
Journalist fellow Paul Farrell says discussions of information security for journalists tend towards abstractions that are of little use to practitioners. Photo: ABC
Journalist fellow Paul Farrell says discussions of information security for journalists tend towards abstractions that are of little use to practitioners. Photo: ABC
It’s no accident that some of the most significant progress in newsroom information security over the past decade has been in smaller, more recently-formed digital startups.
While the journalistic community has historically demonstrated a poor understanding and appreciation of the importance of strong information security skills and techniques, smaller outlets are proving they can effectively incorporate strong infosec strategies into their highly adaptive and responsive workflows.
Part of their strength lies in understanding how to cultivate an effective security mindset for the journalists in their organisation from the outset. “We throw them in the deep end; we say you’re going to use Signal, you’re going to use Thunderbird, this is how you do encrypted storage, we’re going to set up 2FA on your work email and your personal email,” said Emma Prest, chief information at the Organized Crime and Corruption Reporting Project (OCCRP).
She was among several newsroom leaders, security experts and journalists – from Italy, Norway, the Czech Republic, UK, Botswana, the Philippines, the U.S., France, India, Greece and the Netherlands – that I interviewed about what’s working, what isn’t, and what we need to do to move the industry forward.
The need for a strong information security in newsrooms is real. And it isn’t just for national security reporters anymore. Reporters who write about culture and lifestyle issues are doxxed on a daily basis. Television hosts are threatened and pursued by malicious trolls. Court reporters are hounded.
And yet, almost a decade since the revelations about global surveillance revealed by Edward Snowden, many newsrooms still haven’t figured out how to build effective strategies to combat these risks into their newsrooms. Mistakes are made. Journalists feel left in the dark, and frustrated at the lack of change.
Small teams can adapt to these threats with more agility: their experiences are useful in providing some strategies and instructive guidance to larger, older newsrooms that are still coming to grips with how to embed a strong infosec culture.
While they work in vastly different environments, some common themes and strategies emerge from them.
The first is having strong leadership that instils infosec culture from the outset. Each of the organisations has senior editorial leaders that recognise the importance of information security risks and take steps to establish protocols to manage them in their editorial workflows.
At Serbia’s KRIK, managing editor Bojana Jovanovic said the most important part of the process is to communicate clearly with their journalists on how to mitigate risks at the very start of the story process.“We need to explain why it is sensitive, how to act, how to communicate. It’s really important to give a headstart to all journalists so they know how to process and how to work on the story.”
The second is ensuring that information security risks are factored into the editorial process as the story develops. This is consistent with researcher Susan McGregor’s view that these risks need to be front-of-mind for all journalists and editors, in much the same way as they know when a story needs to be checked by the legal team. Many of these organisations also point to the fear of reputational damage they may suffer if they don’t act appropriately from the early stages of a story. In McGregor’s words: “Every reporter, editor, and newsroom leader needs to understand the foundations of information security if they hope to avoid the industry’s cardinal sins: outing a source and becoming the story.”
The third is developing workflows that are easy for journalists to manage, and avoiding unnecessarily complex tools. All advocated the use of Signal for internal communications. Each organisation also offered a range of encrypted tools for first contact, including Signal, Securedrop and, in some circumstances, a Protonmail email address. The more complex the tools, the less likely journalists – as well as sources – are to use them, and the more likely risks will be taken.
For Alvin Ntibinyane, founder of the INK Centre in Botswana, making tools and processes simple is a priority that extends to considering sources, too: “When we did one story in 2017 we had one guy trying to use Signal. He had a smartphone but struggled with it. We had to spend hours with him,” he said.
In the words of Mark Schoofs, former editor of BuzzFeed News: “Infosec is a two-way street. You and your organisation can be great about it, but you’re only one half of the equation.”
The fourth is considering the potential interplay between information security and physical security. Harm minimisation strategies – like those deployed by BuzzFeed to harden social media presences – are a valuable tool in diminishing the impact of online attacks, and decreasing the risk of a physical attack. Mapping out key and emerging risks for staff and how they could lead to physical attacks is a crucial part of any assessment of information security risks.
Investigative.cz’s Holcová said: “What I’ve learnt is that if you are dealing with sensitive information, you tend to underestimate or overestimate the risk. You need that person to talk to. You really need to take a step back and look at a sensitive project,” she said.
Daniel Howden, managing director of Lighthouse Investigations in the Netherlands told me: “We calculate our risk profile or threat profile. Once it reaches the stage where you assume you could get targeted, protocols become hugely more complicated.”
Finally, each of these organisations demonstrated a strong security mindset. Senior leaders had a clear understanding of risks, and these were communicated across the editorial workflow, and among all staff members. This mindset informed their approach to executing complex journalistic activities in a way that minimised potential harm for them and their sources.
Everyone I interviewed said it was impossible to be too prescriptive in explaining exactly what tools journalists need. The risks and threats for different journalists operating in different environments will shape the responses required. As a result, discussions of information security for journalists tend towards abstractions that are of little use to practitioners.
For this reason, I will set out a brief snapshot of some common tools referenced by interview subjects that are broadly in use. Before considering their use, consult more definitive resources that are regularly updated to ensure that no vulnerabilities have emerged.
Every day, all over the world, people reach out to journalists asking them for help. Some of those people are taking a chance when they do this: risking their lives, their jobs and their security to communicate something they believe the public needs to know about.
In doing so, they put their trust in us – collectively – to do all we can to protect them. Having a strong culture of information security helps ensure their trust is not misplaced.
As the range of threats grows in intensity and endangers journalists themselves, having that strong culture will not only help sources, but journalists, too.