Bylaws (proposed)

Index

  1. Mission
  2. Organizational Structure
    1. Editorial Board
    2. Technical Core Group
    3. Legal Advisory Group
    4. Advisory Group
    5. Membership in multiple groups
    6. Groups denote skill sets
  3. Procedures
    1. Meeting Format
    2. Agenda
    3. Speaking
    4. Quorum
    5. Attempted Concensus
    6. Notice
    7. Notes
  4. Other Policies and Procedures
    1. Transparency
    2. Open Source Software
    3. Acceptance of Bylaws

Mission

The mission of VTLeaks is to provide a platform for anonymous whistleblowing in Vermont that will lead to greater transparency and accountability. We seek to provide members of the media with a safe anonymous dropbox to receive potentially controversial materials. We also provide training in the use of anonymity networks and cryptography to media members. We may set up services for other organizations if requested. Truly anonymous drop boxes can be used for tips of all sorts.


Organizational Structure

VTLeaks shall be composed of 4 core bodies with separate but overlapping duties. These bodies are as follows.


Editorial Board

The purpose of the Editorial Board is to analyse any data that is submitted to VTLeaks with an eye to passing it on to media who will publish it. The qualifications needed to be on the Editorial Board are long term knowledge and experience in media. Good writing skills are not enough one must have experience with editorial decisions and possibly training as in journalism. Only if the data is not accepted and published by established media will we consider publishing it on our own. The Editorial Board has the authority to publish materials, however the Technical Core Group may also vet the material to ensure that the anonymity and security of both the source and the recipient of the materials will not be compromised by publishing the material. If there is any question about the legal status of the material the Legal Advisory Group shall be consulted. Before providing materials that may be of questionable legality to any outside group for analysis the Technical Core Group and the Legal Advisory Board should be consulted.


Technical Core Group

The Technical Core Group is responsible for the technical measures needed to maintain the anonymity and confidentiality of sources and recipients of data.

Qualifications: Technical Core Group members must understand anonymity networks, cryptographic practice, and how to defend from the attacks against these precautions. They must also have a good understanding of basic tradecraft and personal security measures that may need to be taken by sources and data recipients.

Some Technical Core Group members must be able to explain and identify social engineering and technical attacks that may be used to gain access to networks as well as attacks to compromise organization members. It is incumbant upon ALL people working with the organization to be aware of security issues and how to secure themselves.

At least some of the Technical Core Group members must be part of the global data transparency and anonymity community and must be able to coordinate with software producers and other transparency groups to keep the software up to date and to provide the most secure and anonymous hosting that is practical. Being part of the global data transparency movement allows the organization to call upon people with decades of experience running an initiative of this sort and it provides our organization with global resources in the areas of security, technology, legislation and legal defenses. In short it would not be possible to do this without this help.

The Technical Core Group may recruit outside people for graphic design or for other software help if needed, though it must be emphasised that the job of the technical group is far beyond that of a webmaster. Helping on a project does not endow Technical Core Group membership. Technical Core Group members must have the full qualifications previously discussed.


Legal Advisory Group

The Legal Advisory Group helps advise the organization of any possible legal problems it may encounter and the best ways to deal with said legal problems. The qualifications needed are legal training or significant experience and proven understanding of the possible legal issues we may encounter. In today's atmosphere it is essential that we be very careful. People from civil liberties organizations like the ACLU and EFF are particularly welcome.


Advisory Group

The previous 3 groups discussed are operational groups that require a high level of a specific skill. The Advisory Group consists of people who fully support the mission of the organization, which is to promote transparency and provide a place for anonymous whistleblowing. Members of the advisory group may have other expertise and contacts that will further the group mission.


Membership in Multiple Operational Groups

People may be members of more than one operational group if they have the prerequisite qualifications.


Groups denote skill sets

The differing groups should be thought of more as skillsets than of groups with different duties. All groups bring needed resources to the group and may warn of different potential problems. It's not a conflict of interest for a skilled journalist to also have a good legal understanding, it simply means we get more skills from one person.


