INTELLIGENCE COMMAND PLATFORM  ·  IDENTITY GATE v2.0
SCANNING BIOMETRIC SIGNATURE…
⚠  TOP SECRET // SCI // BLACKOUT CODEWORD — AUTHORISED PERSONNEL ONLY  ⚠
UNAUTHORIZED ACCESS IS MONITORED & PROSECUTED UNDER 18 U.S.C. § 1030
ALL SESSIONS LOGGED  ·  BIOMETRIC DATA COLLECTED  ·  ZERO-TRUST ACTIVE
ALL SYSTEMS NOMINAL
MODULES · 25
TOOLS · 500
FEED · LIVE
UTC · --:--:--
MISSION STATUSACTIVE
OperatorSECURE.OPS
Session--
Modules25 LIVE
Tools500 / 500
Countries37 MAPPED
Latency12ms
INTEL ACTIVITY · LAST 60s
QUERIES0
LIVE INTEL FEED--
SELECT A LAYER
INTELLIGENCE FEED
Select a layer to load live intel
LIVE
◆ INTELLIGENCE BRIEFS
tap for intel
 NODES LIVE
UPLINK · SECURE
LATENCY · 12MS
NODES · 25 LIVE
SCAN · ACTIVE
STREAMS · 0
TIER · CLASSIFIED
SAT · GEO-4
REGION · GLOBAL
SIG · 98.7%
OPS · RUNNING
TOOLS · 500
FEED · LIVE
◆ MODULES  ·  SELECT TO ACCESS TOOLS
SECURE
◉ TIER I · INACTIVE
CLASSIFIED · UNITED KINGDOM · EST. 2024

BLACKOUT

PRIVATE INTELLIGENCE SERVICES

Decisive intelligence. Total discretion.

A private intelligence platform for HNWIs, family offices, government departments and legal counsel — combining AI-driven OSINT, predictive analysis and full audit governance under one secure command layer.

OSINT · ONLINE CHRONOS · READY NEXUS · SYNC AGENTAUDIT · LIVE ICO REGISTERED 14 ENGAGEMENTS ACTIVE GDPR ENFORCED TSCM · STANDBY OSINT · ONLINE CHRONOS · READY NEXUS · SYNC AGENTAUDIT · LIVE ICO REGISTERED 14 ENGAGEMENTS ACTIVE GDPR ENFORCED TSCM · STANDBY
0%
Client Retention
0+
Data Sources
0/7
Secure Ops
0m
Avg. Response
0%
Defensible Records
◆ DOSSIER · 01

Precision intelligence.
Total accountability.

"Where others stop — we begin."

Blackout provides private intelligence, surveillance and governance services to a discreet client base of principals, family offices, boards, counsel and government partners.

Founded by veterans of UK security operations, we combine AI-driven OSINT with seasoned human tradecraft — every action logged, every verdict signed.

◉ ICO REGISTERED ◉ GDPR COMPLIANT ◉ UK SECURITY INDUSTRY ◉ ISO 27001 ALIGNED

◆ Operational Capabilities

  • Open-Source Intelligence
    500+ verified sources, AI-correlated
  • Executive Protection
    Digital and physical exposure audit
  • TSCM Countermeasures
    RF sweep · bug detection · certification
  • CHRONOS Temporal AI
    Four-horizon predictive verdicts
  • Biometric Intelligence
    Identity verification at signal level
  • AgentAudit™ Governance
    Court-defensible audit trail
OPS LIVE REFRESHED · CONTINUOUSLY

Operational Intelligence · Now.

Live posture across the Blackout fabric. These are the indicators we monitor for every active engagement, refreshed continuously across global signal sources.

Sources Monitored
547
▲ Active across all engagements
Active Dossiers
14
▲ Chronos-signed · Live
Breach Records Indexed
2.4B
▲ Updated last 24h
Avg. Verdict Time
11m
▼ -18% vs baseline

From Brief to Verdict.

Every engagement follows the same disciplined five-step methodology. Court-defensible evidence handling at every stage.

01
BRIEF & SCOPE

Confidential consultation. NDA executed. Lawful basis confirmed and Legitimate Interest Assessment recorded on file.

02
COLLECT

500+ source classes swept under AgentAudit™ tamper-evident logging. Every analyst action timestamped and attributable.

03
CORRELATE

CHRONOS engine resolves Past, Present, Future and Adversary horizons into one signed verdict with confidence scoring.

04
DELIVER

Privilege-asserted dossier delivered to instructing party. Cryptographic seal, full source citations, exhibitable in court.

05
MONITOR

Optional Watchtower watch. Subject changes alert directly to counsel. Re-run at T+30/90 builds remediation evidence.

◆ TRUST & COMPLIANCE

Lawful by design.

Blackout Intelligence operates within a strict statutory and ethical framework. Our boundaries are not negotiable — they are what makes our intelligence defensible.

UK GDPR · Art. 6(1)(f)

All processing under documented Legitimate Interests Assessment, balanced against subject rights.

ICO Registered

Information Commissioner's Office registration current. DPA 2018 fully observed.

RIPA / IPA Boundary

No activity within RIPA 2000 Pt II or IPA 2016. Documented on every matter file.

AgentAudit™ Trail

Tamper-evident, timestamped log of every analyst action — admissible in proceedings.

Six systems. One command.

A complete intelligence stack — from daily toolkit to bespoke operations. Tier I activates the toolkit and audit layer; Premium unlocks the predictive engines and elite engagements.

TIER I · £49.99/mo

Intelligence Toolkit

◉ Daily Operations

Six tools for daily work: OSINT sweep, biometric scan, threat scoring, dark-web watch, AI analyst, due diligence. Unlimited use.

TIER I · INCLUDED

AgentAudit™

◉ Governance Layer

Every AI and human action logged, signed and reviewable. Kill-switch authority. Records hold up in court.

PREMIUM

NEXUS Command

◉ Live Risk Graph

Every adversary, asset and exploit on one live graph. Phantom Weave, Horizon Map, War Room collaboration.

PREMIUM

CHRONOS

◉ Predictive Engine

Resolves Past, Present, Future and Adversary horizons into one signed verdict — a single number you can act on.

PREMIUM

INTELFORGE Academy

◉ Operator Training

Eight tradecraft modules with question banks and a personal performance dossier. Train your team to operate the platform.

BESPOKE

Elite Operations

◉ By Invitation

Surveillance integration, predictive risk, TSCM sweeps, executive retainer, counter-intel and asset protection.

Intelligence Throughput · 24h
Signals processed across the toolkit
LIVE
Active Modules
6
OF 6 ONLINE
14,287
▲ 8.2%
Queries · This Month
99.7%
Resolution Rate · 30d
Tier I Toolkit

PREMIUM TOOLS

Unlimited, full-access to our AI-driven intelligence suite. Six elite modules trained on proprietary and open-source data. Cancel anytime.

INTELLIGENCE TOOLKIT · TIER I

Full-access monthly subscription · Instant activation · Priority UK support

£49.99/month
◉ SUBSCRIBE TO TIER I · £49.99/month
TIER I

OSINT SWEEP

◉ OPEN-SOURCE ENGINE

Deep-scan public records, social graphs, breach databases, and news archives in seconds. Builds a full dossier on any target.

  • 500+ integrated data sources
  • Auto-correlation + risk scoring
  • Breach & credential analysis
TIER I

AI BIOMETRIC SCAN

◉ IDENTITY LINKAGE

Facial recognition, identity verification, and linked-account discovery with geolocation intelligence for rapid threat assessment.

