Editorial policies
WildLeaks only accepts information and material of environmental significance, with a particular focus on Environmental Crime (poaching, trafficking, illegal logging, illegal fishing, etc.) and related crimes (corruption, money laundering, arms trafficking, etc.). Rumors, opinions, stories and other kinds of first hand accounts or materials that are publicly available elsewhere will not be evaluated. Materials that violate individual privacy will not be accepted unless they pertain to a crime, corruption, and abuse that affects wildlife, the environment, and the people (Human Toll of wildlife and forest crime).
Submitting/receiving
1. WildLeaks will accept materials through its online secure submission platform or through the two other options explained here.
2. After the information has been received, all files are securely stored off-line.
3. Whistleblowers sending information can select two levels of security when submitting information and files – Confidential or Anonymous. Whistleblowers and sources can choose the option that better suits their needs. Both options are encrypted and in both cases we will not know who you are or where you reside. But WildLeaks recommends using the safest method possible (Anonymous) and following the instructions on our website in order to further protect the identity of a source.
4. WildLeaks does not have any formal or legal connection with the software vendors and their relations with the initiative are the same as any other modern media initiative willing to use their technology.
Cross-checking
WildLeaks will perform a thorough cross-check to verify whether the files correspond to true information or not, that is, if they are reliable. This will be done to the furthest extent possible, analyzing factors such as possible motives for forgery, cost or difficulty of forgery, and deception. If needed, other professional opinions will be sought.
Redacting
In some cases, files sent by whistleblowers can be a threat to their own anonymity. In these cases, where content or meta-content can lead to the disclosure of a source’s identity, it is necessary to redact the information for their own safety.
Analysis
If a batch of data has been cleared through the first steps of data management it is ready to be analyzed and assessed by the full WildLeaks’s Team.
Investigative Activities
1. Investigating environmental crimes is WildLeaks’ first priority and, whenever possible, an investigation will be conducted by our own undercover teams or in collaboration with our partners.
2. When it is not possible to investigate using our own resources, the information will be passed on selected and trusted individuals within other NGOs and/or the relevant law enforcement agencies.
Publishing on the Media
When an investigation is not needed or possible, and using the media is considered more effective, then WildLeaks will try to make hard news out of the leaks it receives, pitching the information to mainstream media.