Law

Enforcement

webinars

Live, Interactive Webinar:
Patrol Officer Response to Internet Crime
Distance Learning for Law Enforcement
When:
May 28th & 29th from 9:00AM CST - 4:00PM CST
Central Time (US and Canada)

$150.00 per Attendee

Click the "Buy Now" button to enroll

Course Flier

Time Allotted:

(2) Two Days 9AM-4PM CST

Target Group:

Law Enforcement, School Administrators, Patrol Officers, Detectives, Probation and States Attorney’s

Instructor:

Detective Richard Wistocki

Method of Instruction:

Webinar - Wired connection preferred

Items / Materials:

A variety of investigation specific files delivered via download

References:

Internet Crimes Against Children (ICAC) Undercover Operations, Illinois Juvenile Court Act of 2000, NCMEC (CVIP), NASRO, Rosecrance, Linden Oaks Hospital, Bark.us, Webwatcher 

Instructional Goal:

Instructional Goal: The decisions made by the first responder can either make or break a sometimes-sensitive internet/digital investigation. This 16-hour program will address the patrol response which is crucial in handling of complaints and investigations related to internet-based crimes, i.e. Fraud, Sexting, Cyberbullying, Sex Predators, Stalking, Revenge Porn, Computer Tampering etc.

Instructional Objectives: Upon completion of the training exercises, participants will:             

  • Obtain the basic overview of Paypal, Facebook, Snap Chat, Tik Tok Instagram Various email services, Google, YouTube, Grindr, Bumble and Match.             

  • Obtain crucial information in Internet/Computer Fraud Cases.             

  • Learn how to use Snagit to obtain evidence.             

  • Understand how to obtain IP#’s, screen names, email headers, Facebook user I.D. Banking information and Cell Phone data for the initial report.             

  • Review various laws concerning Internet Crime such as Computer Tampering, Stalking, Computer Fraud, Identity Theft, Harassment through Electronic Communication, Sexting, Indecent Solicitation of a Child, Sexual Exploitation of a Child and Child Pornography.        

  • Overview of computer and cell phone forensics and when it is appropriate to seize these items from a victim or a suspect to be analyzed.    The differences in charging Harassment through Electronic Communication and Cyber-Stalking.             

  • How to take a online child exploitation case involving Sexting / Sextortion             

  • When it is appropriate and not appropriate to contact a suspect in any of the forementioned cases.             

  • Work actual cases on what information to obtain and execute the Preservation Letter.

______________________________________________
Live, Interactive Webinar: Patrol Officer Response to Internet Crime

This class is discounted for 3 or more from same agency.

Time Allotted:

Eight Hours  (6-8 hour Webinar)

Target Group:

Patrol Officers, Detectives, Resource Officers, Probation and States Attorney’s

Instructor:

Detective Richard Wistocki, Naperville Police Department

Method of Instruction:

Computer Lab and Class Room

Items / Materials:

A variety of investigation specific files delivered via download

Instructional Goal:


The decisions made by the first responder can either make or break a sometimes sensitive internet/digital investigation. This 8 hour program will address the patrol response which is crucial in the handling of complaints and investigations related to internet based crimes, i.e. Fraud, Sexting, Cyberbullying, Sex Predators, Stalking etc.

This Webinar format allows the first responder to be in the comforts of their own home and or police agency.  It is recommended that the Patrol Officer attending this class should have a direct internet connection and NOT a wireless connection.

 

Instructional Objectives:


Upon completion of the training exercises, participants will:

  • Obtain the basic overview of Craigslist, EBay, Facebook, Form Spring, Various email services, Google, YouTube, Dating Services, Snapchat and Instagram.

  • To search a live hard drive for pictures and videos.

  • How to detect if software based key logging software is attached to the computer.

  • Obtain crucial information in Internet/Computer Fraud Cases.

  • Understand how to obtain IP’s, screen names, email headers, Social Networks

  • User I.D. Banking information and Cell Phone data for the initial report.

  • Various laws concerning Internet Crime such as Computer Tampering, Stalking, Computer Fraud, Identity Theft, Harassment through Electronic Communication, Sexting, Indecent Solicitation of a Child, Sexual Exploitation of a Child and Child Pornography.

  • Overview of computer and cell phone forensics and when it is appropriate to seize these items from a victim or a suspect to be analyzed.

  • The differences in charging Harassment through Electronic Communication and Cyber-Stalking.

  • Procedures involved in obtaining a Stalking No Contact Civil Order of Protection.

________________________________________________________
 
For more information or to schedule an event Contact

Detective Richard Wistocki

BeSure Consulting

​​

Phone: 630.461.0044
Fax:  815.836.8124

Email: richwistocki@besureconsulting.com

  • Facebook Social Icon
  • Twitter Social Icon

© 2020 Be Sure Consulting

Contact Us