Digital Forensic Data and Open Source Intelligence (DFINT+OSINT)

  • Darren Quick
  • Kim-Kwang Raymond Choo
Part of the SpringerBriefs on Cyber Security Systems and Networks book series (BRIEFSCSSN)


This chapter focuses on the externally sourced data aspect of the framework, and explores a process of data mining to extract entity information and a process of fusion with external source data to improve the knowledge discovery potential and intelligence from digital forensic data holdings.


  1. All URLs were last accessed (and correct) on 5 November 2016Google Scholar
  2. ACPO (2006). Good practice guidelines for computer based evidence v4.0, Association of Chief Police Officers. Retrieved March 5, 2014, from
  3. Australia Co (2013). Parliamentary joint committee on law enforcement inquiry into the gathering and use of criminal intelligence, Canberra.Google Scholar
  4. Best, C. (2008). Open source intelligence. Mining massive data sets for security: Advances in data mining, search, social networks and text mining, and their applications to security, 19, 331–344.Google Scholar
  5. Beebe, N. (2009). Digital forensic research: The good, the bad and the unaddressed. In Advances in digital forensics (pp. 17–36). Springer.CrossRefGoogle Scholar
  6. Choo, K.-K. R. (2008). Organised crime groups in cyberspace: a typology. Trends in organized crime, 11(3), 270–295.CrossRefGoogle Scholar
  7. Choo, K.-K. R., & Smith, R. G. (2008). Criminal exploitation of online systems by organised crime groups. Asian Journal of Criminology, 3(1), 37–59.CrossRefGoogle Scholar
  8. Garfinkel, S. (2006). Forensic feature extraction and cross-drive analysis. Digital Investigation, 3, Supplement, no. 0, 71–81.CrossRefGoogle Scholar
  9. Garfinkel, S., Farrell, P., Roussev, V., & Dinolt, G. (2009). Bringing science to digital forensics with standardized forensic corpora. In DFRWS 2009, Montreal, Canada. Retrieved September 9, 2009, from Scholar
  10. Garfinkel, S. (2013). Digital media triage with bulk data analysis and bulk_extractor. Computers and Security, 32, 56–72.CrossRefGoogle Scholar
  11. Gibson, S. (2004). Open source intelligence: An intelligence lifeline. The RUSI Journal, 149(1), 16–22.CrossRefGoogle Scholar
  12. Australian Government (2015). National organised crime response plan 2015–2018, Australia.
  13. IDC (2014a). The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things, EMC Corporation. Retrieved June 1, 2014, from
  14. McKemmish, R. (1999). What is forensic computing?Google Scholar
  15. NIJ (2004) Forensic examination of digital evidence: A guide for law enforcement.
  16. NIJ (2008). Electronic crime scene investigation: A guide for first responders, Second Edition.
  17. Quick, D., & Choo, K.-K. R. (2016). Big forensic data reduction: digital forensic images and electronic evidence. Cluster Computing, 19(2), 723–740.CrossRefGoogle Scholar
  18. Ratcliffe, J. (2008). Intelligence-led policing. Trends and Issues in Crime and Criminal Justice. Australian Institute of Criminology.Google Scholar
  19. Rogers, M. (2003). The role of criminal profiling in the computer forensics process. Computers and Security, 22(4), 292–298.MathSciNetCrossRefGoogle Scholar
  20. Toddington_International (2016). Online investigator’s checklist, Toddington International Inc. Retrieved July 7, 2016, from
  21. UNODC. (2011). United nations office on drugs and crime—Criminal intelligence manual for analysts. New York, Vienna, Austria: United Nations.Google Scholar
  22. Weiser, M., Biros, D. P., & Mosier, G. (2006). Development of a national repository of digital forensic intelligence. In Proceedings of the conference on digital forensics, security and law.Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd., part of Springer Nature 2018

Authors and Affiliations

  • Darren Quick
    • 1
  • Kim-Kwang Raymond Choo
    • 2
  1. 1.University of South AustraliaAdelaideAustralia
  2. 2.University of Texas at San AntonioSan AntonioUSA

Personalised recommendations