Tips on How to Leak Information More Securely

This site was set up as a way for people to leak documents related to the issue of climate change as anonymously and securely as possible, and to assist people in making their stories of fraud and corruption public.

While we use the latest industry standards as described by media outlets who offer secure and anonymous means for submitting documents, no one can 100% guarantee your anonymity or security.

This site is maintained by a small group of concerned citizens with access to major media outlets. We can evaluate your documents and make sure they get the public attention they deserve.

Here are three ways that you can send us documents: by EMAIL, by PHONE/VOICEMAIL and to an actual MAILBOX.

We 
strongly suggest consulting additional resources before providing us materials or 
blowing the whistle on an employer.  Helpful resources include The Art of Anonymous Activism,
 a joint project of POGO,
 PEER, and GAP and websites like National Whistleblower Center.

What are we interested in? Sources and documents. You might be privy to documents you feel show evidence of unethical practices by a corporation or government entity interfering with the scientific understanding of climate change or the implementation of regulations to reduce global greenhouse gas emissions.

A potential whistleblower should seek legal advice before
 making any disclosures to an organization, a government review board, or the 
media.  Remaining anonymous in the early
stages of disclosure and contact with us is also important.

Who are we 
interested in hearing from?  Whether you 
are a current employee of a company, a retired government or corporate employee,
or a government contractor, we want to hear from people who have previously undisclosed 
information, particularly about fraudulent or unethical practices in the energy
and environment sector regarding climate change.

Potential danger zones for sources or whistleblowers:

  • using company or government equipment,
 phones, email, or computers to send information.
  • working with classified information
  • leaving a fingerprint on information because
of the manner information was obtained or by leaving identifying information on 
a document before sharing