The fall conference is on March 13-14, 2026 at Auburn Hills Marriott, Pontiac, 3600 Centerpoint Parkway, Pontiac, MI. Attendees may earn 12 total CLE Skill Training Hours. The cost is $480 for CDAM Members and $600 for Non-Members. Those with CDAM Direct Billing Agreements Register Free.
|
A IS FOR ATTORNEY | 9:30am - 5:30pm | 8 CLE Skill Hours | $320 CDAM Member/$400 Non-Member
Experience CDAM’s acclaimed new lawyer session. Our training has been refreshed and is even better than before! Learn what a new lawyer needs to know to begin practicing criminal defense. Open to all but geared toward those with 3 or less years' experience.
Tiffany DeBruin Faculty | ![]() Rhonda B. Ives Faculty |
Lisa Kirsch Satawa Faculty |
EVIDENCE BOOT CAMP E | 9:30am - 5:30pm | 8 CLE Skill Hours | $320 CDAM Member/$400 Non-Member
CDAM’s Evidence Boot Camp F, ideal for lawyers with five or more years’ experience. These all-day, small group, hands-on, immersion trainings develop fast thinking skills, critical to introducing evidence in court. Limited to sixteen, paired into groups of two, attorneys work on fact patterns that focus on Rules of Evidence. It’s been said that if you know the Rules of Evidence, you can Rule the Courtroom. It’s true, and by attending an EBC, you will position yourself to Master the Courtroom.
Click here to register for Evidence Boot Camp E!
Elizabeth A. LaCosse Faculty |
Faculty |
TRILOGY, TRIADS, AND TRIUMPH: THE PERSUASIVE POWER OF THREE| 12:00-4:00pm | 4 CLE Skill Hours | $160 CDAM Member/$200 Non-Member | NEW SKILLS/ANNUAL HOUR TRAINING!
In this hands-on, small group training, attorneys will master the art of using trilogy to create an impactful courtroom presence. Limited to 20 students. Click here to register for Trilogy, Triads, and Triumph!
Student take-aways: • Understand and appreciate the power of trilogies • Develop the skill of creating trilogies to use in their own cases. • Empowered to deliver trilogies in the most effective manner. |
James R. Samuels Faculty |
YOUR CASE ISSUES | 4pm - 6pm | No CLE Hours Issued | Just Show Up! Got a tough case? Need strategy ideas? Bring your most challenging matter for a dynamic, no-holds-barred discussion. This is your chance to get candid, practical feedback from some of Michigan’s most experienced trial lawyers. The session is free, open to all attendees, and no reservation is needed. Just check in at the registration desk and we’ll direct you to the room. Bring your facts, your questions, and your best listening ears—this is where cases get better. |
|
Tracie Dinehart Facilitator |
Mike Steinberg Facilitator |
CDAM ANNUAL BOARD MEETING | 6:15pm All CDAM members are welcome to attend. Those interested in running for CDAM’s Board of Directors must attend a board meeting within the past year.
LODGE PARTY | 8:00pm
Woodward's Lounge at Auburn Hills Marriott, Pontiac. Open to All Conference Registrants. Complimentary Hors D'oeuvres; Cash Bar.
