Adverse Media Risk API you can rely on.
Turn noisy news into clean risk profiles — one entity, one timeline, one truth. Our API reads global sources, resolves aliases, and links events into a single risk timeline. Every profile comes with risk labels and full source evidence — delivered as structured JSON for instant integration.
Track risks over time
Follow how a person or company’s risk story changes — from past cases to today.
Data that fits your system
Structured JSON profiles ready to plug directly into your workflows.
Built for developers
Simple REST API — SDKs and webhooks on the way.
Global & always fresh
Coverage from worldwide sources in many languages, updated daily.
Evidence for every alert
Every risk comes with its source, date, and context — ready for audits.
Secure & reliable
Fast, scalable API built to support compliance workloads.
How the data pipeline works
We turn messy news into clear, structured risk profiles: collect sources → resolve aliases → merge duplicates → connect events into one timeline → classify risks → deliver clean JSON via API.
- We gather global sources — news and public records in multiple languages.
- We resolve aliases — all name variations and spellings tied to one entity.
- We merge duplicates — the same risk event reported by many publishers becomes one verified fact.
- We connect events — one timeline shows how risks evolve over time.
- We classify risks — using categories like fraud, corruption, money laundering, terrorist financing, and more.
- We provide evidence — every profile includes the original source, publish date, language, and reliability.
What's in the data
- Entity: A complete profile of a person or organization, including name, aliases, attributes, and locations.
- Summary: A plain-text summary of the entity's risk profile.
- Risk Events: A detailed timeline of events, including risk types, categories, and provenance from original articles.
- Notes: Key extracted details for quick reference, such as charges, weapons, and crime status.
{
"entity": {
"identifier": {
"id": "a7a52a97-1f85-44e8-9897-02ba873cf61f"
},
"type": "PERSON",
"name": "A. SADIQ",
"aliases": [
"A Sadiq", "A. SADIQ", "Sadiq","Sadeq",
"Sadik","Abdul Sadiq","Ahmed Sadiq",
"Ali Sadiq", "Anwar Sadiq","Taylor Raja / Shahjahan"
],
"attributes": {
"birth_year": 1975,
"roles": [
"key accused in Coimbatore bombings"
]
},
"locations": [
{
"label": "location",
"value": "Coimbatore (crime site)"
},
{
"label": "location",
"value": "Vijayapura (arrest site)"
}
]
},
"summary": "A. Sadiq, a Person, was identified as a key accused in relation to the 1998 Coimbatore serial bombings,
which killed 58 people and injured over 250. He was arrested in Vijayapura, Karnataka, after living under
a false identity for 27 years.",
"risk_events": {
"risk": [
"Terrorism"
],
"categories": [
"Terrorism / Terrorist Financing"
],
"risk_timeline": [
{
"risk_status": "arrested",
"provenance": [
{
"url": "https://navbharattimes.indiatimes.com/state/tamil-nadu/chennai/coimbatore-blasts-mastermind-sadiq-alias-tailor-raja-arrested-from-vijayapura-after-27-years/articleshow/122376791.cms?utm_source=nextstory&utm_medium=widget&utm_campaign=story6",
"publisher": "navbharattimes.indiatimes.com",
"snippet": "1998 के कोयंबटूर सीरियल बम धमाकों के मुख्य आरोपियों में से एक ए सादिक उर्फ टेलर राजा (50)",
"publishdate": "2025-07-11"
}
]
}
]
},
"notes": {
"name": "A. Sadiq",
"role": "key accused in Coimbatore bombings",
"alias": "Taylor Raja / Shahjahan",
"group": "Al-Umma",
"family": "married, father of three",
"location": "Coimbatore (crime site), Vijayapura (arrest site)",
"expertise": "IED making",
"birth_year": "1975",
"crime_status": "arrested",
"publish_date": "2025-07-11"
}
}
Request Your API Key
Enter your work email to unlock testing. We’ll send your key, docs, and sample JSON.
FAQ
No. We don’t screen customers directly. We provide the adverse media dataset through an API, so you can embed it into your own KYC/KYB workflows and products.
The dataset is refreshed daily, ensuring you always see the most up-to-date coverage and events.
Our sandbox is for evaluation and testing only. Commercial plans include OEM integration, and redistribution rights are available at the enterprise level.
We cluster duplicate articles, unify name variations, and resolve aliases. That way, one risk event is captured once — not repeated under different spellings or sources.
Yes. We provide bulk exports and periodic data snapshots for partners who prefer direct ingestion into their systems.
We operate a takedown and correction process. Every record includes provenance — source URL, publish date, language, and reliability — so it can be verified and audited transparently.