Intelligence from
the margins.
Periphery is the OSINT platform that lets structure emerge from chaos. No predefined ontologies. No forward-deployed engineers. Just your data, crystallizing into intelligence.
The intelligence gap
Current platforms impose structure before observation. Periphery inverts the paradigm.
Schema is a prison
Traditional platforms force you to define your ontology before you see your data. Periphery lets structure emerge from observation. Your schema is a continuous output, not an input.
Palantir is a luxury
Forward-deployed engineers cost $500K/year per deployment. Periphery gives mid-market firms the same analytical power without the Palantir tax.
OSINT is drowning in noise
150+ feeds, thousands of documents per day, entities that change names across languages. Periphery’s five-space embedding architecture separates signal from noise automatically.
Four layers of emergent intelligence
Each layer observes, refines, and validates. Structure crystallizes from raw observation.
Ingest Mesh
RSS, APIs, and custom sources flow through a politeness-aware collection layer.
SOLIDCrystallizer
Five-space HDBSCAN clustering across semantic, entity, relational, temporal, and geospatial embeddings.
DEFINEDContinuous Critic
Adversarial coherence-scoring network that validates every emergent structure.
EMERGINGQuery Interface
Natural language analytical queries synthesized by Claude with full confidence rendering.
HAZE → WHISPERTwo paradigms
Imposed Structure
- Rigid schema defined before first observation
- Manual ontology building by expensive engineers
- Analyst bottleneck at every integration point
- Intelligence shaped to fit the model
Emergent Structure
- Continuous observation shapes the schema
- Crystallizing ontology from raw data
- Adversarial validation at every layer
- The model shaped by intelligence
Where Periphery operates
Four verticals. One platform. Intelligence that adapts to the domain.
Supply Chain Intelligence
Sanctions screening, chokepoint monitoring, entity resolution across jurisdictions.
Financial Compliance
AML pattern detection, beneficial ownership networks, regulatory change tracking.
Geopolitical Analysis
Conflict monitoring, proxy force tracking, diplomatic signal detection.
Cyber Threat Intelligence
APT campaign correlation, CVE enrichment, infrastructure overlap detection.