During this 2-part webinar, learn on-scene and cloud-based surveillance video extraction techniques, maintaining the integrity of the extracted digital video evidence, while preserving authenticity of the video data and meta data. Understand and discuss the benefits and potential risks of WiFi security systems, as well as the impact of artificial intelligence on surveillance video footage.
During this 2-part webinar, learn on-scene and cloud-based surveillance video extraction techniques, maintaining the integrity of the extracted digital video evidence, while preserving authenticity of the video data and meta data. Understand and discuss the benefits and potential risks of WiFi security systems, as well as the impact of artificial intelligence on surveillance video footage.
Discuss an overview of the Overdose Detection Mapping Application Program (ODMAP). Review the benefits of being able to track and access real-time suspected overdose data to support public safety and public health efforts to help mobilize immediate responses to sudden increases or spikes in overdose events. Identify the initial steps needed to set up ODMAP implementation for your community. Explore two successful tribal models of ODMAP implementation, coordinated responses to overdoses, and related alcohol and substance misuse programs and services. The two tribal models that will be highlighted include The Tulalip Tribes and Eastern Band of Cherokee Indians.
Are you feeling exhausted and burned out? Do you want your energy and passion back? Mark Yarbrough shares three things to consider when trying to avoid and/or overcome burnout.
Referencing Ken Lanning's publication, Child Molesters: A Behavioral Analysis 5th Edition into child abuse cases, we will explore grooming and seduction techniques used by sex offenders and how to integrate these concepts into arrest and search warrant affidavits. Learn the use of executing search warrants for non-contraband items in delayed disclosure child abuse cases to corroborate child forensic interviews, or investigative interviews of adult victims who were past child victims.
Learn how the Apple AirTag works for individuals who want a high-tech option to keep track of their belongings. Examine how this technology is being used to conduct criminal activities, to include stalking. During the webinar, you will learn how an AirTag is synced to an iOS user account, how ‘Find My’ works, limitations to the technology, and issues you need to be aware of when requesting legal compliance from Apple.
Thinking of starting a Child Abduction Response Team (CART) in your jurisdiction? Learn how building a CART can assist in the search and recovery of an abducted or endangered child. During this webinar, you will learn about the guidelines for developing, implementing and sustaining a CART program within your community, and examine the CART certification process for agencies and CART programs pursuing formal certification.
Gain an understanding of child sex trafficking victim dynamics, perspectives on sex traffickers and how human trafficking is the second most profitable crime in the world. Case examples will be utilized throughout the course to highlight real world examples of child sex trafficking.
Criminal records of sex trafficking victims are known barriers to exiting sex trafficking situations. The link between committing crime while being a victim of sex trafficking, called forced criminality, has received little research attention. One aspect of forced criminality in sex trafficking situations includes ‘trick rolls’ which are the robberies of sex buyers. With the purpose of exploring forced criminality, this study examined 467 trick roll cases which are robberies conducted in a prostitution situation perpetrated by the sex seller, during one year in Las Vegas, Nevada. Trick roll cases involving sex trafficking victims were found to be more likely to involve multiple suspects (including their sex trafficker), begin at a bar/club or casino floor, involve the theft of more valuable items, more likely involve a weapon, and more likely to involve the injury of the sex buyer.
Learn how to identify the types of data that is available from connected cars and the difference between network connected cars and vehicle forensics options. Gain knowledge on how to query certain vehicles to determine their connection status to various service providers will also be covered. Explore and be instructed on how to draft legal process for the extraction of vehicle specific data and learn about resources and tools that can assist them in their investigations that involve vehicle data.