Dated - Quarter Allotment System : Delhi Police!

advertisement
OFFICE OF THE DY. COMMISSIONER OF POLICE: PROV. & LOGISTICS,
(AN ISO 9001: 2000 CERTIFIED UNIT)
5, RAJPUR ROAD, DELHI-110054 (FAX NO. 011-23993344, 011-23974427)
TENDER NOTICE
Separate sealed tenders are invited in two-bid system i.e. Technical Bid and
Price/commercial bid for Purchase/outsourcing of the following items for use in Delhi Police :Sl.
No.
Description of Work
Pre-Bid Meeting
date, time and
venue
Closing date,
time and place
of Tender
Opening date,
time and venue
of Tender
30.04.2013 at
1100 Hrs
at Reception,
Prov. &
Logistics, 5,
Rajpura Road,
Delhi.
30.04.2013 at
1100 Hrs
at Reception,
Prov. &
Logistics, 5,
Rajpura Road,
Delhi.
30.04.2013 at
1100 Hrs
at Reception,
Prov. &
Logistics, 5,
Rajpura Road,
Delhi.
30.04.2013 at
1100 Hrs
at Reception,
Prov. &
Logistics, 5,
Rajpura Road,
Delhi.
30.04.2013 at
1200 Hrs at
Committee Hall,
Prov. &
Logistics, 5,
Rajpura Road,
Delhi.
30.04.2013 at
1130 Hrs. at
Committee Hall,
Prov. &
Logistics, 5,
Rajpura Road,
Delhi.
30.04.2013 at
1230 Hrs. at
Committee Hall,
Prov. &
Logistics, 5,
Rajpura Road,
Delhi.
30.04.2013 at
1300 Hrs. at
Committee Hall,
Prov. &
Logistics, 5,
Rajpura Road,
Delhi.
1.
Providing Tool Specific Skill
Argumentation Programs
for Cyber Forensics for a
period of three years
28.03.2013 at
1100 Hrs
at Conference
Hall, 3rd Floor,
EOW, Mandir
Marg, Delhi.
2.
Providing
Forensic
Acquisition and Analysis
Services for Cyber Crime
Lab, EOW for a period of
three years
28.03.2013 at
1130 Hrs
at Conference
Hall, 3rd Floor,
EOW, Mandir
Marg, Delhi.
3.
Providing
Specific
Skill
Argumentation and ReLearning Program for MAC
Systems
28.03.2013 at
1200 Noon
at Conference
Hall, 3rd Floor,
EOW, Mandir
Marg, Delhi.
4.
Forensic Tool for Mac
System for use in EOW of
Delhi Police
28.03.2013 at
1230 Hrs
at Conference
Hall, 3rd Floor,
EOW, Mandir
Marg, Delhi.
The tenders should reach in this office on the date as mentioned above. The detailed tender
terms & conditions and requirements can be downloaded from Delhi Police website
www.delhipolice.nic.in or can be obtained from the office of the undersigned free of cost on any
working day between 10 AM to 5 PM before closing of tender. In case the due date is declared a
holiday, tender shall be opened on next working day but tender box will be sealed on scheduled
date and time.
DY. COMMISSIONER OF POLICE:
PROV. & LOGISTICS: DELHI.
TENDER FORMAT
TENDER FOR PROVIDING TOOL SPECIFIC SKILL ARGUMENTATION PROGRAMS
FOR CYBER FORENSICS FOR A PERIOD OF THREE YEARS TO DELHI POLICE
1.
NAME OF THE FIRM
:___________________________
2.
CORRESPONDENCE ADDRESS WITH
TELEPHONE AND FAX NO.
:___________________________
LOCAL ADDRESS WITH TELEPHONE
AND FAX NO.
:___________________________
4.
SERVICE TAX REGISTRATION PROOF
:___________________________
5.
COPY OF LATEST SERVICE TAX
DEPOSIT RECEIPT/CHALLAN
3.
