med312 journalistic sources in the networked era: protecting and framing
TRANSCRIPT
![Page 1: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/1.jpg)
1Sources in the networked environment:
protecting & framing
#med312
![Page 2: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/2.jpg)
2
![Page 3: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/3.jpg)
3
![Page 4: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/4.jpg)
4
It’s the fixed point on the ethical firmament to which all other journalism principles are anchored, and reflects the highest aspiration of reporting –
to inform the public whatever the personal cost to the journalist
Hill and Lashmar, 2014: 132
![Page 5: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/5.jpg)
5
The legend of Deep Throat runs deep and, to British journalists, it conveys a solitary absolute: confidential sources must never be
identified while they are aliveLuckhurst, The Independent, 2003
![Page 6: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/6.jpg)
6
Dr David KellyMay 2003BBC: Andrew GilliganToday programme‘sexed up’‘dodgy dossier’45 minsHutton Inquiry
![Page 7: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/7.jpg)
7
Not an absolute right
![Page 9: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/9.jpg)
9
No court may require a person to disclose, nor is any person guilty of contempt of court for refusing to disclose, the source of information contained in a publication for which he is responsible, unless it be established to the satisfaction of the court that disclosure is necessary in the interests of justice or national security or for the prevention of disorder or crime.
![Page 10: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/10.jpg)
10
Courts very reluctant to establish disclosure in the interest of justice
Only found in exceptional cases where vital public or individual interests are at stake
![Page 11: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/11.jpg)
11
Goodwin v. United Kingdom 1996
Trainee journalist fined £5000
ECHR Article 10 overruled
![Page 12: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/12.jpg)
12In context of national security the courts will almost rule automatically to reveal the source
![Page 13: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/13.jpg)
13Again, almost automatic disclosure favoured by courts
![Page 14: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/14.jpg)
14
This does not apply to certain material such as:1. Legal privilege2. Excluded material3. Special procedure material
![Page 15: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/15.jpg)
15
Clause 14: Journalists have a moral obligation to protect confidential sources of information.
![Page 16: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/16.jpg)
16
![Page 17: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/17.jpg)
17
Who can evoke the right?
• Not just journalists• Middleman (NGO activist, academic)
![Page 18: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/18.jpg)
18
Deliberately avoiding ‘journalist’
“Every social communicator has the right to keep his/her source of information, notes, personal and professional archives confidential”
![Page 19: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/19.jpg)
19
Deliberately avoiding ‘journalist’
The term ‘journalist’ means any natural or legal person who is regularly or professionally engaged in the collection and dissemination of information to the public via any means of mass communication.”
![Page 20: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/20.jpg)
20
![Page 21: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/21.jpg)
21
![Page 22: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/22.jpg)
22
April 2010 Afghan War Logs90,000 classified documents
![Page 23: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/23.jpg)
23
![Page 24: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/24.jpg)
24
April 2010 - Collateral Murder
![Page 25: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/25.jpg)
25
May 2010: Adrian LamoJune 2010: Manning arrested
![Page 26: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/26.jpg)
26
Credibility?
![Page 27: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/27.jpg)
27
![Page 28: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/28.jpg)
28
23 October 2010 Iraq War Logs391,832 classified documents
![Page 29: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/29.jpg)
29
29 November 2010 Cablegate251,287 classified documents
![Page 30: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/30.jpg)
30
![Page 31: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/31.jpg)
31
![Page 32: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/32.jpg)
32
![Page 33: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/33.jpg)
33
![Page 34: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/34.jpg)
34
![Page 35: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/35.jpg)
35
![Page 36: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/36.jpg)
36
![Page 37: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/37.jpg)
37
![Page 38: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/38.jpg)
38
![Page 39: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/39.jpg)
39August 2013: David Miranda detained at Heathrow under schedule 7 of the Terrorism Act 2000
![Page 40: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/40.jpg)
40
![Page 41: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/41.jpg)
41
![Page 42: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/42.jpg)
42
Media responses
Social network analysis of media coverageCompared legacy news coverage with social media reaction
![Page 43: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/43.jpg)
43
Media responses
Legacy news in the United Kingdom “mostly cover whistle-blowers in neutral or positive ways,” since “within the UK national newspaper cultures, blowing the whistle on corruption and malpractice is constructed as a brave act in the public interest”- Wahl-Jorgensen and Hunt, 2012: 399–407
![Page 44: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/44.jpg)
44
Media responses
![Page 45: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/45.jpg)
45
Category Guardian New York Times
People’s Daily South China Morning Post
Whistleblower 58 25 76 32
Hero 9 4 1 1
Victim 1 2 2 2
Villain 1 0 0 1
Neutral 1 1 2 6
Mole 0 0 0 0
Source: Di Salvo & Negra, 2015
![Page 46: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/46.jpg)
46
The term ‘whistleblower’ was only used by two of the newspapers studied – The Guardian (121 times) and The South China Morning Post (36 times). The other newspapers did not use this term. The New York Times preferring other expression such as ‘Former NSA contractor’ (7 times), followed by ‘NSA contractor’ (5 times), ‘former intelligence contractor’ (5 times) and ‘fugitive former intelligence contractor’ (4 times). --Di Salvo and Negra, 2015: 9
![Page 47: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/47.jpg)
47
Category Guardian New York Times People’s Daily South China Morning Post
Whistleblower 1 1 6 0
Hero 10 6 3 5
Victim 12 4 18 1
Villain 17 5 19 4
Neutral 0 0 0 0
Mole 0 0 0 0
Source: Di Salvo & Negra, 2015
![Page 48: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/48.jpg)
48
Compared coverage across a range of publications- Quality (Guardian)- Mid-market (Daily Mail)- Tabloid (The Sun)
![Page 49: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/49.jpg)
49
Newspaper corpus Number of words Number of articles
Daily Mail* 303,552 298
The Guardian* 294,891 341
Evening Standard 66,939 131
The Times 50,947 101
Daily Express 34,405 82
Daily Mirror 30,348 72
The Sun* 20,693 111
Daily Star 1349 9
Total 803,124 1145
Source: Branum & Charteris-Black: 2015
![Page 50: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/50.jpg)
50
Summary
• While whistle-blowers may have once held an unassailable position within the press there appears to be a backlash against them in recent years.
![Page 51: Med312 Journalistic sources in the networked era: protecting and framing](https://reader035.vdocuments.site/reader035/viewer/2022070520/58f12c0f1a28abf3228b45ad/html5/thumbnails/51.jpg)
51
Protecting your source
• Try to avoid electronic communication• Meet face to face• Turn off both your phones, tablets, etc, well in advance of meeting• Avoid meeting in locations with CCTV• If you do use phone or email, do not use names• If you do use mobile phones, only use PAYG mobiles for both sides of
the conversation • If you use email, create a non-identifiable account and use PGP
encryption