All tags

AI Company News Op-Eds OSINT OSINT Case Study OSINT Events OSINT News OSINT Tools Product Updates SL API SL Crimewall SL Professional for i2 SL Professional for Maltego Use Сases

Hey, we’re Social Links — welcome to our OSINT Blog. See our thoughts, stories and ideas.

See what we’ve
written lately
Social Links
Service
Guest Author
Ivan Shkvarun
Meet our author Meet our authors Meet our top authors

Tracing Exploitation: Investigating Human Trafficking Networks

Human trafficking rarely unfolds as a single isolated crime. In most cases, it is sustained by organized networks that recruit victims, control their movement, manage exploitation, and profit across multiple locations. Effective investigations therefore need to do more than respond to individual incidents. They need to identify how exploitation is...

Mapping the Trade: Inside Drug Trafficking Investigations

The global narcotics trade operates through organized criminal networks that span continents, exploit digital technologies, and constantly adapt to enforcement pressure. Disrupting these operations requires more than intercepting shipments at borders. It requires investigations that reveal how trafficking groups are structured, how they communicate, and how drugs and profits move...

Following the Money: From AML Compliance to Financial Intelligence

Financial institutions face a constant challenge: detecting criminal funds hidden among billions of legitimate transactions. Anti-money laundering (AML) programs exist to identify these illicit flows before they circulate freely through the global financial system. Yet many organizations still treat AML as a compliance exercise rather than an intelligence capability—and...

Cybersecurity Investigations: OSINT in Incident Response

Cybersecurity investigations begin when digital systems show signs that something is wrong. A login appears from an unusual location, network traffic behaves unexpectedly, or sensitive data moves outside normal workflows. These signals rarely explain themselves. Security teams must determine whether they represent harmless anomalies or indicators of compromise, and then...

OSINT in Military Operations: Supporting Modern Defense

Modern defense operations increasingly rely on information that exists outside traditional classified systems. Satellite imagery, social media activity, commercial flight data, shipping records, and publicly accessible reporting now contribute directly to military intelligence workflows. What was once considered supplementary intelligence has become a persistent source of operational visibility, supporting both...

Recommended

You’ve successfully subscribed to Social Links — welcome to our OSINT Blog
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.