Anti-Forensics

Techniques bad actors use to hide their tracks.

Businesses involved in fraud, employees involved in misconduct, and criminals engaged in computer-related crime all frequently take steps to destroy, conceal, or confuse digital evidence. Depending on the user’s level of sophistication, these efforts can cause critical evidence to be unrecoverable or inadmissible. There are four primary categories of anti-forensics:

Artifact Wiping

The simplest way to prevent the forensic collection of data is to destroy it. Users may employ a variety of techniques to delete files or drives to prevent detection of their illicit activities. This anti-forensic method can be effective if the right approach is used, but often the malicious user is not thorough and data can be recovered. Wholesale deletion of data is also suspicious and easy to detect in many cases, so it may increase scrutiny of the user even when it’s effective.

Data Hiding

If the user wants to continue accessing the data, they may decide to hide it, instead of destroying it. An unsophisticated user may rely on complex folder structures or misleading file names to fool investigators, not realizing that these methods are easily penetrated by forensic tools.

More sophisticated users may employ encryption. This is an effective technique, and sufficiently advanced encryption can be difficult or impossible to decipher without the encryption key. An exceptionally clever user can make it difficult to prove whether the data is even encrypted at all, further increasing the challenge for investigators.

Trail Obfuscation

Crafty individuals may attempt to hide their tracks by changing metadata, such as timestamps, or otherwise modifying the data in such a way that it becomes difficult to investigate or difficult to use in court. Malicious users may also sidetrack an investigation by leaving false clues, leading an examiner down the wrong track.

Attacks Against Forensic Tools

The most sophisticated offenders have a thorough understanding of the common forensic tools and may attempt to exploit their weaknesses. An examiner must rely on experience, judgement, and application of multiple tools to ensure the results of an investigation are accurate, replicable, and defensible in court.

Contact Us:



Email Us



Phone: (855) 839-9084

#

Back to Knowledge Base

ArcherHall

How can we help?

Digital Forensics &

E-Discovery

Digital Evidence
Collection, examination, and testimony

Electronically Stored Information
Processing, production, and hosting

Contact

Give us a call at (855) 839-9084

Or send us a message and we’ll get back to you right away.

    • Digital Forensics
    • E-Discovery
    • Data Breach
    • Knowledge Base
    • MCLE Presentations
    • Pricing
    • About
    • Live Remote CLEs
    • Careers
    • Contact
    • Follow
    Texas Department of Public Safety Investigations Company – License #: A23023701

    0 / 500

    Capitol Digital & Califorensics is now

    ArcherHall

    We are pleased to announce the new name of our company: ArcherHall. We have the same ownership, same dedicated team, and same great service that we’ve delivered for over 20 years. We look forward to continuing to work with you!

    • Home
    • Services
    • Pricing
    • Contact
    • Send Files


    855.839.9084