Mass Media
Mass Media

Journalists should protect themselves and their sources by keeping up to date on the latest digital security news and threats such as hacking, phishing, and surveillance.

Journalists should think about the information they are responsible for and what could happen if it falls into the wrong hands, and take measures to defend their accounts, devices, communications, and online activity.

Protect your accounts

Journalists use a variety of online accounts that hold both personal and work-related information on themselves, their colleagues, families, and sources. Securing these accounts and regularly backing up and removing information will help protect that data.

To protect your accounts:

  • Think about what information is stored in each account, and what the consequences would be for you, your family, and your sources if your account is breached.
  • Separate your work and private life online and avoid mixing professional and personal information in accounts. This will limit access to data if one of them is breached.
  • Review your privacy settings and understand what information is public, especially on social media.
  • Create backup copies of any information that is sensitive or that you would not want made public, including private messages and emails, then delete them from your account or device. Third party tools are available to help you encrypt individual documents to store on an external drive or in the cloud. It is also advisable to encrypt external hard drives. Review the law with regards to encryption where you are based.
  • Delete any accounts that you no longer use. Remember to create copies of any information you want to save.
  • Create long passwords of more than 15 characters. Do not reuse passwords. Use a password manager to help you manage your passwords.
  • Turn on two-factor authentication (2FA). Ideally, use an authenticator app as your form of 2FA instead of SMS.
  • If you are at risk of detention or you are worried about unauthorized access to your devices, log out of accounts after each use and clear your browsing history.
  • Regularly review the ‘account activity’ section of each of your accounts. This will reveal if devices you don’t recognize are logged in.
  • Avoid accessing your accounts on shared computers, for example, at an internet cafe. If you have no choice, log out immediately afterwards and erase your browsing history.

Phishing

Journalists often have a public profile and share their contact details to solicit tips. Adversaries looking to access journalists’ data and devices can target them – or a colleague or family member – with phishing attacks in the form of tailored email, SMS, social media, or chat messages designed to trick the recipient into sharing sensitive information or installing malware by clicking on a link or downloading a file. There are many types of malware and spyware which range in sophistication, but the most advanced can grant a remote attacker access to the device and all of its contents.

To defend against phishing attacks:

  • Research the tech capabilities of your adversaries to understand the threat and the likelihood you or someone you know could be a target.
  • Be wary of messages that urge you to do something quickly or appear to be offering you something that appears too good to be true, especially if they involve clicking on a link or downloading an attachment.
  • Check the details of the sender’s account and the message content carefully to see if it is legitimate. Small variations in spelling, grammar, layout, or tone may indicate the account has been spoofed or hacked.
  • Verify the message with the sender using an alternative method, like a phone call, if anything about it is suspicious or unexpected.
  • Think carefully before clicking on links even if the message appears to be from someone you know. Hover your cursor over links to see if the URL looks legitimate.
  • Preview any attachments you receive by email; if you do not download the document, any malware will be contained. If in doubt, call the sender and ask them to copy the content into the email, or take screenshots of the document in preview instead of downloading it.
  • Be cautious of links or documents sent via group chat. Chats with large numbers of people in them may be infiltrated by the authorities or criminal groups looking to target participants.
  • Use the desktop version of apps to review messages and links if possible. A bigger screen helps you verify what you have received, and you’re less likely to multitask.
  • Upload suspicious links and documents to Virus Total, a service that will scan them for possible malware, though only those that are known.
  • Enable automatic updates and keep all software on your devices up to date. This will fix known vulnerabilities that malware relies on to compromise your security.
  • Stay particularly alert to phishing attempts during elections and periods of unrest or if colleagues or local civil society groups report being targeted.
ALSO READ  Cellulant recognised among organisations committed to Data Protection in Nigeria

Device security

Journalists use a wide range of devices to produce and store content, and to contact sources. Many journalists, especially freelancers, use the same devices at home as well as at work, potentially exposing a vast amount of information if they are lost, stolen, or taken. Encrypt computer hard drives, phones, tablets, and external storage devices, especially if you travel, to ensure that others will not be able to access this information without a password.

