SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
DIGITAL NEWSROOMS
BULLETPROOFING
•  JORGE LUIS SIERRA
•  KNIGHT INTERNATIONAL JOURNALISM FELLOW
•  INTERNATIONAL CENTER FOR JOURNALISTS
HOW TO
PRODUCE HIGH
RISK STORIES
IN HIGH RISK
ZONES
PHYSICAL ATTACKS
RESTRICTIVE LAWS
LEGAL AGGRESSION
CENSORSHIP
ESPIONAGE
CYBERSTTACKS
HOW TO STAY
SAFE?
SECURITY STRATEGY = RISK ANALYSIS
KNOW THE TARGET – BE MORE EXPENSIVE
KNOW THE AREA – MAPPING RISK
KNOW YOURSELF – RISK ASSESSMENT – USE SALAMA.IO
BULLET-PROOF YOURSELF – SECURITY PROTOCOLS, NETWORKS
BULLET-PROOF YOUR STORY – STRONG VERIFICATION
BULLET-PROOF YOUR NEWSROOM – PHYSICAL -- DIGITAL
USE SALAMA.IO
RISK ASSESSMENT
RISK ANALYSIS
BULLET-PROOF YOURSELF
▸  What is my risk score? Use Salama:
https://salama.io/
▸  What are my main vulnerabilities and capacities?
▸  Is there something in my personal life that can make me
vulnerable?
▸  Do I need additional training to do this story?
▸  What is the support of my media organization?
DIGITAL NEWSROOM
BULLER-PROOF
RISK ANALYSIS
BULLET-PROOFING THE DIGITAL NEWSROOM
▸  Protect your information: Confidentiality, Integrity,
Accessibility
▸  What are the vulnerabilities= pentesting, Salama.io
▸  What are the organizational capacities?
▸  Analyze adversaries (governments, spies, criminals?)
▸  Design a security strategy and support a budget
▸  Security policy, best practices and technologies
▸  OWASP and ISO 27001
KNOW THE AREA
MAPPING RISK
RISK ANALYSIS
UNDERSTAND YOUR AREA
▸  Are there patterns of attack to journalists and media
organizations?
▸  Are violent actors holding territory? = http://www.osrx.org/
▸  Are there organized crime gangs operating in the area?
▸  Do terrorist organizations have operations there?
▸  What is the relationship of local governments with
journalists and media organizations?
STORY
BULLETPROOF YOUR
HOLISTIC APPROACH
PROTECT YOUR STORY
▸  Use full verification methods
▸  Careful selection of sources
▸  Verify authenticity of your documents
▸  Verify every piece of data, name, date
▸  Investigate what denies your hypothesis
▸  Give your target the right to speak
TEAMWORKER
BECOME A
HOLISTIC APPROACH
LEARN HOW TO WORK WITH OTHERS
▸  Set up a good communication with your editor
▸  Ask advice to other colleagues
▸  Plan well ahead your story with your editors, data analysts,
multimedia designers
▸  Keep your family and friends informed
▸  Connect to human rights organizations
EXPENSIVE
BE YOURSELF MORE
HOLISTIC APPROACH
UNDERSTAND THE RELATION WITH THE TARGET
▸  The target will analyze what is more expensive: to attack
or not to attack you
▸  The more professional and prepared you are, the more
expensive you will be
▸  Enhance your capacities, get support from your
community, connect to your audiences
▸  Being more expensive is a good way to deter attacks
NETWORK
EXPAND YOUR
HOLISTIC APPROACH
SECURITY IS A COLLECTIVE ACTION
▸  Create networks of support or become
part of one
▸  Use social media to increase your
profile
▸  Participate in your own community
▸  Use the Reporta app
PROTOCOLS
SET YOUR
HOLISTIC APPROACH
ALWAYS OPERATE TO REDUCE RISK
▸  Check in often with your network of support
▸  Encrypt all your devices and sensitive information
▸  Use encryption to communicate with sources
▸  Organize all the community around you to act
quickly in case of an emergency
▸  Keep your distance with sources
HARM
REDUCE
HOLISTIC APPROACH
REDUCE HARM TO YOUR TARGET
▸  Always try to minimize the harm you will cause to the
target of your investigation
▸  Include the target's points of view, if possible
▸  Always publish only verified information
IF YOU HAVE QUESTIONS OR
NEED MORE ADVICE, DON'T
HESITATE TO CONTACT ME
Jorge Luis Sierra @latinointx
MY CONTACT INFORMATION

