Autonomous OSINT Investigations. Certainty Delivered.

Point Axiom Intel at a target and get a structured intelligence brief — entities mapped, relationships discovered, gaps identified, sub-investigations spawned automatically. Hours, not weeks.

2,105
Entities discovered
610
Relationships mapped
165
Findings generated
~2.2 hrs
Fully autonomous
From a single investigation -- 5 executive brief versions, 85/100 certainty

How It Works

You define the question. Axiom Intel finds the answer.

1

Set an Intelligence Goal

Name a target entity and define your intelligence question. Use AI-assisted goal refinement to sharpen the objective. Four quick-start templates: Corporate Investigation, Person of Interest, Domain/Infrastructure, Financial Network.

2

The Investigation Engine Runs

Choose Quick, Standard, or Thorough mode with configurable cycles. The platform autonomously generates search strategies, collects from multiple sources through encrypted proxy chains, normalizes entities with AI, discovers relationships, and identifies intelligence gaps — spawning sub-investigations to fill them.

3

Get Your Scored Brief

Receive a versioned executive summary with a 0–100 certainty score that tracks across brief versions, an entity graph, relationship map, and identified gaps. Export as PDF. Deliver to your client.

Built for Serious Investigations

Autonomous Intelligence Cycle

Search → collect → normalize → relate → summarize → identify gaps → spawn sub-investigations. The Investigation Engine runs the full intelligence cycle unattended while you work on other things.

Isolated Infrastructure

Every customer gets their own dedicated server with rotating proxy pool and encrypted database. Your investigation data never touches another customer's infrastructure.

Certainty Scoring

Every investigation produces a 0–100 certainty score displayed as a ring chart that tracks across brief versions. See exactly how comprehensively your intelligence question has been answered. No other tool does this.

Multi-Source Collection

URL Collector, Search & Scan across news and web engines, Username Scan across 400+ platforms, and Corporate Registry Search via custom corporate registry scanner — all automated, all routed through your isolated infrastructure.

AI Relationship Discovery

Zero-cost attribute clustering (shared tracking IDs, certificates, email domains) followed by AI-powered relationship mapping. Discovers connections humans miss.

Executive Summaries

Versioned intelligence briefs in structured format: BLUF, key findings, entity overview, relationship analysis, assessment, gaps, and recommended next steps. Export as PDF or CSV.

See the Platform

Real screenshots from a live investigation.

Force-directed relationship graph showing 848 entities and 384 links with color-coded entity types

Relationship Graph

Force-directed visualization with entity type coloring. Click any node to see connections, attributes, and source URLs.

Investigation findings list showing categorized findings with confidence levels and source attribution

Investigation Findings

Categorized findings with confidence scoring, source attribution, and direct links to supporting evidence.

Dashboard showing 4,894 entities, 1,805 relationships, credit balance, and active investigation status

Dashboard

Portfolio overview with entity counts, credit balance, active tasks, and investigation status at a glance.

Choose Your Plan

Every plan includes a dedicated isolated server, proxy rotation, and full platform access. Your credentials are delivered within 15 minutes of payment.

Starter

For independent investigators, journalists, and solo analysts

$150 / month
  • Dedicated isolated server
  • 3 concurrent investigations
  • Standard depth (5 cycles)
  • $5/mo AI budget included
  • Email support (24hr response)
Instance ready in 15 minutes

Enterprise

For government agencies, regulated firms, and custom deployment requirements

Custom
  • Dedicated high-capacity infrastructure
  • Unlimited investigations
  • Custom AI budget allocation
  • API access for integration
  • SLA with dedicated support
  • Custom data retention policies

All plans include: rotating proxy pool, encrypted database, automated daily backups, and full data export.
AI overages billed at cost + 20%. Cancel anytime. 30-day data retention on cancellation.

Already a subscriber?

Need more investigation capacity? Purchase credit packs for your existing instance.

CASE STUDY

Mapping a State-Linked Private Military Network Across 3 Continents

Investigation Results
~2.2 hrs
Runtime
85
Certainty
2,105
Entities
610
Relationships
165
Findings
447 Organizations 204 Persons 165 Locations 123 Companies 35 Domains

The Question

A security analyst needed to identify and map the financial, logistical, and operational networks connecting three state-affiliated private military organizations operating across the Sahel, Central Africa, and the Middle East -- including shell companies, proxy directors, front entities, financial intermediaries, and sanctions-evasion structures spanning multiple jurisdictions.

What Axiom Intel Did

The analyst entered a goal statement describing the three organizations and their suspected areas of operation. The platform autonomously generated 83 search strategies, collected from corporate registries, news archives, sanctions databases, and public records across multiple countries, and produced 5 progressively refined executive briefs as new intelligence emerged -- each with an updated certainty score tracking what had been answered and what remained unknown.

Investigation command center showing 85/100 certainty score, 705 entities, 369 relationships, collection stats with sparklines, and investigation engine controls
The investigation command center: 85/100 certainty score, real-time collection stats with sparklines, and investigation engine controls.

