amlea allows you to share information with Amnesty International while protecting your identity.

It uses security technologies such as HTTPS for improved confidentiality and Tor for online anonymity. However, no software is 100% secure. See our guide below if you are concerned about security.

Follow our three step process to share information.

Getting Started

The three step process


Download Tor Browser

Tor increases your privacy by concealing your location and that you are communicating with Amnesty International. Observers will only see that you are using Tor, not what you are looking at. Install Tor after the download is completed.

Download Tor



Open the Tor browser and navigate to to share information. You can only share information on using the Tor browser.


Upload Your Information

Follow the instructions on the submission page to upload information. You can share documents and send messages.

More about the Tor Project

The files and messages you share may be used by Amnesty International research teams to investigate potential human rights abuses. Researchers may have questions during the course of their investigations. Their questions will be posted on the secure submission page.

A submission will be available on for two weeks before being deleted. You can use a unique code we will provide to view any messages on For safety reasons, Amnesty International will not know your name or email address so please check for new messages periodically.

There is no guarantee that Amnesty International will act on information submitted.

Only the authorized Amnesty research team will be able to view the information you submit on The information you send is encrypted and is unreadable by anyone trying to intercept it. Only our research team will be able to decrypt and read the files and messages you share on

When two devices communicate over the Internet, intermediate Internet service providers can determine the location of the two devices. The Tor browser and the underlying Tor network conceal the endpoints of Internet communication (i.e. your location and the websites you access). Anyone observing you will only be able to see that you are using Tor, not that you are communicating with Amnesty International. will not see where you are located.

Security Tips

Precautions for Everyone

Do not use public computers

Do not use shared computers at cybercafes, libraries, hotels and other public locations. These computers are often subject to extensive monitoring or compromised with malicious software.

Keep your software up to date

Make sure that you are using an up-to-date version of your computer's operating system and that you have all software and anti-virus updates installed. This will reduce the chances of your computer being compromised.

Be aware of file contents and metadata

If necessary, review the contents of the files to be submitted for evidence of your identity. Additionally, understand that just opening files on your computer may record metadata in the file that could reveal your identity. Do not open files on your computer unless necessary.

Delete sensitive files once they have been uploaded

Do not keep personal copies of the submitted files on your hard drive, in your email or on Internet services like Dropbox.

Do not discuss your submission insecurely

Do not use insecure tools like email or instant messaging to discuss the submission to with anyone.

Understand laws restricting use of encryption

Some types of encryption may be illegal in certain countries. Using Tor for anonymous web browsing relies on encryption and may draw attention to you and your work. Understand any applicable restrictions and limit your use of Tor accordingly.

If You Suspect You Are Being Monitored

Use the Tor browser more safely

Infrequent use of the Tor browser can raise the suspicions of those monitoring your online activities. The following my reduce this risk:

  • Prepare a cover story for your use of the Tor browser in case you are questioned
  • Use the Tor browser regularly for everyday tasks and not just to access
  • Consider using the Tor Browser from another location such as an Internet cafe for one-time access to

Be aware of spyware

The use of spyware has become a common tactic to surveil activists, journalists and others. It is difficult to detect if your computer has been compromised and spyware could allow the complete monitoring of all your activities. The following two items may reduce the risk of spyware:

  • Use a computer that you have never used before and that is more likely to be free from spyware
  • Ask a trusted contact who is not likely to be personally monitored to submit the information to

Additional information

Take time to review these security resources if you believe you are under surveillance:

If you do not feel safe, do not further compromise your safety by sending information to Amnesty International.

Powered by Globaleaks

This platform makes use of GlobaLeaks software specifically designed to protect your identity and securely share your information. The software is developed by the non-profit Hermes Center for Transparency and Digital Human Rights. Please support Hermes through their donation page.