2012 National Law Enforcement Training On Child - ICAC Home
2012 National Law Enforcement Training On Child - ICAC Home
2012 National Law Enforcement Training On Child - ICAC Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>2012</strong> <strong>National</strong> <strong>Law</strong> <strong>Enforcement</strong><br />
<strong>Training</strong> on <strong>Child</strong> Exploitation<br />
April 17 - 19, <strong>2012</strong> Hyatt Regency Atlanta Atlanta, GA<br />
Cover Design<br />
Partners in Protecting <strong>Child</strong>ren<br />
Pre-Event Workshops April 16, <strong>2012</strong><br />
“Working as Partners to<br />
Make the Internet a Safer Place”<br />
PARTNERS IN PROTECTING CHILDREN 1
2 3 <strong>2012</strong> NATIONAL NATIONAL LAW LAW ENFORCEMENT ENFORCEMENT TRAINING TRAINING ON ON CHILD CHILD EXPLOITATION<br />
EXPLOITATION
Table of Contents<br />
Welcome 1<br />
Acknowledgements 3<br />
General Information 5<br />
<strong>Training</strong> Event Information 11<br />
Special Events 21<br />
Daily Activities 31<br />
Lab-based <strong>Training</strong> Descriptions 32<br />
Classroom-based <strong>Training</strong> Descriptions 43<br />
Speaker Biographies 65<br />
Exhibitors 97<br />
PARTNERS IN PROTECTING CHILDREN 3
4 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Sextortion<br />
This presentation will provide investigators and prosecutors practical tips for<br />
addressing "sextortion," an increasingly more common form of the online sexual<br />
exploitation of children that involves offenders stalking and extorting minors into<br />
self-producing sexually explicit images and videos. Investigation and charging<br />
strategies will be explored, making reference to two recent high-profile cases.<br />
Learn more about Sextortion<br />
Check your schedule for the day and time<br />
this Lab-Based <strong>Training</strong> will be offered.<br />
PARTNERS IN PROTECTING CHILDREN 5
6 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Welcome<br />
Welcome to the <strong>2012</strong> <strong>National</strong> <strong>Law</strong> <strong>Enforcement</strong> <strong>Training</strong> on <strong>Child</strong> Exploitation.<br />
As we continue to focus on training, prevention, deterrence and interdiction, we<br />
will continue to make meaningful strides in protecting America’s young people<br />
from exploitation.<br />
Partners in<br />
Protecting <strong>Child</strong>ren<br />
Throughout this training program you will find case highlights<br />
from collaborative efforts to protect children and prevent<br />
exploitation. We thank our partner agencies for their tireless<br />
work on behalf of our most vulnerable citizens.<br />
PARTNERS IN PROTECTING CHILDREN 1
2 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Operation Delego<br />
This case study involves the investigation of an Internet forum/bulletin<br />
board dedicated to the production, distribution and advertisement of<br />
hardcore child pornography. The presentation will cover case overview,<br />
investigative techniques, international law and prosecution issues.<br />
Learn more about Operation Delego<br />
Check your schedule for the day and time this Lab-Based <strong>Training</strong> will be offered.<br />
PARTNERS IN PROTECTING CHILDREN 3
4 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Acknowledgements<br />
THANKS TO OUR PARTNERS<br />
The U.S. Department of Justice’s Office of Justice Programs, Office of Juvenile<br />
Justice and Delinquency Prevention would like to thank our partners in protecting children from<br />
sexual exploitation.<br />
Internet Crimes Against <strong>Child</strong>ren Task Force<br />
<strong>National</strong> Center for Missing & Exploited <strong>Child</strong>ren<br />
Naval Criminal Investigative Service<br />
United States Department of Defense Cyber Investigation <strong>Training</strong> Academy<br />
United States Department of <strong>Home</strong>land Security<br />
United States Immigration and Customs <strong>Enforcement</strong><br />
United States Secret Service<br />
United States Department of Justice<br />
<strong>Child</strong> Exploitation and Obscenity Section, Criminal Division<br />
Executive Office for United States Attorneys<br />
Federal Bureau of Investigation<br />
Federal Bureau of Prisons<br />
INTERPOL<br />
Office of the Attorney General<br />
Office of the Deputy Attorney General<br />
Offices of the United States Attorneys<br />
United States Marshals Service<br />
United States Postal Inspection Service<br />
United States Courts<br />
PARTNERS IN PROTECTING CHILDREN 3
Acknowledgements<br />
SPECIAL THANKS TO THE<br />
<strong>ICAC</strong> TASK FORCE TRAINING PROVIDERS<br />
The U.S. Department of Justice’s Office of Justice Programs would also like to<br />
extend special thanks to the <strong>ICAC</strong> training providers who have worked<br />
together to develop and deliver training most pertinent to the mission of<br />
the <strong>ICAC</strong> Task Force Program and this year’s curriculum.<br />
OUR TRAINING PARTNERS INCLUDE:<br />
Fox Valley Technical College’s <strong>ICAC</strong> <strong>Training</strong> & Technical Assistance Program<br />
Girls Education and Mentoring Services<br />
High Tech Crime Institute<br />
The Innocent Justice Foundation<br />
<strong>National</strong> Center for Justice and the Rule of <strong>Law</strong>, University of Mississippi School of <strong>Law</strong><br />
<strong>National</strong> District Attorneys Association<br />
<strong>National</strong> Forensic Science Technology Center<br />
<strong>National</strong> White Collar Crime Center<br />
SEARCH High-Tech Crime <strong>Training</strong> Program<br />
THANK YOU TO THE COMPUTER LAB DONORS<br />
The training event organizers would like to express sincere appreciation to the organizations and agencies who<br />
donated their computer labs to the training. Your donations contributed to the success of the lab sessions.<br />
Florida Department of <strong>Law</strong> <strong>Enforcement</strong><br />
FVTC’s <strong>ICAC</strong> <strong>Training</strong> & Technical Assistance Program<br />
<strong>National</strong> Center for Missing & Exploited <strong>Child</strong>ren<br />
<strong>National</strong> White Collar Crime Center<br />
SEARCH High-Tech Crime <strong>Training</strong> Program<br />
We would also like to convey our appreciation to the Georgia Bureau of<br />
Investigation, the Atlanta Police Department, and<br />
the Georgia <strong>ICAC</strong> Task Force Program for hosting this training event.<br />
4 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>Child</strong> Exploitation –<br />
Wisconsin & California Teamwork<br />
"Wisconsin began chatting with someone identifying herself as “Beth.” Beth<br />
subsequently introduced the victim to her cousin “Brian.” Brian’s conversations<br />
became sexual and the Wisconsin victim sent nude pictures of herself to Brian.<br />
Brian threatened to expose the pictures unless the victim sent additional images.<br />
The victim reported the incident and a Wisconsin investigator assumed the victim’s<br />
on-line identity and began communicating with Brian. Brian stopped chatting with<br />
the Wisconsin undercover officer after Brian was contacted by a Sacramento <strong>ICAC</strong><br />
detective who was following-up on an unrelated CyberTip complaint. <strong>On</strong>ce the<br />
enforcement efforts were coordinated, Sacramento <strong>ICAC</strong> completed the case<br />
resulting in an arrest for child pornography with admissions to the Wisconsin<br />
crimes. Suspect is now serving 11 years in prison."<br />
Learn more about <strong>Child</strong> Exploitation - Wisconsin & California Teamwork<br />
Check your schedule for the day and time<br />
this Lab-Based <strong>Training</strong> will be offered.<br />
PARTNERS IN PROTECTING CHILDREN 5
6 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Project Safe <strong>Child</strong>hood Program Information<br />
The Department of Justice’s<br />
Project Safe <strong>Child</strong>hood Initiative<br />
The Department of Justice is committed to protecting our children. Advances<br />
in technology over the last two decades have made it much easier for offenders<br />
to sexually exploit our children, whether by enabling offenders to quickly and<br />
easily obtain and distribute vast amounts of child pornography images around<br />
the world, by making it easy for offenders to find children to victimize, and by<br />
helping offenders find and communicate with like-minded offenders, with the<br />
result that they encourage each other to commit yet more child exploitation<br />
crimes. As nearly all children in the United States can access the internet not just<br />
from homes, schools, and libraries, but from mobile devices that are becoming<br />
ubiquitous, and as technology continues to advance, the already-considerable<br />
challenges of keeping children safe from dangers online will only continue to<br />
increase. At any time there can be countless persons online who would harm<br />
children if given the opportunity.<br />
In response to the increased dangers associated with the internet, in May 2006<br />
the Department launched the national law enforcement initiative Project Safe<br />
<strong>Child</strong>hood. Project Safe <strong>Child</strong>hood was designed to reduce the incidence of<br />
sexual exploitation of children by helping law enforcement at the federal, tribal,<br />
state, and local levels form collaborative partnerships. These partnerships have<br />
enabled law enforcement to work together to investigate and prosecute people<br />
who have or have attempted to sexually exploit children.<br />
While Project Safe <strong>Child</strong>hood originally focused on technology-facilitated offenses, the Department expanded<br />
Project Safe <strong>Child</strong>hood in May 2011 to encompass all federal crimes involving the sexual exploitation of a minor,<br />
including those committed in Indian country or those which involve commercial sexual activity, whether or<br />
not they involve the internet. This sexual exploitation can occur in numerous ways, including the following: the<br />
production, trafficking, or possession of child pornography; online enticement of children for sexual purposes;<br />
commercial sexual exploitation of children; as well as child prostitution and extraterritorial sexual exploitation of<br />
children. Project Safe <strong>Child</strong>hood aims to protect children from all of these crimes.<br />
In August 2010, the Department submitted The <strong>National</strong> Strategy for <strong>Child</strong> Exploitation Prevention and Interdiction<br />
to Congress. The goal of the <strong>National</strong> Strategy is “to prevent child sexual exploitation from occurring in the first<br />
place, in order to protect every child’s opportunity and right to have a childhood that is free from sexual abuse,<br />
trauma, and exploitation so that they can become the adults they were meant to be . . . by efficiently leveraging<br />
assets across the federal government in a coordinated manner.” The Department adopted this goal as the guiding<br />
principle for all current and future efforts to combat child sexual exploitation. In order to meet this goal, the<br />
Department will continue to focus on partnerships formed with federal, tribal, state, and local agencies and to<br />
pursue opportunities to increase awareness and education about child sexual exploitation. The Department values<br />
the critical contributions of our colleagues throughout law enforcement, such as the members of the Departmentfunded<br />
Internet Crimes Against <strong>Child</strong>ren (<strong>ICAC</strong>) Task Force Program, and looks forward to working shoulder-toshoulder<br />
with our partners as we investigate and prosecute those who prey on our children.<br />
PARTNERS IN PROTECTING CHILDREN 5
<strong>ICAC</strong> Task Force Program Information<br />
OJJDP’s Internet Crimes Against <strong>Child</strong>ren<br />
Task Force Agencies<br />
The Internet Crimes Against <strong>Child</strong>ren (<strong>ICAC</strong>) Task Force Program helps state and local law enforcement agencies<br />
develop an effective response to cyber enticement and child pornography cases. This help encompasses forensic and<br />
investigative components, training and technical assistance, victim services, and community education.<br />
The program was developed in response to the increasing number of children and teenagers using the Internet, the<br />
proliferation of child pornography, and heightened online activity by predators seeking unsupervised contact with<br />
potential underage victims. The FY 1998 Justice Appropriations Act (Pub, L. No. 105–119) directed OJJDP to create<br />
a national network of state and local law enforcement cyber units to investigate cases of child sexual exploitation.<br />
The <strong>ICAC</strong> Program is a national network of 61 coordinated task forces representing over 3,000 federal, state, local<br />
and tribal law enforcement and prosecutorial agencies. These agencies are engaged in proactive investigations,<br />
forensic investigations, and criminal prosecutions. By helping state and local agencies to develop effective, sustainable<br />
responses to online child victimization and child pornography, OJJDP has increased their capacity to address Internet<br />
crimes against children.<br />
6 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>ICAC</strong> Task Force Agency Contacts<br />
Alaska<br />
Anchorage Police Department<br />
Jurisdiction: Alaska<br />
Contact: Detective Sergeant Michael<br />
Couturier<br />
Phone: 907786-2444<br />
Email: mcouturier@muni.org<br />
Alabama<br />
Alabama Bureau of Investigation<br />
Jurisdiction: Alabama<br />
Contact: Sergeant Jeremy Lett<br />
Phone: 334-353-1339<br />
Email: Jeremy.lett@dps.alabama.gov<br />
Arkansas<br />
Arkansas State Police<br />
Jurisdiction: Arkansas<br />
Contact: Captain Henry La Mar<br />
Phone: (501) 618-8441<br />
Email: henry.lamar@asp.arkansas.gov<br />
Arizona<br />
Phoenix Police Department<br />
Jurisdiction: Arizona<br />
Contact: Sergeant Jerry Barker<br />
Phone: (602) 650-3170<br />
Email: jerry.barker@phoenix.gov<br />
California, Los Angeles<br />
Los Angeles Police Department<br />
Jurisdiction: Los Angeles CA area<br />
Contact: Lieutenant Andrea Grossman<br />
Phone: (562) 624-4028<br />
Email: 30231@lapd.lacity.org<br />
California, Fresno<br />
Fresno County Sheriff’s Office<br />
Jurisdiction: Fresno County CA area<br />
Contact: Lieutenant Steve Wilkins<br />
Phone: (559) 488-3904<br />
Email: Steve.Wilkins@fresnosheriff.org<br />
California, Sacramento<br />
Sacramento County Sheriff’s Office<br />
Jurisdiction: Sacramento CA area<br />
Contact: Lieutenant Dave Torgerson<br />
Phone: (916) 874-3007<br />
Email: dtorgerson@sacsheriff.com<br />
California, San Diego<br />
San Diego Police Department<br />
Jurisdiction: San Diego CA area<br />
Contact: Sergeant Chuck Arnold<br />
Phone: (858) 715-7120<br />
Email: carnold@sdicac.org<br />
California, San Jose<br />
San Jose Police Department<br />
Jurisdiction: San Jose CA area<br />
Contact: Sergeant Gregory Lombardo<br />
Phone: (408) 277-4102<br />
Email: 3439@sanjoseca.gov<br />
Colorado<br />
Colorado Springs Police Department<br />
Jurisdiction: Colorado<br />
Contact: Sergeant Bill Dehart<br />
Phone: (719) 444-7808<br />
Email: dehartbi@ci.colospgs.co.us<br />
Connecticut<br />
Connecticut Department of Public Safety<br />
Jurisdiction: Connecticut<br />
Contact: Major William Podgorski<br />
Phone: (203)-694-6525<br />
Email: william.podgorski@po.state.ct.us<br />
Delaware<br />
Delaware Department of Justice<br />
Jurisdiction: Delaware<br />
Contact: Special Investigator Robert Irwin<br />
Phone: (302) 739-2030<br />
Email: robert.irwin@state.de.us<br />
Florida, Gainesville<br />
Gainesville Police Department<br />
Jurisdiction: Northern Florida<br />
Contact: Detective John Madsen<br />
Phone: (352) 393-7686<br />
Email: madsenja@cityofgainesville.org<br />
Florida, Broward County<br />
Broward County Sheriff’s Office<br />
Jurisdiction: Southern Florida<br />
Contact: Lieutenant Richard Pisanti<br />
Phone: (954) 888-5256<br />
Email: Richard_Pisanti@bsosid.org<br />
Florida, Polk County Sheriff ’s Office<br />
Polk County Sheriff’s Office<br />
Jurisdiction: Central Florida<br />
Contact: Lieutenant Steven Ward<br />
Phone: (863) 297-3101<br />
Email: sward@polksheriff.org<br />
Georgia<br />
Georgia Bureau of Investigation<br />
Jurisdiction: Georgia<br />
Contact: Assistant Special Agent in Charge<br />
Sandra Putnam<br />
Phone: (404) 270-8870<br />
Email: sandra.putnam@gbi.ga.gov<br />
Hawaii<br />
Hawaii Department of Attorney General<br />
Jurisdiction: Hawaii<br />
Contact: Supervisory Special Agent Clay<br />
Kawamata<br />
Phone: (808) 587-4114<br />
Email: Clay.S.Kawamata@hawaii.gov<br />
Iowa<br />
Iowa Division of Criminal Investigation<br />
Jurisdiction: Iowa<br />
Contact: Special Agent in Charge Gerard<br />
Meyers<br />
Phone: (515) 965-7402<br />
Email: meyers@dps.state.ia.us<br />
Idaho<br />
Idaho Office of Attorney General<br />
Jurisdiction: Idaho<br />
Contact: <strong>ICAC</strong> Investigator James Kouril<br />
Phone: (208) 334-4125<br />
Email: jim.kouril@ag.idaho.gov<br />
Illinois<br />
Illinois Office of Attorney General<br />
Jurisdiction: Illinois<br />
Contact: Deputy Chief Michael Sullivan<br />
Phone: (312) 814-3505<br />
Email: misullivan@atg.state.il.us<br />
PARTNERS IN PROTECTING CHILDREN 7
<strong>ICAC</strong> Task Force Agency Contacts<br />
Illinois, Cook County<br />
Cook County State’s Attorney’s Office<br />
Jurisdiction: Cook County IL area<br />
Contact: Deputy Chief Kathleen Muldoon<br />
Phone: (773) 674-5887<br />
Email:<br />
Kathleen.Muldoon@cookcountyil.gov<br />
Indiana<br />
Indiana State Police<br />
Jurisdiction: Indiana<br />
Contact: Lieutenant Chuck Cohen<br />
Phone: (317) 232-8309<br />
Email: ccohen@isp.IN.gov<br />
Kansas<br />
Sedgwick County Sheriff’s Office<br />
Jurisdiction: Kansas<br />
Contact: Lieutenant Jeffrey Weible<br />
Phone: (316) 337-6552<br />
Email: jweible@sedgwick.gov<br />
Kentucky<br />
Kentucky State Police<br />
Jurisdiction: Kentucky<br />
Contact: Lieutenant Shane Bates<br />
Phone: (502) 782-9769<br />
Email: shane.bates@ky.gov<br />
Louisiana<br />
Louisiana Department of Justice<br />
Jurisdiction: Louisiana<br />
Contact: Computer Forensic Lab Manager<br />
Corey Bourgeois<br />
Phone: (225) 326-6133<br />
Email: bourgeoisc@ag.state.la.us<br />
Massachusetts<br />
Massachusetts State Police<br />
Jurisdiction: Massachusetts<br />
Contact: Sergeant Michael Hill<br />
Phone: (413) 499-1112 x313<br />
Email: michael.hill@state.ma.us<br />
Maryland<br />
Maryland State Police<br />
Jurisdiction: Maryland<br />
Contact: Lieutenant John Wilhelm<br />
Phone: (410) 953-8260<br />
Email: jwilhelm@mdsp.org<br />
Maine<br />
Maine State Police<br />
Jurisdiction: Maine<br />
Contact: Sergeant Glenn Lang<br />
Phone: (207) 877-8081<br />
Email: glang@mcctf.org<br />
Michigan<br />
Michigan State Police<br />
Jurisdiction: Michigan<br />
Contact: Detective Sergeant Jay<br />
Poupard<br />
Phone: (517) 336-<strong>2012</strong><br />
Email: poupardj@michigan.gov<br />
Minnesota<br />
Minnesota Bureau of Criminal<br />
Apprehension<br />
Jurisdiction: Minnesota<br />
Contact: Senior Special Agent<br />
Donald Cheung<br />
Phone: (651) 793-1072<br />
Email: donald.cheung@state.mn.us<br />
Missouri<br />
St. Charles County Sheriff’s<br />
Department<br />
Jurisdiction: Missouri<br />
Contact: Lieutenant Chris Mateja<br />
Phone: (636) 949-3020 x4604<br />
Email: cmateja@sccmo.org<br />
Mississippi<br />
Mississippi Office of Attorney<br />
General<br />
Jurisdiction: Mississippi<br />
Contact: Assistant AG Jean Vaughan<br />
Phone: (601) 359-3817<br />
Email: jvaug@ago.state.ms.us<br />
Montana<br />
Billings Police Department<br />
Jurisdiction: Montana<br />
Contact: Director of Task Force<br />
Operations Tim West<br />
Phone: (406) 896-3295<br />
Email: westt@ci.billings.mt.us<br />
North Carolina<br />
North Carolina State Bureau of<br />
Investigation<br />
Jurisdiction: North Carolina<br />
Contact: SAIC Kelly Moser<br />
Phone: (919) 779-8131<br />
Email: kmoser@ncdoj.gov<br />
North Dakota<br />
North Dakota Bureau of Criminal<br />
Investigation<br />
Jurisdiction: North Dakota<br />
Contact: Chief Agent Lonnie Grabowska<br />
Phone: (701) 328-5530<br />
Email: lgrabowska@nd.gov<br />
Nebraska<br />
Nebraska State Patrol<br />
Jurisdiction: Nebraska<br />
Contact: Sergeant Eric Jones<br />
Phone: 402479-4080<br />
Email: eric.jones@nebraska.gov<br />
New Hampshire<br />
Portsmouth Police Department<br />
Jurisdiction: New Hampshire<br />
Contact: Captain Corey MacDonald<br />
Phone: (603) 610-7548<br />
Email:<br />
cmacdonald@cityofportsmouth.com<br />
New Jersey<br />
New Jersey State Police<br />
Jurisdiction: New Jersey<br />
Contact: Det. Sgt. First Class Joseph<br />
Glennan<br />
Phone: (609) 584-5051 x 5604<br />
Email: lpp4695@gw.njsp.org<br />
New Mexico<br />
New Mexico Attorney General’s Office<br />
Jurisdiction: New Mexico<br />
Contact: Special Agent in Charge<br />
Anthony Maez<br />
Phone: 505222-9161<br />
Email: amaez@nmag.gov<br />
8 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>ICAC</strong> Task Force Agency Contacts<br />
Nevada<br />
Las Vegas Metropolitan Police<br />
Department<br />
Jurisdiction: Nevada<br />
Contact: Sergeant Mike Mauntel<br />
Phone: (702) 828-5677<br />
Email: M5318M@LVMPD.COM<br />
New York<br />
New York State Police<br />
Jurisdiction: New York<br />
Contact: Captain Frank Pace<br />
Phone: (518) 485-2953<br />
Email: frank.pace@troopers.ny.gov<br />
New York<br />
New York City Police Department<br />
Jurisdiction: New York City NY area<br />
Contact: Sergeant Felix Rivera<br />
Phone: (646) 610-6785<br />
Email: felix.rivera@nypd.org<br />
Ohio<br />
Cuyahoga County Prosecutor’s Office<br />
Jurisdiction: Ohio<br />
Contact: APA Brett Kyker<br />
Phone: (216) 698-2229<br />
Email: bkyker@cuyahogacounty.us<br />
Oklahoma<br />
Oklahoma State Bureau of Investigation<br />
Jurisdiction: Oklahoma<br />
Contact: Special Agent in Charge Steve<br />
Tanner<br />
Phone: (405) 879-2613<br />
Email: steve.tanner@osbi.ok.gov<br />
Oregon<br />
Oregon Department of Justice<br />
Jurisdiction: Oregon<br />
Contact: Special Agent in Charge Ken<br />
Rueben<br />
Phone: (503) 378-6347<br />
Email: ken.rueben@doj.state.or.us<br />
Pennsylvania<br />
Delaware County<br />
District Attorney’s Office<br />
Jurisdiction: Pennsylvania<br />
Contact: Lieutenant Dave Peifer<br />
Phone: (610) 891-4709<br />
Email: paicac@gmail.com<br />
Rhode Island<br />
Rhode Island State Police<br />
Jurisdiction: Rhode Island<br />
Contact: Lieutenant Nicholas Tella<br />
Phone: (401) 275-5171<br />
Email: ntella@risp.dps.ri.gov<br />
South Carolina<br />
SC Attorney General’s Office<br />
Jurisdiction: South Carolina<br />
Contact: AAG Deborah Shupe<br />
Phone: (803) 734-3797<br />
Email: dshupe@scag.gov<br />
South Dakota<br />
South Dakota Division of Criminal<br />
Investigation<br />
Jurisdiction: South Dakota<br />
Contact: Special Agent Troy Boone<br />
Phone: 605677-7231<br />
Email: Troy.Boone@state.sd.us<br />
Tennessee<br />
Knoxville Police Department<br />
Jurisdiction: Tennessee<br />
Contact: Captain Monty Houk<br />
Phone: (865) 215-7020<br />
Email: mhouk@cityofknoxville.org<br />
Texas, Southern<br />
Office of the Attorney General of Texas<br />
Jurisdiction: Southern TX area<br />
Contact: Captain, Criminal Investigations<br />
Jeff Eckert<br />
Phone: 512936-2914<br />
Email: jeff.eckert@oag.state.tx.us<br />
Texas<br />
(HM) Pasadena Independent School District<br />
Jurisdiction: Houston Metro TX area<br />
Contact: Lieutenant Matt Gray<br />
Phone: (713) 740-0045<br />
Email: mgray@hmicac.org<br />
Texas, Dallas<br />
Dallas Police Department<br />
Jurisdiction: Dallas TX area<br />
Contact: Lieutenant Sally Lannom<br />
Phone: (214) 671-4201<br />
Email: sally.lannom@dpd.ci.dallas.tx.us<br />
Utah<br />
Utah Office of Attorney General<br />
Jurisdiction: Utah<br />
Contact: Section Chief Jessica Farnsworth<br />
Phone: (801) 580-4165<br />
Email: jfarnsworth@utah.gov<br />
Virginia<br />
Virginia State Police<br />
Jurisdiction: Northern VA and<br />
Washington DC<br />
Contact: Captain Kirk Marlowe<br />
Phone: (804) 674-2767<br />
Email: kirk.marlowe@vsp.virginia.gov<br />
Virginia<br />
Bedford County Sheriff’s Office<br />
Jurisdiction: Southern VA<br />
Contact: Lieutenant Mike Harmony<br />
Phone: (434) 534-9521 x221<br />
Email: mharmony@bedfordsheriff.org<br />
Vermont<br />
Burlington Police Department<br />
Jurisdiction: Vermont<br />
Contact: Lieutenant Kristian (Kris) Carlson<br />
Phone: (802) 540-2202<br />
Email: kcarlson@bpdvt.org<br />
PARTNERS IN PROTECTING CHILDREN 9
<strong>ICAC</strong> Task Force Agency Contacts<br />
Washington<br />
Seattle Police Department<br />
Jurisdiction: Washington<br />
Contact: Captain James Koutsky<br />
Phone: (206) 684-4351<br />
Email: james.koutsky@seattle.gov<br />
Wisconsin<br />
Wisconsin Department of Justice<br />
Jurisdiction: Wisconsin<br />
Contact: Special Agent in Charge Jenniffer Price<br />
Phone: (608) 267-1326<br />
Email: priceje@doj.state.wi.us<br />
West Virginia<br />
West Virginia State Police<br />
Jurisdiction: West Virginia<br />
Contact: First Sergeant Christopher Casto<br />
Phone: (304) 293-6401<br />
Email: cmcasto@wvsp.state.wv.us<br />
Wyoming<br />
Wyoming Division of Criminal Investigation<br />
Jurisdiction: Wyoming<br />
Contact: Special Agent Robert Leazenby<br />
Phone: (307) 777-5437<br />
Email: Robert.leazenby@wyo.gov<br />
10 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Operation Laminar<br />
This case study involves the investigation of individuals and groups on the<br />
social networking site Facebook who are involved in the dissemination of<br />
materials involving the visual depiction of minors engaged in sexually<br />
explicit conduct. This presentation will cover case overview, investigative<br />
techniques, international concerns and prosecutorial issues.<br />
Learn more about Operation Laminar<br />
Check your schedule for the day and time<br />
that this Lab-Based <strong>Training</strong> will be offered.<br />
PARTNERS IN PROTECTING CHILDREN 11
12 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>Training</strong> Event Information<br />
Thank you for joining us at the <strong>2012</strong> <strong>National</strong> <strong>Law</strong> <strong>Enforcement</strong> <strong>Training</strong> on <strong>Child</strong> Exploitation, the largest event in<br />
the nation that provides training related to Internet crimes against children to law enforcement.<br />
Throughout the event, we will continue to emphasize the importance of cooperation and collaboration between<br />
federal, state, tribal and local investigators and prosecutors. <strong>Training</strong> will focus on the investigation of Internet<br />
crimes against children and techniques that will help lead to the successful prosecution of these horrific crimes.<br />
SPECIAL EVENTS:<br />
Opening Ceremony - Centennial Ballroom<br />
Tuesday, April 17: 8:00 am – 8:45 am<br />
Plenary Session - Centennial Ballroom<br />
Tuesday, April 17: 2:00 pm - 3:30 pm<br />
Visiting Atlanta<br />
Make the most of your visit to Atlanta, a wonderful city with lots to offer.<br />
Visit the concierge at the hotel lobby or log onto www.atlanta.net.<br />
PARTNERS IN PROTECTING CHILDREN 11
Local Restaurants - (sorted by distance)<br />
Downtown Restaurants<br />
Name Address Phone Distance<br />
Sway (Hyatt Regency Atlanta) 265 Peachtree Street NE 404-577-1234 0 ft<br />
The Market (Hyatt Regency Atlanta) 265 Peachtree Street, NE 404-577-1234 0 ft<br />
Twenty-Two Storys (Hyatt Regency Atlanta) 265 Peachtree Street, N.E. 404-577-1234 0 ft<br />
Ray's in the City 240 Peachtree Street 404-524-9224 366 ft S<br />
Chick-fil-A at Peachtree Center 233 Peachtree Street 404-577-4194 431 ft SE<br />
High Velocity (Atlanta Marriott Marquis) 265 Peachtree Center Avenue 404-586-6174 443 ft E<br />
Willy's Mexicana Grill 235 Peachtree Street NE 404-524-0821 443 ft S<br />
Sear (Atlanta Marriott Marquis) 265 Peachtree Center Avenue 404-586-6134 445 ft E<br />
Max Lager's Wood-Fired Grill & Brewery 320 Peachtree Street NE 404-525-4400 0.1 mi N<br />
Morton's The Steakhouse 303 Peachtree Center Ave. 404-577-4366 0.1 mi NE<br />
Pacific Rim Bistro 303 Peachtree Center Avenue 404-893-0018 0.1 mi NE<br />
Azio Restaurant - Peachtree Center 229 Peachtree Street 404-222-0808 0.1 mi S<br />
Benihana Japanese Steakhouse Restaurant 229 Peachtree Street, N.E. 404-522-9629 0.1 mi S<br />
Durango Oak Fire Steakhouse 230 Peachtree Street, NW 404-222-0103 0.1 mi S<br />
Hard Rock Café 215 Peachtree Street, N.E. 404-688-7625 0.1 mi S<br />
Metro Cafe Diner 229 Peachtree Street 404-577-1420 0.1 mi S<br />
Pittypat's Porch Restaurant 25 Andrew Young International Blvd. 404-525-8228 0.1 mi S<br />
Subway 225 Peachtree St., NE 404-524-1782 0.1 mi S<br />
Gibney's Pub 231 Peachtree Center Avenue 404-688-0928 0.1 mi SE<br />
Nikolai's Roof (Hilton Atlanta) 255 Courtland Street, N.E. 404-221-6362 0.2 mi E<br />
BLT STEAK-Bistro Laurent Tourondel 45 Ivan Allen, Jr. Boulevard 404-577-7601 0.2 mi NW<br />
Agatha's -- A Taste of Mystery 161 Peachtree Center Ave 404-584-2255 0.2 mi S<br />
Atlanta Grill (Ritz-Carlton, Atlanta) 181 Peachtree Street, N.W. 404-221-6550 0.2 mi S<br />
Cafe Intermezzo at Carnegie 141 Carnegie Way 404-844-5577 0.2 mi S<br />
Meehan's Public House 200 Peachtree Street 404-214-9821 0.2 mi S<br />
Sun Dial Restaurant, Bar and View 210 Peachtree St., NW 404-589-7506 0.2 mi S<br />
Sweet Georgia's Juke Joint 200 Peachtree St 404-230-5853 0.2 mi S<br />
The Terrace 176 Peachtree Street 404-523-5155 0.2 mi S<br />
Fandangles Restaurant & Martini Bar Sheraton Atlanta Hotel 404-659-6500 0.2 mi SE<br />
HSU's Gourmet Chinese Restaurant 192 Peachtree Center Avenue 404-659-2788 0.2 mi SE<br />
Truva 60 Andrew Young International Blvd 404-577-8788 0.2 mi SE<br />
Room at Twelve Hotel 400 W. Peachtree St. 404-418-1250 0.3 mi N<br />
Ted's Montana Grill 133 Luckie Street 404-521-9796 0.3 mi SW<br />
Johnny Rockets Underground Atlanta 50 Upper Alabama Street 404-525-7117 0.5 mi N<br />
Dania's Restaurant 26 Peachtree St 404-588-0069 0.5 mi S<br />
McDonald's 35 Forsynth Street 404-584-9483 0.5 mi SW<br />
Baja Fresh 250 Park Avenue West NW 404-681-2252 0.5 mi W<br />
The Marketplace (Hilton Atlanta) 255 Courtland Street, N.E. 404-659-2000 0.6 mi NE<br />
12 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>Training</strong> Event Information<br />
General Information:<br />
As a courtesy to other attendees, we request your<br />
cooperation with the following guidelines during the<br />
training:<br />
• Please silence your mobile devices during all<br />
sessions.<br />
• Please arrive on time for all sessions.<br />
• Please fill the seats in the front to make room for<br />
late arrivals.<br />
• If the workshop is filled to capacity, please check<br />
to see if it is offered at a later time or attend your<br />
second choice workshop.<br />
Your name badge is your admission to all<br />
sessions and must be worn at all times. If you<br />
misplace your badge, you will be required to<br />
show a photo ID at the registration desk to<br />
obtain a new badge. Please carry your photo<br />
ID with you at all times.<br />
All classroom-based training sessions will be filled on<br />
a “first come, first served” basis. Lab-based training<br />
session seats are pre-assigned based on attendee<br />
pre-registration; however, any vacant seats will be<br />
allocated to the first requestors on the day and at the<br />
time the session is scheduled. Information with regard<br />
to open lab sessions will be made available at the onsite<br />
registration area.<br />
Special Events:<br />
Opening Ceremony - Centennial Ballroom<br />
Tuesday, April 17: 8:00 am – 8:45 am<br />
Plenary Session - Centennial Ballroom<br />
Tuesday, April 17: 2:00 pm - 3:30 pm<br />
Check-in and <strong>On</strong>site<br />
Eligibility and Check-in:<br />
This training is limited to agencies who handle Internet<br />
crimes against children related cases and other invited<br />
guests. All registrants of the <strong>National</strong> <strong>Law</strong> <strong>Enforcement</strong><br />
<strong>Training</strong> on <strong>Child</strong> Exploitation must check-in at the<br />
registration desk, located in front of the Grand Hall<br />
at the Hyatt Regency Atlanta to pick up a name badge<br />
and other materials.<br />
<strong>On</strong>site Registration:<br />
Eligible participants will be able to register onsite. Lab<br />
pre-registration will not be available onsite; however,<br />
lab seats not reserved during pre-registration will be<br />
filled on a “first come, first served” basis on the day and<br />
at the time the session is scheduled.<br />
Eligible participants who register onsite will also<br />
be allowed to attend any lecture session. While<br />
participants will be allowed into sessions, there is<br />
no guarantee that onsite registrants will be provided<br />
materials as they are available on a limited basis.<br />
PARTNERS IN PROTECTING CHILDREN 13
<strong>Training</strong> Event Information<br />
Check-in & <strong>On</strong>site Registration<br />
Hours:<br />
Sunday, April 15: 3:00 pm – 7:00 pm<br />
Monday, April 16: 7:00 am – 8:30 am<br />
3:00 pm – 7:00 pm<br />
Tuesday, April 17: 6:30 am – 5:00 pm<br />
Wednesday, April 18: 7:30 am – 5:00 pm<br />
Thursday, April 19: 7:30 am – 5:00 pm<br />
Certificates:<br />
Certificates of training will be available for pick up<br />
at the registration desk, located in front of the Grand<br />
Hall, on Thursday, April 19. Pre-Event Certificates<br />
will be distributed Monday, April 16th, from 5:00<br />
pm - 7:00 pm. Attendees must complete an overall<br />
training evaluation prior to receiving their certificate.<br />
Additionally, attendees who attended a lab-based<br />
training session may request a certificate for each<br />
lab completed via our online service. Additional<br />
information will be provided during the lab session.<br />
Exhibitor Hours/Location:<br />
The exhibitors are located in the Grand Hall West of<br />
the Hyatt Regency Atlanta.<br />
Exhibitor Hours:<br />
Monday, April 16: 12:00 pm – 4:00 pm<br />
(Exhibitor set up only)<br />
Tuesday, April 17: 7:00 am – 5:30 pm<br />
Wednesday, April 18: 7:00 am – 5:30 pm<br />
Thursday, May 19: 7:00 am – 5:30 pm<br />
Speaker Information:<br />
All speakers should check-in at the Speaker registration<br />
desk, located in front of the Grand Hall, to pick up<br />
their name badge and materials.<br />
Speaker Registration Hours:<br />
Sunday, April 15: 3:00 pm – 7:00 pm<br />
Monday, April 16: 7:00 am – 8:30 am<br />
3:00 pm – 7:00 pm<br />
Tuesday, April 17: 6:30 am – 5:00 pm<br />
Wednesday, April 18: 7:30 am – 5:00 pm<br />
Thursday, April 19: 7:30 am – 5:00 pm<br />
Speaker Ready Room:<br />
There will be a Speaker Ready Room located in Chicago<br />
A of the Hyatt Regency Atlanta for the duration of the<br />
training.<br />
Speakers can check-in here if they need assistance with<br />
their presentation or have concerns about audiovisual<br />
equipment. Staff will be available in an adjacent room<br />
to respond to questions.<br />
<strong>Training</strong> Site Information:<br />
Hyatt Regency Atlanta<br />
265 Peachtree Street NE<br />
Atlanta, GA 30303<br />
Phone: 404-577-1234<br />
14 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>Training</strong> Event Information<br />
Public Transportation:<br />
There are several options to get to and from the<br />
airport.<br />
Shuttle:<br />
Go to the transportation booth at the airport and<br />
ask for a shuttle to the appropriate hotel. The hotels<br />
recommend The Atlanta Airport Shuttle Service<br />
(T.A.A.S.S.), at 404-941-3440. No reservations<br />
are necessary for arranging transportation from the<br />
Atlanta Airport to the hotel. It runs 6 a.m. to midnight<br />
from the airport and leaves the hotel every 10 and 40<br />
minutes after the hour. $16.50 one way/$29 round<br />
trip per person.<br />
Taxi Service:<br />
To/From airport fee: $30.00 plus $2.00 per each<br />
additional person. Taxi service within downtown<br />
Atlanta has an $8.00 minimum.<br />
M.A.R.T.A.<br />
(Metro Atlanta Rapid Transit Authority):<br />
$2.50 per ride. Rail system runs approx every 10<br />
minutes. The Hyatt Regency Atlanta is connected to<br />
Peachtree Center Train Station via Peachtree Center<br />
Mall.<br />
The Hilton Atlanta Downtown has direct covered<br />
access via pedestrian sky bridge to the MARTA transit<br />
station.<br />
Parking:<br />
Parking is available at the Hyatt Regency Atlanta<br />
(indoor valet) with in/out privileges, for a cost of<br />
$29 for 6-24 hours. (There is no self-service parking<br />
available.) Vehicles with clearance over 7’, oversized<br />
vans, Winnebagos and buses cannot be accommodated<br />
in the hotel parking lot. Local open-air lots can be<br />
recommended. Contact the Hyatt Concierge at<br />
404-460-6437. Additional parking is located in the<br />
SunTrust building, 1/2 block from the hotel.<br />
Press<br />
All members of the press should check in at the<br />
Registration booth in front of the Grand Hall. All<br />
members of the press are required to wear a Press ID<br />
badge.<br />
PARTNERS IN PROTECTING CHILDREN 15
New <strong>ICAC</strong> Task Force Website<br />
The <strong>ICAC</strong> Task Force Program launches its new web site!<br />
www.icactaskforce.org<br />
The <strong>ICAC</strong> Task Force web site contains links to <strong>ICAC</strong> training provider course information, news,<br />
upcoming events and discussion forums, plus a library containing valuable resource material that is<br />
available to all <strong>ICAC</strong> Task Force and Affiliate agency members who become members of this web site.<br />
At the conclusion of this training event, all registered attendees will be sent a link to access the speaker<br />
presentation materials that will also be posted to this site.<br />
16 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>Training</strong> Event Information - Floor Plan<br />
This map shows the various levels in the Hyatt Regency Atlanta Convention, Meeting and Event Facilities.<br />
The following maps will illustrate where our specific sessions will be held.<br />
PARTNERS IN PROTECTING CHILDREN 17
<strong>Training</strong> Event Information - Floor Plan<br />
18 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>Training</strong> Event Information - Floor Plan<br />
PARTNERS IN PROTECTING CHILDREN 19
20 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Operation Minotaur -<br />
A Collaborative Success<br />
“Operation Minotaur” is multi-agency, multi-state investigation<br />
responsible for dismantling a network of individuals dedicated to sexually<br />
abusing children and trafficking in child pornography. Members of the<br />
group used the Internet to communicate with minors and other members<br />
and also travelled extensively to meet one another and abuse children<br />
under their control. To date, 18 defendants in 11 states have been charged<br />
with state and/or federal violations. 26 victims have been identified,<br />
including several rescued from on-going sexual abuse. The entire operation<br />
stemmed from a single Cybertip from the <strong>National</strong> Center for Missing and<br />
Exploited <strong>Child</strong>ren (NCMEC) in the summer of 2008.<br />
Learn more about Opertion Minotaur<br />
at the Plenary Session on Tuesday, April 17th 2:00 pm - 3:30 pm.<br />
PARTNERS IN PROTECTING CHILDREN 21
22 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Opening Ceremony<br />
Tuesday, April 17, <strong>2012</strong><br />
8:00 am – 8:45 am<br />
Centennial Ballroom<br />
Presentation of Colors Honor Guard, Atlanta Police Department<br />
<strong>National</strong> Anthem Evan Arnold<br />
Clayton County <strong>Child</strong>ren’s Touring Choir<br />
Welcome and Opening Melodee Hanes, Acting Administrator<br />
Remarks Office of Juvenile Justice and Delinquency Prevention<br />
Remarks Vernon Keenan, Director<br />
Georgia Bureau of Investigation<br />
Leigh H. Winchell, Assistant Director<br />
<strong>Home</strong>land Security Investigations<br />
Immigration and Customs <strong>Enforcement</strong><br />
Postal Representative<br />
Teresa Thome, Deputy Chief Inspector<br />
United States Postal Inspection Service<br />
Steven R. Chabinsky, Deputy Assistant Director<br />
Federal Bureau of Investigation<br />
Mark D. Clookie, Director<br />
Naval Criminal Investigative Service<br />
Introduction of the Sally Quillian Yates<br />
Keynote Speaker United States Attorney<br />
Northern District of Georgia<br />
Keynote Address The Honorable James Cole<br />
Deputy Attorney General of the United States<br />
PARTNERS IN PROTECTING CHILDREN 21
Plenary Session<br />
Tuesday, April 17, <strong>2012</strong><br />
2:00 pm – 3:30 pm<br />
Centennial Ballroom<br />
Introduction of David Gappa<br />
the Plenary Session <strong>Child</strong> Exploitation, Cyber, and Intellectual Property<br />
