Solution Guide
Introduction 7
Introduction
In recent years there has been an exponential increase in the volume, velocity,
variety, and sophistication of digital activity by criminals and terrorist groups
around the world. Today, most crimes have a digital component. Some have
called it a digital tsunami. This growth has been augmented by dramatic
advances in electronic hardware. The expanding diversity of consumer
electronic devices and their increasing memory and storage capacity offer
criminals and terrorists a wealth of opportunity to hide harmful information.
It is not uncommon for PCs and laptops to come with hard drives that measure
in the hundreds of Gigabytes of storage. The latest hard drives include options
for one or four Terabytes. Consider that a single Terabyte can store the content
of two hundred DVDs: a vast amount of storage representing a problem that will
only continue to grow.
From PCs to laptops, mobile phones to thumb drives and even game consoles,
digital forensics professionals are being pushed to the limit to clone, ingest,
index, analyze, and store growing amounts of suspect data while preserving the
digital chain of custody and continuing to protect citizens.
Store
Ingest
Store Analyze
Archive
Triage
Present