Bonum Certa Men Certa

Potential Targets of European Patent Office (EPO) Whistleblowing

"If you see something, say something..."

John Kiriakou Reference: John Kiriakou



Summary: Priorities for whistleblowing at the European Patent Office (EPO), which operates secretly and occasionally illegally, too

THE management of the EPO is utterly rogue. This problem won't be resolved unless the world can see that.



In part 1 and part 2 we gave an introduction and explained situations in which whistleblowing is justified and sufficiently safe. Today, taking it one step forward, the targets of whistleblowing are identified.

Unofficial EPO Circular no. 003



Whistleblowing Guidelines



for the staff of the European Patent Office



- part 3 -



Ranking of potential targets

In general, the more power and responsibility an individual has within the Organisation, the more important is the person's responsibility for the reign of terror1 and corruption, and the lower the person's accountability. This is not always reflected by the official hierarchy. We propose the following ranking of potential targets for exposure:

PRIORITY 1:

The president of the EPO, Benoît Battistelli and the members of his inner circle2: Elodie Bergot (PD HR) and her husband Gilles Requena (administrator), René Kraft (CIO), François-Régis Hannart (PD Int. Affairs), Antoine Rety (administrator), Frédéric Angermann (external auditor). These people are old buddies of Mr Battistelli from INPI who have infiltrated the EPO, installed a reign of terror and keep filling their pockets at the expense of the European patent system. They are enemies of Europe. Their illegal actions and misdeeds are thus of the highest relevance and should be exposed without hesitation.

Furthermore, the current chairman of the Administrative Council Jesper Kongstad belongs into this priority group for being the president's closest ally and enabler.

The enforcers of the reign of terror at the EPO, i.e. the members of the Investigative Unit3, are amongst the main sources of fear and mental suffering among staff.

All persons under priority 1 enjoy presidential protection against being held accountable.

PRIORITY 2:

The vice-presidents and a certain number of principal directors at key positions keep the system running smoothly. Use your personal insight to identify those who are the most eager to support illegal measures and who receive generous monetary rewards in return.

PRIORITY 3:

Most principal directors and certain particularly influential directors or heads of department are eager to please their superiors. But they are caught in the middle of the hierarchy and they may have little choice but to obey orders. Still, many of them may have skeletons in the closet, and build their career on unscrupulous methods.

PRIORITY 4:

Heads of section, directors, team managers are at the lower end of hierarchy and their influence is usually extremely limited. While their actions and decisions affect ordinary staff in their daily work, solutions can in most cases be worked out locally within the unit.

___________ 1 http://www.dutchnews.nl/news/archives/2015/03/european-patent-office-under-fire-over-reign-of-terror/ 2 https://www.suepo.org/documents/42912/54300.pdf 3 http://techrights.org/2017/01/01/reign-of-fear-epo/




Personal disputes or doubt about a superior's managerial competence should normally not be a reason to expose the superior, e.g. by leaking an internal email or the like.

Be careful

Whisteblowers always run a risk. The EPO management is relentless and brutal. However, compared to the abundantly high number of leaked information and documents during the last four years, the EPO's rate of success in identifying whistleblowers is extremely low.

Best-practice for whistleblowers includes leaking documents which have been seen by a sufficiently large number of persons, e.g. documents which have circulated internally. When there is no urgency, better wait a few days or weeks before leaking a document. If you are one of very few persons who have seen a highly relevant document, it might even be better to secure a copy of the document and to wait instead of leaking it. In some cases, it might even be necessary to wait until the target person left the Office or lost support from top management, e.g. after the departure of Mr Battistelli.

Never upload a document from your Office PC to the web since that leaves digital traces. The same is true for exporting documents on usb sticks.

Pictures taken with private cameras contain the camera model as metadata. These can be easily removed, e.g. by the help of TAILS4. All Electronic documents contain metadata (author, software version, type and version of the operating system, time stamp, ...). This also applies to pictures taken with smart phones. All metadata need to be carefully removed with sufficiently sophisticated tools. But this is not always possible. There is, for example, no tool for securely removing metadata from pdf documents. On top of those metadata which can be easily checked by looking at a document's properties, some documents might contain so-called digital fingerprints or digital watermarks being invisible to the eye. For this reason, leaked documents should undergo a non-digital step, e.g. printing and consecutive scanning on a private device or in a copy shop (this will generate a pdf with the metadata of the scanning device used).

Be careful, take precautions, but don't be paralysed by fear. Balance the value of the document with your personal risk. If you have access to very restricted documents, like contracts with external service providers, an audio recording of a confidential meeting, Mr Kongstad's salary payslip or even the president's top secret employment agreement, the relevance of the document may be extraordinary, but your risk of being identified or interrogated will be much higher.

Good luck!

A final note to the members of the Investigative Unit

We are not afraid. Oppression fuels resistance. The light of truth burns brighter than the smouldering of lies. Those who devour others will finally devour themselves. ________ 4 https://tails.boum.org/news/



By all means cling on to material that can be published after Benoît Battistelli leaves. Accountability can sometimes be pursued long after an act.

