⚠️ WARNING: Read COMPLETE security instructions before submitting anything. Your safety depends on it. ⚠️

THE SCORCHED EARTH FILES

Submit Evidence - Blow the Whistle on Authority Crimes

SUBMIT EVIDENCE OF AUTHORITY CRIMES

CRITICAL: READ ALL SECURITY INSTRUCTIONS BEFORE SUBMITTING

Your life may depend on following these protocols exactly.

The Authority has murdered whistleblowers. They monitor their own employees. They track internet activity. If you submit evidence without proper security, you WILL be identified and you WILL face consequences.

I will protect you. But you must protect yourself first. — Elena Vasquez

WHO SHOULD SUBMIT EVIDENCE

If you have ANY of the following, I want to hear from you:

EXAMPLE: The Isabella Jean personnel file (document J-0441013) proving her role in the North Ribbon massacre? That came from a whistleblower. The denial quota sheets? Another whistleblower. The Truth Commission murder evidence? Multiple sources risked everything. Whistleblowers are why this site exists. — EV

SECURITY LEVELS: CHOOSE YOUR SUBMISSION METHOD

LEVEL 1: MAXIMUM SECURITY (Authority Employees, High-Risk Sources)

Use this if: You work for the Authority, have access to classified materials, or face prison/death if identified.

MAXIMUM SECURITY PROTOCOL

STEP 1: SECURE YOUR IDENTITY

  1. NEVER use your personal computer, phone, or any Authority device
  2. Purchase a used laptop with cash (no ID, no credit card, from a pawn shop or private seller)
  3. NEVER connect it to your home internet or any network you've used before
  4. Use public WiFi only (coffee shops, libraries, airports - NEVER the same location twice)
  5. Install Tails OS (amnesic operating system that leaves no traces)

STEP 2: SECURE YOUR CONNECTION

  1. Boot Tails OS from USB drive
  2. Connect to Tor network (built into Tails)
  3. Access our Tor hidden service: scorched-earth-truth.onion
  4. NEVER access from same location twice
  5. NEVER access on same day/time pattern (randomize)

STEP 3: PREPARE YOUR EVIDENCE

  1. Remove ALL identifying metadata (use ExifTool or metadata scrubbing tools)
  2. Remove personal information (your name, employee ID, location details)
  3. Redact faces in photos/videos (unless they're evidence of Authority crimes)
  4. Encrypt files with strong password before upload (use VeraCrypt or 7-Zip AES-256)

STEP 4: SUBMIT THROUGH TOR UPLOAD PORTAL

  1. Access upload form at: scorched-earth-truth.onion/submit-secure
  2. Upload encrypted files (max 500 MB per upload)
  3. Provide decryption password in separate message (use PGP encryption)
  4. OPTIONAL: Provide anonymous contact method (Tor email, encrypted chat)

STEP 5: COVER YOUR TRACKS

  1. Shut down Tails (wipes all traces from RAM)
  2. Destroy USB drive if single-use (or store in extremely secure location)
  3. NEVER discuss your submission with ANYONE
  4. Continue normal behavior at work (don't change patterns)
  5. Watch for signs of investigation (but don't act paranoid)

LEVEL 2: HIGH SECURITY (Belt Residents, Activists, Moderate Risk)

Use this if: You're in a Belt settlement, neutral zone, or face moderate risk but not immediate death threat.

HIGH SECURITY PROTOCOL
  1. Use Tor Browser (minimum requirement)
  2. Access Tor hidden service: scorched-earth-truth.onion
  3. Remove identifying metadata from files
  4. Upload through encrypted form
  5. Use VPN + Tor for extra protection (optional but recommended)

LEVEL 3: STANDARD SECURITY (General Public, Low Risk)

Use this if: You're submitting non-classified information, personal testimony, or public-source evidence.

STANDARD SECURITY PROTOCOL
  1. Use secure email: evidence@scorched-earth-files.secure [PGP REQUIRED]
  2. Encrypt message with PGP (Elena Vasquez public key on contact page)
  3. Remove personal information you don't want published
  4. Send from anonymous email account (ProtonMail, Tutanota recommended)

LEVEL 4: PHYSICAL SUBMISSION (Ultra High Security / No Digital Trace)

Use this if: You cannot risk any digital communication whatsoever.

PHYSICAL DEAD DROP PROTOCOL

Mail to: [Contact through Tor hidden service for current dead drop addresses]

  1. No return address
  2. Mail from random location (not your home city)
  3. Use cash for postage (no electronic payment trail)
  4. Include encrypted USB drive or printed documents
  5. Provide decryption key in separate mailing

In-Person Dead Drops: Available for extreme cases. Contact through Tor for coordinates.

