Americans lost over USD 4 billion to cyberattacks in 2020 (McCarthy, 2021). Along with this rise in internet crime, advances in anti-forensic techniques have added new layers of complexity for digital forensic investigators.
Anti-forensic techniques are designed to prevent individuals who commit cyberattacks from being discovered. In this article, we’ll explain the five anti-forensic techniques that present the most significant challenges for today’s digital forensic investigators
1. Disk Wiping
The first technique is disk wiping: deleting all of the data on a hard drive or media storage device. Anti-forensic tools can be used to erase the contents of a drive, making it difficult for forensic analysts to recover the data. Drive Wiper, for example, is a Windows-based tool that offers the option to wipe a drive securely, erasing the data beyond recovery. Likewise, File Shredder is a Java-based tool that can overwrite files to prevent recovery.
2. File Encryption
The second technique is file encryption, or the process of transforming readable data into an unreadable format using various encryption algorithms. While encrypting files is an effective way to protect them from prying eyes, anti-forensic tools can also be used to encrypt files with the intent of making them difficult to access or decode.
The third technique is steganography (National Institute of Standards and Technology, 2018). Steganography is the process of hiding messages or files within another file. Anti-forensic tools like Hidden Tear and Stego Watch can be used to hide information in images, audio, and video, among other file types, so that it is difficult for forensic analysts to uncover. Hidden Tear is a Windows-based tool that can hide files within .jpeg, .gif, and .bmp images. Stego Watch is a Java-based tool that can be used to embed hidden information in .jpeg, .gif, and .png image formats.