Cost – Other eligible registrants (Canadian and International)
Accommodations include arrival of student the night before course start date.
Cost is based on the Single room with a shared bathroom priced at $ 95.00/night
Travel grant funding may be available (for non-federal police agencies only)
The Internet is used by criminals involved in child exploitation. Investigation of these crimes develop rapidly and include missing and murdered children. This course provides the knowledge and tools necessary to combat offences related to Internet child exploitation. The course provides experienced child Internet exploitation investigators with the tools and knowledge to conduct proactive online investigations.
Format and delivery
Length of course
maximum 20 students
theoretical and practical components are done in a computer laboratory
Understanding how to create online identities using appropriate equipment, software, and Internet access.
Understanding how to communicate online using various tools, proven strategies, and techniques.
Understanding how to collect intelligence using open source investigative techniques.
Understanding how to capture and preserve evidence/intelligence using appropriate tools.
Understanding the advantages and risks associated with online investigations.
Knowledge of the offenses, potential defenses, and current case law.
Knowledge of emerging trends in Internet communications and how these trends impact online investigations.
Ability to prepare an electronic disclosure package and present cases using appropriate terminology.
Knowledge of C-24 legislation (Protecting Law Enforcement Officers) and how it relates to online investigations.
Recognizing the overall impact and effects that child exploitation investigations have on investigators and their families.
Eligibility and mandatory requirements
This course is offered to police officers currently working full-time investigating Internet child exploitation crimes or individuals who are authorized to investigate Internet child exploitation crimes.
All registrants must:
be authorized to conduct online undercover investigations