Modern Cold Case Investigation Platform
A web-based tool for analyzing cold cases with AI-powered insights, evidence tracking, timeline reconstruction, and hypothesis analysis using formal investigative methodologies.
- Light & Dark Themes - Easy on the eyes day or night
- Accessibility - Adjustable font sizes, high contrast
- Responsive Design - Works on desktop, tablet, and mobile
- Case Management - Create and switch between multiple cases
- Evidence Tracking - Organize and categorize evidence items
- Timeline Builder - Reconstruct events chronologically
- Network Analysis - Visualize relationships between entities
- Hypothesis Testing - ACH (Analysis of Competing Hypotheses) matrix
- Source Assessment - Admiralty/NATO reliability scoring
- NamUs - Missing & unidentified persons database
- FBI ViCAP - Violent crime cases
- CSV/JSON - Bulk import from spreadsheets
- NCMEC - Missing children cases
- Doe Network - Cold case database
- Session-based case isolation
- Local-first data storage
- No case data leaves your server
DeepTrace is designed as a web application. Deploy it to:
See GITHUB_DEPLOYMENT.md for detailed instructions.
# Clone the repository
git clone https://github.com/yourusername/DeepTrace.git
cd DeepTrace
# Create virtual environment
python -m venv .venv
source .venv/bin/activate # On Windows: .venv\Scripts\activate
# Install dependencies
pip install -r requirements-web.txt
# Run the server
python wsgi.pyVisit http://localhost:8080 in your browser!
- Open DeepTrace in your browser
- Click "Create Case" on the selector page
- Enter a case name (e.g.,
jane-doe-1995) - Add optional description
- Start investigating!
Click the "🔄 Switch Case" button in the sidebar to access the case selector.
From the case selector, click "📥 Import from FBI, NamUs, etc." to access import tools.
- Backend: Flask (Python)
- Database: SQLite (with PostgreSQL support)
- Frontend: Modern HTML/CSS/JS with HTMX
- Visualization: vis.js for network graphs
DeepTrace/
├── src/deeptrace/
│ ├── dashboard/ # Web interface
│ │ ├── routes/ # Flask routes
│ │ ├── static/ # CSS, JS, assets
│ │ └── templates/ # HTML templates
│ ├── db.py # Database layer
│ └── commands/ # CLI commands
├── wsgi.py # Web server entry point
├── requirements-web.txt # Production dependencies
└── docs/ # Documentation
DeepTrace is grounded in formal investigative frameworks:
- ACH (Richards Heuer) - Hypothesis testing
- BEA (Brent Turvey) - Behavioral evidence analysis
- Admiralty System - Source reliability assessment
- VIVA Model - Victimology assessment
- OSINT Layers (Michael Bazzell) - Information gathering
FLASK_ENV=production
SECRET_KEY=your-secret-key
DATABASE_URL=sqlite:///deeptrace.dbDeepTrace includes configuration for:
- Vercel (
vercel.json) - Railway (
railway.json) - Heroku (
Procfile)
Contributions are welcome! Please:
- Fork the repository
- Create a feature branch
- Make your changes
- Submit a pull request
MIT License - see LICENSE for details
Built with methodologies from:
- Richards Heuer (CIA, ACH methodology)
- Brent Turvey (Forensic Analysis)
- Michael Bazzell (OSINT Techniques)
- National Missing Persons databases
- Issues: GitHub Issues
- Discussions: GitHub Discussions
Note: DeepTrace is designed for ethical cold case investigation, journalism, and research. Always respect privacy laws and regulations.