Digital Safety Kit

Artwork: Jack Forbes

Artwork: Jack Forbes

Journalists face a wide range of digital threats and it’s increasingly important that they protect themselves and their sources by keeping up to date on the latest digital security news and threats such as hacking, phishing, and surveillance. Journalists should think about the information they are responsible for and what could happen if it falls into the wrong hands, and take measures to defend their accounts, devices, communications, and online activity.

This digital safety kit is designed to be a general starting point for journalists looking to increase their digital safety. For more detailed security advice, please see our Safety Notes. Journalists are encouraged to complete a risk assessment before starting their assignments.

Contents

Protect your online data

Protect your accounts

Protect against targeted phishing attacks

Device security

Encrypted communications

Secure internet use

Crossing borders

Protect your online data

Journalists are increasingly targeted by online abusers who comb the internet looking for personal data that can be used to threaten and intimidate them. Journalists are advised to review their online profile regularly and take steps to remove information where possible.

To better secure your online data:

Look yourself up online

Removing or restricting data

Other steps to be more secure

Other resources

More detailed information on protecting against online abuse can be found here: Resources for protecting against online abuse.

For editors interested in better protecting their staff against online abuse, please see our Editors’ checklist.

The Coalition Against Online Violence is a useful source for information for those looking to learn more. CPJ is a member of the coalition, a collection of global organizations working to find better solutions for women journalists facing online abuse, harassment, and other forms of digital attacks.

Protect your accounts

Journalists use a variety of online accounts that hold both personal and work-related information on themselves, their colleagues, families, and sources. Securing these accounts and regularly backing up and removing information will help protect that data.

Before signing up to a service

Before signing up for an online service, such as social media platforms, messaging apps, and email services, review the terms of service to find out who owns the company and where the company is based, and to understand what they are doing with your data. Understand how this could put you and your sources at risk if there is a data breach or a legal request for your data. This is especially important if you are using online services to communicate with or store data on sources, including social media, messaging apps, and interview transcribing services.

Review the transparency reports published by the technology companies you use to see which when and how they have replied to government requests to remove or hand over data.

Keep up to date with the latest information regarding the services you use. Be alert to any data breaches or changes of ownership that could indicate that the service is not as secure as it once was.

Secure your accounts

The most effective way to secure your accounts against hacking of your accounts is to turn on two-factor authentication (2FA). Two-factor authentication is an extra layer of security and is now offered by most online services. Turn it on for all your accounts where possible.

There are several forms of 2FA, and journalists should consider using an app, such as Authy, instead of SMS as their form of 2FA. Those at high risk of hacking should consider using a security key, such as a YubiKey.

All online services offering 2FA should also offer backup codes to use in case you are unable to access the account using your form of 2FA. These are one-time use codes that you can submit instead of receiving a code to your phone or app. Ensure you keep a copy of these backup codes. You can print them out and store them somewhere safe or keep them in your password manager.

In addition to 2FA, create long passwords of more than 16 characters. These should be a mixture of numbers, symbols, and letters. Do not reuse passwords or include in your password personal information that can easily be found online, such as your date of birth.

Consider using a password manager to help you manage your passwords. Research all password managers to see which is the best fit for you. Create a long unique password for your password manager.

Manage the content in your accounts

Protect against targeted phishing attacks

Journalists often have a public profile and share their contact details to solicit tips. Adversaries looking to access journalists’ data and devices can target them – or a colleague or family member – with phishing attacks in the form of tailored email, SMS, social media, or chat messages designed to trick the recipient into sharing sensitive information or installing malware by clicking on a link or downloading a file. There are many types of malware and spyware which range in sophistication, but the most advanced can grant a remote attacker access to the device and all of its contents.

To defend against phishing attacks:

Device security

Journalists use a wide range of devices to produce and store content, and to contact sources. Many journalists, especially freelancers, use the same devices at home as well as at work, potentially exposing a vast amount of information if the devices are lost, stolen, or taken. Journalists should encrypt computer hard drives, phones, tablets, and external storage devices, especially if they travel or are at high risk of having their devices seized, to ensure that others will not be able to access this information without a password.

Best practices to secure your devices

Encryption
  • Activate encryption for your computers. Mac users can enable FireVault, and Windows users can turn on Bitlocker. For Linux operating systems, turn on LUKS.
  • Before encrypting your computers, create a long password that is not used on any other account or device. This password should be at least 15 characters long and include a mixture of numbers, symbols, and letters, or a collection of words that are unrelated to each other.
  • Since 2014, iPhones have been encrypted by default. Android users will need to turn on encryption. This can be found by going to the settings sections and then to security>encrypt phone.
  • Be aware that someone with knowledge of your password or the power to compel you to decrypt your device will be able to look at the information. This can include law enforcement.
  • Always research the law to ensure encryption is legal in the country you are living in or traveling to.

