For Police & Intelligence Officers

Key Points

  • We will help honourable officers.
  • Many of your colleagues are bent and want access to victim intelligence.
  • Submissions are encrypted and protected under the US First Amendment.
  • Verification of your identity, accountability, and lawful authority is non-negotiable.
  • Targeted access only. No fishing expeditions.

You Have A Trust Problem

The evidence of police involvement in these scandals extends beyond negligence to active participation. Survivors report horrific behaviour by serving police officers. The scope of institutional failure is documented in multiple investigations:

Authentication Requirements

Law enforcement plays a critical role in acting on intelligence from victims. However, because these reports may involve protected journalistic sources or information that must be handled under strict evidential rules, we verify every request to ensure it is necessary, proportionate, and made by an authorised officer. You should include whether it is a live or historical investigation, the urgency of the request (inc. deadline), and whether you require real-time ongoing data.

Police officers must be of Superintendent rank or above. Officers below Superintendent rank must provide Superintendent contact details to verify the request first.

  • Use [email protected]: senior supervisors and barrister access only
  • Provide your warrant card number or equivalent ID, division, and superintendent
  • Submit the request via your official force or agency email address
  • Expect a phone call to your switchboard and contact with your Superintendent to verify you are who you say you are
  • In certain cases, a written request on headed paper or through a secure channel (PNC, HOLMES, or CJSM) will be required

Intelligence Officers - Special Requirements

The Restorationist staff includes several former intelligence officers who are familiar with sources/methods protocols. You do not have to provide extended information, case officer details, or privileged investigatory data as long as we can verify you are an employee of the security services involved in an ongoing criminal investigation.

  • Use the police channel whenever possible
  • Use [email protected]: cleared for supervision by a single contact only
  • Submit the request via your official government email address
  • Provide an authentication procedure, or switchboard/extension number to call and verify
  • Provide your pseudonym, clearance/withholding, and department
  • Specify target name clearly with cryptonym if required

Your Responsibilities

Legal Framework & US First Amendment Protection

This platform operates under US jurisdiction through a California-based entity with established legal protections for journalistic and whistleblowing activities. All data is stored encrypted on secure infrastructure within United States jurisdiction and is protected under the First Amendment to the US Constitution. No infrastructure, messaging, or data storage is held under UK jurisdiction whatsoever.

Whilst we operate under US law, we maintain full compliance with UK-US mutual legal assistance treaties (MLATs) and established diplomatic channels for international law enforcement cooperation. We are subject to different procedural requirements that provide additional protections for sources and whistleblowers.

Emergency & Safeguarding Procedures

For genuine emergencies involving imminent threat to life or ongoing child abuse, we maintain fast-track procedures with 24/7 contact capabilities. Our automated systems flag submissions indicating immediate danger, and we will proactively contact appropriate authorities when child protection concerns are identified. Email [email protected].

All emergency disclosures follow established protocols ensuring proper chain of custody, evidential integrity, and compliance with both US and UK legal requirements for urgent law enforcement cooperation.

Access Criteria & Lawful Basis

Access is only granted where it meets a lawful basis under UK GDPR, including:

Verification

Every request is subject to identity and role verification. False statements or fraudulent applications will be reported under the Fraud Act 2006 and may be treated as obtaining services dishonestly.

Restrictions on Use

  • No personal or political use.
  • No disclosure outside your professional duties.
  • No actions that could endanger whistleblowers or victims.
  • No use in breach of contempt, privacy, or defamation laws.

Audit & Enforcement

All access is logged and may be audited. Breaches can result in access withdrawal, referral to regulators, and potential civil or criminal action under:

"