We are pleased to be offering 2 days of pre-conference workshops to be held on Monday & Tuesday, October 4th & 5th. These workshops are designed to enhance your learning opportunities with full day curriculum in a variety of topics. Both free & tuition based curriculum will be available.
Doors to our main event (FREE!) will open on Wednesday, October 6th at 7:00 am and conclude on Friday at 12:30 pm. During this time we will be offering multiple, simultaneous training sessions in our 14 classrooms where you're sure to find relevant content to aid in your professional development and help navigate your investigations, examinations, prosecutions and supervision of ICAC, Human Trafficking, VICE and other digital crimes offenders.
Final Agenda details will be published in late September.
PRE-CONFERENCE WORKSHOPS (DRAFT)
This is a draft list and is not all-inclusive. Subject to change.
PAUL JABAAY (COINBASE)
Presentation details pending on the topic of virtual currencies.
JOE LARRAMIE (NCJTC)
Prevention programs for ICAC.
WAYNE NICHOLS (NCJTC)
Innovative Approaches in ICAC Investigations.
JOHN PIZZURO (NCJTC)
STACY CECCHET (FORENSIC & OPERATIONAL PSYCHOLOGIST)
Dr. Cecchet will be leading an MDT presentation along with an investigator, prosecutor and ICAC supervisor. Content will include a discussion on integrating a forensic psychologist into your task force, a case study presentation, interview strategies and wellness & resiliency.
JEFF RICH/WAYNE NICHOLS (NCJTC)
ICAC preview tool.
BRAD BEELER (USSS)
Charming Chester – Selling Jail to Child Sex Offenders
This presentation will illustrate some of the shortcomings of traditional interview and interrogation training. Drawing upon sales and behavioral modification techniques utilized by corporate America, we will illustrate methods that the interrogator can utilize to increase the amount of information elicited in an investigative interview.
Discuss techniques that an interviewer can utilize in order to obtain information from social media and outside sources to become the “mythical” person with whom the examinee wants to interact.
Understand impression management techniques that effect the way we “imprint” upon the subject. Explore methods to “prime” this initial interaction in order to improve your first impression.
Illustrate how to decrease levels of anxiety in an interview setting that interfere with the ability to exchange information.
Discuss how to effectively develop and leverage rapport in an interview setting. Case studies will focus on real world examples of how rapport is established, maintained, and leveraged to obtain a positive outcome.
Explore elicitation techniques that will increase the amount of truthful information provided during child exploitation investigations.
Examine case studies involving child pornography and sexual assault. These cases serve as the subject of an open forum in which the group discusses the advantages and disadvantages of elicitation approaches utilized by the interviewers.
Presentation details pending on the topic of wellness & resiliency.
LAUREN WAGNER (SEARCH)
OSINT for ICAC - This comprehensive one-day hands-on lab will go over many aspects of open-source intelligence gathering and give specific examples of how these can be relevant to Internet Crimes Against Children Investigations. Working in ICAC, it is critical to know how to search for, locate, save, and replicate online information relating to an investigation. Topics will include resources for general online research (including phone number, address, and email lookups), using Google Boolean operators to construct specific online searches over multiple keywords and search points, and searching for and saving data from various social media platforms. Because online data can quickly appear and vanish, you need to continuously document your findings and this class will show you the latest tools, tips, and techniques that will help keep your investigation moving forward. Additionally, this class can also show how to creatively take a forensic report and build linkages to other open source intelligence gathering – for example, finding an Instagram ID in a Cellebrite report and using that to backwards connect to the full Instagram profile and related information.
JOHN TRENARY (SEARCH)
Expanding Your Toolbox: Open-source Forensics Solutions - This one-day hands-on lab will focus on expanding the Windows forensics toolbox with no-cost tools and creative solutions beyond the traditional paid forensics suites. Windows forensics artifacts will be explored and parsed with free tools you can immediately add to your forensic arsenal to benefit both new and experienced examiners. Jump lists, volume shadow copies, event logs, and shellbags are just a few of the artifacts with which attendees will gain familiarity and for which resources will be provided.
Presentation details pending.
CyberTip Investigations computer lab.
JUSTIN FITZSIMMONS (NW3C)
Details pending for legal presentations.
Computer lab details for investigators pending.
Computer lab details for forensic examiners pending.