Digital groundwork, in minutes
Automate the OSINT passes every case needs. Breach data, social footprint, corporate records, identity mapping — from a single email address.
Where your billable hours disappear
The digital groundwork on every case follows the same pattern. Repeat work, low margin, and the client rarely pays for it in full.
Running a subject through breach aggregators, interpreting findings, cross-referencing with other indicators — two to four hours of billable time.
Username checks across a dozen platforms, alias identification, content review, network mapping — another few hours, before you've started the actual investigation.
Companies House searches, officer lookups, dissolved-company history, beneficial ownership. Essential but tedious; easy to miss subsidiaries or former roles.
Cross-referencing names, emails, usernames, and aliases to confirm you're looking at the right person. The stage where wrong-subject attribution happens.
What each investigation surfaces
The digital opening of a case follows the same choreography every time: breach sweep, username check, platform sweep, corporate lookups, geographic triangulation. Hours of pattern-matching work that earns a modest line on the invoice. BLACKEYES collapses that opening phase to around fifteen minutes from an email seed — breach archaeology, platform sweep, username graph, commercial footprint, location triangulation — and delivers it as a case-file dossier with citations. Physical investigation, interviewing, surveillance, and the judgement that wins the case all remain the PI’s own.
Breach Archaeology
Decades of breach records cross-referenced against subject identifiers. Passwords, phone numbers, DOBs, and usernames that didn't previously connect, now do — the investigative Rosetta Stone for a new subject.
Platform Sweep
Automated pass across the platforms where a subject's story tends to get complicated — forums, dating platforms, professional networks, buy-sell marketplaces. Hours of manual search compressed to minutes.
Username Graph
Username graph construction from the email seed. Essential when the subject is technically savvy enough to segregate their identities across accounts.
Commercial Footprint
Current and dissolved company filings — the subject's formal commercial history compared against their declared version of events.
Location Triangulation
IP geolocation from breach records, timezone patterns, social content metadata, and open-source geo signals — triangulated into a current and historical location picture.
Case-File Dossier
Structured for case-file integration. Every source cited, every URL categorised as verified match or excluded, ready to hand to a client or retain as workproduct.
Built for the cases that matter
Matrimonial & family
Surface undisclosed accounts, hidden assets, and social evidence relevant to matrimonial and family-law proceedings.
Pre-litigation due diligence
Build a defensible picture of a subject before claim or motion is filed. Source-cited report stands up to scrutiny.
Corporate investigations
Employee misconduct, insider risk, undeclared directorships, or conflict-of-interest investigations.
Tracing & skip tracing
Digital identity layer alongside traditional address and person-tracing work. Start point for physical investigation.
Pricing that rebills cleanly
Per-case pricing from £4.99 per investigation. £3 per investigation on the Agency pack (100 credits) — cleanly markupable within your case fees. Monthly subscriptions for steady caseloads.
Questions PIs ask
Is this a replacement for traditional investigation?
No. BLACKEYES handles the digital groundwork — breach checks, social sweeps, corporate lookups, identity mapping. A professional PI brings judgement, physical investigation, interviewing, surveillance, and case strategy. Most of our PI customers use BLACKEYES to do in fifteen minutes what they'd previously charge two hours for on the digital side, freeing them to focus on investigation work only a human can do.
Can I use the reports as evidence?
Every finding is source-cited, referencing the underlying public source. Reports have supported litigation and tracing work. Admissibility and evidential weight depend on the jurisdiction, matter, and whether a specific finding has been independently verified — for contentious litigation, consult counsel on chain-of-custody. BLACKEYES reports are raw material, not a conclusion. PIs routinely independently verify findings before relying on them in case reports.
Are AI-generated findings reliable?
The pipeline combines traditional API lookups (Companies House, phone intelligence, breach databases) with AI analysis across social and digital-footprint signals. Multi-stage verification, entity gating, and a Skeptic agent reduce false positives — but AI can still misattribute or misinterpret, and third-party data can be out of date. For any finding that will go in a case report or influence a decision, independent verification remains the investigator's responsibility. BLACKEYES is not liable for third-party data accuracy.
Does BLACKEYES replace my existing OSINT toolkit?
If you manually run Maltego, SpiderFoot, theHarvester, Sherlock, or OSINT Framework tools, BLACKEYES automates the equivalent passes and cross-references the findings. It complements rather than replaces specialist tooling for particular source types, but for most email-input investigations it's faster than assembling the same picture manually.
Are targets notified when investigated?
No. BLACKEYES operates passively. The subject is never contacted, notified, or made aware of the investigation. All data is drawn from publicly available sources and historical breach records — no subject-facing activity.
Open your first case
One email. Fifteen minutes. The digital side of the investigation, handled — so you can focus on the rest.
Reports are tools, not conclusive judgements — verify material findings before reliance. See the FAQ