Knowledge

Source protection

Source đź“ť

998:"The recognition of protection of journalistic sources is fairly well established in Europe both at the regional and domestic levels. For the most part, the protections seem to be respected by authorities...and direct demands to sources seem more the exception than the common practice". Banisar noted: "...There are still significant problems. Many of the national laws are limited in scope, or in the types of journalists that they protect. The protections are being bypassed in many countries by the use of searches of newsrooms and through increasing use of surveillance. There has also been an increase in the use of criminal sanctions against journalists, especially under national security grounds for receiving information from sources." 1472: 944:(ASEAN) adopted a Human Rights Declaration in November 2012 with general provisions for freedom of expression and privacy (ASEAN 2012). Reservations have been voiced regarding the wording of provisions on human rights and fundamental freedoms in relation to political, economic and cultural systems and the Declaration's provisions on "balancing" rights with individual duties as well as an absence of reference that legitimate restrictions of rights must be provided by law and conform to strict tests of necessity and proportionality 491:. He proposed in a 2014 paper that interference with journalistic confidentiality by means of secret surveillance should be recognized at least as equally onerous as searches of a home or a workplace. "... it seems that in the digital era, it is necessary to redefine the scope of the protection of journalistic privilege and to include in that scope all the data acquired in the process of communication, preparation, processing or gathering of information that would enable the identification of an informant," Podkowik wrote. 232:
confidential sources relied upon by bloggers and citizen journalists largely unprotected, because these producers of journalism are not recognized as 'proper journalists'. Such definitions also exclude the growing group of academic writers and journalism students, lawyers, human rights workers and others, who produce journalism online, including investigative journalism. This has bearing on a controversy in 2015 in which
1287:
won the case, her status as a real journalist was called into question. Even with the victory, the court did not specifically address if protections and privacy extended to student journalists, but because of the nature of her intent and the project she could not be coerced to releasing the footage. The case helped help further battles in student journalism and press freedoms at an educational level.
826:. This set of recommendations included the following point relevant to source protection in connection with journalism safety: "Encourage legislators to increase safe working conditions for journalists by creating legislation that fosters media freedoms, including guarantees of free access to information, protection of confidential sources, and decriminalizing journalistic activities." 1419:(IACHR) approved the Declaration of Principles on Freedom of Expression as a guidance document for interpreting Article 13 of the Inter American Convention of Human Rights. Article 8 of the Declaration states: "Every social communicator has the right to keep his/her source of information, notes, personal and professional archives confidential." 1408:(OAS). Few journalists are ever required to testify on the identity of their sources. However direct demands for sources still occur regularly in many countries, requiring journalists to seek legal recourse in courts. There are also problems with searches of newsrooms and journalists' homes, surveillance and the use of national security laws". 401:, has outlined that States can gain access to the telephone and email content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites. "All of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every 3210: 102:, the question of whether or not sources can expect to have their identity protected has significant effects on the ability of media to operate and investigate cases. If a potential source can expect to face legal retaliation or other personal harm as a result of talking to a journalist, they may be less willing to talk to the media. 45:. It prohibits authorities, including the courts, from compelling a journalist to reveal the identity of an anonymous source for a story. The right is based on a recognition that without a strong guarantee of anonymity, many would be deterred from coming forward and sharing information of public interests with journalists. 1131:
January 2015: Council of Europe Committee on Legal Affairs and Human Rights, Report on Mass Surveillance/Resolution and recommendation addressed the implications for journalistic source protection in the context of freedom of expression and access to information. The Resolution included the following
1115:
organisations to produce guidelines for prosecutors and police officers and training materials for judges on the right of journalists not to disclose their sources; develop guidelines for public authorities and private service providers concerning the protection of the confidentiality of journalists'
759:
June 2013: 'Report of the Special Rapporteur (Frank La Rue) on the Promotion and Protection of the Right to Freedom of Opinion and Expression' to the Human Rights Council (A/HRC/23/40) highlights the relationship between the rights to freedom of expression, and access to information and privacy that
313:
effect', where national security and anti-terrorism legislation effectively take precedence over legal and normative protections for confidential journalistic sources. The classification of information as being protected by national security or anti-terrorism legislation has the effect of increasing
308:
The problem has grown in the intervening years, as a parallel to digital development, and occurs where it is unchecked by measures designed to preserve fundamental rights to freedom of expression and privacy, as well as accountability and transparency. In practice, Campbell considers that this leads
1139:
May 2014: Council of the European Union - "EU Human Rights Guidelines on Freedom of Expression: Online and Offline" included the following statement: "States should protect by law the right of journalists not to disclose their sources in order to ensure that journalists can report on matters in the
975:
that "rotection of journalistic sources is one of the basic conditions for press freedom ... Without such protection, sources may be deterred from assisting the press in informing the public on matters of public interest. As a result the vital public-watchdog role of the press may be undermined and
835:
April 2013 draft report published: "CleanGovBiz Integrity in Practice, Investigative Media" argued that forcing a journalist to reveal a source in such cases would be a short sighted approach in many cases: "...once a corruption case has been brought to light by a journalist, law enforcement has an
770:
In February 2014, the UN hosted an international expert seminar on the Right to Privacy in the Digital Age (Geneva) Frank La Rue (then UN Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression), called for a special United Nations mandate for protecting
552:
has put it, "Metadata is information about what communications you send and receive, who you talk to, where you are when you talk to them, the length of your conversations, what kind of device you were using and potentially other information, like the subject line of your emails". Metadata may also
536:
States are introducing mandatory data retention laws. Such laws require telecommunications and Internet Service Providers to preserve communications data for inspection and analysis, according to a report of the Special Rapporteur on Promotion and Protection of Human Rights and Fundamental Freedoms
243:
adopted a resolution which outlined a broad definition of journalistic actors that acknowledged that: "...journalism is continuously evolving to include inputs from media institutions, private individuals and a range of organizations that seek, receive and impart information and ideas of all kinds,
1286:
for video she took of a violent encounter between police officers and a group of residents. The case, which was ultimately dismissed, involved attaining unedited footage of the encounter which part of was used in a documentary Linda Tracy made as for an undergraduate journalism class. Although she
1087:
September 2007: Guidelines of the Committee of Ministers of the Council of Europe on protecting freedom of expression and information in times of crisis adopted. These guidelines (CoE 2007) recommended that Member States adopt Recommendation No. R (2000)7 (CoE 2000) into law and practice. In March
48:
Regardless of whether the right to source confidentiality is protected by law, the process of communicating between journalists and sources can jeopardize the privacy and safety of sources, as third parties can hack electronic communications or otherwise spy on interactions between journalists and
1059:
November 2012: European Court of Human Rights (ECtHR) Telegraaf Media Nederland Landelijke Media b.v. and others v. the Netherlands (Application no. 39315/06) The complaint in this case was brought by a Dutch newspaper and two of its journalists. The journalists had been under investigation after
266:
does not want to limit entitlement to source protection to recognized journalists, but to extend it to citizens as well. Egyptian Media Studies Professor Rasha Abdullah said that source protection needs to be accessible to a broad range of communications actors: "It should apply to anyone who has
512:
platforms, for example, can be compelled to produce electronic records (stored for increasingly lengthy periods under mandatory data retention laws) that identify journalists' sources, then legal protections that shield journalists from disclosing confidential sources may be undercut by backdoor
231:
Many legal definitions of 'journalist' have been evaluated as overly narrow, as they tend to emphasis official contractual ties to legacy media organizations, may demand a substantial publication record, and/or require significant income to be derived from the practice of journalism. This leaves
782:
highlights the role of national security, anti-terrorism and anti-extremism laws as instruments "...used in some cases to limit legitimate debate and to curtail dissenting views in the media, while also underwriting expanded surveillance, which may be seen to violate the right to privacy and to
2122:
between third parties on the Internet. They give access to, host, transmit and index content, products and services originated by third parties on the Internet or provide Internet-based services to third parties.' Most definitions of Internet intermediaries explicitly exclude content producers.
2121:
In the UNESCO publication Fostering Freedom Online: The Role of Internet Intermediaries (MacKinnon et al 2014), the authors cite the Organisation for Economic Co-operation and Development's (OECD) definition of Internet intermediaries as entities that 'bring together or facilitate transactions
1338:
Under Canadian law journalists cannot be compelled to identify or disclose information likely to identify a journalistic source, unless a court of competent jurisdiction finds there is no other reasonable way to obtain the information in question, and that the public interest of administrating
144:
Journalists are now adapting their work in an effort to shield their sources from exposure, sometimes even seeking to avoid electronic devices and communications. The cost of the digital era source protection threat is significant—in terms of digital security tools, training, reversion to more
71:
sources. Such sources may require anonymity to protect them from physical, economic or professional reprisals in response to their revelations. There is a strong tradition of legal source protection internationally, in recognition of the function that confidential sources play in facilitating
1299:
passed in 1986 and protects bank transactions, telephone digits, and other information. The act also encompasses what organizations must provide to law enforcement with a subpoena, such as name, address, durations of services used, type of device used, and source of payment. This is known as
1076:
May 2014 Stichting Ostade Blade v The Netherlands in the ECtHR (Application no. 8406/06). The Court rejected a Dutch magazine's application against a police raid under Article 10 of the European Convention on Human Rights. This judgement demonstrates the narrow circumstances in which source
373:
Fuchs, Eubanks, and Giroux have warned that surveillance is a broader problem than the impingement of individual privacy. Andrejevic (2014) has argued that it represents a fundamental alteration to the power dynamics of society: "...Surveillance should be understood as referring to forms of
1127:
on the protection of journalism and safety of journalists and other media actors adopted: "A favorable environment for public debate requires States to refrain from judicial intimidation by restricting the right of individuals to disclose information of public interest through arbitrary or
615:, women journalists need to be able to rely on secure non-physical means of communication with their sources. Women sources may face the same physical risks outlined above—especially if their journalistic contact is male and/or they experience cultural restrictions, or they are working in 1320:
drew attention to the extent of US government surveillance operations. Surveillance by network administrators may include being able to view how many times a journalist or source visits a website per day, the information they are reading or viewing, and online applications they utilize.
140:
environment. In the digital age, it is not the act of committing (or suspicion of committing) a crime that may result in a person being subject to surveillance, but the simple act of using certain modes of communication—such as mobile technology, email, social networks and the Internet.
