<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>surveillance &#8211; English</title>
	<atom:link href="https://onmedia.dw.com/english/?feed=rss2&#038;tag=surveillance" rel="self" type="application/rss+xml" />
	<link>https://onmedia.dw.com/english</link>
	<description>Our work in Africa engages with journalists and partners across a wide range of media including radio, TV, online, mobile and film. One of the priorities of the DW Akademie in Africa is to support and strengthen independent media in post-conflict countries and countries in transition.</description>
	<lastBuildDate>Mon, 03 Dec 2018 13:57:38 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Secure collaboration among journalists: tips from an expert</title>
		<link>https://onmedia.dw.com/english/?p=17665</link>
		<pubDate>Fri, 31 Jan 2014 12:58:15 +0000</pubDate>
		<dc:creator><![CDATA[hairsinek]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[secure collaboration]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[tools]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=17665</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><img class="wp-image-17707 alignleft" alt="Photo of Sebastian Mondial" src="http://onmedia.dw.com/english/files/Sebastian-Mondial.jpg" width="338" height="190" srcset="https://onmedia.dw.com/english/files/Sebastian-Mondial.jpg 940w, https://onmedia.dw.com/english/files/Sebastian-Mondial-300x168.jpg 300w" sizes="(max-width: 338px) 100vw, 338px" />Sebastian Mondial was one of the first journalists entrusted with <a href="http://www.icij.org/offshore/secret-files-expose-offshores-global-impact">millions of leaked offshore tax files</a>. Because of the sensitive nature of the information – which involved the secret financial transactions of individuals from corrupt politicians and international arms dealers to millionaires and middle-class professionals – secure communications among those involved in the investigation was of the utmost importance. The ensuing collaboration, involving nearly 100 journalists from 40 countries, was probably the largest in journalism history</p>
<p><a href="http://www.dw.com/the-offshore-leaks-data-detectives/a-16726438">Mondial</a> was pivotal in setting up the communication channels and ensuring that the information exchange avoided surveillance. In the following guest post for onMedia, he gives some tips on how to protect communications from snooping eyes while still keeping the information flowing.<span id="more-17665"></span></p>
<p>There is much uncertainty and doubt (and perhaps fear) about whether it&#8217;s possible to keep any collaboration among reporters, editors and sources secure these days. Based on my experiences with the global offshore-leaks project and similar international endeavors, I want to share some recommendations for setting up secure communications for collaborative projects.</p>
<p>But before you even start, you need to be honest about your technical skills and the situation. If you are reading this text, chances are you&#8217;re <strong>not</strong> an A-grade hacker or system administrator. You don&#8217;t need to be. But the less developed your technical skills are, the more you will need to rely on other people&#8217;s work and the less you will be able to evaluate for yourself if a solution is really secure.</p>
<p>Take the anonymous surfing project <a href="https://www.torproject.org/">Tor</a>, for example, and more specifically <a href="https://tails.boum.org/">Tails</a>. Tails is a ready-to-use system that allows novices to surf the internet anonymously. While such software has major advantages, the drawback is that you absolutely have to trust the source, the creators, of this system. Since Tails and Tor are open source and used by many people, any security flaws will probably be found and fixed at some point. But as long as you can&#8217;t match the source code with the software yourself, there&#8217;s a chance it&#8217;s been manipulated. (Recently this was done for TrueCrypt, a disk encryption software &#8211; you can read about it <a href="http://www.techrepublic.com/blog/it-security/encryption-for-the-paranoid-verifying-truecrypt-source-code-and-binaries/">here</a>.)</p>
<p>So when you lack the necessary skills, you need to decide to either:<br />
&#8211; “buckle up” and learn the necessary skills<br />
&#8211; trust tutorials and follow step-by-step solutions<br />
&#8211; find/hire an expert who you have to trust from this point on</p>
<p>This will be the Achilles&#8217; heel of your security concept, so choose wisely!</p>
<p><strong>The cardinal question</strong></p>
<p>Then you need to ask yourself the following (multipart) question: <em>How many people need to communicate, for how long and from where, what are their roles and how much time do you have to prepare for this situation?</em></p>
<div id="attachment_17717" aria-labelledby="figcaption_attachment_17717" class="wp-caption alignright" style="width: 216px"><img class=" wp-image-17717 " alt="Screen shot of mobile screen showing red phone" src="http://onmedia.dw.com/english/files/Red-Phone.png" width="216" height="359" srcset="https://onmedia.dw.com/english/files/Red-Phone.png 385w, https://onmedia.dw.com/english/files/Red-Phone-180x300.png 180w" sizes="(max-width: 216px) 100vw, 216px" /><p class="wp-caption-text">RedPhone &#8211; an open source encryption app</p></div>