Issues Coordinator<br />
Executive Office for U.S. Attorneys<br />
Plenary Speakers Operation Minotaur: A Collaborative Success<br />
Inspector Brian Bone<br />
United States Postal Inspection Service<br />
Assistant United States Attorney Anne Gannon<br />
U.S. Attorney’s Office,<br />
Central District of California, Santa Ana Office<br />
Special Agent Kelly Kottas<br />
Immigration and Customs <strong>Enforcement</strong>,<br />
<strong>Home</strong>land Security Investigations<br />
Investigator Wade Walsvick<br />
Orange County Sheriff’s Department<br />
22 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Opening Ceremony & Plenary Session Biographies<br />
James Cole<br />
Deputy Attorney General of the United States<br />
James Cole was sworn in as the Deputy Attorney General on Monday, January 3, 2011. Mr. Cole first joined the<br />
Department in 1979 as part of Attorney General’s Honors Program and served for 13 years - first as a trial attorney<br />
in the Criminal Division, and later as the Deputy Chief of the Division’s Public Integrity Section, the office that<br />
handles investigation and prosecution of corruption cases against officials, and employees at all levels of government.<br />
At Public Integrity Mr. Cole tried a number of notable cases, including prosecution of a U.S. District Judge, a<br />
member of Congress, and a federal prosecutor.<br />
He entered private practice in 1992 and was a partner at Bryan Cave LLP from 1995 to 2010, specializing in white<br />
collar defense. He served as a court-appointed independent monitor to a large insurance company to establish and<br />
oversee corporate compliance programs and ensure it adhered to laws and regulations. He also counseled businesses<br />
on securities, regulatory, and criminal law issues.<br />
While in private practice in 1995, Mr. Cole was tapped to serve as Special Counsel to the U.S. House of Representatives<br />
Committee on Standards of Official Conduct. In that role, he led an investigation into allegations that former House<br />
Speaker Newt Gingrich had improperly used tax-exempt money for partisan purposes and misled the Committee in<br />
its inquiry. His investigation led to a bipartisan resolution that was approved by an overwhelming majority of the full<br />
House, and resulted in a formal reprimand of Speaker Gingrich and a requirement that he pay penalties.<br />
Mr. Cole has been a member of the adjunct faculty at Georgetown University <strong>Law</strong> Center, teaching courses on public<br />
corruption law and legal ethics, and has lectured at Harvard University’s Kennedy School of Government. He is a<br />
former chair of the American Bar Association (ABA) White Collar Crime Committee and served as the Chair Elect<br />
of the ABA Criminal Justice Section. He received his B.A. from the University of Colorado and his J.D. from the<br />
University of California-Hastings.<br />
PARTNERS IN PROTECTING CHILDREN 23
Opening Ceremony & Plenary Session Biographies<br />
Sally Quillian Yates<br />
United States Attorney<br />
Northern District of Georgia<br />
Sally Quillian Yates was nominated by President Obama to serve as United States Attorney for the Northern District<br />
of Georgia. Confirmed by the Senate on March 10, 2010, she is the first woman to serve as United States Attorney<br />
in the Northern District of Georgia. As the chief federal law enforcement official for the district, she oversees the<br />
prosecution of all federal crimes and the litigation of civil matters in which the government has an interest in a district<br />
encompassing over 6 million residents. She supervises a staff of approximately 95 lawyers and 80 support personnel.<br />
In May, 2010, Attorney General Holder appointed Ms. Yates to serve on the Attorney General’s Advisory Committee.<br />
Created in 1973, the Committee represents the voice of the U.S. Attorneys and provides advice and counsel to the<br />
Attorney General on policy, management and operational issues impacting the Department of Justice.<br />
Ms. Yates has spent most of her professional career in public service and has 22 years of prosecutorial experience in<br />
the U. S. Attorney’s office. Prior to her appointment as U. S. Attorney, Ms. Yates served as the First Assistant United<br />
States Attorney for approximately seven years, and from 1994 to 2002, she was the Chief of the Fraud and Public<br />
Corruption Section of the office where she supervised the prosecution of all of the office’s white collar cases. Ms.<br />
Yates is an experienced trial lawyer and has prosecuted a wide variety of complex matters, specializing in public<br />
corruption cases. She was also the lead prosecutor in the Atlanta prosecution of Olympic bomber Eric Rudolph.<br />
Ms. Yates is a Fellow in the American College of Trial <strong>Law</strong>yers.<br />
Prior to joining the United States Attorney’s Office, Ms. Yates practiced with King & Spalding in commercial litigation.<br />
She graduated magna cum laude from the University of Georgia School of <strong>Law</strong> in 1986.<br />
24 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Opening Ceremony & Plenary Session Biographies<br />
Melodee Hanes<br />
Acting Administrator<br />
Office of Juvenile Justice and Delinquency Prevention<br />
Melodee Hanes is the Acting Administrator in the Office of Juvenile Justice and Delinquency Prevention (OJJDP).<br />
Ms. Hanes previously served as Acting Deputy Administrator for Policy from June 2009, when she was appointed to<br />
the position by President Barack Obama, to January <strong>2012</strong>.<br />
Ms. Hanes’ 30-year career in public service and law includes work as a deputy county attorney in the Yellowstone<br />
County (MT) Attorney’s Office, prosecuting child abuse, sexual assault, and homicide cases. She also served as an<br />
assistant county attorney in the Polk County (IA) Attorney’s Office, prosecuting major felony crimes. Ms. Hanes<br />
prosecuted the first child endangerment case in Polk County under Iowa Code Chapter 726 and handled more than<br />
100 child abuse prosecutions during her tenure. In addition, she developed and coordinated the Polk County <strong>Child</strong><br />
Abuse Trauma Team and <strong>Child</strong> Death Review Team.<br />
Ms. Hanes taught child abuse law and forensic medicine and law at Drake University <strong>Law</strong> School. She has lectured<br />
extensively and published in these areas of expertise. She also served on the faculty of the <strong>National</strong> District Attorneys<br />
Association’s <strong>National</strong> Advocacy Center in Columbia, SC, and the <strong>Child</strong> Protection <strong>Training</strong> Academy in Des Moines,<br />
IA.<br />
In 1991, then-State Senator Elaine Szymoniak (D–IA) appointed Ms. Hanes as chairperson of Iowa’s Special Infant<br />
Mortality Task Force, which led to the creation of the Infant Mortality Prevention Project through the state’s<br />
Department of Public Health. The project provided services and resources to the community with the objective of<br />
reducing the high rate of infant mortality in Polk County.<br />
Before joining the Justice Department in 2009, Ms. Hanes served as state director and counsel in the office of U.S.<br />
Senator Max Baucus (D–MT).<br />
Ms. Hanes earned a bachelor’s degree in women’s studies from the University of Utah and a law degree from the<br />
Drake University <strong>Law</strong> School.<br />
PARTNERS IN PROTECTING CHILDREN 25
Opening Ceremony & Plenary Session Biographies<br />
Steven R. Chabinsky<br />
Deputy Assistant Director<br />
Federal Bureau of Investigation<br />
Mr. Chabinsky serves as Deputy Assistant Director within the FBI’s Cyber Division. The Cyber Division centrally<br />
manages a number of programs, to include all FBI investigative and intelligence efforts focused on apprehending<br />
and prosecuting online child predators, combating the global production, distribution, and possession of child<br />
pornography, and identifying, rescuing, and assisting the victims of these crimes.<br />
Prior to his current position, Mr. Chabinsky served as Chief of the FBI’s Cyber Intelligence Section, where he<br />
organized and led the FBI’s analysis and reporting on cyber threat issues.<br />
26 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Opening Ceremony & Plenary Session Biographies<br />
Mark D. Clookie<br />
Director<br />
Naval Criminal Investigative Service<br />
Mark D. Clookie became the fourth civilian Director of the Naval Criminal Investigative Service (NCIS) on February<br />
14, 2010, having been appointed by the Honorable Ray Mabus, Secretary of the Navy.<br />
As NCIS Director, Mr. Clookie leads the agency as it investigates and defeats terrorist, foreign intelligence, and<br />
criminal threats to the United States Marine Corps and Navy wherever they operate: ashore, afloat, or in cyberspace.<br />
Mr. Clookie’s areas of special emphasis include strengthening human, analytic, and technological capabilities,<br />
developing and maintaining strong partnerships and liaison with law enforcement, security services, and intelligence<br />
agencies worldwide, and providing agile, adaptive, and responsive support to the Department of the Navy’s enhanced<br />
security posture and global engagements.<br />
Prior to his selection as Director, Mr. Clookie served as the Executive Assistant D rector for Combating Terrorism<br />
with duties overseeing worldwide offensive and defensive operations to detect, deter and disrupt terrorist activities<br />
directed at Department of the Navy personnel (Sailors, Marines, civilians and families), installations, and weapons<br />
systems.<br />
A career NCIS Special Agent (SA), Mr. Clookie began serving the Department of the Navy in March 1982 at the<br />
Resident Agency (RA) in Newport, RI. In June of 1987, SA Clookie began a series of tours in Washington, DC:<br />
Headquarters Desk Officer, representative to the Office of the Naval Inspector General, and Assistant Special Agent<br />
in Charge of the Washington Fraud Unit.<br />
From July 1993 until December 1995, SA Clookie was the Resident Agent in Charge of the NCIS RA in Bahrain.<br />
After this tour, he assumed duties as the Assistant Special Agent in Charge of the NCIS Northeast Field Office until<br />
June 1998.<br />
PARTNERS IN PROTECTING CHILDREN 27
Opening Ceremony & Plenary Session Biographies<br />
Teresa Thome<br />
Deputy Chief Inspector of the Eastern Field<br />
Operations in the U. S. Postal Inspection Service<br />
Teresa Thome is currently the Deputy Chief Inspector of the Eastern Field Operations in the U. S. Postal Inspection<br />
Service (USPIS). Deputy Chief Thome’s responsibilities include oversight of over 1,200 employees and she also<br />
serves on her agency’s Executive Committee. Her personnel enforce over 200 federal laws covering investigations of<br />
crimes that adversely affect or entail criminal misuse of the U.S. Mail or postal system.<br />
Deputy Chief Thome was first assigned as Postal Inspector to the Los Angeles Division where she worked narcotics,<br />
security, and mail fraud investigations. Deputy Chief Thome has served as Assistant Inspector in Charge of the<br />
New York Division and Inspector in Charge of the Philadelphia Division. She has received several awards including<br />
the U.S. Trustee’s “Director’s Award” for Public Service. Deputy Chief Thome is a member of several professional<br />
organizations and currently serves on the Advisory Council for the Research Center on the Prevention of Financial<br />
Fraud<br />
28 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Opening Ceremony & Plenary Session Biographies<br />
Leigh Winchell<br />
Assistant Director, Investigative Programs<br />
Immigration and Customs <strong>Enforcement</strong>,<br />
<strong>Home</strong>land Security Investigations<br />
Mr. Winchell began his law enforcement career in 1984 as a Deputy Sheriff in Richland County, South<br />
Carolina. In 1987, he was hired by the U.S. Customs Service as a criminal investigator and assigned to Key<br />
West, Florida. Mr. Winchell was promoted to Special Agent in 1988 and reassigned to Grand Rapids, Michigan.<br />
In 1997, Mr. Winchell was again promoted, to Group Supervisor, and transferred to Nogales, Arizona. He transferred<br />
to U.S. Customs Service Headquarters in Washington D.C. in late 1999 and became an Operations Manager with<br />
direct oversight of several field offices. Mr. Winchell subsequently became Director, Special Operations Division<br />
in 2000 where he held principal responsibility for leading a large group of agents from the U.S. Customs Service,<br />
the Drug <strong>Enforcement</strong> Administration, the Federal Bureau of Investigation, and the Internal Revenue Service.<br />
In 2002 to <strong>2012</strong>, Mr. Winchell served as the Special Agent in Charge (SAC) for the Legacy U.S. Customs Service and<br />
subsequently the U.S. Immigration and Customs <strong>Enforcement</strong> (ICE), <strong>Home</strong>land Security Investigations (HSI). Mr.<br />
Winchell is currently assigned to HSI headquarters serving as the Assistant Director of Investigative Programs.<br />
PARTNERS IN PROTECTING CHILDREN 29
Opening Ceremony & Plenary Session Biographies<br />
Vernon Keenan<br />
Director<br />
Georgia Bureau of Investigation<br />
Vernon Keenan entered law enforcement in 1972 as a uniformed police officer at the DeKalb County, Georgia Police<br />
Department. In 1973, he became a GBI Special Agent assigned to northwest Georgia. During his career in the<br />
GBI, he has been promoted to every sworn rank in the agency. He was appointed GBI Director in January 2003 by<br />
Governor Sonny Perdue and reappointed in January 2011 by Governor Nathan Deal.<br />
As GBI Director, Vernon Keenan is responsible for managing a law enforcement agency of 822 employees with a<br />
budget of $74.6 million. The GBI is the state investigative agency for Georgia. It is comprised of three divisions: the<br />
Georgia Crime Information Center, the Investigative Division and the State Crime Laboratory.<br />
Vernon Keenan has participated in professional programs in Spain, Israel, China, Germany, Turkey, Mexico, the<br />
United Kingdom, and the Republic of Georgia. He serves on several professional working groups at the national<br />
level and is a law enforcement lecturer on various public safety issues.<br />
Vernon M. Keenan graduated from Valdosta State College in 1972 with a Bachelor of Science Degree. He has a<br />
Masters Degree in Public Administration from Columbus State University. Vernon Keenan is a graduate of the FBI<br />
<strong>National</strong> Academy and the Command College of the Georgia Association of Chiefs of Police.<br />
30 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
<strong>Child</strong> Sex Tourism<br />
In 2002, Michael James Dodd was convicted for sexual contact with more<br />
than a dozen children in a school he was working for in Saipan. In 2005 he<br />
was released after making a solemn commitment to his parole board to<br />
never sexually contact children again. In 2008 he traveled to Cambodia and<br />
reoffended with no regard for his victims or his commitment to the parole<br />
board.<br />
Learn more about Case Study: <strong>Child</strong> Sex Tourism<br />
Check your schedule for the day and time<br />
this Lab-Based <strong>Training</strong> will be offered.<br />
PARTNERS IN PROTECTING CHILDREN 31
32 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Daily Activities - Schedule at a Glance<br />
MONDAY TUESDAY WEDNESDAY<br />
7:00 am - 8:30am<br />
Pre-Event Registration<br />
<strong>On</strong>ly Grand Hall<br />
8:30 am – 12:00 pm<br />
Pre-Event <strong>Training</strong><br />
Various - see Workshop<br />
Schedules<br />
12:00 pm – 1:30 pm<br />
Lunch, on your own*<br />
1:30 pm - 5:00 pm<br />
Pre-Event <strong>Training</strong><br />
Various - see Workshop<br />
Schedules<br />
3:00 pm – 7:00 pm<br />
Registration<br />
Grand Hall<br />
*Daily lunch<br />
options:<br />
There are lots of<br />
good restaurants<br />
nearby - View Local<br />
Restaurants in this<br />
program on page 12.<br />
6:30 am - 5:30 pm<br />
Registration<br />
Grand Hall<br />
8:00 am – 8:45 am<br />
Welcome Ceremony<br />
Centennial Ballroom<br />
8:45 am – 9:00 am<br />
Proceed to fi rst session<br />
9:00 am – 10:30 am<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
10:30 am – 11:00 am<br />
Morning Break<br />
11:00 am – 12:30 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
12:30 pm – 2:00 pm<br />
Lunch, on your own*<br />
2:00 pm - 3:30 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
3:30 pm – 4:00 pm<br />
Afternoon Break<br />
4:00 pm - 5:30 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
7:30 am - 5:00 pm<br />
Registration<br />
Grand Hall<br />
8:30 am – 10:00 am<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
10:00 am – 10:30 am<br />
Morning Break<br />
10:30 am – 12:00 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
12:00 pm – 1:30 pm<br />
Lunch, on your own*<br />
1:30 pm - 3:00 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
3:00 pm – 3:30 pm<br />
Afternoon Break<br />
3:30 pm - 5:00 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
THURSDAY<br />
7:30 am - 5:00 pm<br />
Registration<br />
Grand Hall<br />
8:30 am – 10:00 am<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
10:00 am – 10:30 am<br />
Morning Break<br />
10:30 am – 12:00 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
12:00 pm – 1:30 pm<br />
Lunch, on your own*<br />
1:30 pm - 3:00 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
3:00 pm – 3:30 pm<br />
Afternoon Break<br />
3:30 pm - 5:00 pm<br />
Lab and Lecture Sessions<br />
Various - see Workshop<br />
Schedules<br />
PARTNERS IN PROTECTING CHILDREN 31
32 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
The Great Unraveling:<br />
An Oregon based child pornography production ring<br />
This case study examines what investigators initially thought was a “routine”<br />
child pornography search warrant and turned out to be anything but that.<br />
Before the investigation was complete, agents arrested four custodial parents<br />
from three separate families, identified five minor victims, including a<br />
bedridden handicapped child, and disabled an internet based child<br />
pornography trading ring. The presenters will examine the issues encountered<br />
with suspects who were a “typical” middle-class suburban married couple<br />
engaged in the production of child sexual abuse images. This case study<br />
highlights the challenges of the investigation when both spouses are the<br />
abusers, tracing images back to their origin and the pitfalls associated with the<br />
prosecution of all of the involved individuals.<br />
Learn more about The Great Unraveling:<br />
An Oregon Based <strong>Child</strong> Pornography Production Ring<br />
Check your schedule for the day and time<br />
this Lab-Based <strong>Training</strong> will be offered.<br />
PARTNERS IN PROTECTING CHILDREN 33
34 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Lab-based <strong>Training</strong> Workshops<br />
Please Note: <strong>On</strong>ly members of law enforcement are allowed to attend courses identifi ed as <strong>Law</strong><br />
<strong>Enforcement</strong> Sensitive (LES) due to the nature of the content presented<br />
Lab Name<br />
Advanced GigaTribe<br />
Advanced Yahoo! Messenger<br />
Automating Craigslist Investigations<br />
Basic Cell Tower Log Analysis<br />
C4All - Categorization of Images/Movies<br />
Cellular Phone Investigations and Field Tools<br />
Computer Forensics for Prosecutors<br />
Conducting GigaTribe Investigations<br />
Conducting Proactive IRC Investigations<br />
CPS 2 Update<br />
Evidence in Microsoft Windows Registry<br />
Facebook Investigation<br />
Field Previews using PALADIN<br />
Field Search (Introduction)<br />
First Responder--Cell Phone<br />
Forensic Artifacts in P2P Investigations<br />
Forensic Scan 2<br />
Google and Firefox as Investigative Tools<br />
Hand Held GPS Interrogation<br />
iDevice Analysis<br />
ImageScan<br />
Introduction to Apple Computers<br />
Introduction to Field Triage<br />
Introduction to mIRC Investigations<br />
Lab Name<br />
Introduction to Social Networking Sites<br />
Investigations Using RoundUp eMule<br />
Investigative USB Apps<br />
Managing Sex Offenders through Monitoring<br />
Microsoft Windows Live Internet Investigations<br />
NW3C’s TUX4N6 Preview/Triage Tool<br />
osTriage: <strong>On</strong>-Scene Preview Tool<br />
Point and Click Linux Forensics<br />
Roundup Ares<br />
Roundup Update 1.5.X<br />
Searching Computers in the Field<br />
Use of Open-source Tools for WiFi investigations<br />
Using Chat Aggregators in Investigations<br />
Using Google in Your Investigations (Advanced)<br />
Using Google in Your Investigations (Basic)<br />
Using Virtual Machines in an Investigative Capacity<br />
Windows Event Logging<br />
Windows Volume Shadow Copy<br />
Wireless Network Investigations<br />
PARTNERS IN PROTECTING CHILDREN 33
Lab-based <strong>Training</strong> Workshops<br />
Advanced GigaTribe<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Jeff Rich & Eric Zimmerman<br />
This lab-based training will cover advanced tools to<br />
make investigating GigaTribe easier. This class assumes<br />
familiarity with GigaTribe.<br />
Advanced Yahoo! Messenger<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Steve Blackwell & Tony Leonard<br />
This lab-based training will cover both new and lesser<br />
known Yahoo! Messenger features that can play a part<br />
in undercover chat investigations, such as archiving<br />
issues, aliases, video calls, and web-based Yahoo! chat.<br />
Students will also explore the new Conversation<br />
History feature included in YM 11, and examine the<br />
changes it brings to conducting investigations on<br />
Yahoo! Messenger. Students should be familiar with<br />
basic Yahoo! Messenger functions and have at least one<br />
Yahoo! screen name prior to attending this lab.<br />
Automating Craigslist Investigations<br />
180 minutes<br />
Wayne Nichols & Joseph Versace<br />
This course is intended for investigators who wish to<br />
learn a new program that will assist in automating much<br />
of the work that goes into a Craigslist investigation.<br />
The program allows an investigator to enter search<br />
terms for Craigslist categories and automatically<br />
returns postings with those search terms. It then acts<br />
as a case management tool to monitor and report<br />
the communication between the investigator and<br />
the suspect. There is also a proactive element to the<br />
program to assist the investigator who posts ads on<br />
Craigslist.<br />
Basic Cell Tower Log Analysis<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Mark Bowser & Tyler Wotring<br />
Students attending this class will be provided with an<br />
introduction to the analysis of cell tower logs and call<br />
detail records obtained from cell phone providers. The<br />
latest version of NW3C’s PerpHound Tool (3.1) will<br />
be utilized in the analysis and distributed to students.<br />
This course will consist of lectures and numerous<br />
hands-on practical exercises with pre and post testing.<br />
C4All - Categorization of Images/Movies<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Trevor Fairchild & Doug Lockhart<br />
This course will instruct investigators/forensic<br />
persons on the use of C4All, a program created by<br />
Trevor Fairchild of the <strong>On</strong>tario Provincial Police,<br />
E-Crime Section, in 2004. C4All is a program freely<br />
distributed to law enforcement that can drastically<br />
reduce the effort of viewing and categorizing images<br />
and movies in a child pornography investigation.<br />
Cellular Phone Investigations and<br />
Field Tools<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive: Yes<br />
180 minutes<br />
Timothy Lott & Lauren Wagner<br />
This workshop is designed for beginners and will<br />
introduce students to cellular devices and discuss<br />
the many aspects that cellular devices have on<br />
investigations. Seizure and examination of devices<br />
will also be discussed as well as an overview of field<br />
tools used for data extraction. Students will complete<br />
a hands-on exercise using CelleBrite as a field tools to<br />
extract data from cellular devices.<br />
34 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Lab-based <strong>Training</strong> Workshops<br />
Computer Forensics for Prosecutors<br />
180 minutes<br />
Justin Fitzsimmons & Christopher Kelly<br />
This hands-on computer lab will allow prosecutors to<br />
use a computer forensic program to conduct an actual<br />
examination. After being given basic instructions on<br />
how the forensics lab works, the participants will be<br />
given a series of tasks and forensic artifacts to try and<br />
recover. At the end of this course participants will have<br />
a better understanding of the forensic process.<br />
Conducting GigaTribe Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Jeff Rich & Eric Zimmerman<br />
This lab-based training will provide an overview of<br />
the operation of the GigaTribe network. It will also<br />
explain advanced tools to investigate GigaTribe cases.<br />
Conducting Proactive Internet Relay Chat<br />
Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Jim Valley<br />
In this lab-based training, students will learn how to<br />
properly conduct IRC investigations. Students will<br />
also learn how to integrate other chat media and email<br />
into IRC chat investigations to identify the suspect<br />
quickly and successfully. This lab is focused on new IRC<br />
investigators or investigators who need a refresher.<br />
Computer Protection System 2 Update<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Mitchell Nixon & William Wiltse<br />
Designed for currently licensed and experienced peerto-peer<br />
investigators, this course will showcase the<br />
newest functionality built-in to the <strong>Child</strong> Protection<br />
System (CPS). Beyond its updated interface, the<br />
new CPS features include real-time analytics such as<br />
automatic job launching (based on region), email/<br />
SMS notification of suspect’s online status, and the<br />
long awaited GUID tracking ability. This lab is for<br />
demonstration only. A current CPS license is not<br />
required.<br />
Evidence In Microsoft Windows Registry<br />
180 minutes<br />
Greg Bembridge<br />
The Microsoft Windows registry files are a goldmine of<br />
information for forensic examiners. This lab provides<br />
participants with the necessary skill set to conduct a<br />
basic forensic examination on the Windows 7 operating<br />
system registry files. Students will determine the<br />
computer name and assigned IP address, review user<br />
accounts to determine who the most frequent users<br />
were and which user account deleted particular files<br />
of interest, identify which external storage devices<br />
had been connected by which computer user account,<br />
inspect windows firewall rule exceptions and review<br />
the basic principles of registry backup files, and identify<br />
by SSID and MAC address, which wireless networks a<br />
user had connected to, and when.<br />
Facebook Investigation<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Mike Duffey<br />
This block of instruction is designed for students<br />
who are new to using Facebook. Students will be<br />
given a hands-on learning experience, and will cover<br />
the following topics: how to sign up for Facebook,<br />
photo tagging and un-tagging, uploading photos, how<br />
to uniquely identify individual’s profiles, using Fan<br />
pages, and searching for Groups. An additional focus<br />
will be spent on examining the user security settings<br />
and account profile settings, which effects how others<br />
view your profile. Having a Facebook profile is not a<br />
requirement.<br />
PARTNERS IN PROTECTING CHILDREN 35
Lab-based <strong>Training</strong> Workshops<br />
Field Previews feat. PALADIN<br />
90 minutes<br />
Steve Whalen<br />
This course provides instruction and hands-on<br />
experience for previewing digital evidence in the field<br />
in a forensically sound manner, without altering data,<br />
using PALADIN forensic. Students will learn how to<br />
easily search any computer to identify and document<br />
potential illicit files.<br />
Field Search (Introduction)<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Jim Tanner<br />
Hands-on lab-based training which instructs and<br />
certifies End Users on Field Search Software, available<br />
free to law enforcement and governmental agents.<br />
Field Search is a Windows-based live-box tool used<br />
for “Knock and Talk”, consent searches, and postconviction<br />
monitoring of computer use. With more<br />
than 10,000 users world-wide, it is a well recognized<br />
investigation and triage tool. Participants in this<br />
training will receive full working copies of Field Search<br />
v 4.0 (either ½ day or full day class) and be certified as<br />
Users (full day class only).<br />
First Responder--Cell Phone<br />
180 minutes<br />
Tom Eskridge<br />
Designed for the investigator/officer investigating<br />
cases where cellular devices are involved. Students will<br />
explore what types/forms of evidence can be recovered<br />
from cellular devices to inform investigations, as well<br />
as how to prepare for seizure of devices and the correct<br />
protocols involved in the collection of these devices.<br />
We will also collect data from cellular devices with<br />
software tools, in a sound manner, giving actionable<br />
intelligence to investigators in minutes. Multiple<br />
vendor software options will be available, along with<br />
numerous cell phones for “ripping” during the lab.<br />
Students who have never before “ripped” a phone are<br />
encouraged to attend.<br />
Forensic Artifacts in P2P Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Brian Arnett & Shannon Geaney<br />
This class is intended to provide a very practical<br />
guide to identifying artifacts of Peer-to-Peer Client<br />
installations. With the decline of LimeWire, several<br />
less frequently used clients are becoming more<br />
popular. Many of these store important artifacts such<br />
as GUID, Installation Dates, Favorite Search Terms,<br />
Download and Sharing Directories differently. Our<br />
intent is to present and provide a guide of default<br />
settings and locations where these artifacts can be<br />
recovered.<br />
Forensic Scan 2<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Mitchell Nixon & William Wiltse<br />
This lab-based training introduces the next generation<br />
of the field triage tool, Forensic Scan. This class will<br />
provide investigators with free software designed to<br />
quickly examine suspect hard drives for contraband.<br />
The tool will find previously identified child sexual<br />
abuse material by hash value and will then allow<br />
the investigator to review other material based on<br />
the likelihood of finding locally produced movies<br />
and images of child sexual abuse. The software uses<br />
new innovations including flesh detection, pattern<br />
recognition and proximity reference to quickly reveal<br />
images likely to allow the rescue of a local child victim.<br />
Google and Firefox as Investigative Tools<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Elizabeth Tow & Lauren Wagner<br />
This computer lab will teach students how to effectively<br />
use Google and Mozilla Firefox as investigative tools.<br />
Students will complete hands-on exercises using<br />
Google Advanced Operators as well as Firefox addons.<br />
36 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Lab-based <strong>Training</strong> Workshops<br />
Hand Held GPS Interrogation<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Mark Bowser & Norman Gibson & Tyler Wotring<br />
This class will provide students with an introduction<br />
to imaging GPS devices. It will also cover the analysis<br />
and mapping of data.<br />
iDevice Analysis<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Kurt Petro<br />
This lab-based training will introduce students to the<br />
acquisition and analysis of MAC iDevices.<br />
ImageScan<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Daniel Hobbs<br />
Image Scan is a component system developed by the<br />
FBI CART Unix Program for field investigators to<br />
accurately view a variety of graphics’ formats on a<br />
subject’s computer. Image Scan uses a customized<br />
Linux boot CD/thumb drive combination that allows<br />
investigators in the field to access the graphics’ files<br />
on a subject’s computer while making absolutely no<br />
changes to any files. As used for consent searches,<br />
this system maintains the forensic integrity of the<br />
computer viewed for subsequent forensic examination<br />
in a lab environment. Students will receive lecture,<br />
hands on instruction and a copy of the software.<br />
Introduction to Apple Computers<br />
90 minutes<br />
Mike Duffey<br />
This lab-based training will introduce students to the<br />
world of Apple computers. This class is designed for<br />
individuals who have never used an Apple computer<br />
before and want to become familiar with the different<br />
applications.<br />
Introduction to Field Triage<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Christopher Armstrong & Timothy Lott<br />
This lab-based training will address the collection<br />
of “Volatile Data”, data that <strong>Law</strong> <strong>Enforcement</strong> has<br />
historically overlooked or ignored. Students will be<br />
provided with free software resources they can use to<br />
collect and view the Volatile Data or Random Access<br />
Memory from a running computer.<br />
Introduction to My Internet Relay Chat<br />
(MIRC) Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Christopher Armstrong & Timothy Lott<br />
This lab-based training teaches the new investigator<br />
the basics of Internet Relay Chat (IRC), focusing on<br />
the software set up to install and capture potential<br />
evidence. Students will be taught how to set up and<br />
implement the chat program mRIC.<br />
Introduction to Social Networking Sites<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Elizabeth Tow & Lauren Wagner<br />
This workshop is designed for beginners, and will<br />
provide students with an overview of social networking<br />
websites and how these websites can be useful to<br />
investigations. Students will learn how to set up an<br />
investigative social networking account to search for<br />
information. They will also learn how to effectively<br />
search social networking websites (predominately<br />
Facebook, MySpace, and Twitter) using Google<br />
Advanced Operators. This workshop will also cover<br />
techniques on capturing profiles for evidentiary<br />
purposes and well as mapping tools for friend networks<br />
in both MySpace and Facebook.<br />
PARTNERS IN PROTECTING CHILDREN 37
Lab-based <strong>Training</strong> Workshops<br />
Investigations Using RoundUp eMule<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Michael Hill & Brian Lynn & D. Matthew Powell<br />
RoundUp eMule is a software tool developed by the<br />
University of Massachusetts to locate and identify<br />
people distributing CP using the eDonkey/eMule<br />
file sharing network. RoundUp eMule has been<br />
successfully used by law enforcement agents to capture<br />
people sharing CP. This lab-based training teaches<br />
investigators how to use the tool to identify and<br />
apprehend people sharing CP. The RoundUp eMule<br />
lecture is not a prerequisite.<br />
Investigative USB Apps<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Lauren Wagner & Elizabeth Tow<br />
This computer lab-based class will teach students<br />
how to download, install and use portable apps as<br />
an investigative tool. Firefox and related add-ons,<br />
LightScreen, and other programs will be covered.<br />
Managing Sex Offenders through<br />
Monitoring<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Sharon Girling & Teresa Hughes<br />
New technologies can play an important role in the<br />
management and control of sex offenders and their<br />
actions online. <strong>On</strong>e of the most effective methods is to<br />
monitor the home computer of each offender for any<br />
inappropriate behavior. Securus is a monitoring system<br />
that identifies any text used by an offender that might<br />
indicate a child protection issue or cause for concern.<br />
Evidence of every incident is captured as a screenshot,<br />
showing exactly what took place and alerting risk<br />
management staff to the situation. Following a review<br />
of the evidence, appropriate intervention can take<br />
place. This is an opportunity to learn how the system<br />
works and discuss its impact.<br />
Microsoft Windows Live Internet<br />
Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Chris Ard<br />
Hotmail and Messenger are two of the free online,<br />
desktop, and mobile applications and services offered<br />
by Microsoft and used by millions of people every day to<br />
communicate and share information. This course takes<br />
a tour of Hotmail, Messenger, Xbox Live, SkyDrive,<br />
and other “Live” branded services and explores how<br />
to conduct an online and forensics investigation. This<br />
course also discusses the evidence provided to <strong>Law</strong><br />
<strong>Enforcement</strong> in response to legal process served to<br />
Microsoft.<br />
NW3C’s TUX4N6 Preview/Triage Tool<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Mark Bowser & Nicholas Newman<br />
This lab-based training program provides an<br />
introduction to the NW3C TUX4N6 preview/triage<br />
tool. Course consists of lectures and numerous handson<br />
practical exercises. The course will have a pre and<br />
post testing.<br />
osTriage: A Next Generation, <strong>On</strong>-Scene<br />
Preview Tool<br />
180 minutes<br />
Jeff Rich & Eric Zimmerman<br />
This lab-based training will provide instruction<br />
on osTriage, why it was written, how to use it, and<br />
what it can do for you. In short, osTriage will quickly<br />
find, extract, and display key information from a<br />
computer which will enable to you get a better first<br />
interview, conduct a better search, and more. Some of<br />
the information extracted includes operating system<br />
details, registry details, USB device history, browser<br />
history for all major browsers, search engine search<br />
terms, cloud storage applications, encryption, P2P and<br />
other applications, and passwords. osTriage displays<br />
thumbnails of images and videos and categorizes<br />
38 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Lab-based <strong>Training</strong> Workshops<br />
images/videos against a list of over 500,000 SHAs of<br />
interest and 300+ keywords. Any contraband can be<br />
copied off the target computer with a few clicks.<br />
Point and Click Linux Forensics<br />
90 minutes<br />
Andrew Rosen<br />
Attendees will receive a Linux forensics boot<br />
disk capable of previewing, imaging and analyzing<br />
Windows, Macintosh and Linux systems. Using the<br />
tools and knowledge presented, attendees will be able<br />
to document, search, recover deleted files, image,<br />
restore and analyze computer systems, storage devices<br />
and more. No previous experience with Linux is<br />
necessary.<br />
Roundup Ares<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
360 minutes<br />
Robert Erdely & David Peifer & Joseph Versace<br />
This lab-based training course is for experienced<br />
Peer-to-Peer Investigators. Students will learn a new<br />
investigative tool which will assist with identifying and<br />
investigating persons sharing child pornography on the<br />
Ares P2P network.<br />
Roundup Update 1.5.X<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Marc Liberatore & Michael Hill & David Peifer &<br />
D. Matthew Powell<br />
<strong>ICAC</strong>COPS offers unprecedented opportunities for<br />
proactive investigations into targets trading child<br />
pornography files via Peer-to-Peer (P2P) file sharing<br />
networks. <strong>ICAC</strong>COPS also offers deconfliction<br />
tools, which facilitate information sharing among<br />
law enforcement agencies. This block will offer a<br />
statistical comparison within the suite of Roundup<br />
tools Gnutella, ARES and eMule file sharing networks.<br />
Searching Computers in the Field<br />
180 minutes<br />
Matt McFadden & Ashley Stockdale<br />
Some people use computers to perpetrate unspeakable<br />
acts against society’s most innocent. When these acts<br />
take place, it is critical that front line investigators have<br />
the ability to quickly identify how and when a computer<br />
might have been involved in the crime. During this lab<br />
you will learn a procedure for searching a computer<br />
to uncover evidence while maintaining the integrity<br />
