Medium 7 mule wallets linked by SIM‑swap chatter
High Banking OTP phishing kit reuse across 14 domains
Info Template v3 detected — early indicators only
Medium Deepfake voice scam spike across EU call centers
High 22 OTP‑phishing domains seeded in last 12 hours
Medium 7 mule clusters linked by SIM‑swap forum chatter
High Banking OTP phishing burst — 14 domains in 24h
Medium 7 mule clusters mapped via SIM‑swap chatter
Info 3,100+ wallets blacklisted across 5 chains
High Deepfake voice ring probing call‑centers
Medium Phishing kit v4 template reuse detected
High Credential harvester infra overlap with last quarter
Info 12 domains sinkholed — takedown in progress
Medium 7 mule wallets linked by SIM‑swap chatter
High Banking OTP phishing kit reuse across 14 domains
Info Template v3 detected — early indicators only
FDIW.org

Fraud Detection & Intelligence Wing

We deliver intelligence before crime for governments, law‑enforcement, and financial institutions—by crawling the open & dark web, fusing public fraud databases, and using neural detection to flag emerging scam networks.

What agencies get from day one

Early‑warning
Weekly threat briefings, daily alerts

Actionable advisories on emerging scam kits, clone sites, mule clusters and creative reuse—before mass victimization.

Evidence
Prosecution‑ready dossiers

Link graphs, artifacts, hashes, and timeline—exportable with chain‑of‑custody notes for rapid legal action.

sha256: 91ac…d10 md5: 5f4d…a9e CLEARED
Sovereign
On‑prem & sovereign cloud

Run FDIW inside national boundaries with full RBAC, MFA, audit logging, and private peering to agency systems.

RBAC • MFA • Audit
Support
24×7 duty desk

Secure hotline + escalation playbooks for takedowns and coordinated actions with your cyber units.

FDIW model

A four‑stage intelligence stack that turns raw internet noise into operational leads.

OSINT & Crawlers — surface/dark web, forums, social/chat, ads.
Database fusion — public scam lists and official advisories.
Neural detection — classifiers, graph linkers, anomaly detectors.
Risk intelligence — 0–100 scores, alerts, dossiers.
CLEARED FOR ACTION
92

Collection → Fusion → Detection → Intelligence.

Signals detected

We map clone sites, throwaway domains, mule wallets, forum chatter, recycled kits, and coordinated ad bursts across regions.

  • Surface + dark web discovery of new domains & stores
  • Chat/forum monitoring for fraud “kits”
  • WHOIS, hosting, SSL, content‑fingerprint deltas
  • Crypto wallet clustering & cash‑out heuristics
  • Ad/campaign pattern spikes and geo pivots

Each pulse is a cluster under investigation.

How the AI works

Ingest — Pages, posts, domains, wallets, numbers, creatives.
Normalize — Clean text, fingerprint HTML, parse WHOIS/SSL/ASN.
Enrich — Join with fraud lists & advisories; multilingual NER.
Detect — Transformers, graph linkers, anomaly detectors.
Score — Risk Score (0–100) with explainable factors.
Report — Alerts, dossiers, dashboards, API responses.
entity: alpha-shop.co
signals:
  - template_similarity: 0.99 (template-v3)
  - wallet_cluster: 14 previous exits
  - domain_age_days: 6
score: 92
explain:
  - "High template match and repeated cash-out behavior"

Graph linkage reveals shared infrastructure across entities.

Technology Stack — Open, Auditable, Trusted

FDIW runs on a fully open, permissive stack (MIT/BSD/Apache‑style). It’s transparent, license‑safe, and deployable on‑premise or sovereign cloud.

1) Collection

Large‑scale crawling & headless automation. Real‑time streams for chatter, logs, feeds; endpoint telemetry capture.

2) Storage

S3‑compatible data lake; relational stores for cases; open graph engine for networks; federated search.

3) Enrichment

Multilingual entity recognition, geolocation & network attribution, high‑volume data cleaning.

Pay to ALPHA SHOP at alpha‑shop.co

4) Detection

Time‑series anomalies, graph analytics across wallet/domain/phone, deep models for clone templates & behavior.

5) Visualization

Geospatial heatmaps and network graphs; mission‑specific dashboards for units and regions.

6) API & Integration

High‑throughput scoring APIs, secure inter‑agency channels, RBAC & MFA.

7) Deployment & Ops

Orchestrated containers, GitOps CI/CD, observability & audit logging; sovereign/on‑prem options.

Dashboards & API

Operations dashboard

Scoring API path

Client FDIW
200 OK   429 Backoff   5xx Retry
POST /v1/score  →  92 (template-v3)  •  latency: 118ms
Program
  • Early‑warning alerts to law‑enforcement inboxes
  • Bulk verification: upload lists, get scores back
  • Case dossiers: ready‑to‑act intelligence packets
  • On‑prem or sovereign cloud options
API
POST https://api.fdiw.org/v1/score { "entity": "alpha-shop.co", "type": "domain" } → { "risk": 92, "family": "template-v3", "notes": ["wallet-cluster:14", "asn:high-risk"], "explain": "High template match and repeated cash‑out behavior" }
>

Case study: pre‑crime shutdown

  • Registration

    13 domains spin up with shared SSL/ASN.

  • Detection

    FDIW model flags cluster in 48h.

  • Dossier

    Evidence pack generated with link graphs and risk 92.

  • Seizure

    Authorities neutralize infrastructure before mass run.

Risk 92

Clustered scam domains flagged and neutralised before mass run.

Security & Compliance

  • OSINT‑first collection; lawful‑access for any closed sources
  • Role‑based access with MFA and audit trails
  • Sovereign cloud & on‑prem deployment options
  • Evidence bundles maintain chain‑of‑custody

Who we serve

State & central cyber police
Banks & payment gateways
Telecoms & wallets
Regulators & FIUs

FAQ

Are you a government agency?

No. FDIW is a private intelligence organization that partners with governments and institutions. We provide intelligence leads and risk scoring; enforcement decisions remain with authorities.

Where does your data come from?

We combine our own OSINT crawlers with publicly available fraud/scam databases and client‑authorized sources. When deeper integrations are required, we work under formal agreements.

Can you run on‑prem?

Yes. Sovereign cloud or on‑prem deployments are available for high‑sensitivity environments.

How do we start?

Begin with an OSINT pilot: we monitor agreed scopes and deliver weekly early‑warning reports. From there, expand to dashboards, API access, and joint investigations.

Request a secure briefing

We can tailor an OSINT pilot for your state, ministry, or institution.

Message ready in your email app ✅ Please fill all fields.

Or email: contact@fdiw.org