<p>I&#8217;ll walk you through some answers to this question using two scenarios. But before I start, if you need to keep the contents of your conversations secret and can&#8217;t meet face to face, I recommend <a href="https://whispersystems.org/">RedPhone</a> (Android) and <a href="https://silentcircle.com/web/silent-mobile/">Silent Circle</a> (Android+iPhone) for the time being. Both of these will keep the content of your talks safe as long as your devices/phones aren&#8217;t compromised. (Calling people does creates specific metadata – while it&#8217;s possible to avoid this by controlling and encrypting the whole connection from end to end, that is too much ground for this post to cover).</p>
<p><strong>Scenario A – exchanging information among five people or fewer (assuming you don&#8217;t need to send many files)<br />
</strong></p>
<p>Depending on the nature of what you are exchanging, having five people or fewer means sharing information via email is still manageable (but it does still create a large amount of duplicate text when referring and refining because email programs often just paste replies above the original messages).</p>
<p>First, make security a special responsibility. If you have a team leader – good. If not, choose one person to have the last word about security – a security “first among equals,” if you like. If unsure about who to chose, pick the person who&#8217;s the most sane and the most paranoid at the same time. If you share responsibility, it will degrade security, trust me.</p>
<p>If you&#8217;re not all working within the same company and are on different mail servers (meaning you have different email addresses &#8211; like mike@yahoo.com and claire@web.de), you should set up extra accounts on another mail server especially for your project.</p>
<p>The best would be a server you can trust to not be accessible to law-enforcement agencies. In Germany, for example, all email providers with more than 1,000 users are required to allow such agencies direct access to mail accounts without users knowing.</p>
<p>This means you will have to set up a server yourself or get a managed server (where you have the problem of having to trust the admin). You need to have that machine in a physical space which you trust won&#8217;t be compromised easily.</p>
<p>You can then set up the server to accept only secure (SSL) connections and use <a href="https://www.eff.org/deeplinks/2013/08/pushing-perfect-forward-secrecy-important-web-privacy-protection">forward secrecy</a> (also called perfect forward secrecy &#8211; you can read more about how to configure it <a href="http://blog.ivanristic.com/2013/06/ssl-labs-deploying-forward-secrecy.html">here</a>). This will also cost money to run &#8211; around US$25-50 a month plus the hardware lease. Security isn’t cheap if you want to have it done right. But this ensures that as you exchange information, none of the metadata is accessible to the NSA and other snoopers (read more about metadata <a href="http://www.theguardian.com/technology/interactive/2013/jun/12/what-is-metadata-nsa-surveillance#meta=0000000">here</a>).</p>
<p>The server will be a &#8220;central point of failure&#8221; &#8211; meaning if your information there is accessed by a third party, unless it is already deleted, the invader gets it all. So you need to add a third layer of protection just in case – encryption. This will keep things secret. <a href="http://gnupg.org/">GPG</a>, the open source implementation of the cryptographic software <a href="http://en.wikipedia.org/wiki/Pretty_Good_Privacy">PGP</a>, is fine for that.</p>
<p>Since you&#8217;re all using the same server, again, metadata will be the least of your worries because it&#8217;ll only be available to outsiders if they get on the server.</p>
<p><img class="alignleft  wp-image-17705" alt="Picture of smartcards" src="http://onmedia.dw.com/english/files/OpenPGP-Smartcard.png" width="263" height="341" />I recently started to work with <a href="https://wiki.debian.org/Smartcards/OpenPGP">PGP V2-Smartcards</a>. These are physical cards you can use to store GPG cryptographic keys. The sweet thing about them is that you can set them up, send them to someone and people then have the encryption keys &#8220;outside&#8221; their computers protected with a pin or passphrase that is most unlikely to be brute-forced, since it locks down after three false access attempts. It also works within companies with a central IT department; they only need to set up your computer &#8211; Windows, Mac or Linux with a GPG version higher then 2.0.8 and a common reader and you can encrypt on your own.</p>
<p>Since we&#8217;re talking about computers &#8211; if you work in an environment where virtual and real break-ins are likely, here are some more tips.</p>
<p>Buy a computer in a store rather than ordering it online because the NSA is known to have <a href="http://www.forbes.com/sites/erikkain/2013/12/29/report-nsa-intercepting-laptops-ordered-online-installing-spyware/">diverted online purchases</a> to install spyware on machines. Select the computer for its modularity &#8211; how easy it is to take apart because you might want to do things like remove the camera or the microphone (see <a href="http://www.ifixit.com/">www.ifixit.com</a> for tips on taking apart devices). Set up the computer afresh with full disk encryption (here are some links to setting it up on <a href="http://www.truecrypt.org/">Windows</a>, <a href="http://support.apple.com/kb/ht4790">Mac</a> and <a href="https://www.eff.org/deeplinks/2012/11/privacy-ubuntu-1210-full-disk-encryption">Ubuntu</a>).</p>