Investigation Depth

Search Coverage
83 unique search strategies across news, web, and corporate registry sources spanning multiple jurisdictions
Source Processing
Corporate registries (UAE, UK, US, Turkey, DRC), sanctions databases, ICIJ leak archives, certificate transparency logs, news archives in 4 languages
Noise Reduction
Irrelevant results filtered automatically -- the platform discarded noise so only actionable intelligence objects reached the final output

What It Found

Organizational Networks
245 association and 33 ownership relationships traced across corporate structures, subsidiaries, and organizational hierarchies
Operational Footprint
129 co-location connections and 34 shared infrastructure links mapped -- overlapping offices, shared digital assets, and coordinated operational footprints
Identity Resolution
74 alias relationships and 52 membership links resolved -- connecting PMO front entities, successor organizations, and personnel across alias networks
Force-directed relationship graph visualization showing 848 entities and 384 links with color-coded entity types
The full relationship graph for this investigation -- 848 entities and 384 links visualized as an interactive force-directed network. Nodes are color-coded by entity type. Click any node to inspect its connections.
Relationship graph showing entity detail panel for Nigerian Immigration Service with 8 connections to related organizations
Clicking an entity reveals its connections and attributes. Here, the Nigerian Immigration Service shows 8 connections to related organizations -- all discovered and linked automatically.
Investigation finding F-031 showing Wagner Group transitioning to Africa Corps under Russian state control, with supporting entities and source URLs
Finding F-031: Wagner Group transitioning to Africa Corps -- with supporting entities, source URLs, and confidence assessment.

Cited, Verifiable Findings

Every finding in an Axiom investigation carries an in-text citation reference (e.g., [F-031]) that appears directly in the executive brief. Click any reference to see the full finding detail -- including the supporting entities, confidence level, category, discovery method, and every source URL used to establish it.

This means every claim in the brief is traceable back to specific open sources. Analysts can verify findings independently, assess confidence, and identify which sources contributed to each conclusion. No black boxes.

Key Finding

Axiom Intel autonomously mapped the full operational architecture of Russian, Chinese, South African, and Turkish private military organizations across Africa -- identifying 74 alias relationships connecting front entities to successor organizations, 129 co-location links revealing shared operational bases, and 33 ownership chains tracing corporate control structures. The platform confirmed the Wagner Group's formal transition into the Africa Corps under GRU control, mapped Frontier Services Group's acquisition strategy consolidating Chinese PMO dominance in East Africa through Hong Kong financial channels, and traced the Dyck Advisory Group's counter-insurgency deployments across Cabo Delgado -- all in 2.2 hours of autonomous operation.

Intelligence Gaps Identified

The investigation reached 85/100 certainty. The platform identified what it could not answer from open sources -- including sealed corporate registry filings in two US states, undisclosed executive officers behind offshore holding structures, and specific transactional evidence (SWIFT data, bills of lading) linking mine output to specific refineries. These gaps were documented with recommended collection methods for human follow-up.

Download Executive Brief (PDF) Download Full Export (CSV) 85 / 100

Contact Us

For enterprise pricing, government procurement, or custom deployment requirements.

Documentation & Support

Guides for getting started and getting help with your Axiom Intel instance.

Getting Started

Your instance is provisioned automatically after payment. This guide covers logging in, creating your first investigation, setting an intelligence goal, and understanding results.

Read Guide →

Security Architecture

How your dedicated instance is isolated: rotating proxy pool, encrypted database, automated backups, and data retention policies.

Read Guide →

Support

Contact support for technical issues, billing questions, or feature requests. Starter: 24hr response. Professional: 12hr response. Enterprise: SLA-bound.

Contact Support →
← Back to Docs

Getting Started

From payment to your first intelligence brief

1. Account Provisioning

After completing payment, your dedicated Axiom Intel instance is provisioned automatically. Within 15 minutes, you will receive an email at the address used during checkout containing:

  • Your instance URL (a dedicated server exclusively for your account)
  • A one-time setup link to create your password

Click the setup link, choose a password, and you are in. Your instance is fully isolated -- no other customer can access your server, data, or investigations.

2. Creating Your First Investigation

From the dashboard, click New Investigation. You will be guided through three steps:

Project Setup

Name your investigation and optionally add tags for organization. The name should describe the target or topic (e.g., "Wagner Group Africa Operations" or "Acme Corp Due Diligence").

Intelligence Goal

Define what you want to know in plain language. Be specific about the entities, relationships, and jurisdictions you care about. Use the AI-assisted goal refinement to sharpen your objective -- the platform will suggest improvements to maximize investigative coverage.

Review & Launch

Choose your investigation mode (Quick, Standard, Deep, or Thorough) based on how comprehensive you need the results to be. Each mode consumes a different number of credits. Review your goal and launch the investigation.

3. Investigation Modes

Each mode balances speed, depth, and credit cost:

  • Quick (0.5 credits) -- 2 collection cycles, 1 sub-project. Best for rapid background checks and single-entity lookups.
  • Standard (1 credit) -- 3 cycles, 2 sub-projects. The default for routine due diligence and corporate profiling.
  • Deep (3 credits) -- 5 cycles, 3 sub-projects, depth 2. For complex investigations requiring network mapping and cross-jurisdictional analysis.
  • Thorough (6 credits) -- 10 cycles, 5 sub-projects, depth 2. Maximum coverage for deep-dive research across multiple jurisdictions.

