Contact The County Times Securely

How to contact The County Times securely

Some significant stories featured in The County Times have originated from anonymous or confidential sources. If you have sensitive information to share, here's how to reach out to us.

Alright, what type of content are you looking to share?

How to dispatch materials…

SecureDrop stands as the utmost secure channel for connecting with The County Times.

Advantages:
  • SecureDrop ensures complete anonymity, leaving no trace of the source.
  • All submitted materials undergo automatic encryption.
  • We review your submissions on secured computers.
Drawbacks:
  • To access our SecureDrop system, you must install Tor software.
  • Using Tor may raise suspicion if you are under surveillance.

SecureDrop provides a secure means to send us messages and documents, with the option to follow up later. We receive only what you send and a designated codename for our replies, recording no additional information about you. To safeguard against interception, we decrypt your submissions on an entirely offline computer.

Getting Started:
  1. Install TorBrowser on a computer you are confident is not monitored.
  2. Visit thecountytimes.co.ke/securedrop and follow the provided instructions.
Next Steps:
  • Upon your first visit, note the passphrase generated by the service. This phrase enables you to return as the same source to view our replies securely.
  • While it’s not mandatory to provide contact details, doing so can be beneficial. You can also share background information about the documents for context.
  • SecureDrop facilitates correspondence with us or the provision of other contact information in confidence.

SecureDrop, an open-source project managed by the Freedom of the Press Foundation, prioritizes the security and privacy of your communications.

Utilize a customized email account equipped with PGP encryption to safeguard your messages and attachments from unauthorized access.

Advantages:
  • Encrypted emails and documents are shielded by confidential encryption keys and passwords, both of which are required for access. Potential adversaries must possess both elements to decipher your content.
  • Facilitates the transmission of extensive messages and attachments, a task challenging on phone applications.
  • Streamlines direct communication with a specific The County Times journalist.
Disadvantages:
  • PGP setup demands a degree of technical proficiency.
  • If you misplace your keys or forget your password, accessing your own communication becomes impossible.

If you intend to correspond with a County Times journalist on a sensitive subject, consider employing PGP encryption. When properly implemented, PGP renders a message or document indecipherable to anyone other than the sender and the intended recipient. By utilizing the public key of the recipient, available online, your message transforms into an unintelligible code. Only the recipient, possessing the corresponding private key, can decode messages encrypted with their public key.

Getting Started:
  1. Avoid using your regular email address. Establish a new email account solely for interactions with The County Times. Execute this process on an unmonitored computer, ensuring the sign-up details do not link back to your identity.
  2. If using browser-based services like Gmail, Yahoo! Mail, or GMX webmail, explore Mailvelope or FlowCrypt (Gmail only) for browser message encryption. For text and document encryption, Gpg4win for Windows and GPGSuite for Mac are two popular applications to consider.
  3. Install the chosen encryption tool to generate your PGP keys. Safeguard your private key and password separately, avoiding storing them together.
Proceeding:
  • Encrypt your messages and attachments using both your public key and that of the recipient. Ideally, only you and the journalist should be able to decrypt the content. Find The County Times journalists’ keys at thecountytimes.co.ke/pgp.
  • Be cautious of the information carried in an email that can disclose your IP address. If anonymity is a concern, connect to your email service through the Tor network.
  • Send your encrypted material along with a copy of your public key for encrypted replies. Do not encrypt the public key itself.
  • After sending the message, log out and consider deleting the correspondence history from your browser or email software to enhance computer security.

Mail still serves a purpose, particularly if you prefer sending us physical copies.

Advantages:
  • With proper precautions, traditional mail can offer a reasonably effective means of concealing your identity.
  • When avoiding a face-to-face meeting with a journalist, it remains the only dependable method for delivering tangible items.
Disadvantages:
  • It operates at a slower pace.
  • There’s a risk of mail interception or scanning during transit.
  • Items can potentially be lost in the mail.

