User:Digi-ark/draft-journalists-digisec

Sources to add:

  • UN Plan of Action on the Safety of Journalists and the Issue of Impunity [1]


Digital security of journalists edit

 
Types of threats to the digital safety of journalism

Surveillance, data storage capabilities and digital attack technologies are becoming more sophisticated, less expensive and more pervasive, making journalists increasingly vulnerable to digital attacks from both state and Non-state actors.[2]

With the widespread availability of surveillance software and hardware[3], in a number of states across multiple regions, broadly defined legislative acts have been seen by some as working to silence digital dissent, prosecute whistle blowers and expand arbitrary surveillance across multiple digital platforms.

Source protection in the digital age edit

Source protection is regarded as a moral imperative in the realm of journalism, but in an everonment where most communications are mediated by digital technology

Chilling effects on sources edit

In the wake of the Snowden revelations in june 2016 the general public became aware of the mass surveillance that predeted the western world. The chiling effects are a follow up on the realization that if one is being surveilled then one might bastain from doing certain things and it has demonstrated the chillings effects do play a significant role in self-censorship in access to information.[4]

In the case journalistic sources, chilling effects are the consequence of a source understanding that everything they share with a journalist might be surveilled by a governmental intelligence agency and thus inhibit the potential source from becoming a whistleblower.

In a report made by Human Rights Watch in 2014, where interviews were conducted with 46 national security journalists in the USA, it was concluded that sources were less willing give out information to journalists, even when it relates to non-classified documents.[5]

Projects like SecureDrop aim to help mitigate the surveillability of source-journalist interactions.[6]

Threats edit

Surveillance edit

Digital communications are by definition mediated by electronic networks, which means that by controlling the means of communication a powerful organization may be able to see who talks to who, about

Metadata collection edit

Metadata is information about information. If a phone call is the data itself, then the metadata is who called who, for how long and from where. The concealment of this information is vital for source protection[citation needed] and encryption does not solve the problem. Education is required to instruct journalists on how metadata is collected and how it can be mitigated.

Cyber-harassment edit

In late 2016, the International Press Institute launched the OnTheLine database, a project that aims to systematically monitor online harassment of journalists as a response to their reporting. As of July 2017, the project had collected 1,065 instances of online harassment in the two countries (Turkey and Austria) in which the project collected data. In Pakistan, the Digital Rights Foundation has launched the country's first cyber harassment helpline for journalists, which aims to provide legal advice, digital security support, psychological counselling and a referral system to victims.[7] As of May 2017, the helpline handled a total of 563 cases since its launch six months earlier, with 63 per cent of calls received from women and 37 per cent from men.[8]Cite error: The opening <ref> tag is malformed or has a bad name (see the help page). Research undertaken by Pew Research Center indicated that 73 per cent of adult internet users in the United States had seen someone be harassed in some way online and 40 per cent had personally experienced it, with young women being particularly vulnerable to sexual harassment and stalking.[9]

Digital security trainings for journalists edit

Due ot th

Challenges edit

Making journalists safer has its own set of challenges. The guide "SaferJoruno" produced by Internews has summarized some of the challenges[10] and other key issues have also been highlighted by research in the field of Privacy Enhancing Technologies and Usability (PETs and Usability).

Technological, institutitonal and economic edit

Poor usability of some security tools edit

Since its origins security tools have had usability problems[11] as they were typically designed for people who already understood security concepts and issues (expert users). But in order for journalists and other at-risk populations to have access to security software usability is a requirement. The stragegy of making already usable software more secure has proven effective with the key example being popular messaging services like the Signal and Whatsapp's introduction of end-to-end encryption.[11]

Lack of financial resources edit

With the advent of the Internet disruption of the traditional media happened both on the dissemination of news[12] and well as in the typical funding source from advertisers.

With the need for fundamental restructuring [13] of many news organizations suffer from finantial restrictions which further limits the software that can be acquired and the training that can be provided.

