Have evidence, documents, or a story? Reach out directly or submit anonymously. Your identity is protected — your information isn't silenced.
For media inquiries, collaboration, legal referrals, or if you just want to talk.
Direct line. Checked daily. Encrypted email welcome (PGP available on request).
sashajglenn@gmail.comThe original Save the Old Fire House campaign site — petitions, updates, community.
www.saveofh.comWe want your information. We also want you safe. This form provides a layer of anonymity, but no website can guarantee absolute protection. Before you submit documents or identifying information, understand the risks.
The lesson: Digital anonymity is only one layer. Physical documents, metadata in files, workplace access logs, behavioral patterns, and the actions of the people you share information with can all be vectors for identification. Governments and corporations have extensive forensic capabilities.
This server has logs. Every web server records IP addresses and connection data. While we do not intentionally log anonymous submissions with identifying data, our hosting provider maintains infrastructure logs and will comply with valid legal process (subpoenas, court orders, national security letters). This is true of virtually all web hosting companies worldwide. We cannot prevent a third party with legal authority from requesting server records.
Use Tor or a trusted VPN. If you are submitting something sensitive, access this site through the Tor Browser or a reputable no-log VPN. This prevents your real IP address from appearing in any server log. Do not use your workplace network, your home WiFi without protection, or your personal phone's mobile data.
Strip metadata from files before uploading. Documents, photos, and PDFs often contain hidden metadata — author names, GPS coordinates, edit history, printer information, software versions. Use a metadata removal tool before uploading. On Windows: right-click → Properties → Details → "Remove Properties and Personal Information." On Mac/Linux: use exiftool -all= filename.
Don't photograph or scan documents at work. Printers, scanners, and copiers in government and corporate offices may log every use. Office cameras may record you. If you must photograph a document, use a personal device in a private location. Be aware that some documents contain invisible tracking features (microprinting, unique formatting variations, or steganographic watermarks) designed to identify the specific copy.
Don't tell anyone you submitted. The most common way whistleblowers are identified is not through technology — it's through human behavior. Don't discuss your submission with coworkers, friends, or family. Don't search for this site on work devices. Don't change your behavior at work after submitting.
Know your legal protections — and their limits. Federal and state whistleblower protection laws exist, but they are not automatic and they do not cover all situations. If you are considering leaking classified information, information protected by NDA, or information obtained through a security clearance, consult a lawyer first. Organizations like the National Whistleblower Center and the Government Accountability Project offer confidential legal guidance.
We built this form to make it as safe as we can. But "as safe as we can" is not the same as "safe."
If what you have could put you at serious risk, consider reaching out to an established whistleblower protection organization or a journalist with a SecureDrop instance before using any web form — including this one.
Have evidence of corruption, documents the public should see, or information that needs to get out? Submit it here. You choose whether to include your identity or stay anonymous.
Your submission is encrypted in transit (HTTPS) and stored on a secured server. Anonymous submissions have no IP or identity attached.
Sasha and the team review every submission. Documents are verified and cross-referenced against existing evidence.
Verified evidence is incorporated into campaigns, shared with legal counsel where appropriate, and published (with your consent if not anonymous) to hold the powerful accountable.
If you included a reply email, we may reach out for clarification or to let you know the impact of your submission. We never share your contact with third parties.