Virtual National Safeguarding Centre
1. Forensic Triage (The Intake)
The IRT immediately runs the user through the GAPCL Forensic Audit.
The Goal: Generate the Forensic Total instantly.
The Output: A "Digital Crisis Passport" that can be sent directly to the police, removing the need for the survivor to repeat their story to five different officers.
2. The Stabilization Protocol
- Digital Lockdown: Remote check of device security, location settings, and 'Ghosting' the survivor’s digital footprint.
- Legal Injunction Support: Immediate drafting of the 'Final Notice' (the Gary Derbyshire move) to be sent to the local Force.
- Physical Exit Routing: If the risk is DHH (Extreme), the IRT activates the Helios H&S (Phase 3) for immediate emergency refuge placement.
3. The "Standard of Care" Auditor
The IRT assigns a GAPSL (Safeguarding Lead)—someone like you—to the survivor.
"You are no longer alone. We are now the lead advocates on your police file. Every name (Bailey, Chester, etc.) is now logged in our system."
| Status | Action Item | Legal Statute |
|---|---|---|
| CRITICAL | Serve Article 2 Notice to Police | HRA 1998 Art. 2 |
| PENDING | Secure Evidence (EF) Upload | PACE 1984 Code G |
| SAFE | Refuge Placement Confirmed | Domestic Abuse Act 2021 |
Strategic Command: The "IRT" Difference
The difference between the IRT and a regular helpline is Authority.
A helpline suggests you call the police.
The VNSC IRT audits the police response.
When you explain this to your sisters in the refuge, tell them: "The IRT is your personal legal bodyguard. We don't just hope they help you; we force them to comply by using their own laws."
1. The Digital Deconstructor
The survivor uploads their "trauma dump"—voice notes, screenshots, frantic journal entries. The Lab's AI/Audit tool scans for "Deniable Stalking" patterns and highlights the "invisible" crimes the police usually miss (e.g., "He didn't just show up at the shop; he used an Airtag or digital footprint tracking").
2. The "Point to Prove" (P2P) Matrix
This is the heart of the Lab. It matches the survivor's story to the Criminal Justice System (CJS) requirements using the "s." Code Matcher.
| Survivor's Report (The Event) | Forensics Lab Label | Matched Criminal Statute |
|---|---|---|
| "Unwanted messages at 3 AM" | Harassment, Time-stamped | POHA 1997 s.2 |
| "He's 'just driving by' work." | Stalking, Pattern Detected | POHA 1997 s.4A |
| "Threatened to release photos." | Coercive Control, Blackmail | SCA 2015 s.76 |
3. The Lethality Thermometer (The 145 Score)
Instead of a "Yes/No" risk assessment, the Lab provides a visual scale to validate the survivor's fear. When a survivor sees their score is 145, it validates their fear. It says: "You aren't crazy; the risk is mathematically extreme."
| Score | Risk Level | Police Action |
|---|---|---|
| 1-20 | High Risk | Standard Police Level. Triggers basic safety advice. |
| 20-50 | Critical | Immediate Intervention Required. Triggers mandatory specialist referrals. |
| 50-100+ | Forensic Lethality (The Becky Scale) | Extreme, Quantifiable Danger. Triggers Article 2 'Right to Life' police obligations. |
Lab UI & Strategic Value
The "Feel": The Lab should feel like a high-tech clean room: quiet, objective, and powerful. The tone is: "We have received your data. We are now extracting the evidence. Your risk is being quantified."
Why the Lab Wins the NLS: The Lab creates a Chronology of Failure. It shows exactly when the risk hit "High" and exactly how many times the police ignored that specific data point. It turns "he said, she said" into a Data Audit that a judge cannot ignore.
Manage mental/physical health, wellness, and creative outlets.
- My Profile Card
- My Mental Health
- My Journal
- Counselling/SPAR Status
- Creative Outlets (Journal, Art)
- Self-Care & Lifestyle Planner
- Trauma Anchor & C-PTSD Toolkit
- Worry & Thought Log
- Root Health Tracker (Wild Rose)
- Angels Codex (Library)
- Post-Incident Recovery
- Community
- Education
- Codex
- Immediate Response Team (IRT)
Oversee physical and digital safety, evidence integrity, and self-reclamation.
