CommsBlack Mobile

Module 12 — Anti-Forensics Awareness


🔍 1. What Investigators Look At

  • Device images: full copies of storage for later analysis.
  • System and app logs, cached data and databases.
  • Backups and synced copies held by cloud providers.

❌ 2. Common Misconceptions

  • “Incognito mode” removes traces everywhere – it does not.
  • Deleting an app guarantees its data is gone – it may not.
  • Tools marketed as “erasers” often focus on peace of mind, not proven guarantees.

🛠️ 3. Practical Anti-Forensics (Within the Rules)

  • Use separate devices/profiles for truly high-risk roles.
  • Limit the number of apps and services involved in sensitive operations.
  • Treat duress features as last-resort tools and understand the legal context before relying on them.

⚖️ 4. Limits & Ethics

No anti-forensics practice is perfect, especially against capable and well-resourced adversaries. The goal is risk reduction, not guaranteed invisibility, and your approach should always stay within the law in your jurisdiction.