Data hiding within the context of data storage media is indeed something that has been there for a long time. This trend has been there and it started in the military. The various clusters that are found in storage media were the widely used methods that data could be hidden. The file head has been the most common area where files are hidden (Taylor, 2006). The researcher did no mention modern methods of data hiding. There are modern methods that are associated with data hiding in the storage media. These modern methods include cryptography. The researcher only mentioned the methods that were used long time ago. Another method is by restricting the area in the storage media where change will be effected. It is made in such a way that the change will affect a small area. There are newer methods of undertaking information hiding that uses the current trends (Berghel, 2007).
Although it is important that the preparation phase is an important phase of an information search, the researcher did not put important considerations in this phase. There is no definition of the actions that should be undertaken in this phase. The various tasks that the researcher mentioned like risk assessment is not that necessary in information search. Information search should entail such issues as the extent in which information and the probability of finding the evidence (Taylor, 2006). This is search of information that can be used as evidence. The researcher mentioned tasks that should be undertaken in disaster preparedness. The preparation phase will include the equipment that will be used in the search of digital evidence. The researcher did not mention this important aspect. What is the information that is being sought? What technologies will be required? With t various knowledge in the use of digital evidence, the knowledgeable personnel that will be involved should have the right knowledge. This is part of the preparation (Berghel, 2007).
References
Berghel, H. (2007). Hiding Data, Forensics, and Anti-Forensics. Communications of the ACM, 50 (4), 15-20.
Taylor, R. W. (2006). Digital crime and digital terrorism. Upper Saddle River, N.J.: Pearson/Prentice Hall.