
Fighting Back: How OSINT is Disrupting Organized Retail Crime
See how OSINT is helping retailers fight back against organized crime and protect their bottom line.
By Kellen Schollaert, Director of Strategy and Enablement at Penlink
Introduction
Conflict isn’t all about tanks rolling across borders. It’s also about coercion without combat, influence without attribution, and operations that stay just below the threshold of actual war. In this type of “gray zone” warfare, the intelligence community is in a constant battle to stay ahead.
In the gray zone, tactics such as disinformation campaigns, cyber operations, and proxy warfare are often conducted in the open. Adversaries weaponize public information, exploit digital platforms, and blend deception with real-world events. OSINT has rapidly become the front line in detecting, attributing, and countering these operations—and the question for intelligence operatives is no longer whether OSINT is valuable, but whether we’re using it quickly and effectively enough.
The Gray Zone Playbook: How Adversaries Exploit Open Sources
Gray zone warfare thrives in ambiguity. A well-executed campaign allows an adversary to weaken a target politically, economically, or socially while maintaining anonymity and/or plausible deniability.
Take Russia’s use of “little green men” in Crimea, or China’s maritime militia in the South China Sea. These aren’t uniformed soldiers; they’re unofficial actors operating in a legal and strategic gray area. By the time traditional intelligence catches up, the damage is often done, and it’s incredibly hard to repair.
Here are some ways OSINT changes the game:
Real-World Applications of OSINT
1. Disinformation Warfare in the Digital Battlefield
State actors are no longer just using tanks and missiles—they’re using memes, fake news, and deepfake videos to shape public perceptions. The 2023 Doppelgänger Operation, attributed to Russia, used cloned Western news websites to push disinformation about NATO and Ukraine.
Here are a few ways OSINT can help:
The challenge is speed. By the time governments identify, plan, and refute disinformation, its often too late. This is why it’s so important for governments to put emphasis on information operations, communications, and global engagement. We are seeing this development firsthand in efforts by the DoD, the DIA, the State Department, and others to counter adversarial influence operations.
2. Tracking Covert Military Movements
During Russia’s invasion of Ukraine, OSINT analysts weren’t just reacting to official briefings or waiting for news—they were predicting troop movements before traditional sources made public statements.
Examples include:
Rather than intelligence analysts leveraging exquisite, state-level capabilities, this involved the use of publicly available information to create intelligence that anyone could verify. From the onset, OSINT played a pivotal role in the Ukraine conflict, demonstrating its exceptional value as an intelligence discipline.
3. Cyber Threat Attribution: Uncovering Digital Breadcrumbs
Cyber warfare is an integral part of the gray zone, and sophisticated adversaries know how to cover their tracks. OSINT continues to provide new ways to attribute attacks without tapping into classified sources or methods.
Attributing cyber-attacks is a complex but essential task in countering gray zone operations. The U.S. government categorizes cyber threats into those by nation-state actors (such as China, Russia, North Korea, and Iran) and those by criminal groups seeking financial gain. Leaning into information highlighted in a Congressional Research Service report on cyber-attacks, the below provides insight into OSINT’s role in this space.
OSINT’s unmasking of adversaries can be accomplished by:
While adversaries use proxy networks, false-flag operations, and an evolving attack infrastructure to evade detection, OSINT-driven cyber analysis enhances attribution confidence and speeds up response efforts.
4. Exposing Sanctions Evasion
“Follow the money” is a common technique and often leads to finding the networks behind gray zone operations. OSINT is now critical in tracking illicit financing, cryptocurrency laundering, and sanctioned asset movements.
As an example, Iran has used maritime deception tactics to bypass international sanctions. They turn off transponders, forge paperwork, and engage in ship-to-ship transfers in neutral waters. OSINT analysts expose these operations using:
Using these methods, analysts uncover sanctions evasions and illegal ship-to-ship oil transfers and provided this intelligence to the government in support of tightening enforcement and disrupting illicit networks.
The Future of OSINT in National Security
OSINT must evolve with gray zone tactics. This demands:
The U.S. government is already moving in this direction. Recent national intelligence strategies and guidance identify OSINT as a core discipline, mandate its adoption, and provide insight into its implementation:
OSINT Is No Longer Optional
Gray zone warfare has been here for a while. But now the battleground is digital, decentralized, and designed to exploit gaps in intelligence collection.
“All warfare is based on deception.” —Sun Tzu
The nations, agencies, and warfighters that effectively integrate OSINT into their operations will outmaneuver adversaries and expose deception before it translates into strategic advantage. That advantage will belong to those who can see, interpret, and act on information more quickly than their adversaries in the digital space.