Questions From Families
If you are considering joining the C.A.P. beta pilot, or you have C.A.P. installed in your home, these are the questions families ask most often. Plain language, no marketing, no legalese.
F-01What does C.A.P. actually do?
C.A.P. is a small box that you plug in between your internet modem and your home Wi-Fi router. It looks at the network traffic going to and from devices in your home — phones, tablets, game consoles, computers — and watches for patterns that often show up in conversations between online predators and children. When it sees something concerning, it sends you a notification on your phone through the C.A.P. app.
It does not block apps. It does not message your child. It does not contact the police on its own. It is a tool to help you, the parent, notice things you might otherwise miss.
F-02How is this different from the parental controls already on my child's phone?
Phone-based parental controls (iOS Screen Time, Google Family Link, app-specific safety settings) live on the device itself. They depend on your child's primary device being the device being watched, and they can be worked around in well-known ways — using a friend's phone, creating a new account, switching to a different app, or using a VPN.
C.A.P. lives on your home network, one layer below those device-level tools. It sees activity from every device connected to your Wi-Fi — not just your child's main phone. C.A.P. is meant to complement device controls, not replace them. The strongest protection is using both together.
F-03Is C.A.P. spying on my kid?
This is the right question to ask, and we want to answer it directly.
C.A.P. inspects network traffic the way an air-traffic controller watches planes — looking at where things are going, when, how often, and what general patterns exist. It does not read every message your child sends. It cannot decrypt traffic that is encrypted (which is most internet traffic today). What it does see is the metadata: who is talking to whom, on which platforms, at what times, and how that compares to behavioral patterns that researchers have documented in cases of online grooming.
We think of it less like a wiretap and more like a smoke detector. A smoke detector doesn't know what you're cooking — it just notices when something looks wrong.
F-04Does C.A.P. work for younger children, teenagers, or both?
Both, with different settings. The C.A.P. parent app lets you set an age profile for each child in your household. Younger children get tighter sensitivity (more types of contact patterns flag for review). Older teenagers get looser sensitivity (the system understands that more adult contact is normal and expected, and only flags patterns that are genuinely concerning).
You can adjust these settings yourself at any time. The system doesn't lock you into one configuration.
F-05How hard is it to set up?
For most homes, about 10 minutes. You unbox the device, plug one Ethernet cable from your modem into the C.A.P. box, plug another from C.A.P. into your Wi-Fi router, plug in the power, and download the app. The app walks you through pairing the device to your account.
You do not need to reconfigure your router, change your Wi-Fi password, install software on your child's devices, or have any technical knowledge.
F-06Will it slow down my internet?
Not in any way you'd notice. C.A.P. is built around a gigabit-rated bridge, which means it can handle a much faster connection than most American homes have. The processing it does happens in parallel with traffic forwarding, so the added delay is measured in fractions of a second.
If you ever do notice slowdowns, the app has a built-in diagnostics view, and our support team can help.
F-07What if I have a modem-router combo from my ISP?
This is the most common home setup, and C.A.P. is designed for it. There are two install options:
- Bridge mode — many ISP combo units have a "bridge mode" or "modem-only mode" that turns off the built-in router. C.A.P. then handles things in between. The C.A.P. app will detect this and walk you through it.
- Behind the combo unit — if bridge mode isn't available, C.A.P. installs between the combo unit and any additional Wi-Fi router or mesh system you use. Coverage is slightly reduced (devices connected directly to the ISP combo's Wi-Fi won't be inspected), and the app will tell you which devices are and aren't being seen.
F-08What about mesh Wi-Fi (Eero, Nest Wifi, Orbi, etc.)?
Mesh systems work fine. C.A.P. installs between your modem and the primary mesh node — all of the mesh's Wi-Fi traffic flows through C.A.P. as long as the mesh is in router mode (which is the default).
F-09What data does C.A.P. collect about my family?
During the pilot program, with your written consent:
- Device telemetry — whether the C.A.P. box is healthy, what software version it's running, basic uptime statistics. Not tied to specific people in your home.
