Services How Do I...?

Wednesday, April 22, 2015

Wednesday Registration 7:30 a.m. - 5:00 p.m.


8:30 a.m. - 10:00 a.m.

Jim ClementeKEYNOTE
Balance: The Law Enforcement/Survivor Conundrum
Jim Clemente
Clemente, a retired FBI agent/profiler, has lectured and testified as an expert witness around the world in the area of Child Sex Crimes, Child Abductions and Violent Crimes. He is also the survivor of childhood sexual victimization.  In this presentation Clemente will discuss how he balanced his expertise gleaned from education, training, investigating, prosecuting, and his own life experiences. He will also explain how he avoided letting his personal experiences bias his professional work and in fact led him to learn more about offenders and their methodologies.


10:00 a.m. – 5:00 p.m.

Victim Identification Lab
Nicholas Brock of NCMEC
Many children have been rescued from further sexual abuse because a clue in the background of child-pornography images led to the location of their abuse. Partnering with the Internet Crimes Against Children Task Forces and cooperating federal law-enforcement agencies, the National Center for Missing & Exploited Children (NCMEC) is proud to host the Victim Identification Lab — an initiative designed to assist law enforcement in its efforts to identify and rescue child sexual abuse victims.
NCMEC is pleased to offer all registered participants at this year's conference a glimpse into this powerful law-enforcement tool designed to rescue children. Within this interactive lab, computers will be available for participants to access background identifiers and audio clues in hopes that these items may be recognizable or familiar to Lab participants. Accompanying each sanitized picture will be a real-time message thread where participants can post their comments and suggestions. You may have the piece of the puzzle that could lead to the rescue of a child victim.
NOTE: All registered conference attendees are invited to participate in this Lab; however, due to the sensitivity of this issue, please make sure to wear your conference badge to gain entry.


10:00 a.m. - 10:15 a.m.

BREAK
Visit Summit Store & Exhibits


10:15 a.m. - 12:15 p.m.

4A
Experimentation or Exploitation: How Behavior Analysis Can Assist in Working with Young People Exhibiting Problematic Sexual Behavior
Joe Sullivan, PhD
Most social workers and foster cares have worked with young people exhibiting sexual behavior yet many are anxious about working with cases where the central concerns are labelled as Problematic Sexual Behavior (PSB). This presentation will seek to demystify sexual behavior in young people and provide a construct for identifying PSB and offering insights into how foster cares and social workers can effective engage with this issue.

4B
The Torture of Children
Sharon Cooper, MD, FAAP
Previously described as serious physical abuse, the torture of children is a stark reality. Numerous cases have been described in the media, and assuredly occur in every state in the country. Torture occurs when there is deliberate, systematic and wanton infliction of physical and/or psychological injury to an individual. This presentation will provide detailed definitions of physical, psychological and sexual torture as well as case examples to assist the attendees in recognizing this very egregious form of abuse.

4C
What Dr. Seuss Knows about Doing THIS Job! Wellness/Survival and the MDT Approach to Child Abuse!
Dan Powers, LCSW
In this session, Dr. Seuss helps us gain some insight to our daily struggles, doubts and the reasons we stay in this job. We will discuss the places you go, the choices you make and how they give us the courage to move mountains. You will discover how lucky you are to do what you do. Whether you like them here or there, stress will find you anywhere. Come enjoy an hour or two if even if you're old or if even if you're new.
Learning Objectives:
1. Examine why the stress of this job may affect you
2. Examine why we stay in this profession
3. Gain an understanding of things you can do to take care of yourself.

4D
The Pebble in the Pond: Factors in Multi-Generational, Childhood Sexual Abuse Victimization
Tamara Hillard, LICSW
"A Pebble in the Pond," explores the phenomenon of, "second generation" child sexual abuse victimization. Discussion will include common perceptions and understandings of how past childhood victimization can impact on the likelihood of, and response to, a child in the next generation being sexually abused. This presentation addresses Psychological factors, incidence rates, and creating a window of therapeutic opportunity amidst the fallout, for both mother and child.
Learning Objectives:
1. The participant will be able to identify areas of focus in helping a parent who has a history of CSA to deal with the dual stressors of their own abuse, and the abuse of their child.
2. The participant will be able to identify 3 "thought-errors" that if not exposed, can negatively affect recovery, for both the parent and their child.
3. The participant will be able to identify ways in which they can help parents be proactive in supporting their children while also creating a safer "normalcy" in the family.

4E
Who Needs a Snitch? Critical Investigative Partnerships
Sarah Ohlsen and Kelley Cloyd
Child sex trafficking cases are complex and need strong supporting evidence. Come learn about three invaluable investigative partnerships that can turn a difficult case into one with strong evidence. We will use case studies and examples throughout the presentation to highlight how invaluable jail intelligence, Parole and Probation intelligence and digital forensics can be to building and prosecuting a strong child sex trafficking case.

