In the modern cyber-world, almost all criminal investigations have an online aspect that can be used to further investigations and more quickly solve otherwise difficult cases. Join us to examine open source online intelligence/information and learn how to leverage free platforms, databases, and web applications to strengthen criminal cases. Uncover little known facts and techniques to optimize results using online search engines and online internet resources, which will support your investigations and prosecutions. Learn how to complete and serve search warrants for a variety of electronic information and databases to further all types of investigations. Develop new skill sets to establish contacts and open-source intelligence networks to provide ongoing criminal and threat intelligence in your jurisdiction.
Gather up-to-date information for the investigation and prosecution of all types of child abuse cases utilizing a multidisciplinary team (MDT) approach. Learn about medical evidence, interviewing child victims/witnesses and adult suspects/witnesses, along with legal issues involved in the investigation and prosecution of child physical and sexual abuse cases. Discuss trends in offenders’ use of technology, the use of child sexual abuse material (CSAM), and sextortion. Learn law enforcement investigative techniques that capitalize on new technology.
Explore the challenges involved with no body homicide investigations. Most start as missing persons cases; the suspect’s head start coupled with the absence of the victim’s body leaves gaping holes in the investigation. Join us to hear from experienced instructors as they provide the framework and tools to build a prosecutable circumstantial case—regardless of the age of the case—from proving the victim is dead using established practices such as victimology, interviews, documents/records/digital footprint to search strategies and best practices in documentation. This training will also provide established prosecution strategies that maximize the likelihood of success. During instruction, there will be an opportunity to share your case as a class participation case study exercise.
The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.
As the Internet of Things (IoT) becomes ubiquitous in our everyday lives there are privacy and security concerns that citizens should be aware of. This training will provide an overview of IoT and will teach law enforcement officials methods to engage with their communities to provide information about IoT privacy and security. Steps that community members can take to be safer with these devices, and effective teaching strategies regarding prevention will be covered.
Join us for a deeper dive into the impact of addiction on the brain. Explore strategies to support tribal community members’ journey out of addiction. Examine the fundamentals of relapse prevention and evidence-based ways of facilitating long-term behavior change. Examine mental health symptoms and broad categories of diagnoses. Explore strategies to support clients presenting myriad needs and complexities. Practice skills, receive feedback and have your questions answered about working with clients presenting with mental health symptoms and/or addiction.
Learn the best approach with children who are alleged victims of child abuse in the initial phases of a case, after a concern has been identified. Develop the basic skills and techniques necessary to engage a child in such a way as to minimize suggestibility but still provide support, beyond what is taught in a First Responder Training. Review best practices in identification of a concern and learn to engage these children in a way that maximizes positive case outcomes and minimizes potential behaviors that can hurt cases.
Discuss examples of federal/state laws and policies that support coordinated responses to child sex trafficking, focusing on how legislation can promote prevention, protection, partnerships, and justice for survivors. Attendees will gain knowledge and training on comprehensive, trauma-informed, and person-centered approaches to effectively support minors who have experienced trafficking, ensuring their needs are met with compassion and respect. We will explore multidisciplinary collaboration among government agencies, community services, law enforcement, healthcare providers, and other stakeholders to create a unified and effective response prioritizing minors’ safety, recovery, and empowerment.
In preparation for meeting with victims, forensic interviewers routinely assess for any potential barriers that might impact what happens during the interview. A potential barrier that is often overlooked is consideration for where that victim might be in the disclosure process and what implications that could have during the forensic interview. Participants in this training will gain an increased understanding of the various stages of the disclosure process and learn strategies to engage with victims in a productive and meaningful way at the various stages of the disclosure process.
Child sex trafficking (CST) is like no other crime. Victimization may happen hundreds of times and can be difficult to identify due to the victims being missing children coupled with the trafficker’s hold on victims. Dissect the crime of CST, its complex nature, and discover how to investigate this crime fully. Develop trauma-informed approaches to ensure your victim interview does not retraumatize and you gain critical information to identify corroborative evidence. Examine the trafficker’s profile and motivation, how they impact your suspect interview, and proven suspect interview strategies. Recognize common evidence available, legal hurdles, and common defenses of traffickers.