of the data. Specific scenarios will be discussed, such<br />
as searching live and turned off computers, defining<br />
situation specific search criteria, and creating reports<br />
in the field.<br />
Use of Open-source Tools for WiFi<br />
Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Ty Brevard & Vincent Costagliola<br />
Students will be instructed on the use of open-source<br />
pen-testing tools from the Backtrack 5 platform. We<br />
will explore how to conduct Wi-Fi based investigations<br />
to expose the use of peer-to-peer devices for<br />
downloading illicit content from a victim’s open Wi-<br />
Fi. This class will demonstrate the tools necessary<br />
to detect, identify and geolocate rogue devices that<br />
are being used by nefarious element. These tools are<br />
publicly available and generally are free to end-users.<br />
Using Chat Aggregators in Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Steve Blackwell & Tony Leonard<br />
This class will examine the use of Trillian, Digsby,<br />
and Meebo for undercover chat. Multi-platform chat<br />
clients allow the investigator to chat across a variety<br />
of systems from one simple interface. This lab will<br />
introduce these clients, and allow students to explore<br />
the available functions and limitations of each, as well as<br />
provide students with practice chatting with different<br />
online identities in a multi-platform environment.<br />
This lab will also cover Facebook Messenger a popular<br />
chat aggregator for smart phones.<br />
PARTNERS IN PROTECTING CHILDREN 39
Lab-based <strong>Training</strong> Workshops<br />
Using Google in Your Investigations<br />
(Advanced)<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Nirupa Calvin & Cory Louie & Peipei Pollmann &<br />
Miles Rutkowski<br />
This advanced-level workshop will give investigators<br />
insight and valuable tips to conduct online investigations.<br />
We will review investigative techniques and tools<br />
using many of Google’s services (Advanced Search,<br />
Google+, AdWords, AdSense, Wallet, Analytics, Voice<br />
and others) that can be used to supplement your<br />
current investigative process. Get ready to learn by<br />
doing! Students should have attended the basic Google<br />
lab-based training or be familiar with Google services.<br />
Using Google in Your Investigations (Basic)<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Nirupa Calvin & Cory Louie & Peipei Pollmann &<br />
Miles Rutkowski<br />
This basic-level workshop will give investigators insight<br />
and valuable tips to conduct online investigations. We<br />
will review investigative techniques and tools using<br />
many of Google’s services (Search, Image Search,<br />
Google Account, Gmail, YouTube, Picasa, Blogger,<br />
Groups, and others) that can be used to supplement<br />
your current investigative process. Get ready to learn<br />
by doing!<br />
Using Virtual Machines in an Investigative<br />
Capacity<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Christopher Armstrong & Timothy Lott<br />
This Virtualization class will introduce the concept of<br />
the virtual computer environment for testing, research<br />
and undercover investigations. Students will set up and<br />
install VMWare Server, an open source virtualization<br />
software package developed by VMWare. The students<br />
will then be walked through the process of setting<br />
up a virtual environment, before opening an existing<br />
instance of Windows XP for testing. In addition<br />
students will learn how to boot a “suspect’s machine”<br />
using .e01 or .dd files.<br />
Windows Event Logging<br />
90 minutes<br />
Chris Ard<br />
The Windows Event Viewer has long been one of<br />
the best tools for troubleshooting technical issues<br />
on Microsoft Windows computers. The Event log<br />
can also provide a wealth of information to forensic<br />
investigators. This session will discuss the types of<br />
information found in the Event Viewer logs, as well as<br />
how to utilize the Event viewer logs and the Windows<br />
Powershell to create timelines of events.<br />
Windows Volume Shadow Copy<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Chris Ard<br />
Windows Vista introduced the ability to recover<br />
previous versions of existing (or deleted) files.<br />
Windows 7 has enhanced this capability. For any<br />
forensic investigator, knowledge of how to leverage<br />
Volume Shadow Copies will be the most useful tool in<br />
the Windows tool chest, since it allows you to recover<br />
files that would otherwise be unrecoverable including<br />
index.dat files, browser history files, old copies of the<br />
registry, thumbnail cache files, etc.<br />
Wireless Network Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Christopher Armstrong & Elizabeth Tow<br />
This class will introduce wireless technology and<br />
teach the attendee how to gather pre- search warrant<br />
evidence and evidence from the network at the scene.<br />
A portion of this topic will be a hands-on lab, setting<br />
up wireless routers, along with collecting evidence in<br />
the form of data from the router.<br />
40 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
CVIP Lab<br />
CVIP -<br />
<strong>Child</strong> Victim Identifi cation Lab<br />
Room: Hanover A<br />
NCMEC is proud to offer all registered participants<br />
at this year’s <strong>Training</strong> a glimpse into the <strong>Child</strong> Victim<br />
Identification Lab – a powerful law enforcement tool<br />
designed to locate child victims.<br />
Many children have been rescued from further<br />
sexual abuse because a clue in the background of<br />
sexually abusive images led to their location. Within<br />
this interactive lab, computers will be available for<br />
participants to access background identifiers and audio<br />
clues in hopes that these items may be recognizable to<br />
Lab participants. Accompanying each sanitized picture<br />
will be a real-time message thread where participants<br />
can post their comments. You may have the piece of<br />
the puzzle that could lead to the rescue of a child<br />
victim. Also at the Lab, learn about NCMEC’s <strong>Law</strong><br />
<strong>Enforcement</strong> Services Portal and see a demonstration<br />
of how you can compare hash values to the NCMEC<br />
system from your office.<br />
NOTE: All registered training attendees are invited to<br />
participate in this Lab; however, due to the sensitivity<br />
of this issue, please make sure to wear your badge and<br />
bring proof of identity to gain entry.<br />
CVIP Lab Hours:<br />
Monday: 12:00 pm – 5:00 pm<br />
Tuesday: 9:00 am – 5:30 pm<br />
Wednesday: 9:00 am – 5:30 pm<br />
Thursday: 9:00 am – 5:30 pm<br />
PARTNERS IN PROTECTING CHILDREN 41
42 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
U.S. v. Michael and Rebecca Strausbaugh<br />
Contact Offender & Image Producer<br />
In February 2011, Canadian authorities provided a lead to U.S. federal authorities<br />
about a child pornographic image sent to a Canadian from an address within the<br />
United States. The information led to the Gettysburg, Pennsylvania area home and<br />
business of twice prior convicted child sex offender Michael Strausbaugh. Upon<br />
executing a search warrant on the residence and business, on scene previews of a<br />
camera and computers revealed that both Michael Strausbaugh and his wife<br />
Rebecca (appointed / trained by the courts to act as Michael’s supervisor ) were<br />
involved in the sexual abuse and production of child pornography using her infant<br />
niece. This case study will examine what went right, technology issues, and the<br />
lessons learned.<br />
Learn more about U.S. v. Michael and Rebecca Strausbaugh -Contact Offender & Image Producer<br />
Check your schedule for the day and time<br />
this Lab-Based <strong>Training</strong> will be offered.<br />
PARTNERS IN PROTECTING CHILDREN 43
44 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
Lecture Name<br />
Adobe Photoshop for Image<br />
Analysis and Victim Identification<br />
Adolescents & the Internet:<br />
Sexting, Cyberbullying, <strong>On</strong>line<br />
Strangers and Offline Victimization<br />
Applying the <strong>Law</strong> to Location<br />
Tracking and Other Emerging<br />
Technologies<br />
Artemis Software: Image Analysis –<br />
Scanning for Contraband<br />
Behavioral Analysis in Sexual<br />
Exploitation of <strong>Child</strong>ren<br />
Investigations<br />
Benefits of Behavior Analysis in<br />
Investigating Internet Sexual<br />
Crimes against <strong>Child</strong>ren<br />
Beyond the Image: Victim<br />
Identification and Adobe Photoshop<br />
Case Study: <strong>Child</strong> Exploitation –<br />
Wisconsin & California Teamwork<br />
Case Study: <strong>Child</strong> Sex Tourism -<br />
Michael James Dodd<br />
Case Study: <strong>Child</strong> Sex Tourism<br />
Operations<br />
Case Study: Operation Delego<br />
Case Study: Operation Laminar -<br />
Facebook Groups<br />
Case Study: The Great Unraveling<br />
- An Oregon-based <strong>Child</strong><br />
Pornography Production Ring<br />
Lecture Name Lecture Name<br />
Case Study: U.S. v. Michael and<br />
Rebecca Strausbaugh – Contact<br />
Offender & Image Producer<br />
Changing the Culture of <strong>On</strong>line<br />
Abuse<br />
<strong>Child</strong> Molesters: In Their Own Words<br />
<strong>Child</strong> Pornography, <strong>Child</strong> Erotica and<br />
<strong>Child</strong> Modeling: Birds of the same<br />
feather?<br />
<strong>Child</strong> Victims of Prostitution:<br />
Interviewing and Building Rapport<br />
Circumventing Encryption Through<br />
Debuggers at Software Breakpoints<br />
Civil Liability in Internet Facilitated<br />
Crimes Against <strong>Child</strong>ren Cases<br />
Collaborative Partnerships Between<br />
<strong>ICAC</strong> Teams and <strong>Child</strong>ren’s Advocacy<br />
Centers<br />
Computer Forensics for Prosecutors<br />
- Basic<br />
Countering Anonymization:<br />
Investigative, Forensic, and Legal<br />
Issues<br />
Craigslist Undercover Investigations<br />
Cross-Examination of Defense Mental<br />
Health Experts<br />
Cross-Examining Defense Computer<br />
Forensics Experts in <strong>Child</strong> Sexual<br />
Exploitation Cases<br />
Detecting Deception - Discourse<br />
Analysis<br />
Direct Examination of a Computer<br />
Forensic Examiner<br />
Effective Technology Safety<br />
Messaging<br />
Emerging Fourth Amendment<br />
Issues: Reasonable and Probable<br />
Facebook for <strong>Law</strong> <strong>Enforcement</strong> &<br />
Prosecutors<br />
Federal Privacy Statutes & Evidence<br />
in the Cloud: What State and Local<br />
Prosecutors and <strong>Law</strong> <strong>Enforcement</strong><br />
Need to Know<br />
Finding Services for <strong>Child</strong> Victims<br />
of Prostitution<br />
Flying Squirrel Wireless Detection<br />
Application<br />
Forensic Analysis of Apple’s iOS<br />
Devices<br />
Forensic Analysis of Internet<br />
Browsers’ Remnant Data<br />
Forensic Interviewing: The Five<br />
“W’s” You Should Know<br />
Fourth Amendment Principles<br />
Related to Obtaining Digital<br />
Information from Third Parties<br />
Fully-Focused Computer Forensics<br />
for <strong>Child</strong> Rescue<br />
PARTNERS IN PROTECTING CHILDREN 43
Classroom-Based <strong>Training</strong> Sessions<br />
Lecture Name Lecture Name Lecture Name<br />
Google’s Efforts to Combat <strong>Child</strong><br />
Exploitation<br />
<strong>ICAC</strong>COPS Website for Investigators<br />
Integrating the Interview and<br />
Polygraph Exam as an Approach to<br />
<strong>Child</strong> Pornography Offenders<br />
International Parental Kidnapping<br />
Internet Investigations and<br />
Anonymity: A Practical Overview<br />
INTERPOL Resources for US <strong>Law</strong><br />
<strong>Enforcement</strong><br />
Interviewing Suspects in Peer-to-<br />
Peer Investigations<br />
Investigating and Prosecuting<br />
International <strong>Child</strong> Exploitation<br />
Investigating and Prosecuting <strong>On</strong>line<br />
Enticement Cases<br />
Investigating and Prosecuting the<br />
Extraterritorial <strong>Child</strong> Sex Offender<br />
Investigating and Understanding<br />
eDonkey Peer-to-Peer Systems<br />
Investigating the Cloud on Portal<br />
Devices<br />
Investigating The <strong>On</strong>ion Router<br />
(TOR) Network<br />
IRC: Basic Overview, Tips & Building<br />
an Undercover Persona<br />
Microsoft COFEE 2.1<br />
Microsoft Victim Identification<br />
Technology Overview &<br />
Interactive Discussion<br />
Microsoft’s Global Criminal<br />
Compliance <strong>On</strong>line Services<br />
Microsoft’s Xbox, Xbox 360 and<br />
Xbox LIVE Investigations<br />
Military Resources in <strong>Child</strong><br />
Exploitation Cases<br />
Mock Trial: Direct and Cross-<br />
Examination of Computer<br />
Forensics Experts<br />
Mock Trial: Peer-to-Peer<br />
Case - Direct Examination of a<br />
Computer Forensic Examiner<br />
Native American Tribal Lands:<br />
Investigating and Prosecuting<br />
<strong>Child</strong> Abuse Cases<br />
Native American Tribal Lands:<br />
Lessons & Observations on<br />
Investigative Challenges for <strong>ICAC</strong><br />
Cases<br />
Obtaining Evidence from<br />
Electronic Service Providers<br />
<strong>On</strong>line <strong>Child</strong> Pornography<br />
Groups: Emerging Trends<br />
Opening Statements and Closing<br />
Arguments<br />
Presenting Evidence to Victims:<br />
The Prepare and Predict Method<br />
Prosecuting the <strong>Child</strong> Sexual<br />
Abuse Case Effectively<br />
Prosecuting the Prostitution of<br />
<strong>Child</strong>ren<br />
Prostitution of <strong>Child</strong>ren Cases:<br />
Successful Investigative Strategies<br />
Protecting the <strong>Child</strong> Victim<br />
During the Court Process<br />
Psychological Profile of a<br />
Collector of <strong>Child</strong> Pornography<br />
RAM Acquisition and Analysis<br />
Regulating Disclosure and<br />
Discovery of <strong>Child</strong> Pornography<br />
in Criminal Procedure<br />
Responding to <strong>Child</strong> Exploitation<br />
Cases Using Effective and<br />
Progressive Victim-orientated<br />
Strategies<br />
The RoundUp eMule Tool<br />
Self-production of <strong>Child</strong><br />
Pornography by Minors<br />
on MyYearbook.com: The<br />
Pennsylvania <strong>ICAC</strong> Response<br />
Sentencing Strategies for <strong>Law</strong><br />
<strong>Enforcement</strong> & Prosecutors:<br />
<strong>2012</strong><br />
Sex Offender Registration and<br />
Notification Act: Investigation<br />
and Prosecution<br />
44 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
Lecture Name Lecture Name<br />
Sex Offender Registration and<br />
Notification Act (SORNA) - Update<br />
Sextortion<br />
Sexual Assault Investigations:<br />
Coordinating First Responders,<br />
Investigations, and Social Services -<br />
The Nitty-gritty<br />
SHIFT Wellness: Staying Healthy<br />
While Exposed to <strong>Child</strong> Sexual<br />
Abuse Material<br />
Social Networking Patterns of<br />
Adolescents, Young Adults, and<br />
Offenders<br />
Suicide Among Sex Offenders Who<br />
Victimized <strong>Child</strong>ren<br />
Technology-facilitated <strong>Child</strong><br />
Abductors & their Motivations - ‘It’s<br />
Not Just About Sex’<br />
Technology-facilitated Crimes<br />
Against <strong>Child</strong>ren on Native<br />
American Tribal Lands<br />
Tips for Testifying in <strong>ICAC</strong> Cases:<br />
A Short-course to Survive the<br />
Testimony Process<br />
Triage-Responder: DHS Science &<br />
Technology Initiative for State &<br />
Local <strong>Law</strong> <strong>Enforcement</strong><br />
Undercover Social Networking<br />
Strategies for <strong>Law</strong> <strong>Enforcement</strong><br />
Understanding and Working with<br />
the Adolescent Compliant Victim<br />
Understanding Sex Offenders<br />
Understanding the BitTorrent File<br />
Sharing Network<br />
United States Postal Inspection<br />
Service: The Value of the Mail in<br />
<strong>Child</strong> Exploitation Investigations<br />
Victim Rights and Restitution<br />
Victimization <strong>On</strong>line: Patterns<br />
and Trends – A Snapshot<br />
Victims of Commercial Sexual<br />
Exploitation & Domestic Minor<br />
Sex Trafficking<br />
Webcams and the Commercial<br />
Sexual Exploitation of <strong>Child</strong>ren<br />
Abroad<br />
Who Are The <strong>Child</strong>ren? NCMEC’s<br />
<strong>Child</strong> Victim Identification<br />
Program<br />
Windows 8 Preview<br />
Wireless Network Investigation<br />
Working with Cooperating<br />
Defendants in <strong>Child</strong> Pornography<br />
Cases<br />
Working With Victims in CSE<br />
Cases & Using Evidence During<br />
Forensic Interviews<br />
Working with Yahoo! on <strong>Law</strong><br />
<strong>Enforcement</strong> Investigations<br />
PARTNERS IN PROTECTING CHILDREN 45
Classroom-Based <strong>Training</strong> Sessions<br />
Adobe Photoshop for Image Analysis and<br />
Victim Identification<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
John Penn<br />
This session discusses and demonstrates the analysis of<br />
child sexual exploitation images and videos with Adobe<br />
Photoshop for <strong>Law</strong> <strong>Enforcement</strong>. Learn how to see<br />
beyond the victim and identify the clues that can focus<br />
the investigation and lead to the rescue of child victims.<br />
See state-of-the-art techniques using Adobe Photoshop<br />
to enhance images and dig deeper into the materials.<br />
See how Adobe Photoshop can be used to conduct<br />
the analysis and enhancement of images and videos.<br />
This presentation will include a sneak peak at new and<br />
upcoming technologies, and a discussion of industry<br />
issues related to internet crimes against children.<br />
Adolescents & the Internet: Sexting,<br />
Cyberbullying, <strong>On</strong>line Strangers and<br />
Offline Victimization<br />
90 minutes<br />
Elizabeth B. Dowdell<br />
This session focuses on the findings from a research study<br />
of middle and high school students who participated<br />
in online communications with unidentified people.<br />
Students who chatted online with strangers showed<br />
higher rates of risky Internet behaviors including sexting,<br />
electronic aggression, and offline meetings. In the high<br />
school group, students were more likely to report that<br />
something sexual happened at their offline meeting, with<br />
girls indicating higher rates of sexual harassment. Case<br />
studies will be used to demonstrate how the profile of<br />
victimization is changing with the use of avatars and web<br />
cams.<br />
Applying the <strong>Law</strong> to Location Tracking and<br />
Other Emerging Technologies<br />
90 minutes<br />
Don Mason<br />
This session provides prosecutors and investigators with<br />
information about the emerging and often conflicting<br />
views and case laws regarding the law enforcement use<br />
of technologies that enable location tracking of wireless<br />
devices. It includes review of a wide range of convergent<br />
technologies but will especially focus on how courts are<br />
responding to the uses of “bumper beepers” and GPS<br />
devices as a means of obtaining cell site registration and<br />
location data.<br />
Artemis Software: Image Analysis – Scanning<br />
for Contraband<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Richard Robertson<br />
Artemis is a free software tool for use by law enforcement<br />
to automatically scan computers for child pornographic<br />
images and videos. Developed by researchers at Oak<br />
Ridge <strong>National</strong> Laboratory (ORNL) and the University<br />
of North Carolina Wilmington, Artemis combines image<br />
analysis technology, hash matching, and keyword searches<br />
to automatically identify images and videos that are likely<br />
to contain child pornography. The tool is designed to<br />
drastically reduce the amount of time an officer must<br />
spend searching a suspect’s hard drive for illegal material.<br />
Behavioral Analysis in Sexual Exploitation of<br />
<strong>Child</strong>ren Investigations<br />
90 minutes<br />
Tia Hoffer & Terri Patterson<br />
Understanding the background and personalities of<br />
sex offenders is vital to effective investigations and<br />
prosecution. A behavioral perspective of sex offenders<br />
who victimize children will be presented through case<br />
examples, investigative strategies and research to assist<br />
law enforcement in understanding and investigating<br />
the offenders. The presentation will focus on factors<br />
related to the motivation of offenders through the<br />
lens of a criminal, behavioral, cognitive and emotional<br />
perspective. Important concepts that will be explored<br />
include the cognitive distortions, victim access techniques<br />
46 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
and grooming behaviors that are commonly observed in<br />
this offender population. The presentation will provide<br />
investigative data, research, and case examples to<br />
illuminate these concepts.<br />
Benefits of Behavior Analysis in Investigating<br />
Internet Sexual Crimes against <strong>Child</strong>ren<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Guy Collings & Joe Sullivan<br />
This session explores the application of behavioral analysis<br />
to law enforcement investigations of sexual crimes against<br />
children using technology and the Internet. The primary<br />
focus is to demonstrate that by better understanding<br />
offender behavior investigators can substantially improve<br />
their investigative strategy. For attendees who have already<br />
completed the five-day Mentor Interview Technique<br />
<strong>Training</strong> and/or the two-day Sex Offender’s Use of<br />
Technology and the Internet Courses this session will add<br />
another chapter to your evolving case-study training.<br />
Beyond the Image: Victim Identification and<br />
Adobe Photoshop<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
180 minutes<br />
Jim Cole & John Penn<br />
John Penn II of Adobe Photoshop and Jim Cole of<br />
<strong>Home</strong>land Security Investigations will discuss and<br />
demonstrate image and video analysis as it relates to<br />
the identification of child victims in sexual exploitation<br />
material.<br />
Case Study: <strong>Child</strong> Exploitation – Wisconsin &<br />
California Teamwork<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Dean Berres & Melinda Gobron & Crystal Sedevie<br />
In June 2009, an unsuspecting 13-year-old victim in<br />
Wisconsin began chatting with someone identifying<br />
herself as “Beth.” Beth subsequently introduced the victim<br />
to her cousin “Brian.” Brian’s conversations became sexual<br />
and the Wisconsin victim sent nude pictures of herself<br />
to Brian. Brian threatened to expose the pictures unless<br />
the victim sent additional images. The victim reported<br />
the incident and a Wisconsin investigator assumed the<br />
victims on-line identity and began communicating<br />
with Brian. Brian stopped chatting with the Wisconsin<br />
undercover officer after Brian was contacted by a<br />
Sacramento <strong>ICAC</strong> detective who was following-up on<br />
an unrelated Cybertip complaint. <strong>On</strong>ce the enforcement<br />
efforts were coordinated, Sacramento <strong>ICAC</strong> completed<br />
the case resulting in an arrest for child pornography<br />
with admissions to the Wisconsin crimes. Suspect is now<br />
serving 11 years in prison.<br />
Case Study: <strong>Child</strong> Sex Tourism - Michael<br />
James Dodd<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Randall Devine<br />
This session reviews the case of Michael James Dodd.<br />
Dodd was an American teacher working in Cambodia<br />
when he molested a young girl there. He had previously<br />
worked in the Northern Mariana Islands where he was<br />
convicted of inappropriately touching elementary school<br />
girls. Dodd was described by the sentencing judge as a<br />
cunning, clever and manipulative predator. In December<br />
2010 Dodd was sentenced to nine years in prison.<br />
Case Study: <strong>Child</strong> Sex Tourism Operations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
James Holdman<br />
This session reviews several child sex-tourism<br />
investigations conducted by DHS/ICE agents.<br />
Investigative techniques include the use of undercover<br />
email accounts, undercover social networks, and<br />
undercover meetings. The investigations occurred in<br />
Mexico, Guatemala and Costa Rica. Common problems<br />
and solutions encountered while working the cases will<br />
be discussed.<br />
PARTNERS IN PROTECTING CHILDREN 47
Classroom-Based <strong>Training</strong> Sessions<br />
Case Study: Operation Delego<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Neil O’Callaghan<br />
Operation Delego involved the investigation of an<br />
Internet forum/bulletin board dedicated to the<br />
production, distribution and advertisement of hardcore<br />
child pornography. The presentation will include case<br />
overview, investigative techniques, international law and<br />
prosecution issues.<br />
Case Study: Operation Laminar -<br />
Facebook Groups<br />
90 minutes<br />
Chris Watkins<br />
This session reviews the investigation of individuals and<br />
groups who used Facebook to share and disseminate<br />
materials involving the visual depiction of minors engaged<br />
in sexually explicit conduct. The presentation includes<br />
case overview, investigative techniques, international<br />
concerns and prosecutorial issues.<br />
Case Study: The Great Unraveling - An Oregonbased<br />
<strong>Child</strong> Pornography Production Ring<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Josh Findley<br />
This case study examines what investigators initially<br />
thought was a “routine” child pornography search<br />
warrant and turned out to be far more complicated.<br />
Agents arrested four custodial parents from three<br />
separate families, identified five minor victims, including<br />
a bedridden handicapped child, and disabled an Internetbased<br />
child pornography trading ring. Presenters will<br />
discuss the issues encountered with suspects who were a<br />
“typical” middle-class suburban married couple engaged<br />
in the production of contraband images. The presentation<br />
examines the challenges of the investigation where both<br />
spouses were abusers, tracing images back to their origin<br />
and the issues associated with the prosecutions of all of<br />
the involved individuals.<br />
Case Study: U.S. v. Michael and Rebecca<br />
Strausbaugh – Contact Offender & Image<br />
Producer<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Daryl Bloom & Michael Corricelli<br />
In February 2011, Canadian authorities provided a lead to<br />
U.S. federal authorities about a child pornographic image<br />
sent to a Canadian from an address within the U.S. The<br />
information led to the Pennsylvania home and business<br />
of twice-convicted sex offender Michael Strausbaugh. A<br />
search warrant and on-scene previews of a camera and<br />
computers revealed that both Strausbaugh and his wife<br />
Rebecca (appointed & trained by the courts to act as<br />
Michael’s supervisor) were involved in the sexual abuse<br />
and production of child pornography involving Rebecca’s<br />
infant niece. The lecture will examine what went right,<br />
technology issues, and lessons learned.<br />
Changing the Culture of <strong>On</strong>line Abuse<br />
90 minutes<br />
Joe Laramie<br />
Cyberbullying has been highly publicized and this<br />
workshop will discuss how the social culture of youth<br />
can influence online behavior. This session will facilitate<br />
discussion of how to create positive change to youth<br />
behavior and include best practices for addressing<br />
electronic abuse in schools and communities.<br />
<strong>Child</strong> Molesters: In Their Own Words<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Michael Yoder<br />
This session includes a brief explanation of cognitive<br />
distortions and a discussion of the Sex Offender<br />
Continuum. Case studies will include video and audio<br />
recordings of actual offenders from various situations<br />
including; video-taped interviews, Internet chat, a<br />
suicide note, a death-row interview, an erotica collection<br />
and a research interview. Tips and recommendations for<br />
interviewing sex offenders will be provided.<br />
48 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
<strong>Child</strong> Pornography, <strong>Child</strong> Erotica and <strong>Child</strong><br />
Modeling: Birds of the same feather?<br />
90 minutes<br />
Paul Almanza & Brian Bone<br />
This session will review child modeling and child erotica<br />
as gateways to undercover child sexual abuse. The lecture<br />
will review several cases where investigation beyond child<br />
modeling and child erotica revealed large-scale sexual<br />
abuse and the customers of these image producers.<br />
<strong>Child</strong> Victims of Prostitution: Interviewing<br />
and Building Rapport<br />
90 minutes<br />
Catherine S Connell & Derek Stigerts<br />
This session will address the most fundamental and<br />
critical component of investigations involving child<br />
victims of prostitution; the victim interview. It is at<br />
this initial stage of the investigation that information is<br />
gathered that will lead to a successful prosecution of<br />
the suspect. Participants will learn the specific phases<br />
of the interview process and barriers that result in the<br />
victim’s reluctance to implicate and testify against her<br />
abuser “pimp”. The lecture will provide participants with<br />
tools and skills necessary to identify and overcome the<br />
challenges of these difficult interviews when building a<br />
relationship with the victim.<br />
Circumventing Encryption Through<br />
Debuggers at Software Breakpoints<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Johnathan Bridbord & Brian Bone<br />
The session discusses and demonstrates techniques using<br />
high-speed 1394 interfaces, debugger testing and remote<br />
shell network commands to circumvent encryption at<br />
software breakpoint locations.<br />
Civil Liability in Internet Facilitated Crimes<br />
Against <strong>Child</strong>ren Cases<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Charles Gillingham<br />
Investigators in child exploitation cases are subject to<br />
civil liability. Often unknowingly, investigators violate<br />
federal law and subject themselves to lawsuit. This session<br />
will help investigators to understand how to insulate<br />
themselves from civil liability and maintain immunity<br />
from liability.<br />
Collaborative Partnerships Between <strong>ICAC</strong><br />
Teams and <strong>Child</strong>ren’s Advocacy Centers<br />
90 minutes<br />
Matthew Gray & Elaine Stolte<br />
Participants will learn about the valuable resources that<br />
<strong>Child</strong>ren’s Advocacy Centers can provide <strong>ICAC</strong> teams<br />
in their work both during the investigative process and<br />
with ongoing victim support following the investigation.<br />
Attendees will learn about model partnerships between<br />
<strong>ICAC</strong> teams and local <strong>Child</strong>ren’s Advocacy Centers and<br />
positive outcomes involving improved investigation and<br />
prosecution. Effective strategies for replicating model<br />
programs will be discussed along with multidisciplinary<br />
team management strategies to give child abuse response<br />
team members the tools to strengthen their own groups<br />
while building a culture of value and respect for each<br />
other in their respective fields.<br />
Computer Forensics for Prosecutors - Basic<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Christopher Kelly<br />
This lecture will discuss the basics of computer<br />
forensics and will begin by taking prosecutors through<br />
different types of technology. Presenters will describe<br />
the computer forensic process and the different types<br />
of evidence that can be recovered through a computer<br />
forensic examination. Prosecutors will leave with a solid<br />
PARTNERS IN PROTECTING CHILDREN 49
Classroom-Based <strong>Training</strong> Sessions<br />
understanding of what to expect from their computer<br />
forensics examiners and what questions to ask to get the<br />
most for their case.<br />
Countering Anonymization: Investigative,<br />
Forensic, and Legal Issues<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Keith Becker & James Fottrell<br />
Offenders are becoming more sophisticated about hiding<br />
their identities online. This presentation will discuss<br />
legal, forensic and investigative techniques to identify and<br />
apprehend offenders who use anonymization techniques<br />
such as proxy servers to hide their identities.<br />
Craigslist Undercover Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Wayne Nichols<br />
Craigslist continues to be a target-rich for investigators<br />
seeking offenders. Since 2009, the Henderson, Nevada<br />
Police Department has made over 40 undercover,<br />
proactive enticement arrests involving Craigslist. This<br />
session will provide information about where to find<br />
suspicious ads on Craigslist. Investigative techniques will<br />
include methods and tools for logging communications,<br />
undercover regressed photos, and incorporating Google<br />
Voice. Additionally, a new ‘Craigslist Software Tool’ will<br />
be introduced that will offered free to law enforcement<br />
personnel.<br />
Cross-Examination of Defense Mental Health<br />
Experts<br />
90 minutes<br />
Frank Williams<br />
This session focuses on the psychopathology and<br />
personality traits of pedophiles and the various evaluation<br />
mechanisms used to demonstrate the risks they pose. The<br />
presentation will assist attendees in understanding various<br />
studies and risk assessments techniques often relied upon<br />
by defense mental health experts to minimize the risks<br />
associated with Internet sex crime offenders.<br />
Cross-Examining Defense Computer<br />
Forensics Experts in <strong>Child</strong> Sexual<br />
Exploitation Cases<br />
90 minutes<br />
Justin Fitzsimmons<br />
This session focuses on one of the emerging issues<br />
with prosecuting technology-facilitated child sexual<br />
exploitation: overcoming the defense computer forensic<br />
examiner. This session discusses substantive methods<br />
and techniques to prepare for and conduct a crossexamination<br />
of the defense CFE. The presenter uses<br />
examples from defense experts to demonstrate possible<br />
areas to cross-examine.<br />
Detecting Deception - Discourse Analysis<br />
90 minutes<br />
Jim Tanner<br />
This session covers the basics of Discourse Analysis, a<br />
lexical and syntactical approach to analyzing statements.<br />
Attendees will improve their interviewing skills by<br />
learning how to tell when someone is editing something<br />
out of a verbal or written statement and how shifts in<br />
words and grammar can point interviewers to “hot spots”<br />
in a statement that need to be probed. After this session,<br />
attendees will never again listen to a conversation or<br />
interview in the same way.<br />
Direct Examination of a Computer Forensic<br />
Examiner<br />
90 minutes<br />
Justin Fitzsimmons<br />
This session will increase a prosecutor’s understanding<br />
and comfort level with presenting a computer forensic<br />
examiner in court. The presenter will focus on practical<br />
methods for qualifying a computer forensic examiner as<br />
an expert and discuss the importance of the presentation<br />
50 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
of findings at trial. Participants will be given effective<br />
techniques for providing demonstrative exhibits at trial<br />
to explain the forensic process and digital evidence.<br />
Effective Technology Safety Messaging<br />
90 minutes<br />
Joe Laramie<br />
This session is for anyone interested in learning effective<br />
strategies to use when presenting technology safety<br />
to kids, teens and adults. Utilizing the latest research,<br />
the workshop will discuss what has been effective and<br />
what types of messages have failed in changing online<br />
behaviors. Attendees will learn tips and tools for making<br />
quality presentations in their schools and communities.<br />
Emerging Fourth Amendment<br />
Issues: Reasonable and Probable<br />
90 minutes<br />
Johnathan Bridbord & LisaMarie Freitas<br />
This session provides information about technical and<br />
legal issues regarding searching and seizing devices based<br />
on probable cause through undercover activity, proactive<br />
surveillance of open wireless, and mobile devices seized<br />
pursuant to arrest.<br />
Facebook for <strong>Law</strong> <strong>Enforcement</strong> & Prosecutors<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Emily Vacher<br />
This presentation provides prosecutors and investigators<br />
with information regarding the challenges Facebook<br />
encounters while operating the world’s largest social<br />
networking site. Topics such as Facebook’s proactive<br />
investigations and the use of PhotoDNA for child<br />
exploitation cases will be discussed. Information regarding<br />
the submission of legal process and how Facebook can<br />
assist law enforcement in ongoing investigations will also<br />
be covered.<br />
Federal Privacy Statutes & Evidence in the<br />
Cloud: What State and Local Prosecutors and<br />
<strong>Law</strong> <strong>Enforcement</strong> Need to Know<br />
90 minutes<br />
Justin Fitzsimmons<br />
This lecture for prosecutors and law enforcement<br />
investigators discusses the federal statutes that regulate<br />
Internet service providers’ compliance, including how<br />
these statutes regulate evidence in the “cloud”. The<br />
Privacy Protection Act and its implications for state and<br />
local law enforcement agencies will also be discussed.<br />
Finding Services for <strong>Child</strong> Victims of<br />
Prostitution<br />
90 minutes<br />
Amy Alvarado & TC Cassidy<br />
Every day across America, runaway and homeless youth<br />
programs funded by the Family and Youth Services<br />
Bureau encounter victims of sex trafficking. Learn how<br />
these community agencies are addressing the special<br />
needs of trafficked young people and how the Bureau is<br />
working inside and outside the government to build a<br />
network of support services for trafficking victims.<br />
Flying Squirrel Wireless Detection<br />
Application<br />
90 minutes<br />
Brandon Enochs & James Reeves Garnett & Kellen<br />
Harwell & Anne Kong<br />
The Flying Squirrel Wireless Detection Application is a<br />
Government-off-the-Shelf (GOTS) software application<br />
developed by the U.S. Naval Research Laboratory to<br />
provide real-time discovery, analysis, and mapping of<br />
IEEE 802.11a/b/g/n wireless networks. It is funded by<br />
the Department of Defense and the program is managed<br />
by Navy PMW 130 Computer Network Defense. Flying<br />
Squirrel (FS), a strictly standalone application designed<br />
to run on a standard laptop, can detect and segregate<br />
PARTNERS IN PROTECTING CHILDREN 51
Classroom-Based <strong>Training</strong> Sessions<br />
wireless transmitters that are acting as a WLAN client<br />
or Access Point (AP). FS provides a real-time integrated<br />
visualization and mapping capability that allows users to<br />
generate a “Radiation Field (RF) Map” based on the signal<br />
strength information for any selected transmitter.<br />
Forensic Analysis of Apple’s iOS Devices<br />
90 minutes<br />
Don Brister<br />
Apple’s iOS devices (iPhone, iPad and iPod Touch) are very<br />
different from other mobile devices. They have their own<br />
method of imaging and analysis. Information is encrypted<br />
and volatile. It must be properly preserved and collected<br />
to result in successful collection and analysis. This session<br />
discusses collection, preservation, and analysis of the<br />
devices and their stored information. Several areas of<br />
importance will be discussed, showing their information<br />
to demonstrate the steps toward a successful conclusion.<br />
Forensic analysts can learn how to successfully handle the<br />
evidence. Investigators and analysts alike can learn about<br />
the types of information stored on the devices.<br />
Forensic Analysis of Internet Browsers’<br />
Remnant Data<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Bryan Kelly<br />
This session provides an overview of the forensic analysis<br />
process of Internet browser remnant data for Internet<br />
Explorer, FireFox and Chrome browsers.<br />
Forensic Interviewing: The five “W’s” You<br />
Should Know<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Bethany Case & Martha Finnegan & Teresa Huizar<br />
& Ale Levi<br />
