Print

 



2018 CONFERENCE SCHEDULE

Thursday, June 7, 2018

7:00 a.m. - 6:00 p.m.
Registration/Check-in

8:45 a.m. Tee Time
CALI Golf Tournament - Skylinks at Long Beach

8:30 a.m. - 5:30 p.m.

Pre-Conference
with Sandra Stibbards, Camelot Investigations
Open Source Intelligence:Tools, Resources, & Techniques for
Better Investigations

8:00 a.m. - 6:00 p.m.
Exhibitor Set-up

12:00 p.m. - 1:00 p.m.
Pre-Conference Lunch

2:30 p.m. - 6:00 p.m.
CALI Board of Directors Meeting

6:30 p.m. - 8:00 p.m.
2018 Hosted Welcome Reception on Hilton Long Beach Pool Terrace

Friday, June 8, 2018

7:00 a.m. - 5:30 p.m.
Registration/Check-in

7:00 a.m. - 8:00 a.m.
Networking Breakfast

7:00 a.m. - 6:30 p.m.
Exhibitors & Networking

8:00 a.m. - 9:00 a.m.
Annual Business Meeting & Legislative Update

9:15 a.m. - 10:45 a.m.
Special CALI 2018 Welcome & Keynote Presentation

Special Welcome to CALI 2018
Chief of Police, Robert. G. Luna, Long Beach Police Department





Keynote Presentation
Investigating Innocence
Bill Clutter,
Bill Clutter Investigations
This program covers the fact investigation that led to overturning wrongful convictions during Bill's 32 years working as a criminal defense investigator. He will cover how post-conviction investigations differ from pre-trial investigations.  And for those interested in doing work on actual innocence cases, he will guide you on how you can tap into the more than 77 Innocence Projects throughout the US and actually get paid for your service.
 

11:00 a.m. – 12:30 p.m.
The Board of District Governors & Directors Meeting

11:00 a.m. - 12:30 p.m.   Concurrent Breakout Sessions

Surveillance Step-by-Step (Total Subrosa Part 1 of 3)
Johnston Blakely, On Track Investigations
Surveillance Step-by-Step will demonstrate Johnston’s approach to conducting successful and safe video surveillance on targets for a variety of case types.  With the use of video examples, Johnston will walk through the stages of a surveillance case from the acceptance of the case to its completion.

Become Stealth Online: Secure Your Identity & Activity While Minimizing Vulnerability
Sandra Stibbards, Camelot Investigations

How to Build & Grow Your PI Business
Cameron Jackson,
C.Jackson Investigations
Learn the step-by-step methods on when and how to build and grow a successful PI business.

12:30 p.m. - 2:00 p.m.
LUNCH KEYNOTE
“The Pinks”
Chris Enss, Author/Speaker

Most students of the Old West and American law enforcement history know the story of the notorious and ruthless Pinkerton Detective Agency and the legends behind their role in establishing the Secret Service and tangling with Old West Outlaws. But the true story of Kate Warne, an operative of the Pinkerton Agency and the first woman detective in America—and the stories of the other women who served their country as part of the storied crew of crime fighters—are not well known. For the first time, the stories of these intrepid women are collected here and richly illustrated throughout with numerous historical photographs. From Kate Warne’s probable affair with Allan Pinkerton, and her part in saving the life of Abraham Lincoln in 1861 to the lives and careers of the other women who broke out of the Cult of True Womanhood in pursuit of justice, these true stories add another dimension to our understanding of American history.

2:10 p.m. - 3:30 p.m.  Concurrent Breakout Sessions

Surveillance Step-by-Step (Total Subrosa Part 2 of 3)
Johnston Blakely, On Track Investigations


Winning Strategies For AOE/COE Investigations  (Part 1 of 2)
Ame Barfield & Matt Andrews, CalStar Unlimited

A comprehensive overview of how to plan and conduct AOE/COE investigations. Attendees will learn about the purpose, scope, goals, and best practices of these investigations, as well as ways to elevate the quality of the work product in order to stand out in what has become a crowded field. This will be a great learning opportunity for both seasoned insurance investigators and those considering a move into that specialty.