If you’re not actively being pursued, the likelihood of interception for an envelope or small package is relatively low.

Before sending:
  • Be mindful of the possibility of items going missing during transit. Consider making copies of the materials you plan to send.
  • Evaluate the need for anonymity. Could the posting location inadvertently reveal your identity? Ensure the package and materials are unremarkable if you’re concerned about traceability.
  • Recognize that mail undergoes scanning for hazardous substances. Exclude anything that might hinder delivery. International mail requires a customs declaration, and registered mail mandates sender details.
Subsequently:

The postal address for County Times is provided for your convenience.

How to send material…

SecureDrop stands as the utmost secure channel for connecting with The County Times.

Advantages:
  • SecureDrop ensures complete anonymity, leaving no trace of the source.
  • All submitted materials undergo automatic encryption.
  • We review your submissions on secured computers.
Drawbacks:
  • To access our SecureDrop system, you must install Tor software.
  • Using Tor may raise suspicion if you are under surveillance.

SecureDrop provides a secure means to send us messages and documents, with the option to follow up later. We receive only what you send and a designated codename for our replies, recording no additional information about you. To safeguard against interception, we decrypt your submissions on an entirely offline computer.

Getting Started:
  1. Install TorBrowser on a computer you are confident is not monitored.
  2. Visit thecountytimes.co.ke/securedrop and follow the provided instructions.
Next Steps:
  • Upon your first visit, note the passphrase generated by the service. This phrase enables you to return as the same source to view our replies securely.
  • While it’s not mandatory to provide contact details, doing so can be beneficial. You can also share background information about the documents for context.
  • SecureDrop facilitates correspondence with us or the provision of other contact information in confidence.

SecureDrop, an open-source project managed by the Freedom of the Press Foundation, prioritizes the security and privacy of your communications.

Utilize a customized email account equipped with PGP encryption to safeguard your messages and attachments from unauthorized access.

Advantages:
  • Encrypted emails and documents are shielded by confidential encryption keys and passwords, both of which are required for access. Potential adversaries must possess both elements to decipher your content.
  • Facilitates the transmission of extensive messages and attachments, a task challenging on phone applications.
  • Streamlines direct communication with a specific The County Times journalist.
Disadvantages:
  • PGP setup demands a degree of technical proficiency.
  • If you misplace your keys or forget your password, accessing your own communication becomes impossible.

If you intend to correspond with a County Times journalist on a sensitive subject, consider employing PGP encryption. When properly implemented, PGP renders a message or document indecipherable to anyone other than the sender and the intended recipient. By utilizing the public key of the recipient, available online, your message transforms into an unintelligible code. Only the recipient, possessing the corresponding private key, can decode messages encrypted with their public key.

Getting Started:
  1. Avoid using your regular email address. Establish a new email account solely for interactions with The County Times. Execute this process on an unmonitored computer, ensuring the sign-up details do not link back to your identity.
  2. If using browser-based services like Gmail, Yahoo! Mail, or GMX webmail, explore Mailvelope or FlowCrypt (Gmail only) for browser message encryption. For text and document encryption, Gpg4win for Windows and GPGSuite for Mac are two popular applications to consider.
  3. Install the chosen encryption tool to generate your PGP keys. Safeguard your private key and password separately, avoiding storing them together.
Proceeding:
  • Encrypt your messages and attachments using both your public key and that of the recipient. Ideally, only you and the journalist should be able to decrypt the content. Find The County Times journalists’ keys at thecountytimes.co.ke/pgp.
  • Be cautious of the information carried in an email that can disclose your IP address. If anonymity is a concern, connect to your email service through the Tor network.
  • Send your encrypted material along with a copy of your public key for encrypted replies. Do not encrypt the public key itself.
  • After sending the message, log out and consider deleting the correspondence history from your browser or email software to enhance computer security.

Mail still serves a purpose, particularly if you prefer sending us physical copies.

