a burgundy zine

The Ultimate Online Privacy Guide for Journalists by Wizcase

Print Friendly, PDF & Email
By: Wizcase

A miniature traffic cone on a laptop keyboard

Source: Pexels

Wizcase teaches us the ins and outs of vital cybersecurity measures for journalists.

As a journalist in 2020, the dangers you face are ever-increasing. 

Wizcase

Without the proper protection from online threats, you risk hackers stealing confidential information, exposing your sources, breaking anonymity, and getting hold of your unpublished stories. You’d be a prime victim for blackmail — or worse.

An infograph of online security threats journalists face by Wizcase

Source: The Ultimate Online Privacy Guide for Journalists | Wizcase

Some of these dangers can even be extreme and life-threatening. According to UNESCO, 495 journalists were killed between 2014 and 2018, which is an 18 percent increase compared to the latest 5-year period.

Additionally, more journalists are being murdered in non-conflict zones than from within conflict zones. Out of all the journalists killed in 2018, 33 percent were TV journalists, 26 percent were print journalists, and journalists in online media formed a significant 15 percent.

Being based in a non-conflict zone no longer assures your safety like it used to. Working online from behind a screen can’t guarantee you’ll be protected, either.

As the journalism industry trend continues to move from print to digital, it’s imperative to your well-being — and that of your colleagues and sources — that you put the appropriate online privacy safeguards in place.

Securing your software and hardware with the right encryption tools can help you keep your confidential files and sensitive information from falling into the wrong hands. It’s also vital to utilize privacy-enhancing software to protect your anonymity and that of all your contacts.

Below are 12 ways you can protect your work, your sources, and yourself in 2020.

Quick Guide: 12 Ways to Protect Your Online Privacy as a Journalist

  1. Send Messages to Sources on Secure Apps — Ensure your messages have end-to-end encryption
  2. Secure Your Emails to Protect Confidential Files — Prevent your emails from being exposed in data breaches, by hackers, or by the government
  3. Encrypt All Your Devices — Protect your private information being intercepted by outsiders
  4. Visit Websites Starting with HTTPS — Always connect to browsers with HTTPS, especially when using public WiFi
  5. Use a Private Internet Browser — Use a browser that keeps your online history safe
  6. Stay Anonymous Online with a VPN — Protect your online identity from prying third-parties, including the government, hackers, and spies
  7. Use a Zero-Knowledge Cloud Provider — Upload confidential files to safe cloud providers
  8. Create Strong Passwords — Use strong passwords that are impossible for others to guess
  9. Use Two-Factor Authentication (2FA) — Add an extra layer of protection to your online accounts
  10. Watch out for Basic Dangers to Journalists — Avoid making basic but dangerous mistakes
  11. Use an Alternative to Slack in the Newsroom — Secure your workplace communications
  12. Educate Your Sources and Colleagues — Protect people you work with by sharing our online privacy tips

1. Send Messages to Sources on Secure Apps

Whenever you contact someone by text or voice, there’s a chance your messages will be intercepted or that a third-party is listening to your phone call. By using a messaging app with strong encryption, you no longer need to worry about unwanted eavesdropping.

Even though many messaging apps have basic encryption — and some even promise end-to-end encryption — you need to be careful which apps you choose.

For example, WhatsApp claims to have end-to-end encryption, but its parent company Facebook has an extremely poor reputation for protecting its users’ privacy.

Thankfully, there are secure messaging apps available. These apps will ensure safe communication between you and your sources or colleagues.

  • Signal — Strong combination of end-to-end encryption and extremely limited logs. This was confirmed in a court case, when all the company could produce was the time of account creation and the last log on.
  • Telegram — Provides encryption, self-destructing messages, and two-factor authentication.
  • Threema — Threema doesn’t use your phone number but instead creates an anonymous ID for you. This is great for talking to someone whom you don’t want to directly give your number to.

Besides top-of-the-line encryption, the Signal app offers some additional privacy features

Source: The Ultimate Online Privacy Guide for Journalists | Wizcase

While all of the apps above offer end-to-end encryption and other security features, Signal and Telegram require your phone number.

Although the number is hashed and anonymized, we recommend using a brand new number that isn’t linked to you to sign up.

2. Secure Your Email to Protect Confidential Files

Emails are most likely your main point of communication, aside from instant messaging. Unfortunately, major email providers are still failing to provide standard encryption options.

This means your emails can be intercepted and read, especially at the recipient’s end.

If you’re planning to send or receive potentially sensitive data, it’s best to sign up to a secure email service.

Tutanota is one of the best options available as it encrypts everything — including the subject line, text, attachments, and even your address book.