:___________________________
6.
LIST OF OWNERS/PARTNERS AND
CERTIFICATION REG. BLACKLIST &
CRIMINAL CASE ATTACHED OR NOT
:___________________________
7.
APPLICATION FEE
:___________________________
8.
EARNEST MONEY DETAIL
:___________________________
9.
COPY OF TERMS AND CONDITION
DULY SIGNED
:___________________________
SIGNATURE OF THE TENDERER WITH STAMP
___________________________
___________________________
___________________________
TENDER TERMS & CONDITIONS
Sealed tenders are invited in two bid system (i) Technical Bid and (ii) Price
Bid by the undersigned from the reputed Private/Government/Semi-Government
Computer Training Institute/Labs or their franchise for “Providing Tool Specific
Skill Argumentation Programs for Cyber Forensics” for a period of three years to
Delhi Police personnel through Regd. post or these can be put personally in the
sealed tender box kept in the Reception Room/Prov. & Logistics Unit, 5, Rajpur
Road, Delhi-110054 on the following terms and conditions: 1)
Separate envelope should be used for Technical Bid as well as Price Bid. The
words “Tender for Providing Tool Specific Skill Argumentation Programs For
Cyber Forensics For A Period Of Three Years To Delhi Police Personnel” shall
be prominently super scribed on the top of each envelop. Both these bids
shall further be put in one envelop addressed to the Deputy Commissioner
of Police, Provision and Logistics, Rajpur Road, Delhi.
2)
The tender should reach this office by 1100 Hrs. on ________.2013.
3)
A pre-bid meeting will be held on 28.03.2013 at 1100 Hrs in Conference
Hall, 3rd Floor, EOW, Mandir Marg, Delhi.
All the interested
tenderers/firms can attend the meeting on scheduled date, time and venue.
Prospective bidders desirous to seek clarifications about training to be
imparted/terms & conditions shall submit their queries in writing and duly
signed by the bidder at least 48 hours before the pre-bid meeting. A box will
be kept in Reception Room of Prov. & Logistics Unit, 5, Rajpur Road, Delhi
on 26.03.2013 between 10 AM to 5 PM. The queries will be discussed at
the pre-bid conference and within one week necessary clarifications would
be posted by Delhi Police on the Websites of Delhi Police apart from
furnishing clarification in writing for which the bidders should state their
address and fax number very clearly on their query letters.
4)
No tender will be accepted by hand and tenders received late will not be
entertained.
5)
The Technical Bids will be first opened on _______.2013 at 1130 Hrs. in
Committee Room, 5, Rajpur Road, Delhi-110054 and the Price Bids will be
opened only after scrutiny of technical bid, if the firm is found technically
qualified.
6)
The participating firms/institutes/labs registered with Service Tax
Department are eligible to fill this tender. A copy of Service Tax Registration
Certificate and Latest Service Tax deposit receipt should also be attached
with the tender.
7)
The tendering firm will have to submit application fee Rs.500/- (Rupees Five
Hundred only) (non refundable) in the shape of Demand Draft in favour of
DCP/P&L at the time of submission of tender. In case the firm fails to
attach the draft of application fee, the tender shall be rejected
straightway.
8)
Incomplete tender will not be accepted.
9)
Conditional tender will not be accepted.
10)
Optional tender will not be accepted. The firm/Institute should have to
quote their rate after careful study of the tender. The option either in model or
in rates will not be accepted and the tender will be rejected straightway.
11)
No tender will be accepted without requisite Bid Security (E.M.D.). Tenderer
must deposit Earnest Money of Rs.1,25,000/- (Rupees One Lac Twenty Five
Thousand only) in the shape of A/c Payee Demand Draft, FDR, Bankers
Cheque or Bank Guarantee from a Commercial Bank in acceptable form in
favour of DCP/P&L, Delhi alongwith the tender. Earnest money deposited
with the tender shall bear no interest.