Friday, March 13 - Speakers & Events - 9:00-5:00pm (8 MIDC-compliant hours) |
8:00am9:00am 9:05-10:30am 10:30-10:45am 10:45-12:00pm 12:00-1:00pm 1:00-2:10pm 2:10-2:25pm 2:25-3:40pm 3:40-3:55pm 3:55-5:00pm | Check-in and Breakfast BuffetWelcomeKEYNOTE -- Judicial Misconduct: The Greatest Threat to Justice by Brian Steel Break No More Open Roads: Automatic Vehicle Tracking by Sidney Thaxter OPTIONS • Working Lunch: Preventing Wrongful Convictions: Lessons from Wayne County by Marilena David • Group Lunch • Lunch on Your Own 1st BREAKOUT: 4 options/select 1 • Detecting AI Images in Criminal Defense Cases by Kenneth G. Hartman • Facial Recognition and Criminal Defense—Detroit and Beyond by Phil Mayor • Litigating and Mitigating Terroristic Threat Cases by Matt Monahan • Non-Flock Surveillance by Eric Grabski Break 2nd BREAKOUT: 3 options/select 1 • Cell Phone Search Warrants -- Identifying Recurring Problems by Tristen Chamberlain • Expungements by Tiffany Hughes • When Google Searches for You by Eric Grabski Break 3rd BREAKOUT: 4 options/select 1 • Building Cyber Resiliency into Your Everyday Practice by Cynthia Rast • ICAC's Watchful Eye: CDAM and Torrential Downpour by Kenneth G. Hartman • Inside ICE Surveillance: Tools, Tactics, and Civil Liberties by by Amy V. Doukoure • Yoga by Marina Chupac and Jordan Zuppke |
6:15-9:00pm | CDAM ANNUAL AWARDS DINNER HONORING Anne Yantus with the Penny R. Beardslee Excellence in Education Award; and honoring Thomas J. Tomko and Stuart Friedman with The Right to Counsel Award. |
|
9:00-12:00pm Friday Morning Plenary Sessions
KEYNOTE: Judicial Misconduct: The Greatest Threat to Justice Description: A working criminal justice system requires ethical and honorable people to abide by and enforce rules at every stage and in every role. Honest law enforcement officers and ethical prosecutors are as vital as the zealous defense lawyers who defend the criminally accused. It is equally essential that judges uphold their oath to administer justice fairly and impartially, without bias for or against anyone, and faithfully perform their duties. While threats to justice exist in various forms, the greatest threat to our criminal justice system are the judges who engage in misconduct, through affirmative conduct or passive dereliction of their duties. | ![]() Brian Steel |
No More Open Roads: Automatic Vehicle Tracking Description: Automatic License Plate Reader (ALPR) surveillance systems are getting more sophisticated and cheaper, meaning they are increasingly accessible to police. ALPRs can gather information about people and their movements, but law enforcement also use them creatively: creating associations between vehicles and identifying “suspicious” travel patterns. As more police departments use ALPRs in new ways, defense lawyers need to be prepared.
Take-aways: • How ALPR Systems Work • Data analytics tools • Database integration • Long term tracking challenges • Expanding Discovery | ![]() Sidney Thaxter Washington, DC |
12:00-1:00pm Group Lunch, Lunch on Your Own, or Working Lunch
Working Lunch Preventing Wrongful Convictions: Lessons from Wayne County Description: Wrongful convictions undermine public trust and cause irreparable harm to the accused, victims, and communities. In this session, we will discuss the findings of a recent wrongful conviction review conducted in Wayne County, highlighting systemic failures and recurring risk factors. Attendees will learn how to identify warning signs of wrongful convictions and implement practical strategies at each stage of representation to prevent them. Take-aways: • Identify common causes and red flags of wrongful convictions revealed by the Wayne County review • Apply lessons learned from the report to strengthen investigation, litigation, and advocacy strategies in criminal defense cases. • Implement proactive practices to safeguard clients’ rights and reduce the risk of wrongful convictions in our own caseloads. |
Marilena David Detroit |
1:00-5:00 BREAKOUTS 1, 2, 3 with multiple options in each!