- Detection events — what category of concern was flagged, how confident the system was, which detection components contributed. The actual content of communications is not sent to IBR-Tech.
- Your feedback — when you rate an alert as useful or as a false alarm, that rating is recorded so we can improve the system.
What we do not collect: the contents of any messages, photos, voice or video calls, browsing history beyond detection events, or anything that identifies a specific child by name.
F-10Where is the data stored, and who can see it?
Most data stays on the C.A.P. device in your home, on encrypted storage. Detection events and your alert reviews are also stored in a secure cloud service that only you (through your parent app login) and a small number of authorized IBR-Tech engineers can access.
If C.A.P. captures specific traffic data because an alert triggered evidence-preservation mode, that captured data is encrypted, cryptographically sealed against tampering, and stored both locally and in a secure cloud replica — but only released to anyone (including law enforcement) if you choose to release it.
F-11What about the rest of my family — me, my spouse, my own privacy?
This is an important question and the honest answer is: C.A.P. inspects all traffic on your home network, but it is tuned for patterns of contact involving children. Adult-to-adult traffic generally does not match the behavioral patterns the system looks for, and the parent app does not show you alerts about adult activity.
We do not perform deep inspection on traffic to banking, medical, financial, or government domains — those are categorically excluded from inspection at the system level, not just by policy.
That said, you should think of C.A.P. the way you would any home security system: it is on your network, and that means everyone using your network is participating. If you have other adults living in your home (a roommate, an adult child, an in-law), they should know the device is there.
F-12Will IBR-Tech ever share my family's data with anyone?
No, with two specific exceptions:
- If you ask us to. If you decide to use C.A.P.'s evidence-export feature to support a report you are making to law enforcement or NCMEC, that's your choice and your action.
- If we are required to by law. Like any U.S. company, we comply with valid legal process. We will tell you about any such request unless we are legally barred from doing so. We work to minimize what data exists to share in the first place — most household data never leaves your home.
We do not sell data. We do not share data with advertisers, data brokers, social media platforms, or schools. The pilot program collects only what we describe in your consent form and nothing else.
F-13Should I tell my child about C.A.P.?
Yes. We strongly recommend it, and the pilot program requires age-appropriate disclosure to children old enough to understand. Hidden monitoring is the wrong model for many reasons — including that children who discover hidden surveillance generally lose trust faster and more permanently than children who understood the situation up front.
How you talk about it matters. Most families have success framing it as "this is a thing we have on our home network — like a smoke detector for dangerous online conversations — and it sometimes lets me know I should check in with you."
F-14What if my child doesn't want to participate?
This is a real consideration. The pilot's consent process includes age-appropriate "assent" for older children — meaning your child has the opportunity to express concerns, and those concerns are part of the conversation about whether to enroll.
Outside the pilot, the broader question of how much network-level awareness is appropriate for your family is a parenting decision that's yours to make. We'd encourage you to make it openly with your child rather than around them.
F-15Will C.A.P. read my child's messages to friends?
No. The vast majority of teen communication is on encrypted apps (iMessage, Snapchat, Discord, Instagram DMs). C.A.P. cannot decrypt this content and does not try to. What it sees is metadata — that messages are being exchanged with a particular contact, with a particular frequency, at particular times — and patterns of those metadata.
If you want a tool that reads your child's messages, C.A.P. is not that tool. We made an explicit choice not to build one.
F-16Can my child get around C.A.P.?
We want to answer this honestly. C.A.P. is harder to bypass than device-level controls, but it's not magic. Here's where it stands strong and where it doesn't:
What C.A.P. handles well:
- Children using devices on the home Wi-Fi — even devices the parent didn't set up.
- Children switching apps, creating new accounts, or using browser incognito mode — none of those bypass network-layer inspection.
- Children installing a VPN — the VPN itself is detected, and you get a notification that one appeared.
What C.A.P. cannot do:
- See activity on cellular data. If your child has a smartphone with a data plan and turns off Wi-Fi, that traffic doesn't pass through C.A.P.
- See activity on someone else's network — at a friend's house, at school, on public Wi-Fi.
