1. Data Controller & Entity Identification

This protocol governs the data processing activities of Trace Consult Limited (Company No. 06691028), a UK-based intelligence firm. Registered Office: The Studio, 1 Canons Lane, Burgh Heath, Surrey, KT20 6DP.

2. Data Ingress & Normalization

Trace500 acts as a specialized data processor for victim-submitted incident telemetry. We ingest and normalize the following technical data points:

  • On-Chain Metadata: Transaction hashes (TXIDs), public wallet addresses, and smart-contract interaction logs.

  • Fiat Transaction Telemetry: ISO 20022 message metadata, IBAN/BIC identifiers, and correspondent banking path identifiers.

  • Heuristic Data: Temporal stamps and value-flow quantifiers used for graph construction.

Note: Trace500 does not ingest, store, or request non-public credentials, private keys, or symmetric/asymmetric encryption seeds.

3. AI-Orchestrated Processing Logic

Submitted data is processed through our AI-orchestrated pipeline to achieve:

  • DAG Construction: Building Directed Acyclic Graphs to visualize the flow of digital assets.

  • Entity Attribution: Cross-referencing public addresses against known custodial clusters via licensed forensic APIs (Chainalysis, TRM Labs, Elliptic).

  • Path Reconstruction: Heuristic linking of on-ramp/off-ramp activity across cross-chain bridges and fiat-to-crypto gateways.

4. Data Security & Forensic Integrity

  • Encryption: All data in transit is secured via TLS 1.3. Data at rest is encrypted using AES-256 standards.

  • Immutable Logging: Outbound notifications to custodial entities are cryptographically signed and RFC 3161 timestamped to ensure forensic non-repudiation.

  • PII Minimization: We apply data redaction protocols to ensure that only relevant forensic evidence is included in outbound alert packets.

5. Outbound Orchestration (Third-Party Disclosure)

To fulfill the tracing objective, normalized incident packets are transmitted to:

  1. Custodial Endpoints: Automated alerts sent to Virtual Asset Service Providers (VASPs), Exchanges, and Financial Institutions to flag suspicious transaction nodes.

  2. Forensic Partners: Data may be queried against licensed investigative databases to score transaction risk.

6. Data Lifecycle & Subject Rights

Trace500 adheres to strict data minimization. Given the 5-week operational window for high-fidelity tracing, data is archived or purged once the technical reporting cycle is concluded. Users may exercise their right to data portability or erasure by contacting our DPO at [email protected].