Daily Bulletin

Men's Weekly

.

  • Written by The Conversation
imageWould reporter Bob Woodward have been able to protect Deep Throat’s identity from today's surveillance tools?Reuters/Alex Gallardo

Washington Post reporter Bob Woodward famously used cloak and dagger methods to communicate with his secret source – “Deep Throat” – in the 1972 Watergate investigation which led to the Nixon administration’s downfall.

Woodward said he would move a pot plant on his balcony to signal to his confidential, high-level source that he wanted a meeting. If Deep Throat wanted a meeting, he would draw a clock face on page 20 of Woodward’s newspaper to indicate the time they should rendezvous in a disused underground car park.

These very 20th-century means of communication helped preserve the iconic source’s anonymity – until former FBI deputy director Mark Felt outed himself more than 30 years later.

It was significant, then, that Washington was the venue for the release of preliminary findings of a study by the University of Wollongong’s Julie Posetti into the threats to source confidentiality in a new era of sophisticated surveillance technologies and powers.

Leaving a trail

The study poses worrying questions about whether sources can ever be sure their communications with journalists remain confidential no matter how determined a reporter might be to protect them.

Journalists have a sacrosanct relationship with their confidential sources. It is enshrined in ethical codes internationally with some qualified protection under “shield laws” in Australia. Journalists don’t “rat” on their sources. In recent decades in Australia, three journalists have been jailed for refusing to reveal their sources in court - Tony Barrass, Joe Budd and Chris Nicholls.

Four decades on, in a digital era of surveillance and data storage, Watergate remains a useful yardstick for assessing the value of source confidentiality. We can only speculate as to whether Woodward would have been able to preserve Deep Throat’s confidentiality with the surveillance tools and legislative reach agencies have at their disposal today.

Some have argued that modern journalists need to return to those analogue means of communicating if they are to have a hope of protecting their sources, particularly when investigating national security, high-level corruption and matters embarrassing to governments.

Recently departed Guardian editor-in-chief Alan Rusbridger said:

I know investigative journalism happened before the invention of the phone, so I think maybe literally we’re going back to that age, when the only safe thing is face-to-face contact, brown envelopes, meetings in parks.

Associate editor at The Australian Cameron Stewart told me that investigative journalists had to leave their smartphones at the office when heading out to meet confidential sources. The 1970s Watergate methods were again becoming necessary.

However, following Woodward’s approach with Deep Throat would not, on its own, be enough in the digital surveillance era. CCTV footage and geolocation technology on mobile devices carried by either party could potentially link the journalist with their source.

As security expert Bruce Schneier explained, security agencies can also use device inactivity in a process of elimination to identify a source. If they can account for the location of nine possible government sources’ phones over a set period – but the tenth has either been turned off for a long period or left at home – then that employee becomes the prime whistleblowing suspect.

Despite their limitations, such primitive contact methods might make a one-off leak harder to trace than it would if there were email records and stored telco and internet provider metadata such as phone tower locations, call durations and IP addresses. These are all easily accessible under Australia’s new data retention laws.

Stewart explained:

The thing I’ve got to my ear now [a smartphone] is your biggest enemy in every single sense, as the Snowden revelations have shown. The ability of authorities to track movements of journalists is really of great concern as far as protecting sources goes.

Veteran investigative journalist Ross Coulthart offered detailed insights into the detectable trail of communications between reporters and sources last month. He explained a major problem was the “first contact” from a whistleblower with a story.

If they contact me by phone or email now, though, I now warn them they’re compromised.

Coulthart also explained his use of encrypted communications and secure platforms in his efforts to disguise his contacts with sources or to expunge records of his contacts with sources.

Paying the price

However, recent research has shed light on how ignorant many journalists are of the risks of compromising their source confidentiality. They are even unaware of whether recently legislated shield laws offer them any protection in the states or territories where they work.

The survey of 154 journalists by Curtin University’s Joseph Fernandez found that while almost all journalists expressed unreserved commitment to the confidentiality of their sources, three-quarters were uncertain about the extent to which shield laws might cover them. Almost half expressed no alarm at official surveillance of their communications.

The price of a detected link can be high. Many whistleblowers have paid with their liberty or careers. They include Chelsea Manning, who is serving what is likely to be the rest of her life in a US military prison for releasing information to WikiLeaks. In Australia, the list of discovered sources include former customs officer Allan Kessing, Victorian detective Simon Artz and design college part-timer Freya Newman.

If journalists are to have any hope of protecting confidential sources into the future it will require a multi-faceted approach. Posetti’s study proposes an ambitious 11-point framework for enhancing free expression, strengthening legislative and policy shields for journalists and whistleblowers, and training reporters.

The fundamental question facing journalists is whether the very act of promising confidentiality to a source – particularly a government whistleblower – is unethical, given the likelihood that agencies have the power, will and technology to detect and identify sources.

A 2015 Deep Throat would be unlikely to survive a week without detection. That is regardless of whether a journalist has promised them confidentiality and even if a shield law allows the reporter to refuse to identify the source in court.

Despite such undertakings, the metadata trail would likely produce enough evidence to nail the confidential source. This damages the public’s right to know.

Mark Pearson is Australian correspondent for Reporters Without Borders and was a member of the review panel for the study "Protecting Journalism Sources in the Digital Age" conducted by the World Association of Newspapers and News Publishers (WAN-IFRA) for UNESCO.

Authors: The Conversation

Read more http://theconversation.com/how-surveillance-is-wrecking-journalist-source-confidentiality-43228

Business News

Robot Trading and Automation: Does Automated Trading Really Work?

In today’s fast-moving financial markets, many new and experienced traders wonder whether automated trading systems — often called trading robots, expert advisors (EAs), or algorithmic bots — can real...

Daily Bulletin - avatar Daily Bulletin

Physical retail roars back: Christmas 2025 expected to be the biggest in years

Physical retail is back and it’s booming. Shopping centres across Australia are preparing for one of the biggest Christmas and Boxing Day sale seasons on record, driven by strong consumer confidence...

Daily Bulletin - avatar Daily Bulletin

Groundbreaking investment positions Agile Energy to slash power costs for Australian businesses and accelerate Australia’s rise as a green economic powerhouse

Agile Energy is now positioned to play a defining role in reducing energy costs for Australian businesses and fast-tracking the nation’s transformation into a globally competitive green economic pow...

Daily Bulletin - avatar Daily Bulletin

Speed Dating For Business
hacklink hack forum hacklink film izle hacklink หวยออนไลน์matbetสล็อตเว็บตรงgamdom girişpadişahbetMostbetpradabetjojobetcarros usadospin updizipalStreameastartemisbet giriştrendbetcocktail glassesligobetpusulabet girişmarsbahis girişcasibom girişcasibom giriştürk ifşaBets10matbetmatbetmatbetMavibet色情 film izlekralbetnakitbahisholiganbet 1179jojobetjojobetjojobetYakabet1xbet girişjojobetGrandpashabetbetofficeenjoybetpradabetkingroyalkralbet girişgiftcardmall/mygiftultrabetholiganbetmatadorbetbets10 girişbetebetkingroyalcasibomkingroyalbetistcasibomcasino sitelericasibom girişJojobetkingroyal girişkingroyalcasibom girişdeneme bonusumeritkingwinxbetcasibomcasibom girişwbahiswbahisyakabetCasibomBetpuanselçuksportsUltrabet girişDinamobetmasterbettingVdcasinoSekabet girişMarsbahisbetkolikbahiscasinopasacasinomadridbetpasacasinoselcuksportsbetcioyakabetyakabetyakabetjojobetbetpuanyakabetsahabetaertyercasibomcolor pickerpusulabetvbetcolor pickermeritbet girişkralbet girişultrabet girişultrabet girişultrabet girişbetnano girişcratosslot girişคลิปหลุดไทยMarsbahis GirişMarsbahisholiganbetdeneme bonusu veren siteleronwin girişmeritbetizmir escortultrabetantalya escorttimebetjojobet girişmarsbahisbahsegelultrabetultrabetultrabet girişbahiscasinobahiscasinoultrabetbets10jojobetcasibomRoyal Reelsroyal reelsultrabet 2026Kayseri Escortjojobet girişjojobetgrandpashabetNişantaşı EscortelexbetelexbetbettiltStreameastcasibom güncel girişKalebetMavibetfixbetaviator gameholiganbettimebettimebettimebetbahislionistanbul escort telegramcasibomvaycasinocrown155hb88super96pusulabetbetciostreameast한국야동av한글자막atlasbetสล็อตเว็บตรงpornopadişahbetBetigmacasibomBetigmaBetlora girişgiftcardmall/mygiftgaziantep escortspin2uneoaus96Mavibetgalabetmarsbahisjojobetcasibombets10 girişffpokiesholiganbetbest australia online casino 2026best payid casino australiaholiganbet 1179jojobet girişsahabetjojobet girişmostbetdaftar situs judi slot gacor hb88 indonesiaJojobetmostbetmostbetgalabetpulibetbahis siteleri 2025matbetMalware downloadcasinowon girişvdcasinojojobetwww.giftcardmall.com/mygiftjojobetgrandpashabetcasibomcasibom girişgiftcardmall/mygiftasdsadasdasdasdasfdasfasfsadfasdfsdfasdasdasdasdkingroyal girişjojobetbahiscasinograndpashabetpin up uzbekistanSlot Heart Casinocasinomedklarna.seholiganbet 1179casibomwww.mcgift.giftcardmall.com balancewww.mcgift.giftcardmall.com balancegiftcardmall/mygiftwww.giftcardmall.com/mygift activatetm menards logincasibombetasusbetebetmeritbetstake payid casino australiabest payid casino in australiapusulabetcanlı maç izleklasbahisvozolcasibomcasibomcratosroyalbetci girişzbahiszbahis girişultrabetultrabetwolf winnerWolf Winnermeritkingjojobet