Download presentation
Presentation is loading. Please wait.
Published byJunior Goodwin Modified over 9 years ago
1
BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 UNIT 1 - 5
2
ADMINISTRATIVE Please complete the BCCO PCT #4 Registration form and turn it in now. Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB). All cell phones off please – pay attention to course materials and show common respect & courtesy.
3
Your Instructor – Course Facilitator and Mentor Trainer 10/7/20153 Deputy Chief George D. Little A.S. & B.S. Criminal Justice & Sociology B.S.CJ Wayland Baptist University, San Antonio M.S. Criminology & Counter-Terrorism University of the State of New York(P) 2012 T.C.O.L.E. Professional Achievement Award Certified Crime Prevention Specialist (C.C.P.S.) TCOLE Basic Instructor Certificate 1984 TCOLE Advanced Instructor 2012 TCOLE Master Peace Officer 1991 MP Special Operations Operator Counter-Terrorism 1988 Military Police Investigations (MPI) & Criminal Investigation Division (CID) Special Agent Graduate Drug Enforcement Administration Academy 1977 43- years Law Enforcement Experience 39-Years Teaching & Instructor Experience
4
COURSE/LESSON OVERVIEW Educational requirements for identity crimes training established by legislative mandate: SB473-(78Reg).
5
UNIT ONE
6
Learning Objectives Learning Objective 1.0 Learning Objective 1.0 : The Participant will be able to recognize the types of identity crimes. Learning Objective 1.1 Learning Objective 1.1 : The Participant will be able to provide a definition of identity crime. Learning Objective 1.2 Learning Objective 1.2 : The Participant will be able to identify types of crimes associated with identity crimes.
7
Learning Objective 1.3 Learning Objective 1.3 : The Participant will be able to list personal and financial identifiers. Learning Objective 1.4 Learning Objective 1.4 : The Participant will be able to identify currents trends associated with identity crimes. Learning Objectives
8
1.0 Defining Identity Crimes
9
1.1 Participant will be able to recognize the types of identity crime According to the Federal Trade Commission (FTC): 31,000 persons were victims of identity crime in 2000. During the first seven months of 2003, 131,000 Americans were victimized
10
If trends continue, by the end of 2003, those victimized will have increased almost 700% in three years. fifthTexas is fifth in the nation in the number of instances of identity crime reported to the FTC.
11
2013 Statistics Total financial loss attributed to identity theft $24,700,000,000 64.1% Misuse of Existing Credit Card 64.1% 35% Misuse of Existing Bank Account 35% 14.2% Misuse of Personal Information 14.2%
12
Identity Fraud & Incident Rate 20114.9% 20104.35% 20096% 20085.44% 20074.51% 20064.71% 20055.04%
13
1.1The student will be able to provide a definition of identity crime A.Identitycrimetheft A. Identity crime is the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.
14
B. B. Types of identity crimes include; theft 1. identity theft, creditcard 2. credit card /access device fraud (“skimming”), check 3. check fraud, bank 4. bank fraud, identification 5. false identification fraud, and passport 6. passport /visa fraud. 1.1The student will be able to provide a definition of identity crime – Cont’d
15
1.2The student will be able to identify types of crimes associated with identity crimes facilitator In many instances an identity crime is used as a facilitator, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking
16
homicide, terrorism, wire fraud, or computer crime/Internet intrusions. crimes Identity crimes can begin with other seemingly unrelated crimes such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash (“dumpster diving”), or theft of documents or information from businesses, medical facilities, hotels, etc.
17
1.3 The student will be able to list personal and financial identifiers Personal identifiers include Personal identifiers include: 1.name, 2.date of birth, 3.social security number, 4.address,
18
Personal identifiers include – Cont’d: 5.phone number, 6.driver’s license number, 7.passport number, 8.mother’s maiden name, etc. 1.3 The student will be able to list personal and financial identifiers – Cont’d
20
Financial identifiers include Financial identifiers include: 1.credit card numbers, 2.bank account numbers, 3.personal identification numbers (“PINs”), 4.insurance account numbers, etc. 1.3 The student will be able to list personal and financial identifiers – Cont’d
21
1.1.4 The student will be able to identify currents trends associated with identity crimes technologies Some of the current trends associated with identity theft involve the usage of current technologies. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes.
