Presentation is loading. Please wait.

Presentation is loading. Please wait.

BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5.

Similar presentations


Presentation on theme: "BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5."— Presentation transcript:

1 BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5

2 ADMINISTRATIVE Please complete the BCCO PCT #4 Registration form and turn it in now. Make sure you sign TCOLE Report of Training (PID#, Full Name and DOB). All cell phones off please – pay attention to course materials and show common respect & courtesy.

3 About Your Instructor Course Facilitator - Mentor George D. Little A.S. & B.S. Criminal Justice & Sociology B.S.CJ Wayland Baptist University, San Antonio M.S. Criminology & Counter-Terrorism University of the State of New York 2012 T.C.L.E.O.S.E. Professional Achievement Award Certified Crime Prevention Specialist (C.C.P.S.) TCLEOSE Basic Instructor Certificate 1984 TCLEOSE Master Peace Officer 1991 MP Special Operations Operator Counter-Terrorism 1988 Graduate Drug Enforcement Administration Academy 1977 43- years Law Enforcement Experience 40-Years Teaching & Instructor Experience

4 COURSE/LESSON OVERVIEW Educational requirements for identity crimes training established by legislative mandate: SB473-(78Reg).

5 UNIT ONE

6 Learning Objectives Learning Objective 1.0 Learning Objective 1.0 : The Participant will be able to recognize the types of identity crimes. Learning Objective 1.1 Learning Objective 1.1 : The Participant will be able to provide a definition of identity crime. Learning Objective 1.2 Learning Objective 1.2 : The Participant will be able to identify types of crimes associated with identity crimes.

7 Learning Objective 1.3 Learning Objective 1.3 : The Participant will be able to list personal and financial identifiers. Learning Objective 1.4 Learning Objective 1.4 : The Participant will be able to identify currents trends associated with identity crimes. Learning Objectives

8 1.0 Defining Identity Crimes

9 1.1 Participant will be able to recognize the types of identity crime According to the Federal Trade Commission (FTC): 31,000 persons were victims of identity crime in 2000. During the first seven months of 2003, 131,000 Americans were victimized

10 If trends continue, by the end of 2003, those victimized will have increased almost 700% in three years. Texas is __________ in the nation in the number of instances of identity crime reported to the FTC.

11 2013 Statistics Total financial loss attributed to identity theft $24,700,000,000 64.1% Misuse of Existing Credit Card 64.1% 35% Misuse of Existing Bank Account 35% 14.2% Misuse of Personal Information 14.2%

12 Identity Fraud & Incident Rate 20114.9% 20104.35% 20096% 20085.44% 20074.51% 20064.71% 20055.04%

13 1.1The student will be able to provide a definition of identity crime A.theft A. _________ ______ is the theft or misuse of personal or financial identifiers in order to gain something of value and/or facilitate other criminal activity.

14 B. B. Types of identity crimes include; 1. identity __________, 2. _______ ______/access device fraud (“skimming”), 3. __________ fraud, 4. ________ fraud, 5. false _______________ fraud, and 6. ______________/visa fraud. 1.1The student will be able to provide a definition of identity crime – Cont’d

15 1.2The student will be able to identify types of crimes associated with identity crimes In many instances an identity crime is used as a _______________, through financing or anonymity, to commit other criminal activities such as mail theft, mail fraud, narcotics/drugs, organized crime, financial fraud (money laundering), mortgage fraud, weapons trafficking

16 homicide, terrorism, wire fraud, or computer crime/Internet intrusions. Identity crimes can begin with other seemingly unrelated _________ such as robbery (e.g. purse snatching or mugging), computer intrusion, mail theft, theft of trash (“dumpster diving”), or theft of documents or information from businesses, medical facilities, hotels, etc.

17 1.3 The student will be able to list personal and financial identifiers Personal identifiers include Personal identifiers include: 1.________, 2.date of __________, 3._________ ___________ number, 4.____________,

18 Personal identifiers include – Cont’d: 5.__________ number, 6.__________ __________ number, 7.____________ number, 8.mother’s maiden name, etc. 1.3 The student will be able to list personal and financial identifiers – Cont’d

19 Financial identifiers include Financial identifiers include: 1.__________ ________ numbers, 2.________ ____________ numbers, 3.personal identification numbers (“PINs”), 4.__________ account numbers, etc. 1.3 The student will be able to list personal and financial identifiers – Cont’d

20 1.1.4 The student will be able to identify currents trends associated with identity crimes Some of the current trends associated with identity theft involve the usage of current ___________. This provides a unique challenge for consumers and law enforcement by testing their ability to keep up with technological advances and changes.

