This course addresses the critical need for well-trained intelligence analysts to interpret growing amounts of information. This introductory course covers the history and purpose of intelligence analysis, the intelligence cycle, analytical thinking skills, and the importance of strategic analysis. The course was developed by a consortium that included the National White Collar Crime Center, Law Enforcement Intelligence Unit, the International Association of Law Enforcement Intelligence Analysis, and the Regional Information Sharing System.
U.S. jails are experiencing a crisis in managing and treating inmates with mental illness. This seminar will discuss the legal requirements regarding the "Duty to Protect," as well as the key protocols every jail should have in place, to include screening tools, heightened watch protocols, housing, and programming considerations.
In 2005, the National Council of Juvenile and Family Court Judges (NCJFCJ) published the Juvenile Delinquency Guidelines: Improving Court Practice in Juvenile Delinquency Cases (JDG). Over the years, the JDG has served as the guidepost for juvenile courts across the country. The JDG identifies the essential elements of effective juvenile justice procedures and describes recommended practice.
This course provides the fundamental knowledge and skills necessary to preserve, acquire, and analyze data on iOS devices (iPod Touch, iPhone, and iPad), as well as various Android devices. Students use forensically sound tools and techniques to acquire and analyze potential evidence. Topics include identifying potential threats to data stored on devices, using available imaging options, accessing locked devices, and understanding the default folder structure. The forensic artifacts covered include device information, call history, voicemail, messages, web browser history, contacts, and photos.
This course introduces the problem of intellectual property (IP) theft and provides tools, techniques, and resources for investigating and prosecuting these crimes. A combination of lecture, discussion, and interactive exercises illustrates the potential dangers and economic repercussions of counterfeit products, as well as best practices and techniques for investigating IP theft. Students are provided with a state-specific workbook that includes relevant statutes, sample organizational documents for IP investigations, and additional resources for investigators and prosecutors.
This course promotes a multiagency approach to the problem of financial exploitation of senior citizens. Topics include working with senior victims, examining documents like bank records and power of attorney, and using resources for investigation and community awareness. Detailed examination of a case study, from initial complaint to prosecution, reinforces and illustrates the course content. With a dual focus on financial abuse by trusted persons and common scams aimed at seniors, the course introduces senior-specific investigative skills while facilitating networking and cooperation that can extend out of the classroom and into real cases.
This webinar is intended for LAW ENFORCEMENT personnel: those who are directly attached to or work in support of a law enforcement agency. Please register using your agency-issued email. TrustComm provides cellular intercept capabilities to the field. This webinar will be an introduction to this type of technology, how it works and how it supports law enforcement, military and first responders in meeting the mission.
This webinar will demonstrate the features and capabilities of the latest version of Personable’s ScanWriter tool as well as integration with Microsoft’s Power BI. ScanWriter automates manual data entry from any electronic document, which improves productivity and efficiency.
Law enforcement officers, firefighters, paramedics, emergency medical technicians, crime scene investigators, and others are frequently exposed to human tragedy on a regular basis, yet few have purposely developed a coping strategy for dealing with this repeated exposure. These concepts also apply to those who are affected by secondary traumatization such as crime scene investigators, attorneys, and others who are in frequent contact with images or information regarding gruesome acts of violence.
Webinar Learning Objectives:
This webinar will showcase innovative best practices to mitigate the negative effects experienced by children exposed to trauma—including an arrest or incident related to opioid use—and will highlight the Handle With Care initiative. This promising initiative partners schools and childcare agencies, law enforcement, and treatment providers to promote safe and supportive homes, schools, and communities with the goals of protecting children and helping traumatized children heal and thrive.