<p>Here are some basic pointers to setting up systems but as I have already emphasized, you need to have or acquire some skills and/or trust other people to make it really safe.</p>
<p>&#8211; securing one of many <a href="http://www.debian.org/doc/manuals/securing-debian-howto/">Linux Distributions</a><br />
&#8211; hardening <a href="//www.nsa.gov/ia/_files/factsheets/macosx_10_6_hardeningtips.pdf">OS X</a> (if you run a Mac client) &#8211;<br />
&#8211; setting up a <a href="http://sealedabstract.com/code/nsa-proof-your-e-mail-in-2-hours/">secure system</a>. Note that with this, as with any other tutorial, you really need to know what you&#8217;re doing</p>
<p>If you set up your system like this, your activity will have very limited visibility and no metadata about the information exchange will be revealed unless the “other side” gets hold of the server.</p>
<p><em>However, if you need to send a lot of files and/or you are collaborating on a project with ever-changing information, this isn&#8217;t the correct scenario for you. See Scenario B instead. </em></p>
<p><strong>Scenario B. Exchanging information among six or more people and/or collaborating on a data-intensive topic over an extended period of time</strong></p>
<p>A larger collaboration makes email a burden rather than a useful tool. Since it is likely different people will be communicating on different topics, and you also might have people joining and leaving the project, you need a different method of setting up secure communications.</p>
<p><img class="wp-image-17711 alignright" alt="Symbolic picture of a lack embedded in a circuit" src="http://onmedia.dw.com/english/files/Digital-Security.jpg" width="294" height="166" srcset="https://onmedia.dw.com/english/files/Digital-Security.jpg 1024w, https://onmedia.dw.com/english/files/Digital-Security-300x168.jpg 300w" sizes="(max-width: 294px) 100vw, 294px" />I recommend setting up a web forum with enhanced encryption and file storage capability on a dedicated secure server. Start with a root/managed server as described above. Then set up a forum like <a href="http://fudforum.org/doc/d/manual.html">fud-forum</a> and <a href="http://cvs.prohost.org/index.php/Securing">harden the system</a>. If the machine has the necessary CPU power, you can also reuse it as a mail server as seen above. On top of this, you could <a href="http://www.elastichosts.com/support/tutorials/linux-l2tpipsec-vpn-server/">enable a VPN</a> (Virtual Private Network), which will add an encryption layer.</p>
<p>By doing this, you can then communicate and keep records in a central location while also being able to control the level of information accessed by those involved. In the offshore-leaks collaboration, we had a core group who were able to access all information as well as a reporter group who only had specific access to certain information relevant to their areas of expertise or their countries. People who were new to the forum could read all communications on their access level chronologically as well as in &#8220;thread-mode,&#8221; meaning that they could see questions and answers.</p>
<p>If we had needed to, we would have been able to shut down the whole system and make the data disappear at any point. An advantage of such a system is that you can also make a complete “private” copy at the end of the project as a reference.</p>
<p>I know this post has only scratched the surface of some of your secure communication needs. The good news is that there is a wealth of great information out there on the internet about making your communication server even more secure.</p>
<p>One more thing – there is no such thing as perfect security. Forget it! But you can reduce the chances of being snooped on or your information compromised. Once you have some knowledge and set up the system, you need to maintain your level of security and keep an eye out for any possible breaches.</p>
<p>If you have any questions or need more pointers, I&#8217;m happy to help &#8211; I just might need some time to respond. You can email me on kappuchino@h2h.de or you can get in touch with me on Twitter at <a href="https://twitter.com/kappuchino">@kappuchino</a>.</p>
<p><em>Sebastian Mondial is a freelance data journalist who works mainly for German state broadcaster NDR in the investigative research team. He is also one of the founders of the first full-time data team in Europe &#8211; the regiondata desk at German press agency dpa. When he&#8217;s not busy crunching data, he also trains journalists on security and data journalism.</em></p>
]]></content:encoded>
			</item>
		<item>
		<title>DW Akademie panel discussion in Berlin: Digital Safety for Journalists</title>
		<link>https://onmedia.dw.com/english/?p=17555</link>
		<pubDate>Fri, 24 Jan 2014 17:00:07 +0000</pubDate>
		<dc:creator><![CDATA[Guy]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=17555</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><iframe frameborder="0" height="221" scrolling="no" src="//www.thinglink.com/card/483276480235700224" width="600"></iframe></p>
