This document discusses forensic imaging. It describes how forensic imaging creates an exact copy of a hard drive or other media that can be used as digital evidence. It outlines different types of forensic imaging like physical, logical, and targeted collection. It also lists several tools that are commonly used for forensic imaging like FTK Imager, DriveImage XML, and EnCase forensic imager. Finally, it provides guidance on initial response when encountering shut down machines or live machines at a crime scene.