Vous êtes témoin ou victime d’un crime international?
Do you have information that is not available in open sources?
You want to blow the whistle ?
Testify. We are here for you.
Si vous voulez inclure des photos avec votre témoignage, nous vous invitons à consulter notre guide méthodologique. Celui-ci explique comment produire des images exploitables, permettant d’établir clairement la réalité d’un crime et ses circonstances :
Determine which situation best corresponds to yours, and complete the form:
I need to remain anonymous
We understand that you are in a situation that requires you not to be identified. Determine which of the options below corresponds best to your situation and follow the protocol.
I'm not being watched, but I want to be careful not to be identified.
Connect to a wifi network that isn't yours or your employer's, or go to a cyber café you don't usually frequent. Don't take your phone or other connected objects with you, pay in cash and be careful of surveillance cameras. Don't give any personal information.
Si les renseignements sont particulièrement sensibles, considérez la possibilité d’acheter – en liquide – un smartphone ou un ordinateur portable dédié uniquement à la transmission d’informations. Le cas échéant, gardez-le en lieu sûr, supprimez les renseignements de votre appareil après l’envoie, en utilisant une méthode « d’effacement par réécriture », en utilisant un logiciel tel que « Eraser ». Le formatage du disque dur est insuffisant.
Use a VPN. Some are free, such as Proton VPN, Hide.me VPN or Windscribe. Tor is also an option.
During the operation, do not connect to websites that require identification (facebook, etc). Be careful not to authorize cookies from any sites you may visit.
Create a free e-mail address on Protonmail. Don't include any information or name that could be linked to you. Your password should be long and complex. Memorize it, don't write it - especially not on your device. Fill in the form below with the information at your disposal.
If you plan to continue providing intelligence, get trained in counter-surveillance. The ” guide d’autodéfense numérique “ (in French) for cyber matters, and ” the private investigator guide book “ (in English) for IRL counter-surveillance, are good introductions.
TESTIMONY FORM :
I'm potentially being tracked and I feel in danger
If possible, wait until the situation has stabilized and surveillance has eased. If you consider that waiting won't change anything, or if you think it's urgent to send us your intelligence, here are some recommendations:
If possible, buy a smartphone in cash, in a store you don't usually frequent. Use a wifi network that isn't yours or your employer's, or use a prepaid internet card. If you can't, go to a cyber café you don't usually frequent. Don't take your phone or other connected objects with you, pay in cash and be careful of surveillance cameras. Don't give out any personal information.
Use a VPN. Some are free, such as Proton VPN, Hide.me VPN or Windscribe. Tor is also an option.
During the operation, do not connect to websites that require identification (facebook, etc). Be careful not to authorize cookies from any sites you may visit.
If you plan to continue providing intelligence, get trained in counter-surveillance. The ” guide d’autodéfense numérique “ (in French) for cyber matters, and ” the private investigator guidebook “ (in English) for IRL counter-surveillance, are good introductions.
Si vous avez réalisé l’opération sur un appareil personnel, effacez le disque dur en utilisant une méthode « d’effacement par réécriture », en utilisant un logiciel tel que « Eraser ». Le formatage du disque dur est insuffisant. Si vous n’y parvenez pas ou que vous ne voulez pas courir de risque, détruisez l’appareil et débarrassez-vous des restes.
Dans la mesure où nous ne pourrons pas vous contacter, veillez à ce que les informations que vous nous envoyez soient aussi détaillées que possible. Notez que nous ne pourrons pas utiliser les informations si les éléments fournis ne permettent pas d’établir avec certitude les faits allégués.
TESTIMONY FORM :
I don't have to remain anonymous
TESTIMONY FORM :
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.