12)
All units registered with NSIC/DGS&D for these services are exempted
from submission of EMD, provided submission of exemption certificate
issued by the authority concerned.
They have to enclose valid
registration document/exemption certificate with their tender.
13)
The participating firm/institute/lab/agency shall submit a certificate issued
by the concerned OEM (i.e. the one who is manufacturing/creating/
distributing the said software/hardware at an international level) showing
therein that the firm/institute/lab/agency has been certified for providing
such software/hardware/services.
14)
Tendering firm/institute/lab/agency must have 05 (Five) numbers of
computers (minimum) in each lab for participation.
15)
The firm whose rates are accepted will have to deposit Performance Security
@ 10% in the shape of Account Payee Demand Draft or Bankers Cheque,
Fixed Deposit Receipt, or Bank Guarantee from any of the commercial banks
in an acceptable form in favour of Deputy Commissioner of Police, Prov. &
Logistics, 5, Rajpur Road, Delhi-110054 payable at Delhi, safeguarding the
purchaser’s interest in all respects, within a week’s time after acceptance of
letter of acceptance. Security Money Deposit shall bear no interest and shall
be released only after 60 days beyond completion of all contractual
obligations.
16)
Tenderers must quote the net price (inclusive of all taxes) both in words as
well as in figures in price bid proforma at Annexure-“B”. Any over
writing/cutting etc. will render the tender invalid.
17)
The rates offered shall remain valid for 06 (six) calendar months from the
date of bid opening. A bid valid for a shorter period may be rejected by the
Purchaser as non-responsive.
18)
The tendering firm will deposit the papers of the Past Performance, if any.
19)
The tendering firms will have to submit the list of branches/ offices
alongwith address and telephone numbers.
20)
The faculty qualification and details may also be enclosed with tender.
21)
For the Certification programs mentioned in Annexure A, supporting
documents from the respective OEMs (i.e. the one who is
manufacturing/creating/ distributing the said software/hardware at an
international level) would also have to be provided.
22)
Delhi Police reserves the right to vary the quantities and/or split the order
among the selected Bidders, in case the Technical Quality and Cost matrix
are found to be the same.
23)
A bidder can bid in any one or more of the line items ( serial numbers )
mentioned in Annexure A and indicated accordingly in Annexure B. The
lowest bidder for each line item ( serial number) would be calculated
separately.
24)
Delhi Police reserves the right to accept or reject any bid, and to annul the
bid process and reject all bids at any time, without assigning any reason,
prior to signing of contract, without thereby incurring any liability to the
affected Bidder(s) or any obligation to inform the affected Bidder(s) of the
grounds for the action of Delhi Police.
25)
Scope of Work: The Bidder would have to provide all software, hardware,
support materials and other training infrastructure in his Training Center.
The training shall be provided by the successful bidder in his own Training
Center / Facility and by their own faculty so as to train personnel in a batch
of 01-05 candidates/trainees at one time. The training must be completed
as per required schedule indicated in Annexure-“A”. The training would be
provided for at least 06 hours or more per day so as to impart sufficient
proficiency in the training subject. The training shall cover the course
contents for each course as per Annexure-“A”. For the Certified Training
Programs, Certificates of Completion of Training would be issued after
successful completion of the program from the OEM concerned. An
examination would have to be conducted at the end of each training session
and a proficiency certificate alongwith details of the hardware /software and
the nature of training would have to be provided to each passing participant.
26)
The firm will have to provide relevant training material in the form of
hard/soft copy for further reference. Trainees shall be catered with tea and
snacks two times a day i.e. before lunch and after lunch and Packed Lunch
(Vegetarian) per day by the successful bidder. One Computer will be
provided to each trainee for training purposes.
27)
Delhi Police reserves the right to suspend training for “Providing Tool
Specific Skill Argumentation Programs for Cyber Forensics” due to major law
& order arrangement or unforeseen circumstances. However, the training
shall be continued immediately thereafter.
