Speaker Biographies - National Criminal Justice Training Center
Transcription
Speaker Biographies - National Criminal Justice Training Center
2010 Internet Crimes Against Children National Conference Hyatt Regency May 11 - 14, 2010 Jacksonville, FL P g our Ch n i T ild EC T re O n R Making the Internet a Safer Place New workshops on the latest investigative techniques Network and learn from experts in their field SEARCH Table of Contents Welcome 1 General Information 7 Conference Information 9 Plenary Session 15 Daily Activities – Lab & Lecture Schedules 23 Computer Lab Descriptions 33 Lecture Session Descriptions 41 Speaker Biographies 57 Exhibitors 79 Acknowledgements 83 PROTECTING OUR CHILDREN N 1 2 2010 ICAC NATIONAL CONFERENCE Welcome The ICAC Program started in 1998 with only 10 Task Forces. Today there are 61 Task Forces, representing more than 3,000 Federal, State, Local and Tribal law enforcement and prosecutorial agencies. Dear Conference Participant: We are pleased to have you join us for the 2010 Internet Crimes Against Children (ICAC) National Conference. This year, you are joining several hundred law enforcement investigators and prosecutors to receive the most up-to-date training related to combating Internet crimes against children. This year’s theme is PROTECTing our Children; Making the Internet a Safer Place. We are excited to offer over 100 different workshop topics and over 400 hours of law enforcement training that is a direct match to the needs of our ICAC Task Force members, their affiliates, Federal partners and child protection professionals. We have over 100 talented speakers who bring with them specialized experience in protecting children from online exploitation. I commend the work that they are doing and thank them for sharing both their experience and knowledge as we all work together to stop the exploitation of children. The 2010 ICAC National Conference brings together local, state and federal law enforcement investigators and prosecutors from throughout the United States, as well as internationally. The conference provides an opportunity for networking both within and outside the planned agenda and for establishing the relationships necessary for a successful impact at the national level. I take this opportunity to thank the ICAC Task Force Commanders, affiliate agencies, and all our ICAC program and federal training partners who have worked to make this conference a success. I extend a special thanks to Fox Valley Technical College for their hard work to make this the most successful ICAC National Conference to date. The group gathered here for the 2010 ICAC National Conference shares a common commitment and a goal to keep our children safe from sexual predators. In strengthening our partnerships, sharing successful strategies and techniques, and discussing the valuable lessons learned in the field, our success in combating Internet crimes will continue to grow. Sincerely, Jeff Slowikowski Acting Administrator Office of Juvenile Justice and Delinquency Prevention PROTECTING OUR CHILDREN 1 ICAC Task Force Program Information OJJDP’s Internet Crimes Against Children Task Force Agencies The Internet Crimes Against Children Task Force Program (ICAC program) helps state and local law enforcement agencies develop an effective response to cyber enticement and child pornography cases. This help encompasses forensic and investigative components, training and technical assistance, victim services, and community education. The program was developed in response to the increasing number of children and teenagers using the Internet, the proliferation of child pornography, and heightened online activity by predators seeking unsupervised contact with potential underage victims. The FY 1998 Justice Appropriations Act (Pub, L. No. 105–119) directed OJJDP to create a national network of state and local law enforcement cyber units to investigate cases of child sexual exploitation. The ICAC program is a national network of 61 coordinated task forces representing over 3,000 federal, state, and local law enforcement and prosecutorial agencies. These agencies are engaged in proactive investigations, forensic investigations, and criminal prosecutions. By helping state and local agencies to develop effective, sustainable responses to online child victimization and child pornography, OJJDP has increased their capacity to address Internet crimes against children. 2 2010 ICAC NATIONAL CONFERENCE ICAC Task Force Agency Contacts Alabama California, San Diego Florida, Polk County Sheriff’s Office Alabama Bureau of Investigation Jurisdiction: Alabama Contact: Sergeant Ricky Agerton Phone: (334) 353-1625 E-mail: Ricky.Agerton@dps.alabama.gov San Diego Police Department Jurisdiction: San Diego, CA area Contact: Sgt. Chuck Arnold Phone: (858) 715-7120 E-mail: carnold@sdicac.org Polk County Sheriff’s Office Jurisdiction: Central Florida Contact: Lt. Gary James Phone: (863) 297-3101 E-mail: gjames@polksheriff.org Alaska California, San Jose Georgia Anchorage Police Department Jurisdiction: Alaska Contact: Detective Sgt. Michael Couturier Phone: (907) 786-2679 E-mail: mcouturier@ci.anchorage.ak.us San Jose Police Department Jurisdiction: San Jose, CA area Contact: Sgt. Randy Schriefer Phone: (408) 277-4102 E-mail: Randall.Schriefer@sanjoseca.gov Georgia Bureau of Investigation Jurisdiction: Georgia Contact: Sp. Agt in Charge John Whitaker Phone: (404) 270-8870 E-mail: john.whitaker@gbi.ga.gov Arizona Colorado Hawaii Phoenix Police Department Jurisdiction: Arizona Contact: Det. Sgt. Frank Kardasz Phone: (602) 650-3170 E-mail: Frank.Kardasz@phoenix.gov Colorado Springs Police Department Jurisdiction: Colorado Contact: Sgt. Bill Dehart Phone: (719) 444-7808 E-mail: Dehartbi@ci.colospgs.co.us Hawaii Department of Attorney General Jurisdiction: Hawaii Contact: Kristin Izumi-Nitao Phone: (808) 587-4114 E-mail: Kristin.E.Izumi-Nitao@hawaii.gov Arkansas Connecticut Idaho Arkansas State Police Jurisdiction: Arkansas Contact: Captain John Morrow Phone: (501) 618-8373 E-mail: john.morrow@asp.arkansas.gov Connecticut State Police Jurisdiction: Connecticut Contact: Sgt. Jim Smith Phone: (203) 639-6407 E-mail: jsmi.ccu@snet.net Idaho Office of Attorney General Jurisdiction: Idaho Contact: ICAC Investigator Jim Kouril Phone: (208) 334-4125 E-mail: jim.kouril@ag.idaho.gov California, Los Angeles Delaware Illinois Los Angeles Police Department Jurisdiction: Los Angeles, CA area Contact: Lt. Andrea Grossman Phone: (562) 624-4028 E-mail: 30231@lapd.lacity.org Delaware Department of Justice Jurisdiction: Delaware Contact: Lt. Bob Moses Phone: (302) 739-2467 E-mail: bob.moses@state.de.us Illinois Attorney General’s Office Jurisdiction: Illinois Contact: Deputy Chief Mike Sullivan Phone: (312) 814-3505 E-mail: misullivan@atg.state.il.us California, Fresno County Florida, Broward County Illinois - Cook County Fresno County Sheriff’s Office Jurisdiction: Fresno County California Contact: Lt. Victor Wisemer Phone: (559) 488-3904 E-mail: Victor.wisemer@fresnosheriff.org Broward County Sheriff’s Office Jurisdiction: Southern Florida Contact: Lt. Robert Cates Phone: (954) 888-5256 E-mail: Robert_cates@bsosid.org Cook County State’s Attorney’s Office Jurisdiction: Illinois, Cook County Area Contact: Deputy Chief Kathleen Muldoon Phone: (773) 869-5887 E-mail: kmuldoo@cookcountygov.com California, Sacramento County Florida, Gainesville Indiana Gainesville Police Department Jurisdiction: Northern Florida Contact: Det. John Madsen Phone: (352) 334-2561 E-mail: madsenja@cityofgainesville.org Indiana State Police Jurisdiction: Indiana Contact: Lt. Charles L. Cohen Phone: (317) 232-8309 E-mail: : CCohen@isp.in.gov Sacramento County Sheriff’s Office Jurisdiction: Sacramento County California Contact: Lt. Harvey Woo Phone: (916) 874-3030 E-mail: twoo@sacsheriff.com PROTECTING OUR CHILDREN 3 ICAC Task Force Agency Contacts Iowa Michigan New Hampshire Iowa Division of Criminal Investigation Jurisdiction: Iowa Contact: Special Agent in Charge Gerard Meyers Phone: (515) 965-7402 E-mail: meyers@dps.state.ia.us Michigan State Police Jurisdiction: Michigan Contact: D/Sgt. Jay Poupard Phone: (517) 336-2012 E-mail: PoupardJ@michigan.gov Portsmouth Police Department Jurisdiction: New Hampshire Contact: Captain Corey MacDonald Phone: (603) 610-7548 E-mail:cmacdonald@pd.cityofportsmouth.com Minnesota New Jersey St. Paul Police Department Jurisdiction: Minnesota Contact: Commander Neil Nelson Phone: (651) 793-1045 E-mail: neil.nelson@ci.stpaul.mn.us New Jersey State Police Jurisdiction: New Jersey Contact: Det. Sgt. 1st Class Gordon Samartino Phone: (609) 584-5051 x 5632 E-mail: lpp4919@gw.njsp.org Mississippi New Mexico Mississippi Office of Attorney General Jurisdiction: Mississippi Contact: Assistant AG Jean Vaughn Phone: (601) 359-3817 E-mail: jvaug@ago.state.ms.us New Mexico Attorney General’s Office Jurisdiction: New Mexico Contact: Special Agent in Charge Jolene Altwies Phone: (505) 222-9023 E-mail: JALTWIES@nmag.gov Missouri New York Glendale Police Department Jurisdiction: Missouri Contact: Lt. Joe Laramie Phone: (314) 889-4282 E-mail: Jlaramie@glendalemo.org New York State Police Jurisdiction: New York Contact: Captain Frank Pace Phone: (518) 485-2953 E-mail: fpace@troopers.state.ny.us Montana New York City Police Department Jurisdiction: New York, New York City Area Contact: Lieutenant Dennis Lane Phone: (646) 610-4740 E-mail: dennis.lane@nypd.org Kansas Sedgwick County Sheriff’s Office Jurisdiction: Kansas Contact: Lt. Jeff Weible Phone: (316) 337-6552 E-mail: jweible@sedgwick.gov Kentucky Kentucky State Police Jurisdiction: Kentucky Contact: Captain Howard Logue Phone: (502) 226-2160 E-mail: Howard.Logue@ky.gov Louisiana Louisiana Department of Justice Jurisdiction: Louisiana Contact: Deputy Director Mike Johnson Phone: (225) 326-6138 E-mail: johnsonm@ag.state.la.us Maine Maine State Police Jurisdiction: Maine Contact: Sgt. Glenn Lang Phone: (207) 877-8081 E-mail: glang@mcctf.org Billings Police Department Jurisdiction: Montana Contact: Project Coordinator Tim West Phone: (406) 896-3295 E-mail: westt@ci.billings.mt.us North Carolina Nebraska Maryland Maryland State Police Jurisdiction: Maryland Contact: Lt. John Wilhelm Phone: (410) 953-8260 E-mail: jwilhelm@mdsp.org Nebraska State Patrol Jurisdiction: Nebraska Contact: Lt. John Shelton Phone: (402) 471-8493 E-mail: John.Shelton@nebraska.gov North Dakota Nevada Massachusetts Massachusetts State Police Jurisdiction: Massachusetts Contact: Sgt. Steve Del Negro Phone: (413) 499-1112 x307 E-mail: Steven.Delnegro@state.ma.us 4 NC State Bureau of Investigation Jurisdiction: North Carolina Contact: Special Agent in Charge Kelly Moser Phone: (919) 716-0487 E-mail: kmoser@ncdoj.gov Las Vegas Metropolitan Police Dept. Jurisdiction: Nevada Contact: Lt. Raymond Steiber Phone: (702) 828-4598 E-mail: R3542s@lvmpd.com ND Bureau of Criminal Investigation Jurisdiction: North Dakota Contact: Special Agent Tim Erickson Phone: (701) 328-5500 E-mail: te409@nd.gov 2010 ICAC NATIONAL CONFERENCE ICAC Task Force Agency Contacts Ohio Tennessee Virginia Cuyahoga County Prosecutor’s Office Jurisdiction: Ohio Contact: APA Frankie Goldberg Phone: (216) 443-7847 E-mail: fgoldberg@cuyahogacounty.us Knoxville Police Department Jurisdiction: Tennessee Contact: Captain Monty Houk Phone: (865) 215-7020 E-mail: mhouk@cityofknoxville.org Virginia State Police Jurisdiction: VA, Northern & Washington, DC Contact: Captain Kirk Marlowe Phone: (804) 674-2696 E-mail: kirk.marlowe@vsp.virginia.gov Oklahoma Texas, Dallas Washington Oklahoma State Bureau of Investigation Jurisdiction: Oklahoma Contact: Sp. Agt in Charge Steve Tanner Phone: (405) 879-2613 E-mail: steve.tanner@osbi.ok.gov Dallas Police Department Jurisdiction: Texas, Northern Contact: Lt. Chesley Williams Phone: (214) 671-4201 E-mail: c.williams1@dpd.ci.dallas.tx.us Seattle Police Department Jurisdiction: Washington Contact: Captain Greg Ayco Phone: (206) 684-4351 E-mail: gregory.ayco@seattle.gov Oregon Texas, Southern Oregon Department of Justice Jurisdiction: Oregon Contact: Assistant SAIC Ken Rueben Phone: (503) 378-6347 E-mail: Ken.rueben@doj.state.or.us Office of the Attorney General of Texas Jurisdiction: Texas, Southern Contact: Chief of Criminal Investigations Division David Boatright Phone: (512) 463-3265 E-mail: David.Boatright@oag.state.tx.us West Virginia Pennsylvania Delaware County District Attorney’s Office Jurisdiction: Pennsylvania Contact: Lt. Dave Peifer Phone: (610) 891-4709 E-mail: : paicac@gmail.com Pasadena Independent School District Jurisdiction: Texas, Houston Metro Area Contact: Lieutenant Matt Gray Phone: (713) 740-0045 E-mail: mgray@hmicac.org Rhode Island Utah Rhode Island State Police Jurisdiction: Rhode Island Contact: Lt. Nicholas Tella Phone: (401) 275-5171 E-mail: NTella@risp.dps.ri.gov South Carolina South Carolina Attorney General’s Office Jurisdiction: South Carolina Contact: AAG Deborah Shupe Phone: (803) 734-3797 E-mail: DShupe@scag.gov South Dakota South Dakota Department of Justice Jurisdiction: South Dakota Contact: SSA Craig Price Phone: (605) 773-3331 E-mail: craig.price@state.sd.us PROTECTING OUR CHILDREN Utah Office of Attorney General Jurisdiction: Utah Contact: Section Chief Jessica Farnsworth Phone: (801) 580-4165 E-mail: jfarnsworth@utah.gov Vermont West Virginia State Police Jurisdiction: West Virginia Contact: Sergeant Christopher Casto Phone: (304) 293-6401 E-mail: cmcasto@wvsp.state.wv.us Wisconsin Wisconsin Department of Justice Jurisdiction: Wisconsin Contact: Director, DCI Investigative Services David Matthews Phone: (608) 266-1671 E-mail: matthewsds@doj.state.wi.us Wyoming Wyoming Div.of Criminal Investigation Jurisdiction: Wyoming Contact: Special Agent Scotty Hughes Phone: (307) 777-5437 E-mail: scottyhughes1@mac.com Burlington Police Department Jurisdiction: Vermont Contact: Lt. Kris Carlson Phone: (802) 540-2202 E-mail: kcarlson@bpdvt.org Virginia Bedford County Sheriff’s Office Jurisdiction: Southern Virginia Contact: Lt. Michael Harmony Phone: (540) 586-4800 E-mail: mharmony@bedfordsheriff.org 5 6 2010 ICAC NATIONAL CONFERENCE General Information From 2005 to 2009, the ICAC Task Forces have increased their yearly arrest totals by 133%. General Information Thank you for joining us at the 2010 Internet Crimes Against Children National Conference in beautiful Jacksonville, Florida. This year’s conference is the largest event providing training related to Internet crimes against children to law enforcement in the nation. Throughout the conference, we will continue to emphasize the importance of cooperation and collaboration between federal, state and local investigators and prosecutors. Conference training will focus on the investigation of Internet crimes against children and techniques that will help lead to the successful prosecution of these horrific crimes. SPECIAL EVENT The Jacksonville Landing, located right on the banks of the St. Johns River, welcomes attendees to the 2010 Internet Crimes Against Children National Conference to enjoy all that the Landing has to offer. On Wednesday night, they will feature a live band from 7-11 pm, which will also be open to the public. There is a great selection of restaurants and bars at the Landing. Attendees can relax, have dinner and enjoy drinks while listening to the music, socializing and networking! Be sure to bring your conference ID badge. Come join in the fun at the Jacksonville Landing! ENJOY JACKSONVILLE Make the most of your stay in Jacksonille, Florida. This wonderful city has much to offer! Visit the Jacksonville information booth on the 2nd floor of the Hyatt Regency Jacksonville for information on social activities as well as local attractions. You can also log on to www.visitjacksonville.com for more ways to make the most of your visit to Jacksonville, Florida. PROTECTING OUR CHILDREN 7 Local Restaurants Restaurants within walking distance of the Hyatt Regency Jacksonville Riverfront Restaurant Name Northstar Substation Bravo’s Ristorante Einstein Bros Bagels Ed’s Spanish American Bay Street Cafe Qui Sushi Rock Inn Rig Wraps Atrium Cafe & Grill Jax City Cafe Casa Dora Italian Cafe Turtle D’s Farah Food Mart And Deli London Bridge Pub Wally Dogz Ruth’s Chris Steak House Yogurt Creams & Things Benny’s Steak and Seafood Cinco De Mayo Koja Sushi Sakura Japan Mill Brewery & Eatery, The American Cafe Twisted Martini Calvin’s Cajun Express Great Wraps Flamers Charbroiled Hamburgers Vito’s Italian Cafe Sbarro Hooters Jax Landing Orange Tree Hot Dogs Dona Maria’s Mexican Apple A Day Deli Southend Brewery & Smokehouse Bourbon Bayou Village Bread Cafe Burrito Gallery DBS Vending Stands Mongos Flat Hot Grill Chew Restaurants 8 Address 119 East Bay Street 225 East Coastline Drive 225 East Coastline Drive 233 East Bay Street 233 East Bay Street 1950 San Marco Boulevard 1 Independent Drive 1 Independent Drive 100 East Forsyth Street 108 East Forsyth Street 220 East Bay Street 345 East Bay Street 3526 San Jose Blvd 1 Sister Cities Plaza 1201 Riverplace Boulevard 1301 Riverplace Boulevard 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 2 Independent Drive 21 East Adams Street 501 East Bay Street Ste 200, 2 Independent Drive 117 West Adams Street Phone No. (904) 860-5451 (904) 633-9095 (904) 634-4579 (904) 353-5891 (904) 634-0328 (904) 399-3305 (904) 247-7764 (904) 634-1811 (904) 633-9028 (904) 356-8282 (904) 353-4542 (904) 598-5231 (904) 359-0001 (904) 309-2028 (904) 396-6200 (904) 398-2712 (904) 301-1014 (904) 329-2892 904) 350-9911 (904) 353-1351 (904) 353-3538 (904) 353-4503 (904) 353-8464 (904) 354-0010 (904) 354-7876 (904) 354-7951 (904) 355-3002 (904) 355-6999 (904) 356-5400 (904) 598-0006 (904) 598-2696 (904) 647-7712 (904) 665-0000 (904) 674-6714 (904) 683-7244 (904) 598-2922 (904) 356-7142 (904) 665-0123 (904) 355-3793 Distance 0.1 0.1N 0.1N 0.1N 0.1N 0.1S 0.2NW 0.2NW 0.2N 0.2 0.2SE 0.2NE 0.2N 0.3W 0.3SW 0.3S 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3W 0.3N 0.3E 0.3W 0.4NW 2010 ICAC NATIONAL CONFERENCE Conference Information In 2009, the ICAC Task Forces conducted more than 12,000 investigations leading to the arrest of more than 3,700 individuals. Conference Information General Information Check-in and Onsite Registration Hours: As a courtesy to other attendees, please turn off (or put on vibrate) all cellular phone and BlackBerry devices during all sessions. Please arrive on time for all sessions. Monday, May 10: Tuesday, May 11: Wednesday, May 12: Thursday, May 13: Friday, May 14: For the Plenary Session, please move to the front of the room. Please fill the seats in the front to make room for late arrivals. All lecture sessions are filled on a first come, first served basis. If the workshop is filled to capacity, please check to see if it is offered at a later time or attend your second choice workshop. Conference Check-in and Onsite Registration Hours/Location Eligibility and Check-in: This conference is limited to agencies who handle Internet Crimes Against Children related cases and other invited guests. All registrants of the 2010 ICAC National Conference must check-in at the conference registration desk located on the second floor of the Hyatt Regency Jacksonville to pick up a name badge and other conference materials. Onsite Registration: Eligible participants will be able to register onsite. Lab session attendance will be allowed based on availability. Lab seats not reserved during pre-registration will be filled on a first come, first served basis on the day and at the time the session is scheduled. Information on available lab sessions will be provided at the ICAC Training & Technical Assistance Exhibit Booth in the Exhibition Hall. Eligible participants who register onsite will also be allowed to attend any lecture session. While participants will be allowed into sessions, there is no guarantee that onsite registrants will be provided conference materials as materials are available on a limited basis. PROTECTING OUR CHILDREN 3:00 pm – 7:00 pm 7:00 am – 4:30 pm 7:30 am – 4:30 pm 7:30 am – 4:30 pm 7:30 am – 10:00 am Your name badge is your admission to all sessions and must be worn at all times. If you misplace your badge, you will be required to show a photo ID at the conference registration desk to obtain a new badge. Please carry your photo ID with you at all times. Exhibitor Hours/Location: The Exhibit Hall is located on the second floor of the Hyatt Regency Jacksonville. Exhibitor Hours: Monday, May 10: (Set up Only) Tuesday, May 11: Wednesday, May 12: Thursday, May 13: Friday, May 14: 2:00 pm – 6:30 pm 7:00 am – 5:00 pm 7:00 am – 5:00 pm 7:00 am – 5:00 pm 7:00 am –11:30 am Speaker Information: All 2010 ICAC National Conference speakers should check in at the speaker registration desk on the second floor during conference registration hours to pick up their name badge and conference materials. Monday, May 10: Tuesday, May 11: Wednesday, May 12: Thursday, May 13: Friday, May 14: 3:00 pm – 7:00 pm 7:00 am – 4:30 pm 7:30 am – 4:30 pm 7:30 am – 4:30 pm 7:30 am – 10:00 am 9 Conference Information (Continued) Speaker Information (continued): Business Services: There will be a Speaker Ready Room located on the second floor Sky Bridge for the duration of the conference. This room is meant to be a quiet place to organize your materials prior to your presentation. Staff will be available to respond to questions. The Hyatt Jacksonville offers a business center conveniently located on the third floor. Conference Site Hotel Information: The business center offers a wide variety of services: • Color printing • Photocopy service • Laser printing • Facsimile service • Image scanning • PC workstations with access to the Internet • Easy laptop interface • General office supplies sold • Charges conveniently billed to your room or credit card Hyatt Regency Jacksonville Riverfront 225 Coastline Drive East Jacksonville, FL 32202 Ph: 904-588-1234 Fax: 904-634-4554 Parking: Valet parking is available at the Hyatt Regency Jacksonville Riverfront. Self-parking will be available for the group at $8.00 per vehicle per day. Daily hours: 7:30 a.m. - 4:00 p.m. Fully automated, 24-hours a day. Overflow Hotel Information: Crowne Plaza Jacksonville Riverfront 1201 Riverplace Boulevard Jacksonville, FL 32207 Phone: 904-398-8800 Fax: 904-398-9170 Wyndham Jacksonville Riverwalk Hotel 1515 Prudential Drive Jacksonville, FL 32207 Ph: 904-396-5100 10 2010 ICAC NATIONAL CONFERENCE Conference Information (Continued) Conference Breaks: Press Beverages and light refreshments will be provided during the morning and afternoon breaks in the Exhibition Hall on the second floor of the Hyatt Regency Jacksonville: All members of the Press should check in at the Press Registration booth on the second floor of the Hyatt Regency Jacksonville prior to attending the Plenary Session Opening Ceremony in the Grand Ballroom. All members of the press are required to wear a Press ID badge at all times. The Press may attend the Opening Ceremony. The Plenary Speaker presentation is closed to the press. Tuesday, May 11 Continental Breakfast: 7:45 am – 8:30 am Lunch (on own): 11:30 am – 1:00 pm Afternoon: 2:30 pm – 3:00 pm Wednesday, May 12 Continental Breakfast: 7:15 am – 8:00 am Morning Beverage Break: 9:30 am – 10:00 am Lunch (on own): 11:30 am – 1:00 pm Afternoon Break: 2:30 pm – 3:00 pm Thursday, May 13 Continental Breakfast: 7:15 am – 8:00 am Morning Beverage Break: 9:30 am – 10:00 am Lunch (on own): 11:30 am – 1:00 pm Afternoon Break: 2:30 pm – 3:00 pm Friday, May 14 Continental Breakfast: 7:15 am – 8:00 am Morning beverage break: 9:30 am - 10:00 am Visit the Internet Café Ethernet connections will be provided for you to check your email on your laptop in our Internet Café. The Café is located in the Exhibition Hall on the second floor of the Hyatt Regency Jacksonville. PROTECTING OUR CHILDREN 11 Conference Information - Floor Plan 12 2010 ICAC NATIONAL CONFERENCE National Conference Attendance The ICAC Task Force Program was launched in 1998 with the establishment of 10 federally funded sites. The ICAC Training & Technical Assistance Program received funding in 2003 and was tasked with conducting the first ICAC National Conference later that year. Since that time, the 10 Task Forces have grown to 61 with nearly 3,000 affiliated law enforcement agencies. The National Conference has grown from a handful of workshops and less than 200 participants in 2003 to over 175 workshops and an estimated 1450 participatants in 2010. This year’s conference builds upon the vital information and training programs available to the Task Force through funding from OJJDP. The unparalleled caliber of instructors and workshop topics makes it one of the largest and most sought after conferences anywhere. We hope to see all of you again next year. Notes: In 2010, we are expecting 1,450 attendees. No national conference was conducted in 2009; funding was instead allocated to assist with coordinating the 2009 Silicon Valley ICAC Conference. PROTECTING OUR CHILDREN 13 14 2010 ICAC NATIONAL CONFERENCE Plenary Session Since 1998, the ICAC Task Forces have reviewed over 180,000 complaints of alleged child sexual victimization. Plenary Session 2010 Internet Crimes Against Children National Conference Plenary Session Tuesday, May 11, 2010 8:30 – 11:30 a.m. Grand Ballroom Opening Ceremony Welcome and Opening Remarks Mary Lou Leary Principle Deputy Assistant Attorney General Office of Justice Programs Presentation of Colors Jacksonville County Sheriff’s Office Honor Guard National Anthem Miss Emma Levy Boys & Girls Clubs of Northeast Florida Remarks by Mary Lou Leary Principle Deputy Assistant Attorney General Office of Justice Programs Frank Mackesy, Undersheriff Jacksonville Sheriff’s Office Representative Debbie Wasserman-Schultz 20th Congressional District of Florida (Invited) Gary Grindler, Acting Deputy Attorney General United States Department of Justice Attorney General Eric Holder Video Message Break Prologue “Supporting Officer Wellness” Plenary Speaker “Psychological and Behavioral Characteristics of Internet Sex Offenders” Dr. Michael Bourke, Chief Psychologist United States Marshals Service PROTECTING OUR CHILDREN 15 Opening Ceremony Biographies ERIC H. HOLDER, JR. 82ND ATTORNEY GENERAL OF THE UNITED STATES Eric H. Holder, Jr. was sworn in as the 82nd Attorney General of the United States on February 3, 2009 by Vice President Joe Biden. President Barack Obama announced his intention to nominate Mr. Holder on December 1, 2008. In 1997, Mr. Holder was named by President Clinton to be the Deputy Attorney General, the first African-American named to that post. Prior to that he served as U.S. Attorney for the District of Columbia. In 1988, Mr. Holder was nominated by President Reagan to become an Associate Judge of the Superior Court of the District of Columbia. Mr. Holder, a native of New York City, attended public schools there, graduating from Stuyvesant High School where he earned a Regents Scholarship. He attended Columbia College, majored in American History, and graduated in 1973. He graduated from Columbia Law School in 1976. While in law school, he clerked at the N.A.A.C.P. Legal Defense Fund and the Department of Justice’s Criminal Division. Upon graduating, he moved to Washington and joined the Department of Justice as part of the Attorney General’s Honors Program. He was assigned to the newly formed Public Integrity Section in 1976 and was tasked to investigate and prosecute official corruption on the local, state and federal levels. Prior to becoming Attorney General, Mr. Holder was a litigation partner at Covington & Burling LLP in Washington. Mr. Holder lives in Washington with his wife, Dr. Sharon Malone, a physician, and their three children. 16 2010 ICAC NATIONAL CONFERENCE Opening Ceremony Biographies REPRESENTATIVE DEBBIE WASSERMAN-SCHULTZ 20th CONGRESSIONAL DISTRICT OF FLORIDA For more than seventeen years, Debbie Wasserman Schultz has dedicated her public life to working on behalf of the people of South Florida. On January 4, 2005, she was sworn in as a member of the United States House of Representatives Rep. Wasserman Schultz represents Florida’s 20th Congressional district, which encompasses parts of Florida as far north as Fort Lauderdale, and as far south as Miami Beach. Before joining the U.S. Congress, she was first a Representative and later a Senator in the Florida State legislature. Rep. Wasserman Schultz serves on the House Committee on Appropriations, which, in conjunction with its Senate counterpart, makes funding decisions on every discretionary program in the federal budget. She serves as a “Cardinal,” chairing the Legislative Branch subcommittee. She also serves on the House Judiciary Committee, which handles issue ranging from terrorism to protection of civil liberties. As a Chief Deputy Whip, Rep. Wasserman Schultz works to help advance important legislation. This role places her on the leadership team of the House of Representatives. In her first term, Rep. Wasserman Schultz served as a Senior Whip, the only freshman chosen to serve on the Whip team. Rep. Wasserman Schultz is a person respected by her colleagues for her tenacity and her hard work on many issues. Her first term was marked with remarkable success for a freshman member then serving in the minority. She was one of the key leaders in the Terri Schiavo debate, and the Senate Judiciary Committee asked her to testify at the confirmation hearing of Supreme Court Justice Samuel Alito on the topic. Rep. Wasserman Schultz discussed the benefits of the American Recovery and Reinvestment Act with her constituents at a town hall meeting in Weston, April 2009. A fighter for South Florida families, Rep. Wasserman Schultz has worked hard to protect children. Some of her accomplishments in the field include the passage of the PROTECT Our Children Act, which creates the largest law PROTECTING OUR CHILDREN 17 Opening Ceremony Biographies enforcement effort ever formed for the protection of children (H.R. 3845), and, the passage the Virginia Graeme Baker Pool and Spa Safety Act (H.R. 1721) to combat childhood drowning. Rep. Wasserman Schultz, the first Jewish Congresswoman ever elected from Florida, introduced a resolution, which passed the House of Representatives and called on the President to declare a Jewish American Heritage Month. The President subsequently did so, with the inaugural month in May, 2006. Rep. Wasserman Schultz was asked by the Senate Judiciary Committee to testify during the nomination hearings for Judge Alito in January 2006. In March 2009, after she announced her own battle with breast cancer, Rep. Wasserman Schultz introduced the Education and Awareness Requires Learning Young Act, or EARLY Act (H.R. 1740), a piece of legislation that directs the Centers for Disease Control and Prevention to develop and implement a national education campaign about the threat breast cancer poses to all young women, and the particular heightened risks of certain ethnic, cultural and racial groups. Rep. Wasserman Schultz was born in Long Island, NY and received her Bachelor’s and Master’s degrees from University of Florida. She and her husband Steve live in Weston, Florida with their three children. All of this experience serves to enhance her commitment to lower health care costs, improve the quality of education, protect Social Security and Medicare, and provide a sensible homeland security plan to protect our citizens from the ongoing threat of terror. She continues to fight to ensure that our first responders, our local police and firefighters, have the tools they need to do their jobs. And she continues to take up the fight to give our troops the equipment and compensation they deserve. Debbie Wasserman Schultz was born in 1966 on Long Island, NY. She attended the University of Florida and graduated with a Bachelor’s Degree in Political Science in 1988 and with a Master’s Degree in 1990. She has been married to Steve Schultz for 17 years and together they have three children. The Congresswoman is proud to call South Florida home where she resides with her family in Weston. 