top of page

SRO 
in person
training 

logo 2020.jpg
panorama nasro training.jpg

MAR

26th-27th

North Aurora PD

200 S Lincolnway St, North Aurora, IL 60542

Patrol response to internet crime

APR

1st

Romeoville PD

1050 Romeo Rd #1050, Romeoville, IL 60446

The art of Diversion

APR

3rd-4th

Lemont PD

14600 127th St, Lemont, IL 60439

NEMRT Cyberbullying, sexting and Vaping investigations

APR

8th-9th

Bradley University

810 N. tobias Ln, Peoria, IL 61625 - Westlake Hall Room 116

Mass casualty prevention

APR

23rd-24th

LETAC

Identifying and Intercepting

APR

25th-26th

Illinois Valley Community College

815 N Orlando Smith St, Oglesby, IL 61348

ILETSB Tracking Mass Casualty

APR-MAY

29th-1st

North Aurora PD

200 S Lincolnway St, North Aurora, IL 60542

NEMRT Delivering Effective Internet Safety

MAY

8th-9th

Lemont PD

14600 127th St, Lemont, IL 60439

NEMRT Patrol response to internet crime

MAY

20th-21st

Kankakee Community College

100 college Drive, Kankakee, IL 60901

Identifying and intercepting

MAY

22nd-23rd

Glen Ellyn PD

65 s Park Blvd, Glen Ellyn, IL 60137

NEMRT Online drugs and UC Operations

MAY

27th-30th

Southeastern Illinois College

3575 College Rd, Harrisburg, IL 62946

Mass Violence class

JUN

7th

Glen Ellyn PD

The art of Diversion

SRO Training Available

Live Instruction:

Identifying and Intercepting
School Violence through Cyber-Investigation


Course Length:
16 Hours, 2 Days

Contact: Tom Karnes, former National Exchange Club President,
at (313) 999-7429 or tkarnes15@gmail.com today.
Course Flier
Course Evaluations

Target Group:

Patrol Officers, Detectives, Resource Officers, Probation and States Attorney's, School Principals, School Administrators and School Deans.


Instructor:

Detective Richard Wistocki

Method of Inst:

In person 

 

Instructional Objectives:
Upon completion of the training exercises, participants will:

  • Learn why it is important NOT to disregard information given to LEO or school officials.

  • Understand what the term “Leakage” means and how we can interpret the information.

  • Learn about free and open source online investigative tools.

  • Know items of cyber evidence needed to successfully identify suspects who post online threats.

  • Learn the three-step process in investigating internet crimes.

  • Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.

  • Learn how to obtain IP's, screen names, screen captures, and email headers

  • Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.

  • Once suspect is identified, importance of search warrant, arrest, interrogation and mental health evaluation.

  • We will examine a successful cyber-crime case study investigation from start to Finish.


IMPORTANT please read carefully: The attending Officer/School Official will need the following items to attend.
1. Computer with internet connection (ensure your computer is turned on early incase it requires updates)
2. Be able to access your WORK email remotely from your computer.
3. Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit/
4. Be able to download the Search.erg Investigative toolbar http://www.search.org/resources/
search-investigative-and-forensic-tool bar/

bottom of page