This session uses a diverse group of experienced<br />
personnel to provide the following information about<br />
forensic interviewing: Identify who conducts forensic<br />
interviewers in federal and non-federal settings.<br />
Describe what a forensic interview entails and provide<br />
background, models, and a variety of perspectives in the<br />
field. Determine when and under what circumstances<br />
forensic interviews should be used. Identify where to find<br />
a trained and experienced interviewer and the associated<br />
costs. Discuss why forensic interviewing is the preferred<br />
method of interviewing child victims and how this<br />
approach can benefit an investigation.<br />
Fourth Amendment Principles Related to<br />
Obtaining Digital Information from Third<br />
Parties<br />
90 minutes<br />
Thomas Clancy<br />
This session provides investigators and prosecutors with<br />
a discussion of the Fourth Amendment and an analysis<br />
of how courts and policy makers are applying Fourth<br />
Amendment doctrines to acquisitions of digital evidence<br />
from third parties.<br />
Fully-Focused Computer Forensics for <strong>Child</strong><br />
Rescue<br />
90 minutes<br />
Matt McFadden<br />
Computer forensics must be thorough. From the children<br />
we protect and rescue to the offenders we put away in<br />
jail, we must ensure that examinations are complete.<br />
With ever-expanding digital storage and improved<br />
technology, this task becomes increasingly difficult.<br />
Clues may be overlooked if examiners do not know<br />
where or how to effectively look. In child exploitation<br />
cases, examiners cannot overlook vital clues that may<br />
lead to the identification or rescue of a child. This course<br />
covers how to start the forensic analysis, high-yield areas<br />
for evidence, and how to manage the assessment of an<br />
entire hard drive while ensuring a thorough search.<br />
Display charts detailing a forensic analysis process will<br />
be provided and reviewed to reinforce efficient searching<br />
techniques.<br />
52 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
Google’s Efforts to Combat <strong>Child</strong> Exploitation<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Cory Louie & Cathy McGoff & Nirupa Calvin & Miles<br />
Rutkowski<br />
An overview of Google’s efforts to combat child<br />
exploitation including content reporting, product safety,<br />
legal process, data disclosure policies, investigative<br />
processes and investigative tools.<br />
<strong>ICAC</strong>COPS Website for Investigators<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
David Peifer<br />
<strong>ICAC</strong>COPS was created as a cooperative effort between<br />
the Pennsylvania State Police, Pennsylvania <strong>ICAC</strong> and the<br />
Massachusetts <strong>ICAC</strong> to help identify offenders in those<br />
jurisdictions. Initially it was designed to complement<br />
eP2P (FBI Gnutella tool) to help identify offenders on<br />
the Gnutella network sharing child pornography. Because<br />
it was such a useful tool, it was adopted by investigators<br />
around the country and now provides investigative leads,<br />
deconfliction and real time alerts to thousands of users.<br />
It aids task forces to identify the worst offenders in their<br />
jurisdictions on the Gnutella, E-Donkey and Ares p2p file<br />
sharing networks.<br />
Integrating the Interview and Polygraph<br />
Exam as an Approach to <strong>Child</strong> Pornography<br />
Offenders<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Lance Fragomeli & Michael Sullivan<br />
The initial interview of a child pornography suspect is a<br />
critical stage of the investigation. An integrated interview<br />
approach that includes the administration of a polygraph<br />
exam has proven very successful in establishing that the<br />
suspects have engaged in previous contact offenses. This<br />
information has proven to be instrumental in identifying<br />
and locating victims and provides valuable information<br />
at sentencing as to the true nature and character of the<br />
defendants. This lecture will describe the components of<br />
the integrated interview, including the polygraph.<br />
International Parental Kidnapping<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Rob Blake & Darcy Katzin & Dash Wagner<br />
This session addresses the investigation and prosecution<br />
of international parental kidnapping cases including<br />
an overview of federal statutes, investigative tips and<br />
strategies, and discussion by the State Department’s Office<br />
of <strong>Child</strong>ren’s Issues of the role of the Hague convention<br />
and other considerations in bringing IPK cases.<br />
Internet Investigations and Anonymity: A<br />
Practical Overview<br />
90 minutes<br />
Brian Levine & Marc Liberatore<br />
Systems that provide users with varying levels of anonymity<br />
on the Internet have moved from the theoretical to the<br />
practical. With this transition, investigators have started<br />
to see evidence that attackers are using these systems to<br />
cover their tracks. This session will review several systems<br />
for network anonymity, including The <strong>On</strong>ion Router<br />
(TOR) and other methods by which attackers can conceal<br />
their network footprints. Presenters will give a high-level<br />
description of the mechanisms by which these systems<br />
operate, discuss what evidence they hide, and describe<br />
what evidence they may leave in both network traffic and<br />
on hard drives. Presenters will also briefly discuss how<br />
such systems might be investigated by a sufficiently wellresourced<br />
investigator.<br />
INTERPOL Resources for US <strong>Law</strong> <strong>Enforcement</strong><br />
90 minutes<br />
Michelle Ford-Stepney & Catherine Sweeney<br />
This session includes case studies that explore how<br />
INTERPOL, Washington assists U.S. law enforcement<br />
agencies in matters with an international nexus. This<br />
assistance includes locating and arresting sex offenders,<br />
criminals, and fugitives, providing criminal history<br />
PARTNERS IN PROTECTING CHILDREN 53
Classroom-Based <strong>Training</strong> Sessions<br />
information and records information, obtaining evidence,<br />
conducting interviews preparing INTERPOL Notices.<br />
INTERPOL Notices have proven to be very effective in<br />
locating and tracking high-profile subjects of interest to<br />
U.S. law enforcement.<br />
Interviewing Suspects in Peer-to-Peer<br />
Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Dennis Carry<br />
<strong>ICAC</strong> investigations often involve suspects possessing<br />
similar characteristics and behaviors. This session focuses<br />
on interviewing techniques of those involved in peer<br />
to peer cases and other child pornography offenses.<br />
Investigators will be provided with an interviewing<br />
platform they may find useful in these cases which will<br />
allow in-depth discovery of behavior and corroborating<br />
evidence. Armed with knowledge about common suspect<br />
traits, investigators will be prepared to ask relevant<br />
interrogation questions.<br />
Investigating and Prosecuting International<br />
<strong>Child</strong> Exploitation<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Michelle Morgan<br />
This session examines the challenges of investigating<br />
targets who travel overseas to engage in sex with minors,<br />
a crime which has increased in recent years. Presenters<br />
will discuss methods for identifying targets, obtaining and<br />
authenticating evidence located overseas, and ensuring<br />
the participation of foreign witnesses in the U.S. trial.<br />
Investigating and Prosecuting <strong>On</strong>line<br />
Enticement Cases<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Tony Godwin & Lisa Miller & Camille Sparks<br />
This interactive lecture examines the basics of successfully<br />
investigating and prosecuting online enticement cases by<br />
outlining the federal enticement statute and its alternatives<br />
as well as discussing practical “dos and don’ts” through<br />
several case studies. Common defenses to enticement<br />
and traveler charges and strategies for overcoming those<br />
defenses will also be discussed. This session is appropriate<br />
for both state and federal investigators and prosecutors.<br />
Audience participation is encouraged.<br />
Investigating and Prosecuting the<br />
Extraterritorial <strong>Child</strong> Sex Offender<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Steven Grocki<br />
This presentation focuses on the increasing problem of<br />
child exploitation cases that reach beyond U.S. Borders.<br />
The session will examine common scenarios including<br />
child sex tourism, international child pornography<br />
trafficking, and U.S. citizens stationed abroad. Presenters<br />
will discuss the locations where the crimes occur and<br />
explain how these offenders and their crimes touch every<br />
state and locality in the country. Unique investigative and<br />
legal issues that arise in these cases will also be discussed.<br />
Investigating and Understanding eDonkey<br />
Peer-to-Peer Systems<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Kevin West<br />
This session provides attendees with an understanding of<br />
eDonkey peer-to-peer systems and discusses investigative<br />
techniques focused on eDonkey. The hash system and<br />
GUID system in eDonkey mule clients will be examined.<br />
Special issues related to digital forensics for eDonkey,<br />
eMule and Shareaza will be presented.<br />
Investigating the Cloud on Portal Devices<br />
90 minutes<br />
Tom Eskridge<br />
This session will discuss the importance of compiling<br />
the social topology of suspects based on the applications<br />
54 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
installed on their portal devices and cell phones. While<br />
the traditional “dumps” of data including call records,<br />
phone books, and text messages are of interest, it is how<br />
the suspect uses today’s technology to attract, groom<br />
and victimize that will assist in better investigations and<br />
prosecutions.<br />
Investigating The <strong>On</strong>ion Router (TOR)<br />
Network<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
James Kilpatrick<br />
The presentation examines the history and the various<br />
tools and techniques for conducting investigations within<br />
The <strong>On</strong>ion Router (TOR) Network. Topics include the<br />
examination of data, investigative techniques, and the<br />
various obstacles to TOR investigations.<br />
IRC: Basic Overview, Tips & Building an<br />
Undercover Persona<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
James Kilpatrick<br />
This session provides a basic overview of Internet Relay<br />
Chat (IRC) including navigation and the logging function<br />
of the IRC client (mIRC). The presentation includes:<br />
building an IRC undercover persona, introduction to chat<br />
rooms dedicated to the sexual exploitation of children,<br />
tips about chatting, building an investigation, and tips for<br />
court presentation.<br />
Microsoft COFEE 2.1<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Norman Gibson & Tyler Wotring<br />
This session provides an overview of the latest version<br />
of Microsoft COFEE 2.1 with support for XP, Vista, and<br />
Windows 7 systems.<br />
Microsoft Victim Identification Technology<br />
Overview & Interactive Discussion<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Bill Harmon & Hany Farid<br />
This interactive discussion session presents Microsoft’s<br />
PhotoDNA technology and its use in forensics and victim<br />
identification. Microsoft will present case scenarios<br />
that they are working on using the technology and in<br />
turn obtain feedback from participants on ways it can<br />
be impactful and relevant. This session is intended to be<br />
discussion-oriented.<br />
Microsoft’s Global Criminal Compliance<br />
<strong>On</strong>line Services<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Colleen Holt<br />
Participants will learn the process to follow when<br />
requesting customer records related to online services<br />
including @hotmail, @msn, @live, Windows Live Spaces,<br />
Windows Live SkyDrive, and Xbox Live. Presenters will<br />
discuss the records available from Microsoft, how long<br />
they are retained and the processes to follow to obtain<br />
information in life-threatening emergency investigations.<br />
Microsoft’s Xbox, Xbox 360 and Xbox LIVE<br />
Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Chris Ard<br />
The Xbox and Xbox 360 both enjoy large followings by<br />
children and adults. These devices have the potential to<br />
store information that may be pivotal to an investigation<br />
and must be handled in the same way as other digital<br />
evidence. This session will introduce investigators to the<br />
Xbox, Xbox 360 and the Live Service. Presenters will<br />
discuss the unique capabilities of these devices including<br />
VOIP, video conferencing, social networking and others.<br />
The presentation will explore some of the techniques that<br />
PARTNERS IN PROTECTING CHILDREN 55
Classroom-Based <strong>Training</strong> Sessions<br />
must be employed to conduct a successful investigation of<br />
these devices.<br />
Military Resources in <strong>Child</strong> Exploitation<br />
Cases<br />
90 minutes<br />
Eric Trest<br />
This session provides an overview of Military Criminal<br />
Investigative Organizations (MCIO) as they relate to<br />
child exploitation investigations and operations within<br />
the Department of Defense. There will be a discussion<br />
regarding the unique resources and capabilities of the<br />
MCIO community and how their access and global<br />
presence can benefit your organization. Specific examples<br />
of MCIO support will be discussed ranging from accessing<br />
military personnel records, DoD database systems, and<br />
worldwide investigative assistance.<br />
Mock Trial: Direct and Cross-Examination of<br />
Computer Forensics Experts<br />
90 minutes<br />
Justin Fitzsimmons & Christopher Kelly<br />
During this session, forensic investigators will have a<br />
unique opportunity to view a mock direct and crossexamination<br />
under simulated courtroom conditions.<br />
The examiner will be paired with two attorneys who<br />
will conduct the examination during the allotted time.<br />
The participants will review the mock scenario 60 days<br />
in advance of the training so they have an opportunity<br />
to prepare. A courtroom will be arranged for this<br />
session complete with audio-visual equipment for the<br />
presentation. A judge will preside. Attendees will observe<br />
the sessions from the gallery. At the end of each session,<br />
participants will engage in a short debriefing to discuss<br />
the exercise.<br />
Mock Trial: Peer-to-Peer Case - Direct<br />
Examination of a Computer Forensic<br />
Examiner<br />
90 minutes<br />
Justin Fitzsimmons<br />
This session takes participants through a mock trial<br />
direct examination of a computer forensic examiner in<br />
a peer-to-peer investigation scenario. Presenters will use<br />
the peer-to-peer fact pattern as the basis of courtroom<br />
testimony. Through the use of demonstrative exhibits,<br />
the presenters will show participants an approach to<br />
effectively provide forensic evidence in a courtroom.<br />
Participants will be shown examples of explanations for<br />
computer forensics that can be utilized in their own cases<br />
and jurisdictions.<br />
Native American Tribal Lands: Investigating<br />
and Prosecuting <strong>Child</strong> Abuse Cases<br />
90 minutes<br />
Travis Burrows & Marcia Hurd<br />
This joint presentation between an FBI Agent and an<br />
Assistant U.S. Attorney discusses investigating and<br />
prosecuting child abuse cases occurring on Native<br />
American Tribal lands that are also under Federal<br />
jurisdiction. Presenters will offer practical tips including<br />
interview strategies, investigative techniques, working<br />
with health care professionals through an MDT approach,<br />
charging decisions, prosecution and sentencing.<br />
Native American Tribal Lands: Lessons &<br />
Observations on Investigative Challenges for<br />
<strong>ICAC</strong> Cases<br />
90 minutes<br />
Phil Keith & Derek VanLuchene & Jim Walters<br />
During this presentation participants will understand<br />
the challenges facing Internet crimes against children<br />
investigations on Native American Tribal lands.<br />
Participants will examine emerging technology crimes<br />
within tribal communities and the challenges facing tribal<br />
law enforcement in the investigation and prosecution of<br />
56 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
these crimes. This presentation will show participants how<br />
an entire tribal community is impacted and challenged by<br />
trending technology.<br />
Obtaining Evidence from Electronic Service<br />
Providers<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
James Fottrell & Steven Grocki<br />
This session explores the often-neglected and increasingly<br />
difficult issue of obtaining crucial evidence stored by<br />
electronic service providers. Presenters will address<br />
practical considerations when dealing with private<br />
industry, emerging industry trends, and where online<br />
storage (into the cloud) is headed in the not-so-distant<br />
future.<br />
<strong>On</strong>line <strong>Child</strong> Pornography Groups: Emerging<br />
Trends<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
James Fottrell & Steven Grocki<br />
This presentation examines techniques employed by<br />
arguably the most dangerous child pornography offenders.<br />
These offenders, not content to simply download images,<br />
form complex groups to communicate about the sexual<br />
abuse of children, seek out “private home-made” images<br />
depicting abuse and exchange tips on how to evade law<br />
enforcement. The course will examine how these groups<br />
and the technologies they utilize are evolving.<br />
Opening Statements and Closing Arguments<br />
90 minutes<br />
Robert Giles<br />
An effectively crafted opening statement places a<br />
prosecutor in the position of leading the jury to conviction<br />
through the use of theme and theory. Closing argument<br />
allows prosecutors to draw on those themes and theories<br />
in the form of a persuasive argument that will convince<br />
the jury of the defendant’s guilt. This session focuses on<br />
how opening statements and closing arguments can be<br />
effectively used in technology-facilitated crimes against<br />
children to convince a jury that the evidence heard during<br />
trial establishes guilt beyond a reasonable doubt.<br />
Presenting Evidence to Victims: The Prepare<br />
and Predict Method<br />
90 minutes<br />
Ale Levi & Diane Siegel<br />
This session focuses on presenting evidence during<br />
investigative interviews using the Prepare and Predict<br />
Method. This method is non-leading, legally defensible<br />
and used to assist interviewers in obtaining accurate and<br />
detailed statements from victims while reducing trauma.<br />
Presenters will focus on child pornography, photo line ups<br />
and other evidence used in child exploitation cases. Case<br />
study examples and forensic interviewer experiences will<br />
be discussed. Forensic interviewers, law enforcement and<br />
prosecutors will benefit from this presentation.<br />
Prosecuting the <strong>Child</strong> Sexual Abuse Case<br />
Effectively<br />
90 minutes<br />
Kevin Mulcahy & Matthew Roth<br />
Attendees will learn strategies for presenting a case when<br />
it is the word of a child against the word of a defendant.<br />
This lecture will focus on developing the most effective<br />
evidence to support a victim’s allegations of child sexual<br />
abuse--whether it is for state or federal prosecution.<br />
From reaching out to potential witnesses who best know<br />
the child, to developing evidence from all aspects of<br />
the defendant’s life, to leveraging concurrent state and<br />
federal prosecutions, to using polygraph examinations,<br />
this class focuses on the best practices in investigating and<br />
prosecuting child sexual assault cases.<br />
PARTNERS IN PROTECTING CHILDREN 57
Classroom-Based <strong>Training</strong> Sessions<br />
Prosecuting the Prostitution of <strong>Child</strong>ren<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Michelle Morgan<br />
This session explores methods for identifying and locating<br />
victims of child prostitution, developing corroborative<br />
evidence, and best practices for interviewing victims<br />
in order to build an effective case and grand jury<br />
presentation. Presenters will examine the requirements<br />
for and benefits of charging a case federally. Presenters<br />
will also discuss how to maintain participation of the<br />
victim throughout the prosecution and trial, and general<br />
strategies for trial and sentencing.<br />
Prostitution of <strong>Child</strong>ren Cases: Successful<br />
Investigative Strategies<br />
90 minutes<br />
Kyle Reardon & Derek Stigerts & Amber Hawk<br />
This presentation focuses on the investigation and<br />
prosecution of child sex trafficking cases. Several case<br />
studies will be examined to demonstrate investigative<br />
techniques that can be used for the prosecution of pimps<br />
and others who profit from the prostitution of minors.<br />
There will also be a focus on some of the issues that<br />
commonly arise in these cases, including victim issues,<br />
the search and seizure of evidence, and charging decisions.<br />
Protecting the <strong>Child</strong> Victim During the Court<br />
Process<br />
90 minutes<br />
Marcia Hurd<br />
This presentation provides prosecutors with practical<br />
advice about how to protect children during the entire case<br />
from investigation to sentencing. It includes information<br />
about the child’s rights as a victim or witness, handling<br />
defense requests, and presenting the child’s testimony.<br />
Psychological Profile of a Collector of <strong>Child</strong><br />
Pornography<br />
90 minutes<br />
Joe Sullivan<br />
This case study will address one of the more debated<br />
issues related to child pornography: Do those who collect<br />
it engage in contact sexual offenses against children?<br />
Video–taped extracts of research interviews demonstrate<br />
some of the key issues and offer a perspective on the risk<br />
posed by collectors.<br />
RAM Acquisition and Analysis<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Bryan Kelly<br />
The session provides an overview of tools available for<br />
the acquisition Random Access Memory (RAM) on a live<br />
computer and methods for extracting data for analysis.<br />
Regulating Disclosure and Discovery of <strong>Child</strong><br />
Pornography in Criminal Procedure<br />
90 minutes<br />
Don Mason<br />
This session provides prosecutors and investigators an<br />
updated examination of the constitutional, statutory,<br />
and rule-based considerations relating to government<br />
disclosure of, or defense access to, evidence believed to<br />
be “child pornography” as defined by law. The presentation<br />
includes discussion of available options regarding<br />
protective orders and related practical means of limiting<br />
or regulating such disclosures or discovery.<br />
Responding to <strong>Child</strong> Exploitation Cases Using<br />
Effective and Progressive Victim-Orientated<br />
Strategies<br />
90 minutes<br />
Shia Cruciani & Anne Darr & Keely McCarthy &<br />
David Porter & Daniel Steele<br />
This session discusses the strategy and concepts<br />
developed during implementation of the “Enhancing<br />
58 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
<strong>Law</strong> <strong>Enforcement</strong>’s Response to Victims” project. These<br />
proven principles, practices, and strategies along with<br />
examples of best practices are applicable to all sectors of<br />
the community and organization including the response<br />
to child exploitation cases. This can be accomplished with<br />
little or no cost.<br />
The RoundUp eMule Tool<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Robert Erdely & Brian Lynn<br />
RoundUp eMule is a software tool developed by the<br />
University of Massachusetts to locate and identify people<br />
distributing contraband images using the eDonkey/<br />
eMule file-sharing network. RoundUp eMule has been<br />
successfully used by law enforcement agents to apprehend<br />
offenders sharing unlawful images. This lecture presents<br />
an overview of the eDonkey/eMule file sharing network<br />
and specifically; the RoundUp eMule software.<br />
Self-Production of <strong>Child</strong> Pornography<br />
by Minors on MyYearbook.com: The<br />
Pennsylvania <strong>ICAC</strong> Response<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Lisa Carroll & Elizabeth B. Dowdell<br />
This lecture focuses on the dramatic increase of selfproduction<br />
of child pornography by minors, specifically<br />
on MyYearbook.com. Examples of classification,<br />
investigation, and processing of these cases will be<br />
discussed in addition to strategies for intervention with<br />
families, Internet safety education, and multidisciplinary<br />
team outreach. Adolescent case studies will be used to<br />
illustrate techniques in addition to highlighting the role<br />
of <strong>ICAC</strong> with teens and families.<br />
Sentencing Strategies for <strong>Law</strong> <strong>Enforcement</strong> &<br />
Prosecutors: <strong>2012</strong><br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Camille Sparks & Allen Bode<br />
Prosecutors and law enforcement want to ensure that<br />
a defendant receives the appropriate sentence for the<br />
crime. However, defense attorneys routinely file motions<br />
for downward variance in child pornography cases asking<br />
the judge for the statutory minimum. In too many cases<br />
the judge grants this request. This lecture will aid law<br />
enforcement and prosecutors to prepare the best case<br />
possible, including investigation and search issues as well<br />
as effective court presentation and argument before the<br />
court.<br />
Sex Offender Registration and Notification<br />
Act (SORNA) - Update<br />
90 minutes<br />
Michelle Ford-Stepney & Laura Sofi a &<br />
Allison Turkel<br />
The Sex Offender Registration and Notification Act, Title<br />
I of the Adam Walsh Act, was signed in to law on July<br />
27, 2006. The implementation deadline was July 2011.<br />
What is the current state of sex offender registration<br />
and notification in the United States? In this session, the<br />
federal agency that oversees the program will discuss<br />
SORNA including updates on the USMS and Interpol<br />
involvement in tracking sex offenders and other SMART<br />
Office sex-offender-related initiatives.<br />
Sex Offender Registration and Notification<br />
Act: Investigation and Prosecution<br />
90 minutes<br />
Kevin Forder & Marcia Hurd<br />
Presenters from the U.S. Marshals Service and the<br />
U.S. Attorney’s Office will provide investigators and<br />
prosecutors information on the federal Sexual Offender<br />
Registration and Notification Act, and how to successfully<br />
investigate and prosecute SORNA cases.<br />
PARTNERS IN PROTECTING CHILDREN 59
Classroom-Based <strong>Training</strong> Sessions<br />
Sextortion<br />
90 minutes<br />
Keith Becker & Brant Cook<br />
This presentation provides investigators and prosecutors<br />
with practical tips for addressing “sextortion” an<br />
increasingly common form of online sexual exploitation<br />
that involves offenders stalking and extorting minors<br />
into self-producing sexually explicit images and videos.<br />
Investigation and charging strategies will be explored<br />
with reference to two recent high-profile cases.<br />
Sexual Assault Investigations: Coordinating<br />
First Responders, Investigations, and Social<br />
Services - The Nitty-Gritty<br />
90 minutes<br />
Ernesto Gaxiola<br />
This session provides first responders, investigators,<br />
social services, medical personnel, computer forensic<br />
examiners, and victim advocates with practical knowledge<br />
and the whole “Nitty Gritty” regarding everything that<br />
encompasses a sexual assault investigation; including<br />
the use of social media and electronic devices to obtain<br />
evidence. All of these elements need to coexist for a<br />
successful investigation and this presentation shows<br />
examples of all facets of sexual assault investigations that<br />
make these cases complicated, but not impossible.<br />
SHIFT Wellness: Staying Healthy While<br />
Exposed to <strong>Child</strong> Sexual Abuse Material<br />
180 minutes<br />
Jennie Barr & Kristian Carlson & Heather Steele<br />
This three-hour course, team-taught by a mental health<br />
professional and a law enforcement officer, allows<br />
professionals who are exposed to child pornography and<br />
who interact with child sex offenders the opportunity to<br />
learn the causes and symptoms of vicarious trauma that<br />
may occur as a result of their duties. Participants will<br />
learn effective coping strategies to deal with the negative<br />
effects of trauma. Attendees will be given tools to help<br />
facilitate a supportive work environment for themselves,<br />
understand and utilize mental health support and solicit<br />
support for their families and their peers. The course<br />
will benefit law enforcement officers, forensic analysts,<br />
prosecutors and others.<br />
Social Networking Patterns of Adolescents,<br />
Young Adults, and Offenders<br />
90 minutes<br />
Elizabeth B. Dowdell<br />
Research into the usage patterns of social networking<br />
sites by adolescent students, college students, and adult<br />
offenders produced interesting results. Key findings<br />
include: 1) offenders and students frequent similar social<br />
network sites; 2) over two-thirds of the Internet offenders<br />
initiate the topic of sex in their first chat session; 3) over<br />
half of the Internet offenders disguise their identity when<br />
online, 4) a small number of students are being threatened<br />
and assaulted by persons met online, and 6) avatars were<br />
used both by students and offenders.<br />
Suicide Among Sex Offenders Who Victimized<br />
<strong>Child</strong>ren<br />
90 minutes<br />
Tia Hoffer & Joy Shelton<br />
This session explores the issues and widespread impact<br />
surrounding sex offenders who commit suicide after<br />
learning they are under criminal investigation for crimes<br />
against children. Pertinent factors obtained from a sample<br />
of 106 offenders will be presented, including information<br />
regarding offenders’ period of greatest risk for suicide<br />
and officer safety.<br />
Technology-Facilitated <strong>Child</strong> Abductors &<br />
Their Motivations - ‘It’s Not Just About Sex’<br />
90 minutes<br />
Graham Hill<br />
Technology-facilitated abductors are those who use<br />
technology to identify and manipulate children.<br />
Abductions of this kind are increasing but relatively little<br />
is known about the characteristics of the offenders. This<br />
presentation explores motivational factors of offenders<br />
through interview extracts and case study examples.<br />
60 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
This session develops and enhances the attendees’<br />
understanding of this type of criminal behavior.<br />
Technology-Facilitated Crimes Against<br />
<strong>Child</strong>ren on Native American Tribal Lands<br />
90 minutes<br />
Phil Keith & Derek VanLuchene & Jim Walters<br />
This interactive session provides participants with an<br />
understanding of the dangers of technology-facilitated<br />
crimes against children on Tribal Lands including child<br />
exploitation, luring, exposure to adult material, erosion<br />
of cultural connections, and unwanted solicitation. Tribal<br />
participants will have the opportunity to interact with<br />
members of regional Internet Crimes Against <strong>Child</strong>ren<br />
Task Forces and to develop relationships for further<br />
cooperation and coordination of activities.<br />
Tips for Testifying in <strong>ICAC</strong> Cases: A Short-<br />
Course to Survive the Testimony Process<br />
90 minutes<br />
Justin Fitzsimmons<br />
This lecture is for law enforcement officers and<br />
prosecutors seeking suggestions and techniques for<br />
providing effective testimony in technology-facilitated<br />
child sexual exploitation cases. The presenter will provide<br />
illustrations of effective testimony and participants will be<br />
given suggestions for presenting evidence and testimony<br />
during direct and cross-examination.<br />
Triage-Responder: DHS Science & Technology<br />
Initiative for State & Local <strong>Law</strong> <strong>Enforcement</strong><br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Harry Parsonage & Douglas Maughan<br />
Triage-Responder is a new digital forensic triage tool<br />
for investigators and first responders who need to scan<br />
computers to quickly gather important evidence or<br />
intelligence. The tool was designed according to “First<br />
Responder Cyber Field Kit” requirements set by the<br />
United States Department of <strong>Home</strong>land Security. Unlike<br />
other forensic triage tools, Triage-Responder requires<br />
minimal training for non-technical users, minimizes<br />
support from forensic examiners and quickly targets<br />
relevant evidence and in a forensically sound manner.<br />
Undercover Social Networking Strategies for<br />
<strong>Law</strong> <strong>Enforcement</strong><br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Jim Valley<br />
This session provides step-by-step information on how to<br />
set up an undercover account for social networking sites.<br />
Attendees will learn strategies for effectively working<br />
undercover. Students will receive information on how to<br />
document and preserve evidence and how to overcome<br />
road blocks with social networking sites when working<br />
undercover.<br />
Understanding and Working with the<br />
Adolescent Compliant Victim<br />
90 minutes<br />
Allison Turkel<br />
Professionals dealing with traditional child sexual abuse<br />
cases and the general public have pre-conceived notions<br />
of the profile of a victim of child sexual abuse. Teens are<br />
victimized by many types of offenders and victims are<br />
frequently mishandled by the criminal justice system.<br />
This session discusses the unique features of adolescents<br />
making them particularly vulnerable to abuse and how<br />
to deal with compliant victims and investigate offenders.<br />
This training also includes techniques for effectively<br />
interviewing victims.<br />
Understanding Sex Offenders<br />
180 minutes<br />
Jim Tanner<br />
This session focuses on the cognitive set of the intrafamilial<br />
and position-of-trust sex offender. The presentation<br />
will expand and clarify elements of the investigation,<br />
prosecution and effective containment of the offender.<br />
Discussion will include sex offenders’ perceptions,<br />
ideation, grooming strategies and cognitive processes.<br />
PARTNERS IN PROTECTING CHILDREN 61
Classroom-Based <strong>Training</strong> Sessions<br />
The impact of the Internet and the offenders’ digital<br />
behavior will be explored and explained. Participants<br />
will leave this session with a new understanding of sex<br />
offenders, their thoughts and digital behaviors that will<br />
enhance the ability to investigate, prosecute, supervise<br />
and treat sex offenders.<br />
Understanding the BitTorrent File Sharing<br />
Network<br />
90 minutes<br />
Brian Levine & Marc Liberatore<br />
Peer-to-peer (p2p) file-sharing networks are used for<br />
acquisition and distribution of images of child sexual<br />
exploitation. This session provides an introduction to<br />
BitTorrent, the most popular p2p application on the<br />
Internet. Presenters will describe how the system<br />
works and how users leverage the network to find and<br />
share content. The discussion will review sources of<br />
evidence available in BitTorrent networks for use in<br />
child pornography investigations. The training will<br />
draw analogies and comparisons to Gnutella and similar<br />
investigations. The presentation will describe challenges<br />
that law enforcement faces when investigating BitTorrent.<br />
United States Postal Inspection Service:<br />
The Value of the Mail in <strong>Child</strong> Exploitation<br />
Investigations<br />
90 minutes<br />
Scott Kelley & Karen Yoakum<br />
This presentation provides attendees with information<br />
about the investigative tools the US Postal Inspection<br />
Service offers in child exploitation cases. The presentation<br />
discusses services available to identify suspect locations,<br />
their Internet service providers, and tools available to<br />
assist in luring/enticement cases. Presenters will provide<br />
case studies to highlight the successful use of these<br />
techniques.<br />
Victim Rights and Restitution<br />
90 minutes<br />
Laurie Levin & Linda Seabrook<br />
This presentation discusses victims’ rights and restitution.<br />
The lecture will address federal statutory avenues<br />
for obtaining restitution for victims of federal child<br />
pornography offenses and recent case law that places<br />
stumbling blocks along these avenues. The presentation<br />
will explore creative ways to use the federal Crime<br />
Victims’ Rights Act as an additional tool to protect the<br />
prosecution’s case.<br />
Victimization <strong>On</strong>line: Patterns and Trends – A<br />
Snapshot<br />
90 minutes<br />
Kevin O’Brien<br />
This session provides a review of recent patterns and<br />
trends of online victimization mined from NCMEC<br />
data including examples of intriguing law enforcement<br />
investigations. Topics include the vulnerabilities of<br />
children using technologies such as smart phones and<br />
social networking. The session explores the increasing<br />
prevalence of victim “self-exploitation.” Industry efforts<br />
to reduce online child victimization including PhotoDNA<br />
will also be presented.<br />
Victims of Commercial Sexual Exploitation &<br />
Domestic Minor Sex Trafficking<br />
90 minutes<br />
Tiffany Rivera & Crystal Ward<br />
This lecture provides prosecutors and investigators with<br />
practical knowledge of CSEC victims including victim<br />
identification, approach tactics, what victims really need,<br />
referral services and victim advocacy. Presenters will<br />
also discuss working with CSEC victims during criminal<br />
proceedings.<br />
62 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Classroom-Based <strong>Training</strong> Sessions<br />
Webcams and the Commercial Sexual<br />
Exploitation of <strong>Child</strong>ren Abroad<br />
90 minutes<br />
James Kilpatrick & Edward McAndrew<br />
This presentation examines the rise of webcams as tools<br />
to facilitate commercial sexual exploitation of children.<br />
The presentation covers the use of webcams by domestic<br />
offenders to exploit foreign children by producing child<br />
pornography or enticing victims in exchange for money.<br />
Presenters discuss webcams used by sex-tourists to<br />
identify and develop online relationships with victims<br />
or their custodians, plan sex-tourism trips and maintain<br />
exploitative relationships after the sex-tourism trip<br />
concludes. Presenters will discuss investigative techniques<br />
and the types of evidence to use in building successful<br />
cases against foreign and domestic targets.<br />
Who Are The <strong>Child</strong>ren? NCMEC’s <strong>Child</strong><br />
Victim Identification Program<br />
90 minutes<br />
Jennifer Lee<br />
This session focuses on child victims and the offenders<br />
who produce child pornography. Based on data from<br />
NCMEC’s <strong>Child</strong> Victim Identification Program,<br />
information including the relationship of child to abuser,<br />
gender and age will be discussed. Using case studies,<br />
this session illustrates the ways children seen in sexually<br />
exploitative images were identified and rescued by law<br />
enforcement, both in the U.S. and worldwide through<br />
Interpol’s network. Participants will learn about the<br />
many investigative and prosecutorial resources available,<br />
including NCMEC’s <strong>Law</strong> <strong>Enforcement</strong> Services Portal.<br />
Windows 8 Preview<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Chris Ard<br />
This presentation showcases some of the features that the<br />
newest Microsoft operating system will offer. The session<br />
highlights some of the changes that will be introduced and<br />
how these changes may influence the law enforcement<br />
