Include verifiable evidence (photos, videos, documents) with timestamps and locations; Choose anonymity or public attribution—all data is encrypted; Critical cases will trigger collaborative investigations with international legal partners and public exposés .