27.02.2013 Views

2012 National Law Enforcement Training On Child - ICAC Home

2012 National Law Enforcement Training On Child - ICAC Home

2012 National Law Enforcement Training On Child - ICAC Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>2012</strong> <strong>National</strong> <strong>Law</strong> <strong>Enforcement</strong><br />

<strong>Training</strong> on <strong>Child</strong> Exploitation<br />

April 17 - 19, <strong>2012</strong> Hyatt Regency Atlanta Atlanta, GA<br />

Cover Design<br />

Partners in Protecting <strong>Child</strong>ren<br />

Pre-Event Workshops April 16, <strong>2012</strong><br />

“Working as Partners to<br />

Make the Internet a Safer Place”<br />

PARTNERS IN PROTECTING CHILDREN 1


2 3 <strong>2012</strong> NATIONAL NATIONAL LAW LAW ENFORCEMENT ENFORCEMENT TRAINING TRAINING ON ON CHILD CHILD EXPLOITATION<br />

EXPLOITATION


Table of Contents<br />

Welcome 1<br />

Acknowledgements 3<br />

General Information 5<br />

<strong>Training</strong> Event Information 11<br />

Special Events 21<br />

Daily Activities 31<br />

Lab-based <strong>Training</strong> Descriptions 32<br />

Classroom-based <strong>Training</strong> Descriptions 43<br />

Speaker Biographies 65<br />

Exhibitors 97<br />

PARTNERS IN PROTECTING CHILDREN 3


4 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Sextortion<br />

This presentation will provide investigators and prosecutors practical tips for<br />

addressing "sextortion," an increasingly more common form of the online sexual<br />

exploitation of children that involves offenders stalking and extorting minors into<br />

self-producing sexually explicit images and videos. Investigation and charging<br />

strategies will be explored, making reference to two recent high-profile cases.<br />

Learn more about Sextortion<br />

Check your schedule for the day and time<br />

this Lab-Based <strong>Training</strong> will be offered.<br />

PARTNERS IN PROTECTING CHILDREN 5


6 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Welcome<br />

Welcome to the <strong>2012</strong> <strong>National</strong> <strong>Law</strong> <strong>Enforcement</strong> <strong>Training</strong> on <strong>Child</strong> Exploitation.<br />

As we continue to focus on training, prevention, deterrence and interdiction, we<br />

will continue to make meaningful strides in protecting America’s young people<br />

from exploitation.<br />

Partners in<br />

Protecting <strong>Child</strong>ren<br />

Throughout this training program you will find case highlights<br />

from collaborative efforts to protect children and prevent<br />

exploitation. We thank our partner agencies for their tireless<br />

work on behalf of our most vulnerable citizens.<br />

PARTNERS IN PROTECTING CHILDREN 1


2 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Operation Delego<br />

This case study involves the investigation of an Internet forum/bulletin<br />

board dedicated to the production, distribution and advertisement of<br />

hardcore child pornography. The presentation will cover case overview,<br />

investigative techniques, international law and prosecution issues.<br />

Learn more about Operation Delego<br />

Check your schedule for the day and time this Lab-Based <strong>Training</strong> will be offered.<br />

PARTNERS IN PROTECTING CHILDREN 3


4 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Acknowledgements<br />

THANKS TO OUR PARTNERS<br />

The U.S. Department of Justice’s Office of Justice Programs, Office of Juvenile<br />

Justice and Delinquency Prevention would like to thank our partners in protecting children from<br />

sexual exploitation.<br />

Internet Crimes Against <strong>Child</strong>ren Task Force<br />

<strong>National</strong> Center for Missing & Exploited <strong>Child</strong>ren<br />

Naval Criminal Investigative Service<br />

United States Department of Defense Cyber Investigation <strong>Training</strong> Academy<br />

United States Department of <strong>Home</strong>land Security<br />

United States Immigration and Customs <strong>Enforcement</strong><br />

United States Secret Service<br />

United States Department of Justice<br />

<strong>Child</strong> Exploitation and Obscenity Section, Criminal Division<br />

Executive Office for United States Attorneys<br />

Federal Bureau of Investigation<br />

Federal Bureau of Prisons<br />

INTERPOL<br />

Office of the Attorney General<br />

Office of the Deputy Attorney General<br />

Offices of the United States Attorneys<br />

United States Marshals Service<br />

United States Postal Inspection Service<br />

United States Courts<br />

PARTNERS IN PROTECTING CHILDREN 3


Acknowledgements<br />

SPECIAL THANKS TO THE<br />

<strong>ICAC</strong> TASK FORCE TRAINING PROVIDERS<br />

The U.S. Department of Justice’s Office of Justice Programs would also like to<br />

extend special thanks to the <strong>ICAC</strong> training providers who have worked<br />

together to develop and deliver training most pertinent to the mission of<br />

the <strong>ICAC</strong> Task Force Program and this year’s curriculum.<br />

OUR TRAINING PARTNERS INCLUDE:<br />

Fox Valley Technical College’s <strong>ICAC</strong> <strong>Training</strong> & Technical Assistance Program<br />

Girls Education and Mentoring Services<br />

High Tech Crime Institute<br />

The Innocent Justice Foundation<br />

<strong>National</strong> Center for Justice and the Rule of <strong>Law</strong>, University of Mississippi School of <strong>Law</strong><br />

<strong>National</strong> District Attorneys Association<br />

<strong>National</strong> Forensic Science Technology Center<br />

<strong>National</strong> White Collar Crime Center<br />

SEARCH High-Tech Crime <strong>Training</strong> Program<br />

THANK YOU TO THE COMPUTER LAB DONORS<br />

The training event organizers would like to express sincere appreciation to the organizations and agencies who<br />

donated their computer labs to the training. Your donations contributed to the success of the lab sessions.<br />

Florida Department of <strong>Law</strong> <strong>Enforcement</strong><br />

FVTC’s <strong>ICAC</strong> <strong>Training</strong> & Technical Assistance Program<br />

<strong>National</strong> Center for Missing & Exploited <strong>Child</strong>ren<br />

<strong>National</strong> White Collar Crime Center<br />

SEARCH High-Tech Crime <strong>Training</strong> Program<br />

We would also like to convey our appreciation to the Georgia Bureau of<br />

Investigation, the Atlanta Police Department, and<br />

the Georgia <strong>ICAC</strong> Task Force Program for hosting this training event.<br />

4 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>Child</strong> Exploitation –<br />

Wisconsin & California Teamwork<br />

"Wisconsin began chatting with someone identifying herself as “Beth.” Beth<br />

subsequently introduced the victim to her cousin “Brian.” Brian’s conversations<br />

became sexual and the Wisconsin victim sent nude pictures of herself to Brian.<br />

Brian threatened to expose the pictures unless the victim sent additional images.<br />

The victim reported the incident and a Wisconsin investigator assumed the victim’s<br />

on-line identity and began communicating with Brian. Brian stopped chatting with<br />

the Wisconsin undercover officer after Brian was contacted by a Sacramento <strong>ICAC</strong><br />

detective who was following-up on an unrelated CyberTip complaint. <strong>On</strong>ce the<br />

enforcement efforts were coordinated, Sacramento <strong>ICAC</strong> completed the case<br />

resulting in an arrest for child pornography with admissions to the Wisconsin<br />

crimes. Suspect is now serving 11 years in prison."<br />

Learn more about <strong>Child</strong> Exploitation - Wisconsin & California Teamwork<br />

Check your schedule for the day and time<br />

this Lab-Based <strong>Training</strong> will be offered.<br />

PARTNERS IN PROTECTING CHILDREN 5


6 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Project Safe <strong>Child</strong>hood Program Information<br />

The Department of Justice’s<br />

Project Safe <strong>Child</strong>hood Initiative<br />

The Department of Justice is committed to protecting our children. Advances<br />

in technology over the last two decades have made it much easier for offenders<br />

to sexually exploit our children, whether by enabling offenders to quickly and<br />

easily obtain and distribute vast amounts of child pornography images around<br />

the world, by making it easy for offenders to find children to victimize, and by<br />

helping offenders find and communicate with like-minded offenders, with the<br />

result that they encourage each other to commit yet more child exploitation<br />

crimes. As nearly all children in the United States can access the internet not just<br />

from homes, schools, and libraries, but from mobile devices that are becoming<br />

ubiquitous, and as technology continues to advance, the already-considerable<br />

challenges of keeping children safe from dangers online will only continue to<br />

increase. At any time there can be countless persons online who would harm<br />

children if given the opportunity.<br />

In response to the increased dangers associated with the internet, in May 2006<br />

the Department launched the national law enforcement initiative Project Safe<br />

<strong>Child</strong>hood. Project Safe <strong>Child</strong>hood was designed to reduce the incidence of<br />

sexual exploitation of children by helping law enforcement at the federal, tribal,<br />

state, and local levels form collaborative partnerships. These partnerships have<br />

enabled law enforcement to work together to investigate and prosecute people<br />

who have or have attempted to sexually exploit children.<br />

While Project Safe <strong>Child</strong>hood originally focused on technology-facilitated offenses, the Department expanded<br />

Project Safe <strong>Child</strong>hood in May 2011 to encompass all federal crimes involving the sexual exploitation of a minor,<br />

including those committed in Indian country or those which involve commercial sexual activity, whether or<br />

not they involve the internet. This sexual exploitation can occur in numerous ways, including the following: the<br />

production, trafficking, or possession of child pornography; online enticement of children for sexual purposes;<br />

commercial sexual exploitation of children; as well as child prostitution and extraterritorial sexual exploitation of<br />

children. Project Safe <strong>Child</strong>hood aims to protect children from all of these crimes.<br />

In August 2010, the Department submitted The <strong>National</strong> Strategy for <strong>Child</strong> Exploitation Prevention and Interdiction<br />

to Congress. The goal of the <strong>National</strong> Strategy is “to prevent child sexual exploitation from occurring in the first<br />

place, in order to protect every child’s opportunity and right to have a childhood that is free from sexual abuse,<br />

trauma, and exploitation so that they can become the adults they were meant to be . . . by efficiently leveraging<br />

assets across the federal government in a coordinated manner.” The Department adopted this goal as the guiding<br />

principle for all current and future efforts to combat child sexual exploitation. In order to meet this goal, the<br />

Department will continue to focus on partnerships formed with federal, tribal, state, and local agencies and to<br />

pursue opportunities to increase awareness and education about child sexual exploitation. The Department values<br />

the critical contributions of our colleagues throughout law enforcement, such as the members of the Departmentfunded<br />

Internet Crimes Against <strong>Child</strong>ren (<strong>ICAC</strong>) Task Force Program, and looks forward to working shoulder-toshoulder<br />

with our partners as we investigate and prosecute those who prey on our children.<br />

PARTNERS IN PROTECTING CHILDREN 5


<strong>ICAC</strong> Task Force Program Information<br />

OJJDP’s Internet Crimes Against <strong>Child</strong>ren<br />

Task Force Agencies<br />

The Internet Crimes Against <strong>Child</strong>ren (<strong>ICAC</strong>) Task Force Program helps state and local law enforcement agencies<br />

develop an effective response to cyber enticement and child pornography cases. This help encompasses forensic and<br />

investigative components, training and technical assistance, victim services, and community education.<br />

The program was developed in response to the increasing number of children and teenagers using the Internet, the<br />

proliferation of child pornography, and heightened online activity by predators seeking unsupervised contact with<br />

potential underage victims. The FY 1998 Justice Appropriations Act (Pub, L. No. 105–119) directed OJJDP to create<br />

a national network of state and local law enforcement cyber units to investigate cases of child sexual exploitation.<br />

The <strong>ICAC</strong> Program is a national network of 61 coordinated task forces representing over 3,000 federal, state, local<br />

and tribal law enforcement and prosecutorial agencies. These agencies are engaged in proactive investigations,<br />

forensic investigations, and criminal prosecutions. By helping state and local agencies to develop effective, sustainable<br />

responses to online child victimization and child pornography, OJJDP has increased their capacity to address Internet<br />

crimes against children.<br />

6 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>ICAC</strong> Task Force Agency Contacts<br />

Alaska<br />

Anchorage Police Department<br />

Jurisdiction: Alaska<br />

Contact: Detective Sergeant Michael<br />

Couturier<br />

Phone: 907786-2444<br />

Email: mcouturier@muni.org<br />

Alabama<br />

Alabama Bureau of Investigation<br />

Jurisdiction: Alabama<br />

Contact: Sergeant Jeremy Lett<br />

Phone: 334-353-1339<br />

Email: Jeremy.lett@dps.alabama.gov<br />

Arkansas<br />

Arkansas State Police<br />

Jurisdiction: Arkansas<br />

Contact: Captain Henry La Mar<br />

Phone: (501) 618-8441<br />

Email: henry.lamar@asp.arkansas.gov<br />

Arizona<br />

Phoenix Police Department<br />

Jurisdiction: Arizona<br />

Contact: Sergeant Jerry Barker<br />

Phone: (602) 650-3170<br />

Email: jerry.barker@phoenix.gov<br />

California, Los Angeles<br />

Los Angeles Police Department<br />

Jurisdiction: Los Angeles CA area<br />

Contact: Lieutenant Andrea Grossman<br />

Phone: (562) 624-4028<br />

Email: 30231@lapd.lacity.org<br />

California, Fresno<br />

Fresno County Sheriff’s Office<br />

Jurisdiction: Fresno County CA area<br />

Contact: Lieutenant Steve Wilkins<br />

Phone: (559) 488-3904<br />

Email: Steve.Wilkins@fresnosheriff.org<br />

California, Sacramento<br />

Sacramento County Sheriff’s Office<br />

Jurisdiction: Sacramento CA area<br />

Contact: Lieutenant Dave Torgerson<br />

Phone: (916) 874-3007<br />

Email: dtorgerson@sacsheriff.com<br />

California, San Diego<br />

San Diego Police Department<br />

Jurisdiction: San Diego CA area<br />

Contact: Sergeant Chuck Arnold<br />

Phone: (858) 715-7120<br />

Email: carnold@sdicac.org<br />

California, San Jose<br />

San Jose Police Department<br />

Jurisdiction: San Jose CA area<br />

Contact: Sergeant Gregory Lombardo<br />

Phone: (408) 277-4102<br />

Email: 3439@sanjoseca.gov<br />

Colorado<br />

Colorado Springs Police Department<br />

Jurisdiction: Colorado<br />

Contact: Sergeant Bill Dehart<br />

Phone: (719) 444-7808<br />

Email: dehartbi@ci.colospgs.co.us<br />

Connecticut<br />

Connecticut Department of Public Safety<br />

Jurisdiction: Connecticut<br />

Contact: Major William Podgorski<br />

Phone: (203)-694-6525<br />

Email: william.podgorski@po.state.ct.us<br />

Delaware<br />

Delaware Department of Justice<br />

Jurisdiction: Delaware<br />

Contact: Special Investigator Robert Irwin<br />

Phone: (302) 739-2030<br />

Email: robert.irwin@state.de.us<br />

Florida, Gainesville<br />

Gainesville Police Department<br />

Jurisdiction: Northern Florida<br />

Contact: Detective John Madsen<br />

Phone: (352) 393-7686<br />

Email: madsenja@cityofgainesville.org<br />

Florida, Broward County<br />

Broward County Sheriff’s Office<br />

Jurisdiction: Southern Florida<br />

Contact: Lieutenant Richard Pisanti<br />

Phone: (954) 888-5256<br />

Email: Richard_Pisanti@bsosid.org<br />

Florida, Polk County Sheriff ’s Office<br />

Polk County Sheriff’s Office<br />

Jurisdiction: Central Florida<br />

Contact: Lieutenant Steven Ward<br />

Phone: (863) 297-3101<br />

Email: sward@polksheriff.org<br />

Georgia<br />

Georgia Bureau of Investigation<br />

Jurisdiction: Georgia<br />

Contact: Assistant Special Agent in Charge<br />

Sandra Putnam<br />

Phone: (404) 270-8870<br />

Email: sandra.putnam@gbi.ga.gov<br />

Hawaii<br />

Hawaii Department of Attorney General<br />

Jurisdiction: Hawaii<br />

Contact: Supervisory Special Agent Clay<br />

Kawamata<br />

Phone: (808) 587-4114<br />

Email: Clay.S.Kawamata@hawaii.gov<br />

Iowa<br />

Iowa Division of Criminal Investigation<br />

Jurisdiction: Iowa<br />

Contact: Special Agent in Charge Gerard<br />

Meyers<br />

Phone: (515) 965-7402<br />

Email: meyers@dps.state.ia.us<br />

Idaho<br />

Idaho Office of Attorney General<br />

Jurisdiction: Idaho<br />

Contact: <strong>ICAC</strong> Investigator James Kouril<br />

Phone: (208) 334-4125<br />

Email: jim.kouril@ag.idaho.gov<br />

Illinois<br />

Illinois Office of Attorney General<br />

Jurisdiction: Illinois<br />

Contact: Deputy Chief Michael Sullivan<br />

Phone: (312) 814-3505<br />

Email: misullivan@atg.state.il.us<br />

PARTNERS IN PROTECTING CHILDREN 7


<strong>ICAC</strong> Task Force Agency Contacts<br />

Illinois, Cook County<br />

Cook County State’s Attorney’s Office<br />

Jurisdiction: Cook County IL area<br />

Contact: Deputy Chief Kathleen Muldoon<br />

Phone: (773) 674-5887<br />

Email:<br />

Kathleen.Muldoon@cookcountyil.gov<br />

Indiana<br />

Indiana State Police<br />

Jurisdiction: Indiana<br />

Contact: Lieutenant Chuck Cohen<br />

Phone: (317) 232-8309<br />

Email: ccohen@isp.IN.gov<br />

Kansas<br />

Sedgwick County Sheriff’s Office<br />

Jurisdiction: Kansas<br />

Contact: Lieutenant Jeffrey Weible<br />

Phone: (316) 337-6552<br />

Email: jweible@sedgwick.gov<br />

Kentucky<br />

Kentucky State Police<br />

Jurisdiction: Kentucky<br />

Contact: Lieutenant Shane Bates<br />

Phone: (502) 782-9769<br />

Email: shane.bates@ky.gov<br />

Louisiana<br />

Louisiana Department of Justice<br />

Jurisdiction: Louisiana<br />

Contact: Computer Forensic Lab Manager<br />

Corey Bourgeois<br />

Phone: (225) 326-6133<br />

Email: bourgeoisc@ag.state.la.us<br />

Massachusetts<br />

Massachusetts State Police<br />

Jurisdiction: Massachusetts<br />

Contact: Sergeant Michael Hill<br />

Phone: (413) 499-1112 x313<br />

Email: michael.hill@state.ma.us<br />

Maryland<br />

Maryland State Police<br />

Jurisdiction: Maryland<br />

Contact: Lieutenant John Wilhelm<br />

Phone: (410) 953-8260<br />

Email: jwilhelm@mdsp.org<br />

Maine<br />

Maine State Police<br />

Jurisdiction: Maine<br />

Contact: Sergeant Glenn Lang<br />

Phone: (207) 877-8081<br />

Email: glang@mcctf.org<br />

Michigan<br />

Michigan State Police<br />

Jurisdiction: Michigan<br />

Contact: Detective Sergeant Jay<br />

Poupard<br />

Phone: (517) 336-<strong>2012</strong><br />

Email: poupardj@michigan.gov<br />

Minnesota<br />

Minnesota Bureau of Criminal<br />

Apprehension<br />

Jurisdiction: Minnesota<br />

Contact: Senior Special Agent<br />

Donald Cheung<br />

Phone: (651) 793-1072<br />

Email: donald.cheung@state.mn.us<br />

Missouri<br />

St. Charles County Sheriff’s<br />

Department<br />

Jurisdiction: Missouri<br />

Contact: Lieutenant Chris Mateja<br />

Phone: (636) 949-3020 x4604<br />

Email: cmateja@sccmo.org<br />

Mississippi<br />

Mississippi Office of Attorney<br />

General<br />

Jurisdiction: Mississippi<br />

Contact: Assistant AG Jean Vaughan<br />

Phone: (601) 359-3817<br />

Email: jvaug@ago.state.ms.us<br />

Montana<br />

Billings Police Department<br />

Jurisdiction: Montana<br />

Contact: Director of Task Force<br />

Operations Tim West<br />

Phone: (406) 896-3295<br />

Email: westt@ci.billings.mt.us<br />

North Carolina<br />

North Carolina State Bureau of<br />

Investigation<br />

Jurisdiction: North Carolina<br />

Contact: SAIC Kelly Moser<br />

Phone: (919) 779-8131<br />

Email: kmoser@ncdoj.gov<br />

North Dakota<br />

North Dakota Bureau of Criminal<br />

Investigation<br />

Jurisdiction: North Dakota<br />

Contact: Chief Agent Lonnie Grabowska<br />

Phone: (701) 328-5530<br />

Email: lgrabowska@nd.gov<br />

Nebraska<br />

Nebraska State Patrol<br />

Jurisdiction: Nebraska<br />

Contact: Sergeant Eric Jones<br />

Phone: 402479-4080<br />

Email: eric.jones@nebraska.gov<br />

New Hampshire<br />

Portsmouth Police Department<br />

Jurisdiction: New Hampshire<br />

Contact: Captain Corey MacDonald<br />

Phone: (603) 610-7548<br />

Email:<br />

cmacdonald@cityofportsmouth.com<br />

New Jersey<br />

New Jersey State Police<br />

Jurisdiction: New Jersey<br />

Contact: Det. Sgt. First Class Joseph<br />

Glennan<br />

Phone: (609) 584-5051 x 5604<br />

Email: lpp4695@gw.njsp.org<br />

New Mexico<br />

New Mexico Attorney General’s Office<br />

Jurisdiction: New Mexico<br />

Contact: Special Agent in Charge<br />

Anthony Maez<br />

Phone: 505222-9161<br />

Email: amaez@nmag.gov<br />

8 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>ICAC</strong> Task Force Agency Contacts<br />

Nevada<br />

Las Vegas Metropolitan Police<br />

Department<br />

Jurisdiction: Nevada<br />

Contact: Sergeant Mike Mauntel<br />

Phone: (702) 828-5677<br />

Email: M5318M@LVMPD.COM<br />

New York<br />

New York State Police<br />

Jurisdiction: New York<br />

Contact: Captain Frank Pace<br />

Phone: (518) 485-2953<br />

Email: frank.pace@troopers.ny.gov<br />

New York<br />

New York City Police Department<br />

Jurisdiction: New York City NY area<br />

Contact: Sergeant Felix Rivera<br />

Phone: (646) 610-6785<br />

Email: felix.rivera@nypd.org<br />

Ohio<br />

Cuyahoga County Prosecutor’s Office<br />

Jurisdiction: Ohio<br />

Contact: APA Brett Kyker<br />

Phone: (216) 698-2229<br />

Email: bkyker@cuyahogacounty.us<br />

Oklahoma<br />

Oklahoma State Bureau of Investigation<br />

Jurisdiction: Oklahoma<br />

Contact: Special Agent in Charge Steve<br />

Tanner<br />

Phone: (405) 879-2613<br />

Email: steve.tanner@osbi.ok.gov<br />

Oregon<br />

Oregon Department of Justice<br />

Jurisdiction: Oregon<br />

Contact: Special Agent in Charge Ken<br />

Rueben<br />

Phone: (503) 378-6347<br />

Email: ken.rueben@doj.state.or.us<br />

Pennsylvania<br />

Delaware County<br />

District Attorney’s Office<br />

Jurisdiction: Pennsylvania<br />

Contact: Lieutenant Dave Peifer<br />

Phone: (610) 891-4709<br />

Email: paicac@gmail.com<br />

Rhode Island<br />

Rhode Island State Police<br />

Jurisdiction: Rhode Island<br />

Contact: Lieutenant Nicholas Tella<br />

Phone: (401) 275-5171<br />

Email: ntella@risp.dps.ri.gov<br />

South Carolina<br />

SC Attorney General’s Office<br />

Jurisdiction: South Carolina<br />

Contact: AAG Deborah Shupe<br />

Phone: (803) 734-3797<br />

Email: dshupe@scag.gov<br />

South Dakota<br />

South Dakota Division of Criminal<br />

Investigation<br />

Jurisdiction: South Dakota<br />

Contact: Special Agent Troy Boone<br />

Phone: 605677-7231<br />

Email: Troy.Boone@state.sd.us<br />

Tennessee<br />

Knoxville Police Department<br />

Jurisdiction: Tennessee<br />

Contact: Captain Monty Houk<br />

Phone: (865) 215-7020<br />

Email: mhouk@cityofknoxville.org<br />

Texas, Southern<br />

Office of the Attorney General of Texas<br />

Jurisdiction: Southern TX area<br />

Contact: Captain, Criminal Investigations<br />

Jeff Eckert<br />

Phone: 512936-2914<br />

Email: jeff.eckert@oag.state.tx.us<br />

Texas<br />

(HM) Pasadena Independent School District<br />

Jurisdiction: Houston Metro TX area<br />

Contact: Lieutenant Matt Gray<br />

Phone: (713) 740-0045<br />

Email: mgray@hmicac.org<br />

Texas, Dallas<br />

Dallas Police Department<br />

Jurisdiction: Dallas TX area<br />

Contact: Lieutenant Sally Lannom<br />

Phone: (214) 671-4201<br />

Email: sally.lannom@dpd.ci.dallas.tx.us<br />

Utah<br />

Utah Office of Attorney General<br />

Jurisdiction: Utah<br />

Contact: Section Chief Jessica Farnsworth<br />

Phone: (801) 580-4165<br />

Email: jfarnsworth@utah.gov<br />

Virginia<br />

Virginia State Police<br />

Jurisdiction: Northern VA and<br />

Washington DC<br />

Contact: Captain Kirk Marlowe<br />

Phone: (804) 674-2767<br />

Email: kirk.marlowe@vsp.virginia.gov<br />

Virginia<br />

Bedford County Sheriff’s Office<br />

Jurisdiction: Southern VA<br />

Contact: Lieutenant Mike Harmony<br />

Phone: (434) 534-9521 x221<br />

Email: mharmony@bedfordsheriff.org<br />

Vermont<br />

Burlington Police Department<br />

Jurisdiction: Vermont<br />

Contact: Lieutenant Kristian (Kris) Carlson<br />

Phone: (802) 540-2202<br />

Email: kcarlson@bpdvt.org<br />

PARTNERS IN PROTECTING CHILDREN 9


<strong>ICAC</strong> Task Force Agency Contacts<br />

Washington<br />

Seattle Police Department<br />

Jurisdiction: Washington<br />

Contact: Captain James Koutsky<br />

Phone: (206) 684-4351<br />

Email: james.koutsky@seattle.gov<br />

Wisconsin<br />

Wisconsin Department of Justice<br />

Jurisdiction: Wisconsin<br />

Contact: Special Agent in Charge Jenniffer Price<br />

Phone: (608) 267-1326<br />

Email: priceje@doj.state.wi.us<br />

West Virginia<br />

West Virginia State Police<br />

Jurisdiction: West Virginia<br />

Contact: First Sergeant Christopher Casto<br />

Phone: (304) 293-6401<br />

Email: cmcasto@wvsp.state.wv.us<br />

Wyoming<br />

Wyoming Division of Criminal Investigation<br />

Jurisdiction: Wyoming<br />

Contact: Special Agent Robert Leazenby<br />

Phone: (307) 777-5437<br />

Email: Robert.leazenby@wyo.gov<br />

10 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Operation Laminar<br />

This case study involves the investigation of individuals and groups on the<br />

social networking site Facebook who are involved in the dissemination of<br />

materials involving the visual depiction of minors engaged in sexually<br />

explicit conduct. This presentation will cover case overview, investigative<br />

techniques, international concerns and prosecutorial issues.<br />

Learn more about Operation Laminar<br />

Check your schedule for the day and time<br />

that this Lab-Based <strong>Training</strong> will be offered.<br />

PARTNERS IN PROTECTING CHILDREN 11


12 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>Training</strong> Event Information<br />

Thank you for joining us at the <strong>2012</strong> <strong>National</strong> <strong>Law</strong> <strong>Enforcement</strong> <strong>Training</strong> on <strong>Child</strong> Exploitation, the largest event in<br />

the nation that provides training related to Internet crimes against children to law enforcement.<br />

Throughout the event, we will continue to emphasize the importance of cooperation and collaboration between<br />

federal, state, tribal and local investigators and prosecutors. <strong>Training</strong> will focus on the investigation of Internet<br />

crimes against children and techniques that will help lead to the successful prosecution of these horrific crimes.<br />

SPECIAL EVENTS:<br />

Opening Ceremony - Centennial Ballroom<br />

Tuesday, April 17: 8:00 am – 8:45 am<br />

Plenary Session - Centennial Ballroom<br />

Tuesday, April 17: 2:00 pm - 3:30 pm<br />

Visiting Atlanta<br />

Make the most of your visit to Atlanta, a wonderful city with lots to offer.<br />

Visit the concierge at the hotel lobby or log onto www.atlanta.net.<br />

PARTNERS IN PROTECTING CHILDREN 11


Local Restaurants - (sorted by distance)<br />

Downtown Restaurants<br />

Name Address Phone Distance<br />

Sway (Hyatt Regency Atlanta) 265 Peachtree Street NE 404-577-1234 0 ft<br />

The Market (Hyatt Regency Atlanta) 265 Peachtree Street, NE 404-577-1234 0 ft<br />

Twenty-Two Storys (Hyatt Regency Atlanta) 265 Peachtree Street, N.E. 404-577-1234 0 ft<br />

Ray's in the City 240 Peachtree Street 404-524-9224 366 ft S<br />

Chick-fil-A at Peachtree Center 233 Peachtree Street 404-577-4194 431 ft SE<br />

High Velocity (Atlanta Marriott Marquis) 265 Peachtree Center Avenue 404-586-6174 443 ft E<br />

Willy's Mexicana Grill 235 Peachtree Street NE 404-524-0821 443 ft S<br />

Sear (Atlanta Marriott Marquis) 265 Peachtree Center Avenue 404-586-6134 445 ft E<br />

Max Lager's Wood-Fired Grill & Brewery 320 Peachtree Street NE 404-525-4400 0.1 mi N<br />

Morton's The Steakhouse 303 Peachtree Center Ave. 404-577-4366 0.1 mi NE<br />

Pacific Rim Bistro 303 Peachtree Center Avenue 404-893-0018 0.1 mi NE<br />

Azio Restaurant - Peachtree Center 229 Peachtree Street 404-222-0808 0.1 mi S<br />

Benihana Japanese Steakhouse Restaurant 229 Peachtree Street, N.E. 404-522-9629 0.1 mi S<br />

Durango Oak Fire Steakhouse 230 Peachtree Street, NW 404-222-0103 0.1 mi S<br />

Hard Rock Café 215 Peachtree Street, N.E. 404-688-7625 0.1 mi S<br />

Metro Cafe Diner 229 Peachtree Street 404-577-1420 0.1 mi S<br />

Pittypat's Porch Restaurant 25 Andrew Young International Blvd. 404-525-8228 0.1 mi S<br />

Subway 225 Peachtree St., NE 404-524-1782 0.1 mi S<br />

Gibney's Pub 231 Peachtree Center Avenue 404-688-0928 0.1 mi SE<br />

Nikolai's Roof (Hilton Atlanta) 255 Courtland Street, N.E. 404-221-6362 0.2 mi E<br />

BLT STEAK-Bistro Laurent Tourondel 45 Ivan Allen, Jr. Boulevard 404-577-7601 0.2 mi NW<br />

Agatha's -- A Taste of Mystery 161 Peachtree Center Ave 404-584-2255 0.2 mi S<br />

Atlanta Grill (Ritz-Carlton, Atlanta) 181 Peachtree Street, N.W. 404-221-6550 0.2 mi S<br />

Cafe Intermezzo at Carnegie 141 Carnegie Way 404-844-5577 0.2 mi S<br />

Meehan's Public House 200 Peachtree Street 404-214-9821 0.2 mi S<br />

Sun Dial Restaurant, Bar and View 210 Peachtree St., NW 404-589-7506 0.2 mi S<br />

Sweet Georgia's Juke Joint 200 Peachtree St 404-230-5853 0.2 mi S<br />

The Terrace 176 Peachtree Street 404-523-5155 0.2 mi S<br />

Fandangles Restaurant & Martini Bar Sheraton Atlanta Hotel 404-659-6500 0.2 mi SE<br />

HSU's Gourmet Chinese Restaurant 192 Peachtree Center Avenue 404-659-2788 0.2 mi SE<br />

Truva 60 Andrew Young International Blvd 404-577-8788 0.2 mi SE<br />

Room at Twelve Hotel 400 W. Peachtree St. 404-418-1250 0.3 mi N<br />

Ted's Montana Grill 133 Luckie Street 404-521-9796 0.3 mi SW<br />

Johnny Rockets Underground Atlanta 50 Upper Alabama Street 404-525-7117 0.5 mi N<br />

Dania's Restaurant 26 Peachtree St 404-588-0069 0.5 mi S<br />

McDonald's 35 Forsynth Street 404-584-9483 0.5 mi SW<br />

Baja Fresh 250 Park Avenue West NW 404-681-2252 0.5 mi W<br />

The Marketplace (Hilton Atlanta) 255 Courtland Street, N.E. 404-659-2000 0.6 mi NE<br />

12 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>Training</strong> Event Information<br />

General Information:<br />

As a courtesy to other attendees, we request your<br />

cooperation with the following guidelines during the<br />

training:<br />

• Please silence your mobile devices during all<br />

sessions.<br />

• Please arrive on time for all sessions.<br />

• Please fill the seats in the front to make room for<br />

late arrivals.<br />

• If the workshop is filled to capacity, please check<br />

to see if it is offered at a later time or attend your<br />

second choice workshop.<br />

Your name badge is your admission to all<br />

sessions and must be worn at all times. If you<br />

misplace your badge, you will be required to<br />

show a photo ID at the registration desk to<br />

obtain a new badge. Please carry your photo<br />

ID with you at all times.<br />

All classroom-based training sessions will be filled on<br />

a “first come, first served” basis. Lab-based training<br />

session seats are pre-assigned based on attendee<br />

pre-registration; however, any vacant seats will be<br />

allocated to the first requestors on the day and at the<br />

time the session is scheduled. Information with regard<br />

to open lab sessions will be made available at the onsite<br />

registration area.<br />

Special Events:<br />

Opening Ceremony - Centennial Ballroom<br />

Tuesday, April 17: 8:00 am – 8:45 am<br />

Plenary Session - Centennial Ballroom<br />

Tuesday, April 17: 2:00 pm - 3:30 pm<br />

Check-in and <strong>On</strong>site<br />

Eligibility and Check-in:<br />

This training is limited to agencies who handle Internet<br />

crimes against children related cases and other invited<br />

guests. All registrants of the <strong>National</strong> <strong>Law</strong> <strong>Enforcement</strong><br />

<strong>Training</strong> on <strong>Child</strong> Exploitation must check-in at the<br />

registration desk, located in front of the Grand Hall<br />

at the Hyatt Regency Atlanta to pick up a name badge<br />

and other materials.<br />

<strong>On</strong>site Registration:<br />

Eligible participants will be able to register onsite. Lab<br />

pre-registration will not be available onsite; however,<br />

lab seats not reserved during pre-registration will be<br />

filled on a “first come, first served” basis on the day and<br />

at the time the session is scheduled.<br />

Eligible participants who register onsite will also<br />

be allowed to attend any lecture session. While<br />

participants will be allowed into sessions, there is<br />

no guarantee that onsite registrants will be provided<br />

materials as they are available on a limited basis.<br />

PARTNERS IN PROTECTING CHILDREN 13


<strong>Training</strong> Event Information<br />

Check-in & <strong>On</strong>site Registration<br />

Hours:<br />

Sunday, April 15: 3:00 pm – 7:00 pm<br />

Monday, April 16: 7:00 am – 8:30 am<br />

3:00 pm – 7:00 pm<br />

Tuesday, April 17: 6:30 am – 5:00 pm<br />

Wednesday, April 18: 7:30 am – 5:00 pm<br />

Thursday, April 19: 7:30 am – 5:00 pm<br />

Certificates:<br />

Certificates of training will be available for pick up<br />

at the registration desk, located in front of the Grand<br />

Hall, on Thursday, April 19. Pre-Event Certificates<br />

will be distributed Monday, April 16th, from 5:00<br />

pm - 7:00 pm. Attendees must complete an overall<br />

training evaluation prior to receiving their certificate.<br />

Additionally, attendees who attended a lab-based<br />

training session may request a certificate for each<br />

lab completed via our online service. Additional<br />

information will be provided during the lab session.<br />

Exhibitor Hours/Location:<br />

The exhibitors are located in the Grand Hall West of<br />

the Hyatt Regency Atlanta.<br />

Exhibitor Hours:<br />

Monday, April 16: 12:00 pm – 4:00 pm<br />

(Exhibitor set up only)<br />

Tuesday, April 17: 7:00 am – 5:30 pm<br />

Wednesday, April 18: 7:00 am – 5:30 pm<br />

Thursday, May 19: 7:00 am – 5:30 pm<br />

Speaker Information:<br />

All speakers should check-in at the Speaker registration<br />

desk, located in front of the Grand Hall, to pick up<br />

their name badge and materials.<br />

Speaker Registration Hours:<br />

Sunday, April 15: 3:00 pm – 7:00 pm<br />

Monday, April 16: 7:00 am – 8:30 am<br />

3:00 pm – 7:00 pm<br />

Tuesday, April 17: 6:30 am – 5:00 pm<br />

Wednesday, April 18: 7:30 am – 5:00 pm<br />

Thursday, April 19: 7:30 am – 5:00 pm<br />

Speaker Ready Room:<br />

There will be a Speaker Ready Room located in Chicago<br />

A of the Hyatt Regency Atlanta for the duration of the<br />

training.<br />

Speakers can check-in here if they need assistance with<br />

their presentation or have concerns about audiovisual<br />

equipment. Staff will be available in an adjacent room<br />

to respond to questions.<br />

<strong>Training</strong> Site Information:<br />

Hyatt Regency Atlanta<br />

265 Peachtree Street NE<br />

Atlanta, GA 30303<br />

Phone: 404-577-1234<br />

14 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>Training</strong> Event Information<br />