and forensic landscape.<br />
Wireless Network Investigation<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 Minutes<br />
Nicholas Newman<br />
This session provides an overview of standards and best<br />
practices for pre and post search warrant investigative<br />
techniques to employ when dealing with wireless<br />
networks.<br />
Working with Cooperating Defendants in<br />
<strong>Child</strong> Pornography Cases<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Keith Becker & Brian Bone<br />
How-to turn a single child pornography case into five,<br />
ten or fifty 50 successful prosecutions? This session<br />
examines the challenges, practical aspects, and benefits<br />
of working with cooperating defendants in online child<br />
exploitation cases. Presenters discuss both organized and<br />
diffuse groups of offenders and strategies to tap into their<br />
networks to apprehend them.<br />
Working With Victims in CSE Cases & Using<br />
Evidence During Forensic Interviews<br />
90 minutes<br />
Robert Giles & Ale Levi<br />
During an investigation involving the technologyfacilitated<br />
sexual exploitation of a child it is imperative<br />
that law enforcement and prosecutors understand the<br />
crime as an assault against a child and not merely a<br />
matter of technology. Investigators and prosecutors must<br />
know that child victims present difficult and unique<br />
challenges. These challenges include cases involving<br />
forced prostitution, children who have no memory<br />
of their victimization and children who feel the need<br />
to protect their abuser(s). This presentation explores<br />
PARTNERS IN PROTECTING CHILDREN 63
Classroom-Based <strong>Training</strong> Sessions<br />
the most effective methods of developing information<br />
from the child who has been victimized through the use<br />
of technology; from the initiation of the investigation<br />
through trial.<br />
Working with Yahoo! on <strong>Law</strong> <strong>Enforcement</strong><br />
Investigations<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Chris Madsen<br />
This presentation provides an overview of Yahoo! services<br />
and technologies, including Flickr photo sharing and<br />
Messenger. In addition to describing the types of data<br />
available to law enforcement from those services and<br />
technologies, presenters will review the processes by<br />
which Yahoo! may provide data to law enforcement,<br />
consistent with state and federal law, including the<br />
Stored Communications Act. Presenters will describe<br />
how Yahoo! detects and reports apparent images of child<br />
pornography.<br />
64 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
INTERPOL Resources for<br />
US <strong>Law</strong> <strong>Enforcement</strong><br />
This presentation will consist of case studies that will explore how<br />
INTERPOL Washington assists U.S. law enforcement agencies in matters<br />
with an international nexus. This assistance generally involves the location<br />
and arrest of known sex offenders, other criminals and fugitives; criminal<br />
history information and records checks from member countries; requests to<br />
obtain evidence or conduct interviews for a judicial or law enforcement<br />
purpose and preparation and issuance of INTERPOL Notices. INTERPOL<br />
notices have demonstrated themselves to be very effective in locating and<br />
tracking high-profile subjects of interest to U.S. law enforcement.<br />
Learn more about INTERPOL Resources<br />
for US <strong>Law</strong> <strong>Enforcement</strong><br />
Check your schedule for the day and time<br />
this Lab-Based <strong>Training</strong> will be offered.<br />
PARTNERS IN PROTECTING CHILDREN 65<br />
Speaker Bios
66 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
Paul Almanza<br />
<strong>National</strong> Coordinator for <strong>Child</strong> Exploitation<br />
Prevention and Interdiction<br />
Office of the Deputy Attorney General,<br />
U.S. Department of Justice<br />
Mr. Almanza is the <strong>National</strong> Coordinator for <strong>Child</strong><br />
Exploitation Prevention and Interdiction in the Office<br />
of the Deputy Attorney General, U.S. Department of<br />
Justice. He joined the Department’s <strong>Child</strong> Exploitation<br />
and Obscenity Section in 2002, working as a line<br />
prosecutor and as a legislative and policy attorney.<br />
Among other matters, he worked on the development<br />
of the Innocence Lost Initiative combating the domestic<br />
victimization of children through prostitution, the<br />
development of Project Safe <strong>Child</strong>hood, and on the<br />
Adam Walsh <strong>Child</strong> Protection and Safety Act of 2006.<br />
Mr. Almanza also was a prosecutor and defense counsel<br />
in the U.S. Army, an attorney in private practice, and<br />
the chief of staff of the Department’s Office of Legal<br />
Policy. He assumed his current position in February<br />
<strong>2012</strong>.<br />
Amy Alvarado<br />
Commercial Sexual Exploited <strong>Child</strong>ren Specialist<br />
Cook County State’s Attorney’s Office<br />
Ms. Alvarado is the Cook County State’s Attorney’s<br />
Office Commercial Sexual Exploited <strong>Child</strong>ren<br />
(CSEC) Specialist. She worked as a Victim-Witness<br />
Specialist for the Domestic Violence Division for<br />
over five years before becoming a part of the office’s<br />
Human Trafficking Unit. While working for the State’s<br />
Attorney’s Office, she also worked with victims of<br />
crime as a Program Specialist at the University of<br />
Illinois Medical Center’s Department of Health Social<br />
Work. Prior to working for the State’s Attorney, she<br />
worked as a Court Advocate for Family Rescue’s<br />
Domestic Violence Reduction Unit, housed in the<br />
Chicago Police Department. As an advocate, she<br />
provided crisis intervention to victims and training to<br />
officers.<br />
Chris Ard<br />
Senior Investigations Consultant<br />
Microsoft<br />
Mr. Ard is a senior consultant with the Microsoft<br />
Cybersecurity Services group. He has been with<br />
Microsoft for more than 12 years. His role within the<br />
team is to provide training and consulting services to<br />
various law enforcement and intelligence groups on<br />
difficult forensic topics and internet investigations. He<br />
has received numerous industry certifications including<br />
CISSP, MCSE, and Security+. He has also published<br />
articles in a leading industry forensic journal and has<br />
spoken at many national and international conferences.<br />
He has a Masters of Business Administration degree<br />
with an emphasis in Information Assurance and a<br />
Bachelor of Science degree in computer science.<br />
Christopher Armstrong<br />
High-Tech Crime <strong>Training</strong> Specialist<br />
SEARCH<br />
Mr. Armstrong is a High-Tech Crime <strong>Training</strong> Specialist<br />
in the High-Tech Crime <strong>Training</strong> Services department<br />
of SEARCH, The <strong>National</strong> Consortium for Justice<br />
Information and Statistics, where he coordinates and<br />
provides training on high-tech crime investigations and<br />
forensics to local, state and federal justice agencies.<br />
He provides technical assistance to law enforcement<br />
agencies in active cases, prepares training curricula,<br />
teaches SEARCH investigative courses and speaks at<br />
conferences throughout the United States.<br />
Brian Arnett<br />
Police Offi cer III<br />
Los Angeles Police Department<br />
Officer Arnett has been working for the Los Angeles<br />
Police Department for 18 years. He began his<br />
assignment with the <strong>ICAC</strong> Task Force eight years ago,<br />
and is currently one of two forensic examiners. He<br />
holds certifications from California DOJ in advanced<br />
forensics and an EnCE from Guidence Software.<br />
PARTNERS IN PROTECTING CHILDREN 65
Speaker Biographies<br />
Dr. Jennie Barr<br />
The Innocent Justice Foundation<br />
Dr. Barr has been employed with a prosecutor-based<br />
state agency in crime victim services since 2000,<br />
serving as Director of <strong>Training</strong> and Victim Assistance,<br />
Program Administrator for Applied Research, Director<br />
of the Sexual Assault Prevention and Crisis Services<br />
Program, which includes the Sexual Assault Response<br />
Team (SART) and Sexual Assault Nurse Examiner<br />
(SANE) Programs as well as a Primary Prevention<br />
Program, and most recently as the Sexual Assault<br />
<strong>Training</strong> Program Coordinator. She has also served<br />
as training specialist and mental health support for<br />
divisions that handle Internet crimes against children,<br />
apprehension of sex offender fugitives, and death<br />
penalty cases.<br />
Keith Becker<br />
Trial Attorney<br />
U.S. Department of Justice, CEOS<br />
Attorney Becker joined the <strong>Child</strong> Exploitation and<br />
Obscenity Section (CEOS) in the Department of<br />
Justice’s Criminal Division as a Trial Attorney in 2010.<br />
He was previously an Assistant United States Attorney<br />
at the United States Attorney’s Office for the District<br />
of Columbia, where he prosecuted federal and local<br />
cases involving violent crimes, narcotics, and child<br />
pornography. Prior to joining the Department, he<br />
clerked for the Honorable Chief Judge Jon P. McCalla<br />
of the Western District of Tennessee in Memphis,<br />
Tennessee. He has a Bachelor of Science degree from<br />
Cornell University and a law degree from Harvard<br />
<strong>Law</strong> School.<br />
Greg Bembridge<br />
Senior Computer Forensic Instructor<br />
Canadian Police College<br />
Mr. Bembridge is a Senior Computer Forensic Instructor<br />
with the Technological Crime Learning Institute at the<br />
Canadian Police College in Ottawa, Canada. He is<br />
involved in the research, development and instruction<br />
of the forensic program delivered to Canadian and<br />
international law enforcement. Previously a Forensic<br />
Analyst with the Royal Canadian Mounted Police Tech<br />
Crime Unit in Halifax, Mr. Bembridge has also worked<br />
as a dedicated forensic analyst to the provincial <strong>Child</strong><br />
Exploitation Unit. Having special interest in evidence<br />
found within the Microsoft Windows registry files, he<br />
has developed, and is currently delivering, a Registry<br />
Analysis Workshop at the Canadian Police College.<br />
Dean Berres<br />
Investigator Sergeant<br />
Wood County Sheriff’s Department<br />
Investigator Berres has been employed with the Wood<br />
County Sheriff’s Department for the past 30 years. He<br />
has received specialized training investigating Cyber<br />
Crimes and, for the past 10 years, the main focus of<br />
his job has been investigating these types of crimes for<br />
the Wood County Sheriff’s Department. Investigator<br />
Berres is active in conducting both fraud and identity<br />
theft investigations for the Department. He also<br />
conducts forensic evaluations of digital evidence for<br />
agencies in Wood County and surrounding counties.<br />
Investigator Berres has been appointed to the FBI<br />
Federal Task Force for Cyber Crime Investigations and<br />
is also a member of the State of Wisconsin Internet<br />
Crimes Against <strong>Child</strong>ren Task Force.<br />
Steve Blackwell<br />
Special Agent<br />
Georgia Bureau of Investigation<br />
Special Agent Blackwell has been with the Georgia<br />
Bureau of Investigation for twenty- seven years, and<br />
has been conducting <strong>ICAC</strong>-related investigations since<br />
2005. He is involved in training other law enforcement<br />
officers in conducting various types of <strong>ICAC</strong>-related<br />
investigations, including undercover chat, peer<br />
to peer, and introduction to online investigations.<br />
Agent Blackwell also works on cases related to the<br />
commercial sexual exploitation of children.<br />
66 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
Rob Blake<br />
Special Agent<br />
Federal Bureau of Investigation<br />
Special Agent Blake has been with the FBI since March<br />
of 2009. He is assigned to the Charlottesville Resident<br />
Agency of the Richmond Field Division, where he<br />
works primarily counterterrorism matters, as well as<br />
various criminal investigations.<br />
Daryl Bloom<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Middle District of Pennsylvania<br />
Attorney Bloom is an Assistant United States Attorney<br />
in the Criminal Division of the United States Attorney’s<br />
Office, in and for the Middle District of Pennsylvania,<br />
duty stationed in the Harrisburg Branch office. He has<br />
worked in the Middle District of Pennsylvania for the<br />
past 10 years. Currently, Attorney Bloom prosecutes<br />
cases involving a wide variety of offenses, including<br />
drug trafficking, sexual exploitation of children,<br />
violent crimes including serial bank robberies and<br />
kidnappings, firearms, passport fraud, identity theft,<br />
counterfeiting and white collar crime.<br />
Allen Bode<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Eastern District of New York<br />
Attorney Bode has been an Assistant United States<br />
Attorney for the Eastern District of New York (EDNY)<br />
since 2003. He has been the EDNY Project Safe<br />
<strong>Child</strong>hood Coordinator since the program’s inception<br />
and has directed investigations and prosecuted child<br />
exploitation cases throughout his tenure as an AUSA.<br />
Prior to his work as a federal prosecutor, he was an<br />
Assistant District Attorney for the Queens County<br />
District Attorney’s Office in Queens, New York.<br />
Brian Bone<br />
Inspector<br />
United States Postal Inspection Service<br />
Inspector Bone has been with the United States Postal<br />
Inspection Service since 2007 and is currently assigned<br />
to the United States Department of Justice’s <strong>Child</strong><br />
Exploitation and Obscenity Section in Washington,<br />
D.C. During his tenure, he has been assigned to work on<br />
child exploitation investigations for USPIS on various<br />
federal and state task forces. In his current capacity,<br />
Inspector Bone conducts complex child exploitation<br />
investigations with a national scope, and performs<br />
computer forensic examinations in support of these<br />
investigations. Prior to joining USPIS, Inspector Bone<br />
worked as a sworn law enforcement officer within the<br />
State of Illinois for over 9 years conducting both cyber<br />
crime and child exploitation investigations.<br />
Mark Bowser<br />
Computer Crimes Specialist<br />
<strong>National</strong> White Collar Crime Center (NW3C)<br />
Mr. Bowser joined the staff of the NW3C in 2008,<br />
bringing with him over 30 years of law enforcement<br />
experience, 10 of which were in the field of computer<br />
forensics. He is currently responsible for providing<br />
support and instruction for all of NW3C’s offerings,<br />
including the BCPI and CP/GPS courses for the U.S.<br />
and the Great Lakes Region of NW3C. Prior to retiring<br />
from Michigan law enforcement, Mr. Bowser had been<br />
assigned to conduct major case investigations and been<br />
assigned to the Michigan State Police (<strong>ICAC</strong>) unit<br />
where he conducted online undercover investigations<br />
along with digital forensics. Mr. Bowser has taught and<br />
spoken to various law enforcement organizations on<br />
the topics of Cyber investigation, Computer forensics,<br />
CP analysis and U/C investigations.<br />
Ty Brevard<br />
Director of <strong>Law</strong> <strong>Enforcement</strong> Technology<br />
SRT Wireless<br />
Mr. Brevard serves as a subject matter expert in the<br />
802.11 exploitation and tracking arena, for both tactical<br />
and strategic missions. He has expertise in operational<br />
techniques and tactics specific to the tracking and<br />
geo-location of Wi-Fi information systems. His focus<br />
has been in the training, presentation and operational<br />
PARTNERS IN PROTECTING CHILDREN 67
Speaker Biographies<br />
support of DEA, Broward Sheriff’s Office, NYPD,<br />
Texas DPS as well other state, local and federal law<br />
enforcement agencies. As a key member of SRT<br />
Wireless’ LE team, he has consulted on investigations<br />
requiring expertise in geo-location, exploitation<br />
or neutralization of Wi-Fi emitters and targets. In<br />
2005, Mr. Brevard joined SR Technologies where<br />
he has advanced his knowledge of Wi-Fi networks/<br />
exploitation and now conducts 802.11 operations and<br />
intermediate/advanced training classes.<br />
Johnathan Bridbord<br />
Lead Computer Forensic Specialist<br />
U.S. Department of Justice, Criminal Division, CEOS<br />
Mr. Bridbord is Lead Computer Forensic Specialist<br />
in the High Technology Investigative Unit within the<br />
<strong>Child</strong> Exploitation and Obscenity Section in the United<br />
States Department of Justice. Among his duties, he<br />
conducts forensic analysis of seized computer systems<br />
and media, provides investigative and analytical<br />
support to prosecutors and law enforcement agents<br />
to identify online child pornography offenses, and<br />
develops strategies for gathering electronic evidence.<br />
Don Brister<br />
Forensic Analyst / Instructor<br />
BlackBag Technologies, Inc.<br />
Mr. Brister joined BlackBag Technologies in 2007. He<br />
has served as a digital forensic analyst, investigator and<br />
lead instructor. With nearly 30 years law enforcement<br />
experience, Mr. Brister offers a wealth of experience<br />
in various investigative roles involving computer<br />
digital evidence. His background includes serving as<br />
the lead investigator in several major, multi-agency<br />
investigations. His law enforcement investigative<br />
experience involved Narcotics, <strong>Child</strong> Exploitation,<br />
Fraud and High Tech. Prior to joining BlackBag, Mr.<br />
Brister served as an instructor for the California<br />
Department of Justice, training law enforcement<br />
investigators in the areas of high technology<br />
investigations, Internet investigations and digital<br />
evidence recovery.<br />
Travis Burrows<br />
Supervisory Senior Resident Agent<br />
Federal Bureau of Investigation<br />
SSRA Burrows is a sixteen-year veteran of the FBI and<br />
has spent the last nine years investigating or supervising<br />
investigations in Indian Country in Northern Montana.<br />
He has extensive knowledge in the investigation of<br />
crimes against children in Indian Country, particularly<br />
child sexual and physical abuse cases.<br />
Nirupa Calvin<br />
Investigator, Trust & Safety<br />
Google<br />
Ms. Calvin is part of Google’s Trust and Safety Team<br />
that is responsible for the protection of Google<br />
revenue, users and brand. Her key focus area is child<br />
safety investigations. She is also actively involved in<br />
some of Google’s key online child safety initiatives.<br />
She is an honors graduate, with a Master’s Degree in<br />
Computer Science and Technology from the University<br />
of Madras, India.<br />
Kristian Carlson<br />
Lieutenant, Burlington Police Department<br />
The Innocent Justice Foundation<br />
Lt. Carlson is the Commander of the Vermont Internet<br />
Crimes Against <strong>Child</strong>ren Task Force (VT-<strong>ICAC</strong>).<br />
As a nationwide leader in implementing a mental<br />
health and wellness program in his Task Force, Lt.<br />
Carlson has developed the SHIFT “Finding a Mental<br />
Health Professional Guide” and acted as an adviser<br />
in the development of the SHIFT curriculum. He<br />
has instructed extensively for the program, and is<br />
also a presenter for the <strong>National</strong> District Attorneys<br />
Association (NDAA) and Internet Crimes Against<br />
<strong>Child</strong>ren <strong>Training</strong> & Technical Assistance Program. He<br />
is also the co-author of the text, “An Introduction to<br />
Vermont Criminal <strong>Law</strong>.” He is an adjunct computer<br />
forensics and criminal procedure faculty member at<br />
Champlain College.<br />
68 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
Lisa Carroll<br />
Detective<br />
Delaware County District Attorney’s Office/PA <strong>ICAC</strong><br />
Detective Carroll has been a law enforcement officer<br />
for over sixteen years and a Detective with the<br />
Delaware County Criminal Investigation Division of<br />
the District Attorney’s Office/Pennsylvania <strong>ICAC</strong> for<br />
ten years. She has been trained in the field of child<br />
physical and sexual abuse and the use of the Internet by<br />
sexual offenders to seduce, entice, and gain access to<br />
children for the purposes of sexual exploitation. She<br />
has worked in an undercover capacity in the area of<br />
child pornography and child exploitation where she<br />
engaged in online communication with individuals<br />
looking to engage in sexual acts with children and/<br />
or procure child pornography. Detective Carroll is<br />
also involved in public education and helps promote<br />
Internet safety and Cyber bullying awareness.<br />
Dennis Carry<br />
Detective Sergeant<br />
Washoe County Sheriff’s Office<br />
Detective Carry has been in law enforcement for 16<br />
years and has been assigned to investigate <strong>ICAC</strong> and<br />
other cyber-related cases since 2004. He serves as a<br />
dual-role investigator conducting computer forensic<br />
analysis in addition to investigations. Detective Carry<br />
has qualified as an expert in several courts and often<br />
testifies before the Nevada State Legislature about<br />
cyber-related crimes and legislation. He has instructed<br />
over 400 law enforcement personnel in the use of<br />
various <strong>ICAC</strong>-related investigative techniques and<br />
is currently an instructor for Fox Valley Technical<br />
College.<br />
Bethany Case<br />
Visiting Fellow<br />
U.S. Department of Justice, Office for Victims of<br />
Crime<br />
Ms. Case is a Licensed Clinical Social Worker and has<br />
been a Visiting Fellow at the Justice Department’s<br />
Office for Victims of Crime since the fall of 2008.<br />
Her work experience prior to moving to Washington,<br />
D.C. includes: Forensic Interviewer at a <strong>Child</strong>ren’s<br />
Advocacy Center; Mental Health Provider in a high<br />
school setting; and State <strong>Child</strong> Protection Investigator.<br />
She received her Bachelor of Arts Degree in Social<br />
Work from Southeastern Louisiana University and<br />
her Master of Social Work Degree from Louisiana<br />
State University. She is currently licensed to practice<br />
clinical social work in both Louisiana and the District<br />
of Columbia.<br />
TC Cassidy<br />
Senior Program Development Specialist<br />
Runaway and <strong>Home</strong>less Youth <strong>Training</strong> and Technical<br />
Assistance Centers<br />
Ms. Cassidy is Senior Program Development Specialist<br />
for the University of Oklahoma’s Runaway and<br />
<strong>Home</strong>less Youth Technical Assistance Center. Her<br />
fields of expertise are runaway and homeless youth,<br />
basic center, transitional living, street outreach, youth<br />
development, GLBTQ, and human trafficking. She<br />
plays a key role in the assessment, design, and provision<br />
of technical assistance services for the Center. She has<br />
extensive experience in the field of youth services<br />
and has worked in both direct care and supervisory<br />
positions in basic center, transitional living, and street<br />
outreach programs. She earned her Master’s Degree<br />
in Public Administration from the University of<br />
Tennessee.<br />
Thomas Clancy<br />
Director<br />
<strong>National</strong> Center for Justice and the Rule of <strong>Law</strong>, Univ.<br />
of Mississippi<br />
Mr. Clancy is a Research Professor and Director of the<br />
<strong>National</strong> Center for Justice and the Rule of <strong>Law</strong> at the<br />
University of Mississippi School of <strong>Law</strong>. He has taught<br />
at several law schools on subjects ranging from criminal<br />
law and procedure to the Fourth Amendment, cyber<br />
crime, and constitutional law. Mr. Clancy has more<br />
than 25 years of trial and post-conviction litigation<br />
experience, has briefed and argued over 900 criminal<br />
appeals, lectures nationally, and has authored numerous<br />
PARTNERS IN PROTECTING CHILDREN 69
Speaker Biographies<br />
articles on the Fourth Amendment, including the<br />
treatise The Fourth Amendment: Its History and<br />
Interpretation (Carolina Academic Press 2008) and the<br />
text Cyber Crime and Digital Evidence: Materials and<br />
Cases (LexisNexis 2011). He is a graduate of Vermont<br />
<strong>Law</strong> School and the University of Notre Dame.<br />
Jim Cole<br />
Special Agent / <strong>National</strong> Program Manager for<br />
Victim Identifi cation<br />
<strong>Home</strong>land Security Investigations (HSI)<br />
Special Agent Cole is currently the HSI <strong>National</strong><br />
Program Manager for Victim Identification at the<br />
<strong>Home</strong>land Security Investigations Cyber Crime<br />
Center, <strong>Child</strong> Exploitation Center. He is a certified<br />
computer forensic examiner and conducts image and<br />
video analysis related to victim identification. Special<br />
Agent Cole has over 19 years of local and federal law<br />
enforcement experience. Previously, he conducted<br />
national security investigations for the Army and then<br />
investigated violent crimes in Indian Country.<br />
Guy Collings<br />
Detective Superintendent<br />
<strong>Child</strong> Exploitation and <strong>On</strong>-line Protection Centre<br />
(CEOP) UK<br />
Detective Superintendent Collings is head of the<br />
Behavioral Analysis Unit at CEOP in London, the<br />
only unit of its kind in the United Kingdom. He<br />
has been a police officer for 23 years and is a career<br />
detective, being an accredited Senior Investigating<br />
Officer since 2003. He has been head of both the<br />
Homicide and Public Protection Units of Lincolnshire<br />
Police, leading numerous homicide, death in overseas<br />
jurisdictions, kidnap and sexual crimes against<br />
children investigations. He has been commended for<br />
his leadership by various chief constables and his work<br />
has been recognized by the award of several judge’s<br />
commendations. He holds an undergraduate degree<br />
in Criminology, a Master’s Degree in Leadership<br />
& Management and a Post Graduate Certificate in<br />
Forensic Behavioral Psychology.<br />
Catherine S. Connell<br />
<strong>Child</strong>/Adolescent Forensic Interviewer<br />
Federal Bureau of Investigation<br />
Ms. Connell is a state licensed Clinical Social Worker,<br />
and is currently employed with the FBI as a <strong>Child</strong>/<br />
Adolescent Forensic Interviewer with the Office<br />
of Victim Assistance. She provides interviews,<br />
consultation and training for FBI Agents, Assistant<br />
United States Attorneys, and other federal and state<br />
law enforcement. Prior to joining the FBI, Ms. Connell<br />
was the Director of Intervention and Treatment at<br />
CARE House, a <strong>Child</strong> Advocacy Center in Pontiac,<br />
Michigan. She was responsible for the collaboration of<br />
the multidisciplinary team, conducting and supervising<br />
forensic interviews, and the coordination of follow-up<br />
services for child victims and their families. Prior to<br />
that, she was a forensic interviewer for 7 years in Mt.<br />
Clemens, Michigan.<br />
Brant Cook<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Southern District of Indiana<br />
Mr. Cook is an Assistant United States Attorney with<br />
the United States Attorney’s Office for the Southern<br />
District of Indiana. His focus is on the prosecution of<br />
cases involving the sexual exploitation of children,<br />
particularly as facilitated by the internet, as part of<br />
the federal government’s increasing emphasis on<br />
addressing the issue under Project Safe <strong>Child</strong>hood.<br />
Mr. Cook began his career with the Franklin County<br />
(Ohio) prosecutor’s office, where he prosecuted<br />
cases involving the physical and sexual abuse of<br />
women and children, and developed a specialization<br />
in the prosecution of cases involving the online sexual<br />
exploitation of children. He is a graduate of The Ohio<br />
State University and the University of Virginia School<br />
of <strong>Law</strong>.<br />
Michael Corricelli<br />
Inspector<br />
U.S. Postal Inspection Service<br />
Inspector Corricelli has been a U.S. Postal Inspector for<br />
70 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
over 18 years. He specializes in proactive undercover<br />
operations and investigating the exploitation of<br />
children where there is a nexus to the mail. He holds a<br />
Master’s degree in Forensic Sciences from the George<br />
Washington University and a Bachelor’s degree in<br />
Criminal Justice from the University of Massachusetts.<br />
He also completed a prestigious year-long fellowship<br />
in Forensic Medicine with the Armed Forces Institute<br />
of Pathology. He is an Adjunct Professor of Criminal<br />
Justice at Lebanon Valley College and is often called<br />
upon within his agency and from outside organizations<br />
to lecture on child exploitation investigations.<br />
Vincent Costagliola<br />
VP, <strong>Law</strong> <strong>Enforcement</strong> Technologies<br />
SRT Wireless, LLC<br />
Mr. Costagliola serves the United States Government,<br />
both the law enforcement and intelligence communities,<br />
as a subject matter expert in the 802.11 exploitation<br />
and tracking arena, for both tactical and strategic<br />
missions. He has expertise in systems integration,<br />
networking architecture, operational techniques<br />
and tactics in the tracking and geo-location of Wi-Fi<br />
information systems. Over the past four years his focus<br />
has been in the training, presentation and operational<br />
support of local and federal law enforcement agencies<br />
with targets of interest utilizing Wi-Fi technologies<br />
for nefarious uses in the area of child pornography,<br />
terrorism, fraud and national security arenas.<br />
Shia Cruciani<br />
Police Offi cer<br />
DeWitt Police Department<br />
Officer Cruciani is a full-time police officer in DeWitt,<br />
Iowa. In addition to her regular duties, she is an active<br />
member of the Iowa Internet Crimes Against <strong>Child</strong>ren<br />
Task Force which involves reactively and proactively<br />
investigating crimes involving online enticement of<br />
minors for illegal sex acts and production, distribution,<br />
receipt, and possession of child pornography. She holds<br />
an Associate’s Degree in Liberal Arts, a Bachelor’s<br />
Degree in <strong>Law</strong> <strong>Enforcement</strong> & Justice Administration,<br />
a Master’s Degree in Criminal Justice, and will<br />
soon complete a Master’s Degree in Organizational<br />
Management. During her 10 years of law enforcement<br />
service she has received various awards.<br />
Anne Darr<br />
Victim Specialist<br />
Federal Bureau of Investigation<br />
Ms. Darr received her Bachelor of Science Degree from<br />
Illinois State University and two Master’s Degrees in<br />
Forensic Psychology and Counseling from Marymount<br />
University in Arlington, Virginia. Prior to joining the<br />
FBI, she worked as a Mobile Crisis Counselor for Prince<br />
George’s County Police, Maryland. She began her<br />
career with the FBI in the Anchorage, Alaska Division<br />
and currently is assigned to the Denver Division,<br />
serving victims of federal crime. In addition, she is<br />
part of the Innocence Lost Task Force, which partners<br />
with both local and federal law enforcement to combat<br />
human trafficking. She was one of 11 team members<br />
who were awarded the Director’s Award from the<br />
United States Attorney’s Office for Best Performance<br />
by a Litigative Team, which was presented by Attorney<br />
General Eric Holder in 2010.<br />
Randall Devine<br />
Special Agent<br />
Federal Bureau of Investigation<br />
Special Agent Devine is with the Los Angeles Office<br />
of the FBI and investigates child sex tourism offenses.<br />
Elizabeth B. Dowdell<br />
Associate Professor<br />
Villanova University<br />
Dr. Dowdell is an associate professor at Villanova<br />
University, College of Nursing. She is a forensic<br />
pediatric nurse whose program of research has<br />
focused on studying vulnerable populations such as<br />
high-risk adolescents, grandmother caregivers, and<br />
infants who have been abducted from homes and<br />
hospitals. Dr. Dowdell has published in the areas of<br />
health risk behaviors, caregiver burden, issues of foster<br />
PARTNERS IN PROTECTING CHILDREN 71
Speaker Biographies<br />
care placement, and high risk Internet behaviors of<br />
adolescents.<br />
Mike Duffey<br />
Special Agent<br />
Florida Department of <strong>Law</strong> <strong>Enforcement</strong><br />
Special Agent Duffey is currently assigned to the<br />
Computer Crime Center in Tallahassee, Florida<br />
where he is responsible for statewide computer<br />
crime investigations including Internet Crimes<br />
Against <strong>Child</strong>ren with the Florida Department of<br />
<strong>Law</strong> <strong>Enforcement</strong>. His law enforcement experience<br />
includes working for the Tallahassee Police<br />
Department and the Florida Department of Insurance.<br />
Special Agent Duffey is a graduate of the Florida State<br />
University School of Criminology, and has completed<br />
his Microsoft Certified System Administrator (MCSA)<br />
course work. His current cases include <strong>On</strong>line <strong>Child</strong><br />
Exploitation, Network intrusion cases, Phishing scams<br />
and unauthorized access to a network system.<br />
Brandon Enochs<br />
Computer Scientist<br />
U.S. Naval Research Laboratory<br />
Mr. Enochs is a computer scientist in the Mobile<br />
Systems Security section of the U.S. Naval Research<br />
Laboratory (NRL) in Washington, DC. He has worked<br />
at the NRL for six years and is the creator of Flying<br />
Squirrel, the Department of Defense’s standard<br />
Wireless Discovery Application. Sponsored by the<br />
<strong>National</strong> Security Agency’s Information Assurance<br />
Scholarship Program, Mr. Enochs obtained both his<br />
Bachelors and Masters of Science in Computer Science<br />
from the University of Tulsa.<br />
Robert Erdely<br />
Corporal, Retired<br />
Pennsylvania State Police<br />
Corporal Erdely (ret.) has been a member of the<br />
Pennsylvania State Police since 1991, and for over 13<br />
of those years was assigned to the Computer Crime<br />
Unit, recently retiring as supervisor of the unit. He<br />
is now in charge of developing and supporting the<br />
RoundUp and <strong>ICAC</strong>Cops.com project. He holds<br />
several forensic, Microsoft, and Cisco certifications.<br />
Tom Eskridge<br />
Partner<br />
High Tech Crime Institute<br />
Mr. Eskridge retired after 28 plus years in law<br />
enforcement. He has trained law enforcement and<br />
military personnel since 1999 in the field of hightech/Internet-based<br />
investigations and computer<br />
forensics. He began working computer crime-related<br />
cases in 1996 as a major fraud investigator, and in 1999<br />
he co-founded the South Bay Regional Computer<br />
Forensics Laboratory. Since his retirement from law<br />
enforcement, he has been a partner with the High<br />
Tech Crime Institute. HTCI has trained military and<br />
law enforcement since 2002 in the subject of digital<br />
investigations and forensics. HTCI is in its second year<br />
of delivering Cell Phone Investigations training under<br />
a Federal grant to <strong>ICAC</strong> members.<br />
Trevor Fairchild<br />
Programmer / Analyst<br />
<strong>On</strong>tario Provincial Police<br />
Mr. Fairchild is a civilian software engineer in the<br />
<strong>On</strong>tario Provincial Police, Electronic Crime Section,<br />
Technological Crime Unit. Since 2003, he has developed<br />
free software designed to assist law enforcement<br />
around the world with the tedious job of categorizing<br />
material in child exploitation investigations. These<br />
programs: C4P, C4M, and C4All have been used by<br />
hundreds of police agencies around the world for over<br />
eight years and have helped introduce standards and<br />
efficiencies that mean less time behind monitors and<br />
more time arresting offenders.<br />
Hany Farid<br />
Professor<br />
Dartmouth College<br />
Professor Farid received his undergraduate degree<br />
in Computer Science and Applied Mathematics from<br />
72 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
the University of Rochester in 1989. He received<br />
his Ph.D. in Computer Science from the University<br />
of Pennsylvania in 1997. Following a two-year postdoctoral<br />
position in Brain and Cognitive Sciences at<br />
MIT, he joined the faculty at Dartmouth in 1999, where<br />
he is currently a Professor of Computer Science. He is<br />
also the Chief Technology Officer and co-founder of<br />
Fourandsix Technologies, Inc., as well as the recipient<br />
of an NSF CAREER award, a Sloan Fellowship and a<br />
Guggenheim Fellowship.<br />
Josh Findley<br />
Special Agent<br />
<strong>Home</strong>land Security Investigations<br />
Special Agent Findley is an agent with the Department<br />
of <strong>Home</strong>land Security, <strong>Home</strong>land Security<br />
Investigations. He has specialized in <strong>Child</strong> Sexual<br />
Exploitation investigations for seven years and has 19<br />
years of law enforcement experience.<br />
Martha Finnegan<br />
<strong>Child</strong>/Adolescent Forensic Interview Specialist<br />
FBI<br />
Ms. Finnegan was hired as the <strong>Child</strong>/Adolescent<br />
Forensic Interview Specialist for Innocent Images,<br />
the FBI’s multi-agency investigative initiative to<br />
combat child pornography and child exploitation<br />
facilitated through the use of online computers. The<br />
FBI then moved Ms. Finnegan’s <strong>Child</strong>/Adolescent<br />
Forensic Interview Specialist position to the Office<br />
for Victim Assistance where she is available to provide<br />
expert testimony, technical assistance and training<br />
to FBI personnel, United States Attorneys, and<br />
other federal, state and local agencies in the areas of<br />
forensic interviewing of child victims of abuse and<br />
exploitation. She is also available to conduct child/teen<br />
victim interviews and/or help agents locate qualified<br />
interviewers in their area.<br />
Justin Fitzsimmons<br />
Senior Attorney<br />
<strong>National</strong> District Attorneys Association (NDAA)<br />
Attorney Fitzsimmons is a Senior Attorney with<br />
NDAA’s <strong>National</strong> Center for Prosecution of <strong>Child</strong><br />
Abuse in Alexandria, Virginia. He organizes national<br />
conferences each year for technology-facilitated child<br />
sexual exploitation. Additionally, he trains at other<br />
state and local seminars on the subject of sexual<br />
crimes against children. He also serves as a member<br />
of working groups on Innocence Lost, Restitution<br />
for Victims of <strong>Child</strong> Pornography, and Cyberbullying<br />
with other individuals from federal, state and local law<br />
enforcement, non-profit organizations and Internet<br />
safety organizations to develop responses and education<br />
to technology-facilitated crimes. Prior to coming to<br />
NDAA in June of 2009, Attorney Fitzsimmons was an<br />
Assistant State’s Attorney in Illinois for 11 years.<br />
Michelle Ford-Stepney<br />
Supervisory Analyst<br />
INTERPOL Washington<br />
Ms. Ford-Stepney serves as a Supervisory INTERPOL<br />
Analyst for INTERPOL Washington, U.S. <strong>National</strong><br />
Central Bureau (USNCB), a component of the<br />
Department of Justice. Ms. Ford-Stepney is responsible<br />
for managing day-to-day operations and administration<br />
within her assigned division: Human Trafficking<br />
and <strong>Child</strong> Protection. Her division maintains direct<br />
contact with counterparts in 190 other member<br />
countries and with over 18,000 U.S. law enforcement<br />
agencies across the country, facilitating police-topolice<br />
communications and providing assistance with<br />
criminal investigations.<br />
Kevin Forder<br />
Associate General Counsel<br />
United States Marshals Service, Office of General<br />
Counsel<br />
Attorney Forder is an Associate General Counsel at the<br />
USMS, where his primary responsibilities are training<br />
and operational counsel in the criminal enforcement<br />
PARTNERS IN PROTECTING CHILDREN 73
Speaker Biographies<br />
of the Adam Walsh Act and for judicial security<br />
and related intelligence operations. He is a former<br />
