This course will discuss the best practices for investigating child abuse cases, including appropriate procedures and considerations, interviewing of parents and children, and special investigative issues.
This course will cover an overview of the issue of child abuse covering topics such as the nature of child abuse, possible effects of abuse, family dynamics, characteristics of abusive parents, theories of child abuse, and possible effects of abuse.
This course covers violent radicalization in the context of national security investigations. It brings together academic and operational insights on models of radicalization but against the backdrop of a group of young Muslim men whose process of violent radicalization starts in high school and culminates in a plot to detonate three, 1-tone ammonium nitrate truck bombs at the stock exchange, a military base, and an intelligence service building in Canada. Viewers will understand how and where radicalization can occur, what possible counter radicalization methods can be used, and how quickly local investigations can become international ones.
Statement Analysis® is the process of analyzing how a person phrases his statement in an effort to determine if the person is being truthful or deceptive. People will always word their statement based on all their knowledge. Therefore, their statement may contain information they did not intend to share. People will provide more information than what they realize. The problem is they sometimes give more information than what the interviewer realizes. This course will show you what to look for in a verbal and written statement in order to determine if a person is lying or telling the truth.
This course is designed to provide the smart practices needed to manage each interview and gain compliance and cooperation from the interview subject. A confession is NOT the objective—it’s information. Officers will learn things such as how to recognize and correctly respond to verbal and nonverbal cues and how to encourage the subject to talk using influence and persuasion tactics. Officers will also learn the Four Personality Behavior Types and the most effective persuasion techniques to get each type to talk and be cooperative and compliant.
This course is designed to help develop a solid foundation for interviewing skills and maximize the amount of usable information gained from any interview. Officers will learn the basic principles of behavior analysis, the Narrative-Based Interview method for recovering the maximum amount of information during interviews, reliable verbal and nonverbal cues of deception, and much more.
This course is designed to teach law enforcement officers about evidence submission to units in many forensic services laboratories. The course includes the scope of service of typical Forensic Units; suggestions on the collection, preservation, packaging, documentation, and submission of evidence to the units; limitations of service that might be encountered; and report interpretations.This course is intended to provide general information regarding the packaging and submission of forensic evidence. Every state crime lab and law enforcement agency may have their own policies for packaging and submitting forensic evidence. Your department policies supersede any material presented in this course.
This course covers violent radicalization in the context of the Islamic State Group alternatively called ISIS, ISIL and DAESH. It looks at the genesis of this group on social media, the process of recruitment of men and women into the group from their own social media postings, and attempts made to counter their influence online by the State Department, U.S. military forces and NGO's. This UNCLASSIFIED presentation will examine the role that social media plays in ISG cyber operations through screenshots of first-person conversations conducted with ISG Foreign Terrorist Fighters from the West (including Europe), as well as their supporters.
This class provides instructions on both IPv4 and IPv6 addressing and how to resolve both types to an ISP. The student will learn about Mobile Hotspots, and how they are changing the ways law enforcement needs to identify the source of an IP address from a home network that cannot be moved to a mobile device. Lastly, the student will learn about the various types of Cloud computing, what is a cloud, the differences between them, and how they can be investigated.
Internet crimes against children are among the most under-reported and rapidly-growing crimes. This intense training course is designed to provide officers with practical knowledge and skills to investigate child pornography crimes and successfully prosecute cyber predators. This course is divided into four, one-hour topic areas, providing instruction on the following: (1) grooming and child porn image series, (2) chat and peer to peer, (3) MedaData, and (4) sexting and policy development.
This course provides a basic overview of cybercrime, cyberthreats, vulnerabilities, and cyber security responses by law enforcement. It outlines strategies to reduce vulnerabilities through cyber security measures. The course ends by looking into the future to see what may be ahead and the challenges it may pose to law enforcement
In this course the attendee will be instructed in Internet Crime Investigations. The student will learn about IP addressing, and how to identify the source of internet crimes. Then the attendee will be familiarized with Social Network sites such as Facebook, and how to use the sites as a source for data during an investigation. Next the student will learn how to investigate emails, to include “phishing” scams and how the source of the email can be identified. Lastly the student will be instructed on common anonymizers, throw away emails, and other ways of hiding the source of the crime.
Increasingly, law enforcement officers and the public face the issue of armed offenders. Whether encountering firearms or investigating firearms related crimes, it is imperative to understand the nature of firearms in the United States. This course will cover many topics surrounding this issue, including firearms commerce, firearms recognition, and firearms investigations. Firearms commerce provides a comprehensive view of the laws that regulate firearms and methods of lawful acquisition. Firearms recognition will explore the expansive world of firearms and how to correctly identify them in reports and for investigations. Firearms investigations will teach you how to properly take firearms into custody and how the information from firearms can assist in your investigations.
As law enforcement entities, we do not make the facts; we discover and report them. It is not what we think, but what we can prove. The physical evidence we seek will help build a strong foundation for the criminal investigation, based upon facts we can prove. This course is designed to provide an overview of the fundamental stages in crime scene investigation and present information on recognizing, preserving, and developing friction ridge skin impressions. Information will also be offered on the best methods for evidence preservation, collection, and packaging.
Eyewitness evidence is critical to the apprehension and prosecution of criminals. Research has proven that a number of small changes to the identification process will help improve the accuracy and reliability of eyewitness identification, ensuring that the highest quality of eyewitness evidence is collected and preserved. The goal of this curriculum is to provide students with a knowledge and understanding of how the implementation of recommended protocols, or best practices, can improve the accuracy and reliability of eyewitness evidence.
This course will take an in depth look at the 4th Amendment (Search and Seizure). In addition, the requirements of probable cause and affidavits will be examined to ensure your warrants are valid every time. Steve Rothlein has developed best practices and a check list for developing search warrants to limit liability and makes sure officers “get it right”. This course will cover the topics of liability which include mistaken address, inclusion of poor information, and execution considerations such as known weapons, associates, etc.
This course is designed to enable the investigator to immediately interpret what he or she sees upon entering crime scene and to derive from that knowledge an analytical approach to the investigation. Participants will become familiar with the indicators of suspicious death and learn just how equivocal the death scene can be. Actual real-life examples will help the investigator become acquainted with forensic concepts such as lividity, rigor mortis, algor mortis, decomposition, antemortem, and postmortem trauma, etc.
Officers will see firsthand how criminal patrol techniques can yield large and small drug and other type arrests from traffic stops and other legal contacts. Officers will also learn of the incredibly advanced concealment places in land vehicles that smugglers and other people involved with drugs hide the drugs, weapons, and currency.
This training course is designed to increase the knowledge and effectiveness of investigators in the recognition, use, and display of information that can be derived from background research and cellular data records. Students will receive instruction on mapping results from cell phone tower reports, cell phone technology definitions, understanding the informational records, and what information can be obtained from cell phone providers.
Crime and accident scenes cannot physically be presented in court, nor can numerous objects and situations. Therefore, the court recognizes the next best evidence—the photograph. This 3-hour course is designed to teach basic and advanced photographic techniques that are required to document crime scenes and accident scenes for investigative purposes and court presentation.