All tags

Company News OSINT OSINT Case Study OSINT Events OSINT News OSINT Tools Product Updates SL API SL Crimewall SL Professional for i2 SL Professional for Maltego Use Сases
Social Links

Social Links

Check out the latest posts

OSINT Websites: Lifeblood of Online Investigations

Every investigation starts somewhere, and in open-source intelligence (OSINT), that somewhere is online. And the range of websites that an OSINT practitioner may use can be vast and varied, from social media posts and breach forums to WHOIS registries and archived pages. But correctly channeled, these sites can capture the...

The OSINT Fact-Checking Toolkit

In the flood of online information, speed often wins over accuracy. Yet for investigators and analysts, rushing means risk. Fact-checking tools don’t replace human judgment—they sharpen it. The key is workflow: knowing how to verify information quickly without getting lost in tabs, speculation, or repetition. This article breaks...

Inside the Social Graph: Decoding Digital Connections

Every digital interaction, whether it’s a follow, a mention, a shared post, or something else, adds a thread to the web of online relationships. Together, these threads form what analysts call a social graph—a network that maps how people, accounts, and organizations connect across social media platforms. In...

Mapping Emotion: Sentiment Analysis in OSINT

In the endless stream of digital communication, every tweet, review, and comment contributes to a massive and chaotic archive of human emotion. Understanding what people think and how strongly they feel was once the domain of surveys and focus groups. Today, artificial intelligence can do it at scale and in...

From Image to Intelligence: OCR and Computer Vision

With so much of the world’s information living inside images—screenshots of messages, photos of documents, surveillance clips, and even social media posts with hidden location data—Optical Character Recognition (OCR) and computer vision have become cornerstones of modern intelligence work. And with the AI renaissance, the laborious manual...

iPhone to iFortress: Using OSINT to Secure your Device

When people think about iPhone security, they usually imagine theft—someone grabbing the device off a table or slipping it out of a pocket. But in the world of Open-Source Intelligence (OSINT), the real danger isn’t just losing the phone itself. It’s what can be seen, linked, or...

You’ve successfully subscribed to Social Links — welcome to our OSINT Blog
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.