27.02.2013 Views

2012 National Law Enforcement Training On Child - ICAC Home

2012 National Law Enforcement Training On Child - ICAC Home

2012 National Law Enforcement Training On Child - ICAC Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Classroom-Based <strong>Training</strong> Sessions<br />

<strong>Child</strong> Pornography, <strong>Child</strong> Erotica and <strong>Child</strong><br />

Modeling: Birds of the same feather?<br />

90 minutes<br />

Paul Almanza & Brian Bone<br />

This session will review child modeling and child erotica<br />

as gateways to undercover child sexual abuse. The lecture<br />

will review several cases where investigation beyond child<br />

modeling and child erotica revealed large-scale sexual<br />

abuse and the customers of these image producers.<br />

<strong>Child</strong> Victims of Prostitution: Interviewing<br />

and Building Rapport<br />

90 minutes<br />

Catherine S Connell & Derek Stigerts<br />

This session will address the most fundamental and<br />

critical component of investigations involving child<br />

victims of prostitution; the victim interview. It is at<br />

this initial stage of the investigation that information is<br />

gathered that will lead to a successful prosecution of<br />

the suspect. Participants will learn the specific phases<br />

of the interview process and barriers that result in the<br />

victim’s reluctance to implicate and testify against her<br />

abuser “pimp”. The lecture will provide participants with<br />

tools and skills necessary to identify and overcome the<br />

challenges of these difficult interviews when building a<br />

relationship with the victim.<br />

Circumventing Encryption Through<br />

Debuggers at Software Breakpoints<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Johnathan Bridbord & Brian Bone<br />

The session discusses and demonstrates techniques using<br />

high-speed 1394 interfaces, debugger testing and remote<br />

shell network commands to circumvent encryption at<br />

software breakpoint locations.<br />

Civil Liability in Internet Facilitated Crimes<br />

Against <strong>Child</strong>ren Cases<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Charles Gillingham<br />

Investigators in child exploitation cases are subject to<br />

civil liability. Often unknowingly, investigators violate<br />

federal law and subject themselves to lawsuit. This session<br />

will help investigators to understand how to insulate<br />

themselves from civil liability and maintain immunity<br />

from liability.<br />

Collaborative Partnerships Between <strong>ICAC</strong><br />

Teams and <strong>Child</strong>ren’s Advocacy Centers<br />

90 minutes<br />

Matthew Gray & Elaine Stolte<br />

Participants will learn about the valuable resources that<br />

<strong>Child</strong>ren’s Advocacy Centers can provide <strong>ICAC</strong> teams<br />

in their work both during the investigative process and<br />

with ongoing victim support following the investigation.<br />

Attendees will learn about model partnerships between<br />

<strong>ICAC</strong> teams and local <strong>Child</strong>ren’s Advocacy Centers and<br />

positive outcomes involving improved investigation and<br />

prosecution. Effective strategies for replicating model<br />

programs will be discussed along with multidisciplinary<br />

team management strategies to give child abuse response<br />

team members the tools to strengthen their own groups<br />

while building a culture of value and respect for each<br />

other in their respective fields.<br />

Computer Forensics for Prosecutors - Basic<br />

<strong>Law</strong> <strong>Enforcement</strong> Sensitive<br />

90 minutes<br />

Christopher Kelly<br />

This lecture will discuss the basics of computer<br />

forensics and will begin by taking prosecutors through<br />

different types of technology. Presenters will describe<br />

the computer forensic process and the different types<br />

of evidence that can be recovered through a computer<br />

forensic examination. Prosecutors will leave with a solid<br />

PARTNERS IN PROTECTING CHILDREN 49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!