Académique Documents
Professionnel Documents
Culture Documents
Offered by Geekzruz
1
Ethical Hacker
1. Purpose
Criminal crime scene investigation is of most importance. Since the past few decades the
computer, internet, cell phones and other data systems have made it a new place for criminal to
commit crimes. We are here to help with victims that have fallen victimized upon by these
criminals.
A.
Investigator. You are to arrive 45 minutes after you have been dispatched to the Scene. If you
have any problems with traffic or for whatever reason you will be late please contact your head
supervisor with whom you will be given their cell and pager number.
B.
All Computer Crime Scenes will be responded to in a prompt manner it is up to your lead
Investigator to assist you with any questions you may have at the scene. If you have questions do
2
Ethical Hacker
3. Legal
A.
All investigator that collect and digital or computer evidence must a hear to the new patriot act
of 2001. If for any reason you do not follow this strict guideline you will be suspended
impending a search upon the details of the rules that you had broken.
B.
All investigators must have a search warrant in hand in order to enter the premises and must keep
a extra copy on hand in order to do a search and seizure to abide by the fourth amendment which
4. Technical
A.
All investigators will be expected to be able to examine the digital evidence, photograph the
evidence and record any evidence you have collected. You will also have to make sure the digital
evidence is preserved right and this is an ability we look for with all of our investigators.
B.
All investigators must possess a knowledge in all the following forensic tools as listed: Encase,
Bsed, Cpio, Lsof, L0phtCrack, and FTK (most current version). You must also have extensive
5. Written Report
A written report has to be submitted to your supervisor within 24 hours of the investigation.
The report must list all the information that belongs with the case you have investigated.
3
Ethical Hacker
2. Location
3. Name of Victim(s)
4. Details of what transpired and actions taken at the Computer Crime Scene
All evidence must go thru the correct chain of command. If you use another service you must
have and retain a copy of the receipt for the chain of command. If the evidence has to be mailed
We all look forward to this new venture you are about to take part in. If you have any questions
or concerns you may contact myself or your acting supervisor regarding any information on the
SOPS.
4
Ethical Hacker