Network home personal computer
Unplug the power to router or modem.
Do not use computer or attempt to search for evidence.
Photograph computer front and back as well as cords and connected devices, as found.
Photograph surrounding area prior to moving any evidence.
If computer is “off”, do not turn “on”.
If computer is “on” and something is displayed on the monitor, photograph the screen.
If computer is “on” and the screen is blank, move mouse or press space bar (this will
display the active image on the screen). After image appears, photograph the screen.
Unplug power cord from back of tower.
Diagram and label cords to later identify connected devices.
Disconnect all cords and devices from tower.
Package components (including router and modem) and transport / store components
as fragile cargo.
Seize additional storage media (see storage media section).
Keep all media, including tower, away from magnets, radio transmitters and other
potentially damaging elements.
Collect instruction manuals, documentation, and notes.
Document all steps involved in the seizure of a computer and components.
Unplug the power to router or modem.
Do not use computer or attempt to search for evidence.
Photograph computer front and back as well as cords and connected devices, as found.
Photograph surrounding area prior to moving any evidence.
If computer is “off”, do not turn “on”.
If computer is “on” and something is displayed on the monitor, photograph the screen.
If computer is “on” and the screen is blank, move mouse or press space bar (this will
display the active image on the screen). After image appears, photograph the screen.
Unplug power cord from back of tower.
Diagram and label cords to later identify connected devices.
Disconnect all cords and devices from tower.
Package components (including router and modem) and transport / store components
as fragile cargo.
Seize additional storage media (see storage media section).
Keep all media, including tower, away from magnets, radio transmitters and other
potentially damaging elements.
Collect instruction manuals, documentation, and notes.
Document all steps involved in the seizure of a computer and components.