Whistleblower Protection Consulting
Expert guidance for navigating the most dangerous job in corporate America. Because courage deserves competent backup.
Advisory services based on our Complete Whistleblower Handbook
Retainer Packages
Assessment
- 2-hour initial assessment
- Threat level evaluation
- Preliminary strategy outline
- Written recommendations
- Resource packet
Standard Retainer
- 4 hours consulting time
- OPSEC review and setup
- Evidence strategy planning
- Secure communication setup
- Weekly check-ins
- Email support (48h response)
- Document review
Crisis Retainer
- 10 hours consulting time
- All Standard features
- 24/7 emergency line
- Daily check-ins available
- Active disclosure support
- Media coordination
- Legal liaison support
Custom enterprise packages available. Contact for nonprofit and journalist rates.
What's Included: 8 Core Expertise Modules
Our consulting services cover every critical domain from the Whistleblower Handbook, translated into actionable, personalized guidance for your specific situation.
1. Digital Identity Protection
Anonymous identity creation, device segregation strategy, VPN/Tor configuration, and digital footprint minimization. We help you become invisible to corporate surveillance.
2. Secure Communications
Encrypted messaging setup, email security protocols, secure meeting practices, and building trusted networks of legal, journalist, and NGO contacts.
3. Offline Security & Risk Mitigation
Personal threat modeling, home and family security planning, financial preparation, and counter-surveillance awareness for the physical world.
4. Evidence Collection Strategy
Legal documentation methods, chain of custody protocols, blockchain timestamping, and working with forensic specialists to build an airtight case.
5. File Security & Malware Defense
Encryption implementation, secure storage systems, malware detection, and protection against corporate spyware and targeted attacks.
6. Operational Security (OPSEC)
Behavioral analysis countermeasures, compartmentalization strategies, meeting security protocols, and maintaining cover during active disclosure.
7. Open Source Intelligence (OSINT)
Researching your own company legally, executive background investigations, evidence verification, and monitoring corporate counter-intelligence efforts.
8. Exit Strategy & Recovery
Career impact planning, financial survival strategies, legal protection navigation, psychological support resources, and long-term recovery planning.
How It Works
Secure Initial Contact
Reach out through our encrypted contact form or Signal. We establish secure communication before discussing any details. No information shared until security protocols are in place.
Confidential Assessment
We evaluate your situation, assess threat levels, and determine the scope of support needed. This includes reviewing your current security posture and identifying immediate vulnerabilities.
Personalized Strategy Development
Based on your specific circumstances, we create a comprehensive protection plan covering all eight modules. This becomes your roadmap for safe disclosure.
Ongoing Support & Adaptation
Regular check-ins, strategy adjustments as situations evolve, and continuous support through the disclosure process and beyond. We stay with you until you're safe.
Why Work With Us
Our Whistleblower Handbook has been refined through extensive research into corporate retaliation tactics and protection strategies.
We practice what we preach. All consultations use the same security protocols we teach our clients.
We don't consult for corporations on "whistleblower management." Our only clients are truth-tellers.
Fixed monthly retainers mean no surprise bills during already stressful times. Budget with confidence.
Frequently Asked Questions
Is this legal advice?
No. We provide strategic consulting on security, evidence handling, and operational planning. We work alongside your legal counsel but do not provide legal representation. We can recommend whistleblower attorneys if you need one.
How do you maintain confidentiality?
All communications are end-to-end encrypted. We don't store client identifying information on networked systems. Consultations can be conducted pseudonymously. We use secure deletion for all temporary files.
What if I can't afford the retainer?
Contact us anyway. We offer reduced rates for verified nonprofit workers, journalists working on public interest stories, and cases with significant public safety implications. No one is turned away for lack of funds if the cause is important.
Can you guarantee my safety?
No one can guarantee that. What we can do is significantly reduce your risk exposure by implementing proven protection strategies. Corporate retaliation is real and dangerous. Our job is to make you a much harder target.
Do you work internationally?
Yes. While our handbook focuses primarily on US protections, corporate surveillance tactics and OPSEC principles are universal. We've advised clients in the EU, UK, and other jurisdictions and can adapt strategies accordingly.
What's the difference between reading the handbook and hiring you?
The handbook gives you the knowledge. We give you personalized implementation, ongoing support, and someone watching your back. Under pressure, having an experienced advisor makes the difference between good intentions and effective protection.
Ready to Protect Yourself?
The first step is always the hardest. Reach out through our secure channels and let's discuss your situation confidentially.
Secure ContactOr email whistleblower@evil1.org (use encryption if possible)