Assistant United States Attorney and former adjunct<br />
professor at George Washington University School<br />
of <strong>Law</strong>. He served in numerous criminal prosecution<br />
capacities and in the Office of Intelligence and Policy<br />
Review (OIPR) at the Justice Department before<br />
joining the USMS in 2004. While at OIPR, he served<br />
as an Associate Investigative Counsel on the Webster<br />
Commission for the review of FBI security programs<br />
related to the Hanssen espionage matter.<br />
James Fottrell<br />
Director, High Technology Investigative Unit<br />
U.S. Department of Justice, <strong>Child</strong> Exploitation and<br />
Obscenity Section<br />
Mr. Fottrell is the Director of the High Technology<br />
Investigative Unit within the <strong>Child</strong> Exploitation and<br />
Obscenity Section in the Criminal Division of the<br />
United States Department of Justice. Among his duties,<br />
he manages a staff of computer forensics specialists and<br />
conducts forensic examinations of seized computer<br />
systems and media, provides investigative and analytical<br />
support to prosecutors and law enforcement agents<br />
to identify online child exploitation offenses, and<br />
develops strategies for gathering electronic evidence.<br />
Mr. Fottrell began his pioneering role in online child<br />
exploitation offenses in 1992 while working with the<br />
U.S. Customs Service’s Office of <strong>Enforcement</strong>.<br />
Lance Fragomeli<br />
Special Agent/ Polygraph Examiner<br />
Federal Bureau of Investigaiton<br />
Special Agent Fragomeli has been an FBI agent for the<br />
past 22 years. He is currently a full-time polygraph<br />
examiner, working out of the FBI’s Cleveland office.<br />
To date, Mr. Fragomeli has conducted over 1,000<br />
polygraph examinations. He has traveled both<br />
domestically and internationally to conduct polygraph<br />
examinations on behalf of the FBI, Department of<br />
Defense, and other federal agencies, and routinely<br />
conducts polygraph examinations on behalf of state<br />
and local police departments within Ohio.<br />
Lisa Marie Freitas<br />
Trial Attorney<br />
U.S. Department of Justice<br />
Attorney Freitas is a Trial Attorney with the Department<br />
of Justice’s <strong>Child</strong> Exploitation and Obscenity Section.<br />
She is currently on detail to the District of Maryland as<br />
a Special Assistant United States Attorney prosecuting<br />
child pornography, online enticement and child<br />
prostitution. Prior to working for the Department<br />
of Justice, Attorney Freitas was a Special Agent with<br />
the FBI assigned to investigate child exploitation and<br />
terrorism offenses. Before entering on duty with the<br />
FBI, she worked as an Assistant State Attorney with the<br />
Palm Beach County State Attorney’s Office.<br />
Anne Gannon<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Central District of California,<br />
Santa Ana Office<br />
Attorney Gannon is an Assistant United States Attorney<br />
in the Central District of California where she is<br />
currently the Project Safe <strong>Child</strong>hood Coordinator for<br />
Orange County. She has prosecuted child exploitation<br />
offenses since 2005. In 2009, she was honored as one<br />
of The Top Women Litigators in California by the Los<br />
Angeles Daily Journal for her appellate work on child<br />
exploitation issues. She clerked for the Honorable<br />
Raner C. Collins, United States District Court, District<br />
of Arizona, Tucson Division. In 2002, following her<br />
clerkship, she began her career as an Assistant United<br />
States Attorney in Tucson prosecuting border crimes.<br />
Additionally, she has taught courses in trial advocacy at<br />
the <strong>National</strong> Advocacy Center.<br />
James Reeves Garnett<br />
Special Agent<br />
Tennessee Bureau of Investigation<br />
Special Agent Garnett has worked for the Tennessee<br />
Bureau of Investigation for three years in the Technical<br />
Services Unit and has been a member of an FBI Joint<br />
Cyber Crime Task Force for two years. His primary role<br />
is a computer forensics examiner, but he also assists in<br />
74 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
the technical aspects of cyber and field investigations.<br />
He has a Bachelors Degree in Information Systems<br />
Engineering from the United States Military Academy,<br />
West Point, New York. Prior to law enforcement,<br />
he spent five years on Active Duty in the U.S. Army<br />
serving as a Field Artillery Officer and one year as a<br />
high school math teacher near Memphis, TN.<br />
Ernesto Gaxiola<br />
Detective<br />
Glendale Police Department<br />
Detective Gaxiola is a detective with the Glendale,<br />
California Police Department and is currently assigned<br />
to the Violent Crimes Bureau. He has been a police<br />
officer for 10 years and for the past five years he has<br />
worked a variety of sexual assault cases, including<br />
Internet crimes pertaining to children. Detective<br />
Gaxiola has been with the Los Angeles <strong>ICAC</strong> Task Force<br />
for the past two years and, most recently, he assisted<br />
with Operation Delego, a joint operation with ICE,<br />
where numerous suspects were taken into custody<br />
for various violations regarding the exploitation of<br />
children.<br />
Shannon Geaney<br />
Detective II<br />
Los Angeles Regional <strong>ICAC</strong><br />
Detective Geaney is a 14-year veteran of the Los<br />
Angeles Police Department. Her previous assignments<br />
include Patrol, Counter-Terrorism Bureau, Sex<br />
Crimes and Homicide. She has been assigned to the<br />
Los Angeles Regional <strong>ICAC</strong> since 2007. Detective<br />
Geaney worked as an Investigator before becoming<br />
a full-time Forensic Examiner in 2008. She currently<br />
supervises the Los Angeles Regional Task Force<br />
Forensic Lab located within the <strong>Home</strong>land Security<br />
Investigations Computer Forensics Lab. Detective<br />
Geaney has a Bachelor’s Degree in Forensic Science<br />
and has completed her EnCE Certification.<br />
Norman Gibson<br />
Computer Crime Specialist<br />
<strong>National</strong> White Collar Crime Center<br />
Robert Giles<br />
Senior Attorney<br />
<strong>National</strong> District Attorneys Association<br />
Attorney Giles is a Senior Attorney for the <strong>National</strong><br />
Center for the Prosecution of <strong>Child</strong> Abuse at the<br />
<strong>National</strong> District Attorneys Association. He trains on<br />
a wide variety of topics relating to investigation and<br />
prosecution of child abuse. As an Assistant Prosecuting<br />
Attorney in Oakland County Michigan, he prosecuted<br />
child sexual assault cases for 9 years. Attorney Giles<br />
also was Section Leader of the <strong>Child</strong> Sexual Assault<br />
Unit at the Oakland County Prosecutor’s Office. Prior<br />
to joining the Oakland County Prosecutor’s Office, he<br />
was a <strong>Law</strong> Clerk to the Honorable Damon J. Keith,<br />
Judge on the United States Court of Appeals for the<br />
Sixth Circuit. He received his law degree from the<br />
University of Detroit Mercy School of <strong>Law</strong> and his<br />
Bachelor’s of Arts Degree from DePauw University.<br />
Charles Gillingham<br />
Deputy District Attorney<br />
Santa Clara County District Attorney’s Office<br />
Deputy District Attorney Gillingham has been a<br />
prosecutor with Santa Clara County for 18 years.<br />
He was a member of the San Jose <strong>ICAC</strong> Task<br />
Force and was responsible for the prosecution of<br />
Internet investigations, child pornography, and child<br />
molestation cases. He has instructed on the topic of<br />
Internet Crimes and <strong>Child</strong> Exploitation at the San Jose<br />
and Dallas <strong>ICAC</strong> Conferences and at several colleges<br />
and police academies on various topics. Deputy<br />
District Attorney Gillingham is an Adjunct Professor of<br />
<strong>Law</strong> in Evidence at Santa Clara University. He was the<br />
California District Attorney’s Association Instructor of<br />
the Year for 2004.<br />
PARTNERS IN PROTECTING CHILDREN 75
Speaker Biographies<br />
Sharon Girling<br />
<strong>Child</strong> Protection Advocate/Retired Police Offi cer<br />
A Gentle Touch Ltd<br />
Ms. Girling is a retired police officer who spent<br />
the last ten years of her service engaged in policing<br />
child abuse on the Internet. During that time, she<br />
was the case officer for many international high<br />
profile investigations including Operation Cathedral,<br />
Operation Ore, Operation Alpine and Operation<br />
Landmark. Each of these cases resulted in safeguarding<br />
and rescuing children from abuse and abusers. They<br />
also concluded with successful convictions of sex<br />
offenders. Ms. Girling developed the initial child<br />
abuse image database and pioneered the creation of the<br />
International <strong>Child</strong> Sexual Exploitation image database<br />
held at Interpol. She is currently the <strong>Child</strong> Protection<br />
Advocate for the new top level domain .XXX and is<br />
advising them on issues regarding the protection of<br />
children.<br />
Melinda Gobron<br />
Detective<br />
Sacramento Valley Hi-Tech Crimes Task Force, Internet<br />
Crimes Against <strong>Child</strong>ren<br />
Detective Gobron has 12 years of law enforcement<br />
experience and has been assigned to the Sacramento<br />
Valley Hi-Tech Crimes Task Force, Internet Crimes<br />
Against <strong>Child</strong>ren (<strong>ICAC</strong>) for the last four years. This<br />
detail is a federal and state-funded task force managed<br />
by the Sacramento Sheriff’s Office with agents<br />
from federal, state, and local agencies. The <strong>ICAC</strong><br />
investigates online child exploitation crimes, including<br />
child pornography, enticement, and sex trafficking.<br />
She holds a Bachelor’s Degree in Sociology from the<br />
University of California, Davis.<br />
Tony Godwin<br />
Detective<br />
Garland Police Department Internet Crimes Against<br />
<strong>Child</strong>ren<br />
Detective Godwin has been with the Garland Police<br />
Department for 18 years; he has spent the last seven<br />
years in Criminal Investigations, specifically Youth<br />
Crimes. Detective Godwin has been a member of<br />
the Northern Texas <strong>ICAC</strong> Task Force for the past 3<br />
1/2 years, conducting proactive online undercover<br />
investigations into the sexual exploitation of children<br />
on the internet. He is a Master Peace Officer in the<br />
State of Texas, and has had great success apprehending<br />
sexual offenders from across the nation who are willing<br />
to travel sexually exploit children. Detective Godwin<br />
is also a TCLEOSE Instructor, and has presented<br />
for numerous law enforcement agencies, and other<br />
professions related to this line of work.<br />
Matthew Gray<br />
Lieutenant<br />
Houston Metro Internet Crimes Against <strong>Child</strong>ren Task<br />
Force<br />
Lieutenant Gray is with the Pasadena ISD Police<br />
Department and is also the Commander of the<br />
Houston Metro Internet Crimes Against <strong>Child</strong>ren<br />
Task Force. The Houston Metro <strong>ICAC</strong> is one of<br />
61federally-funded task forces consisting of local and<br />
federal law enforcement agencies united to combat<br />
child exploitation. Lt. Gray served as a Sergeant in<br />
an Airborne Infantry Unit in Fort Benning, Georgia.<br />
He has received extensive training in computer<br />
forensics, online investigations, behavioral analysis,<br />
and interviewing.<br />
Steven Grocki<br />
Assistant Deputy Chief<br />
U.S. Department of Justice, <strong>Child</strong> Exploitation and<br />
Obscenity Section<br />
Mr. Grocki is currently the Assistant Deputy Chief<br />
for Litigation at the Department of Justice’s <strong>Child</strong><br />
Exploitation and Obscenity Section (CEOS) in<br />
Washington, DC. In his capacity as Assistant Deputy<br />
Chief for Litigation, Mr. Grocki supervises CEOS’<br />
15 trial attorneys. CEOS’ team of attorneys actively<br />
prosecutes all federal crimes relating to the exploitation<br />
of children, leads large national and international child<br />
76 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
exploitation investigations, and provides advice and<br />
training to federal prosecutors and law enforcement.<br />
Bill Harmon<br />
Associate General Counsel, Digital Crimes Unit<br />
Microsoft<br />
Attorney Harmon is an Associate General Counsel<br />
for the Microsoft Digital Crimes Unit. He leads<br />
a worldwide team focused on developing and<br />
implementing groundbreaking legal and technological<br />
solutions to help protect children online and to help<br />
stop ID theft, malicious code, botnets, spam, spyware,<br />
click fraud and other forms of online fraud.<br />
Kellen Harwell<br />
Electrical Engineer<br />
U.S. Naval Research Lab<br />
Mr. Harwell is an electrical engineer in the Mobile<br />
Systems Security section of the U.S. Naval Research<br />
Laboratory (NRL) in Washington, D.C. In four years<br />
at NRL, he has developed inertial navigation units,<br />
collection systems, and geolocation algorithms. Mr.<br />
Harwell obtained both his Bachelors and Masters of<br />
Science in Electrical Engineering from Oklahoma<br />
State University.<br />
Michael Hill<br />
Sergeant<br />
Massachusetts State Police<br />
Sergeant Hill has been a Massachusetts State Police<br />
Officer since 1993. He has worked in the State<br />
Police Berkshire Detective Unit from 1995 to 2011<br />
investigating major crimes, including computer/<br />
Internet related crimes. Sergeant Hill has been a<br />
member of the Massachusetts Internet Crimes Against<br />
<strong>Child</strong>ren Task Force since 2000 and is the current<br />
Massachusetts <strong>ICAC</strong> Task Force Commander. He has<br />
had extensive training and experience with the seizure<br />
and forensic examination of computers. Additionally,<br />
he has been involved in peer to peer investigations<br />
since 2004, which resulted in numerous search<br />
warrants, arrests, and convictions. Sergeant Hill is<br />
currently proactively investigating child exploitation<br />
on the Gnutella, eD2K, and Ares networks.<br />
Graham Hill<br />
Director<br />
KLIK Protective Services<br />
Mr. Hill retired from the Police Service in 2011 after<br />
30 years as an Operational Detective and a Senior<br />
Investigating Officer. Between 2007 and 2011, he<br />
was Head of the Behavior Analysis for the <strong>Child</strong><br />
Exploitation <strong>On</strong>line Protection Centre (CEOP). He is<br />
a Behavioral Profiler who has given operational advice<br />
on over 150 serious sexual crimes against children and<br />
conducted peer reviews for law enforcement agencies<br />
in relation to Missing, Trafficked, Abducted and<br />
Murdered <strong>Child</strong>ren. He is currently a Ph.D student<br />
at Durham University where his research is focused<br />
on the Behavior of Perpetrators of Sexually Motivated<br />
Non-Familial <strong>Child</strong> Abduction/Murder. He is also<br />
an Honorary Lecturer in the School of Psychology<br />
at Birmingham University and the School of Applied<br />
Sciences at Durham.<br />
Tia Hoffer<br />
Supervisory Special Agent<br />
Federal Bureau of Investigation, Behavioral Analysis<br />
Unit III<br />
Supervisory Special Agent Hoffer has been with the<br />
FBI for almost 14 years and is currently assigned to<br />
the FBI’s Behavioral Analysis Unit (BAU) III, which<br />
deals specifically with Crimes Against <strong>Child</strong>ren. She<br />
provides operational support to federal, state, and local<br />
law enforcement through case consultations and onsite<br />
deployments. She has trained criminal justice and<br />
mental health professionals in matters involving child<br />
abductions, child homicides, and sexual victimization<br />
of children. She is the Principal Investigator on research<br />
projects like Suicide Among <strong>Child</strong> Sex Offenders.<br />
Prior to joining the FBI, she conducted psychological<br />
PARTNERS IN PROTECTING CHILDREN 77
Speaker Biographies<br />
assessments, individual and group psychotherapy. She<br />
holds a Doctoral Degree in Clinical Psychology.<br />
James Holdman<br />
Special Agent<br />
Department of <strong>Home</strong>land Security-<strong>Home</strong>land<br />
Security Investigations<br />
Special Agent Holdman has been with the Department<br />
of <strong>Home</strong>land Security for nine years, serving in<br />
Lake Charles, Louisiana and now at the Office of<br />
the Resident Agent in Charge, Springfield, Missouri.<br />
Prior to joining DHS, he served as a Deputy Sheriff<br />
in Washington County, Missouri for three years and a<br />
Criminal Investigator for the State of Missouri for 12<br />
years. Special Agent Holdman is assigned to the <strong>Child</strong><br />
Sex Tourism (CST) Jump Team for the Cyber Crimes<br />
Center (C3), and has conducted undercover CST<br />
operations in Costa Rica and along the Mexican border.<br />
He has also instructed CST classes to the Cambodian<br />
<strong>National</strong> Police in Phnom Penh and Siem Reap.<br />
Colleen Holt<br />
Global Criminal Compliance Manager<br />
Microsoft Global Criminal Compliance<br />
Ms. Holt is a member of Microsoft’s Global Criminal<br />
Compliance team and has been assisting law<br />
enforcement around the world on behalf of Microsoft<br />
since June of 2008. Prior to joining Microsoft, she was<br />
a Senior Investigator with America <strong>On</strong>line’s Public<br />
Safety and Criminal Investigations team from 2005 to<br />
2008. Her criminal compliance work began in 2001<br />
through both Preston Gates and Ellis and then with<br />
Al Gidari of Perkins Coie law firm, where she worked<br />
with several internet service providers and telecom<br />
companies in setting up their criminal compliance<br />
Electronic Communications Privacy Act policies.<br />
Teresa Hughes<br />
Internet Safety & Projects Development Manager<br />
Lucy Faithfull Foundation<br />
Ms. Hughes is the Projects Development & Internet<br />
Safety Manager for the Lucy Faithfull Foundation, the<br />
only UK child protection charity dedicated solely to<br />
reducing the risk of children being sexually abused.<br />
She was formerly a Detective with Surrey Police,<br />
specializing in the investigation of online crimes against<br />
children and the management of sex offenders in the<br />
community. In July 2010, she started a year-long pilot<br />
project with UK law enforcement to assess whether<br />
there was sufficient grounds to promote the use of<br />
e-Safety software for monitoring the computer use of<br />
registered sex offenders. The pilot was a success and<br />
resulted in the software being adopted by a number of<br />
UK police services.<br />
Teresa Huizar<br />
Executive Director<br />
<strong>National</strong> <strong>Child</strong>ren’s Alliance<br />
Ms. Huizar was appointed Executive Director of<br />
<strong>National</strong> <strong>Child</strong>ren’s Alliance on February 26, 2008.<br />
<strong>National</strong> <strong>Child</strong>ren’s Alliance, headquartered in<br />
Washington, DC, is the national association and<br />
accrediting body for 750 <strong>Child</strong>ren’s Advocacy<br />
Centers in the US. Prior to her tenure with NCA,<br />
Ms. Huizar served as the Executive Director of the<br />
Western Regional <strong>Child</strong>ren’s Advocacy Center,<br />
a technical assistance and training center for 200<br />
<strong>Child</strong>ren’s Advocacy Centers and multidisciplinary<br />
teams in 12 Western states. She provides consultation<br />
internationally on effective child abuse intervention,<br />
and has testified before the Senate HELP Committee<br />
on child abuse issues. She is currently a member of the<br />
Advisory Board of the <strong>National</strong> <strong>Child</strong> Traumatic Stress<br />
Network.<br />
Marcia Hurd<br />
Assistant U.S. Attorney<br />
U.S. Attorney’s Office, District of Montana<br />
Attorney Hurd is an Assistant United States Attorney<br />
for the District of Montana, and she has been a<br />
prosecutor for over 20 years. She is Montana’s<br />
Project Safe <strong>Child</strong>hood Coordinator and prosecutes<br />
child abuse cases on Indian reservations, child sexual<br />
exploitation cases as well as cases of sex offenders<br />
who fail to register under SORNA. She serves on the<br />
Attorney General’s Violence Against Women Federal/<br />
78 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
Tribal Prosecution Task Force, helps the FBI present<br />
Forensic Interviewer training for children, and is<br />
involved in victim’s rights issues.<br />
Darcy Katzin<br />
Trial Attorney<br />
U.S. Department of Justice, <strong>Child</strong> Exploitation and<br />
Obscenity Section<br />
Attorney Katzin has been a Trial Attorney with the<br />
Department of Justice, Criminal Division, <strong>Child</strong><br />
Exploitation and Obscenity Section since 2005. Prior<br />
to joining DOJ, she served forsix years as an Assistant<br />
District Attorney in the New York County District<br />
Attorney’s Office, where she was assigned to the <strong>Child</strong><br />
Abuse Bureau.<br />
Phil Keith<br />
Program Director, AMBER Alert <strong>Training</strong> and<br />
Technical Assistance Program<br />
Fox Valley Technical College<br />
Mr. Keith has more than 40 years of experience in the<br />
fields of criminal justice, public safety, and business<br />
administration. He has held numerous high level<br />
policy making positions in law enforcement, public<br />
safety, emergency preparedness management, as well<br />
as numerous local, state, and federal advisory groups.<br />
From 1988 to 2004, Mr. Keith served as the Chief<br />
of Police for the City of Knoxville, Tennessee. Since<br />
his retirement in 2004, he has served as the Program<br />
Director for <strong>Training</strong> and Technical Assistance for the<br />
Department of Justice AMBER Alert Initiative and<br />
maintains a consulting practice with a number of<br />
organizations.<br />
Scott Kelley<br />
US Postal Inspector<br />
United States Postal Inspection Service<br />
Inspector Kelley is a Postal Inspector assigned to the<br />
Boston Division with child exploitation responsibilities<br />
for the New England states, including upstate New<br />
York. Previously, he was a Special Agent with the Naval<br />
Criminal Investigative Service and was responsible for<br />
investigations in the interest of the United States Navy<br />
and Marine Corps to include child sex crimes and sexual<br />
assaults. He was a local police officer in Massachusetts,<br />
assigned to child sex crimes and attended hundreds<br />
of Sexual Assault Information Network interviews.<br />
He has provided trainings and lectures to community<br />
and school-related organizations on symptoms and<br />
methodology of child sex crimes, and has facilitated<br />
trainings to parents, teachers and law enforcement<br />
on the dangers of the Internet and the use of mail to<br />
entice children.<br />
Christopher Kelly<br />
Assistant Attorney General<br />
Massachusetts Attorney General’s Office<br />
Attorney Kelly is the Managing Attorney of the<br />
Cyber Crime Division for the Massachusetts Attorney<br />
General’s Office. In addition to prosecuting and<br />
overseeing investigations of crimes with digital<br />
components, he works with members of the Cyber<br />
Crime Division to design and implement priority<br />
projects and trainings as set forth in the Massachusetts<br />
Strategic Plan for Cyber Crime. Additionally,<br />
Attorney Kelly performs digital forensic examinations<br />
in the Massachusetts Attorney General’s Computer<br />
Forensic Laboratory. Prior to joining the Attorney<br />
General’s Office, he worked in the Suffolk County<br />
District Attorney’s Office where he built the current<br />
Computer Forensic Laboratory. During his tenure<br />
at Suffolk County District Attorney’s Office, he<br />
prosecuted cyber crime, child exploitation, child<br />
sexual and physical abuse cases.<br />
Bryan Kelly<br />
Computer Crime Specialist<br />
<strong>National</strong> White Collar Crime Center (NW3C)<br />
Mr. Kelly is a Computer Crime Specialist with the<br />
<strong>National</strong> White Collar Crime Center in Fairmont,<br />
West Virginia. His duties focus mainly on development,<br />
maintenance, and instruction of computer forensic<br />
course material as he serves as Team Leader for<br />
three of the courses offered. Additionally, Mr. Kelly<br />
PARTNERS IN PROTECTING CHILDREN 79
Speaker Biographies<br />
provides technical assistance to local, state and federal<br />
law enforcement in computer related and computer<br />
forensic forums. He also has experience with testing<br />
and validating new forensic software and hardware<br />
devices and has assisted in the development of the<br />
student CD, self paced learning, on-line and distance<br />
learning modules.<br />
James Kilpatrick<br />
Special Agent/Program Manager<br />
Department of <strong>Home</strong>land Security, <strong>Home</strong>land<br />
Security Investigations<br />
Special Agent Kilpatrick has worked in law enforcement<br />
for 10 years and holds a Bachelor’s Degree in Criminal<br />
Justice. He is currently assigned to the DHS/ICE/<br />
HSI Cyber Crimes Center as a Program Manager in<br />
the <strong>Child</strong> Exploitation Investigations Unit. As a field<br />
agent, he worked on child exploitation cases and as a<br />
computer forensics agent. He successfully investigated<br />
and helped other investigators work hundreds of child<br />
exploitation investigations. He successfully investigated<br />
a complex child exploitation enterprise that resulted<br />
in all of the primary defendants pleading guilty. He<br />
has presented at various conferences/seminars in<br />
the United States as well as internationally. He has<br />
received numerous awards for his work, including<br />
being recognized by NCMEC.<br />
Anne Kong<br />
Flying Squirrel Progam Manager<br />
Navy PMW 130/BAH<br />
Ms. Kong is a Lead Associate from Booz Allen Hamilton,<br />
supporting Navy PMW 130 Computer Network<br />
Defense to provide program management support for<br />
Flying Squirrel Wireless Detection Application.<br />
Kelly Kottas<br />
Special Agent<br />
<strong>Home</strong>land Security Investigations<br />
Special Agent Kottas is 15-year veteran of law<br />
enforcement. She is currently assigned to the Orange<br />
County <strong>Child</strong> Exploitation Task Force under the<br />
direction of the <strong>Home</strong>land Security Investigations<br />
Office of the Assistant Special Agent In Charge, Orange<br />
County, California. Ms. Kottas holds a Bachelor’s<br />
Degree in Criminal Justice from Texas Woman’s<br />
University.<br />
Joe Laramie<br />
Lieutenant, retired<br />
Laramie Consulting<br />
Lt. Laramie retired from Glendale Police Department<br />
and as longtime Missouri <strong>ICAC</strong> Commander in 2010.<br />
He then worked for the Missouri Attorney General as<br />
administrator of the computer lab, focusing on child<br />
exploitation and human trafficking issues. In <strong>2012</strong><br />
he created Laramie Consulting, offering policy and<br />
training resources to law enforcement and schools. He<br />
served on the <strong>ICAC</strong> Executive Committee and liaison<br />
and to Internet safety organizations; NetSmartz,<br />
iKeepSafe and WebWiseKids. He is a nationally-known<br />
speaker on technology safety and cyberbullying, holds<br />
a Bachelor of Science Degree in Criminal Justice<br />
Administration from Bellevue University and is a 2004<br />
FBI <strong>National</strong> Academy graduate.<br />
Jennifer Lee<br />
Senior Program Strategist, CVIP<br />
<strong>National</strong> Center for Missing & Exploited <strong>Child</strong>ren<br />
Ms. Lee is the Senior Program Strategist for NCMEC’s<br />
<strong>Child</strong> Victim Identification Program (CVIP). In 2002,<br />
she assisted in the creation and development of the <strong>Child</strong><br />
Victim Identification Program and eventually served as<br />
Program Manager. Beginning in 2007, she has worked<br />
to help advance the tools used daily within CVIP to<br />
assist law enforcement and prosecutors working child<br />
sexual exploitation cases. Ms. Lee provides assistance<br />
to the unit with policy development and working on<br />
special projects. She also travels across the country<br />
to educate law enforcement officials and policymakers<br />
on the many aspects of online exploitation and<br />
demonstrate critical techniques to help identify child<br />
victims.<br />
80 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
Tony Leonard<br />
Captain<br />
Smyrna Police Department<br />
Captain Leonard has served with the Smyrna Police<br />
Department since 1995 and currently commands the<br />
Criminal Investigations Division within the Smyrna<br />
Police Department. He formed the Smyrna Police<br />
Department’s Computer Crimes Unit, which he<br />
also supervises. He is responsible for overseeing the<br />
investigation of all <strong>ICAC</strong> cases, computer forensic<br />
examinations, and investigations into computer-related<br />
crimes. He began working <strong>ICAC</strong> cases in 2006, and has<br />
conducted many peer-to-peer cases and undercover<br />
chat investigations. Since 1998, Captain Leonard has<br />
served as a part-time instructor at the North Central<br />
Georgia <strong>Law</strong> <strong>Enforcement</strong> Academy, conducting<br />
over 1,800 hours of training. He is a Georgia POSTcertified<br />
Senior Instructor, and has also served as a<br />
guest lecturer at Kennesaw State University.<br />
Ale Levi<br />
Forensic Interview Specialist<br />
<strong>Home</strong>land Security Investigations<br />
Ms. Levi is a Forensic Interview Specialist for ICE<br />
<strong>Home</strong>land Security Investigations. Her responsibilities<br />
include conducting forensic interviews in both English<br />
and Spanish (both domestically and internationally),<br />
consultation and training for ICE Agents, and other<br />
federal, state and local law enforcement, and other<br />
organizations. She is a Licensed Clinical Social Worker<br />
and holds a Master’s Degree in Social Work and in<br />
Forensic Psychology. Prior to HSI, Ms. Levi was the<br />
Manager of the Forensic Interviewing Program and<br />
the Interpreting Program at the Chicago <strong>Child</strong>ren’s<br />
Advocacy Center, where she was responsible for the<br />
collaboration of the multidisciplinary team, conducting<br />
and supervising forensic interviews, and training.<br />
Brian Levine<br />
Professor<br />
Univ. of Massachusetts Amherst<br />
Professor Levine is a Professor in the Department of<br />
Computer Science at the University of Massachusetts<br />
Amherst. He received his Ph.D in Computer<br />
Engineering from the University of California, Santa<br />
Cruz in 1999. His research and teaching focuses on<br />
mobile networks, forensics, and the Internet, and he<br />
has published more than 70 peer-reviewed papers on<br />
those topics. His active funding includes awards from<br />
the <strong>National</strong> Science Foundation, the <strong>National</strong> Institute<br />
of Justice, and the Office of Juvenile Justice. His lab<br />
at UMass is the source of the suite of RoundUp tools<br />
used by law enforcement all over the US for network<br />
investigation of child pornography trafficking. He is<br />
an organizer of the <strong>2012</strong> DFRWS Digital Forensics<br />
Research Conference.<br />
Marc Liberatore<br />
Research Scientist<br />
University of Massachusetts at Amherst<br />
Mr. Liberatore joined the Department of Computer<br />
Science at the University of Massachusetts Amherst as<br />
a Research Scientist in January 2009. Previously, he<br />
served as a Mellon Fellow at Wesleyan University in<br />
Middletown, Connecticut. His research focuses on<br />
network forensics, anonymity systems, peer-to-peer<br />
architectures, and disruption tolerant networking.<br />
His funding includes awards from the Department<br />
of Justice as a PI for the <strong>Child</strong> Protection Research<br />
Program, as well as awards from the <strong>National</strong> Science<br />
Foundation and the <strong>National</strong> Institute of Justice. He<br />
has worked closely with members of the Internet<br />
Crimes Against <strong>Child</strong>ren Task Forces in developing<br />
and deploying tools for investigation of P2P networks.<br />
Doug Lockhart<br />
Detective Constable<br />
<strong>On</strong>tario Provincial Police-<strong>Child</strong> Sexual Exploitation<br />
Section<br />
Detective Constable Lockhart has been a member of the<br />
<strong>On</strong>tario Provincial Police for over twenty-five years.<br />
He has spent the last twelve years as an investigator in<br />
the <strong>Child</strong> Sexual Exploitation Section, which focuses<br />
on the enforcement of Canadian criminal law on<br />
offences of child pornography. Detective Constable<br />
Lockhart has been recognized in courts of <strong>On</strong>tario<br />
PARTNERS IN PROTECTING CHILDREN 81
Speaker Biographies<br />
as an expert in <strong>Child</strong> Pornography recognition and<br />
has been involved in over one thousand cases in his<br />
career. He has taught and provided lectures at both<br />
the <strong>On</strong>tario Police Academy and the Canadian Police<br />
Academy on the best practices of investigations of<br />
child pornography.<br />
Timothy Lott<br />
Director, High-Tech Crime <strong>Training</strong> Services<br />
SEARCH<br />
Mr. Lott is a High-Tech Crime <strong>Training</strong> Specialist in<br />
the High-Tech Crime <strong>Training</strong> Services Department<br />
of SEARCH, The <strong>National</strong> Consortium for Justice<br />
Information and Statistics, where he coordinates and<br />
provides training on high-tech crime investigations and<br />
forensics to local, state, and federal justice and public<br />
safety agencies. He is a former deputy probation officer<br />
with the Sacramento County (California) Probation<br />
Department, and has conducted probation compliance<br />
checks on offenders who have been convicted and<br />
placed on probation for offenses involving the<br />
possession of child pornography, stalking through the<br />
use of social networking sites or cellular devices, and<br />
identity theft.<br />
Cory Louie<br />
Trust & Safety<br />
Google Inc.<br />
Mr. Louie is part of Google’s Trust & Safety team,<br />
responsible for the protection of Google users,<br />
revenue and brand by addressing significant risk,<br />
abuse, fraud and other malicious activity primarily<br />
through investigations. Before joining Google, he was<br />
a Special Agent with the United States Secret Service.<br />
He was trained in the Electronic Crime Special Agent<br />
Program, specializing in the investigation of network<br />
intrusions and cybercrimes. He worked numerous<br />
domestic and international cybercrime investigations<br />
involving e-commerce fraud, phishing, access device<br />
fraud, network intrusions, unauthorized computer<br />
access, hacking, financial fraud and other online<br />
threats.<br />
Brian Lynn<br />
Research Staff<br />
University of Massachusetts Amherst<br />
Mr. Lynn is a member of the Commonwealth<br />
Center for Forensics and Society at the University of<br />
Massachusetts Amherst. He is working on technologies<br />
to prevent child exploitation on the Internet, and<br />
developed the RoundUp eMule tool.<br />
Chris Madsen<br />
Legal Director, U.S. Compliance<br />
Yahoo!<br />
Mr. Madsen is Legal Director, United States Compliance<br />
at Yahoo!, where his responsibilities include advising<br />
on compliance with law enforcement and other thirdparty<br />
requests for user data. Prior to joining Yahoo!,<br />
he spent five years with the Department of Justice<br />
where, among other things, he advised the FBI on the<br />
legal authorities available to obtain user data from<br />
companies like Yahoo!.<br />
Don Mason<br />
Associate Director / Research Professor<br />
<strong>National</strong> Center for Justice and the Rule of <strong>Law</strong>, Univ.<br />
of Mississippi<br />
Attorney Mason is Associate Director of the <strong>National</strong><br />
Center for Justice and the Rule of <strong>Law</strong> (NCJRL )<br />
and a Research Professor of <strong>Law</strong> at the University<br />
of Mississippi. After beginning his law career as a<br />
county prosecutor in Iowa he directed the state<br />
justice department agency and nonprofit association<br />
that jointly provided training and technical assistance<br />
for Iowa prosecutors. Prior to joining the NCJRL in<br />
2003, he was a municipal judge in West Virginia and<br />
worked six years for the <strong>National</strong> White Collar Crime<br />
Center developing legal training related to computer<br />
crime and digital investigations. Besides presenting<br />
at numerous training events each year, he has taught<br />
law school courses on cyber crime, sentencing,<br />
adjudicatory criminal procedure, and Internet crimes<br />
against children.<br />
82 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
Douglas Maughan<br />
Director, Cyber Security Division<br />
DHS Science & Technology Directorate, Cyber<br />
Security Division<br />
Dr. Maughan is the Cyber Security Division Director<br />
in the <strong>Home</strong>land Security Advanced Research<br />
Projects Agency within the Science and Technology<br />
(S&T) Directorate of the Department of <strong>Home</strong>land<br />
Security. He has been at DHS since October 2003 and<br />
is directing Cyber Security R&D activities and staff.<br />
Prior to his appointment at DHS, Dr. Maughan was a<br />
Program Manager at the Defense Advanced Research<br />
Projects Agency (DARPA). He also worked for the<br />
<strong>National</strong> Security Agency (NSA) as a senior computer<br />
scientist. Dr. Maughan received Bachelor’s Degrees in<br />
Computer Science and Applied Statistics from Utah<br />
State University, a Master’s Degree in Computer<br />
Science from Johns Hopkins University, and a Ph.D in<br />
Computer Science from the University of Maryland,<br />
Baltimore County.<br />
Edward McAndrew<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, District of Delaware<br />
Mr. McAndrew has served as an Assistant United States<br />
Attorney and the Project Safe <strong>Child</strong>hood Coordinator<br />
in the U.S. Attorney’s Office for the District of<br />
Delaware since July 2008. He also serves as the CHIP<br />
Coordinator for the District of Delaware. His practice<br />
focuses almost exclusively on computer-facilitated<br />
child exploitation, computer hacking, intellectual<br />
property and fraud offenses. Between October 2006<br />
and July 2008, Mr. McAndrew served as a CEOS Trial<br />
Attorney and a SAUSA in the Cyber Crimes Unit of<br />
the U.S. Attorney’s Office for the Eastern District<br />
of Virginia. Prior to joining the U.S. Department<br />
of Justice in the fall of 2006, Ed was a litigation<br />
partner and the litigation practice group leader in the<br />
Washington, D.C. office of Reed Smith LLP, where he<br />
specialized in technology-related litigation.<br />
Keely McCarthy<br />
Visiting Fellow<br />
Office for Victims of Crime<br />
Ms. McCarthy has been a visiting fellow at the Office<br />
for Victims of Crime, U.S. Department of Justice<br />
since November 2010. Her fellowship focuses on<br />
the broad category of underserved victims of crime,<br />
specifically in the area of federal, military, and Indian<br />
Country programs. She received her Master of Arts<br />
Degree in criminology and criminal justice from<br />
the University of Maryland at College Park and two<br />
Bachelor Degrees, one in justice studies and one in<br />
sociology from Arizona State University in Tempe,<br />
Arizona. Ms. McCarthy’s most recent position was<br />
with the International Association of Chiefs of Police<br />
in Alexandria, Virginia, where she served as project<br />
coordinator for the OVC-funded Enhancing <strong>Law</strong><br />
<strong>Enforcement</strong> Response to Victims project.<br />
Matt McFadden<br />
Sergeant<br />
Clovis Police Department<br />
Sergeant McFadden has over 1,000 hours of computer<br />
crime training and has been conducting computer<br />
forensic investigations for 11 years. He was a parttime<br />
instructor with Guidance Software Inc. (GSI)<br />
for seven years. He maintains computer forensic<br />
certifications as a CFCE through IACIS, EnCE through<br />
GSI, and a CCFT Advanced through HTCN. Sergeant<br />
McFadden received Letters of Commendation from<br />
United States and California Attorney Generals for<br />
his computer forensic work. He has received a Unit<br />
