Services How Do I...?

Thursday, April 23, 2015

Thursday Registration 7:30 a.m. - 5:00 p.m.

8:30 a.m. - 10:00 a.m.

Champions for Children Award Ceremony / Keynote
Sheriff Craig Roberts

10:00 a.m. – 5:00 p.m.

Victim Identification Lab
Nicholas Brock of NCMEC
Many children have been rescued from further sexual abuse because a clue in the background of child-pornography images led to the location of their abuse. Partnering with the Internet Crimes Against Children Task Forces and cooperating federal law-enforcement agencies, the National Center for Missing & Exploited Children (NCMEC) is proud to host the Victim Identification Lab — an initiative designed to assist law enforcement in its efforts to identify and rescue child sexual abuse victims.
NCMEC is pleased to offer all registered participants at this year's conference a glimpse into this powerful law-enforcement tool designed to rescue children. Within this interactive lab, computers will be available for participants to access background identifiers and audio clues in hopes that these items may be recognizable or familiar to Lab participants. Accompanying each sanitized picture will be a real-time message thread where participants can post their comments and suggestions. You may have the piece of the puzzle that could lead to the rescue of a child victim.
NOTE: All registered conference attendees are invited to participate in this Lab; however, due to the sensitivity of this issue, please make sure to wear your conference badge to gain entry.

10:00 a.m. - 10:15 a.m.

Visit Summit Store & Exhibits

10:15 a.m. - 12:15 p.m.

'Just Looking': How Risky Are Collectors of Indecent Images of Children?
Joe Sullivan, PhD
This presentation explores one of the key questions facing professionals dealing with sex offenders who view/download child pornography: Will they commit contact sexual offences? Using video extracts of interviews with sex offenders, Dr. Sullivan will provide an insight into how we can better assess the risks posed by these offenders. It explores the questions of whether possessing indecent images of children is an indicator of risk of contact offending and if there are similarities between online and offline offending.
In addition, this presentation uses an in-depth case study to explore the issues related to this question. Exploring the thoughts and life experiences of a young man convicted once for possessing sexual images of children, the nature of the risk he poses to children in his local community is examined.

Child Physical Abuse
Cindy W. Christian, MD
Child physical abuse is a significant cause of morbidity and mortality in childhood, especially for the very young.  This session will cover the medical approach to the diagnosis of physical abuse, diseases that mimic abuse, and specific injury patterns identified in abused children.

Interviewing the Reluctant Child
Julie Kenniston, MSW, LISW
Forensic interviewers have the challenge of tackling reluctance in child interviews.  Experts agree that we still need more research on the best strategies for reluctance.  There are different approaches based on the way reluctance is manifested.  This presentation will offer some suggestions for interviewers who interview reluctant children.

Sibling Sex Abuse — Investigation (Part 1 of 3)
Geraldine Crisci, MSW
Investigating allegations of sibling sexual abuse can be particularly challenging to the family, law enforcement and child protection. In order to address these complex situations, this session will identify a protocol for investigation.  This session will include the roles of key service providers (police, protective services, probation, and mental health).

Investigation and Prosecution of Institution-Based Child Sexual Abuse and Authority Figures
Roger Canaff
This presentation will focus on the particular needs and concerns that exist for multidisciplinary team members when the suspect in a child sex abuse case is in a position of authority, either over the child directly or in the child’s environment. Particular focus will be on the inadvertent role that many institutions (particularly large and powerful institutions) play in sheltering and even attracting predators. Discussed and highlighted will be concrete, practical strategies to address building rapport with victims, working with non-offending caregivers, recantation, and breaking barriers to investigation and prosecution of perpetrators in positions of authority.

Strangulation: What it is, Why We Care and How to PROVE It! (Repeat)
Kelsey McKay
See Session 2F for Description.

