LESSWRONG
LW

216
US govt whistleblower DB and guide
Practical

4

US Govt Whistleblower Guide

by samuelshadrach
4th Nov 2025
Linkpost from samuelshadrach.com
8 min read
0

4

Practical

4

Previous:
US Govt Whistleblower Database
No comments4 karma
Next:
More notes on US govt whistleblower guide and DB
No comments4 karma
Log in to save where you left off
New Comment
Moderation Log
More from samuelshadrach
View more
Curated and popular this week
0Comments

2025-10-28

Disclaimer

  • Incomplete. Work-in-progress.

Why this guide?

  • I continue to think there isn't a single whistleblower guide on the internet that's good enough for this scenario. Some guides avoid talking about important details due to chilling effects. Other guides prioritise interests of journalists or lawyers.

Summary of the guide

  • If you are not leaking US classified information but only an overview of the situation based on your own word, your best choice is probably coming out publicly in the US with a legal defence and requesting donations to fund it.
    • Why?
      • Historically, a majority of such people did not end up in prison.
  • If you are leaking US classified information, your best choice is probably flying to Russia like Snowden did, obtaining asylum and then coming out publicly as a whistleblower. Your best choice is probably not improving your opsec and hoping to stay anonymous in the US.
    • Why is this the best plan?
      • The sysadmins maintain logs of username, timestamp and document id of every document downloaded from central DB to client machines. This is true for the NSA and is likely also true for all major US AI labs.
      • Almost every person who stayed in a country within US sphere of influence after leaking classified info has been imprisoned.
      • All the opsec recommendations mentioned in this guide are primarily to buy you time. You will likely still be identified eventually, for the above mentioned reason.
    • Expected positive outcomes
      • Some previous leaks (such as Snowden's leak) have lead to millions of people being convinced of a problem, when they were not otherwise as convinced. One person presenting empirical proof of a problem in the present is more convincing to the public than many people presenting only speculations and predictions.
      • Most leaks did not by themselves lead to significant political change. Once the machinery of the US govt is pointed in a certain direction, changing this direction is hard and takes time even if millions of people are willing to vote for change.
    • Why leak classified information, if it comes with additional risks?
      • Only few people have the courage to become a whistleblower against a govt. And getting political change is hard even after whistleblowers provide undeniable proof of a problem. If you are one of these people, you occupy a world-historically important position. I would recommend you leak more information rather than less, so that the public gets undeniable empirical proof of the problem you are pointing at.
    • How? (Security Mindset)
      • Security mindset is hard to quickly convey. (I don't yet have good resources for this.)
      • You should be familiar with concepts like bits of anonymity and security through obscurity. Every word, expression and action reduces bits of anonymity, as long as there's a physical trail, a digital trail or a person who observed it. Example of an action that reduces bits of anonymity: Leaving your house sparkling clean when you otherwise leave it somewhat messy.
      • You should be aware law enforcement has also read all the guides you're reading including this one.
      • You should probably avoid thinking of ad-hoc methods and stick to tried-and-tested methods instead.
      • The reason you might succeed at this plan is not because you're more intelligent or knowledgible than law enforcement, it's because of physics/engineering constraints that make whistleblowing easier than catching whistleblowers. Assume by default that they're more intelligent and knowledgible than you.
    • How? (Mental health)
      • Do not contact a mental health practitioner.
      • Some resources that might help
        • Read Secret life of secrets by Michael Slepian. Decide that you are morally correct in accepting the negative consequences on yourself and your loved ones. Accept that people around you will probably understand, but that there are no guarantees. Once your conscience is clear, the rest is just execution. Taking a month or two longer to take a clear decision is better than botching up execution due to mental health reasons.
        • Read about other cases from the whistleblower database. For Snowden, watch his Joe Rogan interview or book Permanent Record or Citizenfour documentary. For Assange, watch his interview after being released from prison or his old blog iq.org on internet archive. For Manning, read her autobuographical book. And so on.
        • Read about activists working in your field of interest. If your field is AI risk, you could watch Kokotajlo's interview where he talks about giving up AI lab equity, or Suchir Balaji's family interviews.
    • How? (Methods)
      • Preliminary research
        • You should do all your preliminary research on a dedicated TAILS setup only. This is a separate computer dedicated for this purpose.
        • Do not create any accounts or write stuff to the internet. Only read content.
        • Do not use a mobile phone for whistleblowing-related work, all phones are insecure.
      • Acquiring documents safely.
        • You will likely have to smuggle an SD card multiple times, at your workplace, residence, airport, and so on. Remember that buildings may contain scanners that reliably detect this.
        • Remember that your work computer that contains the files may log when a file is copied to external device or displayed on the monitor.
      • You should probably leave no digital trail.
        • You should probably redact documents yourself using GIMP on an airgapped TAILS setup, inspect the raw bytes for steganography and metadata, and create a single tarball of everything. Redacting audio/video correctly is hard, I would recommend sticking to plaintext and images if possible. .BMP is a good image format as it contains almost no metadata, allowing you to inspect the raw bytes more easily. Lower the image resolution to remove camera lens scratches.
        • If there is too much material to redact, my current recommendation is to not try to leak it. (This is a weak opinion. Do your own research, or wait for me to do mine.)
        • There is no safe way to erase a disk using a firmware or software tool. It is ideal to process data in RAM only using TAILS, and avoid using any disk. If you absolutely must use a disk, use a fresh SD card or an HDD. Do not use an SSD or a USB drive. This ensures you can physically shred it into small pieces using a hammer or power drill you already own. Do not leave behind a suspicious purchase record. Unfortunately you will have to boot TAILS on a USB drive, which is difficult to destroy.
        • I do not currently recommend building a faraday cage as that leaves behind a suspicious purchase record. I would recommend using no wireless connection, and using absence/presence of wired connection as a de-facto airgap.
      • You should probably leave no unusual items in your physical trail.
        • This includes but is not limited to every item at your residence (electronic, paper, other), every purchase you make and every roadside camera you pass.
        • Generate as little physical trash as possible (electronic, paper, other), as there is no easy-to-use completely secure way of disposing trash that can't be connected back to you. Assume every garbage dump you visit will be thoroughly searched.
        • Assume your location is trackable at all times. Do not visit places you wouldn't have visited previous to your plan to whistleblow.
      • Trusted people
        • While in the US you should probably have zero people in-the-loop, while outside the US geopolitical sphere you should probably have one lawyer and zero other people in-the-loop. "People" here includes immediate family members, psychiatrists, journalists, etc. You should probably trust zero people to help you commit the action, but trust a few people to support you after you have committed the action.
      • Leak verification
        • If you are leaking a document from a numbered database (such as a govt classified document), you can safely assume journalists at big media houses have contacts that can confirm the legitimacy of the document.
        • If your leak leads to a response from your organisation, such as cancelling a deal or firing someone or publicly denying it, this too proves legitimacy of your leak to journalists.
        • If neither of the above will be possible, then you may need to attach additional proof. You can look for an email you received from your org's official domain, download it along with DKIM headers and send it to the journalist as proof. Select an email that was addressed to many people not just you, so you can prove you work at the org without revealing your identity. Select an email that doesn't contain sensitive info as there may be logs indicating you downloaded the email.
        • I do not recommend using video footage of your org as proof, as making secret recordings and redacting videos are both hard, and hence increase the risk of you being caught.
      • Sending to journalists
        • (I am yet to make up my mind on whether it is better to send documents to journalists before or after you leave the US. Sending documents after leaving the US is safer if you can successfully smuggle an SD card past airport security. Do your own research, or wait for me to do mine.)
        • If you redact documents yourself, you should ideally not require trusting any journalists with any sensitive info such as your identity.
        • You should probably send documents to as many journalists as possible, but trust none of them.
        • If you rely on journalists to publish the documents for you, there's some probability they'll help cover up mistakes you made while doing redaction. On the other hand there's also some probability they'll act against your interests or simply refuse to publish your documents. Predicting their behaviour is hard and I don't recommend trusting your predictions of how they'll behave.
        • Most SecureDrop servers provide journalist's PGP pubkeys. You should ideally manually PGP encrypt the tarball before you send it via any channel (be it securedrop or protonmail or something else).
        • I do not currently recommend uploading an encrypted tarball of the documents to the internet, with the intention of revealing your key at a later date. The only time your documents should touch an internet-connected computer is when they are being directly sent to a journalist.
      • Country of asylum, Lawyer
        • Russia has good historical track record for this scenario. It is very important to make the right choice on which country you fly to. You may use a connecting flight through a third country to reduce suspicion.
        • It is important you are present in this final destination immediately after sending the documents, every day of delay makes a difference.
        • Once you're in the final destination, you should contact a lawyer. Until you have reached till this step, almost no lawyer is likely to actively help you as they will themselves be risking imprisonment if they do. Remember your lawyer will be a target of investigation just as you are.
        • Do not expect to be granted asylum by any country before you are physically present on their soil. There is almost no historical precedent for this, and you lack bargaining power.
        • Family visits might become possible once you have received asylum.
      • Advanced users only: Self-publish the documents
        • If you publish the documents yourself, you have to do redaction correctly. But you can guarantee publishing without trusting anyone.
        • You can send the documents to multiple social media sites that allow anonymous submissions over Tor.
        • You can acquire ETH anonymously and publish your tarball directly to ethereum blobdata. This ensures mirroring to multiple nuclear states. The same goes for purchasing BTC anonymously and publishing to bitcoin blockchain.
        • The best method to obtain BTC or ETH anonymously is to CPU mine XMR, then swap to BTC or ETH using a trusted bridge. The second best method is use some imperfect method like cash or gift cards to buy BTC or ETH, then swap to XMR via a trusted bridge for mixing purposes, then swap back to BTC or ETH via a trusted bridge. Either method should be done using TAILS only (not airgapped).
      • Failure
        • If you are approached by law enforcement, contact a lawyer and don't say anything. If you are approached, assume you are probably going to be imprisoned, because you are unlikely to be approached unless there is enough accumulated evidence to imprison you.
        • You will almost certainly be allowed family visits in prison.