The two-part course will cover the following areas, among others:

  • Understanding AOE/COE, including what it is and what it is not
  • AOE/COE goals and how to create a plan of action for the investigation
  • Resources for understanding the workers’ compensation system and compensability issues encountered during the course of an investigation
  • An overview of typical tasks and actions as part of these investigations, as well as best practices for undertaking these actions
  • Conducting thorough recorded interviews to obtain all essential information  
  • Using AOE/COE investigations as a tool to bolster surveillance and other concurrent or future investigations
  • Producing a written report targeted to the specific needs of claims adjusters and their attorneys

Attendees will also have plenty of opportunities to ask questions and seek advice from two experienced AOE/COE investigators.

Introduction to Bitcoin, Blockchain, and the Dark Web
Oleg
Flaksman, O & O Investigations

This will be an introduction to Bitcoin and altcoins. The understanding of blockchain technology. The current state of blockchain. And a brief overview of the dark web.

3:30 p.m.- 4:00 p.m.
Break with Exhibitors

4:00 p.m. - 5:30 p.m.  Concurrent Breakout Sessions

Winning Strategies For AOE/COE Investigations (Part 2  of 2)
Ame Barfield & Matt Andrews,
CalStar Unlimited

Workplace Investigations-Conducting Pre-Litigation Investigations Of Harassment And Discrimination
Chris Reynolds,
Chris Reynolds Investigations 

Workplace investigations are one of the fastest growing areas of work for private investigators in California. The workplace investigator requires a specific skill set and training and is far different from the traditional role of a retained private investigator; whose side are you on? How do you handle allegations that implicate the business paying your bill?  Who is in charge? What are the laws? Join Chris Reynolds for this session while he teaches the techniques and practices of this unique field. The workplace investigator must investigate and assess the evidence, make credibility findings, and eventually make judgments calls on complex allegations. Harassment and discrimination investigations require specific knowledge of federal and state laws related to sexual harassment and discrimination. Mr. Reynolds will present the rules and laws you must know. Learn the specifics of preparing and conducting a thorough workplace investigation, from case intake, report writing, making findings and building your business. Chris Reynolds has been a licensed Private Investigator since 1979. In 1984 Mr. Reynolds started conducting workplace investigations. Since that time, Mr. Reynolds has conducted over 750 workplace investigations, specializing in harassment and discrimination claims.


Defending Against Claims of Sexual Abuse
Mark Murnan,
Complete Legal Investigations

Claims of sexual abuse and harassment abound. Often there is little to substantiate the allegations other than the testimony of the alleged "victim." This presentation will discuss the motives behind false claims and a methodology for investigating them.

5:30 p.m. - 6:30 p.m.
Exhibitor Reception

6:30 p.m. - 7:30 p.m.            
Cigar Night
The Stave Bar

 

Saturday, June 9, 2018

7:30 a.m. - 3:30 p.m.
Registration/Check-in

8:00 a.m. - 9:00 a.m.
CALI Awards and Exhibitor Breakfast

8:00 a.m. - 3:30 p.m.
Exhibits & Networking

9:00 a.m. - 10:30 a.m.  Concurrent Breakout Sessions

Post Surveillance & Video Processing (Total Subrosa, Part 3 of 3)
Lee Wolf,
SLi Surveillence, Locates, Investigations

Post Surveillance & Video Processing will demonstrate the methods used by Lee Wolfe and his staff at SLI in providing updates, report writing, video processing, large file transfers and storage of unprocessed and processed video. The presentation will provide a step by step demonstration of the latest easy to use video processing software, discuss camera tech and offer ample time for discussion regarding related topics.