The software used tends to be free and open source (FOSS) for security reasons, but also for the financial limations of the newsroom and the low/no cost of FOSS, which can also lead to problems of the financial sustainability of said software projects.[14]

Lack of publicly available data on attacks edit

Data on historical attacks on journalists with digital technologies is generally not available.[15] Organization like the Citizen Lab have compiled reports on the subject[16][17][18] and media organizations have reported on such attacks but it is suspected that the vast majority go unreported for fear of reprisal[citation needed]. The list of comprehensive studies on digital attacks agains civil society is also limited[citation needed] with one example being citizenlab's "targeted threat index"[19][20]

References edit

  1. ^ UNESCO (2017-02-20). "UN Plan of Action on the Safety of Journalists and the Issue of Impunity". UNESCO. Retrieved 2019-10-28.
  2. ^ Marquis-Boire, Morgan. 2015. How governments are using spyware to attack free speech. Amnesty International. Available at https://www.amnesty.org/en/latest/campaigns/2015/08/how-governments-are-using-spyware-to-attack-free-speech/
  3. ^ "The Global Surveillance Industry". Privacy International. Retrieved 2019-10-19.
  4. ^ Penney, Jonathon W. (2016). "Chilling Effects: Online Surveillance and Wikipedia Use". Berkeley Technology Law Journal. doi:10.15779/z38ss13. Retrieved 2019-08-20.
  5. ^ Avenue, Human Rights Watch; York, 34th Floor; t 1.212.290.4700, NY 10118-3299 USA (2014-07-28). "With Liberty to Monitor All | How Large-Scale US Surveillance is Harming Journalism, Law, and American Democracy". Human Rights Watch. Retrieved 2019-10-28. {{cite web}}: Text "350 Fifth" ignored (help); Text "New" ignored (help)CS1 maint: numeric names: authors list (link)
  6. ^ Freedom of the Press Foundation. "Here's how to share sensitive leaks with the press". Freedom of the Press. Retrieved 2019-10-23.
  7. ^ Digital Rights Foundation. n.d. Cyber Harassment Helpline. Digital Rights Foundation. Available at https://digitalrightsfoundation.pk/services/.
  8. ^ Digital Rights Foundation. 2017. Cyber Harassment Helpline: Six Month Report, December 2016-May2017. Digital Rights Foundation. Available at https://digitalrightsfoundation.pk/wp-content/uploads/2017/07/Cyber-Harassment-Helpline-Six-Month-Report.pdf.
  9. ^ Duggan, Maeve, Lee Rainie, Aaron Smith, Cary Funk, Amanda Lenhart, and Mary Madden. 2014. Online Harassment. Pew Research Center. Available at http://www.pewinternet.org/2014/10/22/online-harassment/
  10. ^ Henrichsen, Jennifer R; Betz, Michelle; Lisosky, Joanne M (2015). Building digital safety for journalism: a survey of selected issues. pp. 52–63. ISBN 978-92-3-100087-4.
  11. ^ a b Whitten, Alma; Tygar, J D. "A Usability Evaluation of PGP 5.0": 24. {{cite journal}}: Cite journal requires |journal= (help) Cite error: The named reference "gerberFinallyJohnnyCan2018" was defined multiple times with different content (see the help page).
  12. ^ "The people formerly known as the audience - Social media". The Economist. Retrieved 2019-10-21.
  13. ^ Anderson, C. W.; Bell, Emily J.; Shirky, Clay (2017-07-11), Post Industrial Journalism: Adapting to the Present, Tow Center for Digital Journalism, Columbia University{{citation}}: CS1 maint: multiple names: authors list (link)
  14. ^ In business: Keeping free software sustainable (webm) (video). 2018. Retrieved 2019-10-21.
  15. ^ Poseti, Julie (2017). Protecting journalism sources in the digital age (PDF). pp. 24–25. Retrieved 2019-10-28.
  16. ^ The Citizen Lab (2015-03-09). "Hacking Team Reloaded". The Citizen Lab. Retrieved 2019-10-14.
  17. ^ "Reckless Exploit: Mexican Journalists, Lawyers, and a Child Targeted with NSO Spyware - The Citizen Lab". Retrieved 2019-10-14.
  18. ^ "Reckless VII: Wife of Journalist Slain in Cartel-Linked Killing Targeted with NSO Group's Spyware". The Citizen Lab. 2019-03-20. Retrieved 2019-10-21.
  19. ^ "Targeted Threat Index". The Citizen Lab. 2013-10-18. Retrieved 2019-10-24.
  20. ^ Hardy, Seth; Crete-Nishihata, Masashi; Kleemola, Katharine; Senft, Adam; Sonne, Byron; Wiseman, Greg; Gill, Phillipa; Deibert, Ronald J. "Targeted Threat Index: Characterizing and Quantifying Politically-Motivated Targeted Malware": 16. {{cite journal}}: Cite journal requires |journal= (help)