top of page

SRO 
in person
training 

logo 2020.jpg
panorama nasro training.jpg

Feb

16th

NEMRT Juvenile Station Adjustment

Lombard, IL

Feb

18th-20th

3 Day CAC Identifying and Intercepting

Dallas, TX

Mar

2nd-3rd

NEMRT Cyberbullying and Sexting

Chicagoland

Mar

5th-6th

WSCCA Identifying and Intercepting

Wisconsin Dells, WI

Mar

19th-20th

NEMRT Undercover Drug Sales

Chicagoland

Mar 30th

-Apr 1st

Identifying and Intercepting School Shooters

Burnettown South Carolina PD

Apr

7th-9th

NEMRT Identifying and Intercepting School Shooters

Chicagoland

Apr

10th

MTU 12 Juvenile Station Adjustment 

Urbana, IL

Apr

13th-15th

Identifying and Intercepting School Shooters

Park City, UT

Apr

23th-24th

NEMRT Patrol Response to Internet Crime

Chicagoland

May

1st

MTU 12 Juvenile Station Adjustment

Chicagoland

May

26th--28th

Identifying and Intercepting

Carmel, IN

May 31st-

June 5th

TAASRO Conference

Alabama

Jun

8th-12th

TNSRO Conference

Pigeon Forge, TN

Jun

14th-16th

SCASRO Conference

Myrtle Beach, SC

Jun

17th-19th

ILSROA Conference

Illinois

Jun

23rd-25th

3 Day MEAD Identifying and Intercepting

Longmont, CO

Jun 29th-July 3rd

NASRO Conference

Reno, NV

SRO Training Available

Live Instruction:

Identifying and Intercepting
School Violence through Cyber-Investigation


Course Length:
16 Hours, 2 Days

Contact: Tom Karnes, former National Exchange Club President,
at (313) 999-7429 or tkarnes15@gmail.com today.
Course Flier
Course Evaluations

Target Group:

Patrol Officers, Detectives, Resource Officers, Probation and States Attorney's, School Principals, School Administrators and School Deans.


Instructor:

Detective Richard Wistocki

Method of Inst:

In person 

 

Instructional Objectives:
Upon completion of the training exercises, participants will:

  • Learn why it is important NOT to disregard information given to LEO or school officials.

  • Understand what the term “Leakage” means and how we can interpret the information.

  • Learn about free and open source online investigative tools.

  • Know items of cyber evidence needed to successfully identify suspects who post online threats.

  • Learn the three-step process in investigating internet crimes.

  • Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.

  • Learn how to obtain IP's, screen names, screen captures, and email headers

  • Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.

  • Once suspect is identified, importance of search warrant, arrest, interrogation and mental health evaluation.

  • We will examine a successful cyber-crime case study investigation from start to Finish.


IMPORTANT please read carefully: The attending Officer/School Official will need the following items to attend.
1. Computer with internet connection (ensure your computer is turned on early incase it requires updates)
2. Be able to access your WORK email remotely from your computer.
3. Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit/
4. Be able to download the Search.erg Investigative toolbar http://www.search.org/resources/
search-investigative-and-forensic-tool bar/

For more information or to schedule an event Contact

Detective Richard Wistocki

BeSure Consulting

​​

Phone: 630.461.0044
Fax:  815.836.8124

​

Email: richwistocki@besureconsulting.com

  • Facebook Social Icon
  • Twitter Social Icon

© 2021 Be Sure Consulting

Contact Us

Thanks for submitting!

In Partnership with:

bottom of page