1072:
invalid, that communications metadata "taken as a whole may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained" (Digital Rights Ireland Ltd C-293/12 v Minister for Communications et al. Ireland, 8 April 2014, Directive
1128:
disproportionate application of the law, in particular the criminal law provisions relating to defamation, national security or terrorism. The arbitrary use of laws creates a chilling effect on the exercise of the right to impart information and ideas, and leads to self-censorship."
931:(EAJC) judgement on Burundi Press Law (Burundian journalists' union v the Attorney General of the Republic of Burundi, Reference No.7 of 2013). In this judgement, the EAJC ruled Articles 19 & 20 of Burundi's 2013 Press Law violated democratic principles and should be repealed. 976:
the ability of the press to provide accurate and reliable information may be adversely affected." The Court concluded that absent "an overriding requirement in the public interest", an order to disclose sources would violate the guarantee of free expression in Article 10 of the
1015:(ECtHR) - Tillack v Belgium (20477/05) involved a leak investigation targeting an investigative journalist. The ECtHRs judgment concluded that the authorities acted disproportionately and breached the journalist's right to freedom of expression enshrined in Article 10 of the 648:
Journalists and sources using the Internet or mobile apps to communicate face greater risk of gendered harassment and threats of violence. These risks need to be understood and mitigated to avoid further chilling women's involvement in journalism—as practitioners or sources.
348:
and their sources. Calls for unlimited monitoring and use of modern surveillance technologies to access all citizens' data, directly challenge journalists' rights to protect their confidential sources, she said. A report by The Guardian in 2015, based on files leaked by
3289: 836:
incentive to discover the anonymous source(s). While the source might indeed be valuable for the case in question either by providing additional information or through being a witness in court forcing the journalist to reveal the source would often be short-sighted."
774:
July 2014 - Summary of the Human Rights Council panel discussion on the safety of journalists: Report of the Office of the United Nations High Commissioner for Human Rights the meeting heard that national security and anti-terrorism laws should not be used to silence
586:(working on and offline) is desirable, and case law is catching up gradually on this issue of redefinition. On the other hand, it opens up debates about licensing and registering those who do journalism and who wish to be recognized for protection of their sources. 76:' or 'accountability' journalism. While professional journalistic practice entails multi-sourcing, verification and corroboration, confidential sources are a key component of this practice. Without confidential sources, many acts of investigative story-telling—from 3260: 1094:
2011: Council of Europe Human Rights Commission issues discussion paper on Protection of Journalists from Violence (CoE HRC 2011) noting that "the fight against terrorism does not allow the authorities to circumvent this right by going beyond what is permitted
865:, there exists a relatively strong recognition of the right of journalists to protect their sources, at national, sub-regional as well as continental levels. However, and by and large, this recognition has not yet resulted in a critical mass of legal provisions 416:, according to Emmerson's report: "Targeted surveillance...enables intelligence and law enforcement agencies to monitor the online activity of particular individuals, to penetrate databases and cloud facilities, and to capture the information stored on them". 377:
Mass surveillance can be defined as the broad, arbitrary monitoring of an entire or substantial fraction of a population. According to former United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Expression and Opinion,
895:"XV Protection of Sources and other journalistic material Media practitioners shall not be required to reveal confidential sources of information or to disclose other material held for journalistic purposes except in accordance with the following principles: 564:
the content, they may neglect the metadata, meaning they still leave behind a digital trail when they communicate with their sources. This data can easily identify a source, and safeguards against its illegitimate use are frequently limited, or non-existent.
1181:
of Paul H., an agent accused of selling the file in question. Upon motions by the prosecution and the defence, the investigative judge in the case ordered the disclosure of the source for the news story, on the grounds that it was necessary to safeguard
1149:
In Bulgaria, Poland, and Romania unauthorized access to information by government entities were identified in several cases. In those political regions, policies such as mandatory registration of pre-paid SIM mobile phone cards and government access to
779: 612: 528:
to retain data 'just in case' it is needed for government purposes. Mandatory third-party data retention—a recurring feature of surveillance regimes in many States, where Governments require telephone companies and internet service providers to store
1102:
adopted Recommendation 1950 on the protection of journalists´ sources. (CoE 2011) recommending that the Committee of Ministers call on all their Member States to: legislate for source protection; review their national laws on surveillance,
1329:
In Mexico, it is reported that the government there has spent $ 300 million during one year to surveil and gather information from the population with specific interest in journalists to get access to their texts, phone calls, and emails.
2109: 1064:
about the circulation of state secrets, in the form of documents from the Netherlands' secret service (AIVD). The Court found that the journalists' rights under both Articles 8 and 10 of the European Convention on Human Rights had been
267:
information to expose, particularly in the age of digital media". For Arab Reporters for Investigative Journalism's (ARIJ) Rana Sabbagh, "There is a difference between reporting the news, writing an editorial, and being an activist".
135:
and journalistic privilege internationally. With rapid technological advancement, law enforcement and national security agencies have shifted from a process of detecting crimes already committed, to one of threat prevention in the
1176:
and quoted from what they claimed was an official dossier on Mink Kok, a notorious criminal. They further alleged that the dossier in question had fallen into the hands of Kok himself. A subsequent police investigation led to the
573:
In an era where citizens and other social communicators have the capacity to publish directly to their own audiences, and those sharing information in the public interest are recognized as legitimate journalistic actors by the
611:. In some contexts, their physical mobility may be restricted due to overt threats to their safety, or as a result of cultural prohibitions on women's conduct in public, including meeting privately with male sources. For the 1001:
Since then, European organizations and law-making bodies have made significant attempts at a regional level to identify the risks posed to source protection in the changing digital environment, and to mitigate these risks.
224:(working on and offline). This opens up debates about classifying journalists, and even about licensing and registering those who do journalism—debates that are particularly potent where there is a history of controls over 701:
2012: Resolution adopted by the UN Human Rights Council (A/HRC/RES/20/8) on the promotion, protection and enjoyment of human rights on the Internet that recognize the need to uphold people's rights equally regardless of
1680:
Russell L 2014, "Shielding the Media: In an Age of Bloggers, Tweeters, and Leakers, Will Congress Succeed in Defining the Term "Journalist" and in Passing a Long-Sought Federal Shield Act?" Oregon Law Review, 93, pp.
1136:, had entrusted a large amount of top secret data establishing the existence of mass surveillance and large-scale intrusion practices hitherto unknown to the general public and even to most political decision-makers." 119:
poses challenges to traditional legal protections for journalists' sources. While protective laws and/or a reporter's commitment shielded the identity of sources in the analogue past, in the age of digital reporting,
212:
Scholars, journalism organizations and press freedom advocacy groups have put a lot of effort in defining journalism in a way that it would allow the best possible protection of themselves and their sources. Many
657:"There is widespread recognition in international agreements, case law and declarations that protection of journalists' sources a crucial aspect of freedom of expression that should be protected by all nations" 1354:
had sought the order in a bid to have charges against him stayed, arguing that officials from an anti-corruption police unit had leaked information about the case to the press. The case was remitted back to the
90:(ICIJ)—may never have surfaced. Even reporting that involves gathering opinions in the streets, or a background briefing often relies on trust that a journalist respects confidentiality where this is requested. 1140:
public interest without their sources fearing retribution. All governments must allow journalists to work in a free and enabling environment in safety and security, without the fear of censorship or restraint."
499:
Compounding the impacts of surveillance on source protection and confidential source-dependent journalism globally is the interception, capture and long term storage of data by third party intermediaries. If
756:
conference highlights the significance of the challenges posed by Internet communications to the maintenance of freedom of expression and privacy rights essential to the practice of investigative journalism.
486:
According to Polish law academic Jan Podkowik (2014), surveillance undertaken without a journalist's consent should be considered as an act of interference with the protection granted by Article 10 of the
200:
Expanding requirements for third party intermediaries to mandatory retain citizens' data for increasingly lengthy periods of time further exposes journalistic communications with confidential sources
749:
UN Human Rights Committee, General Comment no. 34 recognizes protection of all forms of expression and the means of their dissemination, including electronic and Internet-based modes of expression.
1132:
statement: "The Parliamentary Assembly is deeply concerned about mass surveillance practices disclosed since June 2013 by journalists to whom a former United States national security insider, Mr.
537:
while Countering Terrorism. In practice, this means that data on individuals' telecommunication and Internet transactions are collected and stored even when no suspicion of crime has been raised.
3236:"Commissioner for Human Rights - Protection of journalists from violence. Issue Discussion Paper commissioned and published by Thomas Hammarberg, Council of Europe Commissioner for Human Rights" 719:
passed a Resolution on 'Internet-related issues: including access to information and knowledge, freedom of expression, privacy and ethical dimensions of the information society' (UNESCO 2013).
3184: 2110:
Jan Podkowik, Secret Surveillance, National Security and Journalistic Privilege: In Search of a Balance Between Conflicting Values in the Age Age of New Telecommunications Technologies, 2014
1091:
2010: Report on the protection of journalists' sources from the Council of Europe (CoE) Parliamentary Assembly highlighted the need to limit exceptions to legal source protection provisions.
284:
Moving the framework to a protection of 'acts of journalism' rather than limiting it to the work of professional journalists is a conceptual shift, according to Stearns in a 2013 report.
1415:
adopted the Chapultepec Declaration. Principle 3 states: "No journalist may be forced to reveal his or her sources of information." Building on the Chapultepec Declaration, in 2000 the
259:, which uses the term 'journalists' to designate the range of "journalists, media workers and social media producers who generate a significant amount of public-interest journalism". 881: 203:
Debates about digital media actors' entitlement to access source protection laws where they exist, while being more prominent in Western contexts, are intensifying around the world.
633:
need to be able to rely on secure digital communications to ensure that they are not at increased risk in conflict zones, or when working on dangerous stories, such as those about
2594:"Refworld - Summary of the Human Rights Council panel discussion on the safety of journalists : Report of the Office of the United Nations High Commissioner for Human Rights" 2237: 641:. The ability to covertly intercept and analyze journalistic communications with sources increases the physical risk to both women journalists and their sources in such contexts. 217:
have argued in favor of legal protections being defined in connection with 'acts of journalism', rather than through the definition of the professional functions of a journalist.
1162:
In the Netherlands, a 2006 case ruled that in cases of minimal national security interest do not supersede source confidentiality. Bart Mos and Joost de Haas, of the Dutch daily
645:
communications and other defensive measures are therefore of great importance to ensure that their movements are not tracked and the identity of the source remains confidential.
