Leadership | LTC Jason Dickinson, US Army
This course will discuss the behaviors and skills necessary to be an effective leader. Leadership will be explored through both the leader and follower perspectives. Advanced influence, motivation, decision-making, conflict/negotiation strategies, and meeting management will be examined primarily in the interpersonal context.
21st Century Guardian | Chief Wayne Nero, Georgetown Police Department, Texas
The 21st century is known as the “Age of Technology”, and one of the most important and complex types of new technology is social media. The strategic challenges of monitoring social networks and transforming huge amounts of data into actionable intelligence can be a daunting task for police agencies. As one official described it, “It is like trying to take a sip from a fire hydrant.” The goal of this course is to examine social media in policing from two tactical points of view: (1) The use of social media by criminal offenders to organize or facilitate criminal events, and 2) the use of social media by law enforcement agencies to manage large gatherings of people, investigate crimes, or handle other events.
Dynamics of Officer & Citizen Encounters | John Bostain, Command Presence Training Associates
This course will identify current trends of threats to officer safety, define “the Deadly Mix”, identify characteristics of officers who are killed or assaulted, identify practical methods of reducing assaults during encounters and define behavioral threat analysis and its role in officer safety. This course focuses on practical ways to increase officer safety, while simultaneously increasing the quality of contacts officers have with the public. Participants will identify the primary threats to law enforcement officers and will be given strategies to mitigate those risks. This presentation also explores the role of effective communication, unconditional respect, and trust building to meet VALOR’s goal of increasing both public and officer safety.
Cell Phone Technology – Exploitation | Stan Brue, Falcon Consulting Group
This course, relying on actual investigation data and case studies, is designed to familiarize investigators, street officers and data and intelligence analyst personnel with various investigative applications of telephone call detail record exploitation and analysis and cell tower mapping applications. Reference materials will be provided. Topics include: Basic Concepts and Terminology of telephone call detail and cell tower subject matter; Legal Considerations including court orders; maintenance of evidence and courtroom presentation; extensive coverage of phone data. Investigative Applications for all types of investigations including Homicide, Robbery, Assault, Kidnapping, Extortion, Home Invasion, Rape, Burglary, Firearms Trafficking, Drug Trafficking, Gangs, Conspiracy, Organized Crime, OMOs, Fugitives, Arson, Bombings, Explosives, and Public Corruption investigations; evidentiary and intelligence applications including Intelligence Leads, including Associative Evidence / Enterprise collation. Event and Relevant Timeframe Corroboration and analysis, including Source Corroboration, Threat Assessment, Pattern of Life analysis, Fugitive investigations, and Coordination with Undercover and Surveillance Operations.
ROCIC/RISS Investigative Tools and Resources | Deputy Director Tom Wright and CIU/Training Manager Kendall Neal, Regional Organized Crime Information Center
The Regional Organized Crime Information Center (ROCIC) is one of the six Regional Information Sharing Systems (RISS) Centers established by DOJ-Bureau of Justice Assistance. ROCIC offers law enforcement support to state, local, federal and tribal agencies through a variety of means. To be discussed are the online tools and resources available through the RISS secure website as well as a review of the core services provided such digital forensic, surveillance equipment loan program, intelligence & analysis and training.
Crime Gun Intelligence - Strategies to Reduce Violent Crime| AUSA Maurice Landrieu and Elizabeth Privitera and SA Joe Frank, New Orleans Field Division
The purpose of the course is to familiarize participants with the elements of violent crime investigations that successfully utilize Crime Gun Intelligence (CGI). Participants will develop an understanding of the National Integrated Ballistic Information Network (NIBIN). The advantages of this system are particularly beneficial in multiple incidents linked to the same firearm. Law enforcement agencies can use ballistic evidence from prior incidents to establish connections to current incidents, as well as provide actionable intelligence leads to investigators. Participants will learn prosecution strategies, innovative investigation techniques, and intelligence collection platforms that are utilized in successful violent crime investigations.
Federal Firearm Licensee Burglaries| Special Agent Patrick Hand, Columbus Field Division
This course is designed to increase the participants understanding of ATF’s policy related to FFL Burglaries/Thefts. It discusses the relevant roles of the ATF Special Agent, Industry Operations Investigator, Intelligence Research Specialist, Task Force Officers, and other state and local participants. Several case studies are used to demonstrate the techniques and strategies used to investigate these FFL Burglaries/Thefts.
RICO - Enhancing Gang Prosecution| Special Agent Richard Boehning, Houston Field Division
This course is designed to illustrate the proper application of federal racketeering statutes for gang prosecutions. This presentation focuses on the Aryan Brotherhood of Texas prison gang. This case study will discuss the development of the Aryan Brotherhood Task Force, strategies employed for successful prosecution, and lessons learned in this multi-year investigation. The Aryan Brotherhood of Texas case resulted in 73 federal defendants charged with a multitude of federal crimes ranging from firearms and narcotics trafficking, to Violent Crime in Aid of Racketeering (VICAR) and Racketeer Influenced and Corrupt Organizations (RICO) conspiracy. Of the 73 defendants, 71 pled guilty and two (2) were convicted at trial, for a 100% conviction rate. Of the 73 convictions, 47 defendants received sentences of 10+ years.
Rollin 60s Crips - A Multi-Faceted Approach to a Street Gang Investigation| Special Agent Joseph Nether, Detroit Field Division
This course demonstrates the benefits of utilizing diverse investigative techniques and collecting intelligence from multiple sources to disrupt and prosecute a street gang. This course will increase the participants understanding of predicate and overt acts and how they are utilized to charge RICO violations. A case study will examine the use of historical information and proactive efforts to collect evidence. Additionally, participants will learn how the effective use of confidential informants, the exploitation of social media and IP addresses, undercover techniques, and cellphone analysis culminated in the successful prosecution of a gang leader.
Social Media - Utilizing Cyberspace for Intelligence Gathering| Eduard J. Ochoa, Operational Investigative Consulting, LLC
This basic Social Media Investigation (SMI) course provides a look into Law enforcement ability to utilize social media as a tool for intelligence gathering, suspect location and evidence gathering. SMI will cover the basics of operating and utilizing social media for any law enforcement related investigation. It will also explore recent techniques and cases that have been taken through the court systems and been proven as usable methods in any investigation.
The Fight After the Fight, Three Rounds and Counting|Officer Ann Marie Carrizales, Stafford Police Department, Texas
The participants of this lecture will learn the value of mental preparedness PRIOR to a critical incident and ways to achieve this vital state of readiness. Participants will also learn how to identify signs of post-traumatic stress and its effects on one’s physical/emotional wellness. Participants will discuss various methods of critical incident stress management and will be provided the VITAL tools needed to win the fight after the fight, which is often the most difficult part of a critical incident.