Journalism

Vet your sources
before you publish.

32 OSINT workers verify identities, surface conflicts of interest, and audit the paper trail behind every quote. Built for investigative desks that have to defend their sourcing under deposition.

What this fixes.

PAIN 1
A bad source can sink a story — or the reporter.
Rolling Stone vs. UVA cost $1.65M and ended an editor's career. Source vetting is the cheapest insurance there is.
PAIN 2
Cross-platform identity correlation is tedious.
Is the @handle on Telegram the same person as the LinkedIn profile and the Twitter alt? An hour of manual work per source — and easy to miss.
PAIN 3
Editors and lawyers want to see the work, not just the conclusion.
Pre-publication review needs auditable sourcing trails. Tracelight gives you the citation chain so your editor can verify in 5 minutes.
What gets checked

8+ data sources running in parallel.

Cross-platform username resolution (Sherlock-style)
Sanctions + politically-exposed-persons lists
Court records + litigation history
Corporate registry lookups for COI surfacing
Adverse media + prior interview record
Dark-web exposure (signal of identity theft vs intentional persona)
Domain + email infrastructure pivots
Wayback Machine + archived social-media history
What you get

The report that lands on your desk.

  1. 1
    Source profile with cross-platform identity confidence score
  2. 2
    Conflicts-of-interest section pulling corporate registries + sanctions
  3. 3
    Timeline of public statements with citation links
  4. 4
    Evidence locker preserving original sources at access time
  5. 5
    Read-only share links for editors and counsel

Common questions.

Does using this protect me legally?+

It supports your defense by documenting the verification you performed before publication, but it doesn't replace legal review. Editors who can show a documented vetting process before publication are in dramatically better shape under defamation claims.

Can I share findings with my editor without giving them dashboard access?+

Yes — every case can be shared via a signed read-only link with token expiry and download tracking. The editor never needs an account.

What about source confidentiality?+

Investigative subjects are stored encrypted at rest in your workspace and visible only to people you invite. We never train models on your data and don't sell aggregated findings. The same RLS that protects competitor intel protects source identities.

Try a sample source vet — free for 7 days.

No credit card. Cancel anytime. Same product, same OSINT workers, same audit trail — just scoped to your investigation.

Other use cases