• Have you witnessed or been the victim of an international crime?
  • Do you have information that is not available in open sources?
  • You want to blow the whistle ?

Testify.
We are here for you.

If you want to include images with your testimony, we invite you to consult our methodological guide. It explains how to produce usable images that clearly establish the reality of a crime and its circumstances:

METHODOLOGY FOR TAKING IMAGES – FRE/ENG/ARA

Determine which situation best corresponds to yours, and complete the form:

We understand that you are in a situation that requires you not to be identified. Determine which of the options below corresponds best to your situation and follow the protocol.

  • Connect to a wifi network that isn't yours or your employer's, or go to a cyber café you don't usually frequent. Don't take your phone or other connected objects with you, pay in cash and be careful of surveillance cameras. Don't give any personal information.

 

  • If the intelligence is particularly sensitive, consider buying - in cash - a smartphone or laptop exclusively dedicated to transmitting information. If so, keep it in a safe place, delete the information from your device after sending, using an “overwrite-erase” method, using a software such as “Eraser”. Formatting the hard disk may not be enough.

 

  • Use a VPN. Some are free, such as Proton VPN, Hide.me VPN or Windscribe. Tor is also an option.

 

  • During the operation, do not connect to websites that require identification (facebook, etc). Be careful not to authorize cookies from any sites you may visit.

 

  • Create a free e-mail address on Protonmail. Don't include any information or name that could be linked to you. Your password should be long and complex. Memorize it, don't write it - especially not on your device. Fill in the form below with the information at your disposal.

 

  • If you plan to continue providing intelligence, get trained in counter-surveillance. The ” guide d’autodéfense numérique “ (in French) for cyber matters, and ” the private investigator guide book “ (in English) for IRL counter-surveillance, are good introductions.

TESTIMONY FORM :

If possible, wait until the situation has stabilized and surveillance has eased. If you consider that waiting won't change anything, or if you think it's urgent to send us your intelligence, here are some recommendations:

  • If possible, buy a smartphone in cash, in a store you don't usually frequent. Use a wifi network that isn't yours or your employer's, or use a prepaid internet card. If you can't, go to a cyber café you don't usually frequent. Don't take your phone or other connected objects with you, pay in cash and be careful of surveillance cameras. Don't give out any personal information.

 

  • Use a VPN. Some are free, such as Proton VPN, Hide.me VPN or Windscribe. Tor is also an option.

 

  • During the operation, do not connect to websites that require identification (facebook, etc). Be careful not to authorize cookies from any sites you may visit.

 

  • If you plan to continue providing intelligence, get trained in counter-surveillance. The ” guide d’autodéfense numérique “ (in French) for cyber matters, and ” the private investigator guidebook “ (in English) for IRL counter-surveillance, are good introductions.

 

  • If you have performed the operation on a personal device, erase the hard disk using an “overwrite-erase” method, using software such as “Eraser”. Formatting the hard disk is insufficient. If you can't do this, or if you don't want to take any risks, destroy the device and dispose of the remains. 

 

  • Since we won't be able to contact you, please ensure that the information you send us is as detailed as possible. Please be aware that we will not be able to use the information if the elements provided do not make it possible to establish the alleged facts with certainty.

 

TESTIMONY FORM :

TESTIMONY FORM :