Loading Events

Back to Training Schedule

Social Networking & Cellphone Applications Investigations

Presented by BESURE CONSULTING

Oct. 16 - 17, 2025
8:00 am - 4:00 pm
Tuition:  Free
ILEAS Training Center
1701 East Main St.
Urbana, IL 61802
+ Google Map

Certification

This course is certified by the Illinois Law Enforcement Training and Standards Board.

Training Mandates

  • Civil Rights (2.0 hrs.)
  • Constitutional Use of Law Enforcement Authority (4.0 hrs.)
  • Legal Updates (4.0 hrs.)
  • Procedural Justice (1.0 hr.)
  • Law Concerning Stops, Searches, and the Use of Force (1.0 hr.)
  • Lead Homicide Investigator (16.0 hrs.)

Description

The decisions made by first responders and detectives can either make or break sometimes sensitive investigations into internet-based crimes such as fraud, sexting, cyber bullying, predatory sexual behaviors, stalking, etc.. Intended for both patrol and investigations, this 16-hour course will address ways in which officers can obtain crucial information and evidence in these cases, how due process paperwork is set into motion, and the investigative responses that are critical in the successful handling of these complaints.

IMPORTANT!!!!

Must have the following items: Updated Laptop Computer with power cord (Please go online for updates 1 day prior to class) Download free trial of Snagit from Techsmith.com Must be able to access work email remotely from laptop Must have a LEO sponsored email address accessible from laptop.

Topics

  • Social networks and the information contained in them
  • Searching live hard drives for pictures and videos
  • Searching social networks for suspected criminal activity
  • Obtaining IP’s, screen names, e-mail headers, Facebook user ID’s and cell phone data for investigations
  • Writing subpoenas and search warrants for social networking sites
  • Laws concerning computer tampering, stalking, computer fraud, identity theft, harassment through electronic communications, sexting, indecent solicitation of a child sexual exploitation of a child, and child pornography
  • Computer and cell phone forensics: When is it appropriate to seize these items?
  • Differences in charging Harassment through Electronic Communication and cyber-stalking
  • When is it appropriate and not appropriate to contact suspects in any of these cases?
  • Cell phone applications and how people are using them today

Instructor

Rich Wistocki

Rich Wistocki, Detective (Ret.)
BeSure ConsultingRead more

Deadline

Please register for this course by October 2.