How to Authenticate Large Datasets
Hacked and leaked datasets are more common than ever. Here are some ways to verify they’re real.
Hacked and leaked datasets are more common than ever. Here are some ways to verify they’re real.
Merrick Garland’s latest policy includes plenty of vague language that could still make it relatively easy for prosecutors to go after reporters’ sources.
A sweeping bill blocking prosecutors from targeting journalists for their sources or seizing their data already passed the House and is within striking distance in the Senate.
Whether to pardon January 6 convicts will be the most revealing question of the Republican primary.
The antiquated measure is an abuse of the legal system, but the Justice Department has no incentive to stop using it.
A new book highlights the power multinational corporations have — and how they strong-arm nations into submission.
The Trump administration used the controversial law to target media outlets and sources who provided important information to the public.
In a 2016 meeting, Britain's deputy minister of foreign affairs removed the diplomatic mask.
Jeremy Scahill, Murtaza Hussain, and Vanessa Gezari analyze the leaked top-secret Pentagon documents and the Air National Guardsman alleged to have taken them.
James Risen tells the story of when a trusted intermediary lawyer betrayed him and collaborated with the FBI to stop his reporting.
This is not a paywall.
By signing up, I agree to receive emails from The Intercept and to the Privacy Policy and Terms of Use.