2019 Conference

10-14 June 2019

2019 Conference

Specific Training for a Specific Application
10-14 June 2019

Over the last few years, I have volunteered to help numerous agencies across the country with the investigation and prosecution of cyber-related crimes. I was exposed to different facts and the skills of countless people and soon began to identify successful concepts, which led to the development of the Mobile Device Foundation Course. The course establishes a base knowledge for working with reports derived from target identifiers from both legal and OSINT (open source intelligence) sources and introduces the concept of flow where new identifiers are continuously fed back into the system.


The application of these concepts led to the recovery of several missing and exploited children and also to the identification and arrest of several child sexual predators. Speaking at national conferences exposed me to nationally recognized experts in various fields who have since become friends and mentors. These experts have freely offered their time, resources, and expertise to advise or collaborate on important cases regardless of jurisdiction and without asking for credit. This group has since become known as the National Child Protection Task Force.


The National Child Protection Task Force has agreed to volunteer their time the week of June 10 – 14, 2019 to provide essential training in areas such as how to identify and legally request the proper records, how to map and analyze records, how to conduct location-based investigations with no suspects, how to track cryptocurrency, and how to use OSINT.


The conference is open to law enforcement and prosecution with the hope that there will be people from each state who would be willing to work together as a multi-jurisdictional team to help other agencies when needed. These state teams would eventually form an interconnected web across the country where, instead of losing experience, it would be reinvested and shared with others. We have found that the most effective teams include:


1. A prosecuting attorney/DA for operational and legal strategies;

2. Investigator/analyst focused on CDR/3rd Party/legal returns;

3. Investigator/analyst focused on Open Source Intelligence (OSINT).


There will be a nominal fee of $200 per person for the 5-day course, which will include breakfast and lunch, to help cover some of the expenses.


Please let me know if you have any questions.


Thank you,

Kevin Metcalf


About the National Child    Protection Task Force

What is the NCPTF?

Human trafficking and child exploitation cannot be stopped in isolation, it’s going to take a crowd sourced effort to identify these predators, locate their lairs, and take the fight to them. The National Child Protection Task Force is a collaborative effort between law enforcement, private organizations, nonprofit foundations, service providers, and highly-skilled individuals. We all work very well separately with isolated effort but that can only get us so far; it’s time we set aside ego and jurisdiction to come together to attack this problem.


This conference will not focus on device-stored forensics but on the data we may find even in the absence of a device – that data can provide powerful insight but is the obvious weak point in most investigations. I have assembled the top people in the most important fields to provide training in legal strategy, the mapping and analysis of location data, OSINT, crypto currency basics, and dark web basics – you will not find a better or more motivated group anywhere.


I invite everyone with a passion for taking on sexual predators to set aside ego, jurisdiction, and biases for a week and come together in Northwest Arkansas to become part of the National Child Protection Task Force – it’s going to take all of us working together to make this happen.

NCPTF was founded by Kevin Metcalf.  Kevin served as a law enforcement officer from 1989 to 2011 when he obtained his law degree from the University of Arkansas School of Law and now serves as a deputy prosecuting attorney. His experience includes patrol, investigations, Border Patrol (San Diego), and the Federal Air Marshal Service (DFW).

Kevin’s interest in the criminal use of computers and cellphones led him to training provided by the National Computer Forensics Institute (NCFI), the FBI CAST (Cellular Analysis Survey Team) Unit, the National White Collar Crime Center (NW3C), and others. After prosecuting several technology-focused jury trials, he developed a system for working with technology-related data in criminal cases that developed into a mobile device foundational course for prosecutors and investigators and a series of cellphone investigation books available on Amazon.

His work in the recovery of missing teens and the identification and apprehension of sexual predators connected him with a network of some of the top people in fields such as mapping and analysis, OSINT, legal strategy, and intelligence specialties. This network has come to be known as the National Child Protection Task Force and is available 24-hours a day for any agency that needs assistance.



