Knowing who you're working with isn't just due diligence — in a conflict environment, it's a security imperative. Sanctions exposure, covert ties to adversarial networks, and concealed dealings with occupied territories don't always surface through standard screening. Finding them requires a different kind of investigation. Our analysts combine open-source intelligence, corporate registry mapping, trade flow analysis, and court record review to trace connections that organisations actively try to obscure. Whether the subject is a prospective partner, a supplier, or a co-investor, we identify the risks before they become your liability.

Spiral staircase built with patterned tiles, leading the eye down to a focal point of green leaves

Results

What you get

Structured Analytical Report

A detailed written report containing all verification results, a full list of sources, and clear conclusions. Every statement is traceable to its primary source—we do not present assumptions as verified facts or unconfirmed guesses as final findings.

Executive Summary with Recommendations

Each report includes a concise overview of key findings along with specific recommendations. For every case, we highlight the insights most relevant to your request, enabling decision-makers to quickly assess results without reading the entire document.

Supplementary Materials (on request)

Our analysts are prepared to provide additional documentation and evidence supporting the research findings.

Expert Consultation & Case Debrief (on request)

Our specialists are available for follow-up consultations to break down the results in detail, discuss specific cases, and answer any questions regarding risks or methodology.

How We Work

Case

Strategic Supply Chain Vetting

Request

A state strategic enterprise commissioned a comprehensive audit as part of its formal vetting process for a prospective cooperation candidate. Given the sensitive nature of the client's operations, any new partnership required rigorous reliability screening before engagement could proceed.

What We Did

We conducted a structured reliability assessment covering the candidate company's ownership structure, business relationships, and active trade flows. The investigation drew on corporate registry data, customs and logistics records, and open-source intelligence to map the full network of entities connected to the subject.

Key Findings

  • The candidate company maintained active commercial ties with Russian     counterparts, in direct conflict with the client's operational and     compliance requirements.
  • The company was routing its products through European subsidiaries of Russian corporate groups, which then forwarded the goods to end recipients in Russia — a layered scheme designed to obscure the ultimate destination.

Outcome

The client rejected the partnership. The concealed Russia-linked trade flows represented both a sanctions exposure risk and a fundamental breach of the trust required for strategic cooperation.

Case

Defence Startup Integrity Check

Request

A defence-sector company with a portfolio ofover 100 startup investments commissioned a pre-investment investigation into a drone manufacturing startup. Given the client's profile and the reputational stakes involved, standard financial due diligence was insufficient — a deeper reliability check was required.

What We Did

We verified the reliability of the startup and all associated legal entities using open-source intelligence methods, cross-referencing corporate registries, court databases, asset recovery records, and law enforcement disclosures.

Key Findings

  • One of the startup's co-founders was identified as a beneficial owner of a legal entity holding a licence for online gambling operations, running an active online casino in Ukraine — an undisclosed conflict of interest with significant reputational implications.
  • An asset recovery agency had claimed to have seized approximately 2.6 billion UAH from the casino's accounts, indicating serious regulatory and legal exposure.
  • Following the investigation, the same co-founder was detained by Ukraine's State Bureau of Investigation on suspicion of laundering Russian-origin funds.

Outcome

The client declined the investment. Proceeding would have exposed the organisation to reputational damage, association with gambling operations, and potential linkage to Russian financial networks — risks incompatible with operating in the defence sector.

Key benefits

Document with a bar chart icon
Evidence You Can Act On

We provide documented findings with clear implications, giving you a solid basis for approvals, rejections, or negotiation decisions, supported by a specialized defence intelligence company.

Fingerprint icon
Independent Verification

We challenge declared information by cross-checking financials, corporate data, and public statements to confirm what is real and what is misrepresented.

Warning alert icon
Early Risk Detection

Our intelligence allows you to identify structural, legal, and reputational risks early, before capital is deployed or agreements are signed, when decisions are still reversible, utilizing advanced Open Source Defence and Security Intelligence.

Key icon
Negotiation & Strategic Leverage

Our findings provide tangible leverage in negotiations, enabling you to adjust deal terms, request safeguards, or walk away with confidence through our comprehensive military intelligence services.

Our influence

Molfar Intelligence operates on a global scale, combining an experienced team, extensive data access, and broad geographic coverage to conduct high-complexity investigations recognized by leading international media.
7000+

investigations

Expanded Plus Icon
80+

specialists on the team

Expanded Plus Icon
750+

open and closed registries worldwide

Expanded Plus Icon
1000+

media mentions

Expanded Plus Icon

Methodology

Our team integrates multi-source intelligence gathering with premium investigative platforms to reconstruct a comprehensive profile, capturing critical insights that exist well beneath the surface of a public persona.

01

Open Source Intelligence (OSINT)

Systematic collection and analysis of publicly available data (social media, news archives, corporate filings, and court records) cross-referenced for accuracy within a defence intelligence company framework.

02

Corporate Registry Research

Mapping of ownership structures, directorships, and affiliated entities across multiple jurisdictions to surface hidden connections and beneficial owners.

03

Sanctions & Watchlist Screening

Checks against global sanctions lists, PEP databases, and regulatory watchlists, including detection of evasion schemes and indirect exposure via military intelligence services.

04

Court & Legal Database Analysis

Review of litigation history, criminal proceedings, enforcement actions, and bankruptcy records across available jurisdictions.

05

Proprietary Intelligence Platforms

Access to premium data sources unavailable through standard commercial tools, including leaked datasets, closed-source registries, and specialized financial databases utilized for Open Source Defence and Security Intelligence.

06

Asset & Network Tracing

Following financial and corporate trails across borders to identify asset holdings, shell structures, and affiliated parties that standard due diligence would miss.

Act Confidently with Reliable Data

Contact us to discover how specialized intelligence can strengthen your decisions, uncover hidden opportunities, and mitigate risks.