Weitere ähnliche Inhalte

Ähnlich wie Bulletproofing digital newsrooms

Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
 
Nicholas Bruneau Presentation at StratCom 2023
Nicholas Bruneau Presentation at StratCom 2023Nicholas Bruneau Presentation at StratCom 2023
Nicholas Bruneau Presentation at StratCom 2023Nicholas Bruneau
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceSyed Peer
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Morakinyo Animasaun
 
Surveying The Landscape
Surveying The LandscapeSurveying The Landscape
Surveying The LandscapeLisa Pollack
 
National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...
National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...
National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...Naveen Ashish
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
Threat and risks management absg2
Threat and risks management absg2Threat and risks management absg2
Threat and risks management absg2Martin Brown
 
2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...
2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...
2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...jmkurtz
 
Computational Social Science: Programming Skills for Social Scientists
Computational Social Science: Programming Skills for Social ScientistsComputational Social Science: Programming Skills for Social Scientists
Computational Social Science: Programming Skills for Social ScientistsJames Allen-Robertson
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
Talk to the hand - Improving public safety outcomes with risk comms (Ronda O...
Talk to the hand  - Improving public safety outcomes with risk comms (Ronda O...Talk to the hand  - Improving public safety outcomes with risk comms (Ronda O...
Talk to the hand - Improving public safety outcomes with risk comms (Ronda O...Learning Manager
 
How to Master Science Crowdfunding
How to Master Science CrowdfundingHow to Master Science Crowdfunding
How to Master Science CrowdfundingKatja Reuter, PhD
 
Tweet, Tweet, Ping, Ping Social Media Strategies For Insurance
Tweet, Tweet, Ping, Ping   Social Media Strategies For InsuranceTweet, Tweet, Ping, Ping   Social Media Strategies For Insurance
Tweet, Tweet, Ping, Ping Social Media Strategies For InsuranceSt. Nick Media Services
 
powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxdeveraralph2
 

Ähnlich wie Bulletproofing digital newsrooms (20)

Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
Nicholas Bruneau Presentation at StratCom 2023
Nicholas Bruneau Presentation at StratCom 2023Nicholas Bruneau Presentation at StratCom 2023
Nicholas Bruneau Presentation at StratCom 2023
 
Up your Infosec game
Up your Infosec gameUp your Infosec game
Up your Infosec game
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
DWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for NonprofitsDWP Cybersecurity 101 for Nonprofits
DWP Cybersecurity 101 for Nonprofits
 
Surveying The Landscape
Surveying The LandscapeSurveying The Landscape
Surveying The Landscape
 
National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...
National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...
National Preparedness, Lawbreaker Identification, Patient Engagement, Discove...
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Threat and risks management absg2
Threat and risks management absg2Threat and risks management absg2
Threat and risks management absg2
 
2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...
2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...
2011 SLA Annual Conference & INFO-EXPO: Novel Applications for TD Bank\'s...
 
Computational Social Science: Programming Skills for Social Scientists
Computational Social Science: Programming Skills for Social ScientistsComputational Social Science: Programming Skills for Social Scientists
Computational Social Science: Programming Skills for Social Scientists
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
Talk to the hand - Improving public safety outcomes with risk comms (Ronda O...
Talk to the hand  - Improving public safety outcomes with risk comms (Ronda O...Talk to the hand  - Improving public safety outcomes with risk comms (Ronda O...
Talk to the hand - Improving public safety outcomes with risk comms (Ronda O...
 
How to Master Science Crowdfunding
How to Master Science CrowdfundingHow to Master Science Crowdfunding
How to Master Science Crowdfunding
 
Tweet, Tweet, Ping, Ping Social Media Strategies For Insurance
Tweet, Tweet, Ping, Ping   Social Media Strategies For InsuranceTweet, Tweet, Ping, Ping   Social Media Strategies For Insurance
Tweet, Tweet, Ping, Ping Social Media Strategies For Insurance
 
powerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptxpowerpointpresentThreat Actor Groups.pptx
powerpointpresentThreat Actor Groups.pptx
 

Mehr von Jorge Luis Sierra

Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeManual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeJorge Luis Sierra
 
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Jorge Luis Sierra
 
Manual de seguridad digital y móvil
Manual de seguridad digital y móvilManual de seguridad digital y móvil
Manual de seguridad digital y móvilJorge Luis Sierra
 