Public Transportation:<br />

There are several options to get to and from the<br />

airport.<br />

Shuttle:<br />

Go to the transportation booth at the airport and<br />

ask for a shuttle to the appropriate hotel. The hotels<br />

recommend The Atlanta Airport Shuttle Service<br />

(T.A.A.S.S.), at 404-941-3440. No reservations<br />

are necessary for arranging transportation from the<br />

Atlanta Airport to the hotel. It runs 6 a.m. to midnight<br />

from the airport and leaves the hotel every 10 and 40<br />

minutes after the hour. $16.50 one way/$29 round<br />

trip per person.<br />

Taxi Service:<br />

To/From airport fee: $30.00 plus $2.00 per each<br />

additional person. Taxi service within downtown<br />

Atlanta has an $8.00 minimum.<br />

M.A.R.T.A.<br />

(Metro Atlanta Rapid Transit Authority):<br />

$2.50 per ride. Rail system runs approx every 10<br />

minutes. The Hyatt Regency Atlanta is connected to<br />

Peachtree Center Train Station via Peachtree Center<br />

Mall.<br />

The Hilton Atlanta Downtown has direct covered<br />

access via pedestrian sky bridge to the MARTA transit<br />

station.<br />

Parking:<br />

Parking is available at the Hyatt Regency Atlanta<br />

(indoor valet) with in/out privileges, for a cost of<br />

$29 for 6-24 hours. (There is no self-service parking<br />

available.) Vehicles with clearance over 7’, oversized<br />

vans, Winnebagos and buses cannot be accommodated<br />

in the hotel parking lot. Local open-air lots can be<br />

recommended. Contact the Hyatt Concierge at<br />

404-460-6437. Additional parking is located in the<br />

SunTrust building, 1/2 block from the hotel.<br />

Press<br />

All members of the press should check in at the<br />

Registration booth in front of the Grand Hall. All<br />

members of the press are required to wear a Press ID<br />

badge.<br />

PARTNERS IN PROTECTING CHILDREN 15


New <strong>ICAC</strong> Task Force Website<br />

The <strong>ICAC</strong> Task Force Program launches its new web site!<br />

www.icactaskforce.org<br />

The <strong>ICAC</strong> Task Force web site contains links to <strong>ICAC</strong> training provider course information, news,<br />

upcoming events and discussion forums, plus a library containing valuable resource material that is<br />

available to all <strong>ICAC</strong> Task Force and Affiliate agency members who become members of this web site.<br />

At the conclusion of this training event, all registered attendees will be sent a link to access the speaker<br />

presentation materials that will also be posted to this site.<br />

16 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>Training</strong> Event Information - Floor Plan<br />

This map shows the various levels in the Hyatt Regency Atlanta Convention, Meeting and Event Facilities.<br />

The following maps will illustrate where our specific sessions will be held.<br />

PARTNERS IN PROTECTING CHILDREN 17


<strong>Training</strong> Event Information - Floor Plan<br />

18 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>Training</strong> Event Information - Floor Plan<br />

PARTNERS IN PROTECTING CHILDREN 19


20 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Operation Minotaur -<br />

A Collaborative Success<br />

“Operation Minotaur” is multi-agency, multi-state investigation<br />

responsible for dismantling a network of individuals dedicated to sexually<br />

abusing children and trafficking in child pornography. Members of the<br />

group used the Internet to communicate with minors and other members<br />

and also travelled extensively to meet one another and abuse children<br />

under their control. To date, 18 defendants in 11 states have been charged<br />

with state and/or federal violations. 26 victims have been identified,<br />

including several rescued from on-going sexual abuse. The entire operation<br />

stemmed from a single Cybertip from the <strong>National</strong> Center for Missing and<br />

Exploited <strong>Child</strong>ren (NCMEC) in the summer of 2008.<br />

Learn more about Opertion Minotaur<br />

at the Plenary Session on Tuesday, April 17th 2:00 pm - 3:30 pm.<br />

PARTNERS IN PROTECTING CHILDREN 21


22 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Opening Ceremony<br />

Tuesday, April 17, <strong>2012</strong><br />

8:00 am – 8:45 am<br />

Centennial Ballroom<br />

Presentation of Colors Honor Guard, Atlanta Police Department<br />

<strong>National</strong> Anthem Evan Arnold<br />

Clayton County <strong>Child</strong>ren’s Touring Choir<br />

Welcome and Opening Melodee Hanes, Acting Administrator<br />

Remarks Office of Juvenile Justice and Delinquency Prevention<br />

Remarks Vernon Keenan, Director<br />

Georgia Bureau of Investigation<br />

Leigh H. Winchell, Assistant Director<br />

<strong>Home</strong>land Security Investigations<br />

Immigration and Customs <strong>Enforcement</strong><br />

Postal Representative<br />

Teresa Thome, Deputy Chief Inspector<br />

United States Postal Inspection Service<br />

Steven R. Chabinsky, Deputy Assistant Director<br />

Federal Bureau of Investigation<br />

Mark D. Clookie, Director<br />

Naval Criminal Investigative Service<br />

Introduction of the Sally Quillian Yates<br />

Keynote Speaker United States Attorney<br />

Northern District of Georgia<br />

Keynote Address The Honorable James Cole<br />

Deputy Attorney General of the United States<br />

PARTNERS IN PROTECTING CHILDREN 21


Plenary Session<br />

Tuesday, April 17, <strong>2012</strong><br />

2:00 pm – 3:30 pm<br />

Centennial Ballroom<br />

Introduction of David Gappa<br />

the Plenary Session <strong>Child</strong> Exploitation, Cyber, and Intellectual Property<br />

Issues Coordinator<br />

Executive Office for U.S. Attorneys<br />

Plenary Speakers Operation Minotaur: A Collaborative Success<br />

Inspector Brian Bone<br />

United States Postal Inspection Service<br />

Assistant United States Attorney Anne Gannon<br />

U.S. Attorney’s Office,<br />

Central District of California, Santa Ana Office<br />

Special Agent Kelly Kottas<br />

Immigration and Customs <strong>Enforcement</strong>,<br />

<strong>Home</strong>land Security Investigations<br />

Investigator Wade Walsvick<br />

Orange County Sheriff’s Department<br />

22 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Opening Ceremony & Plenary Session Biographies<br />

James Cole<br />

Deputy Attorney General of the United States<br />

James Cole was sworn in as the Deputy Attorney General on Monday, January 3, 2011. Mr. Cole first joined the<br />

Department in 1979 as part of Attorney General’s Honors Program and served for 13 years - first as a trial attorney<br />

in the Criminal Division, and later as the Deputy Chief of the Division’s Public Integrity Section, the office that<br />

handles investigation and prosecution of corruption cases against officials, and employees at all levels of government.<br />

At Public Integrity Mr. Cole tried a number of notable cases, including prosecution of a U.S. District Judge, a<br />

member of Congress, and a federal prosecutor.<br />

He entered private practice in 1992 and was a partner at Bryan Cave LLP from 1995 to 2010, specializing in white<br />

collar defense. He served as a court-appointed independent monitor to a large insurance company to establish and<br />

oversee corporate compliance programs and ensure it adhered to laws and regulations. He also counseled businesses<br />

on securities, regulatory, and criminal law issues.<br />

While in private practice in 1995, Mr. Cole was tapped to serve as Special Counsel to the U.S. House of Representatives<br />

Committee on Standards of Official Conduct. In that role, he led an investigation into allegations that former House<br />

Speaker Newt Gingrich had improperly used tax-exempt money for partisan purposes and misled the Committee in<br />

its inquiry. His investigation led to a bipartisan resolution that was approved by an overwhelming majority of the full<br />

House, and resulted in a formal reprimand of Speaker Gingrich and a requirement that he pay penalties.<br />

Mr. Cole has been a member of the adjunct faculty at Georgetown University <strong>Law</strong> Center, teaching courses on public<br />

corruption law and legal ethics, and has lectured at Harvard University’s Kennedy School of Government. He is a<br />

former chair of the American Bar Association (ABA) White Collar Crime Committee and served as the Chair Elect<br />

of the ABA Criminal Justice Section. He received his B.A. from the University of Colorado and his J.D. from the<br />

University of California-Hastings.<br />

PARTNERS IN PROTECTING CHILDREN 23


Opening Ceremony & Plenary Session Biographies<br />

Sally Quillian Yates<br />

United States Attorney<br />

Northern District of Georgia<br />

Sally Quillian Yates was nominated by President Obama to serve as United States Attorney for the Northern District<br />

of Georgia. Confirmed by the Senate on March 10, 2010, she is the first woman to serve as United States Attorney<br />

in the Northern District of Georgia. As the chief federal law enforcement official for the district, she oversees the<br />

prosecution of all federal crimes and the litigation of civil matters in which the government has an interest in a district<br />

encompassing over 6 million residents. She supervises a staff of approximately 95 lawyers and 80 support personnel.<br />

In May, 2010, Attorney General Holder appointed Ms. Yates to serve on the Attorney General’s Advisory Committee.<br />

Created in 1973, the Committee represents the voice of the U.S. Attorneys and provides advice and counsel to the<br />

Attorney General on policy, management and operational issues impacting the Department of Justice.<br />

Ms. Yates has spent most of her professional career in public service and has 22 years of prosecutorial experience in<br />

the U. S. Attorney’s office. Prior to her appointment as U. S. Attorney, Ms. Yates served as the First Assistant United<br />

States Attorney for approximately seven years, and from 1994 to 2002, she was the Chief of the Fraud and Public<br />

Corruption Section of the office where she supervised the prosecution of all of the office’s white collar cases. Ms.<br />

Yates is an experienced trial lawyer and has prosecuted a wide variety of complex matters, specializing in public<br />

corruption cases. She was also the lead prosecutor in the Atlanta prosecution of Olympic bomber Eric Rudolph.<br />

Ms. Yates is a Fellow in the American College of Trial <strong>Law</strong>yers.<br />

Prior to joining the United States Attorney’s Office, Ms. Yates practiced with King & Spalding in commercial litigation.<br />

She graduated magna cum laude from the University of Georgia School of <strong>Law</strong> in 1986.<br />

24 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Opening Ceremony & Plenary Session Biographies<br />

Melodee Hanes<br />

Acting Administrator<br />

Office of Juvenile Justice and Delinquency Prevention<br />

Melodee Hanes is the Acting Administrator in the Office of Juvenile Justice and Delinquency Prevention (OJJDP).<br />

Ms. Hanes previously served as Acting Deputy Administrator for Policy from June 2009, when she was appointed to<br />

the position by President Barack Obama, to January <strong>2012</strong>.<br />

Ms. Hanes’ 30-year career in public service and law includes work as a deputy county attorney in the Yellowstone<br />

County (MT) Attorney’s Office, prosecuting child abuse, sexual assault, and homicide cases. She also served as an<br />

assistant county attorney in the Polk County (IA) Attorney’s Office, prosecuting major felony crimes. Ms. Hanes<br />

prosecuted the first child endangerment case in Polk County under Iowa Code Chapter 726 and handled more than<br />

100 child abuse prosecutions during her tenure. In addition, she developed and coordinated the Polk County <strong>Child</strong><br />

Abuse Trauma Team and <strong>Child</strong> Death Review Team.<br />

Ms. Hanes taught child abuse law and forensic medicine and law at Drake University <strong>Law</strong> School. She has lectured<br />

extensively and published in these areas of expertise. She also served on the faculty of the <strong>National</strong> District Attorneys<br />

Association’s <strong>National</strong> Advocacy Center in Columbia, SC, and the <strong>Child</strong> Protection <strong>Training</strong> Academy in Des Moines,<br />

IA.<br />

In 1991, then-State Senator Elaine Szymoniak (D–IA) appointed Ms. Hanes as chairperson of Iowa’s Special Infant<br />

Mortality Task Force, which led to the creation of the Infant Mortality Prevention Project through the state’s<br />

Department of Public Health. The project provided services and resources to the community with the objective of<br />

reducing the high rate of infant mortality in Polk County.<br />

Before joining the Justice Department in 2009, Ms. Hanes served as state director and counsel in the office of U.S.<br />

Senator Max Baucus (D–MT).<br />

Ms. Hanes earned a bachelor’s degree in women’s studies from the University of Utah and a law degree from the<br />

Drake University <strong>Law</strong> School.<br />

PARTNERS IN PROTECTING CHILDREN 25


Opening Ceremony & Plenary Session Biographies<br />

Steven R. Chabinsky<br />

Deputy Assistant Director<br />

Federal Bureau of Investigation<br />

Mr. Chabinsky serves as Deputy Assistant Director within the FBI’s Cyber Division. The Cyber Division centrally<br />

manages a number of programs, to include all FBI investigative and intelligence efforts focused on apprehending<br />

and prosecuting online child predators, combating the global production, distribution, and possession of child<br />

pornography, and identifying, rescuing, and assisting the victims of these crimes.<br />

Prior to his current position, Mr. Chabinsky served as Chief of the FBI’s Cyber Intelligence Section, where he<br />

organized and led the FBI’s analysis and reporting on cyber threat issues.<br />

26 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Opening Ceremony & Plenary Session Biographies<br />

Mark D. Clookie<br />

Director<br />

Naval Criminal Investigative Service<br />

Mark D. Clookie became the fourth civilian Director of the Naval Criminal Investigative Service (NCIS) on February<br />

14, 2010, having been appointed by the Honorable Ray Mabus, Secretary of the Navy.<br />

As NCIS Director, Mr. Clookie leads the agency as it investigates and defeats terrorist, foreign intelligence, and<br />

criminal threats to the United States Marine Corps and Navy wherever they operate: ashore, afloat, or in cyberspace.<br />

Mr. Clookie’s areas of special emphasis include strengthening human, analytic, and technological capabilities,<br />

developing and maintaining strong partnerships and liaison with law enforcement, security services, and intelligence<br />

agencies worldwide, and providing agile, adaptive, and responsive support to the Department of the Navy’s enhanced<br />

security posture and global engagements.<br />

Prior to his selection as Director, Mr. Clookie served as the Executive Assistant D rector for Combating Terrorism<br />

with duties overseeing worldwide offensive and defensive operations to detect, deter and disrupt terrorist activities<br />

directed at Department of the Navy personnel (Sailors, Marines, civilians and families), installations, and weapons<br />

systems.<br />

A career NCIS Special Agent (SA), Mr. Clookie began serving the Department of the Navy in March 1982 at the<br />

Resident Agency (RA) in Newport, RI. In June of 1987, SA Clookie began a series of tours in Washington, DC:<br />

Headquarters Desk Officer, representative to the Office of the Naval Inspector General, and Assistant Special Agent<br />

in Charge of the Washington Fraud Unit.<br />

From July 1993 until December 1995, SA Clookie was the Resident Agent in Charge of the NCIS RA in Bahrain.<br />

After this tour, he assumed duties as the Assistant Special Agent in Charge of the NCIS Northeast Field Office until<br />

June 1998.<br />

PARTNERS IN PROTECTING CHILDREN 27


Opening Ceremony & Plenary Session Biographies<br />

Teresa Thome<br />

Deputy Chief Inspector of the Eastern Field<br />

Operations in the U. S. Postal Inspection Service<br />

Teresa Thome is currently the Deputy Chief Inspector of the Eastern Field Operations in the U. S. Postal Inspection<br />

Service (USPIS). Deputy Chief Thome’s responsibilities include oversight of over 1,200 employees and she also<br />

serves on her agency’s Executive Committee. Her personnel enforce over 200 federal laws covering investigations of<br />

crimes that adversely affect or entail criminal misuse of the U.S. Mail or postal system.<br />

Deputy Chief Thome was first assigned as Postal Inspector to the Los Angeles Division where she worked narcotics,<br />

security, and mail fraud investigations. Deputy Chief Thome has served as Assistant Inspector in Charge of the<br />

New York Division and Inspector in Charge of the Philadelphia Division. She has received several awards including<br />

the U.S. Trustee’s “Director’s Award” for Public Service. Deputy Chief Thome is a member of several professional<br />

organizations and currently serves on the Advisory Council for the Research Center on the Prevention of Financial<br />

Fraud<br />

28 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Opening Ceremony & Plenary Session Biographies<br />

Leigh Winchell<br />

Assistant Director, Investigative Programs<br />

Immigration and Customs <strong>Enforcement</strong>,<br />

<strong>Home</strong>land Security Investigations<br />

Mr. Winchell began his law enforcement career in 1984 as a Deputy Sheriff in Richland County, South<br />

Carolina. In 1987, he was hired by the U.S. Customs Service as a criminal investigator and assigned to Key<br />

West, Florida. Mr. Winchell was promoted to Special Agent in 1988 and reassigned to Grand Rapids, Michigan.<br />

In 1997, Mr. Winchell was again promoted, to Group Supervisor, and transferred to Nogales, Arizona. He transferred<br />

to U.S. Customs Service Headquarters in Washington D.C. in late 1999 and became an Operations Manager with<br />

direct oversight of several field offices. Mr. Winchell subsequently became Director, Special Operations Division<br />

in 2000 where he held principal responsibility for leading a large group of agents from the U.S. Customs Service,<br />

the Drug <strong>Enforcement</strong> Administration, the Federal Bureau of Investigation, and the Internal Revenue Service.<br />

In 2002 to <strong>2012</strong>, Mr. Winchell served as the Special Agent in Charge (SAC) for the Legacy U.S. Customs Service and<br />

subsequently the U.S. Immigration and Customs <strong>Enforcement</strong> (ICE), <strong>Home</strong>land Security Investigations (HSI). Mr.<br />

Winchell is currently assigned to HSI headquarters serving as the Assistant Director of Investigative Programs.<br />

PARTNERS IN PROTECTING CHILDREN 29


Opening Ceremony & Plenary Session Biographies<br />

Vernon Keenan<br />

Director<br />

Georgia Bureau of Investigation<br />

Vernon Keenan entered law enforcement in 1972 as a uniformed police officer at the DeKalb County, Georgia Police<br />

Department. In 1973, he became a GBI Special Agent assigned to northwest Georgia. During his career in the<br />

GBI, he has been promoted to every sworn rank in the agency. He was appointed GBI Director in January 2003 by<br />

Governor Sonny Perdue and reappointed in January 2011 by Governor Nathan Deal.<br />

As GBI Director, Vernon Keenan is responsible for managing a law enforcement agency of 822 employees with a<br />

budget of $74.6 million. The GBI is the state investigative agency for Georgia. It is comprised of three divisions: the<br />

Georgia Crime Information Center, the Investigative Division and the State Crime Laboratory.<br />

Vernon Keenan has participated in professional programs in Spain, Israel, China, Germany, Turkey, Mexico, the<br />

United Kingdom, and the Republic of Georgia. He serves on several professional working groups at the national<br />

level and is a law enforcement lecturer on various public safety issues.<br />

Vernon M. Keenan graduated from Valdosta State College in 1972 with a Bachelor of Science Degree. He has a<br />

Masters Degree in Public Administration from Columbus State University. Vernon Keenan is a graduate of the FBI<br />

<strong>National</strong> Academy and the Command College of the Georgia Association of Chiefs of Police.<br />

30 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


<strong>Child</strong> Sex Tourism<br />

In 2002, Michael James Dodd was convicted for sexual contact with more<br />

than a dozen children in a school he was working for in Saipan. In 2005 he<br />

was released after making a solemn commitment to his parole board to<br />

never sexually contact children again. In 2008 he traveled to Cambodia and<br />

reoffended with no regard for his victims or his commitment to the parole<br />

board.<br />

Learn more about Case Study: <strong>Child</strong> Sex Tourism<br />

Check your schedule for the day and time<br />

this Lab-Based <strong>Training</strong> will be offered.<br />

PARTNERS IN PROTECTING CHILDREN 31


32 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Daily Activities - Schedule at a Glance<br />

MONDAY TUESDAY WEDNESDAY<br />

7:00 am - 8:30am<br />

Pre-Event Registration<br />

<strong>On</strong>ly Grand Hall<br />

8:30 am – 12:00 pm<br />

Pre-Event <strong>Training</strong><br />

Various - see Workshop<br />

Schedules<br />

12:00 pm – 1:30 pm<br />

Lunch, on your own*<br />

1:30 pm - 5:00 pm<br />

Pre-Event <strong>Training</strong><br />

Various - see Workshop<br />

Schedules<br />

3:00 pm – 7:00 pm<br />

Registration<br />

Grand Hall<br />

*Daily lunch<br />

options:<br />

There are lots of<br />

good restaurants<br />

nearby - View Local<br />

Restaurants in this<br />

program on page 12.<br />

6:30 am - 5:30 pm<br />

Registration<br />

Grand Hall<br />

8:00 am – 8:45 am<br />

Welcome Ceremony<br />

Centennial Ballroom<br />

8:45 am – 9:00 am<br />

Proceed to fi rst session<br />

9:00 am – 10:30 am<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

10:30 am – 11:00 am<br />

Morning Break<br />

11:00 am – 12:30 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

12:30 pm – 2:00 pm<br />

Lunch, on your own*<br />

2:00 pm - 3:30 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

3:30 pm – 4:00 pm<br />

Afternoon Break<br />

4:00 pm - 5:30 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

7:30 am - 5:00 pm<br />

Registration<br />

Grand Hall<br />

8:30 am – 10:00 am<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

10:00 am – 10:30 am<br />

Morning Break<br />

10:30 am – 12:00 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

12:00 pm – 1:30 pm<br />

Lunch, on your own*<br />

1:30 pm - 3:00 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

3:00 pm – 3:30 pm<br />

Afternoon Break<br />

3:30 pm - 5:00 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

THURSDAY<br />

7:30 am - 5:00 pm<br />

Registration<br />

Grand Hall<br />

8:30 am – 10:00 am<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

10:00 am – 10:30 am<br />

Morning Break<br />

10:30 am – 12:00 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

12:00 pm – 1:30 pm<br />

Lunch, on your own*<br />

1:30 pm - 3:00 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

3:00 pm – 3:30 pm<br />

Afternoon Break<br />

3:30 pm - 5:00 pm<br />

Lab and Lecture Sessions<br />

Various - see Workshop<br />

Schedules<br />

PARTNERS IN PROTECTING CHILDREN 31


32 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


The Great Unraveling:<br />

An Oregon based child pornography production ring<br />

This case study examines what investigators initially thought was a “routine”<br />

child pornography search warrant and turned out to be anything but that.<br />

Before the investigation was complete, agents arrested four custodial parents<br />

from three separate families, identified five minor victims, including a<br />

bedridden handicapped child, and disabled an internet based child<br />

pornography trading ring. The presenters will examine the issues encountered<br />

with suspects who were a “typical” middle-class suburban married couple<br />

engaged in the production of child sexual abuse images. This case study<br />

highlights the challenges of the investigation when both spouses are the<br />

abusers, tracing images back to their origin and the pitfalls associated with the<br />

prosecution of all of the involved individuals.<br />

Learn more about The Great Unraveling:<br />

An Oregon Based <strong>Child</strong> Pornography Production Ring<br />

Check your schedule for the day and time<br />

this Lab-Based <strong>Training</strong> will be offered.<br />

PARTNERS IN PROTECTING CHILDREN 33


34 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Lab-based <strong>Training</strong> Workshops<br />

Please Note: <strong>On</strong>ly members of law enforcement are allowed to attend courses identifi ed as <strong>Law</strong><br />

<strong>Enforcement</strong> Sensitive (LES) due to the nature of the content presented<br />

Lab Name<br />

Advanced GigaTribe<br />

Advanced Yahoo! Messenger<br />

Automating Craigslist Investigations<br />

Basic Cell Tower Log Analysis<br />

C4All - Categorization of Images/Movies<br />

Cellular Phone Investigations and Field Tools<br />

Computer Forensics for Prosecutors<br />

Conducting GigaTribe Investigations<br />

Conducting Proactive IRC Investigations<br />

CPS 2 Update<br />

Evidence in Microsoft Windows Registry<br />

Facebook Investigation<br />

Field Previews using PALADIN<br />

Field Search (Introduction)<br />

First Responder--Cell Phone<br />

Forensic Artifacts in P2P Investigations<br />

Forensic Scan 2<br />

Google and Firefox as Investigative Tools<br />

Hand Held GPS Interrogation<br />

iDevice Analysis<br />

ImageScan<br />

Introduction to Apple Computers<br />

Introduction to Field Triage<br />

Introduction to mIRC Investigations<br />

Lab Name<br />

Introduction to Social Networking Sites<br />

Investigations Using RoundUp eMule<br />

Investigative USB Apps<br />

Managing Sex Offenders through Monitoring<br />

Microsoft Windows Live Internet Investigations<br />

NW3C’s TUX4N6 Preview/Triage Tool<br />

osTriage: <strong>On</strong>-Scene Preview Tool<br />

Point and Click Linux Forensics<br />

Roundup Ares<br />

Roundup Update 1.5.X<br />

Searching Computers in the Field<br />

Use of Open-source Tools for WiFi investigations<br />

Using Chat Aggregators in Investigations<br />

Using Google in Your Investigations (Advanced)<br />

Using Google in Your Investigations (Basic)<br />

Using Virtual Machines in an Investigative Capacity<br />

Windows Event Logging<br />

Windows Volume Shadow Copy<br />

Wireless Network Investigations<br />

PARTNERS IN PROTECTING CHILDREN 33


Lab-based <strong>Training</strong> Workshops<br />

Advanced GigaTribe<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Jeff Rich & Eric Zimmerman<br />

This lab-based training will cover advanced tools to<br />

make investigating GigaTribe easier. This class assumes<br />

familiarity with GigaTribe.<br />

Advanced Yahoo! Messenger<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Steve Blackwell & Tony Leonard<br />

This lab-based training will cover both new and lesser<br />

known Yahoo! Messenger features that can play a part<br />

in undercover chat investigations, such as archiving<br />

issues, aliases, video calls, and web-based Yahoo! chat.<br />

Students will also explore the new Conversation<br />

History feature included in YM 11, and examine the<br />

changes it brings to conducting investigations on<br />

Yahoo! Messenger. Students should be familiar with<br />

basic Yahoo! Messenger functions and have at least one<br />

Yahoo! screen name prior to attending this lab.<br />

Automating Craigslist Investigations<br />

180 minutes<br />

Wayne Nichols & Joseph Versace<br />

This course is intended for investigators who wish to<br />

learn a new program that will assist in automating much<br />

of the work that goes into a Craigslist investigation.<br />

The program allows an investigator to enter search<br />

terms for Craigslist categories and automatically<br />

returns postings with those search terms. It then acts<br />

as a case management tool to monitor and report<br />

the communication between the investigator and<br />

the suspect. There is also a proactive element to the<br />

program to assist the investigator who posts ads on<br />

Craigslist.<br />

Basic Cell Tower Log Analysis<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Mark Bowser & Tyler Wotring<br />

Students attending this class will be provided with an<br />

introduction to the analysis of cell tower logs and call<br />

detail records obtained from cell phone providers. The<br />

latest version of NW3C’s PerpHound Tool (3.1) will<br />

be utilized in the analysis and distributed to students.<br />

This course will consist of lectures and numerous<br />

hands-on practical exercises with pre and post testing.<br />

C4All - Categorization of Images/Movies<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Trevor Fairchild & Doug Lockhart<br />

This course will instruct investigators/forensic<br />

persons on the use of C4All, a program created by<br />

Trevor Fairchild of the <strong>On</strong>tario Provincial Police,<br />

E-Crime Section, in 2004. C4All is a program freely<br />

distributed to law enforcement that can drastically<br />

reduce the effort of viewing and categorizing images<br />

and movies in a child pornography investigation.<br />

Cellular Phone Investigations and<br />

Field Tools<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive: Yes<br />

180 minutes<br />

Timothy Lott & Lauren Wagner<br />

This workshop is designed for beginners and will<br />

introduce students to cellular devices and discuss<br />

the many aspects that cellular devices have on<br />

investigations. Seizure and examination of devices<br />

will also be discussed as well as an overview of field<br />

tools used for data extraction. Students will complete<br />

a hands-on exercise using CelleBrite as a field tools to<br />

extract data from cellular devices.<br />

34 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Lab-based <strong>Training</strong> Workshops<br />

Computer Forensics for Prosecutors<br />

180 minutes<br />

Justin Fitzsimmons & Christopher Kelly<br />

This hands-on computer lab will allow prosecutors to<br />

use a computer forensic program to conduct an actual<br />

examination. After being given basic instructions on<br />

how the forensics lab works, the participants will be<br />

given a series of tasks and forensic artifacts to try and<br />

recover. At the end of this course participants will have<br />

a better understanding of the forensic process.<br />

Conducting GigaTribe Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Jeff Rich & Eric Zimmerman<br />

This lab-based training will provide an overview of<br />

the operation of the GigaTribe network. It will also<br />

explain advanced tools to investigate GigaTribe cases.<br />

Conducting Proactive Internet Relay Chat<br />

Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Jim Valley<br />

In this lab-based training, students will learn how to<br />

properly conduct IRC investigations. Students will<br />

also learn how to integrate other chat media and email<br />

into IRC chat investigations to identify the suspect<br />

quickly and successfully. This lab is focused on new IRC<br />

investigators or investigators who need a refresher.<br />

Computer Protection System 2 Update<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Mitchell Nixon & William Wiltse<br />

Designed for currently licensed and experienced peerto-peer<br />

investigators, this course will showcase the<br />

newest functionality built-in to the <strong>Child</strong> Protection<br />

System (CPS). Beyond its updated interface, the<br />

new CPS features include real-time analytics such as<br />

automatic job launching (based on region), email/<br />

SMS notification of suspect’s online status, and the<br />

long awaited GUID tracking ability. This lab is for<br />

demonstration only. A current CPS license is not<br />

required.<br />

Evidence In Microsoft Windows Registry<br />

180 minutes<br />

Greg Bembridge<br />

The Microsoft Windows registry files are a goldmine of<br />

information for forensic examiners. This lab provides<br />

participants with the necessary skill set to conduct a<br />

basic forensic examination on the Windows 7 operating<br />

system registry files. Students will determine the<br />

computer name and assigned IP address, review user<br />

accounts to determine who the most frequent users<br />

were and which user account deleted particular files<br />

of interest, identify which external storage devices<br />

had been connected by which computer user account,<br />

inspect windows firewall rule exceptions and review<br />

the basic principles of registry backup files, and identify<br />

by SSID and MAC address, which wireless networks a<br />

user had connected to, and when.<br />

Facebook Investigation<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Mike Duffey<br />

This block of instruction is designed for students<br />

who are new to using Facebook. Students will be<br />

given a hands-on learning experience, and will cover<br />

the following topics: how to sign up for Facebook,<br />

photo tagging and un-tagging, uploading photos, how<br />

to uniquely identify individual’s profiles, using Fan<br />

pages, and searching for Groups. An additional focus<br />

will be spent on examining the user security settings<br />

and account profile settings, which effects how others<br />

view your profile. Having a Facebook profile is not a<br />

requirement.<br />

PARTNERS IN PROTECTING CHILDREN 35


Lab-based <strong>Training</strong> Workshops<br />

Field Previews feat. PALADIN<br />

90 minutes<br />

Steve Whalen<br />

This course provides instruction and hands-on<br />

experience for previewing digital evidence in the field<br />

in a forensically sound manner, without altering data,<br />

using PALADIN forensic. Students will learn how to<br />

easily search any computer to identify and document<br />

potential illicit files.<br />

Field Search (Introduction)<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Jim Tanner<br />

Hands-on lab-based training which instructs and<br />

certifies End Users on Field Search Software, available<br />

free to law enforcement and governmental agents.<br />

Field Search is a Windows-based live-box tool used<br />

for “Knock and Talk”, consent searches, and postconviction<br />

monitoring of computer use. With more<br />

than 10,000 users world-wide, it is a well recognized<br />

investigation and triage tool. Participants in this<br />

training will receive full working copies of Field Search<br />

v 4.0 (either ½ day or full day class) and be certified as<br />

Users (full day class only).<br />

First Responder--Cell Phone<br />

180 minutes<br />

Tom Eskridge<br />

Designed for the investigator/officer investigating<br />

cases where cellular devices are involved. Students will<br />

explore what types/forms of evidence can be recovered<br />

from cellular devices to inform investigations, as well<br />

as how to prepare for seizure of devices and the correct<br />

protocols involved in the collection of these devices.<br />

We will also collect data from cellular devices with<br />

software tools, in a sound manner, giving actionable<br />

intelligence to investigators in minutes. Multiple<br />

vendor software options will be available, along with<br />

numerous cell phones for “ripping” during the lab.<br />

Students who have never before “ripped” a phone are<br />

encouraged to attend.<br />

Forensic Artifacts in P2P Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Brian Arnett & Shannon Geaney<br />

This class is intended to provide a very practical<br />

guide to identifying artifacts of Peer-to-Peer Client<br />

installations. With the decline of LimeWire, several<br />

less frequently used clients are becoming more<br />

popular. Many of these store important artifacts such<br />

as GUID, Installation Dates, Favorite Search Terms,<br />

Download and Sharing Directories differently. Our<br />

intent is to present and provide a guide of default<br />

settings and locations where these artifacts can be<br />

recovered.<br />

Forensic Scan 2<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Mitchell Nixon & William Wiltse<br />

This lab-based training introduces the next generation<br />

of the field triage tool, Forensic Scan. This class will<br />

provide investigators with free software designed to<br />

quickly examine suspect hard drives for contraband.<br />

The tool will find previously identified child sexual<br />

abuse material by hash value and will then allow<br />

the investigator to review other material based on<br />

the likelihood of finding locally produced movies<br />

and images of child sexual abuse. The software uses<br />

new innovations including flesh detection, pattern<br />

recognition and proximity reference to quickly reveal<br />

images likely to allow the rescue of a local child victim.<br />

Google and Firefox as Investigative Tools<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Elizabeth Tow & Lauren Wagner<br />

This computer lab will teach students how to effectively<br />

use Google and Mozilla Firefox as investigative tools.<br />

Students will complete hands-on exercises using<br />

Google Advanced Operators as well as Firefox addons.<br />

36 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Lab-based <strong>Training</strong> Workshops<br />

Hand Held GPS Interrogation<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Mark Bowser & Norman Gibson & Tyler Wotring<br />

This class will provide students with an introduction<br />

to imaging GPS devices. It will also cover the analysis<br />

and mapping of data.<br />

iDevice Analysis<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Kurt Petro<br />

This lab-based training will introduce students to the<br />

acquisition and analysis of MAC iDevices.<br />

ImageScan<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Daniel Hobbs<br />

Image Scan is a component system developed by the<br />

FBI CART Unix Program for field investigators to<br />

accurately view a variety of graphics’ formats on a<br />

subject’s computer. Image Scan uses a customized<br />

Linux boot CD/thumb drive combination that allows<br />

investigators in the field to access the graphics’ files<br />

on a subject’s computer while making absolutely no<br />

changes to any files. As used for consent searches,<br />

this system maintains the forensic integrity of the<br />

computer viewed for subsequent forensic examination<br />

in a lab environment. Students will receive lecture,<br />

hands on instruction and a copy of the software.<br />

Introduction to Apple Computers<br />

90 minutes<br />

Mike Duffey<br />

This lab-based training will introduce students to the<br />

world of Apple computers. This class is designed for<br />

individuals who have never used an Apple computer<br />

before and want to become familiar with the different<br />

applications.<br />

Introduction to Field Triage<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Christopher Armstrong & Timothy Lott<br />

This lab-based training will address the collection<br />

of “Volatile Data”, data that <strong>Law</strong> <strong>Enforcement</strong> has<br />

historically overlooked or ignored. Students will be<br />

provided with free software resources they can use to<br />

collect and view the Volatile Data or Random Access<br />

Memory from a running computer.<br />

Introduction to My Internet Relay Chat<br />

(MIRC) Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Christopher Armstrong & Timothy Lott<br />

This lab-based training teaches the new investigator<br />

the basics of Internet Relay Chat (IRC), focusing on<br />

the software set up to install and capture potential<br />

evidence. Students will be taught how to set up and<br />

implement the chat program mRIC.<br />

Introduction to Social Networking Sites<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Elizabeth Tow & Lauren Wagner<br />

This workshop is designed for beginners, and will<br />

provide students with an overview of social networking<br />

websites and how these websites can be useful to<br />

investigations. Students will learn how to set up an<br />

investigative social networking account to search for<br />

information. They will also learn how to effectively<br />

search social networking websites (predominately<br />

Facebook, MySpace, and Twitter) using Google<br />

Advanced Operators. This workshop will also cover<br />

techniques on capturing profiles for evidentiary<br />

purposes and well as mapping tools for friend networks<br />

in both MySpace and Facebook.<br />

PARTNERS IN PROTECTING CHILDREN 37


Lab-based <strong>Training</strong> Workshops<br />

Investigations Using RoundUp eMule<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Michael Hill & Brian Lynn & D. Matthew Powell<br />

RoundUp eMule is a software tool developed by the<br />

University of Massachusetts to locate and identify<br />

people distributing CP using the eDonkey/eMule<br />

file sharing network. RoundUp eMule has been<br />

successfully used by law enforcement agents to capture<br />

people sharing CP. This lab-based training teaches<br />

investigators how to use the tool to identify and<br />

apprehend people sharing CP. The RoundUp eMule<br />

lecture is not a prerequisite.<br />

Investigative USB Apps<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Lauren Wagner & Elizabeth Tow<br />

This computer lab-based class will teach students<br />

how to download, install and use portable apps as<br />

an investigative tool. Firefox and related add-ons,<br />

LightScreen, and other programs will be covered.<br />

Managing Sex Offenders through<br />

Monitoring<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Sharon Girling & Teresa Hughes<br />