  • 98.7% match confidence
  • Cross-platform identity linking
  • Location history & proximity alerts
TIER I

THREAT & RISK ANALYSIS

◉ PREDICTIVE ENGINE

AI-driven digital exposure scoring, behavioural profiling, and mitigation recommendations to predict and prevent threats before they materialise.

  • Digital footprint exposure audit
  • Behavioural risk modelling
  • Personalised mitigation roadmap
TIER I

DARK WEB MONITOR

◉ HIDDEN NETWORK SCAN

Continuous real-time scanning of credential dumps, paste sites, onion marketplaces, and criminal forums for any mention of your identity or assets.

  • Tor & I2P marketplace sweeps
  • Credential leak alerts
  • Paste-site & forum monitoring
TIER I

AI INTELLIGENCE ANALYST

◉ CONVERSATIONAL ENGINE

Natural-language AI analyst that synthesises outputs from all tools into clear, actionable intelligence briefings. Your personal operations officer.

  • Multi-tool data synthesis
  • Executive briefing format
  • 24/7 conversational access
TIER I

AI DUE DILIGENCE

◉ VERIFIED REPORTING

Enhanced background reports for investments, hires, and partnerships. Human-verified, court-defensible, delivered in under 24 hours.

  • Corporate affiliations mapped
  • Adverse media & litigation check
  • Human-analyst verification
Agent Activity · Real-Time
Cryptographically logged actions across the fleet
STREAMING
Compliance Score
98
GDPR · ICO
42
▲ 3 today
Active Agents · Registered
8,941
Logged Actions · 24h
Governance Layer

AGENTAUDIT™

Real-time traceability for every AI action, every agent, every decision. The governance backbone for intelligence operations where accountability is non-negotiable.

AGENTAUDIT™ · INCLUDED WITH TIER I

Tamper-evident logging · Kill-switch authority · Court-defensible records

£49.99/month
TIER I

REGISTER NEW AGENT

◉ TRACEABLE IDENTITY

Create uniquely identified, fully traceable AI or human agents. Every action is cryptographically logged and permanently retained.

  • Cryptographic agent identity
  • Immutable action log
  • Role-based permissions
TIER I

LIVE AUDIT

◉ DEFENSIBLE RECORD

Instant defensible audit records with automated risk scoring, compliance flags, and court-ready output. Designed for high-stakes environments.

  • Risk score · 0-100 scale
  • GDPR & ICO compliance flags
  • Court-ready export
TIER I

KILL SWITCH

◉ EMERGENCY TERMINATION

Immediately terminate any compromised or rogue agent. Creates a permanent audit trail of the termination event for later forensic review.

  • Instant agent shutdown
  • Permanent termination log
  • Forensic replay capability
TIER I

LIVE AUDIT STREAM

◉ REAL-TIME TELEMETRY

Real-time telemetry stream from your entire agent fleet. Every action, flag, and decision, instantly.

Threat Vector Velocity
Adversary signal across the unified graph
LIVE
Graph Health
94
SYNC %
1,247
▲ 24
Graph Nodes · Active
7
▲ 2
Critical Vectors · Pending
NEXUS COMMAND CENTER · UNIFIED RISK INTELLIGENCE

Live Risk Graph.

Phantom Weave + HorizonWatch unified. Every adversary, asset, and scenario rendered on one interactive living graph. Get AI Business Platform access or upgrade to Tier II.

RISK87
WEAVE THREADS21
HORIZON PINS12
PHANTOM WEAVE
Build & rehearse threats
HORIZON MAP
30–90 day radar
ADVERSARY MODE
Become the threat
TSCM OVERLAY
Coverage simulator

◆ PHANTOM WEAVE SIMULATOR

Turns raw intelligence into an interactive living tapestry of threat nodes, connections and probabilities. You rehearse every possible outcome before real-world execution — giving total operational confidence.

MODE · WEAVE · 21 ACTIVE THREADS

◆ HORIZON PREDICTIVE MAP

30–90 day threat foresight for every asset — residences, aircraft, yachts, executive travel routes. Move from reactive security to predictive dominance.

MODE · HORIZON · 12 PINS LIVE

◆ LIVE COLLABORATIVE WAR ROOM

Real-time team rehearsal. Remote teams build scenarios together — perfect coordination, zero miscommunication, every decision logged.

MODE · WAR ROOM · 3 OPERATORS ONLINE

◆ DEEPFAKE RISK LABORATORY

Analyses risk of deepfake impersonation. Protects UHNW families from reputation-destroying synthetic media attacks. Voice + face + behavioural auth.

MODE · DEEPFAKE LAB · v4.2.1

◆ TSCM COVERAGE SIMULATOR

Overlays physical surveillance coverage. Instantly identify and fix blind spots before adversaries exploit them. RF · thermal · non-linear junction.

MODE · TSCM · 1MHz–40GHz

◆ AGENT AUDIT™ MASTER LOG

Records every action across NEXUS. Provides court-defensible, fully auditable records for all operations. Every pixel has provenance.

MODE · AUDIT · IMMUTABLE
Four-Horizon Confidence Index
Past · Present · Future · Adversary — rolling 12h
RESOLVING
Verdict Confidence
87
SIGNED · 24H
47
▲ 6
Active Dossiers · Signed
11
Horizon Divergences · 7d
PROJECT CHRONOS · TEMPORAL INTELLIGENCE ENGINE

Four Horizons. One Verdict.

Every investigation runs simultaneously across four temporal horizons — PAST footprint, PRESENT posture, FUTURE trajectory, and ADVERSARY simulation. Chronos resolves contradictions between what the target has done, is doing, will likely do, and what a hostile actor would exploit — into a single confidence-scored threat verdict.

◆ DESIGNATE TARGET
◆ PAST HORIZON · FOOTPRINT
Historical Exposure
Awaiting target designation. The PAST horizon reconstructs everything your target has done digitally — breaches, archived content, deleted posts, corporate filings, court records.
CONFIDENCE
◆ PRESENT HORIZON · POSTURE
Active Posture
Awaiting target designation. PRESENT horizon ingests live signal — current infrastructure, active accounts, geolocation patterns, communication cadence.
CONFIDENCE
◆ FUTURE HORIZON · TRAJECTORY
Predictive Trajectory
Awaiting target designation. FUTURE horizon projects behaviour forward — 30/60/90 day forecasts, likely moves, emerging vulnerabilities.
CONFIDENCE
◆ ADVERSARY HORIZON · EXPLOIT
Hostile Simulation
Awaiting target designation. ADVERSARY horizon simulates a hostile actor against the PAST+PRESENT picture, returning the exploit chain most likely to succeed.
CONFIDENCE
◆ CHRONOS VERDICT · SIGNED & TIMESTAMPED
OSINT GRID · INSTRUMENTS

Open-Source Collection.

Direct access to the instruments Chronos uses to construct the PAST and PRESENT horizons. All instruments are part of the Premium tier.

SURVEILLANCE SUITE

Active Monitoring.

Persistent-watch tooling. Each instrument produces tagged telemetry fed into the Watchtower and upstream to Chronos.

DEEP SCAN · DEEP + DARK WEB

Below The Surface.

Onion routing, paste sites, closed forums, breach databases, leaked credential registries. Chronos weights darknet appearance heavily on the ADVERSARY horizon.

SIGINT · SIGNAL INTELLIGENCE

Signal Capture.

Metadata-layer and traffic-analysis instruments. Every capture is tokenised and correlated before reaching Chronos.

WATCHTOWER · LIVE GLOBAL SIGNAL

Signal Intake.

Continuous ingestion from OSINT, breach registries, darknet relays, and signal intelligence. The Watchtower feeds Chronos with material for the PRESENT horizon.