<p>Everything from the very real threats journalists face from internet surveillance, to losing control of personal data through mobile messaging applications were all canvassed at DW Akademie&#8217;s <a href="http://bit.ly/1j2CXjf">Digital Safety for Journalists</a> panel discussion at the ARD-Hauptstadtstudio in Berlin.</p>
<p>Joining DW Akademie&#8217;s <a href="https://twitter.com/HolgerHank">Holger Hank</a> on the panel were <a href="https://twitter.com/anne_roth">Anne Roth</a> (Tactical Technology Collective), <a href="https://twitter.com/zahialawi">Zahi Alawi</a> (DW Akademie), <a href="@maltespitz">Malte Spitz </a>(German Greens Party), John Goetz (NDR) and <a href="https://twitter.com/Bechkson">William Echikson</a> (Google).</p>
<p>Along with discussing the need for media organizations to be proactive and train journalists to use encryption and secure digital communications, the data retention policies of governments and technology firms, and how the internet should be controlled were also lively debated.<span id="more-17555"></span></p>
<p>The panel was conducted in both German and English and you can listen to and share the audio of the entire event via SoundCloud. A video will be made available shortly.</p>
<p><iframe frameborder="no" height="166" scrolling="no" src="https://w.soundcloud.com/player/?url=https%3A//api.soundcloud.com/tracks/131142059&amp;color=ff5500&amp;auto_play=false&amp;show_artwork=true" width="100%"></iframe></p>
<p>The conversation about digital safety for journalists continues on social media via #digisafe. Check out our Storify below highlighting a selection of quotes and comments from the event.</p>
<div class="storify"><iframe frameborder="no" height="750" src="//storify.com/DW_Akademie/dw-akademie-media-international-digital-safety-for/embed" width="100%"></iframe>[<a href="//storify.com/DW_Akademie/dw-akademie-media-international-digital-safety-for" target="_blank">View the story &#8220;DW Akademie Media International: Digital Safety for Journalists &#8221; on Storify</a>]</div>
]]></content:encoded>
			</item>
		<item>
		<title>Get smart about getting hacked!</title>
		<link>https://onmedia.dw.com/english/?p=16419</link>
		<comments>https://onmedia.dw.com/english/?p=16419#respond</comments>
		<pubDate>Fri, 22 Nov 2013 12:51:53 +0000</pubDate>
		<dc:creator><![CDATA[hairsinek]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[twitter]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=16419</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<div id="attachment_16439" aria-labelledby="figcaption_attachment_16439" class="wp-caption aligncenter" style="width: 490px"><img class=" wp-image-16439 " src="http://onmedia.dw.com/english/files/Digital-Surveillance.jpg" alt="Picture of keyboard with two surveillance cameras on the keys" width="490" height="276" srcset="https://onmedia.dw.com/english/files/Digital-Surveillance.jpg 700w, https://onmedia.dw.com/english/files/Digital-Surveillance-300x168.jpg 300w" sizes="(max-width: 490px) 100vw, 490px" /><p class="wp-caption-text">Watch out! Someone could be spying on you</p></div>
<p>When <a href="http://bigstory.ap.org/article/hackers-compromise-ap-twitter-account">hackers broke into AP&#8217;s Twitter</a> account earlier in 2013, their fake tweet about Barack Obama being injured in an explosion at the White House caused the US stock market to plunge. Just before the Twitter account was hacked, AP staffers had received an email asking them to click on a link that supposedly went to a Washington Post article.</p>
<p>Although it looked legitimate, the email was actually a phishing attack (view the email <a href="http://www.slate.com/blogs/future_tense/2013/04/23/ap_twitter_hack_would_you_click_the_link_in_this_phishing_email.html">here</a>). The fraudulent link redirected the recipients to a bogus site where they were asked for their login credentials. At least one person fell for the phishing email and gave the hackers, the Syrian Electronic Army, the password they needed to tweet in AP&#8217;s name.</p>
<p><img class="aligncenter wp-image-16473" src="http://onmedia.dw.com/english/files/2013-11-22-12_52_35-AP-Twitter-account-hacked-explosions-at-White-House-tweet-crashes-DOW-—-RT-US.png" alt="Screenshot of AP Tweet reading &quot;Breaking: Two explosions in the White House and Barack Obama is injured&quot;" width="612" height="101" srcset="https://onmedia.dw.com/english/files/2013-11-22-12_52_35-AP-Twitter-account-hacked-explosions-at-White-House-tweet-crashes-DOW-—-RT-US.png 874w, https://onmedia.dw.com/english/files/2013-11-22-12_52_35-AP-Twitter-account-hacked-explosions-at-White-House-tweet-crashes-DOW-—-RT-US-300x49.png 300w" sizes="(max-width: 612px) 100vw, 612px" /></p>
<p>In this case, the incident proved more embarrassing than damaging &#8211; the tweet was corrected immediately and the stock market recovered within minutes.</p>
<p>But falling for a phishing attack can have much more serious repercussions.<span id="more-16419"></span></p>
