Blueprint Playbook for Napier AI

Who the Hell is Jordan Crawford?

Founder of Blueprint. I help companies stop sending emails nobody wants to read.

The problem with outbound isn't the message. It's the list. When you know WHO to target and WHY they need you right now, the message writes itself.

I built this system using government databases, public records, and 25 million job posts to find pain signals most companies miss. Predictable Revenue is dead. Data-driven intelligence is what works now.

The Old Way (What Everyone Does)

Your GTM team is buying lists from ZoomInfo, adding "personalization" like mentioning a LinkedIn post, then blasting generic messages about features. Here's what it actually looks like:

The Typical Napier AI SDR Email:

Subject: Reduce false positives with AI-powered AML Hi [First Name], I noticed you're hiring compliance analysts at [Company]. We help financial institutions like yours reduce AML false positives by up to 97% using explainable AI. Would you be open to a quick call to discuss how Napier can transform your compliance operations? Best, SDR Name

Why this fails: The prospect is an expert. They've seen this template 1,000 times. There's zero indication you understand their specific situation. Delete.

The New Way: Intelligence-Driven GTM

Blueprint flips the approach. Instead of interrupting prospects with pitches, you deliver insights so valuable they'd pay consulting fees to receive them.

1. Hard Data Over Soft Signals

Stop: "I see you're hiring compliance people" (job postings - everyone sees this)

Start: "Your FinCEN settlement from March 2024 included Travel Rule deficiencies - 8 states you operate in strengthened enforcement in Q4 2024" (government enforcement database with specific dates)

2. Mirror Situations, Don't Pitch Solutions

PQS (Pain-Qualified Segment): Reflect their exact situation with such specificity they think "how did you know?" Use government data with dates, record numbers, enforcement actions.

PVP (Permissionless Value Proposition): Deliver immediate value they can use today - analysis already done, gaps already identified, patterns already correlated - whether they buy or not.

Napier AI: Company Overview

Company URL: https://napier.ai

Core Problem: Financial institutions waste analyst time investigating false positive alerts from legacy AML systems while missing actual money laundering and financial crime threats, forcing them to choose between over-alerting staff or under-protecting against regulatory risk.

Target ICP: Mid-market to enterprise financial institutions (100+ employees) including retail banks, payment service providers, fintechs, cryptocurrency platforms, and money service businesses with transaction volumes justifying sophisticated AML compliance.

Primary Buyer Persona: Chief Compliance Officer / MLRO (Money Laundering Reporting Officer) responsible for designing enterprise AML compliance programs, managing transaction monitoring operations, reducing false positive alert rates while maintaining compliance, and demonstrating explainable AI decisions to regulators and boards.

Key Differentiators:

Napier AI Plays: Intelligence-Driven Outreach

These messages are ordered by quality score. The highest-scoring plays demonstrate the strongest combination of specificity, data defensibility, and recipient value.

PVP Public + Internal Strong (9.4/10)

Wallet Addresses Flagged in OFAC Advisories

What's the play?

Cross-reference crypto exchange's publicly visible blockchain wallet addresses against OFAC sanctions lists and 2024 crypto advisories to identify sanctioned entity patterns active on their platform that weren't covered in their prior FinCEN enforcement settlement.

Why this works

You're delivering actionable intelligence that directly prevents future enforcement actions. The specificity of wallet clusters and OFAC advisory references proves you've done real investigative work. This helps them protect their customers from sanctioned counterparties - immediate compliance value whether they buy or not.

Data Sources
  1. Blockchain transaction data (public) - wallet addresses associated with the exchange
  2. OFAC sanctions lists and crypto advisories (public)
  3. FinCEN enforcement settlement documents (public)

The message:

Subject: Your wallet addresses flagged in 4 OFAC advisories Cross-referenced your platform's active wallet addresses against OFAC's 2024 crypto advisories - 4 wallet clusters on your platform match sanctioned entity patterns. These weren't in the FinCEN settlement but create ongoing sanctions risk. Want the wallet list and OFAC advisory references?
DATA REQUIREMENT

This play requires ability to monitor publicly visible blockchain transactions associated with the exchange, cross-referenced with OFAC sanctions lists and advisories.

The synthesis of blockchain data with sanctions patterns is the proprietary insight - competitors cannot easily replicate this analysis.
PVP Internal Data Strong (9.3/10)

Unresolved MRAs vs Examiner Re-Test Patterns

What's the play?

Use aggregated BSA examination data from Napier's customer base to show banks with unresolved MRAs (Matters Requiring Attention) how examiners re-test MRA resolution in follow-up exams, and identify root causes the bank's current remediation efforts haven't addressed.

Why this works

You're revealing examiner behavior patterns they can't see - 89% re-test rate creates real urgency. Showing that their threshold changes only addressed 1 of 2 root causes gives them actionable intelligence to pass their next exam. This directly helps them avoid MRA escalation to enforcement actions.

Data Sources
  1. Napier internal examination pattern analysis - examiner testing behaviors across 45+ BSA exams
  2. Public BSA/AML examination guidance (OCC, NCUA, Fed)

The message:

Subject: Your unresolved MRAs vs examiner lookup patterns Analyzed the 2 MRAs from your last exam against 45 recent BSA exams with similar findings - examiners re-test MRA resolution in 89% of follow-up exams. Your threshold changes address only 1 of the 2 original MRA root causes. Want the examiner re-test pattern analysis?
DATA REQUIREMENT

This play requires aggregated examination pattern data from Napier's customer base, analyzing examiner testing behaviors and MRA resolution effectiveness across multiple bank implementations.

This is proprietary intelligence only Napier has - competitors cannot replicate this examiner behavior analysis without the same customer base.
PVP Public + Internal Strong (9.1/10)

State-by-State Remediation Gap Analysis

What's the play?

Map the crypto exchange's FinCEN consent order remediation commitments against state-level Travel Rule requirement updates that occurred after their federal settlement, identifying specific compliance gaps where state requirements now exceed federal commitments.

Why this works

You've done actual work FOR them - 23 specific gaps is concrete and actionable. State-by-state breakdown would be immediately useful to their compliance team. The low-commitment ask ("Want the gap analysis?") makes it easy to say yes. This protects them from state-level enforcement they didn't anticipate.

Data Sources
  1. FinCEN enforcement settlement documents - specific Travel Rule remediation commitments
  2. State banking regulator guidance - Travel Rule updates by jurisdiction (12 states)

The message:

Subject: Gap analysis: your remediation vs 12 state updates I mapped your FinCEN remediation commitments against the 12 states that updated Travel Rule requirements since your settlement. Found 23 specific gaps where state requirements exceed your federal commitments. Want the state-by-state gap analysis?
DATA REQUIREMENT

This play requires access to the exchange's FinCEN consent order details, synthesized with state-level regulatory updates from 12 jurisdictions.

The gap analysis synthesis is proprietary work - showing exactly which state requirements create new obligations beyond federal remediation.
PVP Internal Data Strong (8.9/10)

Peer Alert Rate Benchmarks

What's the play?

Use aggregated transaction monitoring data from Napier customers to show banks with declining regulatory exam trajectories how their alert rates compare to peer institutions with similar asset size, and correlate high alert rates to MRA findings.

Why this works

Specific comparison with actual peer group makes this credible. 340% higher alert rate is a shocking number that demands attention. The correlation to MRA findings (73%) provides valuable context for why this matters. Easy to say yes to receiving the benchmark breakdown.

Data Sources
  1. Napier internal transaction monitoring metrics - alert rates by institution size and type across 8+ bank customers
  2. Public BSA examination reports (OCC, NCUA) - MRA findings correlation

The message:

Subject: Peer comparison: your alert rate vs 8 similar banks Pulled transaction monitoring data for 8 banks with your asset size and exam trajectory - your alert rate is 340% higher than the median. High alert rates correlate with MRA findings in 73% of declining-trajectory banks. Want the peer benchmark breakdown?
DATA REQUIREMENT

This play requires aggregated transaction monitoring alert rate data across multiple bank clients with similar characteristics (asset size, exam trajectory).

