompt an evaluation for maltreatment. The presenter will also discuss how to sort out the fractures that are non-accidental from those from other causes.
Target AudienceLE, Prosecution, Medical, CPS, CAC

The Perfect Pick: Investigating and Prosecuting Cases with Victims Who have an Intellectual Disability
Amy Derrick, Jen Falk
Approximately 6.5 million people in the United States have been diagnosed with an intellectual disability. Children and adults with an intellectual and or developmental disability often make the perfect targets for a sexually violence offense. They also provide a unique set of challenges in the investigation and prosecution of sexual assault cases. This presentation will address best practices for the investigation of these types of cases as well as provide strategies for evidence gathering, charging decisions and successful prosecution.
Target AudienceLE, Pros, VA, Medical, CPS

Pitfalls of Data Silos: Breaking Down the Barriers between Local, State and Federal Law Enforcement
Joey Gauthier
Local law enforcement agencies need to maintain a complete and accurate tool for sex offender investigations while fulfilling their legal requirements for updating state and federal sex offender databases. This has created a system where subsets of sex offender data exist on the local, state and federal levels separately. In this workshop, we will look at the current systems in place now, and the issues that arise from this segmented approach to offender management and reporting. We will also discuss how local, state and federal agencies are attempting to bridge those gaps. This class is recommended for supervisors, investigators, sex offender registration personnel, prosecutors, probation and parole staff.
Target Audience: LE, Pros, Probation, Parole

Presenting Abusive Head Trauma Cases to a Jury
Leigh Bishop
This presentation is designed to instruct law enforcement and prosecutors on the use of admissions and confessions in Abusive Head Trauma cases. This presentation will also address best practice recommendations for trial preparation and jury selection.
Target Audience: LE, Pros, Medical

Profile of a Predator
Graham Hill
Using behavioral analysis techniques, this presentation profiles a predatory child abuser. It explores their key characteristics and the motivations that led to a series of depraved sex offenses against young children. The presentation contextualizes what is currently known about patterns of offending.
Target AudienceAll attendees

Prosecuting Human Trafficking Cases
Brooke Grona-Robb, Hilary Wright
This workshop is designed to assist prosecutors and investigators who are tackling human trafficking cases, from initial investigation to post-conviction. A team approach between prosecutors, law enforcement, and victim advocates allows for simultaneous goals of rescuing victims and prosecuting their offenders to the fullest extent. This lecture will help prosecutors work with law enforcement to investigate cases involving trafficking, and to gather the evidence necessary to make a successful case. The presenters will discuss charging decisions, trial preparation, accomplice testimony, defense strategies, and witness preparation. Additionally, they will discuss analyzing a case to determine if prosecution can go forward without the victim.
Target AudienceLE, Pros, VA, CAC

Protecting Legal Rights of Teen Dating Violence Victims
Bronwyn Blake, Amanda Elkanick
This workshop is designed to help advocates and allies identify the various legal remedies for teen victims of dating violence. These legal options may include; youth rights to healthcare,dating violence and sexual assault civil and criminal laws (brief), age of consent, sexual harassment, and Title IX laws, duty to report, and what options are available if a teen is unhappy at home, including information on emancipation.
Target AudienceAll Attendees

Purposeful Questioning During Investigative Interviews
Thomas McGreal
One of the most important goals of an interview, other than obtaining the truth, is determining intent. Whether the employee has failed an audit, violated a procedure or committed an act of dishonesty it is important that an interviewer strategizes their game plan. The newly added Participatory Approach will help interviewers achieve the goal of obtaining the truth, while also identifying intent. This structured approach is another method to be added to an interviewer’s arsenal and can also be translated to business conversations, negotiations or the typical interview. The presentation will walk through an example of strategizing this method in a variety of contexts.
Target Audience: LE, Pros, Probation, Parole, FI, Therapist, CPS

Randy & Me: A Prosecutor's Story of His Childhood Sexual Abuse
Kevin Mulcahy
This presentation will recount the presenter’s own story of sexual exploitation at the hands of his soccer coach, Randy. But, it will not be merely a retelling of the past. Instead, the presentation will address lessons learned from his case by combining Kevin’s experience both as a victim and a long-time prosecutor of child exploitation cases. Knowing what he knows now, he believes there are lessons to be learned from his story for the investigator (Kevin’s was great), the prosecutor (Kevin’s was terrible), and the forensic interviewer (Kevin did not have one). Beyond these (hopefully) useful lessons, the presentation will provide plenty of time for questions from attendees. Given the nature of our work, we don’t often get to ask questions (beyond factual questions) of our child victims. This presentation will provide that opportunity.
Target AudienceAll Attendees

Really, It is Not about You!: How to Build a Healthy MDT
Irish Burch
MDT collaboration is vital in saving the lives of child abuse victims. No one discipline can or should do it alone. Miscommunication, disengaged team members and lack of understanding of team members’ roles and responsibilities are common issues faced by many multidisciplinary teams. Unfortunately, these dysfunctional behaviors can hinder a teams’ desire to protect the children in their community. Building an effective, high functioning MDT, can create an environment where children can be safe and team members can be heroes. This presentation will provide practical tools and tips for addressing the importance of effective communication, team engagement, peer accountability and conflict resolution. These key factors are essential in creating a MDT that extends beyond the disciplines and focuses on the needs of the victims.
Target AudienceAll Attendees

Recognizing and Reporting Child Abuse
Ray Lara
This presentation is designed to raise awareness and to spur action from the many professionals and volunteers who work with children on a regular basis.This curriculum will educate child-serving professionals or volunteers on the basic issues of child abuse, how to recognize physical and behavioral signs of the varying forms of child abuse, and how to make a report.
Target AudienceCAC

Recovering Live Victims and Confessions During ICAC Interviews with Truth Verification
Jerry Crotty
This presentation will demonstrate the value of using truth verification in child traveler and child porn investigations. It will provide an overview of truth verification techniques for investigations and when properly employed, can assist in discovering undetected evidence and most importantly live victims. The presenter will also demonstrate how voluntary confessions obtained using truth verification result in more substantial and correct penalties for traveler suspects. This presentation will be presented with several case studies which show the effectiveness of using voice stress analysis in traveler operations as well as child pornography investigations. The presenter will also provide assistance to agencies interested in replicating this proven methodology.
Target Audience: LE, Pros, Probation, Parole

