Services at a Glance

 Home

 About Sheila

 About SaferSecurity, Inc.

 The Crime Lab Project

 Consulting

 Events

 The Upcoming Novel

 Published Soon by    Writer's Digest - 
The Book of Weapons


 The SaferSecurity Store

 Private Investigation

 Childproofing

 Childcare and Child  Safety Resources

 Eldercare Investigations

 Background & Pre-    employment Searches

 Business Services 

 
Testimonials

 Links

 A Note from Sheila

 Most Popular   Presentations

 Contact Us

See the new 
Spytekbirmingham.com

Home > Consulting > Speaking Engagements

SPEAKING ENGAGEMENTS

 

      **Sheila has limited her speaking engagements this year due to her involvement in graduate school.  


However, feel free to call.   She may be able to accommodate your group or conference.


Law Enforcement Issues for LE Officers

                              and

Law Enforcement Issues for Writers
                   Get it Right!

 Know what the fruit of the
 poisonous tree means?

 Know
the difference between: 

      larceny   fraud
       theft   burglary
      robbery  




Law Enforcement Lectures:

These lectures have two tracts:  one for law enforcement ( for LE only) and one for writers or civic organizations.   Please specify which tract is required when booking engagements. 

Some necessary overlap of information exists due to subject matter organization and theme.
 
* The CSI Effect--Is it Real or Is it CSI?

This is a Power Point lecture given at the New England School of Law Symposium in October 2006.

It is based on an article Sheila Stephens published in their Law Journal in 2007.   What is reality and what is fantasy will surprise CSI fans and law enforcement personnel alike.

* The Art of Private Investigation
This presentation takes the audience through the differences in the way P.I.s must operate and the way LE (law enforcement) is allowed to operate.  It discusses typical cases and the techniques and technology used to work them. 


Crimes Against Children-Who is the bad guy? Inside the investigation of the most heinous of crimes, those committed against children.

The pedophile profiled - the known and unknown molester
Organized pedophile groups
Recidivism - interviews with psychologists and pedophiles
The monster without a face - internet trolling for children
Effective investigative techniques, undercover work, equipment
How to help children and adolescents stay safe
Support networks—a look at the proposed National Sex Offender Registry, Amber Alert, Innocent Images and more.

 
Crime Defined-Types of Crime, Types of Criminals

Definition and elements of specific crimes - the difference between crimes such as homicide, murder, capital murder, manslaughter
Penalties - how use of a weapon in the commission of crime affects penalties
Criminal Justice terms defined
Finding state criminal codes and understanding their use
NCIC - info provided by this system and who is allowed to access it
Sociopaths - from con men to serial killers
Theories of crime - nature vs. nurture - are criminals born or made?



Federal Agencies, Their Jurisdictions and Collaboration.
Learn the differing, and sometimes overlapping, responsibilities of federal law enforcement agencies, including little known agencies that do big things.

GS 1811 special agents - the men and women on the front lines
Reorganization of agencies under the new Department of Homeland Security
Who investigates what and where they train
New congressional mandates for sharing information
A look inside the many federal data bases and how they are used - AEXIS, NIBIN, NFIRS and more
NCIC - info provided by this system and who is allowed to access it
Criminal Justice terms defined.



Gangs and Gang Activity
Now called the Bureau of Alcohol, Tobacco, Firearms and Explosives, ATF has long specialized in gangs: motorcycle, ethnic and inner-city gangs, as well as mafia, white supremist and terrorist organizations.

ATF's history and changing jurisdictions
ATF's shared investigative responsibility with other agencies
ATF and the Department of Homeland Security
Tools in the fight against gangs/terrorism
Firearms, arson and explosives - the gang/terrorist weapons of choice
Arson and the arsonist
Explosives and the bomber
Firearms - parts, use and firearms violations
Accelerant/explosive/drug sniffing dogs and their handlers (drugs almost always involved - sold to support lifestyle or criminal goals of gangs/organizations)



Juvenile Crime/The Juvenile System.
So different! How the process works on the juvenile level

The nature - how it differs from adult crime
The process - how it differs from the adult system
Designer and traditional drugs - their appearance, use, street names
Kids, crime and drugs
Kids, crime and gangs
Kids, crime and diagnoses: Attention Deficit Hyperactive Disorder (ADHD), Impulse Control Disorder (ICD), Oppositional Defiance Disorder (ODD), Emotional Disturbance (ED) or Conflict (EC), and more
Juvenile detention and treatment centers
Recidivism - why it is rising, efforts to reduce it
Efforts at prevention of juvenile crime

 

* Unusual Lethal and Less Than Lethal Weapons: Weapons of the Good Guys, the Bad Guys and Worse: Terrorists

     When your character needs a weapon how do you choose the correct one? How do you know that your choice is one this character would use, especially in the situation in which you've placed her? This presentation reveals real-world information about weapons used by law enforcement and by criminals.

      You'll see the typical weapons that police officers carry and how they differ from those carried by federal agents, the military and their various adversaries. More importantly, you'll learn how and when these weapons are used. You'll also learn what's available concerning the trend toward less than lethal weapons, not only in law enforcement, but in the military.

      Covert weapons will wow you, as will a not to be missed look into the future the amazing weapons that are in development at this moment, some of which are still classified, and aimed at defending against terrorism.

