Software: Operating Systems, Network Traffi c, and Applications 䡲 153
of the item. In addition, information about how each item is connected to the outside or inside of the
computer (e.g., cable connections, jumper settings) should be documented and photographed. is
will help the cyber forensics investigator to recreate the user’s computer setup.
Assuming that the evidence can be legally seized, each item should be handled using antistatic
bracelets, guarded against electrostatic discharges that can damage the item, sealed properly (i.e.,
a box that is taped shut), and packed securely for transport (consider sealing the package with
tamper-proof evidence tape). Handlers should wear antistatic bracelets when handling sensitive
media and pro ...