Submit Intel

Have you witnessed technology being used to exploit, harass, or cause harm? Report it here. Submissions can be kept anonymous.

IMMEDIATE SAFETY PROTOCOLS

  • 01

    Secure Your Perimeter

    Enable 2FA on all devices. Use physical hardware keys where possible to prevent remote infiltration.

  • 02

    Document the Data

    Take timestamps and screenshots of technological abuse. Digital evidence is fragile and easily deleted by perpetrators.

  • 03

    Isolate & Insulate

    If a specific piece of software is causing harm, disconnect the device from the network immediately and seek AEAH verification.

Our Commitment

"We stand as the watchdog for those who cannot fight back against the machine. Your safety is the priority; the technology is secondary."