 

* "Murder Scene Walk-Through"

      Walk through a murder investigation with former ATF Special Agent Sheila L. Stephens. You will be taken through the steps of crime scene investigation as if you are there - from the moment the call is received to submission of evidence to the laboratory - using differing scenarios.

      Special emphasis will be placed on investigating a scene involving guns and bladed weapons, as well as the proper method for collecting and processing them depending on the situation and condition of the weapon.

      Roles played by personnel in law enforcement departments large and small will be emphasized - as well as that of the private investigator.

 

* The Amazing Technology of Crime and Crime-Fighting on Sunday afternoon

You will learn about computer crime and cutting-edge means of using the computer to fight crime.  Youll be introduced to the amazing new CyberSleuths, trained to investigate, using bytes, the way G-men were trained to use fingerprints.  Youll learn how crimes against children and juveniles, entrenched in social networking sites such as MySpace and FaceBook, are investigated.  Youll learn how covert cameras and listening devices are used to crack the most difficult cases.  You'll learn about legalities of crime fighting technologies and much, much more!

 

Poisons and Poisoners

The poisoner profiled - who poisons and how
Poisoning cases - how they are investigated
Problems with making a case
Poisons - appearance, availability, and effects
Poisons - treatment
Saving lives - a simple, yet little used, test
Prevalence of poison as a murder weapon in the past, and present.



Search and Seizure-Contraband, Evidence and the Chain of Custody
 

Evidence defined
Contraband defined - what can be confiscated, how and by whom
The chain of custody - protection of evidence
Search warrants - obtaining warrants, where it is legal to look, when the search must end, fruit of the poisonous tree
Search without a warrant
Collecting and protecting evidence - Bloodstains and spatters. Prints: tires, shoes, fingerprints and fingerprinting. Ballistics. Broken glass and damaged material. Hair and fibers. Organic compounds: leaves, soil, pollen, insects. Tool marks. Burn and char patterns. Explosives evidence. Advancements in DNA. Narcotics and the newest designer drugs.
Search tools and methods



Surveillance-Who Has the Eyeball?
An overview

Tools of surveillance
Techniques of surveillance
A day in the life of professionals - local police, special agents and private investigators
Who's being watched?
What's new? Surprisingly small listening devices and covert camera equipment
Legalities for investigators - warrants, reports
Legalities for P.I.'s and private citizens - who can use covert equipment and where it can be purchased
When is it legal, or not, to record someone's conversation? Film someone?
The civilian and surveillance: protecting property, tracking employees, watching the baby-sitter



Technology in Crime and in Crime Fighting
What's new out there?

Covert cameras and listening devices
Tracking devices, satellites and their use
Advancements in DNA
Computer crime and using the computer to fight crime - scams, fraud, solicitation of minors
Technology and crimes against children
The pedophile profiled. Monster without a face: internet trolling for children
Keeping children and adolescents safe



The Process-From Approach to Engagement, Arrest and Detention

Probable Cause
Use of force
The 10-Code and Phonetic Alphabet
Police/street jargon
Defensive tactics
Handcuffing techniques
Searching a suspect, vehicle, house or building
Handling evidence
Handling informants, benefits and dangers
How the Feds do it differently from local officers
Male/female defensive/engagement methods - do they differ?
Typical/not so typical calls and officer/agent response



The Process-Investigation, Federal and Local

Jurisdictions - who investigates what?
The crime scene and first responders
Methods and tools for collecting and processing evidence
Interviewing and interrogation, traditional and newer methods: includes overview of Hypnosis and Neurolinguistic Programming
Permissible deception
Eye-witness identification
Informants - the handling, benefits and dangers
Obtaining a search warrant
Criminal Justice terms defined



Weapons and Accessories

Odd and hidden weapons - pen and lipstick knives, etc.
How weapons are carried and concealed
Weapons search - legalities and dangers of searching persons and property
Firearms - parts, use and violations
Ammunition and its effects
ATF's role in enforcing firearms laws and regulations
The ATF search warrant, raid procedure
Working with local and other federal agencies


Choose a topic or suggest a new one! Look for more topics to come!

CONTACT SHEILA at 1.205.424.3799 to book one or more of the above lectures.
Or Contact here
.


Civic / Miscellaneous Lectures:

Crimes Against Children/Keeping Them Safe.
A version of the law enforcement lecture geared to parents, educators and care-givers.

Juvenile Crime/The Juvenile System
A version of the law enforcement lecture geared to parents, educators and care-givers. Review of research about methods of dealing with these kids in the home and school environment.

Gangs and Gang Activity
Emphasis on youth gangs. Signs that your child may be in a gang. Slang, signs, and symbols of gang affiliation. Preventing gang affiliation or getting your child out. Gangs and the internet.

New Technologies-Protecting Home & Business
Amazing new technology in alarm systems, covert cameras and other security solutions.

Personal/Home/Child Safety
An overview of staying safe in today's world.

Firearms, Arson & Explosives
ATF's role in the investigation of these crimes and what the citizen can do in an arson or explosives incident. Get out safely: what to do in case of fire. Arson: report suspicious activity. Bombs: How to recognize danger and what to do when a threat is received.

Simple Self-Defense
Techniques for protecting yourself at home and away.

Choose a topic or suggest a new one!


CONTACT SHEILA at 1.205.424.3799 to book one or more of the above lectures.
Or Contact her here.

**More events and presentations are in the works.  Dates will be posted when details are finalized.


See books to be published soon!



SaferSecurity Inc. � 2007 All Rights Reserved