Some of the most impactful stories in journalism begin with a single tip from an insider, a whistleblower, or a concerned citizen. These tips can expose corporate malfeasance, government overreach, or technological threats that the public has a right to know about. If you have encountered something that should be brought to light, knowing how to contact a news organization safely and effectively is paramount. This guide explains the best methods for submitting tips via email and the encrypted messaging app Signal, along with important security considerations for sources who may be at risk of reprisals.
Why Tips Matter in Investigative Journalism
Tips form the backbone of many breaking news stories. They often provide the initial spark that leads reporters to dig deeper, request documents, and interview witnesses. Without tips, countless stories about data privacy violations, unsafe products, and regulatory failures might never see the light of day. The relationship between a source and a journalist is built on trust and discretion. A newsroom’s ability to protect its sources is not just an ethical obligation—it is a legal and practical necessity. Over the years, high‑profile leaks have demonstrated how vital secure channels are for sources who face potential firing, lawsuits, or even physical danger.
When you decide to share information, you are taking a risk. The news organization has a responsibility to minimize that risk. That is why many publications have adopted best practices recommended by organizations like the Freedom of the Press Foundation. These include using encrypted communication tools, avoiding third‑party trackers on tip‑related pages, and advising sources on how to shield their digital footprint. Understanding these measures before you reach out can make a significant difference in your safety.
What Makes a Good Tip?
Not all tips lead to stories. The most useful tips are those that come with evidence: firsthand accounts, internal documents, emails, photographs, or any material that can be independently verified. A hunch or rumor is less valuable than a concrete piece of information. Editors and reporters will assess the credibility of the tip and the risk to the source before proceeding. If you have documents that support your claim, consider how you can share them securely. The stronger the evidence, the more likely the story will be pursued.
Also, think about the public interest angle. Why should the public know about this? Does it affect people’s health, safety, finances, or rights? A well‑framed tip that connects to a broader issue is more likely to be investigated. Be as specific as possible without endangering your identity. You don’t need to give away everything at once—just enough to demonstrate that you have something real.
Email: The Most Direct Method
Email is the simplest way to reach a newsroom. Most organizations have a dedicated tips address. For instance, the general tips inbox is often something like tips@[publication].com. When using email, you should take several precautions if you are worried about being identified.
First, never use your work email account, your employer’s Wi‑Fi network, or any device that belongs to your company. Your employer may have monitoring software that logs emails, keystrokes, and internet activity. Instead, create a new, anonymous email account using a service that emphasizes privacy, such as ProtonMail or Tutanota. These services encrypt emails end‑to‑end by default and do not require personal information to sign up. Use a pseudonym and choose a strong password. If possible, access that email only through a VPN or the Tor browser to mask your IP address.
When composing your message, avoid including any identifying details unless absolutely necessary. Attach files only if they are essential and be cautious about metadata. Photographs and documents can contain hidden data like location coordinates, device serial numbers, or the author’s name. Remove such metadata using tools like ExifTool or by converting files to clean formats. Also, consider encrypting the attachments themselves with a password, then sharing the password through a separate channel (like Signal) to the same journalist.
If a newsroom has multiple reporters covering different beats, you may want to find the specific journalist who handles your topic. Most publications list their staff with contact information on an “About” or “Masthead” page. You can send a brief, initial email to that reporter to establish a secure line of communication. Even if you start with a generic tips address, your message will be forwarded to the appropriate editor.
Email Security Checklist
- Use a private, encrypted email service (e.g., ProtonMail, Tutanota).
- Never use work email, Wi‑Fi, or devices.
- Create a pseudonymous account without real name or phone number.
- Access email via VPN or Tor.
- Remove metadata from attachments before sending.
- If possible, encrypt sensitive documents and share passwords separately.
Signal: The Gold Standard for Encrypted Communication
Signal is widely regarded as the most secure messaging app available to the public. It uses end‑to‑end encryption for text messages, voice calls, and video calls, meaning that even Signal’s own servers cannot read the contents of your conversations. Signal stores only your phone number and the last time you accessed the app; it does not retain metadata about who you communicate with or for how long. For sources who need the highest level of security, Signal is an excellent choice.
