shank wrote:
> Is there a way to delete files and/or select emails without being recovered
> by forensics?
>
> Assuming yes, is there a way to prevent forensics from detecting if you
> performed a delete action?
>
> thanks
>
You're using the wrong OS, if you're hoping to remain "secret".
Try the following.
Remove all hard disks from the computer.
Boot a Linux LiveCD. It stores intermediate files in RAM. With
the proper distro, you can have an email program, fetch the "secret"
messages from the email server (which of course, the forensic person
can't gain access to). Or, alternately, plug in the USB flash stick
that holds your "secret" files, read them with the tools in the
Linux Live environment etc.
When you're finished, shut down the OS and turn off the power.
Now, all intermediate files that were in RAM, are gone. The original
OS is stored on a CD, so that doesn't store any new info. On the next
BIOS POST, the RAM testing and initialization process, will overwrite
any remnant pattern in RAM (I mention that for the "what if the fuzz
kick in the door" crowd). If you want to relatively quickly flush RAM,
just do a restart and let the BIOS clean the RAM. Even pushing the
computer reset button, will trigger BIOS POST within the next 30
seconds. The BIOS may do some amount of writing to RAM, as part
of the POST sequence.
*******
Also remember, that physical evidence is not needed for a "legal
shakedown". Ask the 5000 people receiving letters for torrenting
"Hurt Locker" how much evidence the lawyers have. They can still
squeeze $1500 out of you, without too much trouble. For those
people receiving the legal letter, it's still going to cost them
money, whether they go to court or not.
*******
If you want the convenience of Windows, with all of its forms of
information leakage, it's going to be pretty hard to plug all
the leaks with adhoc methods. You'll likely slip up and forget
something. That's why I get a bit of a chuckle, when someone
mentions their latest CCleaner tactic. There really are too
many leakages, to go about it that way. You need a method
where you can demonstrate there is no hard disk with "scraps"
on it. If there is no hard drive, there is nothing for the
forensic guy to do.
Your email server has archives of all your emails, which can
be held for long periods of time. Even if the official retention
time for an archive or backup at the email provider is one year,
if the tapes or media haven't been rotated, they might still
have copies of your sensitive email years from now. So the
forensic guy doesn't have to work too hard, if he has a
good lawyer helping him.
http://en.wikipedia.org/wiki/Subpoena
Paul