28)
The training will be imparted in Hindi and English so that trainees can
understand the concept clearly.
29)
The firm will have to provide training to approximately 01 – 05 candidates/
trainees per batch.
30)
Sufficient Hands on session have to be included so as to impart practical
training.
31)
The bidder shall give certificate to each trainee on successful completion of
training and provide the database of trainees to concerned Head of
Office/DCP concerned periodically after completion of training.
32)
No advance payment shall be made, on any ground. The payment will be
made on per candidate basis for a batch of candidates at any one point of
time. The firm will have to submit the bills (in triplicate) to DCP/Prov. &
Logistics, 5, Rajpur Road, Delhi of each batch duly verified by ACP/ EOW
deputed by concerned DCP/EOW.
33)
The total number of candidates trained would depend upon the requirement
of Delhi Police. There would be no minimum guaranteed number of
candidates.
34)
The successful bidder would be given 15 days notice to start a training
program for a batch.
35)
The Payment will be made depending upon the availability/release of funds
by the Govt. and the agencies/contractors shall have no claim in case of
delayed payment and no interest will be paid for the delayed payment.
36)
In case the successful tenderer(s) found in-breach of any conditions(s) at
any stage during the contract, legal action as per rules/laws, shall be
initiated against the agency concerned. In that case Security deposits can be
forfeited and outstanding payments can be held-up, besides debarring/
black-listing the agency concerned for at least 07 (seven) years, for further
dealing in this Department.
37)
The Purchase Committee reserves the right to reject any or all the tenders
without assigning any reason thereof.
38)
The competent authority reserves the right to terminate/recall the tender at
any stage on administrative reasons.
39)
The Purchase Committee can visit the Institute/Lab to assess the suitability
of the Institute/Lab and its training infrastructure.
40)
All disputes in this connection shall be settled in N.C.T. of Delhi Jurisdiction
only.
41)
All procedure laid down in GFRs and DFPRs shall be adhered to strictly by
the undersigned and the subordinates and tenderers are bound to respect
the same.
42)
A copy of tender documents terms & condition duly sealed and signed by the
bidder(s) may also be attached with the tender, un-signed tender documents
shall not be accepted.
43)
All the firms participating in the tender must submit a list of their owners/
partners etc. and a certificate to the effect that the firm is neither blacklisted
by any Govt. Department nor any Criminal Case is registered against the
firm or its owner or partners anywhere in India.
44)
The tender will be rejected straight way without assigning any reasons if the
firm/Institution is found involves in any criminal cases, declared black
listed by any Govt/Semi govt. department/agencies etc.
45)
Foreign Companies/Institutions/Labs shall participate in the tender, only
through their Franchisee/Agent in India. No foreign company shall be
entertained directly.
NOTE :(A)
DOCUMENTS REQUIRED TO BE ATTACHED WITH TECHNICAL BID IN
THE FOLLOWING ORDER:1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Application Fee of Rs.500/- in form of demand draft in favour of DCP/P&L.
E.M.D. of Rs.1,25,000/- (Rupees One Lac Twenty Five Thousand only) in
the shape of Bankers Cheque/Bank draft/FDR/Bank Guarantee in favour of
DCP/P&L, 5-Rajpur Road, Delhi-110054.
Copy of Service Tax Registration Certificate.
Copy of Latest Service Tax Deposit Receipt.
Certificate regarding registration with DGS&D, NSIC if claim EMD
exemption.
Copy of past performance, if any.
List of Branches of Firm alongwith address and telephone numbers.
Faculty quality and details thereof.
OEM approval for the Certification Courses.
Copy of terms and conditions duly signed with seal of the firm, in token of
acceptance of terms and conditions.
All the firms participating in the Tender must submit a list of their owners/
partners etc. and a Certificate to the effect that the firm is neither
blacklisted by any Govt. Department nor any Criminal Case is registered
against the firm or its owner or partners anywhere in India.
