1. Two-Mode Operating Strategy
JIL Sovereign operates under a clear two-mode architecture that separates protocol-level infrastructure from regulated financial execution. This separation is fundamental to JIL's regulatory positioning and ensures that the protocol layer remains a neutral technology infrastructure provider.
1.1 Mode A: Protocol / Control-Plane
JIL operates as a technology infrastructure provider. The protocol layer is a neutral consensus control-plane for settlement integrity. It provides four core functions:
- Settlement Integrity Governance - Protocol-level rules that ensure settlement actions are complete, consistent, and compliant before finality is attested
- Identity Binding - Cryptographic verification and binding of counterparty identities to settlement transactions through the Beneficiary Identity Directory (BID)
- Policy Enforcement - Jurisdiction-aware compliance rules evaluation and enforcement at the protocol level, ensuring all settlement actions conform to configured policy parameters
- Finality Attestation - Deterministic proof of settlement completion through validator consensus, producing audit-grade finality receipts with cryptographic signatures from the validator set
Key distinction: The protocol layer does not initiate, authorize, or execute fund movement. JIL is not a money transmitter. JIL is not a bank. The protocol attests to the integrity and completeness of settlement actions that occur through external regulated channels.
1.2 Mode B: Regulated Execution / Partner-Led
Settlement execution (actual fund movement) occurs through licensed banking and payment partners in each jurisdiction. JIL does not hold, transmit, or control customer funds. In this mode:
- Licensed financial institutions handle fund transfers and custody in each jurisdiction
- Customer-controlled wallets (MPC 2-of-3, user holds a shard) ensure non-custodial architecture
- Regulated payment processors execute fiat settlement legs
- Licensed MSB partners handle money transmission where required
- Compliance obligations are met by the appropriate licensed entities in their respective jurisdictions
Core principle: JIL does not hold, transmit, or control customer funds. The protocol provides the integrity layer - licensed regulated partners provide the execution layer.
2. What JIL Is and Is Not
2.1 JIL IS
- An Integrity Layer - Provides cryptographic attestation that settlement actions were completed correctly, with validator consensus producing tamper-proof finality receipts
- A Governance Layer - Enforces configurable compliance policies at the protocol level, ensuring all settlement participants meet jurisdiction-specific requirements before transactions proceed
- A Policy Enforcement Layer - Evaluates counterparty identity, sanctions status, transaction limits, and jurisdiction rules in real time through the Policy Engine
- A Cross-Rail Settlement Control System - Coordinates settlement across multiple execution rails (tokenized assets, fiat transfers, bridge operations) through a unified consensus control-plane
2.2 JIL IS NOT
- Not a Bank - JIL does not accept deposits, issue loans, or provide banking services of any kind
- Not a Payment Rail - JIL does not move money between parties. Fund movement occurs through regulated partners and customer-controlled accounts
- Not an Exchange - JIL does not operate an order book, match buyers and sellers, or facilitate trading of securities or commodities
- Not a Replacement for Financial Institutions - JIL complements existing financial infrastructure by adding an integrity and governance layer on top of regulated execution channels
- Not a Money Transmitter - JIL does not receive, hold, or transmit money or monetary value on behalf of customers. The protocol provides settlement attestation, not fund transfer
3. U.S. Regulatory Considerations
3.1 FinCEN - Money Transmission
JIL provides technology infrastructure, not money transmission services. The JIL protocol layer does not constitute money transmission under FinCEN guidance. JIL does not accept and transmit currency or funds, nor does it receive currency or funds for the purpose of transmitting them. The protocol provides settlement integrity attestation - cryptographic proof that settlement actions completed correctly through external regulated channels.
Fund movement occurs exclusively through licensed MSB partners and customer-controlled accounts. JIL's role is analogous to a notary or attestation service - it verifies and records that actions occurred, but does not perform the underlying actions themselves.
3.2 OFAC - Sanctions Compliance
Sanctions screening is integrated at the policy engine layer. All counterparties are verified through the Beneficiary Identity Directory (BID) before settlement transactions can proceed. Settlement will not execute if any party appears on the OFAC SDN list. The Policy Engine evaluates counterparty identity against OFAC SDN lists and jurisdiction-specific sanctions programs as part of the pre-settlement compliance check.
The Evidence Export Toolkit produces audit-grade proof bundles that document the complete compliance evaluation chain for each settlement, including sanctions screening results, identity verification status, and policy evaluation outcomes.
