When

Thursday, May 16, 2019 at 8:00 AM CDT
-to-
Friday, May 17, 2019 at 5:00 PM CDT

Add to Calendar 

Where

Holiday Inn Express & Suites 
300 Holiday Frontage Road
North Platte, NE 69101
 

 
Driving Directions 

Contact

Amber McNutt 
Bridge of Hope Child Advocacy Center 
308-534-4064 
amber@bridgeofhopecac.org 
 

Child Exploitation Investigations and Prosecutions: Protecting Children in a Digital Age 

Join us for this FREE 2-day training with national trainer Justin Fitzsimmons. Registration closes on May 8, 2019 so register now. 

12 CLE hours approved

Training Sessions

Child Exploitation Investigations: The Search for Corroboration in Both Physical and Sexual Abuse of Children

Supporting a child's disclosure through corroborative evidence is essential in child abuse investigations and prosecutions.  This presentation covers the potential areas to discover corroborative evidence, and explains the importance of technology-based corroboration.  The audience is shown detailed examples of how statements made during the disclosure leads to corroborative evidence.

Children and Technology: Where Are They Going and What Are They Doing?

New technological advances are added to the consumer marketplace at a constant and rapid pace.  Understanding where children are going on the internet and how offenders are using the newest technology to groom and exploit children is imperative to any agency handling the investigation or prosecution of child sexual exploitation.  This presentation covers some of the newest technology, as well as the different Apps, and social networking sites that children are using

Protecting Children in a Digital World

This presentation explores how technology use has saturated children's lives and creates potential pitfalls for them - pitfalls that were not present as recently as 5 to 10 years ago.  It discusses the roles of emerging technologies as they relate to children, devices, and social networking sites, and demonstrates different methods to protect adolescents online.

Adolescent Development and Compliant Victims Dynamics in Tech Based World and the Use of Tech to Groom/Manipulate Children

Technological exploitation cases often involved a compliant victim.  Understanding the complicated adolescent mind and compliant victim dynamics are imperative to a thorough investigation and successful prosecution.  This presentation describes characteristics commonly seen in adolescent victims and provides suggestions for working with compliant victims. 

Bullying and Cyberbullying, Sexting and Sextortion: The Perils of Youth Technology Usage

This presentation describes the different characteristics of traditional bullying versus bulling that is facilitated by technology.  It also explores the roles of sexting, sexploitation and sextortion in cyberbullying.  The presentation also examines current trends, studies and case law on cyberbullying.

The Courtroom: Making Yourself a Strong Witness, CV's, Witness Prep, Surviving Cross-Examination; Tips on the Stand: Motions In Limine; Voir Dire, Opening and Closing Arguments

This presentation covers courtroom experience from A-Z, but starting at the pre-trial stage of a case and working the various trial stages.  Examples of potential motions in limine to help create a more child friendly courtroom, as well as, education the court on child specific issues will be explained.  Conducting effective voir dire that is case specific for child exploitation will be examined and discussed.  The role of witnesses in court and how to adequately prepare for direct and cross-examinations will be explored.  The target audience for this presentation includes any law enforcement personnel, civilian witnesses, or parole or probation officers involved in a criminal proceeding.  Attendees learn about the difference between direct and cross-examination.  The presentation outlines some of the common witness pitfalls to avoid during direct examination and describes strategies that defense attorneys employ during cross-examination.

MDT Safety in a Tech World: What Digital Breadcrumbs Are You Broadcasting?

Nothing is more important than MDT member safety, whether on the street or on the computer. Participants learn how they leave traces of themselves when visiting websites, what information can be traced, and how to ensure that they are not compromising their safety or their investigations by broadcasting this information.  This lecture covers website date, IP tracing, cell phone considerations, Bluetooth snarfing, and home wireless networks.  Most importantly, this session will show students how to search social media and find the traces of themselves that can be found online by suspects, defense experts, and the media. The audience sees examples pulled from various media sites that could cause ethical issues and to highlight common pitfalls of social media use by professionals.  Hypotheticals are given to encourage audience participation and interaction in determining wheher social media use crosses an ethical boundary. Privacy issues are also addressed.