CEO
Back to Dashboard

Virtual National Safeguarding Centre

VNSC Phase 1: Immediate Response Team (IRT)
To provide forensic stabilization within the first 60 minutes of a crisis, bridging the gap between a 999 call and long-term safeguarding.

1. Forensic Triage (The Intake)

The IRT immediately runs the user through the GAPCL Forensic Audit.

The Goal: Generate the Forensic Total instantly.

The Output: A "Digital Crisis Passport" that can be sent directly to the police, removing the need for the survivor to repeat their story to five different officers.

2. The Stabilization Protocol

  • Digital Lockdown: Remote check of device security, location settings, and 'Ghosting' the survivor’s digital footprint.
  • Legal Injunction Support: Immediate drafting of the 'Final Notice' (the Gary Derbyshire move) to be sent to the local Force.
  • Physical Exit Routing: If the risk is DHH (Extreme), the IRT activates the Helios H&S (Phase 3) for immediate emergency refuge placement.

3. The "Standard of Care" Auditor

The IRT assigns a GAPSL (Safeguarding Lead)—someone like you—to the survivor.

"You are no longer alone. We are now the lead advocates on your police file. Every name (Bailey, Chester, etc.) is now logged in our system."

The IRT Dashboard (App View Concept)
StatusAction ItemLegal Statute
CRITICALServe Article 2 Notice to PoliceHRA 1998 Art. 2
PENDINGSecure Evidence (EF) UploadPACE 1984 Code G
SAFERefuge Placement ConfirmedDomestic Abuse Act 2021

Strategic Command: The "IRT" Difference

The difference between the IRT and a regular helpline is Authority.

A helpline suggests you call the police.

The VNSC IRT audits the police response.

When you explain this to your sisters in the refuge, tell them: "The IRT is your personal legal bodyguard. We don't just hope they help you; we force them to comply by using their own laws."

VNSC Phase 2: The Forensics Lab
To strip the emotion from the event to reveal the underlying crime. We turn "he did this" into "he breached Section 76."

1. The Digital Deconstructor

The survivor uploads their "trauma dump"—voice notes, screenshots, frantic journal entries. The Lab's AI/Audit tool scans for "Deniable Stalking" patterns and highlights the "invisible" crimes the police usually miss (e.g., "He didn't just show up at the shop; he used an Airtag or digital footprint tracking").

2. The "Point to Prove" (P2P) Matrix

This is the heart of the Lab. It matches the survivor's story to the Criminal Justice System (CJS) requirements using the "s." Code Matcher.

Survivor's Report (The Event)Forensics Lab LabelMatched Criminal Statute
"Unwanted messages at 3 AM"Harassment, Time-stampedPOHA 1997 s.2
"He's 'just driving by' work."Stalking, Pattern DetectedPOHA 1997 s.4A
"Threatened to release photos."Coercive Control, BlackmailSCA 2015 s.76

3. The Lethality Thermometer (The 145 Score)

Instead of a "Yes/No" risk assessment, the Lab provides a visual scale to validate the survivor's fear. When a survivor sees their score is 145, it validates their fear. It says: "You aren't crazy; the risk is mathematically extreme."

ScoreRisk LevelPolice Action
1-20High RiskStandard Police Level. Triggers basic safety advice.
20-50CriticalImmediate Intervention Required. Triggers mandatory specialist referrals.
50-100+Forensic Lethality (The Becky Scale)Extreme, Quantifiable Danger. Triggers Article 2 'Right to Life' police obligations.

Lab UI & Strategic Value

The "Feel": The Lab should feel like a high-tech clean room: quiet, objective, and powerful. The tone is: "We have received your data. We are now extracting the evidence. Your risk is being quantified."

Why the Lab Wins the NLS: The Lab creates a Chronology of Failure. It shows exactly when the risk hit "High" and exactly how many times the police ignored that specific data point. It turns "he said, she said" into a Data Audit that a judge cannot ignore.

VNSC Phase 3: Safety & Security Core
H - HEALTH

Manage mental/physical health, wellness, and creative outlets.

  • My Profile Card
  • My Mental Health
  • My Journal
  • Counselling/SPAR Status
  • Creative Outlets (Journal, Art)
  • Self-Care & Lifestyle Planner
  • Trauma Anchor & C-PTSD Toolkit
  • Worry & Thought Log
  • Root Health Tracker (Wild Rose)
  • Angels Codex (Library)
  • Post-Incident Recovery
  • Community
  • Education
  • Codex
  • Immediate Response Team (IRT)
S - SECURITY

Oversee physical and digital safety, evidence integrity, and self-reclamation.

