Identifying and Intercepting School Violence Through Leakage - 3 Day
Notice
- This event meets the criteria for specific mandated training
- Non members please click here to contact us to request access to online registrations.
Login Required
Date: Monday, December 1, 2025
Ends On: Wednesday, December 3, 2025
Registration Deadline: Sunday, November 30, 2025
Ends On: Wednesday, December 3, 2025
Registration Deadline: Sunday, November 30, 2025
Instructor Location:
Plainfield Fire Protection District (Headquarters)
Instructor: Detective Richard Wistocki had been with the Naperville Police Department for 25 years. In his last 19 years as an Internet Crimes Investigator with the Naperville Police Department, he has forged numerous partnerships with the community and other Law Enforcement Agencies. He is one of the founding members and an affiliate member of the Illinois Attorney Generals High Tech Crimes Bureau. He is a member of the United States Secret Service Computer Crimes Task Force. Rich�s passion is concentrated in teaching parents how to parent their children while online. He takes his juvenile investigations experience and applies it to teaching parents how to be better parents. In August of 2006, MySpace.com, owned by Fox Interactive Media had presented Detective Wistocki with the �Law Enforcement Innovation� award. He served as the Law Enforcement Liaison between My Space and the Attorney Generals Internet Crimes against Children Task Force. Detective Wistocki currently presents every other month to parent groups on how to protect their children online. He is a regular guest on Fox 32 Chicago as an expert in Cyber-Safety. In May of 2007, Detective Rich Wistocki presented to the National Governors Association on Keeping Kids Safe Online. On June 1st, 2007, the National Exchange Club of Naperville presented Detective Wistocki with the �Officer of the Year� Award.Plainfield Fire Protection District (Headquarters)
23738 W. 135th Street
Plainfield, IL 60544
Driving Directions
Plainfield, IL 60544
Member's Fee: $0
Non-Member & Civilian Fee: $0
The phenomenon of the school shooter in our schools is at an all-time high. With the advent of depression, bullying and suicidal tendencies as a result, first responders in our school and police departments must be trained to handle these situations with immediacy and GREAT sensitivity. The goal MUST be to identify and intercept the criminal activity before the school shooter is able to take action. The goal of this training is to empower school administrators and Law Enforcement how to gather digital evidence against the aggressor so they may find out who the perpetrator is and take action immediately after the comment or posting is made by the aggressor. The LEO/ School Administrator will learn the fundamentals of investigating social media and internet related crimes that deal with domestic terrorism. We will use the Electronics Communication Privacy Act (ECPA) to our advantage in identifying the person responsible for posting the online threats BEFORE the shooter has the opportunity to kill our children.
COURSE PREREQUISITES: This class requires ALL attendees to bring with them a PC or a Mac lap top computer. Chromebooks and IPads will not perform well in this learning environment. The student must be able to sign into their email from the computer that they are using. The student must be able to download the “Search Investigative Tool Bar” to use the cyber investigative tools required in this class. (https://www.search.org/toolbar/) The free 30-day trail of Snagit needs to be downloaded shortly before the class. (https://www.techsmith.com/download/snagit/)
Topics to be discussed:
- Obtain the basic overview of various social networks and what information they possess.
- Learn why it is important NOT to disregard information that has been given to LEO or school officials.
- Learn about the history of the school shooter and their attributes.
- Understanding what the term “Leakage” means and how we can interpret the information.
- Knowing what tool Law Enforcement has according to ECPA.
- Learn about online investigative tools that are free and open source in their use.
- Know items of evidence needed to successfully identify suspects who post online threats.
- Discuss the three-step process in investigating internet crimes.
- Discuss the importance of Preservation, Exigent Circumstances and Search Warrants if needed.
- Understand how to obtain IP's, screen names, screen captures, email headers, and statements for the investigation.
- Discuss the laws in that state in reference; Terrorist Threat, Falsely Making a Terrorist Threat, Swatting and Causing a Catastrophe.
- Overview of computer and cell phone forensics and when it is appropriate to seize these items from a victim or a suspect to be analyzed.
- Once the suspect is identified, the importance of arrest, interrogation and mental evaluation.
- We will examine a case review of a successful cyber-crime investigation from start to finish.
**Funded in Partnership with the Illinois Law Enforcement Training & Standards Board, SRO Grant
This training covers the following mandates:
- Civil Rights - 4.00 hours
- Constitutional / Proper Use of LE Authority - 1.00 hours
- Crisis Intervention - 1.00 hours
- Procedural Justice - 2.00 hours
- Lead Homicide Investigator - 14.50 hours