Ethical Considerations in Social-Networking Sites: 'What Happens When I Post That?'
Justin Fitzsimmons, JD
This presentation describes the role of social-networking sites in today’s culture and their prevalence in the lives of both adults and children. The unique responsibilities of those in the medical, legal, law enforcement, victim services and advocacy fields are described to highlight common pitfalls of social media use by professionals. The audience sees examples pulled from various media sites that could cause ethical issues. Hypotheticals are given to encourage audience participation and interaction in determining whether social media use crosses an ethical boundary. Privacy issues are also addressed.

When Sex Abuse is Within the Family:  Following a Case From Beginning to End
Bryan Brock, JD, Sue Skinner, MD, Germaine Kollias, BA, Detective Andy Kiesel and Sabra Darcy
Each of us approaches a particular abuse case from our own vantage point: We are a caseworker, a detective, or a forensic interviewer. We do our part, then we are done. But how often do we step back and look at the whole picture, really understanding the case from beginning-to-end? As we attempt to understand how things unfolded for the family, the longevity of the case, and how each agency works within a multidisciplinary approach, we can better understand how to support children and how to work together. This presentation covers a 19-month period of time, from the time of the 11-year-old girl’s first statements of sexual abuse by her father, until the end of the trial. Strengths and pitfalls along the way will be highlighted, offering insight on how each of us can learn from other cases.

Become a Google Jedi: Save Yourself from Information Overload
Lauren Wagner and Elizabeth Tow
See Session 4CL for description.

The Internet Once a Village (IPv4) Now a Universe (IPv6)
Don Lewis and James Williams
IPv4 and IPv6 devices that connect to the internet must have two things, an internet protocol (IP) address and a MAC address.  Similar to a phone number identifying and routing a phone call to a telephone, an IP address identifies a device on the internet and routes traffic to that device. There are 4.3 billion available IP addresses in IPv4, all of which were exhausted February 3, 2011.  The creation of IPv6 vastly expands the number of available IP addresses.  This session discusses changes in Internet addressing, the advantages, limitations and risks to investigations, introduced by migration from IPv4 to IPv6.  Students who attend will learn methods for identifying and tracking IPv6 addresses.

12:15 p.m. - 1:30 p.m.

Visit Summit Store & Exhibits

1:30 p.m. - 3:00 p.m.

A-Z Insight into the Mind of a Traveling Sex Offender
Joe Sullivan, PhD
Sex offenders who travel to sexually exploit children in other jurisdictions has become an issue of some concern to law enforcement and non-government organizations internationally.  Facilitated by the increasing ease of access to for travelers to the developing world, this crime is perpetrated against some of the most vulnerable children.  This presentation uses interviews with perpetrators of sexual crimes against children abroad to illustrate some of the important issues related to this crime.  It also seeks to provide insights into the nature of the problem in the countries most popular with those perpetrators who exploit children overseas.

Child Sexual Abuse
Cindy W. Christian, MD
Child sexual abuse is a common problem, affecting hundreds of thousands of children each year. The diagnosis is generally made by a child’s disclosure, although some children present with medical complications of abuse, such as injury or infection. Physicians are often untrained and uncomfortable when asked to examine children who have been sexually abused. This session will describe the medical evaluation of child sexual abuse and medical diagnoses sometimes confused with sexual abuse, and will review the interpretation of sexually transmitted infections.

Assessing Evaluator Bias in Cases of Alleged Child Sexual Abuse
Mark D. Everson, PhD
Professionals who investigate allegations of child sexual abuse know the critical importance of being objective and impartial in the decision process.  This session examines research suggesting that many professionals in the forensic field approach cases with strong predispositions which impact their judgment about case credibility. Session participants will have the opportunity to assess their own level of bias.  Safeguards and interventions to minimize bias will be discussed.  This session will be repeated on Friday from 10:00 a.m. – 12:00 p.m.

Sibling Sex Abuse:  Assessment (Part 2 of 3)
Geraldine Crisci, MSW
This session will identify a protocol for the assessment of sibling sexual abuse. Topics include: separation of victim and offender; joint interviews with victim and offender. The critical role of full family participation in the assessment process will be outlined. Case examples will demonstrate a working model to address issues of safety, loyalty, engagement, and minimization.