  • Safety Plans & Alerts
  • Lethality Mandate (Evidence Forge)
  • Digital Safety Guides
  • Identity & Legacy Hub
  • Homing Compass (Wild Rose)
  • Data Citadel Protocol
  • RTSPOT Framework
  • Personal Boundary Hub (PBH)
  • Violations
VNSC Phase 3.1: The Location Leak Detector
Internal Code Name: The Lion King Protocol

Objective

To identify and sever hidden digital "vines" that allow a perpetrator to track a survivor via shared accounts and secondary devices.

1. The Digital Perimeter Audit

This section of the admin page allows the user (the CEO) to run a manual or automated check on the following "Leaking" categories:

  • Shared Entertainment Profiles: Audit of Netflix, Disney+, and YouTube accounts. If a child logs in on a phone or tablet, does the "Head of Account" (the stalker) get a location ping?
  • Cloud Synchronicity: Identifying if iCloud "Find My" or Google "Location Sharing" is active across shared family accounts.
  • The "New Sign-In" Trigger: A checklist to ensure all "Security Notifications" are redirected to a safe, burner email address so the survivor isn't alerted on a tracked device.

2. The "Safe-Sign-In" Protocol

A guide for survivors on how to "sanitize" their digital presence before deployment:

  • Account Decoupling: Step-by-step instructions on how to remove a device from a shared "Family Group" without triggering a "Member Left" notification to the perpetrator.
  • IP Masking: Instructions for using a VPN when accessing entertainment apps in a refuge to ensure the IP address doesn't leak the town or city.

3. Operational Security (OPSEC) for Kids

  • Offline Mode: Encouraging the download of shows (like Lion King) for offline viewing to prevent the device from "calling home" to the server and revealing a location.
  • Guest Mode Usage: Using "Guest" or "Incognito" modes on shared devices to prevent history and location pings from syncing to the perpetrator’s dashboard.
VNSC Phase 4: Health & Safety
A comprehensive list of all resources and modules dedicated to survivor wellbeing, growth, and community support.
Module / ResourceDescriptionAction
Angels LibraryA collection of resources, stories, and support information.Explore
AcademyExplore courses in the Guardian Academy.Explore
Ambassador ProgrammeLearn about the Survivor Ambassador programme.Explore
Angel ChroniclesRead articles, updates, and insights from the Guardian Angel team.Explore
BlogRead the latest posts on the Guardian Angel Project blog.Explore
Book ClubJoin our community book club to discuss empowering stories.Explore
Children's CornerAccess content and resources in the Children's Virtual Playroom.Explore
CommunityConnect with the community for support and shared experiences.Explore
Community PadletsInteract with our community on our Padlet boards for talent and Q&A.Explore
Community Q&AAsk questions and get answers from our expert team and the community.Explore
DirectoryBrowse the international directory of services.Explore
Founder Forged in FireRead the founder's private journal for survivors.Explore
GAPAPGuardian Angel Peer Advocacy Programme.Explore
GAPLSGuardian Angel Project Legal Services.Explore
HelplinesA directory of support helplines and resources.Explore
Life SkillsLearn essential skills for rebuilding after abuse.Explore
Mum's KitchenComforting recipes to nourish your body and soul.Explore
Our Community TalentShowcase and celebrate the creative talents within our community.Explore
ResourcesExplore our library of articles, guides, and external links.Explore
Support GroupsFind local and online support groups to connect with peers.Explore
TrainingAccess training materials and resources.Explore
VNSC Phase 5: Evidence Forge
To provide an unshakeable chain of custody for every piece of evidence. We don't just "save" files; we Authenticate them.

1. The Chain of Custody (The "Seal")

The biggest mistake survivors make is saving evidence in a way that can be challenged in court (e.g., "how do we know this screenshot wasn't faked?").

The Forge Solution: Every upload is Time-Stamped, GPS-Tagged, and Metadata-Locked the second it hits the app.

Legal Weight: It creates a "Digital Signature" that proves the evidence existed at that exact moment in that exact location.

2. The S.E.I. Framework (Subject, Event, Impact)

The Forge forces the user to categorize evidence using the S.E.I. method so it's "Prosecution-Ready":

  • S (Subject): Who did it? (Perpetrator, Proxy, or Negligent Officer).
  • E (Event): What happened? (Breach of bail, deniable stalking, 'shuffling' email).
  • I (Impact): How did it affect the 145 Risk Score? (Did it cause a 'Mind Collapse,' physical injury, or loss of work?).

