One opened, more to go... Operation Clambake present:

How to post and e-mail anonymousely



THIS IS A WORK-IN-PROGRESS PAGE, PLEASE SEND ME SUGGESTIONS

The "Church" of Scientology is famous for harassing their critics and defectors, and even their families and friends (indirect pressure). Many ex-Scientologists have stories about abuse and how the group pressure and fright of personal information being released, prevented them from blowing or going public with their inside information. Many also feel embarrassed when they learn the truth about the organization they donated money and a lot of their life to. For some fighting back is part of the "therapy" to recover and get back to a normal life in society, while others just want to put their time in CoS behind them and start fresh. Both could need someone to talk to, someone with similar experiences. For their own recovery and to warn others who might repeat their errors if not warned in time.

We are therefore faced with the challenge of providing channels for these people to get in communications with others out there that are able and willing to help. This is a difficult task since history shows us that CoS will do anything to sabotage this. There is reason to look specially out for those OSA-agents who are very often ´fishing´ for names of leaving people.

The Operartion Clambake Message Board was created by Operation Clambake as an attempt to offer help those who write to the author asking for help. There are no check of the contributors and none of the assistant offered there is vouched for by this site. Depending on your personal situation, you are encouraged to take the appropriate steps to protect your interests and we will try to explain how to do this here. These tips might not be complete and we do not guarantee that that there still might be ways to reveal your identity. There is a lot of different software out there contiousely changing and we suggest you investigate the issue of personal security based on the hardware and software you have.

The message board automatically logs your IP address when you post. If requested by the authorities, the webmaster reserves the right to reveal it.


Some abuse the possibility to act anonymous on the Internet to spread slander and lies, flood, use abusive language, etc. This page is for those who have a legit reason to hide their identity and we strongly urge people not to abuse the freedom this opportunity provides. It is also good 'Net etiquette to use a handle so that you are recognized even though you are anonymous.

  1. E-MAIL
    Usually you get an e-mail account from your Internet Service Provider (ISP) and this then becomes the one most people normally use. Often such account e-mails are reasonably easy to track down, especially if you have a web page on the same account or use it to post personal information elsewhere.
    • SECOND E-MAIL ACCOUNTS
      Hotmail embeds the IP address of the sender in every message. For hotmail to be (relatively) safe, at a minimum, one must create the account and send the email from a public computer (library or internet cafe) - and when using this, one must pay cash and be anonymous.
      An e-mail account (POP account) is where you log in to send and receive e-mail. By setting up a second e-mail account not connected to your real account there is no easy way to trace it back to you without getting access to the ISP server logs. Many sites offers free e-mail accounts with web-interface (where you can use your browser to receive and send). The most famous one is probably HotMail. In return for a the free e-mail account they have adds on their pages to pay for the service.
    • ENCRYPTION
      Sending an e-mail is like sending an ordinary letter, anybody along its path can open and read it. You don't usually suspect your mailman to do this even if he has every opportunity. Still, it doesn't hurt to take precautions. If you encrypt the text in your letters it wouldn't matter if others were able to look inside them, they would not be able to decode your text anyway. Pretty Good Privacy (PGP) is a free program that offers very strong public key encryption and is probably the most common encryption software used on the Internet. PGP users exchange keys and then only the owner of the key used to encrypt the text can decode it. Read more about PGP and public keys in the PGP FAQ or PGPi FAQ. Download the freeware version from the international PGP site.

  2. NEWSGROUPS AND MESSAGE BOARDS

  3. Newsgroups and message boards are usually public places where one can post to different groups and reply to posts made by others. Most are grouped by subject.

  4. REMAILERS
    A re-mailer is computer service that privatizes your e-mail. A re-mailer allows you to send electronic mail to a Usenet news group or to a person without the recipient knowing your name or your e-mail address. To date, all popular re-mailers are free-of-charge. Read more in the Anonymous Re-Mailer FAQ and you find more links here.
  5. CHATTING
    Chatting is when you communicate with others in real-time using the keyboard. The defenitely most popular method is using Internet Relay Chat (IRC). To access IRC you need an IRC program installed on your computer, like the popular mIRC. To hide your identity on IRC you should consult with the manuals provided with the IRC software you choose.
  6. SURFING THE WEB
    Your computer can reveal a lot of information about you when you surf. If this is a consern for you then you should concider using one of the anonymous servers available (e.g. anonymizer.com). What they do is simply to strip off all information coming from your computer and/or your ISP. Most web servers automatically log your IP address which can point back to you. An anonymizing service or using a publicly accessable Internet computer could solve this. Click here to see what information is available about your current session!
  7. REVEALING YOURSELF
  8. Hiding your identity on the 'net is one thing, but you should also remember that it is easy to reveal yourself by telling too much. Don't be paranoid, be smart.


Brought to you by:
Operation Clambake