
Identifying & Intercepting School Violence Through Leakage
Presented by BESURE CONSULTING
Urbana, IL 61802 + Google Map
Certification
This course is certified by the Illinois Law Enforcement Training and Standards Board.
Training Mandates
- Civil Rights (4.0 hrs.)
- Constitutional Use of Law Enforcement Authority (1.0 hr.)
- Crisis Intervention (1.0 hr.)
- Procedural Justice (1.0 hr.)
- Lead Homicide Investigator (24.0 hrs.)
Description
Law Enforcement and School Officials need to obtain the proper information when responding to threats of school violence online. Especially when there is “Leakage” and the posting party is targeting students and school personnel. It is important for the LEO/School Administrator to obtain crucial information and evidence in these cases and initiate due process paperwork in a timely manner. The LEO will then continue the investigation and use the Exigent Circumstances protocol to get the appropriate information. Identifying the perpetrator immediately provides Law Enforcement and Schools the ability to act quickly and proactively to reduce the threat of school shootings and other forms of violence.
IMPORTANT- please read this carefully:
All attending Officers/School Officials will need the following items to attend:
- Laptop Computer (Please open the laptop a day before, start it and go on the internet with it so it can update)
- Be Able to access your WORK email remotely from your laptop computer.
- Be able to download Snagit on a free trial https://www.techsmith.com/download/snagit
- Be able to download the Scarch.org Investigative toolbar: http://www.scarch.org/resourccs/search-investigative-and-forensic-toolbar
Topics
- Learn why it is important NOT to disregard information given to LEO or school officials.
- Understand what the term “Leakage” means and how we can interpret the information.
- Learn about free and open source online investigative tools.
- Know items of cyber evidence needed to successfully identify suspects who post online threats.
- Learn the three-step process in investigating internet crimes.
- Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.
- Learn how to obtain IP’s, screen names, screen captures, and email header.
- Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.
- Once suspect is identified, importance of search warrant, arrest, interrogation and mental evaluation.
- We will examine a successful cyber-crime case study investigation from start to finish.
Instructor

Rich Wistocki, Detective (Ret.)
BeSure ConsultingRead more
Deadline
Please register for this course by December 29.