Proud to bring inspirational speakers from across the globe

Kevin Branzetti


Kevin Branzetti is the Deputy Director of Intelligence at the Manhattan District Attorney’s Office assigned to oversee terrorism and cyber-crime related investigations. He retired from the NYPD in 2015 after 22 years of service and has been involved with criminal, financial and terrorism investigations, cyber intelligence, human intelligence, source development, and intelligence collection, analysis and dissemination.  During the last 12 years of his career at the NYPD, he worked in the Intelligence Bureau supervising terrorism investigations and counterterrorism programs. The final six years in Intel he was the commanding officer of the Cyber Intelligence Unit. During this time he created the Cyber Intelligence Unit’s terrorist targeting program, developed and implemented rules and guidelines for cyber investigations and cyber undercover officers to ensure legal compliance and efficient use of Unit resources, briefed law enforcement agencies from around the world on cyber investigation techniques, briefed private sector entities on foreign terrorist organizations’ (FTOs) use of the internet, created  a training course on using the web to investigate a target of investigation, and was the NYPD Liaison to social media corporations. 


Glenn Devitt


Glenn Devitt is a veteran with 11 years of experience in the United States Army with a background in Human Intelligence (HUMINT) and Counterintelligence (CI). During his military career he was deployed to both Iraq and Afghanistan and was assigned to multiple Joint Task Forces. He has also had the privilege of being an instructor at the Operator Advance Course (OAC), Source Operations Course, Special Operation Forces Physical Surveillance Course, and the Program Manager for the Cyber Operator Greyhat Course. After his military career he joined the H.E.R.O. (Human Exploitation Rescue Operative) Program. This program is designed to allow special operations veterans the chance to become accredited Homeland Security Investigations Computer Forensic Analysts to help combat child exploitation and human trafficking. Glenn then left to start his own company, Delitor Inc., and has spent the last few years supporting governments around the world in targeting human trafficking networks through undercover operations and training agents on how to conduct cyber enabled operations.  


See the following link for more information about his training:  https://www.blackhat.com/us18/training/schedule/index.html#osint-techniques-and-methodology-9841  


Glenn founded Foundation Sentinel “to end underage children being exploited around the world” by focusing “on targeting elusive child traffickers that use highly skilled methods to find and exploit their victims.” Read about a recent example from the news at the following link:  http://www.bbc.com/news/world-asia-43469043


Sy Ray


Sy Ray is the founder of ZetX Corporation and lead RF Engineer for 10-2 Technologies. Sy’s entrepreneurial career with ZetX began after serving 20 years in law enforcement where he spent time as a SWAT operator, homicide Sergeant, and directing fugitive missions. Some of his work has been featured on several episodes of 48 Hours, 20/20, The Discovery Channel and Dateline showcasing his investigative and technological expertise. Sy spent time in Afghanistan as a field advisor for an undercover team targeting improvised explosive device (IED) cells.


Sy established ZetX in 2014 as a one-stop shop for law enforcement as it pertains to cellular geo-location mapping, analysis and training. The software he designed currently leads the industry in geo-location mapping of RF data. While devoting his career to bringing advanced training and investigative technology to law enforcement, Sy is a subject matter expert in the field of geo-location mapping and identifying target sets.


Sy’s geo-location expertise in the field of radio frequency (RF) has advanced into RF Engineering of detection devices with 10-2 Technologies during the past two years. His accomplishments include engineering RF drone detection sensors used by the NFL at the 2015 Super Bowl, and engineering RF tracking and security technology for law enforcement and military applications. 

Robert Liscouski


Mr. Liscouski was appointed by President George W. Bush as the first Assistant Secretary for Infrastructure Protection when the U.S. Department of Homeland Security was founded in 2003. During his tenure as Assistant Secretary for Infrastructure Protection, Mr. Liscouski was responsible for the design, development, implementation and oversight of the Office of Infrastructure, including:

• The National Cyber Security Division – The nation’s first coordinated civilian effort to work coordinate the US Government and private sector cyber security efforts.

• Expansion of the Information Sharing Analysis Centers (ISACs) and the Creation the National Infrastructure Coordination Center a Public-Private Partnership to protect critical infrastructure.

• The design, development and implementation of the National Infrastructure Protection Plan (NIPP) and the development of DHS’ Risk Management Framework for Infrastructure Protection

• Chemical Security Legislation – The Chemical Facility Anti-Terrorism Standards (CFATS)

• Committee of Foreign Investment in the US (CFIUS) Matters


Mr. Liscouski served as President and Director of Implant Sciences Corporation, a leading manufacturer of Explosive Trace Detection equipment and was Director of Information Assurance at the Coca-Cola Company and Vice President of the Law Enforcement Division of Orion Scientific Systems, a developer of advanced analytic software tools. Earlier in his career, he served as a Diplomatic Security Service Special Agent with the U.S. Department of State and a Homicide and Undercover Investigator for the Bergen County (New Jersey) Prosecutors Office.