New technologies can play an important role in the<br />

management and control of sex offenders and their<br />

actions online. <strong>On</strong>e of the most effective methods is to<br />

monitor the home computer of each offender for any<br />

inappropriate behavior. Securus is a monitoring system<br />

that identifies any text used by an offender that might<br />

indicate a child protection issue or cause for concern.<br />

Evidence of every incident is captured as a screenshot,<br />

showing exactly what took place and alerting risk<br />

management staff to the situation. Following a review<br />

of the evidence, appropriate intervention can take<br />

place. This is an opportunity to learn how the system<br />

works and discuss its impact.<br />

Microsoft Windows Live Internet<br />

Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Chris Ard<br />

Hotmail and Messenger are two of the free online,<br />

desktop, and mobile applications and services offered<br />

by Microsoft and used by millions of people every day to<br />

communicate and share information. This course takes<br />

a tour of Hotmail, Messenger, Xbox Live, SkyDrive,<br />

and other “Live” branded services and explores how<br />

to conduct an online and forensics investigation. This<br />

course also discusses the evidence provided to <strong>Law</strong><br />

<strong>Enforcement</strong> in response to legal process served to<br />

Microsoft.<br />

NW3C’s TUX4N6 Preview/Triage Tool<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Mark Bowser & Nicholas Newman<br />

This lab-based training program provides an<br />

introduction to the NW3C TUX4N6 preview/triage<br />

tool. Course consists of lectures and numerous handson<br />

practical exercises. The course will have a pre and<br />

post testing.<br />

osTriage: A Next Generation, <strong>On</strong>-Scene<br />

Preview Tool<br />

180 minutes<br />

Jeff Rich & Eric Zimmerman<br />

This lab-based training will provide instruction<br />

on osTriage, why it was written, how to use it, and<br />

what it can do for you. In short, osTriage will quickly<br />

find, extract, and display key information from a<br />

computer which will enable to you get a better first<br />

interview, conduct a better search, and more. Some of<br />

the information extracted includes operating system<br />

details, registry details, USB device history, browser<br />

history for all major browsers, search engine search<br />

terms, cloud storage applications, encryption, P2P and<br />

other applications, and passwords. osTriage displays<br />

thumbnails of images and videos and categorizes<br />

38 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Lab-based <strong>Training</strong> Workshops<br />

images/videos against a list of over 500,000 SHAs of<br />

interest and 300+ keywords. Any contraband can be<br />

copied off the target computer with a few clicks.<br />

Point and Click Linux Forensics<br />

90 minutes<br />

Andrew Rosen<br />

Attendees will receive a Linux forensics boot<br />

disk capable of previewing, imaging and analyzing<br />

Windows, Macintosh and Linux systems. Using the<br />

tools and knowledge presented, attendees will be able<br />

to document, search, recover deleted files, image,<br />

restore and analyze computer systems, storage devices<br />

and more. No previous experience with Linux is<br />

necessary.<br />

Roundup Ares<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

360 minutes<br />

Robert Erdely & David Peifer & Joseph Versace<br />

This lab-based training course is for experienced<br />

Peer-to-Peer Investigators. Students will learn a new<br />

investigative tool which will assist with identifying and<br />

investigating persons sharing child pornography on the<br />

Ares P2P network.<br />

Roundup Update 1.5.X<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Marc Liberatore & Michael Hill & David Peifer &<br />

D. Matthew Powell<br />

<strong>ICAC</strong>COPS offers unprecedented opportunities for<br />

proactive investigations into targets trading child<br />

pornography files via Peer-to-Peer (P2P) file sharing<br />

networks. <strong>ICAC</strong>COPS also offers deconfliction<br />

tools, which facilitate information sharing among<br />

law enforcement agencies. This block will offer a<br />

statistical comparison within the suite of Roundup<br />

tools Gnutella, ARES and eMule file sharing networks.<br />

Searching Computers in the Field<br />

180 minutes<br />

Matt McFadden & Ashley Stockdale<br />

Some people use computers to perpetrate unspeakable<br />

acts against society’s most innocent. When these acts<br />

take place, it is critical that front line investigators have<br />

the ability to quickly identify how and when a computer<br />

might have been involved in the crime. During this lab<br />

you will learn a procedure for searching a computer<br />

to uncover evidence while maintaining the integrity<br />

of the data. Specific scenarios will be discussed, such<br />

as searching live and turned off computers, defining<br />

situation specific search criteria, and creating reports<br />

in the field.<br />

Use of Open-source Tools for WiFi<br />

Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Ty Brevard & Vincent Costagliola<br />

Students will be instructed on the use of open-source<br />

pen-testing tools from the Backtrack 5 platform. We<br />

will explore how to conduct Wi-Fi based investigations<br />

to expose the use of peer-to-peer devices for<br />

downloading illicit content from a victim’s open Wi-<br />

Fi. This class will demonstrate the tools necessary<br />

to detect, identify and geolocate rogue devices that<br />

are being used by nefarious element. These tools are<br />

publicly available and generally are free to end-users.<br />

Using Chat Aggregators in Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Steve Blackwell & Tony Leonard<br />

This class will examine the use of Trillian, Digsby,<br />

and Meebo for undercover chat. Multi-platform chat<br />

clients allow the investigator to chat across a variety<br />

of systems from one simple interface. This lab will<br />

introduce these clients, and allow students to explore<br />

the available functions and limitations of each, as well as<br />

provide students with practice chatting with different<br />

online identities in a multi-platform environment.<br />

This lab will also cover Facebook Messenger a popular<br />

chat aggregator for smart phones.<br />

PARTNERS IN PROTECTING CHILDREN 39


Lab-based <strong>Training</strong> Workshops<br />

Using Google in Your Investigations<br />

(Advanced)<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Nirupa Calvin & Cory Louie & Peipei Pollmann &<br />

Miles Rutkowski<br />

This advanced-level workshop will give investigators<br />

insight and valuable tips to conduct online investigations.<br />

We will review investigative techniques and tools<br />

using many of Google’s services (Advanced Search,<br />

Google+, AdWords, AdSense, Wallet, Analytics, Voice<br />

and others) that can be used to supplement your<br />

current investigative process. Get ready to learn by<br />

doing! Students should have attended the basic Google<br />

lab-based training or be familiar with Google services.<br />

Using Google in Your Investigations (Basic)<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Nirupa Calvin & Cory Louie & Peipei Pollmann &<br />

Miles Rutkowski<br />

This basic-level workshop will give investigators insight<br />

and valuable tips to conduct online investigations. We<br />

will review investigative techniques and tools using<br />

many of Google’s services (Search, Image Search,<br />

Google Account, Gmail, YouTube, Picasa, Blogger,<br />

Groups, and others) that can be used to supplement<br />

your current investigative process. Get ready to learn<br />

by doing!<br />

Using Virtual Machines in an Investigative<br />

Capacity<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Christopher Armstrong & Timothy Lott<br />

This Virtualization class will introduce the concept of<br />

the virtual computer environment for testing, research<br />

and undercover investigations. Students will set up and<br />

install VMWare Server, an open source virtualization<br />

software package developed by VMWare. The students<br />

will then be walked through the process of setting<br />

up a virtual environment, before opening an existing<br />

instance of Windows XP for testing. In addition<br />

students will learn how to boot a “suspect’s machine”<br />

using .e01 or .dd files.<br />

Windows Event Logging<br />

90 minutes<br />

Chris Ard<br />

The Windows Event Viewer has long been one of<br />

the best tools for troubleshooting technical issues<br />

on Microsoft Windows computers. The Event log<br />

can also provide a wealth of information to forensic<br />

investigators. This session will discuss the types of<br />

information found in the Event Viewer logs, as well as<br />

how to utilize the Event viewer logs and the Windows<br />

Powershell to create timelines of events.<br />

Windows Volume Shadow Copy<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Chris Ard<br />

Windows Vista introduced the ability to recover<br />

previous versions of existing (or deleted) files.<br />

Windows 7 has enhanced this capability. For any<br />

forensic investigator, knowledge of how to leverage<br />

Volume Shadow Copies will be the most useful tool in<br />

the Windows tool chest, since it allows you to recover<br />

files that would otherwise be unrecoverable including<br />

index.dat files, browser history files, old copies of the<br />

registry, thumbnail cache files, etc.<br />

Wireless Network Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Christopher Armstrong & Elizabeth Tow<br />

This class will introduce wireless technology and<br />

teach the attendee how to gather pre- search warrant<br />

evidence and evidence from the network at the scene.<br />

A portion of this topic will be a hands-on lab, setting<br />

up wireless routers, along with collecting evidence in<br />

the form of data from the router.<br />

40 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


CVIP Lab<br />

CVIP -<br />

<strong>Child</strong> Victim Identifi cation Lab<br />

Room: Hanover A<br />

NCMEC is proud to offer all registered participants<br />

at this year’s <strong>Training</strong> a glimpse into the <strong>Child</strong> Victim<br />

Identification Lab – a powerful law enforcement tool<br />

designed to locate child victims.<br />

Many children have been rescued from further<br />

sexual abuse because a clue in the background of<br />

sexually abusive images led to their location. Within<br />

this interactive lab, computers will be available for<br />

participants to access background identifiers and audio<br />

clues in hopes that these items may be recognizable to<br />

Lab participants. Accompanying each sanitized picture<br />

will be a real-time message thread where participants<br />

can post their comments. You may have the piece of<br />

the puzzle that could lead to the rescue of a child<br />

victim. Also at the Lab, learn about NCMEC’s <strong>Law</strong><br />

<strong>Enforcement</strong> Services Portal and see a demonstration<br />

of how you can compare hash values to the NCMEC<br />

system from your office.<br />

NOTE: All registered training attendees are invited to<br />

participate in this Lab; however, due to the sensitivity<br />

of this issue, please make sure to wear your badge and<br />

bring proof of identity to gain entry.<br />

CVIP Lab Hours:<br />

Monday: 12:00 pm – 5:00 pm<br />

Tuesday: 9:00 am – 5:30 pm<br />

Wednesday: 9:00 am – 5:30 pm<br />

Thursday: 9:00 am – 5:30 pm<br />

PARTNERS IN PROTECTING CHILDREN 41


42 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


U.S. v. Michael and Rebecca Strausbaugh<br />

Contact Offender & Image Producer<br />

In February 2011, Canadian authorities provided a lead to U.S. federal authorities<br />

about a child pornographic image sent to a Canadian from an address within the<br />

United States. The information led to the Gettysburg, Pennsylvania area home and<br />

business of twice prior convicted child sex offender Michael Strausbaugh. Upon<br />

executing a search warrant on the residence and business, on scene previews of a<br />

camera and computers revealed that both Michael Strausbaugh and his wife<br />

Rebecca (appointed / trained by the courts to act as Michael’s supervisor ) were<br />

involved in the sexual abuse and production of child pornography using her infant<br />

niece. This case study will examine what went right, technology issues, and the<br />

lessons learned.<br />

Learn more about U.S. v. Michael and Rebecca Strausbaugh -Contact Offender & Image Producer<br />

Check your schedule for the day and time<br />

this Lab-Based <strong>Training</strong> will be offered.<br />

PARTNERS IN PROTECTING CHILDREN 43


44 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

Lecture Name<br />

Adobe Photoshop for Image<br />

Analysis and Victim Identification<br />

Adolescents & the Internet:<br />

Sexting, Cyberbullying, <strong>On</strong>line<br />

Strangers and Offline Victimization<br />

Applying the <strong>Law</strong> to Location<br />

Tracking and Other Emerging<br />

Technologies<br />

Artemis Software: Image Analysis –<br />

Scanning for Contraband<br />

Behavioral Analysis in Sexual<br />

Exploitation of <strong>Child</strong>ren<br />

Investigations<br />

Benefits of Behavior Analysis in<br />

Investigating Internet Sexual<br />

Crimes against <strong>Child</strong>ren<br />

Beyond the Image: Victim<br />

Identification and Adobe Photoshop<br />

Case Study: <strong>Child</strong> Exploitation –<br />

Wisconsin & California Teamwork<br />

Case Study: <strong>Child</strong> Sex Tourism -<br />

Michael James Dodd<br />

Case Study: <strong>Child</strong> Sex Tourism<br />

Operations<br />

Case Study: Operation Delego<br />

Case Study: Operation Laminar -<br />

Facebook Groups<br />

Case Study: The Great Unraveling<br />

- An Oregon-based <strong>Child</strong><br />

Pornography Production Ring<br />

Lecture Name Lecture Name<br />

Case Study: U.S. v. Michael and<br />

Rebecca Strausbaugh – Contact<br />

Offender & Image Producer<br />

Changing the Culture of <strong>On</strong>line<br />

Abuse<br />

<strong>Child</strong> Molesters: In Their Own Words<br />

<strong>Child</strong> Pornography, <strong>Child</strong> Erotica and<br />

<strong>Child</strong> Modeling: Birds of the same<br />

feather?<br />

<strong>Child</strong> Victims of Prostitution:<br />

Interviewing and Building Rapport<br />

Circumventing Encryption Through<br />

Debuggers at Software Breakpoints<br />

Civil Liability in Internet Facilitated<br />

Crimes Against <strong>Child</strong>ren Cases<br />

Collaborative Partnerships Between<br />

<strong>ICAC</strong> Teams and <strong>Child</strong>ren’s Advocacy<br />

Centers<br />

Computer Forensics for Prosecutors<br />

- Basic<br />

Countering Anonymization:<br />

Investigative, Forensic, and Legal<br />

Issues<br />

Craigslist Undercover Investigations<br />

Cross-Examination of Defense Mental<br />

Health Experts<br />

Cross-Examining Defense Computer<br />

Forensics Experts in <strong>Child</strong> Sexual<br />

Exploitation Cases<br />

Detecting Deception - Discourse<br />

Analysis<br />

Direct Examination of a Computer<br />

Forensic Examiner<br />

Effective Technology Safety<br />

Messaging<br />

Emerging Fourth Amendment<br />

Issues: Reasonable and Probable<br />

Facebook for <strong>Law</strong> <strong>Enforcement</strong> &<br />

Prosecutors<br />

Federal Privacy Statutes & Evidence<br />

in the Cloud: What State and Local<br />

Prosecutors and <strong>Law</strong> <strong>Enforcement</strong><br />

Need to Know<br />

Finding Services for <strong>Child</strong> Victims<br />

of Prostitution<br />

Flying Squirrel Wireless Detection<br />

Application<br />

Forensic Analysis of Apple’s iOS<br />

Devices<br />

Forensic Analysis of Internet<br />

Browsers’ Remnant Data<br />

Forensic Interviewing: The Five<br />

“W’s” You Should Know<br />

Fourth Amendment Principles<br />

Related to Obtaining Digital<br />

Information from Third Parties<br />

Fully-Focused Computer Forensics<br />

for <strong>Child</strong> Rescue<br />

PARTNERS IN PROTECTING CHILDREN 43


Classroom-Based <strong>Training</strong> Sessions<br />

Lecture Name Lecture Name Lecture Name<br />

Google’s Efforts to Combat <strong>Child</strong><br />

Exploitation<br />

<strong>ICAC</strong>COPS Website for Investigators<br />

Integrating the Interview and<br />

Polygraph Exam as an Approach to<br />

<strong>Child</strong> Pornography Offenders<br />

International Parental Kidnapping<br />

Internet Investigations and<br />

Anonymity: A Practical Overview<br />

INTERPOL Resources for US <strong>Law</strong><br />

<strong>Enforcement</strong><br />

Interviewing Suspects in Peer-to-<br />

Peer Investigations<br />

Investigating and Prosecuting<br />

International <strong>Child</strong> Exploitation<br />

Investigating and Prosecuting <strong>On</strong>line<br />

Enticement Cases<br />

Investigating and Prosecuting the<br />

Extraterritorial <strong>Child</strong> Sex Offender<br />

Investigating and Understanding<br />

eDonkey Peer-to-Peer Systems<br />

Investigating the Cloud on Portal<br />

Devices<br />

Investigating The <strong>On</strong>ion Router<br />

(TOR) Network<br />

IRC: Basic Overview, Tips & Building<br />

an Undercover Persona<br />

Microsoft COFEE 2.1<br />

Microsoft Victim Identification<br />

Technology Overview &<br />

Interactive Discussion<br />

Microsoft’s Global Criminal<br />

Compliance <strong>On</strong>line Services<br />

Microsoft’s Xbox, Xbox 360 and<br />

Xbox LIVE Investigations<br />

Military Resources in <strong>Child</strong><br />

Exploitation Cases<br />

Mock Trial: Direct and Cross-<br />

Examination of Computer<br />

Forensics Experts<br />

Mock Trial: Peer-to-Peer<br />

Case - Direct Examination of a<br />

Computer Forensic Examiner<br />

Native American Tribal Lands:<br />

Investigating and Prosecuting<br />

<strong>Child</strong> Abuse Cases<br />

Native American Tribal Lands:<br />

Lessons & Observations on<br />

Investigative Challenges for <strong>ICAC</strong><br />

Cases<br />

Obtaining Evidence from<br />

Electronic Service Providers<br />

<strong>On</strong>line <strong>Child</strong> Pornography<br />

Groups: Emerging Trends<br />

Opening Statements and Closing<br />

Arguments<br />

Presenting Evidence to Victims:<br />

The Prepare and Predict Method<br />

Prosecuting the <strong>Child</strong> Sexual<br />

Abuse Case Effectively<br />

Prosecuting the Prostitution of<br />

<strong>Child</strong>ren<br />

Prostitution of <strong>Child</strong>ren Cases:<br />

Successful Investigative Strategies<br />

Protecting the <strong>Child</strong> Victim<br />

During the Court Process<br />

Psychological Profile of a<br />

Collector of <strong>Child</strong> Pornography<br />

RAM Acquisition and Analysis<br />

Regulating Disclosure and<br />

Discovery of <strong>Child</strong> Pornography<br />

in Criminal Procedure<br />

Responding to <strong>Child</strong> Exploitation<br />

Cases Using Effective and<br />

Progressive Victim-orientated<br />

Strategies<br />

The RoundUp eMule Tool<br />

Self-production of <strong>Child</strong><br />

Pornography by Minors<br />

on MyYearbook.com: The<br />

Pennsylvania <strong>ICAC</strong> Response<br />

Sentencing Strategies for <strong>Law</strong><br />

<strong>Enforcement</strong> & Prosecutors:<br />

<strong>2012</strong><br />

Sex Offender Registration and<br />

Notification Act: Investigation<br />

and Prosecution<br />

44 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

Lecture Name Lecture Name<br />

Sex Offender Registration and<br />

Notification Act (SORNA) - Update<br />

Sextortion<br />

Sexual Assault Investigations:<br />

Coordinating First Responders,<br />

Investigations, and Social Services -<br />

The Nitty-gritty<br />

SHIFT Wellness: Staying Healthy<br />

While Exposed to <strong>Child</strong> Sexual<br />

Abuse Material<br />

Social Networking Patterns of<br />

Adolescents, Young Adults, and<br />

Offenders<br />

Suicide Among Sex Offenders Who<br />

Victimized <strong>Child</strong>ren<br />

Technology-facilitated <strong>Child</strong><br />

Abductors & their Motivations - ‘It’s<br />

Not Just About Sex’<br />

Technology-facilitated Crimes<br />

Against <strong>Child</strong>ren on Native<br />

American Tribal Lands<br />

Tips for Testifying in <strong>ICAC</strong> Cases:<br />

A Short-course to Survive the<br />

Testimony Process<br />

Triage-Responder: DHS Science &<br />

Technology Initiative for State &<br />

Local <strong>Law</strong> <strong>Enforcement</strong><br />

Undercover Social Networking<br />

Strategies for <strong>Law</strong> <strong>Enforcement</strong><br />

Understanding and Working with<br />

the Adolescent Compliant Victim<br />

Understanding Sex Offenders<br />

Understanding the BitTorrent File<br />

Sharing Network<br />

United States Postal Inspection<br />

Service: The Value of the Mail in<br />

<strong>Child</strong> Exploitation Investigations<br />

Victim Rights and Restitution<br />

Victimization <strong>On</strong>line: Patterns<br />

and Trends – A Snapshot<br />

Victims of Commercial Sexual<br />

Exploitation & Domestic Minor<br />

Sex Trafficking<br />

Webcams and the Commercial<br />

Sexual Exploitation of <strong>Child</strong>ren<br />

Abroad<br />

Who Are The <strong>Child</strong>ren? NCMEC’s<br />

<strong>Child</strong> Victim Identification<br />

Program<br />

Windows 8 Preview<br />

Wireless Network Investigation<br />

Working with Cooperating<br />

Defendants in <strong>Child</strong> Pornography<br />

Cases<br />

Working With Victims in CSE<br />

Cases & Using Evidence During<br />

Forensic Interviews<br />

Working with Yahoo! on <strong>Law</strong><br />

<strong>Enforcement</strong> Investigations<br />

PARTNERS IN PROTECTING CHILDREN 45


Classroom-Based <strong>Training</strong> Sessions<br />

Adobe Photoshop for Image Analysis and<br />

Victim Identification<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

John Penn<br />

This session discusses and demonstrates the analysis of<br />

child sexual exploitation images and videos with Adobe<br />

Photoshop for <strong>Law</strong> <strong>Enforcement</strong>. Learn how to see<br />

beyond the victim and identify the clues that can focus<br />

the investigation and lead to the rescue of child victims.<br />

See state-of-the-art techniques using Adobe Photoshop<br />

to enhance images and dig deeper into the materials.<br />

See how Adobe Photoshop can be used to conduct<br />

the analysis and enhancement of images and videos.<br />

This presentation will include a sneak peak at new and<br />

upcoming technologies, and a discussion of industry<br />

issues related to internet crimes against children.<br />

Adolescents & the Internet: Sexting,<br />

Cyberbullying, <strong>On</strong>line Strangers and<br />

Offline Victimization<br />

90 minutes<br />

Elizabeth B. Dowdell<br />

This session focuses on the findings from a research study<br />

of middle and high school students who participated<br />

in online communications with unidentified people.<br />

Students who chatted online with strangers showed<br />

higher rates of risky Internet behaviors including sexting,<br />

electronic aggression, and offline meetings. In the high<br />

school group, students were more likely to report that<br />

something sexual happened at their offline meeting, with<br />

girls indicating higher rates of sexual harassment. Case<br />

studies will be used to demonstrate how the profile of<br />

victimization is changing with the use of avatars and web<br />

cams.<br />

Applying the <strong>Law</strong> to Location Tracking and<br />

Other Emerging Technologies<br />

90 minutes<br />

Don Mason<br />

This session provides prosecutors and investigators with<br />

information about the emerging and often conflicting<br />

views and case laws regarding the law enforcement use<br />

of technologies that enable location tracking of wireless<br />

devices. It includes review of a wide range of convergent<br />

technologies but will especially focus on how courts are<br />

responding to the uses of “bumper beepers” and GPS<br />

devices as a means of obtaining cell site registration and<br />

location data.<br />

Artemis Software: Image Analysis – Scanning<br />

for Contraband<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Richard Robertson<br />

Artemis is a free software tool for use by law enforcement<br />

to automatically scan computers for child pornographic<br />

images and videos. Developed by researchers at Oak<br />

Ridge <strong>National</strong> Laboratory (ORNL) and the University<br />

of North Carolina Wilmington, Artemis combines image<br />

analysis technology, hash matching, and keyword searches<br />

to automatically identify images and videos that are likely<br />

to contain child pornography. The tool is designed to<br />

drastically reduce the amount of time an officer must<br />

spend searching a suspect’s hard drive for illegal material.<br />

Behavioral Analysis in Sexual Exploitation of<br />

<strong>Child</strong>ren Investigations<br />

90 minutes<br />

Tia Hoffer & Terri Patterson<br />

Understanding the background and personalities of<br />

sex offenders is vital to effective investigations and<br />

prosecution. A behavioral perspective of sex offenders<br />

who victimize children will be presented through case<br />

examples, investigative strategies and research to assist<br />

law enforcement in understanding and investigating<br />

the offenders. The presentation will focus on factors<br />

related to the motivation of offenders through the<br />

lens of a criminal, behavioral, cognitive and emotional<br />

perspective. Important concepts that will be explored<br />

include the cognitive distortions, victim access techniques<br />

46 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

and grooming behaviors that are commonly observed in<br />

this offender population. The presentation will provide<br />

investigative data, research, and case examples to<br />

illuminate these concepts.<br />

Benefits of Behavior Analysis in Investigating<br />

Internet Sexual Crimes against <strong>Child</strong>ren<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Guy Collings & Joe Sullivan<br />

This session explores the application of behavioral analysis<br />

to law enforcement investigations of sexual crimes against<br />

children using technology and the Internet. The primary<br />

focus is to demonstrate that by better understanding<br />

offender behavior investigators can substantially improve<br />

their investigative strategy. For attendees who have already<br />

completed the five-day Mentor Interview Technique<br />

<strong>Training</strong> and/or the two-day Sex Offender’s Use of<br />

Technology and the Internet Courses this session will add<br />

another chapter to your evolving case-study training.<br />

Beyond the Image: Victim Identification and<br />

Adobe Photoshop<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

180 minutes<br />

Jim Cole & John Penn<br />

John Penn II of Adobe Photoshop and Jim Cole of<br />

<strong>Home</strong>land Security Investigations will discuss and<br />

demonstrate image and video analysis as it relates to<br />

the identification of child victims in sexual exploitation<br />

material.<br />

Case Study: <strong>Child</strong> Exploitation – Wisconsin &<br />

California Teamwork<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Dean Berres & Melinda Gobron & Crystal Sedevie<br />

In June 2009, an unsuspecting 13-year-old victim in<br />

Wisconsin began chatting with someone identifying<br />

herself as “Beth.” Beth subsequently introduced the victim<br />

to her cousin “Brian.” Brian’s conversations became sexual<br />

and the Wisconsin victim sent nude pictures of herself<br />

to Brian. Brian threatened to expose the pictures unless<br />

the victim sent additional images. The victim reported<br />

the incident and a Wisconsin investigator assumed the<br />

victims on-line identity and began communicating<br />

with Brian. Brian stopped chatting with the Wisconsin<br />

undercover officer after Brian was contacted by a<br />

Sacramento <strong>ICAC</strong> detective who was following-up on<br />

an unrelated Cybertip complaint. <strong>On</strong>ce the enforcement<br />

efforts were coordinated, Sacramento <strong>ICAC</strong> completed<br />

the case resulting in an arrest for child pornography<br />

with admissions to the Wisconsin crimes. Suspect is now<br />

serving 11 years in prison.<br />

Case Study: <strong>Child</strong> Sex Tourism - Michael<br />

James Dodd<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Randall Devine<br />

This session reviews the case of Michael James Dodd.<br />

Dodd was an American teacher working in Cambodia<br />

when he molested a young girl there. He had previously<br />

worked in the Northern Mariana Islands where he was<br />

convicted of inappropriately touching elementary school<br />

girls. Dodd was described by the sentencing judge as a<br />

cunning, clever and manipulative predator. In December<br />

2010 Dodd was sentenced to nine years in prison.<br />

Case Study: <strong>Child</strong> Sex Tourism Operations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

James Holdman<br />

This session reviews several child sex-tourism<br />

investigations conducted by DHS/ICE agents.<br />

Investigative techniques include the use of undercover<br />

email accounts, undercover social networks, and<br />

undercover meetings. The investigations occurred in<br />

Mexico, Guatemala and Costa Rica. Common problems<br />

and solutions encountered while working the cases will<br />

be discussed.<br />

PARTNERS IN PROTECTING CHILDREN 47


Classroom-Based <strong>Training</strong> Sessions<br />

Case Study: Operation Delego<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Neil O’Callaghan<br />

Operation Delego involved the investigation of an<br />

Internet forum/bulletin board dedicated to the<br />

production, distribution and advertisement of hardcore<br />

child pornography. The presentation will include case<br />

overview, investigative techniques, international law and<br />

prosecution issues.<br />

Case Study: Operation Laminar -<br />

Facebook Groups<br />

90 minutes<br />

Chris Watkins<br />

This session reviews the investigation of individuals and<br />

groups who used Facebook to share and disseminate<br />

materials involving the visual depiction of minors engaged<br />

in sexually explicit conduct. The presentation includes<br />

case overview, investigative techniques, international<br />

concerns and prosecutorial issues.<br />

Case Study: The Great Unraveling - An Oregonbased<br />

<strong>Child</strong> Pornography Production Ring<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Josh Findley<br />

This case study examines what investigators initially<br />

thought was a “routine” child pornography search<br />

warrant and turned out to be far more complicated.<br />

Agents arrested four custodial parents from three<br />

separate families, identified five minor victims, including<br />

a bedridden handicapped child, and disabled an Internetbased<br />

child pornography trading ring. Presenters will<br />

discuss the issues encountered with suspects who were a<br />

“typical” middle-class suburban married couple engaged<br />

in the production of contraband images. The presentation<br />

examines the challenges of the investigation where both<br />

spouses were abusers, tracing images back to their origin<br />

and the issues associated with the prosecutions of all of<br />

the involved individuals.<br />

Case Study: U.S. v. Michael and Rebecca<br />

Strausbaugh – Contact Offender & Image<br />

Producer<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Daryl Bloom & Michael Corricelli<br />

In February 2011, Canadian authorities provided a lead to<br />

U.S. federal authorities about a child pornographic image<br />

sent to a Canadian from an address within the U.S. The<br />

information led to the Pennsylvania home and business<br />

of twice-convicted sex offender Michael Strausbaugh. A<br />

search warrant and on-scene previews of a camera and<br />

computers revealed that both Strausbaugh and his wife<br />

Rebecca (appointed & trained by the courts to act as<br />

Michael’s supervisor) were involved in the sexual abuse<br />

and production of child pornography involving Rebecca’s<br />

infant niece. The lecture will examine what went right,<br />

technology issues, and lessons learned.<br />

Changing the Culture of <strong>On</strong>line Abuse<br />

90 minutes<br />

Joe Laramie<br />

Cyberbullying has been highly publicized and this<br />

workshop will discuss how the social culture of youth<br />

can influence online behavior. This session will facilitate<br />

discussion of how to create positive change to youth<br />

behavior and include best practices for addressing<br />

electronic abuse in schools and communities.<br />

<strong>Child</strong> Molesters: In Their Own Words<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Michael Yoder<br />

This session includes a brief explanation of cognitive<br />

distortions and a discussion of the Sex Offender<br />

Continuum. Case studies will include video and audio<br />

recordings of actual offenders from various situations<br />

including; video-taped interviews, Internet chat, a<br />

suicide note, a death-row interview, an erotica collection<br />

and a research interview. Tips and recommendations for<br />

interviewing sex offenders will be provided.<br />

48 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

<strong>Child</strong> Pornography, <strong>Child</strong> Erotica and <strong>Child</strong><br />

Modeling: Birds of the same feather?<br />

90 minutes<br />

Paul Almanza & Brian Bone<br />

This session will review child modeling and child erotica<br />

as gateways to undercover child sexual abuse. The lecture<br />

will review several cases where investigation beyond child<br />

modeling and child erotica revealed large-scale sexual<br />

abuse and the customers of these image producers.<br />

<strong>Child</strong> Victims of Prostitution: Interviewing<br />

and Building Rapport<br />

90 minutes<br />

Catherine S Connell & Derek Stigerts<br />

This session will address the most fundamental and<br />

critical component of investigations involving child<br />

victims of prostitution; the victim interview. It is at<br />

this initial stage of the investigation that information is<br />

gathered that will lead to a successful prosecution of<br />

the suspect. Participants will learn the specific phases<br />

of the interview process and barriers that result in the<br />

victim’s reluctance to implicate and testify against her<br />

abuser “pimp”. The lecture will provide participants with<br />

tools and skills necessary to identify and overcome the<br />

challenges of these difficult interviews when building a<br />

relationship with the victim.<br />

Circumventing Encryption Through<br />

Debuggers at Software Breakpoints<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Johnathan Bridbord & Brian Bone<br />

The session discusses and demonstrates techniques using<br />

high-speed 1394 interfaces, debugger testing and remote<br />

shell network commands to circumvent encryption at<br />

software breakpoint locations.<br />

Civil Liability in Internet Facilitated Crimes<br />

Against <strong>Child</strong>ren Cases<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Charles Gillingham<br />

Investigators in child exploitation cases are subject to<br />

civil liability. Often unknowingly, investigators violate<br />

federal law and subject themselves to lawsuit. This session<br />

will help investigators to understand how to insulate<br />

themselves from civil liability and maintain immunity<br />

from liability.<br />

Collaborative Partnerships Between <strong>ICAC</strong><br />

Teams and <strong>Child</strong>ren’s Advocacy Centers<br />

90 minutes<br />

Matthew Gray & Elaine Stolte<br />

Participants will learn about the valuable resources that<br />

<strong>Child</strong>ren’s Advocacy Centers can provide <strong>ICAC</strong> teams<br />

in their work both during the investigative process and<br />

with ongoing victim support following the investigation.<br />

Attendees will learn about model partnerships between<br />

<strong>ICAC</strong> teams and local <strong>Child</strong>ren’s Advocacy Centers and<br />

positive outcomes involving improved investigation and<br />

prosecution. Effective strategies for replicating model<br />

programs will be discussed along with multidisciplinary<br />

team management strategies to give child abuse response<br />

team members the tools to strengthen their own groups<br />

while building a culture of value and respect for each<br />

other in their respective fields.<br />

Computer Forensics for Prosecutors - Basic<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Christopher Kelly<br />

This lecture will discuss the basics of computer<br />

forensics and will begin by taking prosecutors through<br />

different types of technology. Presenters will describe<br />

the computer forensic process and the different types<br />

of evidence that can be recovered through a computer<br />

forensic examination. Prosecutors will leave with a solid<br />

PARTNERS IN PROTECTING CHILDREN 49


Classroom-Based <strong>Training</strong> Sessions<br />

understanding of what to expect from their computer<br />

forensics examiners and what questions to ask to get the<br />

most for their case.<br />

Countering Anonymization: Investigative,<br />

Forensic, and Legal Issues<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Keith Becker & James Fottrell<br />

Offenders are becoming more sophisticated about hiding<br />

their identities online. This presentation will discuss<br />

legal, forensic and investigative techniques to identify and<br />

apprehend offenders who use anonymization techniques<br />

such as proxy servers to hide their identities.<br />

Craigslist Undercover Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Wayne Nichols<br />

Craigslist continues to be a target-rich for investigators<br />

seeking offenders. Since 2009, the Henderson, Nevada<br />

Police Department has made over 40 undercover,<br />

proactive enticement arrests involving Craigslist. This<br />

session will provide information about where to find<br />

suspicious ads on Craigslist. Investigative techniques will<br />

include methods and tools for logging communications,<br />

undercover regressed photos, and incorporating Google<br />

Voice. Additionally, a new ‘Craigslist Software Tool’ will<br />

be introduced that will offered free to law enforcement<br />

personnel.<br />

Cross-Examination of Defense Mental Health<br />

Experts<br />

90 minutes<br />

Frank Williams<br />

This session focuses on the psychopathology and<br />

personality traits of pedophiles and the various evaluation<br />

mechanisms used to demonstrate the risks they pose. The<br />

presentation will assist attendees in understanding various<br />

studies and risk assessments techniques often relied upon<br />

by defense mental health experts to minimize the risks<br />

associated with Internet sex crime offenders.<br />

Cross-Examining Defense Computer<br />

Forensics Experts in <strong>Child</strong> Sexual<br />

Exploitation Cases<br />

90 minutes<br />

Justin Fitzsimmons<br />

This session focuses on one of the emerging issues<br />

with prosecuting technology-facilitated child sexual<br />

exploitation: overcoming the defense computer forensic<br />

examiner. This session discusses substantive methods<br />

and techniques to prepare for and conduct a crossexamination<br />

of the defense CFE. The presenter uses<br />

examples from defense experts to demonstrate possible<br />

areas to cross-examine.<br />

Detecting Deception - Discourse Analysis<br />

90 minutes<br />

Jim Tanner<br />

This session covers the basics of Discourse Analysis, a<br />

lexical and syntactical approach to analyzing statements.<br />

Attendees will improve their interviewing skills by<br />

learning how to tell when someone is editing something<br />

out of a verbal or written statement and how shifts in<br />

words and grammar can point interviewers to “hot spots”<br />

in a statement that need to be probed. After this session,<br />

attendees will never again listen to a conversation or<br />

interview in the same way.<br />

Direct Examination of a Computer Forensic<br />

Examiner<br />

90 minutes<br />

Justin Fitzsimmons<br />

This session will increase a prosecutor’s understanding<br />

and comfort level with presenting a computer forensic<br />

examiner in court. The presenter will focus on practical<br />

methods for qualifying a computer forensic examiner as<br />

an expert and discuss the importance of the presentation<br />

50 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

of findings at trial. Participants will be given effective<br />

techniques for providing demonstrative exhibits at trial<br />

to explain the forensic process and digital evidence.<br />

Effective Technology Safety Messaging<br />

90 minutes<br />

Joe Laramie<br />

This session is for anyone interested in learning effective<br />

strategies to use when presenting technology safety<br />

to kids, teens and adults. Utilizing the latest research,<br />

the workshop will discuss what has been effective and<br />

what types of messages have failed in changing online<br />

behaviors. Attendees will learn tips and tools for making<br />

quality presentations in their schools and communities.<br />

Emerging Fourth Amendment<br />

Issues: Reasonable and Probable<br />

90 minutes<br />

Johnathan Bridbord & LisaMarie Freitas<br />

This session provides information about technical and<br />

legal issues regarding searching and seizing devices based<br />

on probable cause through undercover activity, proactive<br />

surveillance of open wireless, and mobile devices seized<br />

pursuant to arrest.<br />

Facebook for <strong>Law</strong> <strong>Enforcement</strong> & Prosecutors<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Emily Vacher<br />

