DONATE

 

  Help us to deliver insightful reports on the negative influence of social engineering, provocateurs and harassment locally and inte

Communication and development of support programs also requires a significant amount of time.

Transit Report is funded by community contributions.

To support our development efforts, make regular donations or a one time contribution.

Thank you for your support.

PayPal

< Digital Tip Jar

Is my information secure?
Online donation information (credit card data) is never handled by our servers. Instead, you input your data directly to the selected payment system servers.
We can not sell, trade or share your financial information.
We use industry-standard SSL technology to protect your browsing and data security.

more...
 

VOLUNTEER

Help Locally


Draw back the curtain of secrecy.

There are many rolls for volunteers... both anonymous and visible.

As a witness you may mitigate intimidation. 

Enabling access to living essentials such as work, medical appointments or groceries. 

Bring questionnaires or web access to the disenfranchised.
Assist with social media and victim statements.                                                 

      Witness, Record & Share      

      Simple Case Re-enactments

      Distribute our Questionnaires

   Provide Web Access to the Needful

 

SUPPORT

Think Globally


Offer your expertise to rescue the disenfranchised.


         Language Support

         Legal Support

            Analysis

 

SUBMISSIONS

Contribute Work


                     Newspaper 64

If you work in journalism, research or activism and are passionate about those sectors, your informative contributions would be greatly appreciated.

Creative content is also welcome in the form of written pieces, art work, graphics and of course photos & videos. 

Reach out to readers every month. Get yourself heard by the community.
To inquire or make submissions use the contact method of your choice with a brief author bio and your photograph.

 

CONTACT

 
 

How to request a
secure end-to-end encrypted email link


  Read about encrypted email security protocols Here, receiving or sending secure emails Here.

 To further protect your identity install Tor web browser or a VPN before sending request.

 Never include sensitive information unencrypted. Always use the REPLY SECURELY button.