00 / About REF · GSIG-2026-FIRM-001

A firm built differently,
by design.

GSIG was constituted to address a structural gap in the compliance industry: the absence of a forensic intelligence firm with the independence, depth, and infrastructure to serve sovereign authorities, supervisory bodies, and counsel handling material engagements.

The published sanctions lists are the floor. The work begins above them. The pages that follow set out why the firm exists, how it is constructed, and what it refuses to do.

Global Sanctions
Intelligence Group
Established 2026 · London
01 / Why GSIG exists

The structural argument.

The compliance industry has, with few exceptions, organised itself around volume. The threat picture demands depth. A firm of this kind needs to exist.

The published sanctions lists are extraordinarily thin. The threat networks that operate around them are not. The compliance industry that grew up around the published lists has, with few exceptions, organised itself around volume — large vendors selling list-mirroring at scale, optimised for the median customer.

That arrangement no longer matches the threat picture. The institutions that need depth — sovereign authorities, supervisory bodies, counsel handling material engagements, payment networks with structural exposure — increasingly cannot procure depth through the volume vendors. They need a firm built differently, on different infrastructure, under different commercial incentives.

GSIG is that firm.

02 / How we are constructed

The architecture of the firm.

The structural arrangement is the credentialing. Privately owned, privately funded, owned infrastructure, no commercial relationships with the firms we analyse.

GSIG is privately owned and privately funded. We have taken no outside capital, hold no commercial relationships with the firms we analyse, and operate forensic infrastructure built and owned in-house — not on commercial cloud, not under data-sharing arrangements with screened counterparties.

Engagements are conducted under engagement letter and confidentiality agreement. The composition of each engagement team is scoped to the work, with engagement leads, forensic analysts, and counsel-of-record introduced to clients on the same vetted basis as every other element of the engagement.

This arrangement is deliberate. The independence of the firm is the product.

Ownership
Privately heldNo outside capital. No external investors.
Capital
Privately fundedNo commercial dependencies on screened entities.
Infrastructure
Built and owned in-houseNo commercial cloud. No third-party data residency.
Engagement
Under engagement letterConfidentiality and privilege protections from the outset.
Conflicts
No commercial relationships with screened firmsIndependence is structural, not stated.
Registration
England & WalesOperates from London. Established 2026.
03 / What we believe

Four operating principles.

Not values in the corporate sense. These are the operating beliefs that distinguish GSIG from a list-mirroring vendor. Each one declarative, defensible, and testable against the work the firm does.

PRINCIPLE · 01
The published list is the floor,
not the ceiling.
Mirroring designations is the entry condition. Sanctions lists are, by design, lagged, scoped, and politically negotiated — they describe what supervisors are prepared to publish at a given moment, not the topology of the underlying networks. The work begins above the list: pre-designation, topology-resolved, and continuous.
PRINCIPLE · 02
Independence is structural,
not stated.
A firm cannot be independent of counterparties it shares data with, depends on for revenue, or sells back to. The phrase "we are independent" carries no weight without a structural arrangement that makes the independence verifiable. GSIG holds none of those relationships, by deliberate design.
PRINCIPLE · 03
Confidentiality is a product feature,
not a policy.
Vetted engagement, controlled provisioning, owned infrastructure, and no aggregated cross-client data are not statements written in a policy document. They are the way the firm is built. The architecture of the engagement is the confidentiality guarantee.
PRINCIPLE · 04
The first call is the work.
No demos, no marketing decks, no procurement queue, no qualification call. If an engagement is appropriate, it begins with a confidential conversation about scope and proceeds under engagement letter. If it is not appropriate — for conflict, jurisdictional, or capacity reasons — we say so directly.
05 / Engagement

How we work.