I am a writer. I am trying to figure out the best scenario for adding something to someone's computer. If a person had physical access could they change the log files over a long period of time (2 or 3 years) to add files or emails to a computer with correct past timestamps)? Could this be done using Metasploit or is there a better software for accessing MacBook log files?
If the person with the files they wish to add did not have physical access to the computer could this be done remotely with all physical/forensic evidence of the hack removed in the log files?