This page permanently redirects to gemini://gemini.techrights.org/2017/06/24/potential-targets-at-epo/.
Posted in Europe, Patents at 5:50 am by Dr. Roy Schestowitz
“If you see something, say something…”
Reference: John Kiriakou
Summary: Priorities for whistleblowing at the European Patent Office (EPO), which operates secretly and occasionally illegally, too
THE management of the EPO is utterly rogue. This problem won’t be resolved unless the world can see that.
=> ↺ EPO
In part 1 and part 2 we gave an introduction and explained situations in which whistleblowing is justified and sufficiently safe. Today, taking it one step forward, the targets of whistleblowing are identified.
Unofficial EPO Circular no. 003Whistleblowing Guidelinesfor the staff of the European Patent Office- part 3 -Ranking of potential targetsIn general, the more power and responsibility an individual has within the Organisation, the more important is the person’s responsibility for the reign of terror1 and corruption, and the lower the person’s accountability. This is not always reflected by the official hierarchy. We propose the following ranking of potential targets for exposure:PRIORITY 1:The president of the EPO, Benoît Battistelli and the members of his inner circle2: Elodie Bergot (PD HR) and her husband Gilles Requena (administrator), René Kraft (CIO), François-Régis Hannart (PD Int. Affairs), Antoine Rety (administrator), Frédéric Angermann (external auditor). These people are old buddies of Mr Battistelli from INPI who have infiltrated the EPO, installed a reign of terror and keep filling their pockets at the expense of the European patent system. They are enemies of Europe. Their illegal actions and misdeeds are thus of the highest relevance and should be exposed without hesitation.Furthermore, the current chairman of the Administrative Council Jesper Kongstad belongs into this priority group for being the president’s closest ally and enabler.The enforcers of the reign of terror at the EPO, i.e. the members of the Investigative Unit3, are amongst the main sources of fear and mental suffering among staff.All persons under priority 1 enjoy presidential protection against being held accountable.PRIORITY 2:The vice-presidents and a certain number of principal directors at key positions keep the system running smoothly. Use your personal insight to identify those who are the most eager to support illegal measures and who receive generous monetary rewards in return.PRIORITY 3:Most principal directors and certain particularly influential directors or heads of department are eager to please their superiors. But they are caught in the middle of the hierarchy and they may have little choice but to obey orders. Still, many of them may have skeletons in the closet, and build their career on unscrupulous methods.PRIORITY 4:Heads of section, directors, team managers are at the lower end of hierarchy and their influence is usually extremely limited. While their actions and decisions affect ordinary staff in their daily work, solutions can in most cases be worked out locally within the unit.___________1 http://www.dutchnews.nl/news/archives/2015/03/european-patent-office-under-fire-over-reign-of-terror/2 https://www.suepo.org/documents/42912/54300.pdf3 http://techrights.org/2017/01/01/reign-of-fear-epo/Personal disputes or doubt about a superior’s managerial competence should normally not be a reason to expose the superior, e.g. by leaking an internal email or the like.Be carefulWhisteblowers always run a risk. The EPO management is relentless and brutal. However, compared to the abundantly high number of leaked information and documents during the last four years, the EPO’s rate of success in identifying whistleblowers is extremely low.Best-practice for whistleblowers includes leaking documents which have been seen by a sufficiently large number of persons, e.g. documents which have circulated internally. When there is no urgency, better wait a few days or weeks before leaking a document. If you are one of very few persons who have seen a highly relevant document, it might even be better to secure a copy of the document and to wait instead of leaking it. In some cases, it might even be necessary to wait until the target person left the Office or lost support from top management, e.g. after the departure of Mr Battistelli.Never upload a document from your Office PC to the web since that leaves digital traces. The same is true for exporting documents on usb sticks.Pictures taken with private cameras contain the camera model as metadata. These can be easily removed, e.g. by the help of TAILS4. All Electronic documents contain metadata (author, software version, type and version of the operating system, time stamp, …). This also applies to pictures taken with smart phones. All metadata need to be carefully removed with sufficiently sophisticated tools. But this is not always possible. There is, for example, no tool for securely removing metadata from pdf documents. On top of those metadata which can be easily checked by looking at a document’s properties, some documents might contain so-called digital fingerprints or digital watermarks being invisible to the eye. For this reason, leaked documents should undergo a non-digital step, e.g. printing and consecutive scanning on a private device or in a copy shop (this will generate a pdf with the metadata of the scanning device used).Be careful, take precautions, but don’t be paralysed by fear. Balance the value of the document with your personal risk. If you have access to very restricted documents, like contracts with external service providers, an audio recording of a confidential meeting, Mr Kongstad’s salary payslip or even the president’s top secret employment agreement, the relevance of the document may be extraordinary, but your risk of being identified or interrogated will be much higher.Good luck!A final note to the members of the Investigative UnitWe are not afraid. Oppression fuels resistance. The light of truth burns brighter than the smouldering of lies. Those who devour others will finally devour themselves. ________4 https://tails.boum.org/news/
By all means cling on to material that can be published after Benoît Battistelli leaves. Accountability can sometimes be pursued long after an act.
In the fourth and final part we are going to publish more technical tips. We remind readers that in 3 years of publishing EPO leaks we have not betrayed or caused trouble for sources. We have, at times, rejected material or did not publish it purely out of concerns for safety of sources. Our utmost concern is people’s safety. Some unpublished material will eventually be published, but only at a later date when it’s safer to do so. █
Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages.
Permalink Send this to a friend
=> Permalink | ↺ Send this to a friend
=> Techrights
➮ Sharing is caring. Content is available under CC-BY-SA.
text/gemini;lang=en-GB
This content has been proxied by September (ba2dc).