22
Some of the more recent scams involve stealing information by; cellularphones 1.listening in on conversations made on cellular phones, faxese-mails 2.surreptitiously reading other people’s faxes and e-mails,. 1.1.4 The student will be able to identify currents trends associated with identity crimes
24
Some of the more recent scams involve stealing information by; 3.hacking 3.hacking into computers, telephone 4.conducting telephone and e-mail scams, and shopping banking 5.taking advantage of careless consumers’ online shopping and banking. 1.1.4 The student will be able to identify currents trends associated with identity crimes – Cont’d
25
HACKER
26
Currently, the Identity Theft Resource Center, www.idtheftcenter.org, is an excellent website for obtaining information on new trends, scams and consumer alerts on identity crimes. 1.1.4 The student will be able to identify currents trends associated with identity crimes
27
Questions?
28
28 DEFINE & PROCESS Process: Define 1.0: Define 1.0: Explain some current identity crime statistics
29
29 DEFINE & PROCESS Process: Define 1.1: Define 1.1: Explain and define identity crimes
30
30 DEFINE & PROCESS Process: Define 1.2: Define 1.2: Explain some types of crime identified with identity crimes.
31
31 DEFINE & PROCESS Process: Define 1.3: Define 1.3: Explain some personal and financial identifiers associated with identity crime
32
32 DEFINE & PROCESS Process: Define 1.4: Define 1.4: Explain current trends associated with identity crimes.
33
TAKE A 10-MINUTE BREAK
34
UNIT TWO How identity crime occur
35
Learning Objectives Learning Objective 2.0 Learning Objective 2.0 : The Participant will be able to recognize how identity crime occurs. Learning Objective 2.1 Learning Objective 2.1 : The Participant will be able to identify how identity crime is commonly perpetrated. Learning Objective 2.2 Learning Objective 2.2 : The Participant will be able to identify techniques used to procure false identification.
36
2.1. How identity crime is commonly perpetrated A. A. Identity crimes can occur if someone steals your wallet, purse, briefcase, etc., containing your 1.identification 1.identification, 2.socialsecurity 2.social security card, 3.credit 3.credit cards, 4.bankcardscheckbook 4.bankcards or checkbook.
38
B. B. Identity crimes can occur if someone steals your 1.mail 1.mail, statements 2.especially your bank and credit card statements, credit 3.pre-approved credit offers, checks 4.new checks, or 5.tax 5.tax information. 2.1. How identity crime is commonly perpetrated – Cont’d
40
C. changeaddress C. Identity thieves can complete a “ change of address form” to divert your mail to another location. D. dumpster D. Identity thieves may rummage through your trash or the trash of businesses to find personal data (also known as “ dumpster diving”). 2.1. How identity crime is commonly perpetrated – Cont’d
41
E. landlordemployer E. Identity thieves may fraudulently obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for (and legal right to) the information. F. personal F. Identity thieves can find personal information in your home. 2.1. How identity crime is commonly perpetrated – Cont’d
42
G. Internet G. Identity thieves may obtain personal information that you share on the Internet. 2.1. How identity crime is commonly perpetrated – Cont’d
43
H. business record H. Identity thieves can get information from the workplace, in a practice known as “ business record theft,” by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by “hacking” into electronic files. 2.1. How identity crime is commonly perpetrated – Cont’d
45
I. shouldersurfing I. Some identity thieves also engage in “ shoulder surfing ”: looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine. 2.1. How identity crime is commonly perpetrated – Cont’d
47
I. (Cont’d): spycameras I. (Cont’d): This practice has gone high-tech, with some thieves utilizing hidden “ spy cameras ” positioned near ATMs to observe or record people as they enter their PINs. 2.1. How identity crime is commonly perpetrated – Cont’d
48
J. spoofing J. Many criminals who want to obtain personal data from people online use a technique known as “ spoofing ”: the creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites. 2.1. How identity crime is commonly perpetrated – Cont’d
50
J. (Cont’d) websites J. (Cont’d) Consumers receive e- mails from thieves claiming to be legitimate businesses, and are directed to websites that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data. 2.1. How identity crime is commonly perpetrated – Cont’d
52
J. (Cont’d): actually have no connection with those businesses J. (Cont’d): The thieves sending the e-mails or running the websites actually have no connection with those businesses, and their sole purpose is to obtain the consumers’ personal data so that they can engage in various fraud schemes. 2.1. How identity crime is commonly perpetrated – Cont’d
53
2.2 Techniques used to procure false identification bookstoresInternet step-by-step instructions on techniques for producing false documents A wide variety of sources, including bookstores and Internet retailers, provide publications that give criminals step-by-step instructions on techniques for producing false documents.
