Whitepaper: Six Naïve Methods of Concealing Digital Evidence, and How to Deal with Them

Criminals are getting more creative and cautious. They try to cover their tracks to the best of their abilities. In most cases, when a crime involves the average citizen, the basic data analysis procedures may suffice. However, sometimes, you might find yourself dealing with crimes involving more experienced lawbreakers, who tend to use advanced techniques in an attempt to hide or delete evidence.

While several basic procedures can still be used for difficult crimes, there is a caveat. Investigators end up having to work with huge volumes of data in limited time—and this means every successive step they take slows down the entire investigation.

In this whitepaper, we will examine six of the most common (and possibly naïve) tricks that criminals use to hide evidence and slow down investigations:

  • Unusual file/folder destination
  • Renamed files
  • Deleted files
  • Not Storing Data on the PC
  • Encryption
  • Storing data in clouds and social media

By the time you finish reading this whitepaper, you will understand the common tricks used by cybercriminals to conceal evidence. You will also acquire enough knowledge to deal with deceptive and evasive techniques in an investigation.