21 Some of the more recent scams involve stealing information by; __________ 1.listening in on conversations made on __________ ____________, ________________ 2.surreptitiously reading other people’s ________ and ________,. 1.1.4 The student will be able to identify currents trends associated with identity crimes

22 Some of the more recent scams involve stealing information by; 3.______________ 3.______________ into computers, _________ 4.conducting _________ and e-mail scams, and __________ ______________ 5.taking advantage of careless consumers’ online __________ and ______________. 1.1.4 The student will be able to identify currents trends associated with identity crimes – Cont’d

23 Currently, the Identity Theft Resource Center, www.idtheftcenter.org, is an excellent website for obtaining information on new trends, scams and consumer alerts on identity crimes. 1.1.4 The student will be able to identify currents trends associated with identity crimes

24 24 DEFINE & PROCESS Process: Define 1.0: Define 1.0: Explain some current identity crime statistics

25 25 DEFINE & PROCESS Process: Define 1.1: Define 1.1: Explain and define identity crimes

26 26 DEFINE & PROCESS Process: Define 1.2: Define 1.2: Explain some types of crime identified with identity crimes.

27 27 DEFINE & PROCESS Process: Define 1.3: Define 1.3: Explain some personal and financial identifiers associated with identity crime

28 28 DEFINE & PROCESS Process: Define 1.4: Define 1.4: Explain current trends associated with identity crimes.

29 UNIT TWO How identity crime occur

30 Learning Objectives Learning Objective 2.0 Learning Objective 2.0 : The Participant will be able to recognize how identity crime occurs. Learning Objective 2.1 Learning Objective 2.1 : The Participant will be able to identify how identity crime is commonly perpetrated. Learning Objective 2.2 Learning Objective 2.2 : The Participant will be able to identify techniques used to procure false identification.

31 2.1. How identity crime is commonly perpetrated A. A. Identity crimes can occur if someone steals your wallet, purse, briefcase, etc., containing your 1.__________________ 1.__________________, 2._________ __________ 2._________ __________ card, 3.__________ 3.__________ cards, 4.__________ _____________ 4.__________ or _____________.

32 B. B. Identity crimes can occur if someone steals your 1.________ 1.________, 2.especially your bank and credit card _________________, ___________ 3.pre-approved ___________ offers, ____________ 4.new ____________, or 5.________ 5.________ information. 2.1. How identity crime is commonly perpetrated – Cont’d

33 C. _____________________ C. Identity thieves can complete a “__________ of ___________ form” to divert your mail to another location. D. ______________ D. Identity thieves may rummage through your trash or the trash of businesses to find personal data (also known as “______________ diving”). 2.1. How identity crime is commonly perpetrated – Cont’d

34 E. _________________ E. Identity thieves may fraudulently obtain your credit report by posing as a ________, _________, or someone else who may have a legitimate need for (and legal right to) the information. F. _____________ F. Identity thieves can find _____________ information in your home. 2.1. How identity crime is commonly perpetrated – Cont’d

35 G. ___________ G. Identity thieves may obtain personal information that you share on the ___________. 2.1. How identity crime is commonly perpetrated – Cont’d

36 H. ______________ _________ H. Identity thieves can get information from the workplace, in a practice known as “______________ _________ theft,” by stealing files out of offices where you are a customer, employee, patient or student, by bribing an employee who has access to your files, or by “hacking” into electronic files. 2.1. How identity crime is commonly perpetrated – Cont’d

37 I. ___________________ I. Some identity thieves also engage in “__________ _________”: looking over your shoulder or from a nearby location as you enter your Personal Identification Number (PIN) at an ATM machine. 2.1. How identity crime is commonly perpetrated – Cont’d

38 I. (Cont’d): ______________ I. (Cont’d): This practice has gone high-tech, with some thieves utilizing hidden “____ __________” positioned near ATMs to observe or record people as they enter their PINs. 2.1. How identity crime is commonly perpetrated – Cont’d

39 J. __________ J. Many criminals who want to obtain personal data from people online use a technique known as “__________”: the creation of e-mails and websites that appear to belong to legitimate businesses such as established retail companies, financial institutions, and online auctions sites. 2.1. How identity crime is commonly perpetrated – Cont’d