55
Some of the resources that are available to criminals who want to create false documents. Examples: www.paladin-press.com Gun shows The Modern Identity Changer by Sheldon Charrett, ISBN 0-87364-946-X #IDENTITY 2.2 Techniques used to procure false identification
56
Questions?
57
57 DEFINE & PROCESS Process: Define 2.0: Define 2.0: Explain how identity crimes occur
58
58 DEFINE & PROCESS Process: Define 2.1: Define 2.1: Explain how identity crime is commonly perpetrated
59
59 DEFINE & PROCESS Process: Define 2.2: Define 2.2: Explain Techniques used to procure false identification.
60
TAKE A 10-MINUTE BREAK
61
UNIT THREE LAWS
62
Learning Objectives Learning Objective 3.0 Learning Objective 3.0 : The Participant will be able to recognize the legal aspects of identity crimes. Learning Objective 3.1 Learning Objective 3.1 : The Participant will be able to identify the federal statutes dealing with identity crimes. Learning Objective 3.2 Learning Objective 3.2 : The Participant will be able to identify the state statutes dealing with identity crimes.
63
Learning Objective 3.3 Learning Objective 3.3 : The Participant will be able to define the term “security alert,” according to the Business Code. Learning Objective 3.4 Learning Objective 3.4 : The Participant will be able to define “security freeze,” according to the Business Code. Learning Objectives
64
3.0 Laws and Statutes Governing Identity Crimes FEDERAL LAWSTATE LAW
65
3.1 Federal Statutes dealing with Identity Crime Federal law 18 U.S.C. § 1028 Federal law: 18 U.S.C. § 1028 – Identity Theft and Assumption Deterrence Act
66
3.2 state statutes dealing with identity crimes Penal Code 32.51 Fraudulent Use or Possession of Identifying Information State Law: Penal Code 32.51 – Fraudulent Use or Possession of Identifying Information (State Jail Felony)
67
Business and Commerce Code, Chapter 20 Business and Commerce Code, Chapter 20 - Regulation of Consumer Credit Reporting 3.2 state statutes dealing with identity crimes
68
Code of Criminal Procedure, Article 55.02, Sec.2a Code of Criminal Procedure, Article 55.02, Sec.2a – Procedure for Expunction
69
3.3 Define the term “security alert,” according to the Tx-BC. SecurityAlert Security Alert – means a notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer’s identity may have been used without the consumer’s consent to fraudulently obtain goods or services in the consumer’s name.
70
3.4 Define “security freeze,” according to the Business Code Security Freeze Security Freeze – means a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer.
71
Questions?
72
72 DEFINE & PROCESS Process: Define 3.0: Define 3.0: Explain the legal aspects of identity crimes.
73
73 DEFINE & PROCESS Process: Define 3.1: Define 3.1: Explain the federal statute dealing with identity crimes
74
74 DEFINE & PROCESS Process: Define 3.2: Define 3.2: Explain Texas Laws and statutes dealing with identity crimes
75
75 DEFINE & PROCESS Process: Define 3.3: Define 3.3: Explain and define the term security alert according to the Business Code.
76
76 DEFINE & PROCESS Process: Define 3.4: Define 3.4: Explain and define the term security freeze according to the Business Code.
77
TAKE A 10-MINUTE BREAK
78
UNIT FOUR Identity Theft Crime Report
79
Learning Objectives Learning Objective 4.0 Learning Objective 4.0 : The Participant will be able to request information needed for an ID crime offense report. Learning Objective 4.1 Learning Objective 4.1 : The Participant will be able to list information needed for an ID crime offense report. Learning Objective 4.2 Learning Objective 4.2 : The Participant will be able to identify the governmental and business entities that are notified in identity crimes.