Recovery, Justice and Healing for Domestic Minor Sex Trafficking Victims: Challenges, Progress and Hope
Toni McKinley, Andrea Sparks
Trauma from child sex trafficking is complex and traditional therapeutic interventions often do not work. Understanding how complex trauma affects brain chemistry and function, and the consequent behaviors of victims is essential to successful criminal justice and victim services strategies. The presenters, one of which is a survivor of child sex trafficking herself, will share insights about how DMST affects the brain and about promising practices that can undo much of the damage. She will also share her own history of trauma and healing and how she is now successfully helping child sex trafficking victims heal and thrive. The other presenter will share what the Texas Governor’s Child Sex Trafficking Team has learned about promising practices to help survivors heal and thrive. She will also share information about the Team’s efforts and progress in developing and supporting these practices in Texas.
Target Audience: All attendees

Recovery of Video Evidence Using DVR Examiner
Jimmy Schroering
Recovering video evidence from surveillance digital video recorders (DVRs) can be a difficult process, but it doesn't have to be. DVR Examiner is a software solution for acquiring video and metadata from DVRs in a forensically sound manner. This presentation will demonstrate the forensic workflow and also briefly discuss the technical processes behind DVR Examiner. The presenter will walk through some sample cases which illustrate how you can use DVR Examiner to get data from DVRs where you otherwise couldn’t (password protected, broken DVR, etc.), as well as highlight how you can be more efficient using DVR Examiner in situations where the data could be recovered manually using the interface of the DVR. 
This is an exhibitor workshop sponsored by DME Forensics.
Target Audience: LE

Reporting Children Missing from Care
Christie Morin, Leemie Kahng-Sofer
This presentation will provide information on NCMEC’s reporting guidelines, reporting methods, and NCMEC resources. Attendees will become familiar with the NCMEC Intake and triaging process, casework flow, and recovery procedure. The importance of photos and information provided to NCMEC during the course of the case will be highlighted.
Target Audience: LE, Probation, Parole, CPS

Responding to Child Abductions (Part 1 & 2)
Kerri Reifel, Joshua Wilson
This presentation is presented by the FBI's Child Abduction rapid Deployment (CARD) Team and the Behavioral Analysis Unit for investigators responding to the potential stranger abduction of a child. This workshop is designed to provide the critical initial actions to law enforcement professionals responding to these events. The presenters will provide case examples and discuss the FBI's Child Abduction Response Plan (CARP), offender characteristics, victimology, and best practices. The instructors will also discuss the multitude of resources the FBI can provide to assist in the investigation of these cases.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Risk Assessment: We Can Do Better (Part 1 & 2)
Michael Bourke, Joe Sullivan
Practitioners have come to rely on actuarial risk assessment tools to determine how risky convicted sex offenders may be. This presentation evaluates the strengths and limitations of such methods of risk assessment and offers some alternative perspectives to the process. Using video case studies the presenters will explore the benefits of combining rigorous forensic interviewing with polygraph as an alternative to actuarial or dynamic risk assessment tools.
Target AudienceAll Attendees

Runaway Prevention IS Human Trafficking Prevention
Lindsey Kahney, Gordon Vance
Runaway and homeless youth are a high risk group for Human Trafficking. By exploring specific National Runaway Safe line cases, participants will learn about the labor and sexual exploitation that these youth face and fall victim to. Our services are two-fold: helping youth build life skills and resilience through our free 14-module Let’s Talk: Runaway Prevention Curriculum prior to running away, and/or leaving home, and helping youth survivors of trafficking through NRS’ hotline and digital crisis intervention services. Special attention will be paid to the Home Free program conducted in partnership with Greyhound lines. Participants will walk away with a comprehensive resource for prevention and intervention services for the youth they serve and specific implementation options for utilizing Let’s Talk.
Target AudienceLE, Probation, Parole, VA, Therapist, CPS, CAC

Safety @ Facebook  
Julie de Bailliencourt and Karuna Nain
Facebook considers safety its most important responsibility. Attend this workshop to learn all about Facebook’s approach to online safety and the policies, tools, programs and resources Facebook provides so people can stay safe.
Target Audience: LE, Pros, VA

Selection, Engagement and Seduction of Children and Adults by Child Molesters (Part 1 & 2)
Cory Jewell Jensen
Participants will examine (via film clips of interviews with various types of sex offenders) some of the specific strategies offenders report using to groom and exploit children and adults. Information was collected from approximately 1,600 sex offenders who were involved in long-term, court mandated sex offender treatment. Topics include offender descriptions of how and why they: targeted certain children, families and youth serving agencies, seduced child victims and adult caretakers, and inhibited disclosure, detection and reporting. A variety of video clips, research studies and anecdotal quotes from sex offenders will be utilized to illustrate each stage of grooming behavior.
Target AudienceAll Attendees  

Self-Care: Responding to Sandy Hook and working Crimes Against Children
Alicia McShane, Thomas Veivia
Law enforcement officers are exposed to a higher number of traumatic incidents than the general population. Research on the effects of trauma and continually evolving and exposure to these findings will serve the inoculate law enforcement to the sometimes devastating effects on one's quality of life and their personal and professional relationships. This presentation provides a first-person perspective from a veteran Agent who was a tactical first responder to the Sandy Hook mass casualty event and its aftermath. An overview on trauma, to include the physiological and emotional effects on brain and body are outlined in this presentation using examples from both presenters and others in an effort to normalize the law enforcement officer's experience. The presenters will provide information on how to manage the long-term effects of trauma and most importantly when to seek help.  
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Self-Production: What Do We Do?
Joe Adock, Lauren Coffren, Julie de Baillencourt, Matt Dunn, Twitter, TBD
The problem of self-production takes on a variety of issues, both from a law enforcement and a provider perspective. Does the self-production involve enticement of coercion that is not immediately known? Why has the minor produced images/videos of themselves and posted them online? What do we do with the minor? This moderated panel discussion seeks the perspective from law enforcement, both domestic and international, as well as from service providers and an NGO.
Target Audience: LE, Pros

