BlackEyes LogoBLACKEYES
Pipeline Architecture

How BLACKEYES works

A six-phase pipeline of specialised AI agents — running in parallel — transforms a single email address into an eleven-section intelligence report.

~15 min
6 phases
11 sections
Source-cited

Why a pipeline, not a chatbot

Most AI search tools answer a prompt in one pass. An OSINT investigation is not a prompt — it's a methodology. You start with a single signal, pivot across sources, validate claims independently, challenge attribution, and assemble the evidence into a report that holds up under scrutiny.

BLACKEYES replaces the chatbot approach with a pipeline — a structured sequence of specialist agents, each responsible for one discipline. Hunter agents pivot wide. Validator agents cross-reference. The Skeptic challenges weak claims. The Report Generator assembles the final dossier only after every finding has survived independent verification.

The result reads like the work of a human OSINT analyst — because the methodology is the same, automated across parallel agents running in under fifteen minutes.

The six-phase pipeline

Phases run sequentially where dependencies exist, and in parallel where they don't. The whole pipeline completes in around fifteen minutes.

PHASE 01

Foundation & Triage

Technical identity analysis on the input email. Historical breach database lookup. PII triage and username extraction. Location inference from email signals.

Technical AnalystBreach AggregatorPII TriageUsername Analyst
PHASE 02

Hunter Clusters (Parallel)

Three specialist clusters run in parallel: Corporate Records hunting, Digital Footprint sweep across major platforms, and Lifestyle pattern analysis.

Corporate HunterDigital Footprint HunterLifestyle Hunter
PHASE 03

Validation & Expansion

Location triangulation and visual verification. Independent claim-checking across sources. Network expansion — linking associates, family, and professional contacts.

Location ValidatorVisual VerifierClaim CheckerNetwork Expander
PHASE 04

Deep Extraction (Parallel)

Two deep investigators run concurrently — Verifier (high-confidence claims) and Explorer (low-confidence leads). Risk and behavioural profiler runs alongside.

Deep Investigator A (Verifier)Deep Investigator B (Explorer)Risk & Behavioural Profiler
PHASE 05

Quality Control

The Skeptic challenges every finding and filters out weak attribution. Two-Key verification requires independent corroboration before a claim enters the final report.

The SkepticTwo-Key Verification
PHASE 06

Report Generation

The OSINT Report Generator assembles findings into an eleven-section, source-cited dossier of around 4,000 to 6,000 words. Every claim references its origin.

OSINT Report Generator

What lands in your report

Every investigation returns the same eleven-section structure. Missing data is marked as "not found" rather than silently omitted.

01

Executive Summary

Overall assessment, confidence scoring, key findings at a glance.

02

Identity & Email Analysis

Email structure, domain analysis, naming conventions, username patterns, variant identification.

03

Breach Exposure

Every known breach containing the subject, with date, records affected, and exposed fields.

04

Professional & Corporate Records

Companies House filings, directorships, company ownership, and adverse filings.

05

Geographic Intelligence

Current and historical locations, inferred from digital signals and breach metadata.

06

Phone Intelligence

Mobile and landline numbers traced to the subject, with carrier and line-type detail.

07

Digital Footprint & Social Media

Verified accounts across major platforms, content summary, activity patterns, public reputation.

08

Network & Associates

Family, professional contacts, and social connections evidenced through public-record and platform links.

09

Lifestyle & Activity Profile

Hobbies, interests, recurring themes — aggregated from social content and activity signals.

10

Risk & Behavioural Assessment

Signals relevant to hiring, compliance, or investigative risk. Structured for defensibility.

11

Validation & Intelligence Summary

Appendix of every source cited. Each URL categorised as verified, potential match, or excluded, with reasoning.

What automation adds — and what it doesn't

A skilled OSINT investigator is still the gold standard on judgement, edge cases, and interpretation. Automation doesn't replace them — it compresses the repetitive groundwork so they can focus on the work that actually needs human skill.

Speed

A skilled OSINT analyst might spend two to four hours on the digital groundwork. The pipeline runs every phase in parallel and completes in around 15 minutes — the same methodology, compressed.

Cost

A specialist OSINT investigator typically charges £100 an hour or more, with a minimum engagement. A BLACKEYES report starts at £4.99 — cleanly rebillable inside a case fee or absorbed into a screening workflow.

Consistency

Every investigation runs the same methodology on every subject. No fatigue, no skipped checks, no shortcut on low-priority cases. The ninth case of the day gets the same thoroughness as the first.

Breadth per pass

Breach databases, social platforms, corporate registries, geographic signals, phone intelligence — all queried in one run. A human investigator usually works source by source.

Where human judgement matters — attribution calls, reading between the lines, knowing when a finding needs interpretation — that stays with the investigator. The pipeline gives them a defensible foundation in minutes, instead of them spending hours on the groundwork that any tool can do.

Run your first investigation

Enter an email address. The pipeline does the rest. See for yourself in around fifteen minutes.

Reports are tools, not conclusive judgements — verify material findings before reliance. See the FAQ