🛡️ Our Commitment to Source Protection
At Israel.com, we recognize that anonymous sources are sometimes essential to uncovering important stories, particularly in the complex political and security environment of the Middle East. Our unnamed sources policy balances the need for transparency with the protection of individuals who risk their safety, careers, or freedom to provide information in the public interest.
This policy outlines our rigorous standards for using anonymous sources, our verification processes, and our unwavering commitment to protecting those who trust us with sensitive information.
Core Principle
"We will protect our sources with the same intensity that we pursue the truth. The safety and confidentiality of those who provide information in the public interest is our paramount concern."
📋 When We Use Unnamed Sources
Justified Circumstances
- Government Accountability: When officials provide information about government actions, policies, or misconduct
- Security Matters: Information related to national security, intelligence operations, or military activities
- Whistleblowing: When sources expose wrongdoing, corruption, or violations of public trust
- Safety Concerns: When naming a source would put them at risk of harm, retaliation, or persecution
- Professional Consequences: When disclosure would result in job loss, career damage, or legal jeopardy
- Ongoing Investigations: Information about active legal or law enforcement proceedings
High Bar for Anonymity
- Last Resort: Anonymous sourcing is used only when on-the-record information is unavailable
- Significant Public Interest: The information must serve a clear public interest purpose
- Credible and Verifiable: Sources must have direct knowledge and information must be verifiable
- Multiple Confirmation: Key facts require confirmation from at least two independent sources
- Editorial Approval: All anonymous source usage requires approval from senior editorial staff
What We Don't Accept
We do not grant anonymity for routine information, personal attacks, speculation, or information that serves private rather than public interests. Sources seeking anonymity must provide substantial justification.
🔍 Verification Standards
Source Vetting Process
- Identity Verification: We verify the real identity of all anonymous sources to editorial management
- Access Assessment: We confirm sources have legitimate access to the information they provide
- Motivation Review: We understand and evaluate sources' motivations for providing information
- Track Record: We assess the reliability of sources based on past interactions and information quality
- Documentation: We require supporting documentation or evidence whenever possible
Information Verification
- Independent Confirmation: All significant claims require independent verification from separate sources
- Document Authentication: Any documents provided are verified for authenticity
- Cross-Reference Checking: Information is cross-referenced with public records and known facts
- Expert Consultation: Complex technical or specialized information is reviewed by relevant experts
- Fact-Checking: All claims undergo rigorous fact-checking before publication
🔒 Protection Measures
Technical Security
- Encrypted Communication: All sensitive communications use end-to-end encryption
- Secure Devices: Dedicated, secured devices for source communications when necessary
- Anonymous Contact Methods: Secure drop boxes and anonymous communication channels
- Data Protection: Source information stored on encrypted, air-gapped systems
- Access Controls: Strict access controls limiting who can view source information
Operational Security
- Meeting Protocols: Secure meeting locations and communication methods
- Information Compartmentalization: Source identities known only to essential personnel
- Document Handling: Secure handling and storage of physical evidence
- Digital Forensics: Removal of metadata and identifying information from documents
- Counter-Surveillance: Awareness and mitigation of potential surveillance risks
Secure Source Contact
Secure Email: sources@israel.com (PGP encrypted)
Secure Drop: [Tor-based secure upload system]
Signal: +972-XX-XXX-XXXX (verified account)
Physical Drop: Secure drop box locations available upon request
Legal Questions: legal@israel.com
Editor-in-Chief: editor@israel.com
All communications are protected under journalist privilege laws
