Copy of certificate issued by the concerned OEM showing therein that the
firm/institute/Lab/Agency has been certified for providing such
software/hardware/service. (As per clause 13 of T&C).
All Other supporting documents as required in the tender shall be attached.
(B)
DOCUMENTS REQUIRED TO BE ATTACHED WITH PRICE- BID IN THE
FOLLOWING ORDER :PRICE BID shall contain price only and no other documents shall be
enclosed with the price bid.
1.
Rates including of all taxes of the item quoted by the tenderer shall be
submitted on their Letter Pad as per Annexure “B” format in clear terms, in
words and in figures. The cutting & over-writing not valid. The option in
the rates will not be entertained.
DY. COMMISSIONER OF POLICE:
PROV. & LOGISTICS: DELHI.
SIGN. OF TENDERER ___________________
NAME IN BLOCK LETTERS:______________
FULL ADDRESS : _______________________
ANNEXURE-“A”
Skill Acquisition Programs
Sl.
No.
Name
Topic Covered
Certification Programs
1.
Accessdata
Install and configure FTK and its components i.e.
Certified
FTK Imager, PRTK, Registry Viewer, Preview evidence
Examiner
with FTK Imager, export evidence files, create
(ACE)
forensic images, convert existing images, Create a
case in FTK, process and analyze documents,
metadata, graphics and e-mail, Use bookmarks and
check marks, KFF database, file filters, Conduct Live
Indexed, Internet Keyword and Regular Expression
searches, Import search lists for Indexed searches,
Data Carving, Create reports, Different mechanism of
password recovery, Password Recovery through
PRTK, Use custom dictionaries and dictionary
profiles, Identify the basic components of the
Windows registry, Review Registry Viewer functions,
accessing the Protect Storage System Provider &
hidden keys, Create biographical dictionaries.
Review features through case studies and
Certifications examination.
2.
Encase
Installation of Encase v7, Creating a case, Navigating
Certified
within the EnCase v7 environment, timeline viewing
Examiner
function, Fastbloc SE, Imaging a removable media,
The CMOS, BIOS and boot sequence, Interpreting
Binary and hexadecimal data, NT/FAT File Systems,
Acquisition of a hard disk, Drive-to-drive acquisition,
Network crossover-cable acquisition, Processing
evidence, Using the EnCase® Evidence Processor,
Preparing evidence for processing, Creating and
conducting raw and index searches, Bookmarking
and tagging search result, File types analysis,
Installing external viewers, Signature analysis, Hash
analysis, report creation.
Review features through case studies and
Certifications examination.
3.
Certified
Understanding steganography applications and data
Steganography hiding technology, Creating the case, Selecting the
Examiner
case evidence, Search for artifacts, Mount and scan
forensic images, Search for Microsoft Windows
registry artifacts, LSB Analysis, Append Analysis,
point-click-and-extract, Creating the report.
Review features through case studies and
Certifications examination.
4.
Logicube
Understanding the connections, Understanding the
CellXtract
graphical user interface (GUI), Connecting the
Mobile Device handset, Data extraction, Data Analysis, SIM card
No.
of
Days
05
05
02
02
Examiner
acquisition,
Memory
card/extended
memory
acquisition, Report preparation.
Review features through case studies and
Certifications examination.
5
Cellebrite
Understanding the connections, understanding the
UFED Mobile unit commands, understanding the features of the
Devices
device, connecting the mobile device, extracting the
Examiner
data from mobile phone including SIM Card,
understanding the logical analysis and physical
analysis, taking the hex dump of the phone memory,
SIM Card cloning, understanding Physical Analyzer,
Physical extraction and analysis, GPS extraction and
decoding, Reporting.
Review features through case studies and
Certifications examination.
6.