4F
I Hate this Case! Special Challenges for Victim Witness Advocates
Kristina Korobov, JD
This presentation will cover some of the special challenges that Victim Witness Advocates will face when working with sex crimes / intimate partner violence victims. We will examine non-participating and uncooperative victims, looking at reasons why victims may not want to work with prosecutors and how advocates can help to facilitate these relationships. We will also examine the ways in which offenders pressure victims not to cooperate and how the prosecution team can work together to find success and safety for victims. We will also look at victims with disabilities and how to ensure that their needs are respected and that they are able to communicate their account to the court. We will also examine the hurdles that exist when working cases involving drug / alcohol facilitated sexual assaults. The goal of the training will be to help participants turn obstacles to justice into opportunities for justice for these victims.

4G
Interviewing Offenders: Travelers
Mike Duffey
During this session, attendees will be provided with different approaches, tactics and using "themes" during their interview of offenders. This block is intended NOT to teach someone how to interview but rather provide them with some additional considerations when conducting the post arrest interview.

4H
Managing Your Victim in a Technology Age: Case Inception through Prosecution (Part 1 of 3)
Julie Kenniston, MSW, LISW, Detective Chris Kolcharno and Justin Fitzsimmons, JD
This presentation will introduce various aspects of technology to interviewers so they can adequately explore and manage the impact of technology in forensic interviews. Interviewer techniques will be offered to maximize information regarding technology-related issues. It will also focus on managing your victim from investigation to trial. Protecting your victim in the age of digital technology including text messaging, internet, and social networking sites will be explored. The multi-disciplinary team can work together to manage victims as they navigate their way through the criminal justice system. Sometimes digital technology is used in an attempt to discredit victims. This class will outline investigator techniques and prosecutor best practices to prevent attacks and manage them when they occur. 
Learning Objectives:
1. Participants will identify types of digital media being used in exploitation and child abuse cases.
2. Participants will discuss question strategies for inviting information about technology in forensic interviews.
3. Participants will discuss the implications of presenting evidence in forensic interviews.
4. Participants will learn how each member of the multidisciplinary team plays a role in protecting victims during an investigation.
5. Participants will identify technology issues that can negatively impact victims and cases.
6. Participants will learn techniques to minimize the discrediting of victims.

4J
Deception Detection
Jim Clemente
Clemente will discuss three comprehensive theories of Deception Detection (Image Control, Fight or Flight and Cognitive Complexity) in Verbal, Non-Verbal and Non-Linguistic verbal communication.  He will demonstrate these concepts with cases studies and real world examples of deception in the media like Woody Allen, Bishop Eddie Long and Stephen Collins.

4CL
Become a Google Jedi: Save Yourself from Information Overload
Lauren Wagner and Elizabeth Tow
This computer lab will teach students how to effectively use Google to filter search results to relevant and useable information. Students will complete hands-on exercises using Google Boolean and advanced Operators.  This session will be repeated Thursday, 10:15 a.m. – 12:15 p.m.

4IL
Field Triage and Data Acquisition (Part 1 of 2)
Christopher Armstrong and Don Lewis
This lab and lecture will address the collection of potential evidence from running devices at the scene of a search warrant or a Probation/Parole search using tools such as Field Search and osTriage.



12:15 p.m. - 1:30 p.m.

LUNCH
Visit Summit Store & Exhibits


1:30 p.m. - 3:00 p.m.

5A
Does a Sex Offender's Risk Diminish Over Time (Part 1 of 2)
Joe Sullivan, PhD
Sex offenders will often cite old age or the fact they have not offended for over 20 years to support their assertion that they no longer represent a risk of sexual harm to children. Attorneys will point to actuarial risk assessment tools as proof that older offenders present a lower risk of reconviction. So is it safe to assume that risk will diminish as time passes? This presentation will consider this issue using a case study to explore how sex offenders' patterns of behavior adapt and change over the years.

5B
An Overview of Child Sexual Exploitation As It Is Today!
Sharon Cooper, MD, FAAP
This presentation will describe how complex the intersections of the different types of child sexual exploitation have become in the 21st century. Though in the past sexual exploitation was seen as a single event such as trafficking victimization or online enticement, today there are numerous examples of various types of sexual exploitation present in one single case. This requires that investigators and other members of multidisciplinary teams "think outside the box" so as to consider all aspects of offender behaviors.

