Iris

Hidden pattern intelligence

Signal-level detection of harmful patterns in digital conversations.

Iris is a deterministic signal-processing engine with confidence scoring. Built for institutions that need auditable answers, not generative guesses.

Get in touch
8
Patent families
43
Verticals
17
Source jurisdictions
1,000+
Reference authorities

Coercion, exploitation and fraud unfold over time. Iris detects the cumulative pattern.

The gap

Why current tools miss the pattern.

Conversation analytics, transaction monitoring and case review tools share one structural blind spot: they look at events one at a time. Harmful behaviour often appears only when exchanges are read as a pattern across messages, transactions, channels and time.

Iris detects cumulative patterns that single-event analytics cannot see.

The engine

A signal-level architecture for auditable detection.

Iris is deterministic, confidence-scored and not generative AI. We do not generate content. We do not classify people. We process signals and surface patterns that humans then act on.

01

Signal grammar.

Behavioural patterns are represented at signal level, so detection can operate across exchanges rather than isolated messages.

02

Scoring layer.

Each output carries calibrated confidence. The same input produces the same answer, so results are reproducible.

03

Evidence trail.

Every detection can be traced back to the source signals and the regulatory obligation it helps evidence.

The output

Six behavioural dimensions.

Every detection maps to one or more behavioural dimensions, creating a consistent language for patterns across financial services, safety, abuse and exploitation contexts.

01

Control intensity

Monitoring, permission-seeking, decision dominance, information gatekeeping.

02

Manipulation sophistication

Reality distortion, narrative construction, emotional weaponisation.

03

Exploitation severity

Financial drain, resource depletion, identity theft, data harvesting.

04

Escalation trajectory

Changepoint detection, cycling patterns, severity rate-of-change.

05

Network manipulation

Isolation, ally recruitment, support-network disruption.

06

Evasion sophistication

Coded language, channel-switching, evidence destruction.

Iris ASM

The authorities selection process.

Iris Authorities Selection Methodology is the criteria-based process by which Iris identifies, assesses and classifies every reference authority that could bear on a behavioural-signal detection layer.

Builds the universe.

Candidate authorities are identified per vertical, top-down from primary regulators with enforcement authority, then broadened by onward citation.

Classifies the authority.

Each authority is classified by the same deterministic rule: KEEP, HOLD or REJECT.

Records the criterion.

Every classification is recorded against a named criterion, making the output reproducible by a third party.

KEEP / HOLD / REJECT decision rule
Outcome Meaning Effect
KEEP Relevant to the behavioural-signal detection layer. Informs claim language, pilot scope, go-to-market framing or regulatory engagement.
HOLD Not currently active or out of scope for now. Carries an explicit revisit trigger; reviewed at the next ASM run.
REJECT Fails one of seven REJECT criteria. Rationalised against the named criterion; substitute authority noted where applicable.
17
Source jurisdictions
11
Deployment-scope jurisdictions
70+
Regulatory instruments
7
REJECT criteria

Regulation

Built to evidence named obligations.

Iris positions pattern detection against the regimes institutions already need to evidence, without disclosing implementation detail.

Regime What Iris evidences Anchor
FCA Consumer Duty Detection of vulnerability outcomes including the four FG21/1 drivers; auditable evidence of the firm acting in good faith. PS22/9, FG21/1
FCA financial crime Pattern detection across communications and transactions; APP-fraud safe-account narratives; investment scams. FCG, JMLSG, PSR APP rules
Online Safety Act Cumulative-pattern detection in user-to-user services; risk-assessment evidence at the platform level. OSA Part 3, Ofcom codes
Data protection Lawful-by-design architecture; controller-retained data; auditable purpose limitation. UK GDPR, DUA Act 2026
EU AI Act Determinism, traceability, post-market monitoring; evidence appropriate to the risk classification of the deployment. EU AI Act, Annex III
Modern slavery Pattern detection in recruitment, debt bondage, and document control. Modern Slavery Act 2015 s.54
Online safety equivalents US, EU, and Australia online-safety duties addressed under the same engine. KOSA (US), DSA (EU), eSafety (AU)

Coverage

All 43 verticals across two books.

The catalogue is public at typology level: V-number, vertical name and a short hook. It shows breadth without exposing protectable mechanisms.