Use an encrypted email service like Tutanota, which encrypts all aspects of sent emails

Source: The Ultimate Online Privacy Guide for Journalists | Wizcase

Tutanota has a free and paid version, with storage space ranging from 1GB to 1TB.

When emailing someone using a mainstream email provider, Tutanota will send them a message with a link to enter a password and unlock your message. This keeps your emails anonymous in all circumstances.

We like Tutanota as it’s constantly being improved by developers and privacy experts, plus it includes a free mobile client.

Other popular email services like ProtonMail and Hushmail offer many of the same features. However, Tutanota is the only one to encrypt the entirety of an email.

3. Encrypt All Your Devices

You need to ensure that the devices you and your sources use are encrypted. This includes your computers, tablets, phones, and external hard drives.

There are three ways to protect your sensitive data on your devices:

  1. Full-disk encryption (FDE): This is the most secure way to encrypt your device. Your disk will only be accessible with a password or PIN code. If your drive contains unfinished reporting and other sensitive files, this step is vital to take.
    You can use BitLocker if you’re a Windows user, and macOS users can use FileVault. You can also use BitLocker to encrypt your external drives, such as USB drives and memory cards. macOS users do this via Disk Utility.
  2. Encrypting specific files or folders: You can use open-source software, like VeraCrypt, to encrypt individual files and folders.
  3. Air gapping: This is a basic form of protection where you keep your device disconnected at all times. However, this method is only effective if your system is perpetually offline — this means no Bluetooth or NFC either.

4. Visit Websites Starting with HTTPS

What’s the difference between HTTP and HTTPS? HTTP doesn’t encrypt data sent between your browser and a website — but HTTPS does. 

This is essential if you’re interacting with sensitive data, need to log in with private credentials, or are making financial transactions.

An easy way to check if you’re on a secure page is to look at the address bar. Is the site you’re on using “http://” or “https://”? You should also pay attention to the small padlock symbol to the left of the address bar. This can show you if a connection isn’t secure, even if you appear to be on an HTTPS page.

5. Use a Private Internet Browser

It’s no secret that many web browsers store your personal, private, and financial information. If you’re reporting on a sensitive case, this data could be intercepted by hackers, the government, or other unwanted third-parties.

Don’t forget that it’s not just about securing your work, but ensuring you won’t be silenced in other ways.

Wizcase

If you have particular online interests that you don’t want others knowing about, such as your porn viewing habits, these could be used against you as blackmail.

Using your browser’s private or incognito mode won’t ensure your privacy, as your ISP and other parties can still track what you’re doing. I recommend combining a private browser with a VPN, or using a more private browser.

Here are my recommended private browsers:

TOR (The Onion Router)

TOR is the most private option on this list. It was originally developed by the US Navy for anonymous communication.

TOR encrypts your data and “bounces” it randomly around the world via a network of volunteer relays. Additionally, all your requests are routed via HTTPS (a more secure protocol), no scripts are loaded (making you harder to track), and you’re permanently in incognito mode (so none of your browsing data is stored).

This way, you can research and communicate freely without worrying about being tracked, and even navigate the dark web.

Firefox

Run by the non-profit Mozilla organization, Firefox has an built-in tracker blocking and is monetized almost entirely via royalties from partnerships and distribution deals. This means none of your browsing data is sold to third-party companies to make money.

I highly recommend using the DuckDuckGo search engine in Firefox, which doesn’t store any data or track your activities. While DuckDuckGo doesn’t present as many search results as Google, it’s still a much safer option for performing anonymous research.

You can also use Firefox’s “Containers” add-on to separate your browsing activity without having to clear your history, log in and out, or use multiple browsers.

Brave Browser

Brave is based on Chromium, the open-source code powering Chrome. However, aside from the core code, the two browsers are very different. Unlike Chrome, Brave automatically blocks cross-site trackers, adverts, and upgrades your connection to HTTPS. This helps you remain more anonymous online.

Warning! Avoid Chrome as Your Internet Browser

Google’s business model relies on collecting vast quantities of personal data and monetizing it. While this isn’t inherently dangerous, the data stored can be obtained by malicious third-parties or law enforcement officials.

Instead, you should consider signing up to their Advanced Protection scheme. This adds more defenses and restrictions to your Google account and associated apps. It was specifically created by Google for journalists, activists, business leaders, and political campaign teams.

6. Stay Anonymous Online with a VPN

A VPN, or Virtual Private Network, is a global network of servers that offer an anonymous and encrypted internet connection. The encryption hides all your online activities so that it’s unidentifiable and no one can trace your browsing activities back to you.

