Counterforensics: How Insiders Evade Forensics and How to Reveal Their Hidden Tracks Veriato Aug 8, 2019 Veriato Share: Share on Facebook Share on Twitter Share on LinkedIn Share through email Sophisticated data theft and other covert malicious actions by Insiders can involve covering their tracks with tools to erase data, hide data or even appear to be activities other than what actually occurred.