Sex Offenders: What Investigators, Prosecutors and Child Advocates Should Know (Part 1 & 2)
Cory Jewell Jensen
Professionals involved in the investigation and prosecution of sex offenders and child advocacy should be familiar the various theories about the etiology of pedophilia and development of pro-offending attitudes, plus the more typical patterns of sexual offending committed by both juvenile and adult sex offenders. This presentation will highlight via video taped interviews with various adult sex offenders some of the common pathways to developing deviant sexual interests and criminal sexual behavior patterns. In addition, the presenter will review a variety of studies that examine the average number of detected vs. undetected offenses sex offender engage in prior to apprehension and the degree and types of “cross-over” or “crime switching” behavior they report.
Target AudienceAll Attendees  

Sexting and Cyber-Bullying: Redefining Dating Violence in the Social Media Age and the Legal Remedies for Teen Victims
Bronwyn Blake, Amanda Elkanick
Teen Dating Violence is a problem and can take many forms, both verbal and physical, but has evolved to include social media. Cell phones, for example, are a common tool for an abusive boyfriend/girlfriend to control or threaten their partner and have been called an “electronic leash” for that reason. In the age of sexting and cyber-bullying it is all too easy for an abuser to demand sexually explicit materials, send unsolicited communication, or blackmail with sexual content. This presentation will explore the issue and also discuss the laws that are currently in place to deal with teen dating violence and with sexting.
Target AudienceLE, Prosecution, Probation, Parole, VA, Therapist,CPS, CAC

Sexting Investigations and Appropriate Consequences
Leah Treitman, Richard Wistocki
This workshop will discuss how to investigate Sexting cases with the goal of finding those involved in the activity. Attendees will learn about various types of sextortion and how it unfolds, what platforms are being used, who victims are reporting to, barriers to disclosure, and the serious consequences that often result. The presenter will also explain how to use social media and other resources to identify suspects in Sextortion cases. You will learn how to examine the five areas of where sexted images are stored and how to eradicate the images. You will learn about other outcomes and consequences for those involved in sexting besides criminal prosecution such as a Restorative Justice/Diversion Program. Lastly, the presenter will explain how to properly send the sexted images to NCMEC/CVIP. In this effort we will attempt to curtail the spread of the sexted images.
Target AudienceLE, Pros, Probation, Parole, VA, CPS, CAC

Rachel Happel
This workshop will address sextortion and how it impacts its victims. Sextortion refers to the broad category of sexual exploitation in which abuse of power is the means of coercion and can be coupled with the threatened release of sexual images or information. Because the method of coercion is usually non-physical these cases are sometimes thought of as less egregious than cases with hands of offenses. The presentation will focus on the dynamics of sextortion, the victims, the forensic interview and special case considerations when a large number of victims are involved.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

Smartphones & the Apps that Rule Them
Kevin Fisher, Shannon Gomez
Smartphones are more than just messages and phone calls, they are the Apps that rule their data. It is important to understand that many users have moved to third party Apps to be able to attempt to hide data from potential investigations. In a sea of millions of Apps it is important to learn how to find the App and then view the data in a parsed and unparsed form, that is what you will learn by attending this lab.
Target Audience: LE, Pros, Probation, Parole

Social Media, Digital Safety & Kids: What's New, What's Now, What's Next 
Katie Greer
Studies show that kids ages 8-18 are spending an average of 7.5 hours a day in front of some screen; with that, the crimes associated with these ever-changing technologies and social media quickly follow and continue to evolve - maybe faster than we can keep up with. Today, working with and keeping our youth safe means being constantly aware of what they're doing online -which can be vitally helpful in daily cases, and is essential to law enforcement work across the board. In this workshop attendees, will leave with a good understanding of current app and social media trends - how and why they're being used - along with hot topic issue such as sexting, cyber bullying and solicitation through new mediums.
Target AudienceAll Attendees

Social Workers: Making a Case for Safety
Jim Holler
Social workers are at risk for hostile behavior from the public when visiting clients at hotels, apartments or homes in unfamiliar or dangerous locations, especially at night. They have often been assaulted with knives and fists while attempting to visit homes where parents are facing various court actions, or where children are being placed into foster care. Most of these home visits are made by a single social worker, without a radio or other means of adequate communications and social workers have been assaulted and/or killed while making such home visits. This workshop will address safety concerns from the law enforcement perspective by providing social workers with important safety related information that they can utilize each time they make a home visit on their own. The workshop will provide social workers with ways they can identify potentially harmful conditions and defuse volatile situations when encountered.
Target Audience: Therapist, CPS

Sovereign Citizen Defense and Child Abuse Prosecutions
Edward Chase
Investigating and prosecuting child abuse cases is a difficult endeavor by itself. But when the defendant claims to not be bound by the laws of the state or federal government, the legal proceedings can become extraordinarily complicated. Often, the arguments raised will be nonsensical and counter intuitive. This lecture will discuss the sovereign citizen movement itself, the common issues that are raised in the defense, dealing with the often pro se defendants, and practical ways to address these issues. More specifically, we will explore the use of this defense in child abuse cases, and attempt to understand why this defense is becoming more popular throughout the country.
Target AudienceLE, Pros, VA, FI, CPS, CAC 

State Prosecutor Forum
Eren Price, Carmen White
If you came to the conference hoping to discuss a specific case with someone, please bring your questions and ideas to this interactive session moderated by experienced local prosecutors. Find out how other prosecutors handle your particular concern. Be prepared to meet your colleagues and brainstorm ideas as attendees have the opportunity to address your questions. Learn about challenges your colleagues face and how they overcome those issues.
Target Audience: Pros

Strangulation: A Hidden Crime in Child Abuse (Part 1 & 2)
Jennifer Green, Kelsey McKay
Over the last decade as felony strangulation statutes have been enacted throughout the country, communities have been shocked at the devastating prevalence in which this disturbing assault exists between intimate partners. Through proper training, responders have started to better identify this often missed and lethal crime, finally giving this crime and the victims a voice. The next step is to educate those working with children so that we can recognize and better document when children have been either victims or witnesses of strangulation. This workshop will also discuss other areas of this crime relevant to children, such as the exposure of trauma seeing your parent strangled and the next step to stop the cycle by incorporating forensic interviewers into the process.
Target Audience: All Attendees

