When a source wants to leak information, they must first become aware of their options & take steps to protect their operational security. However the very act of seeking out, researching and accessing this information can place a source at risk of discovery. Overview: The First Contact Problem This first