Northeast Counterdrug Training Center

Explore our courses to find the training you need. Upcoming training dates are listed at the bottom of each course description. COURSE LIST VIEW

Did you know you can receive text messages about updates to your NCTC classes? Log in, go to Profile, and opt in for SMS notifications (text messages) today.

Law Enforcement Support Military SF and MP only Attorneys Law Enforcement Businesses Military Corrections

Pennsylvania Overdose Information Network (ODIN) User Training

The Overdose Information Network (ODIN) is a Pennsylvania statewide overdose, naloxone administration and drug identifiable markings application for all PA law enforcement, first responders, and non-law enforcement agencies with a requirement to report on naloxone usage and overdoses within the Commonwealth. For law enforcement and criminal justice agencies, ODIN provides real-time intelligence on overdoses, seizures from those trafficking heroin, identifiable packaging, locations of incidents involving opioids, and other critical information needed from an enforcement perspective. Analysis of overdose and naloxone information within ODIN measure lives saved, geographic location of administrations, results of an administration, instances of multiple administrations to de-identified individuals, demographics of victims receiving naloxone, and much more.

Phoenix Training - Addiction and Connection to Treatment

Those enrolled in this course will learn the principles of trauma informed practices and how to have positive interactions with those suffering from substance use disorder. Practical skills such as engagement techniques, Naloxone administration and how to connect individuals to treatment options will also be taught. Those who complete this training will have a better understanding of the disease of addiction and how they can be part of someone’s recovery.

Physical Surveillance

This five-day course is designed for law enforcement officers involved in the tracking and monitoring of suspects through urban, suburban, or rural conditions for the purpose of documenting activities and potentially interdicting upon these actions. The "hands-on" scenario based training course immerses the attendees into surveillance scenarios simulating street crime situations such as drug dealing, burglaries, robberies, and other crimes.

Role of the Undercover

This course trains new and experienced undercover officers to conduct safe and efficient undercover narcotic operations and understand the roles and responsibilities of other team members. The course stresses how to conduct every undercover operation safely and efficiently. In addition to classroom instruction, the course includes many practical exercises.

Social Networking

This course covers the essentials patrol officers, investigators, probation officers, School Resource Officers and anyone in the criminal justice system needs to know about social networking. Various types of crime are rooted in social networking activity. Drugs, scams, identity theft, flash mobs, sexting, sextortion, cyber bullying, even school shootings can be attributed to social media. This course will break down the elements of social networking, examine what information is collected and demonstrate what a great investigative/intelligence tool it can be.

Street Gang Investigations

This course explores the current trends, identifiers, and dynamics of street gang investigations. Understanding and identifying gang culture both on the street and in correctional facilities requires investigators from both local law enforcement and corrections to work together and share information. The intent of this course is to prepare officers in both large and small agencies to properly identify and interdict gang activity in their respective jurisdictions, collect and manage their gang intelligence, and communicate this information with neighboring jurisdictions and correctional facilities.

Tactical Entry to Drug Labs

OSHA has training and personal protective equipment requirements for officers when they are dismantling a drug lab.  The personal protective equipment requirements provide officers great protection from the chemical hazards but reduces their ability to be tactically sound to defend against the physical threat from the suspects.  These OSHA requirements are not required until the suspect has been removed from the scene.  The entry team will make the scene safe from suspects so the clan lab team can process the scene with the OSHA required personal protective equipment. Classroom lecture and practical training is used for this course.  Students will use safety equipment (Gas Mask and Self-Contained Breathing Apparatus) with simunition guns to clear the mock labs of suspects.

Tactical Narcotic Debriefings

This course will provide lessons and practical exercises which will train the students how to perform all necessary skills associated with conducting an effective “cultivating” debriefing of a prisoner, inmate, new arrest or other, to acquire valuable actionable criminal intelligence and cultivate informants. This course will provide dynamic classroom lessons enhanced by numerous challenging immersion practical exercises in which students will learn and practice the skills and tactics while gaining practical experience to be ready to use the tactics in the field.

Tactics for Narcotic Warrants

A common goal of most narcotic investigations is to execute search warrants to recover illicit drugs and contraband discovered during the investigation. Unfortunately, narcotic-related search warrants are one of the most dangerous types of planned operations conducted by law enforcement agencies across the United States. A narcotic entry team must receive proper and continual training to help minimize the risks associated with the operation.

Technology Threats and Trends Against Law Enforcement

Technology saturates our everyday lives. Yet, so many technologies are being developed with the specific purpose of targeting police officers or hiding criminal activity. This is a unique and eye-opening class for law enforcement personnel who want to learn more on how technologies are being used (or misused) to commit crimes, avoid or detect investigations, and to conduct counter surveillance. However, not only will this class examine and demonstrate how individuals are misusing these technologies, it will also reveal simple, inexpensive ways to mitigate their success as well as provide some investigative tips.