This presentation provides prosecutors and investigators<br />

with information regarding the challenges Facebook<br />

encounters while operating the world’s largest social<br />

networking site. Topics such as Facebook’s proactive<br />

investigations and the use of PhotoDNA for child<br />

exploitation cases will be discussed. Information regarding<br />

the submission of legal process and how Facebook can<br />

assist law enforcement in ongoing investigations will also<br />

be covered.<br />

Federal Privacy Statutes & Evidence in the<br />

Cloud: What State and Local Prosecutors and<br />

<strong>Law</strong> <strong>Enforcement</strong> Need to Know<br />

90 minutes<br />

Justin Fitzsimmons<br />

This lecture for prosecutors and law enforcement<br />

investigators discusses the federal statutes that regulate<br />

Internet service providers’ compliance, including how<br />

these statutes regulate evidence in the “cloud”. The<br />

Privacy Protection Act and its implications for state and<br />

local law enforcement agencies will also be discussed.<br />

Finding Services for <strong>Child</strong> Victims of<br />

Prostitution<br />

90 minutes<br />

Amy Alvarado & TC Cassidy<br />

Every day across America, runaway and homeless youth<br />

programs funded by the Family and Youth Services<br />

Bureau encounter victims of sex trafficking. Learn how<br />

these community agencies are addressing the special<br />

needs of trafficked young people and how the Bureau is<br />

working inside and outside the government to build a<br />

network of support services for trafficking victims.<br />

Flying Squirrel Wireless Detection<br />

Application<br />

90 minutes<br />

Brandon Enochs & James Reeves Garnett & Kellen<br />

Harwell & Anne Kong<br />

The Flying Squirrel Wireless Detection Application is a<br />

Government-off-the-Shelf (GOTS) software application<br />

developed by the U.S. Naval Research Laboratory to<br />

provide real-time discovery, analysis, and mapping of<br />

IEEE 802.11a/b/g/n wireless networks. It is funded by<br />

the Department of Defense and the program is managed<br />

by Navy PMW 130 Computer Network Defense. Flying<br />

Squirrel (FS), a strictly standalone application designed<br />

to run on a standard laptop, can detect and segregate<br />

PARTNERS IN PROTECTING CHILDREN 51


Classroom-Based <strong>Training</strong> Sessions<br />

wireless transmitters that are acting as a WLAN client<br />

or Access Point (AP). FS provides a real-time integrated<br />

visualization and mapping capability that allows users to<br />

generate a “Radiation Field (RF) Map” based on the signal<br />

strength information for any selected transmitter.<br />

Forensic Analysis of Apple’s iOS Devices<br />

90 minutes<br />

Don Brister<br />

Apple’s iOS devices (iPhone, iPad and iPod Touch) are very<br />

different from other mobile devices. They have their own<br />

method of imaging and analysis. Information is encrypted<br />

and volatile. It must be properly preserved and collected<br />

to result in successful collection and analysis. This session<br />

discusses collection, preservation, and analysis of the<br />

devices and their stored information. Several areas of<br />

importance will be discussed, showing their information<br />

to demonstrate the steps toward a successful conclusion.<br />

Forensic analysts can learn how to successfully handle the<br />

evidence. Investigators and analysts alike can learn about<br />

the types of information stored on the devices.<br />

Forensic Analysis of Internet Browsers’<br />

Remnant Data<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Bryan Kelly<br />

This session provides an overview of the forensic analysis<br />

process of Internet browser remnant data for Internet<br />

Explorer, FireFox and Chrome browsers.<br />

Forensic Interviewing: The five “W’s” You<br />

Should Know<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Bethany Case & Martha Finnegan & Teresa Huizar<br />

& Ale Levi<br />

This session uses a diverse group of experienced<br />

personnel to provide the following information about<br />

forensic interviewing: Identify who conducts forensic<br />

interviewers in federal and non-federal settings.<br />

Describe what a forensic interview entails and provide<br />

background, models, and a variety of perspectives in the<br />

field. Determine when and under what circumstances<br />

forensic interviews should be used. Identify where to find<br />

a trained and experienced interviewer and the associated<br />

costs. Discuss why forensic interviewing is the preferred<br />

method of interviewing child victims and how this<br />

approach can benefit an investigation.<br />

Fourth Amendment Principles Related to<br />

Obtaining Digital Information from Third<br />

Parties<br />

90 minutes<br />

Thomas Clancy<br />

This session provides investigators and prosecutors with<br />

a discussion of the Fourth Amendment and an analysis<br />

of how courts and policy makers are applying Fourth<br />

Amendment doctrines to acquisitions of digital evidence<br />

from third parties.<br />

Fully-Focused Computer Forensics for <strong>Child</strong><br />

Rescue<br />

90 minutes<br />

Matt McFadden<br />

Computer forensics must be thorough. From the children<br />

we protect and rescue to the offenders we put away in<br />

jail, we must ensure that examinations are complete.<br />

With ever-expanding digital storage and improved<br />

technology, this task becomes increasingly difficult.<br />

Clues may be overlooked if examiners do not know<br />

where or how to effectively look. In child exploitation<br />

cases, examiners cannot overlook vital clues that may<br />

lead to the identification or rescue of a child. This course<br />

covers how to start the forensic analysis, high-yield areas<br />

for evidence, and how to manage the assessment of an<br />

entire hard drive while ensuring a thorough search.<br />

Display charts detailing a forensic analysis process will<br />

be provided and reviewed to reinforce efficient searching<br />

techniques.<br />

52 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

Google’s Efforts to Combat <strong>Child</strong> Exploitation<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Cory Louie & Cathy McGoff & Nirupa Calvin & Miles<br />

Rutkowski<br />

An overview of Google’s efforts to combat child<br />

exploitation including content reporting, product safety,<br />

legal process, data disclosure policies, investigative<br />

processes and investigative tools.<br />

<strong>ICAC</strong>COPS Website for Investigators<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

David Peifer<br />

<strong>ICAC</strong>COPS was created as a cooperative effort between<br />

the Pennsylvania State Police, Pennsylvania <strong>ICAC</strong> and the<br />

Massachusetts <strong>ICAC</strong> to help identify offenders in those<br />

jurisdictions. Initially it was designed to complement<br />

eP2P (FBI Gnutella tool) to help identify offenders on<br />

the Gnutella network sharing child pornography. Because<br />

it was such a useful tool, it was adopted by investigators<br />

around the country and now provides investigative leads,<br />

deconfliction and real time alerts to thousands of users.<br />

It aids task forces to identify the worst offenders in their<br />

jurisdictions on the Gnutella, E-Donkey and Ares p2p file<br />

sharing networks.<br />

Integrating the Interview and Polygraph<br />

Exam as an Approach to <strong>Child</strong> Pornography<br />

Offenders<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Lance Fragomeli & Michael Sullivan<br />

The initial interview of a child pornography suspect is a<br />

critical stage of the investigation. An integrated interview<br />

approach that includes the administration of a polygraph<br />

exam has proven very successful in establishing that the<br />

suspects have engaged in previous contact offenses. This<br />

information has proven to be instrumental in identifying<br />

and locating victims and provides valuable information<br />

at sentencing as to the true nature and character of the<br />

defendants. This lecture will describe the components of<br />

the integrated interview, including the polygraph.<br />

International Parental Kidnapping<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Rob Blake & Darcy Katzin & Dash Wagner<br />

This session addresses the investigation and prosecution<br />

of international parental kidnapping cases including<br />

an overview of federal statutes, investigative tips and<br />

strategies, and discussion by the State Department’s Office<br />

of <strong>Child</strong>ren’s Issues of the role of the Hague convention<br />

and other considerations in bringing IPK cases.<br />

Internet Investigations and Anonymity: A<br />

Practical Overview<br />

90 minutes<br />

Brian Levine & Marc Liberatore<br />

Systems that provide users with varying levels of anonymity<br />

on the Internet have moved from the theoretical to the<br />

practical. With this transition, investigators have started<br />

to see evidence that attackers are using these systems to<br />

cover their tracks. This session will review several systems<br />

for network anonymity, including The <strong>On</strong>ion Router<br />

(TOR) and other methods by which attackers can conceal<br />

their network footprints. Presenters will give a high-level<br />

description of the mechanisms by which these systems<br />

operate, discuss what evidence they hide, and describe<br />

what evidence they may leave in both network traffic and<br />

on hard drives. Presenters will also briefly discuss how<br />

such systems might be investigated by a sufficiently wellresourced<br />

investigator.<br />

INTERPOL Resources for US <strong>Law</strong> <strong>Enforcement</strong><br />

90 minutes<br />

Michelle Ford-Stepney & Catherine Sweeney<br />

This session includes case studies that explore how<br />

INTERPOL, Washington assists U.S. law enforcement<br />

agencies in matters with an international nexus. This<br />

assistance includes locating and arresting sex offenders,<br />

criminals, and fugitives, providing criminal history<br />

PARTNERS IN PROTECTING CHILDREN 53


Classroom-Based <strong>Training</strong> Sessions<br />

information and records information, obtaining evidence,<br />

conducting interviews preparing INTERPOL Notices.<br />

INTERPOL Notices have proven to be very effective in<br />

locating and tracking high-profile subjects of interest to<br />

U.S. law enforcement.<br />

Interviewing Suspects in Peer-to-Peer<br />

Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Dennis Carry<br />

<strong>ICAC</strong> investigations often involve suspects possessing<br />

similar characteristics and behaviors. This session focuses<br />

on interviewing techniques of those involved in peer<br />

to peer cases and other child pornography offenses.<br />

Investigators will be provided with an interviewing<br />

platform they may find useful in these cases which will<br />

allow in-depth discovery of behavior and corroborating<br />

evidence. Armed with knowledge about common suspect<br />

traits, investigators will be prepared to ask relevant<br />

interrogation questions.<br />

Investigating and Prosecuting International<br />

<strong>Child</strong> Exploitation<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Michelle Morgan<br />

This session examines the challenges of investigating<br />

targets who travel overseas to engage in sex with minors,<br />

a crime which has increased in recent years. Presenters<br />

will discuss methods for identifying targets, obtaining and<br />

authenticating evidence located overseas, and ensuring<br />

the participation of foreign witnesses in the U.S. trial.<br />

Investigating and Prosecuting <strong>On</strong>line<br />

Enticement Cases<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Tony Godwin & Lisa Miller & Camille Sparks<br />

This interactive lecture examines the basics of successfully<br />

investigating and prosecuting online enticement cases by<br />

outlining the federal enticement statute and its alternatives<br />

as well as discussing practical “dos and don’ts” through<br />

several case studies. Common defenses to enticement<br />

and traveler charges and strategies for overcoming those<br />

defenses will also be discussed. This session is appropriate<br />

for both state and federal investigators and prosecutors.<br />

Audience participation is encouraged.<br />

Investigating and Prosecuting the<br />

Extraterritorial <strong>Child</strong> Sex Offender<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Steven Grocki<br />

This presentation focuses on the increasing problem of<br />

child exploitation cases that reach beyond U.S. Borders.<br />

The session will examine common scenarios including<br />

child sex tourism, international child pornography<br />

trafficking, and U.S. citizens stationed abroad. Presenters<br />

will discuss the locations where the crimes occur and<br />

explain how these offenders and their crimes touch every<br />

state and locality in the country. Unique investigative and<br />

legal issues that arise in these cases will also be discussed.<br />

Investigating and Understanding eDonkey<br />

Peer-to-Peer Systems<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Kevin West<br />

This session provides attendees with an understanding of<br />

eDonkey peer-to-peer systems and discusses investigative<br />

techniques focused on eDonkey. The hash system and<br />

GUID system in eDonkey mule clients will be examined.<br />

Special issues related to digital forensics for eDonkey,<br />

eMule and Shareaza will be presented.<br />

Investigating the Cloud on Portal Devices<br />

90 minutes<br />

Tom Eskridge<br />

This session will discuss the importance of compiling<br />

the social topology of suspects based on the applications<br />

54 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

installed on their portal devices and cell phones. While<br />

the traditional “dumps” of data including call records,<br />

phone books, and text messages are of interest, it is how<br />

the suspect uses today’s technology to attract, groom<br />

and victimize that will assist in better investigations and<br />

prosecutions.<br />

Investigating The <strong>On</strong>ion Router (TOR)<br />

Network<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

James Kilpatrick<br />

The presentation examines the history and the various<br />

tools and techniques for conducting investigations within<br />

The <strong>On</strong>ion Router (TOR) Network. Topics include the<br />

examination of data, investigative techniques, and the<br />

various obstacles to TOR investigations.<br />

IRC: Basic Overview, Tips & Building an<br />

Undercover Persona<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

James Kilpatrick<br />

This session provides a basic overview of Internet Relay<br />

Chat (IRC) including navigation and the logging function<br />

of the IRC client (mIRC). The presentation includes:<br />

building an IRC undercover persona, introduction to chat<br />

rooms dedicated to the sexual exploitation of children,<br />

tips about chatting, building an investigation, and tips for<br />

court presentation.<br />

Microsoft COFEE 2.1<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Norman Gibson & Tyler Wotring<br />

This session provides an overview of the latest version<br />

of Microsoft COFEE 2.1 with support for XP, Vista, and<br />

Windows 7 systems.<br />

Microsoft Victim Identification Technology<br />

Overview & Interactive Discussion<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Bill Harmon & Hany Farid<br />

This interactive discussion session presents Microsoft’s<br />

PhotoDNA technology and its use in forensics and victim<br />

identification. Microsoft will present case scenarios<br />

that they are working on using the technology and in<br />

turn obtain feedback from participants on ways it can<br />

be impactful and relevant. This session is intended to be<br />

discussion-oriented.<br />

Microsoft’s Global Criminal Compliance<br />

<strong>On</strong>line Services<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Colleen Holt<br />

Participants will learn the process to follow when<br />

requesting customer records related to online services<br />

including @hotmail, @msn, @live, Windows Live Spaces,<br />

Windows Live SkyDrive, and Xbox Live. Presenters will<br />

discuss the records available from Microsoft, how long<br />

they are retained and the processes to follow to obtain<br />

information in life-threatening emergency investigations.<br />

Microsoft’s Xbox, Xbox 360 and Xbox LIVE<br />

Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Chris Ard<br />

The Xbox and Xbox 360 both enjoy large followings by<br />

children and adults. These devices have the potential to<br />

store information that may be pivotal to an investigation<br />

and must be handled in the same way as other digital<br />

evidence. This session will introduce investigators to the<br />

Xbox, Xbox 360 and the Live Service. Presenters will<br />

discuss the unique capabilities of these devices including<br />

VOIP, video conferencing, social networking and others.<br />

The presentation will explore some of the techniques that<br />

PARTNERS IN PROTECTING CHILDREN 55


Classroom-Based <strong>Training</strong> Sessions<br />

must be employed to conduct a successful investigation of<br />

these devices.<br />

Military Resources in <strong>Child</strong> Exploitation<br />

Cases<br />

90 minutes<br />

Eric Trest<br />

This session provides an overview of Military Criminal<br />

Investigative Organizations (MCIO) as they relate to<br />

child exploitation investigations and operations within<br />

the Department of Defense. There will be a discussion<br />

regarding the unique resources and capabilities of the<br />

MCIO community and how their access and global<br />

presence can benefit your organization. Specific examples<br />

of MCIO support will be discussed ranging from accessing<br />

military personnel records, DoD database systems, and<br />

worldwide investigative assistance.<br />

Mock Trial: Direct and Cross-Examination of<br />

Computer Forensics Experts<br />

90 minutes<br />

Justin Fitzsimmons & Christopher Kelly<br />

During this session, forensic investigators will have a<br />

unique opportunity to view a mock direct and crossexamination<br />

under simulated courtroom conditions.<br />

The examiner will be paired with two attorneys who<br />

will conduct the examination during the allotted time.<br />

The participants will review the mock scenario 60 days<br />

in advance of the training so they have an opportunity<br />

to prepare. A courtroom will be arranged for this<br />

session complete with audio-visual equipment for the<br />

presentation. A judge will preside. Attendees will observe<br />

the sessions from the gallery. At the end of each session,<br />

participants will engage in a short debriefing to discuss<br />

the exercise.<br />

Mock Trial: Peer-to-Peer Case - Direct<br />

Examination of a Computer Forensic<br />

Examiner<br />

90 minutes<br />

Justin Fitzsimmons<br />

This session takes participants through a mock trial<br />

direct examination of a computer forensic examiner in<br />

a peer-to-peer investigation scenario. Presenters will use<br />

the peer-to-peer fact pattern as the basis of courtroom<br />

testimony. Through the use of demonstrative exhibits,<br />

the presenters will show participants an approach to<br />

effectively provide forensic evidence in a courtroom.<br />

Participants will be shown examples of explanations for<br />

computer forensics that can be utilized in their own cases<br />

and jurisdictions.<br />

Native American Tribal Lands: Investigating<br />

and Prosecuting <strong>Child</strong> Abuse Cases<br />

90 minutes<br />

Travis Burrows & Marcia Hurd<br />

This joint presentation between an FBI Agent and an<br />

Assistant U.S. Attorney discusses investigating and<br />

prosecuting child abuse cases occurring on Native<br />

American Tribal lands that are also under Federal<br />

jurisdiction. Presenters will offer practical tips including<br />

interview strategies, investigative techniques, working<br />

with health care professionals through an MDT approach,<br />

charging decisions, prosecution and sentencing.<br />

Native American Tribal Lands: Lessons &<br />

Observations on Investigative Challenges for<br />

<strong>ICAC</strong> Cases<br />

90 minutes<br />

Phil Keith & Derek VanLuchene & Jim Walters<br />

During this presentation participants will understand<br />

the challenges facing Internet crimes against children<br />

investigations on Native American Tribal lands.<br />

Participants will examine emerging technology crimes<br />

within tribal communities and the challenges facing tribal<br />

law enforcement in the investigation and prosecution of<br />

56 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

these crimes. This presentation will show participants how<br />

an entire tribal community is impacted and challenged by<br />

trending technology.<br />

Obtaining Evidence from Electronic Service<br />

Providers<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

James Fottrell & Steven Grocki<br />

This session explores the often-neglected and increasingly<br />

difficult issue of obtaining crucial evidence stored by<br />

electronic service providers. Presenters will address<br />

practical considerations when dealing with private<br />

industry, emerging industry trends, and where online<br />

storage (into the cloud) is headed in the not-so-distant<br />

future.<br />

<strong>On</strong>line <strong>Child</strong> Pornography Groups: Emerging<br />

Trends<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

James Fottrell & Steven Grocki<br />

This presentation examines techniques employed by<br />

arguably the most dangerous child pornography offenders.<br />

These offenders, not content to simply download images,<br />

form complex groups to communicate about the sexual<br />

abuse of children, seek out “private home-made” images<br />

depicting abuse and exchange tips on how to evade law<br />

enforcement. The course will examine how these groups<br />

and the technologies they utilize are evolving.<br />

Opening Statements and Closing Arguments<br />

90 minutes<br />

Robert Giles<br />

An effectively crafted opening statement places a<br />

prosecutor in the position of leading the jury to conviction<br />

through the use of theme and theory. Closing argument<br />

allows prosecutors to draw on those themes and theories<br />

in the form of a persuasive argument that will convince<br />

the jury of the defendant’s guilt. This session focuses on<br />

how opening statements and closing arguments can be<br />

effectively used in technology-facilitated crimes against<br />

children to convince a jury that the evidence heard during<br />

trial establishes guilt beyond a reasonable doubt.<br />

Presenting Evidence to Victims: The Prepare<br />

and Predict Method<br />

90 minutes<br />

Ale Levi & Diane Siegel<br />

This session focuses on presenting evidence during<br />

investigative interviews using the Prepare and Predict<br />

Method. This method is non-leading, legally defensible<br />

and used to assist interviewers in obtaining accurate and<br />

detailed statements from victims while reducing trauma.<br />

Presenters will focus on child pornography, photo line ups<br />

and other evidence used in child exploitation cases. Case<br />

study examples and forensic interviewer experiences will<br />

be discussed. Forensic interviewers, law enforcement and<br />

prosecutors will benefit from this presentation.<br />

Prosecuting the <strong>Child</strong> Sexual Abuse Case<br />

Effectively<br />

90 minutes<br />

Kevin Mulcahy & Matthew Roth<br />

Attendees will learn strategies for presenting a case when<br />

it is the word of a child against the word of a defendant.<br />

This lecture will focus on developing the most effective<br />

evidence to support a victim’s allegations of child sexual<br />

abuse--whether it is for state or federal prosecution.<br />

From reaching out to potential witnesses who best know<br />

the child, to developing evidence from all aspects of<br />

the defendant’s life, to leveraging concurrent state and<br />

federal prosecutions, to using polygraph examinations,<br />

this class focuses on the best practices in investigating and<br />

prosecuting child sexual assault cases.<br />

PARTNERS IN PROTECTING CHILDREN 57


Classroom-Based <strong>Training</strong> Sessions<br />

Prosecuting the Prostitution of <strong>Child</strong>ren<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Michelle Morgan<br />

This session explores methods for identifying and locating<br />

victims of child prostitution, developing corroborative<br />

evidence, and best practices for interviewing victims<br />

in order to build an effective case and grand jury<br />

presentation. Presenters will examine the requirements<br />

for and benefits of charging a case federally. Presenters<br />

will also discuss how to maintain participation of the<br />

victim throughout the prosecution and trial, and general<br />

strategies for trial and sentencing.<br />

Prostitution of <strong>Child</strong>ren Cases: Successful<br />

Investigative Strategies<br />

90 minutes<br />

Kyle Reardon & Derek Stigerts & Amber Hawk<br />

This presentation focuses on the investigation and<br />

prosecution of child sex trafficking cases. Several case<br />

studies will be examined to demonstrate investigative<br />

techniques that can be used for the prosecution of pimps<br />

and others who profit from the prostitution of minors.<br />

There will also be a focus on some of the issues that<br />

commonly arise in these cases, including victim issues,<br />

the search and seizure of evidence, and charging decisions.<br />

Protecting the <strong>Child</strong> Victim During the Court<br />

Process<br />

90 minutes<br />

Marcia Hurd<br />

This presentation provides prosecutors with practical<br />

advice about how to protect children during the entire case<br />

from investigation to sentencing. It includes information<br />

about the child’s rights as a victim or witness, handling<br />

defense requests, and presenting the child’s testimony.<br />

Psychological Profile of a Collector of <strong>Child</strong><br />

Pornography<br />

90 minutes<br />

Joe Sullivan<br />

This case study will address one of the more debated<br />

issues related to child pornography: Do those who collect<br />

it engage in contact sexual offenses against children?<br />

Video–taped extracts of research interviews demonstrate<br />

some of the key issues and offer a perspective on the risk<br />

posed by collectors.<br />

RAM Acquisition and Analysis<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Bryan Kelly<br />

The session provides an overview of tools available for<br />

the acquisition Random Access Memory (RAM) on a live<br />

computer and methods for extracting data for analysis.<br />

Regulating Disclosure and Discovery of <strong>Child</strong><br />

Pornography in Criminal Procedure<br />

90 minutes<br />

Don Mason<br />

This session provides prosecutors and investigators an<br />

updated examination of the constitutional, statutory,<br />

and rule-based considerations relating to government<br />

disclosure of, or defense access to, evidence believed to<br />

be “child pornography” as defined by law. The presentation<br />

includes discussion of available options regarding<br />

protective orders and related practical means of limiting<br />

or regulating such disclosures or discovery.<br />

Responding to <strong>Child</strong> Exploitation Cases Using<br />

Effective and Progressive Victim-Orientated<br />

Strategies<br />

90 minutes<br />

Shia Cruciani & Anne Darr & Keely McCarthy &<br />

David Porter & Daniel Steele<br />

This session discusses the strategy and concepts<br />

developed during implementation of the “Enhancing<br />

58 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

<strong>Law</strong> <strong>Enforcement</strong>’s Response to Victims” project. These<br />

proven principles, practices, and strategies along with<br />

examples of best practices are applicable to all sectors of<br />

the community and organization including the response<br />

to child exploitation cases. This can be accomplished with<br />

little or no cost.<br />

The RoundUp eMule Tool<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Robert Erdely & Brian Lynn<br />

RoundUp eMule is a software tool developed by the<br />

University of Massachusetts to locate and identify people<br />

distributing contraband images using the eDonkey/<br />

eMule file-sharing network. RoundUp eMule has been<br />

successfully used by law enforcement agents to apprehend<br />

offenders sharing unlawful images. This lecture presents<br />

an overview of the eDonkey/eMule file sharing network<br />

and specifically; the RoundUp eMule software.<br />

Self-Production of <strong>Child</strong> Pornography<br />

by Minors on MyYearbook.com: The<br />

Pennsylvania <strong>ICAC</strong> Response<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Lisa Carroll & Elizabeth B. Dowdell<br />

This lecture focuses on the dramatic increase of selfproduction<br />

of child pornography by minors, specifically<br />

on MyYearbook.com. Examples of classification,<br />

investigation, and processing of these cases will be<br />

discussed in addition to strategies for intervention with<br />

families, Internet safety education, and multidisciplinary<br />

team outreach. Adolescent case studies will be used to<br />

illustrate techniques in addition to highlighting the role<br />

of <strong>ICAC</strong> with teens and families.<br />

Sentencing Strategies for <strong>Law</strong> <strong>Enforcement</strong> &<br />

Prosecutors: <strong>2012</strong><br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Camille Sparks & Allen Bode<br />

Prosecutors and law enforcement want to ensure that<br />

a defendant receives the appropriate sentence for the<br />

crime. However, defense attorneys routinely file motions<br />

for downward variance in child pornography cases asking<br />

the judge for the statutory minimum. In too many cases<br />

the judge grants this request. This lecture will aid law<br />

enforcement and prosecutors to prepare the best case<br />

possible, including investigation and search issues as well<br />

as effective court presentation and argument before the<br />

court.<br />

Sex Offender Registration and Notification<br />

Act (SORNA) - Update<br />

90 minutes<br />

Michelle Ford-Stepney & Laura Sofi a &<br />

Allison Turkel<br />

The Sex Offender Registration and Notification Act, Title<br />

I of the Adam Walsh Act, was signed in to law on July<br />

27, 2006. The implementation deadline was July 2011.<br />

What is the current state of sex offender registration<br />

and notification in the United States? In this session, the<br />

federal agency that oversees the program will discuss<br />

SORNA including updates on the USMS and Interpol<br />

involvement in tracking sex offenders and other SMART<br />

Office sex-offender-related initiatives.<br />

Sex Offender Registration and Notification<br />

Act: Investigation and Prosecution<br />

90 minutes<br />

Kevin Forder & Marcia Hurd<br />

Presenters from the U.S. Marshals Service and the<br />

U.S. Attorney’s Office will provide investigators and<br />

prosecutors information on the federal Sexual Offender<br />

Registration and Notification Act, and how to successfully<br />

investigate and prosecute SORNA cases.<br />

PARTNERS IN PROTECTING CHILDREN 59


Classroom-Based <strong>Training</strong> Sessions<br />

Sextortion<br />

90 minutes<br />

Keith Becker & Brant Cook<br />

This presentation provides investigators and prosecutors<br />

with practical tips for addressing “sextortion” an<br />

increasingly common form of online sexual exploitation<br />

that involves offenders stalking and extorting minors<br />

into self-producing sexually explicit images and videos.<br />

Investigation and charging strategies will be explored<br />

with reference to two recent high-profile cases.<br />

Sexual Assault Investigations: Coordinating<br />

First Responders, Investigations, and Social<br />

Services - The Nitty-Gritty<br />

90 minutes<br />

Ernesto Gaxiola<br />

This session provides first responders, investigators,<br />

social services, medical personnel, computer forensic<br />

examiners, and victim advocates with practical knowledge<br />

and the whole “Nitty Gritty” regarding everything that<br />

encompasses a sexual assault investigation; including<br />

the use of social media and electronic devices to obtain<br />

evidence. All of these elements need to coexist for a<br />

successful investigation and this presentation shows<br />

examples of all facets of sexual assault investigations that<br />

make these cases complicated, but not impossible.<br />

SHIFT Wellness: Staying Healthy While<br />

Exposed to <strong>Child</strong> Sexual Abuse Material<br />

180 minutes<br />

Jennie Barr & Kristian Carlson & Heather Steele<br />

This three-hour course, team-taught by a mental health<br />

professional and a law enforcement officer, allows<br />

professionals who are exposed to child pornography and<br />

who interact with child sex offenders the opportunity to<br />

learn the causes and symptoms of vicarious trauma that<br />

may occur as a result of their duties. Participants will<br />

learn effective coping strategies to deal with the negative<br />

effects of trauma. Attendees will be given tools to help<br />

facilitate a supportive work environment for themselves,<br />

understand and utilize mental health support and solicit<br />

support for their families and their peers. The course<br />

will benefit law enforcement officers, forensic analysts,<br />

prosecutors and others.<br />

Social Networking Patterns of Adolescents,<br />

Young Adults, and Offenders<br />

90 minutes<br />

Elizabeth B. Dowdell<br />

Research into the usage patterns of social networking<br />

sites by adolescent students, college students, and adult<br />

offenders produced interesting results. Key findings<br />

include: 1) offenders and students frequent similar social<br />

network sites; 2) over two-thirds of the Internet offenders<br />

initiate the topic of sex in their first chat session; 3) over<br />

half of the Internet offenders disguise their identity when<br />

online, 4) a small number of students are being threatened<br />

and assaulted by persons met online, and 6) avatars were<br />

used both by students and offenders.<br />

Suicide Among Sex Offenders Who Victimized<br />

<strong>Child</strong>ren<br />

90 minutes<br />

Tia Hoffer & Joy Shelton<br />

This session explores the issues and widespread impact<br />

surrounding sex offenders who commit suicide after<br />

learning they are under criminal investigation for crimes<br />

against children. Pertinent factors obtained from a sample<br />

of 106 offenders will be presented, including information<br />

regarding offenders’ period of greatest risk for suicide<br />

and officer safety.<br />

Technology-Facilitated <strong>Child</strong> Abductors &<br />

Their Motivations - ‘It’s Not Just About Sex’<br />

90 minutes<br />

Graham Hill<br />

Technology-facilitated abductors are those who use<br />

technology to identify and manipulate children.<br />

Abductions of this kind are increasing but relatively little<br />

is known about the characteristics of the offenders. This<br />

presentation explores motivational factors of offenders<br />

through interview extracts and case study examples.<br />

60 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

This session develops and enhances the attendees’<br />

understanding of this type of criminal behavior.<br />

Technology-Facilitated Crimes Against<br />

<strong>Child</strong>ren on Native American Tribal Lands<br />

90 minutes<br />

Phil Keith & Derek VanLuchene & Jim Walters<br />

This interactive session provides participants with an<br />

understanding of the dangers of technology-facilitated<br />

crimes against children on Tribal Lands including child<br />

exploitation, luring, exposure to adult material, erosion<br />

of cultural connections, and unwanted solicitation. Tribal<br />

participants will have the opportunity to interact with<br />

members of regional Internet Crimes Against <strong>Child</strong>ren<br />

Task Forces and to develop relationships for further<br />

cooperation and coordination of activities.<br />

Tips for Testifying in <strong>ICAC</strong> Cases: A Short-<br />

Course to Survive the Testimony Process<br />

90 minutes<br />

Justin Fitzsimmons<br />

This lecture is for law enforcement officers and<br />

prosecutors seeking suggestions and techniques for<br />

providing effective testimony in technology-facilitated<br />

child sexual exploitation cases. The presenter will provide<br />

illustrations of effective testimony and participants will be<br />

given suggestions for presenting evidence and testimony<br />

during direct and cross-examination.<br />

Triage-Responder: DHS Science & Technology<br />

Initiative for State & Local <strong>Law</strong> <strong>Enforcement</strong><br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Harry Parsonage & Douglas Maughan<br />

Triage-Responder is a new digital forensic triage tool<br />

for investigators and first responders who need to scan<br />

computers to quickly gather important evidence or<br />

intelligence. The tool was designed according to “First<br />

Responder Cyber Field Kit” requirements set by the<br />

United States Department of <strong>Home</strong>land Security. Unlike<br />

other forensic triage tools, Triage-Responder requires<br />

minimal training for non-technical users, minimizes<br />

support from forensic examiners and quickly targets<br />

relevant evidence and in a forensically sound manner.<br />

Undercover Social Networking Strategies for<br />

<strong>Law</strong> <strong>Enforcement</strong><br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Jim Valley<br />

This session provides step-by-step information on how to<br />

set up an undercover account for social networking sites.<br />

Attendees will learn strategies for effectively working<br />

undercover. Students will receive information on how to<br />

document and preserve evidence and how to overcome<br />

road blocks with social networking sites when working<br />

undercover.<br />

Understanding and Working with the<br />

Adolescent Compliant Victim<br />

90 minutes<br />

Allison Turkel<br />

Professionals dealing with traditional child sexual abuse<br />

cases and the general public have pre-conceived notions<br />

of the profile of a victim of child sexual abuse. Teens are<br />

victimized by many types of offenders and victims are<br />

frequently mishandled by the criminal justice system.<br />

This session discusses the unique features of adolescents<br />

making them particularly vulnerable to abuse and how<br />

to deal with compliant victims and investigate offenders.<br />

This training also includes techniques for effectively<br />

interviewing victims.<br />

Understanding Sex Offenders<br />

180 minutes<br />

Jim Tanner<br />

This session focuses on the cognitive set of the intrafamilial<br />

and position-of-trust sex offender. The presentation<br />

will expand and clarify elements of the investigation,<br />

prosecution and effective containment of the offender.<br />

Discussion will include sex offenders’ perceptions,<br />

ideation, grooming strategies and cognitive processes.<br />

PARTNERS IN PROTECTING CHILDREN 61


Classroom-Based <strong>Training</strong> Sessions<br />

The impact of the Internet and the offenders’ digital<br />

behavior will be explored and explained. Participants<br />

will leave this session with a new understanding of sex<br />

offenders, their thoughts and digital behaviors that will<br />

enhance the ability to investigate, prosecute, supervise<br />

and treat sex offenders.<br />

Understanding the BitTorrent File Sharing<br />

Network<br />

90 minutes<br />

Brian Levine & Marc Liberatore<br />

Peer-to-peer (p2p) file-sharing networks are used for<br />

acquisition and distribution of images of child sexual<br />

exploitation. This session provides an introduction to<br />

BitTorrent, the most popular p2p application on the<br />

Internet. Presenters will describe how the system<br />

works and how users leverage the network to find and<br />

share content. The discussion will review sources of<br />

evidence available in BitTorrent networks for use in<br />

child pornography investigations. The training will<br />

draw analogies and comparisons to Gnutella and similar<br />

investigations. The presentation will describe challenges<br />

that law enforcement faces when investigating BitTorrent.<br />

United States Postal Inspection Service:<br />

The Value of the Mail in <strong>Child</strong> Exploitation<br />

Investigations<br />

90 minutes<br />

Scott Kelley & Karen Yoakum<br />

This presentation provides attendees with information<br />

about the investigative tools the US Postal Inspection<br />

Service offers in child exploitation cases. The presentation<br />

discusses services available to identify suspect locations,<br />

their Internet service providers, and tools available to<br />

assist in luring/enticement cases. Presenters will provide<br />

case studies to highlight the successful use of these<br />

techniques.<br />

Victim Rights and Restitution<br />

90 minutes<br />

Laurie Levin & Linda Seabrook<br />

This presentation discusses victims’ rights and restitution.<br />

The lecture will address federal statutory avenues<br />

for obtaining restitution for victims of federal child<br />

pornography offenses and recent case law that places<br />

stumbling blocks along these avenues. The presentation<br />

will explore creative ways to use the federal Crime<br />

Victims’ Rights Act as an additional tool to protect the<br />

prosecution’s case.<br />

Victimization <strong>On</strong>line: Patterns and Trends – A<br />

Snapshot<br />

90 minutes<br />

Kevin O’Brien<br />

This session provides a review of recent patterns and<br />

trends of online victimization mined from NCMEC<br />

data including examples of intriguing law enforcement<br />

investigations. Topics include the vulnerabilities of<br />

children using technologies such as smart phones and<br />

social networking. The session explores the increasing<br />

prevalence of victim “self-exploitation.” Industry efforts<br />

to reduce online child victimization including PhotoDNA<br />

will also be presented.<br />

Victims of Commercial Sexual Exploitation &<br />

Domestic Minor Sex Trafficking<br />

90 minutes<br />

Tiffany Rivera & Crystal Ward<br />

This lecture provides prosecutors and investigators with<br />

practical knowledge of CSEC victims including victim<br />

identification, approach tactics, what victims really need,<br />

referral services and victim advocacy. Presenters will<br />

also discuss working with CSEC victims during criminal<br />

proceedings.<br />

62 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Classroom-Based <strong>Training</strong> Sessions<br />

Webcams and the Commercial Sexual<br />

Exploitation of <strong>Child</strong>ren Abroad<br />

90 minutes<br />

James Kilpatrick & Edward McAndrew<br />

This presentation examines the rise of webcams as tools<br />

to facilitate commercial sexual exploitation of children.<br />

The presentation covers the use of webcams by domestic<br />

offenders to exploit foreign children by producing child<br />

pornography or enticing victims in exchange for money.<br />

Presenters discuss webcams used by sex-tourists to<br />

identify and develop online relationships with victims<br />

or their custodians, plan sex-tourism trips and maintain<br />

exploitative relationships after the sex-tourism trip<br />

concludes. Presenters will discuss investigative techniques<br />

and the types of evidence to use in building successful<br />

cases against foreign and domestic targets.<br />

Who Are The <strong>Child</strong>ren? NCMEC’s <strong>Child</strong><br />

Victim Identification Program<br />

90 minutes<br />

Jennifer Lee<br />

This session focuses on child victims and the offenders<br />

who produce child pornography. Based on data from<br />

NCMEC’s <strong>Child</strong> Victim Identification Program,<br />

information including the relationship of child to abuser,<br />

gender and age will be discussed. Using case studies,<br />

this session illustrates the ways children seen in sexually<br />

exploitative images were identified and rescued by law<br />

enforcement, both in the U.S. and worldwide through<br />

Interpol’s network. Participants will learn about the<br />

many investigative and prosecutorial resources available,<br />

including NCMEC’s <strong>Law</strong> <strong>Enforcement</strong> Services Portal.<br />

Windows 8 Preview<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Chris Ard<br />