This is proprietary benchmark data only Napier has - competitors cannot replicate these peer comparisons without the same customer base.
PQS Public + Internal Strong (8.8/10)

Unresolved MRAs Heading into Follow-Up Exam

What's the play?

Target banks with unresolved Matters Requiring Attention (MRAs) from prior BSA/AML exams who have follow-up regulatory exams scheduled within 90 days, focusing on institutions with transaction monitoring threshold-related MRAs.

Why this works

You know their specific MRA details and exam timing - that level of specificity proves you've done research. The 90-day window creates genuine urgency. Threshold stress-testing is actionable and specific. Easy yes/no response makes it frictionless to engage.

Data Sources
  1. Prior BSA/AML examination reports - MRA details (internal or FOIA-requested)
  2. Regulatory exam scheduling information (internal or industry contacts)

The message:

Subject: 2 MRAs unresolved heading into Q2 exam Your last BSA exam left 2 Matters Requiring Attention open - both related to transaction monitoring thresholds. Your Q2 2025 exam is 90 days out and unresolved MRAs trigger heightened scrutiny. Is someone stress-testing your threshold changes before the exam?
DATA REQUIREMENT

This play requires access to prior BSA/AML examination reports with MRA details and regulatory exam scheduling information.

Exam reports may be obtained through FOIA requests, industry contacts, or shared by prospects during sales conversations.
PQS Public + Internal Strong (8.7/10)

Travel Rule Compliance Gaps Post-FinCEN Settlement

What's the play?

Target crypto exchanges with recent FinCEN enforcement settlements that included Travel Rule deficiencies, who operate in states that strengthened Travel Rule enforcement after their settlement date, creating new compliance gaps their remediation plans don't address.

Why this works

Extremely specific - you know their exact enforcement action and timing. The state requirement changes are real events they might have missed. This identifies a genuine compliance gap that needs addressing. Question is easy to route to the right person.

Data Sources
  1. FinCEN Enforcement Actions and News Releases - settlement details and Travel Rule deficiencies
  2. State banking regulator guidance - Travel Rule enforcement updates by state
  3. FinCEN MSB Registrant Search - states of operation

The message:

Subject: Your Travel Rule compliance gaps post-FinCEN settlement Your FinCEN settlement from March 2024 included Travel Rule deficiencies - but 8 states you operate in strengthened their Travel Rule enforcement in Q4 2024. Your remediation plan predates these new state requirements. Who's reconciling the state-level gaps against your FinCEN commitments?
DATA REQUIREMENT

This play assumes access to the company's FinCEN settlement documents or consent orders detailing specific Travel Rule deficiencies, combined with public state regulatory updates.

Settlement documents may be obtained through public FOIA requests or published enforcement actions.
PQS Public + Internal Strong (8.6/10)

CRA Rating Decline Pre-BSA Exam

What's the play?

Target banks whose CRA (Community Reinvestment Act) performance evaluation ratings declined from Outstanding to Satisfactory or lower, correlating this decline with increased probability of MRA findings in subsequent BSA/AML examinations.

Why this works

Specific to their actual CRA rating change. The correlation between CRA and BSA findings is non-obvious and valuable intelligence they wouldn't have known. This helps them prepare for their upcoming BSA exam. Easy routing question.

Data Sources
  1. FFIEC CRA performance evaluation database - rating changes by institution
  2. Regulatory examination trend analysis (internal or industry research)

The message:

Subject: Your CRA rating dropped from Outstanding to Satisfactory Your CRA performance evaluation declined from Outstanding to Satisfactory in your June 2024 exam. Banks with declining CRA trajectories see 3x higher probability of MRA findings in subsequent BSA/AML exams. Who's connecting your CRA decline to BSA audit prep?
DATA REQUIREMENT

This play requires access to the bank's CRA performance evaluation results, combined with regulatory examination trend analysis showing correlation between CRA declines and BSA findings.