Mr. Liscouski is also currently a visiting fellow at the Center for Strategic and International Studies as Washington DC based think tank and served as a board member of the Intelligence Science Board supporting the Director of the Central Intelligence Agency and the Director of National Intelligence. Mr. Liscouski is a frequent contributor to CNBC, CNN, Fox News, and other business and security media on Homeland Security and Cyber Security issues. 

Kathryn Gamble  


Kathryn Gamble is a Special Agent with Homeland Security Investigations (HSI) assigned to the Cyber/Child Exploitation Unit in Buffalo, NY.  SA Gamble has been conducting online child exploitation investigations since June 2011.  SA Gamble dedicates the majority of her investigative efforts towards online undercover cases where she is able to engage and identify targets worldwide.  SA Gamble conducts these investigations across a multitude of social media platforms and utilizes a variety of techniques in the identification process.   

Ethan Dietrich


Mr. Dietrich is the CEO and founder of SixGen, Inc. He conducts the day-to-day business operations and oversees all technical operations capabilities for SIXGEN, Inc. He administers corporate agreements with partners and customers and maintains a leadership presence in both industry and legislative boards responsible for the advancement of cybersecurity initiatives. He provides technical advisory for SIXGEN’s cybersecurity services, mission solutions development, and is the lead engineer for the COURSE virtual reality platform, a SixGen proprietary technology. Mr. Dietrich’s 13 years of experience in professional consulting services for the Department of Defense enable him to successfully manage large-scale projects and development teams using modern development methodologies.


Prior to founding SixGen, Mr. Dietrich supported National-level clandestine and covert programs throughout over 18 years of exemplary military service.  He served in the US Army during Operations Iraqi Freedom and Enduring Freedom, where he deployed as part of 5th Special Forces Group (A) and as part of Combined Joint Special Operations Task Force (CJSOTF/TF Dagger). He successfully guided rescue, response, capture, and counter-insurgency missions that were provided to the President of the United States. Mr. Dietrich continues to support national-level missions with increased security and effective operations by developing innovative technologies and providing professional services at SixGen, Inc., a certified veteranowned small business.


Mr. Dietrich was just named a 2019 DCA CyberStar. This is a list of 40 leaders from the cyber growth community that are selected because they are making a positive difference. https://www.sixgen.io/singlepost/2019/01/07/Ethan-Dietrich-CEO-Named-2019-DCA-CyberStar  

Paul Jabaay


Paul Jabaay is a Senior Investigator at Coinbase.   He has worked at Coinbase for 5 years investigating Fraud, Money Laundering, AML/BSA violations, Terrorism Finance, and Child Exploitation/Human Trafficking.  Paul has provided training and support to multiple federal, state, and local law enforcement agencies and is a leading expert in crypto-currency investigations and blockchain analytics.  

Mark Massop


Mark Massop has over twenty-eight years of progressive experience in intelligence-related research and analysis with specialization in drug enforcement policies and law enforcement intelligence. He is a recognized expert in law enforcement technology solutions. He is experienced in preparing various reports using opensource, corporate, private, governmental, and academic resources and in designing and delivering highly customized training programs and software solutions for the intelligence analysis field.  



Lt. Colonel James J. Emerson (Ret)

Jim Emerson is the Executive Advisor for Cyber Policy at the National White Collar Crime Center, and the CEO and founder of the Public Safety Information Sharing and Analysis Organization, and a Partner at J3 Digital Forensics LLC.


Jim spent 15 years as COO/Managing Director at iThreat Cyber Group, Inc., managing cybercrime investigation and mitigation services for private sector victims in cooperation with public sector agencies.


Jim's law enforcement and security background encompasses a wide spectrum of national security and public safety disciplines over 42 years with a focus on cybercrime investigation, computer forensics, and related criminal intelligence over the past 17 years. Jim holds numerous certifications in cybersecurity and digital forensics and has presented evidence and expert testimony related to digital evidence in US Federal Court.


