SUBMIT EVIDENCE OF AUTHORITY CRIMES
CRITICAL: READ ALL SECURITY INSTRUCTIONS BEFORE SUBMITTING
Your life may depend on following these protocols exactly.
The Authority has murdered whistleblowers. They monitor their own employees. They track internet activity. If you submit evidence without proper security, you WILL be identified and you WILL face consequences.
I will protect you. But you must protect yourself first. — Elena Vasquez
WHO SHOULD SUBMIT EVIDENCE
If you have ANY of the following, I want to hear from you:
- Authority internal documents - Memos, emails, operational orders, policies
- Checkpoint misconduct evidence - Photos, videos, documents, witness testimony
- Wrongful denial cases - Documentation proving valid travelers were denied
- Personnel files - Records of Authority employee misconduct, cover-ups
- Financial records - Proof of checkpoint revenue schemes, quotas, bonuses
- Historical documents - Pre-Collapse corporate planning, SCORCHED EARTH evidence
- Missing persons information - Evidence of disappeared whistleblowers, journalists, investigators
- Belt contamination data - Proof the contamination was deliberate or exaggerated
- Surveillance programs - BioVerify, checkpoint monitoring, tracking systems
- Personal testimony - Your story as victim, witness, survivor, or whistleblower
SECURITY LEVELS: CHOOSE YOUR SUBMISSION METHOD
LEVEL 1: MAXIMUM SECURITY (Authority Employees, High-Risk Sources)
Use this if: You work for the Authority, have access to classified materials, or face prison/death if identified.
STEP 1: SECURE YOUR IDENTITY
- NEVER use your personal computer, phone, or any Authority device
- Purchase a used laptop with cash (no ID, no credit card, from a pawn shop or private seller)
- NEVER connect it to your home internet or any network you've used before
- Use public WiFi only (coffee shops, libraries, airports - NEVER the same location twice)
- Install Tails OS (amnesic operating system that leaves no traces)
STEP 2: SECURE YOUR CONNECTION
- Boot Tails OS from USB drive
- Connect to Tor network (built into Tails)
- Access our Tor hidden service: scorched-earth-truth.onion
- NEVER access from same location twice
- NEVER access on same day/time pattern (randomize)
STEP 3: PREPARE YOUR EVIDENCE
- Remove ALL identifying metadata (use ExifTool or metadata scrubbing tools)
- Remove personal information (your name, employee ID, location details)
- Redact faces in photos/videos (unless they're evidence of Authority crimes)
- Encrypt files with strong password before upload (use VeraCrypt or 7-Zip AES-256)
STEP 4: SUBMIT THROUGH TOR UPLOAD PORTAL
- Access upload form at: scorched-earth-truth.onion/submit-secure
- Upload encrypted files (max 500 MB per upload)
- Provide decryption password in separate message (use PGP encryption)
- OPTIONAL: Provide anonymous contact method (Tor email, encrypted chat)
STEP 5: COVER YOUR TRACKS
- Shut down Tails (wipes all traces from RAM)
- Destroy USB drive if single-use (or store in extremely secure location)
- NEVER discuss your submission with ANYONE
- Continue normal behavior at work (don't change patterns)
- Watch for signs of investigation (but don't act paranoid)
LEVEL 2: HIGH SECURITY (Belt Residents, Activists, Moderate Risk)
Use this if: You're in a Belt settlement, neutral zone, or face moderate risk but not immediate death threat.
- Use Tor Browser (minimum requirement)
- Access Tor hidden service: scorched-earth-truth.onion
- Remove identifying metadata from files
- Upload through encrypted form
- Use VPN + Tor for extra protection (optional but recommended)
LEVEL 3: STANDARD SECURITY (General Public, Low Risk)
Use this if: You're submitting non-classified information, personal testimony, or public-source evidence.
- Use secure email: evidence@scorched-earth-files.secure [PGP REQUIRED]
- Encrypt message with PGP (Elena Vasquez public key on contact page)
- Remove personal information you don't want published
- Send from anonymous email account (ProtonMail, Tutanota recommended)
LEVEL 4: PHYSICAL SUBMISSION (Ultra High Security / No Digital Trace)
Use this if: You cannot risk any digital communication whatsoever.
Mail to: [Contact through Tor hidden service for current dead drop addresses]
- No return address
- Mail from random location (not your home city)
- Use cash for postage (no electronic payment trail)
- Include encrypted USB drive or printed documents
- Provide decryption key in separate mailing
In-Person Dead Drops: Available for extreme cases. Contact through Tor for coordinates.