3.3 SEC - Token Classification
JIL tokens are utility tokens for network functionality and protocol participation. Token holders use JIL to participate in validator consensus, pay protocol fees, and access network services. There is no investment contract. There is no expectation of profit derived from the efforts of others. The token does not represent equity, debt, profit-sharing rights, or any claim on the assets or revenue of JIL Sovereign Technologies, Inc.
JIL token value is derived from its utility within the protocol - staking for validator participation, fee payment for settlement attestation services, and governance participation - not from an expectation of profits derived from the efforts of others.
4. Compliance-by-Design Features
JIL Sovereign is built with compliance as a foundational architectural principle, not an afterthought. Five core modules provide end-to-end compliance infrastructure at the protocol level.
4.1 Beneficiary Identity Directory (BID)
The BID provides verified counterparty identity binding for all settlement participants. Each counterparty is cryptographically linked to a verified identity record before they can participate in settlement. The BID supports KYC/KYB attestations from regulated identity providers and maintains a continuously updated counterparty registry.
4.2 Policy Engine
The Policy Engine enforces jurisdiction-aware compliance rules at the protocol level. Configurable policy parameters include transaction limits, counterparty restrictions, jurisdiction allowlists and blocklists, sanctions screening requirements, and settlement velocity controls. Policies are evaluated in real time before settlement actions proceed.
4.3 Escrow Release Module
The Escrow Release Module provides policy-controlled fund release for settlement transactions. Funds held in escrow are released only after the Policy Engine confirms all compliance requirements are satisfied and the validator set achieves consensus on settlement integrity. This prevents premature fund release and ensures compliance gates cannot be bypassed.
4.4 Evidence Export Toolkit
The Evidence Export Toolkit generates audit-grade proof bundles for regulators and compliance teams. Each bundle contains the complete settlement record: counterparty identity attestations, policy evaluation results, sanctions screening outcomes, validator consensus signatures, and timestamped finality receipts. Bundles are formatted for regulatory examination workflows.
4.5 Finality Attestation Engine
The Finality Attestation Engine produces cryptographic proof of settlement completion. Each finality receipt contains the settlement hash, validator consensus signatures (14-of-20 threshold), timestamp, and policy compliance attestation. These receipts serve as authoritative settlement records that can be independently verified by any party with access to the validator public keys.
5. Allowed vs Prohibited Claims
All public communications, marketing materials, and documentation must adhere to the following positioning guidelines. These distinctions are critical for regulatory clarity.
| SAFE Claims | AVOID Claims |
|---|---|
| "Settlement integrity platform" | "Eliminates fraud" |
| "Identity binding" | "Guaranteed protection" |
| "Policy-controlled release" | "Replaces banks" |
| "Cryptographic finality" | "Investment opportunity" |
| "Neutral settlement layer" | "Risk-free" |
| "Consensus control-plane" | "Guaranteed returns" |
| "Complements existing rails" | "Replaces SWIFT/DTCC" |
| "Policy governance infrastructure" | "Bank alternative" |
Guidance: When describing JIL, always emphasize the integrity, governance, and attestation functions. Never position JIL as performing fund movement, custody, or payment processing. JIL enhances settlement infrastructure - it does not replace regulated financial services. Never claim JIL eliminates risk or guarantees outcomes.
6. Disclaimers
6.1 Product Scope
JIL enhances settlement integrity through identity binding, policy enforcement, and cryptographic finality. JIL does not eliminate all settlement risk, replace regulated financial intermediaries, or guarantee transaction outcomes.
Settlement execution occurs through licensed regulated partners and customer-controlled accounts. The JIL protocol layer provides settlement attestation and compliance infrastructure - it does not perform the underlying fund movement, custody, or payment transmission. JIL does not hold, transmit, or control customer funds.
6.2 Advisory
JIL provides technology infrastructure for settlement integrity. Nothing on this website constitutes financial, legal, or investment advice.
The information presented here is for informational purposes only and should not be relied upon as the basis for any financial, legal, or investment decision. Readers should consult their own legal, financial, and tax advisors before taking any action.
6.3 Statistics
Fraud statistics referenced on this site are sourced from FBI IC3 Annual Reports and other public sources. Figures may span multiple categories and time periods.
6.4 Token Classification
JIL tokens are utility tokens intended for network functionality and protocol participation. JIL tokens do not represent equity, debt, profit-sharing rights, or any claim on the assets or revenue of JIL Sovereign Technologies, Inc. Token holders use JIL for validator staking, protocol fee payment, and governance participation within the network.