CPJ Blog

Press Freedom News and Views

Internet

Blog   |   China, Internet

China doubles down on counterproductive censorship

In a move unlikely to surprise those who access the Internet from mainland China, the country's Ministry of Industry and Information Technology recently blocked several popular tools used to bypass the "Great Firewall" national Internet censorship system. Citing the need to protect "cyberspace sovereignty" and to "maintain cyber security and steady operation," the Ministry changed firewall rules to block three increasingly popular commercial virtual private network (VPN) services.

January 28, 2015 5:15 PM ET

Tags:

Blog   |   Internet, UK

Classifying media and encryption as a threat is danger to press freedom

The U.K. prides itself on its commitment to free expression, but the latest revelations of surveillance of journalists and calls by Britain's Prime Minister, David Cameron, to ban secure messaging belie the country's drift toward a more restrictive environment for the press. The revelations further underscore the threat surveillance by Western democracies poses to journalism, a threat that prompted the Committee to Protect Journalists' Right to Report in the Digital Age campaign.

Blog   |   Internet

'Spear phishing' attacks underscore necessity of digital vigilance

The revelation that the FBI sent a fake Associated Press story containing malware to a teenager suspected of making bomb threats has brought "spear phishing" back into the public consciousness. The technique, which combines malicious software with social cues tailored to the target, has been used by state and non-state actors to attack journalists and rights advocates, including the Committee to Protect Journalists. Spear phishing can be devastatingly effective, but there are simple steps journalists can take to protect their work, themselves, and their sources.

Blog   |   Internet

How Facebook's Tor hidden service improves safety for journalists

Facebook announced on October 31 that it has made it easier and safer for users to gain access to its social network by using a dedicated Tor hidden service at https://facebookcorewwwi.onion. A dedicated hidden service access point is a powerful move to protect journalists and anyone else who uses Tor to protect privacy or circumvent censorship.

November 5, 2014 5:46 PM ET

Tags:

Blog   |   Internet

For journalists coming into US, policies border on the absurd

CPJ's internet advocacy coordinator Geoffrey King documented his experiences of being stopped at the U.S. border in a notebook. (Geoffrey King)

I was only supposed to be in Miami for the briefest of layovers. I was en route to San Francisco from São Paulo in Brazil, where I had participated in the NETMundial Conference on Internet governance along with hundreds of members of civil society, technology executives, journalists, and government officials. It was going to be a tight connection even if things had gone smoothly, but I was not free to leave. Someone wanted to ask me some questions, noted the U.S. Customs and Border Protection (CBP) officer holding my well-worn passport. Go stand against that wall, he told me, dropping my passport into a box attached to his booth: someone will be by to collect you.

October 28, 2014 6:01 PM ET

Tags:

Blog   |   Internet

How resistance to encryption jeopardizes journalism

FBI Director James B. Comey, pictured right with outgoing Attorney General Eric Holder in June, says FBI efforts to fight crime are being thwarted by moves to protect user privacy. (Alex Wong/Getty Images/AFP)

Earlier today, the Brookings Institution hosted a discussion with FBI Director James B. Comey, who made the case that steps taken by Apple and Google to protect user privacy were damaging the FBI's efforts to fight crime and safeguard U.S. national security. The discussion was due to take place hours before Apple launched its latest iPads, which benefit from the updated security features of the new iOS 8 operating system.

October 16, 2014 5:08 PM ET

Tags:

Blog   |   Internet

Simple steps to protect journalists and sources from eavesdroppers

Journalists are among those most likely to face technical attempts at attack and interception. Reporting is based on discussions with sources who may want to remain out of the limelight, and news sites attract extensive readership, making them a desirable target for potential attackers. But there are simple steps to protect against the most common form of eavesdropping, and journalists should be aware of the types of technical adversaries they may face.

October 16, 2014 10:23 AM ET

Tags:

Blog   |   Internet

How automatic encryption ensures safety by default

Apple chief executive Tim Cook reveals the iPhone 6 and Apple Watch in September. Apple's latest software includes automatic encryption. (Getty Images/AFP/Justin Sullivan)

The year is 1991, the month April. EMF is playing on the radio. The term "cyberspace" has existed for only half a decade. The world wide web won't exist for another four months. The software engineer Linus Torvalds has only just started work on the Linux operating system. The fastest computer you can own has a 50 Mhz processor. Yes *megahertz*, with a *M*.

October 2, 2014 11:51 AM ET

Tags:

Blog   |   CPJ, Ethiopia, Internet, Russia, Security, Thailand, Turkey, USA

No press freedom without Internet freedom

Four years ago, when CPJ launched its Internet Advocacy program, we were met with lots of encouragement, but also some skepticism.

"Why do you need a program to defend the Internet?" one supporter asked. "You don't have a special program to defend television, or radio, or newspapers."

But the Internet is different. Increasingly, when it comes to global news and information the Internet is not a platform. It is the platform.

Blog   |   Internet, UK

Rushed data legislation would give UK worrying surveillance powers

The British government's attempt to rush through a bill on data retention before the House of Commons summer recess next week has run into opposition--not from members across the aisle but from Internet companies, civil liberty defenders, and lawyers, who say the law would extend the authorities' already vast snooping capabilities.

More documents on Internet »

Social Media

View all »