It's always interesting to stumble upon a bubble you never heard of.
This is super interesting. I will probably (hopefully?) never need to use it, but interesting nonetheless. It also makes sense to have this type of application airgapped. Journalists need to have near-perfect OPSEC depending on what they are working on.
Beautiful work and it's always nice to see new projects in these spaces! I'm the creator of OSINTBuddy which is a somewhat similar project if you squint haha. We've just recently finished porting our web app to an electron binary (unreleased) for people who perform sensitive investigations (aka we have encryption at rest via Turso database) and collaboration features will be done via WebRTC + a signalling server.
I'm loving the approach you took to the UI! I had some similar ideas in mind and plan to build narrative reconstruction and timeline view tools too so it's really nice to see how others have done so! I'll definitely be following your work and I shared your project in the OSINTBuddy discord to hopefully get some more eyes on it :)
Great work, I hope you keep at it :)
This looks interesting, and honestly makes me want to fire up The Roottrees are Dead and see if I can use this to solve the second act.
The idea is good. I do think that is going to be the future for high volume data leaks like the Snowden or Epstein files.
I do think though that this approach will become annoying quick:
https://github.com/mantisfury/ArkhamMirror/blob/main/scripts...
That logo is like concentric rings of power around Galadriel's seer-pool, looking at... Hogwarts?
In case it wasn't clear, the ACH update is on the reflex-dev branch -
Interesting tool, do you have some domain knowledge as an analyst or something similar? I've always been curious what research tools analysts are using outside of like, Google.
This is very compelling, very nice work!
I really would like to know how good this would be for a corporate Internal Audit workflow/professional.
A video demo would be useful. I can't really tell how much the application is doing from the screenshots. Is it a tool with some smart guidance, or is it doing deep magic?
This looks very interesting. I already have Python and Docker set up the way I want. Will the installer mess with them?
I know it is supposed to be airgapped but can’t this be dockerized ?
I'm wondering if the ACH Methodology could be used as a general purpose Chain-of-Thought variant.
Is this "investigation platform" any different from legal "e-discovery" software products? It's a great accomplishment either way, but I am posting so other people know that lawyers use this stuff all the time and there are many (paid) off the shelf options.
Doesn't ACH also constrain hypothesis generation in certain ways?
I got tired of expensive SaaS tools that want my sensitive documents in their cloud. I built ArkhamMirror to do forensic document analysis 100% locally, free and open source.
What makes this different:
Air-gapped: Zero cloud dependencies. Uses local LLMs via LM Studio (Qwen, etc.)
ACH Methodology: Implements the CIA's "Analysis of Competing Hypotheses" technique which forces you to look for evidence that disproves your theories instead of confirming them
Corpus Integration: Import evidence directly from your documents with source links
Sensitivity Analysis: Shows which evidence is critical, so if it's wrong, would your conclusion change?
The ACH feature just dropped with an 8-step guided workflow, AI assistance at every stage, and PDF/Markdown/JSON export with AI disclosure flags. It's better than what any given 3-lettered agency uses.
Tech stack: Python/Reflex (React frontend), PostgreSQL, Qdrant (vectors), Redis (job queue), PaddleOCR, Spacy NER, BGE-M3 embeddings.
All MIT licensed. Happy to answer questions about the methodology or implementation! Intelligence for anyone.
Links: Repo https://github.com/mantisfury/ArkhamMirror
ACH guide with screenshots at https://github.com/mantisfury/ArkhamMirror/blob/reflex-dev/d...