This training provides participants with essential guidance on identifying critical iPhone® data before a forensic examination. Participants will explore key usage data, search functions, Stolen Device Protection, Screen Time, synced passwords, and learn how Apple Watch® evidence can play a pivotal role in investigations.
This intensive three-hour advanced course provides a focused environment for experienced forensic interviewers to refine and strengthen their practice in child sex trafficking cases. Through expert-led peer review, participants will critically analyze the structure, clarity, and defensibility of their forensic interviews, identify areas for improvement, and implement best practices to enhance the quality and integrity of their work. Emphasis is placed on trauma-informed interviewing techniques, legally sound documentation, and effective communication of complex case details to multidisciplinary partners and within judicial proceedings. Participants will leave with strengthened skills to ensure interviews are developmentally appropriate, victim-centered, and defensible in court.
Explore how different types of evidence can be used in forensic interviews of children in abuse, witnessing violence and exploitation cases. Learn how to present different types of evidence in the context of a child-centered, trauma-informed, and legally defendable forensic interview approach. Discuss the implications of presenting child sexual abuse material (CSAM). Practice techniques and develop skills to present different types of evidence in child forensic interviews.
911 Telecommunicators are the first responders in missing children cases, playing a critical, life-saving role as the link between a missing child and their safe return. This interactive course will equip telecommunicators with the essential skills and resources needed to manage these high-stakes situations. By analyzing real cases, learn to recognize the various types of missing children incidents and how they are reported. Through call analysis and scenario-based learning, explore optimal practices, utilizing NCIC, APCO, and ANSI systems and standards. Additionally, the course focuses on resilience-building strategies to support the telecommunicator’s mental health in these emotionally demanding cases.
Join other child-serving professionals to create a plan of action for preventing child sexual abuse of youth in your care. Learn the signs and symptoms of child sexual abuse, mandated reporter and stakeholder responsibilities. Identify strengths and weaknesses of current prevention practices, and develop an action plan, using the Strategic Prevention Dashboard, for your organization. This course is open to all members of child serving organizations such as preschool, after-school care, summer camps, church groups, athletic associations or others responsible for the care of minors.
This training prepares participants to identify critical data on Android® devices before a forensic examination. Participants will learn what to collect beyond photos, text messages, and apps, including usage data and system artifacts. The course also explores how Google® accounts and cloud-stored information integrate with Android devices to support investigative efforts.
Avoid potential conflict both professionally and personally by learning to organize your thinking and respond calmly. Consider the approaches you can take to prevent and respond to verbal conflict. This course will explore the communication process, conflict prevention, to help you understand why conflicts occur. Instruction will also cover certain circumstances in which verbal de-escalation techniques may not be appropriate, and provide techniques to resolve such conflicts. Join us to learn how de-escalation techniques and communication skills can potentially defuse tense situations and lead to more successful outcomes. This training does not cover physical intervention techniques.
Sextortion using technology is an increasing trend seen by law enforcement. Sextortion refers to the crime where someone employs an abuse of power, usually a threat to expose explicit images, in order to coerce a person to do something. This 1-day training will identify the methods and tactics used by offenders, and describe why youth are vulnerable to these tactics. The training will explain the long-term impact of these crimes on victims, offer a victim-centered response, and provide information on reporting these crimes to law enforcement, the National Center for Missing and Exploited Children and the electronic service provider(s). This course will conclude with identifying effective Sextortion prevention messages for youth, parents and educators.
Child sex trafficking of missing children is among the most challenging of child exploitation crimes to investigate. Examine the complexity of the crime and the business model it operates within, including the roles of the trafficker, trafficker accomplices, and buyers. Identify how each contributes to the commission of the crime and what evidence is available and needed to build cases against them. Recognize the differences between a traditional child abuse suspect interview and a trafficker interview, as well as the distinctions between field and investigative victim interviews. Bring all of these pieces together to build solid cases against those who exploit our most vulnerable children.
Combat recidivism and sexual violence posed by sex offenders based on management and treatment best-practices. Learn how treatment, supervision, law enforcement, and the community at large can increase the offender's chances of a pro-social non-offending lifestyle. Explore response strategies for adults and juveniles who commit sexual offenses.