For more information or to schedule an event Contact

Detective Richard Wistocki

BeSure Consulting

​​

Phone: 630.461.0044
Fax:  815.836.8124

Email: richwistocki@besureconsulting.com

  • Facebook Social Icon
  • Twitter Social Icon

© 2017 BeSure Consulting

School

ADmin &

Staff

Overview of Protocols for Administrators and Teachers handling Cyber-Bullying and Sexting Cases in your school

1 to 2 hour Faculty Class

 

Details:

This class will cover red flags of students and appropriate procedures when criminal acts occur.

School Faculty need to understand what is going on in the lives of their students. The only real way to do this is to understand the world that they live in.  Today, that world is on their devices, and online.  BeSure Consulting will educate the faculty members on internet lingo, trending social networks, applications and photo trading. Faculty also need to know the do’s and don'ts when it comes to dealing with students on social media and how to address complex situations when they arise.

 

Instructional Objectives:

  • Internet Predators

  • Cell Phone Applications

  • Monitoring Appropriately

  • When we suspect abuse of any type we MUST contact 1-800-25-ABUSE

  • When we feel that something may be inappropriate with online use but you have no basis to feel it falls under mandated reporting, you can make a Cyber-Tip.

 

Cyber-Bullying and Sexting Investigations with Appropriate Consequences

8 hour Faculty Class

 

Details:

 

We must train School Administrators and School Resource Officers to identify and save children

exploited and abused by others on line. This provides invaluable training on the latest methods to protect our children Online.

 

Instructional Objectives:

  • We will examine current Cyber-Bullying Laws and New Sexting Laws that protect our students from becoming sex offenders.

  • Examine and understand the Laws of Possession, Manufacture and Distribution of Child Pornography, Harmful Material and Obscenity.

  • Learn how to appropriately institute consequences for this behavior using Juvenile Justice, Diversion and Restorative Justice Methodology.

  • Discover effective student Diversion programs and methods to be used by police departments and/or school districts.

  • School Administrators and Law Enforcement will learn to investigate and process students/juveniles in a diversion program to ensure their "Mistake" will NOT affect their digital footprint.

  • We will learn the protocol's of the National Center for Missing and Exploited Children (NCMEC) on how to deal with the pictures and videos that were sent and secure them effectively.

 

 

Identifying and Intercepting School Violence/Shooter Through Cyber-Investigations

8 hour Faculty Class

 

Details:

 

School Officials and Law Enforcement need to obtain the proper information when responding to threats of school violence online.  Especially when there is “Leakage” and the posting party is targeting students and school personnel.  It is important for the School Administrator/LEO to obtain crucial information and evidence in these cases and initiate due process paperwork in a timely manner. The LEO will then continue the investigation and use the Exigent Circumstances protocol to get the appropriate information.  Identifying the perpetrator immediately provides Schools and Law Enforcement the ability to act quickly and proactively to reduce the threat of school shootings and other forms of violence.

              

Instructional Objectives:

Upon completion of the training exercises, participants will:

 

  • Learn why it is important NOT to disregard information given to LEO or school officials.

  • Understand what the term “Leakage” means and how we can interpret the information.

  • Learn about free and open source online investigative tools.

  • Know items of cyber evidence needed to successfully identify suspects who post online threats.

  • Learn the three-step process in investigating internet crimes.

  • Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.

  • Learn how to obtain IP's, screen names, screen captures, and email headers

  • Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.

  • Once suspect is identified, importance of search warrant, arrest, interrogation and mental evaluation.

  • We will examine a successful cyber-crime case study investigation from start to finish.