A VPN is extremely useful if you’re reporting from countries where government surveillance is a threat. 

Wizcase

It helps you work under the radar of the country’s surveillance technology, keeping your traffic and online activities private.

Use a VPN to encrypt your traffic and avoid censorship by connecting to servers around the world

Source: The Ultimate Online Privacy Guide for Journalists | Wizcase

Before connecting to a VPN server, you should first check if the server is hosted in a country that’s part of intelligence-sharing alliances. These agreements may result in VPN providers being forced to hand over your online information to the government.

There are currently three significant alliances involving a total of 14 countries, with some potential third-party contributors.

  • 5 Eyes — USA, UK, Canada, Australia, and New Zealand
  • 9 Eyes — 5 Eyes Countries plus Denmark, France, The Netherlands, and Norway
  • 14 Eyes — 9 Eyes Countries plus Germany, Belgium, Italy, Sweden, and Spain
  • Potential 3rd-Party Contributors — Israel, Japan, Singapore, and South Korea

You should also be careful not to connect to servers in countries with potentially hostile governments. For instance, if you’re reporting on a sensitive issue in Russia, you could be targeted by Russian intelligence.

If you connect to a server that’s physically in Russia, it’s possible that the local authorities could be monitoring this server — and hence your online activities.

It’s especially important for journalists to get a VPN with a no-log policy. These providers will not store any information about your online activity. 

Highly recommended no-log VPNs for journalists are NordVPNExpressVPN, and Surfshark.

Don’t trust free VPNs! 

Free VPNs aren’t trustworthy enough for secure journalistic needs. To make profit, free VPNs are even known to sell user data and give network access to malicious third parties. Make sure you thoroughly research any free services you use before entrusting them with your own valuable data.

For an in-depth look at how VPNs work, check out our complete beginner’s guide to VPNs.

7. Use a Zero-Knowledge Cloud Provider

You can use cloud services to send large files to your colleagues or sources, especially if they’re geographically far away.

However, make sure you use a zero-knowledge cloud provider — this ensures your files will be encrypted before they’re uploaded. A unique password will then be issued to your recipient in order to decrypt the files.

Sync and pCloud are two zero-knowledge cloud services that provide secure end-to-end encryption, even with their free plans.

8. Create Strong Passwords

It’s extremely important to use strong passwords, especially for your email accounts. If a hacker gets access to your primary email account, they could quickly use the same password to break into more of your online accounts.

However, contrary to popular belief, a password with a random combination of uppercase and lowercase letters, numbers, and symbols isn’t the strongest option. Neither is it the easiest to remember.

Here’s how you can create a strong password:

  • Make a long password — make sure it’s at least 11 characters long.
  • Use random words — you could flick randomly through a dictionary until you have at least four words and link them together.
  • Ensure it’s easy to remember — choose several words that have no connection but that you’re able to remember.
  • Use a unique password for each account — don’t repeat the same password twice.

People use weak passwords because they can’t remember more complex — and therefore stronger — passwords.

Luckily, you can use a password manager to store your login credentials. You’ll only have to remember one “master password” which has the ability to unlock the whole vault. I recommend using KeePassLastPass, or Dashlane — all of these password managers secure and user-friendly, with free and paid plans available.

9. Use Two-Factor Authentication (2FA)

If you’re storing sensitive material on one or more of your online accounts, 2FA is vital.

2FA requires two types of authentication before giving you access to your online account. You first enter your normal account login details, then enter a randomized token send to your physical device.

The necessity for a physical device adds a strong extra layer of security. Even if someone gains access to your credentials, they’ll need this device to actually log in.

You can set up 2FA in 3 ways:

  1. On your phone. For Android users, you can use andOTP or Google Authenticator. For iOS users, you can use OTP Auth or Yubico AuthenticatorAuthy is a good choice if you use both operating systems.
  2. Via a physical device like YubiKey or Google Titan. It needs to be physically plugged in or tapped against your phone (if NFC is supported) for verification.
  3. Via SMS or email. This is the least secure method, but you should still set it up if it’s the only type of 2FA offered.

While app-based 2FA is the easiest and most widely-supported method, physical 2FA is the safer choice.

10. Watch out for Basic Dangers to Journalists

These online threats are simple to avoid but can cause major issues if you fall victim.

Phishing

Phishing is a cyber attack that tricks victims into believing they are being contacted by a trusted company or service.

Wizcase

Here’s an example: You’ve received an email that looks like it’s from Google, which asks you to verify something on their site via a link. When you click the link and log in to the site, a hacker steals your login credentials. 

Even if you’re using 2FA and enter your code on the phishing website, hackers can use this information to immediately log in to your real account.

