How we investigate.

Our commitment to rigorous OSINT standards, verification, and ethical reporting.

01

Data Collection

We rely exclusively on Open Source Intelligence (OSINT). This includes publicly available registries, social media metadata, satellite imagery, and blockchain ledgers. We do not use hacking or illegal interception methods.

02

Verification & Cross-Referencing

Every data point is cross-referenced with at least two independent sources. If a corporate filing claims a director exists, we verify their footprint in other databases. If an image claims to be from a location, we perform geolocation analysis to confirm shadows, weather, and landmarks.

03

Network Analysis

We use graph databases to map relationships between entities. Anomalies in these graphs—such as a single address serving 500 companies—often point to the core of the investigation.

04

Risk Assessment

We assign a risk level (Low, Medium, High) based on the societal impact, potential financial loss, and the sophistication of the actor.

Disclaimer

The information provided on detective.fyi is for educational and informational purposes only. While we strive for accuracy, the rapidly changing nature of digital evidence means we cannot guarantee the absolute completeness of every report. We are not a law enforcement agency.