This document proposes a new cyber crime investigation model to address limitations in existing models. It analyzes existing models and identifies gaps such as a lack of focus on evidence handling processes and information flow. The proposed model aims to provide a full scope of the investigation process with defined activities at each step. It focuses on efficiently preserving fragile evidence, transporting and storing it. The model outlines phases like realization, authorization, auditing, managing evidence, and dissemination. It is intended to support investigators by identifying tool and technology needs at each phase and providing a framework for requirements and best practices.