18 2010 ICAC NATIONAL CONFERENCE Opening Ceremony Biographies GARY GRINDLER ACTING DEPUTY ATTORNEY GENERAL Gary Grindler serves as the Acting Deputy Attorney General for the U.S. Department of Justice. He rejoined the Department in 2009 as Deputy Assistant Attorney General in the Criminal Division before being appointed in 2010 by the Attorney General to serve as the Acting Deputy Attorney General. Prior to his return to the Department, Grindler was a partner at King & Spalding LLP in the firm’s Special Matters/Government Investigations Practice Group where he focused on white collar criminal defense, internal corporate investigations, money laundering and search warrant compliance, Foreign Corrupt Practices Act, False Claims Act and whistleblower cases, and complex civil litigation. Grindler has previously served in a number of roles at the Justice Department, including as Principal Associate Deputy Attorney General and Counselor to the Attorney General, Deputy Assistant Attorney General in the Civil Division, and as an Assistant U.S. Attorney in the Southern District of New York and the Northern District of Georgia. He also represented the President of the United States in his official capacity when depositions were taken in two Independent Counsel prosecutions arising out of the Whitewater investigation. Grindler was also a partner in his own litigation firm, Chilivis & Grindler, where he focused on civil litigation and white collar criminal defense. Prior to that he was an associate at Powell, Goldstein, Frazer & Murphy LLP in the firm’s litigation department. Grindler has been selected for inclusion in the 2006-2009 editions of The Best Lawyers in America in the area of white collar criminal defense and on the 2008-2009 Washington, D.C., Super Lawyers lists. In 2000, he received the Edmund J. Randolph Award in recognition of his outstanding contributions to the Department of Justice. He received both his undergraduate and law degrees from Northwestern University. PROTECTING OUR CHILDREN 19 Opening Ceremony Biographies UNDERSHERIFF FRANK MACKESY JACKSONVILLE COUNTY SHERIFF’S OFFICE Frank Mackesy began his career in law enforcement in 1979 and quickly rose through the ranks. From 1995 through August 2002 he served as Chief of the Jails, Patrol, and Detective Divisions. In September 2002 he was promoted to Director of Police Operations overseeing the day-to-day operations of the Patrol, Detective, Community Affairs Divisions, Organized Crime and Intelligence Units. Upon Sheriff Rutherford’s election in July 2003 he reappointed him to the rank of Director and placed him in charge of the newly created Department of Patrol and Enforcement. He additionally tasked him with the responsibility of coordinating the security for Super Bowl XXXIX. In January, 2005 Sheriff Rutherford promoted him to the number two position within the agency where he currently serves as Undersheriff. Frank is a graduate of the FBI National Academy. He holds a Bachelors Degree and a Masters Degree in Business Administration from the University of North Florida. Married to his wife of 28 years, Patti; they have two children; Dana and Kevin. 20 2010 ICAC NATIONAL CONFERENCE Opening Ceremony Biographies MARY LOU LEARY PRINCIPAL DEPUTY ASSISTANT GENERAL Mary Lou Leary joined the Office of the Assistant Attorney General at the Office of Justice Programs in May 2009 when she was appointed Deputy Assistant Attorney General. She was named Principal Deputy Assistant Attorney General in September 2009. Prior to that, she served as Executive Director of the National Center for Victims of Crime, a private nonprofit in Washington, DC, for four years. From 1999 to 2001, Ms. Leary’s service at the U.S. Department of Justice included acting Assistant Attorney General for the Office of Justice Programs, Deputy Associate Attorney General for the Office of the Associate Attorney General, and acting Director of the Office of Community Oriented Policing Services. Ms. Leary has also served as United States Attorney, Principal Assistant and then Senior Counsel to the United States Attorney for the District of Columbia, and Chief, Superior Court Division. Her career included extensive trial and grand jury experience as Assistant United States Attorney in the District of Columbia and Assistant District Attorney in Middlesex County, Massachusetts. Dr. Michael Bourke is the Chief Psychologist for the United States Marshals Service and the head of the USMS Behavioral Analysis Unit. He has proudly served as a federal law enforcement officer since 2000. Prior to joining the PROTECTING OUR CHILDREN 21 Plenary Session Biographies DR. MICHAEL BOURKE CHIEF PSYCHOLOGIST UNITED STATES MARSHALLS SERVICE Dr. Michael Bourke is the Chief Psychologist for the United States Marshals Service and the head of the USMS Behavioral Analysis Unit. He has proudly served as a federal law enforcement officer since 2000. Prior to joining the Marshals Service he worked as a clinical psychologist for the federal prison system; from 2000 to 2006 he was assigned to the Sex Offender Treatment Program (SOTP) and Hypersexuality Management Program (HMP) at the Federal Correctional Institution in Butner, North Carolina, and from July 2006 to September 2008 he worked within the Commitment and Treatment Program for Sexually Dangerous Persons (CTP) at the same institution. Dr. Bourke is a graduate of the Department of Defense Polygraph Institute, and he has conducted several hundred polygraph examinations of sex offenders. He is a regular consultant to federal, state, and local law enforcement agencies on matters pertaining to sexual criminality and interviewing/interrogation techniques. He is an adjunct faculty member at Nova Southeastern University and the U.S. Department of Defense Academy for Credibility Assessment (DACA). In 2008 he received a Special Recognition Award from the United Kingdom’s Child Exploitation and Online Protection Centre (CEOP), and in 2009 he was awarded the Pro-Humanitate Literary award by the North American Resource Center for Child Welfare. An active researcher, Dr. Bourke serves on the editorial boards for two professional journals. His clinical and research interests include the assessment of sexual offenders, the art of interviewing and interrogation, the detection of deception, secondary stress among law enforcement personnel, and investigative profiling. 22 2010 ICAC NATIONAL CONFERENCE Daily Activities Since 1998, the ICAC Task Forces have arrested nearly 20,000 individuals suspected of committing a crime of child sexual exploitation. Daily Activities - Schedule at a Glance FRIDAY TUESDAY WEDNESDAY 7:00 am - 5:00 pm Exhibition Hall Preconvene Area 7:00 am - 5:00 pm Exhibition Hall Preconvene Area 7:00 am - 5:00 pm Exhibition Hall Preconvene Area 7:00 am - 11:30 am Exhibition Hall Preconvene Area 7:00 am - 4:30 pm Registration Preconvene Area 7:30 am - 4:30 pm Registration Precovene Area 7:30 am - 4:30 pm Registration Precovene Area 7:30 am - 10:00 am Registration Precovene Area 7:45am - 8:30 am Continental Breakfast 7:15 am - 8:00 am Continental Breakfast 7:15 am - 8:00 am Continental Breakfast 7:15 am - 8:00 am Continental Breakfast 8:30 – 11:30 am Plenary Session Grand Ballroom 8:00 – 9:30 am Lab and Lecture Sessions Various - see Workshop Schedules 8:00 – 9:30 am Lab and Lecture Sessions Various - see Workshop Schedules 8:00 – 9:30 am Lab and Lecture Sessions Various - see Workshop Schedules 9:30 – 10:00 am Morning Beverage Break Exhibition Hall 9:30 – 10:00 am Morning Beverage Break Exhibition Hall 9:30 – 10:00 am Morning Beverage Break Exhibition Hall 10:00 am – 11:30 am Lab and Lecture Sessions Various - see Workshop Schedules 10:00 am – 11:30 am Lab and Lecture Sessions Various - see Workshop Schedules 10:00 am – 11:30 am Lab and Lecture Sessions Various - see Workshop Schedules 11:30 – 1:00 pm Lunch, on your own* 11:30 – 1:00 pm Lunch, on your own* 1:00 - 2:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 1:00 - 2:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 2:30 – 3:00 pm Afternoon Break Exhibition Hall 2:30 – 3:00 pm Afternoon Break & Raffle Drawing Exhibition Hall 11:30 – 1:00 pm Lunch, on your own* 1:00 - 2:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 2:30 – 3:00 pm fternoon Break Exhibition Hall 3:00 - 4:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 3:00 - 4:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 7:00 pm Special Event for Conference Attendees The Jacksonville Landing THURSDAY *Daily lunch options: Lunch buffet at Trellises Restaurant on the first floor 3:00 - 4:30 pm Lab and Lecture Sessions Various - see Workshop Schedules or there will also be Grab and Go lunch available. The Landing, conveniently located a few blocks from the Hyatt Regency has many great restaurants to choose from. PROTECTING OUR CHILDREN 23 Tuesday, May 11, 2010 - Daily Activities & Lab Schedule Daily Schedule 7:00 am - 4:30 pm Registration Preconvene Area 7:00 am - 5:00 pm Exhibition Hall Preconvene Area 7:45am - 8:30 am Continental Breakfast 8:30 am – 11:30 am Plenary Session Grand Ballroom 11:30 am – 1:00 pm Lunch, on your own* 1:00 pm - 2:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 2:30 pm – 3:00 pm fternoon Break Exhibition Hall 3:00 pm - 4:30 pm Lab and Lecture Sessions Various - see Workshop Schedules Computer Lab Sessions These are not the full titles for each session. Full titles, speakers and descriptions can be found in their respective areas of the program. Session 1 1:00 – 2:30 p.m. Session 2 3:00 – 4:30 p.m. Apple Macintosh Forensics Part 1 & 2 Mousselli City Terrace 9 Basic Cell Phone Investigation Part 1 & 2 Wykes & Williams City Terrace 5 Cellular Phone Inv. Williams & Wagner Orlando Google and Firefox Wagner & Williams Orlando Facebook Duffey Undercover Chat Lab Duffey & Sullivan City Terrace 4 City Terrace 4 Locating Wireless Users HTCI Summary Digital Speakman Triage Forensics City Terrace 12 Eskridge City Terrace 12 ICAC COPS for Investigtrs. ICAC COPS TF Commdrs. Robert Erdely Dave Peifer City Terrace 11 City Terrace 11 Image Scan Training Part 1 & 2 Winkelman & Innes Boardroom 4 Mobile Phone Analysis: Email Investigations Best Practices Tidwell Reiber City Terrace 6 City Terrace 6 Recovering Volatile Data Part 1 & 2 Armstrong & Bishop Daytona Secure Techniques for Onsite Preview Part 1 & 2 Newman & Scott Undercover Chat w/AIM Leonard City Terrace 10 City Terrace 7 Subject Identification McFadden City Terrace 10 Note: NCMEC Child Victim Identification Lab is held daily in River Terrace 2 *Lunch options: Lunch buffet at Trellises Restaurant on the first floor or there will also be a Grab and Go lunch available. The Landing, conveniently located a few blocks from the Hyatt Regency, has many great restaurants to choose from. 24 2010 ICAC NATIONAL CONFERENCE Tuesday, May 11, 2010 - Daily Activities & Lecture Schedule Lecture Sessions These are not the full titles for each session. Full titles, speakers and descriptions can be found in their respective areas of the program. Session 1 1:00 – 2:30 p.m. Session 2 3:00 – 4:30 p.m. Operation Digital Offense Baker & Miller & Cumming River Terrace 3 Undercover Chat Invest. Gremillion & Leonard River Terrace 3 Brianna Owns Torpie & LaPorta To Use or Not - Polygraph Edwards Grand 1 Grand 1 Craigslist Investigations Nichols Grand 2 Cases - Photo Sharing Sites Devlin & Spurger Grand 2 Metzger Case Study Whitehead & Catt & Barnes Grand 3 Website to Combat Chilld Pornographer Zerfoss Grand 3 Case Study: Joseph Okoh Garrett & McGuire Grand 6 Child Pornography Trafficking Geraghty Grand 6 Behavioral characteristics of sex offenders Bourke Terrace Pav 1 Understanding “Sexting” Grantham Terrace Pav 1 Working with Yahoo Berroya Terrace Pav 2 Understanding the Gnutella Network Powell Terrace Pav 2 Microsoft Xbox, Xbox 360 and Live! Ard River Terrace 1 Windows Client Forensics Ard River Terrace 1 Presenting the Internet Safety Message Laramie Grand 7 Mentoring Opportunities Mulcahy & Penna Grand 7 Avoiding personal liability Gillingham Grand 8 Presenting Digital Evidence McGuire Grand 8 ICAC Investigations: Working with the Media Munns St. Johns Search and Seizure Issues in Child Exploitation Anderson St. Johns Understanding “Sexting” Grantham Clearwater Technology-Facilitated Cases Fitzsimmons & Badawy Clearwater Visit the Internet Café Ethernet connections will be provided for you to check your email on your laptop in our Internet Café. The Cafe is located in the Exhibition Hall on the second floor of the Hyatt Regency Jacksonville. PROTECTING OUR CHILDREN 25 Wednesday May12, 2010 - Daily Activities & Lab Schedule Daily Schedule 7:00 am - 5:00 pm Exhibition Hall Preconvene Area 7:30 am - 4:30 pm Registration Precovene Area 7:15 am - 8:00 am Continental Breakfast 8:00 am – 9:30 am Lab and Lecture Sessions Various - see Workshop Schedules Computer Lab Sessions These are not the full titles for each session. Full titles, speakers and descriptions can be found in their respective areas of the program. Session 1 8:00 - 9:30 a.m. Session 2 10:00 - 11:30 a.m. Using Firefox as an Investigative Tool Part 1 & 2 Cohen Basic Cell Phone Investigation Part 3 & 4 Wykes & Williams 10:00 am – 11:30 am Lab and Lecture Sessions Various - see Workshop Schedules 11:30 am – 1:00 pm Lunch, on your own* 1:00 pm - 2:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 2:30 pm – 3:00 pm Afternoon Break Exhibition Hall 3:00 pm - 4:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 7:00 pm Special Event for Conference Attendees The Jacksonville Landing 26 Session 4 3:00 – 4:30 p.m. City Terrace 9 Apple Macintosh Forensics Part 1 & 2 Mousselli City Terrace 9 City Terrace 5 Basic Cell Phone Investigation Part 1 & 2 Wykes & Williams City Terrace 5 Social Networking - Investigative Tools, Tips & Techs. Part 1 & 2 Wagner & Williams Orlando Cellular Phone Inv. Williams & Wagner Orlando Facebook Duffey City Terrace 4 Previewing Windows/Macs Previewing Windows/Macs West West City Terrace 4 City Terrace 4 City Terrace 12 RoundUp Investigations Part 3 & 4 Erdely, Hill & Powell City Terrace 12 City Terrace 11 RoundUp Investigations Part 3 & 4 Erdely, Hill & Powell City Terrace 11 Open City Terrace 4 9:30 am – 10:00 am Morning Beverage Break Exhibition Hall Session 3 1:00 – 2:30 p.m. RoundUp Investigations Part 1 & 2 Erdely, Hill & Powell RoundUp Investigations Part 1 & 2 Erdely, Hill & Powell Image Scan Training Part 3 & 4 Winkelman & Innes Macs! Acquisition & Preliminary Analysis Tidwell City Terrace 6 Boardroom 4 Internet Registry Artifacts Tidwell City Terrace 6 Wireless Network Investigation Part 1 & 2 Armstrong & Bishop Daytona Secure Techniques for Onsite Preview Part 3 & 4 Newman & Scott City Terrace 7 Basic Internent Subject Identification Investigation McFadden Carroll City Terrace 10 City Terrace 10 Windows Client Forensics (Windows 7) Part 1 & 2 Ard City Terrace 8 Google and Firefox Wagner & Bishop Orlando Image Scan Training Part 1 & 2 Winkelman & Innes Boardroom 4 Mobile Phone Analysis: Best Practices Reiber City Terrace 6 Email Investigations Tidwell City Terrace 6 Knoppix as a Preview Tool Armstrong & Bishop Daytona IRC Investigations Armstrong & Williams Daytona Secure Techniques for Onsite Preview Part 1 & 2 Newman & Herb Scott City Terrace 7 The Child Protection System Part 1 & 2 West City Terrace 10 Windows Client Forensics (Windows 7) Part 1 & 2 Ard City Terrace 8 Note: NCMEC Child Victim Identification Lab is held daily in River Terrace 2 *Lunch options: Lunch buffet at Trellises Restaurant on the first floor or there will also be a Grab and Go lunch available. The Landing, conveniently located a few blocks from the Hyatt Regency, has many great restaurants to choose from. 2010 ICAC NATIONAL CONFERENCE Wednesday, May 12, 2010 - Daily Activities & Lecture Schedule Lecture Sessions These are not the full titles for each session. Full titles, speakers and descriptions can be found in their respective areas of the program. Session 1 8:00 – 9:30 a.m. Session 2 10:00 – 11:30 a.m. Session 3 1:00 – 2:30 p.m. Session 4 3:00 – 4:30 p.m. When is Enough, Enough? Gersh et al. River Terrace 3 Youthful Offenders Bronson et al. River Terrace 3 Protecting our Nation’s Children Williams River Terrace 3 ICAC / FBI Task Forces Granozio & Laramie Grand 1 Partnering in Crime Moultrie & McMurry Grand 1 Justice Across State Lines Goldberg & Canonico Grand 1 Brianna Owns Torpie & LaPorta The use of an undercover website Zerfoss Grand 2 Social Networking Investigations West Grand 2 Very Young Girls: Child Victims in the Commercial Sex Industry Attenello Grand 2 Beyond the Image Cole Grand 3 Undercover Chat Invest. Gremillion & Leonard Grand 3 Military Resources Trest & Dent Grand 3 Child Exploitation Invest. Holloway et al River Terrace 3 Child Sex Tourism Investigations Part 1& 2 Grocki & Crane Grand 6 Grand 1 Craigslist Investigations Nichols Grand 3 Online Groups: Investigations, Forensics, and Prosecutions Part 1 & 2 Dunn & Grocki & Fottrell Grand 6 Sex Offender Registration Turkel Terrace Pav 1 Federal Sentencing Issues Blackwell & Dorhoffer & Hunt Terrace Pav 1 Behavioral analysis of offenders Part 1 & 2 Sullivan Encryption of a Password Coduti & Butterfield Terrace Pav 2 Preserving Evidence from the Cloud O’Neill Terrace Pav 2 What’s Next???? Duffey Terrace Pav 2 Web 3.0: Blending of Augmented Reality Rampolla Terrace Pav 2 Web 3.0: Blending of Augmented Reality Rampolla River Terrace 1 Gigatribe investigations Donahue River Terrace 1 802.11 Explo Basic Network McFadden River Terrace 1 enough.org Child Safety Rice Hughes Grand 7 NetSmartz Workshop Nathan Grand 7 Cyberbullying Cellular Phone Forensics for Law Enforcement Pat 1 & 2 Weber & Daniels Grand 8 Terrace Pav 1 Costagliola River Terrace 1 Laramie Grand 7 Encryption and Compelling a Password Coduti et al. Grand 8 ICAC in Tribal Communities Staubs, et al. Grand 7 Preserving Evidence from the Cloud O’Neill Grand 8 ICAC Unit Supervisor Training Schriefer St. Johns Officer Safety in Internet Operations Hansen St. Johns Fourth Amendment Principles and Issues Part 1 & 2 Clancy St. Johns Cross-Examining the Defense Expert Fitzsimmons Clearwater Legally Limiting Defense Discovery Mason Clearwater Direct Examination of a Forensic Expert (Lecture & Demonstration) Fitzsimmons et al. Clearwater Did you know that since 2006, the ICAC Task Forces have executed more than 22,000 search warrants? PROTECTING OUR CHILDREN 27 Thursday, May 13, 2010 - Daily Activities & Lecture Schedules Daily Schedule 7:00 am - 5:00 pm Exhibition Hall Preconvene Area 7:30 am - 4:30 pm Registration Precovene Area 7:15 am - 8:00 am Continental Breakfast 8:00 am – 9:30 am Lab and Lecture Sessions Various - see Workshop Schedules 9:30 am – 10:00 am Morning Beverage Break Exhibition Hall 10:00 am – 11:30 am Lab and Lecture Sessions Various - see Workshop Schedules 11:30 am – 1:00 pm Lunch, on your own* 1:00 pm - 2:30 pm Lab and Lecture Sessions Various - see Workshop Schedules 2:30 pm – 3:00 pm Afternoon Break & Raffle Drawing Exhibition Hall 3:00 - 4:30 pm Lab and Lecture Sessions Various - see Workshop Schedules Computer Lab Sessions These are not the full titles for each session. Full titles, speakers and descriptions can be found in their respective areas of the program. Session 1 8:00 - 9:30 a.m. Session 2 10:00 - 11:30 a.m. Using Firefox as an Investigative Tool Part 1 & 2 Cohen Basic Cell Phone Investigation Part 3 & 4 Wykes & Williams Session 3 1:00 – 2:30 p.m. Session 4 3:00 – 4:30 p.m. City Terrace 9 Apple Macintosh Forensics Part 1 & 2 Mousselli City Terrace 9 City Terrace 5 Basic Cell Phone Investigation Part 1 & 2 Wykes & Williams City Terrace 5 Social Networking Social Networking Investigative Tools, Tips Investigative Tools, Tips Wagner et al. Orlando Wagner et al. Orlando Cellular Phone Inv. Wagner & Williams Orlando Facebook Duffey Previewing Windows/Macs Previewing Windows/Macs West West City Terrace 4 City Terrace 4 Open City Terrace 4 City Terrace 4 Google and Firefox Bishop & Williams Orlando Locating Rogue Wireless HTCI Summary Speakman Digital Triage Forensics City Terrace 12 Eskridge City Terrace 12 Leveraging Linux to facilitate Digital Forensic Inv. Part 1 & 2 Rosen City Terrace 12 RoundUp Investigations Part 1 & 2 Erdely, Hill & Powell RoundUp Investigations Part 3 & 4 Erdely, Hill & Powell City Terrace 11 Image Scan Training Part 3 & 4 Winkelman & Innes Macs! Acquisition & Preliminary Analysis Tidwell City Terrace 6 Boardroom 4 Internet Registry Artifacts Tidwell City Terrace 6 Wireless Network Investigation Part 1 & 2 Armstrong & Bishop Daytona Secure Techniques for Onsite Preview Part 3 & 4 Newman & Scott City Terrace 7 Basic Internent Subject Identification Investigation McFadden City Terrace 10 City Terrace 10 Carroll Windows Client Forensics (Windows 7) Part 1 & 2 Ard City Terrace 8 City Terrace 11 Image Scan Training Part 1 & 2 Winkelman & Innes Boardroom 4 Mobile Phone Analysis: Best Practices Reiber City Terrace 6 Email Investigations Tidwell City Terrace 6 Knoppix as a Preview Tool Armstrong & Bishop Daytona IRC Investigations Armstrong & Bishop Daytona Secure Techniques for Onsite Preview Part 1 & 2 Newman & Herb Scott City Terrace 7 The Child Protection System Part 1 & 2 West City Terrace 10 Windows Client Forensics (Windows 7) Part 1 & 2 Ard City Terrace 8 Note: NCMEC Child Victim Identification Lab is held daily in River Terrace 2 *Lunch options: Lunch buffet at Trellises Restaurant on the first floor or there will also be a Grab and Go lunch available. The Landing, conveniently located a few blocks from the Hyatt Regency, has many great restaurants to choose from. 28 2010 ICAC NATIONAL CONFERENCE Thursday, May 13, 2010 - Daily Activities & Lecture Schedules Lecture Sessions These are not the full titles for each session. Full titles, speakers and descriptions can be found in their respective areas of the program. Session 1 8:00 – 9:30 a.m. Session 2 10:00 – 11:30 a.m. Session 3 1:00 – 2:30 p.m. Session 4 3:00 – 4:30 p.m. Gigatribe investigations Donahue River Terrace 3 Undercover Chat Gremillion & Leonard River Terrace 3 Social Networking Investigations West Grand 1 Understanding “Sexting” Grantham Grand 1 Cellular Phone Forensics Part 1 & 2 Weber & Daniels Grand 1 Raymer Case Study Carry Grand 2 Federal Sentencing Issues Blackwell & Dorhoffer & Hunt Facebook: Working with Law Enforcement Vichinsky & Wu Grand 2 Craigslist Investigations Nichols Grand 2 Patterns and Trends Feller River Terrace 3 Grand 2 Patterns and Trends Feller River Terrace 3 Adobe Photoshop, Digital Imaging and Law Enforcement Part 1 & 2 Penn Grand 3 Online Groups: Investigations, Forensics, and Prosecutions Part 1 & 2 Dunn & Grocki & Fottrell Grand 3 Domain Name System Frailties Geraghty Grand 6 Case Study: Joseph Okoh Garrett & McGuire Grand 6 ICAC / FBI Task Forces Granozio & Laramie Grand 6 Proving Your Child Pornography Case King & Bridbord Grand 6 Women who sexually offend using technology Part 1 & 2 Hill Terrace Pav 1 Behavioral analysis of offenders Part 1 & 2 Sullivan Web 3.0: Blending of Augmented Reality Rampolla Terrace Pav 2 Beyond the Image Microsoft COFEE Pancoast Terrace Pav 2 Windows 7 Forensics Jones River Terrace 1 Windows 7 Forensics Jones River Terrace 1 Fourth Amendment Principles and Issues Part 1 & 2 Clancy River Ter 1 Utilizing Non-Profit Organizations Staubs & Jolley-Kabi Grand 7 NCMEC Resources Sirkel Grand 7 Protecting Youth Online Community Outreach Hancock Carroll Proving Your Child Pornography Case King & Bridbord Grand 8 Forensic Dicussion Group Holloway et al. Grand 8 Detection of Encryption on Live Systems Johnson Grand 8 OJJDP Grant Management Bronson et al. St. Johns Legally of Sexually Exploitative Images Mason St. Johns SHIFT: Supporting Heroes in mental health Foundation Stevenson & Arnold St. Johns Computer Forensics for Prosecutors Fitzsimmons Clearwater Grooming Evidence Fitzsimmons & Badawy Clearwater Cole Terrace Pav 2 Terrace Pav 1 Grand 7 Evolving Search and Seizure Issues Anderson Clearwater Microsoft COFEE Pancoast Terrace Pav 2 Grand 7 Detection of Encryption on Live Systems Johnson Grand 8 Charging Decisions and Pre-trial Motions Cauthorn Clearwater Did you know that the ICAC Task Forces have conducted more than 71,000 computer forensic examinations since 199?. PROTECTING OUR CHILDREN 29 Friday, May 14, 2010 - Daily Activities & Lab Schedule Computer Lab Sessions Daily Schedule These are not the full titles for each session. Full titles, speakers and descriptions can be found in their respective areas of the program. 