Some of the most important stories in journalism begin with a tip from a source who has firsthand knowledge or access to revealing documents. For anyone with information that the public should know about, understanding how to submit that information safely and effectively is crucial. This guide outlines the recommended methods for tipping a news organization, with a focus on email and the encrypted messaging app Signal, as well as best practices for protecting your identity and maximizing the impact of your tip.
What Makes a Good Tip?
A strong tip is more than just a hunch. Ideally, it includes concrete evidence such as documents, screenshots, audio recordings, or other materials that can be independently verified. Firsthand experience is especially valuable because it provides a direct account of events or practices. For example, a current or former employee of a company might have internal emails that reveal misleading marketing claims. A government contractor might possess procurement records that show wasteful spending. Even personal testimony, when corroborated with supporting evidence, can form the basis of a thorough investigation. Remember that journalists receive many tips; the ones that stand out are those that are specific, credible, and accompanied by verifiable sources.
Email: The Easiest Way to Reach Us
Email remains the most straightforward method for sending a tip. Most news organizations maintain a dedicated tips address, often something like tips@example.com. When using email, consider the following security practices:
- Protect Your Identity: If you are at risk of reprisals, do not use your work email, Wi-Fi, or device. Instead, create a new, anonymous email account from a public computer or through a VPN. Use a service like ProtonMail or Tutanota that offers end-to-end encryption and does not require personal information during signup.
- Avoid Metadata Leakage: Standard email services often log IP addresses, timestamps, and account information. Use Tor or a VPN to mask your location. Additionally, strip metadata from any attachments before sending.
- Encrypt Sensitive Content: If you have very sensitive information, consider using a tool like Pretty Good Privacy (PGP) to encrypt the email body and attachments. The news outlet should provide its public PGP key if it supports this method.
For most initial contact, however, a simple email with a concise explanation of your tip and an offer to provide further evidence is sufficient. You can include the most important documents as encrypted attachments if needed. The key is to make the email easy for an editor to quickly understand the significance of your information.
Signal: Strong Encryption for Communications
Signal is a free, open-source messaging app that provides end-to-end encryption for text messages, voice calls, and video calls. It has become a standard tool for journalists and sources because of its strong security features. Signal stores only your phone number and the last time you accessed the app, but it does not record who you communicate with or the content of your messages. This makes it significantly more private than standard SMS or many other messaging apps.
How to Use Signal for Tipping
To send a tip via Signal, follow these steps:
- Download Signal from the official website or app store. It is available for iOS and Android, as well as desktop versions.
- Do not use your work phone. Use a separate device if possible, or at least a personal phone that is not tied to your employer. Consider using a burner phone if the risk is high.
- Find the journalist's Signal number. Many reporters list their Signal contact information on their author pages or in public directories. Add that number as a contact on your phone before starting a conversation. (You can delete the contact after the conversation begins to reduce digital traces.)
- Enable disappearing messages for an extra layer of security. You can set messages to disappear after a set period (e.g., 1 hour, 1 day, 1 week). This protects both you and the journalist if the phone is ever compromised.
- Be aware of safety numbers. Signal uses safety numbers to verify the identity of your contact. If possible, verify the safety number out of band (using a different channel) to ensure you are communicating with the intended recipient and not an impersonator.
The Freedom of the Press Foundation offers detailed guidelines for locking down security on Signal, including how to enable screen security (to prevent screenshots from being captured by other apps) and how to set a strong passphrase.
Why Security Matters
Whistleblowers and tipsters often face serious risks, including legal retaliation, job loss, harassment, or even physical danger. The act of leaking information to the press has a long history, from the Pentagon Papers to the Panama Papers, and in many cases, the sources have been prosecuted. Modern surveillance capabilities mean that metadata alone—who you contacted, when, and from where—can be incriminating. Therefore, taking reasonable security precautions is not just recommended; it is often essential. By using encrypted channels like Signal and by being mindful of operational security (OpSec), you significantly reduce the chance of being identified.
What Happens After You Send a Tip?
After you submit a tip, the news organization will typically review it. Editors and reporters will assess the evidence, verify its authenticity, and determine if the story meets journalistic standards. They may contact you for follow-up questions or additional documents. It is important to establish a secure way to communicate further. If you used an anonymous email, check it regularly. If you used Signal, keep the app installed and notifications managed carefully. Some outlets also offer encrypted submission systems like SecureDrop, which provides strong anonymity by routing communications through the Tor network.
Not every tip becomes a story. However, even if your tip is not pursued immediately, it may be filed for future reference or shared with another journalist who specializes in that area. Journalists appreciate any information that helps them understand complex subjects, and your contribution might eventually lead to an important investigation.
