Metaphorically, clouds and clocks represent two ends of the same spectrum. Clouds refer to the unpredictable, indeterminate, and/or irregular factors that might impact victim risk. While clocks represent the known and predictable risk factors associated with victims of human trafficking.
Learn basic techniques and strategies to enhance the likelihood of obtaining information from possible victims of child sex trafficking. Compare and contrast typical child sexual abuse cases with child sex trafficking (CST) cases and address the different points of entry into the criminal justice and welfare system for CST victims. Understand various disciplines' roles and responsibilities and how they can contribute to a positive outcome of the CST case. Examine question strategy, interview dynamics, language use, and interview suggestions. Discuss the business model of child sex trafficking as it relates to a variety of crimes, including the use of child sexual abuse material (CSAM).
Improve multidisciplinary team (MDT) responses to child sex trafficking cases. Gather information about improving or establishing a formal MDT in your community. Identify gaps and develop short and long- term response plans with the help of subject matter experts. To attend this training, you must be part of a multidisciplinary team and your team members must attend with you, from a minimum of 5 to a maximum of 10. Each team member should register individually. To make your team easily identifiable, all team members should use the same name for their team leader during the registration process. If you need assistance in building your team, please contact our office at the number/email below.
Child Sex Trafficking (CST) is a crime that is hidden yet in plain sight. First responders are often the first system members to make contact with a CST victim. A CST victim has been heavily groomed for system contact, is fearful of their trafficker, and often not forthcoming about their exploitive situation. Deconstruct the crime of CST and identify common scenarios in which you may come in contact with a CST victim. Discover victim-centered contact practices you can implement which are specific to CST victims. Recognize how to secure vital evidence which may only be available during your initial contact with the victim. Practice group exercises and develop contact and response plans to common scenarios you may encounter.
This is an advanced course. Please make sure you meet the prerequisites before registering. Develop the skills and techniques to conduct developmentally appropriate forensic interviews with victims of child sex trafficking. Learn the differences between interviewing children in child abuse cases and interviewing child sex trafficking victims. Review victim-centered interview methodology with special emphasis given to understanding the factors contributing to child sex trafficking victimization and the impact on development and effects of trauma. Learn to gather information regarding the use of technology in the child sex trafficking business model and the multitude of crimes that traffickers commit, including the use of child sexual abuse material (CSAM).
June is Internet Safety Month. This edition features new internet training opportunities. Check out our Critical 3 videos and media coverage from our AMBER Alert Team.
We are excited to share our latest edition of the Compass Newsletter! This issue features NCJTC stories of impact, Conference recap, new training opportunities, Tell Us Your Story, and more!
We are excited to share our latest edition of the Compass Newsletter. This issue features a recap of our Victims of Crime Conference, pilot training opportunities, Associate impact in Dallas, TX and more!
Our May edition features National Missing Children’s Day, the newest edition of the AMBER Advocate, new training opportunities, and resources for Missing and Murdered Indigenous Women’s Day, and Mental Health Awareness Month.
NCJTC Training and Technical Assistance Catalog - 2024 Edition. For a printable version of the catalog, visit ncjtc.org/catalogprint.