
BeSure Consulting
Training for Law Enforcement,
Schools, Parents and Children
Feb
16th
NEMRT Juvenile Station Adjustment
Lombard, IL
Feb
18th-20th
3 Day CAC Identifying and Intercepting
Dallas, TX
Mar
2nd-3rd
NEMRT Cyberbullying and Sexting
Chicagoland
Mar
5th-6th
WSCCA Identifying and Intercepting
Wisconsin Dells, WI
Mar
19th-20th
NEMRT Undercover Drug Sales
Chicagoland
Mar 30th
-Apr 1st
Identifying and Intercepting School Shooters
Burnettown South Carolina PD
Apr
7th-9th
NEMRT Identifying and Intercepting School Shooters
Chicagoland
Apr
10th
MTU 12 Juvenile Station Adjustment
Urbana, IL
Apr
13th-15th
Identifying and Intercepting School Shooters
Park City, UT
Apr
23th-24th
NEMRT Patrol Response to Internet Crime
Chicagoland
May
1st
MTU 12 Juvenile Station Adjustment
Chicagoland
May
26th--28th
Identifying and Intercepting
Carmel, IN
May 31st-
June 5th
TAASRO Conference
Alabama
Jun
8th-12th
TNSRO Conference
Pigeon Forge, TN
Jun
14th-16th
SCASRO Conference
Myrtle Beach, SC
Jun
17th-19th
ILSROA Conference
Illinois
Jun
23rd-25th
3 Day MEAD Identifying and Intercepting
Longmont, CO
Jun 29th-July 3rd
NASRO Conference
Reno, NV
Target Group:
Patrol Officers, Detectives, Resource Officers, Probation and States Attorney's, School Principals, School Administrators and School Deans.
Instructor:
Detective Richard Wistocki
Method of Inst:
In person
Instructional Objectives:
Upon completion of the training exercises, participants will:
-
Learn why it is important NOT to disregard information given to LEO or school officials.
-
Understand what the term “Leakage” means and how we can interpret the information.
-
Learn about free and open source online investigative tools.
-
Know items of cyber evidence needed to successfully identify suspects who post online threats.
-
Learn the three-step process in investigating internet crimes.
-
Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.
-
Learn how to obtain IP's, screen names, screen captures, and email headers
-
Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.
-
Once suspect is identified, importance of search warrant, arrest, interrogation and mental health evaluation.
-
We will examine a successful cyber-crime case study investigation from start to Finish.
IMPORTANT please read carefully: The attending Officer/School Official will need the following items to attend.
1. Computer with internet connection (ensure your computer is turned on early incase it requires updates)
2. Be able to access your WORK email remotely from your computer.
3. Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit/
4. Be able to download the Search.erg Investigative toolbar http://www.search.org/resources/
search-investigative-and-forensic-tool bar/