884:
gives every person the right to receive information and express and disseminate opinions. The 2002 Declaration of Principles on Freedom of Expression in Africa, released by the
793: 517: 1963: 1210:, which states in Principle 8 that "every social communicator has the right to keep his/her source of information, notes, personal and professional archives confidential." 248: 337:". According to the COE report, following the 2001 terrorist attacks, many European countries adopted new laws or expanded the use of old laws to monitor communications. 53:
and their sources have expressed concern over government covertly accessing their private communications. To mitigate these risks, journalists and sources often rely on
1624:"'Secret surveillance, national security and journalistic privilege—in search of the balance between conflicting values in the age of new telecommunication technologies" 2360:"Resolution on Internet related issues: including access to information and knowledge, freedom of expression, privacy and ethical dimensions of the information society" 924:
was circulated. An information officer may refuse a request if the information: "(c) Consists of confidential communication between a journalist and her or his source".
796:(OHCHR) Report on Encryption, Anonymity and the Human Rights Framework by UN Special on the Promotion and Protection of the Right to Freedom of Opinion and Expression, 3698: 3693: 1045:
were right to protect their sources by rejecting a United Kingdom High Court order for them to turn over leaked documents connected to a takeover bid involving a
454:
A 2008 Council of Europe report detailed what it described as a "worrying trend in the use of both authorized and unauthorized electronic surveillance to monitor
1088:
2000, the Council of Europe's Committee of Ministers had adopted that Recommendation on the "right of journalists not to disclose their sources of information".
582:
is to know to whom source protection laws should be applied. On the one hand, broadening the legal definition of 'journalist' to ensure adequate protection for
3363:
Glowacka, Dorota; Siemaszko, Konrad; Smtek, Joanna; Warso, Zuzanna (2018-06-01). "Protecting journalistic sources against contemporary means of surveillance".
1173: 533:
about their customers' communications and location for subsequent law enforcement and intelligence agency access—appears neither necessary nor proportionate".
2090:
Marquis-Boire, Morgan; Marczak, Bill; Guarnieri, Claudio; Scott-Railton, John (April 30, 2013). "For their eyes only: the commercialization of digital spying"
87: 819:
Representative on Freedom of the Media (RFOM) regularly issues statements and comments regarding breaches and threats to legal source protection frameworks.
800:(Kaye 2015) emphasizes the essential roles played by encryption and anonymity as defenses create a zone of privacy to protect opinion from outside scrutiny. 462:
but they are authorized under the broad powers of national laws or undertaken illegally, in an attempt to identify the sources of journalistic information.
992: 816: 746: 680: 1623: 899:
The identity of the source is necessary for the investigation or prosecution of a serious crime, or the defense of a person accused of a criminal offense;
458:
by governments and private parties to track their activities and identify their sources". According to the report, most such incidents are not related to
3570: 3335: 2644:"Keystones to foster inclusive Knowledge Societies Access to information and knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet" 1266:, but the publicity surrounding the case helped introduce the concept of reporter's privilege into public discussion. As a result of the case, Branzburg 991:'s Committee of Ministers issued a Recommendation to its member states on how to implement the protection of sources in their domestic legislation. The 3211:"Recommendation No. R (2000) 7 of the Committee of Ministers to member states on the right of journalists not to disclose their sources of information" 3106: 1756: 921: 885: 850: 397:
A report of the United Nations Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism,
281:
passed a unanimous motion that "strongly rejects any attempts to define a journalist in any way other than as someone who commits acts of journalism."
789:
July 2015: UNESCO study "Keystones for the Internet" calls for enhanced protection of the confidentiality of sources of journalism in the digital age.
1263: 3004:
Recommendation No. R (2000)7 of the Committee of Ministers to Member States on the right of journalists not to disclose their sources of information
1198:
district court considered that the national security interest served by the order was minor and should not prevail over the protection of sources.
1022:
February 2008: European Court of Human Rights (ECtHR) Guja v. Moldova (14277/04) This judgement found in favour of Jacob Guja who had served as a
1124: 1099: 560:
Advocates of long-term metadata retention insist that there are no significant privacy or freedom of expression threats. Even when journalists
2285: 1559: 1480: 541: 920:
April 2013 - Model Law on Access to Information in Africa by the Special Rapporteur on Freedom of Expression and Access to Information at the
145:
labor-intensive analogue practices, and legal advice. Such tactics may be insufficient if legal protections are weak, anonymity is forbidden,
1974: 1068:
April 2014: European Union Court of Justice judgement (Ireland Data Retention Directive). The Court observed, in its judgment declaring the
2518: 1939: 1504: 1056:. The ECtHR declared illegal the seizure by the Dutch police of a journalist's CD of photographs, which identified confidential sources. 822:
June 2011 Organization for Security and Cooperation in Europe (OSCE)—Representative on Freedom of the Media: Vilnius Recommendations on
2837: 2262: 2241: 1439:
2013: announced its withdrawal from the Inter-American Commission on Human Rights (IACHR) and the Inter-American Court of Human Rights.
1236:
confidentiality, reporters are not afforded a similar legal shield. Communications between reporters and sources have been used by the
344:
has specifically referenced the implications of governments invoking national security and anti-terrorism measures that interfere with
540:
Some of the data collected under these policies is known as metadata. Metadata is data that defines and describes other data. For the
273:
media lawyer Charles Tobin is also in favor of a broad definition of journalism as a response to the rise of citizen journalists and
1416: 440: 3185:"Case Law, Strasbourg: Stichting Ostade Blade v Netherlands, The limits of the concept of "journalistic source" – Hugh Tomlinson QC" 149:
is disallowed, and sources themselves are unaware of the risks. The impact of these combined factors on the production and scope of
1869:
Banisar, David (8 November 2007). "Silencing Sources: An International Survey of Protections and Threats to Journalists' Sources".
1662:. Council of Europe, Media and Information Society Division Directorate General of Human Rights and Legal Affairs Council of Europe 786:
July 2014: 'The right to privacy in the digital age: Report of the Office of the United Nations High Commissioner for Human Rights'
1808:
Kuttab, D (2015) Qualitative interview conducted by Alexandra Waldhorn for UNESCO Internet Study: Privacy and Journalists' Sources
472:
Relaxing legal limitations on approving and conducting surveillance including allowing for warrantless interception in some cases;
374:
monitoring deeply embedded in structural conditions of asymmetrical power relations that underwrite domination and exploitation."
160:
Pre-publication exposure of journalistic investigations which may trigger cover-ups, intimidation, or destruction of information,
3512:
Kleberg, C. F. (2015), The Death of Source Protection? Protecting Journalists’ Source in a Post-Snowden Age, London: LSE Polis.
2540: 2359: 3405: 1371:
technologies to protect the confidentiality of their communications. However, even these methods are not completely effective.
941: 2275:
Noorlander, P 2015 Qualitative interview conducted by Emma Goodman for UNESCO Internet Study: Privacy and Journalists' Sources
2135: 3513: 1721: 1296: 1190:
for H. The two journalists were subsequently detained for refusing to comply with the disclosure order, but were released on
735:
December 2014: UN General Assembly Resolution on The safety of journalists and the issue of impunity freedoms (A/RES/69/185)
17: 712:
2013: Resolution adopted by the UN General Assembly (A/RES/68/163) on the Safety of Journalists and Issue of Impunity (2013)
603:
working in the context of reporting conflict and organized crime are particularly vulnerable to physical attacks, including
1852:
Tobin, C, 2015 Qualitative interview conducted by Julie Posetti for UNESCO Internet Study: Privacy and Journalists' Sources
1843:
Sabbagh, R 2015 Qualitative interview conducted by Farrah Wael for UNESCO Internet Study: Privacy and Journalists' Sources
197:
of journalists and their sources undercuts legal source protection frameworks by intercepting journalistic communications,
1016: 977: 706: 488: 278: 3285: 3235: 2099: 1732: 1590:"Leak Prosecutions and the First Amendment: New Developments and a Closer Look at the Feasibility of Protecting Leakers" 2309: 2136:"The right to privacy in the digital age Report of the Office of the United Nations High Commissioner for Human Rights" 1374:
More schools of journalism are also beginning to include data and source protection and privacy into their curriculum.
889: 3733: 2941: 2916: 3135:"European Court of Human Rights : Telegraaf Media Nederland Landelijke Media B.V. and Others v. the Netherlands" 124:, mandatory data retention, and disclosure by third party intermediaries, this traditional shield can be penetrated. 3704: 3310: 2541:"Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression" 2008:
Giroux, H, 2015, Totalitarian Paranoia in the Post-Orwellian Surveillance State, Cultural Studies, 29:2, pp.108-140.
1819: 3715: 2862: 1998: 1528: 1459: 951:
that allow for access to records and oblige assistance. There are also problems in many countries with searches of
301:
that allow for access to records and oblige assistance. There are also problems in many countries with searches of
1574:
Abramowicz, David. 2008. “Calculating the Public Interest in Protecting Journalists'  Confidential Sources.”
3711: 1405: 1237: 723: 668: 240: 3003: 1657:"Speaking of terror: A survey of the effects of counter-terrorism legislation on freedom of the media in Europe" 3719: 1694: 1454: 1229: 1012: 968: 684: 545: 190:
that increasingly broadens definitions of 'classified information' and limits exceptions for journalistic acts,
1656: 1300:“required disclosure” policies. It later included provisions to prohibit access to stored electronic devices. 3754: 3749: 2671: 2211: 1233: 928: 3660: 3634: 3422: 390:
cables, through which the majority of digital communication information flows, and applying word, voice and
3546: 1889: 305:
and with broadly defined state secrets acts which criminalize journalists who publish leaked information".
214: 3448: 767:
spotlighted the right to privacy in protecting individuals who reveal human rights implicated information.
