Digital Security 101: Are You and Your Sources Protected?

Español

With regular headlines about massive data hacks, everyone should be worried about digital security. But investigative journalists—who work with vulnerable sources and deal with sensitive information—may even be targeted.

At the Uncovering Asia 2018 conference in Seoul, Chris Walker, a digital security expert from Tactical Tech, shared key tips that journalists can implement today to protect themselves, their sources and their story.

Encrypt your devices

If you haven’t enabled disk encryption on your laptop, do it now. FileVault is preinstalled on recent Macs and can be activated by going to System Preferences, Security & Privacy, FileVault. Make sure it is turned on and never turn it off. For Windows, Walker recommends BitLocker, which is available for the “Pro” and “Enterprise” versions of Windows 10. (If you have Windows 10 Home, you can upgrade, but it’s not cheap.) Once activated, it encrypts the computer’s hard drive and can be used to encrypt attached USB devices.

Whichever operating system you use, be sure to stay on top of software updates.

Get a VPN 

A Virtual Private Network allows you to browse the web privately through a proxy, or intermediary, server. VPNs are typically subscription services and can be installed on smartphones as well. Do your research! VPN service providers in Europe are likely to offer more privacy protections than those in the U.S., for example. And know when to turn your VPN on and off (always “on” when using public and unsecured WiFi).

Depending on your threat level, location and activity, using the Tor Browser may be a better option. With VPN, you have to trust that the provider is not recording and sharing the list of websites you visit. Tor Browser is designed in such a way that even the Tor servers themselves do not have access to this information. It’s safer, but it does slow you down. As always, be sure you trust the Tor software you download.

Expert advice: depending on the desired level of security, use at least a VPN, and the Tor Browser as needed.

Protect your communications

Talking with sources? Download a safe messaging app like Signal or Wire, which offer free, encrypted messaging and voice calls.

Consider opening an email account with an encrypted, “walled garden” provider, such as Tutanota or ProtonMail, and advise your source to do the same. Want to keep using your current email account? Install the Mozilla Thunderbird email client, the Enigmail extension and the GnuPG encryption software (for Windows or Mac), and get comfortable with the extra steps necessary to protect your communications.

Get a real password

The tricks most people use for passwords are, well, pretty useless, according to Walker. Make your passwords long, make sure they’re not common phrases (i.e. from poems or song lyrics), and use a different one for each account. One trick is to choose seven random words and string them together into a single “passphrase.” Or try KeePassXC, which will generate passwords and store them for you in an encrypted database.

Not sure if your email address has been compromised in the numerous data breaches? Check the website Haveibeenpwned. When any online account gets compromised in a data breach, immediately change your password.

There is no such thing as complete security, but you can certainly raise your level of protection. For more tips and guidance, check out SecurityInaBox.org 


Roland Bednarz is a freelance journalist and chemical engineering student in Delft, Netherlands. He is part of the KAS journalism multimedia program.

 

Print Friendly, PDF & Email

Leave a Reply

Your email address will not be published. Required fields are marked *