Please note: We cannot provide you with legal advice about any obligations you might or might not have regarding disclosure of information. If you have concerns, consult an attorney.
This site was set up as a way for people to leak documents related to the issue of climate change as anonymously and securely as possible, and to assist people in making their stories of fraud and corruption public.
While we use the latest industry standards as described by media outlets who offer secure and anonymous means for submitting documents, no one can 100% guarantee your anonymity or security.
This site is maintained by a small group of concerned citizens with access to major media outlets. We can evaluate your documents and make sure they get the public attention they deserve.
Here are three ways that you can send us documents: by EMAIL, or to an anonymous PO box we check weekly.
We strongly suggest consulting additional resources before providing us materials or blowing the whistle on an employer. Helpful resources include The Art of Anonymous Activism, a joint project of POGO, PEER, and GAP.
What are we interested in? Sources and documents. You might be privy to documents you feel show evidence of unethical practices by a corporation or government entity interfering with the scientific understanding of climate change or the implementation of regulations to reduce global greenhouse gas emissions.
A potential whistleblower should seek legal advice before making any disclosures to an organization, a government review board, or the media. Remaining anonymous in the early stages of disclosure and contact with us is also important.
Who are we interested in hearing from? Whether you are a current employee of a company, a retired government or corporate employee, or a government contractor, we want to hear from people who have previously undisclosed information, particularly about fraudulent or unethical practices in the energy and environment sector regarding climate change.
Potential danger zones for sources or whistleblowers:
- using company or government equipment, phones, email, or computers to send information.
- working with classified information
- leaving a fingerprint on information because of the manner information was obtained or by leaving identifying information on a document before sharing