Advantages:
  • With proper precautions, traditional mail can offer a reasonably effective means of concealing your identity.
  • When avoiding a face-to-face meeting with a journalist, it remains the only dependable method for delivering tangible items.
Disadvantages:
  • It operates at a slower pace.
  • There’s a risk of mail interception or scanning during transit.
  • Items can potentially be lost in the mail.

If you’re not actively being pursued, the likelihood of interception for an envelope or small package is relatively low.

Before sending:
  • Be mindful of the possibility of items going missing during transit. Consider making copies of the materials you plan to send.
  • Evaluate the need for anonymity. Could the posting location inadvertently reveal your identity? Ensure the package and materials are unremarkable if you’re concerned about traceability.
  • Recognize that mail undergoes scanning for hazardous substances. Exclude anything that might hinder delivery. International mail requires a customs declaration, and registered mail mandates sender details.
Subsequently:

The postal address for County Times is provided for your convenience.

 

How to send material…

Mail still serves a purpose, particularly if you prefer sending us physical copies.

Advantages:
  • With proper precautions, traditional mail can offer a reasonably effective means of concealing your identity.
  • When avoiding a face-to-face meeting with a journalist, it remains the only dependable method for delivering tangible items.
Disadvantages:
  • It operates at a slower pace.
  • There’s a risk of mail interception or scanning during transit.
  • Items can potentially be lost in the mail.

If you’re not actively being pursued, the likelihood of interception for an envelope or small package is relatively low.

Before sending:
  • Be mindful of the possibility of items going missing during transit. Consider making copies of the materials you plan to send.
  • Evaluate the need for anonymity. Could the posting location inadvertently reveal your identity? Ensure the package and materials are unremarkable if you’re concerned about traceability.
  • Recognize that mail undergoes scanning for hazardous substances. Exclude anything that might hinder delivery. International mail requires a customs declaration, and registered mail mandates sender details.
Subsequently:

The postal address for County Times is provided for your convenience.

 

Alright, what type of content are you looking to share?

How to send material…

SecureDrop stands as the utmost secure channel for connecting with The County Times.

Advantages:
  • SecureDrop ensures complete anonymity, leaving no trace of the source.
  • All submitted materials undergo automatic encryption.
  • We review your submissions on secured computers.
Drawbacks:
  • To access our SecureDrop system, you must install Tor software.
  • Using Tor may raise suspicion if you are under surveillance.

SecureDrop provides a secure means to send us messages and documents, with the option to follow up later. We receive only what you send and a designated codename for our replies, recording no additional information about you. To safeguard against interception, we decrypt your submissions on an entirely offline computer.

Getting Started:
  1. Install TorBrowser on a computer you are confident is not monitored.
  2. Visit thecountytimes.co.ke/securedrop and follow the provided instructions.
Next Steps:
  • Upon your first visit, note the passphrase generated by the service. This phrase enables you to return as the same source to view our replies securely.
  • While it’s not mandatory to provide contact details, doing so can be beneficial. You can also share background information about the documents for context.
  • SecureDrop facilitates correspondence with us or the provision of other contact information in confidence.

SecureDrop, an open-source project managed by the Freedom of the Press Foundation, prioritizes the security and privacy of your communications.

Utilize a customized email account equipped with PGP encryption to safeguard your messages and attachments from unauthorized access.

Advantages:
  • Encrypted emails and documents are shielded by confidential encryption keys and passwords, both of which are required for access. Potential adversaries must possess both elements to decipher your content.
  • Facilitates the transmission of extensive messages and attachments, a task challenging on phone applications.
  • Streamlines direct communication with a specific The County Times journalist.
Disadvantages:
  • PGP setup demands a degree of technical proficiency.
  • If you misplace your keys or forget your password, accessing your own communication becomes impossible.

If you intend to correspond with a County Times journalist on a sensitive subject, consider employing PGP encryption. When properly implemented, PGP renders a message or document indecipherable to anyone other than the sender and the intended recipient. By utilizing the public key of the recipient, available online, your message transforms into an unintelligible code. Only the recipient, possessing the corresponding private key, can decode messages encrypted with their public key.

