Anti-Forensics
Account Misuse
Clear Browser Artifacts
Clear Email Artifacts
Code Contribution Obfuscation and Misrepresentation
Decrease Privileges
Delayed Execution Triggers
Delete User Account
Deletion of Volume Shadow Copy
Disk Wiping
File Deletion
File Encryption
Hide Artifacts
Hiding or Destroying Command History
Log Deletion
Log Modification
Message Deletion
Modify Windows Registry
Network Obfuscation
Physical Destruction of Storage Media
Physical Removal of Disk Storage
Stalling
Steganography
System Shutdown
Timestomping
Tripwires
Uninstalling Software
Virtualization
Windows System Time Modification
- ID: AF031.002
- Created: 21st March 2026
- Updated: 27th March 2026
- Contributor: The ITM Team
Fragmentation of Functionality Across Contributions
A subject distributes related or interdependent code changes across multiple contributions to obscure their cumulative effect and reduce the likelihood that reviewers identify the full intent or impact.
Each individual change may appear benign or insignificant in isolation; however, when combined, they introduce harmful functionality, weaken controls, or alter system behavior in a meaningful way. This fragmentation complicates both real-time review and retrospective analysis, as investigators must reconstruct intent across multiple artifacts and timelines.
This technique is particularly effective in high-velocity development environments where reviewers assess changes incrementally rather than holistically.