Just another WordPress site
  • Parent page
  • Platform
  • Partners
    • Partnering with Us
    • Our Partners
    • Partner Portal
  • Company
    • About
    • Trust Center
    • Support
    • Careers
  • Resources
    • Library
    • Free Tools
    • Blog
    • Training
  • Contact
Platform The Horizon® Platform

Enterprise investigation platform specialising in open-source intelligence.

Components
read more
Identity Rapid Triage
read more
Investigate Link Analysis
read more
Monitor Ongoing Analysis
Use Case
  • Law Enforcement
  • Government
  • Corporate Security
  • Fraud and Risk
  • Insurance
  • Cybersecurity and Threat Intelligence
  • Integrations
  • SocialNet® API
  • Platform
  • Partners
  • Company
  • Resources
  • Contact
Platform The Horizon® Platform

Enterprise investigation platform specialising in open-source intelligence.

Components
read more
Identity Rapid Triage
read more
Investigate Link Analysis
read more
Monitor Ongoing Analysis
Use Case
  • Law Enforcement
  • Government
  • Corporate Security
  • Fraud and Risk
  • Insurance
  • Cybersecurity and Threat Intelligence
  • Integrations
  • SocialNet® API
  • Partnering with Us
  • Our Partners
  • Partner Portal
  • About
  • Trust Center
  • Support
  • Careers
  • Library
  • Free Tools
  • Blog
  • Training

Resources

Blog
Free OSINT Tools
Guides
Topics: OSINT
Filter
Blog
Free OSINT Tools
Guides
Topics: OSINT
Dark Web
Know Your Customer
Cybersecurity
Monitor
Financial Institutions
Criminal Investigations
Technical Tips and Training
News and Commentary
Solutions
Artificial Intelligence
Corporate Security
Fraud and Risk
Government
Insurance
Law Enforcement
OSINT
Security and Compliance
Investigator reviewing digital identity profile and forensic evidence on computer screen for a child exploitation investigation

Case Study: Accelerating Identification in Child Exploitation Investigations

Blog
13 Mar 2026
View Case Study: Accelerating Identification in Child Exploitation Investigations
Business analyst reviewing data dashboards on a laptop with transparent analytics interface, symbolizing ethical OSINT research and lawful data analysis

OSINT vs. surveillance: Why ethical boundaries matter in open source intelligence

Blog
24 Feb 2026
View OSINT vs. surveillance: Why ethical boundaries matter in open source intelligence

OSINT year in review: How open-source intelligence became core to enterprise risk in 2025

Blog
23 Dec 2025
View OSINT year in review: How open-source intelligence became core to enterprise risk in 2025

Professional OSINT is not about data. It’s about decisions.

Blog
15 Dec 2025
View Professional OSINT is not about data. It’s about decisions.

How OSINT is transforming stadium security: Real-time insight for game day threats

Blog
07 Nov 2025
View How OSINT is transforming stadium security: Real-time insight for game day threats

OSINT without barriers: Spend time on the case, Not the bureaucracy (with OSINT tools)

Blog
08 Oct 2025
View OSINT without barriers: Spend time on the case, Not the bureaucracy (with OSINT tools)

What is identity intelligence? Techniques, benefits, and real-world applications in 2026

Blog
28 Aug 2025
View What is identity intelligence? Techniques, benefits, and real-world applications in 2026

8 best social media monitoring tools for law enforcement (2026)

Blog
18 Jun 2025
View 8 best social media monitoring tools for law enforcement (2026)

Social media threat monitoring: 10 effective strategies in 2026

Blog
13 Jun 2025
View Social media threat monitoring: 10 effective strategies in 2026

What is the OSINT Framework?

Blog
25 Apr 2025
View What is the OSINT Framework?
OSINT techniques

OSINT techniques: Complete list of expert tactics for investigators

Blog
10 Apr 2025
View OSINT techniques: Complete list of expert tactics for investigators
OSINT tools

23 best OSINT tools for advanced intelligence gathering in 2026 (paid and free options)

Blog
10 Apr 2025
View 23 best OSINT tools for advanced intelligence gathering in 2026 (paid and free options)

Just do... OSINT: A short primer on identifying counterfeits online

Blog
04 Apr 2025
View Just do... OSINT: A short primer on identifying counterfeits online

The slow collapse of critical thinking in OSINT due to AI

Blog
03 Apr 2025
View The slow collapse of critical thinking in OSINT due to AI

Unmasking the fentanyl trade in illicit online marketplaces

Blog
03 Mar 2025
View Unmasking the fentanyl trade in illicit online marketplaces

Spotting the signs: How social media and the dark web can reveal human trafficking activity

Blog
14 Jan 2025
View Spotting the signs: How social media and the dark web can reveal human trafficking activity

Smart security: Fighting financial fraud with open source intelligence

Blog
16 Oct 2024
View Smart security: Fighting financial fraud with open source intelligence

How does OSINT make it hard for cybercriminals to work?

Blog
09 Oct 2024
View How does OSINT make it hard for cybercriminals to work?

Surprising ways OSINT is used for good

Blog
25 Sep 2024
View Surprising ways OSINT is used for good

How failing faster helps catch criminals: Exploring OSINT for law enforcement

Blog
18 Sep 2024
View How failing faster helps catch criminals: Exploring OSINT for law enforcement

Unpacking OSINT: The power of publicly available information

Blog
11 Sep 2024
View Unpacking OSINT: The power of publicly available information
OSINT investigation challenges

The 13 biggest OSINT investigation challenges

Blog
04 Sep 2024
View The 13 biggest OSINT investigation challenges

Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit

Blog
14 Apr 2024
View Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit

The (un)hidden threat: Child grooming on social media

Blog
25 Mar 2024
View The (un)hidden threat: Child grooming on social media

Stopping an active shooter with OSINT: How publicly available information becomes actionable intelligence

Blog
06 Dec 2023
View Stopping an active shooter with OSINT: How publicly available information becomes actionable intelligence

The significance of AI and ML in OSINT to human investigators

Blog
29 Nov 2023
View The significance of AI and ML in OSINT to human investigators

Unleashing the power of social media analysis tools in investigations

Blog
06 Nov 2023
View Unleashing the power of social media analysis tools in investigations

ShadowDragon commentary: How to scale investigations using open-source intelligence

Blog
13 Oct 2023
View ShadowDragon commentary: How to scale investigations using open-source intelligence

How OSINT differs from traditional cyber threat intelligence?

Blog
25 Jul 2023
View How OSINT differs from traditional cyber threat intelligence?

OSINT methods to investigate suspected AI-generated content

Blog
19 May 2023
View OSINT methods to investigate suspected AI-generated content
1 2
Ready to start the conversation?
Talk to an OSINT expert.
Speak with our team
Resources Blog
  • Platform
  • Partners
  • Company
  • Resources
  • Login
  • Contact
  • Partner Portal
  • Trust Center
  • © 2026 ShadowDragon. All rights reserved.
  • Privacy Policy
  • Cookie Settings