Investigative Journalists and Digital Security

Perceptions of Vulnerability and Changes in Behavior

Most Investigative Journalists Believe the U.S. Government Collected Data About Their CommunicationsAbout two-thirds of investigative journalists surveyed (64%) believe that the U.S. government has probably collected data about their phone calls, emails or online communications, and eight-in-ten believe that being a journalist increases the likelihood that their data will be collected. Those who report on national security, foreign affairs or the federal government are particularly likely to believe the government has already collected data about their electronic communications (71% say this is the case), according to a new survey of members of Investigative Reporters and Editors (IRE) – a nonprofit member organization for journalists – by the Pew Research Center in association with Columbia University’s Tow Center for Digital Journalism.1

Thus far, concerns about surveillance and hacking have mostly fallen short of keeping many journalists from pursuing a story or a source; Just 14% say that in the past 12 months, such concerns have kept them from pursuing a story or reaching out to a particular source, or have led them to consider leaving investigative journalism altogether.

Stories Still Pursued; Some Change in Security PracticesStill, these concerns have led many of these journalists to alter their behavior in the past 12 months. Nearly half (49%) say they have at least somewhat changed the way they store or share sensitive documents, and 29% say the same of the way they communicate with other reporters, editors or producers.

And among the 454 respondents who identify as reporters, 38% say that in the past year they have at least somewhat changed the way they communicate with sources.

Most Investigative Journalists Have Little Confidence That ISPs Can Protect Their DataWhen it comes to external protection from digital threats like surveillance and hacking, these investigative journalists do not put much stock in their internet service providers (referred to as ISPs). Just 2% have “a lot of confidence” their ISP can protect their data from being accessed by unauthorized parties, while 71% have not much or no confidence at all.

Journalists Split on How Well Their Organizations Protect Them Against Surveillance and HackingNews organizations get mixed reviews for their ability to protect the security of their employees’ communications. Among those who work for news organizations (589 of the 671 journalists surveyed), half say their employer is not doing enough to protect journalists and their sources from surveillance and hacking, while about the same share (47%) says they are doing enough. Just 21% say their organization has taken steps or implemented policies in the past year to protect journalists and their sources, while 36% say their organization has not, and 42% do not know. About half (54%) report getting no formal training or instruction on electronic security issues from professional sources such as journalism associations, news organizations or journalism schools.

Still, other issues are more pressing for the profession than surveillance and hacking. When asked to rank four challenges facing journalists today, an overwhelming majority (88%) of journalists identify decreasing resources in newsrooms as their top concern. No other issue comes close. Following far behind are: legal action against journalists (5%), electronic surveillance by governments or corporations (4%) and hacking targeted at journalists or news organizations (1%). Furthermore, relatively few journalists (27%) have spent at least “some time” in the past 12 months researching how to improve their electronic security.

Overall, these data paint a complex picture in which investigative journalists on the whole feel vulnerable to surveillance and hacking, but not to the degree that most are changing their journalistic practices dramatically or investing energy into figuring out how to do so. And nearly all of those surveyed (97%) say that for today’s journalists, the benefits of digital communication like email and cellphones outweigh the risks. Just 3% say the risks outweigh the benefits.

About This Survey

The analysis in this report is based on an online survey conducted from December 3-28, 2014, with a representative sample of 671 journalists who are members of Investigative Reporters and Editors, Inc. (IRE). The 671 investigative journalists include a mix of reporters, producers, editors, data specialists, photojournalists and others, and comprise a wide range of coverage areas.

The survey was written and analyzed by Pew Research Center staff, and field work was conducted by Princeton Survey Research Associates International (PSRAI). Email invitations containing individualized survey links to access the online study were sent to 2,723 investigative journalists in the United States who are members of IRE. Journalists also had the option of returning a print version of the survey through the mail. For more detailed information, see the Methodology section.

http://www.journalism.org/2015/02/05/investigative-journalists-and-digital-security/

Advertisements

15 thoughts on “Investigative Journalists and Digital Security”

  1. “I have noticed repeatedly that when a document is displayed on the monitors, the jurors sit up and pay attention. portfolio of works spans a bit further than that of Pixar. Though word has it that their animation works is inspired by Western culture, I beg to differ as most of what they have done is based on their beliefs and cultures.

