How to Build and Protect Your Source Network as an Investigative Journalist
Your sources are your most valuable asset as a journalist. Building and maintaining a trusted source network takes years — but protecting it is a daily practice. Here's how experienced investigative reporters do it.
Every Source is a Relationship, Not a Transaction
The biggest mistake new investigative reporters make is treating sources as one-time information dispensers. The reporters with the best Rolodexes are the ones who maintained relationships for years before those relationships produced headline stories. Check in. Send relevant news. Acknowledge their expertise publicly when you can. Build trust before you need something.
Understand and Honor Sensitivity Levels
Not all sources are the same. Public officials making on-the-record statements are very different from whistleblowers risking their careers to reach you. Before any conversation, establish ground rules: on the record, on background, off the record, or deep background. Know what each means — and honor it, always.
On the record: Can be quoted by name.
On background: Can be used but not attributed by name.
Off the record: Information only, not for publication.
Deep background: For your understanding only, helps you know where to look.
Document Every Interaction
Memory is fallible and notes get lost. Keep a running log of every interaction with every significant source: when you spoke, what they told you, what they were willing to go on record about, and what follow-ups you promised. This documentation protects you legally, helps you identify patterns, and ensures you don't lose track of crucial leads.
A source CRM — even a simple one — is essential infrastructure for any serious investigative journalist. You shouldn't be tracking your sources in a spreadsheet or relying on email threads.
Digital Security is Non-Negotiable
In 2026, assuming your digital communications are private is naive. Governments, corporations, and sophisticated actors actively target journalists and their sources. Use Signal for sensitive conversations. Use end-to-end encrypted email when possible. Be aware that metadata — who you called, when, for how long — can be as revealing as content.
Your source management system should be access-controlled and kept off shared drives. Sensitivity levels assigned to sources should inform how you communicate with them.
The Expert Source Network
Beyond whistleblowers and insiders, build a network of subject matter experts who can help you evaluate evidence and understand complex domains. Accountants who can read balance sheets. Scientists who can interpret data. Former federal prosecutors who can assess legal documents. These sources help you avoid getting fooled — and help you understand what you've actually uncovered.
When a Source Comes to You
When someone reaches out — especially anonymously — slow down. Verify their credibility before acting on anything they tell you. Check their story against public records. Have them provide documents. Ask why they're telling you this. Experienced reporters know that the most exciting tips sometimes come from people with agendas. That's fine — just account for it.
Manage Your Sources the Right Way
Presswork.ai's Source CRM lets you track contacts, interactions, sensitivity levels, and AI-suggested follow-ups — all in one secure place.
Start Your Free Trial