Deep Web for Journalists - Comms, Counter-Surveillance, Search

Deep Web for Journalists - Comms, Counter-Surveillance, Search

Language: English

Pages: 107


Format: PDF / Kindle (mobi) / ePub

Deep Web for Journalists - Comms, Counter-Surveillance, Search

Language: English

Pages: 107


Format: PDF / Kindle (mobi) / ePub

Journalism has been transformed by the Internet and the Internet has opened journalists to levels of surveillance that would have horrified George Orwell. All journalists should be aware of the dangers they face in the digital world – the emerging battleground.

Being a journalist in 2015 is more dangerous than it ever was. In addition to the usual threats, beatings, murders and war casualties, we are now being actively targeted online by intelligence agencies, law enforcement and others.

These days it is not just journalists working in repressive regimes that need worry. We now know that the US and its cyber-allies – Britain, Canada, Australia and New Zealand – actively monitor domestic journalists in their mass surveillance of the Internet.

Edward Snowden has warned journalists that they are special targets and he has expressed surprise that news organizations rarely have any counter-measures in place.

They harvest our contacts and monitor our telephone logs. They read our emails and texts. They follow our every move online and they keep tabs on every line we write.

But it is not just intelligence agencies and law enforcement that we should worry about. All kinds of people have a vested interest in knowing about your next story – individual criminals and criminal organizations, political parties and extremist groups, law firms and the corporate giants.

Large business interests have their own intelligence units. They know what is being said about them and by whom. They keep track of their competitors and they know when somebody starts asking awkward questions about them.

If big business or anyone wanted to destroy a journalist’s reputation this is simplicity itself.

The key is not to attract attention in the first place, and to learn to operate beneath the radar.

But how can journalists safeguard their sources and communicate without being overheard? How can they conduct sensitive research without having to watch their backs?

This book will show how to block intruders, set up secure communications, mask your identity online and browse and download anonymously, and store any amount of data without leaving a trace.

If that wasn't enough, the Deep Web is also a largely-unknown research and information resource. If you know the right entry points, you can mine a rich seam of multimedia files, images, software and documents that you cannot find on the Surface Web.

Deep Web for Journalists “offers an uncompromising diagnosis of the perils of online communications and should shatter the confidence many of us place in the unguarded ways of working online,” says Jim Boumelha, President of International Federation of Journalists in his Foreword to the book.

Journalist, broadcaster and author Alan Pearce has covered conflicts from the Khmer Rouge to the Taliban for the BBC and Time Magazine, among others. He now teaches cyber-security skills and counter-surveillance to journalists.

“The work of journalism has become immeasurably harder than it ever has been in the past. Journalists have to be particularly conscious about any sort of network signalling, any sort of connection, any sort of licence plate reading device that they pass on their way to a meeting point, any place they use their credit card, any place they take their phone, any email contact they have with the source - because that very first contact, before encrypted communications are established, is enough to give it all away.” – Edward Snowden 17 July 2014 in The Guardian.

Morning Miracle: Inside the Washington Post - A Great Newspaper Fights for Its Life

Thinking Clearly: Cases in Journalistic Decision-Making

A Russian Diary: A Journalist's Final Account of Life, Corruption, and Death in Putin's Russia

Blur: How to Know What's True in the Age of Information Overload

Left Turn: How Liberal Media Bias Distorts the American Mind

The Kingdom of New York: Knights, Knaves, Billionaires, and Beauties in the City of Big Shots



















Vinegar On My Fish And Chips can be written as ILLOVOMFAC. You could add to this numbers and non-alphanumeric characters and a mix of upper and lower case. If you have a UK-English keyboard, use the � symbol for its rarity value. Therefore, �ILLOVOMfac! could stand as your basic passphrase and then add on an identifier such as �ILLOVOMfac!Am@z for Amazon. You might also choose a line from a favorite poem or a passage from a book. This, in turn, can also be used as a means of passing on a

Windows, because it is designed for the mass market, is an inherently insecure operating system that runs a lot of unnecessary services that can put your computer at risk. As a result, it is best to disable any unused services. Doing so will also help increase the speed of your computer.          First, open the Computer Management window          Right-click My Computer          Click Manage          Expand Services and Applications          Select Services/Standard tab If any

browse the network.          Distributed Link Tracking Client — Disable if you are not on a network. This is only applicable when you use the NTFS file system. If you don't, you can switch off this service.          Error Reporting Service — Disable. This reports system errors to Microsoft.          Fax Service — Disable if you do not use the internal fax machine.          Help and Support — set to Manual.          Human Interface Device Access — Disable.          IPSEC Services

sites and media sources. Business Search          FT Search — search the Financial Times’ archives, company profiles and business news with over 10 million full-text articles from 2,000 different European, Asian and American business sources. US$10 per month.          TechRepublic — the web’s largest library of free technical IT white papers, webcasts and case studies. Covering data management, IT management, networking, communications, enterprise applications, storage, security, etc.

TorStatusNet http://lotjbov3gzzf23hc.onion/ — Twitter clone on Tor.          TorBook http://ay5kwknh6znfmcbb.onion/torbook/ — like Facebook but Deep.          TorSquare http://ay5kwknh6znfmcbb.onion/torsquare/ — anonymous board, share posts and discussions with TorBook’s public square.          TorProject Users Group http://lotjbov3gzzf23hc.onion/index.php/group/tor — micro-blogging service that allows users to share short messages.          Project X Group

Download sample