To use Signal for tipping, follow these steps:
Download the Signal app from the official website or your device’s app store. Signal is free and open‑source. During installation, you will be asked to provide a phone number for verification. It is critical that you do not use your personal or work phone number if you want to remain anonymous. Instead, purchase a prepaid SIM card with cash. Use that number solely for Signal and discard the SIM card after you have established contact. Alternatively, some services provide virtual phone numbers that can receive SMS verification codes without revealing your identity. However, prepaid SIMs are often the simplest and safest route.
Once you have a Signal account, add the journalist’s phone number to your contacts. The journalist’s number should be obtained from a trusted source, such as the publication’s staff list or a public social media account verified by the organization. After adding the number, you can start a conversation. Signal will send a message to the journalist notifying them that you have contacted them, but it will not reveal any of your information beyond your (anonymized) phone number. You can then delete the contact from your phone to further reduce the digital trail.
The Freedom of the Press Foundation offers additional guidance on locking down Signal settings. For example, you can enable disappearing messages so that chats are automatically deleted after a set period. You can also disable read receipts and typing indicators to reduce leakage of your activity. If you need to share files, Signal supports encrypted file transfer. Always verify the safety number of the journalist out‑of‑band (e.g., by reading it over a phone call) if you are concerned about man‑in‑the‑middle attacks.
Signal Security Best Practices
- Use a prepaid SIM card or a virtual number for registration.
- Never register Signal with your personal or work phone.
- Add the journalist’s number only after verifying it from a trusted source.
- Enable disappearing messages (e.g., 1 week or less).
- Disable read receipts and typing indicators.
- Verify safety numbers via an independent channel.
- Delete contacts after the conversation is initiated.
Additional Secure Methods
While email and Signal are the most commonly recommended, there are other ways to reach journalists securely. Some publications accept tips through encrypted submission forms on their websites—these forms are typically hosted on a separate secure server without third‑party analytics. Another option is the SecureDrop system, which is an open‑source platform designed specifically for whistleblowers. SecureDrop allows sources to submit documents and messages anonymously using the Tor browser. Not every newsroom uses SecureDrop, but it is gaining adoption in major outlets.
If you are in a jurisdiction with heavy surveillance, consider using a combination of tools: Tor for browsing, a VPN for additional obfuscation, and an encrypted email client. Always assume that any unencrypted communication can be intercepted. Also, be aware of physical surveillance: if you print documents at home or in a public library, there may be logs. Simple steps like using a different operating system (Tails, for example) can greatly reduce digital traces.
Some journalists also share their phone numbers and encrypted email addresses on their social media profiles. If you find a reporter who covers your area of interest, you can reach out directly. However, always verify that the account is legitimate—impersonation is a risk. Cross‑reference the contact details with the publication’s official website.
The Commitment to Source Protection
News organizations that take tip submissions seriously will often go to great lengths to protect those who come forward. This includes not only using encrypted channels but also training staff on security protocols. For example, the page that contains the tips submission guidelines is often served over HTTPS without third‑party analytics, ad trackers, or social media widgets—precautions that prevent external services from logging visitors. When you visit such a page, your activity remains between you and the newsroom.
It is also common for editors to advise sources against using corporate or government devices. If you are an employee of a large company, your IT department may have the ability to monitor network traffic and even read certain emails. Assume that nothing is private on a work computer. Similarly, if you are a government employee, the risks are even higher due to strict surveillance laws. In such cases, using a personal device, a friend’s device, or a public computer (with caution) may be safer.
Finally, remember that you are not alone. Many sources have stepped forward before you, and their contributions have led to positive change. By following the guidelines outlined here, you can help ensure that your information reaches the public while keeping yourself as safe as possible. The journalists you contact have a professional and moral obligation to protect your identity. They will work with you to find the safest way to communicate and to verify the material you provide.
If you have a story that deserves to be told, take the time to set up a secure channel. The small investment in security can make a profound difference in the impact of your tip. Start with email or Signal, follow the best practices, and know that your courage is the foundation of accountable journalism.
Source: The Verge News