This 9+ minute technical presentation discusses strange behaviors in programs, when these behaviors occur, and how these behaviors cause discrepancies between audit data, last access times for files, and a user's actual actions. These behaviors led to the "Two-Fence Strategy" I use when constructing fence rules for Data Fence.