This introductory course provides participants with practical verbal de-escalation techniques to diffuse conflicts and reduce the potential for violence. Participants will gain the skills needed to recognize the factors that contribute to anger and violence in the workplace, identify behaviors and warning signs of anger and conflict, and recognize individuals in crisis. The course emphasizes the importance of safety considerations during de-escalation and provides verbal and non-verbal communication techniques essential for effective conflict resolution. Participants will leave this training equipped with the knowledge and skills to effectively de-escalate conflicts and maintain safety.
Explore how different types of evidence can be used in forensic interviews of children in abuse, witnessing violence and exploitation cases. Learn how to present different types of evidence in the context of a child-centered, trauma-informed, and legally defendable forensic interview approach. Discuss the implications of presenting child sexual abuse material (CSAM). Practice techniques and develop skills to present different types of evidence in child forensic interviews.
Technology plays a tremendous role in our children's lives. Learn about the ways children are interacting online to create better understanding and open up meaningful communication. Increase awareness of opportunities to protect and connect with children while also gathering valuable information to mitigate threats posed by individuals who seek to exploit them.
Examine the importance of multidisciplinary team (MDT) case coordination and evidence corroboration in the investigation of child abuse cases. Various members of the Multidisciplinary Team, such as law enforcement, child protective services, and forensic interviewers may gather different or differing information. Learn how to evaluate evidentiary findings through crime scene images, interviews and case studies. Understand multidisciplinary team members' roles and responsibilities for protecting child victims and prosecuting offenders. Focus on offenders’ use of technology, including the use of child sexual abuse material (CSAM) in grooming and manipulation. Discuss a variety of technology that can be used by investigators.
Sextortion using technology is an increasing trend seen by law enforcement. Sextortion refers to the crime where someone employs an abuse of power, usually a threat to expose explicit images, in order to coerce a person to do something. This 1-day training will identify the methods and tactics used by offenders, and describe why youth are vulnerable to these tactics. The training will explain the long-term impact of these crimes on victims, offer a victim-centered response, and provide information on reporting these crimes to law enforcement, the National Center for Missing and Exploited Children and the electronic service provider(s). This course will conclude with identifying effective Sextortion prevention messages for youth, parents and educators.
Avoid potential conflict both professionally and personally by learning to organize your thinking and respond calmly. Consider the approaches you can take to prevent and respond to verbal conflict. This course will explore the communication process, conflict prevention, to help you understand why conflicts occur. Instruction will also cover certain circumstances in which verbal de-escalation techniques may not be appropriate, and provide techniques to resolve such conflicts. Join us to learn how de-escalation techniques and communication skills can potentially defuse tense situations and lead to more successful outcomes. This training does not cover physical intervention techniques.
Explore the challenges involved with no body homicide investigations. Most start as missing persons cases; the suspect’s head start coupled with the absence of the victim’s body leaves gaping holes in the investigation. Join us to hear from experienced instructors as they provide the framework and tools to build a prosecutable circumstantial case—regardless of the age of the case—from proving the victim is dead using established practices such as victimology, interviews, documents/records/digital footprint to search strategies and best practices in documentation. This training will also provide established prosecution strategies that maximize the likelihood of success. During instruction, there will be an opportunity to share your case as a class participation case study exercise.
Join other child-serving professionals to create a plan of action for preventing child sexual abuse of youth in your care. Learn the signs and symptoms of child sexual abuse, mandated reporter and stakeholder responsibilities. Identify strengths and weaknesses of current prevention practices, and develop an action plan, using the Strategic Prevention Dashboard, for your organization. This course is open to all members of child serving organizations such as preschool, after-school care, summer camps, church groups, athletic associations or others responsible for the care of minors.
The Internet of Things (IoT) involves a web of data which requires planning to access and manage. During this training, we will explore devices and their connected systems, to understand how they create valuable evidence and could have significance at crime scenes. Examination through live demonstrations on how to retrieve and review the data, identify applicable Fourth Amendment concepts, and apply them to build a legally defensible and ethical case will be discussed.
As the Internet of Things (IoT) becomes ubiquitous in our everyday lives there are privacy and security concerns that citizens should be aware of. This training will provide an overview of IoT and will teach law enforcement officials methods to engage with their communities to provide information about IoT privacy and security. Steps that community members can take to be safer with these devices, and effective teaching strategies regarding prevention will be covered.