Cómo encriptar tu celular Android
Cómo encriptar tu celular AndroidCómo encriptar tu celular Android
Cómo encriptar tu celular AndroidJorge Luis Sierra
 
Caja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalCaja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalJorge Luis Sierra
 
Protege tu comunicación digital
Protege tu comunicación digitalProtege tu comunicación digital
Protege tu comunicación digitalJorge Luis Sierra
 
Evaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroEvaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroJorge Luis Sierra
 
Evaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzEvaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzJorge Luis Sierra
 
Policías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzPolicías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzJorge Luis Sierra
 
Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Jorge Luis Sierra
 
Cómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultCómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultJorge Luis Sierra
 
Cómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailCómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailJorge Luis Sierra
 
Protección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetProtección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetJorge Luis Sierra
 
Protección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñasProtección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñasJorge Luis Sierra
 
How to encrypt word documents
How to encrypt word documentsHow to encrypt word documents
How to encrypt word documentsJorge Luis Sierra
 

Mehr von Jorge Luis Sierra (20)

Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chromeManual para pgp con gpg suite para computadoras mac y mailvelope para chrome
Manual para pgp con gpg suite para computadoras mac y mailvelope para chrome
 
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
Manual con pantallas para pgp con kleopatra y mailvelope version 1.0
 
Manual de seguridad digital y móvil
Manual de seguridad digital y móvilManual de seguridad digital y móvil
Manual de seguridad digital y móvil
 
Cómo encriptar tu celular Android
Cómo encriptar tu celular AndroidCómo encriptar tu celular Android
Cómo encriptar tu celular Android
 
Caja de herramientas de seguridad digital
Caja de herramientas de seguridad digitalCaja de herramientas de seguridad digital
Caja de herramientas de seguridad digital
 
Protege tu comunicación digital
Protege tu comunicación digitalProtege tu comunicación digital
Protege tu comunicación digital
 
How to use anonymox
How to use anonymoxHow to use anonymox
How to use anonymox
 
Spear phishing attacks
Spear phishing attacksSpear phishing attacks
Spear phishing attacks
 
Evaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en GuerreroEvaluación de Riesgos para Periodistas en Guerrero
Evaluación de Riesgos para Periodistas en Guerrero
 
Evaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en VeracruzEvaluación de Riesgos para Periodistas en Veracruz
Evaluación de Riesgos para Periodistas en Veracruz
 
Policías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de VeracruzPolicías y agresores de civil agreden a periodistas de Veracruz
Policías y agresores de civil agreden a periodistas de Veracruz
 
Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet Protege tus comunicaciones con Jitsi meet
Protege tus comunicaciones con Jitsi meet
 
Cómo usar peerio
Cómo usar peerioCómo usar peerio
Cómo usar peerio
 
Cómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVaultCómo encriptar tu computadora con FileVault
Cómo encriptar tu computadora con FileVault
 
Cómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmailCómo abrir una cuenta de hushmail
Cómo abrir una cuenta de hushmail
 
Cómo encriptar emails
Cómo encriptar emailsCómo encriptar emails
Cómo encriptar emails
 
Protección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internetProtección de la privacidad y navegación anónima en internet
Protección de la privacidad y navegación anónima en internet
 
Protege tu móvil
Protege tu móvilProtege tu móvil
Protege tu móvil
 
Protección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñasProtección de equipos, documentos y contraseñas
Protección de equipos, documentos y contraseñas
 
How to encrypt word documents
How to encrypt word documentsHow to encrypt word documents
How to encrypt word documents
 

Kürzlich hochgeladen

Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...narsireddynannuri1
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Delhi Call girls
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Delhi Call girls
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...hyt3577
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.pptsammehtumblr
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkobhavenpr
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...Diya Sharma
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)Delhi Call girls
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...srinuseo15
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Tableget joys
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackPsychicRuben LoveSpells
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...Faga1939
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceDelhi Call girls
 

Kürzlich hochgeladen (20)

Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
Nurturing Families, Empowering Lives: TDP's Vision for Family Welfare in Andh...
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Palam Vihar (Gurgaon)
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 46 (Gurgaon)
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt1971 war india pakistan bangladesh liberation.ppt
1971 war india pakistan bangladesh liberation.ppt
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Chaura Sector 22 ( Noida)
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
Julius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the TableJulius Randle's Injury Status: Surgery Not Off the Table
Julius Randle's Injury Status: Surgery Not Off the Table
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Iffco Chowk Gurgaon >༒8448380779 Escort Service
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 