40 J. (Cont’d) ___________ J. (Cont’d) Consumers receive e- mails from thieves claiming to be legitimate businesses, and are directed to ___________ that appear to be run by those businesses. The consumers are then directed to enter large amounts of personal data. 2.1. How identity crime is commonly perpetrated – Cont’d

41 J. (Cont’d): actually have ____ connection with those businesses J. (Cont’d): The thieves sending the e-mails or running the websites actually have ____ connection with those businesses, and their sole purpose is to obtain the consumers’ personal data so that they can engage in various fraud schemes. 2.1. How identity crime is commonly perpetrated – Cont’d

42 2.2 Techniques used to procure false identification _____________________ step-by-step instructions on techniques for producing false documents A wide variety of sources, including __________ and ___________ retailers, provide publications that give criminals step-by-step instructions on techniques for producing false documents.

43 Some of the resources that are available to criminals who want to create false documents. Examples: www.paladin-press.com Gun shows The Modern Identity Changer by Sheldon Charrett, ISBN 0-87364-946-X #IDENTITY 2.2 Techniques used to procure false identification

44 44 DEFINE & PROCESS Process: Define 2.0: Define 2.0: Explain how identity crimes occur

45 45 DEFINE & PROCESS Process: Define 2.1: Define 2.1: Explain how identity crime is commonly perpetrated

46 46 DEFINE & PROCESS Process: Define 2.2: Define 2.2: Explain Techniques used to procure false identification.

47 UNIT THREE LAWS

48 Learning Objectives Learning Objective 3.0 Learning Objective 3.0 : The Participant will be able to recognize the legal aspects of identity crimes. Learning Objective 3.1 Learning Objective 3.1 : The Participant will be able to identify the federal statutes dealing with identity crimes. Learning Objective 3.2 Learning Objective 3.2 : The Participant will be able to identify the state statutes dealing with identity crimes.

49 Learning Objective 3.3 Learning Objective 3.3 : The Participant will be able to define the term “security alert,” according to the Business Code. Learning Objective 3.4 Learning Objective 3.4 : The Participant will be able to define “security freeze,” according to the Business Code. Learning Objectives

50 3.0 Laws and Statutes Governing Identity Crimes FEDERAL LAWSTATE LAW

51 3.1 Federal Statutes dealing with Identity Crime Federal law___ ______ § 1028 Federal law: ___ ______ § 1028 – Identity Theft and Assumption Deterrence Act

52 3.2 state statutes dealing with identity crimes _______ _____ ___.____ Fraudulent Use or Possession of Identifying Information State Law: _______ _____ ___.____ – Fraudulent Use or Possession of Identifying Information (State Jail Felony)

53 Business and Commerce Code, Chapter 20 Business and Commerce Code, Chapter 20 - Regulation of Consumer Credit Reporting 3.2 state statutes dealing with identity crimes Code of Criminal Procedure, Article 55.02, Sec.2a Code of Criminal Procedure, Article 55.02, Sec.2a – Procedure for Expunction

54 3.3 Define the term “security alert,” according to the Tx-BC. _________________ __________ _______ – means a notice placed on a consumer file that alerts a recipient of a consumer report involving that consumer file that the consumer’s identity may have been used without the consumer’s consent to fraudulently obtain goods or services in the consumer’s name.

55 3.4 Define “security freeze,” according to the Business Code ____________ ___________ ____________ ___________ – means a notice placed on a consumer file that prohibits a consumer reporting agency from releasing a consumer report relating to the extension of credit involving that consumer file without the express authorization of the consumer.

56 56 DEFINE & PROCESS Process: Define 3.0: Define 3.0: Explain the legal aspects of identity crimes.

57 57 DEFINE & PROCESS Process: Define 3.1: Define 3.1: Explain the federal statute dealing with identity crimes

58 58 DEFINE & PROCESS Process: Define 3.2: Define 3.2: Explain Texas Laws and statutes dealing with identity crimes

59 59 DEFINE & PROCESS Process: Define 3.3: Define 3.3: Explain and define the term security alert according to the Business Code.

60 60 DEFINE & PROCESS Process: Define 3.4: Define 3.4: Explain and define the term security freeze according to the Business Code.

61 UNIT FOUR Identity Theft Crime Report

62 Learning Objectives Learning Objective 4.0 Learning Objective 4.0 : The Participant will be able to request information needed for an ID crime offense report. Learning Objective 4.1 Learning Objective 4.1 : The Participant will be able to list information needed for an ID crime offense report. Learning Objective 4.2 Learning Objective 4.2 : The Participant will be able to identify the governmental and business entities that are notified in identity crimes.