Citation from U.S. Customs, Case of the Year Award<br />
from HTCIA, and Agency of the Year from CSAIA. His<br />
computer forensic work was documented in Caught<br />
in the Web: Inside the Police Hunt to Rescue <strong>Child</strong>ren<br />
from <strong>On</strong>line Predators by Julian Sher.<br />
Cathy McGoff<br />
Google <strong>On</strong>line Operations Legal Senior Manager<br />
Google<br />
Ms. McGoff has managed the Legal Investigations<br />
PARTNERS IN PROTECTING CHILDREN 83
Speaker Biographies<br />
Support team at Google, Inc. since 2005. This team is<br />
responsible for responding to all legal process seeking<br />
user data for the company. Prior to joining Google, she<br />
founded and managed the Compliance team at Yahoo!,<br />
Inc. from 1998-2005.<br />
Lisa Miller<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Northern District of Texas<br />
Attorney Miller is an Assistant United States Attorney<br />
(AUSA) for the Northern District of Texas in Dallas,<br />
Texas. She has been an AUSA with the Department<br />
of Justice since 2001, having started her tenure in<br />
the Western District of Oklahoma in Oklahoma City.<br />
Prior to becoming an AUSA, she was an Assistant<br />
District Attorney for five years at the Oklahoma<br />
County District Attorney’s Office where she became<br />
a member of the Sex Crimes/<strong>Child</strong> Abuse Unit and<br />
prosecuted adult rape, child sexual abuse, physical<br />
abuse, neglect, and murder. She has been prosecuting<br />
Crimes Against <strong>Child</strong>ren, including Project Safe<br />
<strong>Child</strong>hood cases, since 1998.<br />
Michelle Morgan<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Eastern District of Pennsylvania<br />
Attorney Morgan is an Assistant United States<br />
Attorney (AUSA) for the Eastern District of<br />
Pennsylvania. Previously, she was an AUSA in the<br />
Northern District of California, where she served as<br />
that District’s Project Safe <strong>Child</strong>hood Coordinator.<br />
She also was a Trial Attorney in the <strong>Child</strong> Exploitation<br />
and Obscenity Section of the U.S. Department of<br />
Justice in Washington, D.C. from 2002-2005. Attorney<br />
Morgan lectures extensively in the United States and<br />
Eastern Europe on child exploitation prosecutions,<br />
and has conducted several joint investigations with<br />
Russia. Prior to joining the Department of Justice, she<br />
was a patent litigator at Skadden, Arps, and clerked<br />
in the United States District Court in Delaware. She<br />
holds a Juris Doctor, magna cum laude, from Villanova<br />
University, and a Bachelor of Arts Degree in Russian<br />
from Oberlin College.<br />
Kevin Mulcahy<br />
Assistant U.S. Attorney<br />
U.S. Attorney’s Office, Eastern District of Michigan<br />
Attorney Mulcahy is Chief of the General Crimes Unit<br />
in the United States Attorney’s Office for the Eastern<br />
District of Michigan, which handles all crimes against<br />
children, gun crimes, and a smattering of other federal<br />
offenses. He began as an Assistant United States<br />
Attorney in the Southern District of California, where<br />
he focused primarily on border crimes and appellate<br />
work.<br />
Nicholas Newman<br />
Computer Crimes Specialist<br />
<strong>National</strong> White Collar Crime Center (NW3C)<br />
Mr. Newman began his career as a Computer Crimes<br />
Specialist with the <strong>National</strong> White Collar Crime<br />
Center in January of 2006. He contributes to and<br />
regularly instructs NW3C’s Secure Techniques for<br />
<strong>On</strong>site Preview, Basic Data Recovery and Acquisition,<br />
Introduction to Securing <strong>Law</strong> <strong>Enforcement</strong> Networks,<br />
Linux Forensics, and Wireless Network Investigations<br />
computer forensic courses, and is also the lead<br />
developer of NW3C’s TUX4N6 and Forensic<br />
Disk Imager forensic tools. Mr. Newman has also<br />
represented NW3C in the mass media through such<br />
news organizations as USA Today, the MSNBC Today<br />
Show, ABC News, CBS News, and SC Magazine. He<br />
holds a Bachelor of Science Degree in Information<br />
Systems Security (with honors), as well as the A+,<br />
Network+, and CEH certifications.<br />
Wayne Nichols<br />
Detective<br />
Henderson Police Department<br />
Detective Nichols works for the Henderson, Nevada<br />
Police Department and has been in law enforcement for<br />
over nine years. Currently assigned to the department’s<br />
Computer Crime Unit, in addition to being a forensic<br />
84 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
examiner, he also conducts proactive enticement and<br />
P2P investigations. With the success of traditional chat<br />
cases experiencing a decline in recent years, Detective<br />
Nichols has focused efforts on Craigslist. The Craigslist<br />
initiative has been very successful and, since 2009,<br />
the Henderson Police Department has made over 40<br />
enticement arrests, all of which resulted from proactive<br />
efforts. In addition to speaking at conferences about<br />
Craigslist investigations, Detective Nichols also speaks<br />
about the use of Google Voice and how it benefits law<br />
enforcement for proactive investigations.<br />
Mitchell Nixon<br />
Director of <strong>Law</strong> <strong>Enforcement</strong> <strong>Training</strong><br />
TLO<br />
Mr. Nixon was the Commander of the North Florida<br />
<strong>ICAC</strong> Task Force for six years before retiring from the<br />
Gainesville, Florida Police Department. He has served<br />
on various State and <strong>National</strong> efforts, including; Chair<br />
of the Florida Safety Management Steering Committee,<br />
and the United States Department of Transportation,<br />
<strong>National</strong> Highway Traffic Safety Administration, Crash<br />
Criteria Development Committee. He has worked<br />
with TLO since retiring in 2009, and is the Director<br />
of <strong>Law</strong> <strong>Enforcement</strong> <strong>Training</strong>, and a Security Director:<br />
<strong>Law</strong> <strong>Enforcement</strong> Systems.<br />
Kevin O’Brien<br />
CyberTipline, Supervisor<br />
<strong>National</strong> Center for Missing and Exploited <strong>Child</strong>ren<br />
Mr. O’Brien is a CyberTipline Supervisor in the<br />
Exploited <strong>Child</strong>ren Division (ECD) at the <strong>National</strong><br />
Center for Missing and Exploited <strong>Child</strong>ren. He has<br />
handled over 42,000 CyberTipline reports, resulting<br />
in numerous arrests of child sexual offenders. He has<br />
participated in various law enforcement investigative<br />
training programs on high technology crimes,<br />
online child sexual exploitation, and investigative<br />
and analytical skills development. He has provided<br />
extensive technical assistance to law enforcement<br />
in the United States, as well as abroad, on cases of<br />
child sexual exploitation and internet crimes against<br />
children. Mr. O’Brien has been with NCMEC since<br />
January 2006. He holds a Bachelor’s of Science Degree<br />
in Psychology and a Master’s Degree in Forensic<br />
Psychology.<br />
Neil O’Callaghan<br />
Special Agent<br />
Department of <strong>Home</strong>land Security, <strong>Home</strong>land<br />
Security Investigations (HSI)<br />
Cyber Crimes Center, <strong>Child</strong> Exploitation Investigations<br />
Unit<br />
Special Agent O’Callaghan began his career with the<br />
U.S. Customs Service in 1998 and was assigned to<br />
the Office of the Special Agent in Charge in Seattle,<br />
Washington. In Seattle, he was a member of the<br />
Internet Crimes Against <strong>Child</strong>ren Task Force for<br />
approximately 3 ½ years and worked on several child<br />
exploitation cases. Since May of 2009, he has been<br />
assigned to the HSI Cyber Crimes Center, <strong>Child</strong><br />
Exploitation Investigations Unit, and in that time<br />
he has run several national and international cases.<br />
Harry Parsonage<br />
Forensic Triage Specialist<br />
ADF Solutions, Inc.<br />
Mr. Parsonage was a police officer for over 30 years in<br />
the UK before he joined ADF Solutions. He spent 23<br />
years as a detective sergeant managing and investigating<br />
the full range of crime. For the last 10 years of his<br />
service he managed a police digital forensic unit while<br />
being a hands-on forensic practitioner. In 2007, he<br />
introduced a triage process to his DFU. In a period<br />
of just nine months he reduced the backlog from one<br />
year to less than six months. He is well known in the<br />
forensic community for his papers on MSN Artefacts,<br />
Windows Link Files, and Web Browser Session Restore<br />
Forensics and is on the editorial panel for the UK’s<br />
Association of Chief Police Officers Good Practice<br />
Guide for Computer-Based Electronic Evidence and<br />
also the ACPO Guide for Managers of eCrime Units.<br />
PARTNERS IN PROTECTING CHILDREN 85
Speaker Biographies<br />
Terri Patterson<br />
Supervisory Special Agent<br />
Federal Bureau of Investigation, Behavioral Analysis<br />
Unit<br />
Supervisory Special Agent Patterson joined the FBI in<br />
1997 and was assigned to the Miami Division where<br />
she investigated violent crime and crimes against<br />
children. She later supervised the Miami Division’s first<br />
crimes against children squad and served as a Program<br />
Manager at FBI Headquarters before being assigned to<br />
the <strong>National</strong> Center for the Analysis of Violent Crime<br />
(NCAVC). She holds a Ph.D. in Psychology, and has<br />
conducted research in the area of witness memory<br />
and behavioral indicators of deception and is currently<br />
engaged in research on the behavioral aspects of child<br />
prostitution and international child sex tourism. She<br />
has trained law enforcement officers and prosecutors<br />
in the United States and abroad.<br />
David Peifer<br />
Lieutenant<br />
Delaware County District Attorney’s Office<br />
Lieutenant Peifer is the Pennsylvania <strong>ICAC</strong> Task<br />
Force Commander and is responsible for conducting<br />
undercover online investigations, responding to<br />
complaints regarding children sexually exploited<br />
via the Internet, conducting community education<br />
programs and monitoring of the Internet for the<br />
bartering in child pornography. He has been a law<br />
enforcement officer for 34 years and the supervisor<br />
of the Delaware County District Attorney’s Criminal<br />
Investigation Division’s <strong>Child</strong> Abuse Unit for 13 years.<br />
During this time he has had occasion to investigate<br />
hundreds of incidents of child abuse, including child<br />
sexual abuse, and child pornography. Lieutenant Peifer<br />
attended West Chester University and is a graduate<br />
of the 174th session of the FBI <strong>National</strong> Academy in<br />
Quantico, Virginia.<br />
John Penn<br />
Senior Solutions Architect<br />
Adobe Systems<br />
Mr. Penn is Senior Solutions Architect for <strong>Law</strong><br />
<strong>Enforcement</strong> Technologies at Adobe Systems<br />
Incorporated in San Jose, California. He spent<br />
11 years at Adobe as a Senior Computer Scientist<br />
working on Photoshop before changing his focus to<br />
the development of tools, techniques and training<br />
for law enforcement. He is particularly focused on<br />
advancing victim identification tools and techniques.<br />
Mr. Penn has spent a great deal of time focusing on<br />
Internet crimes against children and the role industry<br />
can play in its prevention, as well as working to foster<br />
better communication between law enforcement and<br />
industry.<br />
Kurt Petro<br />
Computer Crime Specialist<br />
<strong>National</strong> White Collar Crime Center (NW3C)<br />
Mr. Petro has been a Computer Crime Specialist with<br />
the <strong>National</strong> White Collar Crime Center’s (NW3C)<br />
Computer Crime Section for 5 years. He is the Team<br />
Lead for the Macintosh and iDevice curriculum,<br />
NTOS, and BDRA. He also teaches a number of the<br />
other CCS courses, including NTFS, IDRA, an STOP.<br />
Prior to his tenure at NW3C, he worked for 2 years<br />
at Hewlett Packard providing computer forensic,<br />
eDiscovery, data recovery, and incident response<br />
services to HP and outside clients. He was also a<br />
non-sworn forensic examiner for McKeesport Police<br />
Department for 4 years. He has also earned a number<br />
of certifications during his career; including GCFA,<br />
CFCE, MCSE, Network +, and A +.<br />
Peipei Pollmann<br />
Team Lead<br />
Google<br />
Ms. Pollmann specializes in child safety for Google’s<br />
Legal Removals team. Prior to joining the legal team<br />
in May 2011, she had been a Senior Policy Specialist<br />
for Google’s consumer products since 2006. As a<br />
86 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
co-founder of the User Policy team, she developed<br />
content policies on issues, such as pornography, hate<br />
speech, violence, bullying and impersonation, and<br />
worked with cross-functional teams to operationalize<br />
these policies and prevent abuse, and combat abuse on<br />
consumer products.<br />
David Porter<br />
Chief<br />
DeWitt Police Department<br />
Chief Porter is a 23 year veteran of law enforcement<br />
who began his career with the Flint Police Department<br />
and retired in 2010 to accept the position of Chief of<br />
Police with the City of DeWitt, Iowa. Chief Porter<br />
holds an Associate’s Degree in Criminal Justice<br />
from Mott College, a Bachelor’s Degree in Public<br />
Administration from Eastern Michigan University<br />
and is pursuing a Master’s Degree at the University of<br />
Oklahoma. He is also a graduate of the 228th session<br />
of the FBI <strong>National</strong> Academy and the Eastern Michigan<br />
University School of Police Staff and Command. Chief<br />
Porter is a member of the Police Executive Research<br />
Forum, The Iowa Police Executive Forum and the<br />
International Association of Chiefs of Police where he<br />
serves as chairman of the Victim Services Committee.<br />
D. Matthew Powell<br />
Trooper<br />
Pennsylvania State Police<br />
Trooper Powell is a computer crime investigator<br />
and certified forensic examiner employed by the<br />
Pennsylvania State Police Computer Crime Unit. He<br />
has conducted proactive online investigations into the<br />
sexual exploitation of children, and has over 15 years<br />
on the job. He has attained CFCE, EnCE and ACE<br />
certifications and also conducts forensic examinations<br />
for local, state and federal law enforcement<br />
agencies. Trooper Powell has been conducting online<br />
investigations since 2005 and instructs the RoundUp<br />
Gnutella, eMule and Ares courses of instruction. He<br />
is a member of the State Police Computer Crime Task<br />
Force and the Pittsburgh High Tech Task Force.<br />
Kyle Reardon<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Eastern District of California<br />
Attorney Reardon is the Project Safe <strong>Child</strong>hood<br />
Coordinator for the Eastern District of California. He<br />
has been with the office since 2007 and has prosecuted<br />
child exploitation cases for the past three years. His<br />
caseload also includes white collar fraud. Prior to<br />
joining the United States Attorney’s Office, he clerked<br />
for the Honorable Gregory G. Hollows and the<br />
Honorable John J. Moulds, United States Magistrate<br />
Judges in the Eastern District of California. He also<br />
served 6 years in the United States Army JAG Corps,<br />
was a prosecutor for 3 ½ years in Texas and Germany,<br />
and also served as Command Judge Advocate for Special<br />
Operations Command, Europe. Attorney Reardon has<br />
a law degree from the University of Virginia, and a<br />
Bachelor’s Degree from Centre College.<br />
Jeff Rich<br />
Detective/Task Force Offi cer<br />
Federal Bureau of Investigation<br />
Detective Rich has been a Police Officer for the Plano,<br />
Texas Police Department for 19 years and is assigned<br />
to the Criminal Investigations Division and the FBI’s<br />
Innocent Images <strong>National</strong> Initiative Task Force, where<br />
he investigates and instructs on the exploitation of<br />
children over the Internet. Detective Rich has received<br />
numerous awards and honors for his investigations<br />
and has assisted in the development of a teaching<br />
curriculum for child abuse investigators, which is<br />
taught to police officers across Texas.<br />
Tiffany Rivera<br />
<strong>Training</strong> and Technical Assistance Coordinator<br />
Girls Educational & Mentoring Services<br />
Ms. Rivera, as GEMS’ <strong>Training</strong>/Technical Assistance<br />
Coordinator, provides training and technical assistance<br />
through the agency’s Victim, Survivor, Leader (VSL)<br />
curriculum throughout the United States. Prior to<br />
joining GEMS’ <strong>Training</strong> Department, Ms. Rivera was<br />
a GEMS Youth Outreach Worker from 2008 to 2011,<br />
PARTNERS IN PROTECTING CHILDREN 87
Speaker Biographies<br />
during which she facilitated outreach to hundreds of<br />
young people in detention facilities and area schools,<br />
educating them on the commercial sexual exploitation<br />
and domestic trafficking of children. She has presented<br />
on CSEC and youth organizing in a diverse array of<br />
venues, including the New York Women’s Foundation<br />
Reproductive and Economic Justice Conference, and<br />
a congressional briefing in 2009. A powerful speaker,<br />
she has conducted interviews with The New York<br />
Times and Hot 97 Radio.<br />
Richard Robertson<br />
Oak Ridge <strong>National</strong> Laboratory<br />
Mr. Robertson currently works at Oak Ridge <strong>National</strong><br />
Laboratory with the Global Security Directorate<br />
assisting in national security programs and aiding<br />
Dr. Chris Boehnen and his team in their efforts to<br />
develop tools to assist law enforcement in the hunt for<br />
and prosecution of child predators. Prior to that, he<br />
served in the U.S Army for over 20 years. He served<br />
in combat in the Middle East during Operation Desert<br />
Shield/Desert Storm and then completed two combat<br />
tours with U.S Army Special Operations Command in<br />
Operation Iraqi Freedom. His third tour was cut short<br />
after being wounded in western Iraq.<br />
Andrew Rosen<br />
CEO / CTO<br />
ASR Data Acquisition & Analysis<br />
Mr. Rosen is a Forensic Computer Scientist who offers<br />
unique litigation support services to the legal, law<br />
enforcement and investigative communities. With over<br />
20 years of experience in the recovery of computer<br />
data and forensic examination, he regularly provides<br />
expert testimony in federal and state courts. Along<br />
with training attorneys and law enforcement officials<br />
in computer investigation techniques, he frequently<br />
speaks and writes on emerging matters in the field.<br />
Mr. Rosen has a worldwide reputation for developing<br />
cutting-edge computer crime investigative tools and<br />
is frequently consulted by other professionals in the<br />
industry.<br />
Matthew Roth<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Eastern District of Michigan<br />
Attorney Roth is currently the Deputy Chief of the<br />
General Crimes Unit of the United States Attorney’s<br />
Office for the Eastern District of Michigan. He<br />
primarily handles cases involving the Department of<br />
Justice’s Project Safe <strong>Child</strong>hood initiative. Prior to<br />
joining the United States Attorney’s Office, he was<br />
the Executive Staff Attorney at the Oakland County<br />
Prosecutor’s Office and spent over four years as<br />
a member of the <strong>Child</strong> Sexual Assault Unit which<br />
specialized in the investigation and prosecution of<br />
the sexual assaults of children, vulnerable victims,<br />
child pornography, and child victims of on-line sexual<br />
predators. Now in his 14th year as a prosecutor, he has<br />
prosecuted hundreds of felony cases in both state and<br />
federal courts.<br />
Miles Rutkowski<br />
Legal Assistant, <strong>On</strong>line Product Support<br />
Google Inc.<br />
Mr. Rutkowski graduated from Stanford University<br />
with a Bachelor of Arts in Political Science. He is a<br />
member of Google’s Legal <strong>On</strong>line Product Support<br />
team, where the team’s mission is to provide highquality<br />
support for incoming legal removal requests<br />
and uphold Google’s greater mission of making<br />
information “universally accessible and useful.” He<br />
has given trainings and presentations at the <strong>National</strong><br />
Strategy Conference on <strong>Child</strong> Exploitation (San<br />
Jose, CA, 2011) and the 23rd Annual Crimes Against<br />
<strong>Child</strong>ren Conference (Dallas, TX, 2011). He also<br />
represents Google as a liaison to the <strong>National</strong> Center<br />
for Missing & Exploited <strong>Child</strong>ren, Internet Watch<br />
Foundation, INTERPOL, and Technology Coalition.<br />
Linda Seabrook<br />
Attorney Advisor<br />
United States Department of Justice<br />
Executive Office for U.S. Attorneys<br />
Attorney Seabrook is an Attorney Advisor on the<br />
88 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
Victim-Witness Staff for the Executive Office for<br />
United States Attorneys. In this role, she provides<br />
program support, legal and policy guidance and<br />
support, and training for the 94 United States<br />
Attorneys’ offices on the Crime Victims’ Rights Act<br />
(CVRA), the Attorney General Guidelines for Victim<br />
and Witness Assistance, and other legal issues affecting<br />
the provision of federal victim and witness assistance<br />
and services. She received her Bachelor of Arts Degree<br />
from the University of Virginia, and obtained her law<br />
degree from the University of South Carolina in 2002.<br />
Originally from Charleston, South Carolina, she began<br />
her legal career as an Assistant Solicitor with the Ninth<br />
Circuit Solicitor’s Office as part of a federal/state<br />
Project Safe Neighborhoods Task Force.<br />
Crystal Sedevie<br />
Investigator<br />
Holmen (Wisconsin) Police Department<br />
Investigator Sedevie joined the Holmen Police<br />
Department in 1999, where she received special<br />
training in sexual assault and child abuse investigations,<br />
including forensic interviewing of child victims. She has<br />
also received specialized training from the Wisconsin<br />
<strong>ICAC</strong> Task Force, OJJDP, NCMEC & NDAA. In 2006,<br />
Investigator Sedevie co-founded the Coulee Region<br />
<strong>Child</strong>ren’s Internet Protection Task Force (CRCIPTF),<br />
a multi-jurisdictional, non-profit task force formed to<br />
help combat the online exploitation of local children.<br />
The CRCIPTF has addressed more than 15,000<br />
children and adults on Internet safety. Investigator<br />
Sedevie has participated in over 200 <strong>ICAC</strong>-related<br />
cases. In 2008, she was awarded the WI <strong>ICAC</strong> <strong>Law</strong><br />
<strong>Enforcement</strong> Award. Investigator Sedevie joined<br />
the FBI Cyber Crime Task Force in 2011, and is also<br />
sworn as a Special Deputy US Marshal and holds FBI<br />
credentials.<br />
Joy Shelton<br />
Crime Analyst<br />
Federal Bureau of Investigation<br />
Ms. Shelton began her career with the FBI in 1998 and<br />
joined the Behavioral Analysis Unit in 1999. Currently,<br />
she is a Crime Analyst within the FBI’s Behavioral<br />
Analysis Unit III – Crimes Against <strong>Child</strong>ren. She serves<br />
as the Principal Researcher for the FBI’s research on<br />
maternal filicide and has co-authored three articles. She<br />
is also a co-researcher for the Suicide Among <strong>Child</strong> Sex<br />
Offenders project. In addition, she provides analytical<br />
support for other crimes against children research and<br />
operational support for investigations. She presents at<br />
a wide variety of national crimes against children and<br />
child abuse training venues and is also an instructor at<br />
the FBI’s <strong>National</strong> Academy at Quantico, Virginia.<br />
Diane Siegel<br />
Forensic Interview Specialist<br />
Department of <strong>Home</strong>land Security, <strong>Home</strong>land<br />
Security Investigations<br />
Ms. Siegel has worked in the child welfare and victim<br />
assistance fields since 1995. Currently, she is a Forensic<br />
Interview Specialist with DHS ICE <strong>Home</strong>land Security<br />
Investigations (HSI). She conducts victim sensitive<br />
forensic interviews of children and adults involved<br />
in domestic and/or international human trafficking,<br />
child exploitation and technology facilitated crimes.<br />
Before joining the HSI forensic interview team,<br />
she was the Victim Assistance Specialist for the HSI<br />
SAC Philadelphia office covering Pennsylvania, West<br />
Virginia and Delaware. Prior to HSI, she was a bilingual<br />
forensic interviewer, clinical advocate and outreach<br />
manager at the Chicago <strong>Child</strong>ren’s Advocacy Center.<br />
She also supervised a local foster care program for<br />
several years and was a grief and loss support specialist.<br />
Camille Sparks<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Northern District of Texas<br />
Attorney Sparks has been an Assistant United States<br />
Attorney for the Northern District of Texas since<br />
2005, where she is also the Project Safe <strong>Child</strong>hood<br />
Coordinator. Her caseload is exclusively child<br />
exploitation cases. She has spoken at several different<br />
venues on sentencing issues, including the <strong>National</strong><br />
Advocacy Center, Dallas Crimes Against <strong>Child</strong>ren<br />
and <strong>National</strong> Strategy Conference on Combating<br />
PARTNERS IN PROTECTING CHILDREN 89
Speaker Biographies<br />
<strong>Child</strong> Exploitation. Prior to her tenure as a federal<br />
prosecutor, she was an Assistant Criminal District<br />
Attorney for the Tarrant County District Attorney’s<br />
Office in Fort Worth, Texas for 10 years. She was a<br />
criminal court chief and tried over 100 jury trials.<br />
Attorney Sparks is board certified in criminal law in<br />
the State of Texas.<br />
Heather Steele<br />
CEO<br />
The Innocent Justice Foundation<br />
Ms. Steele is the CEO of the Innocent Justice<br />
Foundation, a non-profit founded in 2007 to maximize<br />
child pornography investigative capacity in the United<br />
States, and thereby significantly reduce child sexual<br />
abuse. She earned her MBA from the University<br />
of Chicago and ran a $200 million product line in<br />
the corporate world before bringing her analytical<br />
background to bear in bringing justice to sexually<br />
abused children and preventing future sexual assault.<br />
She seeks funding for law enforcement agencies<br />
pursuing child pornography investigations nationwide,<br />
educates the public on child pornography, and has<br />
worked to develop a mental health and wellness<br />
initiative to support professionals exposed to child<br />
pornography at work.<br />
Daniel Steele<br />
Sergeant<br />
Denver Police Department<br />
Sergeant Steele has been a Denver Police Officer for<br />
13 years and is currently assigned as the Supervisor of<br />
the FBI Rocky Mountain Safe Streets, Innocence Lost<br />
Task Force. He has served in specialized units including<br />
the Gang Bureau, Street Crimes Attack Team and has<br />
been assigned as a Detective and Sergeant to the Vice/<br />
Drug Control Bureau. He is deputized as a Special<br />
Deputy United States Marshal to investigate crimes of<br />
human sex trafficking and child sexual exploitation.<br />
He has drafted Denver Police Policy and Procedure<br />
concerning prostitution, human sex trafficking, asset<br />
forfeiture and created an eight-hour Sex Trafficking<br />
Investigations course for Colorado law enforcement<br />
personnel.<br />
Derek Stigerts<br />
Detective/Task Force Offi cer<br />
Sacramento Police Department/FBI Task Force<br />
Detective Stigerts has been a police officer for 21<br />
years with the Sacramento Police Department, the<br />
last seven years in the Detective Division. In 2006, he<br />
became a full- time member of the Sacramento FBI<br />
Division’s Innocence Lost Task Force. The Task Force’s<br />
main responsibility is investigating domestic sex<br />
trafficking of children cases, prostituted juveniles, and<br />
prosecuting those responsible for their exploitation.<br />
Detective Stigerts is an instructor at the FBI’s Crimes<br />
Against <strong>Child</strong>ren, Juvenile Prostitution Forensic<br />
Interviewing Course, and he has presented at other<br />
federal and state trainings on domestic sex trafficking.<br />
He has qualified and testified as an expert in federal<br />
court in California, Texas, and Nevada as well as in<br />
California state court on various prostitution and sex<br />
trafficking topics.<br />
Ashley Stockdale<br />
Product Manager, Forensic Solutions<br />
Guidance Software, Inc.<br />
Ms. Stockdale has worked at Guidance Software<br />
on the EnCase Forensic product line for the past<br />
eight years. She currently is the Product Manager<br />
for EnCase Forensic, EnCase Enterprise, as well as<br />
EnCase Portable. As Product Manager, she regularly<br />
meets with customers, delivers training, and presents<br />
on topics related to computer forensics.<br />
Elaine Stolte<br />
Executive Director<br />
The <strong>Child</strong>ren’s Assessment Center<br />
Ms. Stolte is the Executive Director of The <strong>Child</strong>ren’s<br />
Assessment Center (CAC) in Houston, Texas. The<br />
CAC is an advocacy center with 44 partner agencies,<br />
23 co-housed on site, and an annual budget of $7<br />
million. The CAC is located in Harris County, which<br />
is the third largest county in the US. Prior to her<br />
employment with the CAC, she managed the 228th<br />
District Court for the Honorable Ted Poe (currently<br />
90 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
a U.S. Congressman) for 18 years. Her commitment<br />
to the improvement of the criminal justice system<br />
has led to a number of new legislative initiatives. A<br />
passionate speaker about educating multidisciplinary<br />
child abuse teams, Ms. Stolte has enjoyed training<br />
many groups throughout the United States, as well as<br />
other countries, on strategic planning and managing<br />
an effective public/private partnership.<br />
Joe Sullivan<br />
Forensic Psychologist<br />
Mentor Forensic Services<br />
Dr. Sullivan is a forensic psychologist and Director of<br />
Mentor Forensic Services, an organization specializing<br />
in providing consultancy and training in psychological<br />
profiling, behavior analysis and child protection.<br />
He works as a consultant to law enforcement and<br />
specializes in assisting investigations into serious<br />
sexual crimes against children. He has received a Chief<br />
Constables Commendation for his contribution to the<br />
investigation into the sexually-motivated abduction<br />
and murder of a child in 2001. He is engaged in<br />
longitudinal research of sexual offenders and offers<br />
insights into the thinking and behavior of offenders.<br />
Michael Sullivan<br />
Assistant United States Attorney<br />
U.S. Attorney’s Office, Northern District of Ohio<br />
Attorney Sullivan has been an Assistant United States<br />
Attorney in the Northern District of Ohio since 2003,<br />
where he also serves as the Project Safe <strong>Child</strong>hood<br />
Coordinator. Previously, he was an Assistant County<br />
Prosecutor in the Cuyahoga County Prosecutor’s<br />
Office from 1996-2003, where he was assigned to<br />
the Major Trial Unit - <strong>Child</strong> Victim Section and was<br />
the Director of the Northeast Ohio Internet Crimes<br />
Against <strong>Child</strong>ren Task Force. Prior to that, he was<br />
an Assistant District Attorney in the Suffolk County<br />
District Attorney’s Office in New York from 1988-<br />
2003. He is a graduate of Fordham University School<br />
of <strong>Law</strong> and the University of Notre Dame.<br />
Catherine Sweeney<br />
INTERPOL Analyst<br />
INTERPOL Washington, US Department of Justice<br />
Ms. Sweeney is an analyst in the Human Trafficking and<br />
<strong>Child</strong> Protection Division of INTERPOL Washington.<br />
Since the division began in October 2010, she has been<br />
responsible for implementing and developing projects<br />
aimed at protecting children from exploitation on the<br />
Internet. Recently, she initiated an information-sharing<br />
project in collaboration with US law enforcement,<br />
targeting alleged sex tourists.<br />
Jim Tanner<br />
KBSolutions<br />
Dr. Tanner earned his Ph.D. from the University<br />
of Illinois with a specialization in Cognitive Social<br />
Psychology and Criminal Justice. He is sworn staff<br />
in Colorado and has worked with sex offenders for<br />
more than 41 years in almost every capacity within the<br />
justice system. He teaches at more than 20 conferences<br />
a year and trains thousands of professionals annually.<br />
Dr. Tanner is a nationally-recognized authority on sex<br />
offender cognitive sets. Additionally, he is a computer<br />
forensic examiner who has examined more than<br />
1,500 sex offenders’ computers and was a pioneer<br />
in managing convicted sex offenders computer use.<br />
He brings a unique combination of cognitive social<br />
psychology, corrections, discourse analysis and<br />
computer forensics to his fast paced, information filled<br />
presentations.<br />
Elizabeth Tow<br />
High-Tech Crime <strong>Training</strong> Specialist<br />
SEARCH, Inc<br />
Ms. Tow is a High-Tech Crime <strong>Training</strong> Specialist in<br />
the High-Tech Crime <strong>Training</strong> Services department of<br />
SEARCH where she coordinates and provides training<br />
on high-tech crime investigations and forensics<br />
to local, state and federal justice and public safety<br />
agencies. She provides technical assistance to law<br />
enforcement agencies in active cases, prepares training<br />
curricula, teaches SEARCH investigative courses and<br />
speaks at conferences throughout the United States.<br />
PARTNERS IN PROTECTING CHILDREN 91
Speaker Biographies<br />
Before joining SEARCH in 2010, she spent five years<br />
in local law enforcement in two states, as a Public<br />
Safety Dispatcher for the Grass Valley, California and<br />
the Helena, Montana Police Departments.<br />
Eric Trest<br />
Special Agent<br />
Naval Criminal Investigative Service - DoD<br />
Representative to NCMEC<br />
Special Agent Trest has been with the Naval Criminal<br />
Investigative Service since 2005. He is currently<br />
assigned as the Department of Defense Representative<br />
to the <strong>National</strong> Center for Missing & Exploited<br />
<strong>Child</strong>ren. He has taught at such venues as the Dallas<br />
Crimes against <strong>Child</strong>ren Conference, Department<br />
of Defense Cyber Crimes Conference, United States<br />
Attorney General’s Project Safe <strong>Child</strong>hood <strong>National</strong><br />
Conference, United States Marshals Sex Offender<br />
Investigators Course, United States Army Criminal<br />
Investigations Command Digital Forensic Examiners<br />
Conference, US Army <strong>Child</strong> Abuse Prevention<br />
and Investigative Techniques Course, Silicon Valley<br />
Internet Crimes Against <strong>Child</strong>ren Conference, and<br />
the <strong>National</strong> Strategy Conference on Combating<br />
<strong>Child</strong> Exploitation.<br />
Allison Turkel<br />
Senior Policy Advisor<br />
United States Department of Justice SMART Office<br />
Attorney Turkel serves as a senior policy advisor in<br />
the SMART (Sex Offender Sentencing, Monitoring,<br />
Apprehending, Registering and Tracking) Office for<br />
the United States Department of Justice, Office of<br />
Justice Programs. Prior to coming to the SMART<br />
office, she served as the Director of the <strong>National</strong><br />
District Attorneys Association’s <strong>National</strong> Center for<br />
Prosecution of <strong>Child</strong> Abuse. Prior to joining NCPCA,<br />
she was a prosecutor for most of her career in the New<br />
York County District Attorney’s Office and for 1 ½<br />
years in McLean County, Illinois. Prior to becoming<br />
a prosecutor, she was a police officer for eight years.<br />
Emily Vacher<br />
<strong>Law</strong> <strong>Enforcement</strong> Relations Lead - North & South<br />
America<br />
Facebook<br />
Ms. Vacher joined Facebook in 2011 as the <strong>Law</strong><br />
<strong>Enforcement</strong> Relations Lead for North & South<br />
America. She is responsible for managing law<br />
enforcement relations, including incoming requests<br />
and outgoing referrals, as well as law enforcement and<br />
security policy matters. Prior to joining Facebook,<br />
she was a Special Agent with the Federal Bureau of<br />
Investigation for more than a decade, leading a broad<br />
range of federal investigations. Specializing in crimes<br />
against children matters, she was a member of the<br />
<strong>Child</strong> Abduction Rapid Deployment Team (CARD)<br />
and served as a supervisor in the Undercover and<br />
Sensitive Operations Unit at FBI headquarters. Prior<br />
to the joining the FBI, she was an attorney in private<br />
practice in New York.<br />
Jim Valley<br />
Investigator<br />
Door County Sheriff’s Department<br />
Investigator Valley is employed by the Door County<br />
Sheriff’s Department in Wisconsin. He developed, and<br />
is in charge of, a multi-jurisdictional <strong>ICAC</strong> task force<br />
along with a Computer Forensics Lab that supports<br />
cases from all areas of Wisconsin. In 2007 and <strong>2012</strong>,<br />
he received an award from the Wisconsin Department<br />
of Justice for his work on <strong>ICAC</strong> cases and is the only<br />
state two-time award recipient. He has also received<br />
multiple local awards, and has taught for the <strong>National</strong><br />
<strong>Law</strong> Center, <strong>ICAC</strong> <strong>National</strong> Conference, a local<br />
college and the Wisconsin Department of Justice. He<br />
has appeared as a guest on a live TV talk show and also<br />
on the radio speaking about crimes against children.<br />
Derek VanLuchene<br />
President and Founder<br />
Ryan United<br />
Mr. VanLuchene is the President and Founder of Ryan<br />
United, a non-profit dedicated to his eight year-old<br />
92 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
Brother Ryan, who was abducted and murdered by a<br />
repeat sex offender in 1987. Through this organization,<br />
Mr. VanLuchene works around the country to bring<br />
awareness to communities and <strong>Law</strong> <strong>Enforcement</strong> on<br />
issues of sex offenders and child abduction. He is an<br />
18 year veteran of law enforcement, first serving with<br />
the Conrad Police Department then with the Montana<br />
Division of Criminal Investigation as a Special Agent.<br />
His investigative experience and specialized knowledge<br />
of crimes against children has made him an important<br />
resource to law enforcement and communities<br />
throughout the country. He also serves as a consultant<br />
for Fox Valley Technical College.<br />
Joseph Versace<br />
Programmer/Analyst<br />
<strong>On</strong>tario Provincial Police<br />
Mr. Versace is a Programmer/Analyst with the <strong>On</strong>tario<br />
Provincial Police, <strong>Child</strong> Sexual Exploitation Unit.<br />
During his time there, he has developed investigative<br />
tools including E-Phex and Roundup Ares that have<br />
assisted <strong>ICAC</strong> investigators around the world.<br />
Lauren Wagner<br />
High-Tech Crime <strong>Training</strong> Specialist<br />
SEARCH Group, Inc.<br />
Ms. Wagner is a High Tech Crime <strong>Training</strong> Specialist in<br />
the <strong>Training</strong> Services Department of SEARCH where<br />
she performs tasks related to training local, state and<br />
federal agencies on computer technology issues with<br />
criminal justice applications. She provides technical<br />
assistance to law enforcement agencies in active<br />
cases, prepares training materials, teaches SEARCH<br />
investigative courses and speaks at conferences<br />
throughout the United States. Ms. Wagner is an ICI<br />
certified instructor and received a 2009 “Excellence in<br />
<strong>Training</strong>” award from California POST.<br />
Wade Walsvick<br />
Investigator<br />
Orange County (California) Sheriff’s Department<br />
Investigator Walsvick is a 23-year veteran with the<br />
Orange County Sheriff’s Department. In 1997, he was<br />
promoted to investigator assigned to sex crimes and has<br />
handled hundreds of cases involving domestic violence,<br />