Strategies for Engaging Families in Services
Lisa Schuster
This presentation will discuss elementary information regarding the importance of family engagement in child welfare, medical, and mental health services from a strength-based,solution-focused perspective. Multiple case examples from patients and families referred to the REACH clinic will be included in the presentation. Factors that contribute to engagement will be discussed including a review of the knowledge, attitudes, and skills that lead to successful family-center practice. Challenges to engaging families will be reviewed and ways to address potential threats to engagement will be identified. Practical strategies and suggestions to enhance family engagement will be provided along with interventions to improve retention in services.
Target AudienceVA, Medical, Therapist, CPS, CAC

Streamline Your Digital Forensic Investigations
Richard Frawley
In this hands-on workshop, attendees will learn how to use the newest ADF digital investigative tools. We’ll show you specific methods to streamline your digital investigations: quickly identify and collect files and artifacts; analyze the data to correlate people, events and files; and quickly generate court ready reports. During this process attendees will learn how to import hash sets directly from Project Vic and auto-tagging of matching images; leverage time-line feature that combine files, actions and people into a single view; filter results to identify high-value and most relevant data; and how to share the results of the examination with a portable stand-alone viewer. Ultimately attendees will learn how using an automated end-to-end digital investigation tool, can help you work easier and faster.
This is an exhibitor workshop sponsored by ADF Solutions.
Target Audience: LE

Suffer from BURNOUT, Giv'em the F.I.N.G.E.R.!
Mark Yarbrough
Burnout affects millions of Americans each year and has been called “the disease of our civilization.” The presenter, a former 20-year elected District Attorney personally experienced burnout, learned how to successfully overcome it, and went from “Burnout” to “On Fire!” He has since become a “burnout expert” and has written and published on the subject. Mark is a very entertaining, motivating and inspiring speaker. He has taught thousands of people how to overcome Burnout. Audience members will learn the definition of Burnout and the symptoms thereof. But more importantly, attendees will be laughing, and at the same time learning how to apply Mark’s F.I.N.G.E.R. philosophy to help themselves or their co-workers avoid and/or recover from Burnout. This is a training that you won’t want to miss!
Target Audience: All attendees

Suspect Interview Techniques in Child Abuse Cases (Part 1 & 2)
John Combs
This presentation will discuss interviewing suspects in child abuse cases. It will focus on the importance of rapport building and learning about the suspect’s stressors. The presenter will discuss detecting and confronting deception during an interview. Additionally, the presenter will use several short case studies with actual interview excerpts in order to show how it works and what to look for. These cases include physical abuse of an infant, sexual abuse that lasted over ten years between a step-father and daughter, the sexual abuse of a three-year-old by a step-father, and the sexual abuse between a father and a daughter. The presenter will also discuss the use of recorded phones calls with the suspect. Attendees will learn when to use this tool, who should make the call and how to develop a "theme" prior to making the call. Actual excerpts from two case studies will be used as examples.
Target AudienceLE, Pros, CPS

Taking the High Road: Ethical Challenges and the Multidisciplinary Team (Part 1 & 2)
Dan Powers
There are many benefits of working in a multidisciplinary team, but it also brings ethical challenges as a result of conflicting values and roles. This workshop will examine ethical issues as they apply to members of multidisciplinary teams. Ethical principles are the fundamental ground rules of decision making, not just factors to consider. Any decision made in a case has ethical implications for the team, and reflects the decision maker’s sensitivity and commitment to the team concept. Each member of a team that is affected by a decision will deal with the consequences of that decision. This concept reinforces our professional obligation to make all reasonable efforts to anticipate possible consequences and take reasonable steps to avoid unjustified harm to others. Ethical decision making extends beyond the team to the client. Issues such as informed consent, confidentiality, record keeping and client relationships need to be examined by individual team members and the team as a whole. Clients’ rights which are uniquely related to the multidisciplinary team approach will be examined. This is a two-part workshop with a short "assignment" that will meet the 3-hour Ethics requirement for most licensing boards.
Target AudienceAll attendees

Technical Testimony: Making Sure the Jury “Gets It”
John Sammons
Being an expert witness is tough. The stakes are high and the challenges are many. This is especially true with highly technical testimony like that surrounding digital evidence. Crimes against children often involve digital evidence and technology in some form or another. Experts need to deliver this testimony in such a way as to maximize the jury’s abilities to understand and retain it. Expert witnesses can benefit from applying some of the brain-based teaching techniques used by the best classroom teachers. This workshop will cover a wide array of topics including the use of visuals, effective explanations, cognitive load, slide design, analogies, the impact of a juror’s prior knowledge, and more.
Target Audience: LE, Pros

Technology Trends: What is the New Evil on the Internet?
Ben Butler, Chris Roosenraad
This session will review current and future trends in Internet technology with a focus on technical issues that can have an impact on Internet criminal investigations. Topics to include the growth in end-to-end encryption, persistent monitoring, IPv6, NAT, CGN, the "Internet of Things", TOR, the rise of "2 factor authentication", and the growth of "multipathing". This presentation is designed for anyone who wants to know where the Internet is going.
Target Audience: All attendees

Testifying as an Expert in Commercial Sexual Exploitation of Children Cases
Brooke Grona-Robb
This presentation is designed to assist prosecutors, law enforcement officers, forensic interviewers and others who are tackling human trafficking and commercialized sexual exploitation of children cases, to develop and prepare for expert testimony. It is crucial to define who has expertise that can help the jury understand the special issues involved in CSEC cases. Once these areas of expertise are defined, helping witnesses understand their role as experts and preparing them to testify is important for success. This lecture is meant for both prosecutors as they are approaching CSEC trials and for our experts as they prepare for testifying in court.
Target AudienceLE, Pros, VA, Medical, FI, Therapist, CPS, CAC

