This webinar delves into the dual reality faced by many youths in the juvenile justice system who are not only involved in offending behaviors but are also victims of commercial sexual exploitation of children (CSEC). Participants will gain a deeper understanding of the intertwined nature of offending and victimization, the critical role of a trauma-informed lens, and practical strategies for identifying CSEC indicators. Examine how comprehensive wrap-around services and the power of lived experience mentorship can break the cycle and support healing.
The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.
Avoid potential conflict both professionally and personally by learning to organize your thinking and respond calmly. Consider the approaches you can take to prevent and respond to verbal conflict. This course will explore the communication process, conflict prevention, to help you understand why conflicts occur. Instruction will also cover certain circumstances in which verbal de-escalation techniques may not be appropriate, and provide techniques to resolve such conflicts. Join us to learn how de-escalation techniques and communication skills can potentially defuse tense situations and lead to more successful outcomes. This training does not cover physical intervention techniques.
Sextortion using technology is an increasing trend seen by law enforcement. Sextortion refers to the crime where someone employs an abuse of power, usually a threat to expose explicit images, in order to coerce a person to do something. This 1-day training will identify the methods and tactics used by offenders, and describe why youth are vulnerable to these tactics. The training will explain the long-term impact of these crimes on victims, offer a victim-centered response, and provide information on reporting these crimes to law enforcement, the National Center for Missing and Exploited Children and the electronic service provider(s). This course will conclude with identifying effective Sextortion prevention messages for youth, parents and educators.
Examine suspicious death case studies based on the experiences of a homicide detective and forensic pathologist. Identify key scene findings, review actual cases and correlate these findings to the autopsy results. This course will discuss improving case outcomes through strong relationships between investigating agencies and the medical examiner’s office. Students will gain appreciation of how unique case features can affect the direction of the investigation. The ultimate resolution of each case examined will be considered and applied lessons learned are shared during the course.
This introductory course provides participants with practical verbal de-escalation techniques to diffuse conflicts and reduce the potential for violence. Participants will gain the skills needed to recognize the factors that contribute to anger and violence in the workplace, identify behaviors and warning signs of anger and conflict, and recognize individuals in crisis. The course emphasizes the importance of safety considerations during de-escalation and provides verbal and non-verbal communication techniques essential for effective conflict resolution. Participants will leave this training equipped with the knowledge and skills to effectively de-escalate conflicts and maintain safety.
Explore how different types of evidence can be used in forensic interviews of children in abuse, witnessing violence and exploitation cases. Learn how to present different types of evidence in the context of a child-centered, trauma-informed, and legally defendable forensic interview approach. Discuss the implications of presenting child sexual abuse material (CSAM). Practice techniques and develop skills to present different types of evidence in child forensic interviews.
Technology plays a tremendous role in our children's lives. Learn about the ways children are interacting online to create better understanding and open up meaningful communication. Increase awareness of opportunities to protect and connect with children while also gathering valuable information to mitigate threats posed by individuals who seek to exploit them.
Explore and discuss the application of Forensic Genetic Genealogy (FGG) and the ways it aids in investigations. Techniques instructed will include tips in using genealogy to help establish the identities of cold case suspects and assist with identifying human remains. Instruction is provided by experienced investigators who have gained expert knowledge in their application of forensic genetic genealogy through real-life cases. Discuss topics including forensic genealogy techniques and investigative strategies for developing leads and information, as well as working with private labs and other related resources.
Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.