The Journalist Threat Model
Journalists face the highest threat level of any civilian profession. Your adversaries may include:
- Government intelligence agencies (domestic and foreign)
- Law enforcement seeking to identify sources
- Corporations you're investigating
- Hacktivists and cybercriminals targeting media organizations
- State-sponsored hackers (Pegasus spyware, etc.)
Your security stack must match this threat level.
The Journalist Security Stack
Tier 1: Essential (Everyone)
- VPN: Mullvad or Proton VPN (not NordVPN — you need open-source, audited, privacy-maximum)
- Encrypted messaging: Signal (only Signal — not WhatsApp, not Telegram regular chats)
- Encrypted email: ProtonMail for source communication
- Password manager: Bitwarden or 1Password with hardware key 2FA
- Full-disk encryption: BitLocker/FileVault enabled
- 2FA: Hardware security keys (YubiKey) on email, cloud, and social media
Tier 2: Investigating Sensitive Topics
- Tor Browser: For research that shouldn't be linked to your identity
- Tails OS: Amnesic operating system that leaves no trace (boot from USB)
- SecureDrop: For receiving anonymous tips (if your organization runs one)
- Separate devices: Dedicated reporting device, not your personal phone
- VPN + Tor: Connect VPN first, then Tor for maximum anonymity
Tier 3: Hostile Environment
- Travel device: Dedicated device with minimal data for entering hostile countries
- Satellite communication: Satellite phone for areas with no or compromised cellular
- Physical security: Threat assessment before travel, emergency contacts, check-in protocols
VPN Selection for Journalists
Don't use: NordVPN, Surfshark, ExpressVPN — these are consumer VPNs optimized for speed and streaming. They're fine for most people but journalists need maximum privacy guarantees.
Use instead:
- Mullvad — No email, no name, cash payments, proven no-logs (police seizure found nothing), open-source
- Proton VPN — Swiss jurisdiction, open-source, Secure Core routing, transparency reports
Source Protection Rules
- Never communicate with sources on regular phone/email — Signal only
- Never store source identities on connected devices — airgapped notes or mental only
- Use Tor for researching topics linked to your sources
- Assume your phone is compromised — Pegasus-style spyware exists
- Verify Signal safety numbers in person with sources
- Use disappearing messages in Signal for sensitive conversations
Related Guides
10 Secure Browsing Habits Every Remote Worker Should Build (2026)
Simple daily habits that dramatically reduce your risk. HTTPS checking, URL verification, download safety, and more.
Sarah ChenSecure Job Searching: Protect Your Privacy While Looking for Work (2026)
Job searching exposes your personal data to recruiters, job boards, and potential scammers. How to search safely while protecting your identity.
Sarah ChenVPN for Accountants & CPAs: Protect Financial Client Data (2026)
Accountants handle the most sensitive financial data. VPN setup for tax season security, client portal access, and IRS compliance.
Sarah ChenWas this guide helpful?
Advertisement
Ready to Get Protected?
Take the next step in securing your remote work setup.
Sources & Citations
- 1Committee to Protect Journalists (CPJ): Digital Safety Kit
- 2EFF: Surveillance Self-Defense for Journalists
- 3Reporters Without Borders: Digital Security Resources