Skip to main content
Version: 1.0.0

Forensics & Detection

The Forensics section is your investigation hub — it captures every call, SMS, and email to your PhantomIDs, visualizes relationships in an interactive network graph, and lets you generate forensic reports.

Forensics Overview

PhantomID Detail & Timeline

Click any PhantomID in the forensics table to open a detail panel showing the full identity profile and activity timeline.

PhantomID Forensic Detail

The detail panel shows:

  • Personal Information — Email, phone, date of birth, and associated metadata
  • Address — Full address from the PhantomID profile
  • Organization — Affiliation assignment
  • Activity Overview — Summary, emails, and a chronological timeline of all contacts

Forensic Timeline

The Timeline tab shows a chronological feed of every interaction with this PhantomID — calls, SMS, and emails with timestamps and source identifiers.

Forensic Timeline

This is your primary investigation view for a single PhantomID — it answers "who contacted this identity, when, and how?"

Recently Dirty

The Recently Dirty tab tracks PhantomIDs that have transitioned from Clean to Dirty within a configurable time range. It includes a trend chart showing compromises over time and a details table with "Days Until Compromised" — how long after deployment each PhantomID was first contacted.

Recently Dirty PhantomIDs

Call Logs

Every incoming call to a PhantomID phone number is captured and logged.

Call Log Fields

FieldDescription
FromThe caller's phone number
ToThe PhantomID phone number that was called
PhantomIDThe identity associated with the called number
DirectionInbound or outbound
StatusCall status (completed, no-answer, busy, failed)
DurationCall length in seconds
RecordingLink to call recording (if available)
TranscriptAI-generated transcript (if AI voice agent answered)
PriceTelephony cost for the call
AffiliationBusiness unit the PhantomID belongs to
Date/TimeWhen the call occurred

Filtering Call Logs

Filter call logs by:

  • Date range — Focus on a specific time period
  • Affiliation — Show calls for a specific business unit
  • PhantomID — Show calls to a specific identity
  • Phone number — Search by caller or called number
  • Status — Filter by completed, missed, etc.

Call Recordings and Transcripts

When a PhantomID is configured with an AI voice agent (via ElevenLabs), calls are:

  1. Answered by the AI — The voice agent engages the caller naturally
  2. Recorded — The full conversation is captured
  3. Transcribed — An AI-generated transcript is produced

This provides deep intelligence about who is calling and their intent — beyond just knowing that a call happened.

SMS Logs

SMS Logs

SMS messages sent to PhantomID phone numbers are captured with full content.

SMS Log Fields

FieldDescription
FromThe sender's phone number
ToThe PhantomID number that received the SMS
PhantomIDThe identity associated with the receiving number
BodyFull text content of the message
MediaAny attached media (images, files)
SegmentsNumber of SMS segments (for long messages)
PriceSMS cost
Date/TimeWhen the message was received

SMS Sources

SMS messages may arrive through different channels depending on your configuration:

  • Twilio — Standard SMS delivery via Twilio numbers
  • IQSIM — SMS via SIM-based gateway (if configured)
  • BYOT — SMS via your own Twilio account (if configured)

All SMS messages are consolidated into a single view regardless of the delivery channel.

Email Logs

Email Logs

Emails sent to PhantomID email addresses are captured and stored.

Email Log Fields

FieldDescription
FromSender's email address
ToThe PhantomID email address
SubjectEmail subject line
BodyFull email content (text and HTML)
AttachmentsList of attached files
HeadersEmail headers for forensic analysis
SuspiciousFlag indicating potentially suspicious content
Date/TimeWhen the email was received

Email capture requires a monitored domain configured in your tenant's domain settings.

Network Graph

The network graph is an interactive visualization that maps relationships between PhantomIDs, threat actors, and communication events.

Understanding the Graph

The graph uses a force-directed layout built with D3.js:

Nodes represent entities:

  • PhantomIDs — Your planted synthetic identities
  • Threat actors — Detected suspicious entities
  • Phone numbers — Caller phone numbers
  • Email addresses — Sender email addresses

Edges represent communications:

  • Calls — A phone call between two numbers
  • SMS — A text message between two numbers
  • Emails — An email between two addresses

What Patterns to Look For

The network graph helps you identify:

  • Hub patterns — A single caller contacting many PhantomIDs (indicates systematic data access)
  • Cluster patterns — Groups of callers targeting the same set of PhantomIDs (indicates coordinated activity)
  • Cross-channel patterns — The same entity contacting PhantomIDs via multiple channels (call + SMS + email)
  • Temporal patterns — Bursts of activity within a short timeframe

Interacting with the Graph

  • Zoom — Scroll to zoom in/out
  • Pan — Click and drag the background to pan
  • Select nodes — Click a node to highlight its connections
  • Filter — Use controls to show/hide specific node types or communication channels
  • Timeframe — Adjust the time range to focus the visualization
tip

Start with the broadest view to identify major clusters, then zoom into specific threat actors or PhantomIDs for detailed investigation.

Generating Reports

Detektix can generate forensic HTML reports that compile investigation data into a shareable format.

Report Contents

A generated report typically includes:

  • Executive summary — Overview of detected activity
  • PhantomID activity — Which identities were contacted and when
  • Communication logs — Detailed call, SMS, and email records
  • Threat actor profiles — Identified threat actors and their activity
  • Timeline — Chronological view of all events
  • Charts — Call volume over time, activity distribution

Creating a Report

  1. Navigate to Forensics
  2. Apply your desired filters (date range, affiliation, specific PhantomIDs)
  3. Click Generate Report
  4. The report is generated as an HTML file that can be:
    • Viewed in a browser
    • Saved as PDF
    • Shared with stakeholders

Data Export

For custom analysis beyond the built-in reports:

  • Snowflake / BigQuery export — Push forensic data to your data warehouse for custom SQL queries and BI dashboards
  • Webhook data — Configure webhooks to receive real-time forensic events in your own systems