{"id":1834,"date":"2013-10-19T13:42:22","date_gmt":"2013-10-19T17:42:22","guid":{"rendered":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/newsroom13\/?p=816"},"modified":"2021-06-22T18:42:40","modified_gmt":"2021-06-22T22:42:40","slug":"improving-your-digital-hygiene","status":"publish","type":"post","link":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/2013\/10\/19\/improving-your-digital-hygiene\/","title":{"rendered":"Improving Your Digital Hygiene"},"content":{"rendered":"<figure id=\"attachment_861\" aria-describedby=\"caption-attachment-861\" style=\"width: 300px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/newsroom.home.ona\/wp-content\/uploads\/sites\/5\/2013\/10\/Hygine-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-861 \" alt=\"Hygiene\" src=\"http:\/\/testing.journalists.org\/wp-content\/sites\/5\/2013\/10\/Hygine-300x207.png\" width=\"300\" height=\"207\" \/><\/a><figcaption id=\"caption-attachment-861\" class=\"wp-caption-text\">Illustration by Graham Clark\/ONA Newsroom<\/figcaption><\/figure>\nNo digital communication is completely secure, but some technologies are safer than others.\u00a0That was one of the takeaways from Journalism in the Age of Surveillance, a panel exploring how journalists can protect themselves and their sources in a new era of digital surveillance.<\/p>\n<p dir=\"ltr\">Janine Gibson, editor in chief of the Guardian U.S., recounted the challenges of publishing national security stories like the Edward Snowden leaks. \u00a0\u201cThese stories are very expensive,\u201d she said. \u201cYou need a lot of lawyers, a lot of plane tickets and you need a lot of care and attention.\u201d<\/p>\n<p dir=\"ltr\">The law regarding source protection and surveillance is currently in flux, said panelist Nabiha Syed, founder of Drone-U and a media lawyer.<\/p>\n<p dir=\"ltr\">\u201cIn the interim, technological solutions are key,\u201d Syed said. She calls the adoption of secure technological habits a form of \u201cdigital hygiene\u201d for journalists. However, she cautions that technology can only provide so much protection and that journalists can still be subpoenaed. \u201cIf you come into the crosshairs of a prosecution there\u2019s not a lot you can do.&#8221;<\/p>\n<p dir=\"ltr\">For journalists who want to protect their sources, encryption technologies are critical. \u201cRight now what we do on the internet and say on the phone is like an open book,\u201d said panel member Micah Lee, a technologist at the Electronic Frontier Foundation. Although NSA devotes resources to cracking these codes, encryption tools like Tor and PGP have proven remarkably strong, Lee said.<\/p>\n<p dir=\"ltr\">Good habits regarding digital security can also help sources feel more secure. Lee recounted how Glenn Greenwald, the journalist who wrote the Snowden stories and who has since left the Guardian, almost lost Snowden as a source due to technophobia. Snowden wanted to use PGP to communicate and Greenwald kept putting off implementing the program, deterred by how difficult it was to use.<\/p>\n<p dir=\"ltr\">Over time surveillance technologies trickle down from the national to the state and local levels, added Syed. Local police departments can use drones to surveil protests and read license plate numbers. Encryption can protect sensitive sources inside a City Council, as well as those within federal agencies.<\/p>\n<p dir=\"ltr\">Right now, many secure tools aren\u2019t as user-friendly as programs like Skype and Gmail, which the government can surveil. \u201cWe need to invest in these,\u201d said Lee. \u201cThey\u2019re good for democracy.\u201d<\/p>\n<p dir=\"ltr\">A BEGINNER\u2019S TOOLKIT:<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.torproject.org\/\">Tor<\/a>\u00a0&#8211; A free software that masks online traffic and protects anonymity.<\/p>\n<p dir=\"ltr\"><a href=\"http:\/\/www.pgpi.org\/\">PGP<\/a>\u00a0&#8211; Though not the most user-friendly application, PGP (Pretty Good Privacy) is an industry standard for encrypted communication.<\/p>\n<p dir=\"ltr\"><a href=\"http:\/\/www.truecrypt.org\">TrueCrypt<\/a>\u00a0&#8211; Free, open-source disk encryption that protects your files.<\/p>\n<p dir=\"ltr\"><a href=\"www.piriform.com\/ccleaner\u200e\">CCleaner<\/a>, <a href=\"http:\/\/bleachbit.sourceforge.net\/\">BleachBit<\/a>, <a href=\"http:\/\/www.fileshredder.org\">FileShredder<\/a>\u00a0&#8211;\u00a0Each of these programs wipes clean your hard drive and deletes all temporary files.<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/crypto.cat\/\">CryptoCat<\/a>\u00a0&#8211; Private, encrypted chat that feels like a standard instant messaging service.<\/p>\n<p dir=\"ltr\">ADDITIONAL RESOURCES ON SECURITY:<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.cpj.org\/reports\/2012\/04\/journalist-security-guide.php\">Committee to Protect Journalists security guide<\/a>:<\/p>\n<p dir=\"ltr\"><a href=\"http:\/\/gijn.org\/resources\/digital-security\/\">Global Investigative Journalists Network<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No digital communication is completely secure, but some technologies are safer than others.\u00a0That was one of the takeaways from Journalism in the Age of Surveillance, a panel exploring how journalists&hellip;<\/p>\n","protected":false},"author":10594,"featured_media":1759,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[185],"tags":[373],"powerkit_post_featured":[],"coauthors":[459],"class_list":{"0":"post-1834","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-industry","8":"tag-ona13"},"jetpack_featured_media_url":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-content\/uploads\/sites\/4\/2013\/10\/Hygine-1.png","jetpack_shortlink":"https:\/\/wp.me\/pd5Q1c-tA","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/posts\/1834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/users\/10594"}],"replies":[{"embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/comments?post=1834"}],"version-history":[{"count":1,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/posts\/1834\/revisions"}],"predecessor-version":[{"id":4375,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/posts\/1834\/revisions\/4375"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/media\/1759"}],"wp:attachment":[{"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/media?parent=1834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/categories?post=1834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/tags?post=1834"},{"taxonomy":"powerkit_post_featured","embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/powerkit_post_featured?post=1834"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/journalists-org-develop.go-vip.co\/newsroom\/wp-json\/wp\/v2\/coauthors?post=1834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}