63 4.0 Prosecuting Identity Crimes

64 4.1 Request information needed for an ID crime offense report. How to request information needed for an ID crime offense report.

65 4.1 List information needed for an ID crime offense report. _________ ________ because credit bureaus require a police report in order to block fraudulent information Taking a _________ ________ is vital to the victim(s) because credit bureaus require a police report in order to block fraudulent information and to begin repairing the victim’s credit reports.

66 many_____________ l institutions require a police report with an affidavit of fraud In addition, many _____________ l institutions require a police report with an affidavit of fraud. Refer to your “Identity Crime Incident Detail Form” (Appendix A). 4.1 List information needed for an ID crime offense report – Cont’d.

67 crime incident form Have the (class participants as a crime victim) fill out an identity crime incident form (Appendix A). 4.1 Practical Exercise

68 This document provides the officer - investigator with detailed information to:  Understand the type of incident that occurred, _____________  Organize the _____________ case, __________  Determine where __________ might be found, 4.1 List information needed for an ID crime offense report.

69 This document provides the officer/investigator with detailed information to – Cont’d: _________  Develop a _________ of how the identity theft occurred, and _____  Determine what _____institutions should be contacted in the course of the investigation. 4.1 List information needed for an ID crime offense report.

70 bank and credit card statements, letters from creditors, merchant account statements Ask the victim to begin gathering documentation (bank and credit card statements, letters from creditors, merchant account statements, etc.) 4.1 List information needed for an ID crime offense report.

71 Ask the victim to obtain credit reports from the three major Credit Bureaus EquifaxEquifax, ExperianExperian, and Trans UnionTrans Union and voluntarily give them to you. 4.1 List information needed for an ID crime offense report.

72 voluntarily If not given voluntarily by the victim, a subpoena is needed from the courts to obtain victim credit histories. 4.1 List information needed for an ID crime offense report.

73 4.2 Governmental and business entities that are notified in identity crimes. A.FBI ______________________ A.F ederal B ureau of I nvestigation – Notify if an identity crime is used to commit a bank fraud, governmental fraud or in furtherance of an ____________ scheme, __________ fraud, etc. involving losses over one hundred thousand dollars ($100,000).

74 B. _______________ ____________ B. U. S. _______ ________ – Notify if there is any custody arrest of individuals associated with identity crime or identity ____________. This would involve the seizure or recovery of any amount of identity crime devices, equipment, or products such as skimmers (small electronic devices 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

75 B. B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

76 B. B. U. S. Secret Service – Cont’d: that can gather information, such as your name, address, credit limit, and PIN from your credit card); counterfeit identification documents; counterfeit credit cards; or lists of personal identifiers (e.g., names, social security numbers, dates of birth, bank account numbers, and credit card numbers). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

77 C. C. U. S. Postal Service – Notify if an individual is taken into custody for committing a financial crime involving the U.S. mail. Postal inspectors will respond to violations relating to identity crime, forgery, credit cards and checks, mail theft, mail fraud, and Internet fraud (when the scheme involves use of the U.S. mail). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

78 D. Social Security Administration – Notify if the misuse of a social security number involved social security program fraud, or if there is either a significant financial loss to an individual or institution, or a significant number of counterfeit social security cards are seized. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

79 E. E. Federal Trade Commission – Have identity crime victims file a report with the Federal Trade Commission (Appendix B). Encourage them to use the FTC website (www.consumer.gov/idtheft 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

80 E. Cont’d: E. Federal Trade Commission – Cont’d: At the website, victims can file an online complaint and obtain helpful information such as a victim’s guide (”When Bad Things Happen to Your Good Name”) and the FTC Sample Affidavit. The FTC also has a hotline: 1-877-IDTHEFT (1-877-438-4338). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

81 F. 512-424-2000 (www.txdps.state.tx.us/contact.htm). F. Texas Department of Public Safety - This agency is responsible for the issuance of state driver’s licenses and identification cards. It is also responsible for the storage and expunction of criminal records. Contact the Texas Department of Public Safety at 512-424-2000 and online (www.txdps.state.tx.us/contact.htm). 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

82 Other state and local agencies may provide additional assistance with investigating identity crimes. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

83 ____________________ stop additional fraud G. Consumer Credit Reporting Agencies – Tell victims to have a “__________ __________” placed on their credit reports. The fraud alert will show up on their credit report when companies make inquiries about their credit and may stop additional fraud. The three major credit- reporting agencies are: 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

