Table of Contents - updated 20 June 2020
- Whistleblower Anonymity limits
- Mole Hunts
- Surveillance threats to bloggers, investigative journalists and political activists
- Technical ineptitude - the "bomb Al-Jazeera memo" leak
- Trustworthy Contacts for Whistleblowers ?
- Whistleblower middlemen, intermediaries, cut outs
- What to do if you are arrested as a whistleblower
- Secure computer configuration checklists and scripts etc.
- Email and Encryption
- Web Bugs and Read Receipts in Emails and Attachments
- Telephones - Pay Phone Boxes and Private Landlines
- Mobile Devices - WiFi>
- Buying a pre-paid phone card or mobile top up calling credit voucher anonymously
- Burner Phones - rarely used properly - Compartments may be good enough
- Mobile Phones and Wireless PDAs
- Signal Messenger - End to End Encrypted App
- Voice over IP and Communications Traffic Data Retention
- Fax Machines
- Photocopiers, Printers and Paper
- Shift PrtScr - Screen Dumps and photos of Computer Screens
- Electronic Document Files
- Photo Image Files
- CD-ROMs and DVDs and USB flash memory media
- Hard disk and USB Memory device Encryption
- File deletions
- Physical Meetings
- GPS satnavs and interactive web maps
- Dead Letter Drops and Geo Caches
- Covert Channel Signals for Meetings or Dead Letter Drops
- Postal mail and Courier services
- WikiLeakS.org - - no longer functioning for normal whistleblowers
- LeakDirectory.org wiki
- Tor - The Onion Router cloud of proxy servers
- Open Proxy Servers
- Virtual Private Networks
- Web Browser software anonymity
- Do not try to handle two whistleblowers at once on the same phone or email account
- Don't betray your sources through financial expense claims or payment authorisations
- Common Mistakes
- Conclusion
- Further Reading