Encrypted communications

Journalists can communicate with sources more securely using encrypted messaging apps or software that encrypts email so that only the intended recipient can read it. Encryption protects the content of messages, but the companies or organizations involved may be able to see the metadata, including when you sent the message, who received it, and other revealing details. Companies have different policies on what data they collect, how they store this data, and how they respond when authorities ask for it.

Recommended messaging apps offer end-to-end encryption by default, meaning that encryption does not have to be turned on by the user and that the information is encrypted when it is being sent from the sender to the recipient. End-to-end encryption means that information is also encrypted on the server of the company or organization, meaning that it cannot be legally subpoenaed. Be aware that anyone with access to a device sending or receiving the message or to the password of the account linked to the app can still intercept the message content. Examples of messaging apps with end-to-end encryption turned on by default include Signal and WhatsApp. Other apps may require you to turn on end-to-end encryption.

Metadata

Metadata is not the content of your communications, but the data linked to them. Examples of metadata include phone numbers, time stamps, and the duration of a call, among others. Metadata can be used to create a picture of who you communicate with. This information is often not encrypted and can be subpoenaed by law enforcement. If you are concerned about metadata, then you need to use an encrypted messaging service that collects as little data as possible.

Best practices for using end-to-end encrypted messaging apps

Advanced features for end-to-end encrypted messaging apps
  • Lock the app with a PIN or passcode where possible to better protect against someone opening the app if they have physical access to your phone.
  • Set up a registration lock, if the service offers one, to require anyone installing the app with your phone number to enter your PIN number.
  • Protect your phone number by creating a username for your Signal account. Give out your username instead of your phone number.
  • Some apps, including Signal and WhatsApp, provide an extra security step to verify who you are chatting with and prevent someone impersonating one of your contacts from another device. Look for the option to verify safety number or security code in the app settings.
  • Some services, like WhatsApp, back up your message content to the cloud account linked to the telephone number. You can turn on encryption for the cloud backup in the settings section of the app. Create a long and unique password for that backup. If you do not want to create a backup, you can turn off this option in the settings section. Be aware that if you uninstall the app and install it later, you will lose all the content stored within the app, including messages. For iOS users, be mindful that your call history on Signal syncs with iCloud. You can turn this off in the app settings.
  • Disappearing message functions on Signal and WhatsApp allow you to automatically delete messages after a certain time. Turn these on if you are concerned about your phone being taken and your messages being accessed.
  • Both Signal and WhatsApp offer the possibility to set photos and videos to delete after viewing them. It may be helpful to turn that on if you are sending sensitive images.
  • Signal and WhatsApp also offer end-to-end encryption for video calling.
  • If you are concerned about spyware attacks on your WhatsApp account, you should enable the WhatsApp security feature Strict Account Settings.

Best practices for using encrypted email

Using an encrypted email service is another way of ensuring that your communications are secure. There are a number of encrypted email providers that journalists can use. Some of these providers also offer other encryption services, such as cloud storage, calendar, and contacts. Examples of encrypted email providers include Proton Mail, Tuta Mail, and Mailvelope for Gmail.

If you are using an encrypted email service and sending an email to someone who is using the same service, the contents of that message will be encrypted automatically. If you need to email someone using a different email service, then you will have to turn on encryption, requiring the other person to use a password to open the email. It is important to bear in mind that even though your emails are encrypted, the service provider may still hold the metadata, including the subject of the email and the address of the receiver, among others. Review the terms and conditions carefully to understand what data is and is not encrypted.

Using the internet more securely

Journalists rely on the internet for carrying out research, which can leave them and their sources vulnerable if they do not take steps to protect themselves. Internet service providers, governments, companies, and criminals collect data on internet users which can be used to target them, including building legal cases against them.

To use the internet more securely:
Artwork: Jack Forbes

Crossing borders

Many journalists cross borders carrying work and personal information that they may not want others to access on electronic devices. If border guards take a device out of your sight they have an opportunity to search it, access any accounts, copy information, or install spyware. Journalists crossing U.S. borders should consult CPJ’s safety note, “Nothing to Declare.”

Before you travel:
At the border:

If any device is confiscated at the border or anything is inserted into it, assume it is compromised and that any information on it has been copied.

Editors’ note: This kit was originally published on July 30, 2019, and reviewed for accuracy on the date shown at the top.

Exit mobile version