Open Source Intelligence Analysis Platform

LedgerEye

See every connection. Trust every query. Prove everything.

Intelligence tools shouldn't be black boxes.

Analysts make critical decisions using opaque platforms where queries go unrecorded, data provenance is untraceable, and there is no chain of custody for evidence. When a financial crime investigation reaches the courtroom, "trust me" is not a defensible answer. LedgerEye was built to bring radical transparency and cryptographic accountability to every step of the intelligence analysis process.

Four steps to verifiable intelligence

01

Import

Ingest data from OpenSanctions, ICIJ, or your own sources

02

Analyze

Explore relationship graphs, risk scores, and patterns

03

Approve

Every query requires multi-signature approval via IMMUTRACE Protocol

04

Prove

Generate cryptographic evidence packages for legal proceedings

Built for analysts who need proof, not promises

G

Relationship Graph

D3.js force-directed visualization maps complex entity relationships in real time. Zoom, filter, and explore interconnected networks at any scale.

R

Risk Scoring

Automated 0-100 risk assessment powered by configurable rule engines. Transparent scoring with full audit trail on every calculation.

NL

Natural Language Queries

Ask questions in plain English or Italian. AI translates your intent into structured queries and returns actionable intelligence.

AX

IMMUTRACE Protocol

Every query is immutably recorded on blockchain. Multi-signature approval ensures no single actor can access sensitive data unchecked.

EP

Evidence Packages

Court-ready proof with SHA-256 verification. Generate tamper-evident evidence bundles accepted by regulatory bodies worldwide.

RA

Role-Based Access

Five distinct roles — Admin, Analyst, Approver, Auditor, Viewer — each with granular permissions enforced at every API endpoint.

Accountability is not optional

No query runs without approval.
No approval goes unrecorded.
No record can be tampered with.

The IMMUTRACE Protocol is the cryptographic backbone of LedgerEye. Every analytical query, every data access, and every export is submitted as a proposal that requires multi-signature approval before execution. All decisions are recorded on an immutable ledger, creating an unbreakable chain of custody from question to courtroom evidence.

Who uses LedgerEye

Anti-Money Laundering

Financial institutions tracking suspicious relationships across jurisdictions. Automated risk scoring flags high-risk entities while evidence packages satisfy regulatory requirements.

Investigative Journalism

Reporters following money trails across corporate structures and offshore jurisdictions. Relationship graphs reveal hidden connections between entities, people, and assets.

Regulatory Compliance

Compliance officers generating auditable evidence for regulators. Every query is logged, every approval is recorded, and every report is cryptographically verified.

Built in the open. Verified by everyone.

LedgerEye is fully open source under the MIT license. Inspect the code, audit the logic, deploy on your own infrastructure. No vendor lock-in, no hidden algorithms, no trust required.