80
4.0 Prosecuting Identity Crimes
81
4.1 Request information needed for an ID crime offense report. How to request information needed for an ID crime offense report.
82
4.1 List information needed for an ID crime offense report. written report because credit bureaus require a police report in order to block fraudulent information Taking a written report is vital to the victim(s) because credit bureaus require a police report in order to block fraudulent information and to begin repairing the victim’s credit reports.
83
many financial institutions require a police report with an affidavit of fraud In addition, many financial institutions require a police report with an affidavit of fraud. Refer to your “Identity Crime Incident Detail Form” (Appendix A). 4.1 List information needed for an ID crime offense report – Cont’d.
84
crime incident form Have the (class participants as a crime victim) fill out an identity crime incident form (Appendix A). 4.1 Practical Exercise
85
This document provides the officer - investigator with detailed information to: Understand the type of incident that occurred, investigative Organize the investigative case, evidence Determine where evidence might be found, 4.1 List information needed for an ID crime offense report.
86
This document provides the officer/investigator with detailed information to – Cont’d: theory Develop a theory of how the identity theft occurred, and financial Determine what financial institutions should be contacted in the course of the investigation. 4.1 List information needed for an ID crime offense report.
87
bank and credit card statements, letters from creditors, merchant account statements Ask the victim to begin gathering documentation (bank and credit card statements, letters from creditors, merchant account statements, etc.) 4.1 List information needed for an ID crime offense report.
88
Ask the victim to obtain credit reports from the three major Credit Bureaus EquifaxEquifax, ExperianExperian, and Trans UnionTrans Union and voluntarily give them to you. 4.1 List information needed for an ID crime offense report.
89
voluntarily If not given voluntarily by the victim, a subpoena is needed from the courts to obtain victim credit histories. 4.1 List information needed for an ID crime offense report.
90
4.2 Governmental and business entities that are notified in identity crimes. A.FBI investmentinsurance A.F ederal B ureau of I nvestigation – Notify if an identity crime is used to commit a bank fraud, governmental fraud or in furtherance of an investment scheme, insurance fraud, etc. involving losses over one hundred thousand dollars ($100,000).
91
B.SecretService takeover B. U. S. Secret Service – Notify if there is any custody arrest of individuals associated with identity crime or identity takeover. This would involve the seizure or recovery of any amount of identity crime devices, equipment, or products such as skimmers (small electronic devices 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
93
B. B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
94
B. B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
96
C. C. U. S. Postal Service – Notify if an individual is taken into custody for committing a financial crime involving the U.S. mail. Postal inspectors will respond to violations relating to identity crime, forgery, credit cards and checks, mail theft, mail fraud, and Internet fraud (when the scheme involves use of the U.S. mail). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
97
D. Social Security Administration – Notify if the misuse of a social security number involved social security program fraud, or if there is either a significant financial loss to an individual or institution, or a significant number of counterfeit social security cards are seized. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
98
E. E. Federal Trade Commission – Have identity crime victims file a report with the Federal Trade Commission (Appendix B). Encourage them to use the FTC website (www.consumer.gov/idtheft 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
99
E. Cont’d: E. Federal Trade Commission – Cont’d: At the website, victims can file an online complaint and obtain helpful information such as a victim’s guide (”When Bad Things Happen to Your Good Name”) and the FTC Sample Affidavit. The FTC also has a hotline: 1-877-IDTHEFT (1-877-438-4338). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
100
F. 512-424-2000 (www.txdps.state.tx.us/contact.htm). F. Texas Department of Public Safety - This agency is responsible for the issuance of state driver’s licenses and identification cards. It is also responsible for the storage and expunction of criminal records. Contact the Texas Department of Public Safety at 512-424-2000 and online (www.txdps.state.tx.us/contact.htm). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
101
Other state and local agencies may provide additional assistance with investigating identity crimes. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
102
fraudalert stop additional fraud G. Consumer Credit Reporting Agencies – Tell victims to have a “ fraud alert ” placed on their credit reports. The fraud alert will show up on their credit report when companies make inquiries about their credit and may stop additional fraud. The three major credit-reporting agencies are: 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
103
G. Consumer Credit Reporting Agencies – Cont’d: EXPERIAN 1-888-397-3742 www.experian.com TRANS UNION 1-800-680-7289 www.transunion.com EQUIFAX 1-800-525-6285 www.equifax.com 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
104
H. suspicions H. Financial Institutions (e.g., banks, credit card companies, financial advisors) – Advise the victims to contact their financial institutions to report any suspicions of identity crime. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
105
H. H. – Cont’d: passwords The financial institution can check to see if there has been any unusual activity. Victims should establish passwords for their accounts. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
106
I.Utility I.Utility Companies (e.g., power, water, phone, and cable companies, etc.) – Victims may want to contact their utility companies to report instances of possible identity crime. unusual account activity The utility companies can check for any unusual account activity. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d
107
Questions?
108
108 DEFINE & PROCESS Process: Define 4.0: Define 4.0: Explain how to request information needed for an ID Crime Offense Report
109
109 DEFINE & PROCESS Process: Define 4.1: Define 4.1: Explain (list) information needed for a Crime Offense Report.
110
110 DEFINE & PROCESS Process: Define 4.2: Define 4.2: Explain what government and business entities that are required to be notified in Identity Crimes.
111
TAKE A 10-MINUTE BREAK
112
UNIT FIVE
113
Learning Objectives Learning Objective 5.0 Learning Objective 5.0 : The Participant will be able to recognize techniques for educating victims and the public on identity crime. Learning Objective 5.1 Learning Objective 5.1 : The Participant will be able to identify techniques for educating victims and the public on identity crime.
114
Learning Objective 5.2 Learning Objective 5.2 : The Participant will be able to list guidelines for personal protection against identity crime. Learning Objective 5.3 Learning Objective 5.3 : The Participant will be able to list the steps to take if identity crime occurs. Learning Objectives
115
5.0 Identity Crimes Prevention Techniques for educating victims and the public on identity crime.
116
5.1 Techniques for educating victims and the public on identity crime. proactive Law enforcement agencies should be proactive in their approach to educating the public about identity crime. Current techniques used to educate the public about other crimes can be used to facilitate information on identity crime.
117
communitypolicing Some of these techniques may include public service announcements (PSAs), community policing involvement, etc. Law enforcement agencies can make use of the vast amount of information already available on the Internet to guide the public and victims of identity crime. 5.1 Techniques for educating victims and the public on identity crime.
118
5.2 Guidelines for Personal Protection against identify crime aware Emphasize the fact that the more a person becomes aware about his/her financial records the better prepared he/she will be if they become a victim of identity crime.
119
Inform the public that they should: information 1. Not give out personal information over the phone or on the Internet - this includes their social security number, driver’s license number, date of birth, place of birth, home address, mother’s maiden name, and any passwords. 5.2 Guidelines for Personal Protection against identify crime – Cont’d
120
Inform the public that they should: checks do not put your driver’s license, identification card or social security number on your checks 2.Limit the amount of personal information on their checks - it is recommended that you do not put your driver’s license, identification card or social security number on your checks 5.2 Guidelines for Personal Protection against identify crime – Cont’d
121
Inform the public that they should: credit 3.Check credit histories and bank records frequently and look for signs of inaccurate or suspicious activity banking 4.Keep detailed records of banking, check writing, credit card use, and ATM use 5.2 Guidelines for Personal Protection against identify crime – Cont’d
122
Inform the public that they should: carboncopies 5.Destroy carbon copies of credit card receipts shredder 6.Purchase a home shredder or completely destroy any item that may have personal identifiers rather than discarding them in the trash 5.2 Guidelines for Personal Protection against identify crime – Cont’d
124
Note: Note: Some insurance companies offer optional coverage to their policyholders to assist them with certain expenses incurred if they become victims of identity crime. 5.2 Guidelines for Personal Protection against identify crime – Cont’d
126
Monitoring ScanningRespondingGuaranteeTracking
127
5.3 Steps to take if Identity Crime occurs Refer to participant handout “ID Theft Affidavit” (Appendix B). The forms provide victims with detailed instructions on completion and submission of the affidavit. fraud The affidavit should be sent to the companies or businesses where the fraud was perpetrated.
