Wednesday, April 12, 2017
Thursday Registration 7:30 a.m. - 5:00 p.m.
8:30 a.m. - 10:00 a.m.
Collaborative Prevention: Supporting Victims, Children and Families Impacted by Violence
Jeffrey Bucholtz, MA
In this presentation, Bucholtz discusses the importance of collaboration in preventing and responding to violence. The presentation includes lecture, performance, audience interaction, group activities, pop-culture analysis, and video segments from a documentary comprising various interviews with service providers and content experts. The presentation includes concrete examples from successes in the San Diego community -- including the San Diego Domestic Violence Council -- in order to address the necessity for both multi-sector and ecological approaches to violence prevention and response. Participants will learn how to address the cultural conditions that facilitate violence; theoretical and practical strategies for fostering coalitions and networks; how to avoid the isolating effects of fragmentation (or "working in silos"); how to maximize trauma informed approaches; client empowerment; and strengths-based programming.
10:00 a.m. - 10:15 a.m.
Visit Summit Store & Exhibits
10:15 a.m. – 5:00 p.m.Victim Identification Lab
Jennifer Newman of NCMEC
Many children have been rescued from further sexual abuse because a clue in the background of child-pornography images led to the location of their abuse. Partnering with the Internet Crimes Against Children Task Forces and cooperating federal law-enforcement agencies, the National Center for Missing & Exploited Children (NCMEC) is proud to host the Victim Identification Lab — an initiative designed to assist law enforcement in its efforts to identify and rescue child sexual abuse victims.
NCMEC is pleased to offer all registered participants at this year's conference a glimpse into this powerful law-enforcement tool designed to rescue children. Within this interactive lab, computers will be available for participants to access background identifiers and audio clues in hopes that these items may be recognizable or familiar to Lab participants. Accompanying each sanitized picture will be a real-time message thread where participants can post their comments and suggestions. You may have the piece of the puzzle that could lead to the rescue of a child victim.
NOTE: All registered conference attendees are invited to participate in this Lab; however, due to the sensitivity of this issue, please make sure to wear your conference badge to gain entry.
10:15 a.m. - 12:15 p.m.4A
More Than Meets the Eye: Revealing a Serial Child Sex Offender
Geoff Erichsen, Detective, Bill Golden, DA, Nichole Hillyer, Sue Lewis, LCSW, and Sue Skinner, MD, FAAP
It is well-known that young children are at higher risk for sexual abuse, and are not developmentally able to tell a trusted adult clearly what is happening to them. In this presentation, our multidisciplinary team follows the evolution of a case involving young girls, from first disclosure to prosecution, addressing critical issues along the way -- including safety in the home, history of the alleged offender, detailed case investigation, and, ultimately, sentencing. We will address how crucial communication is amongst team members, and how ongoing coordination between partners ultimately supports children and families.
Broken Bones: When Should We Worry About Child Abuse?
Thomas J. Valvano, MD
In this session, Dr. Valvano -- Medical Director of the Suspected Child Abuse and Neglect (SCAN) Program at Doernbecher Children’s Hospital and a Clinical Associate Professor of Pediatrics at Oregon Health & Science University -- will do a review of pediatric fracture types and biomechanics. Dr. Valvano will discuss how to differentiate between accidental and inflicted fractures. A review of common bone disorders that may cause fractures and medical evaluations for children presenting with suspicious fractures will be discussed.
Am I The Only One Who Feels This Way? Wellness Tools for your Personal Toolbox
Elizabeth Tow, Dan Powers, LCSW, and Michael Sullivan
STOP! This is one presentation you won’t want to miss. Join us in an interactive presentation where we will look at the concerns/questions that you have about what this job does to your mental health and wellness -- and answer them with science, nutrition, emotional, and wellness tools and techniques. Build your own toolbox that will add to your resilience and well-being.
Sexual Development Birth through Puberty: “What is Normative?”
Geraldine Crisci, MSW
Understanding inappropriate sexual behavior presentations is impossible without having a clear understanding of normative sexual behavior. This workshop will review normative sexual development -- birth through puberty. Developmental expectations for each phase of sexual development will be clearly outlined.
Understanding Psychopathy and Sociopathy and Their Roles in Family Violence
Curtis St. Denis, MA, QMHP
In this session, Curtis St. Denis will demonstrate the differences between two personality disorders, psychopathy and sociopathy -- and explore the ramifications on victims, workers and systems designed to assist victims and perpetrators. This session is for any professionals in any discipline that has the potential for engaging with persons with these types of disorders.