Surviving an Active Shooter Using ALIVE
Michael Julian,
MPS Security & Protection

No one wants to think they will encounter an active shooter but the fact is it could happen anywhere and it seems to be happening with increased frequency. This is an all too familiar scenario facing our world. People can no longer subscribe to the notion that “it will never happen here” given the frequency and severity of the attacks. Fortunately, we can train you to respond to an active shooter/killer attack that will mitigate your risk of injury and death.
You’ll learn to:
-Identify behaviors, causes, and red flags typically associated with active shooter/killer incidents before they occur
-Better understand the mental process of an assailant preceding and during an active shooter event
-Develop enhanced situational awareness and a survival mindset
-Survive an active shooter event using the A.L.I.V.E. Active Shooter Survival Plan
-Train others to assure that they know how to safely respond to an active shooter event


Recognizing Child Harm in Family and Dependency Law Investigations
John Hiatt,
Telos Investigations

The Private Investigator should come away from this presentation with a working understanding of how the Dependency and Family Law courts determine child harm. The focus will not be on the sensational cases obvious to all, but rather on day to day investigations, more useful to a PI's gathering of evidence in these matters.

10:30 a.m. - 11:00 a.m.
Break with Exhibitors

11 a.m. - 12:30 p.m.  Concurrent Breakout Sessions

Espionage, Eavesdropping and Countermeasures in the 21st Century
Anthony Reep,
Research Electronics International

Computer and Network Hacking is constantly in the news, but electronic eavesdropping is still very active and often overlooked. In this presentation we will discuss the threat, cost and damage caused by eavesdropping, investigation of incidents, devices and methods of intercept, client contact, TSCM methodology and equipment. We will also indicate strategies when a device is located and next steps.

Do You Know What You Don't Know? 8 Important Topics in Forensics Every Investigator Should Know
Elissa Mayo,
 California Department of Justice (DOJ), Bureau of Forensic Services

With advances in forensic analysis comes the opportunity to examine cases with small amounts of evidence, older cases, cases with inconclusive or negative results, previously analyzed cases and cases with no probative leads. For example, biological evidence previously considered too small or degraded to produce results, or which was subjected to less sensitive testing methods may be analyzed using new DNA methods. ¿Old and Cold¿ case investigations are becoming commonplace and have successfully solved decades old cases using new technology. It is important for those involved in forensic investigations to keep abreast of current topics and best practices in forensic analysis AND maintain working knowledge of past forensic methods and technology which might be referenced in old case reports to effectively direct investigations. In this presentation I will review eight important topics every forensic investigator should be aware of and share resources for further study.


Adoption Investigation and the Steps to Finding Birth Relatives
Jay Rosenzweig,
JR Investigations
Diane Hellmer, ExperTrace

This presentation will show how you can help adoptees locate their birth parents through non-identifying information. You will also learn how genealogy research is used to locate birth relatives and verifying those relatives through DNA results.

12:30 p.m. - 3:30 p.m.
LUNCH KEYNOTE
Evaluating Truthfulness and Credibility
David Boone, FiveBy5 Intelligence

This program will teach you how to read and evaluate others through their verbal and nonverbal behaviors and use this skill to accurately evaluate their credibility or uncover any deception.  In most interactions, individuals put too much emphasis on the spoken word. This approach results in a significant loss of information and is ineffective in assessing the credibility of others.  During this program you will go far beyond just analyzing the words, you will learn how to read and interpret all 5 core channels of communication and how these can be used to expose the true thoughts of others. The 5 core channels of communication are; Facial expressions, Body language, The Voice (pitch, tone, and volume), Verbal style (the way a person talks) and Verbal content (the words a person uses).

And A Special Presentation by Drone University USA
To the military, they are UAVs (Unmanned Aerial Vehicles) or RPAS (Remotely Piloted Aerial Systems). However, they are now more commonly known as drones, and being used for a variety of scenarios.  How can they best be used in the investigative and security industry? 



3:30 p.m. - 5:30 p.m.

CPI Examination

6:00 p.m. - Midnight
CALI 50th Anniversary Gala!

Please join us for this special, semi-formal event celebrating 50 years of CALI!  Tickets include a red carpet arrival, cocktail reception, plated dinner, awards, and dancing to live music performed by The Martini Kings, named the #1 live event band in Southern California by KTTV-LA.