Digital and Physical Safety: Protecting Confidential Sources

Two men partially obscured by a reflection in a window are shown talking, one wearing sunglasses and face mask.

Mohammad Naweed, a journalist from western Afghanistan, hides his identity for security reasons as he gives an interview to The Associated Press in Kabul, Afghanistan, on February 3, 2021. (AP Photo/Rahmat Gul)

Protecting confidential sources is a cornerstone of ethical reporting. When journalists have agreed to protect someone’s identity, they should make every effort to do so, especially in circumstances where a source could be arrested or harmed.

Maintaining confidentiality has become more challenging due to increasing levels of digital surveillance and monitoring by authorities and the public. Journalists should therefore consider the following safety advice to help protect the identity of confidential sources.

Be aware, however, that media organizations may have a policy that requires journalists to share a source’s identity with their editors. In some countries, organizations may also have the legal right to hand a journalist’s notebooks or equipment over to a court or the authorities, if they are considered to belong to the organization. Research any such rules before making any promises.

Please note that this is a general introduction written for a global audience. Seek additional advice for country-specific contexts and questions.

Contents

Planning

Preparation before engaging with confidential sources for the first time is critically important, as is ongoing cooperation, secure communication, and trust.

Assessing the risks vs. the reward

Always consider the sensitivity of the story and the source’s information, as well as their identity.

Digital safety best practices

There are a number of ways that data can be accessed, including but not limited to government subpoenas, physical access to devices, hacking, and spyware. Consult with a digital security expert if you have doubts about how to protect a source’s identity.

Researching your source

An encryption message is seen on the WhatsApp application on an iPhone in Manchester, Britain on March 27, 2017. (Reuters/Phil Noble)

Communicating with sources

Receiving and managing documents

Meeting sources

Anonymizing sources

If taking photos or footage of the source, consider the following:

Publishing content

Maintaining confidentiality

Exit mobile version