If we can develop profiles, then we can determine whether Internet activity that appears threatening was undertaken by a terrorist or a teen-ager. |
If you think of the old days of investigation, your evidence might be in a filing cabinet, and you would have to search through each file and piece of paper. Today, those filing cabinets are filled with digital information, and it's a very different process to sort through them. We have to totally change the way we think about collecting evidence -- you can't interrogate a hard drive. |
In many instances, more than one person has access to a computer. If a computer is used by more than one user to commit a crime, it's important to be able to establish who entered information. |