Managing Human Sources for Your Investigations

Start building your own contacts, learn how to develop, interact with and maintain sources and how to enrich your investigations with their cooperation.



  • Breaking ice (10 minutes) and introduction (15 minutes).

  • Identifying and reaching out to sources 35 minutes


  • Approaching tools and methods 1h (might be ran independently)

  • Risk assessment (30’).

  • Building trust and establishing boundaries (self-care) (30’).



  • 15 minutes quiz about sources what they are; how to deal with them, how to set boundaries.


4 hours training


Number of participants 3-15



  • Understanding what a source is and where to find it.

  • Understand and asses risks during your interaction overtime and how bias might affect in different stages.


  • Being on the lookout for potential sources.

  • How to maintain a database and a long lasting, healthy and safe interaction with sources.

  • Risk assessment: Checks and balances. (should refer to the same content in interviews [*see DISCUSSION. Identifying risks and mitigating them] this will only ran independently when the workshop is taught on its own).

  • Self-care

NOTE that the information we cover in the Interviews track of this training package (Plan 1), on types of human sources, how to identify them, conduct background research, establish their biases and trustworthiness, reach out to them, communicate safely, etc, applies as much to long-term sources as it does to one-off interviewees, therefor we will be using the same exercises making clear the difference between those human sources we will interview and those we will be interested in establishing a longer relationship with.

0- Breaking ice and introduction

- Identifying and reaching out to sources

the first part of the training repeats the content that we use for interviews

When addressing this part of the training is important that trainer/s think in longer term interactions and that adapt/s the samples not to an investigation but to a field of investigation and the sources that the investigators will be dealing with and that might be able to help them or provide tips over time.

5 minutes break

1- Safety First!

Ask the participants to explain how they nurture their professional relationships and what do they think that they can apply to the relationship they establish with sources (10 minutes):

Some of these could and should be mentioned:

  • Keeping contact: law of the three calls. Check-ups for non-research purposes.

  • Informal meetings

  • Invitations to a work related event they might be interested in (consider if you care of being seen hanging out with that particular source (risk assessment).

  • Trust. Give and receive trust protecting your sources. Sharing previous work may be helpful in order to gain trust from your sources.

The trainer/s should make clear that building trust and establishing and maintaining boundaries is essential when dealing with long term sources.

Ask participants to share experiences or indicate/guess what challenges may occur (10 minutes).

Problems that may occur:

  • Mutual trust disappears

  • Sources stepping into the personal

  • Power balance

  • Blackmailing (emotional or other type)

Discuss them and propose ways to mitigate it writing two columns for Problems and Mitigation/Solutions (10 minutes).

The trainer/s may suggest to elaborate a set of healthy practices:

  • Gender related. Unwanted advances of a source /// Use a work phone and a personal phone to keep things separated/ bring a colleague along for your next encounter

2- Creating a database of sources: 50 minutes

20 minutes

Working teams take the sources they have identified at the beginning and order them meaningfully creating a sheet (or several) with the information they think they need to consider/gather about the source.

How do the database look like?

Share input and project or write in a board the contact sheets. (25 minutes)

Highlight diverse angles to gather the info meaningfully:

  • topic-specific contact list of environmentalists, lawyers, political activists, human rights researchers, officials, etc.

  • names and occupations

  • organizations

  • Countries

Cross reference is often useful. Remember (Safety recommendations for storage devices, encrypted comms, anonymizing/codifying identity and contacts for sensitive sources and those at risk… etc).

Tools (open source) and links that we can recommend.

3. WRAP up

15 minutes quiz about sources what they are; how to deal with them, how to set boundaries…. Etc.

More about this topic

Interviews - The Human Element of Your Investigation: Preparing and conducting investigative intervi...

Gain the techniques, skills and good practices you need to safely identify, interview and maintain...

Interviews Requiring Special Approaches: Interviewing in unfamiliar or hostile locations and intervi...

Gain skills to approach and interview safely sources in unknown or hostile places or with subjects t...