Loading Events

Back to Training Schedule

Identifying & Intercepting School Violence Through Leakage

Presented by BESURE CONSULTING

Jan. 12 - 14, 2026
8:00 am - 4:00 pm
Tuition:  Free
ILEAS Training Center
1701 East Main St.
Urbana, IL 61802
+ Google Map

Certification

This course is certified by the Illinois Law Enforcement Training and Standards Board.

Training Mandates

  • Civil Rights (4.0 hrs.)
  • Constitutional Use of Law Enforcement Authority (1.0 hr.)
  • Crisis Intervention (1.0 hr.)
  • Procedural Justice (1.0 hr.)
  • Lead Homicide Investigator (24.0 hrs.)

Description

Law Enforcement and School Officials need to obtain the proper information when responding to threats of school violence online.  Especially when there is “Leakage” and the posting party is targeting students and school personnel.  It is important for the LEO/School Administrator to obtain crucial information and evidence in these cases and initiate due process paperwork in a timely manner. The LEO will then continue the investigation and use the Exigent Circumstances protocol to get the appropriate information.  Identifying the perpetrator immediately provides Law Enforcement and Schools the ability to act quickly and proactively to reduce the threat of school shootings and other forms of violence.

IMPORTANT- please read this carefully:
All attending Officers/School Officials will need the following items to attend:

  • Laptop Computer (Please open the laptop a day before, start it and go on the internet with it so it can update)
  • Be Able to access your WORK email remotely from your laptop computer.
  • Be able to download Snagit on a free trial  https://www.techsmith.com/download/snagit 
  • Be able to download the Scarch.org Investigative toolbar: http://www.scarch.org/resourccs/search-investigative-and-forensic-toolbar

Topics

  • Learn why it is important NOT to disregard information given to LEO or school officials.
  • Understand what the term “Leakage” means and how we can interpret the information.
  • Learn about free and open source online investigative tools.
  • Know items of cyber evidence needed to successfully identify suspects who post online threats.
  • Learn the three-step process in investigating internet crimes.
  • Learn the importance of Preservation, Exigent Circumstances and Search Warrants if needed.
  • Learn how to obtain IP’s, screen names, screen captures, and email header.
  • Outline state laws covering; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.
  • Once suspect is identified, importance of search warrant, arrest, interrogation and mental evaluation.
  • We will examine a successful cyber-crime case study investigation from start to finish.

Instructor

Rich Wistocki

Rich Wistocki, Detective (Ret.)
BeSure ConsultingRead more

Deadline

Please register for this course by December 29.