Financial services book - 17 verticals

CodeVerticalTypology hook
V1Retail banking vulnerabilityBehavioural drift across products and time
V2Motor financeCoached affordability, ghost-broker referral, post-delivery uncontactability
V3BNPL and consumer lendingCross-provider density, rapid drawdown, resale-marketplace correlation
V4Mortgage and propertyEmail-thread takeover at conveyancing, late bank-detail change
V5Pension and wealthCold-contact breach, non-standard underlying, illiquid lock-in
V6Regulated adviceProvider-concentration in adviser book, induced churn
V7General insuranceStaged claim, exaggerated claim, ghost broker
V8Savings and investment vulnerabilityBehavioural drift in long-held positions, induced switching
V9APP fraudSafe-account / impersonation pattern across channels
V10Open banking and economic abuseCoercive consent reuse, account-aggregation surveillance
V11Crypto and DeFiPig-butchering, crypto investment build-and-extract
V12Cross-regulatory convergenceSingle actor pattern visible across regulator silos
V13Market manipulation and securities fraudCoordinated trading, narrative reversal across forums
V14Romance fraud (FS overlay)Targeting, rapport, crisis, money request, escalation
V15Investment fraudClone-firm, boiler-room, recovery-room build-and-extract
V16Insurance fraudGhost broker, staged claim, exaggerated claim
V17Pension scamsTracing pretext, transfer-out, illiquid lock-in

Domain book - 26 verticals across safety, abuse, and exploitation

CodeVerticalTypology hook
V18Housing and cuckooingVulnerable tenancy taken over by exploiters
V19Identity fraud and synthetic identityCredentials reused under variant data across applications
V20Authorised but manipulated transactionsCustomer-authorised under coercion or false pretence
V21Trade credit and invoice fraudSupplier-impersonation late in payment cycle
V22SME and commercial vulnerabilityDirector-level coercion in business banking
V23Charity and faith sectorCoerced donation, induced gift, leadership coercion
V24County lines and child criminal exploitationRecruitment, grooming-into-crime, debt-bondage
V25Gambling harmVelocity, chasing-losses, cross-operator rotation
V26Substance abuse and exploitationCoercive supply, financial dependency, isolation
V27Radicalisation and extremismRecruitment funnel from open to closed channels
V28Peer bullying (online)Pile-on dynamics, sustained targeting, exclusion patterns
V29Workplace harassmentSustained pattern recognised against published instruments
V30Modern slavery and human traffickingMovement, debt-bondage, document-control patterns
V31Sextortion (adult)Build, capture, threaten, extract
V32StalkingSustained surveillance, network manipulation, escalation
V33Domestic abuseCumulative pattern across communications and money
V34Coercive controlMonitoring, permission-seeking, isolation, decision dominance
V35Elder financial abusePower-of-attorney misuse, beneficiary-pressure pattern
V36Image-based sexual abuseCapture, threat, distribution, coordination
V37Tech-facilitated abuseDevice, account, and platform pattern across surfaces
V38Child sexual abuse and groomingAccess, contact, normalisation, isolation, escalation
V39Honour-based abuse, forced marriage, FGMFamily-network coercion, travel-and-isolation pattern
V40Harassment and hate crimeSustained pattern recognised against named protected characteristics
V41Fraud and social engineering (cross-typology)Common patterns across multiple vertical contexts
V42Financial and ransom extortionBuild, threat, payment-instruction, escalation
V43Radical group recruitment and cultsRecruitment funnel, isolation, financial control

Where it fits

Institutional and frontline deployment.

Institutional deployment.

Banks, platforms, and regulated firms.

Iris integrates with organisations that need to detect coercive, fraudulent, exploitative or manipulative patterns at scale, with audit-grade evidence and full data control retained by the institution.

Frontline deployment.

Advocacy, oversight, and research teams.

Iris also supports organisations working on harm directly. The same engine, applied diagnostically, helps surface patterns in evidence that would otherwise be invisible to a single reviewer.

Patent and IP

Patent pending across multiple families.

Iris is patent pending across multiple families covering signal-processing approaches to behavioural pattern detection in digital conversations.

Founder

Caroline Wells - Founder.

Caroline brings 25 years' financial services experience to Iris, with deep expertise in conduct, risk, and consumer outcomes. She founded Iris after seeing how poorly current systems detect the patterns that matter most: behaviour that unfolds across conversations, not within them.

Contact

Get in touch.

Tell us who you are and what you are working on. We reply within five working days.

Confidential enquiries only - please do not share personal data of third parties in this form.

0 / 5000