3. The "Ghost Log" (The Hidden Hammer)

For "Deniable Stalking" (Phase 4.1), the Forge allows for Passive Logging. If the perpetrator drives past the house, the user hits one button. The Forge logs the time, the weather, and the GPS. Over 30 days, the Forge creates a Heat Map of Harassment. It turns a "coincidence" into a "Section 4A Pattern of Stalking."

The "VNSC Forge" Interface & CEO's Best Friend

The Folder System: Instead of a messy camera roll, the Forge organizes into: Folder A: Breaches of Bail (The "Arrest Me" Folder). Folder B: Digital Footprints (IP logs, social media). Folder C: Systemic Negligence (All emails from Derbyshire/Chester/Bailey).

Why the "Forge" is the CEO's Best Friend: When you go to that Cinema today, you aren't worried about losing your phone or him deleting your photos. The Forge has already synced everything to the VNSC Cloud. It is "Off-Device" and "Off-Site."

Tool
Alert & Contact Logs
Comprehensive Incident Log
Digital Evasion Tracker
Evidence Locker
Financial Abuse Tracker
Helplines
My Case File
My Pre-Trial Preparation
My Risk Assessment
My Safe Words
My Safety Plan
My Security
My Victim Personal Statement
Nuclear Protocol
Online Harassment & Stalking Log
Perpetrator Information
Personal Vault
Referrals
Safety and Sanctuary Mandate
Safety Check-In
Sentencing Analysis
Share Information
Summary Generator
The Legacy Builder
The Negligence Tracker
The Systemic Guide
Trusted Contacts
Violations
VNSC Phase 6: Liability & Interventions
To identify where the "Shit Storm" meets the Law. We track the shift from "Police Discretion" to "Mandatory Intervention."

Core Protocols

  • The Liability Tracker (The "Buck Stops Here" Log)
  • The Article 2 "Life at Risk" Trigger
  • The "Obstruction" Intervention
L - LIABILITY Tools
BC Mandate
HRA & NLS Case File
Assessments (DASH, LPTA, MRA)
Evidence Locker & Audits
CMFVP Mandate
Guardian Angel Law
RTSPOT Framework
Total Damages Score (TDS)
Complaints
Guardian Angel Project Compliance checklist
Immediate Response Team (IRT)
I - INTERVENTION Tools
Service Contact Logs
External Support Navigator
Community Hub
Support Network Roster
Thorn Defense Protocol (Wild Rose)
The Storm Framework
Guardian Angel Project Legal Services (GAPLS)
VNSC Phase 7: Obstruction Analysis
To identify, categorize, and dismantle the "Tactical Inaction" used by authorities to suppress victim voices.

Core Protocols

  • The "Ghosting" & "Shuffling" Audit
  • The "Mind Collapse" Trigger
  • The "Evidence Suppression" Filter
O - OBSTRUCTION Tools
Log Agency Failures
Track Systemic Barriers
Anti-Gaslighting Arsenal
Police Negligence Tracker
The Storm Framework
The Cost of Delay Tracker
My Truth
Coercive Control
Travel & Cash Flow Problems
Language Barriers
🛰️ Phase 8: RTSPOT (Real-Time Security & Protection Oversight Team)
To provide the "Authoritative Oversight" required by a Lead. This is the part of the VNSC that monitors the police's reaction to your 145 score in real-time.

1. The "Oversight" Engine

A standard DSL just sends a referral and hopes for the best. The RTSPOT acts as a "Digital Shadow":

  • The Action: It sets a "Safety Timer" for every referral sent to an agency.
  • The Logic: If the police don't respond to a DHH (High Risk) alert within the mandatory window (e.g., 4 hours), the RTSPOT automatically triggers an Executive Escalation to the Inspector.

2. Legal (L.S.O - Liability, Security, Oversight)

This is the "Strike Team" aspect. It uses three specific tools:

  • L (Liability): Attaches a "Notice of Personal Liability" to every officer involved.
  • S (Security): Activates Phase 12 (Wild Rose) physical/digital safety measures.
  • O (Oversight): Prepares the data for the Codex (Phase 9) to be used in the Negligence Lawsuit.