AccessData
The AME credential demonstrates your proficiency
Mobile
with Mobile Phone Examiner Plus as well as a
Examiner
general knowledge on process, cellular networks,
(AME)
technology and procedure. Although there are no
prerequisites, AME candidates will benefit from
taking the Mobile Forensics 101 Course and/or the
Mobile Phone Examiner Plus course as a foundation.
In preparation for the process, candidates are
encouraged to test their knowledge of the skills
acquired in the Mobile Forensics 101 and Mobile
Phone Examiner Plus course by reviewing their
course manuals for the above-mentioned course.
Review features through case studies and
Certifications examination.
7.
Logicube
Understanding the different HDD interfaces,
Computer
Hashing, Acquiring data from SATA/IDE HDDs,
Forensic
Acquiring Data from SAS/SCSI HDDs, Protecting the
Acquisition
HDD with ATA Password, Acquiring Laptop HDD
Examiner
through USB, write protecting captured HDD for
analysis, Connecting high end storage and Net
connection with the equipment, Generating Capture
Reports, Running Audit Trail on capture reports.
Review features through case studies and
Certifications examination.
Non Certification Oriented Programs
8.
Live
Data What is live data forensics, difference between offline
Acquisition
data analysis and live data analysis, understanding
using Helix3 the tool capabilities, making the search profiles,
Pro and Live imaging the hard drive images, searching the files,
Response
learning the open source tolls, Understanding the
Toolkit
tool capabilities, making the profiles, searching the
items, preparing the report, Booting the system with
bootable CD, making the profiles, searching the
items and preparing the reports.
Review features through case studies and
Certifications examination.
02
02
03
02
9.
10.
11.
12.
13.
Live
Data
Acquisition
using
AccessData
Triage
What is live data forensics, difference between offline 02
data analysis and live data analysis, understanding
the tool capabilities, making the search profiles,
imaging the hard drive images, searching the files,
learning the open source tools, Understanding the
AD triage capabilities, making the profiles, searching
the items, preparing the report, Booting the system
with bootable CD, making the profiles, searching the
items and preparing the reports.
Review features through case studies and
Certifications examination.
RAID : 0/1/5 Understanding RAID concepts, Difference between 04
Acquisition
RAID 0, 1 & 5, connecting the RAID hard drives to
acquisition devices, making the images of RAID Hard
drives, make 02 images of RAID hard drives, viewing
the captured images through computer.
HDD
data Understanding the SAS, IDE, SATA, SCSI & SSD
Acquisition for connectivity, understanding the optional adapters,
SAS,
connecting the hard drive to duplicator through
IDE/SATA,
adapter, image SCSI hard drive to SATA hard drive,
SCSI, SSD
Laptop
data Booting the laptop through bootable CD, capturing
acquisition
laptop hard drives through USB, Capturing the
laptop hard drive through PCMCIA.
HDD
data Understanding the SAS, IDE, SATA, SCSI & SSD 02
Acquisition for connectivity, understanding the optional adapters,
SAS,
connecting the hard drive to duplicator through
IDE/SATA,
adapter, image SCSI hard drive to SATA hard drive,
SCSI,
SSD and also capture laptop hard drive and SD card data
using IDAS
HDD
data Connecting the hard drive with write blocker, 02
Analysis using Acquiring image, Make a new case, add acquired
X
way image to the case, Indexing the case, search for
forensics and deleted items, search for data files such as doc, xls,
WinHex
pdf, search for internet history, search for USB
history, identification of encrypted files, decryption of
files, email searching, understanding the KFF,
applying the filters, exporting the files, installed
application analysis, Unknown user search,
preparing the report
RAM Analysis Capturing the RAM dump through software, text
using X-ways string searching, searching for running programs
Forensics with
Winhex
Remote Data Connecting to remote system, preview the remoter
analysis using system disk, acquisition of logical drives, acquisition
X-ways
of physical drives, ram dump acquisition, preparing
Forensics with the report.
