regional journalists' source protection and information security practice

33
Chilling Effect: Regional journalists’ source protection and information security practice in the wake of the Snowden and RIPA revelations @PaulBradshaw Birmingham City University

Upload: paul-bradshaw

Post on 21-Feb-2017

388 views

Category:

Education


0 download

TRANSCRIPT

Chilling Effect: Regional journalists’ source

protection and information security practice in the wake of the

Snowden and RIPA revelations @PaulBradshaw

Birmingham City University

What do journalists know? What do journalists do?

What could they be doing?

Not a lot. Nothing.

A lot.

Some history.

.

image by

“This application produced five telephone numbers, all of which were researched for connections with the

[Metropolitan Police Service]. One number was identified as the switchboard number for

Hinchingbrooke Hospital in Cambridgeshire. It was established that Officer 15 DPG’s wife Member of Public

3, was employed at that hospital

”Enquiries were made with Siemens in order to identify from the data on the exhibit, which extension within the

hospital the call to The Sun was made from.”

Some method.

.

image by

.

image by

“Protecting the anonymity of interviewees and their projects

during data collection and analysis is particularly challenging in times of

tight cybersecurity measures and blanket cybersurveillance plans

Milan (in Della Porta, 2014)

.

image by

.

image by

Some charts.

.

image by

“How much at all have you changed the way you…?”

“Do you think your home ISP would or would not share your data with…?”

Which of the following have you used…?

Some discourses.

.

image by

“Another planet”

“People are pretty savvy”

“They can get access to anything they want to”

Some findings.

.

image by

Everything has changed…

1. Pre-publication identification 2. Retrospective identification 3. Not just legal defence 4. Indirect targeting

…but journalists haven’t.1. No protection of social media 2. Unclear policies, reliance on visible problems 3. Legal ignorance 4. Network vulnerability 5. No training

“More research is needed…”• Use of law by other

authorities • Workplace surveillance’s

‘chilling effect’ • Ethnography • Source behaviour

Twitter.com/paulbradshaw Linkedin.com/in/onlinejournalist Slideshare.net/onlinejournalist

Some thanks.