- Decrypt the content of conversations. C.A.P. works on patterns and metadata, not message content.
F-17What if my kid uses cellular data to avoid Wi-Fi?
That traffic isn't visible to C.A.P. There are some practical mitigations parents use: setting cellular data limits on the device, using cellular plan family controls (most carriers have these), or having a household norm that phones live on the home Wi-Fi when at home.
But yes, this is a real limitation. C.A.P. is a household-network tool, not a child-tracking tool, and we don't pretend otherwise.
F-18What about VPNs and apps like Tor?
VPNs and similar privacy tools tunnel traffic past C.A.P.'s ability to see contents or destinations in detail. But they are themselves highly visible at the network level — C.A.P. can tell when a device on your network has started using a VPN, Tor, DNS-over-HTTPS, or similar.
When that happens, C.A.P. notifies you. The reasoning is that a child suddenly running a VPN on their phone is itself something a parent generally wants to know about, regardless of what they're using it for.
F-19What does an alert look like, and what should I do?
An alert is a push notification on your phone that opens to a review screen in the C.A.P. app. The review screen tells you, in plain English: which device the alert came from, what category of concern was flagged, the system's confidence level, and a brief description of the pattern (without exposing message content).
The recommended response depends on the alert level:
- Low (digest) — informational. Read it when you have a moment. Often resolved by a normal parent-child check-in.
- Medium (immediate) — read soon. Consider a check-in conversation with your child within the next day or so.
- High (urgent) — read now. The system has high confidence that something concerning is happening. Consider a calm, direct conversation with your child today, and review the evidence-preservation options in the app.
F-20What if I think the alert is wrong?
False alarms happen — no detection system is perfect. The app has a "this wasn't useful" rating you can apply to any alert. Those ratings help us improve the system and also help calibrate sensitivity for your specific household over time.
If you're getting alerts that are clearly wrong (for example, your teenager's normal long video calls with a long-distance girlfriend), you can mark that contact as a known-good pattern, and the system will adjust.
F-21What if the alert is real and I'm scared?
Take a breath, and remember that you are not alone with this.
- Talk with your child. Many situations are best handled with a calm, non-accusatory conversation. Children who feel safe coming to a parent are far more likely to disclose what's actually happening.
- Use the evidence-preservation feature. If you suspect something serious, the app lets you save a sealed evidence package without taking any other action immediately.
- Contact NCMEC's CyberTipline at CyberTipline.org or 1-800-843-5678 if you believe there has been actual contact from someone exploiting your child. This is the federal reporting channel for online child exploitation.
- If there is immediate danger — call 911. C.A.P. is not designed for emergency response.
- Reach out to a child-welfare or counseling professional. Pilot families have access to a list of resources through the app, including the Childhelp National Child Abuse Hotline at 1-800-422-4453.
F-22Will IBR-Tech contact the police if C.A.P. flags something?
No. We made this a deliberate design decision. Decisions about whether and how to involve law enforcement belong to you, the parent, in consultation with professionals you trust. IBR-Tech does not contact police, NCMEC, schools, or any third party on your behalf. The evidence-export feature in the app is something you use, on your initiative.
F-23What if I want out of the pilot program?
You can withdraw at any time, for any reason, without explaining yourself. The process: contact us through the app or by email, and we will send a return shipping label for the device. We will destroy your household's pilot-collected data within 30 days unless you tell us otherwise.
Withdrawing from the pilot does not affect any other relationship you have with IBR-Tech.
F-24What if the device breaks or stops working?
During the pilot, IBR-Tech provides full hardware support. If something goes wrong, contact support through the app. We will troubleshoot, and if the device needs to be replaced we will send you a replacement at no cost.
F-25How do I reach a real person at IBR-Tech?
Pilot families have direct support contact information provided in your welcome packet. The founder is a U.S. military veteran running a small Pennsylvania company — when you reach out, you reach an actual human being, not a tier-1 outsourced help desk. We expect this to remain true at our intended scale.
