Have you been a victim or a witness of an international crime? Do you have access to information that is not available in open sources and you want to blow the whistle?
We are here for you.
I need to remain anonymous
We understand that you are in a situation that requires you not to be identified. Determine which of the options below corresponds best to your situation and follow the protocol.
I'm not being watched, but I want to be careful not to be identified.
Connect to a wifi network that isn't yours or your employer's, or go to a cyber café you don't usually frequent. Don't take your phone or other connected objects with you, pay in cash and be careful of surveillance cameras. Don't give any personal information.
If the intelligence is particularly sensitive, consider buying - in cash - a smartphone or laptop exclusively dedicated to transmitting information. If so, keep it in a safe place, delete the information from your device after sending, using an “overwrite-erase” method, using a software such as “Eraser”. Formatting the hard disk may not be enough.
Use a VPN. Some are free, such as Proton VPN, Hide.me VPN or Windscribe. Tor is also an option.
During the operation, do not connect to websites that require identification (facebook, etc). Be careful not to authorize cookies from any sites you may visit.
Create a free e-mail address on Protonmail. Don't include any information or name that could be linked to you. Your password should be long and complex. Memorize it, don't write it - especially not on your device. Fill in the form below with the information at your disposal.
If you plan to continue providing intelligence, get trained in counter-surveillance. The ” guide d’autodéfense numérique “ (in French) for cyber matters, and ” the private investigator guide book “ (in English) for IRL counter-surveillance, are good introductions.
TESTIMONY FORM :
I'm potentially being tracked and I feel in danger
If possible, wait until the situation has stabilized and surveillance has eased. If you consider that waiting won't change anything, or if you think it's urgent to send us your intelligence, here are some recommendations:
If possible, buy a smartphone in cash, in a store you don't usually frequent. Use a wifi network that isn't yours or your employer's, or use a prepaid internet card. If you can't, go to a cyber café you don't usually frequent. Don't take your phone or other connected objects with you, pay in cash and be careful of surveillance cameras. Don't give out any personal information.
Use a VPN. Some are free, such as Proton VPN, Hide.me VPN or Windscribe. Tor is also an option.
During the operation, do not connect to websites that require identification (facebook, etc). Be careful not to authorize cookies from any sites you may visit.
If you plan to continue providing intelligence, get trained in counter-surveillance. The ” guide d’autodéfense numérique “ (in French) for cyber matters, and ” the private investigator guidebook “ (in English) for IRL counter-surveillance, are good introductions.
If you have performed the operation on a personal device, erase the hard disk using an “overwrite-erase” method, using software such as “Eraser”. Formatting the hard disk is insufficient. If you can't do this, or if you don't want to take any risks, destroy the device and dispose of the remains.
Since we won't be able to contact you, please ensure that the information you send us is as detailed as possible. Please be aware that we will not be able to use the information if the elements provided do not make it possible to establish the alleged facts with certainty.
If it is not possible to send information by e-mail, you can send your information by postal mail, in hard copy or on USB support, to 122 rue Amelot, XIe arr. Paris, FRANCE. Please note that every USB device received by the DCCI will necessarily pass through a decontamination station and will be opened on a specific computer, which is not connected to the DCCI servers.
TESTIMONY FORM :
I don't have to remain anonymous
TESTIMONY FORM :
* * *
METHODE POUR LA PRISE D’IMAGES
If you want to include pictures with your testimony, please consider the methodology provided in the document below.
This methodology allows to take exploitable pictures, in order to establish clearly the occurrence of a crime and its circumstances.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.