Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Chilling Effect:
Regional journalists’ source
protection and information security
practice in the wake of the
Snowden and ...
What do journalists know?
What do journalists do?
What could they be doing?
Not a lot.
Nothing.
A lot.
Some history.
.
image by
“This application produced five telephone numbers, all
of which were researched for connections with the
[Metropolitan Pol...
Some method.
.
image by
.
image by
“Protecting the anonymity of
interviewees and their projects
during data collection and analysis
is particularl...
.
image by
.
image by
Some charts.
.
image by
“How much at all have you changed the way you…?”
“Do you think your home ISP would or
would not share your data with…?”
Which of the following have you used…?
Some discourses.
.
image by
“Another planet”
“People are pretty savvy”
“They can get access to
anything they want to”
Some findings.
.
image by
Everything has
changed…
1. Pre-publication identification
2. Retrospective identification
3. Not just legal defence
4. Ind...
…but journalists
haven’t.
1. No protection of social media
2. Unclear policies, reliance on
visible problems
3. Legal igno...
“More research is
needed…”
• Use of law by other
authorities
• Workplace surveillance’s
‘chilling effect’
• Ethnography
• ...
Twitter.com/paulbradshaw
Linkedin.com/in/onlinejournalist
Slideshare.net/onlinejournalist
Some thanks.
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Regional journalists' source protection and information security practice
Upcoming SlideShare
Loading in …5
×

Regional journalists' source protection and information security practice

511 views

Published on

Research into the use of information security practices in regional newspapers when it comes to protecting sources and their work

Published in: Education
  • Be the first to comment

  • Be the first to like this

Regional journalists' source protection and information security practice

  1. 1. Chilling Effect: Regional journalists’ source protection and information security practice in the wake of the Snowden and RIPA revelations @PaulBradshaw Birmingham City University
  2. 2. What do journalists know? What do journalists do? What could they be doing?
  3. 3. Not a lot. Nothing. A lot.
  4. 4. Some history. . image by
  5. 5. “This application produced five telephone numbers, all of which were researched for connections with the [Metropolitan Police Service]. One number was identified as the switchboard number for Hinchingbrooke Hospital in Cambridgeshire. It was established that Officer 15 DPG’s wife Member of Public 3, was employed at that hospital ”Enquiries were made with Siemens in order to identify from the data on the exhibit, which extension within the hospital the call to The Sun was made from.”
  6. 6. Some method. . image by
  7. 7. . image by “Protecting the anonymity of interviewees and their projects during data collection and analysis is particularly challenging in times of tight cybersecurity measures and blanket cybersurveillance plans Milan (in Della Porta, 2014)
  8. 8. . image by
  9. 9. . image by
  10. 10. Some charts. . image by
  11. 11. “How much at all have you changed the way you…?”
  12. 12. “Do you think your home ISP would or would not share your data with…?”
  13. 13. Which of the following have you used…?
  14. 14. Some discourses. . image by
  15. 15. “Another planet”
  16. 16. “People are pretty savvy”
  17. 17. “They can get access to anything they want to”
  18. 18. Some findings. . image by
  19. 19. Everything has changed… 1. Pre-publication identification 2. Retrospective identification 3. Not just legal defence 4. Indirect targeting
  20. 20. …but journalists haven’t. 1. No protection of social media 2. Unclear policies, reliance on visible problems 3. Legal ignorance 4. Network vulnerability 5. No training
  21. 21. “More research is needed…” • Use of law by other authorities • Workplace surveillance’s ‘chilling effect’ • Ethnography • Source behaviour
  22. 22. Twitter.com/paulbradshaw Linkedin.com/in/onlinejournalist Slideshare.net/onlinejournalist Some thanks.

×