SIGNALS / MIN
ACTIVE DOSSIERS
CRIT ALERTS (24H)
HORIZON DIVERGENCES
ACTIVE DOSSIERS · CHRONOS-SIGNED

Committed Intelligence.

Every Chronos verdict is signed, timestamped, and stored as a committed dossier. Cases are re-run against live signal automatically; when horizons diverge from the original verdict, you're alerted.

RED TEAM SIMULATOR · ADVERSARY HORIZON

Think Like Your Attacker.

Chronos runs its ADVERSARY horizon by simulating a hostile actor against the PAST+PRESENT picture and returning the exploit chain most likely to succeed.

◆ TARGET FOR ADVERSARY SIMULATION
DOCTRINE · OPERATIONAL PHILOSOPHY

The Chronos Doctrine.

Every piece of intelligence has a temporal dimension. A target's past footprint, present posture, future trajectory and adversary-eye exploit surface are never the same picture — and a single snapshot will always mislead. Chronos is built on one conviction: resolving contradictions between four horizons produces verdicts no single view can reach. It is why our dossiers hold up under legal scrutiny, and why our clients never act on stale intelligence.

BLACKOUT OPERATOR TRAINING · INTELFORGE ACADEMY

FORGE ELITE OPERATORS

Eight tradecraft modules, 400+ scenario-based questions, performance dashboard, and operator dossier. Certification-grade training built by UK intelligence veterans. Premium tier access.

OPERATOR DOSSIER

Your Operator File.

OPERATOR ID
AGT-7741
CLEARANCE
RESTRICTED
MODULES UNLOCKED
0 / 8
CERT TRACK
ACTIVE
Active Engagement Coverage
Bespoke operations across protected principals
SECURE
Operational Readiness
100
% READY
14
▲ 2
Active Engagements
11m
Avg Response Time · Tier I
By Invitation

ELITE CUSTOM OPS

Bespoke, high-stakes intelligence packages for principals, boards, and legal teams. By invitation and referral. Contact for personalised scoping.

INTELLIGENCE PLATFORM · TIER II

Full-suite access with Elite Ops · Priority response · Dedicated support

£199.99/month
◉ SUBSCRIBE TO TIER II · £199.99/month
BESPOKE

ADVANCED SURVEILLANCE INTEGRATION

Drone feeds, vehicle tracking, and real-time physical-digital fusion. Complete operational awareness across any geography.

  • ANPR · plate recognition
  • Aerial & static covert camera integration
  • Secure command-centre dashboard
BESPOKE

PREDICTIVE RISK ENGINE

AI scenario modelling and proactive threat forecasting. See risks weeks or months before they materialise.

  • Monte Carlo scenario simulation
  • Adversary behaviour modelling
  • Strategic early-warning alerts
BESPOKE

TSCM COUNTERMEASURES

Technical surveillance countermeasures. RF sweeps, bug detection, and secure-environment certification for homes, offices, and vehicles.

  • Full-spectrum RF sweep (1MHz–40GHz)
  • Thermal + non-linear junction detection
  • Secure-room certification
BESPOKE

EXECUTIVE INTELLIGENCE RETAINER

24/7 dedicated team with weekly intelligence briefings, custom AI workflows, and direct access to senior operators.

  • Named lead analyst
  • Weekly intelligence brief
  • Emergency escalation protocol
BESPOKE

DIGITAL COUNTER-INTELLIGENCE

Active defence and deception operations. Identify, isolate, and neutralise digital threats targeting your household or business.

  • Honeypot & deception deployment
  • Attacker attribution & profiling
  • Active response + legal escalation
BESPOKE

ASSET PROTECTION PROTOCOL

End-to-end protection for properties, art collections, yachts, and aircraft. Physical security meets digital intelligence.

  • Estate & residence hardening
  • Staff vetting & monitoring
  • Travel route risk assessment
◆ THREE-TIER OFFERING · SPECIMEN AVAILABLE
BLACKOUT INTELLIGENCE · DUE DILIGENCE

The Anatomy of a Verdict.

Discreet, lawful, defensible due diligence on individuals and entities — delivered across three tiers calibrated to your matter's risk and value. Every dossier is privilege-asserted, AgentAudit™-logged, and exhibitable under court scrutiny.

UK GDPR · Art. 6(1)(f) ICO Registered RIPA-Boundary Documented AgentAudit™ Trail
Subjects Covered Individuals · Corporates · Family Offices
Lawful Basis Legitimate Interest · LIA on file
Issued To Instructing party only · NDA-protected
Classification CLIENT-EYES-ONLY
CHRONOS VERDICT · SAMPLE
84/100
Elevated Risk
ADVERSARY CHAIN PLAUSIBLE
WITHIN 30 DAYS
WHAT'S INSIDE

11 sections covering identity, assets, charges, financial integrity, digital exposure, lifestyle and recommendations.

COMPARE TIERS

Standard, Enhanced and Covert tiers — see exactly what uplift each tier delivers and when to use it.

FREQUENTLY ASKED

Lawful basis · turnaround · evidence handling · expert-witness exhibits · pricing structure.

◆ SELECT YOUR TIER

Choose your depth.

Click a tier below to see the methodology, sample report, and pricing for that level of engagement.

TIER 01 · STANDARD

Standard Diligence

£600 fixed
⏱ 7 working days · Documentary
  • Identity verification & corroboration
  • Companies House & PSC mapping
  • Credit, CCJ & insolvency check
  • Sanctions, PEP & regulatory screening
  • Adverse-media sweep (last 10 yrs)
  • Digital footprint & closely-connected parties
  • Land Registry mapping
  • Dark-web / breach scan
  • Peripheral-source enquiry
TIER 03 · COVERT

Covert Engagement

Contact us for a quote
⏱ Scope-driven · By instruction
  • Everything in Enhanced, plus:
  • Directed surveillance (RIPA-aware)
  • Technical / TSCM countermeasures
  • Extended source network engagement
  • Multi-jurisdictional instruction
  • Active counter-intelligence
  • Court-witness preparation
  • 24/7 retainer activation
  • Requires prior legal sign-off
LIVE

Real-Time Data Feeds

Every dossier is more than a static PDF — it's a live dashboard. New CCJs, charges, sanctions hits, breach appearances and adverse media trigger an alert and re-score within hours, not weeks.

HUMAN VERIFIED

Human-in-the-Loop

AI does the collection. A senior analyst reviews, weights, and signs every finding. No auto-published verdicts, no hallucinated findings — every conclusion has a name and a reputation behind it.

PROPRIETARY

Risk Score · 1–100

A single proprietary score from 1–100 distilling every finding into one Go/No-Go indicator. Backed by full source disclosure — every point of the score is traceable to evidence.

◆ TIER UPLIFT — DEPTH
◆ SOURCE COVERAGE
◆ TURNAROUND VS DEPTH
S1
STANDARD TIER

Documentary Due Diligence · £600 · 7 days

The Standard Tier delivers a comprehensive documentary picture of an individual or entity built entirely from the public record and licensed datasets. It is the appropriate baseline for new commercial relationships, supplier onboarding, lower-value transactions, and routine reputational checks.

Each dossier is between 8 and 12 pages, structured to a fixed template, and delivered as a privilege-asserted PDF accompanied by an AgentAudit™ evidence-handling log.

SCOPE OF ENQUIRY

  • Identity verification — corroboration of stated identity against electoral roll, Companies House officer record, and corroborating public sources.
  • Corporate footprint — directorships, PSCs, dissolved/struck-off entities, recurring corporate patterns.
  • Credit & insolvency — CCJs, IVAs, bankruptcy orders, gazette notices, disqualifications.
  • Sanctions & PEP — OFSI, OFAC, UN, EU consolidated lists; politically-exposed person status.
  • Regulatory record — FCA, SRA, ICAEW, professional-body censures or restrictions.
  • Adverse media — last 10 years, weighted by source credibility.
  • Closely-connected parties — first-degree associates and family members where publicly evidenced.
WHEN TO USE
Best fit for routine onboarding and lower-value commercial relationships

Standard Tier is appropriate where the matter does not turn on the subject's hidden assets or operational security, where there is no specific cause for elevated concern, and where a documentary record is sufficient. If a Standard report surfaces material findings, we recommend uplift to Enhanced before relying on the position.

SAMPLE ENHANCED DOSSIER

BI-DD-2026-SAMPLE-ENH · 12 pages · All findings fictional · Demonstration only

◆ ENHANCED TIER · DEMONSTRATION SAMPLE

Enhanced Due Diligence Report on an Individual

An Enhanced Tier dossier rendered in full, illustrating the depth, rigour and methodology applied to every engagement at this tier. Subject, entities, dates and findings are fictional composites — no real individual is depicted.

SubjectMr James Edward Holloway
Report TierEnhanced · £1,200 · 15 days
Prepared ForDemonstration sample
Date of Report22 April 2026
Matter ReferenceBI-DD-2026-SAMPLE-ENH
Prepared BySenior Analyst, Enhanced Diligence
OVERALL RISK ASSESSMENT
ELEVATED
Escalated from MEDIUM at Standard Tier following additional findings
Document IDBI-DD-2026-SAMPLE-ENH
Version1.0
ClassificationConfidential — Legal Privilege Asserted
DistributionInstructing party only · No onward distribution without written consent
Retention7 years from date of report
Lawful BasisUK GDPR Art. 6(1)(f) Legitimate Interest · LIA on file
Statutory BoundaryNo activity within RIPA 2000 Pt II or IPA 2016
Evidence HandlingAgentAudit™ tamper-evident log retained
01

EXECUTIVE SUMMARY

Subject: Mr James Edward Holloway · DOB: 14 March 1971 (verified) · Residence: Chertsey, Surrey · Occupation: Director, private investment and property companies · Nationality: British (verified)

Enhanced Tier enquiries, building on all findings reported at Standard Tier, identify additional matters that materially change the overall assessment. Land Registry and beneficial-ownership mapping reveals a more complex asset position than self-disclosed. Our dark-web exposure scan identified the subject's historic credentials in three separate data breaches. Discreet peripheral-source enquiry has surfaced a previously unreported matter of concern.

FINDINGS CARRIED FORWARD FROM STANDARD TIER
  • Two unsatisfied CCJs totalling £47,382 (see §05).
  • Compulsory strike-off of Meridian Holloway Lettings Ltd (2023).
  • Inconsistent academic claim across public profiles (see §07).
NEW FINDINGS AT ENHANCED TIER
  • Asset position materially larger than self-presented. Land Registry mapping identifies a direct or beneficial interest in 11 residential properties across Surrey, Berkshire and Greater London, with an estimated aggregate market value of approximately £7.2m–£8.4m. Publicly-suggested portfolio size is 4–5 properties (see §03).
  • Undisclosed charge against principal residence. A second charge was registered against the subject's Chertsey residence in February 2025 in favour of a private non-bank lender. No public statement made (see §04).
  • Dark-web credential exposure (three breach events). Subject's email address and historic passwords appear in three verified breach corpora dated 2019, 2022 and 2024 (see §06).
  • Peripheral-source matter. A discreet enquiry to a single former business associate elicited substantive reference to a 2020 dispute resolved outside the public record (see §08).
02

SCOPE AND ENHANCED UPLIFT

This Enhanced Tier report carries forward the full scope of the Standard Tier (identity, corporate, credit, sanctions, regulatory, adverse media, digital footprint, closely-connected parties) and adds the following enhanced enquiry lines:

  • Comprehensive Land Registry mapping — Index Map and Proprietorship Register searches across all candidate locations; corporate-held property interests traced via PSC chains.
  • Beneficial-ownership tracing — Reconstruction of ownership chains through UK and identified offshore holding structures. Identification of silent partners, nominees, and undisclosed interests.
  • Dark-web and breach exposure analysis — Scan of credential and PII exposure across breach corpora (2015–present), indicating operational security posture and potential compromise vectors.
  • Discreet peripheral-source enquiry — Lawful, pretexted where permissible, discreet conversations with a small number of former business associates. No approach to the subject.
  • Lifestyle observation (light-touch) — Open-physical-space observation of publicly-visible lifestyle markers. No covert surveillance at this tier.
  • Counterparty mapping — Identification of key counterparties to subject's entities — lenders, major tenants, investors, advisors — with risk screening on each.
  • Reconciliation against self-representation — Systematic comparison between what the subject claims publicly and what the record evidences, with all divergences logged.
EXPLICITLY EXCLUDED
Covert physical surveillance, technical surveillance, communications interception

And any activity inconsistent with the Data Protection Act 2018, UK GDPR, RIPA 2000, IPA 2016, or the common law of privacy and confidence. These are addressed separately under our Covert Tier, which requires specific legal sign-off in advance of instruction.

03

ASSET POSITION

Comprehensive Land Registry enquiry identifies the following interests held by the subject either personally or through active corporate vehicles in which he is a Person of Significant Control:

#Property (anonymised)Held byEst. ValueCharges
1Detached, Chertsey (principal residence)Personal£1.85M2 (see §04)
2Detached, WeybridgeMeridian Property Holdings Ltd£2.10M1
3Terrace × 4, ReadingSurrey Residential Ltd£1.42M1 (portfolio)
4Terrace × 3, SloughSurrey Residential Ltd£0.96M1 (portfolio)
5Flat × 2, Battersea SW11Holloway Capital Partners Ltd£0.88M1 (portfolio)
6Semi-detached, GuildfordJEH Lending Ltd (security)n/aLoan-held

Estimated aggregate market value of the subject's direct and beneficial property interests: £7.21M – £8.40M.

◆ ASSET BREAKDOWN BY VEHICLE
◆ GEOGRAPHIC DISTRIBUTION
HIGH
Material understatement of portfolio size in public narrative

The subject's publicly-stated portfolio in a 2022 podcast appearance and 2024 LinkedIn commentary references "four or five properties" and describes himself as a "small investor." Land Registry evidence identifies 11 residential units beneficially traceable to the subject across the active corporate group, with aggregate value in the range £7.2m–£8.4m.

Source: Land Registry Index Map and Proprietorship Register searches; PSC register; PropertyPod Ep. 42 (2022); LinkedIn posts (March, July 2024).
04

CHARGES AND INDEBTEDNESS

The following charges have been identified through Land Registry and Companies House enquiries:

Secured Property / EntityChargeeTypeRegistered
Principal residence, ChertseyMajor UK high-street lender1st charge (mortgage)2015
Principal residence, ChertseyPrivate non-bank lender2nd chargeFeb 2025
Meridian Property Holdings LtdChallenger bankDebenture (all-assets)2018
Surrey Residential LtdSpecialist BTL lenderPortfolio charge2021
Holloway Capital Partners LtdSpecialist lender1st charge (Battersea units)2019
HIGH
Second charge on principal residence in favour of private lender

A second charge was registered against the subject's principal residence in February 2025 in favour of a UK-registered private non-bank lender. Private second charges on a principal residence are commonly associated with (a) short-term liquidity pressure, (b) inability to re-mortgage through mainstream channels, or (c) bridging against a planned but incomplete transaction. Where the matter turns on the subject's covenant strength or liquidity, this finding is decisive.

Source: HM Land Registry Charges Register, title [anonymised] (Feb 2025).
05

FINANCIAL INTEGRITY

The County Court Judgments identified at Standard Tier are carried forward without amendment. At Enhanced Tier we have additionally attempted identification of claimants and underlying cause:

  • Guildford CCJ (£31,847, Nov 2024) — claimant identified as a building contractor based in the Home Counties. Claim relates to unpaid invoices in respect of work at a property within the portfolio (Surrey Residential Ltd). No defence filed; judgment in default.
  • Reading CCJ (£15,535, June 2023) — claimant identified as a professional services firm (chartered surveyors). Claim for unpaid fees. Again, no defence filed.

Both judgments relate to commercial suppliers pursuing the subject personally. The pattern — two separate unrelated suppliers, within 18 months, both unsatisfied, both undefended — tilts toward persistent slow-payment behaviour rather than disputed work.

06

DIGITAL EXPOSURE — DARK-WEB & BREACH DATA

Enhanced Tier enquiry includes scan of the subject's known email addresses, telephone numbers and identity fragments against major breach-data corpora and indexed dark-web mentions. Searches were conducted through legitimate, commercially-available breach-intelligence services. No unlawful acquisition of data was undertaken.

Breach EventYearData ExposedStatus
LinkedIn (scrape)2019Email, employment history, hash● Confirmed match
LastPass (auxiliary)2022Email, vault metadata (no plaintext)● Confirmed match
Major retailer breach2024Email, billing postcode, hashed password● Confirmed match
◆ BREACH EXPOSURE TIMELINE

No indication from available metadata that the subject has rotated credentials post-breach, nor that multi-factor authentication has been applied. Exposure is consistent with a typical mid-profile professional individual — reflective of a moderate cybersecurity posture inconsistent with the subject's stated business activity in private lending.

07

SELF-REPRESENTATION AGAINST RECORD

At Enhanced Tier we conduct a systematic reconciliation of the subject's public self-representation against the documentary record. The following divergences have been logged:

Subject's public claimDocumentary recordDivergence
"Four or five properties"11 properties identified● Material
"Small investor"£7.2m–£8.4m portfolio● Material
Exeter / Bristol / Durham (inconsistent)Not independently verified● Inconsistency
"Senior banking roles"Plausible; not independently verified● Unresolved
No public reference to CCJsTwo unsatisfied CCJs● Omission
No public reference to 2nd charge2nd charge registered Feb 2025● Omission
08

PERIPHERAL-SOURCE ENQUIRY

Under Enhanced Tier instruction, a small number of lawful, discreet peripheral enquiries were undertaken with former business associates. Principles observed:

  • No approach to, or notification of, the subject.
  • No deception rising to unlawful conduct; pretext was proportionate, non-actionable and recorded on file.
  • No inducement, payment, or offer of benefit to any source.
  • Records of each contact retained on file with date, medium, and contemporaneous notes.
MEDIUM
Reference to a 2020 commercial dispute resolved outside the public record

A former business associate spontaneously referred to the subject in conversation and characterised a 2020 commercial disagreement between the subject and a third party as "settled quickly with no money changing hands but with some feathers ruffled." This reference is logged for situational awareness; it has not been independently corroborated, is second-hand, and should not be relied upon as evidence of any fact.

Source: Peripheral-source conversation, 14 April 2026; notes retained on matter file.

Three other peripheral enquiries produced no material findings. Sources collectively characterised the subject as "competent," "commercially ambitious," and "good at presenting." One source used the phrase "can be slow to pay." No source raised any matter of criminality, dishonesty in the strict sense, or regulatory concern.

09

LIFESTYLE INDICATORS

Enhanced Tier permits light-touch lifestyle observation: public-space observation of residential frontage, vehicles on public access, and verification of leisure patterns indicated in publicly-posted content. No covert surveillance was undertaken.

CategoryObservation
Principal residenceDetached property in professional condition. Well-maintained frontage, CCTV at two elevations.
VehiclesRange Rover Sport; Porsche Macan observed on second visit. Both on private driveway.
Household staffOne regular domestic cleaner observed (twice weekly). No other household staff identified.
SailingMembership of named Solent-based yacht club corroborated via club's publicly-visible member-boat register.
TravelInstagram content consistent with 2–3 European leisure trips per year (Mediterranean, Alps).

Overall: observed lifestyle is consistent with declared asset position (once the larger portfolio is accounted for) and with material commercial activity. Nothing overtly inconsistent with legitimate income was observed.

10

RECOMMENDATIONS

  • Treat the subject's self-representation with appropriate caution. The pattern of material divergence is sufficient, on its own, to justify independent verification of any statement of wealth or financial position provided by the subject.
  • Request full asset schedule with supporting documentation before any material commercial commitment is concluded. Compare against §03 and §04 of this report.
  • Require formal disclosure of all secured liabilities including the Feb 2025 second charge. Material adverse change clauses in any contract should be tightly drawn.
  • Obtain the subject's written explanation for (a) the unsatisfied CCJs, (b) the academic-claim inconsistency, and (c) the 2020 matter referenced in §08.
  • Consider ongoing monitoring for the duration of any commercial relationship — quarterly CCJ, charges register, and insolvency-register refresh.
  • Escalate to Covert Tier only where strictly warranted and only with prior independent legal sign-off.
11

METHODOLOGY, ETHICS & LIMITATIONS

LEGAL AND ETHICAL BASIS

All enquiry was conducted in accordance with the Data Protection Act 2018, UK GDPR, and the common law of privacy and confidence. Blackout Intelligence Ltd is registered with the ICO. Processing under Article 6(1)(f) Legitimate Interest, supported by a formal Legitimate Interests Assessment. No enquiry within the statutory regime of RIPA 2000 or IPA 2016.

AGENT AUDIT™ EVIDENCE RECORD

This engagement has been conducted under our proprietary Agent Audit™ evidence-handling control layer. Every analyst action — source acquisition, storage, retrieval, analysis, and reporting — is recorded in a tamper-evident, timestamped, attributable log. The audit trail can be produced to the instructing party's legal advisors on reasonable request.

LIMITATIONS
  • Asset aggregation reflects interests identifiable through public records; undisclosed overseas assets, trust-held beneficial interests, and holdings through non-UK corporate vehicles are not comprehensively addressed at Enhanced Tier.
  • The peripheral-source reference at §08 is second-hand, uncorroborated, and should be treated as situational context only.
  • Breach-data scan reflects data made available by the named intelligence services to the date of scan.
  • Report is point-in-time. Refresh recommended before reliance in proceedings or material commitment if more than 90 days have elapsed.
PREPARED & ISSUED BY
D. Blackout
Senior Analyst, Enhanced Diligence
Blackout Intelligence Ltd · ICO Registered
Issued · 22 April 2026 · Demonstration Sample
CRYPTOGRAPHIC SEAL
0x7a3f8d92e4b1c6f0a8d5b2e9c4f7a1d8e3b6c9f2a5d8e1b4c7f0a3d6e9b2c5f8
Verification: chronos-verify.blackoutintelligence.co.uk
Tamper-evident · AgentAudit™ anchored

— DEMONSTRATION SAMPLE · ALL CONTENT FICTIONAL · No real individual is depicted. —

C1
COVERT TIER

Bespoke Engagement · By instruction · Scope-driven

The Covert Tier is reserved for matters where Enhanced Tier enquiry is insufficient to establish the position with the necessary confidence — typically high-value disputes, hostile counterparty relationships, executive protection, family-office security mandates, and litigation support.

Covert engagements are never proceeded with on a self-instruct basis. Each is preceded by independent legal sign-off, a documented proportionality assessment, and a written scope agreement with the instructing party. RIPA 2000 / IPA 2016 boundaries are explicitly addressed in every Covert Tier scope.

CAPABILITIES (BY INSTRUCTION)

  • Directed surveillance — Where lawful and proportionate; conducted by accredited operators under documented authorisation.
  • TSCM countermeasures — RF sweep, technical surveillance counter-measures, bug detection, certified clean-room provisioning.
  • Extended source network — Discreet engagement of vetted source network across multiple jurisdictions.
  • Multi-jurisdictional instruction — Coordinated enquiry across UK, EU, and partner jurisdictions.
  • Active counter-intelligence — Detection and disruption of hostile collection against the principal.
  • Court-witness preparation — Senior analyst available for expert-witness duty; CV available on request.
REQUIRED
Independent legal sign-off before instruction

Covert engagements require the instructing party to obtain independent legal sign-off in advance. Blackout Intelligence will not proceed without a written authorisation. Where independent counsel is required, we maintain a panel of experienced privacy and litigation counsel and can introduce on request.

Capability Standard
£600
Enhanced
£1,200
Covert
On request
Identity verification
Companies House & PSC mapping
Credit, CCJ & insolvency
Sanctions, PEP & regulatory screening
Adverse-media sweep
Digital footprint
Closely-connected parties
Land Registry mapping
Beneficial-ownership tracing
Dark-web & breach scan
Peripheral-source enquiry
Light-touch lifestyle observation
Counterparty risk mapping
Self-representation reconciliation
Directed surveillance
TSCM countermeasures
Extended source network
Multi-jurisdictional instructionlimited
Court-witness preparationon request
Active counter-intelligence
Turnaround7 days15 daysScope-driven
Report length8–12 pp12–24 ppBespoke
AgentAudit™ evidence trail
Privilege-asserted
◆ TIER COMPARISON · CAPABILITY RADAR
◆ vs. TRADITIONAL DUE DILIGENCE

Why Blackout Beats a Law Firm.

The numbers most clients see when they switch from a Magic Circle DD provider to Blackout. We're built on AI-augmented analyst workflows, not billable hours.

FEATURE
TRADITIONAL FIRM
BLACKOUT INTELLIGENCE
Speed
2–4 weeks
7–15 days · 24h rush avail.
Cost
£15,000+
£600–£1,200 fixed
Updates
Outdated once printed
Live · real-time alerts
Availability
Office hours only
24/7 access
Data Sources
~50 manually checked
500+ continuously indexed
Format
Static PDF only
Live dashboard + PDF / PPTX / XLSX
Verification
Junior associate drafts
Senior analyst signs every claim
Audit Trail
Working papers, opaque
AgentAudit™ tamper-evident log
Re-run / refresh
Full re-engagement & re-fee
Re-run T+30 / T+90 included
Customisation
Fixed scope, all-or-nothing
Pick & mix · 12 modules
93%
Average cost reduction
vs Magic Circle DD provider on a comparable Standard scope
Faster turnaround
7–15 days vs 4–8 weeks industry average
10×
More data sources
500+ vs ~50 manually-checked traditional sources
◆ EXECUTIVE SUMMARY DASHBOARD

Deal Breakers. At a Glance.

The first page of every Blackout dossier. A high-level view designed for boardroom decisions — red flags surfaced immediately, full sources one click away.

PROPRIETARY RISK SCORE
72/100
⚠ ELEVATED · PROCEED WITH CONDITIONS
Updated 4 min ago Verified · Senior Analyst

◆ DEAL BREAKERS & RED FLAGS

LIVE
UBO Concealment Detected

Beneficial owner appears 3 layers deep through Cyprus / Isle of Man structure. Contradicts company filing.

Source: Companies House · BVI Registry · Land Registry
CRITICAL
Active Litigation · £2.4M Exposure

Subject is defendant in two High Court matters. Largest claim £1.8M, status: pleadings closed.

Source: BAILII · Royal Courts of Justice · CCJ Registry
HIGH
Tax Non-Compliance Indicators

Two consecutive years of late accounts. HMRC charge registered 2024.

Source: Companies House · HMRC Gazette · Charges Register
HIGH
Cybersecurity Posture · Moderate

Director credentials in 3 breach corpora. No evidence of MFA or password rotation.

Source: Have I Been Pwned · SpyCloud · Internal telemetry
MEDIUM
Sanctions & PEP · Clear

No matches against OFSI, OFAC, UN, EU consolidated lists. Not politically exposed.

Source: HM Treasury · OFAC · UN · EU lists · Real-time
CLEAR

◆ SECTION-BY-SECTION RISK · HEAT MAP

Every standard section scored independently. Click any tile to drill into the detail.

◆ RISK SCORE · 30-DAY TRAJECTORY
◆ SOURCE WEIGHT · BY EVIDENCE TYPE
◆ FINDINGS BY SEVERITY

LIVE INTELLIGENCE FEED

Auto-refresh · 60s
14:32FILINGNew Companies House submission · accounts overdue
14:18CHARGENew charge registered against Meridian Holdings · debenture
13:51CLEAROFSI list refresh · no new matches
13:22MEDIAAdverse-media hit · trade press · supplier dispute
12:48SOCIALDirector removed LinkedIn employment claim · monitored
12:11VERIFIEDSenior analyst signed off Section 03 · Asset Position
◆ STANDARD SECTIONS

What's Inside Every Dossier.

Every Blackout due diligence engagement is built around five standard sections plus three specialist sections. Each is defensible, sourced, and signed by a senior analyst.

01
EXECUTIVE

Executive Summary Dashboard

RED FLAGS SURFACED

A single-page dashboard putting the deal-breakers in front of the decision-maker. Risk score 1–100, top three concerns, recommended actions, and the verdict colour — green / amber / red.

  • Proprietary 1–100 risk score with confidence interval
  • Top deal-breakers ranked by impact & probability
  • Quick-reference traffic-light verdict
  • Recommended next actions, sequenced
  • Source citations for every claim · one click away
02
FINANCIAL

Financial Integrity

2 RISK MARKERS

Automated analysis of balance sheet, P&L, cash-flow patterns and tax compliance — every figure cross-referenced against filed accounts and credit-bureau data.

  • Filed accounts 5-year trend analysis (turnover, margin, gearing)
  • Cash-flow stability indicators & working-capital health
  • Tax compliance · HMRC charges · VAT registration status
  • CCJ & insolvency register · personal & corporate
  • Credit bureau data · payment behaviour score
  • Banking relationship indicators & lender concentration
  • Forensic indicators · earnings management red flags
03
LEGAL · CORPORATE

Legal & Corporate Structure

UBO ALERT

UBO tracing through UK and offshore structures. Share capital reconstruction. Litigation history. Director conduct. Regulatory record.

  • Ultimate Beneficial Ownership · multi-jurisdiction tracing
  • Share capital structure & transfer history
  • PSC register · nominee & trust arrangements identified
  • Active & historical litigation · all jurisdictions
  • Director disqualifications & conduct concerns
  • Regulatory record · FCA / SRA / ICAEW / professional bodies
  • Group structure mapping · subsidiaries & affiliates
04
OPERATIONAL

Operational Review

REVIEW NEEDED

Asset register, supply-chain dependencies, key-person risk, employment contracts and HR exposure — built from filings, public registers and verified open-source intelligence.

  • Tangible & intangible asset register · with valuations
  • Property holdings · Land Registry mapping
  • Supply-chain dependency mapping & concentration risk
  • Key-person risk & succession exposure
  • Employment contract patterns & HR liabilities
  • IP portfolio · patents · trademarks · domains
  • Insurance coverage indicators
05
COMMERCIAL

Commercial & Market Analysis

FAVOURABLE

Benchmarking the target against direct competitors, market share trajectory, customer concentration, and industry trends — to position the financials in the right context.

  • Direct competitor benchmarking · 5–10 peer set
  • Market share trajectory · multi-year
  • Customer concentration · top-revenue dependency
  • Industry trend mapping · macro indicators
  • Pricing power & margin trajectory
  • Reputation in trade press & sentiment analysis
  • Strategic-buyer mapping · who else is interested
06
CYBER · DIGITAL

Cyber & Digital Exposure

3 BREACHES

Operational security posture from open-source signal. Credential leaks, dark-web mentions, attack-surface enumeration, and digital hygiene of principals.

  • Credential exposure across breach corpora (2015–present)
  • Dark-web mention monitoring · principal & entity
  • Attack-surface enumeration · subdomains, certs, endpoints
  • Email security posture · SPF/DKIM/DMARC
  • Public-cloud exposure · open buckets, repos
  • Ransomware-watch · leak-site appearance
  • Behavioural cadence · anomaly detection
07
ESG · REPUTATION

ESG & Reputational Exposure

CLEAR

Environmental, Social, Governance exposure built from public filings and adverse-media. Increasingly demanded by family offices, institutional investors and listed acquirers.

  • Environmental compliance · permits, fines, breaches
  • Modern Slavery Statement & supply-chain ESG
  • Diversity & Inclusion disclosures · gender pay gap
  • Governance · board structure, independence, tenure
  • Reputation events · 10-year horizon
  • Social media sentiment · weighted by source
  • Whistleblower / Glassdoor employee signals
08
SANCTIONS · PEP

Sanctions, PEP & AML Screening

CLEAR

Real-time screening against every major sanctions regime and PEP register. Monitored continuously for the duration of any subscription.

  • OFSI (UK), OFAC (US), UN, EU consolidated
  • HM Treasury Asset Freezing Targets
  • Politically Exposed Persons · global register
  • Family & close associates of PEPs
  • Adverse-media flagged for AML triggers
  • Source-of-wealth & source-of-funds enquiry
  • Ongoing monitoring · refreshed daily on active matters
◆ CUSTOMISABLE MODULES

Pick & Mix.

Don't need everything? Build a bespoke dossier from the modules below. Toggle what matters to your matter — your quote updates instantly. Minimum engagement £400.

◆ YOUR DOSSIER

LIVE QUOTE
Modules selected0
Subtotal£0
Bundle discount−£0
TOTAL£0
Add modules to build your dossier

All modules include AgentAudit™ trail · privilege-asserted · senior-analyst signed

◆ VIRTUAL DATA ROOM

M&A-Grade Workflow.

A secure, encrypted workspace where you upload sensitive documents, run a structured Q&A with the seller, and export board-ready PDFs at the click of a button. Built to the same standards used in £100M+ transactions.

SECURE DATA ROOM

34% of 100GB · 247 documents · AES-256 encrypted at rest
01_Financial 42 files
Audited_Accounts_2024.pdf8.2MB · ✓ Verified
Cashflow_Forecast_2025.xlsx2.1MB · 🔒 Watermarked
Tax_Returns_2020-2024.pdf14.6MB
02_Legal & Corporate 38 files
03_Material Contracts 61 files
04_HR & Employment 29 files
05_IP & Technology 24 files
06_Litigation & Disputes 12 files · ⚠ 2 active
07_ESG & Compliance 19 files
08_Regulatory 22 files
User-watermarking on every page Full access audit trail Time-limited & geo-fenced access Granular permissions per folder

Q&A WORKFLOW

4 OPEN

Ask the seller's team directly. Every question is logged, attributed, and time-stamped — building an evidentiary record that survives any later dispute.

FINANCIAL2h ago
Q: Please explain the £840k goodwill write-down in 2023 accounts.
Awaiting answer · Assigned to: Seller CFO
LEGALYesterday
Q: Provide schedule of all active litigation, including settlement discussions.
A: Schedule provided · See document 06.04. Two matters disclosed; settlement discussions on Matter A.
Answered & verified
OPERATIONAL3d ago
Q: Top 5 customer contracts — change-of-control clauses?
In progress · Legal team reviewing
ESG5d ago
Q: Modern Slavery Statement for FY24 + supplier audit results.
A: Statement at doc 07.03. No material breaches in audits.
Answered
47Total questions
43Answered
4Open
1.2dAvg. response

EXPORT ENGINE

ONE-CLICK

Generate board-ready, branded reports in seconds. Choose format, choose sections, choose audience. Every export is watermarked and tracked.

◆ INDUSTRY CHECKLISTS

Tailored to Your Sector.

Generic checklists miss the issues that actually matter. Choose your industry and the checklist re-builds itself with the regulatory, legal and operational items that experienced practitioners check first.

0 of 0 items complete
◆ SECURITY & COMPLIANCE

Built to M&A-Grade Standard.

Due diligence involves the most sensitive data a company has. Our infrastructure is held to the same standard institutional acquirers and tier-1 law firms demand of their providers.

ISO 27001

Information Security Management System certified. Externally audited, annually renewed. Full Statement of Applicability available on NDA.

CERTIFIED

SOC 2 Type II

Security, Availability, Processing Integrity, Confidentiality and Privacy controls audited over a 12-month observation window.

ATTESTED

UK GDPR · DPA 2018

ICO registered. Lawful basis Art. 6(1)(f). Documented LIA on every engagement. Subject Access Request workflow operational.

REGISTERED

End-to-End Encryption

AES-256 at rest. TLS 1.3 in transit. Hardware-key MFA on all analyst accounts. Zero-knowledge VDR architecture.

ENFORCED

RIPA / IPA Boundary

Statutory boundary documented on every matter. No interception, no covert HUMINT as defined, no equipment interference outside Covert Tier scope.

DOCUMENTED

AgentAudit™

Proprietary tamper-evident audit trail. Every analyst action signed, timestamped, attributable. Court-exhibitable.

PROPRIETARY

Infrastructure & Hosting

  • UK-only data residency · sovereign data handling
  • Hardened cloud infrastructure · ISO 27017 / 27018 aligned
  • Network segmentation · zero-trust architecture
  • 24/7 SOC monitoring · automated threat detection
  • Penetration testing · quarterly · independent
  • Vulnerability scanning · weekly · CVE-tracked

Encryption & Access

  • AES-256-GCM encryption at rest · keys in HSM
  • TLS 1.3 only in transit · perfect forward secrecy
  • Hardware-key (FIDO2) MFA on all analyst access
  • Role-based access control · principle of least privilege
  • Bring-your-own-key (BYOK) available on Enterprise tier
  • Document watermarking · per-user · per-page

Personnel & Operations

  • BS 7858:2019 vetted analysts · DBS Enhanced
  • NDA on engagement · standard mutual
  • Need-to-know access enforcement
  • Quarterly security training · phishing-resistant
  • Incident response · 1-hour SLA · published runbook
  • Background-rechecked annually

Data Subject Rights & Compliance

  • UK GDPR Art. 15–22 SAR workflow operational
  • 30-day SAR response window · documented
  • Data Protection Officer · contactable directly
  • Records of Processing Activity · DPA-compliant
  • Data Processing Agreements · standard available
  • Cyber Essentials Plus aligned
ON REQUEST
Full security pack available under NDA

ISO 27001 SoA, SOC 2 Type II report, penetration test executive summary, Data Processing Agreement and full security architecture documentation are made available to instructing parties' IT and legal teams under NDA. Email dan@blackoutintelligence.co.uk with the subject line "Security Pack" to receive within 1 business day.