Jim has been the Chairman of the International Association of Chiefs of Police Computer Crime and Digital Evidence Committee for over 8 years. He recently Chaired the IJIS Institute Safeguarding Data Task Force, and Co-Chaired the IJIS Institute Digital Integrity Task Force, was a member of the DOJ/BJA Global/CICC Task Team on Cyber Safety for Law Enforcement, is currently a member of the ICANN Public Safety Working Group of the Government Advisory Committee, a board member of the Society for the Policing of Cyberspace and NW3C’s new International Association of Cyber & Economic Crime Professionals (IACECP) Board of Advisors.

Christopher Hadnagy

Christopher Hadnagy, is the founder and CEO of Social-Engineer, LLC. Chris possesses over 16 years experience as a practitioner and researcher in the security field. His efforts in training, education, and awareness have helped to expose social engineering as the top threat to the security of organizations today.

Chris established the world’s first social engineering penetration testing framework at http://www.social-engineer.org, providing an invaluable repository of information for security professionals and enthusiasts. That site grew into a dynamic web resource including a podcast and newsletter, which have become staples in the security industry and are referenced by large organizations around the world. Chris also created the first hands-on social engineering training course and certification, Advanced Practical Social Engineering, attended by law enforcement, military, and private sector professionals.

A sought-after writer and speaker, Chris has spoken and trained at events such as RSA, Black Hat, and various presentations for corporate and government clients. Chris is also the best-selling author of three books; Social Engineering: The Art of Human Hacking, Unmasking the Social Engineer: The Human Element of Security and Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails, and has been invited to the Pentagon to debrief 30+ general officers and government officials on social engineering and its effect on the United States..

Chris is a certified Expert Level graduate of Dr. Paul Ekman’s Micro Expressions courses, having made the study of non-verbal behaviors one of his specialties. In addition, he holds certifications as an Offensive Security Certified Professional (OSCP) and an Offensive Security Wireless Professional (OSWP).

John Penn II

John Penn II, is the Senior Architect for Law Enforcement Technologies at Adobe Systems Incorporated and he has has spent nearly four decades writing software. Most recently, he spent 11 years working at Adobe as a Senior Computer Scientist on Photoshop. Now focusing on the role software can play in the prevention and investigation of internet crimes against children as well as crimes involving digital media, John has helped develop advanced victim identification tools and techniques and train on their implementation. His overarching mission now is to foster better communication between law enforcement and the software industry, and promote a better understanding of the challenges faced by both. He continues to develop new technologies, 
techniques and training to help law enforcement with high tech challenges.



Greg Squire

Special Agent Gregory Squire has been with the Department of Homeland Security, Homeland Security Investigations, since 2007 and is assigned to the Boston field office. SA Squire works in the Child Exploitation and Cyber Crimes group with a focus on dark-web investigations and victim identification cases.


Greg’s work can be seen here:




Evan M. Nicholas

Evan Nicholas is a FBI Supervisory Special Agent assigned to the National Domestic Communications Assistance Center (NDCAC).  Prior to his current assignment, he served in the Crimes Against Children Unit at FBI HQ in Washington, DC as the program manager for the FBI's Innocence Lost National Initiative. This is the FBI lead program that rescues victims of sexual exploitation and targets the individuals involved in these crimes.  From 2003 to 2017 he served as a Special Agent in the New York Field Office and specialized in investigating crimes against children matters, including child abductions, the sexual exploitation of children, child prostitution and child pornography cases.  SSA Nicholas was also a member of the FBI’s Child Rapid Deployment Team (CARD).  Prior to joining the FBI, SSA Nicholas was a Special Agent with the United States Secret Service.

Nick Selby

Nick Selby serves as the NYPD's Director of Cyber Intelligence & Investigations. For nearly a decade he served as a Texas police officer and for four years, as a detective investigating computer fraud and child exploitation. Since 2009, Nick has also worked in the private sector as a cyber-security incident responder. A frequent contributor to newspapers including the Washington Post, USA Today, and the New York Times, Nick is co-author of Cyber Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between; In Context: Understanding Police Killings of Unarmed Civilians; Blackhatonomics: Understanding the Economics of Cybercrime; and was technical editor of Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace.

