Vous êtes sur la page 1sur 5

Ethical Hacker

Computer Crime Scene Investigation

Offered by Geekzruz

Ethical Hacker-Project Manger

November 24, 2009

1
Ethical Hacker

Criminal Crime Scene Investigations at GeekzRuz

Standard Operating Procedures

Subject: Crime Scene Investigations

1. Purpose

Criminal crime scene investigation is of most importance. Since the past few decades the

computer, internet, cell phones and other data systems have made it a new place for criminal to

commit crimes. We are here to help with victims that have fallen victimized upon by these

criminals.

2. Organization and Administration

A.

A Computer Crime Scene Investigator will be either scheduled daily or be an ON CALL

Investigator. You are to arrive 45 minutes after you have been dispatched to the Scene. If you

have any problems with traffic or for whatever reason you will be late please contact your head

supervisor with whom you will be given their cell and pager number.

B.

All Computer Crime Scenes will be responded to in a prompt manner it is up to your lead

Investigator to assist you with any questions you may have at the scene. If you have questions do

not be afraid to ask.

2
Ethical Hacker

3. Legal

A.

All investigator that collect and digital or computer evidence must a hear to the new patriot act

of 2001. If for any reason you do not follow this strict guideline you will be suspended

impending a search upon the details of the rules that you had broken.

B.

All investigators must have a search warrant in hand in order to enter the premises and must keep

a extra copy on hand in order to do a search and seizure to abide by the fourth amendment which

is in frequent use by law enforcement today.

4. Technical

A.

All investigators will be expected to be able to examine the digital evidence, photograph the

evidence and record any evidence you have collected. You will also have to make sure the digital

evidence is preserved right and this is an ability we look for with all of our investigators.

B.

All investigators must possess a knowledge in all the following forensic tools as listed: Encase,

Bsed, Cpio, Lsof, L0phtCrack, and FTK (most current version). You must also have extensive

knowledge of UNIX, Linux, Solaris, Windows, and Panther OS.

5. Written Report

A written report has to be submitted to your supervisor within 24 hours of the investigation.

The report must list all the information that belongs with the case you have investigated.

1. Date and time of arrival and departure

3
Ethical Hacker

2. Location

3. Name of Victim(s)

4. Details of what transpired and actions taken at the Computer Crime Scene

All evidence must go thru the correct chain of command. If you use another service you must

have and retain a copy of the receipt for the chain of command. If the evidence has to be mailed

you must use registered mail with a receipt.

We all look forward to this new venture you are about to take part in. If you have any questions

or concerns you may contact myself or your acting supervisor regarding any information on the

SOPS.

4
Ethical Hacker

Vous aimerez peut-être aussi