Blog

Person selecting a digital identity icon surrounded by KYC and compliance symbols, illustrating customer verification steps

KYC Checklist: 10 Essential Steps for Compliance Success

By Nico Dekens - aka "Dutch Osint Guy" | November 26, 2025

KYC (Know Your Customer) compliance is a vital process for banks, fintechs, insurers, and other regulated organizations. By verifying the identities of your customers and assessing their risk profiles, you can reduce fraud, money laundering, and other financial crimes. But building a KYC program that is consistent, effective, and audit-ready can be a challenge. A […]

Open Source Intelligence (OSINT): What It Is, How It Works, and Why It Matters (+ Tools, Techniques & Use Cases)

By Nico Dekens - aka "Dutch Osint Guy" / February 12, 2025

Discover the power of Open Source Intelligence (OSINT), an essential tool that transforms publicly available data into actionable insights. Learn about its history, methodologies like web scraping and social media monitoring, and the ethical considerations that guide its responsible use.

shadowdragon share

Spotting the Signs: How Social Media and the Dark Web can Reveal Human Trafficking Activity

By Amy Mortlock / January 13, 2025

By: Amanda Blake and David Cook From 2012 to 2022, human trafficking convictions doubled, according to the US Bureau of Justice Statistics. While this most likely indicates an increase in […]

Navigating Election Monitoring: Insights on Security, Disinformation, and Social Media Trends

By Amy Mortlock / October 17, 2024

ShadowDragon’s latest podcast explores election monitoring challenges, including misinformation, security threats, and social media’s role in shaping narratives, with insights from expert analyst Bryeanne Ravettine.

partners resellerfeature@2x

Smart Security: Fighting Financial Fraud with Open Source Intelligence

By Sandy M / October 16, 2024

Financial fraud is rising, with consumers losing over $10 billion in 2023. OSINT solutions help organizations detect threats, analyze patterns, and identify attackers, offering a proactive defense against emerging fraud trends.

CaseStudy uncover and attribute@2x

How Does OSINT Make It Hard for Cybercriminals to Work?

By Nico Dekens - aka "Dutch Osint Guy" / October 9, 2024

OSINT leverages publicly available data from the surface, deep, and dark web to detect cyber threats, uncover cybercriminal activities, and enhance proactive defense. It aids in threat intelligence, exposing identities, and supporting law enforcement to disrupt malicious operations.

features customize@2x

Surprising Ways OSINT is Used for Good

By Amy Mortlock / September 25, 2024

Open source intelligence (OSINT) is a powerful tool used for good across various sectors, including combating human trafficking, preventing crime, monitoring elections, ensuring corporate responsibility, protecting consumers, supporting humanitarian aid, and aiding public health and environmental efforts.

How Failing Faster Helps Catch Criminals: Exploring OSINT for Law Enforcement

By Sandy M / September 18, 2024

In law enforcement, the ability to adapt quickly and learn from mistakes is crucial. This concept, often called “failing faster,” is not about accepting failure but about using it as […]

Thumb UseCases@2x

Unpacking OSINT: The Power of Publicly Available Information

By Amy Mortlock / September 11, 2024

Discover the power of Open Source Intelligence (OSINT) for turning publicly available data into actionable insights. From national security to corporate risk management, learn how OSINT tools identify patterns, track threats, and uncover new opportunities while addressing ethical considerations.

dark prism data wave

The 13 Biggest OSINT Investigation Challenges

By Nico Dekens - aka "Dutch Osint Guy" / September 4, 2024

Conducting OSINT investigations can be challenging, with issues like information overload, data quality verification, technical skills, legal considerations, and misinformation. Overcoming these hurdles requires the right tools, methodologies, and expertise to streamline efforts and ensure actionable insights.

Illuminating Context with Timeline Analysis

By Amy Mortlock / July 29, 2024

In our training courses, we push ideas and investigative methodology more than we push our tools. Tools will change, but proper investigative methods will not change. Asking the right questions […]

Introducing ShadowDragon’s Horizon™ Monitor.

