Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Protecting your stories, sources and brands as journalists & publishers

900 views

Published on

Presentation at BBC Media City organised by Birmingham City University and BBC Academy

Published in: Education
  • Be the first to comment

Protecting your stories, sources and brands as journalists & publishers

  1. 1. @PaulBradshaw, Birmingham City University Protecting Your Sources, Stories and Brands, BBC Media City 2015 Web security: #safestories
  2. 2. This is what most people think of.
  3. 3. *
  4. 4. *
  5. 5. *
  6. 6. Anouk Mols, working paper 2015
  7. 7. But it’s just as likely to be someone like this...
  8. 8. *
  9. 9. *
  10. 10. * National security
  11. 11. * National security Police
  12. 12. * National security Police Public bodies
  13. 13. * National security Police Public bodies Ideologues
  14. 14. * National security Police Public bodies Ideologues
  15. 15. * National security Police Public bodies Ideologues Hackers for LOLs
  16. 16. * National security Police Public bodies Ideologues Hackers for LOLs Hackers for £££
  17. 17. * National security Police Public bodies Ideologues Hackers for LOLs Hackers for £££ Private eyes
  18. 18. * National security Police Public bodies Ideologues Hackers for LOLs Hackers for £££ Private eyes Employers
  19. 19. http://www.telegraph.co.uk/technology/news/9182991/Digital-surveillance-what-my-phone-records-say- 517,236 searches 795 public bodies 1 year
  20. 20. http://www.iocco-uk.info/docs/2015%20Half-yearly%20report%20(web%20version).pdf
  21. 21. * http://bigstory.ap.org/article/govt-obtains-wide-ap-phone-records-probe What might be used against you?
  22. 22. * http://www.neowin.net/news/microsoft-snooped-through-blogger039s-email-to-find-source-of-windows-8-leaks
  23. 23. Source: OJB
  24. 24. Source: OJB
  25. 25. * National security Police Hackers for LOLs Hackers for £££ Private eyes
  26. 26. * Backdoors Laws Metadata Passwords Interception Social engineering Theft
  27. 27. * What might be used against you?
  28. 28. http://loudhailr.wordpress.com/2014/11/21/video-students-explain-why-they-are-protesting-for-free-education/ Threat modelling Why, by who, how, and what could go wrong?
  29. 29. Do they want your... •Documents •Interactions •Audiences Stories, sources, brands
  30. 30. Source: OJB
  31. 31. Simple bites.
  32. 32. * https://maps.google.com/locationhistory/b/0
  33. 33. *
  34. 34. *
  35. 35. * https://twitter.com/settings/security
  36. 36. * Public wifi is, er... public.
  37. 37. **
  38. 38. ** What could go wrong?
  39. 39. ** It is password protected?
  40. 40. ** It’s not password protected (And it’s not deleted)
  41. 41. * A false sense of ‘security’
  42. 42. Image: Tambako the Jaguar Thank you.@PaulBradshaw, Birmingham City University Protecting Your Sources, Stories and Brands, BBC Media City 2015

×