Boca Raton Police Online Computer Investigations PDF
Document Details
Uploaded by ReplaceableBoolean
Boca Raton Police Department
2020
Michele Miuccio
Tags
Related
- Computer-Related Crimes - Field Notebook Divider PDF
- The Protestant Reformation Online Reading Investigation
- Accommodation & Convergence Investigation & Management 5LMS0072 PDF
- Information Systems for Business - Unit 3 - Jain Online PDF
- Decoding Online Consumer Behaviour Towards Counterfeits - PDF
- SESIÓN N° 02 - INVESTIGACIÓN CIENTÍFICA PDF
Summary
This document outlines standard operating procedures for online computer investigations within the Boca Raton Police Department. It details guidelines for conducting investigations, using fictitious accounts, and maintaining confidentiality.
Full Transcript
BOCA RATON POLICE SERVICES DEPARTMENT Standard Operating Procedure 42.05 ONLINE COMPUTER INVESTIGATIONS Revised: new I. PURPOSE: The purpose of this standard operating procedure is to provide guidelines for conducting online investigations. II. PROCEDURE: A. CONDUCTNG ONLINE INVESTIGATIONS: 1....
BOCA RATON POLICE SERVICES DEPARTMENT Standard Operating Procedure 42.05 ONLINE COMPUTER INVESTIGATIONS Revised: new I. PURPOSE: The purpose of this standard operating procedure is to provide guidelines for conducting online investigations. II. PROCEDURE: A. CONDUCTNG ONLINE INVESTIGATIONS: 1. The Investigative Services Bureau shall address the problem of Internet crimes, namely exploitation of minors in the form of child pornography and its dissemination, and any types of fraud, threats, or other crimes facilitated using the Internet. The assigned detective(s) will actively pursue any Internet crimes brought to their attention. 2. Detectives, while involved in online investigations, shall be required to maintain an undercover identity in accordance with Standard Operating Procedure 43.01 VIN Operations. 3. Detectives who perform online investigations will use online accounts that are properly registered with an undercover identity and paid for with funds set aside for undercover operations. 4. A detective will never use a personal online account to perform online investigations. 5. Computers used for online investigations must be designated by the Department and must be set up as sterile computers, with the sole purpose of conducting online investigations. 6. When initiating a new investigation, sterilized media shall be used to store all information retrieved from the computer’s hard drive. 7. During the online investigation, detectives shall time and date stamp and save all online chat logs to the sterile media. 8. Due to the sensitive nature of the online investigation, it is imperative that information be released only on a need to know basis. Effective: July 7, 2020 Revised: Online Computer Investigations SOP No. 42.05 Page 1 of 2 a. Normally only employees within the investigating unit would need to know unless other employees are required to assist and complete the investigation. b. Confidentiality will serve to protect the security of employees involved, particularly the undercover law enforcement officer (LEO) conducting the online investigation. c. Due to the possible graphic nature of material transmitted and displayed on computer monitors, all online investigations must be conducted in a secure location to avoid public viewing of the material. d. Only Department detectives who have received instruction in conducting online investigations will be allowed to conduct the investigations. B. ONLINE IDENTITIES: 1. LEOs, detectives, and crime analysts may utilize fictitious accounts to access websites, such as social media sites, for the purpose of viewing postings to obtain criminal intelligence information. 2. Employees shall obtain permission from their supervisor before using fictitious accounts and disclose the login name/username for all accounts utilized. 3. Employees shall only utilize fictitious accounts for Department-related activities. 4. Employees shall only log into authorized fictitious accounts from Departmentissued devices and Internet connections. Personal devices and/or personal Internet connections shall never be used. 5. Employees shall never attempt to communicate with other individuals using a fictitious account created for intelligence gathering purposes without supervisory approval. 6. If it becomes necessary to communicate with an individual, the employee shall adhere to the guidelines as stated in this SOP. Approved: Michele Miuccio Chief of Police Effective: July 7, 2020 Revised: Date: Online Computer Investigations SOP No. 42.05 Page 2 of 2