Tuesday, August 20, 2019

How Aspiring Whistleblowers Can Protect Themselves

It is always difficult for those who notice illegal or unethical behavior in their organizations to decide whether or not to blow the whistle.

The biggest reason some people prefer not to is simple fear. Blowing the whistle can be career suicide for some and possibly physically dangerous for others. If you have legitimate cause to blow the whistle, how can you do it in a way that would not expose yourself?

The answer is simple – do it digitally. In this article, we would look at how whistleblowers can use the internet to ensure how they can blow the whistle without endangering themselves.

What is Whistleblowing?

Before going out looking to protect yourself, however, we should take a look at whistleblowing is. Whistleblowing refers to the uncovering and sharing of unethical or illegal behaviors within an organization. This applies to all companies, institutions, and even governments, regardless of ownership, financials, and incorporation status. The most famous example of whistleblowing is likely the case of Edward Snowden; who blew the whistle on the NSA (readers should note that the techniques below cannot protect you if you blow the whistle on a major US spy agency).

Techniques for Protecting Yourself

Aspiring whistleblowers are well aware of risks to whistleblowing. This is why you should do as much as you can to hide your identity, and below are 3 ways to help you do just that:

1. Be mindful of access

For those working in offices, it may be tempting to blow the whistle at your desk. This would be a terrible idea, almost immediately exposing who you are even if no one is looking over your shoulder. The reason is that WiFi networks serve the employers, not the employees. Essentially, everything you do while connected the company network can be tracked by your company unless done under a VPN that encrypts Wi-Fi data. But unless there are no other options, you’re not advised to risk exposing yourself by blowing the whistle at the workspace.

2. Hide your trail

Many actions you take can result in you leaving a trail for your targets to follow, particularly if you are doing so online. While technically more anonymous than perhaps meeting someone in a coffee shop, there are many things you can do that could unravel your plan to stay hidden. Threats abound, from paying with a credit card to simply printing a document with the metadata intact. The way around this is the adopt some of the privacy tools we will cover in a later section.

3. Protect your sources

When you are blowing the whistle, it is tempting to disregard the safety of your sources of information. Journalists are known for protecting their sources, but this should be a high priority for everyone simply as a measure of self-protection. If caught providing information to a whistleblower, your source faces severe consequences and could be easily enticed to turn against you. Hence, even if you are planning to whistleblow anonymously, you should discuss your strategy with your sources offline. This makes your conversations harder to track. You should also provide your source with a signal that only the two of you know so no one can impersonate you. Those communicating online can use a cryptographic key while those doing so offline may want to design a passphrase.

Tools for Protecting Yourself

Secrecy and encryption tools abound and should be used as much as possible when you are blowing the whistle. They should be used in every step of the way since your cyber security and anonymity is only as strong as its weakest link.

Often, in the beginning, some research is necessary and the internet is often the most convenient option. However, online behavior is often tracked by multiple parties; so, how can you get around it? In terms of browsing the internet, a good way would be to use either an Incognito (for Chrome) or Private (for Firefox) window. This leaves you exposed to network admins, ISPs and DNS servers.

To ensure they too cannot see your online activity, you should use a VPN. To further increase security, you can opt for a privacy-oriented search engine like Tor, which routes your traffic in relays all across the world. You can further augment this by first connecting to a VPN before using Tor.

When you are finally ready, you should use encrypted service to send the message that blows the whistle. Examples include SecureDrop, Jabber/XMPP with OTR encryption or Signal. Each ensures that your messages are encrypted before they are delivered to the target destination. To pay for the tools, it is probably safest to do so via cryptocurrency since that is far harder to trace than a credit card.

More Articles

FBI Arrests 61 Darknet Vendors, Seizes $4.5 Million Worth...

Joint Criminal Opioid and Darknet Enforcement (J-CODE), a team made up of law authorities from different agencies has arrested 61 people associated...

Over 2,000 Grocery Stores in the U.S Enable Bitcoin...

In a blog post on April 24, Coinme, a blockchain financial technology company announced the launch of more kiosks where Bitcoin can...

Rockefeller & Soros: Behemoths Investing in Crypto Despite Bear...

From the beginning of this year, the market has experienced a continued drop from the high prices that we had in December to the...

Top Indian Business School Issues Blockchain-based Degree Certificates

SP Jain School of Global Management, one of India's top business schools has issued 1,189 certificates to its graduates. These certificates have been stored...

Why should I use Bitcoin? I already have a...

You might be surprised by how popular this question is and the fact that most people who own bitcoin don’t have an answer to...

Technical Analysis: BTCUSD $6000 Could be in the picture

If Bitcoin can't manage to hold this major support around $9300, it may travel down to the next significant level of support with is...

New Australian Startup Promotes Sending Crypto Via Email

Cryptocurrencies, as revolutionary as they are, still have a really high barrier for newbies to get into them. There are significant aspects that make...

Swiss Food Manufacturer to Track Fish Products Using Blockchain...

The Swiss food manufacturer, Gustav Gerig is now the first European importer to track fishes from when they're caught to their processing stage using...

Abkhazia Power Grid To Collapse As A Result Of...

The Republic of Abkhazia is currently running the risk of destabilizing its entire power grid system due to the heavy rate of cryptocurrency mining,...

World Economic Forum: “Blockchain Could Bring $1.1 Trillion in...

There is a strong likelihood that the blockchain technology revenue might experience a drastic growth of over $1 trillion in World Trade, this according...

Bakkt To Help JP Morgan Get Into The Crypto...

JP Morgan awaits the launch of the Bakkt platform which is slated for later this year as the only tempting platform that could drive...

Cryptocurrency Bank To Be Launched In Wyoming

The state of Wyoming plans to establish a Cryptocurrency Bank, to boost the state's potentials of becoming a haven for the cryptocurrency industry and...

Latest Articles

Why Some Financial Bubbles Are Necessary Economic Disasters

The history of the worldwide economy is punctuated by financial bubbles. They happen more often than we think.  Fortunly’s infographic below provides a comprehensive...

Why US-based people can’t bet with bitcoins at online...

Online gambling using bitcoin has been happening since the time when cryptocurrency came into being. In the initial days, gamblers used to opt for...

Couple Pays For Breakfast Using Bitcoin, Community Finds This...

A Reddit user by the username u/portageco recently made a post in bitcoin's official subreddit. In his post, u/portageco boasts about how he paid...

Australian Woman Leads Adoption, Tours 10 Countries Spending Cryptocurrencies

Who says you can't go around the world spending cryptocurrencies? As many believe, cryptocurrencies are only good for speculations. But with a little research,...

Did A Physical Bitcoin Just Sell For $99k On...

As at the time of reporting, the listing on eBay had closed. This could be because the seller got a buyer or he decided...

Litecoin Now Approved In 30,000+ Stores

As cryptocurrencies gain ground, more and more technology-based firms find ways to incorporate the nascent technology into everyday life. Moon, prior to this time,...

How To Shop on Amazon with Bitcoin – Step-By-Step...

Wondered how to shop on Amazon with bitcoin? Then here's how you can purchase goods on one of the largest e-commerce websites that ships...

How To Buy Bitcoin On Coinbase – Step-By-Step Guide

Buy Bitcoin on Coinbase instantly in the U.S., UK, Canada, or anywhere you are globally. Coinbase cryptocurrency exchange has enabled its customers buy the...

Grayscale Bitcoin Trust Boosts By 300%, Affects Oil &...

The institutional investment product, Grayscale Bitcoin Trust (GBTC), experienced a growth of more than 300% due to its outstanding performance since February, Forbes reports....

How To Create A Coinbase Account – Step-By-Step Guide

Create a Coinbase account with ease. Use this illustrative guide to create a Coinbase account for buying, selling, and storing cryptocurrencies. And you know...

$9.2 Trillion Transferred Using Bitcoins In 2.5 Years

Against present belief that bitcoin is only used for speculation, James McDowall, a crypto investor and advisor shared a metric about Bitcoin that's been...

Malware Posing as Movie File Manipulates Results and Steals...

A new form of malware posing as movie file was discovered last year and was designed to steal cryptocurrency and inject manipulated results into...