All tags

AI Company News Op-Eds OSINT OSINT Case Study OSINT Events OSINT News OSINT Tools Product Updates SL API SL Crimewall SL Professional for i2 SL Professional for Maltego Use Сases

Hey, we’re Social Links — welcome to our OSINT Blog. See our thoughts, stories and ideas.

See what we’ve
written lately
Social Links
Service
Guest Author
Ivan Shkvarun
Meet our author Meet our authors Meet our top authors

Mapping the Trade: Inside Drug Trafficking Investigations

The global narcotics trade operates through organized criminal networks that span continents, exploit digital technologies, and constantly adapt to enforcement pressure. Disrupting these operations requires more than intercepting shipments at borders. It requires investigations that reveal how trafficking groups are structured, how they communicate, and how drugs and profits move...

Following the Money: From AML Compliance to Financial Intelligence

Financial institutions face a constant challenge: detecting criminal funds hidden among billions of legitimate transactions. Anti-money laundering (AML) programs exist to identify these illicit flows before they circulate freely through the global financial system. Yet many organizations still treat AML as a compliance exercise rather than an intelligence capability—and...

Cybersecurity Investigations: OSINT in Incident Response

Cybersecurity investigations begin when digital systems show signs that something is wrong. A login appears from an unusual location, network traffic behaves unexpectedly, or sensitive data moves outside normal workflows. These signals rarely explain themselves. Security teams must determine whether they represent harmless anomalies or indicators of compromise, and then...

OSINT in Military Operations: Supporting Modern Defense

Modern defense operations increasingly rely on information that exists outside traditional classified systems. Satellite imagery, social media activity, commercial flight data, shipping records, and publicly accessible reporting now contribute directly to military intelligence workflows. What was once considered supplementary intelligence has become a persistent source of operational visibility, supporting both...

Threat Intelligence and Incident Response: Building a Unified Defense

Most security teams today operate both threat intelligence and incident response functions. Yet having both capabilities does not automatically translate into stronger security outcomes. In many organizations, intelligence and response still operate separately—one focused on understanding threats, the other on containing incidents. The result is a familiar gap: response...

Recommended

You’ve successfully subscribed to Social Links — welcome to our OSINT Blog
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.