5C
Innovative Use of the Multidisciplinary Team in the Investigation, Assessment and Intervention of Juvenile Sex Offenders
Dan Powers, LCSW
Juvenile sex offenders pose an interesting challenge to the multi-disciplinary team. This workshop is intended for interviewers, police officers, CPS workers, medical personnel, family court workers, attorneys, judges, social workers, therapists and anyone else dealing with juvenile sex offenders. This workshop will explore the dynamics and challenges juvenile sex offenders bring to your caseload. We will review types of juvenile sex offenders and will suggest a consistent approach in dealing with them from investigation through on-going treatment. It will emphasize the multi-disciplinary team approach as solution to solving the unique problems these cases bring to the system.
Dynamics of juvenile sex offenders including myths commonly accepted my professionals will be presented. Theories of etiology will be reviewed and discussed. The different roles of the professionals involved in these types of cases will be examined as well as suggestions on how a standardized approach in the investigation, assessment and intervention of juvenile sex offenders will benefit the professionals, the offenders and the family.

5D
Real Treatment with Real Kids (Part 1 of 2)
Tamara Hillard, LICSW
Based on the "evidence based practice" of Trauma Focused-Cognitive Behavioral Therapy, this presentation provides active, creative, and relationship-based intervention ideas for working with sexually abused children. Tamara offers real ideas for how to engage children in therapy and discusses the hidden beliefs and misperceptions, which can follow a child into adulthood and limit their healing.
Learning Objectives:
1. The participant will be able to identify 3 techniques to use in helping a child begin to discuss and work through their sexual abuse history.
2. The participant will be able to identify 3 "thought-errors," which if not exposed, can negatively affect recovery.
3. The participant will be able to identify ways in which they can help parents be proactive in supporting their children, while also teaching truly effective safety skills.

5E
Sex Trafficking Creative Prosecutions
JR Ujifusa
In this session, Ujifusa will demonstrate prosecutions that are offender based using sex crimes, witness tampering, ID Theft and other creative charges to make sure prosecutions are successful and can be completed without victim participation.

5F
Getting Her from Going to Gone
Kristen Howell, MSW
Advocates, first police responders, investigators and prosecutors are routinely frustrated by a battered woman's difficulty terminating her abusive relationship. This session will provide specific examples and words to help law enforcement and advocates get her from 'going to gone.' Participants will examine ways to facilitate and prepare a woman for a safe outcome and ultimately end the abuse. This session will be repeated Wednesday, 3:30 – 5:00 p.m.

5G
The Path of Child Sex Abuse Images: From Victimization to Restitution
Nicholas Brock
Child sexual abuse images have a lifecycle that touches representatives from many agencies throughout the world as we work collaboratively to combat this problem. From the abuse and its documentation, to distribution and investigation, and ultimately to rescue and restitution, child pornography images form part of an ecosystem that involves hotlines, NCMEC, industry, and law enforcement, among others. Come learn about the path these files take from a victim-centered standpoint, and how your help and participation in the "chain" is pivotal to rescuing children featured in child sexual abuse images. The role of NCMEC's CyberTipline and Child Victim Identification Program, how they interact and are connected, along with their resources for investigators, will be discussed in depth. Case studies will be used to highlight the concepts.

5H
Managing Your Victim in a Technology Age: Case Inception through Prosecution (Part 2 of 3)
Julie Kenniston, MSW, LISW, Detective Chris Kolcharno and Justin Fitzsimmons, JD
See Session 4H for description.

5J
Water Related Abuse and Pedophilia
Andrea Zaferes
In this session, Zaferes will explain several water related forms of abuse to include submersion child abuse, pedophilia and aquatic sexual sadism. Submersion abuse with scalding water is well known in the child abuse community, and a lesser known, yet more common, form of abuse and punishment is submersion in normothermic or cold water. She will demonstrate how these submersions are easily missed, especially when they do not result in death and thus require specialized knowledge to discover and recognize. Zaferes will demonstrate that sexual assault in a pool or bathtub/pool can be purposeful or accidental; when submergence can be done to silence a screaming child, to kill the child so they cannot "tell"; or it can occur accidentally when the pedophile is fixated on the assault and not paying attention to the location of the child's airway. Lastly, she will discuss aquatic sexual sadism or lust killings using drowning as the form of torture for sexual gratification; showing how victims can be revived for repeated assaults over extended time frames, or they can be drowned to death.

5CL
Life Beyond Facebook
Lauren Wagner and Elizabeth Tow
This computer lab will introduce students to other social media sites of investigative value, such as vine, Instagram, twitter, ask.fm, kik messenger, as well as others.  Students will complete exercises on how to search these sites and capture the data for evidentiary purposes.  This session will be repeated Thursday, from 3:30 – 5:00 p.m.

5IL
Field Triage and Data Acquisition (Part 2 of 2)
Christopher Armstrong and Don Lewis
See Session 4IL for description.



3:00 p.m. - 3:30 p.m.

BREAK
Visit Summit Store & Exhibits


3:30 p.m. - 5:00 p.m.

