Cart 0 $0.00
IRE favicon


Resource ID: #934
Subject: 156
Source: David Schertler, Karen Williams, Mark MacDougall, Michael Isikoff - 2199David Schertler, Karen Williams, Mark MacDougall, Michael Isikoff
Affiliation: Akin Gump Strauss Hauer & Feld LLP, Yahoo NewsAkin Gump Strauss Hauer & Feld LLP, Yahoo News
Date: 1905-07-08



Sources who help expose corruption or misconduct sometimes violate the law by taking evidence that is not their property. But what about the source who is breaking the law in real-time or who tells a journalist about the crimes that she plans to commit? What can a journalist do to protect a source who is keeping classified information on a home computer - and the journalist will shortly publish a story that will focus law enforcement attention directly on the source? What if the crime goes beyond just spiriting documents out of the office and involves more serious offenses – and the journalist know about it? Other real-life episodes to be considered include: Dealing with sources who proffer classified information, sources who secretly (but unlawfully) record telephone calls or intercept other communications, the risks involved when a source is also a computer hacker, and little-known tools that can be used to protect anonymous sources. This session will focus on how the law treats these cases and what can be done by journalists to protect themselves and their sources from criminal exposure - and still get the story.

109 Lee Hills Hall, Missouri School of Journalism   |   221 S. Eighth St., Columbia, MO 65201   |   573-882-2042   |   |   Privacy Policy
apartmentpenciluserscalendar-fullcrossmenu linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram
My cart
Your cart is empty.

Looks like you haven't made a choice yet.