7:00 am - 5:00 pm Exhibition Hall Preconvene Area 7:30 am - 4:30 pm Registration Precovene Area 7:15 am - 8:00 am Continental Breakfast 8:00 am – 9:30 am Lab and Lecture Sessions Various - see Workshop Schedules 9:30 am – 10:00 am Morning Beverage Break Exhibition Hall 10:00 am – 11:30 am Lab and Lecture Sessions Various - see Workshop Schedules Session 1 8:00 - 9:30 a.m. Session 2 10:00 - 11:30 a.m. Apple Macintosh Forensics Part 1 & 2 Cohen City Terrace 9 Basic Cell Phone Investigation Part 3 & 4 Wykes & Williams City Terrace 5 Social Networking - Investigative Tools, Tips Part 1 & 2 Wagner et al. Facebook Duffey Orlando Undercover Chat Duffey & Sullivan City Terrace 4 City Terrace 4 Leveraging Linux to facilitate Digital Forensic Inv. Part 1 & 2 Rosen City Terrace 12 Locating Rogue Wireless HTCI Summary Speakman Digital Triage Forensics City Terrace 11 Eskridge City Terrace 11 Image Scan Training Part 3 & 4 Winkelman & Innes Boardroom 4 Macs! Acquisition & Preliminary Analysis Tidwell City Terrace 6 Internet Registry Artifacts Tidwell City Terrace 6 Recovering Volatile Data Part 1 & 2 Armstrong & Bishop Daytona Secure Techniques for Onsite Preview Part 3 & 4 Newman & Scott Undercover Chat w/AIM Leonard City Terrace 10 The Child Protection System Part 1 & 2 West City Terrace 7 Subject Identification McFadden City Terrace 10 City Terrace 8 Note: NCMEC Child Victim Identification Lab is held daily in River Terrace 2 Conference Certificates Students must complete the overall conference evaluation form and submit it at the Conference Registration Desk in order to receive the conference certificate. This can be done any time after Thursday, May 13th at 12 noon. 30 2010 ICAC NATIONAL CONFERENCE Friday, May 14, 2010 - Daily Activities & Lecture Schedule Lecture Sessions These are not the full titles for each session. Full titles, speakers and descriptions can be found in their respective areas of the program. Session 1 8:00 - 9:30 a.m. Session 2 10:00 - 11:30 a.m. Understanding BitTorrent Liberatore & Levine River Terrace 3 Understanding BitTorrent Liberatore & Levine River Terrace 3 Mobile Social Networking Cohen Grand 1 Justice Across State Lines Goldberg & Canonico Grand 1 Understanding “Sexting” Grantham Grand 2 Metzger Case Study Whitehead & Catt & Barnes Grand 2 What use is research? Wolak Grand 3 Case Study: Joseph Okoh Garrett & McGuire Grand 3 Patterns and Trends Feller Grand 6 Facebook: Working with Law Enforcement Vichinsky & Wu Grand 6 Women who sexually offend using technology Part 1 & 2 Hill Terrace Pav 1 Understanding the Gnutella Network Powell Terrace Pav 2 Linux for First Responders Pancoast Terrace Pav 2 Microsoft COFEE Open Pancoast River Terrace 1 Community Outreach Carroll PROTECTING OUR CHILDREN Grand 7 River Terrace 1 McGruff SafeGuard Ohlenbush Grand 7 Windows 7 Forensics Jones Grand 8 Open ICAC Unit Supervisor Training Schriefer St. Johns Officer Safety in Internet Operations Hansen St. Johns Grooming Evidence Fitzsimmons & Badawy Clearwater Sentencing Issues Grand 8 Cauthorn Clearwater 31 32 2010 ICAC NATIONAL CONFERENCE Computer Lab Sessions From 2006 to 2010, the ICAC Task Forces rescued more than 4,500 children from sexual exploitation, child abuse and neglect. Computer Labs - Table of Contents Page Lab Name 34. Apple Macintosh Forensics Part 1 & 2 34. Basic Cell Phone Investigation utilizing the NW3C “Perphound(TM)” utility Part 1 - 4 34. Basic Internet Investigation 34. Cellular Phone Investigations and Field Tools 34. Email Investigations 34. Facebook - The Whole Enchilada 35. Google and Firefox as Investigative Tools 35. HTCI Summary Digital Triage Forensics 35. ICAC COPS for Investigators 35. ICAC COPS for Task Force Commanders 35. Image Scan Training Part 1 - 4 35. Internet Registry Artifacts 36. IRC Investigations 36. Knoppix as a Preview Tool 36. Leveraging Linux to Facilitate Digital Forensic Investigations Part 1 & 2 36. Locating Rogue Wireless Users 36. Macs! Acquisition & Preliminary Analysis 36. Mobile Phone Analysis: Best Practices 37. NCMEC Child Victim Identification Lab 37. Previewing Windows & MAC Computers 37. Recovering Volatile Data Part 1 & 2 37. RoundUp Investigations Part 1 - 4 37. Secure Techniques for Onsite Preview (STOP) with the TUX4N6(TM) Previewing and Triage tool Part 1 - 4 37. Social Networking - Introduction and Proactive Investigations 38. Social Networking - Investigative Tools, Tips and Techniques Part 1 & 2 38. Subject Identification – General Searches and Public Records 38. The Child Protection System Part 1 & 2 38. Undercover Chat Investigations Using AIM (AOL Instant Messenger) 38. Undercover Chat Lab 38. Using Firefox as an Investigative Tool Part 1 & 2 39. Windows Client Forensics (Windows 7) Part 1 & 2 39. Wireless Network Investigation Part 1 & 2 PROTECTING OUR CHILDREN Room: River Terrace 2 NCMEC is proud to offer all registered participants at this year’s Conference a glimpse into the Victim Identification Lab– a powerful law enforcement tool designed to locate child victims. Many children have been rescued from further sexual abuse because a clue in the background of sexually abusive images led to their location. Within this interactive lab, computers will be available for participants to access background identifiers and audio clues in hopes that these items may be recognizable to Lab participants. Accompanying each sanitized picture will be a real-time message thread where participants can post their comments. You may have the piece of the puzzle that could lead to the rescue of a child victim. NOTE: All registered conference attendees are invited to participate in this Lab; however, due to the sensitivity of this issue, please make sure to wear your conference badge and bring proof of identity to gain entry. Lab hours: Tuesday: Wednesday Thursday Friday 11:30 am – 5pm 7:30 am – 5pm 7:30 am – 5pm 7:30 am – 12 pm 33 Computer Labs Apple Macintosh Forensics Part 1 & 2 Tuesday, May 11th - 1:00 pm - 4:30 pm Wednesday, May 12th - 1:00 pm - 4:30 pm Thursday, May 13th - 1:00 pm - 4:30 pm Friday, May 14th - 8:00 am - 11:30 am Room: City Terrace 9 Nathan Mousselli An overview of Apple Macintosh Forensics to consist of basic imaging and examination techniques; Operating System structure including the ‘Library’ folders, internet history, sqlite and plist examination. Basic Cell Phone Investigation utilizing the NW3C “Perphound(TM)” utility Part 1 - 4 Tuesday,May 11th - 1:00 pm Wednesday, May 12th - 11:30 am Wednesday, May 12th - 1:00 pm Thursday, May 13th - 11:30 am Thursday, May 13th - 1:00 pm Friday, May 14th - 11:30 am Room: City Terrace 5 Justin Wykes & Matthew Williams This is a full day condensed version of NW3C’s two day BCPI course. This course will include lecture and lab emphasizing the gathering, analysis, and mapping of cell phone tower and activity logs. Basic Internet Investigation Wednesday, May 12th - 8:00 am Thursday, May 13th - 10:00 am Room: City Terrace 10 Bill Carroll This presentation was developed to teach patrol, detectives and supervisors how to use basic internet skills to conduct searches on the internet. Rural law enforcement works with the ICAC TFs and receive training. It is infrequent that they get calls for assistance so some of those skills they acquire during training are lost. This course is designed to illustrate how some of these skills can be adapted into regular duties to enhance their investigations. Cellular Phone Investigations and Field Tools Tuesday, May 11th - 1:00 pm Wednesday, May 12th - 1:00 pm Thursday, May 13th - 1:00 pm Room: Orlando 34 James Williams & Lauren Wagner This workshop will introduce students to cellular devices and discuss the many aspects that cellular devices have on investigations. Seizure and examination of devices will also be discussed as well as an overview of field tools used for data extraction. Students will complete hands-on exercises and the use of field tools to extract data from cellular devices. Email Investigations Tuesday, May 11th - 3:00 pm Wednesday, May 12th - 3:00 pm Room: City Terrace 6 Thursday, May 13th - 3:00 pm Buddy Tidwell Email is one of the most significant sources of evidence in the vast majority of today’s forensic and eDiscovery investigations, and yet, most forensic tools do a fairly poor job of dealing with it. Many corporate and forensic investigators have had to go outside the industry entirely to find email analysis tools that can sufficiently handle the most common corporate email servers and formats, including Exchange and Lotus Notes. This lab will introduce AccessData’s new technological approach to tackle these issues and deliver true enterprise-class email investigative capabilities. The lab will pay particular attention to the analysis of email using FTK 2, focusing on filtering, sorting, bookmarking and reporting of data found in a variety of popular email clients found in corporate and personal email clients today. Facebook - The Whole Enchilada Tuesday, May 11th - 1:00 pm Wednesday, May 12th - 8:00 am Room: City Terrace 4 Thursday, May 13th - 8:00 am Friday, May 14th - 8:00 am Mike Duffey This Lab will cover using Facebook from the creation of a Facebook page to using Facebook. Students will learn what information will be available to them when legal process is served, what Facebook captures, what they keep, how to identify “uniquely” a person’s profile and photo or group. Also, how various applications can affect a user and where else to find Facebook information without having a Facebook profile. This class is for the new Facebook user and up. This Lab is for law enforcement attendees only. Part 1 & 2 must be attended and completed in consecutive blocks. 2010 ICAC NATIONAL CONFERENCE Computer Labs Google and Firefox as Investigative Tools Tuesday, May 11th - 3:00 pm Wednesday, May 12th - 3:00 pm Thursday, May 13th - 3:00 pm Room: Orlando Lauren Wagner & James Williams This workshop will teach students how to effectively use Google and Mozilla Firefox as investigative tools. Students will complete hands-on exercises using Google Advanced Operators as well as Firefox add-ons. HTCI Summary Digital Triage Forensics Tuesday, May 11th - 3:00 pm Thursday, May 13th - 10:00 am Room: City Terrace 12 Room: City Terrace 11 Thomas Eskridge This class discusses the need and the tools available to triage digital evidence. With the growth of the use of digital evidence our current system has become overwhelmed. The background and proper use of DTF discussed will open options for investigators involved in these cases. ICACCOPS for Investigators Tuesday, May 11th - 1:00 pm Room: City Terrace 11 Robert Erdely www.icaccops.com is a website developed by Pennsylvania and Massachusetts ICAC Task Forces as a tool to assist ICAC investigators. As of April 12, 2010, police officers had posted more than 142 million records of offenders associated with child pornography. Investigators can benefit from the use of the site regardless of the P2P tool they are using. This block of instruction will show investigators how to identify offenders recently seen in their jurisdiction as well as identifying the worst offenders. Investigators will also be taught how to place alerts on IP addresses and GUIDs so they will be notified when the offender comes online. This will allow an investigator the ability to collect first hand information about the offender. An investigator will also be shown how to track offenders whose IP addresses change frequently. ICACCOPS for Task Force Commanders Tuesday, May 11th - 3:00 pm Room: City Terrace 11 Dave Peifer PROTECTING OUR CHILDREN www.icaccops.com is a website developed by Pennsylvania and Massachusetts ICAC Task Forces as a tool to assist ICAC investigators and Task Force Commanders. Currently the site has more than 142 million records of offenders associated with child pornography. TFCs will be shown how to see the IP addresses sharing child pornography in their jurisdiction and map those transactions in real time. The site will aid them in determining the scope of the problem in their jurisdiction and assist in targeting the worst offenders. TFCs will be shown administrative functions including displaying the users and their activities, and coordinating investigations. The site also provides a method to quickly keep track of the number of ICAC Cases, Search warrants, and arrests. Finally, commanders will be shown how to approve user to access the system. Image Scan Training Part 1 - 4 Tuesday, May 11th - 1:00 pm Wednesday, May 12th - 11:30 am Wednesday, May 12th - 1:00 pm Thursday, May 13th - 11:30 am Thursday, May 13th - 1:00 pm Friday, May 14th - 11:30 am Room: Boardroom 4 Thad Winkelman & Jim Innes Image Scan is a component system that allows field investigators to accurately view a variety of graphics formats on a subject’s computer - while making absolutely no changes to any files. Internet Registry Artifacts Wednesday, May 12th - 10:00 am Thursday, May 13th - 10:00 am Friday, May 14th - 10:00 am Room: City Terrace 6 Buddy Tidwell The session provides students with the knowledge and skills necessary to conduct an effective Internet-based investigation of the Microsoft Windows registry. This advanced, hands-on intensive course is intended for Forensic Investigators, Law Enforcement Personnel, Network Administrators, and Security Professionals who desire a greater understanding of the collection, and analysis of Internet trace evidence. Topics to be addressed will include: • Linking removable media to an operating system environment • Gaining access to live registry files protected by the Windows environment • User activity related to recent folders, files, and ap- 35 Computer Labs plications • Protected Storage System Provider information, from Internet Explorer (Version 6), such as auto-completed form data, user names, passwords, and search queries. IRC Investigations Wednesday, May 12th - 3:00 pm Thursday, May 13th - 3:00 pm Room: Daytona Christopher Armstrong & James Williams This lab teaches the new investigator the basics of Internet Relay Chat, focusing on the software set up to install and capture potential evidence. Students will be taught how to set up and implement the chat program MRIC. Additionally, students will be provided with a demonstration of a new investigative IRC tool developed by TLO. Knoppix as a Preview Tool Wednesday, May 12th - 1:00 pm Thursday, May 13th - 1:00 pm Room: Daytona Christopher Armstrong & David Bishop Lecture and Lab: Students will be provided with a Knoppix CD and an overview of Knoppix, a Linux tool. The students will learn how to conduct a forensically sound search of a suspect computer with Knoppix. The students will then be shown how to copy suspected evidence to an external storage device, creating a evidence report for court purposes. Leveraging Linux to facilitate Digital Forensic Investigations Part 1 & 2 Thursday, May 13th - 1:00 pm - 4:30 pm Friday, May 14th - 8:00 am - 11:30 am Room: City Terrace 12 Andrew Rosen Using a Linux Live CD to triage, assess, search, image, authenticate and analyze computer data storage devices in a forensically sound manner. Learn how to conduct digital investigations and examinations using free and open source tools, mated P2P tools and tips for testifying. This is an advanced lab. Attendees must have already attended the Operation Fairplay Lab or been previously trained in ‘Peer Precision’ through Wyoming DCI. Part 1 & 2 must be attended and completed in consecutive blocks. Locating Rogue Wireless Users Tuesday, May 11th - 1:00 pm - 2:30 pm 36 Thursday, May 13th - 8:00 am Room: City Terrace 12 Friday, May 14th- 8:00 am Room: City Terrace 11 Sean Speakman This lab will demonstrate the ability to locate users connected to a wireless network with minimal equipment and experience. While conducting search warrants on peer to peer cases, it is only a matter of time before you will encounter a situation where the suspect is stealing wireless Internet. With this knowledge you will be able to track them down quickly and accurately. Macs! Acquisition & Preliminary Analysis Wednesday, May 12th - 8:00 am Thursday, May 13th - 8:00 am Room: City Terrace 6 Friday, May 14th - 8:00 am Buddy Tidwell The Macintosh platform continues to gain in popularity and market share. This has increased the likelihood of forensic investigators accustomed to Windows-based computers encountering a Mac. This presentation will provide the experienced Windows forensic investigator with a broad approach to the acquisition and analysis of Macintosh computers. Topics to be covered include: • Accessing the hard drive • Target Disk Mode • GPT partitioning • BootCamp partitions • Virtual Machines • The User folder • The Library Folder • Browser artifacts • Plist files Attendees will leave with information on some acquisition options and with information enabling them to identify the most common areas in which evidence may be located in the OS X environment. Mobile Phone Analysis: Best Practices Tuesday, May 11th - 1:00 pm Wednesday, May 12th - 1:00 pm Thursday, May 13th - 1:00 pm Room: City Terrace 6 Lee Reiber This course will discuss best practices and procedures for the acquisition, preservation, examination, analysis, and reporting of digital information found on mobile phones. These procedures will be discussed in relation to criminal, intelligence and corporate security cases. NCMEC Child Victim Identification Lab 2010 ICAC NATIONAL CONFERENCE Computer Labs Tuesday, May 11th 1:00 pm Friday, May 14th 11:30 am Room: River Terrace 2 NCMEC is proud to offer all registered participants a glimpse into the Victim Identification Lab – a powerful law enforcement tool designed to locate child victims. Many children have been rescued from further sexual abuse because a clue in the background of sexually abusive images led to their location. Within this interactive lab, computers will be available for participants to access background identifiers and audio clues in hopes that these items may be recognizable to Lab participants. Accompanying each sanitized picture will be a real-time message thread where participants can post their comments. You may have the piece of the puzzle that could lead to the rescue of a child victim. Due to the sensitivity of this issue, please make sure to wear your conference badge and bring proof of identity to gain entry. Recovering Volatile Data Part 1 & 2 Tuesday, May 11th - 1:00 pm - 4:30 pm Friday, May 14th - 8:00 am - 11:30 am Room: Daytona Christopher Armstrong & David Bishop Lecture and Lab: This lab covers the collection of “Volatile Data”, data which Law Enforcement has historically overlooked or ignored. Students will be provided with free software resources they can use to collect and view the Volatile Data or RAM from a running computer. RoundUp Investigations Part 1 - 4 Wednesday, May 12th - 8:00 am - 4:30 pm Thursday, May 13th - 8:00 am - 4:30 pm Room: City Terrace 11 Wednesday, May 12th - 8:00 am - 4:30 pm Room: City Terrace 12 Robert Erdely & Michael Hill & D. Matthew Powell Course Title: P2P investigation course using RoundUp software. Prerequisite course: Understanding the Gnutella Network / Child Exploitation Website. Students will receive instruction on how to use the Gnutella Network to conduct child exploitation investigations. At the conclusion of this training, students will have the tools and training necessary to conduct these pro-active investigation on the Gnutella network, giving them the ability to investigate persons sharing child pornography in their respective jurisdictions. Students completing the 4-part RoundUp lab are strongly PROTECTING OUR CHILDREN encouraged to attend the ICAC COPS for Investigators lab and the Understanding the Gnutella Network lecture session. To attend this lab you must work for a law enforcement or prosecutorial agency that is an ICAC task force or affiliate. Secure Techniques for Onsite Preview (STOP) with the TUX4N6(TM) Previewing and Triage tool Part 1 - 4 Tuesday, May 11th Wednesday, May 12th Wednesday, May 12th Thursday, May 13th Thursday, May 13th Friday, May 14th Room: City Terrace 7 Nick Newman & Herb Scott A condensed version of NW3C’s two day STOP course using the TUX4N6(TM) tool. This is a full day event consisting of Lectures and Lab, emphasizing forensically sound on-scene previewing techniques. Social Networking - Introduction and Proactive Investigations Thursday, May 13th - 8:00 am Thursday, May 13th - 10:00 am Room: Orlando Lauren Wagner & James Williams This workshop will provide students with an overview of social networking websites and how these websites can be useful to investigations. Students will also learn how to set up an investigative social networking account. This workshop will also cover proactive techniques for social networking websites, specifically the “My #1 Friend is a Cop” program, which can be started in the students’ respective jurisdictions. This workshop is designed for beginners. Social Networking - Investigative Tools, Tips and Techniques Part 1 & 2 Wednesday, May 12th - 8:00 am - 11:30 am Friday, May 14th - 8:00 am - 11:30 am Room: Orlando Lauren Wagner & James Williams This workshop will teach participants how to effectively search social networking websites (predominately MySpace, Facebook, and Twitter) using Google Advanced Operators. 37 Computer Labs This workshop will also cover techniques on capturing profiles for evidentiary purposes and well as mapping tools for friend networks in both MySpace and Facebook. Subject Identification – General Searches and Public Records Tuesday, May 11th - 3:00 pm Wednesday, May 12th - 10:00 am Thursday, May 13th - 8:00 am Friday, May 14th - 10:00 am Room: City Terrace 10 Matthew McFadden This lab will address how to use public information available on the internet to search for subjects to establish leads and gather information on a target. The Child Protection System Part 1 & 2 Wednesday, May 12th - 1:00 pm - 4:30 pm Thursday, May 13th - 1:00 pm - 4:30 pm Room: City Terrace 10 Friday, May 14th- 8:00 am Room: City Terrace 8 Kevin West This hands-on training will provide the investigator with the latest innovations in Peer to Peer undercover operations. This free system represents a major change in how law enforcement can easily locate offenders in their jurisdiction, monitor the offender locally and conduct a digital undercover investigation. TLO (Part One)-Child Protection System: Beyond Fairplay will provide the investigator with an update on what is going on with TLO and the Child Protections System. The Child Protection System is the on-line and newest version of Peer to Peer Investigations and gives investigators an Interface to the Peer to Peer Undercover database system. TLO- (Part Two) Forensic Scan: On-site preview tool will give the investigators an overview of the new Forensic preview tools that are being distributed to investigators who need to do on-site previews. Undercover Chat Investigations Using AIM (AOL Instant Messenger) Tuesday, May 11th - 1:00 pm Friday, May 14th - 8:00 am Room: City Terrace 10 Tony Leonard This lab is designed to introduce experienced undercover 38 chat investigators to the AIM chat client. Topics covered will include web-based AIM chat rooms, locating child sexspecific chat environments, using multiple (linked) screen names for investigations, and configuring AIM for undercover chat operations. Undercover Chat Lab Tuesday, May 11th - 3:00 pm Friday, May 14th - 10:00 am Room: City Terrace 4 Mike Duffey & Michael Sullivan Creating an undercover persona in Yahoo and AIM chat clients. Engaging possible sexual predators of children in a chat session that will develop evidence of criminal activity. This training will also provide the students with skills to identify the offender on the other end of the chat session. Using Firefox as an Investigative Tool Part 1 & 2 Wednesday, May 12th - 8:00 am - 11:30 am Thursday, May 13th - 8:00 am - 4:30 pm Room: City Terrace 9 Eliott Cohen This lab will introduce attendees to the Firefox browser (web) and how it can be a valuable tool during online investigations. Technology facilitated crimes are often linked to internet activity through a browser. Persons engaging in these crimes often leave valuable investigative leads scattered about the internet and their browser. Social networking sites have allowed criminals to hide in plain view, while limiting access to their information. We often unwittingly expose information about ourselves while online. Using Firefox browser may help identify investigative leads not present in other browsers. This lab show learners discuss some differences between IE, Google Chrome and Firefox. Finally, this lab will provide learners with ways to enhance the discovery and validate information developed throughout their investigation through a hands on experience. Windows Client Forensics (Windows 7) Part 1 & 2 Wednesday, May 12th - 8:00 am - 11:30 am Wednesday, May 12th - 1:00 pm - 4:30 pm Thursday, May 13th - 8:00 am - 11:30 am Thursday, May 13th - 1:00 pm - 4:30 pm Room: City Terrace 8 Christopher Ard 2010 ICAC NATIONAL CONFERENCE Computer Labs This session will provide students with deep insight into the latest Microsoft Operating System Windows 7. Students will have an opportunity to learn via hands on exercises with the very technologies that they will encounter in future investigations. Topics focus on items such as BitLocker Full Volume Encryption, Virtualization, Media Technology, Volume Shadow Copy, USB storage device analysis, Thumbcache, Recycle bin, SuperFetch, Internet Explorer, Event Logging, NTFS File System Details, Windows Desktop Search artifacts, and others. Wireless Network Investigation Part 1 & 2 Wednesday, May 12th - 8:00 am - 11:30 am Thursday, May 13th - 8:00 am - 11:30 am Room: Daytona Christopher Armstrong & David Bishop Lecture and Lab: This topic will introduce wireless technology and teach the attendee how to gather pre search warrant evidence and evidence from the network at the scene. A portion of this topic will be a hands on lab, setting up wireless routers, along with collecting evidence in the form of data from the router. PROTECTING OUR CHILDREN 39 40 2010 ICAC NATIONAL CONFERENCE Lecture Sessions Since 1998, the ICAC Task Forces have conducted more than 41,000 Internet Safety presentations, reaching more than 3.5 million parents, teachers and children. Lecture Sessions - Table of Contents Page Lecture Name 43. “Brianna Owns”: An Interagency Approach to Child Victim Identification 43. 802.11 Explo 43. Adobe Photoshop, Digital Imaging and Law Enforcement Part 1 & 2 43. Avoiding Personal Liability in Computer Searches 43. Basic Networking and Incident Response 43. Behavioral Analysis of Offenders Part 1 & 2 43. Behavioral characteristics of Sex Offenders 43. Beyond the Image: The Analysis of Child Sexual Exploitation Images and Videos 44. Case Study: Joseph Okoh: Why the Howard Soccer Coach Should Have Spent More Time on the Field and Less on the Computer 44. Cellular Phone Forensics for Law Enforcement Part 1 & 2 44. Charging Decisions and Pre-trial Motions: Other Crimes Evidence; Discovery Issues 44. Child Pornography Trafficking via Usenet Groups 44. Child Sex Tourism Investigations Part 1 & 2 45. Community Outreach/Developing the ICAC Relationship 45. Community Outreach: Actions Steps to Empower Youth to be Web Wise in the Mobile World 45. Computer Forensics for Prosecutors: What Every Prosecutor Needs to Know. 45. Craigslist Investigations 45. Cross-Examining the Defense Expert: Turning the Defense Expert into Your Expert 45. Cyberbullying - A Message of Prevention and Response 45. Detection of Encryption on Live Systems 45. Developing Effective Opening Statements and Closing Arguments In Technology-Facilitated Child Sexual Exploitation Cases 46. Direct Examination of a Forensic Expert (Demonstration) 46. Direct Examination of a Forensic Expert (Lecture) 46. Discussion Panel: Youthful Offenders 46. Domain Name System Frailties and Their Impact on Child Pornography Investigations 46. Encryption and Compelling a Password 46. Enough.org - Child Safety PROTECTING OUR CHILDREN Page Lecture Name 46. Evolving Search and Seizure Issues in Child Exploitation Cases 46. Facebook: Working with Law Enforcement 46. Exploitation Cases 46. Examining the Commercial Sexual Exploitation of Children Part 1 & 2 47. Federal Sentencing Issues 47. Forensic Discussion Group: Is Field Initiated Forensics the Answer to Backlogs? 47. Forensic Evidence: When is Enough, Enough? 47. Fourth Amendment Principles and Issues Part 1 & 2 47. Gigatribe Investigations 47. Grooming Evidence: Presenting it in Court and Limitations on Its Use 47. ICAC / FBI Task Forces 48. ICAC in Tribal Communities Discussion Group: How Do We Get an MOU? 48. ICAC Investigations: Working with the Media 48. ICAC Unit Supervisor Training 48. Investigation and Prosecution of Cases from Photo Sharing Sites (Flicker/Photobucket) 48. Investigation of Suspects in Social Networking 48. Investigations Discussion Group: What’s on the Horizon for Child Exploitation Investigations 48. Justice Across State Lines: An Inter-Jurisdictional Prosecution (State of Ohio v. Ingram) 48. Legally Limiting Defense Discovery of Sexually Exploitative Images of Children 49. Linux for First Responders 49. McGruff SafeGuard 49. Mentoring Opportunities for Educating Young Students on Internet Safety 49. Metzger Case Study 49. Microsoft COFEE 49. Microsoft Xbox, Xbox 360 and Live! Investigations 49. Military Resources in Child Exploitation Investigations 50. Mobile Social Networking 50. NCMEC Resources 50. NetSmartz Workshop: Tools to Teach Internet Safety 50. Officer Safety in Internet Operations: Operational Planning 50. OJJDP Grant funding and Managing the ICAC Task Force 41 Lecture Sessions - Table of Contents (continued) Page Lecture Name 50. Online Groups: Investigations, Forensics, and Prosecutions Part 1 & 2 50. Operation Digital Offense 51. Partnering in Crime: Ways to Successfully Coordinate Federal and State Child Exploitation Prosecutions 51. Patterns and Trends in Online Victimization 51. Presenting the Internet Safety Message 51. Preserving Evidence from the Cloud 51. Protecting our Nation’s Children 51. Protecting Youth Online: Internet Safety, Security, and Ethics 51. Proving Your Child Pornography Case and Meeting Common Defenses with Computer Forensics 52. Richard Raymer Case Presentation 52. Sentencing Issues 52. Sex Offender Registration and Enforcement 52. SHIFT: Supporting Heroes in Mental Health Foundation Training A Workshop for Professionals Exposed to Child Sexual Abuse Images at Work Part 1 & 2 52. The Use of an Undercover Website to Combat the Child Pornographer 52. To Use or Not Use the Polygraph Examination Technique in Crimes against Children Investigations 53. Undercover Chat Investigations 53. Understanding “Sexting” and What Can Be Done About It 53. Understanding the BitTorrent File Sharing Network 53. Understanding the Gnutella Network 53. Utilizing Non-Profit Organizations to Expand the Reach of the ICAC Program 53. Web 3.0: Blending of Augmented Reality and Virtual Worlds 53. Very Young Girls: Child Victims in the Commercial Sex Industry Part 1 & 2 54. What Use Is Research? Research Findings About ICAC What’s Next???? 54. Windows 7 Forensics 54. Windows Client Forensics (Windows XP) 54. Women Who Sexually Offend Using Technology Part 1 & 2 42 Page Lecture Name 54. Working with a Computer Forensic Examiner and Presenting Digital Evidence 54. Working with Yahoo! on Child Exploitation Investigations 2010 ICAC NATIONAL CONFERENCE Lecture Sessions INVESTIGATIONS “Brianna Owns”: An Interagency Approach to Child Victim Identification Tuesday, May 11th - 1:00 pm Wednesday, May 12th - 3:00 pm Room: Grand Ballroom 1 Jennifer Torpie & Steve LaPorta This unique case study demonstrates how the efforts to identify one at-risk child depicted in a series of child pornography led to the identification of eighteen additional victims. The alleged suspect exploited adolescent boys via MySpace by posing as an adolescent girl. The suspect used deception, bribes, and even threats, to coerce his victims into self-producing graphic images of child pornography. This case study illustrates how the suspect used the Internet to recruit both victims and likeminded offenders. Participants will learn the investigative steps taken to identify the suspect along with the valuable information revealed by the forensic examination of the evidence. This case illustrates what can happen when multiple law enforcement agencies and NCMEC’s Exploited Children Division work collaboratively towards a shared goal. be used by criminals to protect themselves from law enforcement will be addressed. Attendees of previous years sessions will find all new information. Law enforcement attendees will be provided access to law enforcement only training resources. Avoiding Personal Liability in Computer Searches Tuesday, May 11th - 1:00 pm Room: Grand Ballroom 8 Charles Gillingham This class will cover federal privacy laws that affect personal civil liability to law enforcement officers. It will also review the relevant law unique to the search and seizure of electronic evidence Basic Networking and Incident Response Wednesday, May 12th - 3:00 pm Room: River Terrace 1 Matthew McFadden This lecture will address how to respond to networked computers and how to perform an incident response in order to collect sufficient evidence for an investigation. Behavioral Analysis of Offenders 802.11 Explo Wednesday, May 12th - 1:00 pm Room: River Terrace 1 Vincent Costagliola Wireless technology has fundamentally changed law enforcement tracking and intercepts paradigms. With the pervasive deployment of wireless technology, nefarious elements have latched on with sophisticated and effective techniques to exploit wireless. Despite these threats, organizations are deploying Wi-Fi technology at a break-neck pace allowing nefarious elements to hide in the wireless ether. The presenter will focus on the use of the common tools used in the commission of unlawful acts. This will be demonstrated through use of historical events such as the Mumbai attacks, various child exploitation