BlackEyes LogoBLACKEYES
For Insurance Fraud Teams

Claimant verification in minutes

Surface undisclosed identities, inconsistent histories, and repeat-claimant patterns from a single email address. Evidence-ready reports for fraud and SIU teams.

~15 min per claim
11-section report
Every source cited

Where fraud hides in plain sight

The evidence is usually public. It just takes hours to find — hours a claims handler doesn't have on a £3,000 suspicious claim.

Undisclosed Identity

Claimants with alias accounts, previous names, or undisclosed directorships — information absent from policy documentation but visible in public record.

Social Contradiction

Claimed injuries or incapacity contradicted by public social posts — sporting activity, employment, holiday photos, physical activity inconsistent with the claim.

Repeat-Claimant Patterns

Network links, shared addresses, or identifier overlaps between claimants — the fingerprint of organised or recurring claims activity.

Inconsistent History

Claimed employment, location, or circumstance at time of claim inconsistent with digital footprint evidence — a common indicator of exaggerated or fabricated claims.

What each investigation surfaces

Insurance fraud lives and dies on the evidence you can gather fast enough to act on a suspicious claim. BLACKEYES automates the digital evidence-gathering stage: the email address on the claim form becomes the input, and fifteen minutes later the claims handler has a dossier covering breach-derived identity signals, public social contradictions, alternate accounts, and commercial interests the claimant hasn’t disclosed. The report plugs directly into case files, supports SIU review, and hands cleanly to external investigators for further work.

Breach-Record Identity

Identifiers, DOBs, and data points pulled from historical breaches. A useful independent snapshot to check the claimant's story against — particularly where ID documents are in dispute.

Public Contradiction Evidence

Timestamped, public social posts that contradict claimed injury, incapacity, or circumstance at the time of the claim. Photos, check-ins, activity patterns — often decisive on contentious claims.

Alternate Profile Detection

The email behind a claim rarely travels alone. Alternate accounts, spelling variants, and pseudonymous profiles often tell a different story — and are frequently the fingerprint of repeat or organised claims activity.

Undisclosed Commercial Interests

Directorships, dissolved companies, and business holdings the claimant hasn't disclosed. Core territory for commercial claims and injury claims where employment capacity is in issue.

Location at Time of Claim

Where was the claimant actually located when the incident occurred? Breach metadata, geotagged posts, and open-source signals offer a check against policy documentation.

SIU-Handover Report

Eleven-section dossier structured for case files, SIU review, and investigator handover. Every finding carries its source URL so further investigation can pick up cleanly.

Where claims teams use BLACKEYES

Suspicious new claims

Early-stage triage on claims flagged for inconsistency, exaggeration, or mismatch between claimed and real-world circumstances.

Repeat claimant detection

Cross-reference claimants against historical identifiers, alias accounts, and network links to detect coordinated or recurring fraud.

Motor claim verification

Vehicle and ownership history, named-driver consistency, and location evidence for crash-for-cash and induced-accident investigations.

Injury claim contradiction

Social evidence that conflicts with claimed injury severity — sporting activity, employment, holidays, physical posts inconsistent with the claim.

Pay per claim, scale with volume

From £4.99 per investigation. £3 on the Agency pack. Volume pricing and Enterprise contracts available for claims operations with steady fraud-triage caseloads.

Questions fraud teams ask

Is this an SIU replacement?

No. BLACKEYES automates the digital-evidence-gathering phase of an investigation. SIU teams use the reports as part of their evidence package, alongside surveillance, interviews, and forensic review. The platform accelerates Phase 1 of an investigation so investigators spend time where human judgement matters — the interpretation and further investigation phases.

Is this admissible in court?

Every finding is source-cited and references the underlying public source. Reports have been used in support of litigation. Admissibility depends on the court and matter — for contested civil or criminal proceedings, consult counsel on evidence handling, chain of custody, and whether any material needs expert-witness framing. The data itself is drawn from public sources and historical breach records.

Is the insurer responsible for GDPR compliance?

Yes. The insurer decides and documents the lawful basis for the processing — typically legitimate interest for fraud investigation, with a Data Protection Impact Assessment weighing that interest against claimant rights. BLACKEYES acts as Data Processor on your instruction. We don't certify your lawful basis and aren't liable for its adequacy. Your DPO signs off on it.

Can findings be relied on without further verification?

No. Findings come from public sources, historical breach data, and third-party APIs including Companies House — all of which can be inaccurate, outdated, or misattributed. The pipeline adds AI analysis with multi-stage verification, but AI can still misinterpret ambiguous signals. Before a finding drives a repudiation, referral, or litigation decision, verify it independently. BLACKEYES is not liable for third-party data accuracy.

How fast is the report?

Around fifteen minutes per claim from email submission. Multiple claims can be investigated in parallel. Useful for same-day triage on flagged claims.

Can claims teams use this without OSINT training?

Yes. The report is structured for claims teams — no OSINT expertise required to interpret findings. For complex matters where further investigation is warranted, the report's citations and source links let an in-house or external investigator pick up efficiently.

Triage your next suspicious claim

One email. Fifteen minutes. A source-cited digital evidence file on every flagged claimant.

Reports are tools, not conclusive judgements — verify material findings before reliance. See the FAQ