1346:
overturned an order that would have required a journalist to disclose the source of her reporting on the
561: 459: 146: 3159: 3056: 2568: 1033:
ltd and others v. The United Kingdom (821/03). The Court ruled that the Financial Times, The Guardian,
948: 797: 660: 549: 298: 187: 2775: 1151: 1052:
September 2010: European Court of Human Rights (ECtHR), Grand Chamber Appeal—Sanoma Uitgevers B.V. v
501: 387: 220:
Some countries are broadening the legal definition of 'journalist' to ensure adequate protection for
3081: 2749:"OECD 2013, 'CleanGovBiz Integrity in Practice, Investigative Media,' Secretary General of the OECD" 325:
is often used as a talisman to justify stifling dissenting voices in the way that calling someone a
1390: 1386: 1317: 1312:
further impacted the relationship between journalism, sources, and privacy. Snowden's actions as a
1069: 476: 150: 3710:, providing an overview of International and European domestic law on protection of sources - the 3030: 2890: 1978: 544:
standard, metadata is defined as data that defines and describes other data and processes. As the
524:
in the Digital Age concludes that there is a pattern of "...increasing reliance of Governments on
3532: 2187:"ISO/IEC 11179-1:2004 - Information technology -- Metadata registries (MDR) -- Part 1: Framework" 1394: 1343: 1219: 753: 38: 1471: 1422:
There are developments with regards to the status of the above regional instruments since 2007:
98:
Due to the centrality of communication between journalists and sources to the daily business of
2415: 1245: 1241: 956: 902:
The information or similar information leading to the same result cannot be obtained elsewhere;
687:(ECtHR) has found in several cases that it is an essential component of freedom of expression. 406: 368: 2748: 1874: 3688:
Silencing Sources: An International Survey of Protections and Threats to Journalists’ Sources
3527:
Silkie Carlo and Arjen Kamphuis. 2014. “Information Security for Investigative Journalists.”
2160: 1433:
expressed interest in signing the Declaration of Chapultepec, he later suspended the signing.
1368: 1279: 823: 730: 595: 420: 413: 345: 252: 233: 194: 3594: 3495: 2787: 2643: 2618: 2387: 2027: 1784: 1484: 1112: 379: 358: 225: 137: 3514:
http://www.lse.ac.uk/media@lse/documents/Death-of-Source-Protection-Carl-Fridh-Kleberg.pdf
2696: 1890:"'Under Cover of Security, Governments Jail Journalists' Committee to Protect Journalists" 1430: 1026:
to a newspaper regarding cases of alleged political interference with the justice process.
947:
In 2007, Banisar noted that: "A major recent concern in the region is the adoption of new
8: 3764: 3134: 3015: 2490: 1351: 1347: 630: 465:
These laws expand surveillance in a number of ways, according to the CoE study, such as:
128: 116: 73: 3608: 1270:
a Kentucky reporter, was forced to testify about his sources and story to a grand jury.
427:(also known as FinSpy) backdoors, in a total of 25 countries, including 14 countries in 292: 41:, is a right accorded to journalists under the laws of many countries, as well as under 3661:"OAS - Organization of American States: Democracy for peace, security, and development" 3635:"OAS - Organization of American States: Democracy for peace, security, and development" 3388: 2812: 2298: 1258: 583: 391: 310: 221: 3571:"Supreme Court ruling bolsters journalists' authority to protect confidential sources" 1785:"The Safety of journalists and the danger of impunity: report by the Director-General" 726:(UNGA) adopted a resolution on the Right to Privacy in the Digital Age. (A/C.3/68/167) 3460: 3392: 3380: 2256: 1870: 1601: 1183: 1104: 1005: 988: 683:(OSCE) have specifically recognized journalists' right to protect their sources. The 676: 624: 620: 505: 383: 318: 183: 121: 77: 42: 2891:"UN experts raise concerns over 'landmark' Southeast Asian human rights declaration" 1914: 1244:
as an avenue to information about specific individuals or groups related to pending
830: 3759: 3372: 2813:"Model Law for African States on Access to Information / Legal Instruments / ACHPR" 1589: 1117: 623:
victims may be physically unable to leave their homes, and therefore be reliant on
521: 244:
online as well as offline, in the exercise of freedom of opinion and expression".
163:
Revelation of sources' identities with legal or extra-legal repercussions on them,
3490:
McGregor, Susan. 2014. “DIGITAL SECURITY AND SOURCE PROTECTION FOR JOURNALISTS.”
2967:"GOODWIN v. THE UNITED KINGDOM - 17488/90 [1996] ECHR 16 (27 March 1996)" 2966: 2838:"Burundian Journalists' Union v. Attorney General - Global Freedom of Expression" 1449: 1356: 1038: 1030: 906: 169: 68: 64: 1168:. In an article in January 2006, the two journalists alleged the existence of a 729:
2014: Resolution adopted by the UN Human Rights Council (A/HRC/RES/27/5) on the
297:
In 2007, Banisar noted that: "A major recent concern ... is the adoption of new
2593: 1733:"Shield laws and journalist's privilege: The basics every reporter should know" 1309: 1133: 1108: 604: 600: 575: 525: 354: 350: 82: 3406:'Dutch court releases 2 reporters jailed for refusing to reveal their sources' 2990: 809: 419:
In 2013, the Monk School of Global Affairs' Citizen Lab research group at the
63:
Journalists rely on source protection to gather and reveal information in the
3743: 3464: 3384: 3239: 1605: 1313: 1225: 1111:, and access to telecommunications records; co-operate with journalists' and 1023: 672: 579: 436: 270: 127:
Technological developments and a change in operational methods of police and
494: 482:
Increased demand for identification of users of telecommunications services.
369:
The role of mass and targeted surveillance in undercutting legal protections
3727: 2286:"World Trends in Freedom of Expression and Media Development Global Report" 1476: 1164: 1061: 509: 398: 361:
assessment had listed "investigative journalists" alongside terrorists and
341: 263: 3547:"Consolidated federal laws of canada, Journalistic Sources Protection Act" 3031:"CEDH, AFFAIRE TILLACK c. BELGIQUE, 27 novembre 2007, 20477/05 - Doctrine" 2186: 3690:. Global survey of source protection laws by Privacy International, 2007. 3376: 2672:"OHCHR - Report on encryption, anonymity, and the human rights framework" 1412: 1178: 1053: 764: 554: 3336:"EU Human Rights Guidelines on Freedom of Expression Online and Offline" 1339:
justice in the case outweighs the public interest of source protection.
3723: 3589:
Berret, Charles. 2016. “How SecureDrop Helps CPJ Protect Journalists.”
3426: 2491:"General comment No. 34 Article 19: Freedoms of opinion and expression" 1578:
108(8):1949–90. Retrieved March 1, 2019 (www.jstor.org/stable/40041814)
1382: 1378: 1187: 1077:
protection laws can be legitimately over-ridden in the public interest.
642: 634: 608: 455: 448: 353:, highlighted the potential controversy in this area. It stated that a 330: 99: 54: 50: 2440: 3057:"CEDH, AFFAIRE GUJA c. MOLDOVA, 12 février 2008, 14277/04 - Doctrine" 2334: 2310:"OHCHR - Session21 Resolutions, decisions and President's statements" 1695:"Excellence in Journalism 2013 - Society of Professional Journalists" 1436: 1426: 1195: 1169: 1034: 424: 326: 322: 293:
The 'trumping effect' of national security/anti-terrorism legislation
3687: 1698: 1262:
the court ruled that reporter's privilege was not guaranteed by the
959:
acts which criminalize journalists who publish leaked information".
857:
which includes a right to protection of sources under Principle XV.
739: 3423:"Inter-American Declaration of Principles on Freedom of Expression" 3261:"Recommendation 1950 (2011) The protection of journalists' sources" 2701: 1283: 952: 530: 402: 334: 302: 256: 3701:
by Privacy International 2009. Creative Commons Non-Commercial Use
3694:
ECtHR case law factsheet on the protection of journalistic sources
2465: 1206:
In the Americas, protection of sources has been recognized in the
1006:
European Court of Human Rights and European Union Court of Justice
912:
And disclosure has been ordered by a court, after a full hearing."
780:
World Trends in Freedom of Expression and Media Development report
469:
Extending the range of crimes that interception is authorised for;
1940:"Europe's Journalists Caught in Widening National Security Net -" 1208:
Inter-American Declaration of Principles on Freedom of Expression
1046: 1042: 831:
The Organisation for Economic Co-operation and Development (OECD)
156:
Where source protection is compromised, the impacts can include:
132: 57: 2723: 3481:. Vol. 1. Washington, D.C.: National Communication Association. 1191: 862: 716: 664: 444: 432: 362: 3533:
https://files.gendo.ch/Books/InfoSec_for_Journalists_V1.21.pdf
3479:
Free Speech Yearbook: The Under Privileged Journalism Students
2788:"Declaration of Principles on Freedom of Expression in Africa" 2161:"Freedom of Expression, Privacy and Anonymity on the Internet" 2066: 763:
In July 2013, the then UN High Commissioner for Human Rights,
2619:"World Trends in Freedom of Expression and Media Development" 1290: 638: 405:
user are potentially open for inspection by intelligence and
2991:"European Convention on Human Rights and its Five Protocols" 2776:
Declaration of Principles on Freedom of Expression in Africa
1411:
In 1997, the Hemisphere Conference on Free Speech staged in
1116:
sources in the context of the interception or disclosure of
855:
Declaration of Principles on Freedom of Expression in Africa
251:(IPDC) welcomed the UNESCO Director-General's Report on the 3362: 3055:
l'homme, Cour européenne des droits de (12 February 2008).
3029:
l'homme, Cour européenne des droits de (27 November 2007).
810:
Organisation for Security and Co-operation in Europe (OSCE)
428: 274: 249:
International Program for the Development of Communications
1404:
Banisar wrote: "There are important declarations from the
909:
in disclosure outweighs the harm to freedom of expression;
340:
Gillian Phillips, Director of Editorial Legal Services of
3595:
https://academiccommons.columbia.edu/doi/10.7916/D84178B2
3496:
https://academiccommons.columbia.edu/doi/10.7916/D89P3D4M
616: 495:
The role of third party intermediaries and data retention
1486:
Protecting Journalism Sources in the Digital Age​
709:
resolution A/HRC/RES/21/12 on the safety of journalists.
