Implementation of Anti Forensics on Hard Drives Using the DoD 5220.22 M Method and British HMG IS5 E

Implementasi Anti Forensik pada Harddisk Menggunakan Metode DoD 5220.22 M dan British HMG IS5 E

  • Muh Fadli Hasa Universitas Ahmad Dahlan
  • Anton Yudhana Universitas Ahmad Dahlan
  • Abdul Fadlil Universitas Ahmad Dahlan
Keywords: Anti forensik, British HMG IS5 E, DoD 5220.22 M, Keamanan data


The process of securing data is related to anti-forensic science, one of the anti-forensic techniques that can be used to safeguard data security, namely by deleting data on storage media. This study examines the implementation of data deletion using the DoD 5220.22 M and British HMG IS5 E methods, then compares these methods. The comparison of the two methods includes performance tests, forensic tests, and data recovery tests. The results of the performance test show that the two methods are strongly influenced by the anti-forensic tools used and do not provide a significant difference when applied using one of the tools. The results of the implementation of data deletion using both methods on the hard disk drive are declared safe to delete data, as evidenced by the extraction results in the forensic test using the Autopsy tool found files on the partition :F with the number of 252 files and on the partition :I with the number of 1 file and the extraction results from the test Forensics using the Recover My File tool managed to find files with the number of 102 files on different partitions, but all the files found in the forensic test process cannot be accessed. The results of the recovery test show that the safest method in the process of deleting data is the British HMG IS5 E method using the Active @ Kill Disk tool, as evidenced by all the results of the recovery process using three tools that do not find any files. Meanwhile, the application of the deletion method that is generally carried out by users, namely the shift + delete method, is declared unsafe, as evidenced by the results of the recovery tests conducted showing that the deleted files can be recovered 100% and can be reaccessed using recovery tools.



Download data is not yet available.


Hermansa, R. Umar, and A. Yudhana, “Pangamanan Pesan Menggunakan Kriptografi Caesar Cipher dan Steganografi EOF pada Citra,” J. Sains Komput. Inform., vol. 4, pp. 157–169, 2020.

Jessica, “Sistem informasi manajemen,” Sist. Inf. Manaj., p. 109, 2018.

S. M. Diesburg and A. I. A. Wang, “A survey of confidential data storage and deletion methods,” ACM Comput. Surv., vol. 43, no. 1, 2010.

Y. W, I. Riadi, and A. Yudhana, “Analisis Keamanan Webserver Menggunakan Metode Penetrasi Testing (PENTEST),” Annu. Res. Semin., vol. 2, no. 1, pp. 300–304, 2016.

R. Indonesia, “Undang-Undang Republik Indonesia Nomor 19 Tahun 2016 Tentang Perubahan Atas Undang-Undang Nomor 11 Tahun 2008 Tentang Informasi Dan Transaksi Elektronik,” UU No. 19 tahun 2016, no. 1, pp. 1–31, 2016.

M. F. Hasa, A. Yudhana, and A. Fadlil, “Analisis Bukti Digital Pada Storage Secure Digital Card Menggunakan Metode Static Forensic,” J. Mob. Forensics, vol. 1, no. 2, pp. 22–30, 2019.

E. Wahyudi, “Definisi dan Teknik Anti forensik,” 2016.

Fathoni Mahardika; Yulian Sani, “Anti Forensik Tools Dalam Meningkatkan Keamanan Data,” pp. 37–39, 2012.

A. Al Anhar, G. B. Satrya, and F. A. Yulianto, “Analisis Perbandingan Keamanan Teknik Penghapusan Data pada Hardisk dengan Metode DoD 5220 . 22 dan GutmannzComparative Analysis of Data Deletion Technique Security on Hard disk with DoD 5220 . 22 and Gutmann Method,” vol. 1, no. 1, pp. 607–613, 2014.

G. Hughes and T. Coughlin, “Tutorial on Disk Drive Data Sanitization Data Loss is Rampant,” Nist Spec. Publ., vol. Volume|, no. September, pp. 1–15, 2006.

S. M. Beloussov, “( 12 ) United States Patent Sty for Partial Erasing Run Wipe Procedure as,” vol. 1, no. 12, 2010.

H. R. Khalifa, F. A. Yulianto, and E. M. Jadied, “Implementasi Teknik Penghapusan Data Dengan Metode DoD 5220 . 22M Pada Sistem Operasi Android Implementation Of Data Deletion Using DoD 5220 . 22M method On Android Operating System,” vol. 3, no. 1, pp. 897–913, 2016.

P. F. Bennison and P. J. Lasher, “Data security issues relating to end of life equipment,” IEEE Int. Symp. Electron. Environ., pp. 317–320, 2004.

T. Martin and A. Jones, “An evaluation of data erasing tools,” Proc. 9th Aust. Digit. Forensics Conf., no. December, pp. 84–92, 2011.

F. P. Document, “Force Policy Document,” pp. 1–11, 2012.

How to Cite
Hasa, M. F., Anton Yudhana, & Abdul Fadlil. (2020). Implementation of Anti Forensics on Hard Drives Using the DoD 5220.22 M Method and British HMG IS5 E. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(4), 736 - 744.
Artikel Teknologi Informasi