To secure your devices:

  • Lock devices with a password, code, or PIN. Longer personal identification numbers or passwords are more difficult for others to unlock.
  • Update your operating system, apps and browsers when prompted. Old software has vulnerabilities that can be exploited to install malware on your devices. This is especially important if you feel you may be targeted by sophisticated spyware.
  • Audit the information stored on your devices and consider how it could put you or others at risk.
  • Back up your devices regularly in case they are destroyed, lost, or stolen. Store the backup copies securely, away from your regular workstation.
  • Delete sensitive information regularly, including chat messages. To prevent an adversary from restoring deleted files, use secure deletion software to wipe the device, if available; otherwise reset it and use it for unrelated activities in order to rewrite the device memory. (Back up anything you want to keep first or you will lose all your data.)
  • Don’t leave devices unattended in public, including when charging, as they could be stolen or tampered with.
  • Don’t plug devices into public USB ports or use USB flash drives that are handed out free at events. These could come loaded with malware which could infect your computer.
  • Be aware that your device may back up your data to the cloud account linked to the phone. Information stored in the cloud may not be encrypted. You can turn off automatic backups in the settings.
  • Set up your devices to allow you to wipe any data remotely if they are stolen. This feature must be set up in advance, and the device will only wipe if it is connected to the internet.
  • Always get devices repaired with a reputable dealer.

To encrypt your device:

  • Newer smartphones come with an encryption function, just make sure it is switched on in the settings.
  • Use Bitlocker to turn on full-disk encryption for Windows, Firevault for Mac, or the free Veracrypt software for hard drives and external storage.
  • Creating a long, unique password is key to using encryption; on a smartphone, check the custom settings to add a longer, more complex password.
  • Be aware that an adversary with knowledge of your password or power to compel you to decrypt your device will be able to look at the information.
  • Always research the law to ensure encryption is legal in the country you are living in or traveling to.

Encrypted communications

Journalists can communicate with sources more securely using encrypted messaging apps or software that encrypts email so only the intended recipient can read it. Some tools are easier to use than others. Encryption protects the content of messages, but the companies involved can still see the metadata, including when you sent the message, who received it, and other revealing details. Companies have different policies on what data they collect, how they store this data and how they respond when authorities ask for it.

ALSO READ  eLA: Let’s seize the moment, say Ministers

Recommended messaging apps offer end-to-end encryption, meaning that the information is encrypted when it is being sent from the sender to the recipient. Both parties must have an account with the same app.

Anyone with access to a device sending or receiving the message or to the password of the account linked to the app can still intercept the message content. Examples of messaging apps with end-to-end encryption turned on by default include Signal and WhatsApp. Other apps may require you to turn on end-to-end encryption.

Encrypted email is another secure way of exchanging information with a source or contact. Both parties must download and install specific software in order to send and receive encrypted email.

To use encrypted messaging apps:

  • Research who owns the app, what user data they keep, and whether that data has been subpoenaed by a government. Check to see what their policy is for responding to requests to share user data. Tech companies should produce a transparency report each year covering government requests to remove or share
  • Lock the app with a PIN or passcode where possible to better protect against someone opening the app if they have physical access to your phone.
  • Set up a registration lock, if the service offers one, to require anyone installing the app with your phone number to enter your PIN number.
  • Some apps, including Signal and WhatsApp, provide an extra security step to verify who you are chatting with and prevent someone impersonating one of your contacts from another device. Look for the option to verify safety number or security code in the app settings.
  • Understand where information sent to your messaging apps, such as photos or documents, is stored on your phone.
  • Anything you download, like photos, will be saved on your device and may be copied to other devices and apps, especially when you back up your data.
  • Some services, like WhatsApp, back up your message content to the cloud account linked to the telephone number. For iOS users be mindful that your call history on Signal syncs with iCloud. You can turn this off in the app settings.
  • Contacts stored in your phone sync with messaging apps and cloud accounts, so numbers you try to delete in one place may be preserved somewhere else.
  • Back up and delete messages regularly to store as little as possible on a single device or account. Create a process for reviewing content, including documents and multimedia messages, and store downloads or screenshots on an encrypted external storage device.
  • Disappearing message functions on Signal and WhatsApp allow you to automatically delete messages after a certain time. Turn these on if you are concerned about your phone being taken and your messages being accessed.
  • Both Signal and Whatsapp offer the possibility to set photos and videos to delete after viewing them. It may be helpful to turn that on if you are sending sensitive images.
  • Signal and WhatsApp also offer end-to-end encryption for video calling.