CRA evaluations are public; the correlation analysis is proprietary research Napier can develop from regulatory examination pattern data.
PQS Public + Internal Strong (8.4/10)

SAR Filing Patterns Match Binance Settlement

What's the play?

Target crypto exchanges under post-enforcement monitoring whose internal audit reports show SAR filing patterns matching deficiencies cited in major enforcement actions like Binance's $4.3B settlement, which FinCEN is using as the new enforcement baseline.

Why this works

You've read their actual audit report - that's concerning and impressive to the recipient. The Binance comparison is highly relevant given their post-enforcement status. This signals they're still at risk of escalated enforcement. Easy yes/no question makes it frictionless to respond.

Data Sources
  1. Internal audit reports or regulatory examination findings (internal or shared during sales process)
  2. Binance enforcement settlement details - public FinCEN documents
  3. FinCEN Enforcement Actions database

The message:

Subject: 3 SAR filing patterns flagged in your audit Your Q3 2024 audit report shows 3 SAR filing patterns that match the deficiencies cited in Binance's $4.3B settlement. FinCEN is using Binance as the new enforcement baseline for crypto exchanges. Is your remediation team aware of the Binance comparison?
DATA REQUIREMENT

This play assumes access to internal audit reports or regulatory examination findings, cross-referenced with public Binance settlement details.

Audit reports may be shared during sales conversations or obtained through compliance officer relationships.

What Changes

Old way: Spray generic messages at job titles. Hope someone replies.

New way: Use public data to find companies in specific painful situations. Then mirror that situation back to them with evidence.

Why this works: When you lead with "Your FinCEN settlement from March 2024 included Travel Rule deficiencies - 8 states you operate in strengthened enforcement in Q4 2024" instead of "I see you're hiring for compliance roles," you're not another sales email. You're the person who did the homework.

The messages above aren't templates. They're examples of what happens when you combine real data sources with specific situations. Your team can replicate this using the data recipes in each play.

Data Sources Reference

Every play traces back to verifiable data. Here are the sources used in this playbook:

Source Key Fields Used For
OCC Enforcement Actions Database institution_name, enforcement_action_type, subject_matter, effective_date Identifying banks under AML/BSA enforcement
NCUA Administrative Orders credit_union_name, enforcement_action_type, violation_type, order_date Identifying credit unions with AML compliance issues
FinCEN MSB Registrant Search legal_name, msb_activities, states_of_operation, number_of_branches Finding money service businesses and crypto exchanges
FinCEN Enforcement Actions entity_name, violation_type, penalty_amount, enforcement_date Tracking AML/BSA/sanctions enforcement across financial institutions
FINRA Disciplinary Actions case_number, firm_name, action_date, violation_type Finding broker-dealers with AML/compliance violations
SEC IAPD adviser_name, assets_under_management, disciplinary_disclosures Identifying RIAs with client screening gaps
Federal Reserve Enforcement Actions institution_name, enforcement_action_type, violation_category Tracking multi-regulator enforcement patterns
FDIC Enforcement Decisions institution_name, order_type, violation_type, effective_date Finding state-chartered banks under enforcement
OFAC Sanctions Lists & Crypto Advisories sanctioned_entity, wallet_addresses, advisory_date Identifying crypto platforms with sanctions exposure
Blockchain Transaction Data (Public) wallet_addresses, transaction_patterns Monitoring crypto exchange compliance risks
State Banking Regulator Guidance jurisdiction, regulatory_requirement, effective_date Tracking state-level Travel Rule changes
FFIEC CRA Performance Evaluations institution_name, rating, evaluation_date Correlating CRA declines with BSA exam risk
Napier Internal Examination Pattern Data examiner_behavior, MRA_resolution_patterns, re-test_frequency Predicting examiner focus areas in follow-up exams
Napier Internal Alert Rate Benchmarks institution_type, asset_size, alert_rate_percentile Peer-to-peer compliance performance comparison