Colleen Nick


On June 9, 1995, Colleen’s 6 year old daughter Morgan was kidnapped from a little league
baseball game. Finding Morgan became the top priority for Colleen and her family.
Without hesitation, she closed her private business and began the fight to bring Morgan
and other missing children home.
Colleen formed the Morgan Nick Foundation in 1996 and serves as a full time Executive
Director. Through Colleen’s outstanding leadership, the foundation assists thousands of
families in crisis, successfully providing intervention, support, and reunification to children
and their families. The foundation is also extremely proactive with prevention education
programs for children, communities, and schools. Colleen was instrumental in the
adoption of AMBER Alert in Arkansas, making Arkansas the third state in the nation to
have a statewide alert system in place.
Colleen is a nationally recognized spokesperson and advocate for missing children. She
has spoken at Quantico (FBI National Training Base), the National Homicide Investigators
Symposium, and at National Missing Children’s Day with Attorney General Janet Reno.
Colleen was invited to meet with President George W. Bush and Mrs. Bush at the White
House Conference on Missing and Exploited Children in 2002 to explore new resources in
the ongoing fight for missing children. Colleen serves as an independent consultant with
Fox Valley Technical College, the National Center for Missing and Exploited Children, and
the Office of Juvenile Justice and Delinquency Prevention. She travels the nation training
law enforcement about the issue of missing and exploited children.
Colleen is a co-creator of Team H.O.P.E. a peer support mentoring program for families of
the missing at the National Center for Missing & Exploited Children and now serves as a
Senior Coordinator, supervising numerous volunteers, and providing immediate and
ongoing support to families in a 12 state area. In addition, she served 17 years on the
Board of Directors for the National Center for Missing and Exploited Children; currently
serves on the Arkansas Crime Victims Reparations Board; and is the past Vice President
for AMECO (Association of Missing and Exploited Children’s Organizations).
Colleen’s passion and unwavering hope motivate her daily to fight for America’s missing
children. She continues to work together with countless dedicated people and is making a
difference, one child at a time.

Donald Conroy


Mr. Donald Conroy has served as Director of the National Targeting Center – Passenger (NTC-
P) division within the Office of Field Operations (OFO) since September 2011. He is responsible
for managing U.S. Customs and Border Protection’s (CBP) advance targeting and research
operations related to international travel. Specifically focusing on terrorism and trans-national
criminal activity, the NTC is the CBP focal point for all possible terrorism-related encounters
and coordinates with CBP field entities as well as numerous local and international law
enforcement, military, and intelligence agencies that support the U.S. government’s anti-
terrorism and other homeland security related missions.

Prior to his selection as the NTC-P Director, Mr. Conroy was the Area Port Director of the
Detroit Metropolitan International Airport from 2009-2011; which included oversight of
operational activities at the Detroit Metropolitan Airport, Oakland-Pontiac Airport, Lansing
International Airport, Grand Rapids International Airport, Battle-Creek Airport and the Willow
Run Airport. He also managed the highly sensitive and complex multi-agency response when a
passenger on an incoming flight attempted to set off a bomb on Christmas Day 2009.
Mr. Conroy has over 30 years of government service. He served in the U.S. Air Force from
1986 -1991. In 1991 he began his career as a U.S. Customs Inspector in San Diego, California
where he served in various positions at the San Ysidro and Otay Mesa ports of entry.

In 2004, he relocated to northern Virginia where he held several positions at CBP Headquarters.


Justin Seitz
Justin Seitz is the co-founder of Dark River Systems Inc., a Canadian security and intelligence company. 
Justin is a renowned and respected cybersecurity and open source intelligence practitioner whose work has been featured in Motherboard, Forbes, and has appeared in numerous other media and podcasts. Justin has authored two books on developing hacking tools, is the creator of the AutomatingOSINT.com training platform, and the creator of Hunchly, an open source intelligence collection tool for investigators. Justin is also a contributor to the citizen journalism site Bellingcat, a member of the International Criminal Court’s Technical Advisory Board, and a Fellow at the Center for Advanced Defense Studies in Washington, DC.

Conference Schedule

Conference Schedule

click icon to view

Conference Presentation Topics

click icon to view


Getting There...


Don Tyson School of Innovation

2667 Hylton Rd

Springdale, AR 72764