This presentation showcases some of the features that the<br />

newest Microsoft operating system will offer. The session<br />

highlights some of the changes that will be introduced and<br />

how these changes may influence the law enforcement<br />

and forensic landscape.<br />

Wireless Network Investigation<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 Minutes<br />

Nicholas Newman<br />

This session provides an overview of standards and best<br />

practices for pre and post search warrant investigative<br />

techniques to employ when dealing with wireless<br />

networks.<br />

Working with Cooperating Defendants in<br />

<strong>Child</strong> Pornography Cases<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Keith Becker & Brian Bone<br />

How-to turn a single child pornography case into five,<br />

ten or fifty 50 successful prosecutions? This session<br />

examines the challenges, practical aspects, and benefits<br />

of working with cooperating defendants in online child<br />

exploitation cases. Presenters discuss both organized and<br />

diffuse groups of offenders and strategies to tap into their<br />

networks to apprehend them.<br />

Working With Victims in CSE Cases & Using<br />

Evidence During Forensic Interviews<br />

90 minutes<br />

Robert Giles & Ale Levi<br />

During an investigation involving the technologyfacilitated<br />

sexual exploitation of a child it is imperative<br />

that law enforcement and prosecutors understand the<br />

crime as an assault against a child and not merely a<br />

matter of technology. Investigators and prosecutors must<br />

know that child victims present difficult and unique<br />

challenges. These challenges include cases involving<br />

forced prostitution, children who have no memory<br />

of their victimization and children who feel the need<br />

to protect their abuser(s). This presentation explores<br />

PARTNERS IN PROTECTING CHILDREN 63


Classroom-Based <strong>Training</strong> Sessions<br />

the most effective methods of developing information<br />

from the child who has been victimized through the use<br />

of technology; from the initiation of the investigation<br />

through trial.<br />

Working with Yahoo! on <strong>Law</strong> <strong>Enforcement</strong><br />

Investigations<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Chris Madsen<br />

This presentation provides an overview of Yahoo! services<br />

and technologies, including Flickr photo sharing and<br />

Messenger. In addition to describing the types of data<br />

available to law enforcement from those services and<br />

technologies, presenters will review the processes by<br />

which Yahoo! may provide data to law enforcement,<br />

consistent with state and federal law, including the<br />

Stored Communications Act. Presenters will describe<br />

how Yahoo! detects and reports apparent images of child<br />

pornography.<br />

64 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


INTERPOL Resources for<br />

US <strong>Law</strong> <strong>Enforcement</strong><br />

This presentation will consist of case studies that will explore how<br />

INTERPOL Washington assists U.S. law enforcement agencies in matters<br />

with an international nexus. This assistance generally involves the location<br />

and arrest of known sex offenders, other criminals and fugitives; criminal<br />

history information and records checks from member countries; requests to<br />

obtain evidence or conduct interviews for a judicial or law enforcement<br />

purpose and preparation and issuance of INTERPOL Notices. INTERPOL<br />

notices have demonstrated themselves to be very effective in locating and<br />

tracking high-profile subjects of interest to U.S. law enforcement.<br />

Learn more about INTERPOL Resources<br />

for US <strong>Law</strong> <strong>Enforcement</strong><br />

Check your schedule for the day and time<br />

this Lab-Based <strong>Training</strong> will be offered.<br />

PARTNERS IN PROTECTING CHILDREN 65<br />

Speaker Bios


66 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

Paul Almanza<br />

<strong>National</strong> Coordinator for <strong>Child</strong> Exploitation<br />

Prevention and Interdiction<br />

Office of the Deputy Attorney General,<br />

U.S. Department of Justice<br />

Mr. Almanza is the <strong>National</strong> Coordinator for <strong>Child</strong><br />

Exploitation Prevention and Interdiction in the Office<br />

of the Deputy Attorney General, U.S. Department of<br />

Justice. He joined the Department’s <strong>Child</strong> Exploitation<br />

and Obscenity Section in 2002, working as a line<br />

prosecutor and as a legislative and policy attorney.<br />

Among other matters, he worked on the development<br />

of the Innocence Lost Initiative combating the domestic<br />

victimization of children through prostitution, the<br />

development of Project Safe <strong>Child</strong>hood, and on the<br />

Adam Walsh <strong>Child</strong> Protection and Safety Act of 2006.<br />

Mr. Almanza also was a prosecutor and defense counsel<br />

in the U.S. Army, an attorney in private practice, and<br />

the chief of staff of the Department’s Office of Legal<br />

Policy. He assumed his current position in February<br />

<strong>2012</strong>.<br />

Amy Alvarado<br />

Commercial Sexual Exploited <strong>Child</strong>ren Specialist<br />

Cook County State’s Attorney’s Office<br />

Ms. Alvarado is the Cook County State’s Attorney’s<br />

Office Commercial Sexual Exploited <strong>Child</strong>ren<br />

(CSEC) Specialist. She worked as a Victim-Witness<br />

Specialist for the Domestic Violence Division for<br />

over five years before becoming a part of the office’s<br />

Human Trafficking Unit. While working for the State’s<br />

Attorney’s Office, she also worked with victims of<br />

crime as a Program Specialist at the University of<br />

Illinois Medical Center’s Department of Health Social<br />

Work. Prior to working for the State’s Attorney, she<br />

worked as a Court Advocate for Family Rescue’s<br />

Domestic Violence Reduction Unit, housed in the<br />

Chicago Police Department. As an advocate, she<br />

provided crisis intervention to victims and training to<br />

officers.<br />

Chris Ard<br />

Senior Investigations Consultant<br />

Microsoft<br />

Mr. Ard is a senior consultant with the Microsoft<br />

Cybersecurity Services group. He has been with<br />

Microsoft for more than 12 years. His role within the<br />

team is to provide training and consulting services to<br />

various law enforcement and intelligence groups on<br />

difficult forensic topics and internet investigations. He<br />

has received numerous industry certifications including<br />

CISSP, MCSE, and Security+. He has also published<br />

articles in a leading industry forensic journal and has<br />

spoken at many national and international conferences.<br />

He has a Masters of Business Administration degree<br />

with an emphasis in Information Assurance and a<br />

Bachelor of Science degree in computer science.<br />

Christopher Armstrong<br />

High-Tech Crime <strong>Training</strong> Specialist<br />

SEARCH<br />

Mr. Armstrong is a High-Tech Crime <strong>Training</strong> Specialist<br />

in the High-Tech Crime <strong>Training</strong> Services department<br />

of SEARCH, The <strong>National</strong> Consortium for Justice<br />

Information and Statistics, where he coordinates and<br />

provides training on high-tech crime investigations and<br />

forensics to local, state and federal justice agencies.<br />

He provides technical assistance to law enforcement<br />

agencies in active cases, prepares training curricula,<br />

teaches SEARCH investigative courses and speaks at<br />

conferences throughout the United States.<br />

Brian Arnett<br />

Police Offi cer III<br />

Los Angeles Police Department<br />

Officer Arnett has been working for the Los Angeles<br />

Police Department for 18 years. He began his<br />

assignment with the <strong>ICAC</strong> Task Force eight years ago,<br />

and is currently one of two forensic examiners. He<br />

holds certifications from California DOJ in advanced<br />

forensics and an EnCE from Guidence Software.<br />

PARTNERS IN PROTECTING CHILDREN 65


Speaker Biographies<br />

Dr. Jennie Barr<br />

The Innocent Justice Foundation<br />

Dr. Barr has been employed with a prosecutor-based<br />

state agency in crime victim services since 2000,<br />

serving as Director of <strong>Training</strong> and Victim Assistance,<br />

Program Administrator for Applied Research, Director<br />

of the Sexual Assault Prevention and Crisis Services<br />

Program, which includes the Sexual Assault Response<br />

Team (SART) and Sexual Assault Nurse Examiner<br />

(SANE) Programs as well as a Primary Prevention<br />

Program, and most recently as the Sexual Assault<br />

<strong>Training</strong> Program Coordinator. She has also served<br />

as training specialist and mental health support for<br />

divisions that handle Internet crimes against children,<br />

apprehension of sex offender fugitives, and death<br />

penalty cases.<br />

Keith Becker<br />

Trial Attorney<br />

U.S. Department of Justice, CEOS<br />

Attorney Becker joined the <strong>Child</strong> Exploitation and<br />

Obscenity Section (CEOS) in the Department of<br />

Justice’s Criminal Division as a Trial Attorney in 2010.<br />

He was previously an Assistant United States Attorney<br />

at the United States Attorney’s Office for the District<br />

of Columbia, where he prosecuted federal and local<br />

cases involving violent crimes, narcotics, and child<br />

pornography. Prior to joining the Department, he<br />

clerked for the Honorable Chief Judge Jon P. McCalla<br />

of the Western District of Tennessee in Memphis,<br />

Tennessee. He has a Bachelor of Science degree from<br />

Cornell University and a law degree from Harvard<br />

<strong>Law</strong> School.<br />

Greg Bembridge<br />

Senior Computer Forensic Instructor<br />

Canadian Police College<br />

Mr. Bembridge is a Senior Computer Forensic Instructor<br />

with the Technological Crime Learning Institute at the<br />

Canadian Police College in Ottawa, Canada. He is<br />

involved in the research, development and instruction<br />

of the forensic program delivered to Canadian and<br />

international law enforcement. Previously a Forensic<br />

Analyst with the Royal Canadian Mounted Police Tech<br />

Crime Unit in Halifax, Mr. Bembridge has also worked<br />

as a dedicated forensic analyst to the provincial <strong>Child</strong><br />

Exploitation Unit. Having special interest in evidence<br />

found within the Microsoft Windows registry files, he<br />

has developed, and is currently delivering, a Registry<br />

Analysis Workshop at the Canadian Police College.<br />

Dean Berres<br />

Investigator Sergeant<br />

Wood County Sheriff’s Department<br />

Investigator Berres has been employed with the Wood<br />

County Sheriff’s Department for the past 30 years. He<br />

has received specialized training investigating Cyber<br />

Crimes and, for the past 10 years, the main focus of<br />

his job has been investigating these types of crimes for<br />

the Wood County Sheriff’s Department. Investigator<br />

Berres is active in conducting both fraud and identity<br />

theft investigations for the Department. He also<br />

conducts forensic evaluations of digital evidence for<br />

agencies in Wood County and surrounding counties.<br />

Investigator Berres has been appointed to the FBI<br />

Federal Task Force for Cyber Crime Investigations and<br />

is also a member of the State of Wisconsin Internet<br />

Crimes Against <strong>Child</strong>ren Task Force.<br />

Steve Blackwell<br />

Special Agent<br />

Georgia Bureau of Investigation<br />

Special Agent Blackwell has been with the Georgia<br />

Bureau of Investigation for twenty- seven years, and<br />

has been conducting <strong>ICAC</strong>-related investigations since<br />

2005. He is involved in training other law enforcement<br />

officers in conducting various types of <strong>ICAC</strong>-related<br />

investigations, including undercover chat, peer<br />

to peer, and introduction to online investigations.<br />

Agent Blackwell also works on cases related to the<br />

commercial sexual exploitation of children.<br />

66 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

Rob Blake<br />

Special Agent<br />

Federal Bureau of Investigation<br />

Special Agent Blake has been with the FBI since March<br />

of 2009. He is assigned to the Charlottesville Resident<br />

Agency of the Richmond Field Division, where he<br />

works primarily counterterrorism matters, as well as<br />

various criminal investigations.<br />

Daryl Bloom<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Middle District of Pennsylvania<br />

Attorney Bloom is an Assistant United States Attorney<br />

in the Criminal Division of the United States Attorney’s<br />

Office, in and for the Middle District of Pennsylvania,<br />

duty stationed in the Harrisburg Branch office. He has<br />

worked in the Middle District of Pennsylvania for the<br />

past 10 years. Currently, Attorney Bloom prosecutes<br />

cases involving a wide variety of offenses, including<br />

drug trafficking, sexual exploitation of children,<br />

violent crimes including serial bank robberies and<br />

kidnappings, firearms, passport fraud, identity theft,<br />

counterfeiting and white collar crime.<br />

Allen Bode<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Eastern District of New York<br />

Attorney Bode has been an Assistant United States<br />

Attorney for the Eastern District of New York (EDNY)<br />

since 2003. He has been the EDNY Project Safe<br />

<strong>Child</strong>hood Coordinator since the program’s inception<br />

and has directed investigations and prosecuted child<br />

exploitation cases throughout his tenure as an AUSA.<br />

Prior to his work as a federal prosecutor, he was an<br />

Assistant District Attorney for the Queens County<br />

District Attorney’s Office in Queens, New York.<br />

Brian Bone<br />

Inspector<br />

United States Postal Inspection Service<br />

Inspector Bone has been with the United States Postal<br />

Inspection Service since 2007 and is currently assigned<br />

to the United States Department of Justice’s <strong>Child</strong><br />

Exploitation and Obscenity Section in Washington,<br />

D.C. During his tenure, he has been assigned to work on<br />

child exploitation investigations for USPIS on various<br />

federal and state task forces. In his current capacity,<br />

Inspector Bone conducts complex child exploitation<br />

investigations with a national scope, and performs<br />

computer forensic examinations in support of these<br />

investigations. Prior to joining USPIS, Inspector Bone<br />

worked as a sworn law enforcement officer within the<br />

State of Illinois for over 9 years conducting both cyber<br />

crime and child exploitation investigations.<br />

Mark Bowser<br />

Computer Crimes Specialist<br />

<strong>National</strong> White Collar Crime Center (NW3C)<br />

Mr. Bowser joined the staff of the NW3C in 2008,<br />

bringing with him over 30 years of law enforcement<br />

experience, 10 of which were in the field of computer<br />

forensics. He is currently responsible for providing<br />

support and instruction for all of NW3C’s offerings,<br />

including the BCPI and CP/GPS courses for the U.S.<br />

and the Great Lakes Region of NW3C. Prior to retiring<br />

from Michigan law enforcement, Mr. Bowser had been<br />

assigned to conduct major case investigations and been<br />

assigned to the Michigan State Police (<strong>ICAC</strong>) unit<br />

where he conducted online undercover investigations<br />

along with digital forensics. Mr. Bowser has taught and<br />

spoken to various law enforcement organizations on<br />

the topics of Cyber investigation, Computer forensics,<br />

CP analysis and U/C investigations.<br />

Ty Brevard<br />

Director of <strong>Law</strong> <strong>Enforcement</strong> Technology<br />

SRT Wireless<br />

Mr. Brevard serves as a subject matter expert in the<br />

802.11 exploitation and tracking arena, for both tactical<br />

and strategic missions. He has expertise in operational<br />

techniques and tactics specific to the tracking and<br />

geo-location of Wi-Fi information systems. His focus<br />

has been in the training, presentation and operational<br />

PARTNERS IN PROTECTING CHILDREN 67


Speaker Biographies<br />

support of DEA, Broward Sheriff’s Office, NYPD,<br />

Texas DPS as well other state, local and federal law<br />

enforcement agencies. As a key member of SRT<br />

Wireless’ LE team, he has consulted on investigations<br />

requiring expertise in geo-location, exploitation<br />

or neutralization of Wi-Fi emitters and targets. In<br />

2005, Mr. Brevard joined SR Technologies where<br />

he has advanced his knowledge of Wi-Fi networks/<br />

exploitation and now conducts 802.11 operations and<br />

intermediate/advanced training classes.<br />

Johnathan Bridbord<br />

Lead Computer Forensic Specialist<br />

U.S. Department of Justice, Criminal Division, CEOS<br />

Mr. Bridbord is Lead Computer Forensic Specialist<br />

in the High Technology Investigative Unit within the<br />

<strong>Child</strong> Exploitation and Obscenity Section in the United<br />

States Department of Justice. Among his duties, he<br />

conducts forensic analysis of seized computer systems<br />

and media, provides investigative and analytical<br />

support to prosecutors and law enforcement agents<br />

to identify online child pornography offenses, and<br />

develops strategies for gathering electronic evidence.<br />

Don Brister<br />

Forensic Analyst / Instructor<br />

BlackBag Technologies, Inc.<br />

Mr. Brister joined BlackBag Technologies in 2007. He<br />

has served as a digital forensic analyst, investigator and<br />

lead instructor. With nearly 30 years law enforcement<br />

experience, Mr. Brister offers a wealth of experience<br />

in various investigative roles involving computer<br />

digital evidence. His background includes serving as<br />

the lead investigator in several major, multi-agency<br />

investigations. His law enforcement investigative<br />

experience involved Narcotics, <strong>Child</strong> Exploitation,<br />

Fraud and High Tech. Prior to joining BlackBag, Mr.<br />

Brister served as an instructor for the California<br />

Department of Justice, training law enforcement<br />

investigators in the areas of high technology<br />

investigations, Internet investigations and digital<br />

evidence recovery.<br />

Travis Burrows<br />

Supervisory Senior Resident Agent<br />

Federal Bureau of Investigation<br />

SSRA Burrows is a sixteen-year veteran of the FBI and<br />

has spent the last nine years investigating or supervising<br />

investigations in Indian Country in Northern Montana.<br />

He has extensive knowledge in the investigation of<br />

crimes against children in Indian Country, particularly<br />

child sexual and physical abuse cases.<br />

Nirupa Calvin<br />

Investigator, Trust & Safety<br />

Google<br />

Ms. Calvin is part of Google’s Trust and Safety Team<br />

that is responsible for the protection of Google<br />

revenue, users and brand. Her key focus area is child<br />

safety investigations. She is also actively involved in<br />

some of Google’s key online child safety initiatives.<br />

She is an honors graduate, with a Master’s Degree in<br />

Computer Science and Technology from the University<br />

of Madras, India.<br />

Kristian Carlson<br />

Lieutenant, Burlington Police Department<br />

The Innocent Justice Foundation<br />

Lt. Carlson is the Commander of the Vermont Internet<br />

Crimes Against <strong>Child</strong>ren Task Force (VT-<strong>ICAC</strong>).<br />

As a nationwide leader in implementing a mental<br />

health and wellness program in his Task Force, Lt.<br />

Carlson has developed the SHIFT “Finding a Mental<br />

Health Professional Guide” and acted as an adviser<br />

in the development of the SHIFT curriculum. He<br />

has instructed extensively for the program, and is<br />

also a presenter for the <strong>National</strong> District Attorneys<br />

Association (NDAA) and Internet Crimes Against<br />

<strong>Child</strong>ren <strong>Training</strong> & Technical Assistance Program. He<br />

is also the co-author of the text, “An Introduction to<br />

Vermont Criminal <strong>Law</strong>.” He is an adjunct computer<br />

forensics and criminal procedure faculty member at<br />

Champlain College.<br />

68 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

Lisa Carroll<br />

Detective<br />

Delaware County District Attorney’s Office/PA <strong>ICAC</strong><br />

Detective Carroll has been a law enforcement officer<br />

for over sixteen years and a Detective with the<br />

Delaware County Criminal Investigation Division of<br />

the District Attorney’s Office/Pennsylvania <strong>ICAC</strong> for<br />

ten years. She has been trained in the field of child<br />

physical and sexual abuse and the use of the Internet by<br />

sexual offenders to seduce, entice, and gain access to<br />

children for the purposes of sexual exploitation. She<br />

has worked in an undercover capacity in the area of<br />

child pornography and child exploitation where she<br />

engaged in online communication with individuals<br />

looking to engage in sexual acts with children and/<br />

or procure child pornography. Detective Carroll is<br />

also involved in public education and helps promote<br />

Internet safety and Cyber bullying awareness.<br />

Dennis Carry<br />

Detective Sergeant<br />

Washoe County Sheriff’s Office<br />

Detective Carry has been in law enforcement for 16<br />

years and has been assigned to investigate <strong>ICAC</strong> and<br />

other cyber-related cases since 2004. He serves as a<br />

dual-role investigator conducting computer forensic<br />

analysis in addition to investigations. Detective Carry<br />

has qualified as an expert in several courts and often<br />

testifies before the Nevada State Legislature about<br />

cyber-related crimes and legislation. He has instructed<br />

over 400 law enforcement personnel in the use of<br />

various <strong>ICAC</strong>-related investigative techniques and<br />

is currently an instructor for Fox Valley Technical<br />

College.<br />

Bethany Case<br />

Visiting Fellow<br />

U.S. Department of Justice, Office for Victims of<br />

Crime<br />

Ms. Case is a Licensed Clinical Social Worker and has<br />

been a Visiting Fellow at the Justice Department’s<br />

Office for Victims of Crime since the fall of 2008.<br />

Her work experience prior to moving to Washington,<br />

D.C. includes: Forensic Interviewer at a <strong>Child</strong>ren’s<br />

Advocacy Center; Mental Health Provider in a high<br />

school setting; and State <strong>Child</strong> Protection Investigator.<br />

She received her Bachelor of Arts Degree in Social<br />

Work from Southeastern Louisiana University and<br />

her Master of Social Work Degree from Louisiana<br />

State University. She is currently licensed to practice<br />

clinical social work in both Louisiana and the District<br />

of Columbia.<br />

TC Cassidy<br />

Senior Program Development Specialist<br />

Runaway and <strong>Home</strong>less Youth <strong>Training</strong> and Technical<br />

Assistance Centers<br />

Ms. Cassidy is Senior Program Development Specialist<br />

for the University of Oklahoma’s Runaway and<br />

<strong>Home</strong>less Youth Technical Assistance Center. Her<br />

fields of expertise are runaway and homeless youth,<br />

basic center, transitional living, street outreach, youth<br />

development, GLBTQ, and human trafficking. She<br />

plays a key role in the assessment, design, and provision<br />

of technical assistance services for the Center. She has<br />

extensive experience in the field of youth services<br />

and has worked in both direct care and supervisory<br />

positions in basic center, transitional living, and street<br />

outreach programs. She earned her Master’s Degree<br />

in Public Administration from the University of<br />

Tennessee.<br />

Thomas Clancy<br />

Director<br />

<strong>National</strong> Center for Justice and the Rule of <strong>Law</strong>, Univ.<br />

of Mississippi<br />

Mr. Clancy is a Research Professor and Director of the<br />

<strong>National</strong> Center for Justice and the Rule of <strong>Law</strong> at the<br />

University of Mississippi School of <strong>Law</strong>. He has taught<br />

at several law schools on subjects ranging from criminal<br />

law and procedure to the Fourth Amendment, cyber<br />

crime, and constitutional law. Mr. Clancy has more<br />

than 25 years of trial and post-conviction litigation<br />

experience, has briefed and argued over 900 criminal<br />

appeals, lectures nationally, and has authored numerous<br />

PARTNERS IN PROTECTING CHILDREN 69


Speaker Biographies<br />

articles on the Fourth Amendment, including the<br />

treatise The Fourth Amendment: Its History and<br />

Interpretation (Carolina Academic Press 2008) and the<br />

text Cyber Crime and Digital Evidence: Materials and<br />

Cases (LexisNexis 2011). He is a graduate of Vermont<br />

<strong>Law</strong> School and the University of Notre Dame.<br />

Jim Cole<br />

Special Agent / <strong>National</strong> Program Manager for<br />

Victim Identifi cation<br />

<strong>Home</strong>land Security Investigations (HSI)<br />

Special Agent Cole is currently the HSI <strong>National</strong><br />

Program Manager for Victim Identification at the<br />

<strong>Home</strong>land Security Investigations Cyber Crime<br />

Center, <strong>Child</strong> Exploitation Center. He is a certified<br />

computer forensic examiner and conducts image and<br />

video analysis related to victim identification. Special<br />

Agent Cole has over 19 years of local and federal law<br />

enforcement experience. Previously, he conducted<br />

national security investigations for the Army and then<br />

investigated violent crimes in Indian Country.<br />

Guy Collings<br />

Detective Superintendent<br />

<strong>Child</strong> Exploitation and <strong>On</strong>-line Protection Centre<br />

(CEOP) UK<br />

Detective Superintendent Collings is head of the<br />

Behavioral Analysis Unit at CEOP in London, the<br />

only unit of its kind in the United Kingdom. He<br />

has been a police officer for 23 years and is a career<br />

detective, being an accredited Senior Investigating<br />

Officer since 2003. He has been head of both the<br />

Homicide and Public Protection Units of Lincolnshire<br />

Police, leading numerous homicide, death in overseas<br />

jurisdictions, kidnap and sexual crimes against<br />

children investigations. He has been commended for<br />

his leadership by various chief constables and his work<br />

has been recognized by the award of several judge’s<br />

commendations. He holds an undergraduate degree<br />

in Criminology, a Master’s Degree in Leadership<br />

& Management and a Post Graduate Certificate in<br />

Forensic Behavioral Psychology.<br />

Catherine S. Connell<br />

<strong>Child</strong>/Adolescent Forensic Interviewer<br />

Federal Bureau of Investigation<br />

Ms. Connell is a state licensed Clinical Social Worker,<br />

and is currently employed with the FBI as a <strong>Child</strong>/<br />

Adolescent Forensic Interviewer with the Office<br />

of Victim Assistance. She provides interviews,<br />

consultation and training for FBI Agents, Assistant<br />

United States Attorneys, and other federal and state<br />

law enforcement. Prior to joining the FBI, Ms. Connell<br />

was the Director of Intervention and Treatment at<br />

CARE House, a <strong>Child</strong> Advocacy Center in Pontiac,<br />

Michigan. She was responsible for the collaboration of<br />

the multidisciplinary team, conducting and supervising<br />

forensic interviews, and the coordination of follow-up<br />

services for child victims and their families. Prior to<br />

that, she was a forensic interviewer for 7 years in Mt.<br />

Clemens, Michigan.<br />

Brant Cook<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Southern District of Indiana<br />

Mr. Cook is an Assistant United States Attorney with<br />

the United States Attorney’s Office for the Southern<br />

District of Indiana. His focus is on the prosecution of<br />

cases involving the sexual exploitation of children,<br />

particularly as facilitated by the internet, as part of<br />

the federal government’s increasing emphasis on<br />

addressing the issue under Project Safe <strong>Child</strong>hood.<br />

Mr. Cook began his career with the Franklin County<br />

(Ohio) prosecutor’s office, where he prosecuted<br />

cases involving the physical and sexual abuse of<br />

women and children, and developed a specialization<br />

in the prosecution of cases involving the online sexual<br />

exploitation of children. He is a graduate of The Ohio<br />

State University and the University of Virginia School<br />

of <strong>Law</strong>.<br />

Michael Corricelli<br />

Inspector<br />

U.S. Postal Inspection Service<br />

Inspector Corricelli has been a U.S. Postal Inspector for<br />

70 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

over 18 years. He specializes in proactive undercover<br />

operations and investigating the exploitation of<br />

children where there is a nexus to the mail. He holds a<br />

Master’s degree in Forensic Sciences from the George<br />

Washington University and a Bachelor’s degree in<br />

Criminal Justice from the University of Massachusetts.<br />

He also completed a prestigious year-long fellowship<br />

in Forensic Medicine with the Armed Forces Institute<br />

of Pathology. He is an Adjunct Professor of Criminal<br />

Justice at Lebanon Valley College and is often called<br />

upon within his agency and from outside organizations<br />

to lecture on child exploitation investigations.<br />

Vincent Costagliola<br />

VP, <strong>Law</strong> <strong>Enforcement</strong> Technologies<br />

SRT Wireless, LLC<br />

Mr. Costagliola serves the United States Government,<br />

both the law enforcement and intelligence communities,<br />

as a subject matter expert in the 802.11 exploitation<br />

and tracking arena, for both tactical and strategic<br />

missions. He has expertise in systems integration,<br />

networking architecture, operational techniques<br />

and tactics in the tracking and geo-location of Wi-Fi<br />

information systems. Over the past four years his focus<br />

has been in the training, presentation and operational<br />

support of local and federal law enforcement agencies<br />

with targets of interest utilizing Wi-Fi technologies<br />

for nefarious uses in the area of child pornography,<br />

terrorism, fraud and national security arenas.<br />

Shia Cruciani<br />

Police Offi cer<br />

DeWitt Police Department<br />

Officer Cruciani is a full-time police officer in DeWitt,<br />

Iowa. In addition to her regular duties, she is an active<br />

member of the Iowa Internet Crimes Against <strong>Child</strong>ren<br />

Task Force which involves reactively and proactively<br />

investigating crimes involving online enticement of<br />

minors for illegal sex acts and production, distribution,<br />

receipt, and possession of child pornography. She holds<br />

an Associate’s Degree in Liberal Arts, a Bachelor’s<br />

Degree in <strong>Law</strong> <strong>Enforcement</strong> & Justice Administration,<br />

a Master’s Degree in Criminal Justice, and will<br />

soon complete a Master’s Degree in Organizational<br />

Management. During her 10 years of law enforcement<br />

service she has received various awards.<br />

Anne Darr<br />

Victim Specialist<br />

Federal Bureau of Investigation<br />

Ms. Darr received her Bachelor of Science Degree from<br />

Illinois State University and two Master’s Degrees in<br />

Forensic Psychology and Counseling from Marymount<br />

University in Arlington, Virginia. Prior to joining the<br />

FBI, she worked as a Mobile Crisis Counselor for Prince<br />

George’s County Police, Maryland. She began her<br />

career with the FBI in the Anchorage, Alaska Division<br />

and currently is assigned to the Denver Division,<br />

serving victims of federal crime. In addition, she is<br />

part of the Innocence Lost Task Force, which partners<br />

with both local and federal law enforcement to combat<br />

human trafficking. She was one of 11 team members<br />

who were awarded the Director’s Award from the<br />

United States Attorney’s Office for Best Performance<br />

by a Litigative Team, which was presented by Attorney<br />

General Eric Holder in 2010.<br />

Randall Devine<br />

Special Agent<br />

Federal Bureau of Investigation<br />

Special Agent Devine is with the Los Angeles Office<br />

of the FBI and investigates child sex tourism offenses.<br />

Elizabeth B. Dowdell<br />

Associate Professor<br />

Villanova University<br />

Dr. Dowdell is an associate professor at Villanova<br />

University, College of Nursing. She is a forensic<br />

pediatric nurse whose program of research has<br />

focused on studying vulnerable populations such as<br />

high-risk adolescents, grandmother caregivers, and<br />

infants who have been abducted from homes and<br />

hospitals. Dr. Dowdell has published in the areas of<br />

health risk behaviors, caregiver burden, issues of foster<br />

PARTNERS IN PROTECTING CHILDREN 71


Speaker Biographies<br />

care placement, and high risk Internet behaviors of<br />

adolescents.<br />

Mike Duffey<br />

Special Agent<br />

Florida Department of <strong>Law</strong> <strong>Enforcement</strong><br />

Special Agent Duffey is currently assigned to the<br />

Computer Crime Center in Tallahassee, Florida<br />

where he is responsible for statewide computer<br />

crime investigations including Internet Crimes<br />

Against <strong>Child</strong>ren with the Florida Department of<br />

<strong>Law</strong> <strong>Enforcement</strong>. His law enforcement experience<br />

includes working for the Tallahassee Police<br />

Department and the Florida Department of Insurance.<br />

Special Agent Duffey is a graduate of the Florida State<br />

University School of Criminology, and has completed<br />

his Microsoft Certified System Administrator (MCSA)<br />

course work. His current cases include <strong>On</strong>line <strong>Child</strong><br />

Exploitation, Network intrusion cases, Phishing scams<br />

and unauthorized access to a network system.<br />

Brandon Enochs<br />

Computer Scientist<br />

U.S. Naval Research Laboratory<br />

Mr. Enochs is a computer scientist in the Mobile<br />

Systems Security section of the U.S. Naval Research<br />

Laboratory (NRL) in Washington, DC. He has worked<br />

at the NRL for six years and is the creator of Flying<br />

Squirrel, the Department of Defense’s standard<br />

Wireless Discovery Application. Sponsored by the<br />

<strong>National</strong> Security Agency’s Information Assurance<br />

Scholarship Program, Mr. Enochs obtained both his<br />

Bachelors and Masters of Science in Computer Science<br />

from the University of Tulsa.<br />

Robert Erdely<br />

Corporal, Retired<br />

Pennsylvania State Police<br />

Corporal Erdely (ret.) has been a member of the<br />

Pennsylvania State Police since 1991, and for over 13<br />

of those years was assigned to the Computer Crime<br />

Unit, recently retiring as supervisor of the unit. He<br />

is now in charge of developing and supporting the<br />

RoundUp and <strong>ICAC</strong>Cops.com project. He holds<br />

several forensic, Microsoft, and Cisco certifications.<br />

Tom Eskridge<br />

Partner<br />

High Tech Crime Institute<br />

Mr. Eskridge retired after 28 plus years in law<br />

enforcement. He has trained law enforcement and<br />

military personnel since 1999 in the field of hightech/Internet-based<br />

investigations and computer<br />

forensics. He began working computer crime-related<br />

cases in 1996 as a major fraud investigator, and in 1999<br />

he co-founded the South Bay Regional Computer<br />

Forensics Laboratory. Since his retirement from law<br />

enforcement, he has been a partner with the High<br />

Tech Crime Institute. HTCI has trained military and<br />

law enforcement since 2002 in the subject of digital<br />

investigations and forensics. HTCI is in its second year<br />

of delivering Cell Phone Investigations training under<br />

a Federal grant to <strong>ICAC</strong> members.<br />

Trevor Fairchild<br />

Programmer / Analyst<br />

<strong>On</strong>tario Provincial Police<br />

Mr. Fairchild is a civilian software engineer in the<br />

<strong>On</strong>tario Provincial Police, Electronic Crime Section,<br />

Technological Crime Unit. Since 2003, he has developed<br />

free software designed to assist law enforcement<br />

around the world with the tedious job of categorizing<br />

material in child exploitation investigations. These<br />

programs: C4P, C4M, and C4All have been used by<br />

hundreds of police agencies around the world for over<br />

eight years and have helped introduce standards and<br />

efficiencies that mean less time behind monitors and<br />

more time arresting offenders.<br />

Hany Farid<br />

Professor<br />

Dartmouth College<br />

Professor Farid received his undergraduate degree<br />

in Computer Science and Applied Mathematics from<br />

72 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

the University of Rochester in 1989. He received<br />

his Ph.D. in Computer Science from the University<br />

of Pennsylvania in 1997. Following a two-year postdoctoral<br />

position in Brain and Cognitive Sciences at<br />

MIT, he joined the faculty at Dartmouth in 1999, where<br />

he is currently a Professor of Computer Science. He is<br />

also the Chief Technology Officer and co-founder of<br />

Fourandsix Technologies, Inc., as well as the recipient<br />

of an NSF CAREER award, a Sloan Fellowship and a<br />

Guggenheim Fellowship.<br />

Josh Findley<br />

Special Agent<br />

<strong>Home</strong>land Security Investigations<br />

Special Agent Findley is an agent with the Department<br />

of <strong>Home</strong>land Security, <strong>Home</strong>land Security<br />

Investigations. He has specialized in <strong>Child</strong> Sexual<br />

Exploitation investigations for seven years and has 19<br />

years of law enforcement experience.<br />

Martha Finnegan<br />

<strong>Child</strong>/Adolescent Forensic Interview Specialist<br />

FBI<br />

Ms. Finnegan was hired as the <strong>Child</strong>/Adolescent<br />

Forensic Interview Specialist for Innocent Images,<br />

the FBI’s multi-agency investigative initiative to<br />

combat child pornography and child exploitation<br />

facilitated through the use of online computers. The<br />

FBI then moved Ms. Finnegan’s <strong>Child</strong>/Adolescent<br />

Forensic Interview Specialist position to the Office<br />

for Victim Assistance where she is available to provide<br />

expert testimony, technical assistance and training<br />

to FBI personnel, United States Attorneys, and<br />

other federal, state and local agencies in the areas of<br />

forensic interviewing of child victims of abuse and<br />

exploitation. She is also available to conduct child/teen<br />

victim interviews and/or help agents locate qualified<br />

interviewers in their area.<br />

Justin Fitzsimmons<br />

Senior Attorney<br />

<strong>National</strong> District Attorneys Association (NDAA)<br />

Attorney Fitzsimmons is a Senior Attorney with<br />

NDAA’s <strong>National</strong> Center for Prosecution of <strong>Child</strong><br />

