The IRE website will be unavailable while we complete routine maintenance on Friday, November 19 from 8-10 am CT.
IRE favicon

Shop

Resource ID: #4855
Subject: 
Source: 
Affiliation: 
Date: 2016

$0.00

Description

Sources who help expose corruption or misconduct sometimes violate the law by taking evidence that is not their property. But what about the source who is breaking the law in real-time or who tells a journalist about the crimes that she plans to commit? What can a journalist do to protect a source who is keeping classified information on a home computer - and the journalist will shortly publish a story that will focus law enforcement attention directly on the source? What if the crime goes beyond just spiriting documents out of the office and involves more serious offenses – and the journalist know about it? Other real-life episodes to be considered include: Dealing with sources who proffer classified information, sources who secretly (but unlawfully) record telephone calls or intercept other communications, the risks involved when a source is also a computer hacker, and little-known tools that can be used to protect anonymous sources. This tipsheetwill focus on how the law treats these cases and what can be done by journalists to protect themselves and their sources from criminal exposure - and still get the story.

141 Neff Annex   |   Missouri School of Journalism Columbia, MO 65211   |   573-882-2042   |   info@ire.org   |   Privacy Policy
apartmentpenciluserscalendar-fullcrossmenu linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram