All tags

HOME
Company News OSINT OSINT Case Study OSINT Events OSINT News OSINT Tools Product Updates SL API SL Crimewall SL Professional for i2 SL Professional for Maltego Use Сases

Use Сases15

Check out the latest posts

OSINT Websites: Lifeblood of Online Investigations

Every investigation starts somewhere, and in open-source intelligence (OSINT), that somewhere is online. And the range of websites that an OSINT practitioner may use can be vast and varied, from social media posts and breach forums to WHOIS registries and archived pages. But correctly channeled, these sites can capture the...

The OSINT Fact-Checking Toolkit

In the flood of online information, speed often wins over accuracy. Yet for investigators and analysts, rushing means risk. Fact-checking tools don’t replace human judgment—they sharpen it. The key is workflow: knowing how to verify information quickly without getting lost in tabs, speculation, or repetition. This article breaks...

Inside the Social Graph: Decoding Digital Connections

Every digital interaction, whether it’s a follow, a mention, a shared post, or something else, adds a thread to the web of online relationships. Together, these threads form what analysts call a social graph—a network that maps how people, accounts, and organizations connect across social media platforms. In...

From Image to Intelligence: OCR and Computer Vision

With so much of the world’s information living inside images—screenshots of messages, photos of documents, surveillance clips, and even social media posts with hidden location data—Optical Character Recognition (OCR) and computer vision have become cornerstones of modern intelligence work. And with the AI renaissance, the laborious manual...

iPhone to iFortress: Using OSINT to Secure your Device

When people think about iPhone security, they usually imagine theft—someone grabbing the device off a table or slipping it out of a pocket. But in the world of Open-Source Intelligence (OSINT), the real danger isn’t just losing the phone itself. It’s what can be seen, linked, or...

Advanced Deanonymization Techniques for Law Enforcement and CTI

In today's digital landscape, anonymization is the threat actor’s cloak when carrying out illicit activities. For law enforcement agencies and cyber threat intelligence professionals alike, uncovering the real identities behind pseudonyms has become vital. But while many masks may seem airtight, with the right techniques, chinks can...

You’ve successfully subscribed to Social Links — welcome to our OSINT Blog
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.