This video, from this year’s Google I/O conference, is one of the best explanations I’ve seen on HTTPS with regard to publishers.
It’s worth watching for five minutes or so to get an insight into why HTTPS is so important not just in protecting users, but also in protecting your own reputation.
HTTPS protects users because it prevents others from seeing what sites they visited before and after yours, and what pages they’re looking at on your site.
Imagine a whistleblower checking your site or profile out, or indeed one of your own journalists visiting it using hotel or coffee shop wifi, and you have an idea what I mean.
But HTTPS also prevents hackers from impersonating your site in order to collect user data. I imagine most publishers will be more concerned with their customers than their sources.
For journalists who suddenly realise that their web browsing is public information, I recommend the browser plugin HTTPS Everywhere, which turns on HTTPS by default (where sites support it) in Chrome, Firefox, Firefox on Android, or Opera.
You could be forgiven for not having heard of John Henry Skillern. The 41 year old is facing charges of possession and promotion of child pornography after Google detected images of child abuse on his Gmail account.
Because of his case we now know that Google “proactively scours hundreds of millions of email accounts” for certain images. The technology has raised some privacy concerns which have been largely brushed aside because, well, it’s child pornography.
Sky’s technology correspondent Tom Cheshire, for example, doesn’t think it is an invasion of our privacy for “technical and moral reasons”. But should journalists be worried about the wider applications of the technology, and the precedent being set?
If you’re a journalist in the 21st century you have two choices: you can choose to be paranoid, or you can choose to be delusional.
The paranoid journalist assumes that someone is out to get them. The delusional journalist assumes that no one is.
In this post I will explain why and how every journalist – whether you’re a music reporter or a political correspondent – can take a serious and informed look at their security and arrive at a reasonable evaluation of risks and safeguards.
Don’t panic. I promise that by the end of this piece you will be less anxious about security, and no longer paranoid. I also promise to use lots of lolcats. Continue reading →
The project has been called IRPILeaks and, like the Dutch PubLeaksand WikiLeaks, is a tool for those want to leak staying anonymous and safe.
IRPI aims to use this anonymity to encourage leaks from people who want to expose misconducts of companies and public authorities. A list of risks they could face in the process is published on IRPI‘s site. Continue reading →
I’ve pulled together a collection of articles and resources for anyone interested in web security and surveillance, and how it affects journalists. You can find it on Flipboard here. If you want to contribute to the collection, get in touch, or recommend an article in the comments below.
Early in Alan Pearce‘s book on web security, Deep Web for Journalists, a series of statistics appears that tell a striking story about the spread of surveillance in just one country.
199 is the first: the number of data mining programs in the US in 2004 when 16 Federal agencies were “on the look-out for suspicious activity”.
Just six years later there were 1,200 government agencies working on domestic intelligence programs, and 1,900private companies working on domestic intelligence programs in the same year.
As a result of this spread there are, notes Pearce, 4.8m people with security clearance “that allows them to access all kinds of personal information”. 1.4m have Top Secret clearance.
But the most sobering figure comes at the end: 1,600 – the number of names added to the FBI’s terrorism watchlist each day.
This is the world of predictive policing that a modern journalist must operate in: where browsing protesters’ websites, making particular searches, or mentioning certain keywords in your emails or tweets can put you on a watchlist, or even a no-fly list. An environment where it is increasingly difficult to protect your sources – or indeed for sources to trust you.
Alan Pearce’s book attempts to map this world – and outline the myriad techniques to avoid compromising your sources. Continue reading →