summaryrefslogtreecommitdiff
path: root/old/published/How To Wiki/how to be a whistleblower.txt
diff options
context:
space:
mode:
Diffstat (limited to 'old/published/How To Wiki/how to be a whistleblower.txt')
-rw-r--r--old/published/How To Wiki/how to be a whistleblower.txt45
1 files changed, 45 insertions, 0 deletions
diff --git a/old/published/How To Wiki/how to be a whistleblower.txt b/old/published/How To Wiki/how to be a whistleblower.txt
new file mode 100644
index 0000000..0a5e982
--- /dev/null
+++ b/old/published/How To Wiki/how to be a whistleblower.txt
@@ -0,0 +1,45 @@
+Nobody wants to be party to coverups, outright lies and the other scandalous behavior sometimes uncovered in both the government and businesses. But what should you do if you uncover something you think is unethical or potentially criminal?
+
+Blow the whistle.
+
+However, doing so can have serious repercussions -- whistleblowers have been ostracized, fired, threatened, jailed, and worse.
+
+Still, from Deep Throat to Enron, whistleblowers have a distinguished legacy of helping the public good. Stephen M. Kohn President of the "National Whistleblower Center"<http://www.whistleblowers.org/> in Washington DC says that "The majority of all civil fraud recoveries in the US are based on whistleblower disclosures," which means it could be up to you to point out wrongdoings.
+
+Legal protection for whistleblowers varies from country to country and Wired can't provide you with legal advice, but we do have some tips that might help whistleblowers remain anonymous and possibly escape detection for long enough to get the word out.
+
+#Anonymous Web Surfing
+
+One tool explicitly designed with whistleblowers in mind is "Tor"<https://tor.eff.org/>. Tor is a free networking software program and allows you to use the internet anonymously. Need to login to that GMail account you used to contact the press, but you're stuck at work? Tor can help cover your tracks.
+
+When you log into to Tor you join a network of machines scattered around the world that pass internet traffic randomly amongst themselves before it emerges at its destination. The process is somewhat like a ball bouncing around inside a sealed box. Every now and then a ball comes out of the box, but it's impossible to tell who put it in the box to begin with.
+
+The process is know as "onion routing," and it was first developed at the Naval Research Laboratory. Tor uses a layered encryption protocol, which is where the onion skin analogy comes from.
+
+Tor is designed to defeat one specific form of digital eavesdropping known as traffic analysis, a form of network surveillance that tracks who is talking to whom over a public network.
+
+Without Tor an malicious employer can easily detect your outgoing traffic to the media announcing your whistleblowing intentions.
+
+#Encryption
+
+But Tor alone isn't enough to hide you from the snoops. To use our earlier example, if you login to GMail via Tor and send your whistleblowing message, the company might not be able to trace where it can from, but they can read it the minute it leaves Tor.
+
+Anonymity is not the same as security.
+
+It's important to recognize the Tor does not encrypt traffic once it emerges from the Tor network. Thus you data is going to exposed unless it has been encrypted by you.
+
+To learn more about encrypting your e-mail, see the Wired How To Wiki entry: "Keep Your E-mail Private, Secret and Secure"<http://howto.wired.com/wiredhowtos/index.cgi?page_name=keep_your_e_mail_private_secret_and_secure;action=display;category=Work>.
+
+But if you're collecting whistleblowing data you'll likely want to encrypt more than just your e-mail.
+
+#File encryption
+
+To encrypt a file in Windows XP your hard drive needs to formated as NTFS which supports encryption. As long as you aren't on a FAT32 formated disk encrypting in Windows XP is easy, just select the files or folder in Windows Explorer, right click it and choose "properties." In the "attributes" section at the bottom, click "advanced" and check the 'encrypt contents to secure data' box, then click OK twice.
+
+There's a couple of caveats here though. First off the encryption is useless if someone else knows your login password (which is often assigned by the IT department) and second, if you encrypt a folder, anyone can still read the file names they just can't open them.
+
+A better option is to use "GPG4win,"<http://www.gpg4win.org/> an open source encryption program for Windows, to encrypt files with a private key. Again, if anyone else has access to your account, the security provided is ruined because they will have access to your GPG key.
+
+If you find yourself in a situation where you can't control access to your computer you might investing an encrypted USB thumb drive, though there could be some record of accessing it on your computer that leaves you vulnerable.
+
+In the end most whistleblowers do end up exposed out of necessity (whether for legal testimony or simply accidental exposure). Many have been fired, but many of those people have also sued and won their cases. Ultimately the choice to blow the whistle is always fraught with risk. \ No newline at end of file