1029:
December 2009: European Court of Human Rights (ECtHR)
568: 182:
Source protection laws are at risk of being trumped by
3082:"Financial Times Ltd & Ors v United Kingdom - 5RB" 1975:"Global Media Journal - Australian Edition - 5:1 2011" 752:
2012: Carthage Declaration—participants at the UNESCO
3699:
Model Brief on the Protection of Journalists' Sources
386:
and online communications "...by placing taps on the
88:
International Consortium of Investigative Journalists
2697:"OSCE Representative on Freedom of the Media - OSCE" 1377:
Technologies used to protect source privacy include
993:
Organization for Security and Co-operation in Europe
747:
International Covenant on Civil and Political Rights
681:
Organization for Security and Co-operation in Europe
619:. Additionally, female confidential sources who are 3734:
Infosec for Investigative Journalists, version 2016
3311:"PACE - Resolution 2045 (2015) - Mass surveillance" 2212:"Success Story: Breaking News About Data Retention" 475:Authorizing the use of invasive techniques such as 247:In 2014, the Intergovernmental Council of UNESCO's 80:to the major 2014 investigative journalism project 3365:Northern Lights: Film & Media Studies Yearbook 3107:"CASE OF SANOMA UITGEVERS B.V. v. THE NETHERLANDS" 2724:"Vilnius Recommendations on Safety of Journalists" 1399: 1154:make hacking tools and surveillance a lot easier. 236:objected to having been a subject of surveillance 740:Reports, recommendations, statements and comments 3741: 1561:Protecting Journalism Sources in the Digital Age 1144: 995:has also called on states to respect the right. 794:Office of the High Commissioner for Human Rights 518:Office of the High Commissioner for Human Rights 382:, States can achieve almost complete control of 3492:Tow Center for Digital Journalism A Tow/Knight. 922:African Commission on Human and People's Rights 886:African Commission on Human and People's Rights 851:African Commission on Human and Peoples' Rights 3591:Tow Center for Digital Journalism A Tow/Knight 3016:"Vienna Follow-up Meeting CONCLUDING DOCUMENT" 804: 589: 542:International Organization for Standardization 357:Government Communications Headquarters (GCHQ) 153:based on confidential sources is significant. 2569:"OHCHR - Right to Privacy in the Digital Age" 2061: 2059: 2057: 1475: This article incorporates text from a 652: 3545:Branch, Legislative Services (2019-11-15). 3054: 3028: 1887: 479:and remote keystroke monitoring to be used; 423:discovered command and control servers for 314:the reluctance of sources to come forward. 131:are redefining the legal classification of 3446: 2054: 2017:Mark Andrejevic, The Big Data Divide, 2014 1820:"Egypt's Media in the Midst of Revolution" 1621: 1291:Electronics Communications and Privacy Act 1201: 1081: 839: 715:In November 2013, the 37th session of the 412:There is also concern about the extent of 1689: 1687: 1654: 1587: 1417:Inter-American Commission on Human Rights 172:by journalists and citizens more broadly. 3286:"Document not found - Council of Europe" 2538: 1864: 1862: 1860: 1858: 1479:work. Licensed under CC BY SA 3.0 IGO ( 1359:for further consideration of new facts. 1100:Council of Europe Parliamentary Assembly 690: 3707:Sanoma Uitgevers B.V. v the Netherlands 1868: 1717: 1715: 1617: 1615: 1557: 935: 447:. This software is exclusively sold to 14: 3742: 3730:News and Media Limited, December 2009. 3544: 3160:"EUR-Lex - 62012CJ0293 - EN - EUR-Lex" 2842:Globalfreedomofexpression.columbia.edu 2261:: CS1 maint: archived copy as title ( 2130: 2128: 1684: 1502: 942:Association of Southeast Asian Nations 508:, telecommunication technologies, and 110: 3523: 3521: 3508: 3506: 3504: 1855: 1650: 1648: 1646: 1644: 1297:Electronic Communications Privacy Act 1251: 1120:and traffic data of computer network. 3447:Koningisor, Christina (2018-03-01). 1712: 1612: 1553: 1551: 1549: 1547: 1545: 1543: 1541: 1539: 1537: 1535: 1498: 1496: 1273: 916:Noteworthy developments since 2007: 569:Changes in entitlement to protection 262:The Arabic Media Internet Network's 3736:by Silkie Carlo and Arjen Kamphuis. 3658: 3632: 3529:Centre for Investigative Journalism 3449:"The De Facto Reporter's Privilege" 2125: 1817: 1282:student, Linda Tracy, was issued a 1017:European Convention on Human Rights 978:European Convention on Human Rights 663:such as the United Nations (UN) or 489:European Convention on Human Rights 279:Society of Professional Journalists 166:Sources of information running dry, 24: 3606: 3518: 3501: 3484: 2416:"United Nations Official Document" 1641: 1568: 1503:Liptak, Adam (February 11, 2012). 1194:after three days, on November 30. 890:member states of the African Union 875: 25: 3776: 3681: 3531:1(21). Pp 1-97.  Retrieved ( 1532: 1493: 1303: 783:jeopardize freedom of expression" 3716:Committee to Protect Journalists 1489:, 193, Julie Posetti, UNESCO. 1470: 1460:Shield laws in the United States 1213: 309:to what can be identified as a ' 33:, sometimes also referred to as 3712:Open Society Justice Initiative 3652: 3626: 3600: 3583: 3563: 3538: 3471: 3440: 3415: 3399: 3356: 3328: 3303: 3278: 3253: 3228: 3203: 3177: 3152: 3127: 3099: 3074: 3048: 3022: 3008: 2997: 2983: 2959: 2934: 2909: 2883: 2855: 2830: 2805: 2780: 2769: 2741: 2716: 2689: 2664: 2636: 2611: 2586: 2561: 2532: 2526:Afdb.org\accessdate=28 May 2018 2511: 2483: 2458: 2433: 2408: 2380: 2352: 2327: 2302: 2292: 2278: 2269: 2230: 2204: 2179: 2153: 2115: 2103: 2093: 2084: 2045: 2020: 2011: 2002: 1992: 1967: 1957: 1932: 1907: 1881: 1846: 1837: 1811: 1802: 1777: 1749: 1725: 1588:Kitrosser, Heidi (2015-03-15). 1406:Organisation of American States 1400:Latin America and the Caribbean 882:African Charter of Human Rights 724:United Nations General Assembly 669:Organisation of American States 441:Latin America and the Caribbean 241:United Nations General Assembly 193:The widespread use of mass and 3720:Media Legal Defence Initiative 3609:"Tor at the Heart: GlobaLeaks" 1674: 1581: 1522: 1455:Senior administration official 1157: 1013:European Court of Human Rights 969:European Court of Human Rights 695: 685:European Court of Human Rights 546:Electronic Frontier Foundation 451:and law enforcement agencies. 13: 1: 3593:.  pp. 03-77 Retrieved ( 3477:Dee, Juliet Lushbough. 2010. 2863:"Asean Human Rights Document" 2388:"Volume 1 : Resolutions" 1594:William & Mary Law Review 1465: 1362: 1145:Bulgaria, Poland, and Romania 929:East African Court of Justice 207: 176: 3410:International Herald Tribune 1481:license statement/permission 760:underpins source protection. 93: 7: 1443: 1429:2013: (The then) President 971:stated in the 1996 case of 805:Inter-regional institutions 661:International Organizations 590:Safety of women journalists 346:protections for journalists 10: 3781: 2519:"The Carthage Declaration" 1737:Columbia Journalism Review 1576:Columbia Journalism Review 1505:"A High-Tech War on Leaks" 1350:, former cabinet minister 1217: 892:on protection of sources: 888:, provided guidelines for 593: 409:in the States concerned". 188:anti-terrorism legislation 105: 1757:"UNGA 2013: A/RES/68/163" 1333: 1324: 973:Goodwin v. United Kingdom 962: 955:and with broadly defined 844: 745:July 2011: Office of the 717:UNESCO General Conference 653:International regulations 287: 1387:Off-the-Record Messaging 1318:National Security Agency 1242:law enforcement agencies 1123:2014 Declaration of the 1070:Data Retention Directive 407:law enforcement agencies 151:investigative journalism 3705:Amicus Curiae brief in 3551:laws-lois.justice.gc.ca 1558:Posetti, Julie (2017). 