🛡️ Our Commitment to Source Protection
At Israel.com, we recognize that anonymous sources are sometimes essential to uncovering important stories, particularly in the complex political and security environment of the Middle East. Our unnamed sources policy balances the need for transparency with the protection of individuals who risk their safety, careers, or freedom to provide information in the public interest.
This policy outlines our rigorous standards for using anonymous sources, our verification processes, and our unwavering commitment to protecting those who trust us with sensitive information.
Core Principle
"We will protect our sources with the same intensity that we pursue the truth. The safety and confidentiality of those who provide information in the public interest is our paramount concern."
📋 When We Use Unnamed Sources
Justified Circumstances
- Government Accountability: When officials provide information about government actions, policies, or misconduct
- Security Matters: Information related to national security, intelligence operations, or military activities
- Whistleblowing: When sources expose wrongdoing, corruption, or violations of public trust
- Safety Concerns: When naming a source would put them at risk of harm, retaliation, or persecution
- Professional Consequences: When disclosure would result in job loss, career damage, or legal jeopardy
- Ongoing Investigations: Information about active legal or law enforcement proceedings
High Bar for Anonymity
- Last Resort: Anonymous sourcing is used only when on-the-record information is unavailable
- Significant Public Interest: The information must serve a clear public interest purpose
- Credible and Verifiable: Sources must have direct knowledge and information must be verifiable
- Multiple Confirmation: Key facts require confirmation from at least two independent sources
- Editorial Approval: All anonymous source usage requires approval from senior editorial staff
What We Don't Accept
We do not grant anonymity for routine information, personal attacks, speculation, or information that serves private rather than public interests. Sources seeking anonymity must provide substantial justification.
🔍 Verification Standards
Source Vetting Process
- Identity Verification: We verify the real identity of all anonymous sources to editorial management
- Access Assessment: We confirm sources have legitimate access to the information they provide
- Motivation Review: We understand and evaluate sources' motivations for providing information
- Track Record: We assess the reliability of sources based on past interactions and information quality
- Documentation: We require supporting documentation or evidence whenever possible
Information Verification
- Independent Confirmation: All significant claims require independent verification from separate sources
- Document Authentication: Any documents provided are verified for authenticity
- Cross-Reference Checking: Information is cross-referenced with public records and known facts
- Expert Consultation: Complex technical or specialized information is reviewed by relevant experts
- Fact-Checking: All claims undergo rigorous fact-checking before publication
🔒 Protection Measures
Technical Security
- Encrypted Communication: All sensitive communications use end-to-end encryption
- Secure Devices: Dedicated, secured devices for source communications when necessary
- Anonymous Contact Methods: Secure drop boxes and anonymous communication channels
- Data Protection: Source information stored on encrypted, air-gapped systems
- Access Controls: Strict access controls limiting who can view source information
Operational Security
- Meeting Protocols: Secure meeting locations and communication methods
- Information Compartmentalization: Source identities known only to essential personnel
- Document Handling: Secure handling and storage of physical evidence
- Digital Forensics: Removal of metadata and identifying information from documents
- Counter-Surveillance: Awareness and mitigation of potential surveillance risks
⚙️ Editorial Process
Anonymous Source Approval Process
Initial Assessment
Reporter evaluates source credibility and information value
Editorial Consultation
Discussion with senior editor about anonymity justification
Verification
Independent confirmation and fact-checking process
Legal Review
Legal assessment of risks and protections
Final Approval
Editor-in-Chief authorization for publication
Editorial Oversight
- Senior Review: All anonymous source stories reviewed by Editor-in-Chief or Deputy Editor
- Legal Consultation: Legal review for stories with potential legal implications
- Ethics Review: Assessment of ethical implications and public interest value
- Risk Assessment: Evaluation of risks to sources, reporters, and publication
- Publication Decision: Final go/no-go decision by senior editorial leadership
⚖️ Legal Protections
Shield Law Compliance
- Journalist Privilege: Full utilization of available journalist shield law protections
- Confidentiality Agreements: Formal agreements ensuring source protection
- Legal Resistance: Vigorous legal resistance to attempts to compel source disclosure
- Court Challenges: Challenging subpoenas and court orders seeking source information
- International Law: Compliance with international standards for press freedom
Emergency Protocols
- Rapid Response: Immediate legal response to threats against sources or reporters
- Source Warning Systems: Protocols to warn sources of potential compromises
- Evidence Destruction: Secure destruction of identifying information when necessary
- Legal Support: Full legal support for sources facing consequences
- International Assistance: Coordination with international press freedom organizations
📝 Transparency and Attribution
Reader Disclosure
- Clear Attribution: Specific description of anonymous sources' position and access to information
- Reason for Anonymity: Clear explanation of why the source requested anonymity
- Verification Methods: Description of how information was verified without compromising sources
- Limitations: Acknowledgment of any limitations in the information provided
- Context: Background information to help readers evaluate the information's credibility
Attribution Standards
- Descriptive Terms: Use of meaningful descriptive terms (e.g., "senior government official," "intelligence source")
- Avoiding False Specificity: Not providing misleading details about source identity
- Multiple Source Stories: Clear differentiation between multiple anonymous sources
- Partial Attribution: Using partial attribution when possible to provide more context
- Updates and Corrections: Clear updates when new information becomes available
🎓 Training and Education
Staff Training Requirements
- Source Protection Training: Comprehensive training on technical and operational security
- Legal Education: Understanding of relevant laws and journalist protections
- Ethics Training: Regular updates on ethical standards and best practices
- Technology Training: Instruction on secure communication tools and methods
- Scenario Exercises: Regular drills and scenario-based training
Ongoing Education
- Industry Updates: Regular updates on industry best practices and legal changes
- Technology Evolution: Training on new security tools and threats
- Case Studies: Analysis of successful and problematic anonymous source situations
- Expert Consultation: Regular consultation with security and legal experts
- Policy Updates: Regular review and updating of policies based on experience
Secure Source Contact
Secure Email: sources@israel.com (PGP encrypted)
Secure Drop: [Tor-based secure upload system]
Signal: +972-XX-XXX-XXXX (verified account)
Physical Drop: Secure drop box locations available upon request
Legal Questions: legal@israel.com
Editor-in-Chief: editor@israel.com
All communications are protected under journalist privilege laws




















