Digital Evidence Obfuscation: Recovery Techniques

J. Philip Craiger, Jeff Swauger, Chris Marberry, Philip Craiger

Research output: Contribution to conferencePresentation

Abstract

Criminals who use computers to commit crimes often hide the fruits of the commission of those crimes. Hiding files on a computer can take on many forms, from file names and extensions to more technical methods such as encryption and steganography. Encryption and steganography have the potential to severely impede the recovery of digital evidence. We discuss encryption and steganography and describe potential methods of coping with each. The techniques we discuss require no special knowledge or advanced hardware or software; however, the use of these techniques does not guarantee the recovery of obfuscated information.
Original languageAmerican English
StatePublished - Mar 2005
EventSensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV - Orlando, FL
Duration: Mar 1 2005 → …

Conference

ConferenceSensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense IV
Period3/1/05 → …

Keywords

  • digital forensics
  • computer crime
  • steganography
  • digital evidence

Disciplines

  • Social and Behavioral Sciences
  • Forensic Science and Technology

Cite this