CONFERENCE GOALS
ACCREDITATIONS
Seminar attendees have the opportunity to acquire up to twenty (20) nationally-recognized NASBA and Texas DPS-approved CEs. All attendees will be provided with documentation and a conference completion Certificate. This Seminar will also provide 18 hours toward the completion of the Board Certified Investigative Professional (BCIP) charter class.
RECOMMENDED ATTENDEES
At this event you will join and network with private investigators, law enforcement officers, attorneys, forensic specialists and and other persons allied to the investigative, security and law enforcement professions. Attendees will have hands-on exposure to critical Subject Matter Experts (SMEs) and cutting-edge tactics, techniques, sources, products and services. Our goal is to enhance your professional standing and skills.
Number of participants is limited!
Don't miss out on this critical skills Seminar.
Our World Class Speakers
Mindy Montford
Michael Coble
Mitch R. Morrissey
Robert Kowalkowski
Trampas Gooding
Dianna Strain
Rosalva (Rosie) Baez
Amy Lenertz
Helen G
Steven Rambam
December 2024 TRAINING AGENDAThat's not all, more details on the schedule page
Video:
“Rm9sbG93ZXJz” is an award-winning and hugely entertaining episode from the eleventh season of the science fiction television series “The X-Files”. This 1-hour episode was shockingly ahead of its time and has become a cult favorite in the hacker and IT communities. It depicts Artificial Intelligence, intelligent drones, networked devices, the “Internet of Things” and uncontrolled levels of automation that were, at that time, only aspirational, but today are becoming reality.
(Note: the episode’s title is Base64 code for “Followers” and the tagline for this episode is “VGhlIFRydXRoIGlzIE91dCBUaGVyZQ==”, which translates to “The Truth Is Out There” in Base64.)
Presentation:
This video will be followed by an updated “Digital Officer Safety” presentation.
This seminar has been developed by investigative professionals for investigative professionals and consists of hand-on “weapons familiarization” to address real-word situations. If you are an Investigator, Law Enforcement Officer or undercover operative, or if you work in any type of physical security or cyber/IT security function or routinely conduct risk management or due-diligence activities, this is a “must attend” event.
Attendees will be introduced to unique methods for gathering and using personal / sensitive information and subject biographical data. This seminar will also discuss how proprietary online databases are merged with public records, and OSINT (Open Source Intelligence) sources, to support “skip trace”, background, character, due diligence, criminal, civil and asset-location investigations. Especially, this seminar will discuss little-know, but extremely prevalent, technologies and methods now routinely used, sometimes maliciously, to gather not just routine investigative and personal information, but also character, habits, hobbies, beliefs and “psychographics” of a subject.
This seminar will especially focus on newer technologies that are facilitating complete negation of privacy and anonymity, including facial recognition / biometrics, IOT devices, smart homes, smart cars, AI and plugins/scripts that can provide any member of the general public with the ability to gather unprecedented types and amounts of personal data on an Investigator.
No prior training or experience is necessary to attend.
Exploitation of information received from volunteer subjects will be demonstrated.
This seminar is not open to the general public. Law Enforcement, licensed professionals and verified FOI members and members of allied professions only. For questions regarding eligibility to attend, please contact the event coordinators.
Presenter:
Steven Rambam has been an investigative and security professional for more than 40 years and is the founder of Pallorium, Inc. Steven specializes in international and multi-jurisdictional investigations, investigations of sophisticated frauds and missing person investigations, including hundreds of insurance-related homicide and “death claim” investigations. Pallorium has coordinated investigations in more than fifty (50) countries, and in nearly every U.S. State and Canadian province.
Steven is a recognized Subject Matter Expert (SME) and well-known presenter on the topics of OSINT, “tech tracking” and investigative / security technologies. Steven has conducted training on those topics for federal and local law enforcement, and private investigative, security and IT security professionals and educational institutions.
Steven’s “Privacy Is Dead – Get Over It” and OSINT seminars have been attended by more than 100,000 participants and his talks at “HOPE” and other IT conferences have also been viewed or downloaded by millions of subscribers. “Rambam’s First Law” which states ”All databases will eventually be used for unintended purposes” is now a hacker and IT axiom.
Steven coined the term “Digital Officer Safety” in 2008, during training at a law enforcement “undercover academy”.
Presenters: Mitch Morrissey; Mindy Montford; Trampas Gooding; Michael Coble; Dianna Strain
In the combined histories of law enforcement, investigations, security, civil disputes and resolving familial issues, no forensic or investigative technology has had a more dramatic effect on obtaining truthful results than the forensic use of Deoxyribonucleic acid, better known as DNA.
DNA facilitates identification of completely unknown perpetrators of crimes and then provides “one in 200 trillion” incontrovertible forensic evidence to convict them.
DNA frees the wrongfully convicted and, along the way, exposes deficiencies in evidence that for decades was used to win false convictions. Hair and fiber comparisons, blood spatter, bite marks, burn patterns, shoe and tire impressions, handwriting analysis and more have been revealed again and again to be inaccurate or even quackery.