Hands Are Not for Hitting: The Impact of Domestic Violence on Children (Repeat)
See session 1F for description.
A Decade of Abuse: The Investigation of Jose Reyna Rojas
For over a decade, Jose Reyna-Rojas systematically assaulted and tortured his wife and seven children. Finally, in February 2016, two of his daughters disclosed sexual abuse as well -- and his world came crashing down. This presentation will cover the history of abuse perpetrated by Jose and how the investigation unfolded, including startling revelations from the multiple victims and the lessons learned during this investigation. Presenters will also cover how the victims are doing now, and the challenges they are still facing.
Introduction to the Darknet
Lauren Wagner and Tim Lott
As the debate over digital privacy rages in the media and the courts, many who utilize technology have found ways to obscure their online activity. These include people who wish to commit criminal offenses. While the TOR network has some noble ideals, it is often used as a bastion where offenders can operate in the open with little fear of law-enforcement interdiction. This presentation will introduce students to the terminology employed in anonymized browsing, learn how to access the TOR network, and gain a firmer understanding of the challenges of investigating crimes on the Darknet.
In this session, participants will be introduced the use of a P2P (peer-to-peer) investigative software suite utilized to identify and investigate child pornography offenders on P2P networks.
The software suite is designed to provide real-time de-confliction and historical look-ups of IP addresses, usernames, screen names, email addresses, phone numbers, addresses, undercover chat sessions and P2P file sharing activity. Additionally, the software includes the ability to manage your own image library of child exploitation material and quickly find the images related to your current investigation, including those you could not download directly from the suspect -- but for which they were a source/possessing.
Participants will be introduced use of the latest P2P investigative client, which helps enhance and automate the gathering and logging of evidence directly from a single target. It also has the ability to simultaneously monitor several suspects, and acquire files from an offender when they come online, even with a change of IP address (dynamic IP).
Participants will be introduced to the ability to hash files, identify notable images/videos, cross-reference notes with other investigators, geo-locate IP addresses, investigate software serial numbers (GUID), and identify service providers for legal process.
12:15 p.m. - 1:30 p.m.
Visit Summit Store & Exhibits
1:30 p.m. - 3:00 p.m.5A
Advanced Injury Reconstruction (Part 1 of 2)
Injury and scene reconstruction is a must as the investigator gains "explicit knowledge” of the series of events that surround the commission of the abuse, using deductive and inductive reasoning, physical evidence, and scientific methods to determine how the injury occurred. This workshop will provide investigators with a better understanding of injury and scene reconstruction, as well as providing some simple but effective tools to use — such as injury and scene photography, video, Play-Doh reconstruction, dolls, and other non-traditional means to help recreate and determine the possible cause of injury.
Scalds, Scorches and Splashes: Burn Injuries in Children
Matthew Cox, MD
The lecture will review the medical aspects of pediatric burn injuries -- including the classic forced immersion burns, accidental spills, and unusual burn injuries. Topics such as mechanism of injury, medical evidence as it pertains to abusive burns, and treatment of burn injuries will be discussed. The lecture will be given from the perspective of a child abuse pediatrician with a target audience of investigators and prosecutors.
A Multi-Disciplinary Approach to Child Abuse Prevention: What’s Happening in Oregon Law and Practice?
Sally Blackwood, MA, LPC, Amber Kroeker, MPH, CPST, and Sara Taggart, MPA, RYT
It’s difficult to argue with the importance of preventing child abuse. Research on adverse childhood experiences tells us that prevention is paramount for keeping children safe and healthy and a key to mitigating profound societal issues such as high-school dropouts, teen pregnancy and mental-health crises. But what is child abuse prevention? And how can we do it effectively? This presentation explores a paradigm shift in which Oregon is leading the way -- from traditional definitions of prevention (primary, secondary and tertiary) towards an ecological and multidisciplinary model. Using case examples from three organizations – Cares NW, Randall Children’s Hospital and The Children’s Center – we will look at how a “spectrum approach” to prevention is playing out in our experiences and discuss what the future may hold for communities around our state.
Assessment of Sexual Behavior Problems in Prepubescent Children (Part 1 of 2)
Geraldine Crisci, MSW
This workshop will present an assessment protocol for assessing sexual behavior problems in prepubescent children. Five etiological categories will be presented and defined, and case examples will be used to illustrate differences.
Finding Trace: Fusing the Forensic Interview with Forensic Evidence
Sally K. Sheppard, LCSW and Jeremy C. Howell
This workshop will fuse the link between a disclosure of child abuse during the forensic interview and the forensic evidence that can be gathered from a crime scene. The workshop will also focus on the need for various disciplines to work together in a team approach in sharing information that may lead to a stronger criminal case. Workshop participants will be given a detailed explanation of what types of corroborating physical and trace evidence can be found by crime scene specialists, as well as the equipment utilized to find even the slightest of trace evidence. This workshop also emphasizes the use of an Alternate Light Source (ALS) and methods for recognizing and collecting technological-based evidence. This will further the forensic interviewer’s knowledge about corroborating physical and trace evidence and assist in crafting the forensic interview in order to strengthen the case beyond the word of a child victim. This workshop also promotes the collaboration between those that interview child victims and those that collect evidence at the scene of the crime.
The primary intended audience would be those within the field of law enforcement (most specifically those working child abuse and sexual assault cases) along with those who work in the field of social work as Court Appointed Special Advocates or employees of Child Protective Services and Children's Advocacy Centers (as both family advocates and forensic interviewers). This training would also be beneficial for forensic nurses working in the field of child abuse and sexual assault in learning additional ways to collect evidence on a body. Prosecutors of child abuse and sexual assault cases will learn the additional ways those gathering evidence can find additional evidence to strengthen the case.
This information is new and pressing because it assists with the validation of a child's disclosure of abuse by bringing together the link between the child's disclosure of abuse and the physical evidence that can be found in the area where the abuse occurred. Case studies and research through the instructors' experience has shown that evidence to corroborate a child's statement about the abuse can be found at the scene of the abuse months and years after the disclosure. Once those involved in the case learn of this information, it can add validation to the child's statement. This session will be repeated Wednesday, from 3:30 – 5:00 p.m.
More than Enforcement: How Law Enforcement Can Change the Environment to Help Survivors and Prevent Sexual Violence
Jeffrey Bucholtz, MA
Rape does not just “happen.” Sexual violence occurs when the environment allows perpetrators to operate freely, and when survivors do not feel safe to come forward. In fact, when survivors of sexual violence come forward with their stories, they are often met with doubt, disbelief, and even hostility from the culture around them. For law enforcement officers, this provides an important opportunity to take an active role in survivor support and violence prevention. In this workshop, participants will explore several investigative strategies to assist in evidence collection while also disrupting the cultural myths about sexual violence that facilitate a lack of safe space for survivors and embolden perpetrators.
Predators on the Darknet
Joe Sullivan, PhD.
Many who would seek to sexually exploit children and share their abuse with like-minded others are now choosing to hide in the Darknet. This presentation is a case study of an administrator of a Darknet forum which explores his online as well as offline behavior. It will include aspects of the investigation and an interview with the offender post-conviction.
The Digital Culture of Kids Today
In this presentation, McKenna, Founder of Protect Young Eyes, will answer each of these questions:
• Why is online pornography having such a profound impact on our children?
• What specific apps and devices are kids using -- and what are their risks?
• How is the brain’s complex neurology impacted by the Internet?
• How can adults stay current on the constantly changing digital landscape?
The hope is that parents, educators, law enforcement and any caring adult will walk out of this presentation enlightened, encouraged and equipped to defend our precious children from online dangers. Creating safer digital environments in our homes, schools, and public places is possible, but it requires diligence and persistence. This session will be repeated on Wednesday from 3:30 – 5:00 p.m.
Identifying Subjects Seeking to Sexually Exploit a Child in Your Own Jurisdiction (Part 1 of 2)
How many subjects in your home jurisdiction are currently online seeking to sexually exploit a child? What are their screen names? What times are they online? This hands-on computer lab will assist local law enforcement officer to answer each of the above questions. During this lab, sworn law enforcement officers will learn how to use a chat-based program to identify subjects in their home jurisdiction who are seeking to sexually exploit children. The lab will cover the use of an undercover persona, identification of predicated chat rooms, and geo-location to regionalize investigations. This lab is for sworn personnel only. This session will continue from 3:30 – 5:00 p.m.
Trust & Safety: Kik’s Approach to a Safe Chat Community
Michelle Micks and Nicole Nearing
This presentation will provide an overview of Kik’s processes and resources available for global law enforcement in criminal investigations. Kik's Trust & Safety team will discuss how Kik works, new product features, and data that may be available pursuant to legal process. They’ll also provide an overview on Kik’s latest safety features and privacy controls available to users, as well as ongoing safety initiatives.