Thinking Outside the Box: Creative Approaches to the Trauma Narrative
Kathy Dumond, Lauren Hurley
When working with children who have experienced sexual abuse or complex trauma, developing and processing the trauma narrative can be challenging. Instead of being deterred, clinicians can accommodate different expressions of self to help children find their voice. In this presentation, clinicians will learn creative interventions to enhance the processing of the child's trauma while working within the fidelity of TF-CBT.
Target AudienceTherapist

The Three Coolest Little-Known Social Media Searches
Justin Fitzsimmons, Lauren Wagner
Social media is a common part of everyday life, so there is little surprise that it has become commonplace to investigations. However, there are capabilities within social media websites that are little-known within the Crimes Against Children community. This lecture will detail how three specific social media searches can be used to enhance the investigation and prosecution of cases. Topics discussed will be using the geocode: search in Twitter to find tweets from a specific latitude and longitude, using site: in Google to search specific social media websites, and using URL manipulations in Facebook to find photo likes and comments from a target profile.  
Target Audience: LE, Pros, Probation, Parole, VA, CPS, CAC

Timeline Development: A Tool for Investigators
Bonnie Armstrong, Margaret Patterson
Child abuse cases have many documents and facts to analyze, process and then make a determination. In this workshop, the importance of timelines will be discussed. Timelines offer away to take complex case facts and present them in a simplified, linear manner. When sharing the case with team members, timelines offer a case “snap-shot” to quickly understand the case. In court, timelines have been noted by jurors as the single most important visual shown that helped them understand the case and be convinced. The timeline developed must be visually interesting, cohesive, and convincing and include basic elements such as the date, time frame,victim, witnesses, the suspect, and other key elements of the case. Timelines examples will be shared with the group to compare/contrast different methods and styles.
Target AudienceLE, Prosecution, CPS, FI, Medical

Tips and Strategies for Testifying in Court
Stephanie Morris
This workshop will address testifying as both a lay and expert witness in child abuse investigations. Participants will discuss tips for avoiding testifying and for maintaining their credibility as witnesses. The lecture will also provide tips and tools for testifying effectively at pretrial hearings and trial. Participants will leave better equipped to defend their investigations and interviews.
Target AudienceAll attendees

Trust & Safety: Kik’s Approach to a Safe Chat Community
Nicole Nearing, Michelle Micks
This presentation will provide an overview of Kik’s processes and resources available for global law enforcement in criminal investigations. The Trust & Safety team will discuss how Kik works, new product features and data that may be available pursuant to legal process. They’ll also provide an overview on Kik’s latest safety features and privacy controls available to users as well as on going safety initiatives
Target AudienceLE, Pros

Turning the Case Upside Down: Rethinking the Art and Science of Suspect Interviews
Russell Strand
It’s time to take a fresh look at an age-old problem – suspect interviews. Reducing false confessions, deception, and false information have long been at the center of criminal justice interest and research. The desire to determining the truth – deterred neither by fear nor prejudice have been the focal points of research and development of proper interview/interrogation techniques. This presentation will review the history of interrogation techniques and discuss the impact of numerous suspect interview/interrogation techniques and the efficacy of these techniques including substantial research that will assist fact-finders in determining some short falls in current interview techniques. This presentation will challenge long-held beliefs in what works and what doesn't. Recommendations, including the newly developed suspect forensic interview technique will be presented.
Target Audience: All attendees

Twelve Elements of a Successful Forensic Investigation
Bonnie Armstrong, Jason Bobo
Professionals charged with the duty to protect children have a multitude of evidence to document, interviews to conduct, and leads to follow. In this minutiae of facts, photos, lists, and lies, cases can become twisted, and confusing. This workshop details The 12 Elements of the Forensic Investigation©, a proven format for organizing and investigating cases of child physical abuse. Case studies will show how utilizing these 12 elements including: established protocol, multi-disciplinary team, consent, scene investigation, physical evidence, testimonial evidence, electronic and documentary evidence, timeline development, scene re-enactment, interrogation,resources, and ongoing training results in the development of strong cases for prosecution. Participants will be provided with a Pocket Investigator’s Guide of The 12 Elements of the Forensic Investigation©.
Target AudienceAll Attendees

Uber’s Law Enforcement Portal
Billy Kewell, Linda Isley, Lisa O’Connor
Uber is excited to showcase our new Law Enforcement Portal. We will highlight the features and benefits of the Portal, a fast, secure, user-friendly way for law enforcement to request information and manage cases. We will also provide time to assist law enforcement with creating accounts. Attendees who wish to sign up for access to the Uber Law Enforcement Portal are encouraged to bring their tablets or laptops to this workshop.
Target Audience: LE, Pros, Probation, Parole

Under-reporting of Sexual Abuse in Orthodox Jewish Communities
David Katzenstein 
The fact that child sexual abuse exists in all communities in all areas of the globe is generally accepted as fact. Child sexual abuse is prevalent across all communities, neighborhoods, and socioeconomic classes. It is just as prevalent in Orthodox communities even though laws exist among the Orthodox that are designed to regulate sexual contact, and in more ultra-Orthodox communities, there is also a segregation of the sexes. This lecture will explore the nuanced, acute factors that significantly influence the under-reporting of child sexual abuse within Orthodox Jewish communities, ways in which these communities have dealt with reporting sexual abuse in the past, progress on this issue, and factors that continually impede reporting of abuse. An important element of the presentation will include the issues facing CPS and law enforcement working within this insular population and an outline of recommendations as to how overcome many of these ongoing problems.
Target Audience: All Attendees  

Understanding Cutting Edge Criminal Tradecraft
Steve DeBrota
This presentation will describe the present and emerging communication, high technology, and social networking tools offenders use to communicate with each other and victims. Topics will include data encryption, cell phone applications, cloud storage, web-based communications, and traditional tools. The goal is to provide the student with ways to differential offenders based upon their conduct as part of an accurate danger assessment model. The presentation will include multiple case examples.
Target Audience: LE, Pros, Probation, Parole, VA, FI, Therapist, CPS, CAC

