10. Identification – General Concepts You can take everything, or take only what is subject to search warrant or you can take only data. (Computer of Victim vs. Suspect vs. 2nd party to the event ??) But…
48. Preservation – Hacker systems When you have a case involving a computer as the object or means of committing a crime, remember that a program running in memory might be the evidence of your crime.
49.
50.
51.
52.
53.
54. Preservation – Urban Legend? The possible presence of degaussing (magnets) equipment placed in the crime scene by the suspect. Evidence being lost due the presence of large degaussing hardware hidden in a doorway and operated by a wall switch. Hmm,…not likely.
55.
56.
57.
58.
59. It is the small stuff that can create problems sometimes…
74. Collection If you are seizing more than one computer system first number the computers and then tag the cables and hardware using the computer number. Ex. A-1, B-1, A-2, B-2 etc…