Historical Context: How Tipping Has Evolved
The practice of tipping journalists dates back centuries, but the methods have changed dramatically. In the pre-digital era, sources would call newsrooms, mail physical documents, or meet in person. The rise of the internet brought email, which quickly became the default. Over the past decade, however, concerns about surveillance and data retention have led to the adoption of encrypted tools. The Edward Snowden revelations in 2013 were a turning point, as they highlighted the ease with which governments and corporations can monitor communications. Since then, many news organizations have invested in secure tip lines, published encryption keys, and trained their staff on digital security. Signal, SecureDrop, and encrypted email services have become standard offerings.
High-profile leaks such as the ones that led to the Offshore Leaks, the Football Leaks, and the Uber Files all relied on sources using secure communication channels. These stories have had tangible impacts, resulting in policy changes, criminal investigations, and public accountability. The methods used by those sources—often involving encrypted messaging, code words, and strict OpSec—are now taught in journalism schools and security workshops worldwide.
Additional Tips for Source Protection
If you decide to share information with a journalist, consider the following additional measures:
- Use Tor or a VPN: When accessing anything online related to your tip, use the Tor browser or a reputable VPN to hide your IP address and location.
- Create separate accounts: If you need to use email or other services, create accounts specifically for this purpose, and do not reuse passwords or personal details.
- Check for malware: Ensure your devices are clean of spyware or tracking software. Consider using a live operating system (like Tails) that leaves no trace on the computer you are using.
- Be careful with phone numbers: Even with Signal, your phone number is known to the app provider (though not the content of messages). If you want stronger anonymity, use a burner phone number or a virtual number that cannot be traced to you.
- Limit the information you share: Only provide the minimum necessary to establish credibility and share the core evidence. You can always disclose more later under controlled circumstances.
Journalists are trained to respect the confidentiality of their sources, but it is ultimately your responsibility to protect yourself. A good news organization will have clear policies on source protection and will work with you to ensure your safety.
Understanding Encryption Basics
Encryption is the process of encoding information so that only authorized parties can read it. End-to-end encryption means that messages are encrypted on your device and decrypted only on the recipient's device, so even the service provider cannot read them. Signal is the gold standard for end-to-end encryption because its protocol is open-source, independently audited, and widely respected. In contrast, standard email (SMTP) is not encrypted by default; messages are stored in plaintext on servers and can be intercepted. This is why for truly sensitive tips, email alone is insufficient unless you use PGP encryption—a method that many find complicated to set up correctly. Signal offers a simpler, more user-friendly encrypted experience.
Other tools like WhatsApp also use end-to-end encryption, but they are owned by Facebook (now Meta), which has a track record of privacy controversies. Signal is widely recommended by security experts because of its nonprofit status, minimal data collection, and commitment to privacy. When a major news organization asks for tips via Signal, it is because they want to provide the highest level of security possible for their sources.
The Importance of Evidence
As mentioned, evidence is the backbone of any good tip. Journalists need to be able to verify the information before publishing. If you have documents, try to provide them in a way that maintains their integrity—for example, sharing a scan rather than a transcription. However, be cautious about metadata embedded in digital files (e.g., authorship, GPS coordinates, editing history). Use tools like ExifTool to strip metadata, or convert documents to plain text. If you have audio or video recordings, ensure they are authentic and unedited. Journalists may ask for a chain of custody to confirm that the evidence has not been tampered with.
If you are not in possession of documents but have direct knowledge, be prepared to provide a detailed account, including specific names, dates, and locations. The journalist may ask follow-up questions to test consistency. Your willingness to corroborate your story with other sources or to go on the record—perhaps anonymously—can strengthen the case for publication.
Final Words of Caution
Submitting a tip is a brave act that can serve the public good. However, it comes with responsibilities and risks. Always consider the potential consequences for yourself and others involved. If your tip involves sensitive personal data, think about the privacy of individuals who may be mentioned. Journalists operate under ethical guidelines that aim to minimize harm, but they also have a duty to report on matters of public interest. Open a dialogue with the journalist about how the information will be used and what protections can be put in place.
Remember that secure communication is a two-way street. The news organization should also demonstrate strong security practices, such as using HTTPS on their website (as recommended by the Freedom of the Press Foundation) and not embedding third-party trackers on sensitive pages. You have a right to ask about their security protocols before sharing anything.
By following the methods outlined here—using email with caution, adopting Signal for encrypted conversations, and taking additional OpSec steps—you can help ensure that your tip reaches the journalists who can act on it, while minimizing the risk to yourself. Many powerful stories have been born from a single, well-delivered tip. Yours could be next.
Source: The Verge News