Confidential • Documented • Cross‑Border Ready

Strategic Intelligence for capital & governance

PIW operates as an independent intelligence bureau supporting corporate decision makers across high‑risk engagements.

01 Decision‑grade outputs
02 Scope discipline
03 Legality‑first
Positioning We do not accept every engagement. Submissions are reviewed for admissibility and practical value.

Mandate

Independent intelligence support for corporate decision makers.

What we do

  • Map ownership, linkages and exposure signals
  • Structure disputes into documented intelligence packages
  • Develop board‑ready risk narratives and escalation briefs
  • Support cross‑border engagements with disciplined scope

What we are not

  • Not a law firm or accounting firm
  • No hacking, unlawful surveillance or impersonation
  • No guarantees of recovery or outcomes
  • No engagement without legal authorization

Operational divisions

Ten services grouped into three divisions.

Capital & Financial Intelligence
Before capital is committed.

Financial Flow & Exposure Mapping

High demand

Signals‑based mapping of financial exposure and transaction patterns within lawful limits.

  • Exposure map
  • Assumptions register
  • Decision memo

Ownership & Control Architecture

UBO layers

Ownership layers, control signals, affiliated entities and governance visibility.

  • Structure diagram
  • Linkage notes
  • Red‑flag register

Pre‑Investment Intelligence Review

Capital

Counterparty profiling, exposure scan and a board‑grade intelligence snapshot.

  • Executive summary
  • Key risks
  • Recommendation options

Cross‑Border Counterparty Verification

International

Validation signals across jurisdictions: identity, operations, linkages and exposure.

  • Verification notes
  • Source citations
  • Next steps
Governance & Executive Intelligence
For board‑level appointment and control integrity.

Executive & Board‑Level Exposure Screening

Vetting

Conflict signals, reputational exposure and governance risk indicators.

  • Exposure summary
  • Conflicts register
  • Decision notes

Governance Weakness & Conflict Mapping

Controls

Internal conflict mapping and governance weak points relevant to decision makers.

  • Weakness map
  • Control notes
  • Mitigation options

Sanctions & Regulatory Exposure Scan

Compliance

Signals‑based scan for regulatory and sanctions exposure indicators.

  • Exposure indicators
  • Assumptions
  • Escalation notes
Dispute & Regulatory Intelligence
The bureau arm: structure, evidence, escalation.

Dispute Intelligence Structuring

Bureau arm

Timeline, parties, contradictions and decision‑grade dispute architecture.

  • Chronology
  • Issue matrix
  • Risk narrative

Evidence Pack Architecture

File‑ready

Transform fragmented documents into a coherent evidence pack.

  • Index & exhibits
  • Cross‑references
  • Submission‑ready format

Regulatory Escalation Briefing

Pressure

Structured briefing for regulator/counsel review with calibrated tone.

  • Brief memo
  • Framing logic
  • Next‑step options

Structured Risk Narrative Development

Signature

Board‑ready narrative: evidence → exposure → options. The bureau signature output.

  • Executive narrative
  • Assumptions register
  • Decision options
Secure intake is the gate.
Authorized representatives only. Case ID is generated upon submission.

Engagement model

Disciplined scope. Documented output. Confidential by default.

01

Secure inquiry

Submit intake with objective, parties and decision use.

02

Admissibility review

Legal authorization and practical value assessment.

03

Scope definition

Deliverables, timeline and information requirements.

04

Delivery pack

Evidence pack • timeline • risk narrative • escalation brief.

Rules of engagement

Legality‑first. Discreet. Documented.

Permitted

  • Document analysis & evidence structuring
  • Commercial intelligence and exposure mapping
  • Board‑grade narratives and briefs
  • Lawful escalation support (drafting & structure)

Prohibited

  • Hacking, unlawful surveillance, wiretapping
  • Impersonation or threats
  • Guarantees of recovery/outcomes
  • Requests without legal authorization