cases, FISA and terrorism circumstances and events. Part 1 & 2 Wednesday, May 12th - 1:00 pm Thursday, May 13th - 1:00 pm Room: Terrace Pavilion 1 Joe Sullivan Behavioral Characteristics of Sex Offenders Tuesday, May 11th - 1:00 pm Room: Terrace Pavilion 1 Michael Bourke This session will describe psychological and behavioral characteristics of sex offenders, especially Internet sexual offenders. The presentation will address motivational pathways, risk assessment, and the correlation between child pornography and hands-on sex offenders. The implications of “crossover” also will be discussed. Adobe Photoshop, Digital Imaging and Law Enforcement Part 1 & 2 Thursday, May 13th - 8:00 am Room: Grand Ballroom 3 John Penn Adobe Systems scientist & solutions architect, John Penn II, will be showing to Law Enforcement for the first time, many brand new Photoshop and other new Adobe technologies and techniques. Techniques valuable in ICAC and other law enforcement investigations will be demonstrated. It will provide law enforcement with a balanced understanding of the benefits and costs of digital evidence in their cases. Techniques that can PROTECTING OUR CHILDREN Beyond the Image: The Analysis of Child Sexual Exploitation Images and Videos Wednesday, May 12th - 8:00 am Room: Grand Ballroom 3 Thursday, May 13th- 10:00 am Room: Terrace Pavilion 2 James Cole This class will discuss and demonstrate the analysis of child sexual exploitation images and videos. Learn how to see beyond the victim and identify the clues that can focus the investigation and lead to the rescue of child victims and the ar43 Lecture Sessions rest of abusers or prove the abuse in the courtroom. Learn how to identify seemingly innocuous items that can turn out to be critical clues to solving the case. This class will use real cases to highlight the skill set including the image analysis conducted to help identify the victim of the “Vicky” series, one of the most prolific and highly traded series of child pornography on the Internet. This class will use sanitized images of child sexual exploitation material. Case Study: Joseph Okoh: Why the Howard Soccer Coach Should Have Spent More Time on the Field and Less on the Computer Tuesday, May 11th - 1:00 pm Thursday, May 13th - 1:00 pm Room: Grand Ballroom 6 Friday, May 14th- 10:00 am Room: Grand 3 Tom Garrett & Rusty McGuire Joseph Okoh left his place just outside of D.C. to meet what he thought was a 13 year-old child for sex in a rural Virginia county. Never did he think a small rural county in Virginia had recently launched a comprehensive Child Safety Initiative “CSI Louisa.” His season as Howard’s soccer coach recently ended and his freedom for the next 14 years ended that day. This presentation will begin with information on the child enticement investigation, review the powerful impact of digital trial presentation, online investigative techniques and sentencing issues that were used to apprehend and convict Okoh. While this course will focus on the Okoh trial, other trials prosecuted by the presenter will be used to demonstrate the learning objectives. Cellular Phone Forensics for Law Enforcement Part 1 & 2 Wednesday, May 12th - 8:00 am Room: Grand Ballroom 8 Thursday, May 13th- 1:00 pm Room: Grand 1 Michael Weber & Keith Daniels Cellular phone technology has become a pervasive tool used by child sexual predators. Thus, cell phone forensics is a crucial component of child sexual predator investigations. This lecture will cover the different cellular phone technologies, both here and abroad. It will focus on and demonstrate the various techniques law enforcement agencies can use to triage and capture digital media from cell phones. This will include how and where to find potential evidence from a variety of devices relevant to child sexual predator investigations. Attendees will also learn about standard procedures for the forensic acquisition, preservation, examination, analysis, and reporting of digital information present on cell phones. Finally, the lecture will 44 discuss some of the counter-cell phone forensic techniques that are currently being used. Charging Decisions and Pre-trial Motions: Other Crimes Evidence; Discovery Issues Thursday, May 13th - 3:00 pm Room: Clearwater Alison Cauthorn This lecture session will focus on the different elements of charging technology-facilitated child sexual exploitation cases. The presenter will focus on the different types of charges that can be brought in these cases as well as the evidence necessary to support different levels of charges. The presenter will also talk about the use of presenting other acts evidence through Motion in Limine practice, as well as effective arguments for persuading judges to admit the crucial evidence of intent or motive. Finally, the lecture will also touch on discovery issues under the Adam Walsh Act for state prosecutors. Child Pornography Trafficking via Usenet Groups Tuesday, May 11th - 3:00 pm Room: Grand Ballroom 6 Michael Geraghty The mass distribution of child abuse images and movies is efficiently carried-out via the Internet’s Usenet newsgroups to a vast audience around the world. Much like other distribution methods - peer-to-peer networks and the IRC, extremely large digital collections of multimedia files documenting the abuse of children can be obtained in a very short time, with relative ease and little fear of being caught. This module will provide students with a thorough explanation of the Usenet Newsgroups and their role in the exploitation of children on the Internet. Topics covered will include the technological make-up of the Usenet, the propagation of child abuse images and movies via news servers, as well as, investigative techniques that can be used to combat these crimes. Child Sex Tourism Investigations Part 1 & 2 Wednesday, May 12th - 8:00 am Room: Grand Ballroom 6 Steven Grocki & Deborah Crane This lecture will focus on Child Sex Tourism Investigations. This will provide an overview of applicable federal statutes, to include venue considerations. The lecture will cover investigative techniques, recovering evidence, foreign law enforcement cooperation, obtaining the defendant from the foreign jurisdiction, and witness consideration. Community Outreach/Developing the ICAC Relationship Friday, May 14th - 8:00 am 2010 ICAC NATIONAL CONFERENCE Lecture Sessions Room: Grand Ballroom 7 Bill Carroll This presentation illustrates developing a mission statement unique to the particular ICAC Task Force, with objectives, timelines and deliverables consistent with the grant application. The example followed by the Oregon ICAC will be demonstrated as follows: First Phase: Developing affiliates and working relationships with law enforcement, prosecutors. Second Phase: Developing partnerships with schools and community groups. Third Phase: Developing relationships with Community Corrections. Community Outreach: Actions Steps to Empower Youth to be Web Wise in the Mobile World Thursday, May 13th - 3:00 pm Room: Grand Ballroom 7 Esther Cookson & Micah Smith This session explores educational, pro-active approaches that bring digital and mobile safety education into your community. Attendees will be introduced to a customizable action steps plan for schools and your community that address responsible use of digital technology and the dangers youth face: textual harassment, sexting, chat roulette and teen domestic violence. We will address ways you can leverage community partnerships through the media and local grants to start initiatives in your own community. Attendees of this workshop will be introduced to the new interactive role-playing cell phone safety game, “It’s Your Call” and receive free trial licenses to the game. class is especially aimed towards investigators who have UC chat experience. Cross-Examining the Defense Expert: Turning the Defense Expert into Your Expert Wednesday, May 12th - 8:00 am Room: Clearwater Justin Fitzsimmons This lecture will discuss the common defenses raised by defense computer forensic examiners. Students will be given different practical methods for cross-examining the defense expert. Students will also be given tips on how to use the defense expert to prove the validity of their own expert. Finally, students will be able to ask various questions using their own cases for possible areas of cross-examination. Cyberbullying - A Message of Prevention and Response Wednesday, May 12th - 1:00 pm Room: Grand Ballroom 7 Joe Laramie Computer technology can allow kids and teens to be faceless or anonymous. This workshop will give a perspective of how technology can facilitate cyberbullying and what messages can be taught to prevent victimization. Tips and best practices to the response by schools and law enforcement to this issue will also be covered. Detection of Encryption on Live Systems Computer Forensics for Prosecutors: What Every Prosecutor Needs to Know. Thursday, May 13th - 8:00 am Room: Clearwater Justin Fitzsimmons This will be a basic instruction class in the elements of a computer forensics examination. Students will be given a report and walk through it step-by-step to demonstrate what evidence is included in the report and how that evidence can be effectively used to successfully prosecute technology-facilitated child sexual exploitation cases. Craigslist Investigations Tuesday, May 11th - 1:00 pm Room: Grand Ballroom 2 Wednesday, May 12th - 3:00 pm Room: Grand Ballroom 3 Wayne Nichols Craigslist has seen a growing trend where suspects are posting and seeking out juveniles to have sexual contact with. The Henderson, NV Police Department will discuss their proactive methods that have been very successful for them in 2009. This PROTECTING OUR CHILDREN Thursday, May 13th - 1:00 pm Thursday, May 13th - 3:00 pm Room: Grand Ballroom 8 Jeremiah Johnson This is a lecture with demonstration of the Live Encryption and Analysis Program, LEAP(TM) tool, developed through a partnership of NW3C, West Virginia State Police, and West Virginia University. The LEAP(TM)tool will identify common encryption utilities that may be present on a live computer system. Developing Effective Opening Statements and Closing Arguments In Technology-Facilitated Child Sexual Exploitation Cases Tuesday, May 11th - 3:00 pm Room: Clearwater Justin Fitzsimmons & Rami Badawy In this lecture session students will be instructed on various themes that can be used in creating an opening statement and closing argument. The instructor will focus on the ingredients necessary for making both a persuasive opening statement as well as closing argument. The instructor will demonstrate how 45 Lecture Sessions to weave technological evidence into both openings and closings to make them more powerful. Direct Examination of a Forensic Expert (Demonstration) Wednesday, May 12th - 3:00 pm Room: Clearwater Encryption and Compelling a Password Wednesday, May 12th - 8:00 am Room: Terrace Pavilion 2 Wednesday, May 12th- 1:00 pm Room: Grand 8 Justin Fitzsimmons & Micah Smith This session will contain the direct examination of a computer forensic examiner. It will cover the basics of laying the foundation for the forensic examiner as an expert witness; effectively presenting the nuts and bolts of a computer examination; and explaining different analogies for computer forensic examinations and demonstrating how to persuasively present digital evidence in court. The class will be interactive with frequent breaks to allow students to ask questions. Philip Coduti & Robert Butterfield During this discussion, you will be briefed on a recent case of sexual exploitation of a child and how the suspect was compelled by court order to enter his password. The crime involved a live victim along with manufacture and distribution of child pornography. The digital evidence in this case included encrypted partitions on two separate hard drives. The discussion will also cover information on encryption methods, the feasibility of cracking them, and the significance of the wording in the court order. Direct Examination of a Forensic Expert (Lecture) Enough.org - Child Safety Wednesday, May 12th - 1:00 pm Room: Clearwater Wednesday, May 12th - 8:00 am Room: Grand Ballroom 7 Justin Fitzsimmons This class will focus on the necessary requirements to lay the foundation for calling a computer forensic examiner as an expert witness at trial. The course will discuss the different aspects of a forensic expert’s testimony and give tips on effectively presenting this evidence at trial. Donna Rice Hughes Improve Internet Safety Trainings and meet OJJDP public education requirements with new OJJDP funded Internet Safety 101 multi-media program (4 part DVD, workbook, website). Developed to educate, equip and empower parents, educators and law enforcement to protect children from pornography, predators, cyberbullies and to keep kids safe on social networking sites, gaming and mobile devices. Contains poignant stories and advice from industry leaders, psychologists, law enforcement, victims, parents, kids and a convicted sex offender. Can be used as plug ‘n play or tailored, with or without facilitator, small and large audiences. Discussion Panel: Youthful Offenders Wednesday, May 12th - 1:00 pm Room: River Terrace 3 Will Bronson & Antonio Sutton & David Ferris & Allison Turkel & Will Favrot This panel discussion will discuss the nuances associated with investigating, prosecuting, and supervising youth involved with the manufacture, distribution, and/or possession of child pornography. Panelist will include an investigator, an attorney, and a juvenile probation representative. Domain Name System Frailties and Their Impact on Child Pornography Investigations Thursday, May 13th - 8:00 am Room: Grand Ballroom 6 Michael Geraghty From domains containing non-Latin characters to unlimited gTLDs, 2010 will present investigators with new challenges in carrying out online child sexual exploitation investigations. This module will provide students with an overview of upcoming domain name system changes and their impact on ICAC investigations. Students will also be introduced to the role of the Internet Corporation for Assigned Names and Numbers (ICANN) as it relates to Internet governance. 46 Evolving Search and Seizure Issues in Child Exploitation Cases Tuesday, May 11th - 3:00 pm Room: Saint John’s Thursday, May 13th- 1:00 pm Room: Clearwater James Anderson Participants will be provided with an overview of privacy and search and seizure issues that arise in the investigation and prosecution of cases involving computer facilitated sexual exploitation of children. Emphasis will be on recent court rulings and how the holdings in those cases might impact investigative protocols. Facebook: Working with Law Enforcement Thursday, May 13th - 1:00 pm Room: Grand Ballroom 2 Friday, May 14th- 10:00 am Room: Grand 6 2010 ICAC NATIONAL CONFERENCE Lecture Sessions Alex Vichinsky & Jeff Wu Facebook staff presentation on how their site works, what they do to prevent issues/reduce risk for teens, and how they work with law enforcement. Federal Sentencing Issues a result, investigators, prosecutors and forensic examiners are facing a dilemma: When is enough forensic evidence enough? During this presentation, participants will hear the perspectives of three law enforcement officials: a prosecutor, investigator and forensic examiner discussing how much evidence is enough for a successful prosecution. Wednesday, May 12th - 10:00 am Room: Terrace Pavilion 1 Thursday, May 13th- 10:00 am Room: Grand 2 Fourth Amendment Principles and Issues Part 1 & 2 Kevin Blackwell & Alan Dorhoffer & Kim Hunt This session will discuss issues related to child exploitation offenses and how these offenders are sentenced in the federal system. The presentation will discuss both the offense characteristics of these offenses and the offender characteristics of individuals convicted of these offenses. The session also will include a discussion on the effects of post-Adam Walsh changes to the federal statutes and the sentencing guidelines. The presentation will highlight sentencing trends in the number of federal child exploitation cases sentenced, the sentence lengths, and the types of sentences imposed in these cases. The presenters will discuss future research plans that will investigate recidivism among offenders previously sentenced under federal child pornography statutes, with a special emphasis on the degree to which former offenders reoffend with a new sex crime. Thomas Clancy A review of the basic principles regarding applicability and satisfaction of the Fourth Amendment as they relate to ICAC investigations, including the requirements for search warrants, the proper execution of warrants, and the application of selected warrant exceptions under which searches are considered reasonable. Will include review of pertinent court decisions and updates, as appropriate, on particular decisions impacting search and seizure of digital evidence. Forensic Discussion Group: Is Field Initiated Forensics the Answer to Backlogs? Thursday, May 13th - 10:00 am Room: Grand Ballroom 8 Chris Holloway & Eric Devlin & Nathan Mousselli & David Johnson This discussion group will explore the future of the computer forensic process. Attendees will hear about innovative approaches to conducting on scene forensic exams, as well as have the opportunity to discuss their own approaches to conducting forensics. This is a discussion group, so attendees are strongly encouraged to ask questions and participate in the group dialogue. Forensic Evidence: When is Enough, Enough? Wednesday, May 12th - 10:00 am Room: River Terrace 3 Jeffrey Gersh & Justin Fitzsimmons & Mike Duffey & Michael Sullivan Three years ago, the average household only had one computer. Today, a typical home will have multiple computers, as well as numerous other devices that could contain child pornography. In addition, the size and volume of media storage devices are getting larger and larger. This has created a large backlog for forensic examiners, sometimes spanning six or more months. As PROTECTING OUR CHILDREN Wednesday, May 12th - 1:00 pm Room: Saint John’s Thursday, May 13th- 1:00 pm Room: River Terrace 1 Gigatribe Investigations Wednesday, May 12th - 10:00 am Room: River Terrace 1 Thursday, May 13th- 10:00 am Room: River Terrace 3 J. Brooke Donahue Gigatribe Investigations - this lecture will cover how the Gigatribe application works, jurisdictional considerations of target identification, elements to support indictment counts, and general forensics. Grooming Evidence: Presenting it in Court and Limitations on Its Use Thursday, May 13th - 10:00 am Friday, May 14th - 8:00 am Room: Saint John’s Justin Fitzsimmons & Rami Badawy This session will focus on what grooming evidence is and how it can be introduced at trial. The session will instruct students on the various jurisdictions where grooming evidence has been allowed and the different ways it can help prove the elements of a charge. The session will conclude by showing the students the limitations on this type of evidence. ICAC / FBI Task Forces Wednesday, May 12th - 8:00 am Room: Grand Ballroom 1 Thursday, May 13th- 10:00 am 47 Lecture Sessions Jim Granozio & Joe Laramie Co-presenting with ICAC representative regarding FBI Cyber Crime Task Force Program and the benefits it offers. when you obtain it. The second part is how to take these types of investigations and develop a case that can be brought for successful prosecution including identifying the suspect, tying the posts and images to that suspect, and identifying victims of the abuse. ICAC in Tribal Communities Discussion Group: How do we get an MOU? Investigation of Suspects in Social Networking Room: Grand Ballroom 6 Wednesday, May 12th - 3:00 pm Room: Grand Ballroom 7 Amy Staubs & David Matthews & Gregory Ayco & Richard VanBoxtel & Amy Evans This session will be an open dialogue on building collaborative relationships between the ICAC task forces and tribal communities. Discussion will touch on: • the scope of technology-facilitated crimes against children in Indian Country, • the need for public awareness/community education on Internet safety, • investigative capacity and training needs of tribal law enforcement, and • how to work with the tribal council to obtain an MOU. ICAC Investigations: Working with the Media Tuesday, May 11th - 1:00 pm Room: Saint John’s Hugh Munn Presentation featuring PowerPoint, videos, etc. to discuss the most effective ways for working with the media involving ICAC investigations. This lecture will include a review of the fractured and re-structured news media and how the role of social media has become a key tool in crafting a message that will ensure better cooperation and productivity with the media. ICAC Unit Supervisor Training Wednesday, May 12th - 8:00 am Friday, May 14th - 8:00 am Room: Saint John’s Randy Schriefer Intro on what to expect from the ICAC Unit Supervisor Training class and some key issues Investigation and Prosecution of Cases from Photo Sharing Sites (Flicker/Photobucket) Tuesday, May 11th - 3:00 pm Room: Grand Ballroom 2 Eric Devlin & Gary Spurger This class is a how-to for investigators on child exploitation and child pornography cases that arise out of photo sharing websites (including Photobucket/Flicker). The first part to be covered includes how those types of reports are received, how to initiate your investigation, what type of information you need and how to obtain it, and what to do with the information 48 Wednesday, May 12th - 10:00 am Room: Grand Ballroom 2 Thursday, May 13th- 8:00 am Room: Grand 1 Kevin West This course will cover how to research suspects on social networking sites, how to record the information properly, and how to plan and prepare your court orders for social networking sites. Investigations Discussion Group: What’s on the Horizon for Child Exploitation Investigations Wednesday, May 12th - 8:00 am Room: River Terrace 3 Chris Holloway & Matthew Dunn & Michael Geraghty & Michael Sullivan This discussion group will examine the new and emerging ways offenders are attempting to exploit children. Panelists will present on the emerging technologies and Internet applications on the horizon, as well as discussing the investigative techniques used to infiltrate them. This is a discussion group, so attendees are encouraged to ask questions, share their experiences, and offer information on other technologies not discussed by the panel. Justice Across State Lines: An Inter-Jurisdictional Prosecution (State of Ohio v. Ingram) Wednesday, May 12th - 1:00 pm Friday, May 14th - 10:00 am Room: Grand Ballroom 1 Frankie Goldberg & Jesse Canonico In 2009, Assistant Prosecuting Attorneys Frankie Goldberg and Jesse Canonico of the Cuyahoga County Prosecutor’s Office and the Ohio ICAC Task Force teamed with members of ICAC Task Forces in South Carolina, Georgia and Utah to successfully prosecute a case that spanned at least four different states over 7 years. Interstate cooperation between these Task Forces led to the location of vital witnesses and key evidence that helped to secure a 10-year prison sentence. Legally Limiting Defense Discovery of Sexually Exploitative Images of Children Wednesday, May 12th - 10:00 am Room: Clearwater 2010 ICAC NATIONAL CONFERENCE Lecture Sessions Thursday, May 13th- 10:00 am Room: St. Johns Donald Mason An examination of statutory and rule-based constraints on the disclosure and discovery of images of child sexual exploitation in criminal cases, including review of relevant state and federal case law and discussion of related practical and case management considerations. Linux for First Responders Friday, May 14th - 10:00 am Room: Terrace Pavilion 2 Scott Pancoast This is a lecture with demonstration on identifying and the initial handling of various Linux systems. Metzger Case Study Tuesday, May 11th - 1:00 pm Wednesday, May 12th - 3:00 pm Room: Grand Ballroom 3 Thursday, May 14th- 10:00 am Room: Grand 2 Donald Whitehead & Jeffery Catt & Jennifer Barnes Case study of a 53 year old who was found to be molesting and videotaping/photographing 7 central Indiana girls between the ages of 8-13. He was also running a sophisticated home network of computers using TruCrypt. A live acquisition was performed on-scene with successful results. Around 1 million images of child pornography were recovered as well as original video tapes of the victims. Microsoft COFEE McGruff SafeGuard Friday, May 14th - 10:00 am Room: Grand Ballroom 7 Ellen Ohlenbush McGruff SafeGuard monitors and controls kids’ online activity, including: Facebook, MySpace, AOL, MSN, and Yahoo. The product controls sites that kids are accessing. The Service alerts parents and caregivers to potentially dangerous behavior, such as cyber bullying, Internet predators, drug use or criminal activity. The service allows you to conveniently review your children’s activities using a secure website, or to be notified of potentially dangerous situations via cell phone & email alerts. Mentoring Opportunities for Educating Young Students on Internet Safety Tuesday, May 11th - 3:00 pm Room: Grand Ballroom 7 Carol Mulcahy & Cheryl Penna The Berkshire District Attorney’s Office will showcase their Student Mentor Internet Safety Program created in conjunction with the Massachusetts ICAC. The program utilizes the Netsmartz Workshop, an interactive educational safety resource from NCMEC and the Boys & Girls Clubs of America. The mentor program trains high school students to train their younger peers, in grades K-2, basic Internet safety lessons using 3-D interactive video, positive behavior discussions and arts and crafts activities. Attendees will be given the tools to re-create this program in their own community. All program materials will be provided including program description brochures, education standards, materials for schools and parents, performance measure surveys and retention outcomes. Participants will be given tips on strategies for program development and overcoming implementation hurdles. PROTECTING OUR CHILDREN Thursday, May 13th - 1:00 pm Thursday, May 13th - 3:00 pm Room: Terrace Pavilion 2 Friday, May 14th- 8:00 am Room: River Terrace 1 Scott Pancoast Lecture and demonstration of the Microsoft COFEE tool for the collection of volatile data from a running system. Microsoft Xbox, Xbox 360 and Live! Investigations Tuesday, May 11th - 1:00 pm Room: River Terrace 1 Christopher Ard The Xbox and Xbox 360 enjoy a large following by both children and adults. These devices have the potential to store information that may be pivotal to an investigation and must be handled in the same way as other computer based evidence. This session will introduce investigators to the Xbox, Xbox 360 and the Live! Service. We will also discuss the unique capabilities of these devices —VOIP, Video Conferencing, Social Networking and others. In addition, we will explore some of the investigative techniques that must be employed to conduct a successful investigation of these devices. Military Resources in Child Exploitation Investigations Wednesday, May 12th - 1:00 pm Room: Grand Ballroom 3 Eric Trest & William Dent This presentation will provide an overview of Military Criminal Investigative Organizations (MCIO) as they relate to child exploitation investigations and operations within the Department of Defense. There will be a discussion regarding the unique resources and capabilities of the MCIO community and how their access and global presence can benefit your organization. Additionally, the Defense Computer Forensic 49 Lecture Sessions Laboratory (DCFL) Forensic Data Extraction (FDE) section will demo a triage tool to extract pictures, movies, internet history, electronic mail, chat, and limited registry information in cases involving digital evidence. The tool extracts data in a userfriendly interface and will be releasable to all law enforcement who attends the presentation. tions available for kids, tweens, teens, and parents and guardians. Mobile Social Networking Kenneth Hansen Operational planning for Internet Undercover Operations. Assessing risk management for the typical offender. Planning for search warrants and knock and talks. Arrest site selection and review of the information available in chat logs Friday, May 14th - 8:00 am Room: Grand Ballroom 1 Eliott Cohen Mobile devices have become a huge part of our everyday lives. As a result, we have integrated/allowed many activities, once performed only from home, to be performed on these devices. Little thought is often given to our personal area network (PAN) which we broadcast a signal and/or what information we have voluntarily given up in order to allow the use of applications (third party) on our mobile devices. This block will introduce participants to popular mobile social networking tools. It will discuss how these mobile device applications provide a virtual window into a user’s day-to-day activities, to include but not limited to: real time geo-tracking, automatic uploads to image sharing sites and peer-to-peer file sharing. Discuss investigative strategies which should be considered when investigating persons immersed in mobile social networking. NCMEC Resources Thursday, May 13th - 10:00 am Room: Grand Ballroom 7 Thomas Sirkel This workshop will provide the participants with updated information on the many remarkable and diverse array of resources offered to investigators of Internet Crimes Against Children, parents, community members, and other professionals by the National Center for Missing & Exploited Children. It will also include examples of our nationally known NetSmartZ videos and special music to enhance the learning process. The tools provided by this workshop are vital to the successful investigation and prosecution of Internet Crimes Against Children. NetSmartz Workshop: Tools to Teach Internet Safety Wednesday, May 12th - 10:00 am Room: Grand Ballroom 7 Laurie Nathan Discover cutting edge technology and invaluable safety information to provide kids, tweens, and teens with the necessary tools to navigate the Internet and make safer decisions online. Find out how zombies can teach kids how to handle cyberbullying, how a rapping robot encourages digital citizenship, and how