
Product Overview
Trained on your data. Built for action.
Liminal Clarity AI enables organisations to proactively monitor internal and external behaviours using a custom-trained neural engine. Built to detect fraud, corruption, and other high-risk activities, the platform analyses your enterprise data to identify behavioural anomalies and flag suspicious patterns as they emerge.
How It Works

Step 1
DATA
INGESTION
We securely connect to a variety of data sources,
such as:
-
Email data
-
Chat integration
-
HR Employee data
-
Supplier & Customer records
-
Transaction data
-
Legal Registries (i.e. Windeed, DHA, CIPC)


Step 2
NEURAL ENGINE PROCESSING
Our system applies advanced AI techniques, including:
-
Natural Language Processing (NLP)
-
Pattern recognition
-
Anomaly detection
-
Entity correlation
-
Behavioural risk modelling
-
Relationship mapping


Step 3
MONITORING
OUTPUT

The dashboard presents findings, tools and outputs such as:
-
Networking
-
Keyword recognition
-
Entity recognition
-
Anomaly detection
-
Network diagramming

Dashboards that surface what matters
Our monitoring dashboard transforms complex data into clear visual intelligence. Alerts, audit trails, timelines, and actor maps help you zero in on risk—without sifting through noise.






Use Cases
Liminal Clarity AI is designed to adapt—because no two organisations face risk in the same way. Below are examples of how our neural engine has been deployed to surface invisible behaviour patterns, flag emerging threats, and empower decisive action.
From procurement fraud to ghost employees, these use cases show the engine in action—trained on real data, in real organisations.
Internal Employee Fraud/Theft
Problem: Employees submit false or inflated claims for travel or accommodation.
Data Ingested: Receipts, credit card data, GPS logs, travel bookings, calendar entries
Engine's Task: Look for duplicate submissions, inflated amounts, or mismatched dates/times
Dashboard flags the suspicious claims with LLM-generated rationaleProblem: Fake employees are created pay HR or payroll staff to siphon salaries
Data Ingested: HR records, device logins, badge access, tax records
Engine's Task: Identify employees with zero system activity, no email or login activity, but regular salary disbursements
Dashboard flags ghost employee profile, salary total to date, and system activity summaryProblem: Procurement staff accept bribes or kickbacks in return for awarding contracts at inflated prices
Data Ingested: Procurement logs, internal emails/chats and vendor payment trends
Engine's Task: Detect unusual price hikes or repeated awards to one vendor despite negative performance
Dashboard displays supplier/contracts heatmap flagging pricing and behavioural anomaliesProblem: Employees falsify work hours or log fake overtime
Data Ingested: Timesheets, access control logs, login records, task data
Engine's Task: Identify entries where reported hours exceed actual system activity
Dashboard lists user, period in question, discrepancy hours, and AI narrative on mismatchProblem: Employees alter data to meet KPIs or performance metrics that trigger bonuses
Data Ingested: KPI logs, edit trails, performance dashboards
Engine's Task: Compare historical trends in KPIs vs current surges, especially near bonus cycle; check edit trail
Dashboard shows KPI name, change vs baseline, involved employee, and LLM suspicion scoreProblem: Employees approve fake or inflated invoices from vendors in exchange for personal gain
Data Ingested: Vendor onboarding/setups, communication, payment patterns and invoice approvals
Engine's Task: Identify collusion patterns (e.g., familiar tone in emails or hidden links between staff and vendor).
Dashboard generates network graph showing relationship links and message excerpts flagged by LLMProblem: Employee misuse of company vehicles, credit cards, or equipment for personal benefit.
Data Ingested: GPS logs, fuel card spend, vehicle/device schedules
Engine's Task: Compare scheduled vs actual use of company assets, highlight anomalies like high fuel spend on weekends or non-approved locations
Dashboard provides map view and flagged trips or spend entries, with explanations like “Fuel card used 100km from site.”Problem: Losses hidden or profits inflated in financial statements
Data Ingested: Financials, audit logs, system edit trails
Engine's Task: Summarise all changes to financials with material impact; flag ones without proper notes or sign-offs
Dashboard provides comparison panel with before/after reports compared; and analyses discrepencies/rationalityProblem: Staff direct contracts to companies in which they or relatives have interests, bypassing due diligence
Data Ingested: Employee declarations, supplier/business registries, comms data
