If you are interested in registering for a course but are not a registered user or part of an ICAC Task Force or an affiliated agency you should contact your regional ICAC Task Force Commander for information with regard to participating in the ICAC Task Force Program.
ICAC Training & TA Program Course Offerings - Listed below are quick summaries of our course offerings. To learn more or to register for a particular course, click on the title of the course.
ICAC Investigative Techniques Training Program (ICAC-IT)
The purpose of this 4-1/2 day training program is to provide state and local law enforcement investigators with a basic understanding of investigative techniques in the area of Internet crimes against children. These techniques have been developed by the ICAC Task Force and conform to a set of national standards.
ICAC Undercover Chat Investigations Training Program (ICAC-UC)
This 4-1/2 day intensive training program is for experienced ICAC investigators designed to provide them with the latest tools and techniques necessary to combat on-line child exploitation. This program involves a combination of online activities utilizing hands-on computer instruction and presentations by ICAC experts who routinely investigate and prosecute some of the nation's most complex and high-profile cases. Participants will learn how to chat on-line and document cases in an undercover capacity so they have the skills necessary to ensure a successful prosecution upon returning to their respective agencies.
ICAC Peer-to-Peer Training Programs (ICAC-P2P)
These 1 to 2-1/2 day training programs are intended to provide experienced peer-to-peer network investigators with the training, materials and tools necessary to investigate the use of peer-to-peer file sharing networks using advanced technology developed as a result of previous peer-to-peer investigations. Students will receive training on the recently released RoundUp tool. The RoundUp tool was developed collaboratively between Georgetown University, U-MASS, Massachusetts State Police and Pennsylvania State Police. This is yet another tool which can be added to the ICAC Training & Technical Assistance Program's arsenal of peer-to-peer file sharing investigative tools. Law Enforcement can use this tool to investigate the use of peer-to-peer file sharing networks while incorporating many of the techniques learned from previous successful operations.
ICAC Unit Supervisor Training Program (ICAC-US)
This 4-1/2 day course is for ICAC unit commanders and supervisors of ICAC Task Force and affiliated law enforcement agencies. This training program provides students with an overview of managerial, investigative and early intervention strategies to more effectively protect children in their area of responsibility. Experts in the field of Internet exploitation will review emerging technologies and update participants on current investigative and prosecutorial issues associated with supervising an ICAC unit.
ICAC CyberTip Management Training Program
This 2-1/2 day training program will provide an in-depth review of the National Center for Missing and Exploited Children's CyberTipline Program. Participants will learn how CyberTip reports are received, processed, and disseminated by NCMEC analysts. Attendees will spend one-on-one time with NCMEC analysts in an interactive and open environment geared toward providing a clear understanding of the inner workings of the CyberTipline. They will observe and interact with the analysts as they process a variety of Electronic Service Provider and public reports. In addition, this training program will instruct participants on CyberTipline Download Manager, the software application that enhances and streamlines the process of downloading and organizing CyberTipline reports. This class imparts the skills necessary to use the software application developed for use with NCMEC's VPN.
ICAC Trial Advocacy for Prosecutors Training Program (ICAC-TAP)
This 4-1/2 day training program is a trial advocacy course involving computer-facilitated crimes against children. It is for experienced prosecutors and is focused on examining the distinct phases of a trial and the relevant issues, challenges, tactics, strategies, and the law that enhance the skills and knowledge of prosecutors in these cases. This course presents significant training on the authentication of technical evidence; how to prepare and organize your case, the selection of jurors, motions practice in computer cases involving crimes against children, the presentation of expert and fact testimony, cross-examination of defendants and their experts as well as how to conduct effective opening statements and closing arguments, among other topics in trial advocacy in such cases. Post-verdict motions and sentencing issues are discussed and analyzed in this course. It is highly recommended that students attend PCO-PRO I before applying to attend this course. This course is heavily influenced by the investigative protocols and standards of the Department of Justice, Office of Juvenile Justice and Delinquency Prevention, Internet Crimes Against Children Task Force.
ICAC First Responder Training Program (ICAC-FR)
This 1 day training program and is designed to provide cost-effective training to first responding investigators confronted with Internet-based child exploitation cases. Students are provided with information, investigative techniques and best practices for effectively responding to referrals from Task Force agencies, the National Center for Missing & Exploited Children’s CyberTipline and peer-to-peer based investigations. Participants learn how to safely plan and execute “knock and talk” investigations, properly document and collect evidence, conduct on-scene interviews and execute search warrants. Case law and legal issues are reviewed and students receive information regarding training and technical assistance resources available to them and their agencies.