elder abuse, sex registration violations, child abuse,<br />
child molestation and rape. In 2007, he joined a multiagency<br />
federal task force responsible for investigating<br />
Computer-aided Internet crimes against children. As<br />
of today, he is a member of the multi-agency, Orange<br />
County – <strong>Child</strong> Exploitation Task Force (<strong>ICAC</strong>) and<br />
continues to investigate all Internet-facilitated crimes<br />
against children. Investigator Walsvick is also a regular<br />
speaker for “Internet Safety” presentations and teaches<br />
a (law enforcement) first responder class for child<br />
abuse/sex crimes investigations.<br />
Jim Walters<br />
Assistant Chief of Police<br />
Southern Methodist University<br />
Assistant Chief Walters is with the Southern Methodist<br />
University Police Department in Dallas, Texas, and is<br />
also a retired Captain from the City of Placerville,<br />
California Police Department. He is the AMBER Alert<br />
Liaison for <strong>Training</strong> and Technical Assistance with<br />
the United States Department of Justice Southern<br />
Border Initiative, a program designed to improve<br />
capabilities and capacity related to the investigation<br />
and recovery of missing, endangered, abducted and<br />
exploited children in the United States - Mexican<br />
border region. He is also responsible for training and<br />
technical assistance to tribal communities across the<br />
United States, and specifically assist communities in<br />
developing capabilities and capacity related to child<br />
protection programs.<br />
Crystal Ward<br />
Trainer<br />
Girls Educational Mentoring Service<br />
Ms. Ward is a Trainer at Girl’s Educational & Mentoring<br />
Services (GEMS). In this capacity, Ms. Ward conducts<br />
trainings and provides technical assistance for legal<br />
professionals, law enforcement and social service<br />
professionals on the issues of commercial sexual<br />
exploitation of children (CSEC) and domestic minor<br />
PARTNERS IN PROTECTING CHILDREN 93
Speaker Biographies<br />
sex trafficking (DMST). Ms. Ward is also a former<br />
law enforcement officer, with over eight years of<br />
experience as an Indianapolis Police Officer. She<br />
earned a Master’s Degree in politics at Long Island<br />
University, Brooklyn and a Bachelor’s Degree at<br />
Indiana University-Bloomington, majoring in Politics,<br />
with a minor in Criminal Justice.<br />
Chris Watkins<br />
Special Agent<br />
Department of <strong>Home</strong>land Security, <strong>Home</strong>land<br />
Security Investigations<br />
Mr. Watkins is a Special Agent with the Department<br />
of <strong>Home</strong>land Security, assigned to <strong>Home</strong>land Security<br />
Investigations (HSI), and has held the position since<br />
2001. He is currently assigned as a <strong>National</strong> Program<br />
Manager within the <strong>Child</strong> Exploitation Investigations<br />
Unit at the HSI Cyber Crimes Center in Fairfax,<br />
Virginia. As part of his current duties at HSI, he is<br />
responsible for initiating and conducting HSI national<br />
investigations involving criminal violations relating to<br />
the production, distribution, receipt, and possession<br />
of child pornography. He received his Bachelor of<br />
Arts Degree in Sociology from Alabama Agricultural<br />
and Mechanical (A&M) University, and is currently a<br />
Master’s candidate for the Degree of Management at<br />
the Johns Hopkins University.<br />
Kevin West<br />
Detective<br />
Cary Police Department<br />
Detective West is currently investigating Internet<br />
crimes for the Cary Police Department in North<br />
Carolina. He is the past <strong>ICAC</strong> Commander for<br />
the North Carolina <strong>ICAC</strong> and has 33 years of law<br />
enforcement experience. He holds a Bachelor of<br />
Science Degree from Brigham Young University, is a<br />
FBI <strong>National</strong> Academy Graduate and a Graduate of<br />
the Administrative Officers Management Program<br />
from North Carolina State. He has served in various<br />
capacities in State and Local <strong>Law</strong> enforcement in<br />
North Carolina, and has taught extensively around<br />
the country on the subject of Internet Crimes Against<br />
<strong>Child</strong>ren.<br />
Steve Whalen<br />
Managing Director<br />
SUMURI<br />
Mr. Whalen CFCE is the Managing Director for<br />
SUMURI, a leading provider of training, services and<br />
software relating to digital evidence and computer<br />
forensics worldwide. He has developed and delivered<br />
forensic training to thousands of investigators and<br />
examiners around the world through organizations<br />
such as the International Association of Computer<br />
Investigative Specialists (IACIS), the High Technology<br />
Crimes International Association (HTCIA) and the<br />
United States Department of State Anti-Terrorism<br />
Assistance Program. He is also the developer of the<br />
successful Macintosh Forensic Survival Courses and<br />
co-developer of the popular PALADIN forensic<br />
software. Prior to SUMURI, he served over 15 years<br />
as a Delaware State Trooper.<br />
Frank Williams<br />
Assistant United States Attorney<br />
U.S. Attorneys Office, Northern District of Florida<br />
Attorney Williams is an Assistant United States<br />
Attorney in the Northern District of Florida,<br />
Gainesville Division, with over 20 years of experience<br />
prosecuting sex offenses against children, including<br />
working as an Assistant State Attorney and Assistant<br />
Statewide Prosecutor. He serves as the District’s<br />
Project Safe <strong>Child</strong>hood Coordinator and CHIP<br />
Coordinator. He is Board Certified by the Florida Bar as<br />
a Criminal Trial <strong>Law</strong>yer, and has prosecuted hundreds<br />
of felony jury trials, including first degree murder,<br />
child exploitation, drug trafficking, public corruption,<br />
white collar, computer crime, and organized crime.<br />
94 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Speaker Biographies<br />
William Wiltse<br />
Security Director: <strong>Law</strong> <strong>Enforcement</strong> Systems<br />
TLO<br />
Mr. Wiltse has been a police officer for the last 20<br />
years and is certified as a forensic computer examiner.<br />
Working as a detective for the Salem, Oregon Police<br />
Department, he specialized in conducting forensic<br />
computer exams in cases involving child sexual<br />
exploitation. He has led proactive investigations into<br />
the online trading of child pornography and worked<br />
with numerous federal, state and local law enforcement<br />
agencies. He is currently employed by TLO in Boca<br />
Raton, Florida, where he directs the development<br />
of software tools targeting those who create and<br />
disseminate child pornography over the Internet.<br />
Tyler Wotring<br />
Computer Crime Specialist<br />
<strong>National</strong> White Collar Crime Center<br />
Karen Yoakum<br />
United States Postal Inspector<br />
United States Postal Inspection Service<br />
Inspector Yoakum has been a United States Postal<br />
Inspector since 2007. She is currently assigned as the<br />
United States Postal Inspector Representative to the<br />
<strong>National</strong> Center for Missing & Exploited <strong>Child</strong>ren<br />
in Alexandria, Virginia. Prior to her appointment<br />
at NCMEC, Inspector Yoakum was assigned to the<br />
Pittsburgh, Pennsylvania Division Headquarters<br />
where she worked on child exploitation cases. Prior to<br />
becoming a Postal Inspector, she worked for the North<br />
Carolina State Bureau of Investigation in Raleigh and<br />
became a member of the North Carolina Internet<br />
Crimes Against <strong>Child</strong>ren Task Force in 2003.<br />
Michael Yoder<br />
Supervisory Special Agent<br />
FBI/NCAVC/BAU-3<br />
Supervisory Special Agent Yoder has been with the FBI<br />
for over 15 years. Currently, he is assigned to the FBI’s<br />
Behavioral Analysis Unit 3 (Crimes Against <strong>Child</strong>ren)<br />
where he advises on areas of online sexual exploitation<br />
of children, missing children, child pornography and<br />
cyberbullying to law enforcement agencies throughout<br />
the United States. Prior to his transfer to BAU-3, he<br />
led the FBI’s Safe <strong>Child</strong> Task Force in Atlanta, Georgia<br />
and was the coordinator of a group of agents and local<br />
police officers dedicated to investigating online child<br />
sex offenders and arresting those engaged in child<br />
pornography. He is a graduate of West Point, has a<br />
Master’s Degree in Organizational Management and<br />
is working on a second Master’s Degree in Forensic<br />
Psychology.<br />
Eric Zimmerman<br />
Special Agent<br />
Federal Bureau of Investigation<br />
Special Agent Zimmerman is assigned to the Cyber<br />
Crimes Squad of the Salt Lake City FBI field office<br />
where he has been investigating child pornography<br />
and computer intrusions for the past three years.<br />
He is a member of the Utah <strong>ICAC</strong> and has provided<br />
training and assistance to dozens of local, state, federal<br />
and international law enforcement agencies. He has a<br />
degree in Computer Science and has developed several<br />
computer programs to aid in the investigation and<br />
prosecution of child exploitation matters.<br />
PARTNERS IN PROTECTING CHILDREN 95
96 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Exhibitors<br />
PARTNERS IN PROTECTING CHILDREN 97<br />
Exhibitors
98 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Exhibitors<br />
ADF Solutions, Inc.<br />
ADF Solutions, Inc. is the market leader in triage<br />
tools for site exploitation of computers and peripheral<br />
devices. Leveraging an innovative approach, these easyto-use<br />
tools rapidly extract actionable intelligence to<br />
help identify and capture suspects who are a threat<br />
to national security, and accelerate prosecution of<br />
criminals. Widely deployed for field operatives, these<br />
proven tools are actively used by intelligence and<br />
defense agencies, border security, law enforcement,<br />
and other government agencies worldwide.<br />
Applied Visions, Inc. - Secure Decisions<br />
Division<br />
Secure Decisions is a developer of visual cyber<br />
defense decision support tools. Secure Decisions is<br />
a leading supplier of user-centered visual software<br />
solutions that improve the detection, comprehension,<br />
and communication of cyber threats for the U.S.<br />
Government and business enterprises. Secure<br />
Decisions’ clients include the Department of Defense,<br />
<strong>Home</strong>land Security, Intelligence Community, hightechnology<br />
companies, and large system integrators.<br />
Secure Decisions’ mission is to advance, and further<br />
the application of, visual analytics and visualization<br />
technology to improve the cyber defense decisionmaking<br />
of its clients.<br />
Belkasoft<br />
Belkasoft is an independent software vendor founded<br />
in 2002. Belkasoft specializes in computer forensics<br />
and system software for the Windows and Mac OS<br />
platforms. With the slogan “Forensics made easier”,<br />
they are trying to help IT security experts and forensic<br />
investigators by creating the tools with out-of-the-box<br />
solutions which do not require deep specific knowledge<br />
to operate. Along with the flagship Belkasoft Evidence<br />
Center, they are also known for our Belkasoft<br />
Forensic IM Analyzer, Belkasoft Forensic Studio, and<br />
some other software used in forensic investigations,<br />
law enforcement, intelligence/counterintelligence,<br />
corporate security, and parental control. These<br />
solutions are chosen by the FBI, the U.S. Army, the<br />
US Secret Service, the police of Germany, Norway,<br />
Australia, New Zealand, etc.<br />
Berla Corporation<br />
Berla Corp. is a US owned and operated small business,<br />
founded by an experienced team of law enforcement<br />
and IC professionals. Our core expertise is focused<br />
on the acquisition, examination and analysis of georeferenced<br />
meta-data. Berla Corp. provides operators,<br />
examiners and analysts with a suite of products and<br />
services designed to tactically and forensically retrieve<br />
and analyze data from electronic devices as well as<br />
other sources. Berla Corp.’s expertise is manifested<br />
in the development of Blackthorn2, the premier GPS<br />
Forensics Tool widely used throughout the world in<br />
both the government & commercial sectors. Our tools<br />
provide operators with the ability to easily acquire<br />
data from electronic devices, and then immediately<br />
conduct a field level examination revealing actionable<br />
intelligence.<br />
BlackBag Technologies, Inc.<br />
BlackBag Technologies, Inc. provides Mac-based<br />
forensic and eDiscovery data solutions to law<br />
enforcement and private sector clients. Based in Silicon<br />
Valley, the company offers clients a comprehensive<br />
and secure suite of services, software and training<br />
solutions. BlackBag acknowledges the growing<br />
challenges faced by forensic examiners and legal<br />
professionals in the field and is dedicated to creating<br />
flexible, open environment solutions. We serve a wide<br />
range of clients including federal, state and local law<br />
enforcement agencies, as well as leading private sector<br />
security, legal and human resource professionals.<br />
Bluebear LES<br />
BlueBear is fully dedicated to helping the police cut<br />
down the backlogs in the analysis of the contents<br />
of seized computer media in cases of online child<br />
exploitation. Due to the increased number of arrests,<br />
case backlogs are now exploding because the amount<br />
of material to be analyzed increases exponentially<br />
and because the number of police officers that can<br />
PARTNERS IN PROTECTING CHILDREN 97
Exhibitors<br />
be assigned to this analysis is very limited. BlueBear<br />
develops and markets forensic software “LACE” that<br />
allows law enforcement using its proprietary image<br />
recognition to reduce, from 80 to 95%, the amount<br />
of visual content to be reviewed manually by an<br />
investigator specialist. “LACE” is fully integrated<br />
into existing processes and methodologies of police<br />
investigations and is consistent with the analysis tools<br />
currently in use.<br />
Callyo Incorporated<br />
As criminals become more sophisticated, federal, state,<br />
and local police must equip themselves with equally<br />
sophisticated intelligence technology. Callyo is a law<br />
enforcement technology company that was created<br />
to bring a higher level of innovation and efficiency<br />
to law enforcement agencies and first responders<br />
nationwide – regardless of their size – to help<br />
everyday police officers serve and protect us better.<br />
Callyo’s products include Virtual Investigation Phones,<br />
Undercover Police Bugs, Mobile Court Orders, Crime<br />
Tip Lines, Radio Interoperability Solutions, Social<br />
Media Intelligence platforms, and other cutting edge<br />
technologies.<br />
Cellebrite USA<br />
Cellebrite’s UFED is the most complete system for<br />
mobile forensics and data extraction, incorporating<br />
logical and physical, passcode recovery, and file<br />
system extraction. The UFED provides the latest and<br />
most advanced hardware and software technologies,<br />
support of thousands mobile phones, smartphones,<br />
and GPS devices, and covers all major mobile OS<br />
and unprecedented analyzing capabilities. Stop by our<br />
booth to learn more or visit us at www.cellebrite.com.<br />
ComputerCOP Software Corp.<br />
ComputerCOP Software tool has assisted over 200<br />
law enforcement agencies across the U.S.A. with their<br />
public safety/community outreach efforts, specifically<br />
in dealing with the inherent dangers that families face<br />
every day from the Internet. The All New Premium<br />
Edition enables parents to review what their children<br />
have been doing online. When objectionable words are<br />
used, ComputerCOP will send Parents or Guardians a<br />
copy of their child’s suspicious chat or email to their<br />
computer. Parents can review Internet History, Videos,<br />
Web pages, including My-Space or Facebook, images,<br />
and text information related to Cyber Bulling, Gangs,<br />
and Drugs, and will also alert parents to Pedophiles<br />
trying to communicate with their children. Visit the<br />
ComputerCOP booth and receive a FREE working<br />
sample & demo.<br />
Digital Assembly LLC.<br />
Digital Assembly is a Brooklyn, New York-based startup<br />
developing innovative digital forensics solutions. The<br />
mission of the company is to research and develop<br />
products and technology that can help our customers<br />
perform better forensic analysis with less effort. The<br />
current flagship photo forensic product, Adroit Photo<br />
Forensics, helps investigators recover, organize, filter<br />
and search digital photos.<br />
Digital Intelligence, Inc.<br />
Digital Intelligence is dedicated to providing the<br />
highest quality forensic products at reasonable prices.<br />
At Digital Intelligence, they recognize the challenges<br />
associated with digital evidence recovery and build<br />
exceptional and innovative products and services to<br />
face those challenges. Digital Intelligence also provides<br />
high quality digital forensic training and a wide range<br />
of forensic and eDiscovery services.<br />
DigitalStakeout<br />
DigitalStakeout has created a customized application,<br />
specifically iScoutWeb<strong>ICAC</strong>, for the Georgia<br />
Bureau of Investigation Georgia Internet Crimes<br />
against <strong>Child</strong>ren Task Force to assist investigators in<br />
monitoring websites, blogs, and social media relevant<br />
to Internet Crimes Against <strong>Child</strong>ren. DigitalStakeout’s<br />
leadership includes a long history in cyber intelligence<br />
and security. Our leadership’s extensive experience<br />
comes from working with a wide range of enterprises<br />
including Fortune 500, media, service providers, and<br />
law enforcement. DigitalStakeout was founded in<br />
1904 and is headquartered in Atlanta Georgia.<br />
98 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Exhibitors<br />
Federal Bureau of Investigation (FBI) <strong>Law</strong><br />
<strong>Enforcement</strong> <strong>On</strong>line (LEO)<br />
What is LEO? <strong>Law</strong> <strong>Enforcement</strong> <strong>On</strong>line (LEO) is a<br />
state-of-the-art Internet system that is accredited<br />
and approved by the FBI for sensitive but unclassified<br />
information. LEO is used to support investigative<br />
operations, send notifications and alerts, and provide<br />
an avenue to remotely access other law enforcement<br />
and intelligence systems and resources. LEO provides<br />
all levels of the law enforcement, criminal justice, and<br />
public safety communities virtual private network<br />
access to its “anytime and anywhere” system for<br />
secure electronic communications, online training,<br />
and information sharing. Membership Requirements<br />
for The <strong>Law</strong> <strong>Enforcement</strong> <strong>On</strong>line (LEO) network<br />
is only available to persons duly employed by a law<br />
enforcement, criminal justice, or public safety agency/<br />
department.<br />
Fernico Inc<br />
Fernico’s ZRT 2 is the leading system for the manual<br />
investigation of Cell Phones. As smart phones become<br />
smarter it is an impossible task for forensic software<br />
tools to support every new phone and 100% extraction<br />
of every feature. This is why ZRT 2 is an essential<br />
component of every cell phone investigator’s tool<br />
kit. Fernico’s FAR Archiving and Acquisition systems<br />
are the premier automated solutions to archive large<br />
amounts of data or video files from online storage to<br />
a sequential series of Blu Ray disks with full traceability.<br />
In addition, these systems work in reverse to<br />
read in large quantities of discs with minimal operator<br />
supervision as the robotic automation delivers<br />
significant time saving benefits and reduces the chance<br />
of human error to virtually zero.<br />
Forensic Computers.com<br />
Forensic Computers provides forensic systems and<br />
peripherals for Digital Forensic Examiners. Forensic<br />
Computers designs, builds, and tests their systems to<br />
meet the strict requirements of conducting a proper<br />
forensic acquisition and analysis. Forensic Computers<br />
also conducts Computer Forensics <strong>Training</strong> and “Dead”<br />
hard drive data recovery at our Glen Lyn, VA facility.<br />
They will customize their systems and integrate the<br />
customer’s choice of forensic software for a true<br />
turn-key system. Forensic Computers, Inc. is a small<br />
veteran owned business operated by retired Computer<br />
Crime Investigators.<br />
Georgia Bureau of Investigation<br />
The Georgia Bureau of Investigation (GBI) is an<br />
independent, statewide agency that provides assistance<br />
to the state’s criminal justice system in the areas of<br />
criminal investigations, forensic laboratory services<br />
and computerized criminal justice information.<br />
The Bureau consists of three divisions: Investigative,<br />
Forensic Sciences, and the Crime Information Center.<br />
The Georgia Internet Crimes Against <strong>Child</strong>ren (<strong>ICAC</strong>)<br />
Task Force is housed within the <strong>Child</strong> Exploitation And<br />
Computer Crimes Unit (CEACCU). The mission of<br />
the <strong>ICAC</strong> Task Force program is to assist state and local<br />
law enforcement agencies in developing an effective<br />
response to cyber enticement and child pornography<br />
cases.<br />
Guidance Software<br />
Guidance Software, Inc. is recognized worldwide as<br />
the industry leader in digital investigative solutions.<br />
Its EnCase® platform and Tableau hardware line of<br />
products provide the foundation for government,<br />
corporate and law enforcement organizations to<br />
conduct thorough, network-enabled, and courtvalidated<br />
computer investigations of any kind. For<br />
more information about Guidance Software, visit<br />
www.guidancesoftware.com.<br />
High Tech Crime Institute<br />
HTCI is a vendor-neutral training company that<br />
supports <strong>ICAC</strong> with our federally funded cell phone<br />
investigations course. HTCI also provide hardware<br />
and software solutions for digital investigators and<br />
forensics examiners. HTCI is the manufacturer of the<br />
EDAS FOX family of forensic computers. As their<br />
way of thanking <strong>ICAC</strong>, we offer a 10% discount from<br />
list pricing for <strong>ICAC</strong> members and affiliates. Our<br />
PARTNERS IN PROTECTING CHILDREN 99
Exhibitors<br />
machines can be seen at www.edasfox.com or www.<br />
forensicstore.com.<br />
<strong>ICAC</strong> <strong>Training</strong> & TA<br />
Fox Valley Technical College’s <strong>ICAC</strong> <strong>Training</strong> &<br />
Technical Assistance Program (FVTC <strong>ICAC</strong> T&TA)<br />
offers regional, specialized and technical assistance<br />
training designed specifically for federal, state and local<br />
law enforcement investigators, unit supervisors and<br />
prosecutors. These trainings are conducted throughout<br />
the country so that participants can take advantage<br />
of the valuable information conveyed during our<br />
programs in the most cost-effective manner possible.<br />
As mandated by OJJDP, only regional <strong>ICAC</strong> Task<br />
Force or Affiliate agency members will be approved<br />
to participate in our training programs. Federal and<br />
International participants will receive consideration<br />
on a case by case basis. Visit us at: www.icactraining.<br />
org.<br />
immixGroup<br />
immixGroup delivers full strategic IT services<br />
to government and law enforcement customers<br />
nationwide, leveraging extensive business relationships<br />
with industry leaders, deep technical expertise, and<br />
unmatched knowledge of customers environments<br />
to deliver and implement the ideal IT solution. We<br />
are IT experts, providing support to investigators<br />
combating online child exploitation, Internet fraud,<br />
and cyber crime. immixGroup offers unparalleled<br />
CETS expertise, comprehensive Cloud knowledge,<br />
and the new iCIMS solution which delivers enhanced<br />
deconfliction, collaboration, and analysis capabilities<br />
to law enforcement investigators throughout the<br />
country.<br />
InfinaDyne<br />
InfinaDyne provides software to the world’s leading<br />
government agencies, law enforcement, and forensic<br />
investigators. They have been in existence since 1996<br />
providing support to our customers and providing<br />
products to enable them to do their jobs. InfinaDyne<br />
specializes in extensive analysis of CD/DVDs.<br />
Intelligent Computer Solutions, Inc<br />
ICS is a pioneer in disk drive duplication, having first<br />
introduced this technology to the world in 1991 in<br />
a US patented device. For over twenty years, ICS<br />
has focused on providing cutting-edge solutions to<br />
the Computer Hardware Manufacturers, large IT<br />
Organizations, and small IT Departments around<br />
the world. ICS also supports state, local and federal<br />
government, <strong>Law</strong> <strong>Enforcement</strong> communities, and<br />
the growing private Digital Forensics Investigation<br />
sector through the development of leading edge<br />
Digital Forensics Hardware and Software Technology<br />
used in some of the most complex digital forensics<br />
investigations today.<br />
INTERPOL Washington<br />
INTERPOL Washington, U.S <strong>National</strong> Central<br />
Bureau (USNCB) is the official U.S. representative<br />
to the International Criminal Police Organization<br />
(INTERPOL), as designated by the U.S. Attorney<br />
General. USNCB serves as the national point of contact<br />
for INTERPOL matters and coordinates international<br />
investigative cooperation between INTERPOL’s 189<br />
member countries and the more than 18,000 federal,<br />
state, local and tribal law enforcement agencies in the<br />
United States.<br />
JADsoftware Inc<br />
JADsoftware was founded by Jad Saliba, a digital<br />
forensics expert and former police officer. JADsoftware<br />
is a digital forensics software company focused on<br />
developing products that aid in the recovery of digital<br />
artifacts left behind on hard drives and in live memory.<br />
Internet Evidence Finder (IEF), their flagship product,<br />
is designed to help users in a range of fields conduct<br />
thorough, effective computer investigations while<br />
preserving the forensic integrity of the data. It’s an<br />
indispensable tool for forensic examiners, security<br />
managers, forensic accountants, and others in law<br />
enforcement, government, and corporations, as they<br />
100 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Exhibitors<br />
investigate cybercrime, fraud, employee misconduct,<br />
security breaches, intellectual property abuse/theft,<br />
regulatory compliance, disaster recovery, and more.<br />
Katana Forensics, Inc.<br />
Katana Forensics, Inc., creators of Lantern and Lantern<br />
Lite, is a global software firm that specializes in mobile<br />
device forensics. Our motto, “Verum Utilitas”, truth<br />
in tools, is the guiding principle of our team. We<br />
service law enforcement, military, corporations, and<br />
law firms. Katana develops so that forensic tools are<br />
accessible to all, not to a few. Katana Forensics: we<br />
lead, others follow.<br />
LTAS Technologies Inc.<br />
Harmari Tools, developed by LTAS Technologies,<br />
analyzes Craigslist, Kijiji, Backpage and other online<br />
classifieds as a support tool for investigations into<br />
High Tech Crime, Cybercrime, and Cyberfraud. The<br />
Harmari Tools can be used in investigating auto theft,<br />
auto fraud, curbstoning, child prostitution, criminal<br />
investigations, unlicensed contractors, electricians,<br />
plumbers, and other businesses. The Harmari Tools<br />
save you time when reviewing many classifieds at<br />
once. The Harmari Engine prioritizes the most serious<br />
suspects to the top of the list, cleans up spelling,<br />
decorations, acronyms, abbreviations, synonyms,<br />
filters out duplicate postings and postings not relevant<br />
to your investigation, eliminates obfuscated phone<br />
numbers, and stores ads offline for future retrieval.<br />
MD5<br />
MD5 develops industry leading forensic software that<br />
is used by investigators worldwide. Products include<br />
VFC, a unique virtualization tool, and SPI, an iPhone<br />
analysis tool.<br />
MicroSystemation<br />
MSAB, the global leader of forensic technology for<br />
mobile device examination, has offices in Europe and<br />
in the US, as well as a network of distributors across the<br />
globe. The XRY software has been used by investigators<br />
to quickly and effectively retrieve mobile data since<br />
2003. With logical and physical extraction capabilities<br />
to recover even deleted information, MSAB provides a<br />
complete forensic solution for most electronic mobile<br />
devices including GPS satellite navigation systems.<br />
<strong>National</strong> Center for Missing & Exploited<br />
<strong>Child</strong>ren<br />
NetSmartz Workshop is a program of the <strong>National</strong><br />
Center for Missing & Exploited <strong>Child</strong>ren (NCMEC)<br />
that creates interactive, educational safety resources for<br />
children ages 5-17. Through activities, games, videos,<br />
safety presentations, and websites, NetSmartz prepares<br />
children to behave responsibly when confronted<br />
with issues such as cyberbullying, inappropriate<br />
content, predators, revealing too much information,<br />
sexting, and scams. These age-appropriate materials<br />
are developed to educate, engage, and empower<br />
children to make safer decisions online. In addition to<br />
empowering children, NetSmartz also seeks to assist<br />
parents/guardians, educators, and law-enforcement<br />
officials in their efforts to educate youths about online<br />
safety.<br />
<strong>National</strong> White Collar Crime Center<br />
<strong>National</strong> White Collar Crime Center is dedicated to<br />
supporting local, state and tribal law enforcement<br />
agencies in the prevention, investigation and<br />
prosecution of economic and high tech crime by<br />
offering training, analysis and investigative support at<br />
no cost.<br />
NetClean Technologies<br />
NetClean develops technology that stops the spread<br />
of child sexual abuse material. The NetClean Analyze<br />
Suite is a product family especially designed for law<br />
enforcement agencies working with child sexual abuse<br />
investigations. NetClean Analyze is designed to improve<br />
speed and minimize human effort when examining<br />
seized data. It enables efficient categorization and<br />
identification of child sexual abuse images and videos,<br />
and creates a good basis for the prosecutor. By working<br />
closely with police forces around the world, NetClean<br />
PARTNERS IN PROTECTING CHILDREN 101
Exhibitors<br />
achieves the highest understanding of how the globally<br />
increasing problem of child sexual abuse material<br />
evolves, and uses this knowledge to develop world<br />
unique solutions to effectively put a stop to it.<br />
Nuix<br />
Nuix is a worldwide provider of information<br />
management technologies, including eDiscovery,<br />
electronic investigation, and information governance<br />
software. Nuix solutions scale to meet the needs<br />
of the smallest or largest organizations, making it<br />
faster and easier to undertake investigations and<br />
data management activities, no matter the size or<br />
complexity of the data sets. Nuix customers include<br />
the world’s leading advisory firms, litigation support<br />
providers, enterprises, government departments, law<br />
enforcement agencies, as well as all of the world’s<br />
major corporate regulatory bodies.<br />
OJJDP<br />
OJJDP, a component of the Office of Justice Programs,<br />
U.S. Department of Justice, accomplishes its mission<br />
by supporting states, local communities, and tribal<br />
jurisdictions in their efforts to develop and implement<br />
effective programs for juveniles. The Office strives<br />
to strengthen the juvenile justice system’s efforts to<br />
protect public safety, hold offenders accountable, and<br />
provide services that address the needs of youth and<br />
their families. Under the leadership of its Administrator<br />
and through its components, OJJDP sponsors research,<br />
program, and training initiatives; develops priorities<br />
and goals and sets policies to guide federal juvenile<br />
justice issues; disseminates information about juvenile<br />
justice issues; and awards funds to states to support<br />
local programming.<br />
Paraben Corporation<br />
Paraben specializes in comprehensive digital forensic<br />
solutions for mobiles, hard drives, and enterprise<br />
networks. From technology to training, Paraben<br />
provides effective results and forensic-grade data.<br />
Pen-Link, Ltd<br />
In business for over 20 years, Pen-Link, Ltd. provides<br />
<strong>Law</strong> <strong>Enforcement</strong> and Intelligence agencies with stateof-the-art<br />
software and systems for the collection,<br />
storage, and analysis of telephonic- and IP-based<br />
communications. Pen-Link’s software and systems—<br />
Pen-Link 8, LINCOLN, and Xnet—are widely<br />
recognized as industry standards, with thousands of<br />
licensed <strong>Law</strong> <strong>Enforcement</strong> and Intelligence users<br />
in federal, state, and local agencies worldwide. Pen-<br />
Link systems are widely favored because they not only<br />
excel at intelligence gathering and live collection, but<br />
they also bring to bear a powerful suite of reporting<br />
and analytical tools; the type of functionality that is<br />
essential in drilling down through today’s extensive<br />
data sets to reveal relationships that might otherwise<br />
go undetected.<br />
Runaway and <strong>Home</strong>less Youth <strong>Training</strong> and<br />
Technical Assistance Centers<br />
The Runaway and <strong>Home</strong>less Youth <strong>Training</strong> and<br />
Technical Assistance Center (RHYTTAC) serves a<br />
centralized national resource for FYSB funded Runaway<br />
and <strong>Home</strong>less Youth grantees. <strong>Training</strong> and Technical<br />
Assistance Services are directed at assisting RHY<br />
grantees to engage in continuous quality improvement<br />
of their services and to build their capacity to effectively<br />
serve runaway and homeless youth.<br />
SEARCH<br />
SEARCH’s High-Tech Crime <strong>Training</strong> Services is<br />
comprised of a team of experts who provide technical<br />
assistance and training to local, state, and federal<br />
justice and public safety agencies nationwide. Through<br />
training classes, technical workshops and hands-on<br />
assistance, SEARCH trains and assists investigators<br />
in methods to prevent, detect, and investigate the<br />
rising tide of computer crime. These crimes include<br />
fraud, email threats, online stalking, identity theft,<br />
phishing, drug trafficking, cyber terrorism, and child<br />
exploitation.<br />
102 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
Exhibitors<br />
Silicon Forensics<br />
Silicon Forensics delivers quality, performance & value<br />
into every custom forensic workstation we build. At<br />
Siliconforensics.com “we build only what you need.”<br />
We supply full features in our forensic workstation,<br />
which can be custom configured for the high tech<br />
forensic investigator. We provide full powered, full<br />
featured forensic workstations for on the go. We<br />
specialize in Forensically Sanitized Hard Drives.<br />
SRT Wireless, LLC<br />
SRT Wireless, the commercial and law enforcement<br />
company within The SRT Group, helps federal,<br />
state, and local law enforcers do their jobs better<br />
with investigative technologies that are faster, easier,<br />
smarter, and more affordable. In fact, SRT Wireless<br />
is the leading provider of Wi-Fi signal technology<br />
and training for law enforcement purposes, including<br />
access point and station discovery, surveillance,<br />
interception and targeting.<br />
SUMURI<br />
In July of 2010, Sumuri LLC opened for business<br />
to provide forensic training, services, and products<br />
relating to the preservation, examination, and<br />
reporting of digital evidence. The name “Sumuri” is<br />
an old Tagalog word which can be interpreted as “to<br />
investigate” or “analyze”. The heart of Sumuri consists<br />
of simple core values that found in each of our team<br />
members. These are core values such as honor,<br />
integrity, loyalty, positive attitude, dedication, and<br />
most important and above all - altruism. Altruism - the<br />
desire to help, serve and care for others first before<br />
yourself.<br />
Susteen Inc<br />
usteen is a software manufacturer. Susteen made the<br />
product called Secure View, which is a cell phone<br />
forensic software that acquires, analysis and reports on<br />
over 3000 cell phones.<br />
Tactical Network Solutions<br />
Tactical Network Solutions, LLC (TNS) provides<br />
offensive cyber capabilities to law enforcement, the<br />
intelligence community, and military intel units.<br />
Founded in 2007, TNS employs former intelligence<br />
community developers, operators, and intelligence<br />
professionals that specialize in computer network<br />
operations (CNO). Areas of focus include 802.11<br />
wireless network exploitation, network traffic analysis,<br />
reconnaissance and surveillance, covert infrastructure<br />
support, and training. All TNS personnel are cleared to<br />
the Top Secret level.<br />
The Innocent Justice Foundation<br />
Innocent Justice works to enable the investigation and<br />
prosecution of child sex predators by assisting law<br />
enforcement agencies to obtain equipment needed<br />
for child pornography investigations, offering mental<br />
health and wellness training for those exposed to<br />
disturbing material, and educating the public about the<br />
true nature and scope of child sexual abuse and torture<br />
images.<br />
Tracker Products<br />
Tracker Products software automates the entire<br />
process of collecting, processing and tracking<br />
inventory with an easy-to-use, browser-based system.<br />
Featuring the latest advances in bar code tracking,<br />
chain of custody reporting, detailed searching and<br />
inventory management, Tracker Products software is<br />
the ultimate evidence tracking solution.<br />
Walden University<br />
Walden, an accredited online university, offers degree<br />
programs that focus on relevant skills to be used<br />
immediately in the workplace and in your community.<br />
Our online degree programs reflect our mission of<br />
promoting positive social change. Walden University<br />
offers over 600 online bachelors, masters, and<br />
doctorate degree programs for working professionals.<br />
PARTNERS IN PROTECTING CHILDREN 103
Exhibitors<br />
ZiuZ, Inc.<br />
ZiuZ Inc. is a leading developer of image and video<br />
analysis tools for child exploitation investigations.<br />
As the author of VizX, and the ground-breaking<br />
technology TwinMatch, ZiuZ puts state-of-the-art<br />
visual intelligence capabilities in the hands of today’s<br />
high-tech crime investigators and computer forensics<br />
professionals. VizX and TwinMatch combined make a<br />
total solution for analyzing video and photo material<br />
confiscated in CA/CE investigations. Proven and robust<br />
tools for quickly searching through large quantities of<br />
visual material and distinguishing between offensive<br />
and non-offensive images by using built-in intelligence<br />
presented in a way to enhance the effectiveness of the<br />
users’ judgment. Visit the ZiuZ booth to receive your<br />
demo license of VizX 2. www.ziuz.com<br />
104 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION
PARTNERS IN PROTECTING CHILDREN 105
Partners in Protecting <strong>Child</strong>ren<br />
Thank you for helping to make this training a success!<br />
Working as Partners to<br />
Make the Internet a Safer Place<br />
For additional resources and training opportunities, please visit: www.icactaskforce.o<br />
This project is supported by Grant # 2010-MC-CX-K038 awarded by the OJJDP, OJP, US DOJ.<br />
106 Points of view or opinions in this document <strong>2012</strong> NATIONAL are those of LAW the author ENFORCEMENT and do not necessarily TRAINING represent ON CHILD EXPLOITATION<br />
the official position or policies of the US DOJ.