Introducing Evidence of Grooming and Dynamics of Victimization in Child Sex-Abuse Cases
Roger Canaff
This presentation will address the methods of grooming that most child sex predators employ when targeting child victims and seeking to involve them in sexual behavior. Dynamics of victimization will be discussed — including an examination of common reactions to child sexual abuse and experiences that many victims share. Finally, attendees will learn how to explain these dynamics in ways that make the child’s account of abuse believable in court and supportive of the theme and theory of the case.

Successful Prosecution and Presentation of Strangulation Cases to a Jury
Kelsey McKay
This session will prepare prosecutors, law enforcement and medical experts to present these challenging strangulation cases to a judge or jury from start to finish — starting with how to evaluate the cases, how to present them to grand jury, and when to take them to trial. The session will provide trial tips to the attendees, including tips during voir dire, how to make a jury understand this unique type of assault through the use of charts, diagrams and through utilizing a domestic violence and strangulation expert. Attendees will learn how to recruit and use a strangulation expert in the courtroom, see examples from real cases that have been tried to a jury, and how to coordinate a response in your community to better investigate, treat and prosecute this crime. It is recommended that attendees who wish to participate in this course attend “Strangulation: What it is, Why We Care and How to Investigate it!” on either Tuesday from 1:30 – 3:00 p.m. and 3:30 – 5:00 p.m., or Thursday from 10:15 a.m. – 12:15 p.m. prior to attendance.

Authenticating Digital Evidence in Court
Justin Fitzsimmons, JD
This presentation covers the various types of evidence that investigators can gather from cyberspace and cellular phone providers. The audience is shown case-law examples for authenticating emails, chats, and other technological evidence. The presentation also gives examples of what type of witnesses are needed to lay the proper foundation for the admission of digital evidence.

Identifying Child Sex Trafficking Victims in Missing Child Cases
Laura Carroll
This presentation will demonstrate National Center for Missing and Exploited Children resources available to investigators working to identify and recover victims of child sex trafficking. Attendees will become familiar with the analytical resources provided to law enforcement nationwide investigating these types of cases by the Child Sex Trafficking Team at NCMEC. Analysts process over 900 online advertisements a month and provide technical-assistance reports to law enforcement in their efforts to build cases and successfully prosecute those individuals involved in trafficking children. This session will be repeated on Thursday from 3:30 – 5:00 p.m.

Firefox Add-ons: Free Resources to Enhance your Investigations
Lauren Wagner and Elizabeth Tow
This computer lab will teach students how to effectively use Mozilla Firefox add-ons as investigative tools.  These add-ons can offer time-saving solutions to day-to-day investigation tasks.

The Recovery of Volatile Data (Part 1 of 2)
Chris Armstrong and Don Lewis
This lab and lecture will address the collection of “Volatile Data” in the form of a computer’s Random Access Memory, or RAM. Volatile data is information which Law Enforcement has historically overlooked.  We will use the free FTK Imager software to conduct a RAM dump, and then we’ll use a free demonstration version of FTK to open and view the contents of the RAM dump.

3:00 p.m. - 3:30 p.m.

Visit Summit Store & Exhibits

3:30 p.m. - 5:00 p.m.

The Cheater Cam: Physical Abuse and Torture of a 2-Month-Old Caught on Video
Sandra Murray, MD, Van Greco, MD, Dr. Daphne Wong, Happy Medina and Barrie Pink
Members of the multidisciplinary team will present the case as it unfolded — from the initial presentation through prosecution. Portions of the video, medical findings, investigation and prosecution will be discussed.
This case presents a unique opportunity to correlate actual physical events to injuries seen on physical exam as well as radiographic images. The teamwork between the medical team, investigating agencies, and the prosecuting attorneys lead to a successful conviction of child abuse, torture and attempted murder. The medical team provided a better understanding of the meaning of the medical findings to the investigative team, and the added history from the investigative teams assisted in an improved evaluation and treatment of the infant. This session will be repeated on Friday from 10:00 a.m. – 12:00 p.m.