Understanding and Investigating Child Burn Injuries
Jim Holler
Infants and toddlers are most likely to be burned intentionally. Child abuse burn victims are typically under the age of 10 with the majority of them being under the age of 2. Immediate identification of intentional burn victims by those individuals first responding to the call for assistance is crucial because most of the victims are unable to speak for themselves. This workshop will provide law enforcement officers and CPS workers with information that will assist them in distinguishing the difference between intentional and accidental burns. It will also assist the investigator by providing methods that can be used in recreating the incident to help prove or disprove the caregiver’s statements as to how the burns were sustained.
Target Audience: LE, Pros, Medical, CPS, CAC

Understanding Cases of Child Torture
Rebecca Wiester
This workshop will discuss cases of child torture and current literature regarding these cases. The attendees will understand how to detect potential cases of child torture, understand how to interview potential victims and understand the difference between child torture and other kinds of child abuse and neglect.
Target Audience: All attendees

Understanding the Psychopathic Offender
Melanie Malterer
Psychopathy has been referred to as “...the single most important clinical construct in the criminal justice system” (Hare, 1996) and by others as “the most important and useful psychological construct yet discovered for criminal justice policies” (Harris, Skilling and Rice,2001). This workshop provides compelling support for these claims and sheds light on the importance of understanding and identifying psychopathy in criminal offenders. The audience will learn about the construct of psychopathy, its relationship to risk assessment and officer safety, and prevalence rates in society and prison populations. Common myths about psychopathy will be debunked. The audience will be given strategies for the identification of psychopathic traits in offenders and how to utilize this information in law enforcement contexts.
Target Audience: LE, Pros, Probation, Parole, VA, CPS, CAC

Understanding Sex Offenders (Part 1 & 2)
Jim Tanner
This session focuses professionals on the cognitive set of the intrafamilial and position of trust sex offender. We will expand and clarify elements of investigation, prosecution and effective containment. We will discuss sex offenders' perceptions, ideation, grooming strategies and cognitive processes. The impact of the Internet and the offenders' digital behavior will be explored and explained. Participants will leave this session with a new understanding of sex offenders, their thoughts and digital behaviors which will enhance the ability to investigate, prosecute, supervise and treat sex offenders.
Target Audience: All attendees

Use of Expert Witnesses in Child Physical and Sexual Abuse Cases
Mary-Ann Burkhart, Barbara Knox
We are oftentimes now having to use medical expert testimony to prove not only what happened and how something happened, but also to prove the absence of evidence and debunk defense myths. This joint workshop, by an attorney and a doctor, will discuss that evidence can be introduced through expert testimony in both physical and sexual abuse cases, how to partner with your medical expert to prove negative evidence in child abuse cases, and also how to work with your medical expert to debunk the most common defense myths in child physical and sexual abuse cases.
Target Audience: LE, Pros, VA, Medical

Use of Expert Witnesses in Child Physical and Sexual Abuse Cases

Mary-Ann Burkhart, Barbara Knox
We are oftentimes now having to use medical expert testimony to prove not only what happened and how something happened, but also to prove the absence of evidence and debunk defense myths. This joint workshop, by an attorney and a doctor, will discuss that evidence can be  introduced through expert testimony in both physical and sexual abuse cases, how to partner with your medical expert to prove negative evidence in child abuse cases, and also how to work with your medical expert to debunk the most common defense myths in child physical and sexual abuse cases.
Target Audience: LE, Pros, VA, Medical

Using Artificial Intelligence to Identify Child Exploitation on Social Platforms
Adam Hildreth, Peter Maude
Social platforms where young people reside are a magnet for child groomers. With thousands of social platforms, a rising number of users and billions of conversations taking place each day, how do you even start to identify a potential child groomer amongst the crowd? How do you identify them with and without the actual chatter? The presenters will talk through the machine learning and signal processing methods they have used over the decade to spot over ten million sexual predators as well as demonstrating a live view of potential pedophile activity.
Target Audience: LE, Pros

Using Artificial Intelligence to Prioritize and Solve Crimes

Brad Leitch, Chris Priebe
In recent years advances in artificial intelligence has allowed for self-driving cars, voice controlled automated assistants on phones and smart home automation. In this session, the presenters will explore what artificial intelligence means for law enforcement and how it can be applied in a meaningful way to provide triage and help solve cases faster. This is a non-technical session that will help prepare investigative teams for upcoming technology innovations.
Target Audience: LE, Pros, CPS, CAC

Using Craigslist and Backpage for Undercover Operations
Jesse Crowe, Jim Valley
This presentation will involve the set-up of operations when using Craigslist and Backpage. Personnel needs will be discussed as well as safety concerns. Examples will be given of small and large operations. Postings and responding to ads with certain techniques will also be discussed. Attendees will learn about Bit Coins and how they affect posting ads. Also, attendees will learn about the proper equipment needs to success and overcome some of the barriers involved in the operations.
Target Audience: LE, Pros, Probation, Parole

Using Facial Recognition to Develop Leads in Crimes Against Children Investigations
Roger Rodriquez
Agencies like the NYPD have analyzed images for investigations including crimes against children that span trafficking, abuse, child prostitution and exploitation. Attend this workshop and go step-by-step through the facial recognition investigative process, learn essential best practices, techniques and strategies to produce facial recognition leads. Get the facts on how to deal with less than perfect images from sources including CCTV cameras, bank ATM’s, social media, and sources where faces are often rejected for facial recognition. See how a unique approach can make use of these images to generate quality leads in any investigation.
This is an exhibitor workshop sponsored by Vigilant Solutions.
Target Audience: LE, Pros, Probation, Parole

Using NamUs to Resolve Missing and Unidentified Person Cases
B.J. Spamer
This session will introduce attendees to the personnel, technology, and forensic resources available through NamUs to assist with the resolution of long-term missing and unidentified person cases. This session will include an overview of the NamUs system, a discussion of how to best utilize biometric information (dentals, DNA and fingerprints) to resolve cases, and case studies to illustrate the effectiveness of NamUs.
This is an exhibitor workshop sponsored by the National Missing and Unidentified Persons System
Target Audience: LE

Using Predictive Analytics to Better Allocate Sex Offender Management Resources
Jay Lathwell
This workshop will discuss the use of predictive analytics in policing. The basics of data analysis as well as data sources will be discussed. All of this will be brought together in a discussion of a strategic plan used by the Baltimore Police Department to manage their sex offender caseload.
Target Audience: LE, Probation, Parole

