Test your community’s response in conducting an initial investigation, search and canvass activities for a missing or abducted child scenario occurring on tribal lands. Employ strategies and responses in mitigating and resolving the emergency. Participate in a multi-disciplinary, multi-jurisdictional tabletop exercise, to build cohesiveness with tribal, state, local and federal partners when responding to an emergency.
Join other law enforcement and school personnel to address school violence and youth victimization concerns through the use of crime prevention and response strategies and review lessons learned from relevant case studies. Examine the impacts of trauma on youth and effective strategies for working with students experiencing mental illness and learning disabilities. Explore the most current trends among youth relating to social media and alcohol and substance abuse. Discuss successful prevention and intervention program models.
Seconds count when a child is missing. Gain the critical skills needed to construct and manage effective search and canvass operations to recover the child. Recognize crucial cell phone and technology-related evidence which can help locate the child and track the abductor. Explore relevant legal issues associated with criminal cases against those who abduct and harm children. Participate in hands-on exercises designed to test your knowledge and application of the material and prepare you for your next missing child case.
Explore evolving trends in human trafficking and practical strategies for prevention, intervention, and prosecution. Participants will examine risk factors, investigative approaches, victim support strategies, the role of technology in investigations, and community-based solutions. Special focus is given to strengthening investigation and prosecution efforts. Through case studies and collaboration exercises, attendees will develop actionable plans to enhance responses in their own communities.
Learn basic techniques and strategies to enhance the likelihood of obtaining information from possible victims of child sex trafficking. Compare and contrast typical child sexual abuse cases with child sex trafficking (CST) cases and address the different points of entry into the criminal justice and welfare system for CST victims. Understand various disciplines' roles and responsibilities and how they can contribute to a positive outcome of the CST case. Examine question strategy, interview dynamics, language use, and interview suggestions. Discuss the business model of child sex trafficking as it relates to a variety of crimes, including the use of child sexual abuse material (CSAM).
Sextortion using technology is an increasing trend seen by law enforcement. Sextortion refers to the crime where someone employs an abuse of power, usually a threat to expose explicit images, in order to coerce a person to do something. This 1-day training will identify the methods and tactics used by offenders, and describe why youth are vulnerable to these tactics. The training will explain the long-term impact of these crimes on victims, offer a victim-centered response, and provide information on reporting these crimes to law enforcement, the National Center for Missing and Exploited Children and the electronic service provider(s). This course will conclude with identifying effective Sextortion prevention messages for youth, parents and educators.
This training provides participants with essential guidance on identifying critical iPhone® data before a forensic examination. Participants will explore key usage data, search functions, Stolen Device Protection, Screen Time, synced passwords, and learn how Apple Watch® evidence can play a pivotal role in investigations.
Avoid potential conflict both professionally and personally by learning to organize your thinking and respond calmly. Consider the approaches you can take to prevent and respond to verbal conflict. This course will explore the communication process, conflict prevention, to help you understand why conflicts occur. Instruction will also cover certain circumstances in which verbal de-escalation techniques may not be appropriate, and provide techniques to resolve such conflicts. Join us to learn how de-escalation techniques and communication skills can potentially defuse tense situations and lead to more successful outcomes. This training does not cover physical intervention techniques.
This training prepares participants to identify critical data on Android® devices before a forensic examination. Participants will learn what to collect beyond photos, text messages, and apps, including usage data and system artifacts. The course also explores how Google® accounts and cloud-stored information integrate with Android devices to support investigative efforts.
Technology plays a tremendous role in our children's lives. Learn about the ways children are interacting online to create better understanding and open up meaningful communication. Increase awareness of opportunities to protect and connect with children while also gathering valuable information to mitigate threats posed by individuals who seek to exploit them.