◆ FREQUENTLY ASKED

Common questions.

All processing is conducted under UK GDPR Article 6(1)(f) — Legitimate Interest. A formal Legitimate Interests Assessment (LIA) is completed and retained on file for every engagement, balancing the instructing party's legitimate need for due diligence against the rights and freedoms of the subject. We are registered with the Information Commissioner's Office under the Data Protection Act 2018.

15 working days from receipt of signed instruction and cleared funds. Expedited timelines are available by exception on Covert Tier instructions where operational justification supports it.

Yes. Every dossier is privilege-asserted on the cover page and accompanied by an AgentAudit™ tamper-evident evidence-handling log. The audit trail can be produced to the instructing party's legal advisors and exhibited where matters covered by the report come before a court or tribunal. Senior analyst expert-witness duty is available on Covert Tier and on Enhanced Tier by request.

No — never on Standard or Enhanced Tier. The subject is not approached, contacted, or notified. Discreet peripheral-source enquiries on Enhanced Tier are conducted with former business associates or counterparties only, and never with the subject. On Covert Tier, any subject contact is bound by the prior written scope and independent legal sign-off.

No activity within the statutory regime of the Regulation of Investigatory Powers Act 2000 or the Investigatory Powers Act 2016 is conducted on Standard or Enhanced Tier — no interception of communications, no covert human intelligence source as defined by those statutes, no use of equipment interference, and no directed surveillance for a continuous period sufficient to engage Part II RIPA. Covert Tier instructions where these boundaries are engaged are conducted only with prior independent legal sign-off and through accredited operators under documented authorisation.

Standard and Enhanced Tier are billed at fixed fee (£600 and £1,200 respectively). Fees are payable in full on instruction. We accept BACS, CHAPS, and corporate card. Covert Tier is billed against a written scope, typically with an initial retainer and time-recorded thereafter.

Yes. We routinely accept instruction from law firms, family offices, accountancy practices, and corporate counsel. Where the instructing party is a regulated professional acting on behalf of an underlying client, we can structure the engagement to support legal professional privilege over the work product.

If Standard Tier surfaces material findings or unresolved questions that warrant deeper enquiry, we will recommend uplift to Enhanced — and the Standard fee is credited in full against the Enhanced fee. The same uplift principle applies between Enhanced and Covert.

— Every dossier we deliver is bound by client confidentiality. The Enhanced Tier sample shown above is a fictional composite. Real engagements are never circulated. —

Cyber Ops Activity · 24h
Privacy & threat analysis throughput
LIVE
Modules Active
9
OF 9 LIVE
8,412
▲ 12.4%
Scans · This Month
247
▲ 18
Threats Detected · 30d
CYBER OPS CENTER · PRIVACY & THREAT INTELLIGENCE

Cyber Operations.

Full-spectrum privacy analysis, breach intelligence, network leak detection, and threat scanning. Nine elite modules unified in one operations center.

MODULE 01 · EXPOSURE INTELLIGENCE

BREACH EXPOSURE SCANNER

Detect known public breach exposures for email addresses, usernames, and phone numbers. Analyse severity, data types, historical timeline, and generate actionable security recommendations.

MODULE 02 · ENTITY ANALYSIS

EMAIL FOOTPRINT INTELLIGENCE

Map linked platform accounts, discover associated usernames, detect profile photos, correlate digital entities across 40+ networks, and visualise the full identity relationship graph.

MODULE 03 · SECURE COMMUNICATIONS

DISPOSABLE INBOX GENERATOR

Instant self-destructing email addresses with configurable expiry timers, anonymous signup protection, live message receiving, and operational-grade inbox isolation.

EXPIRY TIMER:
MODULE 04 · DIGITAL HYGIENE

FOOTPRINT CLEANUP CENTER

Locate account deletion portals across major platforms, categorise by risk level, track cleanup progress, generate a privacy improvement score, and eliminate your digital exposure systematically.

MODULE 05 · BIOMETRIC PRIVACY

AI FACE EXPOSURE ANALYZER

Upload an image to analyse AI dataset exposure risk, scraping vulnerability vectors, EXIF metadata leakage, reverse image indexing probability, and facial recognition exposure potential.

DRAG & DROP OR CLICK TO UPLOAD IMAGE
JPG · PNG · WEBP · Max 10MB
MODULE 06 · NETWORK SECURITY

VPN & NETWORK LEAK DETECTOR

Real-time DNS leak detection, WebRTC IP exposure analysis, IPv6 leak test, timezone consistency checks, browser UA fingerprinting, and comprehensive VPN integrity scoring.

MODULE 07 · TRACKING ANALYSIS

BROWSER FINGERPRINT ENGINE

Collect and score browser uniqueness vectors including canvas fingerprinting, WebGL renderer, hardware entropy, timezone, language, and full tracking resistance evaluation against the global browser population.

MODULE 08 · DEVICE SECURITY

SYSTEM SECURITY ANALYZER

Browser and device security posture scoring, telemetry exposure detection, privacy risk profiling, permission auditing, and AI-generated operational security recommendations.

MODULE 09 · THREAT ANALYSIS

MULTI-ENGINE THREAT SCANNER

URL and file threat analysis dispatched across 12 detection engines. Phishing scoring, malware probability, hash analysis, and AI-generated attack vector explanations in a real-time SOC interface.

OR DROP A FILE FOR MALWARE ANALYSIS

BESPOKE ENGAGEMENT

Every Elite engagement begins with a confidential conversation. Choose your preferred channel. All communications are treated in strictest confidence under NDA.

< 1 BUSINESS DAY
Initial response
NDA-PROTECTED
Mutual NDA on instruction
UK GDPR · ICO
Lawful basis: Art. 6(1)(f)
PRINCIPAL · DIRECT
No call-centre routing

◆ REQUEST A BESPOKE BRIEFING

Complete the secure form below. Your principal analyst will respond within one business day.

CONFIDENTIAL · NDA-PROTECTED · GDPR-COMPLIANT
◈ TOP SECRET // SENSITIVE COMPARTMENTED INFORMATION // BLACKOUT CLEARANCE REQUIRED SESSION ENCRYPTED · AES-256-GCM · ZERO-KNOWLEDGE
BLACKOUT COMMAND CENTRE
GLOBAL INTELLIGENCE OPERATIONS // LIVE
AIRCRAFT
VESSELS98,240
CYBER EVENTS
ACTIVE THREATS8
EONET EVENTS
UTC--:--:--
◈ LIVE INTELLIGENCE ALERTS
◈ ENVIRONMENTAL EVENTS
◈ THREAT MATRIX
CONFLICT ZONES
CRITICAL
CYBER THREATS
HIGH
MARITIME RISK
HIGH
FINANCIAL SYS
MODERATE
OSINT SIGNAL
ELEVATED
DEEPFAKE OPS
CRITICAL
◈ LIVE AIRCRAFT — OPENSKY
SOURCE: OPENSKY-NETWORK.ORG · ADS-B
◈ LIVE INTEL
◈ LIVE
Listening…
VOICE CMD
VOICE COMMANDS:
"Show Russia intel"
"Open conflict zones"
"Activate satellite layer"
"Show Ukraine"
"Open cyber threats"
"Tell me about China"
"Close" / "Clear layers"
"Command centre"
"Screenshot"