This means everything you’ve stored on Google — including Gmail and Google Drive — can now be accessed by the hacker.

You can see an example of a phishing email below:

This phishing email looks like it came from FedEx, but it has some red flags such as the strange email address

Source: The Ultimate Online Privacy Guide for Journalists | Wizcase

While it looks semi-official, you can see that it isn’t addressed to anyone in particular, and the formatting and punctuation are strange.

However, the main red flag is the email address, which is clearly not related to FedEx.

You still need to be vigilant about what you open and click when receiving emails. Cyber attackers can still appear to use a company’s domain to impersonate a company or one of its employees.

Malware

Be careful of accidentally infecting your device with malware when browsing the internet. Journalists should be especially concerned about ransomware, which encrypts your whole hard drive and requests a monetary ransom in exchange.

Make sure you use your common sense and avoid visiting potentially malicious websites. Don’t browse non-secure websites and avoid websites inundated with adverts, especially pop-ups. Bookmark sites you regularly return to so you know you’re visiting the real version.

You can use Malwarebyte’s anti-malware software to regularly scan your computer for threats. The free version is enough to detect malware, but the premium version offers useful extras, including ransomware protection and real-time protection.

Regularly scan your machine for malware — Malwarebyte’s free version is a good option

Source: The Ultimate Online Privacy Guide for Journalists | Wizcase

You should also be aware of “malvertising,” which quietly deliver malware via adverts without you even realizing it. Use an adblocker such as uBlock Origin on Chrome or Firefox to protect yourself against this threat.

Keep Your Devices Updated

Keeping your devices updated ensures you’ll be protected from the newest security threats. This advice applies to the operating system on your laptop or computer, mobile devices, and programs or apps you use.

Lock Your Devices and Set up Tracking

Make sure you have some form of lock on your mobile device and computer. Passwords are more secure than fingerprints or facial unlocking.

In case you ever need to recover a lost device, you can set up device tracking on Android and iOS devices.

You can also activate the option to remotely wipe your devices, in the event that confidential information comes to be possessed by the wrong person or group.

Make sure you can always track your mobile device, so you can locate or remotely wipe it

Source: The Ultimate Online Privacy Guide for Journalists | Wizcase

11. Use an Alternative to Slack in the Newsroom

Instant messengers and collaborative tools have made their way into workplaces around the world, such as Slack or Skype for Business. 

As journalists, you may be sending sensitive data and files to your colleagues via these channels. You need to make sure they can’t be accessed by unauthorized third parties.

Slack is one of the most widely-used collaboration tools, thanks to its user-friendliness. However, Slack does not employ security features such as end-to-end encryption or self-destructing messages.

More secure options are:

  • Keybase Teams — Similar to Slack, but with end-to-end encryption and a self-destruct feature that completely removes messages from the conversation.
  • Riot — Built on the open-source Matrix protocol, Riot offers the best implementation of end-to-end encryption plus a user-friendly interface.
  • Wickr — Includes end-to-end encryption, auto-deletion of messages, and forensic deleting of content from your device.
  • Semaphor — A zero-knowledge messenger protected with end-to-end encryption and blockchain technology.

12. Educate Your Sources and Colleagues

The average person doesn’t know how to share confidential information in a secure way — and this includes your sources. It’s important that you show your contacts how they can protect any confidential files and communicate privately with encrypted messages and emails. Even if they already know, it’s in both of your best interests to discuss a standard operating procedure (SOP) before cooperating.

Explain to them that under no circumstances should they deviate from your SOP. It’s best to meet in person to avoid leaving any digital footprints — even if it’s just to set up their online safeguards.

Remember, even if your own online security is close to perfect, you may be vulnerable if your data leaks through other people. Your online security is only as strong as those in your circle of communication.

Lazy Security Costs Journalists — Protect Yourself Now

Every journalist needs to protect themselves online with strong security tools — from hackers, state-sponsored operatives, and others who actively work to prevent damning stories from being published.

Make sure you keep yourself, your colleagues, and your sources safe. By following these 12 steps to staying private online, you can keep your stories and investigative pieces secure until they’re ready to be published.


Head on over to Wizcase’s blog for the latest in cyber security!


Interested in having content featured in an upcoming blog post or issue of The Burgundy Zine? Head on over to the submissions page!

For all other inquiries, please fulfill a contact form.

Guest Content

Guest Content is the user to denote any and all articles submitted to us by fellow writers. More content submitted to us by guest contributors can be found under our "Guest Content" section. If you are interested in submitting content to The Burgundy Zine, please refer to our submissions page.

View more posts from this author