Discuss an overview of the Overdose Detection Mapping Application Program (ODMAP). Review the benefits of being able to track and access real-time suspected overdose data to support public safety and public health efforts to help mobilize immediate responses to sudden increases or spikes in overdose events. Identify the initial steps needed to set up ODMAP implementation for your community. Explore two successful tribal models of ODMAP implementation, coordinated responses to overdoses, and related alcohol and substance misuse programs and services. The two tribal models that will be highlighted include The Tulalip Tribes and Eastern Band of Cherokee Indians.
In the modern cyber-world, almost all criminal investigations have an online aspect that can be used to further investigations and more quickly solve otherwise difficult cases. Join us to examine open source online intelligence/information and learn how to leverage free platforms, databases, and web applications to strengthen criminal cases. Uncover little known facts and techniques to optimize results using online search engines and online internet resources, which will support your investigations and prosecutions. Learn how to complete and serve search warrants for a variety of electronic information and databases to further all types of investigations. Develop new skill sets to establish contacts and open-source intelligence networks to provide ongoing criminal and threat intelligence in your jurisdiction.
During these difficult times of social distancing and self-quarantine, there has been a dramatic increase in online activities by children, and a heightened concern for their safety by parents/guardians, educators, and child protection professionals. Kids and teens are unable to go to school, participate in sports or other activities, or hang out with their friends, and instead spend many hours in the online world. This webinar provides ICAC members and other child protection professionals with tools and resources to help parents/guardians and others create a safer environment for all children.
Learn about the Tribal Justice System Planning Process (TJSPP) principles and how a comprehensive tribal justice system strategic plan can improve public safety and the quality of life in your community. This online training course is designed for grantees who have not participated in the onsite TJSPP course, as well as non-grantee tribes.
Are you feeling exhausted and burned out? Do you want your energy and passion back? Mark Yarbrough shares three things to consider when trying to avoid and/or overcome burnout.
Gather information on the structure and interdependent functions/roles of a CART program. Learn about protocol development and management, development and use of Memoranda of Understanding, CART composition, training including tabletop exercises and field scenarios, and CART certification standards. Examine a case study which integrates all topics covered for effective CART leadership.
Thinking of starting a Child Abduction Response Team (CART) in your jurisdiction? Learn how building a CART can assist in the search and recovery of an abducted or endangered child. During this webinar, you will learn about the guidelines for developing, implementing and sustaining a CART program within your community, and examine the CART certification process for agencies and CART programs pursuing formal certification.
Gain an understanding of child sex trafficking victim dynamics, perspectives on sex traffickers and how human trafficking is the second most profitable crime in the world. Case examples will be utilized throughout the course to highlight real world examples of child sex trafficking.
Referencing Ken Lanning's publication, Child Molesters: A Behavioral Analysis 5th Edition into child abuse cases, we will explore grooming and seduction techniques used by sex offenders and how to integrate these concepts into arrest and search warrant affidavits. Learn the use of executing search warrants for non-contraband items in delayed disclosure child abuse cases to corroborate child forensic interviews, or investigative interviews of adult victims who were past child victims.
Learn how the Apple AirTag works for individuals who want a high-tech option to keep track of their belongings. Examine how this technology is being used to conduct criminal activities, to include stalking. During the webinar, you will learn how an AirTag is synced to an iOS user account, how ‘Find My’ works, limitations to the technology, and issues you need to be aware of when requesting legal compliance from Apple.