Abuse in Alexandria, Virginia. He organizes national<br />

conferences each year for technology-facilitated child<br />

sexual exploitation. Additionally, he trains at other<br />

state and local seminars on the subject of sexual<br />

crimes against children. He also serves as a member<br />

of working groups on Innocence Lost, Restitution<br />

for Victims of <strong>Child</strong> Pornography, and Cyberbullying<br />

with other individuals from federal, state and local law<br />

enforcement, non-profit organizations and Internet<br />

safety organizations to develop responses and education<br />

to technology-facilitated crimes. Prior to coming to<br />

NDAA in June of 2009, Attorney Fitzsimmons was an<br />

Assistant State’s Attorney in Illinois for 11 years.<br />

Michelle Ford-Stepney<br />

Supervisory Analyst<br />

INTERPOL Washington<br />

Ms. Ford-Stepney serves as a Supervisory INTERPOL<br />

Analyst for INTERPOL Washington, U.S. <strong>National</strong><br />

Central Bureau (USNCB), a component of the<br />

Department of Justice. Ms. Ford-Stepney is responsible<br />

for managing day-to-day operations and administration<br />

within her assigned division: Human Trafficking<br />

and <strong>Child</strong> Protection. Her division maintains direct<br />

contact with counterparts in 190 other member<br />

countries and with over 18,000 U.S. law enforcement<br />

agencies across the country, facilitating police-topolice<br />

communications and providing assistance with<br />

criminal investigations.<br />

Kevin Forder<br />

Associate General Counsel<br />

United States Marshals Service, Office of General<br />

Counsel<br />

Attorney Forder is an Associate General Counsel at the<br />

USMS, where his primary responsibilities are training<br />

and operational counsel in the criminal enforcement<br />

PARTNERS IN PROTECTING CHILDREN 73


Speaker Biographies<br />

of the Adam Walsh Act and for judicial security<br />

and related intelligence operations. He is a former<br />

Assistant United States Attorney and former adjunct<br />

professor at George Washington University School<br />

of <strong>Law</strong>. He served in numerous criminal prosecution<br />

capacities and in the Office of Intelligence and Policy<br />

Review (OIPR) at the Justice Department before<br />

joining the USMS in 2004. While at OIPR, he served<br />

as an Associate Investigative Counsel on the Webster<br />

Commission for the review of FBI security programs<br />

related to the Hanssen espionage matter.<br />

James Fottrell<br />

Director, High Technology Investigative Unit<br />

U.S. Department of Justice, <strong>Child</strong> Exploitation and<br />

Obscenity Section<br />

Mr. Fottrell is the Director of the High Technology<br />

Investigative Unit within the <strong>Child</strong> Exploitation and<br />

Obscenity Section in the Criminal Division of the<br />

United States Department of Justice. Among his duties,<br />

he manages a staff of computer forensics specialists and<br />

conducts forensic examinations of seized computer<br />

systems and media, provides investigative and analytical<br />

support to prosecutors and law enforcement agents<br />

to identify online child exploitation offenses, and<br />

develops strategies for gathering electronic evidence.<br />

Mr. Fottrell began his pioneering role in online child<br />

exploitation offenses in 1992 while working with the<br />

U.S. Customs Service’s Office of <strong>Enforcement</strong>.<br />

Lance Fragomeli<br />

Special Agent/ Polygraph Examiner<br />

Federal Bureau of Investigaiton<br />

Special Agent Fragomeli has been an FBI agent for the<br />

past 22 years. He is currently a full-time polygraph<br />

examiner, working out of the FBI’s Cleveland office.<br />

To date, Mr. Fragomeli has conducted over 1,000<br />

polygraph examinations. He has traveled both<br />

domestically and internationally to conduct polygraph<br />

examinations on behalf of the FBI, Department of<br />

Defense, and other federal agencies, and routinely<br />

conducts polygraph examinations on behalf of state<br />

and local police departments within Ohio.<br />

Lisa Marie Freitas<br />

Trial Attorney<br />

U.S. Department of Justice<br />

Attorney Freitas is a Trial Attorney with the Department<br />

of Justice’s <strong>Child</strong> Exploitation and Obscenity Section.<br />

She is currently on detail to the District of Maryland as<br />

a Special Assistant United States Attorney prosecuting<br />

child pornography, online enticement and child<br />

prostitution. Prior to working for the Department<br />

of Justice, Attorney Freitas was a Special Agent with<br />

the FBI assigned to investigate child exploitation and<br />

terrorism offenses. Before entering on duty with the<br />

FBI, she worked as an Assistant State Attorney with the<br />

Palm Beach County State Attorney’s Office.<br />

Anne Gannon<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Central District of California,<br />

Santa Ana Office<br />

Attorney Gannon is an Assistant United States Attorney<br />

in the Central District of California where she is<br />

currently the Project Safe <strong>Child</strong>hood Coordinator for<br />

Orange County. She has prosecuted child exploitation<br />

offenses since 2005. In 2009, she was honored as one<br />

of The Top Women Litigators in California by the Los<br />

Angeles Daily Journal for her appellate work on child<br />

exploitation issues. She clerked for the Honorable<br />

Raner C. Collins, United States District Court, District<br />

of Arizona, Tucson Division. In 2002, following her<br />

clerkship, she began her career as an Assistant United<br />

States Attorney in Tucson prosecuting border crimes.<br />

Additionally, she has taught courses in trial advocacy at<br />

the <strong>National</strong> Advocacy Center.<br />

James Reeves Garnett<br />

Special Agent<br />

Tennessee Bureau of Investigation<br />

Special Agent Garnett has worked for the Tennessee<br />

Bureau of Investigation for three years in the Technical<br />

Services Unit and has been a member of an FBI Joint<br />

Cyber Crime Task Force for two years. His primary role<br />

is a computer forensics examiner, but he also assists in<br />

74 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

the technical aspects of cyber and field investigations.<br />

He has a Bachelors Degree in Information Systems<br />

Engineering from the United States Military Academy,<br />

West Point, New York. Prior to law enforcement,<br />

he spent five years on Active Duty in the U.S. Army<br />

serving as a Field Artillery Officer and one year as a<br />

high school math teacher near Memphis, TN.<br />

Ernesto Gaxiola<br />

Detective<br />

Glendale Police Department<br />

Detective Gaxiola is a detective with the Glendale,<br />

California Police Department and is currently assigned<br />

to the Violent Crimes Bureau. He has been a police<br />

officer for 10 years and for the past five years he has<br />

worked a variety of sexual assault cases, including<br />

Internet crimes pertaining to children. Detective<br />

Gaxiola has been with the Los Angeles <strong>ICAC</strong> Task Force<br />

for the past two years and, most recently, he assisted<br />

with Operation Delego, a joint operation with ICE,<br />

where numerous suspects were taken into custody<br />

for various violations regarding the exploitation of<br />

children.<br />

Shannon Geaney<br />

Detective II<br />

Los Angeles Regional <strong>ICAC</strong><br />

Detective Geaney is a 14-year veteran of the Los<br />

Angeles Police Department. Her previous assignments<br />

include Patrol, Counter-Terrorism Bureau, Sex<br />

Crimes and Homicide. She has been assigned to the<br />

Los Angeles Regional <strong>ICAC</strong> since 2007. Detective<br />

Geaney worked as an Investigator before becoming<br />

a full-time Forensic Examiner in 2008. She currently<br />

supervises the Los Angeles Regional Task Force<br />

Forensic Lab located within the <strong>Home</strong>land Security<br />

Investigations Computer Forensics Lab. Detective<br />

Geaney has a Bachelor’s Degree in Forensic Science<br />

and has completed her EnCE Certification.<br />

Norman Gibson<br />

Computer Crime Specialist<br />

<strong>National</strong> White Collar Crime Center<br />

Robert Giles<br />

Senior Attorney<br />

<strong>National</strong> District Attorneys Association<br />

Attorney Giles is a Senior Attorney for the <strong>National</strong><br />

Center for the Prosecution of <strong>Child</strong> Abuse at the<br />

<strong>National</strong> District Attorneys Association. He trains on<br />

a wide variety of topics relating to investigation and<br />

prosecution of child abuse. As an Assistant Prosecuting<br />

Attorney in Oakland County Michigan, he prosecuted<br />

child sexual assault cases for 9 years. Attorney Giles<br />

also was Section Leader of the <strong>Child</strong> Sexual Assault<br />

Unit at the Oakland County Prosecutor’s Office. Prior<br />

to joining the Oakland County Prosecutor’s Office, he<br />

was a <strong>Law</strong> Clerk to the Honorable Damon J. Keith,<br />

Judge on the United States Court of Appeals for the<br />

Sixth Circuit. He received his law degree from the<br />

University of Detroit Mercy School of <strong>Law</strong> and his<br />

Bachelor’s of Arts Degree from DePauw University.<br />

Charles Gillingham<br />

Deputy District Attorney<br />

Santa Clara County District Attorney’s Office<br />

Deputy District Attorney Gillingham has been a<br />

prosecutor with Santa Clara County for 18 years.<br />

He was a member of the San Jose <strong>ICAC</strong> Task<br />

Force and was responsible for the prosecution of<br />

Internet investigations, child pornography, and child<br />

molestation cases. He has instructed on the topic of<br />

Internet Crimes and <strong>Child</strong> Exploitation at the San Jose<br />

and Dallas <strong>ICAC</strong> Conferences and at several colleges<br />

and police academies on various topics. Deputy<br />

District Attorney Gillingham is an Adjunct Professor of<br />

<strong>Law</strong> in Evidence at Santa Clara University. He was the<br />

California District Attorney’s Association Instructor of<br />

the Year for 2004.<br />

PARTNERS IN PROTECTING CHILDREN 75


Speaker Biographies<br />

Sharon Girling<br />

<strong>Child</strong> Protection Advocate/Retired Police Offi cer<br />

A Gentle Touch Ltd<br />

Ms. Girling is a retired police officer who spent<br />

the last ten years of her service engaged in policing<br />

child abuse on the Internet. During that time, she<br />

was the case officer for many international high<br />

profile investigations including Operation Cathedral,<br />

Operation Ore, Operation Alpine and Operation<br />

Landmark. Each of these cases resulted in safeguarding<br />

and rescuing children from abuse and abusers. They<br />

also concluded with successful convictions of sex<br />

offenders. Ms. Girling developed the initial child<br />

abuse image database and pioneered the creation of the<br />

International <strong>Child</strong> Sexual Exploitation image database<br />

held at Interpol. She is currently the <strong>Child</strong> Protection<br />

Advocate for the new top level domain .XXX and is<br />

advising them on issues regarding the protection of<br />

children.<br />

Melinda Gobron<br />

Detective<br />

Sacramento Valley Hi-Tech Crimes Task Force, Internet<br />

Crimes Against <strong>Child</strong>ren<br />

Detective Gobron has 12 years of law enforcement<br />

experience and has been assigned to the Sacramento<br />

Valley Hi-Tech Crimes Task Force, Internet Crimes<br />

Against <strong>Child</strong>ren (<strong>ICAC</strong>) for the last four years. This<br />

detail is a federal and state-funded task force managed<br />

by the Sacramento Sheriff’s Office with agents<br />

from federal, state, and local agencies. The <strong>ICAC</strong><br />

investigates online child exploitation crimes, including<br />

child pornography, enticement, and sex trafficking.<br />

She holds a Bachelor’s Degree in Sociology from the<br />

University of California, Davis.<br />

Tony Godwin<br />

Detective<br />

Garland Police Department Internet Crimes Against<br />

<strong>Child</strong>ren<br />

Detective Godwin has been with the Garland Police<br />

Department for 18 years; he has spent the last seven<br />

years in Criminal Investigations, specifically Youth<br />

Crimes. Detective Godwin has been a member of<br />

the Northern Texas <strong>ICAC</strong> Task Force for the past 3<br />

1/2 years, conducting proactive online undercover<br />

investigations into the sexual exploitation of children<br />

on the internet. He is a Master Peace Officer in the<br />

State of Texas, and has had great success apprehending<br />

sexual offenders from across the nation who are willing<br />

to travel sexually exploit children. Detective Godwin<br />

is also a TCLEOSE Instructor, and has presented<br />

for numerous law enforcement agencies, and other<br />

professions related to this line of work.<br />

Matthew Gray<br />

Lieutenant<br />

Houston Metro Internet Crimes Against <strong>Child</strong>ren Task<br />

Force<br />

Lieutenant Gray is with the Pasadena ISD Police<br />

Department and is also the Commander of the<br />

Houston Metro Internet Crimes Against <strong>Child</strong>ren<br />

Task Force. The Houston Metro <strong>ICAC</strong> is one of<br />

61federally-funded task forces consisting of local and<br />

federal law enforcement agencies united to combat<br />

child exploitation. Lt. Gray served as a Sergeant in<br />

an Airborne Infantry Unit in Fort Benning, Georgia.<br />

He has received extensive training in computer<br />

forensics, online investigations, behavioral analysis,<br />

and interviewing.<br />

Steven Grocki<br />

Assistant Deputy Chief<br />

U.S. Department of Justice, <strong>Child</strong> Exploitation and<br />

Obscenity Section<br />

Mr. Grocki is currently the Assistant Deputy Chief<br />

for Litigation at the Department of Justice’s <strong>Child</strong><br />

Exploitation and Obscenity Section (CEOS) in<br />

Washington, DC. In his capacity as Assistant Deputy<br />

Chief for Litigation, Mr. Grocki supervises CEOS’<br />

15 trial attorneys. CEOS’ team of attorneys actively<br />

prosecutes all federal crimes relating to the exploitation<br />

of children, leads large national and international child<br />

76 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

exploitation investigations, and provides advice and<br />

training to federal prosecutors and law enforcement.<br />

Bill Harmon<br />

Associate General Counsel, Digital Crimes Unit<br />

Microsoft<br />

Attorney Harmon is an Associate General Counsel<br />

for the Microsoft Digital Crimes Unit. He leads<br />

a worldwide team focused on developing and<br />

implementing groundbreaking legal and technological<br />

solutions to help protect children online and to help<br />

stop ID theft, malicious code, botnets, spam, spyware,<br />

click fraud and other forms of online fraud.<br />

Kellen Harwell<br />

Electrical Engineer<br />

U.S. Naval Research Lab<br />

Mr. Harwell is an electrical engineer in the Mobile<br />

Systems Security section of the U.S. Naval Research<br />

Laboratory (NRL) in Washington, D.C. In four years<br />

at NRL, he has developed inertial navigation units,<br />

collection systems, and geolocation algorithms. Mr.<br />

Harwell obtained both his Bachelors and Masters of<br />

Science in Electrical Engineering from Oklahoma<br />

State University.<br />

Michael Hill<br />

Sergeant<br />

Massachusetts State Police<br />

Sergeant Hill has been a Massachusetts State Police<br />

Officer since 1993. He has worked in the State<br />

Police Berkshire Detective Unit from 1995 to 2011<br />

investigating major crimes, including computer/<br />

Internet related crimes. Sergeant Hill has been a<br />

member of the Massachusetts Internet Crimes Against<br />

<strong>Child</strong>ren Task Force since 2000 and is the current<br />

Massachusetts <strong>ICAC</strong> Task Force Commander. He has<br />

had extensive training and experience with the seizure<br />

and forensic examination of computers. Additionally,<br />

he has been involved in peer to peer investigations<br />

since 2004, which resulted in numerous search<br />

warrants, arrests, and convictions. Sergeant Hill is<br />

currently proactively investigating child exploitation<br />

on the Gnutella, eD2K, and Ares networks.<br />

Graham Hill<br />

Director<br />

KLIK Protective Services<br />

Mr. Hill retired from the Police Service in 2011 after<br />

30 years as an Operational Detective and a Senior<br />

Investigating Officer. Between 2007 and 2011, he<br />

was Head of the Behavior Analysis for the <strong>Child</strong><br />

Exploitation <strong>On</strong>line Protection Centre (CEOP). He is<br />

a Behavioral Profiler who has given operational advice<br />

on over 150 serious sexual crimes against children and<br />

conducted peer reviews for law enforcement agencies<br />

in relation to Missing, Trafficked, Abducted and<br />

Murdered <strong>Child</strong>ren. He is currently a Ph.D student<br />

at Durham University where his research is focused<br />

on the Behavior of Perpetrators of Sexually Motivated<br />

Non-Familial <strong>Child</strong> Abduction/Murder. He is also<br />

an Honorary Lecturer in the School of Psychology<br />

at Birmingham University and the School of Applied<br />

Sciences at Durham.<br />

Tia Hoffer<br />

Supervisory Special Agent<br />

Federal Bureau of Investigation, Behavioral Analysis<br />

Unit III<br />

Supervisory Special Agent Hoffer has been with the<br />

FBI for almost 14 years and is currently assigned to<br />

the FBI’s Behavioral Analysis Unit (BAU) III, which<br />

deals specifically with Crimes Against <strong>Child</strong>ren. She<br />

provides operational support to federal, state, and local<br />

law enforcement through case consultations and onsite<br />

deployments. She has trained criminal justice and<br />

mental health professionals in matters involving child<br />

abductions, child homicides, and sexual victimization<br />

of children. She is the Principal Investigator on research<br />

projects like Suicide Among <strong>Child</strong> Sex Offenders.<br />

Prior to joining the FBI, she conducted psychological<br />

PARTNERS IN PROTECTING CHILDREN 77


Speaker Biographies<br />

assessments, individual and group psychotherapy. She<br />

holds a Doctoral Degree in Clinical Psychology.<br />

James Holdman<br />

Special Agent<br />

Department of <strong>Home</strong>land Security-<strong>Home</strong>land<br />

Security Investigations<br />

Special Agent Holdman has been with the Department<br />

of <strong>Home</strong>land Security for nine years, serving in<br />

Lake Charles, Louisiana and now at the Office of<br />

the Resident Agent in Charge, Springfield, Missouri.<br />

Prior to joining DHS, he served as a Deputy Sheriff<br />

in Washington County, Missouri for three years and a<br />

Criminal Investigator for the State of Missouri for 12<br />

years. Special Agent Holdman is assigned to the <strong>Child</strong><br />

Sex Tourism (CST) Jump Team for the Cyber Crimes<br />

Center (C3), and has conducted undercover CST<br />

operations in Costa Rica and along the Mexican border.<br />

He has also instructed CST classes to the Cambodian<br />

<strong>National</strong> Police in Phnom Penh and Siem Reap.<br />

Colleen Holt<br />

Global Criminal Compliance Manager<br />

Microsoft Global Criminal Compliance<br />

Ms. Holt is a member of Microsoft’s Global Criminal<br />

Compliance team and has been assisting law<br />

enforcement around the world on behalf of Microsoft<br />

since June of 2008. Prior to joining Microsoft, she was<br />

a Senior Investigator with America <strong>On</strong>line’s Public<br />

Safety and Criminal Investigations team from 2005 to<br />

2008. Her criminal compliance work began in 2001<br />

through both Preston Gates and Ellis and then with<br />

Al Gidari of Perkins Coie law firm, where she worked<br />

with several internet service providers and telecom<br />

companies in setting up their criminal compliance<br />

Electronic Communications Privacy Act policies.<br />

Teresa Hughes<br />

Internet Safety & Projects Development Manager<br />

Lucy Faithfull Foundation<br />

Ms. Hughes is the Projects Development & Internet<br />

Safety Manager for the Lucy Faithfull Foundation, the<br />

only UK child protection charity dedicated solely to<br />

reducing the risk of children being sexually abused.<br />

She was formerly a Detective with Surrey Police,<br />

specializing in the investigation of online crimes against<br />

children and the management of sex offenders in the<br />

community. In July 2010, she started a year-long pilot<br />

project with UK law enforcement to assess whether<br />

there was sufficient grounds to promote the use of<br />

e-Safety software for monitoring the computer use of<br />

registered sex offenders. The pilot was a success and<br />

resulted in the software being adopted by a number of<br />

UK police services.<br />

Teresa Huizar<br />

Executive Director<br />

<strong>National</strong> <strong>Child</strong>ren’s Alliance<br />

Ms. Huizar was appointed Executive Director of<br />

<strong>National</strong> <strong>Child</strong>ren’s Alliance on February 26, 2008.<br />

<strong>National</strong> <strong>Child</strong>ren’s Alliance, headquartered in<br />

Washington, DC, is the national association and<br />

accrediting body for 750 <strong>Child</strong>ren’s Advocacy<br />

Centers in the US. Prior to her tenure with NCA,<br />

Ms. Huizar served as the Executive Director of the<br />

Western Regional <strong>Child</strong>ren’s Advocacy Center,<br />

a technical assistance and training center for 200<br />

<strong>Child</strong>ren’s Advocacy Centers and multidisciplinary<br />

teams in 12 Western states. She provides consultation<br />

internationally on effective child abuse intervention,<br />

and has testified before the Senate HELP Committee<br />

on child abuse issues. She is currently a member of the<br />

Advisory Board of the <strong>National</strong> <strong>Child</strong> Traumatic Stress<br />

Network.<br />

Marcia Hurd<br />

Assistant U.S. Attorney<br />

U.S. Attorney’s Office, District of Montana<br />

Attorney Hurd is an Assistant United States Attorney<br />

for the District of Montana, and she has been a<br />

prosecutor for over 20 years. She is Montana’s<br />

Project Safe <strong>Child</strong>hood Coordinator and prosecutes<br />

child abuse cases on Indian reservations, child sexual<br />

exploitation cases as well as cases of sex offenders<br />

who fail to register under SORNA. She serves on the<br />

Attorney General’s Violence Against Women Federal/<br />

78 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

Tribal Prosecution Task Force, helps the FBI present<br />

Forensic Interviewer training for children, and is<br />

involved in victim’s rights issues.<br />

Darcy Katzin<br />

Trial Attorney<br />

U.S. Department of Justice, <strong>Child</strong> Exploitation and<br />

Obscenity Section<br />

Attorney Katzin has been a Trial Attorney with the<br />

Department of Justice, Criminal Division, <strong>Child</strong><br />

Exploitation and Obscenity Section since 2005. Prior<br />

to joining DOJ, she served forsix years as an Assistant<br />

District Attorney in the New York County District<br />

Attorney’s Office, where she was assigned to the <strong>Child</strong><br />

Abuse Bureau.<br />

Phil Keith<br />

Program Director, AMBER Alert <strong>Training</strong> and<br />

Technical Assistance Program<br />

Fox Valley Technical College<br />

Mr. Keith has more than 40 years of experience in the<br />

fields of criminal justice, public safety, and business<br />

administration. He has held numerous high level<br />

policy making positions in law enforcement, public<br />

safety, emergency preparedness management, as well<br />

as numerous local, state, and federal advisory groups.<br />

From 1988 to 2004, Mr. Keith served as the Chief<br />

of Police for the City of Knoxville, Tennessee. Since<br />

his retirement in 2004, he has served as the Program<br />

Director for <strong>Training</strong> and Technical Assistance for the<br />

Department of Justice AMBER Alert Initiative and<br />

maintains a consulting practice with a number of<br />

organizations.<br />

Scott Kelley<br />

US Postal Inspector<br />

United States Postal Inspection Service<br />

Inspector Kelley is a Postal Inspector assigned to the<br />

Boston Division with child exploitation responsibilities<br />

for the New England states, including upstate New<br />

York. Previously, he was a Special Agent with the Naval<br />

Criminal Investigative Service and was responsible for<br />

investigations in the interest of the United States Navy<br />

and Marine Corps to include child sex crimes and sexual<br />

assaults. He was a local police officer in Massachusetts,<br />

assigned to child sex crimes and attended hundreds<br />

of Sexual Assault Information Network interviews.<br />

He has provided trainings and lectures to community<br />

and school-related organizations on symptoms and<br />

methodology of child sex crimes, and has facilitated<br />

trainings to parents, teachers and law enforcement<br />

on the dangers of the Internet and the use of mail to<br />

entice children.<br />

Christopher Kelly<br />

Assistant Attorney General<br />

Massachusetts Attorney General’s Office<br />

Attorney Kelly is the Managing Attorney of the<br />

Cyber Crime Division for the Massachusetts Attorney<br />

General’s Office. In addition to prosecuting and<br />

overseeing investigations of crimes with digital<br />

components, he works with members of the Cyber<br />

Crime Division to design and implement priority<br />

projects and trainings as set forth in the Massachusetts<br />

Strategic Plan for Cyber Crime. Additionally,<br />

Attorney Kelly performs digital forensic examinations<br />

in the Massachusetts Attorney General’s Computer<br />

Forensic Laboratory. Prior to joining the Attorney<br />

General’s Office, he worked in the Suffolk County<br />

District Attorney’s Office where he built the current<br />

Computer Forensic Laboratory. During his tenure<br />

at Suffolk County District Attorney’s Office, he<br />

prosecuted cyber crime, child exploitation, child<br />

sexual and physical abuse cases.<br />

Bryan Kelly<br />

Computer Crime Specialist<br />

<strong>National</strong> White Collar Crime Center (NW3C)<br />

Mr. Kelly is a Computer Crime Specialist with the<br />

<strong>National</strong> White Collar Crime Center in Fairmont,<br />

West Virginia. His duties focus mainly on development,<br />

maintenance, and instruction of computer forensic<br />

course material as he serves as Team Leader for<br />

three of the courses offered. Additionally, Mr. Kelly<br />

PARTNERS IN PROTECTING CHILDREN 79


Speaker Biographies<br />

provides technical assistance to local, state and federal<br />

law enforcement in computer related and computer<br />

forensic forums. He also has experience with testing<br />

and validating new forensic software and hardware<br />

devices and has assisted in the development of the<br />

student CD, self paced learning, on-line and distance<br />

learning modules.<br />

James Kilpatrick<br />

Special Agent/Program Manager<br />

Department of <strong>Home</strong>land Security, <strong>Home</strong>land<br />

Security Investigations<br />

Special Agent Kilpatrick has worked in law enforcement<br />

for 10 years and holds a Bachelor’s Degree in Criminal<br />

Justice. He is currently assigned to the DHS/ICE/<br />

HSI Cyber Crimes Center as a Program Manager in<br />

the <strong>Child</strong> Exploitation Investigations Unit. As a field<br />

agent, he worked on child exploitation cases and as a<br />

computer forensics agent. He successfully investigated<br />

and helped other investigators work hundreds of child<br />

exploitation investigations. He successfully investigated<br />

a complex child exploitation enterprise that resulted<br />

in all of the primary defendants pleading guilty. He<br />

has presented at various conferences/seminars in<br />

the United States as well as internationally. He has<br />

received numerous awards for his work, including<br />

being recognized by NCMEC.<br />

Anne Kong<br />

Flying Squirrel Progam Manager<br />

Navy PMW 130/BAH<br />

Ms. Kong is a Lead Associate from Booz Allen Hamilton,<br />

supporting Navy PMW 130 Computer Network<br />

Defense to provide program management support for<br />

Flying Squirrel Wireless Detection Application.<br />

Kelly Kottas<br />

Special Agent<br />

<strong>Home</strong>land Security Investigations<br />

Special Agent Kottas is 15-year veteran of law<br />

enforcement. She is currently assigned to the Orange<br />

County <strong>Child</strong> Exploitation Task Force under the<br />

direction of the <strong>Home</strong>land Security Investigations<br />

Office of the Assistant Special Agent In Charge, Orange<br />

County, California. Ms. Kottas holds a Bachelor’s<br />

Degree in Criminal Justice from Texas Woman’s<br />

University.<br />

Joe Laramie<br />

Lieutenant, retired<br />

Laramie Consulting<br />

Lt. Laramie retired from Glendale Police Department<br />

and as longtime Missouri <strong>ICAC</strong> Commander in 2010.<br />

He then worked for the Missouri Attorney General as<br />

administrator of the computer lab, focusing on child<br />

exploitation and human trafficking issues. In <strong>2012</strong><br />

he created Laramie Consulting, offering policy and<br />

training resources to law enforcement and schools. He<br />

served on the <strong>ICAC</strong> Executive Committee and liaison<br />

and to Internet safety organizations; NetSmartz,<br />

iKeepSafe and WebWiseKids. He is a nationally-known<br />

speaker on technology safety and cyberbullying, holds<br />

a Bachelor of Science Degree in Criminal Justice<br />

Administration from Bellevue University and is a 2004<br />

FBI <strong>National</strong> Academy graduate.<br />

Jennifer Lee<br />

Senior Program Strategist, CVIP<br />

<strong>National</strong> Center for Missing & Exploited <strong>Child</strong>ren<br />

Ms. Lee is the Senior Program Strategist for NCMEC’s<br />

<strong>Child</strong> Victim Identification Program (CVIP). In 2002,<br />

she assisted in the creation and development of the <strong>Child</strong><br />

Victim Identification Program and eventually served as<br />

Program Manager. Beginning in 2007, she has worked<br />

to help advance the tools used daily within CVIP to<br />

assist law enforcement and prosecutors working child<br />

sexual exploitation cases. Ms. Lee provides assistance<br />

to the unit with policy development and working on<br />

special projects. She also travels across the country<br />

to educate law enforcement officials and policymakers<br />

on the many aspects of online exploitation and<br />

demonstrate critical techniques to help identify child<br />

victims.<br />

80 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

Tony Leonard<br />

Captain<br />

Smyrna Police Department<br />

Captain Leonard has served with the Smyrna Police<br />

Department since 1995 and currently commands the<br />

Criminal Investigations Division within the Smyrna<br />

Police Department. He formed the Smyrna Police<br />

Department’s Computer Crimes Unit, which he<br />

also supervises. He is responsible for overseeing the<br />

investigation of all <strong>ICAC</strong> cases, computer forensic<br />

examinations, and investigations into computer-related<br />

crimes. He began working <strong>ICAC</strong> cases in 2006, and has<br />

conducted many peer-to-peer cases and undercover<br />

chat investigations. Since 1998, Captain Leonard has<br />

served as a part-time instructor at the North Central<br />

Georgia <strong>Law</strong> <strong>Enforcement</strong> Academy, conducting<br />

over 1,800 hours of training. He is a Georgia POSTcertified<br />

Senior Instructor, and has also served as a<br />

guest lecturer at Kennesaw State University.<br />

Ale Levi<br />

Forensic Interview Specialist<br />

<strong>Home</strong>land Security Investigations<br />

Ms. Levi is a Forensic Interview Specialist for ICE<br />

<strong>Home</strong>land Security Investigations. Her responsibilities<br />

include conducting forensic interviews in both English<br />

and Spanish (both domestically and internationally),<br />

consultation and training for ICE Agents, and other<br />

federal, state and local law enforcement, and other<br />

organizations. She is a Licensed Clinical Social Worker<br />

and holds a Master’s Degree in Social Work and in<br />

Forensic Psychology. Prior to HSI, Ms. Levi was the<br />

Manager of the Forensic Interviewing Program and<br />

the Interpreting Program at the Chicago <strong>Child</strong>ren’s<br />

Advocacy Center, where she was responsible for the<br />

collaboration of the multidisciplinary team, conducting<br />

and supervising forensic interviews, and training.<br />

Brian Levine<br />

Professor<br />

Univ. of Massachusetts Amherst<br />

Professor Levine is a Professor in the Department of<br />

Computer Science at the University of Massachusetts<br />

Amherst. He received his Ph.D in Computer<br />

Engineering from the University of California, Santa<br />

Cruz in 1999. His research and teaching focuses on<br />

mobile networks, forensics, and the Internet, and he<br />

has published more than 70 peer-reviewed papers on<br />

those topics. His active funding includes awards from<br />

the <strong>National</strong> Science Foundation, the <strong>National</strong> Institute<br />

of Justice, and the Office of Juvenile Justice. His lab<br />

at UMass is the source of the suite of RoundUp tools<br />

used by law enforcement all over the US for network<br />

investigation of child pornography trafficking. He is<br />

an organizer of the <strong>2012</strong> DFRWS Digital Forensics<br />

Research Conference.<br />

Marc Liberatore<br />

Research Scientist<br />

University of Massachusetts at Amherst<br />

Mr. Liberatore joined the Department of Computer<br />

Science at the University of Massachusetts Amherst as<br />

a Research Scientist in January 2009. Previously, he<br />

served as a Mellon Fellow at Wesleyan University in<br />

Middletown, Connecticut. His research focuses on<br />

network forensics, anonymity systems, peer-to-peer<br />

architectures, and disruption tolerant networking.<br />

His funding includes awards from the Department<br />

of Justice as a PI for the <strong>Child</strong> Protection Research<br />

Program, as well as awards from the <strong>National</strong> Science<br />

Foundation and the <strong>National</strong> Institute of Justice. He<br />

has worked closely with members of the Internet<br />

Crimes Against <strong>Child</strong>ren Task Forces in developing<br />

and deploying tools for investigation of P2P networks.<br />

Doug Lockhart<br />

Detective Constable<br />

<strong>On</strong>tario Provincial Police-<strong>Child</strong> Sexual Exploitation<br />

Section<br />

Detective Constable Lockhart has been a member of the<br />

<strong>On</strong>tario Provincial Police for over twenty-five years.<br />

He has spent the last twelve years as an investigator in<br />

the <strong>Child</strong> Sexual Exploitation Section, which focuses<br />

on the enforcement of Canadian criminal law on<br />

offences of child pornography. Detective Constable<br />

Lockhart has been recognized in courts of <strong>On</strong>tario<br />

PARTNERS IN PROTECTING CHILDREN 81


Speaker Biographies<br />

as an expert in <strong>Child</strong> Pornography recognition and<br />

has been involved in over one thousand cases in his<br />

career. He has taught and provided lectures at both<br />

the <strong>On</strong>tario Police Academy and the Canadian Police<br />

Academy on the best practices of investigations of<br />

child pornography.<br />

Timothy Lott<br />

Director, High-Tech Crime <strong>Training</strong> Services<br />

SEARCH<br />

Mr. Lott is a High-Tech Crime <strong>Training</strong> Specialist in<br />

the High-Tech Crime <strong>Training</strong> Services Department<br />

of SEARCH, The <strong>National</strong> Consortium for Justice<br />

Information and Statistics, where he coordinates and<br />

provides training on high-tech crime investigations and<br />

forensics to local, state, and federal justice and public<br />

safety agencies. He is a former deputy probation officer<br />

with the Sacramento County (California) Probation<br />

Department, and has conducted probation compliance<br />

checks on offenders who have been convicted and<br />

placed on probation for offenses involving the<br />

possession of child pornography, stalking through the<br />

use of social networking sites or cellular devices, and<br />

identity theft.<br />

Cory Louie<br />

Trust & Safety<br />

Google Inc.<br />

Mr. Louie is part of Google’s Trust & Safety team,<br />

responsible for the protection of Google users,<br />

revenue and brand by addressing significant risk,<br />

abuse, fraud and other malicious activity primarily<br />

through investigations. Before joining Google, he was<br />

a Special Agent with the United States Secret Service.<br />

He was trained in the Electronic Crime Special Agent<br />

Program, specializing in the investigation of network<br />

intrusions and cybercrimes. He worked numerous<br />

domestic and international cybercrime investigations<br />

involving e-commerce fraud, phishing, access device<br />

fraud, network intrusions, unauthorized computer<br />

access, hacking, financial fraud and other online<br />

threats.<br />

Brian Lynn<br />

Research Staff<br />

University of Massachusetts Amherst<br />

Mr. Lynn is a member of the Commonwealth<br />

Center for Forensics and Society at the University of<br />

Massachusetts Amherst. He is working on technologies<br />

to prevent child exploitation on the Internet, and<br />

developed the RoundUp eMule tool.<br />

Chris Madsen<br />

Legal Director, U.S. Compliance<br />

Yahoo!<br />

Mr. Madsen is Legal Director, United States Compliance<br />

at Yahoo!, where his responsibilities include advising<br />

on compliance with law enforcement and other thirdparty<br />

requests for user data. Prior to joining Yahoo!,<br />

he spent five years with the Department of Justice<br />

where, among other things, he advised the FBI on the<br />

legal authorities available to obtain user data from<br />

companies like Yahoo!.<br />

Don Mason<br />

Associate Director / Research Professor<br />

<strong>National</strong> Center for Justice and the Rule of <strong>Law</strong>, Univ.<br />

of Mississippi<br />

Attorney Mason is Associate Director of the <strong>National</strong><br />

Center for Justice and the Rule of <strong>Law</strong> (NCJRL )<br />

and a Research Professor of <strong>Law</strong> at the University<br />

of Mississippi. After beginning his law career as a<br />

county prosecutor in Iowa he directed the state<br />

justice department agency and nonprofit association<br />

that jointly provided training and technical assistance<br />

for Iowa prosecutors. Prior to joining the NCJRL in<br />

2003, he was a municipal judge in West Virginia and<br />

worked six years for the <strong>National</strong> White Collar Crime<br />

Center developing legal training related to computer<br />

crime and digital investigations. Besides presenting<br />

at numerous training events each year, he has taught<br />

law school courses on cyber crime, sentencing,<br />

adjudicatory criminal procedure, and Internet crimes<br />

against children.<br />

82 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

Douglas Maughan<br />

Director, Cyber Security Division<br />

DHS Science & Technology Directorate, Cyber<br />

Security Division<br />

Dr. Maughan is the Cyber Security Division Director<br />

in the <strong>Home</strong>land Security Advanced Research<br />

Projects Agency within the Science and Technology<br />

(S&T) Directorate of the Department of <strong>Home</strong>land<br />

Security. He has been at DHS since October 2003 and<br />

is directing Cyber Security R&D activities and staff.<br />

Prior to his appointment at DHS, Dr. Maughan was a<br />

Program Manager at the Defense Advanced Research<br />

Projects Agency (DARPA). He also worked for the<br />

<strong>National</strong> Security Agency (NSA) as a senior computer<br />

scientist. Dr. Maughan received Bachelor’s Degrees in<br />

Computer Science and Applied Statistics from Utah<br />

State University, a Master’s Degree in Computer<br />

Science from Johns Hopkins University, and a Ph.D in<br />

Computer Science from the University of Maryland,<br />

Baltimore County.<br />

Edward McAndrew<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, District of Delaware<br />

Mr. McAndrew has served as an Assistant United States<br />

Attorney and the Project Safe <strong>Child</strong>hood Coordinator<br />

in the U.S. Attorney’s Office for the District of<br />

Delaware since July 2008. He also serves as the CHIP<br />

Coordinator for the District of Delaware. His practice<br />

focuses almost exclusively on computer-facilitated<br />

child exploitation, computer hacking, intellectual<br />

property and fraud offenses. Between October 2006<br />

and July 2008, Mr. McAndrew served as a CEOS Trial<br />

Attorney and a SAUSA in the Cyber Crimes Unit of<br />

the U.S. Attorney’s Office for the Eastern District<br />

of Virginia. Prior to joining the U.S. Department<br />

of Justice in the fall of 2006, Ed was a litigation<br />

partner and the litigation practice group leader in the<br />

Washington, D.C. office of Reed Smith LLP, where he<br />

specialized in technology-related litigation.<br />

Keely McCarthy<br />

Visiting Fellow<br />

Office for Victims of Crime<br />

Ms. McCarthy has been a visiting fellow at the Office<br />

for Victims of Crime, U.S. Department of Justice<br />

since November 2010. Her fellowship focuses on<br />

the broad category of underserved victims of crime,<br />

specifically in the area of federal, military, and Indian<br />

Country programs. She received her Master of Arts<br />

Degree in criminology and criminal justice from<br />

the University of Maryland at College Park and two<br />

Bachelor Degrees, one in justice studies and one in<br />

sociology from Arizona State University in Tempe,<br />

Arizona. Ms. McCarthy’s most recent position was<br />

with the International Association of Chiefs of Police<br />

in Alexandria, Virginia, where she served as project<br />

coordinator for the OVC-funded Enhancing <strong>Law</strong><br />

<strong>Enforcement</strong> Response to Victims project.<br />

Matt McFadden<br />

Sergeant<br />

Clovis Police Department<br />

Sergeant McFadden has over 1,000 hours of computer<br />

crime training and has been conducting computer<br />

forensic investigations for 11 years. He was a parttime<br />

instructor with Guidance Software Inc. (GSI)<br />

for seven years. He maintains computer forensic<br />

certifications as a CFCE through IACIS, EnCE through<br />

GSI, and a CCFT Advanced through HTCN. Sergeant<br />

McFadden received Letters of Commendation from<br />

United States and California Attorney Generals for<br />

his computer forensic work. He has received a Unit<br />

Citation from U.S. Customs, Case of the Year Award<br />

from HTCIA, and Agency of the Year from CSAIA. His<br />

computer forensic work was documented in Caught<br />

in the Web: Inside the Police Hunt to Rescue <strong>Child</strong>ren<br />

from <strong>On</strong>line Predators by Julian Sher.<br />

Cathy McGoff<br />

Google <strong>On</strong>line Operations Legal Senior Manager<br />

Google<br />

Ms. McGoff has managed the Legal Investigations<br />

PARTNERS IN PROTECTING CHILDREN 83


Speaker Biographies<br />

Support team at Google, Inc. since 2005. This team is<br />

responsible for responding to all legal process seeking<br />

user data for the company. Prior to joining Google, she<br />

founded and managed the Compliance team at Yahoo!,<br />

Inc. from 1998-2005.<br />

Lisa Miller<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Northern District of Texas<br />

