Headlines
  • At least five ballistic missile launches from Iran have been detected by the Israelis since midnight.
  • Mehrabad Airport in Tehran is hit by strikes
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General António Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

More Details

Undercover Reporting a Big Challenge

By R.Solomon

My sources are my friends.They trust me a lot and without any hesitation they pass vital information to me and I always prefer to go undercover for my assignment their knowledge of the darker side of the society come as a handy.I treat my sources as my friends.I chat a lot with them and try to solve their problem.I believe that a good investigative reporter can not reveal his source.He prefer to go to jail rather than reveal their identity.

Few years ago,one of my source brought a young lady to me.He introduced the lady as a call girl.After that we regularly met and she revealed ‘trade secrets’to me.She believed me a lot and I always protected her identity.But now she withdrew from it entirely.She formed a NGO and helping destitute children.As an investigative reporter first I try to built up confidence and then persuade persons to talk on camera.I tell them that I have nothing to do with their criminal activity or criminal background but I try to highlight their plight-they trust me a lot and openly tell their story on camera.

Despite my best effort to built a co-ordial relation with them,sometimes they put me in trouble.Here, I want to recall one incident where I was compelled to take action against one of my contacts.Few months ago,my source a husky guy came over my office and struck up conversation with me and pull pranks-then he told me that he needed one of my mobile phones to capture some videos for me.As I trust him, I hand over my mobile phone to him and he promised to return it after finishing his job.But two -three days later when he didn’t return my mobile, I tired to contact him,found that his mobile was switched off.I didn’t remember his home address.I was at my wits end.

After waiting for ten-twelve days,I informed the police.Though it was not a strong Case because I willingly gave it to him,they considered the case seriously. A young police officer nab him from his hideout after three months and several rounds of raids.I later learnt that the guy involved in white color crime and earlier police booked him on several charges.

Despite these types of setback, I still trust my sources and regularly meet them.I follow the footsteps of Pete Shellem, a chain-smoking investigative reporter of Patriot-News of Harrisburg,Pennsylvania who meets sources in bars and knows most of the bartenders by name.When his immediate boss or any other person from his newspaper needs to find him for a question on a story they know where to find him.By his tireless effort four innocent people were freed from jail after serving several years in jail.Hats off to his temperament.

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before purchasing or adopting a pet.
Read More

Fileless Malware

A type of malicious software known as “fileless malware” infects a computer by using reliable apps. As it doesn’t rely on files and leaves no trace, it is difficult to detect and remove.
Read More

Ragdoll Cats

Large and sturdy, ragdoll cats have a soft, semi-long coat and blue eyes originated in Maine, United States. Coat colors are gold, silver, white, and tortoiseshell.
Read More

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends a legitimate process, removes its original code, and replaces it with malicious code before the process resumes. Due to this, the virus can operate as a legitimate process and avoid being discovered by security programs.
Read More

Our You Tube Channel Promo

For Latest Updates

[jetpack_subscription_form show_only_email_and_button=”true” custom_background_button_color=”undefined” custom_text_button_color=”undefined” submit_button_text=”Subscribe” submit_button_classes=”undefined” show_subscribers_total=”false” ]

From Our Archive

We Do Believe that Digital Publication is the Best Way for Communication and Spreading Awareness

Related Article

Indian President Election 2022

On July 18, India will elect a new president.4,800 MPs and MLAs will vote to choose India's 15th pre ...
July 18, 2022

Freedom of Speech is Not Absolute…

Though the freedom of speech and expression guaranteed by article 19(1)(a) of the Indian Constitutio ...
July 7, 2022

The Source of a Good Investigative…

My sources are my friends.They have a lot of trust in me and freely give me vital information. Since ...
August 9, 2021

Journalists,Opposition Leaders the Target of Government…

According to Freedom House,governments in various countries are rapidly investing in sophisticated t ...
July 20, 2021

India Needs More Innovative Methods to…

Despite the legislative focus on child marriage, implementation has been inadequate in addressing th ...
July 17, 2021

Shettihalli Rosary Church the Abandoned Floating…

Shettihalli Rosary Church, commonly known as floating church, was built in 1860. It is a fascinating ...
July 16, 2021

Other Article

Pick of the Day

UN Permanent Representative of Iran Briefs…

Amir Saeid Iravani, Permanent Representative of the Islamic Republic of Iran to the United Nations, ...
March 7, 2026
Bizzare News

Malaysian Man Holds Record for Having…

Malaysian Prathab Muniandy has ten more teeth than the typical human. This indicates that he has the ...
March 6, 2026
Pet Corner

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before pur ...
Prevent Cyber Crime

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
Pick of the Day

UN Security Council Meets on Energy,…

Chris Wright, Secretary of Energy of the United States and President of the United Nations Security ...
Bizzare News

Just Before it Collapses, New Jersey…

A horrifying collapse happened minutes after four Jersey Shore police officers were captured on came ...
March 5, 2026

Top