A forensic approach to IT disaster recovery planning. This paper examines 5 common suspects often responsible for unexpected IT recovery failures.