Digital Evidence and Computer Crime, Second Edition

23.1 Identification or Seizure

The aim of this step is to locate likely sources of digital evidence and seize them. In some cases, such as computer intrusion investigations, it may be necessary to extract information from RAM (Figure 23.1).

Figure 23.1: Overview of identification and seizure process.

23.1.1 When the Entire Computer is Required

Категории