American Flag  Official website of the Department of Homeland Security

Investigation

Related Job Titles | Tasks | KSA's

DESCRIPTION

Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include but not limited to interview and interrogation techniques, surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of prosecution versus intelligence gathering.

RELATED JOB TITLES

Persons working in this Specialty area may have job titles similar to:

  • Computer Crime Investigator
  • Special Agent

TASKS

Professional invloved in this Specialty perform the following tasks:

  • Analyze computer-generated threats
  • Assist in the gathering and preservation of evidence used in the prosecution of computer crimes
  • Conduct analysis of log files, evidence, and other information in order to determine best methods for identifying the perpetrator(s) of a network intrusion
  • Conduct interviews of victims and witnesses and conduct interviews or interrogations of suspects
  • Conducts large-scale investigations of criminal activities involving complicated computer programs and networks
  • Determine and develop leads and identify sources of information in order to identify and prosecute the responsible parties to an intrusion
  • Develop an investigative plan to investigate alleged crime, violation, or suspicious activity utilizing computers and the Internet
  • Document original condition of digital and/or associated evidence (e.g., via digital photographs, written reports, etc.)
  • Employ IT systems and digital storage media to solve and prosecute cybercrimes and fraud committed against people and property
  • Establish relationships, if applicable, between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, and public relations professionals)
  • Examine recovered data for information of relevance to the issue at hand
  • Fuse computer network attack analyses with criminal and counterintelligence investigations and operations
  • Identify and/or determine whether a security incident is indicative of a violation of law that requires specific legal action
  • Identify data or intelligence of evidentiary value to support counterintelligence and criminal investigations
  • Identify digital evidence for examination and analysis in such a way as to avoid unintentional alteration
  • Identify elements of proof of the crime
  • Identify outside attackers accessing the system from the internet or insider attackers, that is, authorized users attempting to gain and misuse non-authorized privileges
  • Identify, collect, and seize documentary or physical evidence, to include digital media and logs associated with cyber intrusion incidents, investigations, and operations
  • Prepare reports to document analysis
  • Process crime scenes
  • Secure the electronic device or information source
  • Use specialized equipment and techniques to catalog, document, extract, collect, package, and preserve digital evidence

KSAs

Experts in the Specialty Area have the following Knowledge, Skills, and Ability:

Back to Top