Attorney Miller is an Assistant United States Attorney<br />

(AUSA) for the Northern District of Texas in Dallas,<br />

Texas. She has been an AUSA with the Department<br />

of Justice since 2001, having started her tenure in<br />

the Western District of Oklahoma in Oklahoma City.<br />

Prior to becoming an AUSA, she was an Assistant<br />

District Attorney for five years at the Oklahoma<br />

County District Attorney’s Office where she became<br />

a member of the Sex Crimes/<strong>Child</strong> Abuse Unit and<br />

prosecuted adult rape, child sexual abuse, physical<br />

abuse, neglect, and murder. She has been prosecuting<br />

Crimes Against <strong>Child</strong>ren, including Project Safe<br />

<strong>Child</strong>hood cases, since 1998.<br />

Michelle Morgan<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Eastern District of Pennsylvania<br />

Attorney Morgan is an Assistant United States<br />

Attorney (AUSA) for the Eastern District of<br />

Pennsylvania. Previously, she was an AUSA in the<br />

Northern District of California, where she served as<br />

that District’s Project Safe <strong>Child</strong>hood Coordinator.<br />

She also was a Trial Attorney in the <strong>Child</strong> Exploitation<br />

and Obscenity Section of the U.S. Department of<br />

Justice in Washington, D.C. from 2002-2005. Attorney<br />

Morgan lectures extensively in the United States and<br />

Eastern Europe on child exploitation prosecutions,<br />

and has conducted several joint investigations with<br />

Russia. Prior to joining the Department of Justice, she<br />

was a patent litigator at Skadden, Arps, and clerked<br />

in the United States District Court in Delaware. She<br />

holds a Juris Doctor, magna cum laude, from Villanova<br />

University, and a Bachelor of Arts Degree in Russian<br />

from Oberlin College.<br />

Kevin Mulcahy<br />

Assistant U.S. Attorney<br />

U.S. Attorney’s Office, Eastern District of Michigan<br />

Attorney Mulcahy is Chief of the General Crimes Unit<br />

in the United States Attorney’s Office for the Eastern<br />

District of Michigan, which handles all crimes against<br />

children, gun crimes, and a smattering of other federal<br />

offenses. He began as an Assistant United States<br />

Attorney in the Southern District of California, where<br />

he focused primarily on border crimes and appellate<br />

work.<br />

Nicholas Newman<br />

Computer Crimes Specialist<br />

<strong>National</strong> White Collar Crime Center (NW3C)<br />

Mr. Newman began his career as a Computer Crimes<br />

Specialist with the <strong>National</strong> White Collar Crime<br />

Center in January of 2006. He contributes to and<br />

regularly instructs NW3C’s Secure Techniques for<br />

<strong>On</strong>site Preview, Basic Data Recovery and Acquisition,<br />

Introduction to Securing <strong>Law</strong> <strong>Enforcement</strong> Networks,<br />

Linux Forensics, and Wireless Network Investigations<br />

computer forensic courses, and is also the lead<br />

developer of NW3C’s TUX4N6 and Forensic<br />

Disk Imager forensic tools. Mr. Newman has also<br />

represented NW3C in the mass media through such<br />

news organizations as USA Today, the MSNBC Today<br />

Show, ABC News, CBS News, and SC Magazine. He<br />

holds a Bachelor of Science Degree in Information<br />

Systems Security (with honors), as well as the A+,<br />

Network+, and CEH certifications.<br />

Wayne Nichols<br />

Detective<br />

Henderson Police Department<br />

Detective Nichols works for the Henderson, Nevada<br />

Police Department and has been in law enforcement for<br />

over nine years. Currently assigned to the department’s<br />

Computer Crime Unit, in addition to being a forensic<br />

84 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

examiner, he also conducts proactive enticement and<br />

P2P investigations. With the success of traditional chat<br />

cases experiencing a decline in recent years, Detective<br />

Nichols has focused efforts on Craigslist. The Craigslist<br />

initiative has been very successful and, since 2009,<br />

the Henderson Police Department has made over 40<br />

enticement arrests, all of which resulted from proactive<br />

efforts. In addition to speaking at conferences about<br />

Craigslist investigations, Detective Nichols also speaks<br />

about the use of Google Voice and how it benefits law<br />

enforcement for proactive investigations.<br />

Mitchell Nixon<br />

Director of <strong>Law</strong> <strong>Enforcement</strong> <strong>Training</strong><br />

TLO<br />

Mr. Nixon was the Commander of the North Florida<br />

<strong>ICAC</strong> Task Force for six years before retiring from the<br />

Gainesville, Florida Police Department. He has served<br />

on various State and <strong>National</strong> efforts, including; Chair<br />

of the Florida Safety Management Steering Committee,<br />

and the United States Department of Transportation,<br />

<strong>National</strong> Highway Traffic Safety Administration, Crash<br />

Criteria Development Committee. He has worked<br />

with TLO since retiring in 2009, and is the Director<br />

of <strong>Law</strong> <strong>Enforcement</strong> <strong>Training</strong>, and a Security Director:<br />

<strong>Law</strong> <strong>Enforcement</strong> Systems.<br />

Kevin O’Brien<br />

CyberTipline, Supervisor<br />

<strong>National</strong> Center for Missing and Exploited <strong>Child</strong>ren<br />

Mr. O’Brien is a CyberTipline Supervisor in the<br />

Exploited <strong>Child</strong>ren Division (ECD) at the <strong>National</strong><br />

Center for Missing and Exploited <strong>Child</strong>ren. He has<br />

handled over 42,000 CyberTipline reports, resulting<br />

in numerous arrests of child sexual offenders. He has<br />

participated in various law enforcement investigative<br />

training programs on high technology crimes,<br />

online child sexual exploitation, and investigative<br />

and analytical skills development. He has provided<br />

extensive technical assistance to law enforcement<br />

in the United States, as well as abroad, on cases of<br />

child sexual exploitation and internet crimes against<br />

children. Mr. O’Brien has been with NCMEC since<br />

January 2006. He holds a Bachelor’s of Science Degree<br />

in Psychology and a Master’s Degree in Forensic<br />

Psychology.<br />

Neil O’Callaghan<br />

Special Agent<br />

Department of <strong>Home</strong>land Security, <strong>Home</strong>land<br />

Security Investigations (HSI)<br />

Cyber Crimes Center, <strong>Child</strong> Exploitation Investigations<br />

Unit<br />

Special Agent O’Callaghan began his career with the<br />

U.S. Customs Service in 1998 and was assigned to<br />

the Office of the Special Agent in Charge in Seattle,<br />

Washington. In Seattle, he was a member of the<br />

Internet Crimes Against <strong>Child</strong>ren Task Force for<br />

approximately 3 ½ years and worked on several child<br />

exploitation cases. Since May of 2009, he has been<br />

assigned to the HSI Cyber Crimes Center, <strong>Child</strong><br />

Exploitation Investigations Unit, and in that time<br />

he has run several national and international cases.<br />

Harry Parsonage<br />

Forensic Triage Specialist<br />

ADF Solutions, Inc.<br />

Mr. Parsonage was a police officer for over 30 years in<br />

the UK before he joined ADF Solutions. He spent 23<br />

years as a detective sergeant managing and investigating<br />

the full range of crime. For the last 10 years of his<br />

service he managed a police digital forensic unit while<br />

being a hands-on forensic practitioner. In 2007, he<br />

introduced a triage process to his DFU. In a period<br />

of just nine months he reduced the backlog from one<br />

year to less than six months. He is well known in the<br />

forensic community for his papers on MSN Artefacts,<br />

Windows Link Files, and Web Browser Session Restore<br />

Forensics and is on the editorial panel for the UK’s<br />

Association of Chief Police Officers Good Practice<br />

Guide for Computer-Based Electronic Evidence and<br />

also the ACPO Guide for Managers of eCrime Units.<br />

PARTNERS IN PROTECTING CHILDREN 85


Speaker Biographies<br />

Terri Patterson<br />

Supervisory Special Agent<br />

Federal Bureau of Investigation, Behavioral Analysis<br />

Unit<br />

Supervisory Special Agent Patterson joined the FBI in<br />

1997 and was assigned to the Miami Division where<br />

she investigated violent crime and crimes against<br />

children. She later supervised the Miami Division’s first<br />

crimes against children squad and served as a Program<br />

Manager at FBI Headquarters before being assigned to<br />

the <strong>National</strong> Center for the Analysis of Violent Crime<br />

(NCAVC). She holds a Ph.D. in Psychology, and has<br />

conducted research in the area of witness memory<br />

and behavioral indicators of deception and is currently<br />

engaged in research on the behavioral aspects of child<br />

prostitution and international child sex tourism. She<br />

has trained law enforcement officers and prosecutors<br />

in the United States and abroad.<br />

David Peifer<br />

Lieutenant<br />

Delaware County District Attorney’s Office<br />

Lieutenant Peifer is the Pennsylvania <strong>ICAC</strong> Task<br />

Force Commander and is responsible for conducting<br />

undercover online investigations, responding to<br />

complaints regarding children sexually exploited<br />

via the Internet, conducting community education<br />

programs and monitoring of the Internet for the<br />

bartering in child pornography. He has been a law<br />

enforcement officer for 34 years and the supervisor<br />

of the Delaware County District Attorney’s Criminal<br />

Investigation Division’s <strong>Child</strong> Abuse Unit for 13 years.<br />

During this time he has had occasion to investigate<br />

hundreds of incidents of child abuse, including child<br />

sexual abuse, and child pornography. Lieutenant Peifer<br />

attended West Chester University and is a graduate<br />

of the 174th session of the FBI <strong>National</strong> Academy in<br />

Quantico, Virginia.<br />

John Penn<br />

Senior Solutions Architect<br />

Adobe Systems<br />

Mr. Penn is Senior Solutions Architect for <strong>Law</strong><br />

<strong>Enforcement</strong> Technologies at Adobe Systems<br />

Incorporated in San Jose, California. He spent<br />

11 years at Adobe as a Senior Computer Scientist<br />

working on Photoshop before changing his focus to<br />

the development of tools, techniques and training<br />

for law enforcement. He is particularly focused on<br />

advancing victim identification tools and techniques.<br />

Mr. Penn has spent a great deal of time focusing on<br />

Internet crimes against children and the role industry<br />

can play in its prevention, as well as working to foster<br />

better communication between law enforcement and<br />

industry.<br />

Kurt Petro<br />

Computer Crime Specialist<br />

<strong>National</strong> White Collar Crime Center (NW3C)<br />

Mr. Petro has been a Computer Crime Specialist with<br />

the <strong>National</strong> White Collar Crime Center’s (NW3C)<br />

Computer Crime Section for 5 years. He is the Team<br />

Lead for the Macintosh and iDevice curriculum,<br />

NTOS, and BDRA. He also teaches a number of the<br />

other CCS courses, including NTFS, IDRA, an STOP.<br />

Prior to his tenure at NW3C, he worked for 2 years<br />

at Hewlett Packard providing computer forensic,<br />

eDiscovery, data recovery, and incident response<br />

services to HP and outside clients. He was also a<br />

non-sworn forensic examiner for McKeesport Police<br />

Department for 4 years. He has also earned a number<br />

of certifications during his career; including GCFA,<br />

CFCE, MCSE, Network +, and A +.<br />

Peipei Pollmann<br />

Team Lead<br />

Google<br />

Ms. Pollmann specializes in child safety for Google’s<br />

Legal Removals team. Prior to joining the legal team<br />

in May 2011, she had been a Senior Policy Specialist<br />

for Google’s consumer products since 2006. As a<br />

86 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

co-founder of the User Policy team, she developed<br />

content policies on issues, such as pornography, hate<br />

speech, violence, bullying and impersonation, and<br />

worked with cross-functional teams to operationalize<br />

these policies and prevent abuse, and combat abuse on<br />

consumer products.<br />

David Porter<br />

Chief<br />

DeWitt Police Department<br />

Chief Porter is a 23 year veteran of law enforcement<br />

who began his career with the Flint Police Department<br />

and retired in 2010 to accept the position of Chief of<br />

Police with the City of DeWitt, Iowa. Chief Porter<br />

holds an Associate’s Degree in Criminal Justice<br />

from Mott College, a Bachelor’s Degree in Public<br />

Administration from Eastern Michigan University<br />

and is pursuing a Master’s Degree at the University of<br />

Oklahoma. He is also a graduate of the 228th session<br />

of the FBI <strong>National</strong> Academy and the Eastern Michigan<br />

University School of Police Staff and Command. Chief<br />

Porter is a member of the Police Executive Research<br />

Forum, The Iowa Police Executive Forum and the<br />

International Association of Chiefs of Police where he<br />

serves as chairman of the Victim Services Committee.<br />

D. Matthew Powell<br />

Trooper<br />

Pennsylvania State Police<br />

Trooper Powell is a computer crime investigator<br />

and certified forensic examiner employed by the<br />

Pennsylvania State Police Computer Crime Unit. He<br />

has conducted proactive online investigations into the<br />

sexual exploitation of children, and has over 15 years<br />

on the job. He has attained CFCE, EnCE and ACE<br />

certifications and also conducts forensic examinations<br />

for local, state and federal law enforcement<br />

agencies. Trooper Powell has been conducting online<br />

investigations since 2005 and instructs the RoundUp<br />

Gnutella, eMule and Ares courses of instruction. He<br />

is a member of the State Police Computer Crime Task<br />

Force and the Pittsburgh High Tech Task Force.<br />

Kyle Reardon<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Eastern District of California<br />

Attorney Reardon is the Project Safe <strong>Child</strong>hood<br />

Coordinator for the Eastern District of California. He<br />

has been with the office since 2007 and has prosecuted<br />

child exploitation cases for the past three years. His<br />

caseload also includes white collar fraud. Prior to<br />

joining the United States Attorney’s Office, he clerked<br />

for the Honorable Gregory G. Hollows and the<br />

Honorable John J. Moulds, United States Magistrate<br />

Judges in the Eastern District of California. He also<br />

served 6 years in the United States Army JAG Corps,<br />

was a prosecutor for 3 ½ years in Texas and Germany,<br />

and also served as Command Judge Advocate for Special<br />

Operations Command, Europe. Attorney Reardon has<br />

a law degree from the University of Virginia, and a<br />

Bachelor’s Degree from Centre College.<br />

Jeff Rich<br />

Detective/Task Force Offi cer<br />

Federal Bureau of Investigation<br />

Detective Rich has been a Police Officer for the Plano,<br />

Texas Police Department for 19 years and is assigned<br />

to the Criminal Investigations Division and the FBI’s<br />

Innocent Images <strong>National</strong> Initiative Task Force, where<br />

he investigates and instructs on the exploitation of<br />

children over the Internet. Detective Rich has received<br />

numerous awards and honors for his investigations<br />

and has assisted in the development of a teaching<br />

curriculum for child abuse investigators, which is<br />

taught to police officers across Texas.<br />

Tiffany Rivera<br />

<strong>Training</strong> and Technical Assistance Coordinator<br />

Girls Educational & Mentoring Services<br />

Ms. Rivera, as GEMS’ <strong>Training</strong>/Technical Assistance<br />

Coordinator, provides training and technical assistance<br />

through the agency’s Victim, Survivor, Leader (VSL)<br />

curriculum throughout the United States. Prior to<br />

joining GEMS’ <strong>Training</strong> Department, Ms. Rivera was<br />

a GEMS Youth Outreach Worker from 2008 to 2011,<br />

PARTNERS IN PROTECTING CHILDREN 87


Speaker Biographies<br />

during which she facilitated outreach to hundreds of<br />

young people in detention facilities and area schools,<br />

educating them on the commercial sexual exploitation<br />

and domestic trafficking of children. She has presented<br />

on CSEC and youth organizing in a diverse array of<br />

venues, including the New York Women’s Foundation<br />

Reproductive and Economic Justice Conference, and<br />

a congressional briefing in 2009. A powerful speaker,<br />

she has conducted interviews with The New York<br />

Times and Hot 97 Radio.<br />

Richard Robertson<br />

Oak Ridge <strong>National</strong> Laboratory<br />

Mr. Robertson currently works at Oak Ridge <strong>National</strong><br />

Laboratory with the Global Security Directorate<br />

assisting in national security programs and aiding<br />

Dr. Chris Boehnen and his team in their efforts to<br />

develop tools to assist law enforcement in the hunt for<br />

and prosecution of child predators. Prior to that, he<br />

served in the U.S Army for over 20 years. He served<br />

in combat in the Middle East during Operation Desert<br />

Shield/Desert Storm and then completed two combat<br />

tours with U.S Army Special Operations Command in<br />

Operation Iraqi Freedom. His third tour was cut short<br />

after being wounded in western Iraq.<br />

Andrew Rosen<br />

CEO / CTO<br />

ASR Data Acquisition & Analysis<br />

Mr. Rosen is a Forensic Computer Scientist who offers<br />

unique litigation support services to the legal, law<br />

enforcement and investigative communities. With over<br />

20 years of experience in the recovery of computer<br />

data and forensic examination, he regularly provides<br />

expert testimony in federal and state courts. Along<br />

with training attorneys and law enforcement officials<br />

in computer investigation techniques, he frequently<br />

speaks and writes on emerging matters in the field.<br />

Mr. Rosen has a worldwide reputation for developing<br />

cutting-edge computer crime investigative tools and<br />

is frequently consulted by other professionals in the<br />

industry.<br />

Matthew Roth<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Eastern District of Michigan<br />

Attorney Roth is currently the Deputy Chief of the<br />

General Crimes Unit of the United States Attorney’s<br />

Office for the Eastern District of Michigan. He<br />

primarily handles cases involving the Department of<br />

Justice’s Project Safe <strong>Child</strong>hood initiative. Prior to<br />

joining the United States Attorney’s Office, he was<br />

the Executive Staff Attorney at the Oakland County<br />

Prosecutor’s Office and spent over four years as<br />

a member of the <strong>Child</strong> Sexual Assault Unit which<br />

specialized in the investigation and prosecution of<br />

the sexual assaults of children, vulnerable victims,<br />

child pornography, and child victims of on-line sexual<br />

predators. Now in his 14th year as a prosecutor, he has<br />

prosecuted hundreds of felony cases in both state and<br />

federal courts.<br />

Miles Rutkowski<br />

Legal Assistant, <strong>On</strong>line Product Support<br />

Google Inc.<br />

Mr. Rutkowski graduated from Stanford University<br />

with a Bachelor of Arts in Political Science. He is a<br />

member of Google’s Legal <strong>On</strong>line Product Support<br />

team, where the team’s mission is to provide highquality<br />

support for incoming legal removal requests<br />

and uphold Google’s greater mission of making<br />

information “universally accessible and useful.” He<br />

has given trainings and presentations at the <strong>National</strong><br />

Strategy Conference on <strong>Child</strong> Exploitation (San<br />

Jose, CA, 2011) and the 23rd Annual Crimes Against<br />

<strong>Child</strong>ren Conference (Dallas, TX, 2011). He also<br />

represents Google as a liaison to the <strong>National</strong> Center<br />

for Missing & Exploited <strong>Child</strong>ren, Internet Watch<br />

Foundation, INTERPOL, and Technology Coalition.<br />

Linda Seabrook<br />

Attorney Advisor<br />

United States Department of Justice<br />

Executive Office for U.S. Attorneys<br />

Attorney Seabrook is an Attorney Advisor on the<br />

88 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

Victim-Witness Staff for the Executive Office for<br />

United States Attorneys. In this role, she provides<br />

program support, legal and policy guidance and<br />

support, and training for the 94 United States<br />

Attorneys’ offices on the Crime Victims’ Rights Act<br />

(CVRA), the Attorney General Guidelines for Victim<br />

and Witness Assistance, and other legal issues affecting<br />

the provision of federal victim and witness assistance<br />

and services. She received her Bachelor of Arts Degree<br />

from the University of Virginia, and obtained her law<br />

degree from the University of South Carolina in 2002.<br />

Originally from Charleston, South Carolina, she began<br />

her legal career as an Assistant Solicitor with the Ninth<br />

Circuit Solicitor’s Office as part of a federal/state<br />

Project Safe Neighborhoods Task Force.<br />

Crystal Sedevie<br />

Investigator<br />

Holmen (Wisconsin) Police Department<br />

Investigator Sedevie joined the Holmen Police<br />

Department in 1999, where she received special<br />

training in sexual assault and child abuse investigations,<br />

including forensic interviewing of child victims. She has<br />

also received specialized training from the Wisconsin<br />

<strong>ICAC</strong> Task Force, OJJDP, NCMEC & NDAA. In 2006,<br />

Investigator Sedevie co-founded the Coulee Region<br />

<strong>Child</strong>ren’s Internet Protection Task Force (CRCIPTF),<br />

a multi-jurisdictional, non-profit task force formed to<br />

help combat the online exploitation of local children.<br />

The CRCIPTF has addressed more than 15,000<br />

children and adults on Internet safety. Investigator<br />

Sedevie has participated in over 200 <strong>ICAC</strong>-related<br />

cases. In 2008, she was awarded the WI <strong>ICAC</strong> <strong>Law</strong><br />

<strong>Enforcement</strong> Award. Investigator Sedevie joined<br />

the FBI Cyber Crime Task Force in 2011, and is also<br />

sworn as a Special Deputy US Marshal and holds FBI<br />

credentials.<br />

Joy Shelton<br />

Crime Analyst<br />

Federal Bureau of Investigation<br />

Ms. Shelton began her career with the FBI in 1998 and<br />

joined the Behavioral Analysis Unit in 1999. Currently,<br />

she is a Crime Analyst within the FBI’s Behavioral<br />

Analysis Unit III – Crimes Against <strong>Child</strong>ren. She serves<br />

as the Principal Researcher for the FBI’s research on<br />

maternal filicide and has co-authored three articles. She<br />

is also a co-researcher for the Suicide Among <strong>Child</strong> Sex<br />

Offenders project. In addition, she provides analytical<br />

support for other crimes against children research and<br />

operational support for investigations. She presents at<br />

a wide variety of national crimes against children and<br />

child abuse training venues and is also an instructor at<br />

the FBI’s <strong>National</strong> Academy at Quantico, Virginia.<br />

Diane Siegel<br />

Forensic Interview Specialist<br />

Department of <strong>Home</strong>land Security, <strong>Home</strong>land<br />

Security Investigations<br />

Ms. Siegel has worked in the child welfare and victim<br />

assistance fields since 1995. Currently, she is a Forensic<br />

Interview Specialist with DHS ICE <strong>Home</strong>land Security<br />

Investigations (HSI). She conducts victim sensitive<br />

forensic interviews of children and adults involved<br />

in domestic and/or international human trafficking,<br />

child exploitation and technology facilitated crimes.<br />

Before joining the HSI forensic interview team,<br />

she was the Victim Assistance Specialist for the HSI<br />

SAC Philadelphia office covering Pennsylvania, West<br />

Virginia and Delaware. Prior to HSI, she was a bilingual<br />

forensic interviewer, clinical advocate and outreach<br />

manager at the Chicago <strong>Child</strong>ren’s Advocacy Center.<br />

She also supervised a local foster care program for<br />

several years and was a grief and loss support specialist.<br />

Camille Sparks<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Northern District of Texas<br />

Attorney Sparks has been an Assistant United States<br />

Attorney for the Northern District of Texas since<br />

2005, where she is also the Project Safe <strong>Child</strong>hood<br />

Coordinator. Her caseload is exclusively child<br />

exploitation cases. She has spoken at several different<br />

venues on sentencing issues, including the <strong>National</strong><br />

Advocacy Center, Dallas Crimes Against <strong>Child</strong>ren<br />

and <strong>National</strong> Strategy Conference on Combating<br />

PARTNERS IN PROTECTING CHILDREN 89


Speaker Biographies<br />

<strong>Child</strong> Exploitation. Prior to her tenure as a federal<br />

prosecutor, she was an Assistant Criminal District<br />

Attorney for the Tarrant County District Attorney’s<br />

Office in Fort Worth, Texas for 10 years. She was a<br />

criminal court chief and tried over 100 jury trials.<br />

Attorney Sparks is board certified in criminal law in<br />

the State of Texas.<br />

Heather Steele<br />

CEO<br />

The Innocent Justice Foundation<br />

Ms. Steele is the CEO of the Innocent Justice<br />

Foundation, a non-profit founded in 2007 to maximize<br />

child pornography investigative capacity in the United<br />

States, and thereby significantly reduce child sexual<br />

abuse. She earned her MBA from the University<br />

of Chicago and ran a $200 million product line in<br />

the corporate world before bringing her analytical<br />

background to bear in bringing justice to sexually<br />

abused children and preventing future sexual assault.<br />

She seeks funding for law enforcement agencies<br />

pursuing child pornography investigations nationwide,<br />

educates the public on child pornography, and has<br />

worked to develop a mental health and wellness<br />

initiative to support professionals exposed to child<br />

pornography at work.<br />

Daniel Steele<br />

Sergeant<br />

Denver Police Department<br />

Sergeant Steele has been a Denver Police Officer for<br />

13 years and is currently assigned as the Supervisor of<br />

the FBI Rocky Mountain Safe Streets, Innocence Lost<br />

Task Force. He has served in specialized units including<br />

the Gang Bureau, Street Crimes Attack Team and has<br />

been assigned as a Detective and Sergeant to the Vice/<br />

Drug Control Bureau. He is deputized as a Special<br />

Deputy United States Marshal to investigate crimes of<br />

human sex trafficking and child sexual exploitation.<br />

He has drafted Denver Police Policy and Procedure<br />

concerning prostitution, human sex trafficking, asset<br />

forfeiture and created an eight-hour Sex Trafficking<br />

Investigations course for Colorado law enforcement<br />

personnel.<br />

Derek Stigerts<br />

Detective/Task Force Offi cer<br />

Sacramento Police Department/FBI Task Force<br />

Detective Stigerts has been a police officer for 21<br />

years with the Sacramento Police Department, the<br />

last seven years in the Detective Division. In 2006, he<br />

became a full- time member of the Sacramento FBI<br />

Division’s Innocence Lost Task Force. The Task Force’s<br />

main responsibility is investigating domestic sex<br />

trafficking of children cases, prostituted juveniles, and<br />

prosecuting those responsible for their exploitation.<br />

Detective Stigerts is an instructor at the FBI’s Crimes<br />

Against <strong>Child</strong>ren, Juvenile Prostitution Forensic<br />

Interviewing Course, and he has presented at other<br />

federal and state trainings on domestic sex trafficking.<br />

He has qualified and testified as an expert in federal<br />

court in California, Texas, and Nevada as well as in<br />

California state court on various prostitution and sex<br />

trafficking topics.<br />

Ashley Stockdale<br />

Product Manager, Forensic Solutions<br />

Guidance Software, Inc.<br />

Ms. Stockdale has worked at Guidance Software<br />

on the EnCase Forensic product line for the past<br />

eight years. She currently is the Product Manager<br />

for EnCase Forensic, EnCase Enterprise, as well as<br />

EnCase Portable. As Product Manager, she regularly<br />

meets with customers, delivers training, and presents<br />

on topics related to computer forensics.<br />

Elaine Stolte<br />

Executive Director<br />

The <strong>Child</strong>ren’s Assessment Center<br />

Ms. Stolte is the Executive Director of The <strong>Child</strong>ren’s<br />

Assessment Center (CAC) in Houston, Texas. The<br />

CAC is an advocacy center with 44 partner agencies,<br />

23 co-housed on site, and an annual budget of $7<br />

million. The CAC is located in Harris County, which<br />

is the third largest county in the US. Prior to her<br />

employment with the CAC, she managed the 228th<br />

District Court for the Honorable Ted Poe (currently<br />

90 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

a U.S. Congressman) for 18 years. Her commitment<br />

to the improvement of the criminal justice system<br />

has led to a number of new legislative initiatives. A<br />

passionate speaker about educating multidisciplinary<br />

child abuse teams, Ms. Stolte has enjoyed training<br />

many groups throughout the United States, as well as<br />

other countries, on strategic planning and managing<br />

an effective public/private partnership.<br />

Joe Sullivan<br />

Forensic Psychologist<br />

Mentor Forensic Services<br />

Dr. Sullivan is a forensic psychologist and Director of<br />

Mentor Forensic Services, an organization specializing<br />

in providing consultancy and training in psychological<br />

profiling, behavior analysis and child protection.<br />

He works as a consultant to law enforcement and<br />

specializes in assisting investigations into serious<br />

sexual crimes against children. He has received a Chief<br />

Constables Commendation for his contribution to the<br />

investigation into the sexually-motivated abduction<br />

and murder of a child in 2001. He is engaged in<br />

longitudinal research of sexual offenders and offers<br />

insights into the thinking and behavior of offenders.<br />

Michael Sullivan<br />

Assistant United States Attorney<br />

U.S. Attorney’s Office, Northern District of Ohio<br />

Attorney Sullivan has been an Assistant United States<br />

Attorney in the Northern District of Ohio since 2003,<br />

where he also serves as the Project Safe <strong>Child</strong>hood<br />

Coordinator. Previously, he was an Assistant County<br />

Prosecutor in the Cuyahoga County Prosecutor’s<br />

Office from 1996-2003, where he was assigned to<br />

the Major Trial Unit - <strong>Child</strong> Victim Section and was<br />

the Director of the Northeast Ohio Internet Crimes<br />

Against <strong>Child</strong>ren Task Force. Prior to that, he was<br />

an Assistant District Attorney in the Suffolk County<br />

District Attorney’s Office in New York from 1988-<br />

2003. He is a graduate of Fordham University School<br />

of <strong>Law</strong> and the University of Notre Dame.<br />

Catherine Sweeney<br />

INTERPOL Analyst<br />

INTERPOL Washington, US Department of Justice<br />

Ms. Sweeney is an analyst in the Human Trafficking and<br />

<strong>Child</strong> Protection Division of INTERPOL Washington.<br />

Since the division began in October 2010, she has been<br />

responsible for implementing and developing projects<br />

aimed at protecting children from exploitation on the<br />

Internet. Recently, she initiated an information-sharing<br />

project in collaboration with US law enforcement,<br />

targeting alleged sex tourists.<br />

Jim Tanner<br />

KBSolutions<br />

Dr. Tanner earned his Ph.D. from the University<br />

of Illinois with a specialization in Cognitive Social<br />

Psychology and Criminal Justice. He is sworn staff<br />

in Colorado and has worked with sex offenders for<br />

more than 41 years in almost every capacity within the<br />

justice system. He teaches at more than 20 conferences<br />

a year and trains thousands of professionals annually.<br />

Dr. Tanner is a nationally-recognized authority on sex<br />

offender cognitive sets. Additionally, he is a computer<br />

forensic examiner who has examined more than<br />

1,500 sex offenders’ computers and was a pioneer<br />

in managing convicted sex offenders computer use.<br />

He brings a unique combination of cognitive social<br />

psychology, corrections, discourse analysis and<br />

computer forensics to his fast paced, information filled<br />

presentations.<br />

Elizabeth Tow<br />

High-Tech Crime <strong>Training</strong> Specialist<br />

SEARCH, Inc<br />

Ms. Tow is a High-Tech Crime <strong>Training</strong> Specialist in<br />

the High-Tech Crime <strong>Training</strong> Services department of<br />

SEARCH where she coordinates and provides training<br />

on high-tech crime investigations and forensics<br />

to local, state and federal justice and public safety<br />

agencies. She provides technical assistance to law<br />

enforcement agencies in active cases, prepares training<br />

curricula, teaches SEARCH investigative courses and<br />

speaks at conferences throughout the United States.<br />

PARTNERS IN PROTECTING CHILDREN 91


Speaker Biographies<br />

Before joining SEARCH in 2010, she spent five years<br />

in local law enforcement in two states, as a Public<br />

Safety Dispatcher for the Grass Valley, California and<br />

the Helena, Montana Police Departments.<br />

Eric Trest<br />

Special Agent<br />

Naval Criminal Investigative Service - DoD<br />

Representative to NCMEC<br />

Special Agent Trest has been with the Naval Criminal<br />

Investigative Service since 2005. He is currently<br />

assigned as the Department of Defense Representative<br />

to the <strong>National</strong> Center for Missing & Exploited<br />

<strong>Child</strong>ren. He has taught at such venues as the Dallas<br />

Crimes against <strong>Child</strong>ren Conference, Department<br />

of Defense Cyber Crimes Conference, United States<br />

Attorney General’s Project Safe <strong>Child</strong>hood <strong>National</strong><br />

Conference, United States Marshals Sex Offender<br />

Investigators Course, United States Army Criminal<br />

Investigations Command Digital Forensic Examiners<br />

Conference, US Army <strong>Child</strong> Abuse Prevention<br />

and Investigative Techniques Course, Silicon Valley<br />

Internet Crimes Against <strong>Child</strong>ren Conference, and<br />

the <strong>National</strong> Strategy Conference on Combating<br />

<strong>Child</strong> Exploitation.<br />

Allison Turkel<br />

Senior Policy Advisor<br />

United States Department of Justice SMART Office<br />

Attorney Turkel serves as a senior policy advisor in<br />

the SMART (Sex Offender Sentencing, Monitoring,<br />

Apprehending, Registering and Tracking) Office for<br />

the United States Department of Justice, Office of<br />

Justice Programs. Prior to coming to the SMART<br />

office, she served as the Director of the <strong>National</strong><br />

District Attorneys Association’s <strong>National</strong> Center for<br />

Prosecution of <strong>Child</strong> Abuse. Prior to joining NCPCA,<br />

she was a prosecutor for most of her career in the New<br />

York County District Attorney’s Office and for 1 ½<br />

years in McLean County, Illinois. Prior to becoming<br />

a prosecutor, she was a police officer for eight years.<br />

Emily Vacher<br />

<strong>Law</strong> <strong>Enforcement</strong> Relations Lead - North & South<br />

