How we operate
Our ethical decoy operations use structure, documentation, and discipline designed to support lawful investigations. We identify, document, and preserve evidence responsibly — and we never confront targets or publish identities.
Ethical decoys
We follow strict protocols for age representation, communications, and evidence handling. All activities prioritize child safety and legal integrity. Our decoy operations are designed to be admissible and useful to investigators, never to entrap or escalate.
Evidence-first
We preserve messages, media, and identifiers following chain-of-custody best practices. Documentation is structured so it can be used by law enforcement and prosecutors. We do not alter, summarize, or discard evidence; we hand off complete, organized materials to the proper authorities.
Law enforcement liaison
We channel reports directly to local, state, and federal partners, including the FBI and ICAC (Internet Crimes Against Children) task forces. We do not publish identities or take enforcement action ourselves. Our role is to support lawful investigations and prosecutions.
Training & standards
Volunteers receive ongoing training in online safety, policy, and documentation aligned with investigative needs. We maintain clear guidelines and mentorship so that every report meets the same high standards and supports law enforcement effectively.