Converting Mess





Case Documentation




Mass Databases
Into clarity

in 1 click
On a platform you can actually use


Each case is automatically cross-correlated with your Mass Databases
I need help with my investigation
Drag'n'drop all you Case documentation and mass databases
Process
-
Drag'n'drop case files into Inteliate, using a local PC.
-
The AI cross-correlates the case with DBs you drag'n'dropped
-
Ask questions or automate a report with 1 click.
-
Get Methodology Advice and Case insights

All on a local computer with no internet
Frequently Asked Questions
No. Inteliate platforms are designed to operate fully offline and can be deployed in air-gapped environments with no external connectivity.
No. The platform runs entirely within your environment. InteliATE has no standing access to any client data, and the default deployment has no outbound telemetry channel. Even during support or setup, we cannot see your investigative content.
Yes. Air-gapped deployment is a primary use case. All AI models, indexes, and case material remain on your infrastructure. Updates and model refreshes are delivered on signed offline media and applied by your own administrators. No internet connection is required at any point.
Data at rest is encrypted using your own managed keys. Data in transit between platform components uses mutually authenticated TLS. The key management model integrates with your existing key management service, or the platform can provide its own internal key manager with standard rotation and escrow options.
Access is governed at two levels. Platform-level roles determine what a user can do system-wide. Case-level roles determine what a user can see and do within a specific investigation. A user authorised to use the platform is not automatically authorised to access every case—case access is explicit, granted by a case owner, and recorded in the audit log.
Yes. Every meaningful action is captured in a tamper-evident audit log: authentications, case access, ingestions, searches, report generations, exports, and permission changes. Entries identify the actor, the action, the case, the target objects, and the timestamp. Logs can be forwarded to your SIEM for long-term retention.
The platform can be configured to meet GDPR, CJIS, ISO 27001, and other regulatory requirements. Secure coding practices, encryption at rest and in transit, role-based access control, and immutable audit logging are built into the foundation—not bolted on.
Almost anything: PDFs, Word documents, Excel spreadsheets, images, audio, video, email archives, forensic logs, database extracts, social media exports, and more. Structured or unstructured—no reformatting needed. The platform normalises, extracts text (including OCR), and indexes everything automatically.
Operators ask questions in plain language—such as "Who are the most frequently mentioned people in this case?" or "Summarise the email thread between Doyle and Byrne in March"—and receive evidence-cited answers. Every claim links back to the source exhibit, page, or record so it can be verified in one click.
Keyword search only finds exact words. Semantic search finds content by meaning—so a query for "unexplained cash deposits" also surfaces items describing "unattributed lodgements" or "anomalous account credits." This dramatically reduces the chance of missing critical evidence buried in unfamiliar terminology.
The platform automatically identifies people, organisations, locations, accounts, vehicles, phone numbers, and other entities across all ingested material. It then cross-correlates them so the same entity appearing in different items is recognised, linked, and displayed on a case-wide entity graph with evidence pointers.
Yes. Authorised operators can run controlled cross-correlation against registered reference holdings—historical intelligence repositories, financial datasets, sanctions lists, or any bulk dataset your agency maintains. Matches are ranked and linked back to both the case and the reference record.
The platform auto-generates source-cited reports including intelligence summaries, briefing notes, suspect breakdowns, timelines, and visual link diagrams. Reports export to Word and PDF. Every claim carries a citation back to the underlying evidence, and embedded charts refresh if the case is updated.
Yes. Concurrent multi-user access is fully supported with presence indicators, comments on exhibits and entities, and a complete audit trail. Investigators, analysts, and supervisors can collaborate in real time within the same case workspace.
We provide specifications based on your user count, model types, and expected data volume. You can supply your own hardware or opt for a pre-configured server delivered by us. Operators access the platform through a standard web browser—no client-side installation required.
The entire system is deployed locally on your secure hardware. Deployment options include plug-and-play server delivery, remote setup, or on-site installation by InteliATE engineers. There is no cloud component—you retain full control over all data and infrastructure.
For plug-and-play or remote installation, setup typically takes one to two days. On-site installation may take slightly longer depending on network access and security procedures. Once deployed, the system is operational immediately.
Every deployment includes training for investigators, analysts, and administrators covering system navigation, data ingestion, AI usage, and report generation. Optional advanced training is available for power users and system administrators.
In connected deployments, updates are delivered through your configured update channel and applied under administrator control. In air-gapped environments, updates arrive on signed offline media. No internet connection is ever required for updates.
Licensing is modular. You license the base platform and add AI modules as needed. Pricing can be structured per seat, per model, or by data volume—we tailor it to your use case and scale.
Begin with a scoping session: we assess your operational needs, configure the platform and models, and then deploy—plug-and-play, remote, or on-site.
Book your session at https://www.inteliate.com/contact
Language models for document review, risk scoring, and summarisation. Visual models for image and video analysis and ID verification. Audio models for transcription, sentiment analysis, and speaker identification. Structured data models for anomaly detection and predictive scoring. All run locally on your infrastructure.
Generic tools are cloud-based, trained on public internet data, and send your queries to external servers. InteliATE models are offline, trained on your own data, and produce explainable outputs with domain-specific logic. The result is better accuracy, fewer false positives, and zero data exposure.
Yes. We work with you to scope your investigative or operational needs, prepare the relevant data, and build tailored AI models. Examples include document classification, fraud detection, KYC screening, entity extraction, and threat assessment. All training happens offline on your premises.
Yes. The model is deployed on your systems with no external access and no licensing restrictions on use. InteliATE retains no rights to your data or your trained model.
Yes. We build models with explainability features such as SHAP, LIME, or rule-based overlays depending on the use case. Investigators can review how a conclusion was reached, what signals were used, and how confident the model was—essential for evidential and judicial proceedings.
InteliATE is a sovereign, on-premises AI investigation platform for intelligence, law enforcement, defence, and regulatory agencies. It unifies four integrated products—OSINT Hub, Tactical Investigation Manager, Backbone, and Forensic Triage Centre—so teams can collect, fuse, analyse, and report on sensitive case material entirely inside their own environment. No data ever leaves your boundary.
Intelligence investigators, police and law-enforcement units, border-control agencies, financial regulators, and any government or defence organisation that handles classified or sensitive investigations. The platform is designed so field-level personnel can be productive on day one, while power users retain full analytical depth.
Three things: it runs fully offline on your premises with zero external dependencies; it uses custom AI models trained specifically for your cases rather than generic cloud AI; and every analytical output is traceable to its source evidence through immutable citations. No other platform combines all three.
OSINT Hub—an API-agnostic OSINT workspace where you swap providers without replacing the platform. Tactical Investigation Manager—a rugged in-a-box AI fusion appliance for rapid, defensible case triage. Backbone—a strategic, mission-configured data fusion centre for national-scale intelligence. Forensic Triage Centre—automated offline triage of up to 1 TB of seized digital media per case. All four run on the same sovereign architecture and can be deployed individually or together.
Intelligence Methodology is a
Mindset