Nieman Watchdog

Browse Archives

By Date

Two E-books about Investigative Journalism in the U.S. and Around the World

By Watchdog October 16, 2013

"Muckraking Goes Global: The Future of Cross-Border Investigative Journalism" examines the achievements and challenges of investigative journalists reporting stories on subjects of global interest and impact. Journalists from Latin America, Romania, and the U.S. contributed. Published in Spanish and English on the occasion of three major investigative journalism conferences held in Rio de Janeiro, Brazil, in the fall of 2013, the e-book includes original content as well as articles published in the Spring 2013 issue of Nieman Reports. .epub | .mobi | .pdf "Investigative Reporting: Perils and Promise" focuses on post-Communist realities for journalists, government pushback on press freedoms, and strategies for moving forward. With contributions by journalists from Europe, Latin America, Russia, and South Africa, the e-book is a compilation of articles published in the Spring 2011 issue of Nieman Reports and in Kiev, Ukraine, in concert with a global investigative journalism conference held in the fall of 2011. .epub | .mobi | .pdf Read more

How to Keep Sources Secure from Surveillance

By Watchdog September 18, 2013

In an encrypted Q&A with The New York Times Magazine, National Security Agency leaker Edward Snowden warned that journalists have been slow to properly respond to the threat of government surveillance. "I was surprised to realize that there were people in news organizations who didn’t recognize any unencrypted message sent over the Internet is being delivered to every intelligence service in the world," he wrote to Peter Maass about his initial attempts to communicate with Guardian reporter Glenn Greenwald. "In the wake of this year’s disclosures, it should be clear that unencrypted journalist-source communication is unforgivably reckless." Revelations over the last few months have made it clear that the U.S. government is willing and able to use telephone and Internet records to pursue sources who leak secrets to the media, and to do so by targeting reporters, if necessary. Read more