Location: Alaska Location: Arizona Location: California Location: Colorado Location: Connecticut Location: Florida Location: Louisiana Location: Minnesota Location: Montana Location: North Carolina Location: North Dakota Location: New Mexico Location: Nevada Location: Ohio Location: Pennsylvania Location: Tennessee Location: Texas Location: Utah Location: Wisconsin Location: Wyoming Delivery Modes: Classroom Delivery Modes: Conference Delivery Modes: Live Online Instructor Led Delivery Modes: Self-Paced Delivery Modes: Webinar (Exclusive Content) Delivery Modes: Webinar (Upcoming) Delivery Modes: Webinar (Watch Now) Program: AMBER Alert in Indian Country Program: AMBER Alert Training & Technical Assistance Program: Conference Opportunities Program: Contract with Us -Tribal Communities Program: Critical 3 Videos Program: Emmett Till Cold Case Program Program: Internet Crimes Against Children Task Force Program: Internet of Things (IoT) TTA Program: Missing and Exploited Children TTA Program Program: Missing Children's Day Program: NCJTC Contracting Program: Strengthening Community Relations Program: Tell Us Your Story Program: TPA training Program: Tribal Community Corrections Program: Tribal Justice Systems Planning Program: Tribal Responses to Alcohol and Substance Misuse Audience: Community Corrections Officer Audience: Community Member Audience: Court System Personnel Audience: Educator Audience: Emergency Management Audience: Law Enforcement Audience: Law Enforcement Support Audience: Prosecutors Audience: Social Workers Audience: Tribes/Tribal Partners Audience: Victim Service Providers Category: Alcohol and Substance Misuse Category: Child Abuse and Neglect Category: Child Sex Trafficking Category: Community Policing and Prevention Category: Courts and Community Corrections Category: Death Investigations Category: Endangered, Missing, and Abducted Children Category: Leadership, Management, and Planning Category: School Safety Category: Sex Offender Management Category: Technology Investigations Category: Victims and At-Risk Populations Clear all
Internet of Things (IoT): Legal Trends with Audio and Video Recordings
Internet of Things (IoT): Legal Trends with Audio and Video Recordings
Webinar (Upcoming) | Apr 2, 2024 | 12:00 PM - 1:30 PM CT

Learn from case studies to explore contemporary legal developments concerning the utilization of audio and video recordings in criminal investigations and prosecutions. You will learn critical thinking about the considerations investigators and prosecutors need to keep in mind when using such evidence in a prosecution, including the importance of adhering to legal procedures and ensuring the admissibility of this evidence.

Protecting Children in a Digital Age
Protecting Children in a Digital Age
Live Online Instructor Led

Technology plays a tremendous role in our children's lives. Learn about the ways children are interacting online to create better understanding and open up meaningful communication. Increase awareness of opportunities to protect and connect with children while also gathering valuable information to mitigate threats posed by individuals who seek to exploit them.

Criminal Connections: Child Exploitation Material and Child Sexual Abuse
Criminal Connections: Child Exploitation Material and Child Sexual Abuse
Classroom

Explore investigative strategies that address the relationship between child sexual abuse and child sexual abuse materials (child pornography) to supplement an investigation and corroborate victim statements. Gather new tools and resources for the most comprehensive case outcomes.

Beyond Google - Discovering Online Resources in Investigations
Beyond Google - Discovering Online Resources in Investigations
Classroom

In the modern cyber-world, almost all criminal investigations have an online aspect that can be used to further investigations and more quickly solve otherwise difficult cases. Join us to examine open source online intelligence/information and learn how to leverage free platforms, databases, and web applications to strengthen criminal cases. Uncover little known facts and techniques to optimize results using online search engines and online internet resources, which will support your investigations and prosecutions. Learn how to complete and serve search warrants for a variety of electronic information and databases to further all types of investigations. Develop new skill sets to establish contacts and open-source intelligence networks to provide ongoing criminal and threat intelligence in your jurisdiction.

Responding to Sextortion Related Offenses Against Children
Responding to Sextortion Related Offenses Against Children
Live Online Instructor Led

Sextortion using technology is an increasing trend seen by law enforcement. Sextortion refers to the crime where someone employs an abuse of power, usually a threat to expose explicit images, in order to coerce a person to do something. This 1-day training will identify the methods and tactics used by offenders, and describe why youth are vulnerable to these tactics. The training will explain the long-term impact of these crimes on victims, offer a victim-centered response, and provide information on reporting these crimes to law enforcement, National Center for Missing and Exploited Children and the electronic service provider(s). This course will conclude with identifying effective Sextortion prevention messages for youth, parents and educators.

Mobile Device Investigations
Mobile Device Investigations
Classroom

Learn current cell phone related strategies and techniques for any type of investigation. Explore and apply current practices for working with different cellular network providers, completing technology-focused search warrants, analyzing cellular provider call data, associating reported data to the investigation and effective case reporting strategies.

Casting the Digital Footprint
Casting the Digital Footprint
Classroom

Technology impacts almost every type of investigation today. Uncover the information technology users knowingly and unknowingly leave behind when accessing and using electronic devices. Learn how to covertly strengthen your investigations through gathering personal, public and open source data. Discuss techniques to locate evidence through technologies that can benefit any type of investigation.

Connected Vehicles for Law Enforcement
Connected Vehicles for Law Enforcement
Webinar (Watch Now) | Recorded on Mar 28, 2023

Learn how to identify the types of data that is available from connected cars and the difference between network connected cars and vehicle forensics options. Gain knowledge on how to query certain vehicles to determine their connection status to various service providers will also be covered. Explore and be instructed on how to draft legal process for the extraction of vehicle specific data and learn about resources and tools that can assist them in their investigations that involve vehicle data.

Critical 3:  Technology Device Rules in the Home
Critical 3: Technology Device Rules in the Home
Webinar (Watch Now) | Recorded on Apr 30, 2021

Do you set technology device boundaries in your home? Do you provide professional guidance to others about safe technology uses for children and families? Technology devices have a large presence in our daily lives, surrounding us in our homes, schools, and workplaces. They assist us in many ways but can be equally disruptive or dangerous if not marshalled correctly. Dana Miller shares three critical things to consider when teaching or setting your own technology device limits for children and adolescents.

Critical 3: 3 Questions for Parents to Ask Their Kids About Their Tech Use
Critical 3: 3 Questions for Parents to Ask Their Kids About Their Tech Use
Webinar (Watch Now) | Recorded on Jun 1, 2022

It’s 10 pm, do you know where your children are? Do you know what your child’s online and off-line activities are? Dana Miller shares three critical questions for parents to ask their kids about their tech use.

 
Loading Spinner