Services How Do I...?

Thursday, April 13, 2017

Thursday Registration 7:30 a.m. - 5:00 p.m.


8:30 a.m. - 10:00 a.m.

Champions for Children Award Ceremony

Chris NewlinKEYNOTE:
Are We Making a Difference?  Should I Keep Doing This Work?
Chris Newlin, MS, LPC, Executive Director, National Children’s Advocacy Center
For many years, social entrepreneurs worked to develop a multidisciplinary response to child abuse while recalling past frustration with a siloed approach that limited our effectiveness and also caused additional trauma for children and families.  Many professionals working in the field now only know current CAC/MDT approach and don’t have the experience of working in both systems.  Thus, they view the current model as the institutional approach (the way we do things) without fully knowing the rationale for this approach.  Reminding everyone of the rationale for this approach, its effectiveness and impacts, and the worldwide implementation of this model is valuable and invigorating.  If that is not enough, connecting the dots behind an effective response to child abuse and its impact on our nation’s health and economy will inspire attendees to look beyond the individual caseloads to the impact “we,” as a collective group, are having on our future generations.


10:00 a.m. - 10:15 a.m.

BREAK
Visit Summit Store & Exhibits


10:15 a.m. - 5 p.m.

Victim Identification Lab
Jennifer Lee of NCMEC
Many children have been rescued from further sexual abuse because a clue in the background of child-pornography images led to the location of their abuse. Partnering with the Internet Crimes Against Children Task Forces and cooperating federal law-enforcement agencies, the National Center for Missing & Exploited Children (NCMEC) is proud to host the Victim Identification Lab — an initiative designed to assist law enforcement in its efforts to identify and rescue child sexual abuse victims.
NCMEC is pleased to offer all registered participants at this year's conference a glimpse into this powerful law-enforcement tool designed to rescue children. Within this interactive lab, computers will be available for participants to access background identifiers and audio clues in hopes that these items may be recognizable or familiar to Lab participants. Accompanying each sanitized picture will be a real-time message thread where participants can post their comments and suggestions. You may have the piece of the puzzle that could lead to the rescue of a child victim.
NOTE: All registered conference attendees are invited to participate in this Lab; however, due to the sensitivity of this issue, please make sure to wear your conference badge to gain entry.



10:15 a.m. - 12:15 p.m.

7A
Risk Assessment and Risk Management of Perpetrators of Sexual Crimes Against Children
Joe Sullivan, PhD.
The process of evaluating the risk of sexual harm to children in the future is a complex process that cannot be achieved by simply administering a set of psychometric tests or an actuarial risk assessment tool.  Risk assessment requires practitioners to have specialist knowledge and skills related to perpetrators -- and how perpetrators manipulate to gain the trust of potentially protective others and achieve access to children.  This presentation explores the challenges of forensic risk assessment interviews and uses case studies to illustrate the key issues.

7B
Sudden Unexplained Infant Deaths (SUID):  A Comprehensive Review
Patrick Bray, Detective; Sue Skinner MD; Eric Tonsfeldt BS, D-ABDMI; and Chris Young, MD
This presentation utilizes a spectrum of experts in order to aid attendees in understanding the spectrum of issues concerning the investigation of unexplained infant deaths.  The leading causes of infant deaths will be reviewed, along with what constitutes both safe sleep environments as well as unsafe sleep practices.  Developmental milestones of infants will be covered.  Next, the team will address how professionals must work together to conduct a comprehensive infant death scene investigation, including witness interviews and doll re-enactment.  The team discusses critical scene and case information needed.  Finally, the medical examiner will instruct the audience how to interpret the information that investigators collect, within the context of the physiologic findings on autopsy, and how the totality of the findings and circumstances informs both the cause and manner of death. This presentation best illustrates how our multidisciplinary approach is optimally applied to the investigation of infant deaths.

7C
Childhood Trauma: Costs, Consequences and Proven Interventions
Kim Jacobowitz, LCSW, and Cathleen Lang, MD
The first portion of this presentation will define what trauma is and provide examples of childhood trauma.  It will review the biologic and epigenetic changes that toxic stress and trauma cause on the brain and body.  It will also discuss the signs and symptoms that care providers may note when treating a patient who has been through significant trauma.  Both long-term and short-term consequences of childhood trauma will be discussed in this presentation, as well as the costs to society.  The second portion of this presentation will focus on proven (evidence-based) trauma treatment interventions for children. There are several treatment models that have shown to be effective in treating traumatized children and improving mental health outcomes for parents. This presentation will provide an overview of a few of these models, with a specific focus on Trauma-Focused Cognitive Behavioral Therapy (TF-CBT) and Alternatives For Families: A Cognitive-Behavioral Therapy (AF-CBT).

