Digital Forensics —
If ordinary forensics is the application of science in solving crimes, digital forensics uses data retrieval and analysis for the same purpose. As well as digital information from hardware such as computers, smartphones, and all manner of IoT devices, this also encompasses the many volumes of open data that can be derived from social media platforms, messengers, the Dark Web, blockchains, and other sources.
There has long been strong interconnection between offline actions and their counterparts in cyberspace. Forensics has therefore been at work in the digital realm for well over 20 years, with the International Organization on Computer Evidence founded in 1995, followed by the FBI’s Regional Computer Forensic Laboratory in 2000.
Typically, the majority of digital forensic work has been carried out by centralized departments. However, such units have become increasingly overwhelmed by the huge amount of incoming tasks. This observation is also consistent with the report that digital evidence now plays a role in more than 90% of criminal investigations.
The central objective of digital forensics is to provide law enforcement with the insights and evidence needed to successfully proceed with a criminal investigation. However, the sources of data that feed into this process are many, varied, and vast. In such a climate, forensic analysts require a modern, inclusive approach towards the inspection of digital information.
A large part of digital forensics concerns data extracted from devices—the physical artifacts collected in the course of a criminal investigation, such as computers, smartphones, USB sticks, external hard drives, and so on. Forensic experts then thoroughly draw out all data using specialized extraction tools before the analysts get busy, combing through the information for all manner of patterns, leads, and insights.
This process has long been a staple of digital forensics, but to consider hardware as the be-all and end-all of data sources would seriously limit the investigative scope. Placing hardware-based and online data into two separate camps is not just unnecessary; it is erroneous, and could even be counterproductive.
OSINT tools and techniques can significantly broaden the horizons of digital forensics. With automated open data processing tools, analysts can combine device data with the oceans of information available in the online realm. This can greatly enrich the evolution of a case, and provide investigators with leads that would be otherwise inconceivable.
SEE OUR ARTICLES ABOUT
Featured terms
Blockchains —
In a nutshell, a blockchain is a shared, or distributed, ledger recording transactions and assets. The data is compiled through a continuous verification process that links all transactions into a large, decentralized "chain" of participants, who are linked across a network of peer-to-peer computers...
Data Breach —
Data breaches are the exposure of sensitive or classified information to unauthorized parties and can have disastrous consequences for an organization. When a breach occurs, a company often has to pay out huge sums of money to contain the leak and may also suffer costly reputational damage...
Link Analysis —
The process of link analysis involves examining data to uncover relationships or connections that might not be apparent in raw data sets. It is a powerful analytical tool that has a wide range of applications in various sectors, from law enforcement and national security to cyber and...
Operations Security (OPSEC) —
Operations Security, or OPSEC, involves identifying and consolidating critical information to gain a better understanding of a situation. Additionally, it refers to safeguarding data and ensuring a given mission against eavesdropping by unauthorized parties or accidental compromise...
Social Media Intelligence (SOCMINT) —
A close cousin of OSINT, SOCMINT is an acronym meaning ‘social media intelligence.’ SOCMINT is the collection and analysis of data from social media platforms. Such information might be used for various purposes, including digital footprinting, link analysis, etc.
Social Media Piggybacking (Piggyback Marketing) —
When a company’s social media post goes viral, it is only a matter of time before millions of people start talking about it. Seeing an opportunity to leverage the post's popularity, companies can join in to redirect some of the traffic toward their services...
Our OSINT Solutions
A suite of data extraction and analysis methods across social media, blockchains, messengers, and the Dark Web connected directly to your in-house platform via our API.
A versatile OSINT tool for conducting in-depth investigations across social media, blockchains, messengers, and the Dark Web via the Maltego and i2 platforms.