[ FIELD MANUAL ]

Protection Protocols

A working framework for reshaping the incentive structures around whistleblowing. The goal: make defection from corrupt systems the dominant strategy.

00

The Game Theory Problem

Whistleblowing is fundamentally a defection problem. The goal is to reshape incentive structures so that defection from corrupt systems becomes the dominant strategy.

Four Levers

LeverMechanismExamples
Reduce cost of defectionProtection, insurance, relocationLegal defense pools, income replacement, safe houses
Increase reward of defectionFunding, legal immunity, recognitionRetroactive grants, qui tam awards, public honor
Increase cost of silenceComplicity liability, moral injury supportEnabler accountability laws, psychological support
Solve coordination failureLet whistleblowers find each otherAnonymous signaling platforms, threshold triggers

Risks Faced

Legal retaliation

Lawsuits, prosecution, NDAs weaponized

Economic retaliation

Termination, industry blacklisting, credit destruction

Physical threats

Intimidation, surveillance, violence

Social isolation

Ostracism by colleagues, community, family pressure

Psychological trauma

PTSD, moral injury, survivor guilt

Family targeting

Retaliation extended to dependents

01

Privacy & Secure Disclosure

Graduated Disclosure Protocol

Don't force all-or-nothing. A staged process reduces risk at each step.

StageActionExposure
1. SignalAnonymously register that information exists via zero-knowledge proofNone — fully anonymous
2. VerifyCredibility check via encrypted channel (journalists, lawyers evaluate)Minimal — pseudonymous
3. ConnectSecure matchmaking to legal counsel, media partners, NGOsLimited — vetted allies only
4. DiscloseCoordinated, timed release with protections pre-activatedControlled — on whistleblower's terms
5. ProtectPost-disclosure support network activates automaticallyPublic — full protection envelope

Dead Man's Switch / Canary Vault

Pre-stage encrypted evidence that auto-releases if the whistleblower goes dark. Distributed across multiple jurisdictions. Periodic "heartbeat" signal; if it stops, release triggers after a configurable delay.

Threshold Encryption

Evidence cryptographically split across N parties. Release requires M-of-N agreement. No single actor — including the whistleblower — can be coerced into suppressing it.

Steganographic Entry Points

Innocuous-looking websites that function as intake portals. Onion-routed mirrors. Multiple entry paths. QR codes printable on ordinary objects — business cards, stickers, receipts.

02

Funding Networks

Mutual Defense Pools

Cooperatives where members contribute regularly. Funds flow immediately to anyone who blows the whistle. Modeled on union strike funds — collective resources backing individual courage. Structured as a DAO for transparency and censorship resistance.

Retroactive Public Goods Funding

After disclosure leads to measurable accountability (fines, policy changes, prosecutions), a portion of recovered value flows back to the whistleblower. Society rewards those who create public benefit.

Whistleblower Bonds

Financial instruments that mature when disclosures are verified. Investors bet on institutional accountability. Creates a financial constituency for truth-telling — people with money on the line who want disclosures to succeed.

Crowdfunded Legal War Chests

Pre-funded, jurisdiction-specific legal defense funds ready to deploy instantly. Eliminates "I can't afford a lawyer." Organized by sector (healthcare, finance, government, tech) so expertise matches need.

Anonymous Grants

Zero-knowledge funding where neither donor nor recipient can be linked. Prevents retaliation against funders. Crypto-native with fiat off-ramps in safe jurisdictions.

03

Insurance Networks

Income Replacement Guarantees

Lose your job for speaking up — salary continues 12-24 months. Mutual insurance pool or decentralized protocol. Removes the single biggest deterrent: "How will I feed my family?"

Legal Defense Insurance

Pre-purchased coverage for attorney fees, court costs, countersuits. Could be offered as add-on to professional association memberships — normalizing the idea that ethical professionals might need this.

Career Transition Support

Job placement networks for blacklisted whistleblowers. Partner organizations that explicitly value integrity. Reframe: a whistleblower isn't damaged goods — they're a proven ethical actor.

Family Protection Riders

Coverage extends to dependents: housing security, children's education, relocation for the whole family. Retaliation targets families, not just individuals.

Reputation Insurance

PR and communications support to counter smear campaigns. Pre-drafted response templates. Media coaching. Proactive narrative control so the institution can't define the whistleblower's story.

04

Transit & Relocation Networks

Modern Sanctuary Network

Vetted safe houses across jurisdictions, activated on short notice. Modeled on historical underground railroads. Each node knows only its immediate neighbors — compartmentalized for security.

Jurisdiction Arbitrage

Legal expertise identifying strongest protections for specific disclosure types. Pre-arranged pathways by category: financial fraud, military/intelligence, corporate. Continuously updated as laws change.

Identity Transition Support

Legitimate new-start assistance. Relocation, career rebuilding, community integration. Language training, cultural orientation, professional recertification in receiving countries.

Distributed Evidence Hosting

Physical location becomes irrelevant — evidence is already distributed globally across jurisdictions, platforms, and custodians. Seizing the person doesn't suppress the information.

Embassy Coordination

Pre-negotiated asylum pathways with sympathetic embassies. Legal templates ready to file. Diplomatic contacts who understand urgency. Avoids the ad-hoc scramble of cases like Snowden's.

05

Coordination & Community

The Chorus Effect

A platform where multiple whistleblowers from the same institution discover each other anonymously. Imagine seeing: "3 others from your organization have registered concerns about the same issue."

This transforms whistleblowing from an individual sacrifice into a collective action. When people know they're not alone, the calculus changes entirely. Perhaps the single highest-leverage intervention in the entire design space.

Mentor Networks

Past whistleblowers supporting current ones. Structured mentorship by sector, risk level, and disclosure type. Not just legal strategy — the emotional and psychological journey.

Psychological Support

Trauma-informed counseling for the specific psychology of institutional defection. Moral injury, betrayal dynamics, identity disruption, hypervigilance, and the grief of losing a career and community.

Post-Disclosure Community

Lasting community for people who've been through it. Not just crisis support but ongoing belonging. Annual gatherings, online forums, collaborative projects. Isolated suffering into shared purpose.

06

Mechanism Design

Temporal Locks

"Release in 90 days unless I renew the delay." Creates a forcing function where the institution must negotiate in good faith or face automatic disclosure. Whistleblower retains control while creating irrevocable momentum.

The Airbag Model

Pre-registered protection that activates automatically upon disclosure — like an airbag in a crash. Legal counsel notified, funding unlocked, media alerted, sanctuary network on standby. All without making phone calls in a moment of crisis.

Credibility Staking

Optionally stake professional credentials to signal seriousness. A verified doctor reporting pharmaceutical fraud carries built-in credibility markers. Verify without revealing identity prematurely.

Adversarial Jurisdiction Design

Structure across multiple legal jurisdictions — Iceland, Switzerland, Ecuador, Costa Rica — each holding different pieces. If one is compromised, the network routes around it.

Canary Statements

Organizations publish regular statements: "We have not been served with a secret surveillance order." If the statement disappears, absence signals the problem. Employees maintain a collective canary — its death triggers investigation.

Defensive Bug Bounties

Don't wait for harm — hunt for it. Bounty programs that reward the discovery of institutional vulnerabilities, policy failures, and systemic risks before they produce victims. Modeled on security bug bounties but applied to governance, compliance, and organizational integrity.

Anonymous researchers probe institutions for weak points — financial controls with gaps, conflicts of interest, regulatory blind spots — and submit findings through secure channels. Verified findings trigger bounty payouts from defense pools. The institution gets a chance to fix the problem. If they don't, the finding escalates through the Graduated Disclosure Protocol.

Effect: shifts the economics from reactive whistleblowing (report harm after it happens) to preventative defense (find and fix vulnerabilities before they cause harm). Creates a professional class of institutional auditors accountable to the public, not the institution.

The Schelling Point Problem

Whistleblowers need a known, trusted, findable coordination point. The brand and URL itself IS the Schelling point. It needs to be:

Memorable enough that someone in crisis can recall it

Credible enough that they trust it with their life

Findable enough that search engines surface it

Resilient enough that it can't be taken down

07

Anonymous Group Wallets

Traditional crowdfunding exposes donors and recipients to retaliation. Anonymous group wallets use crypto-native primitives to pool resources where no single party controls the funds and no external actor can trace who contributed or freeze the treasury.

The War Chest Model

A multi-sig Safe deployed on a privacy-preserving chain or L2. Signers are anonymous — identified only by burner wallets generated through Tor. Threshold set to M-of-N (e.g., 3-of-5) so no single key holder can be coerced into moving funds, and no single seizure compromises the treasury.

Contributions enter through mixers or shielded pools. Outflows are approved by anonymous quorum vote. The wallet address is public — anyone can verify the balance — but the humans behind it are invisible.

Tornado / Privacy Pool Deposits

Donors deposit ETH or stablecoins into a privacy pool (Tornado Cash-style mixer, Railgun, Aztec). The pool breaks the on-chain link between sender and recipient. The group wallet receives clean funds — no transaction graph connects donor identity to the defense fund.

Risk: privacy pools face regulatory pressure. Mitigation: multi-chain deployment, jurisdiction arbitrage, decentralized relayers.

Stealth Address Donations

Each donation generates a one-time stealth address derived from the group wallet's public key. Only the wallet signers can detect and sweep incoming funds. On-chain observers see deposits to random addresses with no visible connection to each other or to the defense fund.

Threshold Signature Wallets

Instead of a standard multi-sig (where signer addresses are visible on-chain), use threshold signatures (TSS/MPC). The wallet appears as a single externally-owned account. No on-chain evidence of how many signers exist or who they are. Signers coordinate off-chain via encrypted channels.

DAO-Gated Disbursement

Funds release only when an anonymous governance vote passes. Token holders vote with shielded ballots (MACI or Semaphore-based). The vote proves "a quorum of verified members approved this disbursement" without revealing who voted or how. Prevents capture by any single actor — including the whistleblower.

Rolling Treasuries

Don't keep all funds in one wallet. Automatically distribute across multiple chains, multiple wallets, multiple jurisdictions. If one wallet is frozen, the others continue operating. Rebalancing happens through cross-chain bridges via privacy-preserving routes. No single point of seizure.

Dead Drop Funding

For high-risk cases: funds are deposited to a time-locked contract that releases to a pre-committed address after a delay. The recipient address is itself a stealth address. Neither party needs to be online simultaneously. The whistleblower can collect funds days later from a different device, network, and jurisdiction.

Operational Architecture

LayerToolPurpose
ChainBase / Arbitrum / Polygon zkEVMLow fees, EVM-compatible, growing privacy tooling
PrivacyRailgun / Aztec / stealth addressesBreak transaction graph between donors and treasury
CustodySafe{Wallet} + MPC signersM-of-N threshold control, no single point of failure
GovernanceSnapshot + MACI shielded votingAnonymous quorum approval for disbursements
IdentitySemaphore / ZK proofs of membershipProve you belong to the group without revealing who you are
CommunicationSignal / SimpleX / Briar (Tor)Encrypted coordination between anonymous signers
Fiat off-rampP2P exchanges in safe jurisdictionsConvert to local currency without centralized KYC

Example: Sector Defense Fund

100 healthcare workers each contribute 0.01 ETH monthly via Railgun into a 3-of-7 threshold wallet. When a member reports Medicare fraud and gets fired, they submit a claim. Seven anonymous signers — verified as healthcare professionals via Semaphore ZK proof — vote with shielded ballots. If 3+ approve, funds flow to a stealth address the whistleblower controls. The hospital sees nothing. The insurance company sees nothing. The whistleblower eats.

08

Coordination Protocols

The hardest problem in whistleblowing isn't evidence — it's isolation. These protocols let whistleblowers find each other, verify each other, and act together without anyone knowing who they are until they choose to be known.

The Chorus Protocol

An anonymous coordination layer where potential whistleblowers from the same institution register encrypted concern signals. Nobody sees anyone else's identity. But everyone sees the count.

Step 1 — Signal

Register a hashed concern: organization ID + concern category + ZK proof of employment. The proof confirms you work there without revealing who you are. The hash confirms you're concerned about the same issue without revealing what it is.

Step 2 — Threshold

When the count hits a pre-set threshold (e.g., 3 independent signals about the same concern), all signalers are notified: "Threshold reached. 3 others share your concern. Secure channel available."Nobody is revealed. The threshold itself is the trigger.

Step 3 — Channel

An encrypted group channel opens. Participants communicate pseudonymously. They can share evidence fragments, coordinate timing, and decide collectively whether to proceed. If they do, they act as a chorus — not a lone voice.

Step 4 — Coordinated Disclosure

The group submits evidence simultaneously through multiple channels — journalists, regulators, SecureDrop instances. Retaliation against one person is futile when five people hold the same proof. The Airbag Model activates for all participants at once.

Canary Mesh Networks

Employees within an organization maintain a distributed canary — a collectively signed statement published at regular intervals: "We are not aware of [category] violations as of [date]." If any participant refuses to sign, the canary dies. External observers detect the absence without anyone making an affirmative disclosure.

Implementation: Ring signatures or group signatures — the statement is verifiably signed by N members, but which N members is unknowable.

Dead Letter Protocols

Each participant deposits encrypted evidence into a shared vault with a time-lock. If the participant fails to send a heartbeat within the agreed window (72h, 7d, 30d), their evidence auto-releases to pre-configured recipients. Multiple people holding dead letters about the same institution creates an indestructible mesh of redundancy.

Whistleblower Rings

Small cells (3-7 people) from the same sector or institution, connected through anonymous introductions by trusted intermediaries. Each ring has a shared threshold wallet for immediate expenses. Rings don't know about other rings. An intermediary network connects rings when coordination would be strategic — but compartmentalization protects the whole if one ring is compromised.

Verifiable Credentials Without Identity

Zero-knowledge proofs that establish: "I am a current employee of [org] in [department] with [clearance level]" — without revealing name, badge number, or any identifying detail. Built on ZK-SNARKs against employment records or credential issuers. Lets strangers trust each other's claims without doxxing themselves.

Time-Boxed Commitment Devices

A group of N people each commit a stake (crypto, reputation token, or signed pledge) that says: "I will participate in coordinated disclosure by [date] if threshold is met." Commitments are binding — backed by smart contract escrow. If you commit and then bail, your stake is redistributed to those who followed through. Prevents free-rider collapse.

Relay Networks for Evidence

Evidence doesn't travel from source to journalist in one hop. It passes through a chain of anonymous relays — each relay holds the evidence for a randomized window (hours to days), then forwards it. By the time it arrives, the original submission is buried under layers of temporal and network noise. Modeled on Tor's onion routing but for documents, not packets.

Attack Resistance

Sybil attacks: ZK employment proofs prevent fake accounts. One proof per employee per concern. Can't inflate the count.

Mole infiltration: Compartmentalization means a compromised ring exposes only 3-7 people, not the whole network. Rings are disposable — burn and reform.

Subpoena resistance: Servers hold only encrypted blobs and hashed metadata. Even with full server seizure, no plaintext evidence or identities are recoverable.

Timing analysis: Randomized relay delays, batched submissions, and decoy traffic make it impossible to correlate signal registration with specific employees.

Communication Stack

LayerTool
DiscoveryChorus Protocol (ZK-gated anonymous signals)
MessagingSimpleX Chat (no user IDs, no metadata)
File transferOnionShare (Tor-routed, ephemeral)
Voice/videoBriar (mesh-capable, works without internet)
GovernanceMACI (anti-collusion voting for group decisions)
FundingThreshold wallet (see Section 07)

Example: The Quiet Revolt

A pharmaceutical company is suppressing clinical trial data showing adverse effects. Over 6 months, 7 employees independently register anonymous signals through the Chorus Protocol. Each proves they work in the company's R&D division via ZK credential. Each hashes their concern as "clinical-data-suppression."

At signal 4, threshold triggers. A SimpleX group channel opens. The four discuss pseudonymously, share evidence fragments that independently corroborate the same conclusion. They activate the Airbag Model for all four simultaneously. Evidence is relayed through 3 hops to 4 different journalists.

The story breaks from 4 sources on the same day. The company can't retaliate against one person — there are four, and they don't know which four. Legal defense funds activate from the sector's threshold wallet. Income replacement begins within 48 hours. The signal cannot be silenced.

09

Existing Ecosystem

Tool / OrgFocusGap It Fills
SecureDropTor-based media submissionSecure disclosure channel to journalists
GlobaLeaksOpen-source whistleblowing platformSelf-hostable disclosure infrastructure
Courage FoundationLegal & financial supportPost-disclosure defense funding
Gov. Accountability ProjectUS-focused legal advocacyLegal representation & policy reform
Whistleblower Network NewsMedia & awarenessPublic narrative & case visibility
EU Whistleblower DirectiveLegal framework (2019/1937)Mandatory protections across EU states
Signal / Tor / TailsPrivacy toolingCommunication & operational security
HunchlyEvidence preservationTamper-proof documentation
ExposeFactsJournalist-source connectionBridges whistleblowers and newsrooms
10

Gaps & Opportunities

The existing ecosystem handles disclosure mechanics reasonably well. The major gaps — and the greatest opportunities — are in everything that surrounds disclosure.

GapCurrent StateOpportunity
Financial protectionAd-hoc crowdfunding after the factPre-funded insurance pools that activate instantly
CoordinationWhistleblowers act aloneAnonymous discovery platforms (Chorus Effect)
Career recoveryBlacklisting is commonEmployer networks that value demonstrated integrity
Physical relocationImprovised, case-by-caseStanding sanctuary networks with pre-arranged pathways
Family protectionAlmost entirely neglectedComprehensive family coverage
Psychological supportGeneric therapy referralsSpecialized trauma-informed programs
Proactive deterrenceReactive — after harmAirbag Model + Defensive Bug Bounties — prevent harm before it happens
Global South coverageUS/EU-centricJurisdiction-aware networks for Africa, Asia, Latin America

Highest-Impact Starting Points

01

The Chorus Effect

Anonymous coordination platform. Highest leverage — transforms individual risk into collective action.

02

The Airbag Model

Pre-registered protection activation. Removes the scramble from the most vulnerable moment.

03

Mutual Defense Pools

Cooperative funding. Financial protection available before it's needed, not after.

04

Defensive Bug Bounties

Preventative defense. Reward hunters who find institutional vulnerabilities before they produce victims — shifting from reactive whistleblowing to proactive protection.