7D
Critical Issues in Sibling Sexual Abuse
Geraldine Crisci, MSW
This workshop will review the literature and clinical features of sibling sexual abuse. Topics include: separation of victim and offender, joint interviews with victim and offender, and the roles of key service providers (police, protective services, probation, and mental health). Discussion of placement decisions will be part of this workshop.

7E
How to Survive Cross Examination for Forensic Interviewers:  It’s Not What You Say, It’s How You Say It
Lawrence Jay Braunstein, Esq., and Julie Kenniston, MSW, LISW
Successful child sexual abuse prosecutions depend in large part on the quality of the forensic interview of the child, and the testimony of the forensic interviewer. This presentation will focus on the various protocols used during the interview process; disclosure as a process or event; forensic linguistics; videotaping of forensic interviews; and how to best present your testimony in the courtroom, both on direct examination and cross examination. The goal of the program is to "re-educate" forensic interviewers to understand and consider how what they do in the forensic interview room/CAC will "play out" in the courtroom.

7F
Grooming: Making You See What I Want You to See and Believe
Chris Newlin, MS, LPC
The investigation of child abuse is challenging, and the pursuit of evidence associated with the grooming of children, caregivers, and the community environment provides opportunities for investigators to pursue additional evidence.  This workshop will provide an overview of research related to grooming and propose a new framework for the concept of grooming that could dramatically modify current investigatory practices, in addition to enhancing current forensic interviewing efforts.
Learning Objectives:
1. Attendees will develop a framework for classifying grooming behaviors by those who abuse children;
2. Attendees will review recently published research on grooming related to child abuse and related content; and
3. Attendees will identify new opportunities for identifying corroborative evidence based on this new “grooming” information.


7G
The Darknet and Emerging Technologies
Justin Fitzsimmons, JD
As the internet continues to evolve, new layers populate where offenders commit criminal offenses. One such area is known as the Darknet. Participants will learn how the Darknet works -- and how potential criminal activity facilitated on the Darknet is crucial to investigating and prosecuting child exploitation cases. In addition, new software applications are being added to mobile phones and tablets daily. This presentation will demonstrate several of the newer applications for mobile devices that are popular for teenagers. Participants will learn about "vault applications" and the ability to secretly store information.

7H
Child Sex Dens: Infiltrating, Raiding, and Rescuing
Martin Conley and Douglas McDonnell
This case study details investigative techniques leading to the identification of child sex dens in the Philippines. Children as young as 2 years old were sexually molested and trafficked daily for paying customers worldwide. Learn how, through undercover online communications, HSI Special Agents in Portland, Maine were able to discover and ultimately infiltrate closely protected communities of offenders and communicate with targets. Presenters will discuss their collaborative efforts with international law enforcement agencies and the strategies implemented -- including innovative real-time international surveillance and rescue operations that led to the dismantling of several child sex dens in the Philippines, the criminal prosecution of the members, and the rescue of dozens of children.

7CL
Tech Tools for Prosecutors
Lauren Wagner and Tim Lott
This hands-on computer lab designed for prosecutors will introduce useful software and technical methodologies.  Topics will include Firefox add-ons, such as Video Downloadhelper (to save videos from YouTube and other websites), and Screengrab (to save or  copy websites). Also included will be Google searching techniques (Boolean operators) to make searching for information much for efficient and reliable. Google advanced operators, such as site: (to  search only particular websites) and filetype: (to search only  particular filetypes), as well as Google services such as Images (to  search only images as well as reverse image searching techniques)  and Scholar (to search only legal journals) will also be covered.  Also in Google we will talk about all the data saved that can be viewed in "Dashboard" and "My Activity." Other software that will be introduced includes: Jing (screenshot and screencast software), VLC (for playing movies), IrfanView (for viewing images), and Audacity (for audio editing).

7IL
Combatting Online Child Exploitation
Jennifer Newman and Micah D. Persons
This session will be co-presented by NCMEC & the Oregon ICAC. Participants will be provided information on NCMEC’s CyberTipline -- including how it can generate, de-conflict, and corroborate cases related to computer-facilitated crimes against children. Overview of CyberTipline reports will be included with a detailed explanation of the reports sent to law enforcement. An investigator will walk the participants through the steps necessary to identify the location of the suspect and specific computer involved in the investigation. Specifics will be shared on how to secure evidence of criminal behavior from electronic service providers (ESPs) as well as on-scene.



12:15 p.m. - 1:30 p.m.

LUNCH
Visit Summit Store & Exhibits


1:30 p.m. - 3:00 p.m.

8A
Organized Groups of Offenders
Joe Sullivan, PhD.
The internet has brought about many changes in the world of child sexual abuse. Among the most alarming is the dramatic increase of offenders linking with others of a similar mind to molest children. Using case examples on some of the most notorious offenders in the UK, this presentation will outline how such groups function -- and how they seek to protect themselves from infiltration or detection. In addition, the presentation explores the challenges involved in combating organized child sexual abuse.

8B
Effects of Child Maltreatment: Child, Family and Professional
Matthew Cox, MD
Child abuse affects the child directly involved in many ways -- physically and emotionally.  This talk will start by illustrating the physical, developmental and emotional effects of child abuse.   It will transition to review the effects on the parents and the family unit.  Lastly, the talk will utilize case examples to illustrate the effects of child abuse on the professional including missed cases of child abuse, professional distrust and dysfunction in child abuse cases, and confrontation.  An approach to minimizing the toxic effects of child abuse cases on the professional involved in these cases will be discussed.  

8C
Following the Evidence in the Commercial Sexual Exploitation Forensic Interview
Julie Kenniston, MSW, LISW
This presentation will provide content that forensic interviewers should incorporate in interviews of minors suspected as trafficking and/or internet crime victims.  The focus will be on non-caregiver cases.  Commercial sexual exploitation interviews will be compared and contrasted to intrafamilial cases.  Strategies to obtain case-specific details will be discussed.
Objectives:
• Participants will compare and contrast commercial sexual exploitation interviews with intrafamilial sex abuse interviews;
• Participants will learn questioning strategies for gathering details about commercial sexual exploitation; and
• Participants will apply the research of repeated interviews to commercial sexual exploitation cases.
As law enforcement agencies and other youth serving professionals begin to better identify youth at risk of exploitation, many referrals are being made for these youth to be interviewed.  The CAC model provides many benefits in serving these youth, but there are also some considerations that are being overlooked.  Trained, experienced forensic interviewers have expanded the types of cases that are seen for interviews, and many skills cross over.  Although there has been much training on the dynamics of exploitation, there are some key issues to address in the forensic interview that are different from the traditional types of cases seen in CACs.  This presentation will compare and contrast exploitation cases with typical cases seen in CACs, and offer suggestions on topic strategies unique to commercial sexual exploitation cases.

8D
Assessment of Sibling Sexual Abuse
Geraldine Crisci, MSW
The critical role of full family participation in the assessment and treatment process will be outlined. Family dynamics, parental issues, sibling issues, and individual issues for both the initiator and victimized child will be presented. 

8E
How Not to Help the Defense Attorney in Child Sexual Abuse Cases (Part 1 of 2)
Lawrence Jay Braunstein, Esq.
This program, presented by a defense attorney (and former prosecutor), will acquaint law enforcement, prosecutors, medical practitioners, mental-health practitioners, child-protection caseworkers and victim-assistance agency personnel with the intimate workings of the defense in child sexual abuse cases. Topics covered will include the preparation of a defense case, investigative techniques, pretrial motion practice and discovery, examinations before trial, jury selection, defense trial strategy, demonstrative evidence, trial exhibits, cross-examination techniques, and courtroom psychology.
By having a broad overview of both pretrial and trial procedures -- and how the defense will approach its preparation during each phase of the litigation -- the expert and lay (fact) witness will be better prepared in understanding their individual roles in the proceedings, and better prepared to maximize their participation in the overall litigation.

8F
Intimate Partner Strangulation (Part 1 of 2)
Kelsey McKay, JD
This session will cover intimate partner strangulation from top to bottom.  Part 1 focuses on how to implement and understand a strangulation supplement. Part 2 will explore prosecution -- including ideas for voir dire, a simulation of using a medical expert, and recommended tips to help juries understand this complicated crime.  Participants will gain a better understanding of how strangulation is different than all other types of intimate partner assault -- both physiologically, in terms of its lethal danger, and emotionally, in terms of the effect it can have on the victim.  The session will also discuss defensive injuries and help the audience interpret these, so that a victim is not accidentally arrested and prosecutors can use that evidence to their advantage.  You will walk away from this talk and never again ask, "Why didn’t she have visible injuries?"

8G
Corroboration:  The Key to Child Exploitation Cases
Justin Fitzsimmons, JD
Supporting a child’s disclosure through corroborative evidence is essential in child-abuse investigations and prosecutions. This presentation covers the potential areas to discover corroborative evidence, and explains the importance of technology­‐based corroboration. The audience is shown detailed examples of how statements made during the disclosure lead to corroborative evidence.

8H
Sex Trafficking (Part 1 of 2)
JR Ujifusa and Mike Gallagher
This two-part session takes an in-depth and practical look at sex trafficking, investigations, and prosecutions. For large and small agencies, sex trafficking is prevalent and growing. This presentation will provide real-life applications for targeting demand and traffickers. Mike Gallagher from the Portland Police Bureau and JR Ujifusa from the Multnomah County DA’s office will share innovative ways to conduct missions, investigations, charging decisions and trial techniques.  This session will continue from 3:30 – 5:00 p.m.


8CL
Facebook Investigations: Advanced Searching and Saving (Part 1 of 2)
Lauren Wagner and Tim Lott
Facebook is the largest worldwide social-media network, and contains a substantial amount of potential investigative information. First we will use Facebook graph search, which uses specific targeted terms that can show investigative material. We will demonstrate how graph search works, and explain how syntax -- the structure of search keywords and phrases -- is vital to a successful search. Once a target profile has been identified, we will use Facebook URL manipulations. These URL manipulations are specific, and offer information beyond what can be found simply by looking at someone's profile.  These URL manipulations can show content from the target, such as photo comments, video likes, and comparisons with friends.  Lastly, we will cover free techniques for saving Facebook videos and capturing screenshots of profiles.  This session will continue from 3:30 – 5:00 p.m.

8IL
Victim Notification:  Protecting Rights in Child Exploitation Cases
Jennifer Newman
Child victims who were sexually exploited and photographed experience the additional trauma of knowing that their abuse has been permanently memorialized in images. This presentation will address the efforts to help victims receive proper notification of their rights in child-exploitation cases.  Participants will learn the step-by-step process that begins at the time the victim is identified, as well as what “victim notification” entails.  The FBI’s Office for Victim Assistance (OVA) provides notification to these victims (or guardians), and NCMEC serves as the central repository in the U.S. for information relating to child victims depicted in sexually exploitive images and videos.  Participants will also hear where victim impact statements can be attained -- and how they can be used to give a human voice to otherwise silent pictures.



3:00 p.m. - 3:30 p.m.

BREAK
Visit Summit Store & Exhibits


3:30 p.m. - 5:00 p.m.

9A
Sexual Sadism
Joe Sullivan, PhD.
While not the most common motivation for sexually abusing children, sadistic arousal is more common than many professionals realize.  This presentation examines the prevalence and nature of sadistically motivated sexual abusers of children. Using video interviews with offenders, Dr. Sullivan will highlight some of the key issues for professionals to understand about sexual sadism in sex offenders.

9B
Having the Last Word: Medical, Law Enforcement and DA Collaboration in Building a Case for Abusive Head Trauma
Kevin Barton, DDA and Tamara Grisby, MD
This case study discusses a recent abusive head trauma investigation and prosecution.  The investigating detective, the consulting physician, and the prosecuting attorney will present perspectives and highlight: necessity of continuous dialogue among disciplines, updates of victim status, detailed corroboration of facts, and deconstruction of experts to build a compelling case.

9C
Recent Research Affecting Child Abuse Investigations
Chris Newlin, MS, LPC
This workshop is intended for all levels of professionals who are involved in the investigation and prosecution of child abuse. We are working in a continually changing field, and it is critical that direct service providers stay abreast of the current research affecting our work. This workshop will provide a general review of recent research affecting child abuse investigations and prosecutions, and challenge the attendees to relate this information to their current practices in the field.
Learning objectives:
1. Attendees will review recently published research affecting child abuse investigations and prosecutions;
2. Attendees will relate this information to their current practices in the field; and
3. Attendees will identify multiple issues to raise with their local MDT to inform them of this emerging research and identify potential modifications to current practice.

9D
Treatment of Sibling Sexual Abuse
Geraldine Crisci, MSW
In this workshop, specific case examples demonstrate a clinical model to address issues of safety, loyalty, engagement, and minimization.  Treatment goals will be discussed for each component of the family system. 

9E
How Not to Help the Defense Attorney in Child Sexual Abuse Cases (Part 2 of 2)
Lawrence Jay Braunstein, Esq.
See session 8E for description.

9F
Intimate Partner Strangulation (Part 2 of 2)
Kelsey McKay, JD
See session 8F for description.

9G
Cross-Examination of Defense Experts in Technology-Facilitated Child Exploitation Cases
Justin Fitzsimmons, JD
This presentation gives the audience tips and examples of ways to cross-examine defense experts in cases involving a technology-facilitated crime against a child. Attendees will learn possible ways to defeat some of the more common defenses raised by experts.

9H
Sex Trafficking (Part 2 of 2)
JR Ujifusa and Mike Gallagher
See session 8H for description.

9CL
Facebook Investigations: Advanced Searching and Saving (Part 2 of 2)
Lauren Wagner and Tim Lott
See session 8CL for description.

9IL
Trust & Safety: Kik’s Approach to a Safe Chat Community (Repeat)
Michelle Micks and Nicole Nearing   
See session 5IL for description.





Share this page

Northwest SARCon

Sheriff Craig Roberts

Sheriff Craig Roberts

2017 Child Abuse & Family Violence Summit
April 11-14, 2017

Red Lion Hotel on the River
909 N. Hayden Island Drive
Portland, Oregon 97217

Julie Collinson, Conference Coordinator
Phone: 503-557-5827
Fax: 503-794-8068
jcollinson@clackamas.us

Register online