By Amy Mortlock / July 15, 2024

We are excited to announce a game-changing enhancement to our Horizon™™™™ intelligence platform: Horizon™™™™ Monitor. This represents a significant leap forward, seamlessly integrating with our existing world-class OSINT link analysis, […]

ShadowDragon Partners with SynapseAi to Expand Influence in Asia Pacific

By Amy Mortlock / June 26, 2024

Hoover, AL – [26th June] – ShadowDragon™, a provider of ethical open-source intelligence (OSINT), unique datasets and APIs, is pleased to expand its partner ecosystem through a strategic partnership with […]

Link analysis with OSINT, breach data, and intelligence in one comprehensive investigations toolkit

By Amy Mortlock / April 14, 2024

In a landscape where information is power, the ability to gather, analyze, and act upon open-source intelligence (OSINT) is paramount for organizations across all sectors. Recognizing this need, we have […]

ShadowDragon Wins 2024 Frost & Sullivan Best Practices Award for Excellence in Global Open-Source Intelligence

By Amy Mortlock / March 26, 2024

As a pioneer of open-source intelligence (OSINT) investigation tools dating back to 2009, ShadowDragon is honored by a recent award recognizing us as a transparent and reliable vendor that supports […]

ShadowDragon introduces Horizon™ Identity

ShadowDragon Enters Strategic Partnership with Collaboraite and Vestigo to Build Trust in OSINT

By Amy Mortlock / March 26, 2024

Global leaders in open-source intelligence and operational security partner to foster trust in data and technology HOOVER, ALABAMA – March 4, 2024 – ShadowDragon™, a provider of ethical open-source intelligence […]

The (Un)hidden Threat: Child Grooming on Social Media

By Amy Mortlock / March 25, 2024

Technative generations do not know life without the internet and even my one year old niece knows how to navigate a device. Whilst screen time can be good for learning […]

Stopping an Active Shooter with OSINT: How Publicly Available Information Becomes Actionable Intelligence

By Amy Mortlock / December 6, 2023

[First printed in the December 2023 edition of Security Technology] You Might Also Enjoy… OSINT Investigator Training 101: Building a Foundation for Success Unmasking a carder with OSINT Illuminating Context […]

The Significance of AI and ML in OSINT to Human Investigators

By Nico Dekens - aka "Dutch Osint Guy" / November 29, 2023

Artificial Intelligence (AI) and Machine Learning (ML) excel in processing vast amounts of data swiftly. During open-source intelligence (OSINT) investigations, you almost always gather information in overwhelming volumes. AI algorithms […]

Unleashing the Power of Social Media Analysis Tools in Investigations

By Sandy M / November 6, 2023

[Originally on Kaseware.com] In this fast-paced digital age, utilizing data from social media platforms has become essential for uncovering crucial information in investigations. Digital footprints left by individuals and entities […]

ShadowDragon Commentary: How to Scale Investigations Using Open-Source Intelligence

By Amy Mortlock / October 13, 2023

Recently, ShadowDragon CEO, dclemens, contributed an article to Security Management Magazine for their October 2023 organized crime issue. In the piece, he offers firsthand insights into how investigators can improve […]

How OSINT Differs from Traditional Cyber Threat Intelligence?

By Sandy M / July 25, 2023

While there may be some minor overlap, there are major distinctions between traditional Cyber Threat Intelligence (CTI) and the more advanced Open Source Intelligence (OSINT). The efficiency, effectiveness, and approach […]

OSINT Investigator Training 101: Building a Foundation for Success

By Olivia Gransback / June 20, 2023

Today’s investigators and analysts using online sources to investigate cases are often so focused on where to click, that they don’t even realize what their tools are doing in the […]