Using Truth Verification to Recover Victims and Obtain Confessions in ICAC Cases
Jerry Crotty
This presentation will discuss the use of the Computer Voice Stress Analyzer (CVSA) in ICAC cases. Prior to the implementation of this device by the presenter’s agency, these investigations revealed no live victims over the previous five years and led to very little discovery of other crimes through normal interrogation methods. In February 2015, this investigative tool was introduced into the traveler and computer pornography investigations along with other new interview techniques. Since that time, this agency has identified 33 live victims and thousands of child sexual abuse images and videos. This presentation will discuss how the CVSA can be utilized in criminal investigations and how it can also assist prosecutors and probation officers obtain a complete picture of the offender.
Target Audience: LE, Prosecution, Probation, Parole

The U.S. Marshals and the Adam Walsh Act and Sex Offender Registries-Separating Fact from Fiction
Tim Orava, Justin Vickers
This presentation will cover topics related to the U.S. Marshals Service and its efforts to work with state, local and other federal agencies to identify, locate and apprehend unregistered or non-compliant sex offenders and investigate violations of 18 USC §2250. In addition, the presenters will broadly discuss sex offender registration in the U.S. ten years after the enactment of the Adam Walsh Act, and will highlight some common misperceptions and differences between state and federal sex offender registration requirements, including who has to register, for what duration and who is posted on public websites.
Target Audience: LE, Pros, Probation, Parole, VA, CPS, CAC

U.S. Marshals Training: Use Case Studies and Benefits of OffenderWatch

Dan O’Donnell, Joel Shoultz
This session is restricted to USMS users only.

Vehicle Forensics: An Emerging Evidence Source
John Sammons
Investigators today readily recognize a suspect’s computer, cell phone, or tablet as a potentially viable source of evidence. There is another source that could be equally as fruitful; the suspect’s car. In 2013, there were approximately 23 million connected cars on the world’s roadways. By some estimates, that number will swell to over 152 million by 2020. Computer systems inside of these connected cars can store a wide array of artifacts that could prove extremely valuable in a criminal investigation. This workshop will examine the basics of connected cars, potential artifacts found in vehicles, the acquisition process, the challenges investigators will face trying to recover them, a glimpse into the future, and more.  
Target Audience: LE, Pros, Probation, Parole

Victim ID and Adobe Technology (Part 1 & 2)
Jim Cole, John Penn
In this workshop you will learn how victim identification specialists at Homeland Security Investigations (HIS) utilize cutting edge technology to bring out details and clues used to track down victims and offenders of child abuse material. You will also learn how Adobe Creative Cloud and other tools are helping in the fight against child exploitation with technology breakthroughs in their tools.
Target Audience: LE, Pros, Probation, Parole, VA, FI

A Visual Atlas of Child Abuse
Ryan Brown
Child maltreatment is a medical condition that can manifest itself in different ways. No child is immune to it and it is also a very serious and often dangerous condition that should be recognized by health care providers and investigators. The purpose of this lecture is to introduce the audience to the various presentations of abuse. Though most people think of physical manifestations to be solely physical abuse, one objective of the talk is to show that all forms of abuse can be demonstrated in physical signs and/or symptoms of it's victims. Since physical findings play a role in the investigation and determination of abuse, medical mimics of child abuse will also be discussed and shown. The presentation will also touch on how to differentiate between abuse, accident, or medical mimic and how to properly work the child up to make a diagnosis. The audience will be shown photos of patients and will be ask to determine if the child was abused or not based only on the viewing of the picture. Then, the audience will be given a description and workup, if any, of the condition.
Target Audience: LE, Pros, VA, Medical, CPS, CAC

What Every Prosecutor Needs to Know about Forensic Interviewing
Mary Sawicki
This presentation will highlight how prosecutors can effectively utilize forensic interview techniques as they prepare a child for trial and as they conduct a direct examination of a child in the courtroom. How to formulate questions appropriate for a child's age and stage of development will be discussed.
Target Audience: LE, Pros, FI, Therapist

What Sex Offenders Can Teach Us About Interviewing 
Cory Jewell Jensen
This presentation examines the relationship between confession rates and sex offender characteristics (ie., offender age, relationship to victim, personality type, offense history and prior experience with the criminal justice system). Studies that examined the effectiveness of interviewer style will be reviewed and  the presenter will provide anecdotal comments from 121 admitting adult male sex offenders about their thought process during the police interview. Comments focus on the reason they declined to be interviewed, lied about their sexual offending, or confessed. Video clips will also be used to illustrate specific interview strategies and recommendations for specific interview comment/questions from 26 veteran child abuse detectives from 10 law enforcement agencies will be offered.
Target AudienceLE, Prosecution, Therapy, CPS 

What the Offender has to Tell Us: Sex Offenders in the School Environment
Steve DeBrota, John Pirics, Michael Johnson
The defendant in United States v Darrell Hughes was a long-term school counselor and treatment provider for teenager in a local community. After his apprehension for producing child pornography with multiple victims, he was convicted and agreed to participate in video recorded interviews about his criminal tradecraft and previously successful methods to avoid detection. This seminar will show portions of these interviews and provide public information for parents, teachers, and school administrators to use in training and education efforts. The goal of this lecture includes providing teachers and school officials with reasons to rapidly and effectively report criminal activity or suspicious behaviors in the school environment.
Target Audience: All attendees

What to do with Cellular Call Detail Records: The CAST Approach (Part 1 & 2)
Wendell Cosenza, Richard Fennern
This presentation will be a fast moving and motivating tutorial of how to gain the most investigative leads and evidence from call detail records (CDRs).  Investigators appreciate and often obtain CDRs during investigations. However, few investigators know how to quickly vet the records to obtain the information they need to solve the case or find the victim in an efficient manner.  Attendees will be shown the methods and tools used by the FBI's CAST team for each of the four major cellular providers (ATT, Sprint, VZW, and T-Mobile). Topics covered will include call record explanations, Microsoft Excel tips, the importance of per call measurement data (PCMD), and introduction to CASTViz, a free mapping solution available to law enforcement. The information will be presented through numerous successful case solutions.
Target Audience: LE, Pros, Probation, Parole, VA, Medical, FI, Therapist, CPS, CAC

