Case metadata, classification and profile photo
UPLOAD
PHOTO
PHOTO
EXECUTIVE SUMMARY
Subject personal identity data
PERSONAL DETAILS
Contact info, addresses and location data
CONTACT INFORMATION
Social media profiles, usernames and digital footprint
PLATFORM PROFILES
Data breaches, leaked credentials and compromised accounts
DATA BREACH DETAILS
CRITICAL
HIGH
MEDIUM
LOW
Bank accounts, crypto wallets, properties and vehicles
FINANCIAL RECORDS
HIGH
MEDIUM
LOW
UNVERIFIED
Known relationships, organizations and network analysis
NETWORK MEMBERS
Threat level, subject type and risk analysis
THREAT PROFILE
Key findings, recommendations and sources
INVESTIGATION NOTES