Administrative Positions or Boards

An administrative board or position may be formed of organizational members elected from all other sections of the organization to fulfill any legal or functional purpose. There may be a chair or a spokesperson but these officers do not have any authority other than what is strictly given to them by the organization. An administrative board has no authority over the organization, only duties assigned to it. They may not remove other members and they must be elected by majority vote. They can NOT change the bylaws and they can not elect any so called 'executive boards'.




Procedures

Meeting Format

Meetings format is a standard union meeting format. The first matter is approving the meeting facilitator and note keeper. Potential facilitators and note keepers are presented, and if necessary, elected. Meetings also should elect a stack keeper if the facilitator is unable to do the duty of facilitation and stack keeping or if the meeting prefers a separate stack keeper. Normally there is little controversy over competent meeting facilitators or stack keepers.


Agenda

The second matter of any meeting is presenting the agenda. An agenda may be presented by any member and competing agendas will be consolidated. Before proceeding the agenda must be voted on. If there are any objections, points on the agenda will be discussed until an agenda is approved by a majority.


Speaking

Agenda items are discussed in the order they are listed. Rounds of speakers are taken by the facilitator or stack keeper. The facilitator or stack keeper may impose a time limit if needed. A person may call a vote. A vote call may itself be voted on. A vote may not be called until at least 1 round of speakers are called. At a vote call persons objecting may raise their hand to put themselves in stack to oppose. After more speakers are called a person may call a vote on the vote. You may not do calls on calls to vote. If a meeting is too long people can of course call to end the meeting. Note, there is no need for 'seconds' or stuff like that. Discussion on matters other than the item at hand may be called 'out of order'. New items may be added to the agenda as needed during the meeting. Anyone can call to add a new item to the agenda and additions may be voted on if neccesary.


Decisions, with the exception of changes to the Bylaws, are made by simple democratic vote with the proviso that Technical Group members may veto any action that may compromise the anonymity and security of sources, recipients that require anonymity or the organization as a whole. This is the sole thing Technical group members have a veto on. A veto may be overridden only by concensus of the editorial board supported by one or more Technical group members. Legal Advisory Group members may object to actions that may have dire legal consequences beyond that which we are willing to incur. Their objection requires a 75% supermajority to override. In the event of a disagreements within the Legal or Technical Groups a membership vote of the people in the remaining groups will be used to break the tie.


Attempted Concensus

Concensus is the ideal for decisions of any sort. However, with the exception of bylaw changes, a majority may make a decision.


Quorum

Quorum is achieved when at least 50% of the members of operational groups are present.There must be at least one representative each from the Editorial Board, the Technical Core Group and the Legal Group in attendance. The operational groups consist of the Editorial Board, The Technical Core Group and the Legal Group. Decisions may be made in face to face meetings, face to face meetings with people participating electronically, fully electronically or even by mail or email. Once a quorum of people discusses and votes on an issue it is legally decided. Should there be controversy on a topic, members can request a face to face meeting or an electronic meeting to better discuss the issue.


Notice

Notice will be given at least 12 hours in advance of any normal face to face meetings. Exceptions are if at least 75% of members are notified earlier or an emergency exists. Notice for electronic decision making is achieved when a majority of operational group members have given their vote. Snap decisions made by a minority of members with little notice to members of operational groups are to be avoided.


Meeting Notes

A record of meetings shall be maintained. If it is not possible for someone to keep a full record of the discussion, a record of decisions will be kept as a 'TODO' list.


Other Policies and Procedures

Transparency

Financial transactions will be posted publically where possible. This means what was spent and what for. It does not necessarily mean that people's identities will be revealed. People's positions may be revealed if it is deemed appropriate.


Open Source Software

We will use Open Source Software wherever practical for infrastructure, documents and other uses. Where cryptography is concerned we will prefer audited code written by trained cryptographers.


Acceptance of Bylaws

Once the Bylaws are accepted, changes to the Bylaws may only be made by a supermajority of 75% (three-quarters) or more, with attempted concensus. One week notice must be given and a superQuorum of at least 75%, consisting of members of all voting groups, must be in attendance.