What's Inside Your Child’s Device?
James Cooksey, Yuri Gubanov
Games, chats, emails, browser histories, pictures, videos, dating apps, documents… there are hundreds if not thousands different evidence types stored inside a child's device. How to quickly identify relevant data? How to restore deleted data, including intentionally erased? What are traces of prior presence of data, robustly wiped from a device? What system information helps your investigation? IPs used by a device, USB sticks plugged to a computer, logins and passwords…In this workshop, we will review major types of data which may be important for digital forensic investigation related to children. A tool, Belkasoft Evidence Center, which helps automating digital forensic tasks, will be demonstrated and all attendees will get a free trial copy. This workshop is aimed at anyone that does digital forensic investigations.
This is an exhibitor workshop sponsored by Belkasoft.
Target Audience: LE, Pros

Why See the World Through the Eyes of a Sex Offender? 
Joe Sullivan
If we don’t understand how individuals sexually exploit children and groom the protective adults in their world we cannot effectively implement child safeguarding. Professionals who enhance their knowledge of offender behavior can recognize situations where children might be at risk or engage more effectively with perpetrators, victims and their families. When we understand the complexity and subtleties of the problem we can better implement policies and procedures within our organizations and ensure effective safeguarding for all. Using video interviews with sex offenders this presentation provides insights into the motivations, thoughts and behaviors of child sex offenders.
Target AudienceAll Attendees

WI CAN: Partnering to Protect Children
Rita Kadamian, Dave Smith
Accurate detection of and effective intervention for all types of child maltreatment require a coordinated interdisciplinary response by law enforcement and child welfare, usually with input from medical professionals. While the law enforcement and child welfare responses are statutorily mandated and funded, the medical response beyond making a mandated report is not. Engaging medical providers in child maltreatment investigations and assessments is vital, yet very challenging due to resource limitations, fragmented responses, and lack of training and meaningful engagement by medical professionals. This workshop will describe Wisconsin’s response to this issue through the development of the Wisconsin Child Abuse Network and describe current strategies implemented to improve medical input in child abuse investigations.
Target Audience: LE, Pros, Medical, FI, CPS, CAC

Without Borders: Bilingual Forensic Interviewer and Family Advocate Collaboration
Jennifer Cano, Jesse Gonzalez, Suzzie Gonzalez, Janeth Peterson
Forensic interviewers and family advocates play very crucial roles with children and families in a child abuse investigation. When meeting with a family, this process can be one that is daunting and intimidating, especially now with the current state of changes in the country. There are many challenges that could affect a child abuse investigation when working with undocumented families, specifically, the Hispanic population. This training will focus on the forensic interviewer and family advocate collaboration, the importance of providing undocumented/documented families with the right information and support, and how new changes in USA legislation could affect children and families coming forward.
Target Audience: VA, FI

The Windshield Approach to Wellness: What We Learn from Looking in the Rear-View Mirror and How We Can Prepare for the Future
Beth Medina, Michael Sullivan, Dan Powers, Elizabeth Tow
In this workshop, you will learn from those that have been to hell and back and now see the topic of wellness as a top priority. Professionals in the industry will tell their personal stories of faltering, realizations, and successes in maintaining their wellness and resiliency.
Target Audience: All Attendees

Working MUCH Harder: How Cascade Forensics Leverages 3rd Party Tools to Increase Your Investigation Velocity
Andrew Sheldon
CEOP, the UK Child Exploitation and Online Protection (a division of the National Crime Agency) faced a massive problem: How to process more media faster. The answer was that they turned to Evidence Talks for a solution. The presenter lives by the motto ‘every time a human touches the data, it takes longer and costs more!’ He uses multiple forensic tools but each step introduces delays so he wanted to find a smarter way of working. This presentation looks at Cascade Forensics, a framework we designed for CEOP, which investigators or forensic experts can use to automate ‘intelligent forensic workflows’ so that multiple suspect media can be examined simultaneously using existing forensics tools.
This is an exhibitor workshop sponsored by Evidence Talks.

Working with South Asian Victims and Their Family
Heena Khan
The presenter, who is an American Muslim Licensed Professional Counselor, will discuss the acculturation and cultural dynamics that are important to be aware of when providing services to South Asian victims and families. She will share her unique counseling experience and will educate participants on trauma-informed and culturally competent practices when working with these children and families. Attendees will learn ways to work effectively and attune to the unique needs of these children and families.
Target Audience: All attendees

Working with Victims with Disabilities in Child Abuse Cases
Mary Sawicki
This workshop will offer concise and practical tips for effectively working with victims who have disabilities in child abuse cases. Suggestions for child protection professionals on how to effectively prepare for their interview of the child and how to conduct developmentally appropriate questioning of the child will be highlighted.  
Target Audience: All attendees

You Got the Call, Now What?
Michael Hernandez, Bernadette Yupit-Martinez
Child sexual abuse cases are one of the most complex crimes in existence. As professionals who are involved in a multi-disciplinary team, it is imperative to know what to ask and when to ask questions when speaking with alleged victims. Asking a child detailed questions outside of a forensic interview can at times be detrimental to the credibility of the child and integrity of the case at trial. This presentation will assist those who are first responders to victims of sexual abuse, such as patrol officers and school resource officers, to be able to understand the fine line of obtaining information you need at the reporting stage and obtaining details that may cause problems down the line.
Target AudienceLE, Probation, Parole, Medical 

You Wanna Talk About Private Parts?
Michael Margolis, Megan Peterson
Screening children for sexual abuse can be overwhelming and often times contains critical information for an investigation. Proper screening techniques for child abuse becomes an imperative tool for CPS workers. Do you know what questions to ask and when to stop a sexual abuse screening? Do you know when a case should by-pass a screening and come directly to a Children’s Advocacy Center, for a forensic interview? As a CAC employee, do you know how to implement this information into your own center? In this lecture, attendees can expect to learn how to screen children for sexual abuse, what questions to ask if a child discloses, when to stop, and how to determine when a case should be seen at a CAC.
Target AudienceCPS, CAC