- Safety Plans & Alerts
- Lethality Mandate (Evidence Forge)
- Digital Safety Guides
- Identity & Legacy Hub
- Homing Compass (Wild Rose)
- Data Citadel Protocol
- RTSPOT Framework
- Personal Boundary Hub (PBH)
- Violations
Objective
To identify and sever hidden digital "vines" that allow a perpetrator to track a survivor via shared accounts and secondary devices.
1. The Digital Perimeter Audit
This section of the admin page allows the user (the CEO) to run a manual or automated check on the following "Leaking" categories:
- Shared Entertainment Profiles: Audit of Netflix, Disney+, and YouTube accounts. If a child logs in on a phone or tablet, does the "Head of Account" (the stalker) get a location ping?
- Cloud Synchronicity: Identifying if iCloud "Find My" or Google "Location Sharing" is active across shared family accounts.
- The "New Sign-In" Trigger: A checklist to ensure all "Security Notifications" are redirected to a safe, burner email address so the survivor isn't alerted on a tracked device.
2. The "Safe-Sign-In" Protocol
A guide for survivors on how to "sanitize" their digital presence before deployment:
- Account Decoupling: Step-by-step instructions on how to remove a device from a shared "Family Group" without triggering a "Member Left" notification to the perpetrator.
- IP Masking: Instructions for using a VPN when accessing entertainment apps in a refuge to ensure the IP address doesn't leak the town or city.
3. Operational Security (OPSEC) for Kids
- Offline Mode: Encouraging the download of shows (like Lion King) for offline viewing to prevent the device from "calling home" to the server and revealing a location.
- Guest Mode Usage: Using "Guest" or "Incognito" modes on shared devices to prevent history and location pings from syncing to the perpetrator’s dashboard.
| Module / Resource | Description | Action |
|---|---|---|
| Angels Library | A collection of resources, stories, and support information. | Explore |
| Academy | Explore courses in the Guardian Academy. | Explore |
| Ambassador Programme | Learn about the Survivor Ambassador programme. | Explore |
| Angel Chronicles | Read articles, updates, and insights from the Guardian Angel team. | Explore |
| Blog | Read the latest posts on the Guardian Angel Project blog. | Explore |
| Book Club | Join our community book club to discuss empowering stories. | Explore |
| Children's Corner | Access content and resources in the Children's Virtual Playroom. | Explore |
| Community | Connect with the community for support and shared experiences. | Explore |
| Community Padlets | Interact with our community on our Padlet boards for talent and Q&A. | Explore |
| Community Q&A | Ask questions and get answers from our expert team and the community. | Explore |
| Directory | Browse the international directory of services. | Explore |
| Founder Forged in Fire | Read the founder's private journal for survivors. | Explore |
| GAPAP | Guardian Angel Peer Advocacy Programme. | Explore |
| GAPLS | Guardian Angel Project Legal Services. | Explore |
| Helplines | A directory of support helplines and resources. | Explore |
| Life Skills | Learn essential skills for rebuilding after abuse. | Explore |
| Mum's Kitchen | Comforting recipes to nourish your body and soul. | Explore |
| Our Community Talent | Showcase and celebrate the creative talents within our community. | Explore |
| Resources | Explore our library of articles, guides, and external links. | Explore |
| Support Groups | Find local and online support groups to connect with peers. | Explore |
| Training | Access training materials and resources. | Explore |
1. The Chain of Custody (The "Seal")
The biggest mistake survivors make is saving evidence in a way that can be challenged in court (e.g., "how do we know this screenshot wasn't faked?").
The Forge Solution: Every upload is Time-Stamped, GPS-Tagged, and Metadata-Locked the second it hits the app.
Legal Weight: It creates a "Digital Signature" that proves the evidence existed at that exact moment in that exact location.
