Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Can archived computer files be faked with respect to date and content?
04/29/15 | Grumpygresh

Posted on 04/29/2015 8:15:40 PM PDT by grumpygresh

Question for all freeper computer experts. I have a case where I have reason to believe that my opponent has faked the date and content of a website as it appeared in January through April 2011. I have used the way back machine and found that my opponent did not the information that they claimed to have had on the website between January to April 2011. I have not yet received any paperwork or computer file from my opponent. But when I do get the computer file, could it be faked with respect to the date and content? What would be the best course of action to reveal the fraud?


TOPICS: Computers/Internet; Government; Science
KEYWORDS: computerarchiving
Navigation: use the links below to view more comments.
first previous 1-2021-4041-53 next last
To: grumpygresh

Pretty much anything can be changed.

For example, I’m a photojournalist and one tool I regularly use can change every bit of metadata in photos, from date and time to the camera used and GPS coordinates. Now, I don’t change the data, but I often strip it all out, which is essentially changing all the values to zero.

There are steps that can be taken to ensure files are unchanged — checksums and the like. ...but that really needs to be done as an active thing and can’t really be done ex post facto except to compare a known older file and a current copy. For example, you can compare the submitted version of a file with one extracted from an old backup tape.

...but all this is best left in the hands of competent forensic specialists rather than internet pajamahadin.


21 posted on 04/29/2015 8:44:21 PM PDT by MediaMole
[ Post Reply | Private Reply | To 1 | View Replies]

To: UnwashedPeasant

Right now, I have saved (print & digital) the website info from the way back machine. My opponent will claim that their own archiving system is correct and the way back machine is wrong or not admissible. The info on the website would have been there for a long time, at least 6 months, so way back must have sampled it.


22 posted on 04/29/2015 8:44:30 PM PDT by grumpygresh (Democrats & GOPe delenda est. President zero gave us patient zero.)
[ Post Reply | Private Reply | To 19 | View Replies]

To: grumpygresh

“Would the changes leave a trail?”

Not really, since they only have the files that sent you.

However, if you had access to the computer that the web site was developed on and it was on a Windows 7 system, you could obtain various backup copies of the folders these files were kept in via Properties -> Previous Versions of the folders, and then restoring the backup folders VIA COPYING THEM (NOT RESTORING THEM), and then examining the modification dates of the files and what they contain relative to the faked files you received via differencing.

Short of this,it seems to me your best evidence is from the wayback machine.


23 posted on 04/29/2015 8:49:13 PM PDT by catnipman (Cat Nipman: Vote Republican in 2012 and only be called racist one more time!)
[ Post Reply | Private Reply | To 20 | View Replies]

To: grumpygresh

if it’s a file you can change any thing. especially a text file. but others as well. Even live in memory stuff. We used to edit the CICS region while it was running, in extreme cases i the editor was called omegamon. not for the faint hearted. if you wanted to change a table entry without an IPL . you can change anything that digital.
from a wiki description.
When OMEGAMON was released by Candle in 1977, it was recognized as the first MVS* real-time monitor. It also provided the system programmers with tools to immediately perform common tasks that normally required the MVS OS to be IPLed.


24 posted on 04/29/2015 8:49:28 PM PDT by kvanbrunt2 (civil law: commanding what is right and prohibiting what is wrong Blackstone Commentaries I p44)
[ Post Reply | Private Reply | To 1 | View Replies]

To: grumpygresh

This is very vague. Please give more details.
What you really want to do is go after the backup tapes (plural) since you mentioned a website I assume they are backing up offsite. Get after them as they will back up the attributes of files (creation, updates, deletions, etc..). Depending on the OS, it may show far, far more such as who had access, extended attributes and depending on the backup type who accessed the files last.
But without more info on “who” the opponent is (i.e., what kind of files and from where), it is hard to answer. For all we know, it was a virtual machine in Amazon’s cloud that has been deleted once and recreated with ACL’s reset across the board.


25 posted on 04/29/2015 8:50:10 PM PDT by Ghost of SVR4 (So many are so hopelessly dependent on the government that they will fight to protect it.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Vermont Lt
"Sure, just change the date on the computer. Then save the file. It will be tagged with the time and date on the computer—unless you have the clock automatically set."

Won't the actual meta-data in the computer drive show when the fabricated document or file was really created?

26 posted on 04/29/2015 8:54:02 PM PDT by Baynative (We are experiencing the type of government the founders warned us about.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: catnipman

I don’t have the files yet, but I should ask for backup copies, previous versions?


27 posted on 04/29/2015 8:56:59 PM PDT by grumpygresh (Democrats & GOPe delenda est. President zero gave us patient zero.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: grumpygresh

Domain names leave a trail too. Whois records, which servers are used, etc.

Here are a couple archival sites, I am sure there are many more.

http://www.domaintools.com/
http://toolbar.netcraft.com/site_report/

A hacker could probably get some interesting info, even without actually hacking They are probably good at finding metadata.


28 posted on 04/29/2015 8:58:35 PM PDT by UnwashedPeasant (A slave is one who waits for someone to come and free him.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Ghost of SVR4

Thanks for the info. I can’t be specific right now but I can say opponent is non security/ domestic US fed government agency.


