Source protection

Header image of two women speaking to each other on a couch

Are you a journalist working on sensitive subjects? The effort to protect your sources needs to start before they contact you. These guides will help you create the processes that you need to make sure that both you and your sources stay safe from unwanted threats.

  1. Header image, a close-up shot of recording equipment.

    The first time they reach out, protect sources from themselves

    One of the most significant challenges when working with sensitive sources is the “first contact problem” — when a source reaches out over a channel that could immediately compromise their confidentiality. In this guide, we examine how to get ahead of the first contact problem by proactively advertising secure tip channels and how to reach out more safely in advance.

  2. Header image showing pattern of mail envelope icons

    Security considerations for confidential tip pages

    Not all tip pages are created equal! Some support the humble email and phone number, while others support a number of encrypted messaging channels such as Signal and SecureDrop. In this guide, we walk you through the strategy surrounding how to explain the varying security properties of these tip channels with, how to unpack source safety for those who desire anonymity, and pitfalls to avoid when crafting your tip page.

  3. Header image reading, "Working with Whistleblowers: A Guide for Journalists

    Working with Whistleblowers: A Guide for Journalists

    This guide from the Government Accountability Project provides an in-depth look at common trends among whistleblowers, the legal threats they face, and tips for journalists on how to engage with them effectively and securely.

  4. Photo of pro-choice protesters at a rally holding signs

    Taking care with source security when reporting on abortion

    Since the U.S. Supreme Court overturned Roe v. Wade in 2022, journalists reporting on abortion may find themselves speaking to sources in reproductive health spaces targeted by law enforcement. In this guide, we examine several types of data at issue and how to minimize risk when speaking to sensitive sources.

  5. Screenshot from the New York Times tip page

    Here's how to share sensitive leaks with the press

    If you’re looking for language to help you communicate best practices for reaching the press securely, our guide can help. We walk you through the security strategy and legal considerations that potential sources may want to think through before reaching out. We also introduce how to use widely supported tip channels.

Image credit: WOCinTech Chat. CC-BY-2.0