To use encrypted email:

  • Get help from a trusted contact who is tech savvy. Encrypted email is not always easy to set up if you are new to it.
  • Choose reputable email encryption software that has been peer reviewed. Always update your software to protect against security vulnerabilities.
  • Take time in advance to create a long, unique password for your encrypted email software. If you forget this password you will lose access to encrypted emails.
  • Send encrypted emails regularly so that you don’t forget how to use the software.
  • Details about the email, including the title and the email addresses sending and receiving the message, are not encrypted.

Secure internet use

Journalists rely on the internet, but may not want to share their online activity with every internet service provider, internet cafe, or hotel with free WiFi. Criminals, as well as sophisticated adversaries, can steal information or monitor journalists using insecure websites or public WiFi connections.

ALSO READ  2Africa deployment underway with first landing in Genoa, Italy

To use the internet securely:

  • Look for https and a padlock icon at the start of every website URL (https://cpj.org), indicating that traffic between you and the site is encrypted. Check sites you visit are secure using the Electronic Frontier Foundation’s HTTPS Everywhere browser extension.
  • Check that the website address is authentic, not a spoof. The URL should be spelled correctly and include https.
  • Install an ad-blocker to protect against malware, which is often hidden in pop-up advertising. Ad-blockers allow you to exempt certain sites from being blocked.
  • Install Privacy Badger to block websites and advertisers from tracking what sites you visit online.
  • Disable Bluetooth and other file-sharing apps and services when not in use.
  • Use a VPN to better protect your internet traffic from being logged by your internet service provider. Research who owns the VPN, whether they log your browsing history, and whether the company shares data with governments.
  • Avoid using public computers, especially at internet cafes or press rooms. Log out of all sessions and clear your browsing history after use if it cannot be avoided.
  • Consider installing the free Tor Browser Bundle to use the Internet anonymously or Tails, a free operating system that routes all your internet traffic through Tor. Tor is especially recommended for journalists who investigate sensitive topics like high-level government corruption in countries with sophisticated tech capacity. Review the law with regards to using Tor in the country you are in.

Artwork: Jack Forbes

Crossing borders

Many journalists cross borders carrying work and personal information that they may not want others to access on electronic devices. If border guards take a device out of your sight they have an opportunity to search it, access any accounts, copy information, or install spyware. Journalists crossing U.S. borders should consult CPJ’s safety note, “Nothing to Declare.”

Before you travel:

  • Find out what information is on your devices and how it could put you and your contacts at risk. Assume your devices could be subject to the same level of scrutiny as notebooks and printed material in your luggage.
  • Back up all your devices to an external hard drive or to the cloud. Remove any information that you would not want border officials to access from your devices.
  • Buy clean devices to use only for travel if possible, especially if you are working on highly sensitive stories. If you are traveling with a personal or work device, securely back up your content then perform a wipe or reset.
  • Turn on full-disk encryption for all devices to ensure that your information cannot be accessed without a password. Research restrictions on encryption of the country you are visiting to ensure you are not breaking any laws. Be aware that security forces may legally be allowed to ask for your password. Seek advice from your employer or lawyer before travel if there is a possibility you will be stopped at the border.
  • Log out of all accounts on your devices and uninstall apps until you have crossed the border and reached a secure Internet connection.
  • Clear your browsing history on all your devices. (Your internet service provider and browser will still have a record of which websites you have visited.)
  • Lock all devices with a PIN or password instead of biometric data like your face or fingerprint.
  • Enable remote wiping of your devices and leave clear instructions with someone you trust to wipe your devices remotely if you are detained.

At the border:

  • Power off your devices to activate disk encryption.
  • Keep an eye on your devices as they pass through security.
  • Do not turn on your phone until you are away from the airport. Any calls and SMS messages will be routed through a local service provider who may collect the content or share it with authorities. Use a VPN when connecting to the airport WiFi.

If any device is confiscated at the border or anything is inserted into it, assume it is compromised and that any information on it has been copied.

AMA GHANA is not responsible for the reportage or opinions of contributors published on the website.