29 posted on 04/29/2015 9:03:11 PM PDT by grumpygresh (Democrats & GOPe delenda est. President zero gave us patient zero.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: grumpygresh

Yes, simply change the clock time of your computer going back as much as needed. Then copy original files to new names. Finally copy from new names to original file names. Original files files will be stamped with the date you had set on the computer.

But much easier method is to acquire software which can alter dates directly.


30 posted on 04/29/2015 9:25:43 PM PDT by entropy12 (Prediction: Walker will win Iowa primary, NH is wide open, SC looking good for Cruz)
[ Post Reply | Private Reply | To 1 | View Replies]

To: grumpygresh

It IS possible to change the file date. I don’t know if there is a way to tell that it has been changed though.


31 posted on 04/29/2015 9:33:04 PM PDT by smokingfrog ( sleep with one eye open (<o> ---)
[ Post Reply | Private Reply | To 1 | View Replies]

To: grumpygresh

Depends on the environment, but in general, if I modified something and didn’t want you to know - you wouldn’t.


32 posted on 04/29/2015 9:45:57 PM PDT by TheZMan (I am a secessionist.)
[ Post Reply | Private Reply | To 20 | View Replies]

To: TheZMan

But, what about a website? Others would have previously acessed the site and also could have archived it.


33 posted on 04/29/2015 10:12:21 PM PDT by grumpygresh (Democrats & GOPe delenda est. President zero gave us patient zero.)
[ Post Reply | Private Reply | To 32 | View Replies]

To: grumpygresh

Does your “opponent” have [or did he have at any time] unrestricted physical access to the computers on which these files were stored?


34 posted on 04/29/2015 10:23:55 PM PDT by FredZarguna (On your deathbed you will receive total consciousness. So I got that goin' for me.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Baynative

No.


35 posted on 04/29/2015 10:24:37 PM PDT by FredZarguna (On your deathbed you will receive total consciousness. So I got that goin' for me.)
[ Post Reply | Private Reply | To 26 | View Replies]

To: grumpygresh

Yes and no...

It is easy to ‘touch’ a file, changing the creation/modified date. Some types of files also contain metadata -Internal invisible tracking of editing, which could expose such a fraud - most methods of touching a file would not alter said metadata. But, it is also easy to wipe or alter metadata, if a file does contain it. There can also be change logs in the OS the files were modified on, or on the internet server they were uploaded to. However, these too are easy to change/wipe providing one has access and authority. One can also determine how the file was saved to the drive - But this too is easy to fix, by defragging the drive and mft, and wiping free space.

What you are trying to do is catch somebody who doesn’t know how to change these things... If it is professional IT with full control, you are probably boned.

One way or another, you need a lawyer and a forensic computer specialist to find out. lots of bucks to chase this bet... Better be worth it.


36 posted on 04/29/2015 10:59:47 PM PDT by roamer_1 (Globalism is just socialism in a business suit.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: grumpygresh

“I don’t have the files yet, but I should ask for backup copies, previous versions?”

Won’t do any good. Anything they “give” you can be faked. Aside from the wayback machine, you would have to have access to the PC itself that they developed the website on AND have someone perform a forensic analysis on it, AND that PC would have to be obtained BEFORE they knew what you were up to so they couldn’t cover their tracks on the PC before they handed it over to you.


37 posted on 04/29/2015 11:30:56 PM PDT by catnipman (Cat Nipman: Vote Republican in 2012 and only be called racist one more time!)
[ Post Reply | Private Reply | To 27 | View Replies]

To: roamer_1

Since it’s a domestic government website, I wonder if other copies are archived at Library of Congress, National Archives. WB machine supports my contention, but it is sometimes inadmissible. I wish I could be more specific, but if there’s a settlement, there could be non-disclosure.
I would have to say that all the comments have been quite good, and I’m impressed.


38 posted on 04/29/2015 11:32:12 PM PDT by grumpygresh (Democrats & GOPe delenda est. President zero gave us patient zero.)
[ Post Reply | Private Reply | To 36 | View Replies]

To: grumpygresh
Since it’s a domestic government website, I wonder if other copies are archived at Library of Congress, National Archives.

Most gvt websites are backed up offsite, and non-security sites are usually backed up to secondary private vendors - Though the nature of the backup is beyond my ken. However, there are lawyers that do this sort of thing, and they will know how to proceed... Again, lawyers and computer forensics...

Good luck.

39 posted on 04/29/2015 11:51:56 PM PDT by roamer_1 (Globalism is just socialism in a business suit.)
[ Post Reply | Private Reply | To 38 | View Replies]

To: E. Pluribus Unum

Yes.

I was involved in an IP court case. Someone claimed to own a design and had back dated files to show they had the idea first. BUT this person didn’t understand that the creation date, computer info, and username were all stored in the file. I showed this info in a sworn deposition. He dropped the claims when he was warned he is guilty of perjury.

Open the files in question in a txt editor and you can sometimes find the creation dates.

Goodluck


40 posted on 04/30/2015 12:35:02 AM PDT by Organic Panic
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-53 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson