Intelligence from
the margins.

Periphery is the OSINT platform that lets structure emerge from chaos. No predefined ontologies. No forward-deployed engineers. Just your data, crystallizing into intelligence.

0documents ingested·0entities resolved·0emerging clusters

The intelligence gap

Current platforms impose structure before observation. Periphery inverts the paradigm.

Schema is a prison

Traditional platforms force you to define your ontology before you see your data. Periphery lets structure emerge from observation. Your schema is a continuous output, not an input.

Palantir is a luxury

Forward-deployed engineers cost $500K/year per deployment. Periphery gives mid-market firms the same analytical power without the Palantir tax.

OSINT is drowning in noise

150+ feeds, thousands of documents per day, entities that change names across languages. Periphery’s five-space embedding architecture separates signal from noise automatically.

Four layers of emergent intelligence

Each layer observes, refines, and validates. Structure crystallizes from raw observation.

01

Ingest Mesh

RSS, APIs, and custom sources flow through a politeness-aware collection layer.

SOLID
02

Crystallizer

Five-space HDBSCAN clustering across semantic, entity, relational, temporal, and geospatial embeddings.

DEFINED
03

Continuous Critic

Adversarial coherence-scoring network that validates every emergent structure.

EMERGING
04

Query Interface

Natural language analytical queries synthesized by Claude with full confidence rendering.

HAZE → WHISPER

Two paradigms

Imposed Structure

  • Rigid schema defined before first observation
  • Manual ontology building by expensive engineers
  • Analyst bottleneck at every integration point
  • Intelligence shaped to fit the model

Emergent Structure

  • Continuous observation shapes the schema
  • Crystallizing ontology from raw data
  • Adversarial validation at every layer
  • The model shaped by intelligence

Where Periphery operates

Four verticals. One platform. Intelligence that adapts to the domain.

Supply Chain Intelligence

Sanctions screening, chokepoint monitoring, entity resolution across jurisdictions.

Financial Compliance

AML pattern detection, beneficial ownership networks, regulatory change tracking.

Geopolitical Analysis

Conflict monitoring, proxy force tracking, diplomatic signal detection.

Cyber Threat Intelligence

APT campaign correlation, CVE enrichment, infrastructure overlap detection.