01. Data Collection Protocols
In order to facilitate asset recovery, the Bureau requires the submission of specific identifiers. This includes but is not limited to:
- Biometric & Identity: Full legal name, Government-issued ID, and Proof of Residence.
- Financial Logs: Transaction hashes (TXIDs), bank statements, and communication logs with fraudulent entities.
- Technical Data: IP addresses and device metadata used during the time of loss.
02. Operational Usage
Data collected is strictly used for the purpose of asset tracing and legal restitution. We do not sell or monetize user data. Information is processed through our encrypted Case Management System (CMS) to build forensic evidence for recovery.
03. Encryption Standards
Technical Specification:
All data at rest is encrypted using AES-256-GCM. Transmission is secured via TLS 1.3. Access is restricted to Tier-3 Intelligence Officers using Multi-Factor Authentication (MFA).
05. Subject Rights
Under the 2026 Data Protection Act, you maintain the right to request a copy of your forensic file, or to request the deletion of non-essential data once a case has reached "Final Resolution" status.