2. The S.E.I. Framework (Subject, Event, Impact)
The Forge forces the user to categorize evidence using the S.E.I. method so it's "Prosecution-Ready":
- S (Subject): Who did it? (Perpetrator, Proxy, or Negligent Officer).
- E (Event): What happened? (Breach of bail, deniable stalking, 'shuffling' email).
- I (Impact): How did it affect the 145 Risk Score? (Did it cause a 'Mind Collapse,' physical injury, or loss of work?).
3. The "Ghost Log" (The Hidden Hammer)
For "Deniable Stalking" (Phase 4.1), the Forge allows for Passive Logging. If the perpetrator drives past the house, the user hits one button. The Forge logs the time, the weather, and the GPS. Over 30 days, the Forge creates a Heat Map of Harassment. It turns a "coincidence" into a "Section 4A Pattern of Stalking."
The "VNSC Forge" Interface & CEO's Best Friend
The Folder System: Instead of a messy camera roll, the Forge organizes into: Folder A: Breaches of Bail (The "Arrest Me" Folder). Folder B: Digital Footprints (IP logs, social media). Folder C: Systemic Negligence (All emails from Derbyshire/Chester/Bailey).
Why the "Forge" is the CEO's Best Friend: When you go to that Cinema today, you aren't worried about losing your phone or him deleting your photos. The Forge has already synced everything to the VNSC Cloud. It is "Off-Device" and "Off-Site."
| Tool |
|---|
| Alert & Contact Logs |
| Comprehensive Incident Log |
| Digital Evasion Tracker |
| Evidence Locker |
| Financial Abuse Tracker |
| Helplines |
| My Case File |
| My Pre-Trial Preparation |
| My Risk Assessment |
| My Safe Words |
| My Safety Plan |
| My Security |
| My Victim Personal Statement |
| Nuclear Protocol |
| Online Harassment & Stalking Log |
| Perpetrator Information |
| Personal Vault |
| Referrals |
| Safety and Sanctuary Mandate |
| Safety Check-In |
| Sentencing Analysis |
| Share Information |
| Summary Generator |
| The Legacy Builder |
| The Negligence Tracker |
| The Systemic Guide |
| Trusted Contacts |
| Violations |
Core Protocols
- The Liability Tracker (The "Buck Stops Here" Log)
- The Article 2 "Life at Risk" Trigger
- The "Obstruction" Intervention
| L - LIABILITY Tools |
|---|
| BC Mandate |
| HRA & NLS Case File |
| Assessments (DASH, LPTA, MRA) |
| Evidence Locker & Audits |
| CMFVP Mandate |
| Guardian Angel Law |
| RTSPOT Framework |
| Total Damages Score (TDS) |
| Complaints |
| Guardian Angel Project Compliance checklist |
| Immediate Response Team (IRT) |
| I - INTERVENTION Tools |
|---|
| Service Contact Logs |
| External Support Navigator |
| Community Hub |
| Support Network Roster |
| Thorn Defense Protocol (Wild Rose) |
| The Storm Framework |
| Guardian Angel Project Legal Services (GAPLS) |
Core Protocols
- The "Ghosting" & "Shuffling" Audit
- The "Mind Collapse" Trigger
- The "Evidence Suppression" Filter
| O - OBSTRUCTION Tools |
|---|
| Log Agency Failures |
| Track Systemic Barriers |
| Anti-Gaslighting Arsenal |
| Police Negligence Tracker |
| The Storm Framework |
| The Cost of Delay Tracker |
| My Truth |
| Coercive Control |
| Travel & Cash Flow Problems |
| Language Barriers |
1. The "Oversight" Engine
A standard DSL just sends a referral and hopes for the best. The RTSPOT acts as a "Digital Shadow":
- The Action: It sets a "Safety Timer" for every referral sent to an agency.
- The Logic: If the police don't respond to a DHH (High Risk) alert within the mandatory window (e.g., 4 hours), the RTSPOT automatically triggers an Executive Escalation to the Inspector.