In the fourth and final part we are going to publish more technical tips. We remind readers that in 3 years of publishing EPO leaks we have not betrayed or caused trouble for sources. We have, at times, rejected material or did not publish it purely out of concerns for safety of sources. Our utmost concern is people's safety. Some unpublished material will eventually be published, but only at a later date when it's safer to do so.

Recent Techrights' Posts

Who really owns Debian: Ubuntu or Google?
Reprinted with permission from disguised.work
 
[Meme] Reserving Scorn for Those Who Expose the Misconduct
they like to frame truth-tellers as 'harassers'
Why the Articles From Daniel Pocock (FSFE, Fedora, Debian Etc. Insider) Still Matter a Lot
Revisionism will try to suggest that "it's not true" or "not true anymore" or "it's old anyway"...
Links 03/05/2024: Canada Euthanising Its Poor and Disabled, Call for Julian Assange's Freedom
Links for the day
Dashamir Hoxha & Debian harassment
Reprinted with permission from disguised.work
Maria Glukhova, Dmitry Bogatov & Debian Russia, Google, debian-private leaks
Reprinted with permission from disguised.work
Keeping Computers at the Hands of Their Owners
There's a reason why this site's name (or introduction) does not obsess over trademarks and such
In May 2024 (So Far) statCounter's Measure of Linux 'Market Share' is Back at 7% (ChromeOS Included)
for several months in a row ChromeOS (that would be Chromebooks) is growing
Links 03/05/2024: Microsoft Shutting Down Xbox 360 Store and the 360 Marketplace
Links for the day
Evidence: Ireland, European Parliament 2024 election interference, fake news, Wikipedia, Google, WIPO, FSFE & Debian
Reprinted with permission from Daniel Pocock
Enforcing the Debian Social Contract with Uncensored.Deb.Ian.Community
Reprinted with permission from Daniel Pocock
Gemini Links 03/05/2024: Antenna Needs Your Gemlog, a Look at Gemini Get
Links for the day
IRC Proceedings: Thursday, May 02, 2024
IRC logs for Thursday, May 02, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Jonathan Carter & Debian: fascism hiding in broad daylight
Reprinted with permission from disguised.work
Gunnar Wolf & Debian: fascism, anti-semitism and crucifixion
Reprinted with permission from disguised.work
Links 01/05/2024: Take-Two Interactive Layoffs and Post Office (Horizon System, Proprietary) Scandal Not Over
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, May 01, 2024
IRC logs for Wednesday, May 01, 2024
Embrace, Extend, Replace the Original (Or Just Hijack the Word 'Sudo')
First comment? A Microsoft employee
Gemini Links 02/05/2024: Firewall Rules Etiquette and Self Host All The Things
Links for the day
Red Hat/IBM Crybullies, GNOME Foundation Bankruptcy, and Microsoft Moles (Operatives) Inside Debian
reminder of the dangers of Microsoft moles inside Debian
PsyOps 007: Paul Tagliamonte wanted Debian Press Team to have license to kill
Reprinted with permission from disguised.work
IBM Culling Workers or Pushing Them Out (So That It's Not Framed as Layoffs), Red Hat Mentioned Repeatedly Only Hours Ago
We all know what "reorg" means in the C-suite
IBM Raleigh Layoffs (Home of Red Hat)
The former CEO left the company exactly a month ago
Paul R. Tagliamonte, the Pentagon and backstabbing Jacob Appelbaum, part B
Reprinted with permission from disguised.work
Links 01/05/2024: Surveillance and Hadopi, Russia Clones Wikipedia
Links for the day
Links 01/05/2024: FCC Takes on Illegal Data Sharing, Google Layoffs Expand
Links for the day
Links 01/05/2024: Calendaring, Spring Idleness, and Ads
Links for the day
Paul Tagliamonte & Debian: White House, Pentagon, USDS and anti-RMS mob ringleader
Reprinted with permission from disguised.work
Jacob Appelbaum character assassination was pushed from the White House
Reprinted with permission from disguised.work
Why We Revisit the Jacob Appelbaum Story (Demonised and Punished Behind the Scenes by Pentagon Contractor Inside Debian)
If people who got raped are reporting to Twitter instead of reporting to cops, then there's something deeply flawed
Free Software Foundation Subpoenaed by Serial GPL Infringers
These attacks on software freedom are subsidised by serial GPL infringers
Red Hat's Official Web Site is Promoting Microsoft
we're seeing similar things at Canonical's Ubuntu.com
Enrico Zini & Debian: falsified harassment claims
Reprinted with permission from disguised.work
European Parliament Elections 2024: Daniel Pocock Running as an Independent Candidate
I became aware that Daniel Pocock had decided to enter politics
Publicly Posting in Social Control Media About Oneself Makes It Public Information
sheer hypocrisy on privacy is evident in the Debian mailing lists
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, April 30, 2024
IRC logs for Tuesday, April 30, 2024