The International Consortium of Investigative Journalists encourages whistleblowers to securely submit all forms of content that might be of public concern - documents, photos, video clips as well as story tips. We accept all information that relates to potential wrongdoing by corporate, government or public service entities in any country, anywhere in the world. We do our utmost to guarantee the confidentiality of our sources.
ICIJ uses PGP encryption: our public key can be found on the MIT Public Key Server (fingerprint:
986A 572D 3B95 BD42 331E 839A B532 F18C 2A17 696B).
Our email address is firstname.lastname@example.org.
Please note: if you use our public PGP key to contact us via email, only the contents of your message will be encrypted – the subject line, name of the sender and other header information will be unencrypted.
A free, open-source, end-to-end encrypted messaging app, Signal enables you to send text messages, multimedia and some small files to us.
Signal does not retain any metadata and can also be configured to make messages disappear from all devices after the timer has elapsed.
ICIJ’s Signal phone number
WhatsApp enforces end-to-end encryption by default on messages, using technology developed in collaboration with Open Whisper Systems.
According to WhatsApp, only you and the person you’re communicating with can read what is sent, and nobody in between, not even WhatsApp. Messages are not stored on WhatsApp’s servers.
ICIJ’s Whatsapp phone number
ICIJ can be also found on Wire, a free, open-source app that offers end-to-end encrypted chats, calls and files, protected by European privacy laws. Wire can be used on iOS, Android, Windows, Mac and Linux.
ICIJ’s Wire username
Another free, open-source, end-to-end encrypted messaging app, which can be used to communicate directly with ICIJ reporters.
Telegram has no media and chat size limits and, like Signal, can also be configured to make messages disappear after a specified time period.
ICIJ’s Telegram phone number
ICIJ is also on Keybase, a free, open-source security app for mobile phones and desktop computers. Powered by public-key cryptography, it uses publicly auditable proofs of identity.
Keybase can store up to 10GB of files for free. And files in your private folder will be encrypted end-to-end, so even Keybase’s servers won’t be able to read them.
ICIJ’s Keybase username
Ultimately, no electronic form of communication is entirely secure – sometimes the safest ways are the old-fashioned ways. You can post printed documents, or electronic files on a portable storage device (a thumb drive, hard drive, memory card, DVD, CD, etc.) directly to ICIJ at the below address:
1730 Rhode Island Avenue NW, Suite 317,
Washington, D.C. 20036 USA