The evidence of police involvement in these scandals extends beyond negligence to active participation. Survivors report horrific behaviour by serving police officers. The scope of institutional failure is documented in multiple investigations:
Law enforcement plays a critical role in acting on intelligence from victims. However, because these reports may involve protected journalistic sources or information that must be handled under strict evidential rules, we verify every request to ensure it is necessary, proportionate, and made by an authorised officer. You should include whether it is a live or historical investigation, the urgency of the request (inc. deadline), and whether you require real-time ongoing data.
Police officers must be of Superintendent rank or above. Officers below Superintendent rank must provide Superintendent contact details to verify the request first.
The Restorationist staff includes several former intelligence officers who are familiar with sources/methods protocols. You do not have to provide extended information, case officer details, or privileged investigatory data as long as we can verify you are an employee of the security services involved in an ongoing criminal investigation.
This platform operates under US jurisdiction through a California-based entity with established legal protections for journalistic and whistleblowing activities. All data is stored encrypted on secure infrastructure within United States jurisdiction and is protected under the First Amendment to the US Constitution. No infrastructure, messaging, or data storage is held under UK jurisdiction whatsoever.
Whilst we operate under US law, we maintain full compliance with UK-US mutual legal assistance treaties (MLATs) and established diplomatic channels for international law enforcement cooperation. We are subject to different procedural requirements that provide additional protections for sources and whistleblowers.
For genuine emergencies involving imminent threat to life or ongoing child abuse, we maintain fast-track procedures with 24/7 contact capabilities. Our automated systems flag submissions indicating immediate danger, and we will proactively contact appropriate authorities when child protection concerns are identified. Email [email protected].
All emergency disclosures follow established protocols ensuring proper chain of custody, evidential integrity, and compliance with both US and UK legal requirements for urgent law enforcement cooperation.
Access is only granted where it meets a lawful basis under UK GDPR, including:
Every request is subject to identity and role verification. False statements or fraudulent applications will be reported under the Fraud Act 2006 and may be treated as obtaining services dishonestly.
All access is logged and may be audited. Breaches can result in access withdrawal, referral to regulators, and potential civil or criminal action under: