26.04.2026 REQUEST →
FILE № 0S1NT/26-04 ░░ DECLASSIFIED FOR PUBLIC DISTRIBUTION CIRCULATION · UNLIMITED
▣ OPEN-SOURCE INTELLIGENCE

Public
sources.
Structured
method.

We compile open-source intelligence on companies, individuals and digital assets. Ownership chains, beneficial owners, sanctions, on-chain footprints, public litigation, and the people behind the names — delivered as a cited, hash-signed report. Every claim sourced. Every source cited.

Turnaround
From 24h
Method
Public records only
Settled
USDTTRC20
01 / SCOPE

Three doors,
one method.

Corporate · Personal · Digital
A · ENTITIES

Corporate diligence.

Companies, holdings, beneficial owners. Built for M&A, KYC, compliance and pre-investment review.

  • Ownership chain & UBO mapping
  • Directors, shareholders, signatories
  • Sanctions, PEP & adverse media
  • Litigation, regulatory, tax history
  • Affiliate & jurisdiction analysis
B · PERSONS

Personal profile.

Public-record research on individuals — beneficial owners, executives, counterparties, partners. For pre-engagement screening, M&A and litigation support.

  • Identity, public biography, jurisdictions
  • Corporate roles & affiliations
  • Public litigation, judgments & regulatory record
  • Digital footprint & public network
  • Risk indicators & red flags register
C · DIGITAL

Crypto & infra.

Wallet attribution, cluster analysis, infrastructure tracing. For Web3, journalists, recovery counsel.

  • On-chain wallet tracing & clustering
  • Mixer, bridge & CEX exposure
  • Domain history, WHOIS, DNS
  • Hosting, certificates, pivots
  • Public breach & paste exposure
02 / DELIVERABLE

Inside the report.

Every claim cited · Every hash signed

The report is a single, self-contained document — HTML for working review, PDF for printing and archival. Every finding is numbered, severity-graded, and cited to a public source we can name. Where confidence is low, we say so. Where the record is silent, we don't fill it.

The Pro tier is SHA-256 signed for integrity verification and built to support third-party reproduction of every cited finding.

SEE A SPECIMEN →
01Executive summary & risk overview
02Corporate structure & ownership map
03Key personnel — biographical cards
04Numbered red-flags register
05Network analysis & affiliations
06Chronology / long-arc timeline
07Technical infrastructure & on-chain
08Source register & citations
03 / METHOD

From request to report.

Four stages · Email only · No accounts
STEP 01

Brief.

You describe the target, the question, the depth. We confirm scope, jurisdictions and exclusions in writing.

CHANNEL · ENCRYPTED EMAIL
STEP 02

Settle.

Quote and case-ID issued. Payment in USDT-TRC20. Work begins on confirmation.

RAIL · USDT TRC20
STEP 03

Collect.

Open-source acquisition: registries, courts, regulators, archives, on-chain, social, breach data, press.

SOURCES · PUBLIC ONLY
STEP 04

Deliver.

Cited report, hash-signed. One-week Q&A window included with every package.

FORMAT · HTML + PDF
04 / PACKAGES

Three depths
of looking.

Settled in USDT · No hidden fees
P/01   BASIC

Surface.

A factual snapshot — registry, ownership, public exposure. For first-pass screening.
$490USDT
From 24h
  • Corporate registry & ownership chain
  • Directors & signatories
  • Sanctions / PEP cross-check
  • Top-tier adverse media (recent)
  • Domain & basic infrastructure
  • Personnel deep dives
  • On-chain tracing
SELECT BASIC
P/03   PRO

Deep dive.

Our deepest tier — built for high-stakes counterparty, M&A and investigative work.
$3,900USDT
From 10 days
  • Everything in Profile
  • Extended personnel coverage
  • On-chain wallet research
  • Crypto cluster & CEX exposure
  • Cross-jurisdictional public litigation map
  • 90-day Q&A & revisions
  • SHA-256 signed delivery
SELECT PRO
05 / SAMPLE

Read a specimen.

Redacted · Structure 1:1 with our deliverable · Names & identifiers removed

Specimen 0S1NT/██-████

A redacted specimen of our corporate due diligence report. All names, entities, dates, jurisdictions and identifying details have been altered or removed. Structure, methodology and citation density are representative of our actual deliverable.

Free. Sent to your email.

▣ SPECIMEN — REDACTEDv1.0
██████ Group
Corporate group — elevated-risk profile
Case ID0S1NT/██-████
Domicile██████, ██ ·
UBOsidentified & mapped
Sanctionsindirect exposure flagged
Red flagsnumbered, severity-graded
Litigationpublic proceedings, mapped
Adverse mediamultiple references
Confidencegraded per finding
FormatHTML & PDF · SHA-256 signed
06 / USE CASES

Who orders, and why.

Anonymised · No client names · No case details
▸ M&A · DUE DILIGENCE

The pre-acquisition screen.

Acquirers ask us to vet a seller's beneficial owner before signing. Typical scope: parallel holding structures, hidden affiliates, undisclosed exposures the data room missed. Delivered ahead of close, in time to renegotiate or walk.

Outcome — a structured report with cited findings and risk grading.
▸ COUNTERPARTY · COMPLIANCE

The counterparty review.

Compliance teams ask us to check a prospective counterparty before onboarding — UBO chains, licensing verification, sanctions exposure, infrastructure overlap with previously-flagged entities. Used to support — not replace — internal KYC.

Outcome — supplementary research that surfaces what blockchain analytics and sanctions screens miss.
▸ INVESTIGATIVE · JOURNALISM

The funding chain.

Journalists and investigative outlets ask us to reconstruct ownership and funding chains across registries. Typical work: tracing layered corporate structures across jurisdictions, registry by registry, with every step citable from the public record.

Outcome — a reproducible chain that survives editorial legal review.
▸ WEB3 · TREASURY

The wallet behind the brand.

DAOs and treasury councils ask us to vet service providers and grant recipients. Typical scope: corporate identity resolution, on-chain treasury flows, exposure to flagged mixers or sanctioned addresses.

Outcome — a basis to engage, negotiate, or decline — with receipts.
07 / REQUEST

Open a case.

No account · No tracking · USDT TRC20
▸ INTAKE / CASE BRIEF

Tell us what you need to know.

09 / FAQ

Common questions.

If it isn't here — ask by email.
Is what you do legal?
Yes. We work exclusively with publicly-available information — corporate registries, court records, regulators, archives, on-chain data, press, and breach data already lawfully in the public record. We do not hack systems, impersonate people, or buy private data.
Will my request stay confidential?
We do not run user accounts. Intake is via email or encrypted messaging; case-IDs are randomised. We make best efforts to delete case metadata within 90 days and deliverables within 14 days. We never disclose client identity or case details to third parties, except where compelled by lawful process.
Why USDT-TRC20 only?
Low fees, fast settlement, predictable USD value. We do not accept fiat, cards, BTC or privacy coins. Every case is invoiced to a fresh deposit address.
Can I use the report in court or in a regulatory filing?
Our reports are research products. They are commonly used to brief counsel, who then prepare admissible evidence based on or supplementing our findings. We do not file expert-witness statements ourselves and do not represent our reports as admissible evidence — admissibility is a procedural question and your counsel's call.
What is your turnaround?
Surface from 24 hours · Profile from 4 days · Deep Dive from 10 days. Rush handling is possible for an additional fee.
Do you offer monitoring or recurring reports?
Yes. We offer recurring research on existing subjects on a quarterly or on-demand basis. Pricing is bespoke and depends on scope. Available after a first engagement.