Getting Started:
  1. Avoid using your regular email address. Establish a new email account solely for interactions with The County Times. Execute this process on an unmonitored computer, ensuring the sign-up details do not link back to your identity.
  2. If using browser-based services like Gmail, Yahoo! Mail, or GMX webmail, explore Mailvelope or FlowCrypt (Gmail only) for browser message encryption. For text and document encryption, Gpg4win for Windows and GPGSuite for Mac are two popular applications to consider.
  3. Install the chosen encryption tool to generate your PGP keys. Safeguard your private key and password separately, avoiding storing them together.
Proceeding:
  • Encrypt your messages and attachments using both your public key and that of the recipient. Ideally, only you and the journalist should be able to decrypt the content. Find The County Times journalists’ keys at thecountytimes.co.ke/pgp.
  • Be cautious of the information carried in an email that can disclose your IP address. If anonymity is a concern, connect to your email service through the Tor network.
  • Send your encrypted material along with a copy of your public key for encrypted replies. Do not encrypt the public key itself.
  • After sending the message, log out and consider deleting the correspondence history from your browser or email software to enhance computer security.

Initiating a confidential conversation with a County Times journalist is most conveniently achieved through secure messaging apps. Here’s a breakdown of the advantages and disadvantages:

Advantages

Secure messaging apps like Signal and Threema implement encryption during transit and on providers’ servers, ensuring only the sender and recipient can access the messages. Once set up, these apps are user-friendly, comparable to regular text messaging.

Disadvantages

Phone communication inherently reveals the device’s identity and location, compromising anonymity when using mobile apps. The security of messages stored on the phone relies on the device’s security; if the phone is unlocked, the messages can be read. Handling long messages and attachments may be challenging.

Secure messaging apps are effective and convenient for quick communication with journalists, allowing them to promptly view your message. They serve well for discussing communication strategies. However, if absolute anonymity is crucial or if you prefer your interaction with The County Times to be discreet, these apps may not be the best choice.

Getting Started:
  1. Decide whether to use your existing phone or acquire a less traceable one.
  2. Install a secure app like Signal or Threema.
  3. Consider enabling disappearing messages if the app offers this feature.
  4. Familiarize yourself with the app by sending test messages before using it for significant communication.
Next Steps

Add The County Times investigations teams’ Signal accounts to your contacts using the provided numbers. Avoid calling or sending regular text messages; use Signal for communication.

For additional contact details, refer to journalists’ profile pages or search their name along with The County Times on Google. If contact details are elusive, message the provided Signal numbers, requesting your information be forwarded to the intended recipient, accompanied by a brief explanation.

While telephone communication lacks robust security measures, it serves as a practical means to initiate conversations and exchange secure messaging identities. Below are the pros and cons:

Advantages
  • Requires no technical expertise.
  • Useful for initiating communication with a journalist to share contact information for more secure channels.
Disadvantages
  • Telephone communication is susceptible to hacking, potentially revealing your identity or location.
  • Verification of the other person’s identity may be challenging.
Getting Started

Before reaching out, identify the journalist you wish to contact and plan how much information you are comfortable sharing. Keep in mind that the journalist may not be immediately available, requiring you to leave a message. Be prepared for this possibility.

If document sharing is anticipated, explore alternative options in this guide before making a call, so you can inform the journalist of your preferred method.

Evaluate the safety of calling from your work or home phone or any linked mobile phone. If using a new number via a pay-as-you-go SIM card, exercise caution in its acquisition, timing, and payment method. Note that mobile phone calls disclose both the handset ID and the SIM card.

Next Steps

Contact us at one of the following numbers:

  • Kenyan office: +254 706 221098

Mail still serves a purpose, particularly if you prefer sending us physical copies.