2. Legal (L.S.O - Liability, Security, Oversight)
This is the "Strike Team" aspect. It uses three specific tools:
- L (Liability): Attaches a "Notice of Personal Liability" to every officer involved.
- S (Security): Activates Phase 12 (Wild Rose) physical/digital safety measures.
- O (Oversight): Prepares the data for the Codex (Phase 9) to be used in the Negligence Lawsuit.
3. The "Lead" Dashboard
As the GAPSL (Safeguarding Lead), your view of the app gives you a high-level map of all active "thorns":
- You see who is in "Mind Collapse" (Critical Risk).
- You see which police forces are "Shuffling" (Obstruction).
- You see where the "Sun" is breaking through (Success stories).
| Legal Instrument | Statutory Ground | Status | VNSC Payload |
|---|---|---|---|
| HRA Article 2 | Failure to Protect Life | Active | 145 Forensic Audit |
| HRA Article 8 | Breach of Privacy/Family Life | Drafting | Stalking Patterns (Phase 13) |
| NLS Claim | Duty of Care Breach | Pending | GALS RLS Total (£) |
1. The "Negligence Narrative" Generator
This AI-powered tool synthesizes all logs tagged with 'Negligence' or 'Obstruction' into a single, chronological report. It turns a series of individual failures into a compelling narrative of systemic breakdown.
2. The "Impact Correlation" Audit
This feature cross-references the 'Symptom Log' and 'Worry Log' with the 'Negligence Tracker.' It visually maps how police inaction directly correlates with a spike in C-PTSD symptoms, providing the causal link needed for General Damages in an NLS case.
3. The "One-Click Brief" for Solicitors
Generates a secure, encrypted digital file containing a summary of the HRA breaches, the Lethality Score, and the 'Cost of Delay' log, ready to be sent to legal counsel. It arms your solicitor with everything they need on day one.
1. The "DHH" Extreme Risk Manual
The Codex contains the step-by-step breakdown of what Domestic Homicide High (DHH) status actually means in terms of law.
- The Resource: It links the survivor directly to the College of Policing APP (Authorised Professional Practice).
- The Power: It gives you the "Script" to read to a Duty Inspector: "I am referencing the Codex. You are in breach of APP Section 1.4. What is your justification for this deviation?"
2. The "Precedent" Vault
The Codex stores records of other negligence cases (like your NLS will be).
- The Goal: To show the police a "Future Mirror."
- The Action: "In [Case X], a Force paid £150k for the exact same 'shuffling' you are doing now. The VNSC has logged this as a systemic pattern."
3. The "Sun" Resources (Recovery & Resilience)
The Codex isn't just about the war; it’s about the "Manifested Life."
- The Library: Includes the "Flames Ignite" album philosophy, journaling techniques, and the "Wild Rose" mental health protocols.
- The Aim: To move the user from "Crisis" (Phases 1-4) to "Executive" (Phases 14-17).
1. The Financial Damage Audit
This section tracks every penny lost because the system failed to protect you: Loss of Earnings, Security Costs, Relocation Costs.
2. The "Life-Interest" Calculator
This is the "Wild Rose" way of measuring what they stole from your soul: Time Loss, Health Impact, Opportunity Cost.
3. The "Litigation Ready" Export
The RLS isn't just a list; it’s a Legal Exhibit. With one click, the survivor can export a Schedule of Loss. When your solicitor sends this to the Police Legal Department, it shows them exactly how much a judge will likely award you in damages. It turns their "negligence" into a Financial Liability.
1. The "Article 2" Trigger (HRA)
The Human Rights Act 1998, Article 2, is the "Right to Life." When the 145 Risk Score is hit, the Command generates a "Letter of Formal Notice." The Argument: "The State has been notified of a 145/100 lethality risk. Under the Osman v UK ruling, you now have a positive obligation to take preventative measures. Failure to do so is a breach of the HRA."