<p>In Bahrain at least 11 people were imprisoned between October 2012 and May 2013 after the Bahraini government successfully phished their identities. All had allegedly written anonymous Tweets criticizing Bahrain&#8217;s King Hamad. The authorities identified the individuals by sending them fake links from Twitter and Facebook. When they clicked on the link, spy software noted the computer&#8217;s IP address allowing authorities to track the Twitter users down (read how the Bahriani government did this in an <a href="https://bahrainwatch.org/ipspy/viewreport.php">extensive report</a> by Bahrainwatch.org).</p>
<p>Phishing attacks don&#8217;t just have to come from Twitter or email though; from sms to Skype, What&#8217;s App or even via the comments box on an online article, fake links can be embedded in any kind of communication.</p>
<p>What’s more, phishing doesn&#8217;t always involve a fake link. It might contain a downloadable file containing malicious software (or malware) that installs itself on your computer or smartphone without your knowledge.</p>
<p><img class="wp-image-16435 alignleft" src="http://onmedia.dw.com/english/files/Tweet-from-Appelbaum-about-phishing-attack-on-Anglolan-activist.png" alt="Tweet text reads &quot;Angolan activist was pwned via a spearphishing attack - I have the original emails, original payload and an updated payload.&quot;" width="332" height="215" srcset="https://onmedia.dw.com/english/files/Tweet-from-Appelbaum-about-phishing-attack-on-Anglolan-activist.png 692w, https://onmedia.dw.com/english/files/Tweet-from-Appelbaum-about-phishing-attack-on-Anglolan-activist-300x194.png 300w" sizes="(max-width: 332px) 100vw, 332px" /></p>
<p>Renowned security expert Jacob Appelbaum <a href="https://twitter.com/ioerror/status/334619847302467584">tweeted</a> earlier this year about discovering spyware on the computer of an Angolan activist. Installed when an email attachment was opened, the spyware took shots of the victim&#8217;s screen and copied his files, automatically sending the information to remote servers.</p>
<p>This particular spyware wasn&#8217;t very high-tech but other malware can log keystrokes to steal logins and passwords, record visited websites or even activate the camera or microphone on the laptop to record what people are doing.</p>
<p>We journalist are used to receiving emails, tweets or Facebook messages with links to stories or documents. After all, being on top of the news is part of our jobs. But letting hackers, whether they are government authorities or criminals, steal our information can endanger not only our stories, but also ourselves, our colleagues and most importantly, our sources. That&#8217;s why it is essential to be aware of the problem.</p>
<p>Here are a few tips:</p>
<p><img class="alignright  wp-image-16445" src="http://onmedia.dw.com/english/files/Mouse-Hover.png" alt="Email text showing mouse hovering over link to display link URL" width="331" height="119" srcset="https://onmedia.dw.com/english/files/Mouse-Hover.png 551w, https://onmedia.dw.com/english/files/Mouse-Hover-300x107.png 300w" sizes="(max-width: 331px) 100vw, 331px" /><strong>Mouse over the link</strong>. You can view a link&#8217;s URL by hovering over it with your mouse (but don&#8217;t click). If the URLs doesn&#8217;t look legitimate, or doesn&#8217;t match the one given in the email text, don&#8217;t open it.</p>
<p><strong>Read the URL carefully</strong>. Fake links will often try to trick you into thinking the URL is real by using similar spelling to a real site, for example www.aljazera.com instead of the correct www.aljazeera.com. If you don’t look carefully, it’s easy to think you’re clicking on a legitimate link.</p>
<p><strong>Check the domain name</strong>. The domain name is the part of the URL just before the first slash. For example, Deutsche Welle&#8217;s domain is www.dw.com. Genuine DW links have the domain name before the first slash – for example, http://akademie.dw.com/digitalsafety/ is still a genuine DW URL as the &#8220;dw.de&#8221; is before the first slash. A phishing URL to a fake DW site may look like this www.topstories.com/dw/globalization. Here&#8217;s a great <a href="http://www.bustspammers.com/phishing_links.html">spambusters post</a> that tells lets you know more about checking links.</p>
<p><strong>Use an URL checker</strong>. They aren&#8217;t foolproof but sites such as <a href="https://safeweb.norton.com/">safeweb.norton.com</a> are a good start.</p>
<p><strong>Don&#8217;t open unverified attachments</strong>. All file types can contain malware. If in doubt, delete.</p>
<p><em>To find out more about avoiding hacking attacks, tune into the <a href="http://akademie.dw.com/digitalsafety/livesessions/">What&#8217;s in that message</a> live online session with security expert <a href="http://www.nytimes.com/2012/08/31/technology/finspy-software-is-tracking-political-dissidents.html?_r=0">Morgan Marquis-Boire</a> on December 6 at 4pm CET. It&#8217;s just one of six online sessions happening during the “Digital Safety for Journalists” Open Online Workshop running from December 2-6. Other live sessions include mobile phone safety and using the Internet without being tracked.</em></p>
<p><em>Organized by DW Akademie together with Reporters Without Borders, the online workshop is free and open to anyone. For more information, visit the <a href="http://akademie.dw.com/digitalsafety/">Digital Safety for Journalists</a> website where you&#8217;ll also find daily posts on the topic starting from November 25.</em></p>
