SECURE CONTACT METHODS
If you want to share testimony, leak documents, report Authority abuses, or contact me for any reason, here are the safest methods.
CRITICAL SECURITY WARNING:
- The Authority monitors internet traffic
- They actively search for people contacting this site
- Use encryption, anonymous connections, and operational security
- Your safety is YOUR responsibility. I'll protect your identity, but you must protect your access.
Contact Methods (By Security Level)
1. Physical Dead Drops (Most Secure)
How It Works: Leave physical materials (documents, notes, USB drives) at predetermined locations. I check periodically. No direct contact.
Security: No electronic trail. No face-to-face meeting. Authority can't intercept.
Dead Drop Locations: I can't publish these publicly (Authority reads this site). To establish dead drop contact:
- Use encrypted email (see below) to request dead drop information
- I'll provide location after verifying you're not Authority (may take time)
- Use location to leave materials
- I check drops weekly, retrieve materials
- Response (if needed) left at same location
Best For: Leaked documents, sensitive testimony, whistleblower materials
2. Encrypted Email (Good Security)
Email Address: contact@scorched-earth-files.com
IMPORTANT:
- Use VPN or Tor when accessing email
- Create anonymous email account (fake name, no real information)
- Don't access from home/work - use public WiFi
- Use PGP encryption if possible (my public key below)
- Don't include identifying information in emails
PGP Public Key:
[KEY FINGERPRINT: 2043-STC-EV-TRUTH]
mQENBF8dK3QBCAC9U2vMxK4h... [truncated for brevity]
...[full key available on request]...
-----END PGP PUBLIC KEY BLOCK-----
How to use PGP: Search "how to use PGP encryption" - many guides available. Worth learning if you're sharing sensitive information.
Best For: Initial contact, coordination, questions, less-sensitive information
3. Anonymous Web Form (Moderate Security)
URL: scorched-earth-files.com/submit.html
How It Works: Simple web form for submitting testimony, tips, information. No account required.
Security Notes:
- Use VPN/Tor when accessing form
- Don't include identifying information unless you consent to it being used
- Form encrypts submission before sending
- I don't log IP addresses or track submissions
Best For: Testimony, tips, general information, quick submissions
4. Radio Contact (Belt Settlements)
Frequency: 14.313 MHz (HAM radio, 20-meter band)
Call Sign: "NOVEMBER-TANGO-2043"
Schedule: Sundays, 1800-1900 GMT
How It Works: I monitor this frequency during scheduled times. Use call sign, I'll respond.
Security Notes:
- Authority monitors HAM radio - assume they're listening
- Use code words/phrases for sensitive topics
- Don't reveal locations, real names, or identifying details
- Best for coordination, general communication, Belt settlement contact
Best For: Belt settlement coordination, refugees seeking help, general contact when other methods unavailable
What I Need From You
If You're Sharing Testimony:
- Your story - what happened, when, where, who was involved
- Documentation - if you have any (denial letters, permits, photographs)
- Consent - can I publish your name, or do you want anonymity?
- Contact method - how can I reach you for follow-up questions? (optional)
If You're Leaking Documents:
- Documents themselves - photos, scans, copies, originals if safe
- Context - what are these? where did they come from?
- Authentication - how can I verify they're real?
- Safety concerns - will sharing these endanger you? how can I protect your identity?
If You're Reporting Authority Abuse:
- What happened - detailed account
- When and where - dates, times, locations, checkpoint numbers
- Who was involved - inspector names/IDs if you have them
- Evidence - documentation, photos, witnesses
- Current situation - are you safe? do you need help?
What I Promise You
- Source Protection: Your identity will NEVER be revealed without your explicit consent
- Careful Verification: I'll verify information before publishing to protect credibility
- No Judgment: Whatever your situation, I'm here to help, not judge
- Security Consciousness: I understand OpSec and will protect your safety
- Preservation: Your testimony/documents will be preserved, backed up, protected
- Attribution Control: You decide whether your name is used or kept anonymous
Frequently Asked Questions
Q: How do I know you're not Authority?
A: You don't, for certain. But consider:
- Authority has spent 14 years trying to shut this site down
- Authority references me in internal documents (SUBJECT #2043-STC-EV)
- Documents I've published have been verified as authentic by independent analysts
- If I were Authority, why would I publish evidence of their crimes?
Ultimately, trust must be earned over time. Start with less-sensitive information, verify my reliability, then decide.
Q: Will you really protect my identity?
A: Yes. Absolutely. I have never, in 14 years, revealed a source without explicit consent. Source protection is sacred to me. Twenty-three people died rather than reveal truth - I won't betray people who trust me with information.
Q: What if I change my mind about being public?
A: If you consent to public testimony and later change your mind, contact me. I'll remove your name, replace it with "Anonymous," and update the published version. Your story stays (it's evidence), but your identity is protected.
Q: Can you help me if I'm denied checkpoint crossing?
A: I can't overturn denials or provide fake documents. But I can:
- Document your case (adds to evidence of wrongful denials)
- Provide information about appeal processes
- Connect you with Belt settlements if appropriate
- Offer general guidance about options
Q: Can you help me leave the Authority (if I work for them)?
A: I can provide information about Belt settlements and general guidance. I can't smuggle people, provide false documents, or do anything that would endanger others. But if you want to leave, I'll help within my capabilities.
I know contacting me is scary. The Authority monitors. They retaliate. They've killed people for less.
Your fear is justified. Be cautious. Use good OpSec. Protect yourself.
But if you have testimony, evidence, or information that exposes Authority crimes - please share it. The truth matters. Your story matters.
I've protected sources for 14 years. I've never revealed anyone. I never will.
You're not alone. I'm here. We're in this together.
— Elena Vasquez, 10/30/2057
Security Checklist Before Contact
Before contacting me, verify:
- ☐ I'm using VPN or Tor
- ☐ I'm on public WiFi (not home/work)
- ☐ I've cleared browser history/cookies after
- ☐ I haven't included identifying information (unless I consent to it being public)
- ☐ I have a cover story if questioned about my activities
- ☐ I understand the risks and accept them
Your safety is your responsibility. I'll protect your identity once you contact me, but you must protect your access to me.