Identifying trace evidence in data wiping application software

One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data s...

Full description

Bibliographic Details
Main Authors: Gregory H. Carlton, Gary C Kessler
Format: Article
Language:English
Published: Association of Digital Forensics, Security and Law 2012-06-01
Series:Journal of Digital Forensics, Security and Law
Online Access:http://ojs.jdfsl.org/index.php/jdfsl/article/view/54
id doaj-198e6ccb8cee44d1bb4c124ed3c20646
record_format Article
spelling doaj-198e6ccb8cee44d1bb4c124ed3c206462020-11-25T01:10:11ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232012-06-017211314213Identifying trace evidence in data wiping application softwareGregory H. Carlton0Gary C KesslerCalifornia State Polytechnic University Computer Information Systems Department College of Business AdministrationOne area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to identify these tools and analyze them to determine the extent to which each of the evaluated data wiping applications perform their tasks and to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected activities. We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application. We identified information for each application that is beneficial to forensics examiners when faced with similar situations. This paper describes our application selection process, our application evaluation methodology, and our findings. Following this, we describe limitations of this study and suggest areas of additional research that will benefit the study of digital forensics.http://ojs.jdfsl.org/index.php/jdfsl/article/view/54
collection DOAJ
language English
format Article
sources DOAJ
author Gregory H. Carlton
Gary C Kessler
spellingShingle Gregory H. Carlton
Gary C Kessler
Identifying trace evidence in data wiping application software
Journal of Digital Forensics, Security and Law
author_facet Gregory H. Carlton
Gary C Kessler
author_sort Gregory H. Carlton
title Identifying trace evidence in data wiping application software
title_short Identifying trace evidence in data wiping application software
title_full Identifying trace evidence in data wiping application software
title_fullStr Identifying trace evidence in data wiping application software
title_full_unstemmed Identifying trace evidence in data wiping application software
title_sort identifying trace evidence in data wiping application software
publisher Association of Digital Forensics, Security and Law
series Journal of Digital Forensics, Security and Law
issn 1558-7215
1558-7223
publishDate 2012-06-01
description One area of particular concern for computer forensics examiners involves situations in which someone utilized software applications to destroy evidence. There are products available in the marketplace that are relatively inexpensive and advertised as being able to destroy targeted portions of data stored within a computer system. This study was undertaken to identify these tools and analyze them to determine the extent to which each of the evaluated data wiping applications perform their tasks and to identify trace evidence, if any, left behind on disk media after executing these applications. We evaluated five Windows 7 compatible software products whose advertised features include the ability for users to wipe targeted files, folders, or evidence of selected activities. We conducted a series of experiments that involved executing each application on systems with identical data, and we then analyzed the results and compared the before and after images for each application. We identified information for each application that is beneficial to forensics examiners when faced with similar situations. This paper describes our application selection process, our application evaluation methodology, and our findings. Following this, we describe limitations of this study and suggest areas of additional research that will benefit the study of digital forensics.
url http://ojs.jdfsl.org/index.php/jdfsl/article/view/54
work_keys_str_mv AT gregoryhcarlton identifyingtraceevidenceindatawipingapplicationsoftware
AT garyckessler identifyingtraceevidenceindatawipingapplicationsoftware
_version_ 1725176368489037824