Advantages:
  • With proper precautions, traditional mail can offer a reasonably effective means of concealing your identity.
  • When avoiding a face-to-face meeting with a journalist, it remains the only dependable method for delivering tangible items.
Disadvantages:
  • It operates at a slower pace.
  • There’s a risk of mail interception or scanning during transit.
  • Items can potentially be lost in the mail.

If you’re not actively being pursued, the likelihood of interception for an envelope or small package is relatively low.

Before sending:
  • Be mindful of the possibility of items going missing during transit. Consider making copies of the materials you plan to send.
  • Evaluate the need for anonymity. Could the posting location inadvertently reveal your identity? Ensure the package and materials are unremarkable if you’re concerned about traceability.
  • Recognize that mail undergoes scanning for hazardous substances. Exclude anything that might hinder delivery. International mail requires a customs declaration, and registered mail mandates sender details.
Subsequently:

The postal address for County Times is provided for your convenience.

 

How to send material…

SecureDrop stands as the utmost secure channel for connecting with The County Times.

Advantages:
  • SecureDrop ensures complete anonymity, leaving no trace of the source.
  • All submitted materials undergo automatic encryption.
  • We review your submissions on secured computers.
Drawbacks:
  • To access our SecureDrop system, you must install Tor software.
  • Using Tor may raise suspicion if you are under surveillance.

SecureDrop provides a secure means to send us messages and documents, with the option to follow up later. We receive only what you send and a designated codename for our replies, recording no additional information about you. To safeguard against interception, we decrypt your submissions on an entirely offline computer.

Getting Started:
  1. Install TorBrowser on a computer you are confident is not monitored.
  2. Visit thecountytimes.co.ke/securedrop and follow the provided instructions.
Next Steps:
  • Upon your first visit, note the passphrase generated by the service. This phrase enables you to return as the same source to view our replies securely.
  • While it’s not mandatory to provide contact details, doing so can be beneficial. You can also share background information about the documents for context.
  • SecureDrop facilitates correspondence with us or the provision of other contact information in confidence.

SecureDrop, an open-source project managed by the Freedom of the Press Foundation, prioritizes the security and privacy of your communications.

Utilize a customized email account equipped with PGP encryption to safeguard your messages and attachments from unauthorized access.

Advantages:
  • Encrypted emails and documents are shielded by confidential encryption keys and passwords, both of which are required for access. Potential adversaries must possess both elements to decipher your content.
  • Facilitates the transmission of extensive messages and attachments, a task challenging on phone applications.
  • Streamlines direct communication with a specific The County Times journalist.
Disadvantages:
  • PGP setup demands a degree of technical proficiency.
  • If you misplace your keys or forget your password, accessing your own communication becomes impossible.

If you intend to correspond with a County Times journalist on a sensitive subject, consider employing PGP encryption. When properly implemented, PGP renders a message or document indecipherable to anyone other than the sender and the intended recipient. By utilizing the public key of the recipient, available online, your message transforms into an unintelligible code. Only the recipient, possessing the corresponding private key, can decode messages encrypted with their public key.

Getting Started:
  1. Avoid using your regular email address. Establish a new email account solely for interactions with The County Times. Execute this process on an unmonitored computer, ensuring the sign-up details do not link back to your identity.
  2. If using browser-based services like Gmail, Yahoo! Mail, or GMX webmail, explore Mailvelope or FlowCrypt (Gmail only) for browser message encryption. For text and document encryption, Gpg4win for Windows and GPGSuite for Mac are two popular applications to consider.
  3. Install the chosen encryption tool to generate your PGP keys. Safeguard your private key and password separately, avoiding storing them together.
Proceeding:
  • Encrypt your messages and attachments using both your public key and that of the recipient. Ideally, only you and the journalist should be able to decrypt the content. Find The County Times journalists’ keys at thecountytimes.co.ke/pgp.
  • Be cautious of the information carried in an email that can disclose your IP address. If anonymity is a concern, connect to your email service through the Tor network.
  • Send your encrypted material along with a copy of your public key for encrypted replies. Do not encrypt the public key itself.
  • After sending the message, log out and consider deleting the correspondence history from your browser or email software to enhance computer security.

