The Telegraph Investigations team has published a series of ground-breaking scoops that have held the powerful to account.
From politics to sport, to expenses and healthcare, our team have uncovered evidence that has led to criminal, parliamentary and regulatory inquiries.
Our reporters rely on tip offs and information from whistle-blowers. Information provided by our readers has led to some of our biggest scoops and we are grateful for your help in uncovering wrongdoing or unethical behaviour.
We are committed to protecting our sources. If you would like to get it touch, it can be important to protect your identity and security.
There are several options available (although none are guaranteed)
Email - investigations@telegraph.co.uk
One of the easiest ways to contact us is by email, but it is worth thinking how to protect yourself. You might choose to set up a new email address not in your name, but it is worth bearing in mind that if you are using a public or work computer, there may be a record of information sent and received.
Here are the emails addresses for the team -
- Claire Newell - claire.newell@telegraph.co.uk
- Katherine Rushton - katherine.rushton@telegraph.co.uk
- Sophie Barnes - sophie.barnes@telegraph.co.uk
- Janet Eastham - janet.eastham@telegraph.co.uk
If you would like to send confidential material, one of the best ways is using PGP to encrypt the email.
- Claire Newell - Click here
Telephone
The main number for the investigations team is 020 7931 3354. However, if you want to discuss sensitive information, you may not want to use your home, office or mobile phone.
Consider where you are making the call from, will there be a trace? It might be worth buying a pay-as-you-go phone and thinking carefully about when and where you make the call - can you be overheard?
Pros
Easy access
Reasonably secure
Cons
Doesn’t always provide full security
Can’t send large documents
Difficult to provide anonymity
Post
Arguably, the most secure way to provide anonymous, confidential material is by post. Our address is - Investigations, Telegraph, 111 Buckingham Palace Road, London, SW1W 0DT.
However, before you pop something in the mail, consider where you are posting it from, is it likely to leave a trace?
Pros
Easy for printed documentation
Cons
One way communication. It is hard for the journalist to ask follow up questions. We would almost certainly want to speak to you.
SecureDrop
Telegraph SecureDrop address
SecureDrop is a system designed to be accessed over the dark web to allow sources to anonymously and safely send information to journalists.
It is only possible to access the system using Tor. When you upload files or send us messages using SecureDrop, those messages are encrypted and only members of the Investigations team are able to retrieve and decrypt them. Responses can be posted and are visible only to the original poster.
SecureDrop was developed and is maintained by the Freedom of the Press Foundation and is the de facto standard for secure, anonymous communications with investigative journalists.
We recommend using Tails, a secure, anonymising operating system that boots from a USB stick and provides access to to the dark web using Tor.
Pros
Anonymous over Tor with no email addresses associated with messages
All messages and files are automatically encrypted once they are uploaded to the system
Easy to use once using Tor
Standard system for anonymously and securely sending files to journalists
Cons
Using Tor is marginally more difficult than using encrypted email
Responses need to be checked for
Most companies monitor for Tor traffic, so it is likely that your employer would notice your activity.
Best for:
Files and messages where anonymity is essential
To use Secure Drop, you will need a Tor browser
Accessing the SecureDrop system requires using a Tor browser, which is a special web browser that anonymises and encrypts access to the web. The Telegraph’s SecureDrop system operates as a hidden service on the dark web.
It is possible to use Tor from any operating system, by downloading the bundle from here: https://www.torproject.org/download/download-easy.html.en
However, to use Tor to its full anonymising potential, you should consider using Tails, a secure operating system that boots your laptop or desktop into a secure environment, separate from your day-to-day system. It is available here: https://tails.boum.org/index.en.html
Notes:
Some organisations block and monitor Tor traffic, so be wary of using Tor or Tails in your workplace
Some laptops, Chromebooks in particular, won’t allow Tails to boot
Using Tor as an app on your laptop or desktop will leave traces, so consider the security of your device if you are not using Tails.
Signal Messenger
You can reach our journalists via the encrypted app Signal at+447702676347
Signal is an encrypted instant-messaging and phone-call app. Signal stores your number, but it doesn’t store a log of who you communicate with, or who communicates with you. You can also set it to erase messages so that they no longer exist on your phone, the recipient’s phone, or in the cloud. You can download Signal for Android or iPhone.
Consider using a phone number on Signal that your employer cannot connect to you. Understand that Signal is not designed to facilitate complete anonymity.
Using Signal is pretty easy.
Here’s how:
Open the Signal app and tap the pen icon (in the top-right on an iPhone, in the bottom-right on Android) to start a new message. Type our phone number in the search box, +447702676347. From there, you can send us an encrypted Signal message. Only written messages and documents should be sent through Signal. No phone calls will be answered. No classic text messages will be monitored.





