How BLACKEYES works
A six-phase pipeline of specialised AI agents — running in parallel — transforms a single email address into an eleven-section intelligence report.
Why a pipeline, not a chatbot
Most AI search tools answer a prompt in one pass. An OSINT investigation is not a prompt — it's a methodology. You start with a single signal, pivot across sources, validate claims independently, challenge attribution, and assemble the evidence into a report that holds up under scrutiny.
BLACKEYES replaces the chatbot approach with a pipeline — a structured sequence of specialist agents, each responsible for one discipline. Hunter agents pivot wide. Validator agents cross-reference. The Skeptic challenges weak claims. The Report Generator assembles the final dossier only after every finding has survived independent verification.
The result reads like the work of a human OSINT analyst — because the methodology is the same, automated across parallel agents running in under fifteen minutes.
The six-phase pipeline
Phases run sequentially where dependencies exist, and in parallel where they don't. The whole pipeline completes in around fifteen minutes.
Foundation & Triage
Technical identity analysis on the input email. Historical breach database lookup. PII triage and username extraction. Location inference from email signals.
Hunter Clusters (Parallel)
Three specialist clusters run in parallel: Corporate Records hunting, Digital Footprint sweep across major platforms, and Lifestyle pattern analysis.
Validation & Expansion
Location triangulation and visual verification. Independent claim-checking across sources. Network expansion — linking associates, family, and professional contacts.
Deep Extraction (Parallel)
Two deep investigators run concurrently — Verifier (high-confidence claims) and Explorer (low-confidence leads). Risk and behavioural profiler runs alongside.
Quality Control
The Skeptic challenges every finding and filters out weak attribution. Two-Key verification requires independent corroboration before a claim enters the final report.
Report Generation
The OSINT Report Generator assembles findings into an eleven-section, source-cited dossier of around 4,000 to 6,000 words. Every claim references its origin.
What lands in your report
Every investigation returns the same eleven-section structure. Missing data is marked as "not found" rather than silently omitted.
Executive Summary
Overall assessment, confidence scoring, key findings at a glance.
Identity & Email Analysis
Email structure, domain analysis, naming conventions, username patterns, variant identification.
Breach Exposure
Every known breach containing the subject, with date, records affected, and exposed fields.
Professional & Corporate Records
Companies House filings, directorships, company ownership, and adverse filings.
Geographic Intelligence
Current and historical locations, inferred from digital signals and breach metadata.
Phone Intelligence
Mobile and landline numbers traced to the subject, with carrier and line-type detail.
Digital Footprint & Social Media
Verified accounts across major platforms, content summary, activity patterns, public reputation.
Network & Associates
Family, professional contacts, and social connections evidenced through public-record and platform links.
Lifestyle & Activity Profile
Hobbies, interests, recurring themes — aggregated from social content and activity signals.
Risk & Behavioural Assessment
Signals relevant to hiring, compliance, or investigative risk. Structured for defensibility.
Validation & Intelligence Summary
Appendix of every source cited. Each URL categorised as verified, potential match, or excluded, with reasoning.
What automation adds — and what it doesn't
A skilled OSINT investigator is still the gold standard on judgement, edge cases, and interpretation. Automation doesn't replace them — it compresses the repetitive groundwork so they can focus on the work that actually needs human skill.
Speed
A skilled OSINT analyst might spend two to four hours on the digital groundwork. The pipeline runs every phase in parallel and completes in around 15 minutes — the same methodology, compressed.
Cost
A specialist OSINT investigator typically charges £100 an hour or more, with a minimum engagement. A BLACKEYES report starts at £4.99 — cleanly rebillable inside a case fee or absorbed into a screening workflow.
Consistency
Every investigation runs the same methodology on every subject. No fatigue, no skipped checks, no shortcut on low-priority cases. The ninth case of the day gets the same thoroughness as the first.
Breadth per pass
Breach databases, social platforms, corporate registries, geographic signals, phone intelligence — all queried in one run. A human investigator usually works source by source.
Where human judgement matters — attribution calls, reading between the lines, knowing when a finding needs interpretation — that stays with the investigator. The pipeline gives them a defensible foundation in minutes, instead of them spending hours on the groundwork that any tool can do.
Run your first investigation
Enter an email address. The pipeline does the rest. See for yourself in around fifteen minutes.
Reports are tools, not conclusive judgements — verify material findings before reliance. See the FAQ