Kik is a smartphone messenger application that lets users connect with their friends and the world around them through chat. Users can send texts, GIFs, pictures, videos and more -- all with the app. Kik uses an existing Wi-Fi connection or data plan to send and receive messages. Kik is available for download through the iOS App Store and the Google Play store on most iOS (iPhone, iPod, iPad), Android (including Kindle Fire) and Windows 7 devices. Users may also be using Kik on their Symbian-based or BlackBerry 4.6-7 phone; however, as of May 2014, it was no longer possible to download or register new accounts on these devices. This session will be repeated on Thursday from 3:30 – 5:00 p.m.
3:00 p.m. - 3:30 p.m.
Visit Summit Store & Exhibits
3:30 p.m. - 5:00 p.m.
Advanced Injury Reconstruction (Part 2 of 2)
See session 5A for description.
Abusive Head Trauma: The Evidence and the Arguments
Matthew Cox, MD
The talk will provide background information on the mechanisms of injury, medical findings, the medical evaluation and outcomes in cases of abusive head trauma. Common arguments brought forth by the defense will be reviewed. Cases will be used to illustrate the important aspects in the treatment and investigation of cases of suspected abusive head trauma.
Case Vignettes in Child Abuse and Neglect
Catherine Y.H. Wagoner, MD
Through illustrative cases, Child Abuse Pediatrician Dr. Wagoner of CARES NW will explore some challenging child-welfare scenarios, with basic background review of the legal, policy and practice, and ethical factors pertinent to each scenario.
1. Reviewing the principles behind decision-making when faced with difficult cases in child abuse and neglect;
2. Learning the Oregon Revised Statutes governing child welfare;
3. Learning some of the principles guiding the child welfare response both from law enforcement and department of human services; and
4. Beginning to think of a scheme of how to resolve ethical conflicts when faced with child-welfare situations.
Treatment Sexual Behavior Problems in Prepubescent Children (Part 2 of 2)
Geraldine Crisci, MSW
This workshop will present specific treatment interventions for the types of sexual behavior problems outlined in the assessment workshop (Part 1). Use of individual, family and group intervention will be discussed. Criteria for including trauma-focused intervention will be outlined.
Take out The Drama, Bring in the Trauma: How to Convert Challenges into Convictions
Kelsey McKay, JD
What impact does trauma have on the initiation, investigation, prosecution and decisions made by the trier of fact in violent crime? What is its place in determining whether a report of a crime is taken seriously, documented, investigated or prosecuted? The answer may surprise you. Often, conclusions about whether or not a report is credible, reasonable, and provable through the lens of own life experiences, belief and framework. When a victim makes a report of a traumatic crime, there is a process by which we filter information -- often resulting in critically inaccurate judgments of the report and victim. Information reported by the victim may not seem to make sense, and is often misinterpreted as "reasonable doubt." However, if properly understood and translated, such evidence can be valuable. The presenters will provide information about common “red flags” -- and discuss strategies to enable a better analysis of these complex cases.
Finding Trace: Fusing the Forensic Interview with Forensic Evidence (Repeat)
Sally K. Sheppard, LCSW and Jeremy C. Howell
See session 5E for description.
The Digital Culture of Kids Today (Repeat)
See session 5H for description.
Identifying Subjects Seeking to Sexually Exploit a Child in Your Own Jurisdiction (Part 2 of 2)
See session 5CL for description.
Protecting Yourself in a Tech World: Digital Officer Safety and Ethical Concerns
Lauren Wagner and Tim Lott
Nothing is more important than officer safety, whether on the street or on the computer. This lecture will show how people leave traces of themselves when visiting websites, what information can be traced, and how to ensure that investigations are not being compromised when broadcasting this information. This lecture covers website data, IP tracing, cell phone considerations, Bluetooth snarfing, and home wireless networks. This lecture also addresses the unique responsibilities of those in the medical, legal, law enforcement, victim services and advocacy fields -- highlighting common pitfalls of social media use by professionals. The audience will see examples pulled from various media sites that could cause ethical issues. Hypotheticals will also be discussed to encourage audience participation and interaction in determining whether social media use crosses an ethical boundary. Privacy issues will also be addressed.
Paul Wade and Tina Tappouni
Students will be taught basic but extremely effective skills to counter attacks from every angle -- including ground attacks. The class will be led by certified self-defense instructors Detective Paul Wade and Tina Tappouni. These skills they will teach are derived from Krav Maga -- the Israeli military fighting technique with a proven combat record -- and Brazilian Jiu Jitsu, the premier ground-fighting and ground self-defense art in the world. With these new skills, students will gain the confidence they need to survive instead of being victimized. No prior experience is required, and the class is open to all Summit attendees. Class limited to 12 participants. You will need to sign-up to participate at the Summit Information Table in the Lower Level Foyer of the Red Lion Hotel on the River.
Share this page