Controversies in Abusive Head Trauma
Cindy W. Christian, MD
The diagnosis of abusive head trauma has come under attack in recent years.  This session will cover some of the controversies related to “shaken baby syndrome” and other manifestations of child abuse, and will provide balance to the issues being challenged.

Child Forensic Interviewing at Age 35:  Virtuous to a Fault
Mark D. Everson, PhD
Our field has long been dominated by the pursuit of virtue. For the last 30 years, we have sought improvements in the forensic interviewing and evaluation process to increase diagnostic accuracy in our assessments of child sexual abuse allegations. The 1980s were an era of emphasis on “Sensitivity” — an index of diagnostic accuracy that focused on reducing errors of undercalling abuse. Since the mid-1990s, our field has emphasized “Specificity,” or reducing errors of overcalling abuse. This workshop will examine the deleterious impact of this lack of forensic balance on the history of our field and on accepted practice. The session will also discuss current best-practice interview techniques designed to reduce errors of undercalling and errors of overcalling.

Sibling Sex Abuse:  Treatment
Geraldine Crisci, MSW
This session will address a specific treatment modality for effectively intervening in cases involving sibling sexual abuse.  The importance of full family participation will be outlined.  Development of treatment plans will be examined.

Abuse and Neglect of Children with Disabilities
Roger Canaff
Children with physical, cognitive and emotional disabilities (or a combination of one or more) are believed to be abused and neglected at higher rates than children without such challenges. This presentation focuses on some common disabilities that are often encountered by child protection professionals — including Autism Spectrum Disorder, Downs Syndrome and other cognitive delays, and deafness. The presentation provides both crucial facts about these disabilities, how they can contribute to vulnerability, and how practitioners can best approach these cases in a way that maximizes success and minimizes the chances of seeing the child only through the prism of the disability.

When the Abuse of Animals Harms Children: Strategies for Helping Children and Families
Allie Phillips, JD
When children witness harm to their companion animal, it can forever impact the health and well-being of the child — and could lead to subsequent perpetration of harm towards animals and people. Over 82 million American homes (68%) have a companion animal, with 98% deeming them a part of the family. This is particularly true for children who often see their pets as siblings. The American family has been redefined to include companion animals, and how we respond to child abuse must now include inquiries about animals. When family violence is present, the pet is often targeted to gain silence and compliance of child victims. This session is important for anyone who speaks with children about abuse and provides for early intervention to prevent the escalation of violence. This workshop will delve into the newest research and theories addressing how animals can be caught in the crossfire of family violence — and how failing to address animal abuse can contribute to continued violence in the home. Strategies for intervention will include: the psychological impact of animal abuse on children; addressing when maltreated children turn to abusing animals; successful multi-disciplinary team responses; how to talk with children about their experiences with animals; and programs to assist families with companion animals as victims flee abusive homes and find safety. Investigation and prosecution of crimes that link animal abuse to child abuse will be discussed. This session will be repeated on Friday from 10:00 a.m. – 12:00 p.m.

Emerging Technologies
Justin Fitzsimmons, JD
New technological advances are added to the consumer marketplace at a constant and rapid pace. Understanding where children are going on the web and how offenders are using the newest technology to groom and exploit children is imperative to any agency handling the investigation or prosecution of child sexual exploitation. This presentation covers some of the newest technological devices and discusses how they are being used to facilitate child exploitation.

Identifying Child Sex Trafficking Victims in Missing Child Cases (Repeat)
Laura Carroll
See Session 8H for description.

Life Beyond Facebook (Repeat)
Lauren Wagner and Elizabeth Tow
See Session 5CL for description.

The Recovery of Volatile Data (Part 2 of 2)
Chris Armstrong and Don Lewis
See Session 8IL for description.

Share this page

Clackamas County Sheriff

Sheriff Craig Roberts

Sheriff Craig Roberts

Office: (503) 785-5000
Non-Emergency: (503) 655-8211

If this is an emergency,
call 9-1-1.