OSINT Methods To Investigate Suspected AI Generated Content

By Nico Dekens - aka "Dutch Osint Guy" / May 19, 2023

The proliferation of content generated by artificial intelligence (AI) is just beginning. Recent years haveseen online accounts, run by bots, create fake news articles, divisive social media posts, fraudulentproduct reviews, […]

ShadowDragon Commentary: OSINT vs Classified Secrets

By Amy Mortlock / April 11, 2023

In a recent opinion piece for The Cipher Brief, Gregory Sims, former CIA Clandestine Service for over thirty years, including multiple field tours as Chief and Deputy Chief of CIA […]

Sportradar Case Study: Deep Background Checks, Organizational Integrity, and Fraud Investigations

By Sandy M / March 20, 2023

Investigating integrity and criminality in commerce is a daunting task that requires access to vast amounts of information and complex organizational analysis. The scale rises considerably when investigations are international […]

OSINT Observations from ShadowDragon Experts: Moldova

By Nico Dekens - aka "Dutch Osint Guy" / March 15, 2023

NicoDekens, Director of Intelligence and Innovation Collection, ShadowDragon You Might Also Enjoy… The Significance of AI and ML in OSINT to Human Investigators ShadowDragon Commentary: OSINT vs Classified Secrets Diving […]

Diving Deeper: What Past Attackers Tell Us About Bryan Kohberger

By Amy Mortlock / January 11, 2023

After six weeks of investigation, on Dec. 30, 2022 authorities arrested Bryan Kohberger as the key suspect in the quadruple murders of four University of Idaho students. This case (which […]

APT33 CircleOfTruth

Additional Insights into Iranian Cyber Espionage | APT33

By Amy Mortlock / April 24, 2020

Earlier this week FireEye/Mandiant had released a blog entitled “Insights into Iranian Cyber Espionage”detailing the targets within the Aerospace and Energy sectors being targeted. To compliment their post we wanted […]

background checks

Background Checks & Due Diligence

By Sandy M / March 11, 2020

Many years ago, when I was in college, I had a job at a large retailer.  It involved all of the normal retail-y things: stocking, checking, unloading trucks, helping customers, […]

heatmaps

Heat Maps: Form Over Function

By Amy Mortlock / March 6, 2020

Since movies took over displaying intelligence, we have seen crazy maps and charts attempt to display intelligence and seem “futuristic.” Here, we can see an example of a heat map:  […]

unmasking carder07

Unmasking a carder with OSINT

By Sandy M / February 19, 2020

Today, we will be exploring the world of carding a bit and following the path of a kid on his way to becoming a full-fledged carder.  I spent about an […]

OSINT for Fun and Profit02

Iran and OSINT Hunting for Fun & Profit.

By Sandy M / January 15, 2020

Today, I’m going to go on a very basic hunting adventure. Every so often, I do stuff like this for “fun”.  There’s no deep takeaway here –– just some basic […]

screenshot

Job Post: Training and Curriculum Specialist

By Amy Mortlock / September 3, 2019

ShadowDragon is a privately-held software development company seeking a full-time training and curriculum specialist. ShadowDragon provides cyber security software tools to commercial entities, government and law enforcement agencies around the […]

1 1

Timeline Analysis | Epstein Death Reported on 4Chan Before Announced

By Amy Mortlock / August 10, 2019

In my last entitled Illuminating Context with Timeline Analysis, I gave a rough sketch of the basics. In this post I will share a few specifics. The primary point to […]

BostonBomber

Understanding Link Analysis and Using it in Investigations

By Amy Mortlock / June 21, 2018

I started using link analysis for investigations somewhere around 2009/2010 when we were developing the first version of SocialNet.  A longtime friend, Roelof from Paterva, shared his vision for a […]

Charming Kitten Cyberespionage

Buckle up for Insight into Charming Kitten Cyberespionage Attacks

By Amy Mortlock / January 26, 2018

The horrors of cybercrime can make even the savviest tech person shudder. Much like an accident on the side of the road, however, we just can’t help rubbernecking. That’s why […]

Scroll to Top