Public Intelligence is an international, collaborative research project aimed at aggregating the collective work of independent researchers around the globe who wish to defend the public’s right to access information.
This site is an attempt to compile and defend public information using software and methods which are open source and available to the public at large. It is our hope that by making such information available and demonstrating the power of a public resolved to inform itself, we may engender a more informed and proactive populace. Within our first two years of operation, we have already received more than twenty threats and takedown notices from government agencies and corporations around the world for publishing documents discovered via open source methods available to any member of the public. No information has ever been removed or censored.
Update 11th February 2012
Together with Cryptome.org and wikileaks.org this website is on the US State Department's open source media watchlist
Update 21st August 2011
According to their Twitter stream, they appear to be in the process of finding another web server location after "complaints":
publicintel Public Intelligence
- Until our main site is back online, a complete mirror of all information is available via http://publicintelligence.info
- Our experience with EuroVPS, in particular, has been extremely positive and we highly recommend them.
- Both EuroVPS and Leaseweb have been supportive in the past and have provided us with excellent service. We thank them for that.
- EuroVPS was not responsible for our service being terminated. It was a decision at Leaseweb, who EuroVPS uses for colocation.
- There have reportedly been "complaints" about content on the site. That's all we know at this time.
- The main site will likely be down for several days while it is being moved. We apologize for any inconvenience this causes.
- Our server in the Netherlands has been shut down and we are being forced to move elsewhere . . .
Update 27th August 2011
They now seem to be back online with server hosting in Luxembourg
Update 29th August 2011
PublicIntelligence.net now seem to have turned off the Quantserve web bug tracking, but have not acknowledged our warning to them about it.
For general inquiries:
To provide us with documents or information:
If you would like to support us financially:
For legal matters:
Social Networking publicity
Blog / RSS
Financial Donation methods
Currently accepting submissions of whistleblower leaks ?
The following form allows you to contribute up to 1 GB of data and nearly all file formats are accepted. All data is sent via AES 256 bit high-grade encryption, approved by the NSA for Top Secret U.S. government communications, to our server in the Netherlands. All information will be processed into user-friendly formats and stripped of all metadata. All submissions are handled anonymously. If you have any problems, questions, or concerns, please contact us using our encrypted contact form.
Explicit promises about Anonymity, Privacy or Security
Restrictive legal Terms & Conditions
Practical Advice on preserving Whistleblower Anonymity
Leak Submission Encryption
Digital Certificate fingerprints published on their website:
SHA1: 32:99:41:A1:80:B1:22:DB:6E:2E:43:88:E8:38:3A:3D:48:33:E2:07 MD5: 66:7C:B4:02:F5:19:35:C0:03:90:13:B7:94:1B:7F:4E
Serial Number: 01:1B:4E
Qualsys SSLLabs SSL Server Test rating:
Overall rating: A 
Protocol Support: 85
Key Exchange: 80
Cipher Strength: 90
No obvious weaknesses
PGP Public Encryption Key
email: Public Intelligence <firstname.lastname@example.org>
PGP ID: 0x5FE1B448
Type: RSA 4096/4096
Cipher: AES 256 bit
PGP fingerprint: 26BB 850B 4764 B794 F2D7 5158 1461 A2E6 5FE1 B448
N.B. a different PGP Key User ID of
is published on
but these are the same PGP Key.
Encrypted Contact Form
This form utilizes multiple types of encryption and is appropriate for secure communications. If you want us to be able to contact you in return, please include some form of contact information.
Your encrypted message has been sent successfully.
TOR Hidden Service
Hushmail Secure Form
Leak Submission Anonymity
Some of these techniques are appropriate for a normal website like this wiki, but not for whistleblower or tipoff websites, where potential whistleblower source anonymity protection should be paramount:
TOR users blocked from access
3rd Party or persistent tracking cookies or graphics
CAPTCHA graphics generated from another website e.g. GoogleRe-Captcha
Mixed mode non-SSL graphics or style sheets
Embedded video clips etc. from another website e.g. YouTube
Flash file uploader class
Communications / Acknowledgement back to the whistleblower via the website
Acknowledgement of receipt of information
e.g. file upload success indicator - has the leak message or upload actually been received successfully ?
Your upload was successful.
Thank you for contributing to Public Intelligence.
Leak analysis work flow status reporting
e.g. Has anyone actually looked at what the whistleblower has submitted ?
Private message box
e.g for 2 way communications back to the anonymous whistleblower, asking for clarification, offering advice etc.
Domain Name Resilience
Domain Name Registrar
Registrar: DIRECTNIC, LTD Whois Server: whois.directnic.com Referral URL: http://www.directnic.com
Based in Grand Cayman, Cayman Islands
Multiple Internet Service Providers, in different legal jurisdictions ?
Domain Name Server(s) & jurisdiction(s)
afraid.org dns nameservers are in the United States of America
Web Server hosting jurisdiction(s)
publicIntelligence.net is hosted as a virtual server in the Netherlands by EuroVPS.com
PublicIntelligence.net is hosted in Luxembourg by root eSolutions http://root.lu
Alternate Domain Name aliases
Actual Physical Mirrors of the website:
Romanian mirror: http://publicintelligence.info
Content available via BitTorrent etc P2P etc.