Law Enforcement Inquiry Protocol

Law Enforcement Inquiry Protocol

Last updated: February 2026

Last Updated: February 2026

OneSwap.ai stands profoundly committed to collaborating alongside recognized sovereign agencies globally to combat digital financial fraud, illicit money flows, and criminal exploitations of decentralized networks, fully adhering to prevailing multinational statutes.

This document serves as a specialized manual for law enforcement operatives, illuminating the technical confines of our infrastructure, the boundaries of our data retention, and the strict mechanics required to lodge a formally actionable data request.

1. Architectural Reality (Non-Custodial Parameters)

Prior to drafting any subpoena or warrant, authorities must precisely understand the fundamental engine powering OneSwap.ai:

  • We are an Aggregator: OneSwap.ai operates strictly as a routing interface. We seamlessly bridge user queries to liquidity pools managed by independent execution partners (hereafter "Liquidity Providers").
  • Zero Custodial Control: We never harvest, warehouse, or manage user deposits. We possess absolutely zero access to private cryptographic keys or vault infrastructures.
  • Inability to Seize Assets: Because we lack custody, we are technically paralyzed from unilaterally freezing, intercepting, or seizing assets mid-transit. However, if our internal surveillance heuristics trip—or if prompted by an agency—certain routing pipelines may be temporarily halted by our Liquidity Providers pending KYC/AML audits.
  • Absence of Default KYC: As a decentralization-first bridge, OneSwap.ai rarely stockpiles intimate user identities (like passports or residential proofs) by default. Such intrusive verifications are typically demanded and warehoused deep within the domain of the specific Liquidity Provider finalizing the swap.

2. Protocol for Official Inquiries

All formal demands for intelligence must be funneled electronically to our compliance nexus: [email protected].

To trigger an operational response, your submission must rigorously align with the following criteria:

A. Authenticated Domains

Correspondences must originate from a verified sovereign domain (e.g., gov.uk, fbi.gov, .police). Unverified or commercial mail servers (Gmail, Proton, Outlook) will be summarily discarded without reply to protect against social engineering.

B. Necessary Dossier Contents

The appended legal instrument must overtly specify:

  • Sovereign Body: The exact nomenclature of the investigating agency and regional bureau.
  • Operative Metrics: The investigating agent's full name, rank, badge identifier, and direct-line cellular/desk coordinates.
  • Operational ID: The official criminal or investigative case indexing number.
  • Statutory Anchor: The binding regional law or treaty authorizing the intelligence extraction (e.g., Grand Jury Subpoena, Search Warrant, Court Order).
  • Target Vectors: Granular details to isolate the event within our telemetry, strictly including:
    • Cryptographic Hash (TXID) denoting the exact blockchain event.
    • The precise alphanumeric wallet addresses implicated.
    • Surgical UTC timestamps enclosing the event.
    • The precise asset ticker and numerical volume swapped.

3. Scope of Obtainable Data

Contingent upon the presentation of a flawless legal writ, OneSwap.ai may harvest and surrender the ensuing data slices regarding a targeted event:

  • Routing Telemetry: Logged timelines, swap volumes, fiat-pegged equivalents, and the specific smart contracts or destination addresses employed.
  • Vendor Subpoena Routing: We can unmask the exact Liquidity Provider that physically absorbed and paid out the funds. This intel is paramount, empowering agencies to serve subsequent warrants directly to the custodian actually gripping the assets.
  • Digital Exhaust: Captured IP arrays, browser fingerprint hashes, and granular User Agent strings associated with the session bridging the swap.
  • Support Dialogue: Transcripts of any troubleshooting tickets or emails the suspect lodged with our help desk.

Crucial Context: We inherently do not demand physical ID cards or facial scans to operate our routing node. If the subject voluntarily submitted files during a localized anomaly check, we will surrender them. However, 99% of profound KYC artifacts (passports, selfies) reside locked inside the vault of the Liquidity Provider handling the final mile. We will point you directly to them.

4. Expedited Emergency Disclosures

When the threat vector involves the immediate loss of human life, catastrophic physical damage, or acute terrorism financing, OneSwap.ai shifts into rapid-response overdrive, bypassing standard bureaucratic queues.

For us to classify a dossier as an acute emergency, it must:

  • Scream "URGENT EMERGENCY DISCLOSURE" in the email header.
  • Articulate the grim reality of the unfolding threat in plain terms.
  • Defend exactly why immediate access to routing logs prevents the impending harm.
  • Provide lightning-fast identifiers (TXIDs, receiving addresses) to allow instant database querying.

5. Target Subject Alerts

It is the foundational prerogative of OneSwap.ai to decide whether to inform a suspect that their swap data has been requisitioned by the State. We generally exercise non-disclosure if the law expressly forbids it, or if alerting the subject threatens an open manhunt or digital seizure operation.

6. Statutory Limitations & Disclaimers

This protocol outline exists strictly as an educational compass for state actors. It creates zero actionable rights, nor does it waive OneSwap.ai's right to challenge overbroad, unconstitutional, or jurisdictionally defective subpoenas.

While our engineers fiercely endeavor to query and packetize intel flawlessly, the dataset is handed over "AS IS." We issue zero warranties guaranteeing absolute perfection, chronological entirety, or uncorrupted structural integrity.

OneSwap.ai accepts zero punitive or operational liability for investigative dead-ends birthed from:

  • Database latency or routine purges;
  • Garbled inputs received from third-party vendor APIs;
  • Inevitable human oversight or server fragmentation.

Sovereign bodies utilize and prosecute based upon this intelligence under their own assumption of risk. All provided datasets remain heavily privileged and strictly ring-fenced for the exact criminal inquiry detailed in the submitted writ.