We invite:-
participation from lawyers and other professionals. The project offers stimulating interaction; the prospect of interesting, helpful networking; and opportunities through its multimedia products and events etc. for professional visibility in various markets
participation from anyone anywhere who wants to get involved on any level, including to share useful relevant data. We welcome relevant input from and proactive interaction with victims, villains, reformed villains, police, prosecutors, judges, regulators, journalists, investigators, analysts, etc. There's quite a community out there of real people who have knowledge and experience to contribute. We value all of it.
HOW CAN I SECURELY COMMUNICATE IN WRITING WITH MHNA? Some considerations:-
See the 'be cautious, not credulous' paragraph below about some correspondence platforms we don't use
We are not unqualifiedly sold on the idea of end-to-end encryption: we are not entirely sure what it bespeaks in every case. We are ok with zero-access encryption. We find PGP intensely annoying, especially the absurd idea of a 'public key' (and don't see what PGP adds if email is already encrypted on the email provider's server, encrypted in transit and encrypted at the recipient's end)
The simplest quickest way to correspond with MHNA is, at least initially, by email, with attachments, to inheritancecrime@protonmail.com (use a secure browser if you like)
Once we get started and want to take things further, we'll suggest genuinely secure platforms for video conversations and further correspondence.
WHAT DATA CAN I CONTRIBUTE? You can email us, nonymously and or anonymously, relevant:-
tips
documents
comments, criticisms, opinions, impressions, theories, hypotheses, ideas, etc.
cases
stories, including of good and bad experiences
fully supported, detailed corroboration and or refutation of relevant assertions, allegations and accusations made by this project
names
contacts and connections
any other data you think are appropriate to the project.
BREACHING CONFIDENTIALITY: Divulging another person's confidential data in breach of your legal obligations of confidentiality is not that problematic if done in the course of protected whistleblowing and or when complying with a legal obligation to disclose actual or apprehended criminality.
IS EVERYTHING I SEND CONFIDENTIAL COMPREHESIVELY AND INDEFINITELY? Yes. MHNA is used to dealing with highly confidential data. We are accountable directly to you for the indefinitely secure, private, confidential storage, handling and use of every written and oral communication no matter what.
WHAT WE DON'T WANT: This project has no interest in assertions, allegations or accusations that have no basis in fact.
BE CAUTIOUS, NOT CREDULOUS: We prefer to minimise the ways in which you can communicate with us securely. Whether or not in any way wholly secure in every relevant location in an intelligible rational transparent verifiable-to-destruction way, we don't like some 'secure' platforms, including (to take a few obvious examples) SecureDrop ('active instances'?); Session (limited to one's existing contact list, which multiply defeats the object); Signal (requires a phone number); Threema (phone); WhatsApp (owned by a social media company; fiddly and unreliable re exporting an account's entire chat archive, or one or more particular chats, to protonmail); or not-end-to-end-encrypted email of any kind; or gmail. And of course stay away from all social media as a disclosure technique.