Questions From Grant Reviewers
For grant reviewers and program officers evaluating IBR-Tech's C.A.P. application. These questions reflect what serious reviewers ask of any consumer-deployed child-safety hardware product, and where IBR-Tech's claims are firm versus where they are honestly aspirational.
R-01What problem does C.A.P. actually solve, and how is it differentiated from existing parental-control products?
Existing consumer parental controls operate at the device or account layer (iOS Screen Time, Google Family Link, platform-specific safety settings, monitoring apps installed on a child's phone). All of these depend on the child's primary device being the observed device, and all are routinely circumvented through new accounts, secondary devices, app substitution, or simple settings changes.
C.A.P. operates one layer below — at the home network level — which provides parents with awareness of patterns visible across every device on the home network, regardless of what software is running on the device. To our knowledge, no current consumer hardware product addresses this layer with a focus on child-safety behavioral patterns. C.A.P. is positioned to fill that specific gap, not to replace any other tool.
R-02How does the detection engine work? Is it machine learning, rule-based, or something else?
It is a hybrid. The detection engine combines four parallel detectors:
- Signature matcher — high-throughput pattern matching using established multi-pattern algorithms (Aho-Corasick with SIMD acceleration) against curated indicator sets. Rule-based.
- Behavioral analyzer — gradient-boosted ensemble model trained on flow-metadata features documented in published online-grooming research. Machine-learned, with rule-based overlays.
- Flow correlator — heuristic cross-platform linking on metadata only. Rule-based.
- Content classifier — cryptographic hash matching against published NCMEC hash sets. Deterministic.
Outputs from all four detectors feed a weighted-fusion layer that produces a single 0–100 risk score with a confidence band. Detectors do not act independently; no single rule fires an alert without fusion. This architecture is the patent-pending core, filed under reference IBR-CAP.
R-03Is the founder qualified to build this?
The founder is a U.S. military veteran with 25+ years of professional experience as an IT engineer and architect, spanning enterprise infrastructure, network architecture, security engineering, and hardware-software integration. These are the precise disciplines required for a network-layer hardware appliance with cryptographic evidence-handling.
The founder is also being honest with reviewers about the disciplines that complement his core expertise — child-development research, forensic admissibility law, and IRB ethical review — and the company has budgeted for outside expertise in each. These are not areas where IBR-Tech is claiming expertise it does not have.
R-04Why hardware? Couldn't this be a software product?
It could not, for two reasons. First, software running on a child's device can be disabled by the child — a router-on-the-network appliance cannot. Second, software cannot inspect traffic from devices it isn't installed on (game consoles, smart TVs, IoT devices, friends' devices brought into the home), while a network-layer appliance sees all of them.
Hardware also creates a sustainable business model that does not depend on app-store distribution, subscription churn, or platform-policy changes — all of which have crippled previous attempts to build consumer child-safety software.
R-05What does "tamper-evident capture and cryptographic preservation" actually mean technically?
Each captured-data package contains the relevant network capture, detector outputs, device attestation (TPM 2.0 quote of firmware state at the moment of capture), and a Merkle-tree root binding all artifacts. The Merkle root is signed by an Ed25519 key generated and held inside the device's TPM secure element. The signed root is then countersigned by an external RFC 3161 Trusted Timestamp Authority, providing independent time verification.
Local storage uses an encrypted write-once partition. Cloud replicas use object-lock immutable storage. Verification of any package is possible without contacting IBR-Tech, using only the published intermediate CA public key.
R-06Are you claiming this evidence will be admissible in court?
No, and we are explicit about this in the grant application. Admissibility under the Federal Rules of Evidence (901, 902) and applicable state rules is a determination made by courts on a case-by-case basis. IBR-Tech provides the technical substrate that admissibility arguments typically rely on — origin authentication, integrity binding, independent time verification, tamper evidence, and provenance attestation — but the legal outcome of any particular use of that data is not something a vendor can guarantee.
We describe captured data as "stored if requested for a legal proceeding," not as "suitable for legal proceedings," precisely because we are not the body that determines the latter.
R-07Have you consulted with practitioners — prosecutors, ICAC investigators, NCMEC?
