Are you a journalist working on sensitive subjects? The effort to protect your sources needs to start before they contact you. These guides will help you create the processes that you need to make sure that both you and your sources stay safe from unwanted threats.
One of the most significant challenges when working with sensitive sources is the “first contact problem” — when a source reaches out over a channel that could immediately compromise their confidentiality. In this guide, we examine how to get ahead of the first contact problem by proactively advertising secure tip channels and how to reach out more safely in advance.
In this guide, we walk you through how to set up and get started messaging with Signal, the secure messaging app.
Not all tip pages are created equal! Some support the humble email and phone number, while others support a number of encrypted messaging channels such as Signal and SecureDrop. In this guide, we walk you through the strategy surrounding how to explain the varying security properties of these tip channels with, how to unpack source safety for those who desire anonymity, and pitfalls to avoid when crafting your tip page.
This guide from the Government Accountability Project provides an in-depth look at common trends among whistleblowers, the legal threats they face, and tips for journalists on how to engage with them effectively and securely.
In this guide, we examine the many ways address books can be leaked, particularly through cloud backups that may be vulnerable to law enforcement requests, and how to minimize related risks.
Since the U.S. Supreme Court overturned Roe v. Wade in 2022, journalists reporting on abortion may find themselves speaking to sources in reproductive health spaces targeted by law enforcement. In this guide, we examine several types of data at issue and how to minimize risk when speaking to sensitive sources.
If you’re looking for language to help you communicate best practices for reaching the press securely, our guide can help. We walk you through the security strategy and legal considerations that potential sources may want to think through before reaching out. We also introduce how to use widely supported tip channels.