Skip to main content
Tax Notes - Home

I2 Analyst Notebook Link

❌ – A wire transfer from A→B is not the same as B→A. Always show arrows on financial and communication links.

❌ – i2 can generate a link chart audit trail . Use it. When a defense attorney asks how you concluded a link existed, you need the raw data timestamp. 5. i2 vs. Modern Alternatives | Tool | Best for | Weakness vs. i2 | |------|----------|------------------| | Palantir | Enterprise-scale, real-time | Cost, overkill for link analysis | | Maltego | OSINT & cyber targets | Less rigorous on temporal/transactional data | | Neo4j / Gephi | Graph DB exploration | No built-in investigative workflow | | Linkurious | Web-based collaboration | Shallow analytical depth | i2 analyst notebook

Why i2 Analyst’s Notebook is Still the Gold Standard for Link Analysis (And How to Use It Like a Pro) ❌ – A wire transfer from A→B is not the same as B→A

If you’ve ever tried to untangle a money laundering scheme, map a terrorist network, or visualize a botnet’s command-and-control infrastructure, you’ve almost certainly heard of . Acquired by IBM years ago, this desktop-based investigative tool has been around for decades—yet it remains one of the most powerful, non-negotiable pieces of software in serious analytic shops. Use it

❌ – Don’t spend 45 minutes picking colors. Spend 45 minutes running network metrics. Presentation can come after analysis.

Have you used i2 Analyst’s Notebook in a real investigation? What’s your favorite hidden feature or biggest frustration? Drop your thoughts below. Want a follow-up post on “i2 Analyst’s Notebook for Cybersecurity” or “Importing Phone CDRs like a Pro”? Comment and let me know.

© Tax Analysts 2025. | 400 S. Maple Avenue, Suite 400, Falls Church, VA 22046