For more information or to schedule an event Contact

Detective Richard Wistocki

BeSure Consulting


Phone: 630.461.0044
Fax:  815.836.8124


  • Facebook Social Icon
  • Twitter Social Icon

© 2020 Be Sure Consulting

Contact Us




Live, Interactive Webinar:
Cyber-Bullying, Vaping and Sexting Investigations with Appropriate Consequences
April 9/10 from 9:00AM CST - 4:00PM CST
Central Time (US and Canada)
Course Flier

$150.00 per Attendee

Click the "Buy Now" button to enroll

Time Allotted:

(2) Two Days 9AM-4PM CST

Target Group:

Law Enforcement, School Administrators, Patrol Officers, Detectives, Probation and States Attorney’s


Detective Richard Wistocki

Method of Instruction:

Webinar - Wired connection preferred

Items / Materials:

A variety of investigation specific files delivered via download


Internet Crimes Against Children (ICAC) Undercover Operations, Illinois Juvenile Court Act of 2000, NCMEC (CVIP), NASRO, Rosecrance, Linden Oaks Hospital,, Webwatcher 

Instructional Goal:

We must train School Administrators and School Resource Officers to identify and save children exploited and abused by others online.

The National Exchange Club has partnered with Det. Richard Wistocki and Be Sure Consulting Training to sponsor his cutting edge LIVE INTERACTIVE WEBINAR training.

Instructional Objectives:​

  • The law Enforcement officer will come to understand how to identify cyber bullies, how to find out who they are and investigate Internet crime.

  • The Officer / School Official will also learn how to effectively empower kids not to become victims.

  • We will examine your state’s current laws and how they affect your children who commit these crimes.

  • The laws we will examine are Possession, Manufacture and Distribution of Child Pornography, Harmful Material, and Obscenity.

  • The LEO will learn how to appropriately institute consequences for this behavior i.e. Diversion using Restorative Justice Protocols, Probation or Adjudication.

  • Educate and reform students involved in Vaping rather than write tickets that do not address the problem.

  • We will be learning about a new online Restorative Justice Online Diversion System.

  • We will learn how to investigate, process juveniles in a diversionary program.

  • We will make sure these images that were traded will be listed as known images and be on the lookout status for them not be distributed online by using the NCMEC Child Victim Identification Program (CVIP)

Live, Interactive Webinar: Patrol Officer Response to Internet Crime

This class is discounted for 3 or more from same agency.

Time Allotted:

Eight Hours  (6-8 hour Webinar)

Target Group:

Patrol Officers, Detectives, Resource Officers, Probation and States Attorney’s


Detective Richard Wistocki, Naperville Police Department

Method of Instruction:

Computer Lab and Class Room

Items / Materials:

A variety of investigation specific files delivered via download

Instructional Goal:

The decisions made by the first responder can either make or break a sometimes sensitive internet/digital investigation. This 8 hour program will address the patrol response which is crucial in the handling of complaints and investigations related to internet based crimes, i.e. Fraud, Sexting, Cyberbullying, Sex Predators, Stalking etc.

This Webinar format allows the first responder to be in the comforts of their own home and or police agency.  It is recommended that the Patrol Officer attending this class should have a direct internet connection and NOT a wireless connection.


Instructional Objectives:

Upon completion of the training exercises, participants will:

  • Obtain the basic overview of Craigslist, EBay, Facebook, Form Spring, Various email services, Google, YouTube, Dating Services, Snapchat and Instagram.

  • To search a live hard drive for pictures and videos.

  • How to detect if software based key logging software is attached to the computer.

  • Obtain crucial information in Internet/Computer Fraud Cases.

  • Understand how to obtain IP’s, screen names, email headers, Social Networks

  • User I.D. Banking information and Cell Phone data for the initial report.

  • Various laws concerning Internet Crime such as Computer Tampering, Stalking, Computer Fraud, Identity Theft, Harassment through Electronic Communication, Sexting, Indecent Solicitation of a Child, Sexual Exploitation of a Child and Child Pornography.

  • Overview of computer and cell phone forensics and when it is appropriate to seize these items from a victim or a suspect to be analyzed.

  • The differences in charging Harassment through Electronic Communication and Cyber-Stalking.

  • Procedures involved in obtaining a Stalking No Contact Civil Order of Protection.