HOW TO LEAK DOCUMENTS SAFELY
I've worked with 47 whistleblowers over 13 years. None have been caught because of poor security on my end. This is how we do it.
CRITICAL WARNING
If you work for the Authority and you're considering leaking documents, understand the risks:
- You can be prosecuted under the Information Security Act (minimum 15 years)
- Internal Affairs monitors employee communications
- They track document access, printing, photographing
- Whistleblowers have been disappeared, not just fired
I'm not telling you to do this. I'm telling you how to do it safely IF you decide the truth matters more than your job.
RULE #1: NEVER USE AUTHORITY SYSTEMS
The Authority monitors EVERYTHING on their network:
- Email (yes, even "deleted" messages)
- Document access logs (they know who viewed what, when)
- Print jobs (every page has invisible tracking dots)
- USB drives (flagged if you insert one into Authority computers)
- Screenshots (some systems log screen captures)
- Chat/messaging (all recorded, even "private" channels)
If you access a classified document on their system, they will know. The question is whether they notice before you leak it.
RULE #2: USE PERSONAL DEVICES ONLY
What You Need:
- Burner phone - Purchased with cash, not linked to your identity
- Public WiFi - Never your home network, never Authority facilities
- Tor Browser - Routes traffic through multiple nodes, harder to trace
- Encrypted email - ProtonMail or similar, created with burner identity
What You NEVER Use:
- Your personal phone/laptop linked to your real identity
- Your home or work internet connection
- Social media accounts
- Email accounts with your real name
RULE #3: PHOTOGRAPH, DON'T PRINT OR COPY
Modern printers embed invisible tracking dots on every page (Machine Identification Code). This can trace documents back to specific printers, times, and users.
Safer Method:
- Use your personal phone (not Authority-issued)
- Photograph the document on screen or paper
- Take photos in a bathroom stall or private area (no security cameras)
- Transfer photos to burner device via encrypted SD card or cable (NOT cloud/email)
- Delete originals from your personal phone immediately
- Factory reset the phone after transfer if possible
RULE #4: REMOVE IDENTIFYING METADATA
Digital photos contain metadata (EXIF data) that can reveal:
- Device model and serial number
- GPS location where photo was taken
- Date and time stamps
- Software versions
How to Strip Metadata:
- Use metadata removal tools (ExifTool, MAT2, etc.)
- Take a screenshot of the photo (instead of sending original)
- Or: I can strip metadata when you send to me (see contact page)
RULE #5: CONTACT ME SECURELY
NEVER email me from your work or personal email.
Secure Contact Methods:
- Encrypted Email: Create anonymous email account, use Tor Browser, contact me at contact@scorched-earth-files.com
- Dead Drops: Physical document drops at pre-arranged locations (email for details)
- Intermediaries: Contact Belt settlement resistance networks (they know how to reach me)
See full instructions: Secure Contact Methods
RULE #6: DON'T LEAK DOCUMENTS ONLY YOU ACCESSED
If you're the only person who accessed a classified file, and then it appears on this website, Internal Affairs will know it was you.
Safer Approach:
- Leak documents with wide distribution (many people have access)
- Wait several weeks/months after accessing before leaking
- Leak multiple documents at once (harder to pinpoint timing)
- Choose files that multiple departments access regularly
RULE #7: NEVER TELL ANYONE
Not your spouse. Not your best friend. Not your "trusted" coworker.
The Authority offers immunity and rewards for turning in whistleblowers. People talk. People get scared. People betray you.
If no one knows, no one can turn you in.
RULE #8: HAVE A COVER STORY
If Internal Affairs questions why you accessed certain files:
- "I was researching for my performance review"
- "I was cross-checking data for my report"
- "I thought I needed it for the [legitimate project] assignment"
- "I clicked the wrong file by mistake"
Prepare plausible explanations BEFORE you access sensitive documents.
RULE #9: ASSUME YOU'RE BEING WATCHED
If you work for the Authority:
- Assume your workspace has cameras
- Assume your computer is monitored
- Assume your communications are recorded
- Assume Internal Affairs reviews access logs
Act normal. Access documents during normal work hours for plausible reasons. Don't change your behavior patterns.
RULE #10: KNOW WHEN TO STOP
If you notice:
- Unexpected "security reviews" of your work
- Questions about your document access patterns
- Internal Affairs asking colleagues about you
- Increased monitoring or scrutiny
STOP IMMEDIATELY. Destroy burner devices. Delete encrypted accounts. Resume normal work. Wait 6+ months before considering further leaks.
WHAT I DO TO PROTECT YOU
When you send me documents, I:
- Strip all metadata - Remove EXIF data, device fingerprints, timestamps
- Redact identifying details - Remove internal distribution lists, access codes, recipient names
- Delay publication - Wait weeks/months to obscure leak timing
- Never reveal sources - Even under threat, I don't name whistleblowers
- Use secure deletion - Originals are destroyed after publication
FOR NON-AUTHORITY WHISTLEBLOWERS
If you have evidence from private companies, civilian records, personal testimony:
- Same security practices apply (burner devices, Tor, encrypted email)
- Corroborate your story (do you have documents, witnesses, photos?)
- Be prepared to verify identity (I won't publish unverified claims)
- Understand risks (retaliation can happen even outside Authority employment)
FINAL THOUGHTS
You don't owe the Authority your silence.
If you've seen evidence of crimes, cover-ups, murders, corruption - you have a choice. You can keep quiet and stay safe. Or you can risk everything to tell the truth.
I'm not going to tell you which choice is right. But if you decide the truth matters more than your safety, I'll do everything in my power to protect you while you expose it.
— Elena Vasquez
ADDITIONAL RESOURCES
Secure Contact Methods - Detailed instructions for reaching me safely
Document Verification - How to verify evidence before submitting
How to Resist - Other ways to fight Authority control
"The truth is worth the risk. Twenty-three of my colleagues died proving it."
— Elena Vasquez, Sacramento Truth Commission Survivor