Initiating a confidential conversation with a County Times journalist is most conveniently achieved through secure messaging apps. Here’s a breakdown of the advantages and disadvantages:

Advantages

Secure messaging apps like Signal and Threema implement encryption during transit and on providers’ servers, ensuring only the sender and recipient can access the messages. Once set up, these apps are user-friendly, comparable to regular text messaging.

Disadvantages

Phone communication inherently reveals the device’s identity and location, compromising anonymity when using mobile apps. The security of messages stored on the phone relies on the device’s security; if the phone is unlocked, the messages can be read. Handling long messages and attachments may be challenging.

Secure messaging apps are effective and convenient for quick communication with journalists, allowing them to promptly view your message. They serve well for discussing communication strategies. However, if absolute anonymity is crucial or if you prefer your interaction with The County Times to be discreet, these apps may not be the best choice.

Getting Started:
  1. Decide whether to use your existing phone or acquire a less traceable one.
  2. Install a secure app like Signal or Threema.
  3. Consider enabling disappearing messages if the app offers this feature.
  4. Familiarize yourself with the app by sending test messages before using it for significant communication.
Next Steps

Add The County Times investigations teams’ Signal accounts to your contacts using the provided numbers. Avoid calling or sending regular text messages; use Signal for communication.

For additional contact details, refer to journalists’ profile pages or search their name along with The County Times on Google. If contact details are elusive, message the provided Signal numbers, requesting your information be forwarded to the intended recipient, accompanied by a brief explanation.

We can furnish you with an exclusive user account for document uploads, offering enhanced security measures. This approach is particularly robust for transmitting a series of documents over time or handling substantial document sets, even in gigabytes.

Advantages:
  • High level of security (comparatively).
  • Suitable for sending batches of documents over an extended period.
  • Efficient for handling large document sets, including those in gigabytes.

However, there are some prerequisites:

  • Pre-arrange communication with us to receive access keys and passphrases.
  • Familiarity with FTP software is necessary.

Our private Secure FTP server employs password-protected keypair authentication. Upon assigning you a unique user account, the uploaded documents are automatically relocated to an isolated environment.

To initiate the process:
  1. Reach out to us through alternative communication channels to specify the nature of your submission.
  2. We will supply you with a keyfile and password, along with guidance on accessing the SFTP site.
  3. Install FTP software, such as Cyberduck or FileZilla, on your computer.
Subsequently:
  1. Connect to the site and transmit your documents.
  2. Notify us once the transmission is complete.
  3. The documents will be securely moved from the destination. Rest assured, they have been relocated to an even more secure environment.
  4. Remember to organize your computer files by removing unnecessary duplicates, ensuring a tidy setup

How to dispatch materials…

Mail still serves a purpose, particularly if you prefer sending us physical copies.

Advantages:
  • With proper precautions, traditional mail can offer a reasonably effective means of concealing your identity.
  • When avoiding a face-to-face meeting with a journalist, it remains the only dependable method for delivering tangible items.
Disadvantages:
  • It operates at a slower pace.
  • There’s a risk of mail interception or scanning during transit.
  • Items can potentially be lost in the mail.

If you’re not actively being pursued, the likelihood of interception for an envelope or small package is relatively low.

Before sending:
  • Be mindful of the possibility of items going missing during transit. Consider making copies of the materials you plan to send.
  • Evaluate the need for anonymity. Could the posting location inadvertently reveal your identity? Ensure the package and materials are unremarkable if you’re concerned about traceability.
  • Recognize that mail undergoes scanning for hazardous substances. Exclude anything that might hinder delivery. International mail requires a customs declaration, and registered mail mandates sender details.
Subsequently:

The postal address for County Times is provided for your convenience.

 

By clicking "Accept" you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in improving your experience. Read More