Publication page

Source Safety

How to securely submit information to the Trump's War Crimes Archive. Encrypted contact methods, anonymity guidance, and source protection.

Secure Contact

For sensitive information, use encrypted email over Tor.

  1. Open Tor Browser (free, anonymous)
  2. Go to ProtonMail and create a free account (no personal info required over Tor)
  3. Send your information to: NicWeyand@ProtonMail.com

ProtonMail is end-to-end encrypted. When both sender and receiver use ProtonMail, the contents are encrypted in transit and at rest. Proton cannot read the messages. Combined with Tor Browser, your IP address is hidden from both Proton and us.

Do not use your real name, work email, or personal email for this.

What We're Looking For

  • Government documents, court filings, or official records related to documented incidents
  • First-hand accounts of detention conditions, deportation procedures, or enforcement actions
  • Evidence of government website scrubbing or document removal
  • Legal analyses from qualified attorneys on incidents we've documented
  • Corrections to existing incident records (factual errors, misattributed sources, incorrect dates)

What We Do NOT Want

  • Classified material — we document from public sources only
  • Information that could only have come from a single identifiable person
  • Anything that would require us to protect your identity in order to publish — we are not equipped for source protection at that level yet

Read This Before You Reach Out

Source protection starts before you make contact. The first message can expose you — even if we later suggest something safer.

  • Do not use a work device, work account, work network, or any device managed by your employer
  • Do not send files with identifying metadata (Word documents, photos with EXIF data, PDFs with author fields)
  • Do not search for this site or Tor Browser on a work computer
  • Do not assume deleting a message removes the records created when you first sent it
  • Do not tell anyone you're considering contacting us

Strip Metadata Before Sending

If you're sending documents:

  • PDFs: use exiftool -all= document.pdf to strip metadata
  • Images: use exiftool -all= photo.jpg or take a screenshot of the image instead
  • Word/Office: don't send these — convert to PDF first, then strip
  • Or just describe what you have in plain text. We can request the document through a safer channel if needed.

Lilac Party SecureDrop

For fully anonymous submissions, use our SecureDrop instance. It runs on dedicated infrastructure in Iceland, completely separate from the public website.

SecureDrop .onion address (Tor Browser required):

http://jq44bmv2ayrrwqgmzvfuewq4p4lqxvrumrqd6wp5tnbka5zcv5q2olad.onion

  • Open Tor Browser
  • Paste the .onion address above
  • Submit your message and/or files
  • All submissions are encrypted with GPG before storage — only we can read them
  • No JavaScript. No logs. No IP tracking.

GPG fingerprint: FCFE 8D80 0652 54B6 06D2 1358 F1BB 4990 FBA7 D43F

For Attorneys and Investigators

If you represent a legal organization, the ICC, or a human rights body, you don't need to be anonymous. Contact directly:

Every incident page includes structured citation formats (Chicago, APA, Bluebook, BibTeX, RIS), JSON exports, and links to preserved evidence copies. The evidentiary standards page explains how our classifications map to ICC thresholds.

Further Reading