real-life stories can impact that hard-to-reach teen audience. Each participant will receive copies of the latest presenta50 Officer Safety in Internet Operations: Operational Planning Wednesday, May 12th - 10:00 am Friday, May 14th - 10:00 am Room: Saint John’s OJJDP Grant Funding and Managing the ICAC Task Force Thursday, May 13th - 8:00 am Room: Saint John’s Will Bronson & Chris Holloway In this session, participants will review OJJDP grant program administrative requirements and discuss effective strategies for managing Internet Crimes Against Children (ICAC) Task Force Programs. Topics will cover a variety of grant issues, to include: post award grant activities; basic reporting requirements; American Reinvestment and Recovery Act reporting requirements; resources for effective grant management; and the ICAC Portal, including a functionality demonstration. Online Groups: Investigations, Forensics, and Prosecutions Part 1 & 2 Wednesday, May 12th - 1:00 pm Room: Grand Ballroom 6 Thursday, May 13th- 1:00 pm Room: Grand 3 Matthew Dunn & Steven Grocki & James Fottrell This lecture will provide an overview of investigations, forensics, and prosecutions of online groups. Online groups present a unique challenge to law enforcement in identifying members, capturing evidence, and making appropriate prosecutorial determinations. The lecture will focus on several recent international investigations that have successfully identified and prosecuted numerous individuals involved in Internet forums and social networking groups that were dedicated to the advertisement and distribution of child pornography. Operation Digital Offense Tuesday, May 11th - 1:00 pm Room: River Terrace 3 Larry Baker & Rex Miller & Ethan Cumming Operation Digital Offense was an FBI undercover operation targeting Richard Fleming, a renowned computer security expert who was affiliated with an international child pornography 2010 ICAC NATIONAL CONFERENCE Lecture Sessions production and distribution ring known as Star Kids. Star Kids members victimized hundreds of pre-pubescent males over an extended period of time. Numerous members of this ring utilized sophisticated encryption tools, browser wiping programs, and identity anonymizers to conceal their illegal activities. This case study will show how the FBI utilized all the investigative tools in its arsenal, to include many sophisticated and “lowtech” approaches not commonly used in child sexual exploitation investigations, to overcome Fleming’s sophisticated defenses and take down the last standing member of this ring. Partnering in Crime: Ways to Successfully Coordinate Federal and State Child Exploitation Prosecutions Wednesday, May 12th - 10:00 am Room: Grand Ballroom 1 Richard Moultrie & Kevin McMurry Richard S. Moultrie, Jr., Assistant United States Attorney for the Northern District of Georgia, and Kevin T. McMurry, Assistant District Attorney for the Coweta County, Georgia, District Attorney’s Office, will discuss factors for determining when child exploitation offenses originating on the local law enforcement level, should be considered for exclusive federal prosecution or dual prosecution by both entities. AUSA Moultrie and ADA McMurry will share strategies for successfully coordinating this effort, including a recent case study in which their respective offices collaborated in the federal conviction of a former emergency room doctor for the federal offense of child pornography production. The defendant had originally been charged by local law enforcement officers for the offense of attempted aggravated child molestation, and related offenses. Patterns and Trends in Online Victimization Thursday, May 13th - 8:00 am Thursday, May 13th - 3:00 pm Room: River Terrace 2 Friday, May 14th - 8:00 am Room: Grand 6 Christine Feller This session will demonstrate recent patterns and trends of online victimization mined from NCMEC data as well as intriguing law enforcement investigations. Topics will include the vulnerabilities of children using online gaming, cellular devices, virtual communities and social networking. In addition, this session will explore the difficult issue of “self-exploitation” that is increasing in prevalence across the country. Various industry efforts to reduce online child victimization will be presented. Presenting the Internet Safety Message Tuesday, May 11th - 1:00 pm Room: Grand Ballroom 7 PROTECTING OUR CHILDREN Joe Laramie Presenting Internet safety to kids, teens and parents requires connecting with each audience in a different way. Participants will gain an understanding of the issues and difficulties, and get tips and best practices to presenting to each of these groups. Attendees will be provided with resources and materials to help present this prevention message in their own schools and community. Preserving Evidence from the Cloud Wednesday, May 12th - 10:00 am Room: Terrace Pavilion 2 Wednesday, May 12th- 3:00 pm Room: Grand 8 Kelli O’Neill This lecture will inform the audience about recent trends to put digital records and other evidence at third party Application Service Providers (in the Cloud). It will provide solution including California search warrant language and law that allows for the seizure, preservation and examination of digital evidence from the Cloud. Protecting our Nation’s Children Wednesday, May 12th - 3:00 pm Room: River Terrace 3 Timothy A. Williams This presentation will focus on how INTERPOL Washington processes, reviews, and electronically publishes INTERPOL’s Red, Blue, Yellow Notices in coordination with appropriate law enforcement agencies. Protecting Youth Online: Internet Safety, Security, and Ethics Thursday, May 13th - 1:00 pm Room: Grand Ballroom 7 Marsali Hancock Understand the current risks and hot topics youth are facing online and with other connected technology such as cellphones (four main risks youth face online include giving out personal information, pornography online, violent or hateful content, and cyberbullying), and receive access to the iKeepSafe resources and presentations that you can tailor to specifically fit the needs of your community at no cost. Create a community that builds a generation of responsible, ethical and resilient digital citizens. Proving Your Child Pornography Case and Meeting Common Defenses with Computer Forensics Thursday, May 13th - 8:00 am Room: Grand Ballroom 8 Thursday, May 13th- 3:00 pm 51 Lecture Sessions Room: Grand 6 Damon King & Johnathan Bridbord Prosecutors, investigators, and computer forensics examiners will learn how to effectively use computer forensics in child pornography cases. Forensic methodology and points of evidence in computer systems, as well as how to analyze this data and incorporate it as part of the overall case, will be covered. Students will also be taught how to use computer forensic techniques to meet most common defenses. Richard Raymer Case Presentation Thursday, May 13th - 8:00 am Room: Grand Ballroom 2 Dennis Carry Trippinkid69: The case study of now third-time convicted sex offender Richard Lee Raymer. This case involved the cooperation of multiple agencies and local media allowing for a more detailed investigation by ICAC rather than a lesser crime suspected. The resulting investigation with ICAC and cooperation by other agencies allowed for a victim rescue and a third sex offense conviction for the offender. During Raymer’s previous prison incarceration, he made notes in journals during his sex offender treatment program indicating his desires for 10 year old boys and his intentions when released from prison. Sentencing Issues Friday, May 14th - 10:00 am Room: Saint John’s Alison Cauthorn During this lecture students will be shown various methods for achieving significant sentences in technology-faciliated child sexual exploitation cases. The session will focus on different methods to educate the judiciary on the horrible nature of these crimes as well as provide different approaches for securing appropriate sentences. The presenter will focus on effective themes to be employed as well as resources, from NGO’s as well as the research, to attack the belief that these are “just picture” cases. Sex Offender Registration and Enforcement Wednesday, May 12th - 8:00 am Room: Terrace Pavilion 1 Allison Turkel This lecture will provide a brief history of sex offender registration laws. An overview of the Sex Offender Registration and Notification Act(SORNA)will be provided. Current issues and topics related to sex offender registration, notification and management will be discussed. 52 SHIFT: Supporting Heroes in Mental Health Foundation Training A Workshop for Professionals Exposed to Child Sexual Abuse Images at Work Part 1 & 2 Thursday, May 13th - 1:00 pm Room: Saint John’s Jane Stevenson & Chuck Arnold This three hour course will offer exposed individuals (Law Enforcement Officers, Analysts, Prosecutors) the opportunity to learn about the causes and symptoms trauma that may occur as a result of their duties. Participants will learn how to develop effective coping strategies to deal with the negative effects of trauma. In addition the exposed individual will be given the tools to create a supportive work environment, effectively utilize mental health support and tools to create support for their families and their peers. The Use of an Undercover Website to Combat the Child Pornographer Tuesday, May 11th - 3:00 pm Room: Grand Ballroom 3 Wednesday, May 12th- 8:00 am Room: Grand 2 D. Todd Zerfoss This block will take a look at how an undercover website can benefit child pornography investigators and a few of the success stories that were made possible because of the use of an undercover website. To Use or Not Use the Polygraph Examination Technique in Crimes against Children Investigations Tuesday, May 11th - 3:00 pm Room: Grand Ballroom 1 Steven Edwards This module will provide the attendee with a basic understanding of the polygraph examination procedure and how it can be used most effectively in crimes committed against children. It will provide the attendee with what information a polygraph examiner will need to conduct the most effective examination. The participants will be provided with what is expected of them in their investigative and interview strategies to insure the best possible polygraph examination outcome. Various examination techniques will be discussed and what method(s) are best in cases involving victims and suspects in crimes committed against children. The presentation will include some case examples as well as the theories of polygraph techniques. 2010 ICAC NATIONAL CONFERENCE Lecture Sessions Undercover Chat Investigations Understanding the Gnutella Network Tuesday, May 11th - 3:00 pm Thursday, May 13th - 1:00 pm Room: River Terrace 3 Wednesday, May 12th- 10:00 am Room: Grand 3 Tuesday, May 11th - 3:00 pm Friday, May 14th - 8:00 am Room: Terrace Pavilion 2 Chad Gremillion & Tony Leonard This is an overview of emerging chat environments such as Meebo and Facebook, the latest ways that predators are communicating in these environments, and discuss ways to capture evidence. We will also discuss the latest updates and new features in AIM and Yahoo! Understanding “Sexting” and What Can Be Done About It Tuesday, May 11th - 1:00 pm Room: Clearwater Tuesday, May 11th - 3:00 pm Room: Terrace Pavilion 1 Thursday, May 13th- 10:00 am Room: Grand 1 Friday, May 14th - 10:00 am Room: Grand 2 Priscilla Grantham Examination of the production and dissemination of self-exploitative images by juveniles, with discussion of the incidence of such behaviors and related concerns, explanation of why such self-produced images may or may not constitute child pornography, review of relevant laws and public policies, and discussion of evolving response options available to investigators, prosecutors, courts, and schools. Understanding the BitTorrent File Sharing Network Friday, May 14th - 8:00 am Friday, May 14th - 10:00 am Room: River Terrace 3 Marc Liberatore & Brian Levine Peer-to-peer (p2p) file-sharing networks are extensively used for acquisition and distribution of images of child sexual exploitation. In this talk, we provide an introduction to BitTorrent, the most popular p2p application on the Internet. We will describe how the system works, and how users leverage the network to find and share content. We will then review sources of evidence present in BitTorrent networks for use in child pornography investigations. We will draw analogies and points of comparison to Gnutella and similar Internet investigations. We will detail the challenges that law enforcement will face when investigating BitTorrent. PROTECTING OUR CHILDREN D. Matthew Powell This module will begin with a review of IP addresses, ports, hash functions and geolocation technology. It will move into an introduction to and demonstration of Gnutella P2P software applications. Participants will see the abilities of the P2P networks to quickly circulate child sexual abuse images in the global environment. The operation of the Gnutella P2P network and clients will be explained. A breakdown of the common clients involved in trafficking child pornography and used during investigations will be discussed and trace evidence will be explained. Globally Unique Identifiers (GUIDs), Push Proxies and network traffic will also be explained. Utilizing Non-Profit Organizations to Expand the Reach of the ICAC Program Thursday, May 13th - 8:00 am Room: Grand Ballroom 7 Amy Staubs & Wendy Jolley-Kabi Learn how ICAC task forces are utilizing credible non-profit organizations to support ICAC goals and objectives. Members of the Association of Missing and Exploited Children’s Organizations (AMECO), actively support ICAC task forces and other law enforcement agencies by delivering prevention and education on Internet safety. Additionally, AMECO member organizations have established partnerships with law enforcement to: maintain contact with families of missing children (including runaways) and provide updates to investigators; assist with volunteer recruitment, training, and retention; and support and coordinate large-sale search efforts. Very Young Girls: Child Victims in the Commercial Sex Industry Part 1 & 2 Wednesday, May 12th - 1:00 pm Room: Grand Ballroom 2 Allison Attenello This presentation explores domestic trafficking and the commercial sexual exploitation of children (CSEC). Participants will have the opportunity to view the 2007 Showtime Documentary “Very Young Girls,” an expose of human trafficking that follows thirteen and fourteen year old American girls as they are seduced, abused, and sold on New York’s streets by pimps, and treated as adult criminals. Using the themes raised in the film, the presentation examines who CSEC victims are, as well as how law enforcement can identify and engage with 53 Lecture Sessions these victims. The presentation highlights best practices for law enforcement working with CSEC victims and emphasizes utilizing a victim-centered approach during investigation. Web 3.0: Blending of Augmented Reality and Virtual Worlds Wednesday, May 12th - 8:00 am Room: River Terrace 1 Wednesday, May 12th - 3:00 pm Thursday, May 13th - 8:00 am Room: Terrace Pavilion 2 Joseph Rampolla Augmented Reality (AR) is a new high-tech science that is on the verge of creating a technological explosion. The blending of AR and Virtual Worlds creates negative opportunities for technology to shape our society. The explosion of iPhone apps are already utilizing AR technology. GPS and cell towers’ coordinates have created a live social networking phenomenon that is likely to thrive in our broadband society. We will review these cutting-edge applications, and demonstrate how the use of this technology creates potential dangers in our world, highlighting the opportunities for predators to exploit others — particularly our children. Attendees will benefit from understanding the magnetism of the dark side for adolescents and how predators can capitalize on this new high-tech playground. What Use Is Research? Research Findings About ICAC Friday, May 14th - 8:00 am Room: Grand Ballroom 3 Janis Wolak OJJDP funded research by the Crimes against Children Research Center gives a “big picture” of the law enforcement response to technology-facilitated child sexual exploitation crimes and supports the direction of many ICAC programs. For example, findings show that arrests have increased in all categories of crimes (child pornography, undercover chat, crimes with identified victims). Proactive initiatives are generating more arrests. More offenders are being incarcerated and sentences are longer. This presentation will describe findings about offenders, victims and dynamics of crimes. It will also include discussion about child pornography offenders (How many child pornography investigations catch child molesters and which undercover operations are most productive for that purpose? Are offenders caught in peer-to-peer investigations different from those caught other ways?). What’s Next???? Wednesday, May 12th - 1:00 pm Room: Terrace Pavilion 2 Mike Duffey This class will focus on new technologies that are affecting or 54 possibly will be affecting child exploitation investigations. Also discussed will be legal issues and ways the various technologies can be used by suspects with regards to child exploitation investigations. Windows 7 Forensics Thursday, May 13th - 8:00 am Thursday, May 13th - 10:00 am Room: River Terrace 1 Friday, May 14th- 8:00 am Room: Grand 8 Jerrold Jones Overview of the changes implemented by Microsoft’s latest version of the Windows operating system, Windows 7. Windows Client Forensics (Windows XP) Tuesday, May 11th - 3:00 pm Room: River Terrace 1 Christopher Ard This session will provide students with an understanding of the Windows XP operating system beyond what the current forensic analysis tools can provide. Topics focus on potential evidentiary data such as log files, the Windows registry, system restore points, EFS, building a reliable timeline, USB storage device analysis, hidden data and Windows and Office metadata, Prefetch, and file system analysis. Women Who Sexually Offend Using Technology Part 1 & 2 Thursday, May 13th - 8:00 am Friday, May 14th - 8:00 am Room: Terrace Pavilion 1 Graham Hill This presentation will look at the ways in which women are using technology to facilitate their exploitation of children. The content will include video footage of interviews with women who have offended using technology and explores what behavior analysis can offer professionals in these cases. Working with a Computer Forensic Examiner and Presenting Digital Evidence Tuesday, May 11th - 3:00 pm Room: Grand Ballroom 8 Rusty McGuire Most cases involve some aspect of digital evidence or the Internet. Often the prosecutor and judges are new to this evolving area of the law. This workshop will focus on how to prepare a forensic examiner for trial, how to qualify an examiner as an expert and how to present digital evidence to a jury. This lecture will cover: 1. Understanding the capabilities of a computer 2010 ICAC NATIONAL CONFERENCE Lecture Sessions forensic examiner and how to prepare the examiner for trial. 2. Understanding how to effectively present testimony and how to address the defense team’s tactics 3. Deciding if you need an expert and how to qualify them. Sample voir dire questions will be provided to qualify an expert. Working with Yahoo! on Child Exploitation Investigations Tuesday, May 11th - 1:00 pm Room: Terrace Pavilion 2 Jon Berroya This class will provide law enforcement agents with a detailed explanation of Yahoo!’s policies and procedures for detecting and deterring online child sexual exploitation, including what data we report to the National Center for Missing and Exploited Children (NCMEC). We will cover Yahoo!’s most popular services and describe our data retention policies for subscriber information and content on our network. Finally, we will provide a primer on the Stored Communications Act and how that Act influences the types of data we can and will disclose in response to varying types of legal process. PROTECTING OUR CHILDREN 55 56 2010 ICAC NATIONAL CONFERENCE Speaker Biographies Since 1998, more than 250,000 law enforcement officers, prosecutors and other professionals have received training from the ICAC Task Force Program. Speaker Biographies James Anderson Chuck Arnold Assistant United States Attorney U.S. Attorney’s Office - Cheyenne Wyoming Jim Anderson is an Assistant United States Attorney stationed in Cheyenne, Wyoming. Jim has been a prosecutor for 30 years, having served the past fifteen years as an AUSA. His current duties involve prosecuting cases involving the use of technology to exploit children, federal firearm violations, narcotics offenses, and white collar crime. In addition to his prosecution duties, Jim is an instructor at the Wyoming Law Enforcement Academy and frequently instructs on legal issues arising in child exploitation cases at ICAC training programs. Jim obtained his undergraduate degree from Gonzaga University, in Spokane, Washington and his law degree from the University of Wyoming, College of Law located in Laramie, Wyoming. Unit Commander, San Diego ICAC San Diego Police Department Chuck Arnold is the Unit Commander of the San Diego Internet Crimes Against Children Task Force, a position he has held for the past three and a half years. Born and raised in San Diego, he has been with SDPD for 29 years where he has worked a variety of patrol, traffic, Investigative and administrative positions. Christopher Ard Investigative Consultant Microsoft Chris Ard has been with Microsoft for over 10 years. He is an Investigative Consultant with Microsoft’s Cybercrime Consulting and Training team. His primary responsibility is delivering Internet investigation and computer forensic training to government law enforcement organizations and providing consulting services on difficult forensics issues. Allison Attenello Training & Technical Assistance Manager Girls Educational & Mentoring Services (GEMS) Allison is the Training and Technical Assistance Manager at GEMS where she develops and conducts trainings on the commercial sexual exploitation of children (CSEC). She works closely with CSEC survivors to ensure that their experiences, ideas and insights are reflected in GEMS’ training curricula. After earning her Masters degree in Global Affairs, she spent several years working as a project manager for the United Nations-affiliated University for Peace in Costa Rica. There she developed graduate level curricula focusing on the intersections between gender, identity, and peace building. Prior to joining GEMS, Allison served as the Program Director for Girls Learn International where she conducted trainings to foster girls’ empowerment and advocate for girls’ human rights. Christopher Armstrong Hi Tech Crime Training Specialist SEARCH Mr. Armstrong is a High-Tech Crime Training Specialist in the High-Tech Crime Training Services department of SEARCH, where he coordinates and provides training on high-tech crime investigations and forensics. Mr. Armstrong retired from the San Diego Police Department in 2006 after more than 27 years of service. When he retired, he was Lead Investigator for the ICAC grant in San Diego County. In this role, he was involved in both proactive and reactive investigations, forensic investigations, computer maintenance, office network and networking hardware, and grant financial planning. Immediately prior to his ICAC assignment, he spent 6-plus years as a Child Abuse Investigator, investigating every type of child abuse, including child homicides. PROTECTING OUR CHILDREN Gregory Ayco Captain Seattle Police Department Captain Greg Ayco has been with the Seattle Police Department for 30 years. Captain Ayco has commanded numerous sections within the Seattle Police Department including Domestic Violence/Sexual Assault, Gang Unit and the Vice Section. He has been the Washington State ICAC Task Force Commander for the past 10 years. He is also the King County Regional AMBER Alert Coordinator. Rami Badawy Senior Attorney and Chief of Publications National District Attorneys Association Mr. Badawy is a Senior Attorney and Chief of Publications for the National Center for the Prosecution of Child Abuse at the National District Attorneys Association. He oversees outreach in the areas of child homicide, physical abuse, and 57 Speaker Biographies the Crawford line of cases. Mr. Badawy trains on a variety of topics, including the link between domestic violence and child abuse, cultural competency in the investigation and prosecution of child abuse and domestic sex trafficking of minors. Larry Baker Special Agent FBI Special Agent (SA) Larry Baker has been an agent of the Federal Bureau of Investigation (FBI) for eleven years. SA Baker has served his entire career with the FBI in San Antonio, Texas. As a field agent, SA Baker has worked a variety of federal violations in the fields of Public Corruption, Civil Rights, White Collar Crime, Cyber Crime, and Crimes Against Children. His collateral duties include being a fitness advisor and a member of the San Antonio Division’s SWAT Team. Jennifer Barnes Sergeant Indiana State Police Sergeant Jennifer Barnes is a 15 year veteran with the Indiana State Police. She is a graduate of Purdue University where she received her BS in Computer Science and MS in Industrial Management. Prior to joining the Indiana State Police, Sgt Barnes was employed in the computer industry for 11 years. In 2003 she was assigned to the Criminal Investigation Division, Cyber Crime Unit where she conducts digital media forensic examinations on computers and cellular devices. As part of the Indiana ICAC she also participates in numerous search warrants doing “on-scene” forensics. Additionally, she assists with the management / training of the Department’s Digital Media Recovery Specialist officers who perform “on-scene” forensic triage exams. Jon Berroya Legal Director, Global Law Enforcement and Security Yahoo! Inc. David Bishop HiTech Crime Training Specialist SEARCH Mr. David I. Bishop is a High-Tech Crime Training Specialist in the High-Tech Crime Training Services Program of SEARCH, where he coordinates and provides 58 training on high-tech crime investigations and forensics. Before joining SEARCH in 2009, Mr. Bishop served in the Grass Valley PD for 25 years. He worked most recently as a patrol sergeant and led the agency’s special incident team and various community- and problem-oriented policing teams. Mr. Bishop has considerable experience in communications and information systems planning, implementation, management, and support. While at the Grass Valley PD, he was responsible for the implementation, configuration, administration, and maintenance of the department’s network environment, including servers, workstations, and user profiles. Kevin Blackwell Senior Research Associate United States Sentencing Commission Kevin is a Senior Policy Analyst at the United States Sentencing Commission where he has worked for over 19 years. Kevin has worked extensively on child sexual abuse and other violent crimes at the Commission during his time at the Commission. He also has authored papers on disparity in sentencing. Prior to his employment at the Commission, Kevin worked at the Pennsylvania Commission on Sentencing. Kevin holds degrees in Chemical Engineering and Sociology from Bucknell University and the Pennsylvania State University. Michael Bourke Chief Psychologist United States Marshals Service Dr. Michael Bourke is the Chief Psychologist for the United States Marshals Service and the head of the USMS Behavioral Analysis Unit. Prior to joining the Marshals Service he worked as a clinical psychologist for the federal prison system; from 2000 to 2006 he was assigned to the Sex Offender Treatment Program and Hypersexuality Management Program at the Federal Correctional Institution in North Carolina. From July 2006 to September 2008, he worked within the Commitment and Treatment Program for Sexually Dangerous Persons at the same institution. In 2008 he received a Special Recognition Award from the United Kingdom’s Child Exploitation and Online Protection Centre, and in 2009 he was awarded the Pro-Humanitate Literary Award by the North American Resource Center for Child Welfare. 