Potentially, an automation may be able to simulate any common user activity, such as Web navigation, authentication
to protected websites, posting of messages, sending of emails, as well as creation and modification of local documents, and
even playing with online videogame. The evidence generated by such actions may provide a person with an airtight
alibi. The presented methodology also includes techniques to avoid or remove traces which may reveal the execution of the automation. If all the needed precautions are taken, there is no way to determine if the evidence found on a computer
has been generated by either a common user activity or an automated procedure.