A defensible incident is dependent on reliable evidence. If not handled with precision and care, sensitive information may be overwritten, destroyed, or otherwise corrupted. Follow these steps to learn what to do, and more importantly, what not to do, when a digital crime has been committed.
1. Upon the discovery of a crime, secure and take control of the area containing the equipment.
2. Document the location of the device, those who have access to it and the time of its removal.
3. Do not change the status of the device. Pulling the plug on a live machine can result in the loss of evidence from remote areas and prevent access to encrypted folders.
4. Isolate the compromised device by restricting network access. For a computer, this will involve switching off Wi-Fi and Bluetooth, for a mobile device, use a Faraday bag to prevent a potential remote wipe, or place it in Airplane Mode.
5. If possible, ask the user about the set-up of the system, accurately recording any passwords given.
6. Do not plug anything into the device, open any applications or files or copy anything to or from it.
7. To assist the investigation, seize any manuals, encryption keys or physical security keys related to the item.
Completing the above will help preserve the evidential value of the exhibit, however, it's essential you contact a digital forensic expert (javascript:void(0))as soon as possible so a thorough investigation can take place.