Investigations

OSINT Investigation & Case Management

An investigation board with 18 OSINT sources for cross-platform identity resolution, plus full case management with evidence boards, hypothesis testing, and AI-powered analysis.

Operation Nightfall
OSINT Investigation
Sessions
alex_mercer
Username · 12 results
a.mercer@proton.me
Email · 5 results
Same person 87%
Username
alex_mercer
R
G
X
in
T
2 data breaches
Found in leaked databases
12 repos
47 commits
842 posts
5 leaked credentials

18

OSINT sources

9

Query types

8

AI actions

3

Export formats

OSINT board

18 integrated sources

Query across social, technical, identity, and archive platforms from a single investigation canvas. Results link together with probability-based identity correlation.

SourceCategoryDescription
Twitter/XSocialProfile data, posts, and network analysis via Nitter
RedditSocialUser profiles, post history, and subreddit activity
MastodonSocialFediverse profile discovery and post analysis
TelegramSocialChannel monitoring and user correlation
YouTubeSocialChannel analysis and video metadata
TikTokSocialProfile and content discovery
ShodanTechnicalInternet-connected device and service discovery
CensysTechnicalCertificate and host scanning intelligence
VirusTotalTechnicalMalware analysis and file/URL reputation
CRT.SHTechnicalCertificate transparency log search
WHOISTechnicalDomain registration and ownership data
HIBPIdentityHave I Been Pwned breach exposure check
GravatarIdentityEmail-to-profile correlation
Hunter.ioIdentityEmail discovery and verification
Wayback MachineArchivesHistorical website snapshots and changes
4ChanArchivesAnonymous board monitoring
CalendarArchivesPublic calendar and event discovery
Combined SearchCombinedMulti-platform search across all sources simultaneously

Query types

UsernameEmailDomainIP AddressPhoneNameHashWallet AddressPhrase
Case management

Full investigation lifecycle

Create investigations with mission structure, track evidence, test hypotheses, analyze entity networks, and generate intelligence products — all in one workspace.

Evidence Board

Organized evidence cards with drag-drop management and source attribution

Hypothesis Testing

Alternative Competing Hypotheses (ACH) matrix for structured analytic technique

Entity Graph

Network visualization of relationships between people, organizations, locations, and events

Intelligence Gaps

Track missing information requirements with automated recommendations

Task Board

Assignment and tracking for investigation team members

AI Assistant

Context-aware queries about the investigation with full evidence access

Product Generator

Export findings as formatted intelligence reports (PDF with watermarks)

Timeline View

Chronological event log with evidence linkage and source tracking

Investigation views

Structured analytic tools

Each investigation provides specialized views for evidence management, entity analysis, hypothesis testing, and intelligence product generation.

Case Overview

Investigation Case

ACTIVE
67%Complete

Operation Nightfall

Cross-platform identity investigation targeting threat actor "alex_mercer" across social and technical platforms.

3 analysts assigned
24
Evidence
8
Entities
3
Hypotheses
12
Tasks
Recent Activity
14:32New evidence added from Reddit profile scan
13:15Entity "a.mercer@proton.me" linked to GitHub profile
11:48Hypothesis H2 updated — confidence raised to 0.82

Evidence Board

Evidence Board

6 items
E-001Reddit
Reddit Profile Match
Confidence92%
IdentityE-002
E-002GitHub
GitHub Commit History
Confidence87%
TechnicalE-001, E-004
E-003HIBP
Breach Database Hit
Confidence95%
Identity
E-004Telegram
Telegram Channel Posts
Confidence68%
ContentE-002
E-005WHOIS
Domain WHOIS Record
Confidence98%
Technical
E-006Twitter/X
Twitter Post Archive
Confidence74%
ContentE-001

Entity Relationship Graph

Entity Relationship Graph

personorglocation
member ofassociates withbased inuses serviceemail providerco-locatedrecruitsalex_merce…PERSONDarkNet Op…ORGj.smith_42PERSONBerlin, DELOCATIONProton AGORGghost_ride…PERSON

Hypothesis Matrix (ACH)

Analysis of Competing Hypotheses

ConsistentInconsistentNeutral
Evidence
H1
Same individual
H2
Coordinated group
H3
Unrelated accounts
E-001Username match (Reddit)CIN
E-002Email domain overlapCCN
E-003GitHub commit timingCCI
E-004Telegram geo mismatchICC
E-005Writing style analysisCNI
E-006Breach data overlapCII
Confidence82%45%12%

SITREP Product

SECRET // NOFORN
DTG: 101432ZMAR2026
SITREP — Middle East Theater
Classification: SECRET // Period: 0600Z–1400Z 10MAR2026
1. SITUATION
  • a.Iran launched coordinated drone-missile strike on Golan Heights military installations at 0417L
  • b.120+ projectiles engaged; 85% intercept rate by Iron Dome / Arrow-3
  • c.No civilian casualties confirmed; 3 IDF personnel WIA
2. ENEMY ACTIVITY
  • a.IRGC Aerospace Force confirmed as launch authority; Shaheed-136 drones + Fateh-110 SRBMs
  • b.Hezbollah forces placed on REDCON-2 but did not participate
  • c.Houthi maritime disruption operations continue in Red Sea AOR
3. INTELLIGENCE
  • a.SIGINT indicates pre-planned operation with 72hr preparation cycle
  • b.OSINT: social media activity spike in Tehran 6hrs prior to strike
  • c.14 HUMINT sources corroborate retaliatory motivation
4. ASSESSMENT
  • a.Threat Level: CRITICAL — escalation to direct state conflict confirmed
  • b.Israeli retaliatory strike assessed as 78% probability within 7-14 days
  • c.Recommend: elevate CENTCOM force protection posture to FPCON DELTA
SECRET // NOFORN
AI-powered

8 AI-powered investigation actions

Profile synthesis across platforms
Alias and duplicate detection
Cross-platform entity linking
Behavioral pattern analysis
Risk scoring
Network analysis
Anomaly detection
Intelligence gap recommendations
Get started

See CLERINT in action

Schedule a personalized demo to see how CLERINT transforms raw open-source data into structured, actionable intelligence.