128
5.3 5-STEPS report 1.Notify the police – Make a report. Get the names of the officers you contact and the police report number for your records. specific Be specific as to which kind of identity crime happened, such as bad checks, credit card abuse, or the misuse of your name, driver’s license, or identification card.
129
creditors Cancel credit cards and close your accounts 2.Notify creditors and merchants – Cancel credit cards and close your accounts. Contact the creditors and merchants that are affected. employees you have contact with Get the names of any employees you have contact with, and ask for a reference number on each item that you are disputing 5.3 5-STEPS - Cont’d
130
Change affected bank accounts 3.Notify your banks and financial institutions – Change affected bank accounts. Advise the banks of the situation and find out what is required to clear anything that affects your banking services. This could relate to checks, ATM cards, debit cards, etc. 5.3 5-STEPS - Cont’d
131
credit block 4.Check your credit – Notify the major credit reporting agencies as well as local credit reporting companies, and advise them of your situation. You may be able to request that a block be put on any attempt to gain credit under your name and your date of birth without your confirmation. 5.3 5-STEPS - Cont’d
132
earned income benefits 5.Check with the Social Security Administration – Make sure that earned income benefits are accurate. 5.3 5-STEPS - Cont’d Check to see if there is any action on your social security number that should not be there Check to see if there is any action on your social security number that should not be there.
133
5.Cont’d: Get as much information as you can, and follow through with what is requested of you. 5.3 5-STEPS - Cont’d
134
Questions?
135
135 DEFINE & PROCESS Process: Define 5.1: Define 5.1: Explain techniques for educating victims and public on identity crime.
136
136 DEFINE & PROCESS Process: Define 5.2: Define 5.2: Explain some guidelines for personal protection against identity crime.
137
137 DEFINE & PROCESS Process: Define 5.3: Define 5.3: Explain the steps to take if identity crime occurs.
138
Questions?
139
SOURCES All Course Sources and/or Resources are listed in your Participant Handout IDENTITY CRIMES TCOLE Course # 3277
140
“Knowledge is “POWER” Stay informed, stay SAFE, stay Vigilant & stay Alive”
141
UPCOMING TRAINING Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4 Racial Profiling Course – TCOLE Course #3256 (8-hrs) 8-hrs on Saturday October 4 th, 2014 from 10:30 am to 7:30 pm. Racial Profiling Course – TCOLE Course #3256 (8-hrs) on Friday October 10, 2014 from 8:00 am to 5:00 pm 141 Bexar County Constable’s Office PCT#4 TRAINING SCHEDULE 2014
142
Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4 Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Saturday October 11, 2014 from 10:30 am to 2:30 pm Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Sunday October 12 th, 2014 from 11:00 am to 3:00 pm. Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Friday October 17 th, 2014 from 1:00 pm to 5:00 pm.
143
143 Advanced TCOLE Instructor Course – TCOLE #1017 (40hrs), Day One Saturday November 1 st,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg) Day Two Advanced TCOLE Instructor Course – TCOLE #1017, Day Two Sunday November 2 nd,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg) Day Three Advanced TCOLE Instructor Course – TCOLE #1017, Day Three Friday November 7 th,2014 from 9:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg ) Lesson Presentation preparation time. Instructors available Day Four Advanced TCOLE Instructor Course – TCOLE #1017, Day Four Saturday November 8 th,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)
144
144 Day Five Advanced TCOLE Instructor Course – TCOLE #1017, Day Five & Grad Sunday November 9 th, 2014 from 11:00 am to 6:00 pm – Presentations, Final Test & Graduation (Deputy Chief G. D. Little and Dep. Constable R. Berg ) HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 8-hrs on Saturday November 15 th, 2014 from 10:00 am to 6:00 pm. HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Thursday December 4th, 2014 from 1:00 am to 5:00 pm HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Friday December5th, 2014 from 1:00 am to 5:00 pm KNOWLEDGE IS POWER
145
TAKE A 15-MINUTE BREAK
146
Please complete a course and instructor evaluation form. If you rate 2 or below you must justify on reverse side. Constructive CriticismConstructive Criticism helps all, being negative helps no one. COURSE & INSTRUCTOR EVALUATION Form
147
Exam Graduation THANK YOU & STAY SAFE STAY SAFE
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.