Ex-money launderer Kenneth Rijock offers tips for whistleblowers

9780241954768_TheLaundryMan_fCOVIn this article, first published in the Whistleblower Edition of TJN’s newsletter, Tax Justice Focus, convicted money launderer Kenneth Rijock (author of The Laundry Man, Penguin, 2013) offers some practical advice to those who might be considering blowing the whistle on their employers.  Helpful tip: get yourself a good lawyer.

Although my primary field is the identification and detection of financial crime in general, with an emphasis on money laundering, I often find myself in the role of working with whistle-blowers, when reporting on white-collar crime in progress, where the information is received from a confidential source. Inasmuch I have substantial experience in conducting operations under the radar, when I was involved in activities that I wanted to remain confidential, I am offering these suggestions for whistle-blowers who also wish to quietly collect material, without attracting unwanted attention from the target of their inquiries. They are what we refer to as operational security.

Given the propensity of many whistle-blowers’ targets, especially when they are large entities, to maintain agents to investigate unhappy employees, as potential whistle-blowers, it is prudent to take a number of measures that will: (1) keep your information secure, (2) protect the identities of your sub-sources, and (s) prevent you from being a civil, or even, criminal, defendant as the result of your actions.

First of all, you must assume that all your means of electronic communication is potentially under surveillance. This includes telephone calls from your land-line or mobile telephones, and your known email addresses. You need to adopt what is in essence the tradecraft of espionage if you want to avoid interception of your communications with media, or your sub-sources.

This means never using your present email addresses; some whistle-blowers utilize obscure email providers, from faraway jurisdictions, and using them only for short periods, In conjunction with the same activity on the other end ( your own sources),
And both parties using Internet cafes, libraries, public wifi resources, alternating them, to avoid any pattern. Some people use Hushmail (www.hushmail.com) a free, encrypted email service, changing their address & password frequently, to avoid detection.

Both sender and recipient have the address AND password, for there is only a need for one account. Here’s why:

Since all emails, even when deleted by the sender or recipient, remain available to prying eyes, prepare drafts only; the recipient himself or herself deletes the draft when read. Both parties regularly monitor the single account, looking for messages from the other. Drafts are not saved anywhere, because they technically are never sent or received. This technique ensures that your messages cannot be read by others, unless they know what you are doing, and look for drafts, but they need to have your address & password, and know what to look for.

The second measure I recommend is to never, in writing, identify your sources by name; designate an alias, or code word, so that their identity is always protected in your notes and documents, and under no circumstances do you ever put his telephone number down anywhere near that code name.; keep his telephone number and the email address in a totally different file, hard copy only, so that it appears to be that of another contact, client, vendor, or other innocent party.

You obviously will need to compose memoranda, type up your handwritten notes, and the progress of your investigation. Do not use any of the computers or devices that are connected to the Internet, for this purpose. Obtain an inexpensive laptop, new. and use it exclusively for your whistle-blower project. It is to have its wifi capability completely and permanently disabled, and with no USB or hard-wired connection to the World Wide Web. This is known as a stand-alone computer; it is not ever to be networked with any other system, to guarantee that it cannot be accessed remotely, and that it will never be the target of an intrusion, worm, or hack.

If you must install programs, such as MS Word, or Excel, do so from a CD, never install anything from the Internet, not even from one of your other computers, for that may already been compromised. Do not ever leave this computer out where it can be seen; store it in a very unlikely place, so that anyone who breaks in will not find it. If you follow these suggestions, then it is highly unlikely that any company investigator will learn the identity of your sources

The third issue is protecting oneself from civil suits, and also from possible criminal prosecution. The information contained in this article is not intended to be legal advice, and you are strongly advised to consult with a competent attorney, who is familiar with not just libel and slander issues, but also with trade secrets, classified information laws, and the corporate culture of the type of entity that you plan to publicly expose, or blow your whistle to government or law enforcement.

You may not be aware of all the legal ramifications of your activities, and you should fully understand the potential legal risks, both now, and in the future, so be sure to consult a good lawyer before engaging in your whistle-blowing campaign, for some of what you are planning could cross the line into either an illegal act, or be grounds for a civil suit. Understand the risks before you jump into your project.

That being said, you are encouraged to dig, probe and poke around any issue, where you believe that there are facts that must be extracted, and to take any damaging information that you find to the appropriate regulator, or agency, or media, where it will get the attention it deserves.

Good luck.


Related Posts

UN must defend target to curtail multinational companies’ tax abuse

Photo by Luca Santori, Creative Commons LicenseThe Tax Justice Network, The Independent Commission for the Reform of International Corporate Taxation, and the Global Alliance for Tax Justice call on the UN Secretary General to make sure the commitment to action on tax abuses by multinational companies remains part of the new UN Sustainable Development Goals.


The BVI: Responsible for worldwide tax losses of $37.5 billion a year

BVI report blogAn extraordinary report by consultants Capital Economics, for BVI Finance, claims that the British Virgin Islands are responsible for $1.5 trillion of assets invested around the world, and that these result in 2.2 million jobs and $15 billion in tax revenue. A better approximation would be that the BVI imposes global tax losses of $37.5 […]


Event: Making Tax Work for Women in the UK and Globally

Invitation_ Tax and Gender eventOn Wednesday 28th June 2017 at 16.30 our very own Liz Nelson will be speaking at an event in London that aims to bring together gender and tax justice advocates to highlight the need for coherent and gender-responsive fiscal policies to safeguard the rights of women and girls both in the UK and globally. The […]


Historic event on women, human rights and tax justice in Bogota

BogotaLast week civil society organisations, researchers, labour union activists and policy makers met in Bogota, Colombia to explore how tax justice issues can ensure governments, multinational corporations and others meet their obligations to women in order to secure their full range of human rights. The Women’s Rights and Tax Justice conference opened with a conversation […]


The Offshore Wrapper: the Panama Papers, one year on

Photos from the Protest outside PwC 1 Embankment Place, part of the Global week of action for tax justiceWelcome to the Offshore Wrapper – your weekly update from TJN.  Happy Paniversary! This week it’s been one year since the Panama Papers were leaked, and a number of organisations around the world have been marking the occasion though the global week of action for tax justice. In London, activists from the TJN and the […]


Leave a Reply

Your email address will not be published. Required fields are marked *

Back to Top