Whistleblower Submission Guidelines
We want the evidence, not your identity. Follow these OPSEC procedures to submit unclassified proof of waste, fraud, or abuse.
Secure Submission
Follow these operational security procedures to submit evidence safely and anonymously.
Our Security Guarantee
The Center for Federal Accountability (CFA) invokes the Reporter’s Privilege to protect our sources. We utilize a Zero-Knowledge architecture for digital submissions. We do not track IPs, we strip metadata upon receipt, and we do not retain logs.
LEGAL WARNING: NO CLASSIFIED INFO
We audit the Bureaucracy, not the Battlefield. Do not submit Classified National Defense Information (Secret/TS/SCI). We accept only unclassified proof of statutory violations, waste, and gross mismanagement.
Submission Methods
Method 1: Secure Digital Form (Recommended)
Status: ENCRYPTED & ANONYMOUS
We utilize BlockSurvey, a privacy-first platform running on decentralized storage with end-to-end encryption.
- Zero Trackers: No Google Analytics, no Meta Pixels, no cookies.
- End-to-End Encryption: Only we hold the private keys. Even the platform provider cannot see your data.
- Metadata Scrubbing: Our automated intake pipeline strips file metadata before it reaches our analysts.
Method 2: Signal (Mobile)
Status: FASTEST
Use Signal for encrypted chat. Set "Disappearing Messages" to 1 Hour before sending. Do not use your personal cell number; use a VoIP number if possible.
Signal: (202) 750-1130
Method 3: Physical Mail (Offline)
Status: MAXIMUM SECURITY
If you are submitting high-risk documents, use the US Postal Service.
- Print Remotely: Never use an office printer (they log timestamps and embed tracking dots).
- No Return Address: Leave the exterior blank.
- Public Drop: Use a blue collection box, not a post office counter.
VARRY LLC doing business as Center for Federal Accountability
ATTN: Intake Desk
8401 MAYLAND DR # 7387
RICHMOND, VA 23294
Final OPSEC Checklist
- [ ] The Canary Test: Did your boss send only you this specific version of the memo? If so, leaking it identifies you immediately.
- [ ] Pattern of Life: Do not contact us immediately after a heated argument with your supervisor. Wait. Create distance.
- [ ] Network Hygiene: Are you on a VPN? Are you using a Tor browser? Never trust an ISP connection.