|
 |
 |
 |
 |
Checklist for Electronic Media Device Evaluations
Although the methodology for the evaluation and analysis of electronic media devices is necessarily sophisticated, the following high-level and overview checklist conveys the principal components in the identification, isolation, evaluation, and preservation of electronic evidence in a legally acceptable and court admissible manner:
- Record each media device with a unique identifying number
- Write protect each media device
- Forensically duplicate each media device to create a true mirror image
- Mathematically verify and validate that the mirror image is identical to the original
- Inspect media devices for viruses and document occurrences
- Produce directory structure for each media device
- Analyze the electronic media and extract relevant information
- Secure each media device
|
 |
|
|
|
|