4. Monitoring Progress

Once launched, the Investigation Engine runs autonomously. You can monitor progress in real time from the project page:

  • Certainty Score -- a 0-100 ring chart that tracks how comprehensively your intelligence question has been answered
  • Collection Stats -- entity count, relationship count, and source processing metrics updated live
  • Task List -- see what the engine is doing right now (collecting, normalizing, analyzing, generating briefs)
  • Relationship Graph -- watch the entity network form as new connections are discovered

You do not need to keep the page open. The investigation runs on your dedicated server and you can return at any time to check status.

5. Reviewing Results

When the investigation completes, you will find:

  • Executive Brief -- a structured intelligence summary with BLUF, key findings, entity overview, relationship analysis, assessment, intelligence gaps, and recommended next steps. Each brief is versioned and scored.
  • Investigation Findings -- discrete findings with reference IDs, confidence levels, categories, and source attribution
  • Intelligence Objects -- all discovered entities (persons, companies, organizations, locations, domains, etc.) with attributes and source URLs
  • Relationships -- mapped connections between entities with confidence scores
  • Relationship Graph -- interactive force-directed visualization of the entire entity network

6. Exporting

Export your results in multiple formats:

  • PDF -- the executive brief formatted as a professional intelligence report
  • CSV -- entity and relationship data for import into your own analysis tools
← Back to Docs

Security Architecture

How your investigations are protected

Dedicated Single-Tenant Infrastructure

Every Axiom Intel customer receives their own dedicated server instance. Your server is not shared with any other customer. Your investigation data, collected content, AI-generated analysis, and configuration are stored exclusively on your instance. No data commingling occurs at any level.

Network Security

  • Rotating proxy pool -- collection traffic is distributed across a rotating pool of proxies, preventing source sites from correlating requests back to your instance.
  • TLS encryption -- all data in transit between your browser and the service is encrypted using TLS 1.2 or higher.
  • Firewall rules -- access is restricted to necessary ports only. SSH is key-based (no password authentication).

Data Encryption

  • Secrets at rest -- API keys and other sensitive configuration data are encrypted using Fernet symmetric encryption derived from a per-instance secret key.
  • Database credentials -- generated per-instance and not shared across any infrastructure.
  • Passwords -- hashed, never stored in plaintext.

Backups

Automated daily database backups are stored in encrypted object storage in a separate account from your server instance. Backups are retained for 30 days and then permanently deleted. Backup storage is encrypted at rest by the storage provider.

Data Retention

  • Active accounts -- data retained on your dedicated instance for the duration of your subscription.
  • After cancellation -- instance and all data retained for 30 calendar days to allow data export. After 30 days, the instance and all associated data are permanently and irreversibly destroyed.
  • Backups -- retained for 30 days, then permanently deleted.

Access Control

Access to your dedicated instance is restricted to:

  • You -- through the web interface using your account credentials.
  • Authorized personnel -- only for infrastructure-level maintenance. We do not access, review, or analyze the content of your investigations without explicit written permission.

Third-Party Processing

Investigation text is sent to Google Gemini API for AI analysis. Your personal account information is not sent to Google. Web traffic is routed through commercial proxy providers who see destination URLs and traffic volume, but not investigation context or your identity. Payment data is processed by Stripe.

← Back to Docs

Support

Getting help with your Axiom Intel instance

Contact Support

For technical issues, billing questions, or feature requests, email us at [email protected]. Include your instance URL and a description of the issue.

Response Times

Starter Plan

Email support with 24-hour response time during business days.

Professional Plan

Priority email support with 12-hour response time, including weekends.

Enterprise Plan

SLA-bound support with dedicated response commitments defined in your service agreement.

Billing & Account

Manage your subscription, update payment methods, and view invoices through the Stripe Customer Portal. Access it from your account settings within the platform, or contact [email protected] for assistance.

Enterprise Inquiries

For government procurement, custom deployment requirements, API access, or volume licensing, contact our sales team.

Investigation Credits

Credits fuel your investigations. Each time you launch an investigation, credits are deducted based on the depth and complexity of the mode you choose. Purchase credit packs for your existing Axiom Intel instance.

What Credits Buy

Mode Credits Cycles Sub-Projects Max Depth Best For
Quick 0.5 2 1 1 Rapid background checks, single-entity lookups
Standard 1 3 2 1 Routine due diligence, corporate profiling
Deep 3 5 3 2 Complex investigations, network mapping
Thorough 6 10 5 2 Deep-dive research, multi-jurisdiction tracing

10 Credits

For periodic investigations and ad-hoc research

$19.99
  • 10 investigation credits
  • 10 standard or 20 quick investigations
  • No expiration
  • Use any investigation mode

75 Credits

For teams and high-volume investigation work

$99.99
  • 75 investigation credits
  • 75 standard or 12 thorough investigations
  • No expiration
  • Use any investigation mode

Credits are added to your account instantly after payment. No expiration.
Need a subscription with included credits? View subscription plans