America<br />

Facebook<br />

Ms. Vacher joined Facebook in 2011 as the <strong>Law</strong><br />

<strong>Enforcement</strong> Relations Lead for North & South<br />

America. She is responsible for managing law<br />

enforcement relations, including incoming requests<br />

and outgoing referrals, as well as law enforcement and<br />

security policy matters. Prior to joining Facebook,<br />

she was a Special Agent with the Federal Bureau of<br />

Investigation for more than a decade, leading a broad<br />

range of federal investigations. Specializing in crimes<br />

against children matters, she was a member of the<br />

<strong>Child</strong> Abduction Rapid Deployment Team (CARD)<br />

and served as a supervisor in the Undercover and<br />

Sensitive Operations Unit at FBI headquarters. Prior<br />

to the joining the FBI, she was an attorney in private<br />

practice in New York.<br />

Jim Valley<br />

Investigator<br />

Door County Sheriff’s Department<br />

Investigator Valley is employed by the Door County<br />

Sheriff’s Department in Wisconsin. He developed, and<br />

is in charge of, a multi-jurisdictional <strong>ICAC</strong> task force<br />

along with a Computer Forensics Lab that supports<br />

cases from all areas of Wisconsin. In 2007 and <strong>2012</strong>,<br />

he received an award from the Wisconsin Department<br />

of Justice for his work on <strong>ICAC</strong> cases and is the only<br />

state two-time award recipient. He has also received<br />

multiple local awards, and has taught for the <strong>National</strong><br />

<strong>Law</strong> Center, <strong>ICAC</strong> <strong>National</strong> Conference, a local<br />

college and the Wisconsin Department of Justice. He<br />

has appeared as a guest on a live TV talk show and also<br />

on the radio speaking about crimes against children.<br />

Derek VanLuchene<br />

President and Founder<br />

Ryan United<br />

Mr. VanLuchene is the President and Founder of Ryan<br />

United, a non-profit dedicated to his eight year-old<br />

92 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

Brother Ryan, who was abducted and murdered by a<br />

repeat sex offender in 1987. Through this organization,<br />

Mr. VanLuchene works around the country to bring<br />

awareness to communities and <strong>Law</strong> <strong>Enforcement</strong> on<br />

issues of sex offenders and child abduction. He is an<br />

18 year veteran of law enforcement, first serving with<br />

the Conrad Police Department then with the Montana<br />

Division of Criminal Investigation as a Special Agent.<br />

His investigative experience and specialized knowledge<br />

of crimes against children has made him an important<br />

resource to law enforcement and communities<br />

throughout the country. He also serves as a consultant<br />

for Fox Valley Technical College.<br />

Joseph Versace<br />

Programmer/Analyst<br />

<strong>On</strong>tario Provincial Police<br />

Mr. Versace is a Programmer/Analyst with the <strong>On</strong>tario<br />

Provincial Police, <strong>Child</strong> Sexual Exploitation Unit.<br />

During his time there, he has developed investigative<br />

tools including E-Phex and Roundup Ares that have<br />

assisted <strong>ICAC</strong> investigators around the world.<br />

Lauren Wagner<br />

High-Tech Crime <strong>Training</strong> Specialist<br />

SEARCH Group, Inc.<br />

Ms. Wagner is a High Tech Crime <strong>Training</strong> Specialist in<br />

the <strong>Training</strong> Services Department of SEARCH where<br />

she performs tasks related to training local, state and<br />

federal agencies on computer technology issues with<br />

criminal justice applications. She provides technical<br />

assistance to law enforcement agencies in active<br />

cases, prepares training materials, teaches SEARCH<br />

investigative courses and speaks at conferences<br />

throughout the United States. Ms. Wagner is an ICI<br />

certified instructor and received a 2009 “Excellence in<br />

<strong>Training</strong>” award from California POST.<br />

Wade Walsvick<br />

Investigator<br />

Orange County (California) Sheriff’s Department<br />

Investigator Walsvick is a 23-year veteran with the<br />

Orange County Sheriff’s Department. In 1997, he was<br />

promoted to investigator assigned to sex crimes and has<br />

handled hundreds of cases involving domestic violence,<br />

elder abuse, sex registration violations, child abuse,<br />

child molestation and rape. In 2007, he joined a multiagency<br />

federal task force responsible for investigating<br />

Computer-aided Internet crimes against children. As<br />

of today, he is a member of the multi-agency, Orange<br />

County – <strong>Child</strong> Exploitation Task Force (<strong>ICAC</strong>) and<br />

continues to investigate all Internet-facilitated crimes<br />

against children. Investigator Walsvick is also a regular<br />

speaker for “Internet Safety” presentations and teaches<br />

a (law enforcement) first responder class for child<br />

abuse/sex crimes investigations.<br />

Jim Walters<br />

Assistant Chief of Police<br />

Southern Methodist University<br />

Assistant Chief Walters is with the Southern Methodist<br />

University Police Department in Dallas, Texas, and is<br />

also a retired Captain from the City of Placerville,<br />

California Police Department. He is the AMBER Alert<br />

Liaison for <strong>Training</strong> and Technical Assistance with<br />

the United States Department of Justice Southern<br />

Border Initiative, a program designed to improve<br />

capabilities and capacity related to the investigation<br />

and recovery of missing, endangered, abducted and<br />

exploited children in the United States - Mexican<br />

border region. He is also responsible for training and<br />

technical assistance to tribal communities across the<br />

United States, and specifically assist communities in<br />

developing capabilities and capacity related to child<br />

protection programs.<br />

Crystal Ward<br />

Trainer<br />

Girls Educational Mentoring Service<br />

Ms. Ward is a Trainer at Girl’s Educational & Mentoring<br />

Services (GEMS). In this capacity, Ms. Ward conducts<br />

trainings and provides technical assistance for legal<br />

professionals, law enforcement and social service<br />

professionals on the issues of commercial sexual<br />

exploitation of children (CSEC) and domestic minor<br />

PARTNERS IN PROTECTING CHILDREN 93


Speaker Biographies<br />

sex trafficking (DMST). Ms. Ward is also a former<br />

law enforcement officer, with over eight years of<br />

experience as an Indianapolis Police Officer. She<br />

earned a Master’s Degree in politics at Long Island<br />

University, Brooklyn and a Bachelor’s Degree at<br />

Indiana University-Bloomington, majoring in Politics,<br />

with a minor in Criminal Justice.<br />

Chris Watkins<br />

Special Agent<br />

Department of <strong>Home</strong>land Security, <strong>Home</strong>land<br />

Security Investigations<br />

Mr. Watkins is a Special Agent with the Department<br />

of <strong>Home</strong>land Security, assigned to <strong>Home</strong>land Security<br />

Investigations (HSI), and has held the position since<br />

2001. He is currently assigned as a <strong>National</strong> Program<br />

Manager within the <strong>Child</strong> Exploitation Investigations<br />

Unit at the HSI Cyber Crimes Center in Fairfax,<br />

Virginia. As part of his current duties at HSI, he is<br />

responsible for initiating and conducting HSI national<br />

investigations involving criminal violations relating to<br />

the production, distribution, receipt, and possession<br />

of child pornography. He received his Bachelor of<br />

Arts Degree in Sociology from Alabama Agricultural<br />

and Mechanical (A&M) University, and is currently a<br />

Master’s candidate for the Degree of Management at<br />

the Johns Hopkins University.<br />

Kevin West<br />

Detective<br />

Cary Police Department<br />

Detective West is currently investigating Internet<br />

crimes for the Cary Police Department in North<br />

Carolina. He is the past <strong>ICAC</strong> Commander for<br />

the North Carolina <strong>ICAC</strong> and has 33 years of law<br />

enforcement experience. He holds a Bachelor of<br />

Science Degree from Brigham Young University, is a<br />

FBI <strong>National</strong> Academy Graduate and a Graduate of<br />

the Administrative Officers Management Program<br />

from North Carolina State. He has served in various<br />

capacities in State and Local <strong>Law</strong> enforcement in<br />

North Carolina, and has taught extensively around<br />

the country on the subject of Internet Crimes Against<br />

<strong>Child</strong>ren.<br />

Steve Whalen<br />

Managing Director<br />

SUMURI<br />

Mr. Whalen CFCE is the Managing Director for<br />

SUMURI, a leading provider of training, services and<br />

software relating to digital evidence and computer<br />

forensics worldwide. He has developed and delivered<br />

forensic training to thousands of investigators and<br />

examiners around the world through organizations<br />

such as the International Association of Computer<br />

Investigative Specialists (IACIS), the High Technology<br />

Crimes International Association (HTCIA) and the<br />

United States Department of State Anti-Terrorism<br />

Assistance Program. He is also the developer of the<br />

successful Macintosh Forensic Survival Courses and<br />

co-developer of the popular PALADIN forensic<br />

software. Prior to SUMURI, he served over 15 years<br />

as a Delaware State Trooper.<br />

Frank Williams<br />

Assistant United States Attorney<br />

U.S. Attorneys Office, Northern District of Florida<br />

Attorney Williams is an Assistant United States<br />

Attorney in the Northern District of Florida,<br />

Gainesville Division, with over 20 years of experience<br />

prosecuting sex offenses against children, including<br />

working as an Assistant State Attorney and Assistant<br />

Statewide Prosecutor. He serves as the District’s<br />

Project Safe <strong>Child</strong>hood Coordinator and CHIP<br />

Coordinator. He is Board Certified by the Florida Bar as<br />

a Criminal Trial <strong>Law</strong>yer, and has prosecuted hundreds<br />

of felony jury trials, including first degree murder,<br />

child exploitation, drug trafficking, public corruption,<br />

white collar, computer crime, and organized crime.<br />

94 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Speaker Biographies<br />

William Wiltse<br />

Security Director: <strong>Law</strong> <strong>Enforcement</strong> Systems<br />

TLO<br />

Mr. Wiltse has been a police officer for the last 20<br />

years and is certified as a forensic computer examiner.<br />

Working as a detective for the Salem, Oregon Police<br />

Department, he specialized in conducting forensic<br />

computer exams in cases involving child sexual<br />

exploitation. He has led proactive investigations into<br />

the online trading of child pornography and worked<br />

with numerous federal, state and local law enforcement<br />

agencies. He is currently employed by TLO in Boca<br />

Raton, Florida, where he directs the development<br />

of software tools targeting those who create and<br />

disseminate child pornography over the Internet.<br />

Tyler Wotring<br />

Computer Crime Specialist<br />

<strong>National</strong> White Collar Crime Center<br />

Karen Yoakum<br />

United States Postal Inspector<br />

United States Postal Inspection Service<br />

Inspector Yoakum has been a United States Postal<br />

Inspector since 2007. She is currently assigned as the<br />

United States Postal Inspector Representative to the<br />

<strong>National</strong> Center for Missing & Exploited <strong>Child</strong>ren<br />

in Alexandria, Virginia. Prior to her appointment<br />

at NCMEC, Inspector Yoakum was assigned to the<br />

Pittsburgh, Pennsylvania Division Headquarters<br />

where she worked on child exploitation cases. Prior to<br />

becoming a Postal Inspector, she worked for the North<br />

Carolina State Bureau of Investigation in Raleigh and<br />

became a member of the North Carolina Internet<br />

Crimes Against <strong>Child</strong>ren Task Force in 2003.<br />

Michael Yoder<br />

Supervisory Special Agent<br />

FBI/NCAVC/BAU-3<br />

Supervisory Special Agent Yoder has been with the FBI<br />

for over 15 years. Currently, he is assigned to the FBI’s<br />

Behavioral Analysis Unit 3 (Crimes Against <strong>Child</strong>ren)<br />

where he advises on areas of online sexual exploitation<br />

of children, missing children, child pornography and<br />

cyberbullying to law enforcement agencies throughout<br />

the United States. Prior to his transfer to BAU-3, he<br />

led the FBI’s Safe <strong>Child</strong> Task Force in Atlanta, Georgia<br />

and was the coordinator of a group of agents and local<br />

police officers dedicated to investigating online child<br />

sex offenders and arresting those engaged in child<br />

pornography. He is a graduate of West Point, has a<br />

Master’s Degree in Organizational Management and<br />

is working on a second Master’s Degree in Forensic<br />

Psychology.<br />

Eric Zimmerman<br />

Special Agent<br />

Federal Bureau of Investigation<br />

Special Agent Zimmerman is assigned to the Cyber<br />

Crimes Squad of the Salt Lake City FBI field office<br />

where he has been investigating child pornography<br />

and computer intrusions for the past three years.<br />

He is a member of the Utah <strong>ICAC</strong> and has provided<br />

training and assistance to dozens of local, state, federal<br />

and international law enforcement agencies. He has a<br />

degree in Computer Science and has developed several<br />

computer programs to aid in the investigation and<br />

prosecution of child exploitation matters.<br />

PARTNERS IN PROTECTING CHILDREN 95


96 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Exhibitors<br />

PARTNERS IN PROTECTING CHILDREN 97<br />

Exhibitors


98 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Exhibitors<br />

ADF Solutions, Inc.<br />

ADF Solutions, Inc. is the market leader in triage<br />

tools for site exploitation of computers and peripheral<br />

devices. Leveraging an innovative approach, these easyto-use<br />

tools rapidly extract actionable intelligence to<br />

help identify and capture suspects who are a threat<br />

to national security, and accelerate prosecution of<br />

criminals. Widely deployed for field operatives, these<br />

proven tools are actively used by intelligence and<br />

defense agencies, border security, law enforcement,<br />

and other government agencies worldwide.<br />

Applied Visions, Inc. - Secure Decisions<br />

Division<br />

Secure Decisions is a developer of visual cyber<br />

defense decision support tools. Secure Decisions is<br />

a leading supplier of user-centered visual software<br />

solutions that improve the detection, comprehension,<br />

and communication of cyber threats for the U.S.<br />

Government and business enterprises. Secure<br />

Decisions’ clients include the Department of Defense,<br />

<strong>Home</strong>land Security, Intelligence Community, hightechnology<br />

companies, and large system integrators.<br />

Secure Decisions’ mission is to advance, and further<br />

the application of, visual analytics and visualization<br />

technology to improve the cyber defense decisionmaking<br />

of its clients.<br />

Belkasoft<br />

Belkasoft is an independent software vendor founded<br />

in 2002. Belkasoft specializes in computer forensics<br />

and system software for the Windows and Mac OS<br />

platforms. With the slogan “Forensics made easier”,<br />

they are trying to help IT security experts and forensic<br />

investigators by creating the tools with out-of-the-box<br />

solutions which do not require deep specific knowledge<br />

to operate. Along with the flagship Belkasoft Evidence<br />

Center, they are also known for our Belkasoft<br />

Forensic IM Analyzer, Belkasoft Forensic Studio, and<br />

some other software used in forensic investigations,<br />

law enforcement, intelligence/counterintelligence,<br />

corporate security, and parental control. These<br />

solutions are chosen by the FBI, the U.S. Army, the<br />

US Secret Service, the police of Germany, Norway,<br />

Australia, New Zealand, etc.<br />

Berla Corporation<br />

Berla Corp. is a US owned and operated small business,<br />

founded by an experienced team of law enforcement<br />

and IC professionals. Our core expertise is focused<br />

on the acquisition, examination and analysis of georeferenced<br />

meta-data. Berla Corp. provides operators,<br />

examiners and analysts with a suite of products and<br />

services designed to tactically and forensically retrieve<br />

and analyze data from electronic devices as well as<br />

other sources. Berla Corp.’s expertise is manifested<br />

in the development of Blackthorn2, the premier GPS<br />

Forensics Tool widely used throughout the world in<br />

both the government & commercial sectors. Our tools<br />

provide operators with the ability to easily acquire<br />

data from electronic devices, and then immediately<br />

conduct a field level examination revealing actionable<br />

intelligence.<br />

BlackBag Technologies, Inc.<br />

BlackBag Technologies, Inc. provides Mac-based<br />

forensic and eDiscovery data solutions to law<br />

enforcement and private sector clients. Based in Silicon<br />

Valley, the company offers clients a comprehensive<br />

and secure suite of services, software and training<br />

solutions. BlackBag acknowledges the growing<br />

challenges faced by forensic examiners and legal<br />

professionals in the field and is dedicated to creating<br />

flexible, open environment solutions. We serve a wide<br />

range of clients including federal, state and local law<br />

enforcement agencies, as well as leading private sector<br />

security, legal and human resource professionals.<br />

Bluebear LES<br />

BlueBear is fully dedicated to helping the police cut<br />

down the backlogs in the analysis of the contents<br />

of seized computer media in cases of online child<br />

exploitation. Due to the increased number of arrests,<br />

case backlogs are now exploding because the amount<br />

of material to be analyzed increases exponentially<br />

and because the number of police officers that can<br />

PARTNERS IN PROTECTING CHILDREN 97


Exhibitors<br />

be assigned to this analysis is very limited. BlueBear<br />

develops and markets forensic software “LACE” that<br />

allows law enforcement using its proprietary image<br />

recognition to reduce, from 80 to 95%, the amount<br />

of visual content to be reviewed manually by an<br />

investigator specialist. “LACE” is fully integrated<br />

into existing processes and methodologies of police<br />

investigations and is consistent with the analysis tools<br />

currently in use.<br />

Callyo Incorporated<br />

As criminals become more sophisticated, federal, state,<br />

and local police must equip themselves with equally<br />

sophisticated intelligence technology. Callyo is a law<br />

enforcement technology company that was created<br />

to bring a higher level of innovation and efficiency<br />

to law enforcement agencies and first responders<br />

nationwide – regardless of their size – to help<br />

everyday police officers serve and protect us better.<br />

Callyo’s products include Virtual Investigation Phones,<br />

Undercover Police Bugs, Mobile Court Orders, Crime<br />

Tip Lines, Radio Interoperability Solutions, Social<br />

Media Intelligence platforms, and other cutting edge<br />

technologies.<br />

Cellebrite USA<br />

Cellebrite’s UFED is the most complete system for<br />

mobile forensics and data extraction, incorporating<br />

logical and physical, passcode recovery, and file<br />

system extraction. The UFED provides the latest and<br />

most advanced hardware and software technologies,<br />

support of thousands mobile phones, smartphones,<br />

and GPS devices, and covers all major mobile OS<br />

and unprecedented analyzing capabilities. Stop by our<br />

booth to learn more or visit us at www.cellebrite.com.<br />

ComputerCOP Software Corp.<br />

ComputerCOP Software tool has assisted over 200<br />

law enforcement agencies across the U.S.A. with their<br />

public safety/community outreach efforts, specifically<br />

in dealing with the inherent dangers that families face<br />

every day from the Internet. The All New Premium<br />

Edition enables parents to review what their children<br />

have been doing online. When objectionable words are<br />

used, ComputerCOP will send Parents or Guardians a<br />

copy of their child’s suspicious chat or email to their<br />

computer. Parents can review Internet History, Videos,<br />

Web pages, including My-Space or Facebook, images,<br />

and text information related to Cyber Bulling, Gangs,<br />

and Drugs, and will also alert parents to Pedophiles<br />

trying to communicate with their children. Visit the<br />

ComputerCOP booth and receive a FREE working<br />

sample & demo.<br />

Digital Assembly LLC.<br />

Digital Assembly is a Brooklyn, New York-based startup<br />

developing innovative digital forensics solutions. The<br />

mission of the company is to research and develop<br />

products and technology that can help our customers<br />

perform better forensic analysis with less effort. The<br />

current flagship photo forensic product, Adroit Photo<br />

Forensics, helps investigators recover, organize, filter<br />

and search digital photos.<br />

Digital Intelligence, Inc.<br />

Digital Intelligence is dedicated to providing the<br />

highest quality forensic products at reasonable prices.<br />

At Digital Intelligence, they recognize the challenges<br />

associated with digital evidence recovery and build<br />

exceptional and innovative products and services to<br />

face those challenges. Digital Intelligence also provides<br />

high quality digital forensic training and a wide range<br />

of forensic and eDiscovery services.<br />

DigitalStakeout<br />

DigitalStakeout has created a customized application,<br />

specifically iScoutWeb<strong>ICAC</strong>, for the Georgia<br />

Bureau of Investigation Georgia Internet Crimes<br />

against <strong>Child</strong>ren Task Force to assist investigators in<br />

monitoring websites, blogs, and social media relevant<br />

to Internet Crimes Against <strong>Child</strong>ren. DigitalStakeout’s<br />

leadership includes a long history in cyber intelligence<br />

and security. Our leadership’s extensive experience<br />

comes from working with a wide range of enterprises<br />

including Fortune 500, media, service providers, and<br />

law enforcement. DigitalStakeout was founded in<br />

1904 and is headquartered in Atlanta Georgia.<br />

98 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Exhibitors<br />

Federal Bureau of Investigation (FBI) <strong>Law</strong><br />

<strong>Enforcement</strong> <strong>On</strong>line (LEO)<br />

What is LEO? <strong>Law</strong> <strong>Enforcement</strong> <strong>On</strong>line (LEO) is a<br />

state-of-the-art Internet system that is accredited<br />

and approved by the FBI for sensitive but unclassified<br />

information. LEO is used to support investigative<br />

operations, send notifications and alerts, and provide<br />

an avenue to remotely access other law enforcement<br />

and intelligence systems and resources. LEO provides<br />

all levels of the law enforcement, criminal justice, and<br />

public safety communities virtual private network<br />

access to its “anytime and anywhere” system for<br />

secure electronic communications, online training,<br />

and information sharing. Membership Requirements<br />

for The <strong>Law</strong> <strong>Enforcement</strong> <strong>On</strong>line (LEO) network<br />

is only available to persons duly employed by a law<br />

enforcement, criminal justice, or public safety agency/<br />

department.<br />

Fernico Inc<br />

Fernico’s ZRT 2 is the leading system for the manual<br />

investigation of Cell Phones. As smart phones become<br />

smarter it is an impossible task for forensic software<br />

tools to support every new phone and 100% extraction<br />

of every feature. This is why ZRT 2 is an essential<br />

component of every cell phone investigator’s tool<br />

kit. Fernico’s FAR Archiving and Acquisition systems<br />

are the premier automated solutions to archive large<br />

amounts of data or video files from online storage to<br />

a sequential series of Blu Ray disks with full traceability.<br />

In addition, these systems work in reverse to<br />

read in large quantities of discs with minimal operator<br />

supervision as the robotic automation delivers<br />

significant time saving benefits and reduces the chance<br />

of human error to virtually zero.<br />

Forensic Computers.com<br />

Forensic Computers provides forensic systems and<br />

peripherals for Digital Forensic Examiners. Forensic<br />

Computers designs, builds, and tests their systems to<br />

meet the strict requirements of conducting a proper<br />

forensic acquisition and analysis. Forensic Computers<br />

also conducts Computer Forensics <strong>Training</strong> and “Dead”<br />

hard drive data recovery at our Glen Lyn, VA facility.<br />

They will customize their systems and integrate the<br />

customer’s choice of forensic software for a true<br />

turn-key system. Forensic Computers, Inc. is a small<br />

veteran owned business operated by retired Computer<br />

Crime Investigators.<br />

Georgia Bureau of Investigation<br />

The Georgia Bureau of Investigation (GBI) is an<br />

independent, statewide agency that provides assistance<br />

to the state’s criminal justice system in the areas of<br />

criminal investigations, forensic laboratory services<br />

and computerized criminal justice information.<br />

The Bureau consists of three divisions: Investigative,<br />

Forensic Sciences, and the Crime Information Center.<br />

The Georgia Internet Crimes Against <strong>Child</strong>ren (<strong>ICAC</strong>)<br />

Task Force is housed within the <strong>Child</strong> Exploitation And<br />

Computer Crimes Unit (CEACCU). The mission of<br />

the <strong>ICAC</strong> Task Force program is to assist state and local<br />

law enforcement agencies in developing an effective<br />

response to cyber enticement and child pornography<br />

cases.<br />

Guidance Software<br />

Guidance Software, Inc. is recognized worldwide as<br />

the industry leader in digital investigative solutions.<br />

Its EnCase® platform and Tableau hardware line of<br />

products provide the foundation for government,<br />

corporate and law enforcement organizations to<br />

conduct thorough, network-enabled, and courtvalidated<br />

computer investigations of any kind. For<br />

more information about Guidance Software, visit<br />

www.guidancesoftware.com.<br />

High Tech Crime Institute<br />

HTCI is a vendor-neutral training company that<br />

supports <strong>ICAC</strong> with our federally funded cell phone<br />

investigations course. HTCI also provide hardware<br />

and software solutions for digital investigators and<br />

forensics examiners. HTCI is the manufacturer of the<br />

EDAS FOX family of forensic computers. As their<br />

way of thanking <strong>ICAC</strong>, we offer a 10% discount from<br />

list pricing for <strong>ICAC</strong> members and affiliates. Our<br />

PARTNERS IN PROTECTING CHILDREN 99


Exhibitors<br />

machines can be seen at www.edasfox.com or www.<br />

forensicstore.com.<br />

<strong>ICAC</strong> <strong>Training</strong> & TA<br />

Fox Valley Technical College’s <strong>ICAC</strong> <strong>Training</strong> &<br />

Technical Assistance Program (FVTC <strong>ICAC</strong> T&TA)<br />

offers regional, specialized and technical assistance<br />

training designed specifically for federal, state and local<br />

law enforcement investigators, unit supervisors and<br />

prosecutors. These trainings are conducted throughout<br />

the country so that participants can take advantage<br />

of the valuable information conveyed during our<br />

programs in the most cost-effective manner possible.<br />

As mandated by OJJDP, only regional <strong>ICAC</strong> Task<br />

Force or Affiliate agency members will be approved<br />

to participate in our training programs. Federal and<br />

International participants will receive consideration<br />

on a case by case basis. Visit us at: www.icactraining.<br />

org.<br />

immixGroup<br />

immixGroup delivers full strategic IT services<br />

to government and law enforcement customers<br />

nationwide, leveraging extensive business relationships<br />

with industry leaders, deep technical expertise, and<br />

unmatched knowledge of customers environments<br />

to deliver and implement the ideal IT solution. We<br />

are IT experts, providing support to investigators<br />

combating online child exploitation, Internet fraud,<br />

and cyber crime. immixGroup offers unparalleled<br />

CETS expertise, comprehensive Cloud knowledge,<br />

and the new iCIMS solution which delivers enhanced<br />

deconfliction, collaboration, and analysis capabilities<br />

to law enforcement investigators throughout the<br />

country.<br />

InfinaDyne<br />

InfinaDyne provides software to the world’s leading<br />

government agencies, law enforcement, and forensic<br />

investigators. They have been in existence since 1996<br />

providing support to our customers and providing<br />

products to enable them to do their jobs. InfinaDyne<br />

specializes in extensive analysis of CD/DVDs.<br />

Intelligent Computer Solutions, Inc<br />

ICS is a pioneer in disk drive duplication, having first<br />

introduced this technology to the world in 1991 in<br />

a US patented device. For over twenty years, ICS<br />

has focused on providing cutting-edge solutions to<br />

the Computer Hardware Manufacturers, large IT<br />

Organizations, and small IT Departments around<br />

the world. ICS also supports state, local and federal<br />

government, <strong>Law</strong> <strong>Enforcement</strong> communities, and<br />

the growing private Digital Forensics Investigation<br />

sector through the development of leading edge<br />

Digital Forensics Hardware and Software Technology<br />

used in some of the most complex digital forensics<br />

investigations today.<br />

INTERPOL Washington<br />

INTERPOL Washington, U.S <strong>National</strong> Central<br />

Bureau (USNCB) is the official U.S. representative<br />

to the International Criminal Police Organization<br />

(INTERPOL), as designated by the U.S. Attorney<br />

General. USNCB serves as the national point of contact<br />

for INTERPOL matters and coordinates international<br />

investigative cooperation between INTERPOL’s 189<br />

member countries and the more than 18,000 federal,<br />

state, local and tribal law enforcement agencies in the<br />

United States.<br />

JADsoftware Inc<br />

JADsoftware was founded by Jad Saliba, a digital<br />

forensics expert and former police officer. JADsoftware<br />

is a digital forensics software company focused on<br />

developing products that aid in the recovery of digital<br />

artifacts left behind on hard drives and in live memory.<br />

Internet Evidence Finder (IEF), their flagship product,<br />

is designed to help users in a range of fields conduct<br />

thorough, effective computer investigations while<br />

preserving the forensic integrity of the data. It’s an<br />

indispensable tool for forensic examiners, security<br />

managers, forensic accountants, and others in law<br />

enforcement, government, and corporations, as they<br />

100 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Exhibitors<br />

investigate cybercrime, fraud, employee misconduct,<br />

security breaches, intellectual property abuse/theft,<br />

regulatory compliance, disaster recovery, and more.<br />

Katana Forensics, Inc.<br />

Katana Forensics, Inc., creators of Lantern and Lantern<br />

Lite, is a global software firm that specializes in mobile<br />

device forensics. Our motto, “Verum Utilitas”, truth<br />

in tools, is the guiding principle of our team. We<br />

service law enforcement, military, corporations, and<br />

law firms. Katana develops so that forensic tools are<br />

accessible to all, not to a few. Katana Forensics: we<br />

lead, others follow.<br />

LTAS Technologies Inc.<br />

Harmari Tools, developed by LTAS Technologies,<br />

analyzes Craigslist, Kijiji, Backpage and other online<br />

classifieds as a support tool for investigations into<br />

High Tech Crime, Cybercrime, and Cyberfraud. The<br />

Harmari Tools can be used in investigating auto theft,<br />

auto fraud, curbstoning, child prostitution, criminal<br />

investigations, unlicensed contractors, electricians,<br />

plumbers, and other businesses. The Harmari Tools<br />

save you time when reviewing many classifieds at<br />

once. The Harmari Engine prioritizes the most serious<br />

suspects to the top of the list, cleans up spelling,<br />

decorations, acronyms, abbreviations, synonyms,<br />

filters out duplicate postings and postings not relevant<br />

to your investigation, eliminates obfuscated phone<br />

numbers, and stores ads offline for future retrieval.<br />

MD5<br />

MD5 develops industry leading forensic software that<br />

is used by investigators worldwide. Products include<br />

VFC, a unique virtualization tool, and SPI, an iPhone<br />

analysis tool.<br />

MicroSystemation<br />

MSAB, the global leader of forensic technology for<br />

mobile device examination, has offices in Europe and<br />

in the US, as well as a network of distributors across the<br />

globe. The XRY software has been used by investigators<br />

to quickly and effectively retrieve mobile data since<br />

2003. With logical and physical extraction capabilities<br />

to recover even deleted information, MSAB provides a<br />

complete forensic solution for most electronic mobile<br />

devices including GPS satellite navigation systems.<br />

<strong>National</strong> Center for Missing & Exploited<br />

<strong>Child</strong>ren<br />

NetSmartz Workshop is a program of the <strong>National</strong><br />

Center for Missing & Exploited <strong>Child</strong>ren (NCMEC)<br />

that creates interactive, educational safety resources for<br />

children ages 5-17. Through activities, games, videos,<br />

safety presentations, and websites, NetSmartz prepares<br />

children to behave responsibly when confronted<br />

with issues such as cyberbullying, inappropriate<br />

content, predators, revealing too much information,<br />

sexting, and scams. These age-appropriate materials<br />

are developed to educate, engage, and empower<br />

children to make safer decisions online. In addition to<br />

empowering children, NetSmartz also seeks to assist<br />

parents/guardians, educators, and law-enforcement<br />

officials in their efforts to educate youths about online<br />

safety.<br />

<strong>National</strong> White Collar Crime Center<br />

<strong>National</strong> White Collar Crime Center is dedicated to<br />

supporting local, state and tribal law enforcement<br />

agencies in the prevention, investigation and<br />

prosecution of economic and high tech crime by<br />

offering training, analysis and investigative support at<br />

no cost.<br />

NetClean Technologies<br />

NetClean develops technology that stops the spread<br />

of child sexual abuse material. The NetClean Analyze<br />

Suite is a product family especially designed for law<br />

enforcement agencies working with child sexual abuse<br />

investigations. NetClean Analyze is designed to improve<br />

speed and minimize human effort when examining<br />

seized data. It enables efficient categorization and<br />

identification of child sexual abuse images and videos,<br />

and creates a good basis for the prosecutor. By working<br />

closely with police forces around the world, NetClean<br />

PARTNERS IN PROTECTING CHILDREN 101


Exhibitors<br />

achieves the highest understanding of how the globally<br />

increasing problem of child sexual abuse material<br />

evolves, and uses this knowledge to develop world<br />

unique solutions to effectively put a stop to it.<br />

Nuix<br />

Nuix is a worldwide provider of information<br />

management technologies, including eDiscovery,<br />

electronic investigation, and information governance<br />

software. Nuix solutions scale to meet the needs<br />

of the smallest or largest organizations, making it<br />

faster and easier to undertake investigations and<br />

data management activities, no matter the size or<br />

complexity of the data sets. Nuix customers include<br />

the world’s leading advisory firms, litigation support<br />

providers, enterprises, government departments, law<br />

enforcement agencies, as well as all of the world’s<br />

major corporate regulatory bodies.<br />

OJJDP<br />

OJJDP, a component of the Office of Justice Programs,<br />

U.S. Department of Justice, accomplishes its mission<br />

by supporting states, local communities, and tribal<br />

jurisdictions in their efforts to develop and implement<br />

effective programs for juveniles. The Office strives<br />

to strengthen the juvenile justice system’s efforts to<br />

protect public safety, hold offenders accountable, and<br />

provide services that address the needs of youth and<br />

their families. Under the leadership of its Administrator<br />

and through its components, OJJDP sponsors research,<br />

program, and training initiatives; develops priorities<br />

and goals and sets policies to guide federal juvenile<br />

justice issues; disseminates information about juvenile<br />

justice issues; and awards funds to states to support<br />

local programming.<br />

Paraben Corporation<br />

Paraben specializes in comprehensive digital forensic<br />

solutions for mobiles, hard drives, and enterprise<br />

networks. From technology to training, Paraben<br />

provides effective results and forensic-grade data.<br />

Pen-Link, Ltd<br />

In business for over 20 years, Pen-Link, Ltd. provides<br />

<strong>Law</strong> <strong>Enforcement</strong> and Intelligence agencies with stateof-the-art<br />

software and systems for the collection,<br />

storage, and analysis of telephonic- and IP-based<br />

communications. Pen-Link’s software and systems—<br />

Pen-Link 8, LINCOLN, and Xnet—are widely<br />

recognized as industry standards, with thousands of<br />

licensed <strong>Law</strong> <strong>Enforcement</strong> and Intelligence users<br />

in federal, state, and local agencies worldwide. Pen-<br />

Link systems are widely favored because they not only<br />

excel at intelligence gathering and live collection, but<br />

they also bring to bear a powerful suite of reporting<br />

and analytical tools; the type of functionality that is<br />

essential in drilling down through today’s extensive<br />

data sets to reveal relationships that might otherwise<br />

go undetected.<br />

Runaway and <strong>Home</strong>less Youth <strong>Training</strong> and<br />

Technical Assistance Centers<br />

The Runaway and <strong>Home</strong>less Youth <strong>Training</strong> and<br />

Technical Assistance Center (RHYTTAC) serves a<br />

centralized national resource for FYSB funded Runaway<br />

and <strong>Home</strong>less Youth grantees. <strong>Training</strong> and Technical<br />

Assistance Services are directed at assisting RHY<br />

grantees to engage in continuous quality improvement<br />

of their services and to build their capacity to effectively<br />

serve runaway and homeless youth.<br />

SEARCH<br />

SEARCH’s High-Tech Crime <strong>Training</strong> Services is<br />

comprised of a team of experts who provide technical<br />

assistance and training to local, state, and federal<br />

justice and public safety agencies nationwide. Through<br />

training classes, technical workshops and hands-on<br />

assistance, SEARCH trains and assists investigators<br />

in methods to prevent, detect, and investigate the<br />

rising tide of computer crime. These crimes include<br />

fraud, email threats, online stalking, identity theft,<br />

phishing, drug trafficking, cyber terrorism, and child<br />

exploitation.<br />

102 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


Exhibitors<br />

Silicon Forensics<br />

Silicon Forensics delivers quality, performance & value<br />

into every custom forensic workstation we build. At<br />

Siliconforensics.com “we build only what you need.”<br />

We supply full features in our forensic workstation,<br />

which can be custom configured for the high tech<br />

forensic investigator. We provide full powered, full<br />

featured forensic workstations for on the go. We<br />

specialize in Forensically Sanitized Hard Drives.<br />

SRT Wireless, LLC<br />

SRT Wireless, the commercial and law enforcement<br />

company within The SRT Group, helps federal,<br />

state, and local law enforcers do their jobs better<br />

with investigative technologies that are faster, easier,<br />

smarter, and more affordable. In fact, SRT Wireless<br />

is the leading provider of Wi-Fi signal technology<br />

and training for law enforcement purposes, including<br />

access point and station discovery, surveillance,<br />

interception and targeting.<br />

SUMURI<br />

In July of 2010, Sumuri LLC opened for business<br />

to provide forensic training, services, and products<br />

relating to the preservation, examination, and<br />

reporting of digital evidence. The name “Sumuri” is<br />

an old Tagalog word which can be interpreted as “to<br />

investigate” or “analyze”. The heart of Sumuri consists<br />

of simple core values that found in each of our team<br />

members. These are core values such as honor,<br />

integrity, loyalty, positive attitude, dedication, and<br />

most important and above all - altruism. Altruism - the<br />

desire to help, serve and care for others first before<br />

yourself.<br />

Susteen Inc<br />

usteen is a software manufacturer. Susteen made the<br />

product called Secure View, which is a cell phone<br />

forensic software that acquires, analysis and reports on<br />

over 3000 cell phones.<br />

Tactical Network Solutions<br />

Tactical Network Solutions, LLC (TNS) provides<br />

offensive cyber capabilities to law enforcement, the<br />

intelligence community, and military intel units.<br />

Founded in 2007, TNS employs former intelligence<br />

community developers, operators, and intelligence<br />

professionals that specialize in computer network<br />

operations (CNO). Areas of focus include 802.11<br />

wireless network exploitation, network traffic analysis,<br />

reconnaissance and surveillance, covert infrastructure<br />

support, and training. All TNS personnel are cleared to<br />

the Top Secret level.<br />

The Innocent Justice Foundation<br />

Innocent Justice works to enable the investigation and<br />

prosecution of child sex predators by assisting law<br />

enforcement agencies to obtain equipment needed<br />

for child pornography investigations, offering mental<br />

health and wellness training for those exposed to<br />

disturbing material, and educating the public about the<br />

true nature and scope of child sexual abuse and torture<br />

images.<br />

Tracker Products<br />

Tracker Products software automates the entire<br />

process of collecting, processing and tracking<br />

inventory with an easy-to-use, browser-based system.<br />

Featuring the latest advances in bar code tracking,<br />

chain of custody reporting, detailed searching and<br />

inventory management, Tracker Products software is<br />

the ultimate evidence tracking solution.<br />

Walden University<br />

Walden, an accredited online university, offers degree<br />

programs that focus on relevant skills to be used<br />

immediately in the workplace and in your community.<br />

Our online degree programs reflect our mission of<br />

promoting positive social change. Walden University<br />

offers over 600 online bachelors, masters, and<br />

doctorate degree programs for working professionals.<br />

PARTNERS IN PROTECTING CHILDREN 103


Exhibitors<br />

ZiuZ, Inc.<br />

ZiuZ Inc. is a leading developer of image and video<br />

analysis tools for child exploitation investigations.<br />

As the author of VizX, and the ground-breaking<br />

technology TwinMatch, ZiuZ puts state-of-the-art<br />

visual intelligence capabilities in the hands of today’s<br />

high-tech crime investigators and computer forensics<br />

professionals. VizX and TwinMatch combined make a<br />

total solution for analyzing video and photo material<br />

confiscated in CA/CE investigations. Proven and robust<br />

tools for quickly searching through large quantities of<br />

visual material and distinguishing between offensive<br />

and non-offensive images by using built-in intelligence<br />

presented in a way to enhance the effectiveness of the<br />

users’ judgment. Visit the ZiuZ booth to receive your<br />

demo license of VizX 2. www.ziuz.com<br />

104 <strong>2012</strong> NATIONAL LAW ENFORCEMENT TRAINING ON CHILD EXPLOITATION


PARTNERS IN PROTECTING CHILDREN 105


Partners in Protecting <strong>Child</strong>ren<br />

Thank you for helping to make this training a success!<br />

Working as Partners to<br />

Make the Internet a Safer Place<br />

For additional resources and training opportunities, please visit: www.icactaskforce.o<br />

This project is supported by Grant # 2010-MC-CX-K038 awarded by the OJJDP, OJP, US DOJ.<br />

106 Points of view or opinions in this document <strong>2012</strong> NATIONAL are those of LAW the author ENFORCEMENT and do not necessarily TRAINING represent ON CHILD EXPLOITATION<br />

the official position or policies of the US DOJ.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!