dfm covers
 
 

Anti-Forensics Tools in the Public Domain

Written by Frazer Lewis

Recovering deleted data goes hand in hand with forensic computing. It is difficult to imagine an investigative scenario whereby the information recovered in deleted data does not play a key role when drawing final conclusions.


Historically, anti-forensic or secure delete tools were somewhat “underground” executables. These applications were shared between the paranoid computer enthusiasts or those who “had something to hide”. Today, there exists a wide variety of secure delete tools that no longer carry such a dubious stigma. How and why did such tools get so popular?


Only a few years ago the average user believed that the process of securely deleting a file consisted of merely “emptying the bin” – and why wouldn’t they? There was no button for the user to get the file back. Many (if not, still most) people believe the same today, though a growing number are becoming more aware that deleted files are not exactly what they seem. Day-to-day computer operators are gradually gaining more education as to the implications of “non-secure” delete operations, though it is unlikely that this knowledge has emerged via a direct public interest in forensics. User awareness of secure deletion began not because people were looking for a way to hide data from prying eyes; rather, that people were looking for a way to recover the holiday snaps they accidentally deleted, or the important email sent from their boss. With this growing demand for data recovery, applications began to emerge providing the functionality which the mass market was looking for. Some companies were quick to cash in on the success, though in today’s world the average user has a wide choice of free offerings.


Due to experiences with other file system applications such as disk continuity checkers or de-fragmentation programs, many believed that an application advertising “deleted data recovery” would prove to be a long and arduous process. Individuals were no doubt surprised when within in a few clicks of a pretty GUI, they had successfully recovered their holiday snaps or important email from work. The uptake of data recovery tools continued to spread… see issue 5 for the rest of this article - subscribe now!


The full article appears in Issue 5 of Digital Forensics Magazine, published 1st Nov 2010. You must log in with a valid subscription to read on...


 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

George Bailey

George Bailey is an IT security professional with over 15 years of experience

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 39 on sale from February 2019:


Making Sense of Digital Forensic International Standards

To many the complexity of Standards, their numbering and obscure contents fail to make practical sense and confuse the entry points for effective use. A roadmap is provided in this paper for Standard information access and optimal use. Read More »

Evidentiary Challenges: Social media, the Dark Web, and Admissibility

This article takes a look at two categories of remote evidence: social media, and the dark web. We will also examine two interesting cases: The Target store credit card breach; and the civil case of Fero v Excellus Health Plan, Inc. Read More »

Subscribe today


Vehicle Data Forensics on Unsupported Systems

The article will help readers understand how to approach a vehicle from a digital forensics’ perspective, it will cover a range of infotainment units from popular manufacturers, data extraction methods and examples of data types found which may be considered intelligence and or used as digital evidence. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue