Identity Protection

Generally speaking, a “whistle blower” does not need to be overly cautious but if a “leak” does precipitate an investigation, it is important identification is made as difficult as possible. If a “whistle blower” takes unnecessary risks then the chances of identification are greatly increased.

At Whistle Blowers Press Agency Limited (Whistle Blowers) we have introduced a number of safeguards to make the identity of the “whistle blower” as difficult as possible. We have introduced Skype telephone services (it is virtually impossible to monitor a “skype” call) and we utilise “pay as you go” mobile phones for particularly sensitive phone calls (see below).

If you take the precautions listed below the risk of identification will be minimised. Remember, with the exception of a “leak” which relates to the commission of serious crime or endangers national security, nobody is going to look too deeply at the source of the leak – their immediate concern will be to minimise the damage caused by the leak and prevent recurrence.

If a "whistle blower" is identified the main cause is usually the behaviour of the "whistle blower" himself/herself...
If you intend to provide documentary evidence, be aware printers and photostat machines can be linked to a document, which has been copied...
Information contained on a hard disk can be recovered, even if a file has been deleted, a hard disk has been wiped or encryption software has been utilised...
Do not use emails at your place of work...
Do not use your employer’s telephone. Where at all possible do not receive or make calls at work...
If you are the owner of a telephone...
If you are taking photographs...

Top of page