Winhex
HDD
data Connecting the hard drive with write blocker, Make a 05
Analysis using new case, add acquired image to the case, Indexing
Encase
RAM Analysis
using Encase
Remote Data
Analysis using
Encase
14.
15.
HDD
data
Analysis using
AccessData
the case, search for deleted items, search for data
files such as doc, xls, pdf, search for internet history,
search for USB history, identifications of encrypted
files,
decryption
of
files,
email
searching
understanding the KFF, applying the filters,
exporting the files, installed applications analysis,
Unknown user search, preparing the report.
Capturing the RAM dump through software, text
string searching, searching for running programs
Connecting to remote system, preview the remoter
system disk, acquisition of logical drives, acquisition
of physical drives, RAM dump acquisition, preparing
the report.
Connecting the hard drive with write blocker, Make a 05
new case, add acquired image to the case, Indexing
the case, search for deleted items, search for data
files such as doc, xls, pdf, search for internet history,
search for USB history, identifications of encrypted
files,
decryption
of
files,
email
searching
understanding the KFF, applying the filters,
exporting the files, installed applications analysis,
Unknown user search, preparing the report.
Capturing the RAM dump through software, text
string searching, searching for running programs
RAM Analysis
using
AccessData
Remote Data Connecting to remote system, preview the remoter
Analysis using system disk, acquisition of logical drives, acquisition
AccessData
of physical drives, RAM dump acquisition, preparing
the report.
iPhone, iPAD Understanding the iOS storage technology, selection 05
Forensics
of tool for data capturing, difference between
physical and file system acquisition, Passcode
recovery, deleted data recovery SQLite databases
such as messages, images, videos, calls history,
contacts and much more, extracts and presents GPS
fixes, Wi-Fi networks and cell towers IDs from all iOS
devices, integration of Google maps and google earth,
extracting the keychain file, iOS data decoding,
Safari data decoding, application data decoding,
preparing the report.
Android
Understanding OS, Physical extraction of Android
Forensics
Phone, bypassing any type of lock of Android based
devices, Physical extraction and advanced decoding,
via USB debugging, Data decoding of Android
phones, deleted data recovery, decoding installed
applications, preparing the report.
Blackberry
Understanding
Blackberry
OS,
data
storage
Forensics
technique of Blackberry, physical extraction and
logical extraction of BB, decoding of Address Book
including contact, photos, SMS MMS, Emails and
PIN messages, Recent email contacts (BB OS 6 and
16.
17.
18.
19.
20.
above, where available), Bluetooth devices, Calendar
entries, Memo pad notes, Web browser history, Web
bookmarks, Cookies, BlackBerry messenger –
contacts and chats (excluding group contacts, group
chats, attachments and deleted entries), BlackBerry
messenger history (if enabled by the user),
BlackBerry messenger history (if enabled by the
user), Installed applications, Device Info (Model,
IMEI/MEID, ICCID, PIN, OS version, Platform,
Supported Networks)
Mobiles Phone Understanding the data storage technology of
Forensics
phones, connecting the phone to device, pushing the
agent, data acquisition, physical data acquisition,
data display, data analysis and report generation.
Chinese
Difference between Chinese phones and standard
Phones
phones, Chinese phone chipsets, connectivity of
Chinese phones, understanding the connectivity
options, data acquisition, physical data acquisition,
GPS data analysis (if phone supports) data viewing,
deleted data recovery, report preparation.
E-discovery
Configuring the software, Acquiring email data from 03
and
Email the seized media, link analysis, content analysis and
Analysis using reporting of email and e-discovery results
NUIX
Password
Understanding the password recovery processes, 02
Recovery
connecting the HDD to the password recovery
hardware, password recovery, analysis and report
generation.
Mac
Using Apple Mac Operating System incl overview, 10
familiarization orientation to the desktop, navigation, system
& Forensics
features, preferences, window elements, applications,
multitasking, usage of different applications,
security, various mac softwares and handson. Digital
forensics of apple devices, setting up of a system,
imaging and acquisition, forensic tools and evidence
gathering advanced file system analysis. Usages of
various tools like Backlight R5.