DNA has shown that the “gold standard” of testimony, eyewitness identification, is often unreliable. And, worse, that innocent people often confess. (1)
And, by making certain that the correct, guilty perpetrators of crimes are put in jail, DNA performs the truly inestimable function of making certain that those criminals are not able to continue to offend and harm society. Even with “minor” or “nonviolent” crimes, use of DNA to identify perpetrators has a major impact on society. Use of DNA at property crime (burglary, auto theft, etc.) scenes, for example, has been shown to extraordinarily increase cleared cases. (2) As active burglars average 100-200 burglaries per year – and may perpetrate other crimes, such as sexual assault – upon people they encounter, for each year a “professional” burglar or active car thief is in jail, numerous felonies are not perpetrated by that individual. (3)
As forensic efficiency increases and public and private DNA databases grow exponentially, DNA evidence can reach back decades or generations to bring justice and closure to victims, reunite families and give names to the abandoned, living and dead.
Seminar attendees can expect to obtain a basic and deployable understanding of gathering and investigative use of DNA, a critical skill for investigative and security professionals.
No prior training or experience is necessary to attend.
Exploitation of information received from volunteer subjects will be demonstrated.
____________________________________
(1. According to the National Registry of Exonerations in the United States, 27% of those on the registry who were accused of homicide, but were later exonerated, gave false confessions. However, 81% of people with mental illness or intellectual disabilities also confessed when accused of homicide.
2. In one jurisdiction clearance rates rose from 11% to 41%. In Minnesota, when DNA was found at a property crime scene, scientists matchws it to a known offender’s sample in CODIS, the national DNA database, more than 70 percent of the time (per the Star Tribune newspaper).
3. The Denver DNA Burglary Project reported that when DNA evidence was used in burglary cases, the prosecution filing rates increased by a factor of eight and the average prison term of those convicted rose from 1.4 years to 14 years.)
Presenters: Mitch Morrissey; Mindy Montford; Trampas Gooding; Michael Coble; Dianna Strain
Continuation of DNA – From the Crime Scene through the Investigation to the Courtroom
Presenters: Mitch Morrissey; Mindy Montford; Trampas Gooding; Michael Coble; Dianna Strain
Continuation of DNA – From the Crime Scene through the Investigation to the Courtroom
“How to Become A Texas Notary Public”
Presenter: Rosalva “Rosie” Baez
Asst. Vice President of Operations
The American Association of Notaries
Although it is no longer necessary in Texas for affidavits to be sworn to before a Notary Public (see: https://statutes.capitol.texas.gov/Docs/CP/htm/CP.132.htm) a Texas Notary Public Commission is still a useful credential for many investigative professionals.
The Texas Secretary of State describes a Notary Public as “…a public servant with statewide jurisdiction who is authorized to take acknowledgments, protest instruments permitted by law to be protested (primarily negotiable instruments and bills and notes), administer oaths, take depositions, and certify copies of documents not recordable in the public records. A Notary Public is, in the true sense of the word, “a public servant” and “an officer of the State of Texas”, conveniently located in the community so that the notary may be of service to the public. … The primary duty of a Notary Public is to show that a disinterested party (the Notary Public) has duly notified the signer of an instrument as to the importance of such document, and the signer of such document has declared that the signer’s identity, signature, and reasons for signing such instrument are genuine. The signature and seal of a Notary Public do not prove these facts conclusively, but provide prima facie proof of them, and allow persons in trade and commerce to rely upon the truth and veracity of the Notary Public as a third party who has no personal interest in the transaction. …”. (Notary Public Educational Information, https://www.sos.texas.gov/statdoc/edinfo.shtml )
In this presentation, Ms. Baez will describe how to become a Notary Public in Texas, including discussing the qualifications, notary bond requirements, and associated costs. This presentation will also cover the importance of correct use of the notary stamp and maintaining accurate records of notarial acts, as mandated by Texas law, and details of Notaries’ authorized duties and prohibited acts.
Ms. Baez will discuss resources to assist with the Texas Notary application process (which is undergoing some significant changes) and how Notaries can safeguard themselves from potential legal issues through proper practices and suitable insurance options.
(This presentation is being provided as a professional courtesy by The American Association of Notaries, the largest Texas notary organization, at the specific request of the Fraternal Order of Investigators, solely to benefit our membership. There is no commercial relationship of any kind between The American Association of Notaries and the Fraternal Order of Investigators.)
(3.0 CEs)
Instructors: Steven Rambam, Robert Kowalkowski, Helen G.
Knowledge of data sources and access methods is a investigative necessity, yet many investigative professionals are substantially unaware of billions of online records containing PII, location history, personal backgrounds, multi-generational family details, relationships, associates, key personal events (ex. marriage, birth, death), military history and more, covering (at least) the past 50-100 years to the present. These records can contain USA and foreign information and initial leads not available elsewhere.
During this 3-hour seminar component, participants can expect to gain a working knowledge of unique online genealogical and “person” sources and records and how to search for and access those records. Actual cases resolved by these data sources will be reviewed. Exploitation of information received from volunteer subjects will be demonstrated. Attendees are invited to bring actual subjects’ information for processing and demonstration purposes.
Sources and methods discussed in this seminar will be immediately deployable by most attendees.
No prior training or experience is necessary to attend.