6A
Does a Sex Offender's Risk Diminish Over Time (Part 2 of 2)
Joe Sullivan, PhD
See Session 5A for description.

6B
Cutaneous Manifestations of Child Abuse
Dan Leonhardt, MD
In this session, Dr. Leonhardt will discuss the cutaneous manifestations of child abuse. This lecture will focus on what skin findings are concerning for child abuse and neglect by looking at what the published medical literature tells us regarding skin manifestations of accidental and inflicted injury. Emphasis will be on the cutaneous manifestations of child physical abuse using specific case examples.

6C
Working with Non-Offending Parents in Child Sexual Abuse Cases
Dan Powers, LCSW
This workshop is intended for interviewers, police officers, CPS workers, probation officers, attorneys, judges, social workers, therapists and anyone else dealing with abused children and their non-offending parents. It will review types of non-offending parents and suggest a consistent approach in dealing with them from investigation through on-going treatment. Your actions can "make or break it" for the next professional dealing with the parent. We will discuss the range of emotions professionals may feel as well as the "do's and don'ts" of dealing with non-offending parents, emphasizing the need for a collaborative, consistent approach when dealing with them.
Learning Objectives:
1. Develop a framework for empathy for non-offending parents
2. Gain an understanding of the dynamics and types of non-offending parent
3. Have a consistent approach in dealing with non-offending parents

6D
Real Treatment with Real Kids (Part 2 of 2)
Tamara Hillard, LICSW
See Session 5D for description.

6E
Jury Selection in Child Abuse Cases
John Casalino
In this session, Casalino will explain the objectives for jury selection and demonstrate strategies for an effective jury selection. He will discuss the use of themes, developing questioning, research on juror and expert knowledge, juror background characteristics associated with positive and negative perceptions regarding child victims, and jurors who convict. Casalino will address questions specific to child abuse cases; sole witness being the child, lack of support from non-offending caregivers, multiple versions of the crime, poor character/age of victim, divorce and/or custody situations, experience with other children, opinions on child abuse, family dynamics, experts, medical conditions, memory suggestion, intent, delay in reporting, recantation, reasonable physical discipline, Abusive Head Trauma, and common defenses.

6F
Getting Her from Going to Gone (Repeat)
Kristen Howell, MSW
See Session 5F for description.

6G
The Path of Child Sex Abuse Images: From Victimization to Restitution
Lauren Schuette Coffren
Child sexual abuse images have a lifecycle that touches representatives from many agencies throughout the world as we work collaboratively to combat this problem. From the abuse and its documentation, to distribution and investigation, and ultimately to rescue and restitution, child pornography images form part of an ecosystem that involves hotlines, NCMEC, industry, and law enforcement, among others. Come learn about the path these files take from a victim-centered standpoint, and how your help and participation in the "chain" is pivotal to rescuing children featured in child sexual abuse images. The role of NCMEC's CyberTipline and Child Victim Identification Program, how they interact and are connected, along with their resources for investigators, will be discussed in depth. Case studies will be used to highlight the concepts.

6H
Managing Your Victim in a Technology Age: Case Inception through Prosecution (Part 3 of 3)
Julie Kenniston, MSW, LISW, Detective Chris Kolcharno and Justin Fitzsimmons, JD
See Session 4H for description.

6J
Pediatric Cold Stress and Abuse
Andrea Zaferes
A toddler arrives at an emergency room in August with hypothermia. What could be the cause? A 4-year old is left in a car in a casino garage for 5 hours in January. A 6-year old is locked out of her house at night as punishment. A child dies after being immersed in a tub full of ice and water. What is cold stress, hypothermia, and immersion hypothermia, and what are their possible causes, sign/symptoms, and consequences? Cold water immersion accident, abuse and neglect causes, signs/symptoms, and red flags will be addressed in this session.

6CL
Investigative USB Apps
Elizabeth Tow
This computer lab will teach students how to download, install and use portable apps as an investigative tool.  Firefox and related add-ons, LightScreen, and other programs will be covered.

6IL
Introduction to Mobile Devices: Systems, Seizure and Considerations
Timothy Lott and Lauren Wagner
In this session, Lott and Wagner will discuss why the use of mobile devices—including cell phones, tablets, and portable game units—is so widespread that it’s hard to find an investigation that doesn’t include at least some element of digital evidence. They will demonstrate that to conduct a thorough investigation, you need to know how to retrieve the digital data and then how to properly analyze it. In this introductory lecture session, students will learn key terminology in relation to mobile device systems, proper collection and seizure procedures and important steps to preserve evidence on mobile devices.

Share this page

Sheriff Craig Roberts

Sheriff Craig Roberts

Office: (503) 785-5000
Non-Emergency: (503) 655-8211

If this is an emergency,
call 9-1-1.