This is in active progress. The current grant application reflects design decisions made on the basis of published literature, NCMEC public guidance, and the founder's professional network. As part of the project plan, IBR-Tech is initiating direct outreach to PA cyber-crimes practitioners (PA OAG ICAC Task Force, PA State Police Computer Crime Task Force, county-level cyber detectives) for practitioner guidance on evidence-handling design.
We are not claiming endorsements or partnerships we do not yet have. We are also not waiting for those conversations to happen before submitting grant applications — but we will incorporate practitioner feedback into the design before the product ships, and any architectural changes will be reflected in subsequent grant updates.
R-08The grant application mentions the NCMEC CyberTipline. What is the actual integration status?
The NCMEC CyberTipline is the established public reporting channel for suspected online exploitation of minors — any member of the public, any electronic service provider, any organization can submit reports. C.A.P.'s architecture provides a parent-initiated reporting pathway that submits a properly formatted CyberTipline report on the parent's behalf when the parent chooses to do so.
This is correctly described in the grant application as "an architectural pathway for integration with the NCMEC CyberTipline reporting framework." It is not a special partnership or formal MOU with NCMEC. Any consumer product can architect to this pathway; what we are claiming is that we have done so deliberately, with appropriate metadata formatting and chain-of-custody preservation.
R-09What about law-enforcement database integration — predator fingerprints, registered offender data?
IBR-Tech does not currently hold and does not claim to hold any formal agreement, MOU, or technical integration with FBI, DHS, ICE, or other federal or state law enforcement databases. Any such integrations would require formal agency agreements and CJIS-compliance certifications that take significant time and agency-side sponsorship to establish.
If we pursue these in the future, we will disclose them clearly. They are not part of the V1 product claim.
R-10Most predatory contact happens inside encrypted apps. Can C.A.P. actually see anything meaningful?
This is the most important technical challenge for any network-layer child-safety product, and the honest answer requires care. C.A.P. does not perform TLS interception. It cannot read the content of encrypted messages. What it does see, even on encrypted traffic, is metadata: which platforms a device is communicating with (via SNI), DNS queries, flow timing, volume patterns, contact-frequency trends, and the timing relationships between flows on different platforms.
Published online-grooming research has documented substantial behavioral signal in this metadata layer — escalation of contact frequency from a new external party, off-hours session clustering, platform-hopping from public to private channels within short time windows. C.A.P.'s behavioral analyzer is built on these documented signals.
What this means in practice: C.A.P. is not a content-monitoring product. It is a behavioral-pattern product. We do not claim it would detect every predatory interaction — we claim it surfaces patterns parents would otherwise be unable to see at all.
R-11What about the bypass-resistance claim? Can children just use a VPN or cellular data?
Yes — and the grant application states this directly in Section 11. C.A.P. is bypass-resistant against device-level evasion (settings changes, account recreation, app substitution, browser incognito mode), but it is not bypass-proof. A child using cellular data exclusively, or operating exclusively on networks outside the home, is outside C.A.P.'s visibility.
C.A.P. addresses VPN usage by detecting it at the network level — a VPN appearing on a household device is itself a parent-notification event, on the reasoning that a child installing traffic-concealment tooling is information worth parental awareness regardless of the underlying use case. C.A.P. does not claim to defeat traffic tunneled through a trusted VPN.
R-12How do you handle CSAM if the content classifier finds a match?
A positive hash match against an NCMEC-published list immediately triggers maximum-severity evidence sealing and surfaces a high-priority alert to the parent with explicit guidance on the NCMEC CyberTipline reporting pathway. Reporting itself remains parent-initiated — IBR-Tech does not autonomously report on a family's behalf — but the system is designed to make that reporting straightforward when the parent chooses to act.
R-13Where is C.A.P. in the development cycle today?
C.A.P. is at reference-design status. The architecture is documented (see IBR-CAP-ARCH), the patent application is filed, and the grant funding sought in this application is specifically scoped to the path from reference design through certification and initial production over a 24-month execution window. We are not asking grants to fund a finished product or to subsidize ongoing operations — we are asking for the bridge funding consumer hardware historically lacks.
