Welcome to SportsJournalists.com, a friendly forum for discussing all things sports and journalism.
Your voice is missing! You will need to register for a free account to get access to the following site features:We hope to see you as a part of our community soon!
SF_Express said:Actually, I've had this "style" question from the start of the Foley story.
ABC and others are using "e-mail" and "instant messages" interchangably. Well, not quite. But they keep referring to what were really instant messages as "e-mails."
They're different, aren't they? Or do we consider them to be the same kind of electronic, written communication.
Also, I've found it curious that these pages thought to save these IM exchanges. Was it just for fun, a souvenir, so to speak, or was using it against Foley down the road on their minds?
Meanwhile, Columbo, I don't know how easy it is to fake e-mails. And nobody has denied their veracity.
Columbo said:SF_Express said:Actually, I've had this "style" question from the start of the Foley story.
ABC and others are using "e-mail" and "instant messages" interchangably. Well, not quite. But they keep referring to what were really instant messages as "e-mails."
They're different, aren't they? Or do we consider them to be the same kind of electronic, written communication.
Also, I've found it curious that these pages thought to save these IM exchanges. Was it just for fun, a souvenir, so to speak, or was using it against Foley down the road on their minds?
Meanwhile, Columbo, I don't know how easy it is to fake e-mails. And nobody has denied their veracity.
It would seem near impossible to confirm an e-mail's/IM true originator.
I don't see how you can publish such stuff without knowing.
jgmacg said:If you were trying to break a story based on an e-mail trail, you'd need an IT investigator. Bigger papers now often have one. And there are private consultants/detectives you can hire.
If the congressman had put up a fight, for example, about the authenticity of the IMs or the e-mails, a good IT detective would have been able to track down the IP address of the computer from which they were sent. The cops often do this with internet predators, and other folks of low character. If the source computer is in his office or home, that fact can be pretty damning.
It's not necessarily incontrovertible ("Someone else must have used my computer to send those 131 salacious notes over the course of eighteen months, officer."), nor is it always possible - but it can be used to strengthen a case, or a story, considerably.