School of Information Systems

Anti Forensic Method

Anti-forensics refer to techniques and methods used to hinder or thwart digital forensic investigations. These techniques are designed to prevent investigators from accessing or recovering data or evidence from electronic devices or digital systems. Anti-forensic techniques can include data encryption, data hiding, file wiping, and the use of steganography to conceal data.

The purpose of anti-forensics is to make it more difficult or even impossible for digital forensic analysts to recover information from a system or device. Anti-forensic techniques are often used by criminals to conceal their activities, hide evidence, or protect their privacy.

Anti-forensics techniques can include data wiping, encryption, steganography (hiding information within other files), file obfuscation (making files harder to read), and file deletion. These techniques can make it difficult or impossible for forensic analysts to recover data or determine the activities that occurred on a device.

While anti-forensics techniques can be used for legitimate purposes such as protecting privacy, they can also be used by criminals to evade detection and prosecution. As a result, digital forensic analysts must be aware of these techniques and develop countermeasures to effectively recover and analyze digital evidence.

Anti-Forensic Method :

Digital forensic investigation refers to the process of collecting digital evidence from digital devices in order to reconstruct criminal activities. However, the advancement of technology has posed challenges to digital forensic investigations, one of which is the emergence of anti-forensic methods. As previously explained, anti-forensic techniques are typically utilized by criminals to conceal incriminating evidence. Some techniques that can be used for anti-forensic purposes:

  1. Data Wiping: This technique involves permanently deleting data from a device or storage media, making it impossible for forensic analysts to recover the information.
  2. Encryption: This technique involves encrypting data to protect it from being accessed by unauthorized users. Encryption can also be used to hide data from forensic analysts by making it difficult to decipher.
  3. Steganography: This technique involves hiding information within other files or images. This can be used to conceal information from forensic analysts or to communicate information in secret.
  4. File Obfuscation: This technique involves modifying files to make them harder to read or analyze. This can be done by changing the file format, removing or altering important metadata, or compressing the file.
  5. File Deletion: This technique involves deleting files from a device or storage media. However, simply deleting files is not enough, as they can often be recovered using forensic tools. To effectively delete files, special software can be used to overwrite the data multiple times, making it impossible to recover.

It’s important to note that anti-forensic techniques can be used for both legitimate and illegal purposes. Legitimate uses can include protecting personal privacy or securing sensitive information, while illegal uses can include concealing criminal activities or evading prosecution. As such, it’s important to use these techniques responsibly and within the boundaries of the law.

Joni Suhartono