R-14How will the 50-household beta deployment be conducted ethically?
The beta plan is documented separately (see the C.A.P. Pilot Deployment Plan). Key elements:
- Independent IRB or equivalent ethical-review approval before any household receives a device.
- Written informed parental consent and age-appropriate child assent.
- Categorical exclusion of households in active custody disputes or open child-welfare cases.
- An adverse-event protocol that does not place IBR-Tech in a mandatory-reporter role it is not legally positioned to fulfill.
- Right to withdraw at any time, with data destruction within 30 days.
- Parental-consent-based outcome data collection — no content data, only metadata and parent-rated alert utility.
R-15What are the manufacturing and supply-chain plans?
Initial 500-unit production is planned with a U.S.-based contract manufacturer to align with Buy-American procurement preferences. Component selection emphasizes parts available from multiple distributors to reduce single-source supply risk. Production timeline targets months 15–19 of the 24-month grant execution window, after FCC Part 15 and UL 62368 certification milestones.
R-16What happens if the founder is unable to continue, or the company fails?
This is a serious question that grant reviewers correctly ask of any small-team venture. IBR-Tech maintains technical documentation, source code, and patent prosecution materials in formats that are independent of the founder. A succession plan establishes that, in the event the company cannot continue, the IP and pilot-collected data are transferred to a designated child-safety nonprofit partner under terms that protect pilot families' privacy. Specific arrangements are being finalized as part of partner conversations.
Pilot family data remains protected regardless of company continuity — the pilot-deployment plan requires destruction-on-withdrawal at any time, including an orderly destruction protocol if the program were discontinued.
R-17How will success be measured?
Honestly. The primary success metric is parent-surfaced behavioral-awareness events — the number of moments where a parent, because of C.A.P., became aware of a pattern they would not otherwise have seen. We deliberately do not claim arrests, prosecutions, or rescues as success metrics, because those are law-enforcement outcomes attributable to many factors, and a vendor claiming credit for them tends to mislead reviewers.
Secondary metrics include: technical reliability (uptime, latency), parent utility (rating distributions on alerts), false-positive tolerance, household retention through the pilot, partner-engagement outcomes, and zero product-caused household harm events. These are captured in Section 7 of the pilot plan.
R-18How do you think about false positives?
As an unavoidable cost of doing this work, and one we plan to measure honestly. The fusion-based detection architecture is designed to keep low-confidence single-detector signals from generating alerts on their own — a positive risk score requires corroboration across detectors. The household-tunable threshold tiers (digest, immediate, urgent) ensure that only the highest-confidence cases produce immediate notifications.
The pilot will report observed false-positive rates as part of standard reporting. We are not aiming for "zero false positives" — that would mean we had set the threshold so high that we missed real cases — but for a rate that pilot parents find acceptable in exchange for the awareness the system provides.
R-19What public benefit accrues from this funding?
The most direct public benefit is household-level: each deployed C.A.P. device is a household with earlier visibility into at-risk online behavioral patterns. A secondary public benefit is structural — a credible, commercially available consumer-grade hardware option in the child-safety space changes the baseline of what American families can reasonably expect from this category of technology. A tertiary public benefit is veteran-economic: a successful veteran-owned hardware company in public-safety technology demonstrates a path other veteran entrepreneurs can follow.
R-20Why should this grant program fund this rather than a more established organization?
Because more established organizations have largely not built this. The consumer-hardware child-safety space is structurally underserved by large vendors — the unit economics, regulatory complexity, and reputational risk discourage incumbents from entering. Grant funding for early-stage veteran-owned hardware in public-safety technology directly addresses this market gap. IBR-Tech is not the only organization that should be working in this space; we are simply the one currently doing it, with the technical depth and the founder credentials to do it credibly.
Questions From Potential Partners
For child-safety nonprofits, advocacy organizations, school-district safety coordinators, and similar mission-aligned organizations evaluating a relationship with IBR-Tech. These are the questions partner organizations ask before agreeing to lend their name, time, or community to a vendor relationship.
P-01What is IBR-Tech actually trying to do?
IBR-Tech is building hardware for American homes that addresses problems the consumer-software market has structurally failed to address. C.A.P. is the company's child-safety product — a hardware appliance that gives parents household-level awareness of online contact patterns affecting their children.
We are not a charity, and we are not pretending to be one. We are a for-profit veteran-owned small business that has chosen to focus on a problem space where the right product is mission-aligned by nature. We expect to build a sustainable company while doing this work.
P-02Is the founder's veteran status real, and is it relevant?
Yes, on both counts. The founder is a U.S. military veteran with 25+ years of professional IT engineering and architecture experience. His military service is documented and verifiable through standard channels (DD-214, VA records).
It is relevant in two ways. First, veteran-owned status creates real federal procurement advantages that affect IBR-Tech's go-to-market — including child-safety procurement at the federal and state levels where partnerships with established nonprofits are often required. Second, the founder's perspective on this work — that protecting children online is "a second mission" — is genuine and shows up in how the company makes design decisions, including ones that prioritize safety over feature surface area.
P-03How does C.A.P. relate to existing child-safety technology and resources?
C.A.P. is intentionally designed to complement existing tools, not to replace them. NCMEC remains the established federal channel for online-exploitation reporting; C.A.P.'s architecture supports parent-initiated reporting through that channel. Device-level parental controls remain valuable; C.A.P. operates one layer below them on a different signal entirely. Crisis hotlines, in-school counselors, and community-based child-protection organizations remain primary resources for any household navigating an actual situation; C.A.P. is a notification tool, not a response tool.
We see C.A.P. as one tool in a larger ecosystem, and our partnership posture reflects that.
P-04What kinds of partnerships is IBR-Tech actually seeking?
Three categories, in rough order of formality:
- Advisory relationships — partner organizations that lend domain expertise to C.A.P.'s design, particularly on consent processes, age-appropriate communication with children, and adverse-event protocols. Time commitment is typically a few hours per quarter.
- Pilot recruitment partnerships — partner organizations that help IBR-Tech identify families willing to participate in the 50-household beta. The partner organization does not endorse the product unconditionally; it simply makes the opportunity known to families it serves who may be interested.
- Letters of support for grant applications — partner organizations whose mission alignment with C.A.P. is genuine and who are willing to put that on paper for grant reviewers.
We are not currently seeking endorsement-as-marketing relationships, paid sponsorship arrangements, or any partnership that puts the partner organization in a position to recommend C.A.P. to families they have not personally evaluated.
P-05What does IBR-Tech offer partner organizations in return?
Honestly, less than larger vendors typically offer — and that is intentional. We are not in a position to offer significant cash compensation, and we are wary of compensation arrangements that could compromise a partner organization's independent judgment.
What we can offer:
- Direct input into product design from organizations with operational expertise we lack.
- Access to de-identified pilot outcome data for legitimate research or program-evaluation purposes (with appropriate data-use agreements).
- Honest credit for the partner organization's role in shaping the product — including in published materials, case studies, and grant reports.
- Joint application paths to funding programs that prefer or require nonprofit participation alongside small-business technology developers.
P-06What about school districts? Could C.A.P. be deployed in schools?
Not in its current form. C.A.P. as designed is a household tool — its detection logic, age-profile calibration, and consent model are built around the family unit. School-district deployment is a different product in important ways: it requires district-level consent frameworks, alignment with student-privacy laws (FERPA, COPPA, state-specific student-privacy statutes), and a fundamentally different approach to alert routing (school counselors, not parents, in many cases).
A school-district variant is something IBR-Tech is interested in pursuing as a future product line, with the right partners — but it is not what is being applied for in the current grant application, and we would not deploy the household version into a school environment.
P-07What happens if your product surfaces a real ongoing harm to a child during the pilot?
