Skip to main content

Justice Information Sharing

Webinar – Using Social Media for Recruiting: Targeted Messaging in Law Enforcement

Throughout the nation, law enforcement organizations use a variety of strategies to recruit qualified applicants. Despite these efforts, many organizations struggle to fill vacancies. This issue may, in part, relate to reliance on outdated recruiting methods. Social media has transformed the way in which organizations in other fields market to customers and potential employees alike. While some law enforcement organizations use social media, few organizations leverage research to develop tailored social media marketing strategies.

Access the Police Executive Research Forum’s Report on Combatting Human Trafficking

Published: Sep 22, 2020 - Last updated: Jan 31, 2025

In August 2020, the Police Executive Research Forum (PERF) released the report “How Local Police Can Combat the Global Problem of Human Trafficking: Collaboration, Training, Support for Victims, and Technology Are Keys to Success.” The report was developed from PERF’s Critical Issues in Policing conference held on August 5, 2019, where approximately 200 individuals from backgrounds in anti-trafficking participated in dynamic discussions on the issue.

Webinar – Part II: Now That You’ve Got it and Can Read It, What Can You Do With It?

Join AEquitas, in partnership with the Denver District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Webinar – Part I: The Investigative Stage—Recognition, Collection, Search

Join AEquitas, in partnership with the Denver, Colorado District Attorney’s Office, for a two-part webinar that will explore the scope of data available from sources of digital evidence and strategies on how such data can effectively be identified and preserved with forensically sound practices. Presenters will discuss theories of admission, rules of evidence, and “real life” examples to demonstrate how to properly obtain, search, authenticate, and introduce digital evidence in court proceedings.

Attend a Two-Part Webinar Series on Collecting and Analyzing Digital Evidence

Published: Sep 17, 2020 - Last updated: Aug 2, 2021

Join AEquitas and the Denver, Colorado District Attorney’s Office for a two-part webinar series on effectively collecting and using digital evidence. “Part I: The Investigative Stage—Recognition, Collection, Search” will take place on September 18, 2020 at 1:00 p.m. ET and will focus on properly obtaining digital evidence.

Webinar – “Police Report Writing in Tribal Domestic and Sexual Assault Cases”

Join TA2TA on September 21, 2020 for their free law enforcement training on “Police Report Writing in Tribal Domestic and Sexual Violence Cases.” Dr. James D. Diamond, Dean of Academic Affairs at the National Tribal Trial College, will provide practical tips on documenting witness and suspect statements, overcoming hearsay, and diagramming the crime scene to increase successful prosecution and conviction rates. This one-hour course is sponsored by the U.S.

Attend the “Police Report Writing in Tribal Domestic and Sexual Assault Cases” Webinar

Published: Sep 15, 2020 - Last updated: Sep 29, 2021

Join TA2TA for their “Police Report Writing in Tribal Domestic and Sexual Assault Cases” webinar on September 21, 2020 at 12:00–1:00 p.m. ET. Attendees will learn “practical tips on documenting witness and suspect statements, overcoming hearsay, and diagramming the crime scene to increase successful prosecution and conviction rates.”  

This webinar is intended for individuals serving American Indian/Alaska Native survivors of sexual violence.

Technical Detection Methods for Insider Risk Mitigation Part 2

Effective insider risk mitigation requires the collection, aggregation, and analysis of data from a multitude of data sources within an organization. In this webinar, the presenter will provide an overview of the current state of the practice in technical detection methods for insider risk mitigation and present strategies organizations can use to protect their critical assets from insider misuse. 

Presented by Dan Costa, Technical Manager, CERT National Insider Threat Center

Building an Effective Insider Risk Management Program Part 1

This session will discuss strategies for building, implementing, and operating an effective insider risk management program that is integrated into an organization-wide enterprise risk management strategy. Best practices will be discussed addressing prevention, detection, investigation, and response strategies to reduce the risk of malicious and non-malicious insiders impacting the critical assets of your organization. 

Presented by Randy Trzeciak, Director National Insider Threat Center; CERT Division, Software Engineering Institute

Subscribe to Justice Information Sharing