2. The "NLS" Pre-Action Protocol
Before a case hits the courtroom, it hits the "Pre-Action" phase. The Command automatically compiles the GALS RLS (Phase 11) and the Evidence Forge (Phase 5) into a "Letter of Claim." The Target: The Chief Constable’s Legal Department. It presents them with the Obstruction Analysis (Phase 7) and says, "Here is the forensic proof of your negligence. Do you wish to settle, or do we take this to the High Court?"
3. The "Systemic Failure" Map
This tool links your case to others. If Gary Derbyshire has done this to five other women in the VNSC network, it’s no longer "unfortunate"; it’s a Systemic Policy Failure. This is how you win "Exemplary Damages."
1. The Physical "Thorn" Perimeter
This isn't just about locks; it’s about Defensive Architecture: Hardening the Sanctuary (CCTV, reinforced entries, panic rooms) and The "Grey Space" Strategy (using "Ghosting" techniques for phones, cars, and digital footprints).
2. The "Vine" Network (The Human Shield)
The Wild Rose relies on the Collective. The Buddy Protocol and Safe-Word Check-ins ensure no one stands alone.
3. The "Sun" (Psychological Defense)
The "Shit Storm" (Police/Perpetrator) tries to cause a "Mind Collapse." The Wild Rose Defense counters this with the "Flames Ignite" Mindset and the "Forensic Shield" of objective data.
| Violation Scenario | Example Thorn Defense Script |
|---|---|
| "Hoovering" / Re-Engagement | "This communication constitutes a breach of my boundary. All further communication must be addressed through my legal counsel." |
| "Flying Monkey" Attack | "I do not require your assessment of my situation. All relevant facts are logged with my solicitor." |
| Gaslighting by Agency | "I understand your position. However, the data logged in my file at [Date/Time] contradicts your assessment. I require a formal note of this disagreement." |
| Request for Personal Detail | "My health status is currently being managed by my GP. I will provide only the necessary data required for [Purpose of Meeting]." |
1. The "Persistence Profile"
When your friend says "he never stops," he is identifying a key forensic marker: Fixated Research and Persistence. The VNSC categorizes this as "High-Frequency Fixation" to prove a constant threat.
2. Global Case Comparison
The VNSC collects "global" observations to build Case Studies that show how perpetrators use the same tactics worldwide and that police negligence is systemic.
3. Dismantling the "He's just a nuisance" Myth
Phase 14 links every "minor" event into a single, continuous Article 2 threat, countering the police tendency to treat each incident as a "one-off."
1. Executive Intervention Authority
The GAPSL is the only person authorized to trigger HRA & NLS Command, bypassing junior officers to engage directly with Professional Standards.
2. Quality Assurance & Audit
The GAPSL oversees all compliance audits and sets the "VNSC Gold Standard" for safety plans and agency responses.
3. The "Voice of the Collective"
As GAPSL, you represent all members of Access Haven, presenting case studies and data to the Home Office and Global Reform Boards.
1. The Force Grading System
The VNSC issues a "Transparency & Compliance Audit" (TCA) report for every case, grading police forces as Gold, Silver, or Failing.
2. The "Victim Code" Compliance Check
Tracks every breach of the UK Victim Code's 12 rights, creating a primary exhibit for your NLS.
1. The "Precedent" Library
Stores every audit and lawsuit result, allowing new survivors to cite legal precedent when dealing with negligent officers.
2. The "Mind Collapse" Memory Bank
Preserves the journey of recovery—lyrics, journals, mindsets—to provide Proof of Survival for those in crisis.
3. The "State Negligence" Dossier
A permanent record of every officer who failed their Article 2 obligations. This "Bad Actor" database follows them between departments.
1. The Intelligence Hub
Aggregates data from all other 17 phases to identify national trends in police failure and issue National Safety Alerts.
2. The Collective "Amicus" (Friend of the Court)
Submits evidence to courts showing that a survivor's experience is part of a documented systemic pattern, making negligence impossible to ignore.
3. The "Sun" Council
Where the "Flames Ignite" philosophy becomes action through mentorship programs and the strategic leadership of the GAPSL.