This training prepares participants to identify critical data on Android® devices before a forensic examination. Participants will learn what to collect beyond photos, text messages, and apps, including usage data and system artifacts. The course also explores how Google® accounts and cloud-stored information integrate with Android devices to support investigative efforts.
Avoid potential conflict both professionally and personally by learning to organize your thinking and respond calmly. Consider the approaches you can take to prevent and respond to verbal conflict. This course will explore the communication process, conflict prevention, to help you understand why conflicts occur. Instruction will also cover certain circumstances in which verbal de-escalation techniques may not be appropriate, and provide techniques to resolve such conflicts. Join us to learn how de-escalation techniques and communication skills can potentially defuse tense situations and lead to more successful outcomes. This training does not cover physical intervention techniques.
Sextortion using technology is an increasing trend seen by law enforcement. Sextortion refers to the crime where someone employs an abuse of power, usually a threat to expose explicit images, in order to coerce a person to do something. This 1-day training will identify the methods and tactics used by offenders, and describe why youth are vulnerable to these tactics. The training will explain the long-term impact of these crimes on victims, offer a victim-centered response, and provide information on reporting these crimes to law enforcement, the National Center for Missing and Exploited Children and the electronic service provider(s). This course will conclude with identifying effective Sextortion prevention messages for youth, parents and educators.
Child sex trafficking of missing children is among the most challenging of child exploitation crimes to investigate. Examine the complexity of the crime and the business model it operates within, including the roles of the trafficker, trafficker accomplices, and buyers. Identify how each contributes to the commission of the crime and what evidence is available and needed to build cases against them. Recognize the differences between a traditional child abuse suspect interview and a trafficker interview, as well as the distinctions between field and investigative victim interviews. Bring all of these pieces together to build solid cases against those who exploit our most vulnerable children.
Combat recidivism and sexual violence posed by sex offenders based on management and treatment best-practices. Learn how treatment, supervision, law enforcement, and the community at large can increase the offender's chances of a pro-social non-offending lifestyle. Explore response strategies for adults and juveniles who commit sexual offenses.
Violence against Native women remains a significant public safety issue. According to the U.S. Department of the Interior- Indian Affairs Office, more than 1.5 million American Indian and Alaska Native women have experienced violence in their lifetime. Tribal law enforcement officers report persistent challenges in identifying and responding appropriately to victims, navigating victim reluctance to come forward, and accessing adequate victim service resources. To address these challenges, the National Criminal Justice Training Center in partnership with the Tribal Law and Policy Institute developed the Tribal Law Enforcement Victim Services Academy.
The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.
Gain insight and strategies to maximize how police agencies can connect with their community and important stakeholders through ongoing dialog and partnerships. Consider minority perceptions of policing due to historical events and ways to overcome some of these barriers. Discover strategies for creating a “learning organizational culture” while appreciating the fragile relationship with our communities. A focus will be on the importance of police legitimacy through ethics, empathy and equity.
Learn the best approach with children who are alleged victims of child abuse in the initial phases of a case, after a concern has been identified. Develop the basic skills and techniques necessary to engage a child in such a way as to minimize suggestibility but still provide support, beyond what is taught in a First Responder Training. Review best practices in identification of a concern and learn to engage these children in a way that maximizes positive case outcomes and minimizes potential behaviors that can hurt cases.
As the Internet of Things (IoT) becomes ubiquitous in our everyday lives there are privacy and security concerns that citizens should be aware of. This training will provide an overview of IoT and will teach law enforcement officials methods to engage with their communities to provide information about IoT privacy and security. Steps that community members can take to be safer with these devices, and effective teaching strategies regarding prevention will be covered.