1344:Supreme Court of Canada 1246:criminal investigations 1202:North and South America 1082:Council of Europe (COE) 840:Status around the world 754:World Press Freedom Day 365:in a threat hierarchy. 3494:pp. 03–88. Retrieved ( 1944:Journalism.cmpf.eui.eu 1564:. UNESCO. p. 195. 1391:Tails operating system 1125:Committee of Ministers 1060:publishing stories in 873: 625:digital communications 516:A 2014 United Nations 321:(CoE) report stated: " 239:In December 2013, the 37:or in the U.S. as the 35:source confidentiality 3659:OAS (1 August 2009). 3633:OAS (1 August 2009). 1824:Carnegieendowment.org 1369:end-to-end encryption 1280:University of Montana 1174:Dutch secret services 859: 824:Safety of Journalists 771:the right to privacy. 731:Safety of Journalists 722:In December 2013 the 691:United Nations Actors 596:Safety of Journalists 526:private sector actors 421:University of Toronto 414:targeted surveillance 333:were used during the 277:. In 2013, the USA's 253:Safety of Journalists 234:Amnesty International 195:targeted surveillance 129:intelligence services 18:Protection of sources 3755:Freedom of the press 3750:Sources (journalism) 3453:The Yale Law Journal 3412:, November 30, 2006 3377:10.1386/nl.16.1.97_1 2441:"A/HRC/RES/27/5 - F" 1888:Campbell, M (2013). 1629:. University of Oslo 1308:Former CIA employee 1256:In the 1971 case of 1220:Reporter's privilege 936:Asia and the Pacific 707:Human Rights Council 578:, the question, for 513:access to the data. 460:countering terrorism 359:information security 39:reporter's privilege 1622:Podkowik J (2014). 1483:). Text taken from 1348:Sponsorship scandal 949:anti-terrorism laws 870:(Banisar, 2007: 53) 613:World Trends Report 299:anti terrorism laws 117:digital environment 111:Digital environment 3139:merlin.obs.coe.int 2897:. 16 November 2012 2651:Unesdoc.unesco.org 2466:"A/RES/69/185 - E" 2395:Unesdoc.unesco.org 2335:"A/RES/68/163 - E" 2141:. OHCHR (UN). 2014 1655:Banisar D (2008). 1367:Newsrooms rely on 1259:Branzburg v. Hayes 1252:Branzburg v. Hayes 601:Female journalists 425:FinFisher software 392:speech recognition 384:telecommunications 255:and the Danger of 86:undertaken by the 3164:eur-lex.europa.eu 2792:hrlibrary.umn.edu 2218:. 6 December 2012 1431:Otto PĂ©rez Molina 1274:Tracy v. Missoula 1184:national security 989:Council of Europe 880:Article 9 of the 677:Council of Europe 631:Women journalists 584:citizen reporters 319:Council of Europe 222:citizen reporters 184:national security 122:mass surveillance 43:international law 31:Source protection 16:(Redirected from 3772: 3676: 3675: 3673: 3671: 3656: 3650: 3649: 3647: 3645: 3630: 3624: 3623: 3621: 3619: 3604: 3598: 3587: 3581: 3580: 3578: 3577: 3567: 3561: 3560: 3558: 3557: 3542: 3536: 3525: 3516: 3510: 3499: 3488: 3482: 3475: 3469: 3468: 3444: 3438: 3437: 3435: 3434: 3425:. Archived from 3419: 3413: 3403: 3397: 3396: 3360: 3354: 3353: 3351: 3349: 3340: 3332: 3326: 3325: 3323: 3321: 3315:assembly.coe.int 3307: 3301: 3300: 3298: 3297: 3288:. Archived from 3282: 3276: 3275: 3273: 3271: 3257: 3251: 3250: 3248: 3247: 3238:. Archived from 3232: 3226: 3225: 3223: 3221: 3207: 3201: 3200: 3198: 3196: 3181: 3175: 3174: 3172: 3170: 3156: 3150: 3149: 3147: 3145: 3131: 3125: 3124: 3122: 3120: 3111: 3103: 3097: 3096: 3094: 3092: 3078: 3072: 3071: 3069: 3067: 3052: 3046: 3045: 3043: 3041: 3026: 3020: 3019: 3012: 3006: 3001: 2995: 2994: 2987: 2981: 2980: 2978: 2977: 2963: 2957: 2956: 2954: 2952: 2938: 2932: 2931: 2929: 2927: 2913: 2907: 2906: 2904: 2902: 2887: 2881: 2880: 2878: 2876: 2867: 2859: 2853: 2852: 2850: 2848: 2834: 2828: 2827: 2825: 2823: 2809: 2803: 2802: 2800: 2798: 2784: 2778: 2773: 2767: 2766: 2764: 2762: 2753: 2745: 2739: 2738: 2736: 2734: 2720: 2714: 2713: 2711: 2709: 2693: 2687: 2686: 2684: 2682: 2668: 2662: 2661: 2659: 2657: 2648: 2640: 2634: 2633: 2631: 2629: 2623: 2615: 2609: 2608: 2606: 2604: 2590: 2584: 2583: 2581: 2579: 2565: 2559: 2558: 2556: 2554: 2545: 2536: 2530: 2529: 2523: 2515: 2509: 2508: 2506: 2504: 2495: 2487: 2481: 2480: 2478: 2476: 2462: 2456: 2455: 2453: 2451: 2437: 2431: 2430: 2428: 2426: 2412: 2406: 2405: 2403: 2401: 2392: 2384: 2378: 2377: 2375: 2373: 2364: 2356: 2350: 2349: 2347: 2345: 2331: 2325: 2324: 2322: 2320: 2306: 2300: 2296: 2290: 2289: 2282: 2276: 2273: 2267: 2266: 2260: 2252: 2250: 2249: 2240:. Archived from 2234: 2228: 2227: 2225: 2223: 2208: 2202: 2201: 2199: 2197: 2183: 2177: 2176: 2174: 2172: 2167:. 19 August 2012 2157: 2151: 2150: 2148: 2146: 2140: 2132: 2123: 2119: 2113: 2107: 2101: 2097: 2091: 2088: 2082: 2081: 2079: 2077: 2063: 2052: 2049: 2043: 2042: 2040: 2038: 2024: 2018: 2015: 2009: 2006: 2000: 1996: 1990: 1989: 1987: 1986: 1977:. Archived from 1971: 1965: 1961: 1955: 1954: 1952: 1950: 1936: 1930: 1929: 1927: 1925: 1911: 1905: 1904: 1902: 1900: 1885: 1879: 1878: 1866: 1853: 1850: 1844: 1841: 1835: 1834: 1832: 1830: 1818:Abdulla, Rasha. 1815: 1809: 1806: 1800: 1799: 1797: 1795: 1789: 1781: 1775: 1774: 1772: 1770: 1761: 1753: 1747: 1746: 1744: 1743: 1729: 1723: 1719: 1710: 1709: 1707: 1706: 1697:. Archived from 1691: 1682: 1678: 1672: 1671: 1669: 1667: 1661: 1652: 1639: 1638: 1636: 1634: 1628: 1619: 1610: 1609: 1585: 1579: 1572: 1566: 1565: 1555: 1530: 1526: 1520: 1519: 1517: 1515: 1500: 1474: 871: 522:right to privacy 27:Journalist right 21: 3780: 3779: 3775: 3774: 3773: 3771: 3770: 3769: 3740: 3739: 3684: 3679: 3669: 3667: 3657: 3653: 3643: 3641: 3631: 3627: 3617: 3615: 3607:Steele, Shari. 3605: 3601: 3588: 3584: 3575: 3573: 3569: 3568: 3564: 3555: 3553: 3543: 3539: 3526: 3519: 3511: 3502: 3489: 3485: 3476: 3472: 3445: 3441: 3432: 3430: 3421: 3420: 3416: 3404: 3400: 3361: 3357: 3347: 3345: 3338: 3334: 3333: 3329: 3319: 3317: 3309: 3308: 3304: 3295: 3293: 3284: 3283: 3279: 3269: 3267: 3259: 3258: 3254: 3245: 3243: 3234: 3233: 3229: 3219: 3217: 3209: 3208: 3204: 3194: 3192: 3183: 3182: 3178: 3168: 3166: 3158: 3157: 3153: 3143: 3141: 3133: 3132: 3128: 3118: 3116: 3109: 3105: 3104: 3100: 3090: 3088: 3080: 3079: 3075: 3065: 3063: 3053: 3049: 3039: 3037: 3027: 3023: 3014: 3013: 3009: 3002: 2998: 2989: 2988: 2984: 2975: 2973: 2965: 2964: 2960: 2950: 2948: 2940: 2939: 2935: 2925: 2923: 2915: 2914: 2910: 2900: 2898: 2889: 2888: 2884: 2874: 2872: 2865: 2861: 2860: 2856: 2846: 2844: 2836: 2835: 2831: 2821: 2819: 2811: 2810: 2806: 2796: 2794: 2786: 2785: 2781: 2774: 2770: 2760: 2758: 2751: 2747: 2746: 2742: 2732: 2730: 2722: 2721: 2717: 2707: 2705: 2695: 2694: 2690: 2680: 2678: 2670: 2669: 2665: 2655: 2653: 2646: 2642: 2641: 2637: 2627: 2625: 2621: 2617: 2616: 2612: 2602: 2600: 2592: 2591: 2587: 2577: 2575: 2567: 2566: 2562: 2552: 2550: 2543: 2537: 2533: 2521: 2517: 2516: 2512: 2502: 2500: 2493: 2489: 2488: 2484: 2474: 2472: 2464: 2463: 2459: 2449: 2447: 2439: 2438: 2434: 2424: 2422: 2414: 2413: 2409: 2399: 2397: 2390: 2386: 2385: 2381: 2371: 2369: 2362: 2358: 2357: 2353: 2343: 2341: 2333: 2332: 2328: 2318: 2316: 2308: 2307: 2303: 2297: 2293: 2288:. UNESCO. 2017. 