Headlines
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General António Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

More Details

The Source of a Good Investigative Reporter Cannot be Revealed

My sources are my friends.They have a lot of trust in me and freely give me vital information. Since I always prefer to go undercover for my assignments, their knowledge of the darker side of society comes in handy.I treat my sources like friends.I talk to them a lot and try to solve their problems.I believe that a good investigative reporter cannot reveal his source.He prefers to go to jail rather than reveal their identity.A few years ago, one of my sources introduced me to a young lady.He introduced her as a call girl.

After that, we met regularly in and around Kolkata and she Revealed ‘trade secrets’ to me.She trusted me a lot and I always protected her identity.But now she has completely withdrawn from it.She has formed an NGO and is helping destitute children.As an investigative reporter, I first try to build up confidence and then persuade persons to talk on Camera.

But, despite my best efforts to build a cordial relationship with them, they occasionally get me into trouble.Here, I’d like to recall one incident in which I was forced to take action against one of my contacts.A few years ago, my source, a husky guy, came over to my office and struck up a conversation with me and pulled pranks—then he told me that he needed one of my mobile phones to capture some videos for me.

I handed over my mobile phone to him because I trusted him and he promised to return it after completing his job.But two-three days later, when he didn’t return it, I tried to contact him and discovered that his phone was switched off.I didn’t remember his home address.I was at my wits end.After ten-twelve days, I informed the police.Though it was not a strong case because I willingly gave it to him, I informed the police. After three months and several raids, a young officer from local Police Station, nabbed him from his hideout. I later learned that the man was involved in white-collar crime and that he had been arrested on several charges before.

Despite these type of setbacks, I continue to trust my sources and meet with them on a regular basis. I follow in the footsteps of Pete Shellem, a chain-smoking investigative reporter for the Patriot-News in Harrisburg, Pennsylvania, who meets sources in bars and knows most of the bartenders by name. When his immediate boss or anyone else from his newspaper needs to find him for a question on a storey, they know where to look.His tireless efforts resulted in the release of four innocent persons who had been incarcerated for long years. Hats off to his temperament.

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before purchasing or adopting a pet.
Read More

Fileless Malware

A type of malicious software known as “fileless malware” infects a computer by using reliable apps. As it doesn’t rely on files and leaves no trace, it is difficult to detect and remove.
Read More

Ragdoll Cats

Large and sturdy, ragdoll cats have a soft, semi-long coat and blue eyes originated in Maine, United States. Coat colors are gold, silver, white, and tortoiseshell.
Read More

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends a legitimate process, removes its original code, and replaces it with malicious code before the process resumes. Due to this, the virus can operate as a legitimate process and avoid being discovered by security programs.
Read More

Related Article

Indian President Election 2022

On July 18, India will elect a new president.4,800 MPs and MLAs will vote to choose India's 15th pre ...
July 18, 2022

Freedom of Speech is Not Absolute…

Though the freedom of speech and expression guaranteed by article 19(1)(a) of the Indian Constitutio ...
July 7, 2022

Journalists,Opposition Leaders the Target of Government…

According to Freedom House,governments in various countries are rapidly investing in sophisticated t ...
July 20, 2021

India Needs More Innovative Methods to…

Despite the legislative focus on child marriage, implementation has been inadequate in addressing th ...
July 17, 2021

Shettihalli Rosary Church the Abandoned Floating…

Shettihalli Rosary Church, commonly known as floating church, was built in 1860. It is a fascinating ...
July 16, 2021

A Temple in India Dedicated to…

Over time, Dog Temple in Agrahara Valagerehalli village south of Karnataka's Ramanagara district,60 ...
July 15, 2021

Other Article

Pick of the Day

UN Permanent Representative of Iran Briefs…

Amir Saeid Iravani, Permanent Representative of the Islamic Republic of Iran to the United Nations, ...
March 7, 2026
Bizzare News

Malaysian Man Holds Record for Having…

Malaysian Prathab Muniandy has ten more teeth than the typical human. This indicates that he has the ...
March 6, 2026
Pet Corner

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before pur ...
Prevent Cyber Crime

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
Pick of the Day

UN Security Council Meets on Energy,…

Chris Wright, Secretary of Energy of the United States and President of the United Nations Security ...
Bizzare News

Just Before it Collapses, New Jersey…

A horrifying collapse happened minutes after four Jersey Shore police officers were captured on came ...
March 5, 2026

Top