84 G. Consumer Credit Reporting Agencies – Cont’d: EXPERIAN 1-888-397-3742 www.experian.com TRANS UNION 1-800-680-7289 www.transunion.com EQUIFAX 1-800-525-6285 www.equifax.com 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

85 H. ______________ H. Financial Institutions (e.g., banks, credit card companies, financial advisors) – Advise the victims to contact their financial institutions to report any ______________ of identity crime. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

86 H. H. – Cont’d: ______________ The financial institution can check to see if there has been any unusual activity. Victims should establish ______________ for their accounts. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

87 I. _____________ I. _____________ Companies (e.g., power, water, phone, and cable companies, etc.) – Victims may want to contact their utility companies to report instances of possible identity crime. unusual account activity The utility companies can check for any unusual account activity. 4.2 Governmental and business entities that are notified in identity crimes – Cont’d

88 88 DEFINE & PROCESS Process: Define 4.0: Define 4.0: Explain how to request information needed for an ID Crime Offense Report

89 89 DEFINE & PROCESS Process: Define 4.1: Define 4.1: Explain (list) information needed for a Crime Offense Report.

90 90 DEFINE & PROCESS Process: Define 4.2: Define 4.2: Explain what government and business entities that are required to be notified in Identity Crimes.

91 UNIT FIVE

92 Learning Objectives Learning Objective 5.0 Learning Objective 5.0 : The Participant will be able to recognize techniques for educating victims and the public on identity crime. Learning Objective 5.1 Learning Objective 5.1 : The Participant will be able to identify techniques for educating victims and the public on identity crime.

93 Learning Objective 5.2 Learning Objective 5.2 : The Participant will be able to list guidelines for personal protection against identity crime. Learning Objective 5.3 Learning Objective 5.3 : The Participant will be able to list the steps to take if identity crime occurs. Learning Objectives

94 5.0 Identity Crimes Prevention Techniques for educating victims and the public on identity crime.

95 5.1 Techniques for educating victims and the public on identity crime. ______________ Law enforcement agencies should be ______________ in their approach to educating the public about identity crime. Current techniques used to educate the public about other crimes can be used to facilitate information on identity crime.

96 _______________________ Some of these techniques may include public service announcements (PSAs), __________ _____________ involvement, etc. Law enforcement agencies can make use of the vast amount of information already available on the Internet to guide the public and victims of identity crime. 5.1 Techniques for educating victims and the public on identity crime.

97 5.2 Guidelines for Personal Protection against identify crime ___________ Emphasize the fact that the more a person becomes ___________ about his/her financial records the better prepared he/she will be if they become a victim of identity crime.

98 Inform the public that they should: _________ 1. Not give out personal _________ over the phone or on the Internet - this includes their social security number, driver’s license number, date of birth, place of birth, home address, mother’s maiden name, and any passwords. 5.2 Guidelines for Personal Protection against identify crime – Cont’d

99 Inform the public that they should: __________ do not put your driver’s license, identification card or social security number on your checks 2.Limit the amount of personal information on their __________ - it is recommended that you do not put your driver’s license, identification card or social security number on your checks 5.2 Guidelines for Personal Protection against identify crime – Cont’d

100 Inform the public that they should: __________ 3.Check __________ histories and bank records frequently and look for signs of inaccurate or suspicious activity ___________ 4.Keep detailed records of ___________, check writing, credit card use, and ATM use 5.2 Guidelines for Personal Protection against identify crime – Cont’d

101 Inform the public that they should: __________________ 5.Destroy _________ _________ of credit card receipts 6.Purchase a home ___________ or completely destroy any item that may have personal identifiers rather than discarding them in the trash 5.2 Guidelines for Personal Protection against identify crime – Cont’d

102 Note: Note: Some insurance companies offer optional coverage to their policyholders to assist them with certain expenses incurred if they become victims of identity crime. 5.2 Guidelines for Personal Protection against identify crime – Cont’d

103 5.3 Steps to take if Identity Crime occurs Refer to participant handout “ID Theft Affidavit” (Appendix B). The forms provide victims with detailed instructions on completion and submission of the affidavit. __________ The affidavit should be sent to the companies or businesses where the __________was perpetrated.

104 5.3 5-STEPS report 1.Notify the police – Make a report. Get the names of the officers you contact and the police report number for your records. specific Be specific as to which kind of identity crime happened, such as bad checks, credit card abuse, or the misuse of your name, driver’s license, or identification card.

