2012 National Law Enforcement Training On Child - ICAC Home
2012 National Law Enforcement Training On Child - ICAC Home
2012 National Law Enforcement Training On Child - ICAC Home
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Classroom-Based <strong>Training</strong> Sessions<br />
<strong>Child</strong> Pornography, <strong>Child</strong> Erotica and <strong>Child</strong><br />
Modeling: Birds of the same feather?<br />
90 minutes<br />
Paul Almanza & Brian Bone<br />
This session will review child modeling and child erotica<br />
as gateways to undercover child sexual abuse. The lecture<br />
will review several cases where investigation beyond child<br />
modeling and child erotica revealed large-scale sexual<br />
abuse and the customers of these image producers.<br />
<strong>Child</strong> Victims of Prostitution: Interviewing<br />
and Building Rapport<br />
90 minutes<br />
Catherine S Connell & Derek Stigerts<br />
This session will address the most fundamental and<br />
critical component of investigations involving child<br />
victims of prostitution; the victim interview. It is at<br />
this initial stage of the investigation that information is<br />
gathered that will lead to a successful prosecution of<br />
the suspect. Participants will learn the specific phases<br />
of the interview process and barriers that result in the<br />
victim’s reluctance to implicate and testify against her<br />
abuser “pimp”. The lecture will provide participants with<br />
tools and skills necessary to identify and overcome the<br />
challenges of these difficult interviews when building a<br />
relationship with the victim.<br />
Circumventing Encryption Through<br />
Debuggers at Software Breakpoints<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Johnathan Bridbord & Brian Bone<br />
The session discusses and demonstrates techniques using<br />
high-speed 1394 interfaces, debugger testing and remote<br />
shell network commands to circumvent encryption at<br />
software breakpoint locations.<br />
Civil Liability in Internet Facilitated Crimes<br />
Against <strong>Child</strong>ren Cases<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Charles Gillingham<br />
Investigators in child exploitation cases are subject to<br />
civil liability. Often unknowingly, investigators violate<br />
federal law and subject themselves to lawsuit. This session<br />
will help investigators to understand how to insulate<br />
themselves from civil liability and maintain immunity<br />
from liability.<br />
Collaborative Partnerships Between <strong>ICAC</strong><br />
Teams and <strong>Child</strong>ren’s Advocacy Centers<br />
90 minutes<br />
Matthew Gray & Elaine Stolte<br />
Participants will learn about the valuable resources that<br />
<strong>Child</strong>ren’s Advocacy Centers can provide <strong>ICAC</strong> teams<br />
in their work both during the investigative process and<br />
with ongoing victim support following the investigation.<br />
Attendees will learn about model partnerships between<br />
<strong>ICAC</strong> teams and local <strong>Child</strong>ren’s Advocacy Centers and<br />
positive outcomes involving improved investigation and<br />
prosecution. Effective strategies for replicating model<br />
programs will be discussed along with multidisciplinary<br />
team management strategies to give child abuse response<br />
team members the tools to strengthen their own groups<br />
while building a culture of value and respect for each<br />
other in their respective fields.<br />
Computer Forensics for Prosecutors - Basic<br />
<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />
90 minutes<br />
Christopher Kelly<br />
This lecture will discuss the basics of computer<br />
forensics and will begin by taking prosecutors through<br />
different types of technology. Presenters will describe<br />
the computer forensic process and the different types<br />
of evidence that can be recovered through a computer<br />
forensic examination. Prosecutors will leave with a solid<br />
PARTNERS IN PROTECTING CHILDREN 49