Close Comment Creative Commons Donate Email Facebook Mobile Phone Podcast Print RSS Search Search Signal Twitter WhatsApp

Leak to Us

Our job is to hold people and institutions accountable. And it requires evidence. Documents are a crucial part of that. We are always on the lookout for them — especially, now.

Have you seen something that troubles you or that you think should be a story? Do you have a tip about something we should be investigating? Do you have documents or other materials that we should see? We want to hear from you.

Here is our staff list. You can click on any reporter and get their contact info. We’ve also previously detailed what we’re working on.

Below are a few ways to contact us or send us documents and other materials, safely, securely and anonymously as possible.

Our general tips address is To contact specific reporters, here is our staff list, which links to each of our bios and email addresses. Of course, email is convenient, but if your information is sensitive, there are better options.

Encrypted Communications

Many ProPublica staffers use the free Signal app (iPhoneAndroid) to send and receive encrypted messages and phone calls. That means that messages and calls are scrambled, so that it’s extremely difficult for others to eavesdrop on them.

Using Signal requires both parties to share cellphone numbers with each other. Although Signal prompts users to enter their contacts into their address book, we suggest instead that people use Signal's option to type in a journalists’ phone number and not enter the journalist into their contacts. (Thank you, Signal, for listening to us and adding that feature for iPhone users!) For some situations, it might even be better to use a separate phone for Signal communications.

Some of our staff also use an encrypted email program called PGP (sometimes referred to as “GPG”). It takes a bit of time to set up but allows you to send us scrambled messages that cannot be read by email providers, hackers, and other parties that may get access to your email.

You can read more about email encryption, and learn how to set it up on Windows or on a Mac.

One important caveat: PGP only protects the message body of your email. Metadata — information about who you are communicating with and when — is not protected and can be seen by anyone with access to your email. (Like a mailed envelope, this unprotected information is used by email providers to make sure your message gets sent to the right place.) If your identity is sensitive, consider using a new, anonymous email address in combination with PGP, or try one of our other options.

Postal mail is an excellent, easy way to reach ProPublica securely. U.S. postal mail without a return address is one of the most secure ways to communicate — authorities would need a warrant to intercept and open it in transit.

Don’t use your company or agency mailroom to send something to us. Mail your package or envelope from an unfamiliar sidewalk box instead of going to a post office. You can mail us paper materials or digital files on, for example, a thumb drive. Our mailing address is:

ProPublica 155 Avenue of the Americas 13th Floor New York, NY 10013-1507

If you can identify a reporter you want to reach, it’s worth noting that on the outside or inside of your package or envelope. You can also simply address it to ProPublica.

Super Hi-Tech, Time-Consuming but Maximum Security: SecureDrop

Update, December 5, 2017: Our SecureDrop instance is currently offline while we upgrade our systems to ensure the safety of our sources. We recommend you use Signal, PGP, or anonymous postal mail as noted above.

ProPublica uses a system called SecureDrop so you can share information and files with us with maximum security — far more than is possible with conventional email or other electronic means. Used properly, SecureDrop allows you to correspond with us in a way that shields your identity even from us.

Our SecureDrop server is only accessible using Tor, a special browser that masks information about your internet connection and the computer you are using. Although you need to download special software to connect to ProPublica's SecureDrop server, it can be as easy to use as a normal web browser.

Here’s how to contact us using SecureDrop:

  • Visit and follow the directions to download and install Tor.
  • Launch the Tor Browser.
  • In the Tor Browser, copy and paste the following into its address bar: http://pubdrop4dw6rk3aq.onion/
  • Follow the instructions on that website to send us files and messages.
  • When you use the site, you will get a code name, which is your login for SecureDrop. You can come back and log in with this code name to submit more information; you can also log in from time to time to see if we have sent a response to you.

When using SecureDrop, we will not record your IP address or information about your browser, computer or operating system.

If you seek maximum confidentiality, do not submit material using the network at your home or work. If you can, use public WiFi, such as at a coffee shop. You can also boot your computer from a USB key containing TAILS, a secure operating system which does not leave any trace of your TAILS activity on the computer you are using; TAILS also comes with a copy of the Tor Browser. (More information on TAILS can be found here.)

Tor is designed to hide your IP address and seeks to make it very difficult for anybody to determine who is sending the files. However, be on your guard and know who might be watching you. We want you to be safe and to understand the risks you face before you send us anything. And if you’re using Tor, you can also read ProPublica more anonymously by using our “onion site” version.

Our Latest Stories

Current site Current page