2010 ICAC NATIONAL CONFERENCE Speaker Biographies Johnathan Bridbord Lead CFS U.S. Department of Justice, Criminal Division Johnathan Bridbord is a Lead Computer Forensic Specialist in the High Technology Investigative Unit located within CEOS in the Criminal Division of the United States Department of Justice. Among his duties, Mr. Bridbord conducts forensic analysis of seized computer systems and media, provides investigative and analytical support to prosecutors and law enforcement agents to identify online child pornography offenses, and develops strategies for gathering electronic evidence. Prior to joining Criminal Division, Mr. Bridbord was the Senior Forensic Examiner at a prominent litigation consulting firm where he provided data forensic consultation in support of litigation and investigative matters. Will Bronson Program Manager US. Dept. of Justice, OJJDP Will D. Bronson, Jr., currently serves as a Program Manager with the Child Protection Division, Office of Juvenile Justice and Delinquency Prevention (OJJDP), U.S. Department of Justice. As part of his duties, Will is responsible for comanaging a portfolio of grants and cooperative agreements from the Department of Justice to units of state and local governments and non-profit organizations that include projects such as the Internet Crimes Against Children (ICAC) Program, the Child and Youth Safety Program, and various mental health programs affecting at-risk children. Prior to joining OJJDP, Will worked as the Director of Operations for VA Pyxis, Inc., a private human services agency. Robert Butterfield Senior Special Agent US Immigration and Customs Enforcement Senior Special Agent Robert Butterfield graduated from the Western Illinois University with a degree in Law Enforcement. In 1998, he went to work for the US Immigration as a Special Agent in Chicago, where he worked in the human trafficking group. In 2007, SSA Butterfield transitioned to the Computer Forensics unit, in what is now known as the Immigration and Customs Enforcement a division of the Department of Homeland Security (DHS). Rob is currently in the SAC Chicago ICE regional forensics lab. He has completed advanced coursework and training in PROTECTING OUR CHILDREN Guidance Software’s ENCASE, Access Data’s FTK, IACIS, Paraben and more. He is an AccessData Certified Examiner, along with BCERT, PCERT and A+. SSA Butterfield is a member of HTCIA. Jesse Canonico Assistant Prosecuting Attorney Cuyahoga County Prosecutor’s Office, Ohio ICAC Task Force Jesse Canonico is a graduate of The Ohio State University (1998, Journalism) and the Cleveland Marshall College of Law (2003, J.D.), and has been employed as an Assistant Prosecuting Attorney in the Cuyahoga County (Ohio) Prosecutor’s Office since 2004. Canonico is a member of the office’s Major Trial Unit, which handles all murder, rape and child victim prosecutions. Within that Unit, Canonico is assigned to the Ohio Internet Crimes Against Children Task Force, which prosecutes all cases involving the creation and distribution of child pornography online as well as online child sexual predators. Canonico has tried more than 60 cases as a first-chair prosecutor. Bill Carroll Lead Consultant Carroll Consulting LLC Bill was employed in the Criminal Justice field for the past thirty-five years, retiring November 2008, with the last ten years in an executive management position. The last four years of my career with the Oregon Department of Justice, I acted as the Oregon ICAC Task Force Commander. As a participating member of the national ICAC, I served on the policies and procedures committee. In 2008, Carroll Consulting LLC was formed. Services include: Contracting as an instructor for Fox Valley Technical College Unit Supervisors Course and Knock and Talk. I am also recognized as a qualified instructor for Surviving an audit and Community Outreach and Education. Currently, I am contracted with FVTC to assist with the development of a First Responder Course for Electronic Crimes. Dennis Carry Detective Washoe County Sheriff’s Office, Nevada ICAC Detective Dennis Carry has over 14 years of law enforcement experience with much of this experience assigned as a full time detective to the Internet Crimes against Children Task Force and related investigations. Detective Carry is 59 Speaker Biographies also a computer forensic examiner and with his experience in these roles, he’s investigated hundreds of investigations throughout Northern Nevada. In addition to ICAC, Detective Carry is a Task Force Officer with the FBI’s Innocent Images Initiative. Detective Carry often testifies to the Nevada State Legislature and Statutory Boards relating to the investigation of high tech crimes and online child exploitation. Jeffery Catt Detective Kokomo Police Department I am a 21 year veteran police officer. I have spent the last 7 years in the area of computer forensics, running our local computer lab for area law enforcement. I am Certified through the Department of Defense and Federal Law Enforcement Training Center. I have attended numerous courses on computer forensics such as EnCase and FTK. I have participated in numerous search warrants where I assist with on scene computer forensics. Alison Cauthorn Assistant Prosecuting Attorney Washington County Ohio Prosecutor’s Office B.A. Ohio Wesleyan University, 1986, Magna Cum Laude, Phi Beta Kappa; J.D. The Ohio State University, 1989. I have worked as an Assistant Prosecuting Attorney in Washington County Ohio since 1990. I do appellate work, search warrants, investigative subpoenas, provide other advice or investigative assistance and training to law enforcement. I also provide civil representation to county and township clients. I teach basic peace officer training legal courses part time and assist with teaching the legal aspects of Electronic Surveillance (wiretap) through the Ohio Peace Officer Training Academy to officers who must be certified to apply for Ohio wiretap warrants. I prepare and co-counsel complex felony cases, including child pornography/child sex abuse cases. Thomas Clancy Director and Research Professor National Center for Justice and the Rule of Law, University of Mississippi School of Law Tom Clancy, Director of the National Center for Justice and the Rule of Law at Ole Miss, has taught a variety of criminal law and procedure subjects at numerous major 60 law schools. He has more than 25 years of legal experience, including serving as Chief of the Post Conviction Unit in the State’s Attorney’s Office for Prince George’s County, Maryland and as an Assistant Attorney General for the State of Maryland in the Criminal Appeals Division. He has briefed and argued over 900 criminal appeals cases and has extensive trial and post conviction litigation experience. He has written extensively on the Fourth Amendment and lectures frequently at judicial, law enforcement, and other conferences on search and seizure, cyber crime and other criminal law and procedure topics. Philip Coduti Special Agent U.S. Immigration and Customs Enforcement Eliott Cohen Sergeant Maryland State Police Eliott Cohen is an 11 year veteran with the Maryland State Police. As an investigator assigned to the Computer Crimes Section/MD ICAC Task Force, he had been responsible for investigating a diversity of crime of related to high technology, primarily online child sexual exploitation for the past 7 years. Mr. Cohen has been recognized as having exceptional knowledge in the area of computer and Internet related investigations by Maryland courts and his peers. He regularly instructs federal, state and local law enforcement on how conduct computer/Internet related investigations. He also educates children, parents, counselors and school administration about the risks users face and how their online presence exposes them to a variety of predators; more specifically sexual predators. James Cole Senior Special Agent / Digital Forensic Agent Department of Homeland Security, U.S. Immigration and Customs Enforcement, Office of Investigations James “Jim” Cole is a Senior Special Agent and Digital Forensic Agent with the Department of Homeland Security, U.S. Immigration and Customs Enforcement. He has been assigned to a child sexual exploitation unit for the past seven years and prior to that was a detective working violent crimes including child sexual abuse and homicide. SSA Cole helped initiate the Inter-agency Child Exploitation Prevention Team (INTERCEPT), a tri-county task force devoted to 2010 ICAC NATIONAL CONFERENCE Speaker Biographies the pro-active investigation of non-traditional child sexual exploitation and conducts computer forensics for federal prosecutions arising from the team. Jim has been involved in numerous child sexual exploitation investigations over his past 17 years of law enforcement. Esther Cookson Director of Strategic Initiatives and Product Development Web Wise Kids Esther Cookson serves as the Director of Strategic Initiatives and Product Development for Web Wise Kids, a national, non-profit organization. She has over a decade of experience working in the nonprofit sector on behalf of children and families. Her particular expertise is in planning and implementing community initiatives, leading the development of interactive resources for K-12 students, training adults and equipping them to help prevent the online victimization of children, and developing partnerships with both the public and private sector. Web Wise Kids has games to empower youth to make wise choices in the digital world through interactive and fun activities instead of through a lecture. Vincent Costagliola VP Information Systems SR Technologies Vincent Costagliola’s technical background includes 15 years experience in software development platforms as well as an extensive knowledge of systems integration and business analytics. Mr. Costagliola is an active member of young AFCEANS, AFCEA, HTCIA, InfraGard, as well as an appointed member to the national AFCEA Technology Committee. Vincent holds a BS in Electrical Engineers with an emphasis on Computer Engineering. investigations with a focus on Child Sex Tourism cases. I also coordinate training classes and conferences for field agents involved in child exploitation investigations. John Cromwell Strategic Access Technologies, LLC John Cromwell is an experienced Cellular Forensics instructor serving Law Enforcement, Military Special Forces, and other U.S. organizations. He has conducted numerous trainings worldwide and has developed doctrinal cell-phone forensics certification courses. John has also produced real-world training exercises used by U.S. Special Forces and other U.S. organizations. Prior to joining NEKASG & Strategic Access Technologies, John served as a liaison between U.S. Intelligence and the United States Army. He is also experienced in Electronic Warfare and Signals Intelligence Systems operations and training. Ethan Cumming Special Agent Federal Bureau of Investigation Special Agent Ethan G. Cumming joined the FBI in 2004 and was first assigned to the San Antonio, Texas division. While in San Antonio, SA Cumming investigated a variety of matters involving child sexual exploitation, child pornography, computer intrusions, Internet fraud, and intellectual property rights. In 2009, SA Cumming was reassigned to the FBI’s Honolulu, Hawaii, division and designated the office’s Innocent Images Coordinator. Prior to entering government service, SA Cumming served as Director of Information Technology for a Washington, DC firm, and has worked closely with technology since a young age. Keith Daniels Deborah Crane Senior Special Agent US Immigration and Customs Enforcement I began my career in 1987 with legacy U.S. Customs Service and have worked all aspects of Customs law including drug smuggling, arms smuggling, money laundering and asset forfeiture. Since January 2007, I have been assigned to the ICE Headquarters Child Exploitation Section at the Cyber Crimes Center (C3) in Fairfax, Virginia, as a National Program Manager. In this position, I am responsible for overseeing various programs and operations that are being conducted in the field relative to Child Exploitation PROTECTING OUR CHILDREN Cellular Technologies Engineer Strategic Access Technologies Mr. Keith Daniels is a Cellular Technologies Engineer with Strategic Access Technologies, where he provides training and technical support to law enforcement in the area of Cellular mobile devices. He prepares training materials, teaches cellular phone data recovery courses and speaks at conferences throughout the United States. Prior to joining Strategic Access Technologies as a Cellular Technologies Engineer, Mr. Daniels was a High Tech Crime Training Specialist with SEARCH Group Inc. 61 Speaker Biographies William Dent Alan Dorhoffer Special Agent Defense Computer Forensic Laboratory (DCFL) Special Agent William Dent is a civilian agent and computer crime investigator with the Air Force Office of Special Investigations (AFOSI). He is currently the Chief, Forensic Data Extraction (FDE) section, Defense Cyber Crime Center (DC3), Defense Computer Forensics Laboratory (DCFL). SA Dent has over 30 years of service to the U.S. Air Force (twenty years of active duty and over ten years as a civilian). Twenty two years of service has been as an AFOSI agent. Deputy Director, Office of Education United States Sentencing Commission Alan Dorhoffer is the Deputy Director of the Office of Education and Sentencing Practice at the United States Sentencing Commission. He has conducted hundreds of training programs for judges, attorneys, law clerks, staff attorneys, and probation officers on federal sentencing issues. Mr. Dorhoffer has been the Chair of numerous policy teams, including the Child Pornography, Firearms, and Criminal History Teams. Furthermore, he analyzes U.S. Supreme Court, appellate court, and district court decisions interpreting the federal sentencing guidelines. Mr. Dorhoffer was an Adjunct Professor at the George Mason School of Law. He previously served as a law clerk to the Honorable Edmund A. Sargus in Columbus, Ohio. Eric Devlin Assistant District Attorney Houston Metro Internet Crimes Against Children Task Force / Harris County District Attorney’s Office Eric Devlin serves as the Chief Prosecutor of the Child Exploitation and Cybercrime Section of the Harris County District Attorney’s Office and the Deputy Commander of the Houston Metro Internet Crimes Against Children Task Force. A 2001 graduate of South Texas College of Law, Eric Devlin is one of the founders of the Houston ICAC Task Force, and in 2009 was awarded named one of the outstanding Child Abuse Prosecutors for the State of Texas by the Child Advocacy Centers of Texas. Since the creation of the Task Force, he has investigated and prosecuted more than 600 cases of child exploitation of children. J. Brooke Donahue Supervisory Special Agent FBI SSA Donahue is a twelve year veteran of the FBI and has been investigating child sexual exploitation offenses for six years. He currently serves as a Program Manager in the Innocent Images National Initiative Unit providing oversight of the Innocent Images sub-program for the field offices. He is the FBI’s primary subject matter expert on Gigatribe investigations and pioneered the development of an interagency national law enforcement operation to combat the distribution of child pornography through Gigatribe. He routinely provides training to domestic and international law enforcement organizations on LimeWire and Gigatribe. 62 Mike Duffey Special Agent Florida Department of Law Enforcement Mike Duffey is a Special Agent with the Florida Department of Law Enforcement. Mike is currently assigned to the Computer Crime Center in Tallahassee, Florida where he is responsible for statewide computer crime investigation. Mike’s law enforcement experience includes working for the Tallahassee PD and the Florida Department of Insurance. Mike is a graduate of Florida State University School of Criminology. Mike’s current cases include network intrusion cases, Phishing scams and unauthorized access to a network system. Mike has been involved with conducting online undercover Child Exploitation investigations both within the United States and overseas. Mike has conducted trainings with MySpace and Facebook along with other training to other Child Exploitation Detectives around the world. Matthew Dunn Section Chief US Immigration and Customs Enforcement Matt Dunn became the Section Chief for the ICE Child Exploitation Section (CES) in May 2009. The CES is responsible for managing the ICE Child Exploitation Program, providing operational and programmatic support to ICE field offices (both domestic and foreign). The CES is a fully operational component and initiates national/ international investigations. Mr. Dunn has been assigned 2010 ICAC NATIONAL CONFERENCE Speaker Biographies to the CES since February 2005. Prior to this assignment, Mr. Dunn worked in the ICE Office of Professional Responsibility. Mr. Dunn began his career in federal law enforcement in June 1998 with the U.S. Department of Transportation, Office of Inspector General. and “Traveler” cases in 1996 as a sex crimes investigator with the Redondo Beach California Police Department. In 1999 Tom co-founded the South Bay Regional Computer Forensics Laboratory (Los Angeles County). Mike Evans Training Coordinator ICAC Training and Technical Assistance Edwards currently is a private contractor working for entities such as Fox Valley Technical College, the University of Tennessee and several other clients. In this role he assists in the development of training, facilitates training and evaluates training related to crimes against children, cybercrime and financial crime. He retired from the Georgia Bureau of Investigation in April 2005 after 32 years of service. In his last assignment he was the Special Agent in Charge of the Financial Investigations Unit and the Commander of the ICAC Task Force. Edwards is certified and trained as a polygraph examiner, fraud examiner, police instructor, and police manager. As a polygraph examiner he has interviewed numerous child victims and child sexual predators. Chief of Police Squaxin Island Police Chief Michael Evans started in law enforcement in 1991 as a reserve officer with the City of Lacey, WA Police Dept. Several years later he was hired by the Squaxin Island Tribal Police Department. Mike is a federally certified narcotics and community policing trainer. In 2001, Mike was promoted to Sergeant and shortly thereafter to Lieutenant. Mike was promoted to Chief of Police in April of 2006. He is currently serving on the Washington Board on Law Enforcement Training, Standards, and Education and also serves on the MACECOM (Dispatch) Governance and Legislative Boards. Mike is currently the President of the Northwest Association of Tribal Enforcement Officers. The Squaxin Island Police Department is actively involved in the Seattle ICAC. Robert Erdely Robert Favrot Corporal PA State Police Robert Erdely is the supervisor of the computer crime unit in Pennsylvania. He has been a trooper for over 18 years, 11 of which was assigned to the computer crime unit. The University of Massachusetts, Massachusetts State Police and Pennsylvania State Police were part of the RoundUp development team. He has various forensic certifications, Cisco certifications, Microsoft certifications, CompTIA certifications and his CISSP. Investigator Louisiana Attorney General’s Office I have been employed as a Deputy Sheriff in West Baton Rouge Parish, Louisiana for the past 19 years. I currently hold the rank of Sergeant. I have been assigned to the High Technology Crime Unit with the Louisiana Attorney General’s Office for the past 3 years. As a member of ICAC I have had the opportunity to investigate numerous internet crimes involving child pornography and child exploitations. I have been a part of co-founding a pilot juvenile offenders diversion program which focuses on the rehabilitation process of juvenile offenders possessing child pornography. Steven Edwards Thomas Eskridge COO Tom Eskridge is the Chief Operations Officer and Partner of the High Tech Crime Institute. (HTCI) Tom Eskridge retired after 28 plus years in law enforcement. During his lengthy law enforcement career Tom worked as a patrol officer, training officer, traffic officer, detective, Sergeant and retired as the administrative Lieutenant for the Redondo Beach California Police Department. Tom has trained law enforcement and military personnel since 1999 in the field of high tech/Internet based investigations and computer forensics. Tom began working computer Child Exploitation PROTECTING OUR CHILDREN Christine Feller Program Manager, Child Victim Identification Program National Center for Missing and Exploited Children Christine Feller is the Program Manager of the Child Victim Identification Program at the National Center for Missing & Exploited Children in Alexandria, Virginia. Ms. Feller has been with the Exploited Children Division at NCMEC since 2002, where she started as a CyberTipline analyst. In July 2003, Ms. Feller joined CVIP, where she now manages a staff of approximately thirteen analysts. This program serves 63 Speaker Biographies a dual mission, (1) to help prosecutors secure convictions by proving that a real child is depicted in child pornography images; and (2) to assist law enforcement in locating unidentified child victims. She has provided extensive technical assistance to law enforcement in the United States, as well as abroad on cases of child sexual exploitation. David Ferris Investigator Louisiana Department of Justice High Technology Crime Unit I have been in law enforcement 10 years and in a child exploitation capacity for 3 years. I am currently a supervisor in the Louisiana Attorney General’s Office, High Technology Crime Unit. During that time I have conducted thousands of hours of instruction and operations in undercover investigations. I have received a Bachelors of Psychology from Ashford University in Clinton, Iowa. I am also a United States Marine Corps veteran having served in Iraq. I have been certified as an expert in Undercover Peer to Peer investigations, Cybercrimes, and Child exploitation in the state of Louisiana. Recently I have been a part of cofounding a pilot juvenile offender’s diversion program which focuses on the rehabilitation process of juvenile’s offenders possessing child pornography. the section’s High Technology Investigative Unit. Among his duties, Mr. Fottrell conducts forensic examinations of seized computer systems and media, provides investigative and analytical support to prosecutors and law enforcement agents to identify online child pornography and obscenity offenses, develops strategies for gathering electronic evidence. Tom Garrett Commonwealth’s Attorney Following his graduation from the University of Richmond, Tom served in the United States Army. While in the Army, he was deployed overseas in support of Operation Joint Endeavor. Following his service in the Army, Tom entered the T.C. Williams Law School at the University of Richmond. Prior to being elected Commonwealth’s Attorney, Tom served as an Assistant Attorney General under Bob McDonnell where he prosecuted complex whitecollar and internet crimes. During this time he also served as a Special Assistant United States Attorney. Tom is a strong believer in protecting children. His child safety initiative “CSI Louisa” has brought dozens of predators to justice in his two years in office. He put Louisa on the map in Virginia as a place where not to prey on children. Michael Geraghty Justin Fitzsimmons Senior Attorney National District Attorneys Association Justin Fitzsimmons is a Senior Attorney with NDAA’s National Center for Prosecution of Child Abuse in Alexandria, Virginia. He organizes national conferences on the topic of technology-facilitated child sexual exploitation. Additionally, he also trains at other national conferences and state and local seminars on the subject of technologyfacilitated child sexual exploitation. James Fottrell Assistant to the Chief for Computer Forensics and Investigations at Department of Justice Department of Justice James Fottrell is the Assistant to the Chief for Computer Forensics and Investigations for the Child Exploitation and Obscenity Section in the Criminal Division of the United States Department of Justice. In this role, Mr. Fottrell oversees the staff of Computer Forensics Specialist within 64 Executive Director, Technology Services Division NCMEC Mike is the Executive Director of the Technology Services Division for the National Center for Missing & Exploited Children. In this capacity he is responsible for overseeing the Center’s enterprise information technology systems and services. Mike has previous corporate and law enforcement experience, which includes a position as the vice president of High Technology Investigations at Prudential Financial. At Prudential, he was responsible for carrying out and supervising all computer related investigations for Prudential. He is a former New Jersey State Trooper and is responsible for the formation and development of the NJSP’s High Technology Crimes Investigations Unit, which has garnered international accolades for its expertise in computer crime investigations. 2010 ICAC NATIONAL CONFERENCE Speaker Biographies Jeffrey Gersh Program Manager OJJDP, USDOJ Jeffrey Gersh is a Program Manager for the U.S. Department of Justice’s Office of Juvenile Justice and Delinquency Prevention (OJJDP), where he is responsible for managing several States’ Internet Crimes Against Children (ICAC) Task Forces, as well as the National Center for Missing & Exploited Children. While working in the Child Protection Division of OJJDP, Mr. Gersh also manages several federallyfunded research and evaluation initiatives in the areas of commercial sexual exploitation of children, internet crimes against children, missing and exploited children and other child protection issues. Mr. Gersh has published articles, presented papers and taught on several topics associated with criminal justice and law enforcement evaluation, crime analysis, crime mapping and corrections. Charles Gillingham Deputy District Attorney Santa Clara County District Attorney’s Office Charles Gillingham has been a Deputy District Attorney with the Santa Clara County District Attorney’s Office since 1994. He has been on multiple trial assignments including misdemeanors, narcotics, domestic violence and sexual assault. He has handled the prosecution of three-strike, attempted murders, robberies, sexual assaults, child molest, homicide and death penalty cases. Mr. Gillingham was the assigned prosecutor on the San Jose, California ICAC Task Force for three years and prosecuted numerous child pornography and child exploitation cases. Mr. Gillingham has taught many courses for local law enforcement. He is a member of the U.S. Attorney for the Northern District of California Child Pornography Task Force. Frankie Goldberg Director Ohio ICAC, Assistant Prosecuting Attorney Ohio ICAC Frankie Goldberg is a graduate of Cleveland-Marshall College of Law and has been employed as an Assistant Prosecuting Attorney in the Cuyahoga County (Ohio) Prosecutor’s Office since 1991. She has served in numerous roles that have included: Director of Special Projects, a member of the Cold Case Task Force, and also was responsible for the development, coordination, and implementation of the Northern Ohio Elder Protection Training Council, a PROTECTING OUR CHILDREN 40-county training of more than 1,000 federal, state and local law enforcement funded by a grant from the U.S. Dept. of Justice. Moreover, Ms. Goldberg has successfully prosecuted high profile elder exploitation crimes including financial, physical and sexual abuse. Jim Granozio Supervisory Special Agent FBI SSA James Granozio is the Program Manager for the Cyber Crime Task Force Program under the FBI’s Cyber Division. He is responsible for overseeing 46 cyber crime task forces nationwide encompassing over 270 full and part time task force officers. Priscilla Grantham Senior Research Counsel National Center for Justice and the Rule of Law Ms. Grantham has worked as senior research counsel for the National Center for Justice and the Rule of Law at the University of Mississippi School Of Law since 2006. Prior to joining the NCJRL, Ms. Grantham was associated with the United States Attorney for the Northern District of Mississippi as a research attorney, where she primarily handled issues regarding the Fourth Amendment and the Federal Sentencing Guidelines. Ms. Grantham is a graduate of the University of Mississippi School Of Law where she received her J.D. She has developed and presented legal training for law enforcement officers, judges and prosecutors in various subjects related to the Fourth Amendment, computer crime and computer-related criminal investigations. Chad Gremillion Senior Trooper Louisiana State Police Senior Trooper Chad Gremillion has been a member of the Louisiana State Police for the past 11 years and has investigated crimes against children for the past 6 years. Trooper Gremillion’s undercover chat investigations has led to the prosecution of cases in both state and federal court in Louisiana and throughout the Nation. He is currently an instructor for Fox Valley Technical College on undercover chat investigations. For his work in child exploitation investigations, he was the recipient of the “2006 Plainclothes Trooper of the Year”. 