This document provides information about protecting journalists' sources of information. It discusses organizing threat modeling sessions to help journalists understand potential adversaries and motives for surveillance. It also outlines providing practical guides and links to defend journalists' data and sources based on threat modeling. Hands-on crypto party sessions are held to teach practical security practices like using Signal for encrypted chat or Tor Browser for anonymous web browsing. The agenda shown discusses threat modeling, a sneak peek at a secure tip-off platform, and setting up encrypted chat and anonymous browsing applications.