WHAT HAPPENS TO YOUR EVIDENCE
- Secure Receipt: I receive your encrypted submission through secure channels
- Verification: I verify authenticity (check document formats, cross-reference, analyze metadata)
- Protection: Original files stored encrypted in multiple secure locations (Belt settlements, international servers)
- Redaction: I remove ANY remaining identifying information that could expose you
- Publication: Evidence published with analysis, context, corroboration from other sources
- Source Protection: Your identity NEVER revealed. I would rather go to prison than expose a source.
FREQUENTLY ASKED QUESTIONS
Q: Can the Authority trace my submission?
A: Not if you follow Level 1 Maximum Security protocol correctly. Tor hidden services + Tails OS + public WiFi + cash-purchased laptop = essentially untraceable. The Authority is powerful but not omniscient. Millions use Tor daily; they cannot track everyone.
Q: What if I make a mistake and expose myself?
A: I check all submissions for identifying information before publication. If I find anything that could expose you, I redact it or contact you (if you provided secure contact method) before publishing. However, YOU must assume primary responsibility for your own security.
Q: Can I submit evidence of crimes by specific Authority employees?
A: YES. Absolutely. This is exactly what I need. Personnel files, misconduct reports, witness testimony, evidence of specific crimes by named individuals. Isabella Jean's file came from sources like you. Submit it.
Q: What if I only have small pieces of information, not major "smoking guns"?
A: SUBMIT IT ANYWAY. I build cases from many small pieces. A single checkpoint denial log might seem minor to you, but combined with 50 other denial logs, it proves systematic quotas. Every piece matters.
Q: I'm scared. What if they kill me like the Truth Commission members?
A: Your fear is rational. They ARE dangerous. That's why security protocols exist. Follow them exactly. If you're too afraid, don't submit - your life is more valuable than any document. But know this: every whistleblower who has followed proper security has survived. The Truth Commission was murdered because we operated OPENLY. You will be ANONYMOUS.
Q: How do I know YOU aren't an Authority honeypot trap?
A: Valid question. Evidence:
- The Authority has tried to shut down this site 47 times (documented)
- Authority internal memo (leaked Oct 2057) threatens employees for reading this site
- I was tortured during Sacramento raid (medical records available through secure channels)
- Published evidence has been verified authentic by independent sources
- If I was Authority, they wouldn't need this elaborate trap - they already monitor everything
But don't trust me. Trust the security protocols. If you follow Level 1 protocol correctly, it doesn't matter who I am - you're protected either way.
TYPES OF EVIDENCE MOST NEEDED RIGHT NOW
URGENT - Gate 33 Corruption Investigation:
- Internal Affairs reports on Gate 33 personnel
- Forgery market investigation documents
- Checkpoint revenue records 2055-2057
- Employee testimony about corruption
URGENT - Isabella Jean Criminal Record:
- Additional personnel files (we have J-0441013, seeking more)
- Witness testimony from anyone she processed
- Internal complaints about her conduct
- Commendation records showing Authority rewarded her for brutality
URGENT - BioVerify Surveillance Program:
- Technical specifications of tracking capabilities
- Contracts with corporate providers
- Retention policies for biometric data
- Evidence of warrantless surveillance
URGENT - Denial Quota System:
- More quota sheets from other checkpoints
- Bonus payment records linked to denials
- Performance reviews rewarding high denial rates
- Training materials instructing inspectors to deny valid documents
AFTER YOU SUBMIT
What to expect:
- Confirmation: If you provided contact method, I'll confirm receipt within 48 hours (via encrypted channel)
- Questions: I may have follow-up questions to verify authenticity or get context
- Timeline: Major documents published within 2-4 weeks after verification
- Attribution: Published as "Source: Authority whistleblower (identity protected)" or "Leaked document (verified authentic)"
- Your Safety: I monitor for signs your identity was compromised. If I detect risk, I'll warn you (if contact method provided)
WHY BLOW THE WHISTLE?
You might be thinking: "Why risk my life for this? What difference does one more leaked document make?"
Here's the difference:
The Isabella Jean personnel file proving the North Ribbon massacre? That came from one person. ONE BRAVE PERSON who said "this is wrong and the world needs to know."
Because of that one person, 19 murdered victims have names. Their families have proof. The truth is documented. History will remember. Isabella Jean will be judged by her crimes, not her propaganda.
That's what one whistleblower can do.
The Authority wants you to think you're powerless. That compliance is survival. That silence is safety.
They're wrong. The truth is power. Your conscience is power. Your courage is power.
Blow the whistle. The dead are counting on you. The future is counting on you.
— Elena Vasquez
READY TO SUBMIT?
Choose your security level:
- Maximum Security: Access Tor hidden service at scorched-earth-truth.onion/submit-secure
- High Security: Email evidence@scorched-earth-files.secure (PGP required - key on contact page)
- Physical Submission: Contact through Tor for dead drop addresses
Full contact information and PGP key →