Engine's Task: Scan declarations, emails, supplier addresses for hidden connections or overlaps
Dashboard charts “related party risk” showing potential linked parties with confidence ratings
External Supplier or Customer Fraud/Theft
Problem: Vendors submit multiple or fraudulent invoices for the same goods/services
Data Ingested: Invoice records, purchase orders, payment logs
Engine's Task: Use semantic similarity to flag “near duplicates” with small changes
Dashboard displays side-by-side invoice comparisons with LLM flagsProblem: Vendors invoice for more than they deliver
Data Ingested: Receiving logs, weight data, scanner entries, invoices
Engine's Task: Highlight mismatches with recurring patterns by the same vendor
Dashboard provides visualisation of delivery timelines visualised and mismatch heatmapsProblem: Customers return damaged, used, or incorrect goods for full refunds
Data Ingested: Return logs, photos, original sale records
Engine's Task: Identify discrepancies in SKUs or repeated return patterns per customer
Dashboard flags customer profile with return fraud risk score and descriptionProblem: Multiple vendors collude to fix prices and eliminate competitive pricing
Data Ingested: Tender responses, pricing sheets, proposal documents
Engine's Task: Monitor bids received for similar tenders; look for repeated phrases, patterns, and abnormal price consistency across bidders
Dashboard displays network graph of collusion clusters and price variance histogram.Problem: Customers or suppliers file false claims under warranty policies or insurance arrangements.
Data Ingested: Warranty logs, usage data, complaint records
Engine's Task: Check claim volume against average rates, and compare to usage data or complaint logs, spot claim justification inconsistencies
Dashboard creates risk queue sorted by likelihood of fraud and flags excerptsProblem: External actors impersonate vendors to divert payments
Data Ingested: Domain records, unusual communication requests, bank detail change requests
Engine's Task: Detect suspicious language shifts in vendor emails (e.g., urgent tone, unusual greetings) and flag metadata mismatches
Dashboard shows Alert box with sender metadata and narrative like “Tone change detected in recent emails.”Problem: Fake supplier entities bill for non-existent goods or services
Data Ingested: Supplier profiles, registry data, websites
Engine's Task: Detect red flags like no web presence, shared physical address, or new bank accounts
Dashboard flags shell risk indicators across vendor portfolio with checklistProblem: Vendors intentionally inflate prices or add obscure charges not outlined in contracts
Data Ingested: Contracts, invoice line items, historic pricing data
Engine's Task: Detect fee descriptions that are vague or duplicated across vendors, analyse line-item price across time, identify off-contract charges.
Dashboard provides vendor billing tracker highlighting contract breaches with insights (i.e. “Extra charge not found in master agreement.”)Problem: Suppliers deliver substandard or counterfeit goods billed as premium products
Data Ingested: Inspection reports, sensor data, delivery records
Engine's Task: Identify mismatches in certification, quantity, or weight logs
Dashboard flags and provides explanation of inspection outcome vs difference from SLAProblem: Customers use stolen or fabricated identities to secure credit or payment terms, then default
Data Ingested: Customer data from credit bureaus and ID
registries, IP addresses
Engine's Task: validate customer data, compare application narrative to known fraud patterns
Dashboard flags mismatched metadata by presenting a fraud risk scorecard + reasoning e.g. “IP address in Nigeria, applicant in Cape Town.”
Adaptable Intelligence, Aligned to your Business
Liminal Clarity AI’s neural engine is designed to be trained and refined using your organisation’s unique data. This ensures the system aligns with your specific processes, risk landscape, and monitoring priorities.
Each deployment is tailored to ingest the data sources most relevant to your environment, enabling a focused, high-precision approach to behavioural risk detection.
While current implementations are centred on fraud, theft, and corruption, the platform is fully configurable. With the right data inputs, it can be extended to support additional risk domains as your needs evolve.

Designed with Security and Scale in Mind
Whether deployed on-premise or in secure cloud environments, the platform is built to handle high-volume, sensitive data without compromising performance or confidentiality. Each solution is tailored to your infrastructure, access controls, and compliance parameters.