Training

Webinar – Partnerships to Address Labor Trafficking: How to Build Multidisciplinary Team

The Office of Community Oriented Policing Services (COPS Office) and the Institute for Intergovernmental Research (IIR) invite you to their webinar “Partnerships to Address Labor Trafficking: How to Build a Multidisciplinary Team.”

Investigators will benefit from learning about practices and innovative strategies for investigating and addressing labor trafficking cases. Establishing trusted multidisciplinary relationships can lead to significant progress in identifying, apprehending, and convicting labor traffickers while safeguarding the lives of victims and their families.

Webinar - Of Eggplants and Umbrellas: The Legal and Investigative Implications of Emojis

This webinar, presented by cyber crime attorneys and a former prosecutor, discusses investigative uses of emojis, particularly in the context of child exploitation, and the legal context of this growing medium, including current case law and implications for practice.

Webinar – Youth Homelessness and Juvenile Justice: Supporting Youth Across Systems

Nationally, an estimated 78 percent of young people who have experienced homelessness report that they have also had at least one interaction with law enforcement, while 44 percent have spent time in a jail or detention facility. Participants will learn about ways that communities can better support young people who find themselves at the intersections of youth homelessness and juvenile justice to ensure that youth do not have unnecessary contact with the juvenile justice system and that if they do come in contact with the justice system, that they exit to safe, stable, and secure housing.

Webinar - Checkm8 & CheckRa1n: New Tools for iOS Extractions

If anything about mobile forensics could be considered buzzworthy in the past year, it would be the release of the Checkm8 Boot ROM exploit created by axi0mX in October. Allowing critical access to 11 generations of iPhones and iDevices, Checkm8 is a new opportunity to access data previously locked behind a secure wall. But beyond the hype, what data can you actually access using this newfound exploit, and what do you do once you've extracted data using Checkm8? In this webinar, we will discuss the benefits, challenges, and usefulness of Checkm8 and Checkra1n to mobile forensic examiners and investigators. We will also explore how examiners can use Checkra1n to gain access to devices and what that access means in practical terms for investigations.

Project Safe Neighborhoods (PSN) Webinar on Targeting Offenders and Creating Targeted Offender Lists

A significant number of law enforcement agencies use offender-based approaches as part of their PSN strategy. Researchers and experienced law enforcement will conduct an interactive panel discussion on strategies for identifying prolific violent offenders and maintaining targeted offender lists. The webinar will go beyond the basics of developing and implementing a priority offender list; panelists will discuss questions related to implementation.

Assessing Childhood Trauma: A Guide for Justice Professionals

Traumatic events during childhood have an impact on the victim’s brain development, emotional regulation capacity, and behavior throughout the lifespan. Having the ability to assess an individual for the effects of childhood trauma better enables us to work effectively with them, and more effectively encourage compliance.

Participants will be able to:

Expert Q&A: Innovative Practices for Family Justice Centers

Family Justice Centers provide a “one-stop shop” for victims of family violence (intimate partner violence, sexual assault, and elder abuse). These co-located, multidisciplinary service centers reduce the number of places a victim must go to receive services following the crime. Services include, but are not limited to, assistance with protective orders, legal services, medical, counseling, safety planning, and more. This session will allow the audience to inquire about innovative practices within the Family Justice Center model.

Webinar – (PH)REAL: PHilosophy, Relationship, Equipping, Attitude and Leadership

Did you know that 99% of all leadership occurs not from the TOP but from the MIDDLE of an organization? Join the National Institute of Corrections (NIC) to explore the qualities of effective leaders at all levels and the essential skills necessary to flourish in one’s own management style while respecting organizational structure and mission. Through a series of interactive activities, attendees will explore how current and future leaders can bring relevant tools, values, and influence to and from every level of a correctional organization. 

FC122 Intellectual Property Theft Training (Jan. 2020, Florida)

This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.

This course is presented in collaboration with the National Association of Attorneys General.

Collecting Evidence from Online Social Media: Building a Cyber-OSINT Toolbox

There is a rapid evolution in the technologies people use to communicate and share material with each other, in the companies providing the sharing platforms, and in how people choose to communicate with each other. People are increasingly choosing to communicate using text, images, and videos rather than traditional electronic voice communications. And they increasingly choose to use platforms that make this communication openly available for others to view. This means that evidence associated with not just metadata but also content of communications can often be collected through open sources long after the communication is completed. While evidence of criminality and victimization can be recovered through open source investigative techniques, many of the commercial tools marketed to criminal investigators and analysts are expensive. This sometimes places them outside the reach of police departments, and social media companies are increasingly blocking API connections for commercial tools that allow the tools to be used for "surveillance." Therefore, it is increasingly important for criminal investigators and analysts to build an inexpensive cyber-OSINT toolbox. This webinar will discuss the rapidly evolving ecosystem of online social media and how people are changing how they choose to communicate. It will then detail and demonstrate free and inexpensive cyber-OSINT tools that criminal investigators and analysts can use to start building a cyber-OSINT toolbox.

Pages