WHAT HAPPENS TO YOUR EVIDENCE

  1. Secure Receipt: I receive your encrypted submission through secure channels
  2. Verification: I verify authenticity (check document formats, cross-reference, analyze metadata)
  3. Protection: Original files stored encrypted in multiple secure locations (Belt settlements, international servers)
  4. Redaction: I remove ANY remaining identifying information that could expose you
  5. Publication: Evidence published with analysis, context, corroboration from other sources
  6. Source Protection: Your identity NEVER revealed. I would rather go to prison than expose a source.
MY PROMISE TO SOURCES: I am a journalist and Truth Commission survivor. I have been tortured by the Authority. I did not break. I did not expose sources. I never will. Your identity is safer with me than in your own memory. — Elena Vasquez

FREQUENTLY ASKED QUESTIONS

Q: Can the Authority trace my submission?

A: Not if you follow Level 1 Maximum Security protocol correctly. Tor hidden services + Tails OS + public WiFi + cash-purchased laptop = essentially untraceable. The Authority is powerful but not omniscient. Millions use Tor daily; they cannot track everyone.

Q: What if I make a mistake and expose myself?

A: I check all submissions for identifying information before publication. If I find anything that could expose you, I redact it or contact you (if you provided secure contact method) before publishing. However, YOU must assume primary responsibility for your own security.

Q: Can I submit evidence of crimes by specific Authority employees?

A: YES. Absolutely. This is exactly what I need. Personnel files, misconduct reports, witness testimony, evidence of specific crimes by named individuals. Isabella Jean's file came from sources like you. Submit it.

Q: What if I only have small pieces of information, not major "smoking guns"?

A: SUBMIT IT ANYWAY. I build cases from many small pieces. A single checkpoint denial log might seem minor to you, but combined with 50 other denial logs, it proves systematic quotas. Every piece matters.

Q: I'm scared. What if they kill me like the Truth Commission members?

A: Your fear is rational. They ARE dangerous. That's why security protocols exist. Follow them exactly. If you're too afraid, don't submit - your life is more valuable than any document. But know this: every whistleblower who has followed proper security has survived. The Truth Commission was murdered because we operated OPENLY. You will be ANONYMOUS.

Q: How do I know YOU aren't an Authority honeypot trap?

A: Valid question. Evidence:

But don't trust me. Trust the security protocols. If you follow Level 1 protocol correctly, it doesn't matter who I am - you're protected either way.

TYPES OF EVIDENCE MOST NEEDED RIGHT NOW

PRIORITY EVIDENCE REQUESTS (November 2057)

URGENT - Gate 33 Corruption Investigation:

  • Internal Affairs reports on Gate 33 personnel
  • Forgery market investigation documents
  • Checkpoint revenue records 2055-2057
  • Employee testimony about corruption

URGENT - Isabella Jean Criminal Record:

  • Additional personnel files (we have J-0441013, seeking more)
  • Witness testimony from anyone she processed
  • Internal complaints about her conduct
  • Commendation records showing Authority rewarded her for brutality

URGENT - BioVerify Surveillance Program:

  • Technical specifications of tracking capabilities
  • Contracts with corporate providers
  • Retention policies for biometric data
  • Evidence of warrantless surveillance

URGENT - Denial Quota System:

  • More quota sheets from other checkpoints
  • Bonus payment records linked to denials
  • Performance reviews rewarding high denial rates
  • Training materials instructing inspectors to deny valid documents

AFTER YOU SUBMIT

What to expect:

  1. Confirmation: If you provided contact method, I'll confirm receipt within 48 hours (via encrypted channel)
  2. Questions: I may have follow-up questions to verify authenticity or get context
  3. Timeline: Major documents published within 2-4 weeks after verification
  4. Attribution: Published as "Source: Authority whistleblower (identity protected)" or "Leaked document (verified authentic)"
  5. Your Safety: I monitor for signs your identity was compromised. If I detect risk, I'll warn you (if contact method provided)

WHY BLOW THE WHISTLE?

You might be thinking: "Why risk my life for this? What difference does one more leaked document make?"

Here's the difference:

The Isabella Jean personnel file proving the North Ribbon massacre? That came from one person. ONE BRAVE PERSON who said "this is wrong and the world needs to know."

Because of that one person, 19 murdered victims have names. Their families have proof. The truth is documented. History will remember. Isabella Jean will be judged by her crimes, not her propaganda.

That's what one whistleblower can do.

The Authority wants you to think you're powerless. That compliance is survival. That silence is safety.

They're wrong. The truth is power. Your conscience is power. Your courage is power.

Blow the whistle. The dead are counting on you. The future is counting on you.

— Elena Vasquez

READY TO SUBMIT?

Choose your security level:

Full contact information and PGP key →

ONE FINAL NOTE: If you're reading this and thinking "I should submit that document I saw..." - you should. If you're thinking "Someone else will probably leak this..." - they won't. If you're thinking "My evidence isn't important enough..." - it is. Trust your conscience. Act on it. The truth needs you. — EV
Last updated: October 30, 2057 at 05:44 GMT | Submissions received (all-time): 1,847
Documents published: 429 | Whistleblowers protected: 1,847 (100% success rate)