Itis apparent that in today’s connected world where technology is more developed,with an ample volume of data and nothing more than a click of a mouse away,electronic devices are increasingly vulnerable to attacks and plots. Manycrimes of late are engaged in identity theft, e-mail scams, terrorism,gambling, hacking, espionage, sexual assaults, and data feeds disruptions.According to Healy (2008), companies lose 66 million dollars in relation tocybercrime. Computers are being used in such activities by criminals, as aninstrument from the client to any recipient the client has in mind (Inkipi etal. 2011). With such insecurities anddilemma, governments have suggested numerous ways to help law enforcementagencies to combat cyber-attacks that are aimed at companies and individuals.Any electronic device that contains data and has access to the web isvulnerable to an attack.
With the number of crimes that involve electronics,most of companies depends on digital forensics and Open Source Intelligence forsecurity and improvement on their business. Electronic devices contain shredsof evidence and traces of past events or activities of a person which is veryuseful to law enforcement agencies. Evidence can then be retrieved by searchingfor materials on the internet or retrieving information from the PC and servers(Dinant, 2004). Digital forensic investigation and Open Source intelligence aremost commonly used to prevent cybercrimerely on the finding, examining, analysing, preserving, documenting,interpreting, and reporting information attained on computers, servers,surveillance relating to a private or public investigation. Digital forensicsinvestigation conducts its activity through imagery, surveillance videos,e-mails, software applications, hardware, and disk drives (Casey and Brenner,2011) On the other hand Open Source Intelligence involves extractinginformation from publicly available sources from the internet.
These includeFacebook, WhatsApp, YouTube and Instagram. As the rate of cybercrimesincreases, public and private officials are depending upon advanced softwaretools to collect and process security information. This essay will determinethe core differences between digital forensic investigations and Open SourceIntelligence (OSINT) investigations, focusing on the ways of conductinginvestigations and guidelines used in validating evidences.