105 __________ Cancel credit cards and close your accounts 2.Notify __________ and merchants – Cancel credit cards and close your accounts. Contact the creditors and merchants that are affected. employees you have contact with Get the names of any employees you have contact with, and ask for a reference number on each item that you are disputing 5.3 5-STEPS - Cont’d

106 Change affected bank accounts 3.Notify your banks and financial institutions – Change affected bank accounts. Advise the banks of the situation and find out what is required to clear anything that affects your banking services. This could relate to checks, ATM cards, debit cards, etc. 5.3 5-STEPS - Cont’d

107 _________ _______ 4.Check your credit – Notify the major _________ reporting agencies as well as local credit reporting companies, and advise them of your situation. You may be able to request that a _______ be put on any attempt to gain credit under your name and your date of birth without your confirmation. 5.3 5-STEPS - Cont’d

108 earned income benefits 5.Check with the Social Security Administration – Make sure that earned income benefits are accurate. 5.3 5-STEPS - Cont’d Check to see if there is any action on your social security number that should not be there Check to see if there is any action on your social security number that should not be there.

109 5.Cont’d: Get as much information as you can, and follow through with what is requested of you. 5.3 5-STEPS - Cont’d

110 110 DEFINE & PROCESS Process: Define 5.1: Define 5.1: Explain techniques for educating victims and public on identity crime.

111 111 DEFINE & PROCESS Process: Define 5.2: Define 5.2: Explain some guidelines for personal protection against identity crime.

112 112 DEFINE & PROCESS Process: Define 5.3: Define 5.3: Explain the steps to take if identity crime occurs.

113 SOURCES All Course Sources and/or Resources are listed in your Participant Handout IDENTITY CRIMES TCOLE Course # 3277

114 “Knowledge is “POWER” Stay informed, stay SAFE, stay Vigilant & stay Alive”

115 UPCOMING TRAINING Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4 Racial Profiling Course – TCOLE Course #3256 (8-hrs) 8-hrs on Saturday October 4 th, 2014 from 10:30 am to 7:30 pm. Racial Profiling Course – TCOLE Course #3256 (8-hrs) on Friday October 10, 2014 from 8:00 am to 5:00 pm 115 Bexar County Constable’s Office PCT#4 TRAINING SCHEDULE 2014

116 Current TRAINING Schedule of Courses offered by Bexar County Constable’s Office PCT#4 Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Saturday October 11, 2014 from 10:30 am to 2:30 pm Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Sunday October 12 th, 2014 from 11:00 am to 3:00 pm. Eye Witness Evidence Course – TCOLE Course # 3286 (4-hrs) Friday October 17 th, 2014 from 1:00 pm to 5:00 pm.

117 117 Advanced TCOLE Instructor Course – TCOLE #1017 (40hrs), Day One Saturday November 1 st,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg) Day Two Advanced TCOLE Instructor Course – TCOLE #1017, Day Two Sunday November 2 nd,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg) Day Three Advanced TCOLE Instructor Course – TCOLE #1017, Day Three Friday November 7 th,2014 from 9:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg ) Lesson Presentation preparation time. Instructors available Day Four Advanced TCOLE Instructor Course – TCOLE #1017, Day Four Saturday November 8 th,2014 from 11:00 am to 6:00 pm (Deputy Chief George D. Little and Deputy Constable Roland Berg)

118 118 Day Five Advanced TCOLE Instructor Course – TCOLE #1017, Day Five & Grad Sunday November 9 th, 2014 from 11:00 am to 6:00 pm – Presentations, Final Test & Graduation (Deputy Chief G. D. Little and Dep. Constable R. Berg ) HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 8-hrs on Saturday November 15 th, 2014 from 10:00 am to 6:00 pm. HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Thursday December 4th, 2014 from 1:00 am to 5:00 pm HIV-AIDS & Viral Hepatitis in Criminal Justice Profession Course – TCOLE # 3804 (8-hrs) 4-hrs on Friday December5th, 2014 from 1:00 am to 5:00 pm KNOWLEDGE IS POWER

119 Please complete a course and instructor evaluation form. If you rate 2 or below you must justify on reverse side. Constructive CriticismConstructive Criticism helps all, being negative helps no one. COURSE & INSTRUCTOR EVALUATION Form


Download ppt "BCCO PCT #4 PowerPoint AND IDENTITY CRIMES TCOLE Course #3277 Participant Handout UNIT 1 - 5."

Similar presentations


Ads by Google