~ Each track will have 15-minute transition break ~
1st BREAKOUT 1:00-2:10pm with 3 options
Option 1 Detecting AI Images in Criminal Defense Cases Description: Artificial intelligence has made it possible to generate highly realistic images that never came from a camera or real-world event. These images are already appearing in criminal cases through social media, screenshots, search warrants, and digital extractions. This session equips criminal defense attorneys with practical tools to evaluate whether image evidence is authentic, synthetic, or unverifiable. Attendees will learn how AI-generated images differ from traditional photo manipulation, what red flags can be identified without specialized software, how forensic methods like metadata analysis and camera fingerprinting apply, and how emerging provenance standards affect admissibility. The focus is on actionable strategies for discovery, motions, and cross-examination. Take-Aways: • Identify common indicators that an image may be AI-generated or unreliable • Know what discovery requests matter when image authenticity is disputed. • Understand when metadata, PRNU, or expert testimony can undermine image evidence • Distinguish between meaningful provenance and self-attested digital credentials • Apply Rule 901 and
702 principles to challenge questionable image exhibits. |
Kenneth G. Hartman |
Option 2 Litigating and Mitigating Terroristic Threat Cases Description: In response to increases in online vitriol, both the state and federal government have increased prosecutions of terroristic threats. Distinct from cases involving the material support of terrorism, the threats cases involve just (terrifying) words, usually communicated via social media. This session will give defense attorneys some arrows to stick in the quiver when a terrorist threats case comes across their desk. Take-aways: • Attendees will analyze and evaluate the plain language of relevant statutes to determine the required mens rea. • Attendees will analyze different fact patterns that speak to, or against, the mens rea elements. • Attendees will get a primer on the dangerousness evaluations (and evaluators) that help contextualize our clients for the sentencing court. • Attendees
will evaluate the extent to which prosecutors overreach in charging terrorist
threats where terrorism isn’t at play. |
Matt Monahan Detroit |
Facial Recognition and Criminal Defense—Detroit and Beyond Description: This session will discuss how facial recognition technology works and how it may be deployed in criminal cases in Michigan. We will discuss flaws with the technology and how those flaws may guide your litigation strategy. We will also discuss the dangerous pipeline of police moving straight from facial recognition leads to identification lineups. And we will discuss how the technology may inform Brady/Giglio issues Finally, we will discuss the ACLU’s civil lawsuit regarding the misuse of the technology in Detroit and the resulting settlement, which bears directly on Detroit-based cases and implicitly on cases elsewhere. Take-aways: • An understanding of the basic mechanics and flaw of facial recognition technology. • Awareness
of criminal defense issues that may arise as the result of the use of FRT
including flawed lineups, Brady/Giglio issues, and fourth amendment
issues • An understanding of how the ACLU successfully challenged misuses of FRT in Detroit, and the resulting model policies adopted in Detroit as part of the consent decree resolving that case. |
Phil Mayor |
Option 3 Non-Flock Surveillance |
Eric Grabski |
2nd BREAKOUT 2:25-3:40pm with 3 options
|
Option 1 Cell Phone Search Warrants -- Identifying Recurring Problems Description: This presentation focuses on foundational principles of cell phone technology and how remnants of traditional computer-based drafting continue to appear in modern cell phone search warrants. Building on that foundation, the session examines recurring problems in search warrants by walking through one analyzed by the Michigan Supreme Court. Attendees will learn how technological misunderstandings translate into overbroad scope, unsupported assumptions, and legal vulnerabilities, and how those issues affect probable cause and particularity in digital searches. Take-aways: • Cell phone technology and data architecture. • Extractions, report generation, and discovery mechanics. • Technology-driven red flags in warrants and affidavits. • Probable cause, particularity, and scope failures. • Multipurpose data and emerging legal tensions. |
Tristan Chamberlain |
Option 2 Expungements --The Ins and Outs Description: Details on the Michigan Expungement Law along with updates. Take-aways: • What qualifies and what doesn’t for expungement. • Who qualifies for an expungement. • The time periods to qualify for expungement. • Which convictions are automatically expunged and which have to be expunged by application. |
Tiffany Hughes Corunna |
