If you fill out the "Forgot Password" form but don't get an email to reset your password within 5-10 minutes, please email logistics@ire.org for assistance.
$0.00
Sources who help expose corruption or misconduct sometimes violate the law by taking evidence that is not their property. But what about the source who is breaking the law in real-time or who tells a journalist about the crimes that she plans to commit? What can a journalist do to protect a source who is keeping classified information on a home computer - and the journalist will shortly publish a story that will focus law enforcement attention directly on the source? What if the crime goes beyond just spiriting documents out of the office and involves more serious offenses – and the journalist know about it? Other real-life episodes to be considered include: Dealing with sources who proffer classified information, sources who secretly (but unlawfully) record telephone calls or intercept other communications, the risks involved when a source is also a computer hacker, and little-known tools that can be used to protect anonymous sources. This session will focus on how the law treats these cases and what can be done by journalists to protect themselves and their sources from criminal exposure - and still get the story.
Looks like you haven't made a choice yet.