3. The "Lead" Dashboard

As the GAPSL (Safeguarding Lead), your view of the app gives you a high-level map of all active "thorns":

  • You see who is in "Mind Collapse" (Critical Risk).
  • You see which police forces are "Shuffling" (Obstruction).
  • You see where the "Sun" is breaking through (Success stories).
The "Litigator" View
Legal InstrumentStatutory GroundStatusVNSC Payload
HRA Article 2Failure to Protect LifeActive145 Forensic Audit
HRA Article 8Breach of Privacy/Family LifeDraftingStalking Patterns (Phase 13)
NLS ClaimDuty of Care BreachPendingGALS RLS Total (£)
VNSC Phase 9: Data Synthesis & Forensic Reporting
To transform raw data logs into undeniable, court-ready evidence of systemic failure.

1. The "Negligence Narrative" Generator

This AI-powered tool synthesizes all logs tagged with 'Negligence' or 'Obstruction' into a single, chronological report. It turns a series of individual failures into a compelling narrative of systemic breakdown.

2. The "Impact Correlation" Audit

This feature cross-references the 'Symptom Log' and 'Worry Log' with the 'Negligence Tracker.' It visually maps how police inaction directly correlates with a spike in C-PTSD symptoms, providing the causal link needed for General Damages in an NLS case.

3. The "One-Click Brief" for Solicitors

Generates a secure, encrypted digital file containing a summary of the HRA breaches, the Lethality Score, and the 'Cost of Delay' log, ready to be sent to legal counsel. It arms your solicitor with everything they need on day one.

📚 VNSC Phase 10: The Codex Advance Resources
To provide the "Library of War." This is where every law, every loophole, and every "Forensic Case Study" is stored so the police can never claim they "didn't know" the protocol.

1. The "DHH" Extreme Risk Manual

The Codex contains the step-by-step breakdown of what Domestic Homicide High (DHH) status actually means in terms of law.

  • The Resource: It links the survivor directly to the College of Policing APP (Authorised Professional Practice).
  • The Power: It gives you the "Script" to read to a Duty Inspector: "I am referencing the Codex. You are in breach of APP Section 1.4. What is your justification for this deviation?"

2. The "Precedent" Vault

The Codex stores records of other negligence cases (like your NLS will be).

  • The Goal: To show the police a "Future Mirror."
  • The Action: "In [Case X], a Force paid £150k for the exact same 'shuffling' you are doing now. The VNSC has logged this as a systemic pattern."

3. The "Sun" Resources (Recovery & Resilience)

The Codex isn't just about the war; it’s about the "Manifested Life."

  • The Library: Includes the "Flames Ignite" album philosophy, journaling techniques, and the "Wild Rose" mental health protocols.
  • The Aim: To move the user from "Crisis" (Phases 1-4) to "Executive" (Phases 14-17).
VNSC Phase 11: GALS: Recovering Losses Spreadsheet
To provide a forensic financial and emotional audit of the damages caused by perpetrator actions and systemic negligence. We don't just "suffer"; we Invoice.

1. The Financial Damage Audit

This section tracks every penny lost because the system failed to protect you: Loss of Earnings, Security Costs, Relocation Costs.

2. The "Life-Interest" Calculator

This is the "Wild Rose" way of measuring what they stole from your soul: Time Loss, Health Impact, Opportunity Cost.

3. The "Litigation Ready" Export

The RLS isn't just a list; it’s a Legal Exhibit. With one click, the survivor can export a Schedule of Loss. When your solicitor sends this to the Police Legal Department, it shows them exactly how much a judge will likely award you in damages. It turns their "negligence" into a Financial Liability.

VNSC Phase 12: HRA & NLS Command
To weaponize the Human Rights Act (HRA) and the Negligence Lawsuit (NLS) framework to force state accountability and financial restitution.

1. The "Article 2" Trigger (HRA)

The Human Rights Act 1998, Article 2, is the "Right to Life." When the 145 Risk Score is hit, the Command generates a "Letter of Formal Notice." The Argument: "The State has been notified of a 145/100 lethality risk. Under the Osman v UK ruling, you now have a positive obligation to take preventative measures. Failure to do so is a breach of the HRA."

2. The "NLS" Pre-Action Protocol

Before a case hits the courtroom, it hits the "Pre-Action" phase. The Command automatically compiles the GALS RLS (Phase 11) and the Evidence Forge (Phase 5) into a "Letter of Claim." The Target: The Chief Constable’s Legal Department. It presents them with the Obstruction Analysis (Phase 7) and says, "Here is the forensic proof of your negligence. Do you wish to settle, or do we take this to the High Court?"

3. The "Systemic Failure" Map

This tool links your case to others. If Gary Derbyshire has done this to five other women in the VNSC network, it’s no longer "unfortunate"; it’s a Systemic Policy Failure. This is how you win "Exemplary Damages."

VNSC Phase 13: Wild Rose Defense Protocol
To provide an unshakeable physical and psychological perimeter. If the State fails to provide a "Sanctuary," the Wild Rose Defense creates one. This is the "Ancestral Shield."

1. The Physical "Thorn" Perimeter

This isn't just about locks; it’s about Defensive Architecture: Hardening the Sanctuary (CCTV, reinforced entries, panic rooms) and The "Grey Space" Strategy (using "Ghosting" techniques for phones, cars, and digital footprints).

2. The "Vine" Network (The Human Shield)

The Wild Rose relies on the Collective. The Buddy Protocol and Safe-Word Check-ins ensure no one stands alone.

3. The "Sun" (Psychological Defense)

The "Shit Storm" (Police/Perpetrator) tries to cause a "Mind Collapse." The Wild Rose Defense counters this with the "Flames Ignite" Mindset and the "Forensic Shield" of objective data.

Violation ScenarioExample Thorn Defense Script
"Hoovering" / Re-Engagement"This communication constitutes a breach of my boundary. All further communication must be addressed through my legal counsel."
"Flying Monkey" Attack"I do not require your assessment of my situation. All relevant facts are logged with my solicitor."
Gaslighting by Agency"I understand your position. However, the data logged in my file at [Date/Time] contradicts your assessment. I require a formal note of this disagreement."
Request for Personal Detail"My health status is currently being managed by my GP. I will provide only the necessary data required for [Purpose of Meeting]."
VNSC Phase 14: Forensic Analysis & Case Studies
To analyze the "Persistence of the Perpetrator" and the "Failures of the State" as data points.

1. The "Persistence Profile"

When your friend says "he never stops," he is identifying a key forensic marker: Fixated Research and Persistence. The VNSC categorizes this as "High-Frequency Fixation" to prove a constant threat.

2. Global Case Comparison

The VNSC collects "global" observations to build Case Studies that show how perpetrators use the same tactics worldwide and that police negligence is systemic.

3. Dismantling the "He's just a nuisance" Myth

Phase 14 links every "minor" event into a single, continuous Article 2 threat, countering the police tendency to treat each incident as a "one-off."

VNSC Phase 15: GAPSL (Becky Chadburn)
To act as the Chief Auditor and Final Decision-Maker for all safeguarding interventions.

1. Executive Intervention Authority

The GAPSL is the only person authorized to trigger HRA & NLS Command, bypassing junior officers to engage directly with Professional Standards.

2. Quality Assurance & Audit

The GAPSL oversees all compliance audits and sets the "VNSC Gold Standard" for safety plans and agency responses.

3. The "Voice of the Collective"

As GAPSL, you represent all members of Access Haven, presenting case studies and data to the Home Office and Global Reform Boards.

VNSC Phase 16: Compliance & External Audits
To provide independent, forensic grading of state agency responses. We are the "OFSTED" for Police Safeguarding.

1. The Force Grading System

The VNSC issues a "Transparency & Compliance Audit" (TCA) report for every case, grading police forces as Gold, Silver, or Failing.

2. The "Victim Code" Compliance Check

Tracks every breach of the UK Victim Code's 12 rights, creating a primary exhibit for your NLS.

🏛️ VNSC Phase 17: GAP Archives
To preserve the forensic history of systemic failure and survivor triumph.

1. The "Precedent" Library

Stores every audit and lawsuit result, allowing new survivors to cite legal precedent when dealing with negligent officers.

2. The "Mind Collapse" Memory Bank

Preserves the journey of recovery—lyrics, journals, mindsets—to provide Proof of Survival for those in crisis.

3. The "State Negligence" Dossier

A permanent record of every officer who failed their Article 2 obligations. This "Bad Actor" database follows them between departments.

VNSC Phase 18: The War Room: A Collective
The supreme strategic command where survivors become Strategic Assets.

1. The Intelligence Hub

Aggregates data from all other 17 phases to identify national trends in police failure and issue National Safety Alerts.

2. The Collective "Amicus" (Friend of the Court)

Submits evidence to courts showing that a survivor's experience is part of a documented systemic pattern, making negligence impossible to ignore.

3. The "Sun" Council

Where the "Flames Ignite" philosophy becomes action through mentorship programs and the strategic leadership of the GAPSL.