65 Speaker Biographies Steven Grocki Assistant Deputy Chief for Litigation U.S. Department of Justice - Child Exploitation and Obscenity Section Steven Grocki is currently the Assistant Deputy Chief for Litigation at the Department of Justice’s Child Exploitation and Obscenity Section (CEOS) in Washington, DC. CEOS leads the Department of Justice in its endeavor to continuously improve the enforcement of federal child exploitation laws and prevent the exploitation of children and families. In his capacity as Assistant Deputy Chief for Litigation, Mr. Grocki supervises CEOS’ 15 trial attorneys. CEOS’ team of attorneys actively prosecute all federal crimes relating to the exploitation of children, provide advice and training to federal prosecutors, law enforcement personnel, and Department of Justice officials. Marsali Hancock President iKeepSafe.org - Internet Keep Safe Coalition As president of iKeepSafe.org, Marsali Hancock speaks nationally and internationally on digital citizenship issues. Recently, Ms Hancock received the Family Online Safety Institute (FOSI) Award for Outstanding Achievement and was a panelist and moderator at FOSI’s 2009 conference. She participated in the planning and execution of the PointSmart.ClickSafe. Summit and currently serves on its Blue Ribbon Task Force, exploring and making recommendations for industry best practices. She’s a member of the Obama administration’s Online Safety & Technology Working Group and on the advisory boards of the Washington and London-based Family Online Safety Institute, and GetNetWise.org (a project of the Internet Education Foundation in Washington). Kenneth Hansen Detective Midvale Police Department Ken worked for the Salt Lake City Police department as an officer and sergeant for 26 years. He gained experience in Patrol, Traffic, SWAT, Vice, Gangs and as a Public Information Sergeant. He graduated from FBI SWAT School in Camp Pendleton, California and the California Highway Patrol Motorcycle Operations School. In 1990, he started the Metro Gang Unit in Salt Lake County and received the Police Chief ’s Award for Excellence for his supervision of the 66 Metro Gang Unit and the Salt Lake City Police Vice Squad. After 27 years of service as a U.S. Army Combat Medic, Combat Medic instructor and Licensed Practical Nurse he retired from the United States Army Reserve in 2006. He maintains his nursing license. Ken graduated from the United States Army NREMT and Nursing Schools. Michael Hill Sergeant Massachusetts State Police Sergeant Michael Hill has been a Massachusetts State Police Officer since 1993. In his career he has investigated homicides, unattended deaths, rapes, child abuse, child sexual assaults, and other major crimes. Sergeant Hill has had extensive training and experience with the seizure and forensic examination of computers. Sergeant Hill has computer forensic certifications as an Encase Certified Examiner (EnCE), Seized Computer Evidence Recovery Specialist (SCERS), and a Certified Forensic Computer Examiner (CFCE). Sergeant Hill has been a member of the Massachusetts Internet Crimes Against Children (ICAC) Task Force since 2000. He has conducted numerous reactive and proactive investigations involving the exploitation of children on the Internet. Graham Hill Detective Chief Superintendent Child Exploitation & Online Protection Centre Graham is currently the head of CEOP’s Behavioural Analysis Unit. It specializes only in understanding the behaviour of people suspected of having a sexual interest in children. Graham brings with him 25 years service, the majority of which have been spent within the Criminal Investigation Department, Major Crime and specialist teams. Since 2001, Graham has assisted with law enforcement training on the issues of understanding, interviewing, preparing strategies for interviewing child sex offenders and investigating serious sexual crimes against children. In addition to providing training in the UK, he has undertaken training internationally for European law enforcement agencies, Interpol, Europol and the UK Foreign and Commonwealth Office in South East Asia and America. Chris Holloway Program Manager US Department of Justice, Office of Juvenile Justice and 2010 ICAC NATIONAL CONFERENCE Speaker Biographies Delinquency Prevention Chris Holloway is a Program Manager with the Office of Juvenile Justice and Delinquency Prevention’s (OJJDP) Child Protection Division. For nearly ten years, Chris has managed the Internet Crimes Against Children (ICAC) Task Force program, as well as other initiatives focused on reducing the sexual exploitation of children. Kim Hunt Senior Research Associate United States Sentencing Commission Dr. Kim Steven Hunt has over nineteen years of experience in the field of criminal sentencing policy and research. He is a Senior Research Associate at the United States Sentencing Commission. Previously, he worked on sentencing reform efforts in the District of Columbia, Maryland and Virginia. Dr. Hunt has led research studies of sentencing guidelines, risk assessment, and correctional forecasting. He is currently studying the recidivism rates of federally-sentenced offenders and correlates of recidivism. Jim Innes Detective Sergeant Grandview Police Department Detective Sergeant Jim Innes has been with the Grandview Missouri Police Department for 25 years, 21 of which as a Detective. Jim has been involved with computer forensics since 2002. His most recent assignment is with the FBI Heart of America Regional Computer Forensic Laboratory in Kansas City Missouri as a certified Forensic Examiner. David Johnson Officer San Jose Police Department David has been an Officer with the San Jose Police Department for 28 years. He has been working with computer evidence for the past 3 years as part of the Silicon Valley ICAC Task Force. Jeremiah Johnson Computer Crime Specialist National White Collar Crime Center Mr. Johnson joined the National White Collar Crime Center in October 2005 as a Computer Crime Specialist. He has recently been certified by SANS as a GIAC Security Essentials professional. His last year focus was Computer PROTECTING OUR CHILDREN Security and Digital Investigative Techniques. He has seven years experience fixing and repairing computers. Mr. Johnson was contracted by Dell to perform a Department of Defense grade (5220.22-M) data wipe for ALLIANT TECH SYS INC on over 500 machines. ATK is an advanced weapon and space system company and is the nation’s largest producer of conventional munitions, serving both military and commercial markets. As a help desk employee for Holiday Builders, a company with over 600 employees, Mr. Johnson was responsible for receiving and responding to all help desk calls. Wendy Jolley-Kabi Executive Director Wendy Jolley-Kabi, the Executive Director of AMECO, has worked in the nonprofit sector for over 15 years in the United States and Southern Africa. She has served in a variety of direct care and management positions working with medically-ill homeless individuals, developmentally disabled adults, disabled individuals falling through the cracks of homeless provider systems, grassroots community groups, HIV+ and abused younger children and displaced children. Wendy is a returned Peace Corps Volunteer who served in Lesotho and then remained in the country working with children in need of care. She is a founding member and Past President of the Lesotho Non-Governmental Organization Coalition for Children’s Rights. Jerrold Jones Computer Crime Specialist National White Collar Crime Center Jerry Jones is retired from the law enforcement community after almost 31 years with the Police Bureau in Portland Oregon and is currently an instructor for NW3C. During his career Jerry worked various assignments and has 14 years experience in investigative functions. For the last three years Jerry has been a full time computer forensics examiner for the Detective Division and was assigned to the FBI Northwest Regional Computer Forensics Lab. In this capacity he has examined media in numerous cases including hard drives, cell phones, PDAs, and other electronic storage devices. He has significant experience in computer forensics, investigations, and vehicular assault/fatal accident reconstruction. Jerry has been involved in cases on both a national and local level. 67 Speaker Biographies Damon King Deputy Chief U.S. Department of Justice - Child Exploitation and Obscenity Section Damon King is Deputy Chief for the Child Exploitation and Obscenity Section (CEOS) in the Criminal Division of the United States Department of Justice. In this capacity, Mr. King supervises more than a dozen prosecutors as well as the High Technology Investigative Unit (HTIU), a special unit within CEOS consisting of computer forensic specialists who team with expert prosecutors to ensure the Department of Justice’s capacity and capability to prosecute the most complex and advanced offenses against children committed online. Before joining CEOS as a prosecutor in 2001, Mr. King served for more than six years as a prosecutor in the United States Army Judge Advocate General’s Corps and as a Special Assistant United States Attorney in the Eastern District of Virginia. Steve LaPorta Sergeant Gloucester County Prosecutor’s Office - New Jersey State Police ICAC Task Force Sergeant Steven LaPorta oversees the High Tech Crimes Unit with the Gloucester County Prosecutor’s Office and is an affiliate of the New Jersey State Police – ICAC Task Force. Sergeant LaPorta has been assigned to this unit since its inception in October 2004, and has been trained in the investigation of computer use in the exploitation of children and in the methods of digital forensic analysis. Sergeant LaPorta has participated in numerous investigations, both proactive and reactive, which have resulted in apprehension and prosecution of suspects attempting to exploit or solicit sexual acts with children. Joe Laramie Lieutenant Glendale PD - Missouri ICAC Lieutenant Joe Laramie is a 31 year veteran of the Glendale, Missouri Police Department, with more than 28 years experience in the area of child protection. He is a certified Police Juvenile Specialist and former DARE officer, and since 2003 has been the Program Director for the Missouri Internet Crimes Against Children (ICAC) Task Force. He has served on the National ICAC Task Force Executive Committee and was a member of Missouri Governor Blunt’s 2007 Cyber Harassment Task Force. He currently 68 serves on the Advisory Board to the National Coalition to Prevent Child Sexual Exploitation and as an advisor to the Internet Keep Safe (IKeepSafe) Coalition. Tony Leonard Lieutenant Smyrna Police Deparrtment Anthony Leonard has served with the Smyrna Police Department since 1995. He is currently assigned to the Criminal Investigations Division. Lt. Leonard formed the Smyrna Police Department’s Computer Crimes Unit, which he currently supervises. He is responsible for overseeing the investigation of all the agency’s ICAC cases, computer forensic examinations, and investigations into computerrelated crimes. He also maintains a case load of his own, consisting primarily of peer-to-peer investigations and undercover chat investigations. Since 1998, Tony has served as a part-time instructor at the North Central Georgia Law Enforcement Academy and the Clayton Regional Law Enforcement Academy, conducting over 1,500 hours of classroom and hands-on training. Brian Levine Associate Professor University of Massachusetts Amherst Brian Levine is an Associate Professor in the Dept. of Computer Science at the University of Massachusetts Amherst. He received a PhD in Computer Engineering from the University of California, Santa Cruz in 1999. His research focuses on digital forensics, mobile systems, and the Internet, and he has published more than 60 papers on these topics. Brian’s active funding includes awards from the Nation Institute of Justice Electronic Crime program; the National Science Foundation (NSF) programs on Trustworthy Computing, Networking (NETS), GENI testbed development; and DARPA’s Disruption Tolerant Networking program. He received a CAREER award in 2002 for work in peer-to-peer networking, one of NSF’s most prestigious awards for new faculty. Marc Liberatore Research Scientist University of Massachusetts Amherst Marc Liberatore is a Research Scientist at the University of Massachusetts Amherst, working in the field of network security. He received his Ph.D. in Computer Science from the University of Massachusetts Amherst in 2008. He has 2010 ICAC NATIONAL CONFERENCE Speaker Biographies also served as a Mellon Postdoctoral Fellow at Wesleyan University in Connecticut. Keith Lockhart VP, Training AccessData As Director of Training, Keith is responsible for the development of forensic and encryption training solutions for local, state, federal, and international law enforcement agencies as well as worldwide corporate entities involved in the prevention, investigation and prosecution of hightechnology crime. Prior to joining AccessData, Keith served as a computer crime specialist at the National White Collar Crime Center (NW3C) in Fairmont, WV. Keith served as program manager of the INET (Internet Trace Evidence Recovery & Analysis) course providing the framework of complex research and design for its development and maintenance. Donald Mason Associate Director and Research Professor National Center for Justice and the Rule of Law, University of Mississippi School of Law Don Mason is Associate Director of the National Center for Justice and the Rule of Law (NCJRL) and a Research Professor at the University of Mississippi (Ole Miss) School of Law. After receiving his B.A. and law degrees from the University of Iowa, he started his law career as a county prosecuting attorney in Iowa and then for twelve years directed the statewide agency and nonprofit association that provide training and technical assistance for Iowa prosecutors. Prior to joining the NCJRL in 2003, he was a municipal court judge in West Virginia and worked six years for the National White Collar Crime Center developing and presenting legal training on computer crime and related criminal investigations. David Matthews Director Wisconsin Department of Justice David Matthews is the Director of the Wisconsin DCI Investigative Services Bureau. He is responsible for the management of the Wisconsin ICAC Task Force in addition to his other duties. Prior to his current assignment Director Matthews worked as a Special Agent assigned to the WI ICAC Task Force since 1995 where his duties included online investigations in the P2P network as well as forensic PROTECTING OUR CHILDREN computer examinations in addition to general cyber crimes investigations. Director Matthews has been a police officer since 1978. Matthew McFadden Department of Defense Cyber Crime Center Matthew McFadden, Department of Defense Cyber Crime Center; Defense Cyber Investigation Training Academy (DCITA). As a member of the Network Investigation Section, Mr. McFadden researches, develops, and instructs in areas of forensics in network investigations and intrusions. Matthew has spent several years in the field of Information Technology specializing in Information Assurance and Security, Network Intrusion/Penetration, and Forensics. Matthew has performed research projects, consulted, presented, and has worked in Network and System Administration. He also holds industry IT certifications, a Bachelors of Science in Network Security, a Masters of Science in Information Security, and is also a candidate for his Doctorate of Computer Science in Digital System Security. Rusty McGuire Deputy Commonwealth’s Attorney County of Louisa Rusty McGuire is a career prosecutor that has served at the local, state, and federal level. He has dedicated the last 7 years of his career to technology crimes and protecting children from internet predators. He brought many of Virginia’s worst internet predators to justice, prosecuted our Nation’s first felony SPAM case, and helped organize AG Bob McDonnell’s highly acclaimed Internet Safety Task Force. Super Lawyers Magazine recognized and featured Rusty in their 2007 “Rising Stars” edition. Rusty helped develop the Attorney General’s “Safety Net” program which is used as model to educate parents and minors on Internet Safety. He has published numerous articles on legal subjects ranging from Internet safety to capital murder. Kevin McMurry Assistant District Attorney District Attorney’s Office Coweta Judicial Circuit Rex Miller Special Agent Federal Bureau of Investigation Rex Miller is a Special Agent (SA) with the Federal Bureau 69 Speaker Biographies of Investigation (FBI). SA Miller has been an Agent with the FBI since May 2004. SA Miller is currently assigned to the Cyber Crimes unit in San Antonio, Texas, and is the Innocent Images Coordinator for the San Antonio Division of the FBI. SA Miller is part of the San Antonio’s Evidence Response Team and works with other members on the team in the preservation and documentation of crime scenes. He is a licensed Professional Engineer and holds a Bachelors of Science degree in Civil Engineering from New Mexico State University, New Mexico. Preceding his appointment as an Agent of the FBI, he was employed as a Forensic Engineer for over 10 years. serving as Victim Assistance Advocate, Child Sexual Assault Team Coordinator and Education Coordinator. In 2003 she was appointed Director of Community Outreach and Education where she is responsible for the implementation of crime prevention and awareness education and training. Ms. Mulcahy worked with prevention experts to create the District Attorney’s Bullying Prevention Initiative which partners with schools countywide to combat bullying and harassment. In 2006, she collaborated with the Massachusetts ICAC Task Force to create a student mentoring internet safety pilot program for young students that now serves as a model for the state. Richard Moultrie Assistant United States Attorney US Attorney’s Office Richard S. Moultrie, Jr. has been an Assistant United States Attorney for 14 years. He currently serves as the Human Trafficking Coordinator for the United States Attorney’s Office in the Northern District of Georgia. He has handled a variety of federal offenses, including child exploitation offenses, child pornography production and distribution, and RICO violations. Hugh Munn Crisis Communications and Public Relations lecturer University of South Carolina, School of Journalism and Mass Communications Hugh Munn specializes in law enforcement media relations and crisis communications techniques. He is retired after 26 years as chief spokesman with the S.C. State Law Enforcement Division (SLED) and currently serves as a public relations and crisis communications lecturer for the University of South Carolina’s School of Journalism and Mass Communications. Munn has presented law enforcement training programs in more than 45 states and Puerto Rico. Nathan Mousselli Special Agent Department of Homeland Security - Immigration & Customs Enforcement Nathan Mousselli is a Special Agent with the Department of Homeland Security, Immigration and Customs Enforcement (ICE) in New York City. He has 13 years of combined Law Enforcement and Military (United States Marine Corps) experience. Prior to his law enforcement career, Nathan was a computer operations manager, information technology (IT) specialist and network administrator. Nathan graduated from The Pennsylvania State University and is a Certified Forensic Computer Examiner (CFCE) by the International Association of Computer Investigative Specialist. He holds numerous other certifications. Nathan has testified as an expert witness in federal court and has conducted exams on PCs, Macs, iPhones, RAIDs, PDAs and numerous other storage devices. Carol Mulcahy Director of Community Outreach and Education Berkshire District Attorney Carol Mulcahy joined the District Attorney’s staff in 1992, 70 Laurie Nathan Manager of National Outreach and Partnerships NetSmartz Workshop/NCMEC Laurie Nathan is the Manager of National Outreach and Partnerships for NetSmartz Workshop, a program of the National Center for Missing & Exploited Children. She brings a background in child exploitation and child abuse prevention to the fight against child endangerment online. Recently, Laurie’s focus has been on spreading awareness of the importance of Internet safety education. Laurie is an alumna of Emory University in Atlanta, GA where she graduated with highest honors in Psychology. Nick Newman Computer Crime Specialist National White Collar Crime Center Nicholas R. Newman has been with the National White Collar Crime Center since January of 2006. He started off as an intern and quickly moved up the ranks of the Computer Crimes Section. In a little over six months, he 2010 ICAC NATIONAL CONFERENCE Speaker Biographies was promoted to Computer Crime Specialist. Dedication and overachievement is nothing out of the ordinary for CCS Newman; he’s been doing it since he was barely old enough to have a driver’s license. Wayne Nichols Detective Henderson Police Department I have been a Detective for over 2 years. I have over 350 hours in training in the area of Forensics (EnCase and FTK), undercover operations, P2P (Wyoming and TLO) and I specialize in proactive Craigslist investigations, which from 2009 to date, I have made 14 arrests. My cases are prosecuted both a state and federal level. Kelli O’Neill Special Agent California Department of Justice Kelli ONeill is a Special Agent with the California Department of Justice, Bureau of Medi-Cal Fraud and Elder Abuse. Kelli is currently assigned as lead agent of the Department of Justice, Computer Forensics Lab. She was a Sworn California Peace Office for 14 years. She designed and built DOJ, Medi-Cal Fraud Computer Forensics Lab (CFIT). Ellen Ohlenbush President McGruff SafeGuard Ms. Ohlenbush is President of McGruff SafeGuard. Partnering with the National Crime Prevention Council, McGruff monitors & controls kids’ online activity. A frequent speaker on Internet risks for families & the technologies available to protect them, she recognizes when our children are online, their neighborhood is global. This is a challenge for parents and law enforcement as they attempt to protect our children. McGruff developed a technology that provides children with a safer experience. Our mission is to give parents the ability to parent in this global neighborhood. While ensuring children have access to the benefits of the internet along with bringing the community together to build awareness & ensure that law enforcement & parents work together for the best experience. Scott Pancoast Cyber Crime Specialist National White Collar Crime Center PROTECTING OUR CHILDREN Mr. Pancoast, a graduate of Western Washington University, completed 16 years of government service that included 12 years as an investigator with the Washington State Office of the Attorney General. During his tenure with the Washington State office of the Attorney General, Mr. Pancoast worked in Criminal Justice Division, Economic Crimes Unit, in the Consumer Protection Division, and in the High Tech Unit. Prior to his work with the Washington State office of the Attorney General, Mr. Pancoast was a Tax Auditor with the Washington State Department of Labor and Industries and the Washington State Department of Revenue. Dave Peifer Lieutenant Delaware County District Attorney’s Office Detective Lieutenant David Peifer, Delaware County Criminal Investigation Division (CID) is a member and the supervisor of a Task Force (Operation Triad) which directs its efforts in the area of Internet Crimes Against Children (ICAC) and is comprised of federal, state, and local law enforcement. The task force is responsible for conducting undercover online investigations, responding to complaints regarding children sexually exploited via the Internet, conducting community education programs, and monitoring the Internet for the bartering in child pornography. Lieutenant Peifer has been a law enforcement officer for 29 years and the supervisor of the Delaware County District Attorney’s Criminal Investigation Division’s Child Abuse Unit for 10 years. John Penn Sr. Solutions Architect- Intelligence, Investigation & Law Enforcement Technologies Adobe Systems Inc John Penn II is Senior Solutions Architect for Intelligence, Investigation and Law Enforcement Technologies at Adobe Systems, in San Jose, California. He spent 11 years at Adobe as a Senior Computer Scientist working on Photoshop and is now focused on the development of tools, techniques and training for the intelligence and law enforcement community as well as for the National Center for Missing and Exploited Children. Mr. Penn has a history in the technology sector extending 30 years. He has been working to foster communication between law enforcement and industry. He hopes his efforts will build a better understanding of law enforcement challenges in industry, and bring a better 71 Speaker Biographies understanding of technology to the law enforcement and judicial system. Cheryl Penna Youth Education & Prevention Specialist Berkshire District Attorney Cheryl Penna has been employed at the Berkshire District Attorney’s Office for 18 years, first as a Victim Assistance Advocate and later as a Senior Advocate. She was appointed Child Sexual Assault Unit Program Coordinator, becoming a member of the Sexual Assault Intervention Network (SAIN). In 2005 Ms. Penna joined the Community Outreach & Education Program to train local K-12 school professionals on bullying, harassment and hate crimes as part of the Massachusetts Safe Schools Initiative. In 2007 she became a Youth Education & Prevention Specialist. Ms. Penna graduated from Westfield State College with a Bachelor of Science Degree in education and a minor in psychology. She has worked as a special education teacher, remedial education specialist, and in-school suspension supervisor. D. Matthew Powell Trooper First Class Pennsylvania State Police Trooper D. Matthew Powell became a member of the Pennsylvania State Police in 1996. He is currently assigned as a Computer Crime Investigator with the Pennsylvania State Police Bureau of Criminal Investigation. He is responsible for both the forensic analysis of computer systems and the investigation of computer related crimes. Trooper Powell currently holds certifications as CFCE, EnCE, ACE and A+. He is a member of the Pennsylvania State Police, Computer Crime Task Force and the Pennsylvania ICAC Task Force. He also provides instruction to all of the PSP Area Computer Crime Task Forces and has instructed numerous other law enforcement agencies as an instructor for the ICAC Task Force. Joseph Rampolla Lieutenant Park Ridge Police Department Joseph Rampolla has been a law enforcement officer for fifteen years. Joseph holds a Bachelor of Arts degree in Law & Society from Ramapo College of New Jersey. He became a police officer in 1995 and currently holds the rank of Lieutenant for the Park Ridge Police Department. He has supervised numerous criminal investigations within the department and oversees the Detective Bureau. In 2003 he was assigned to a regional computer crimes task force. He has successfully completed training offered by county, state and federal agencies as well as leading technology companies with a focus in the areas of computer forensics, Internet child exploitation, cyber-bullying, cyber counterterrorism, human trafficking, and Peer-to-Peer file sharing investigations. Lee Reiber CEO Mobile Forensics Inc Lee Reiber is CEO of Mobile Forensics Inc, the leading non vendor training company in the US specializing in mobile forensics. Mobile Forensics Inc recently became the mobile phone training company for AccessData and trains on cell phone forensics. Lee Reiber is a frequent writer for the Law Officer Magazine on cell phone forensics and has been featured in many newspapers from the New York Times to the Washington Post. Lee worked for the Boise Police Department for almost fifteen years where he conducted forensic exams of computers and mobile devices prior to leaving in late 2009. Some of Lee’s memberships include: The International Association of Computer Investigative Specialists, High Technology Crime Investigation Association and a Mobile Forensics Certified Examiner. Donna Rice Hughes President Enough Is Enough Donna Rice Hughes, President of Enough Is Enough (EIE), is an internationally known Internet safety expert, author, and speaker. Under her leadership and vision, EIE created the Internet Safety 101 program with the U.S. Department of Justice. She is also the executive producer, host, and instructor of the Internet Safety 101 DVD series. Donna has been a featured guest on leading national broadcasts including Dateline, The Today Show, The O’Reilly Factor, Oprah and 20/20, having given more than 3,500 media interviews. She has testified numerous times before the United States Congress and served on the 2008 COPA Commission, the 2006 Virginia AG’s Internet Safety Task Force and the 2008 Internet Safety Technical Task Force, formed by the U.S. Attorneys General. Andrew Rosen 72 2010 ICAC NATIONAL CONFERENCE Speaker Biographies CEO/CTO ASR Data Acquisition & Analysis, LLC As a Forensic Computer Scientist, Andrew Rosen offers unique litigation support services to the Legal, Law Enforcement and Investigative communities. With over twenty years of experience in the recovery of computer data and forensic examination (computer forensics), Rosen regularly provides expert testimony in federal and state courts. Along with training attorneys and law enforcement officials in computer investigation techniques, Rosen frequently speaks and writes on emerging matters in the field. In summary, Rosen has a worldwide reputation for developing cutting edge computer crime investigative tools and is frequently consulted by other professionals in the industry. Randy Schriefer SVICAC Commander San Jose Police Department Sergeant Randy Schriefer has been a police officer for 16 years. During his law enforcement career, Randy has worked a variety of assignments including patrol, field training officer, motor officer, motor officer instructor, family and workplace violence investigator, patrol sergeant, robbery investigator/sergeant and sexual assaults sergeant. Randy is currently the ICAC Commander for the Silicon Valley Internet Crimes Against Children Task Force. In addition to his role as the SVICAC Commander, Randy oversees the San Jose Police Departments Child Exploitation Detail and is an on-call sergeant for the departments sexual assault unit and tactical negotiations team. Randy is also responsible for organizing and hosting the annual Silicon Valley ICAC conference. Herb Scott Computer Crime Specialist National White Collar Crime Center Herb Scott joined the staff of the NW3C, on April 1, 2004, bringing with him over 34 years of law enforcement experience and over two years of computer forensic experience. Herb began his investigative career with the Army Security Agency, in 1963, branching out into assignments with other Intelligence agencies. He was trained as a linguist in the German and South Vietnamese languages. After five years in the Army, he worked as a Private Investigator until he joined the Jacksonville, Florida, Police Department/Sheriff’s PROTECTING OUR CHILDREN Office (JSO) in 1970. During his 26 ½ years with the JSO, Herb worked “Mod Squad” details, Patrol Division, Undercover Narcotics, Burglary, Robbery and Homicide. He was the recipient of numerous commendations and citations. Thomas Sirkel Associate Director of Training & Outreach National Center for Missing & Exploited Children Thomas G. Sirkel is currently employed by the National Center for Missing & Exploited Children as an Associate Director of Training & Outreach. He is responsible for the teaching & facilitating of the Protecting Children Online and Protecting Victims of Child Prostitution courses nationwide. He retired in October 2008 from the Los Angeles County Sheriff’s Department after more than 39 years of service. He retired as Operations & Training Lieutenant for the Special Victims Bureau where he supervised and managed six teams of Child/Sexual Abuse detectives. He also was the Program Manager for the Los Angeles County SAFE Team. Micah Smith Detective Linn County Sheriff’s Office Micah Smith is the Computer Crimes Detective for the Linn County Sheriff’s Office in Albany, Oregon, primarily investigating computer-facilitated child sex crimes, and undercover peer-to-peer file sharing investigations, as well as conducting computer forensics examinations for Linn County and neighboring agencies. Detective Smith’s forensic specialty has focused on the Mac operating system, as well as Windows forensics using EnCase. Smith is a recipient of the 2005 NCMEC Law Enforcement Award, serves as a faculty instructor for the National District Attorneys Association, is a frequent presenter at Internet safety conferences throughout the Northwest, and is in charge of the Sheriff’s Office Internet safety program TechSmartz tasked with keeping kids safer online. Sean Speakman Detective Polk County Sheriff’s Office Speakman began his career at the Sheriff’s Office in the IT Department and left after 6.5 years. He returned as a deputy and shortly after proceeded as a Computer Crimes Detective. He has worked in this capacity for over 3 years. Speakman is a forensic examiner and has extensive IT 73 Speaker Biographies experience including network administration, security and email administration and hardware repair. Gary Spurger Sergeant Harris County Constable, Precinct 4 Sgt. Gary Spurger has been in Law Enforcement for approximately 20 years and with the Harris County Constables Office, Precinct 4 for the past 17 years. During that time Sgt. Spurger has been in the patrol division as a K9 Handler, Crime Scene Photographer, Videographer, Traffic Unit, Certified Field Training Officer and is certified by the Texas Commission on Law Enforcement Officers Standards and Education as an Instructor and Firearms Range Master. Sgt. Spurger holds a Master Peace Officers License and is on the TCLEOSE appointed board to create a certification process for CyberCrimes Investigators in the State of Texas. National Crime Squad Occupational Health and Welfare department where her responsibilities included supporting the health and wellbeing of specialist law enforcement officers both nationally and internationally. As a Research Fellow to Bramshill College, Jane has carried out several studies relating to psychological support for investigators. Joe Sullivan Principal Forensic Behavioural Analyst Behaviour Analysis Unit, CEOP Joe is the Principal Psychologist with the Child Exploitation and Online Protection Centre (CEOP) in the UK. CEOP is a national law enforcement agency which specialises in crimes against children. The Behaviour Analysis Unit (BAU) where Joe is based offers specialist advice and assistance to investigations into child sexual abuse and has been involved in a number of high profile investigations over the last eight years. Amy Staubs Program Manager OJJDP Amy Staubs works for the Office of Juvenile Justice and Delinquency Prevention’s (OJJDP) Child Protection Division, where she is responsible for managing the Internet Crimes Against Children (ICAC) Task Force Program, the Missing and Exploited Children Training and Technical Assistance Program and the Association of Missing and Exploited Children’s Organizations (AMECO). She also co-manages the Child Protection in Tribal Communities Program. Prior to joining OJJDP, Ms. Staubs has 14 years of experience working on federal grants related to program development and coordination and delivery of training and technical assistance. She has worked on national, state, local and tribal initiatives on issues including victim services, crime/substance abuse prevention, youth development, and adolescent health. Michael Sullivan Deputy Chief Illinois Attorney General’s Office Deputy Chief Sullivan is a thirty year veteran of law enforcement and holds a Bachelor’s Degree in Law Enforcement Administration. He is assigned to the Investigations Division for the Illinois Attorney General’s Office and the ICAC Task Force Commander. He is the author of Safety Monitor, which focuses on the use of computers to victimize children and the SAFEKIDS program in conjunction with the Microsoft Corporation. He has received numerous awards for his work including the Medal of Valor. Antonio Sutton Deputy Director of Court Services Norfolk Juvenile and Domestic Relations District Court Services Unit Jane Stevenson Occupational Health and Welfare Consultant Workplace Wellbeing Jane Stevenson, founder of Workplace Wellbeing, is a highly experienced nurse consultant. Jane is currently Welfare Consultant to several UK Government Agencies as well as to the Innocent Justice Foundation in the USA. She also leads on the Module in Occupational Health for Remote Medical Practitioners with the Royal College of Surgeons Faculty of Health. Jane spent seven years as Head of the 74 Buddy Tidwell Senior Instructor AccessData Buddy specializes in the investigation of computer related crimes and recovery and preparation of digital evidence. Buddy served as a Lab Manager and Senior Computer Forensic Examiner at the Joint Computer Forensics Lab for Law Enforcement in Middle Tennessee and as a criminal investigator for the District Attorney Generals Office where 2010 ICAC NATIONAL CONFERENCE Speaker Biographies he was the lead investigator in hundreds of CyberCrime incidents and complex felony investigations. Buddy regularly provides hands on training to law enforcement agencies and private sector examiners around the globe in the investigation of computer-related offenses. Jennifer Torpie Analyst Delaware County ICAC Task Force Jennifer G. Torpie has been an Analyst with the Delaware County Internet Crimes Against Children (ICAC) Task Force since September 2008. Analyst Torpie manages CyberTipline leads for the state of Pennsylvania and provides outreach to parents and students on Internet safety. She is also involved in proactive investigations involving commercially available child pornography. Prior to joining the ICAC, Torpie was employed at the National Center for Missing & Exploited Children (NCMEC) in both the Exploited Children Division and the Missing Children Division. At NCMEC, Torpie received extensive training in investigative methods regarding Internet-facilitated child sexual exploitation and child abductions. Eric Trest Special Agent Naval Criminal Investigative Service - DoD Representative to NCMEC Eric Trest has been a Special Agent with the Naval Criminal Investigative Service (NCIS) since 2005. He is currently assigned as the Department of Defense Representative to the National Center for Missing and Exploited Children (NCMEC). Prior to his appointment at NCMEC SA Trest was assigned to NCISHQ as the Child Exploitation Investigations and Operations Desk Officer. Formally, SA Trest was a member of the Family and Sexual Violence Unit (F&SVU), at Marine Corps Base, Camp Pendleton, CA, and a member of the San Diego Internet Crimes against Children (SDICAC) Task Force. Prior to NCIS SA Trest was an Analyst with the NCMEC, Exploited Child Unit and Police Officer for the City of Evanston, IL. Allison Turkel Senior Policy Advisor DOJ/Office of Sex Offender Sentencing Monitoring, Apprehending, Registering and Tracking (SMART) Allison Turkel serves as a senior policy advisor in the USDOJ SMART Office. Previously,she served as the Director of the PROTECTING OUR CHILDREN NDAA’s National Center for Prosecution of Child Abuse where she managed and supervised program activities and staff. She also provided training and technical assistance on child abuse, maltreatment, sexual exploitation, computer facilitated crimes against children and domestic violence. Prior to coming to NDAA, she was an Assistant State’s Attorney in McLean County, IL. Before that, she was an A.D.A. in the N. Y. County D.A.’s Office for 9 ½ years. She tried a wide variety of felony cases including narcotics, child physical and sexual abuse and homicides. Prior to becoming a prosecutor, she was a police officer for 8 years Richard VanBoxtel Chief Oneida Police Department Richard Van Boxtel is an enrolled member of the Oneida Tribe of Indians of Wisconsin and the Chief of Police for the Oneida Police Department in Oneida, Wisconsin. Rich began his law enforcement career at the Oneida Police Department in 1992 as a patrol officer. In 1995, he was promoted to Sergeant and has held other interim positions in the department as Lieutenant and Assistant Chief. Rich has an Associate Degree in Criminal Justice - Law Enforcement from Northeast Wisconsin Technical College, a Bachelors Degree in Public Services Administration from Silver Lake College, and a Masters Degree in Management and Organizational Behavior from Silver Lake College. Alex Vichinsky Law Enforcement Response Analyst Facebook Lauren Wagner High Tech Crime Training Specialist SEARCH Ms. Lauren Wagner is a High Tech Crime Training Specialist in the Training Services Department of SEARCH where she performs tasks related to training local, state and federal agencies on computer technology issues with criminal justice applications. She provides technical assistance to law enforcement agencies in active cases, prepares training materials, teaches SEARCH investigative courses and speaks at conferences throughout the U.S. Ms. Wagner is an ICIcertified instructor and received a 2009 “Excellence in Training” award from California POST. 75 Speaker Biographies Kevin West Detective Cary Police Department Kevin West is the former head of the NC ICAC (retired in January 2009) and now works for Cary Police Department in an undercover on-line capacity in Internet Crimes Against Children. He has a four year degree in criminal justice from Brigham Young University. Kevin has a 31 year background in Law Enforcement with a large emphasis on Crimes Against Children and Internet Crimes Against Children. He has worked all walks of law enforcement investigations and management in the law enforcement sector. He is a graduate of the FBI National Academy and has taught Internet Crimes Against Children classes all over the United States and also Internationally. Tim West Commander Montana ICAC Task Force Tim West started his law enforcement career as a Patrol Officer in 1984 with the El Paso, Texas Police Department. In 1987 he was hired by the Portsmouth, NH Police Department as a Patrol Officer. In 1991 Mr. West became a Detective and was assigned to the Juvenile Division. As a Juvenile Detective, Mr. West was involved in the investigation of juvenile delinquent cases as well as the prosecutor for the Juvenile Division. He spent nine years as the department’s lead investigator of child sexual and physical abuse cases. During the course of his nine years, Mr. West was responsible for interviewing hundreds of children who were the victims of abuse, along with interviewing the suspects who were involved. Donald Whitehead Lieutenant Kokomo Police Department I am a 25 year veteran of the Kokomo Police Department, currently assigned as a Lieutenant in the Computer Forensics Lab. I have been a member of the Indiana ICAC for approximately 7 years and have participated in hundreds of cases involving the victimization of children. department of SEARCH, The National Consortium for Justice Information and Statistics, where he coordinates and provides training on high-tech crime investigations and forensics to local, state and federal justice and public safety agencies. Timothy A. Williams Director INTERPOL WASHINGTON Timothy A. Williams commenced his appointment in October 2009 as the Director of INTERPOL Washington (U.S. National Central Bureau), a subcomponent of the U.S. Department of Justice. As the Director of INTERPOL Washington, Mr. Williams acts on behalf of the Attorney General as the official representative to the International Criminal Police Organization located in Lyon, France. He also directs all operations, policies and procedures related to INTERPOL Washington. Matthew Williams Computer Crime Specialist National White Collar Crime Center Mr. Williams graduated from West Virginia University with a Bachelor of Science degree in Computer Science and a graduate certificate in Computer Forensics. He has also received CompTIA’s A+ and Security+ certifications and will complete his Master’s degree in 2010. Matt has been with NW3C for two years. He has assisted in the development of basic and advanced computer forensics courses ranging from incident response and operating systems to network intrusion and mobile device forensics. He has also done extensive research on the topics of information security management, cell phone networks, computer security, and cyber law. He is currently instructing NW3C courses to local, state, and federal law enforcement agencies throughout the country. Thad Winkelman Corporal Shawnee County Sheriff’s Department Janis Wolak James Williams High Tech Crime Training Specialist SEARCH Mr. Williams is a High-Tech Crime Training Project Instructor in the High-Tech Crime Training Services 76 Senior Researcher Crimes against Children Research Center, UNH Janis Wolak, J.D., is a Senior Researcher at the Crimes against Children Research Center, University of New Hampshire. She has directed US national studies about youth Internet 2010 ICAC NATIONAL CONFERENCE Speaker Biographies use and Internet safety, including national surveys of law enforcement agencies about crimes related to the Internet, funded by the US Department of Justice, OJJDP. She is the author and co-author of numerous reports, book chapters, and peer-reviewed articles about youth victimization, youth Internet use, online predation, child pornography and other Internet-related sex crimes, written with colleagues David Finkelhor and Kimberly Mitchell, CCRC. She has provided training and served on expert panels nationally and globally in the field of Internet safety. Justin Wykes Computer Crime Specialist National White Collar Crime Center Mr. Wykes joined the National White Collar Crime Center in December 2006 as a Computer Crime Specialist. He is currently responsible for the development and updating of the “Basic Cell Phone Investigations” and “Fast Cyberforensic Triage” courses, and is an instructor for the ISEE, STOP, BDRA, NTFS, NTOS, and BOTS courses. Mr. Wykes was also the NW3C team-lead on the validation and update Microsoft’s COFEE tool, version 1.1.2. He has ten years experience building, fixing and repairing computers, and earned his A+ certification in September of 2006. After earning a Bachelor of Science degree from Grand Valley State University in Criminal Justice, with an emphasis in Law Enforcement, Mr. Wykes spent five years as a Special Agent for US Army Counterintelligence. D. Todd Zerfoss Senior Special Agent/National Program Manager Department of Homeland Security Immigration and Customs Enforcement Cyber Crimes Center. I have been employed as a Special Agent for United States Immigration and Customs Enforcement since the agency’s creation in March 2003. Prior to that time, I was employed as a Special Agent for the United States Customs Service from September 2000 through March 2003. Prior to becoming a Special Agent with the United States Customs Service, I was employed by the United States Immigration and Naturalization Service for approximately five years. As a Senior Special Agent for ICE, my primary duty was investigating and prosecuting child exploitation cases. In December of 2009 I was promoted and transferred from the Resident Agent in Charge/Fort Myers, FL office to ICE Head Quarters Cyber Crimes Center in Fairfax, VA where I am a National Program Manager for the Child Exploitation Section. PROTECTING OUR CHILDREN 77 78 2010 ICAC NATIONAL CONFERENCE Exhibitors In partnership with the National Center for Missing & Exploited Children (NCMEC), the ICAC Task Forces have received and processed more than 55,000 CyberTipline reports. Exhibitors Adobe For 25 years, Adobe Systems has been a trusted partner to government organizations around the globe. With consistency, government organizations look to Adobe to help better create, edit, visualize and share information with practically everyone in the world. In the quest to become open and transparent, government organizations use Adobe solutions to more efficiently and effectively interact with citizens, employees and other constituents. Whether faced with publishing official government documents, providing citizens with a forum to participate in policy review, or reducing the complexity of enrolling for benefits, agencies turn to Adobe for trusted solutions to a wide variety of people-centric, government challenges. Access Data AccessData has pioneered digital investigations for more than twenty years, providing the technology and training that empower law enforcement, government agencies and corporations to perform thorough computer investigations of any kind with speed and efficiency. AMECO Founded in 1994, AMECO is an association of missing and exploited children’s organizations in the U.S. and Canada; AMECO’s mission is to build and nurture an international association of credible, ethical, and effective nonprofit organizations that serve missing and exploited children, their families and law enforcement. BackBone Security The SARC is a Center of Excellence in digital steganography research and development within Backbone Security. The SARC has established the world’s largest commercially available repository of digital steganography applications, fingerprints, and signatures and has developed industry leading computer forensics and network security steganalysis tools for detecting and extracting information hidden with digital steganography applications. units deployed and hundreds of thousands of end users. Our products have been deployed reliably and effectively throughout the world, and used for both commercial data synchronization and forensic data analysis.. Computer Cop Software Corp Today the number one concern of parents is: “What are my children doing on the computer?” This tool enables parents to review what their children have been doing online. It does not block access to sites, but rather reviews what sites children have gone to on the web. Digital Certainty Digital Certainty draws upon advanced defense research to create cyber security and forensics products for law enforcement and commercial security users. Digital Certainty’s flagship product, Wi-Fi Investigator, is now in the hands of defense and law enforcement customers. Fernico Fernico’s ZRT Video Mobile Phone Examination System is the leading method to manually extract evidential data and report this information from any mobile device. Fernico’s FAR, is the premier automated forensic Blu-Ray system for archiving evidential data and acquiring large quantities of seized discs. Forensic Computers, Inc. Forensic Computers, Inc is owned and managed by retired Air Force Office of Special Investigations Computer Crime Investigators. We focus on providing high quality forensic workstations, forensic related equipment, and software to the computer forensic community. Forensic Computers has provided equipment and training to a number if ICAC task force units. HTCI Forensic categorization solutions for Law Enforcement. As a global leader in the field of Computer Crime Investigation and Computer Forensics, HTCI is uniquely qualified to provide expert instruction, proactive security management and computer forensic platforms to both the private and public sectors. Cellebrite USA Immigration and Customs Enforcement BlueBear LES Established in 1999, CelleBrite is the leader in cellular phone synchronization technologies, with over 70,000 PROTECTING OUR CHILDREN Formed in 2003 as part of the federal government’s response to the 9/11 attacks, ICE’s mission is to protect the security of 79 Exhibitors the American people and homeland by vigilantly enforcing the nation’s immigration and customs laws. ICE combines innovative investigative techniques, new technological resources and a high level of professionalism to provide a wide range of resources to the public and to our federal, state and local law enforcement partners. InfinaDyne We specialize in computer forensics. CD/DVD Inspector is used throughout the world by law enforcement agencies, forensics investigators, and government agencies to analyze and extract CD and DVD media. Innovative Business Products Innovative Business Products (IBP) is a Minneapolisheadquartered company that delivers recording media products and offers related duplication equipment and publishing systems – specifically for the digital forensics and law enforcement markets - through a high-touch, customer service-friendly experience. ICAC Training & Technical Assistance Program The ICAC Training & Technical Assistance Program offers regional, specialized and technical assistance training to federal, state and local prosecutors, probation and parole officers and law enforcement investigators at locations throughout the country so that participants can take advantage of the valuable information conveyed during our Programs in the most cost-effective manner possible. email or cell phone to potentially dangerous behavior. The National District Attorneys Association The National District Attorneys Association is the oldest and largest professional organization representing criminal prosecutors in the world. Its members come from the offices of district attorneys, state’s attorneys, attorneys general, and county and city prosecutors with responsibility for prosecuting criminal violations in every state and territory of the United States. National Law Center for Children and Families The National Law Center for Children and Families (NLC) is a non-profit law center formed in 1991 which has since served as an agent of change and education in the areas of child sexual exploitation. National White Collar Crime Center (NW3C) The mission of the NW3C is to provide training, investigative support and research to agencies and entities involved in the prevention, investigation and prosecution of economic and high-tech crime. NetSmartz National Center for Missing & Exploited Children, has been a leader in the Internet safety education field since 2001. NetSmartz offers free, interactive, educational safety resources to help teach children ages 5-17 how to be safer online and in the real world. Intelligent Computer Solutions Office of Juvenile Justice & Delinquency Prevention Intelligent Computer Solutions (ICS) the technology leader in high speed hard drive duplication has applied its technology (based on its US patent 6,131,141) to the development of the most advanced tools in Computer Forensic. ICS Data acquisition tools have become the known standard within Law Enforcement Agencies World Wide and are being used wherever data acquisition and analysis takes place. OJJDP provides national leadership, coordination, and resources to prevent and respond to juvenile delinquency and victimization. McGruff SafeGuard McGruff SafeGuard is a free subscription service that intelligently monitors, filters and controls children’s online activity, including: e-mail, chat, instant messaging, Web site visits, MySpace, Google, Facebook, AOL, MSN & Yahoo. Once installed, SafeGuard automatically alerts parents by 80 Paraben Paraben Corporation was founded in 1999 and quickly established itself as a leader in specialized digital forensic software with its release of PDA Seizure in early 2002. Paraben then released Cell Seizure, the first commercial tool for performing cell phone forensics 2010 ICAC NATIONAL CONFERENCE Exhibitors Pen-Link Strategic Access Technologies In business for over 20 years, Pen-Link, Ltd. provides Law Enforcement and Intelligence agencies with state-of-the-art software and systems for the collection, storage, and analysis of telephonic- and IP-based communications. Strategic Access Technologies has emerged as industry leaders specializing in tailored, comprehensive solutions to meet local and state law-enforcement agencies need for exploitation, computer forensic and cyber security requirements. SAT’s National-level experience tethered with state-of-the-art assets allows our staff to quickly and efficiently react to customer needs worldwide. SAT is an affiliate of NEK Advanced Securities Group, Inc. (NEK), a leading global provider of security, training and technical services to commercial, defense, and government sectors, and a member of the NEK Group of Companies. Rimage Rimage Corporation (Nasdaq NMS: RIMG) is the world’s leading provider of integrated CD-R/DVD-R (recordable) publishing systems, required for producing discs with customized digital content on an on-demand basis. SEARCH SEARCH, The National Consortium for Justice Information and Statistics, is a nonprofit membership organization created by and for the states. Since 1969, SEARCH’s primary objective has been to identify and help solve the information management problems of state and local justice agencies confronted with the need to exchange information with other local agencies, state agencies, agencies in other states, or with the federal government. Social Shield We specialize in internet monitoring tools for parents, specifically within social networks to understand where kids are active online, who they are speaking with and friends with, and what they are saying. SpectorSoft SpectorSoft is the recognized leader and pioneer in the PC and Internet monitoring software market. More than 500,000 parents and 50,000 businesses, government organizations, schools, and law enforcement agencies have purchased SpectorSoft products to help keep kids safe online, and to prevent Internet abuse, data loss, and compliance violations in the workplace. SR Technologies SR Technologies supports federal, state and local law enforcement with purpose-built suite of tools for 802.11 access point and station discovery, surveillance, interception and targeting. PROTECTING OUR CHILDREN Technology Pathways Technology PathwaysTM makes the ProDiscover® family of computer forensic software. ProDiscover includes solutions for computer investigations, incident response, security auditing, and electronic discovery. The Innocent Justice Foundation The Innocent Justice Foundation is a non-profit organization whose mission is to provide support to Internet Crimes Against Children (ICAC)task forces in the area of child pornography investigations. Tracker Products At Tracker Products, we design browser-based bar code tracking software that intuitively adapts to the specific needs of each of our customers. Law enforcement agencies from Maine to California, The United States Armed Forces, Institutions of higher learning, e-discovery units and countless other industries have found Tracker Products’ infinitely customizable tracking environment to be an indispensable tool in their quest for accurate chain-ofcustody and asset management. USDOJ - COPS COPS provides community policing resources for law enforcement. Participants can get our problem solving guides that address topics affecting all communities. The U.S. Marshals Service The U.S. Marshals Service was tasked with important new responsibilities in 2006 under the Adam Walsh Child 81 Exhibitors Protection and Safety Act. This legislation designated the U.S. Marshals as the lead federal agency tasked with locating fugitive sex offenders who fail to register or do not comply with their state’s registry requirements. Vere Software Vere Software was founded to build tools upon concepts that already exist for, and are commonly accepted about, online evidence collection and preservation. Web Wise Kids Web Wise Kids is a unique organization that offers fun, challenging and interactive simulations based on real-life criminal cases—MISSING, Mirror Image, Airdogs and It’s Your Call. Whats What? www.whatswhat.me is a social networking website designed for tweens. The mission of the site is to help educate children on how to behave safely on the Internet and in particular, on social networking sites so that they are prepared for sites such as Facebook. 82 2010 ICAC NATIONAL CONFERENCE Acknowledgements From 2005 to 2009, the number of complaints reviewed by the ICAC Task Forces, related to the prostitution of children and the commercial sexual exploitation of children, has increased by more than 746%. Acknowledgements THANKS TO OUR PARTNERS The U.S. Department of Justice’s Office of Justice Programs would like to thank the following organizations and offices for their ongoing efforts to support the ICAC Task Force Program in protecting children from sexual exploitation. Our partners include: The Internet Crimes Against Children Task Forces National Center for Missing & Exploited Children U.S. Department of Justice Criminal Division Federal Bureau of Investigation Office of the Attorney General Office of the Deputy Attorney General Office of Juvenile Justice and Delinquency Prevention Offices of the U.S. Attorneys U.S. Marshals Service U.S. Immigration and Customs Enforcement U.S. Postal Inspection Service U.S. Secret Service Naval Criminal Investigative Service U.S. Army Criminal Investigative Command U.S. Air Force Office of Special Investigations PROTECTING OUR CHILDREN 83 Acknowledgements SPECIAL THANKS TO THE ICAC TASK FORCE TRAINING PROVIDERS The U.S. Department of Justice’s Office of Justice Programs would also like to extend special thanks to the ICAC training providers who have worked together to develop and deliver training most pertinent to the mission of the ICAC Task Force Program and this year’s conference curriculum. Our training providers include: Fox Valley Technical College Internet Crimes Against Children Training & Technical Assistance Program Girls Education and Mentoring Services National Center for Justice and the Rule of Law, The University of Mississippi School of Law National District Attorneys Association National White Collar Crime Center SEARCH, Inc. The Innocent Justice Foundation Computer Lab Donors The conference organizers send a sincere thanks to the organizations and agencies who donated their computer labs to the conference. Your donations contributed to the success of the lab sessions. We acknowledge and thank the following for their donations: Florida Department of Law Enforcement FVTC’s ICAC Training & Technical Assistance Program National Center for Missing & Exploited Children SEARCH, Inc. South Carolina Attorney General’s Office 84 2010 ICAC NATIONAL CONFERENCE Thank you to everyone who helped make this conference a success! Together, we will Protect our Children . . . Making the Internet a Safer Place This project is supported by Grant # 2009-MC-CX-K055 awarded by the OJJDP, OJP, US DOJ. Points of view or opinions in this document are those of the author and do not necessarily represent the official position or policies of the US DOJ.