The pilot deployment plan addresses this directly. If C.A.P. surfaces an alert indicating possible ongoing harm in a pilot household, the parent receives the notification through the C.A.P. mobile application as the product is designed to do. If the parent reaches out to IBR-Tech, IBR-Tech provides guidance on the NCMEC CyberTipline as a reporting pathway and, for PA households, contact information for the PA ICAC Task Force.
IBR-Tech does not initiate third-party contact (law enforcement, schools, child welfare) without explicit parental request. This is a deliberate boundary: vendors who initiate reporting on a family's behalf without context have caused real harm in cases where the situation was misread, and we do not believe a hardware company is the right entity to make that call.
Mandatory-reporter analysis is part of the pilot's pre-launch legal review. Individual IBR-Tech staff who hold mandatory-reporter credentials in another professional capacity continue to carry those obligations personally.
P-08What does IBR-Tech do with pilot data, and how can a partner verify that?
Pilot-collected data is described in detail in the pilot deployment plan (Section 5). The short version: device telemetry, detection-event metadata (no content), parent-rated alert utility, household feedback survey responses, and de-identified adverse-event records. Retention is 24 months plus a 12-month audit tail, then destruction. Households can request earlier destruction at any time.
Partner organizations are welcome to review the pilot's data-handling protocols as part of an advisory relationship — we expect this and welcome the scrutiny. Independent IRB or equivalent ethical review is contracted and provides an outside check on the protocol before any household receives a device.
P-09How does IBR-Tech handle the risk of false accusations or unintended harm?
By design, C.A.P. surfaces patterns to parents for review — it does not name accused third parties, does not initiate contact, and does not produce outputs intended for direct presentation to anyone outside the household without parental review. The fusion-based detection architecture is designed specifically to avoid single-signal false alarms.
We are aware that any technology that labels behavior as "concerning" carries risk of misinterpretation. The product's user-experience design includes explicit framing that alerts are signals warranting parental conversation, not conclusions about anyone's character or intent. The pilot's adverse-event protocol includes review of any case where C.A.P.'s output may have contributed to a harmful outcome.
P-10What are the limits of what IBR-Tech is willing to build?
We will not build content-monitoring features that intercept and read encrypted child communications. We will not build autonomous-response features that take action against accused third parties without parental and law-enforcement involvement. We will not build child-tracking features that extend C.A.P. beyond the home network. We will not build features that route family data through advertising or data-broker channels under any circumstance.
These are not aspirational limits — they are constraints on the company's product roadmap, and they will be reflected in the patent filings and in any grant-funded development.
P-11What does a first conversation with IBR-Tech look like?
A 30-minute video call. We will share what we are building, what we are asking, and what we can offer. We will listen to what your organization sees in the field that we should know about — particularly things that contradict assumptions we have made. We will not ask for a commitment in the first call, and we will follow up within 48 hours with a written summary of what we discussed and what next steps make sense.
If a partnership is the right fit, we will propose a specific structure. If it is not, we will say so.
P-12How does IBR-Tech protect partner organizations from reputational risk?
By designing the product, the pilot, and the public messaging in ways that we would be comfortable being publicly associated with — and by giving partner organizations approval rights over how their name appears in any public-facing IBR-Tech material. Partner organizations are not used as marketing collateral without explicit written approval of the specific content in question.
If partner organizations identify product or messaging choices that create reputational risk, we expect to hear about it and to take it seriously. The partnership is not worth keeping if it requires a partner to defend something they would not have signed off on.
P-13What if we want to support IBR-Tech's mission but cannot formally partner?
That is normal and welcome. Many child-safety organizations have policies that limit formal vendor partnerships. There are lighter-weight ways to engage — informal advisory conversations, introductions to other organizations or practitioners, public expressions of support for the broader category of veteran-built child-safety hardware, or simply ongoing dialogue as the product evolves.
We track these relationships honestly. An organization that has been generous with informal guidance will be acknowledged accordingly, even where a formal partnership is not possible.
P-14How do we contact IBR-Tech to start the conversation?
Direct contact information is provided on request. The founder personally handles initial partnership conversations and will continue to do so until the company scale makes that impractical. Email is the most efficient first contact, with a brief description of the organization and the type of relationship under consideration.