1) Computer systems, which consists of hardware and software that process data and is likely to include the case containing circuit boards, microprocessors, hard drive, memory, and interface connections, the monitor, keyboard, and mouse. A cybercrime suspect with a computer anywhere in the world can attempt to take control or “hack” into networks. For example, a hacker attempted to take control of an offshore oil rig manned by an unmanned robot platform, controlled wirelessly by onshore personnel (Grant, 2009).
2) External drives, removable media, thumb drives, memory cards. These may contain information such as e-mail messages, internet browsing history, chat logs, pictures, image files, databases, financial records, and event logs which can be used as evidence in an investigation (National Institute of Justice, 2008).
3) Handheld devices, such as mobile phones, smart phones, pagers, GPS systems. These may also contain information such as e-mail messages, internet browsing history, chat logs, pictures, image files, databases, financial records, and event logs that can be used as evidence in an investigation (National Institute of Justice, 2008).
4) Peripheral devices, including VoIP devices, memory card readers, and USB and FireWire hubs. Information stored on these devices can be used as evidence, such as recently faxed or printed documents, sources for fingerprints, and other identifiers (National Institute of Justice, 2008).
5) Printers, which are network-attached hardware, should be ‘imaged’ as well as the computer and other equipment. These may contain event logs and recently printed documents that can be used as evidence in an investigation.
References:
Grant, G. (2009, August 25). The New Threat to Oil Supplies:
References: Grant, G. (2009, August 25). The New Threat to Oil Supplies: Hackers. Retrieved January 26, 2012, from www.foreignpolicy.com: http://www.foreignpolicy.com/articles/2009/08/25/the_new_threat_to_oil_supplies_hackers National Institute of Justice. (2008, April 14). Electronic Crime Scene Investigation: A Guide for First Responders. Retrieved January 26, 2012, from www.nij.gov: http://www.nij.gov/nij/publications/ecrime-guide-219941/ch1-electronic-devices/welcome.htm