    Like

  2. I don’t see it that way though: in terms of a marketing gimmick.
    Pixar and Dreamworks are just two of the most popular
    and famous studios, both offering outstanding quality besides their huge experience.
    More key frames are specified for intricate motions than for simple, slowly varying
    motions.

    Like

  3. If you were using a Digital still camera you will
    need to copy the images (normally in JPEG format) over to your PC to
    import in to your stop motion software. Design the static (non animated) part
    of your card first. And therefore they cannot see such important sides of resource
    as banners, animated buttons, menus etc.

    Like

  4. Greetings from Los angeles! I’m bored to tears at work so I decided to browse your website
    on my iphone during lunch break. I love the information you provide here
    and can’t wait to take a look when I get home. I’m surprised
    at how quick your blog loaded on my phone ..
    I’m not even using WIFI, just 3G .. Anyhow, wonderful site!

    Like

  5. One of more innovative features of the i30 is that all of its controls provide voice feedback so you know what you just selected or activated.

    For a luau theme, use grass skirts to “dress” the table and chairs.

    A quirky mechanical drawing toy manufactured by the
    Ohio Art Company captured the imagination of the entire baby boom generation, and today
    resides in the hall of fame (or should anyway), and remains
    one of the best-known of the all-time classic toys and games.

    Like

  6. * The Nintendo 3DS can (and probably) a Game – Changer in the video
    game industry, in the same way the Wii and DS have been. Finally, one of the big surprises that I have been looking at sales numbers game is like Apple
    is getting slightly in the industry as a major player.
    Consumers should feel the rush of combat in the psp system for the psp games working
    with 16 multiplayer matches getting completed with enhanced stat tracking in the market.

    Like

  7. Knight Exemplar seems like it would fit right in with a crusade against the scaly scourge, along with plenty of anti-dragon avengers
    like Southern Paladin and Dragonstalker. She is still young, of course, and it
    isn’t clear how long she can stay a dragon’s princess. For instance instead of
    a trip to Jerusalem, why not call it a ‘trip to Hogwarts.

    Like

  8. ” It works like this: Once you’ve set your goals, it’s fairly easy to come up with a list of daily habits, behaviors and action steps you’ll need to take to reach your goal. The ways of the dragon can be summarized in 5 words (Confusion, Deception, Manipulation, Fear & Force) representing the strategies for how the dragons gain power. But people study martial arts for a variety of reasons.

    Like

  9. Wow, this is one artist who is very loving and sexy
    plump body of hers. But it is only those masking sounds that are actually “noticeable. You can find video, movies, TV shows, audio books, radio programs and…Podcasts.

    Like

  10. Just after the code has been confirmed, then all is set and a single is ready to down load, browse,
    acquire, and absolutely delight in these high quality expert services.
    from WMV movies or WMV TELEVISION SET shows on Mac for i
    – Pod shuffle, i – Pod effect, i – Pod nano, and
    so forth. Then you need to go to “app” page and check the apps you want to sync.

    Like

  11. ‘Our motivation behind the release was to raise the public
    awareness around the issue, and also put
    public pressure on Snapchat to get this exploit fixed,’ they
    said. Many concerned companies are looking to take some strong measures against this lethal threat, however, the situation still does not look too
    pleasing. We spoke with a developer, Alex Forbes-Reed, who says he had rebuff mess recently reverse-engineering Snapchat’s API representing his own relevance, and he suspects it was tranquil representing engineers by Snap – Saved, the source of the allegedly stolen photos, to accomplish the same gadget.

    Like

  12. On Saturday, the Gold Coast Derby Girls will hold a
    flat track derby bout at Gold Coast Skating Rink, 2604
    S. This bout will take place at Sk8away, 815 SW Fairlawn in Topeka,
    Kansas. This bout will take place at the North Florida Fairgrounds, Building 2 in Tallahassee, Florida.

    Like

Comments are closed.