<p><em>Otherwise check out the <a href="https://rorypecktrust.org/resources/digital-security/">Rory Peck Trust website</a> which has fantastic online digital security resources written specifically for freelance journalists. For more about malware, see the entry <a href="https://rorypecktrust.org/resources/digital-security/malware-and-spyware">How can I avoid malware</a>.</em></p>
<p><em>Written by Kate Hairsine and edited by Kyle James</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
			<wfw:commentRss>https://onmedia.dw.com/english/?feed=rss2&#038;p=16419</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Journalism under surveillance</title>
		<link>https://onmedia.dw.com/english/?p=13043</link>
		<comments>https://onmedia.dw.com/english/?p=13043#respond</comments>
		<pubDate>Fri, 27 Sep 2013 10:42:07 +0000</pubDate>
		<dc:creator><![CDATA[Guy]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[surveillance]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=13043</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<div id="attachment_13045" aria-labelledby="figcaption_attachment_13045" class="wp-caption alignleft" style="width: 240px"><a href="http://www.flickr.com/photos/17964151@N00/3677688990"><img class="size-full wp-image-13045" src="http://onmedia.dw.com/english/files/3677688990_645a307bc8_m.jpg" alt="" width="240" height="193" /></a><p class="wp-caption-text">Flickr user: jmarty CC BY 2.0</p></div>
<p>Are you using any encryption tools or doing anything to protect your files, email and contacts on your computer or mobile phone?</p>
<p>As we find out more about the <a href="http://www.theguardian.com/world/the-nsa-files">internet surveillance activities</a> of the US National Security Agency, it&#8217;s clear that journalists and media organisations are among the targets of intelligence gathering agencies.</p>
<p>&#8220;Encrypt everything.&#8221;</p>
<p>That was one of the take home messages of Hauke Gierow&#8217;s talk on journalism and surveillance at this week&#8217;s <a href="http://socialmediaweek.org/berlin/events/?id=101831#.UkSKo7yWmTN">Social Media Week Berlin</a>.<span id="more-13043"></span></p>
<p>Gierow heads the internet freedom desk at <a href="http://www.reporter-ohne-grenzen.de/ueber-uns/team/">Reporters Without Borders</a> in Germany. Surveillance he says has a chilling effect on journalism. Your sources become unwilling to talk; there is an erosion of trust in the media; and, people who might be key whistleblowers hesitate to speak out.</p>
<p>Perhaps just as worrying is what he describes as the complicity of technology firms in surveillance &#8211; or as Reporters Without Borders refers to them in their <a href="http://surveillance.rsf.org/en/category/corporate-enemies/">2013 report</a>: &#8220;Corporate Enemies of the Internet&#8221;.</p>
<p>Gierow says there are some 230 companies worldwide that develop spyware and internet traffic monitoring products that may be used by governments to violate human rights and freedom of information. A number of these firms are within EU countries.</p>
<p><strong>Tools for online security</strong></p>
<p>Here on the onMedia blog you can check out our<a href="http://onmedia.dw.com/english/?cat=819"> in-depth series on online security resources and techniques</a> produced by Natalia Karbasova. It&#8217;s an ongoing topic onMedia will cover.</p>
<p>But for journalists in developing countries, working safely online can be even more challenging &#8211; particularly if they are using shared computers in newsrooms, or in internet cafes. And, some tools may make the net slower to use or be hard to install on shared computers.</p>
<p>So what can you do?</p>
<div id="attachment_13047" aria-labelledby="figcaption_attachment_13047" class="wp-caption alignright" style="width: 300px"><a href="http://onmedia.dw.com/english/files/IMG_4527.jpg" rel="lightbox[13043]"><img class="size-medium wp-image-13047" src="http://onmedia.dw.com/english/files/IMG_4527-300x225.jpg" alt="" width="300" height="225" srcset="https://onmedia.dw.com/english/files/IMG_4527-300x225.jpg 300w, https://onmedia.dw.com/english/files/IMG_4527-1024x768.jpg 1024w" sizes="(max-width: 300px) 100vw, 300px" /></a><p class="wp-caption-text">Gierow says open source tools are useful for online security</p></div>
<p>Gierow says to first check out the tools and the how to guides in Tactical Technology Collective&#8217;s <a href="https://www.tacticaltech.org/security-box">Security in a Box</a>. These guides are also available in many languages.</p>
<p>He also suggests journalists using shared computers at work should have a dedicated user name and login; try to store their files in encrypted folders; limit the applications you install on the computer to the ones you only need to use; surf the net using the <a href="https://www.torproject.org/projects/vidalia.html.en">TOR</a> network; and use encrypted chat programs.</p>
<p>Gierow cautions journalists to avoid talking about sensitive information over Skype.( You can also read our interview with Fabian von Keudell from CHIP magazine that examines <a href="http://onmedia.dw.com/english/?p=6755">the security of VoIP services such as Skype</a>.)</p>
<p>You can watch Hauke Gierow&#8217;s full presentation below and follow the journalism related links and discussions at Social Media Week Berlin on <a href="https://twitter.com/search?q=%23smwbjournalism&amp;src=typd">#smwbjournalim</a>.</p>
<p><iframe height="240" src="https://new.livestream.com/accounts/4966059/events/2397955/videos/30880568/player?width=560&amp;height=315&amp;autoPlay=false&amp;mute=false" width="560"></iframe></p>
<p>&nbsp;</p>
<p>UPDATE:</p>
<p>Dutch MEP <a href="http://www.vieuws.eu/citizens-consumers/dual-use-tech-eu-should-stop-the-spread-of-digital-arms-says-mep-schaake/">Marietje Schaake</a> has also drawn attention to the dual use of &#8220;digital arms&#8221; and wants European lawmakers to take action.</p>
<p><em>&#8216;It is a bit hypocritical to talk about the NSA revaluations with concern to stress the importance of cyber security, which is also a very popular topic nowadays, without addressing the fact that it’s EU based companies that are making and producing these digital arms.’</em><em> </em><strong><strong><em><br />
</em></strong></strong></p>
<p><strong>Author: Guy Degen</strong></p>
]]></content:encoded>
			<wfw:commentRss>https://onmedia.dw.com/english/?feed=rss2&#038;p=13043</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Who gathers your data and what you can do about it?</title>
		<link>https://onmedia.dw.com/english/?p=12237</link>
		<comments>https://onmedia.dw.com/english/?p=12237#respond</comments>
		<pubDate>Fri, 16 Aug 2013 18:48:12 +0000</pubDate>
		<dc:creator><![CDATA[Guy]]></dc:creator>
				<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[online security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[tor]]></category>

		<guid isPermaLink="false">http://onmedia.dw.com/english/?p=12237</guid>
		<description><![CDATA[ [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><span style="font-family: Times"><span style="font-size: medium"><a href="http://onmedia.dw.com/english/files/Anne_Roth_sm.jpg" rel="lightbox[12237]"><img class="alignleft  wp-image-12241" src="http://onmedia.dw.com/english/files/Anne_Roth_sm-300x300.jpg" alt="" width="200" height="200" srcset="https://onmedia.dw.com/english/files/Anne_Roth_sm-300x300.jpg 300w, https://onmedia.dw.com/english/files/Anne_Roth_sm-150x150.jpg 150w, https://onmedia.dw.com/english/files/Anne_Roth_sm-1024x1024.jpg 1024w" sizes="(max-width: 200px) 100vw, 200px" /></a>The revelations of the surveillance program of the US </span></span><a href="http://en.wikipedia.org/wiki/National_Security_Agency" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">National Security Agency</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium"> (NSA) has shown that no one is protected from being spied upon. Diplomats, political activists, as well as journalists around the world, are becoming increasingly vulnerable to online surveillance. </span></span><a href="https://twitter.com/annalist" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">Anne Roth</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium"> is a researcher for the NGO </span></span><a href="https://www.tacticaltech.org/" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">Tactical Technology Collective</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium"> that trains rights advocates how to use information and communications technologies. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">DW Akademie’s </span></span><a href="http://mediakar.org/" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">Natalia Karbasova</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium"> spoke to Roth about the biggest risks journalists face online, and about the parties interested in gathering all relevant and irrelevant information: from local authorities to national secret services. <span id="more-12237"></span></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>Is it possible for journalists to completely protect their online privacy?</strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">Complete protection is not really possible. It will not be possible in the future either, since we need to supply our data to an internet provider to go online in the first place. The question is rather: what do you want to be secure from? If you want to be sure you are not being tracked by the advertising industry, you can use an adblocker as a browser plugin and configure it manually. If you want to shop online and at the same time protect your identity, you can use secure online payment services like </span></span><a href="https://www.paysafecard.com/" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">Paysafecard </span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium">or </span></span><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">UKash</span></span></span></span><span style="font-family: Times"><span style="font-size: medium">. If you want to use internet services without disclosing your IP address, you should use the </span></span><a href="https://www.torproject.org/" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">software Tor</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium">. Still, this personal anonymity is only guaranteed if you don’t use your personal log-in data while browsing the web.