Option 3 When Google Searches for You Description: Learn about Google geofence warrants, breaking down the three-step process used by law enforcement to obtain location and subscriber data. Expect to learn how location history is generated, why geofence searches routinely capture innocent users, and where constitutional and technical flaws arise. The course emphasizes discovery strategies, false positives, data uncertainty, and practical methods for identifying, challenging, and litigating geofence evidence in criminal cases. Take-aways: • Geofence warrants search everyone first, suspects later. • Location data includes uncertainty and false positives. • Privacy issues surrounding Google Geofence • Navigating discovery demands when handling a case involving a Google Geofence return. |
Eric Grabski South Carolina |
3rd BREAKOUT 3:55-5:00pm
|
Option 1 Building Cyber Resiliency into your Everyday Practice Description: Cybersecurity webinars are quick to advise on what to do when the cyber incident happens. While this advice is extremely helpful, the focus of this webinar is to describe the steps companies should implement in advance of the cyber incident. Whether your entity is large or small and enjoys a multi-million-dollar IT budget or a budget of merely thousands, you face the same daily onslaught from threat actors and nation states. Their threat is constant and agnostic to size and dollars. So, what should companies do to build cyber resiliency? Take-aways: • Attendees will understand the critical role of preparation and planning before the cyber incident happens. • Attendees will be able to identify the elements of an Incident Response Plan and the roles played by Incident Response Team members. Attendees will learn who should comprise and serve as Incident Response Team members. • Attendees
will learn how to prepare for and implement Table Top Exercises. |
Claudia Rast Ann Arbor |
Option 2 ICAC's Watchful Eye: CDAM and Torrential Downpour Description: ICAC investigations increasingly rely on Torrential Downpour and similar tools that function as continuous, automated surveillance of peer-to-peer networks. This session gives defense attorneys a working understanding of how CSAM cases are built from BitTorrent evidence—without requiring forensic expertise. Attendees will learn core technical concepts that routinely appear in affidavits and testimony, how those concepts are translated into legal claims, and where overstatement commonly occurs. The session also addresses Fourth Amendment search arguments as part of a broader strategy, explaining when they matter, when they do not, and how technical limits shape suppression, discovery, and trial decisions. Take-aways: • A clear, lawyer-level understanding of how Torrential Downpour and ICAC BitTorrent surveillance actually works. • The key technical terms and concepts attorneys must recognize without becoming forensic experts. • How automated surveillance claims are translated into probable cause and trial evidence. • When Fourth Amendment search arguments are viable—and when other strategies are more effective. • How to identify and request the specific Torrential Downpour artifacts necessary to evaluate government claims. |
Kenneth G. Hartman |
Option 3 ICE Surveillance: Tools, Tactics, and Civil Liberties Description: This session equips criminal defense attorneys with a practical understanding of ICE surveillance techniques. The presentation will examine digital tracking tools including geolocation data, license plate readers, facial recognition, social media monitoring, data brokers, and inter-agency data sharing. Attendees will learn how these systems are used to generate leads, establish probable cause, and build prosecutions, as well as how to challenge their legality through suppression motions, discovery demands, constitutional litigation, and expert analysis. The session will also address the direct implications for criminal defense attorneys confronting warrantless monitoring and bulk data collection in everyday practice. Take-aways: • Inside ICE Surveillance: Tools, Tactics, and Civil Liberties. • Insight into the legal authorities, limits, and constitutional risks surrounding government surveillance.• Awareness of cybersecurity vulnerabilities and data exploitation risks created by mass surveillance systems. • Implications for federal and state prosecutions relying on government suspicion less surveillance. |
Amy Doukoure |
Option 4 Chill Out and Relax Description: The practice of law can be demanding, placing immense strain on both mind and body. The high stakes and constant pressures of the profession often leave even the most resilient attorneys running on empty. Take a step back with a cozy sound bath and guided meditation hosted by Zupac Law. This restorative session is designed to help you release stress, restore balance, and settle into deep relaxation. Come as you are—dress comfortably, show up, and simply breathe. *Bring a mat or we’ll have some for sale. CDAM will also have towels on hand to use. |
Jordan Zuppke and Marina Chupac Royal Oak, MI |