2284: 2283: 2279: 2274: 2270: 2254: 2253: 2247: 2245: 2238:"Archived copy" 2236: 2235: 2231: 2221: 2219: 2210: 2209: 2205: 2195: 2193: 2185: 2184: 2180: 2170: 2168: 2159: 2158: 2154: 2144: 2142: 2138: 2134: 2133: 2126: 2120: 2116: 2108: 2104: 2098: 2094: 2089: 2085: 2075: 2073: 2065: 2064: 2055: 2050: 2046: 2036: 2034: 2026: 2025: 2021: 2016: 2012: 2007: 2003: 1997: 1993: 1984: 1982: 1973: 1972: 1968: 1962: 1958: 1948: 1946: 1938: 1937: 1933: 1923: 1921: 1913: 1912: 1908: 1898: 1896: 1886: 1882: 1867: 1856: 1851: 1847: 1842: 1838: 1828: 1826: 1816: 1812: 1807: 1803: 1793: 1791: 1787: 1783: 1782: 1778: 1768: 1766: 1759: 1755: 1754: 1750: 1741: 1739: 1731: 1730: 1726: 1720: 1713: 1704: 1702: 1693: 1692: 1685: 1679: 1675: 1665: 1663: 1659: 1653: 1642: 1632: 1630: 1626: 1620: 1613: 1586: 1582: 1573: 1569: 1556: 1533: 1527: 1523: 1513: 1511: 1501: 1494: 1468: 1450:Confidentiality 1446: 1402: 1365: 1357:Court of Quebec 1336: 1327: 1306: 1293: 1276: 1264:First Amendment 1254: 1222: 1216: 1204: 1160: 1147: 1084: 1054:The Netherlands 1047:brewing company 1039:The Independent 1031:Financial Times 1011:November 2007: 1008: 983:In the wake of 967:In Europe, the 965: 938: 907:public interest 878: 876:Legal framework 872: 869: 849:In Africa, the 847: 842: 833: 812: 807: 742: 698: 693: 655: 598: 592: 571: 550:Peter Eckersley 497: 371: 295: 290: 210: 179: 170:Self-censorship 113: 108: 96: 65:public interest 28: 23: 22: 15: 12: 11: 5: 3778: 3768: 3767: 3762: 3757: 3752: 3738: 3737: 3731: 3702: 3696: 3691: 3683: 3682:External links 3680: 3678: 3677: 3651: 3625: 3599: 3582: 3562: 3537: 3517: 3500: 3483: 3470: 3439: 3414: 3398: 3355: 3343:Eeas.europa.eu 3327: 3302: 3277: 3252: 3227: 3202: 3191:. 22 June 2014 3176: 3151: 3126: 3098: 3073: 3047: 3021: 3007: 2996: 2982: 2958: 2933: 2908: 2882: 2854: 2829: 2804: 2779: 2768: 2740: 2715: 2688: 2663: 2635: 2624:. UNESCO. 2014 2610: 2585: 2560: 2539:Frank La Rue. 2531: 2510: 2482: 2457: 2432: 2407: 2379: 2351: 2326: 2301: 2291: 2277: 2268: 2229: 2203: 2178: 2152: 2124: 2114: 2102: 2092: 2083: 2067:"A/69/397 - E" 2053: 2044: 2019: 2010: 2001: 1991: 1966: 1956: 1931: 1906: 1880: 1854: 1845: 1836: 1810: 1801: 1790:. UNESCO. 2014 1776: 1748: 1724: 1711: 1683: 1673: 1640: 1611: 1580: 1567: 1531: 1521: 1509:New York Times 1491: 1467: 1464: 1463: 1462: 1457: 1452: 1445: 1442: 1441: 1440: 1434: 1401: 1398: 1364: 1361: 1352:Marc-Yvan CĂ´tĂ© 1335: 1332: 1326: 1323: 1310:Edward Snowden 1305: 1304:Edward Snowden 1302: 1292: 1289: 1275: 1272: 1253: 1250: 1230:doctor-patient 1218:Main article: 1215: 1212: 1203: 1200: 1159: 1156: 1146: 1143: 1142: 1141: 1137: 1134:Edward Snowden 1129: 1121: 1109:data retention 1105:anti-terrorism 1096: 1092: 1089: 1083: 1080: 1079: 1078: 1074: 1066: 1057: 1050: 1027: 1020: 1007: 1004: 964: 961: 937: 934: 933: 932: 925: 914: 913: 910: 903: 900: 877: 874: 867: 853:has adopted a 846: 843: 841: 838: 832: 829: 828: 827: 820: 811: 808: 806: 803: 802: 801: 790: 787: 784: 776: 772: 768: 761: 757: 750: 741: 738: 737: 736: 733: 727: 720: 713: 710: 703: 697: 694: 692: 689: 654: 651: 621:domestic abuse 617:conflict zones 605:sexual assault 591: 588: 576:United Nations 570: 567: 506:search engines 496: 493: 484: 483: 480: 473: 470: 370: 367: 355:United Kingdom 351:Edward Snowden 294: 291: 289: 286: 209: 206: 205: 204: 201: 198: 191: 178: 175: 174: 173: 167: 164: 161: 112: 109: 107: 104: 95: 92: 83:Offshore Leaks 26: 9: 6: 4: 3: 2: 3777: 3766: 3763: 3761: 3758: 3756: 3753: 3751: 3748: 3747: 3745: 3735: 3732: 3729: 3725: 3721: 3717: 3713: 3709: 3708: 3703: 3700: 3697: 3695: 3692: 3689: 3686: 3685: 3666: 3662: 3655: 3640: 3636: 3629: 3614: 3610: 3603: 3596: 3592: 3586: 3572: 3566: 3552: 3548: 3541: 3534: 3530: 3524: 3522: 3515: 3509: 3507: 3505: 3497: 3493: 3487: 3480: 3474: 3466: 3462: 3458: 3454: 3450: 3443: 3429:on 2012-08-01 3428: 3424: 3418: 3411: 3407: 3402: 3394: 3390: 3386: 3382: 3378: 3374: 3371:(1): 97–111. 3370: 3366: 3359: 3344: 3337: 3331: 3316: 3312: 3306: 3292:on 2018-05-09 3291: 3287: 3281: 3266: 3262: 3256: 3242:on 2014-07-23 3241: 3237: 3231: 3216: 3212: 3206: 3190: 3186: 3180: 3165: 3161: 3155: 3140: 3136: 3130: 3115: 3108: 3102: 3087: 3083: 3077: 3062: 3058: 3051: 3036: 3032: 3025: 3017: 3011: 3005: 3000: 2992: 2986: 2972: 2968: 2962: 2947: 2943: 2937: 2922: 2918: 2912: 2896: 2892: 2886: 2871: 2864: 2858: 2843: 2839: 2833: 2818: 2814: 2808: 2793: 2789: 2783: 2777: 2772: 2757: 2750: 2744: 2729: 2725: 2719: 2704: 2703: 2698: 2692: 2677: 2673: 2667: 2652: 2645: 2639: 2620: 2614: 2599: 2595: 2589: 2574: 2570: 2564: 2549: 2542: 2535: 2528:. 3 May 2012. 2527: 2520: 2514: 2499: 2492: 2486: 2471: 2467: 2461: 2446: 2442: 2436: 2421: 2417: 2411: 2396: 2389: 2383: 2368: 2361: 2355: 2340: 2336: 2330: 2315: 2311: 2305: 2299: 2295: 2287: 2281: 2272: 2264: 2258: 2244:on 2018-05-29 2243: 2239: 2233: 2217: 2213: 2207: 2192: 2188: 2182: 2166: 2162: 2156: 2137: 2131: 2129: 2118: 2111: 2106: 2100: 2096: 2087: 2072: 2068: 2062: 2060: 2058: 2051:UNGA HRC 2013 2048: 2033: 2029: 2023: 2014: 2005: 1999: 1995: 1981:on 2015-05-06 1980: 1976: 1970: 1964: 1960: 1945: 1941: 1935: 1920: 1916: 1910: 1895: 1891: 1884: 1876: 1872: 1865: 1863: 1861: 1859: 1849: 1840: 1825: 1821: 1814: 1805: 1786: 1780: 1765: 1758: 1752: 1738: 1734: 1728: 1722: 1718: 1716: 1701:on 2018-03-30 1700: 1696: 1690: 1688: 1677: 1658: 1651: 1649: 1647: 1645: 1625: 1618: 1616: 1607: 1603: 1599: 1595: 1591: 1584: 1577: 1571: 1563: 1562: 1554: 1552: 1550: 1548: 1546: 1544: 1542: 1540: 1538: 1536: 1529: 1525: 1510: 1506: 1499: 1497: 1492: 1490: 1488: 1487: 1482: 1478: 1473: 1461: 1458: 1456: 1453: 1451: 1448: 1447: 1438: 1435: 1432: 1428: 1425: 1424: 1423: 1420: 1418: 1414: 1409: 1407: 1397: 1396: 1392: 1388: 1384: 1380: 1375: 1372: 1370: 1360: 1358: 1353: 1349: 1345: 1342:In 2019, the 1340: 1331: 1322: 1319: 1315: 1314:whistleblower 1311: 1301: 1298: 1288: 1285: 1281: 1271: 1269: 1265: 1261: 1260: 1249: 1247: 1243: 1239: 1235: 1234:lawyer-client 1231: 1227: 1226:United States 1221: 1214:United States 1211: 1209: 1199: 1197: 1193: 1189: 1186:and ensure a 1185: 1180: 1175: 1171: 1167: 1166: 1155: 1153: 1138: 1135: 1130: 1126: 1122: 1119: 1118:computer data 1114: 1113:media freedom 1110: 1106: 1101: 1097: 1093: 1090: 1086: 1085: 1075: 1071: 1067: 1063: 1058: 1055: 1051: 1048: 1044: 1040: 1036: 1032: 1028: 1025: 1024:whistleblower 1021: 1018: 1014: 1010: 1009: 1003: 999: 996: 994: 990: 986: 981: 979: 974: 970: 960: 958: 957:state secrets 954: 950: 945: 943: 930: 926: 923: 919: 918: 917: 911: 908: 904: 901: 898: 897: 896: 893: 891: 887: 883: 866: 864: 858: 856: 852: 837: 825: 821: 818: 814: 813: 799: 795: 792:May 2015: UN 791: 788: 785: 781: 777: 773: 769: 766: 762: 758: 755: 751: 748: 744: 743: 734: 732: 728: 725: 721: 718: 714: 711: 708: 704: 700: 699: 688: 686: 682: 678: 674: 673:African Union 670: 666: 662: 658: 650: 646: 644: 640: 636: 632: 628: 626: 622: 618: 614: 610: 606: 602: 597: 587: 585: 581: 580:Julie Posetti 577: 566: 563: 558: 557:information. 556: 551: 547: 543: 538: 534: 532: 527: 523: 519: 514: 511: 507: 503: 492: 490: 481: 478: 474: 471: 468: 467: 466: 463: 461: 457: 452: 450: 446: 443:, and one in 442: 438: 437:North America 434: 430: 426: 422: 417: 415: 410: 408: 404: 400: 395: 393: 389: 385: 381: 375: 366: 364: 360: 356: 352: 347: 343: 338: 336: 332: 328: 324: 320: 315: 312: 306: 304: 300: 285: 282: 280: 276: 272: 271:United States 268: 265: 264:Dauoud Kuttab 260: 258: 254: 250: 245: 242: 237: 235: 229: 227: 226:press freedom 223: 218: 216: 202: 199: 196: 192: 189: 185: 181: 180: 171: 168: 165: 162: 159: 158: 157: 154: 152: 148: 142: 139: 134: 130: 125: 123: 118: 103: 101: 91: 89: 85: 84: 79: 75: 70: 66: 61: 59: 56: 52: 46: 44: 40: 36: 32: 19: 3728:the Guardian 3706: 3668:. Retrieved 3664: 3654: 3642:. Retrieved 3638: 3628: 3616:. Retrieved 3612: 3602: 3590: 3585: 3574:. Retrieved 3565: 3554:. Retrieved 3550: 3540: 3528: 3491: 3486: 3478: 3473: 3459:(5): 11–76. 