Webinar Archive

Webinar Archive

250+ on-demand webinars to choose from!


Using Forensic Genetic Genealogy to Solve Serial Sexual Assaults and Sexually Motivated Homicides

Using Forensic Genetic Genealogy to Solve Serial Sexual Assaults and Sexually Motivated Homicides

More and more suspects are identified using the analysis of biological samples collected at a crime scene or developed from the remains of Jane or John Doe combined with traditional genealogical research on potential relatives identified in public DNA databases. Nowhere is this investigative technique more relevant than with a cold case sexual assault homicide, deemed otherwise stagnant.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - Using Forensic Genetic Genealogy to Solve Serial Sexual Assaults and Sexually Motivated Homicides members only.
Login Join Now

Speakers:

DNA and Sexual Assault Kits: A Great Forensic Tool

DNA and Sexual Assault Kits: A Great Forensic Tool

When sexual assault victims/survivors consent to a forensic sexual assault examination, they fully expect that the completed Sexual Assault Kit (SAK) will be submitted by law enforcement to a crime lab to be tested. Sadly, that is not always the case.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - DNA and Sexual Assault Kits: A Great Forensic Tool members only.
Login Join Now

Speakers:

Law Enforcement: What Can the SANE Tell You at the End of the Medical Forensic Examination?

Law Enforcement: What Can the SANE Tell You at the End of the Medical Forensic Examination?

The medical forensic examination is arguably one of the most critical components of a victim-centered response to sexual assault. The exam has two main goals: to treat the survivor of the assault for any medical injuries that may have resulted from the assault and to collect precious evidence that may eventually lead to the arrest, prosecution, and conviction of the offender. At the completion of the examination, the medical forensic report is generated.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - Law Enforcement: What Can the SANE Tell You at the End of the Medical Forensic Examination? members only.
Login Join Now

Speakers:

Only the Faces and Names Change – Witness Intimidation in Intimate Partner Violence Cases

Only the Faces and Names Change – Witness Intimidation in Intimate Partner Violence Cases

Witness intimidation in intimate partner violence cases is a significant problem because offenders use complex interpersonal processes to keep violent relationships intact. Research suggests that as many as 80 percent of cases that reach the court system involve victims that recant or refuse to testify because savvy offenders know how to influence victims. In this environment, what can communities do to improve case outcomes, hold offenders accountable, and ensure victim safety?

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - Only the Faces and Names Change – Witness Intimidation in Intimate Partner Violence Cases members only.
Login Join Now

Speakers:

A Victim-Centered Approach to Elder Abuse Investigations

A Victim-Centered Approach to Elder Abuse Investigations

One in ten adults over the age of 60 has experienced one or more forms of abuse – physical or sexual assault, neglect, or financial exploitation. However, communities often struggle to identify, respond to, and prevent elder abuse. Ineffective response can result from lack of training for law enforcement, prosecutors, and court staff. It may also be due to lack of coordination across systems and disciplines. Factors such as ageism, family dynamics, fear, isolation, health concerns, and financial constraints can impair an older victim’s ability or willingness to report abuse. Furthermore, in many communities, there is a lack of funding to address elder abuse and provide services to victims.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - A Victim-Centered Approach to Elder Abuse Investigations members only.
Login Join Now

Speakers:

Digital Violence: Understanding Trauma-informed Methods of Care

Digital Violence: Understanding Trauma-informed Methods of Care

What is digital violence and what does it look like when we're reliant on technology to stay connected? This session will help service providers better understand digital violence and the trauma impact on those who have experienced it. Trauma from digital violence often goes unrecognized due to providers lack of assessment and understanding. This training helps to identify tech facilitated abuse and understand it within the lens of gender-based violence. The mental health impact of being abused through digital methods and platforms can have devastating effects on a person’s global functioning, including their ability to communicate through technology. For those who have suffered online abuse, connecting through digital methods can reactivate trauma symptoms and destabilize them in personal and professional settings.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - Digital Violence: Understanding Trauma-informed Methods of Care members only.
Login Join Now

Speakers:

Utilizing Technical Evidence in Stalking Investigations and Prosecutions

Utilizing Technical Evidence in Stalking Investigations and Prosecutions

This presentation covers the applicable rules of evidence and relevant case law associated with proving a technology-facilitated stalking case and will provide strategies on when and how to introduce technical evidence and overcome common objections at trial.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - Utilizing Technical Evidence in Stalking Investigations and Prosecutions members only.
Login Join Now

Speakers:

Getting to “Guilty”: Guiding the Jury’s Response to the Evidence

Getting to “Guilty”: Guiding the Jury’s Response to the Evidence

This presentation will suggest ways to focus the jury’s attention on the evidence in a manner that accurately conveys the reality of sexual assault and assists jurors in rendering a fair and just verdict – beginning with jury selection and continuing through opening statement, presentation of evidence, and summation.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - Getting to "Guilty": Guiding the Jury's Response to the Evidence members only.
Login Join Now

Speakers:

An Electronic Life – How to Destroy a Life through Sextortion

An Electronic Life – How to Destroy a Life through Sextortion

This workshop will address the case of State of Connecticut v. Christopher Lamb, and how a single person can devastate numerous lives through a few keystrokes. In this case, the defendant hacked into and took over the cloud storage and social media accounts of over 20 teenage victims, through exploiting his friendship with the victims and simple social engineering.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - An Electronic Life - How to Destroy a Life through Sextortion members only.
Login Join Now

Speakers:

Detection and Visibility of Bruises using Alternate Light: From Science to Practice

Detection and Visibility of Bruises using Alternate Light: From Science to Practice

In this presentation, the presenters will review the science behind alternate light and bruising. They will also present the major findings of a recent National Institute of Justice funded, multi-site, randomized controlled trial comparing alternate light to white light (i.e., normal examination lighting) in the visualization of bruises. The knowledge generated from this study objectively demonstrates that using alternate light improves the detection and visibility of potential bruises, which increases the scientific and evidentiary validity of alternate light findings.

This content is for Individual - Monthly, Individual - Annual, Individual - Lifetime, Agency - Bronze (1-10 Users), Agency - Silver (11-25 Users), Agency - Gold (26-50 Users), Agency - Platinum (51-500 Users), and Lifetime Access - Detection and Visibility of Bruises using Alternate Light: From Science to Practice members only.
Login Join Now

Speakers: