Secure, anonymous & in the public interest
We have experience working with leaked or sensitive documents. Most recently, we worked both with WikiLeaks and independently to examine a series of leaks from the Trade In Services Agreement negotiations. We understand the importance of protecting whistleblowers (many of whom are public service workers) and are committed to fully protecting all of our sources.
We shine the light on corporate abuse and shady influence.
Have you seen discrepancies in outsourcing or privatization contracts?
Do you have evidence of corporate or government wrongdoing?
Want our expertise as a partner in your investigative work?
Our work with Leaked Documents makes a difference
In 2015, PSI received a series of leaks from the Trade in Services Agreement Negotiations. These documents revealed how corporations were convincing governments to negotiate away their right to regulate and ensure quality public services into the future.
We produced the first detailed analysis of TiSA and were able to launch a global campaign. After building widespread public opposition, we managed to successfully stop the TiSA talks. In this case, the leaked documents made all the difference.
Rosa Pavanelli General Secretary, PSI
Leaks have changed the game in the fight against offshore tax havens, corporate crimes and anti-democratic trade deals. Whistleblowing is a public service.
How to leak to us
Signal, recommended by Edward Snowden, is a free encrypted app for your phone that works in a similar way to skype - but its servers never have access to your data or store it.
Send us an encrypted message via signal to set up a more secure communication channel at: +33 7 88 38 91 40
For sensitive email communications, we recommend Protonmail - a highly-rated encrypted email service. Set up your own free Protonmail account then email our address below to ensure automatic end-to-end encryption.
Our Protonmail email is PSISecure@protonmail.com
If you decide to contact us from a non-protonmail email service, you can still do so using our Public PGP key below.