3456: 3452: 3442: 3431:. Retrieved 3427:the original 3417: 3409: 3401: 3368: 3364: 3358: 3346:. Retrieved 3342: 3330: 3318:. Retrieved 3314: 3305: 3294:. Retrieved 3290:the original 3280: 3268:. Retrieved 3264: 3255: 3244:. Retrieved 3240:the original 3230: 3218:. Retrieved 3214: 3205: 3193:. Retrieved 3188: 3179: 3167:. Retrieved 3163: 3154: 3142:. Retrieved 3138: 3129: 3117:. Retrieved 3113: 3101: 3089:. Retrieved 3085: 3076: 3064:. Retrieved 3060: 3050: 3038:. Retrieved 3034: 3024: 3010: 2999: 2985: 2974:. Retrieved 2971:worldlii.org 2970: 2961: 2949:. Retrieved 2945: 2936: 2924:. Retrieved 2920: 2911: 2899:. Retrieved 2894: 2885: 2873:. Retrieved 2869: 2857: 2845:. Retrieved 2841: 2832: 2820:. Retrieved 2816: 2807: 2795:. Retrieved 2791: 2782: 2771: 2759:. Retrieved 2755: 2743: 2731:. Retrieved 2727: 2718: 2706:. Retrieved 2700: 2691: 2679:. Retrieved 2675: 2666: 2654:. Retrieved 2650: 2638: 2626:. Retrieved 2613: 2601:. Retrieved 2598:Refworld.org 2597: 2588: 2576:. Retrieved 2572: 2563: 2551:. Retrieved 2547: 2534: 2525: 2513: 2501:. Retrieved 2497: 2485: 2473:. Retrieved 2469: 2460: 2448:. Retrieved 2444: 2435: 2423:. Retrieved 2419: 2410: 2398:. Retrieved 2394: 2382: 2370:. Retrieved 2366: 2354: 2342:. Retrieved 2338: 2329: 2317:. Retrieved 2313: 2304: 2294: 2280: 2271: 2246:. Retrieved 2242:the original 2232: 2220:. Retrieved 2215: 2206: 2194:. Retrieved 2190: 2181: 2169:. Retrieved 2164: 2155: 2143:. Retrieved 2117: 2105: 2095: 2086: 2074:. Retrieved 2070: 2047: 2035:. Retrieved 2031: 2022: 2013: 2004: 1994: 1983:. Retrieved 1979:the original 1969: 1959: 1947:. Retrieved 1943: 1934: 1922:. Retrieved 1918: 1909: 1897:. Retrieved 1893: 1883: 1848: 1839: 1827:. Retrieved 1823: 1813: 1804: 1792:. Retrieved 1779: 1767:. Retrieved 1763: 1751: 1740:. Retrieved 1736: 1727: 1703:. Retrieved 1699:the original 1676: 1664:. Retrieved 1631:. Retrieved 1597: 1593: 1583: 1575: 1570: 1560: 1524: 1514:February 14, 1512:. Retrieved 1508: 1485: 1477:free content 1469: 1421: 1410: 1403: 1376: 1373: 1366: 1341: 1337: 1328: 1307: 1294: 1277: 1267: 1257: 1255: 1223: 1207: 1205: 1165:De Telegraaf 1163: 1161: 1148: 1073:2006/24/EC). 1062:De Telegraaf 1000: 997: 984: 982: 972: 966: 946: 939: 915: 894: 879: 860: 854: 848: 834: 778:2014 UNESCO 659: 656: 647: 629: 599: 572: 559: 539: 535: 520:Report, The 515: 510:social media 498: 485: 477:Trojan horse 464: 453: 418: 411: 399:Ben Emmerson 396: 380:Frank La Rue 376: 372: 342:The Guardian 339: 316: 307: 296: 283: 269: 261: 246: 238: 230: 219: 215:stakeholders 211: 155: 143: 138:September 11 126: 114: 97: 81: 69:confidential 62: 47: 34: 30: 29: 3189:Informm.org 2498:2.ohchr.org 1600:(4): 1221. 1413:Mexico City 1179:prosecution 1158:Netherlands 927:May 2015 - 775:journalists 765:Navi Pillay 702:environment 696:Resolutions 555:geolocation 456:journalists 449:governments 388:fiber-optic 3765:Journalism 3744:Categories 3724:ARTICLE 19 3576:2020-11-19 3556:2020-11-19 3433:2006-12-01 3296:2018-05-16 3246:2018-05-15 2976:2022-01-19 2470:Undocs.org 2445:Undocs.org 2367:Unesco.org 2339:Undocs.org 2248:2018-05-15 2071:Undocs.org 1985:2018-05-15 1742:2020-11-15 1705:2018-05-15 1466:References 1383:GlobaLeaks 1379:SecureDrop 1363:Technology 1240:and other 1188:fair trial 798:David Kaye 679:, and the 635:corruption 609:harassment 594:See also: 431:, nine in 331:capitalist 208:Definition 177:Key issues 147:encryption 100:journalism 51:News media 3618:3 January 3465:0044-0094 3393:189379837 3385:1601-829X 2946:Ohchr.org 2921:Ohchr.org 2917:"OHCHR -" 2870:Asean.org 2817:Achpr.org 2676:Ohchr.org 2573:Ohchr.org 2548:Ohchr.org 2314:Ohchr.org 1915:"Reports" 1764:Seapa.org 1606:0043-5589 1437:Venezuela 1427:Guatemala 1228:, unlike 1196:The Hague 1065:violated. 1035:The Times 953:newsrooms 643:Encrypted 439:, one in 327:communist 323:Terrorism 303:newsrooms 94:Relevance 78:Watergate 58:messaging 55:encrypted 49:sources. 3613:Tor Blog 3061:Doctrine 3035:Doctrine 2756:Oecd.org 2728:Osce.org 2702:Osce.org 2257:cite web 2028:"Issues" 1444:See also 1284:subpoena 868:—  553:include 531:metadata 403:Internet 335:Cold War 311:trumping 275:bloggers 257:Impunity 74:watchdog 3760:Secrecy 3665:Oas.org 3639:Oas.org 3265:Coe.int 3215:Coe.int 3086:5rb.com 2942:"OHCHR" 2216:Eff.org 2191:Iso.org 2165:Eff.org 2032:Eff.org 1919:Coe.int 1894:Cpj.org 1875:1706688 1681:193-227 1316:at the 1224:In the 1172:in the 1043:Reuters 985:Goodwin 562:encrypt 363:hackers 317:A 2008 133:privacy 106:Context 3726:, and 3718:, the 3714:, the 3670:28 May 3644:28 May 3463:  3391:  3383:  3348:28 May 3320:28 May 3270:28 May 3220:28 May 3195:28 May 3169:28 May 3144:28 May 3119:28 May 3091:28 May 3066:28 May 3040:28 May 2951:28 May 2926:28 May 2901:28 May 2895:Un.org 2875:28 May 2847:28 May 2822:28 May 2797:28 May 2761:28 May 2733:28 May 2708:28 May 2681:28 May 2656:28 May 2628:28 May 2603:28 May 2578:28 May 2553:28 May 2503:28 May 2475:28 May 2450:28 May 2425:28 May 2420:Un.org 2400:28 May 2372:28 May 2344:28 May 2319:28 May 2222:28 May 2196:28 May 2171:28 May 2145:28 May 2076:28 May 2037:28 May 1949:28 May 1924:28 May 1899:28 May 1873:  1829:28 May 1794:28 May 1769:28 May 1666:28 May 1633:28 May 1604:  1393:, and 1389:, the 1334:Canada 1325:Mexico 1192:appeal 1098:2011: 987:, the 963:Europe 863:Africa 845:Africa 705:2012: 665:UNESCO 607:, and 445:Africa 433:Europe 394:...". 288:Issues 3389:S2CID 3339:(PDF) 3114:Vm.ee 3110:(PDF) 2866:(PDF) 2752:(PDF) 2647:(PDF) 2622:(PDF) 2544:(PDF) 2522:(PDF) 2494:(PDF) 2391:(PDF) 2363:(PDF) 2139:(PDF) 1788:(PDF) 1760:(PDF) 1660:(PDF) 1627:(PDF) 639:crime 136:post- 67:from 3672:2018 3646:2018 3620:2017 3461:ISSN 3381:ISSN 3350:2018 3322:2018 3272:2018 3222:2018 3197:2018 3171:2018 3146:2018 3121:2018 3093:2018 3068:2018 3042:2018 2953:2018 2928:2018 2903:2018 2877:2018 2849:2018 2824:2018 2799:2018 2763:2018 2735:2018 2710:2018 2683:2018 2658:2018 2630:2018 2605:2018 2580:2018 2555:2018 2505:2018 2477:2018 2452:2018 2427:2018 2402:2018 2374:2018 2346:2018 2321:2018 2263:link 2224:2018 2198:2018 2173:2018 2147:2018 2078:2018 2039:2018 1951:2018 1926:2018 1901:2018 1871:SSRN 1831:2018 1796:2018 1771:2018 1668:2018 1635:2018 1602:ISSN 1516:2012 1395:Tor. 1295:The 1170:leak 1152:CCTV 1041:and 940:The 905:The 817:OSCE 815:The 637:and 502:ISPs 435:and 429:Asia 186:and 115:The 3457:127 3373:doi 1238:FBI 1232:or 861:In 548:'s 329:or 3746:: 3722:, 3663:. 3637:. 3611:. 3597:). 3549:. 3535:). 3520:^ 3503:^ 3498:). 3455:. 3451:. 3408:, 3387:. 3379:. 3369:16 3367:. 3341:. 3313:. 3263:. 3213:. 3187:. 3162:. 3137:. 3112:. 3084:. 3059:. 3033:. 2969:. 2944:. 2919:. 2893:. 2868:. 2840:. 2815:. 2790:. 2754:. 2726:. 2699:. 2674:. 2649:. 2596:. 2571:. 2546:. 2524:. 2496:. 2468:. 2443:. 2418:. 2393:. 2365:. 2337:. 2312:. 2259:}} 2255:{{ 2214:. 2189:. 2163:. 2127:^ 2069:. 2056:^ 2030:. 1942:. 1917:. 1892:. 1857:^ 1822:. 1762:. 1735:. 1714:^ 1686:^ 1643:^ 1614:^ 1598:56 1596:. 1592:. 1534:^ 1507:. 1495:^ 1385:, 1381:, 1278:A 1248:. 1107:, 1037:, 980:. 675:, 671:, 667:, 627:. 504:, 228:. 60:. 3674:. 3648:. 3622:. 3579:. 3559:. 3467:. 3436:. 3395:. 3375:: 3352:. 3324:. 3299:. 3274:. 3249:. 3224:. 3199:. 3173:. 3148:. 3123:. 3095:. 3070:. 3044:. 3018:. 2993:. 2979:. 2955:. 2930:. 2905:. 2879:. 2851:. 2826:. 2801:. 2765:. 2737:. 2712:. 2685:. 2660:. 2632:. 2607:. 2582:. 2557:. 2507:. 2479:. 2454:. 2429:. 2404:. 2376:. 2348:. 2323:. 2265:) 2251:. 2226:. 2200:. 2175:. 2149:. 2112:; 2080:. 2041:. 1988:. 1953:. 1928:. 1903:. 1877:. 1833:. 1798:. 1773:. 1745:. 1708:. 1670:. 1637:. 1608:. 1518:. 1268:, 1095:" 1049:. 1019:. 72:' 20:)

Index

Protection of sources
reporter's privilege
international law
News media
encrypted
messaging
public interest
confidential
watchdog
Watergate
Offshore Leaks
International Consortium of Investigative Journalists
journalism
digital environment
mass surveillance
intelligence services
privacy
September 11
encryption
investigative journalism
Self-censorship
national security
anti-terrorism legislation
targeted surveillance
stakeholders
citizen reporters
press freedom
Amnesty International
United Nations General Assembly
International Program for the Development of Communications

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