Bulletproofing digital newsrooms

  • 1. DIGITAL NEWSROOMS BULLETPROOFING •  JORGE LUIS SIERRA •  KNIGHT INTERNATIONAL JOURNALISM FELLOW •  INTERNATIONAL CENTER FOR JOURNALISTS
  • 2. HOW TO PRODUCE HIGH RISK STORIES IN HIGH RISK ZONES
  • 3. PHYSICAL ATTACKS RESTRICTIVE LAWS LEGAL AGGRESSION CENSORSHIP ESPIONAGE CYBERSTTACKS
  • 5. SECURITY STRATEGY = RISK ANALYSIS KNOW THE TARGET – BE MORE EXPENSIVE KNOW THE AREA – MAPPING RISK KNOW YOURSELF – RISK ASSESSMENT – USE SALAMA.IO BULLET-PROOF YOURSELF – SECURITY PROTOCOLS, NETWORKS BULLET-PROOF YOUR STORY – STRONG VERIFICATION BULLET-PROOF YOUR NEWSROOM – PHYSICAL -- DIGITAL
  • 7.
  • 8. RISK ANALYSIS BULLET-PROOF YOURSELF ▸  What is my risk score? Use Salama: https://salama.io/ ▸  What are my main vulnerabilities and capacities? ▸  Is there something in my personal life that can make me vulnerable? ▸  Do I need additional training to do this story? ▸  What is the support of my media organization?
  • 10. RISK ANALYSIS BULLET-PROOFING THE DIGITAL NEWSROOM ▸  Protect your information: Confidentiality, Integrity, Accessibility ▸  What are the vulnerabilities= pentesting, Salama.io ▸  What are the organizational capacities? ▸  Analyze adversaries (governments, spies, criminals?) ▸  Design a security strategy and support a budget ▸  Security policy, best practices and technologies ▸  OWASP and ISO 27001
  • 12. RISK ANALYSIS UNDERSTAND YOUR AREA ▸  Are there patterns of attack to journalists and media organizations? ▸  Are violent actors holding territory? = http://www.osrx.org/ ▸  Are there organized crime gangs operating in the area? ▸  Do terrorist organizations have operations there? ▸  What is the relationship of local governments with journalists and media organizations?
  • 14. HOLISTIC APPROACH PROTECT YOUR STORY ▸  Use full verification methods ▸  Careful selection of sources ▸  Verify authenticity of your documents ▸  Verify every piece of data, name, date ▸  Investigate what denies your hypothesis ▸  Give your target the right to speak
  • 16. HOLISTIC APPROACH LEARN HOW TO WORK WITH OTHERS ▸  Set up a good communication with your editor ▸  Ask advice to other colleagues ▸  Plan well ahead your story with your editors, data analysts, multimedia designers ▸  Keep your family and friends informed ▸  Connect to human rights organizations
  • 18. HOLISTIC APPROACH UNDERSTAND THE RELATION WITH THE TARGET ▸  The target will analyze what is more expensive: to attack or not to attack you ▸  The more professional and prepared you are, the more expensive you will be ▸  Enhance your capacities, get support from your community, connect to your audiences ▸  Being more expensive is a good way to deter attacks
  • 20. HOLISTIC APPROACH SECURITY IS A COLLECTIVE ACTION ▸  Create networks of support or become part of one ▸  Use social media to increase your profile ▸  Participate in your own community ▸  Use the Reporta app
  • 22. HOLISTIC APPROACH ALWAYS OPERATE TO REDUCE RISK ▸  Check in often with your network of support ▸  Encrypt all your devices and sensitive information ▸  Use encryption to communicate with sources ▸  Organize all the community around you to act quickly in case of an emergency ▸  Keep your distance with sources
  • 24. HOLISTIC APPROACH REDUCE HARM TO YOUR TARGET ▸  Always try to minimize the harm you will cause to the target of your investigation ▸  Include the target's points of view, if possible ▸  Always publish only verified information
  • 25. IF YOU HAVE QUESTIONS OR NEED MORE ADVICE, DON'T HESITATE TO CONTACT ME Jorge Luis Sierra @latinointx MY CONTACT INFORMATION