Macdisk for Windows, MacQuisition – Stand alone
USB Forensic image, Hex Fiend, Softblock – Software
based write block, EmailChemy 11.2, Mac Marshall
Forensic as well as Field Edition etc.
Link Analysis
Using l2 Notebook for data acquisition and analysis 04
for diverse databases incl. bank a/c details, CDRS,
Access logs and interpretation of results.
CDR Analysis
Using CDR Analysis Toolkit for multiple CDR 03
Analysis and Interpretation.
ANNEXURE-“B”
PROFORMA FOR PRICE SCHEDULE
Sl.
No.
Description
Name
Rates Offered per
person/trainee for the
indicated number of
days for providing
complete training for
“Providing
Tool
Specific
Skill
Argumentation
Programs for Cyber
Forensics”
for
a
period of three years
to
Delhi
Police
Personnel [including
all taxes and cost for
providing
relevant
training materials in
the form of hard/soft
copy, catering tea
and snacks two times
a day i.e. before
lunch and after lunch,
Packed
Lunch
(Vegetarian) and any
other
services
associated with the
training etc.]
Accessdata Certified Examiner (ACE)
Encase Certified Examiner
Certified Steganography Examiner
Certified Logicube CellXtract Mobile
Device Examiner
Certified Cellebrite UFED Mobile
Devices Examiner
Certified
AccessData
Mobile
Examiner (AME)
Certified Logicube Computer Forensic
Acquisition Examiner
Live Data Acquisition using Helix3
Pro and Live Response Toolkit
Live
Data
Acquisition
using
AccessData Triage
RAID : 0/1/5 Acquisition
HDD data Acquisition for SAS,
IDE/SATA, SCSI, SSD
Laptop data acquisition
05
05
02
02
HDD data Acquisition for SAS,
IDE/SATA, SCSI, SSD using IDAS
HDD data Analysis using X way
forensics and WinHex
RAM
Analysis
using
X-ways
Forensics with Winhex
Remote Data analysis using X-ways
Forensics with Winhex
02
13.
HDD data Analysis using Encase
RAM Analysis using Encase
Remote Data Analysis using Encase
05
14.
HDD data Analysis using AccessData
RAM Analysis using AccessData
Remote
Data
Analysis
using
AccessData
05
15.
iPhone, iPAD Forensics
Android Forensics
Blackberry Forensics
Mobiles Phone Forensics
Chinese Phones
05
16.
E-discovery and Email Analysis using
NUIX
Password Recovery
Mac familiarization & Forensics
Link Analysis
CDR Analysis
03
1.
2.
3.
4.
5
6.
7.
8.
9.
10.
11.
12.
17.
18.
19.
20.
NOTE:
1.
2.
No.
of
Days
Rates offered
inclusive of all
taxes
[in Indian
Rupees]
In figure
Rates offered
inclusive of
all taxes
[in Indian
Rupees]
In words
02
02
03
02
02
04
02
02
10
04
03
RATES SHOULD BE OFFERED ONLY FOR EACH SL. No.
OPTIONAL BID WILL NOT BE ENTERTAINED AS CLARIFIED IN
CLAUSE NO. 10 OF TENDER TERMS & CONDITIONS.
3.
NO CONDITION SHOULD BE INSERTED IN THE PRICE BID AS
CLARIFIED IN CLAUSE NO.9 OF TENDER TERMS & CONDITIONS.
It is hereby certified that we have understood all the terms and conditions specified
in the tender document and are thoroughly aware of the nature of job required to be done
and stores/items to be supplied. We agree to abide by all the tender terms and
conditions.
We hereby offer to carry out the job and (or) supply the stores/items detailed above
or such portion(s) thereof as you specify in the notification of award.
(Signature and seal of Bidder)
Dated: _______________
Download