
BeSure Consulting
Training for Law Enforcement,
Schools, Parents and Children
11/2-3
415 W. Lexington St, Maywood, IL 60153
​Preventing Targeted Violence Through Cyber Investigations
8AM - 4PM
​
11/8-9
200 S Lincolnway St, North Aurora, IL 60542
Cyber-bullying/Sexting Investigations and Appropriate Consequences
8AM - 4PM
Sponsored By: North Aurora PD
11/20-21
910 N Gary Ave, Carol Stream, IL 60188
Mass Violence class
8AM - 4PM
Sponsored By: ILETSB
11/29-12/1
1500 W Jefferson St, Vandalia, IL 62471
Identifying and Intercepting
8AM - 4PM
Sponsored By: ROE3
12/4-5
​ROE 39 training center
Identifying and Intercepting
8AM - 4PM
Sponsored By: Piatt County
12/7-8
3355 Woolley Rd, Oswego, IL 60543
NEMRT Online Drug Dealing
8AM - 4PM
Sponsored By: Oswego PD, NEMRT
12/27-29
1350 Aurora, Naperville, IL 60540
NEMRT Delivering Effective Internet Safety
8AM - 4PM
Sponsored By: Naperville PD
1/4-5
200 S Lincolnway St, North Aurora, IL 60542
NEMRT Identifying and Intercepting
8AM - 4PM
Sponsored By: North Aurora PD
1/11-12
815 Orlando Smith Rd, Oglesby, IL 81348 Room C316
ILETSB Tracking Mass Casualty
8AM - 4PM
Sponsored By: Lasalle County
2/22-23
14600 W 127th St, Lemont, IL 60439
NEMRT Patrol Response to Internet Crimes
8AM - 4PM
Sponsored By: Lemont PD
3/4-5
23748 W 125th St, Plainfield, IL 60544
Tri River Identifying and Intercepting
8AM - 4PM
Sponsored By: Plainfield Fire Protection
Target Group:
Patrol Officers, Detectives, Resource Officers, Probation and States Attorney's, School Principals, School Administrators and School Deans.
Instructor:
Detective Richard Wistocki
Method of Inst:
In person
Instructional Objectives:
Upon completion of the training exercises, participants will:
-
Learn why it is important NOT to disregard information given to LEO or school officials.
-
Understand what the term “Leakage” means and how we can interpret the information.
-
Learn about free and open source online investigative tools.
-
Know items of cyber evidence needed to successfully identify suspects who post online threats.
-
Learn the three-step process in investigating internet crimes.
-
Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.
-
Learn how to obtain IP's, screen names, screen captures, and email headers
-
Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.
-
Once suspect is identified, importance of search warrant, arrest, interrogation and mental health evaluation.
-
We will examine a successful cyber-crime case study investigation from start to Finish.
IMPORTANT please read carefully: The attending Officer/School Official will need the following items to attend.
1. Computer with internet connection (ensure your computer is turned on early incase it requires updates)
2. Be able to access your WORK email remotely from your computer.
3. Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit/
4. Be able to download the Search.erg Investigative toolbar http://www.search.org/resources/
search-investigative-and-forensic-tool bar/