</span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>What are the biggest security vulnerabilities online? </strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">There’s no general answer to this question. It depends on whether you are a big company, a journalist or just a normal user. Access to data which are being transferred unencrypted through email or other internet services pose a big problem. If data transfer isn’t </span></span><a href="https://en.wikipedia.org/wiki/Transport_Layer_Security" target="_blank"><span style="color: #1155cc"><span style="font-family: Times"><span style="font-size: medium"><span style="text-decoration: underline">SSL</span></span></span></span></a><span style="font-family: Times"><span style="font-size: medium">-encrypted (you can see this encryption in your browser address bar which says “https://” instead of “http://”), it can be easily intercepted in an open WiFi network.</span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">It is especially Windows users who face security problems. There’re numerous viruses and malware for Windows out there since this operating system is wide spread. They use unknown security weaknesses of Windows or install standard software and browser plug-ins to get daily access to the computer. That’s why is it is extremely important that you install the latest updates and the latest software. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">You should also be really careful and limit yourself to the software, plug-ins and add-ons you really need. You can also protect yourself by installing a personal firewall and a virus scanner. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>How do I know I’m being spied upon? </strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">Normally you won&#8217;t discover if you’re being kept under surveillance by the authorities. In Germany, you have the right to request this information from the German Federal Intelligence Service and other services. The question is, if you get the answer. Foreign secret services like the NSA don’t provide any information to non-US citizens.</span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>Who is interested in gathering my private information in the first place? </strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">On the one hand, we talk about authorities, on the other hand, about companies. Their motives and methods differ of course. Secret services gather information on internet usage and on users not only to protect their country against terror attacks, but also to exchange this information with foreign secret services which are not necessarily able to track the global internet traffic on their own. The approach of the secret services can be described as “full take”: you take so much information as you can. Edward Snowden and other whistleblowers have shown that secret services often use special interfaces, which global companies have provided them with. Secret services also use intercontinental internet lines. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">You have to be extremely cautious when it comes to using free services on the web. Remember that you still pay for it, but in a different manner, that is, not with money but with your data. That’s when you stop being a client and become a product. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>What do companies do with the data they collect? </strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">The data are collected through third-party cookies &#8211; little text files &#8211; users accept by browsing the web. Most users are not aware that they interact with other, third, parties when reading a news or any other website. These sites get paid to let the third parties have access to their users&#8217; data. The more information is known about a user, the more valuable and up-to-date is his or her profile. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">The advertising industry uses profiles for individual ads. Financial and insurance industries use your profile data to give predictions and to calculate how expensive their services should be for the end customers. By the way, the German registry office also sells your data, which many of us don’t know. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium"><strong>What’s so bad about it?</strong></span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">The problem of such data pools is, data collectors want more and more data. The intended use is often expanded later without updating those affected. That’s why I would recommend to be very careful with requests to share your address, you date of birth or the data of your children. </span></span></p>
<p><span style="font-family: Times"><span style="font-size: medium">There’s an ongoing discussion in Germany following the data retention directive of the European Union. It regards retention of communication meta data. It is basically the same as gathering of metadata which is being intensely debated in the light of Prism. You can easily generate motion profiles and networks with the help of these data, which show who knows whom, who makes calls with whom and how long these calls last. The initial purpose of the initiative was counter-terrorism, but it’s obvious that even here others are interested to extend access options.</span></span></p>
]]></content:encoded>
			<wfw:commentRss>https://onmedia.dw.com/english/?feed=rss2&#038;p=12237</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
