Source protection explained

Source protection, sometimes also referred to as source confidentiality or in the U.S. as the reporter's privilege, is a right accorded to journalists under the laws of many countries, as well as under international law. It prohibits authorities, including the courts, from compelling a journalist to reveal the identity of an anonymous source for a story. The right is based on a recognition that without a strong guarantee of anonymity, many would be deterred from coming forward and sharing information of public interests with journalists.

Regardless of whether the right to source confidentiality is protected by law, the process of communicating between journalists and sources can jeopardize the privacy and safety of sources, as third parties can hack electronic communications or otherwise spy on interactions between journalists and sources. News media and their sources have expressed concern over government covertly accessing their private communications.[1] To mitigate these risks, journalists and sources often rely on encrypted messaging.

Journalists rely on source protection to gather and reveal information in the public interest from confidential sources. Such sources may require anonymity to protect them from physical, economic or professional reprisals in response to their revelations. There is a strong tradition of legal source protection internationally, in recognition of the function that confidential sources play in facilitating 'watchdog' or 'accountability' journalism. While professional journalistic practice entails multi-sourcing, verification and corroboration, confidential sources are a key component of this practice. Without confidential sources, many acts of investigative story-telling—from Watergate to the major 2014 investigative journalism project Offshore Leaks undertaken by the International Consortium of Investigative Journalists (ICIJ)[2] —may never have surfaced. Even reporting that involves gathering opinions in the streets, or a background briefing often relies on trust that a journalist respects confidentiality where this is requested.[3]

Relevance

Due to the centrality of communication between journalists and sources to the daily business of journalism, the question of whether or not sources can expect to have their identity protected has significant effects on the ability of media to operate and investigate cases.[4] If a potential source can expect to face legal retaliation or other personal harm as a result of talking to a journalist, they may be less willing to talk to the media.[5]

Context

Digital environment

The digital environment poses challenges to traditional legal protections for journalists' sources. While protective laws and/or a reporter's commitment shielded the identity of sources in the analogue past, in the age of digital reporting, mass surveillance, mandatory data retention, and disclosure by third party intermediaries, this traditional shield can be penetrated.

Technological developments and a change in operational methods of police and intelligence services are redefining the legal classification of privacy and journalistic privilege internationally.[6] With rapid technological advancement, law enforcement and national security agencies have shifted from a process of detecting crimes already committed, to one of threat prevention in the post-September 11 environment. In the digital age, it is not the act of committing (or suspicion of committing) a crime that may result in a person being subject to surveillance, but the simple act of using certain modes of communication—such as mobile technology, email, social networks and the Internet.[6] [7]

Journalists are now adapting their work in an effort to shield their sources from exposure, sometimes even seeking to avoid electronic devices and communications. The cost of the digital era source protection threat is significant—in terms of digital security tools, training, reversion to more labor-intensive analogue practices, and legal advice. Such tactics may be insufficient if legal protections are weak, anonymity is forbidden, encryption is disallowed, and sources themselves are unaware of the risks. The impact of these combined factors on the production and scope of investigative journalism based on confidential sources is significant.

Where source protection is compromised, the impacts can include:

Key issues

  1. Source protection laws are at risk of being trumped by national security and anti-terrorism legislation that increasingly broadens definitions of 'classified information' and limits exceptions for journalistic acts,
  2. The widespread use of mass and targeted surveillance of journalists and their sources undercuts legal source protection frameworks by intercepting journalistic communications,
  3. Expanding requirements for third party intermediaries to mandatory retain citizens' data for increasingly lengthy periods of time further exposes journalistic communications with confidential sources
  4. Debates about digital media actors' entitlement to access source protection laws where they exist, while being more prominent in Western contexts, are intensifying around the world.

Definition

Scholars,[8] journalism organizations[9] and press freedom advocacy groups[10] have put a lot of effort in defining journalism in a way that it would allow the best possible protection of themselves and their sources. Many stakeholders have argued in favor of legal protections being defined in connection with 'acts of journalism', rather than through the definition of the professional functions of a journalist.

Some countries are broadening the legal definition of 'journalist' to ensure adequate protection for citizen reporters (working on and offline). This opens up debates about classifying journalists, and even about licensing and registering those who do journalism—debates that are particularly potent where there is a history of controls over press freedom.

Many legal definitions of 'journalist' have been evaluated as overly narrow, as they tend to emphasis official contractual ties to legacy media organizations, may demand a substantial publication record, and/or require significant income to be derived from the practice of journalism. This leaves confidential sources relied upon by bloggers and citizen journalists largely unprotected, because these producers of journalism are not recognized as 'proper journalists'. Such definitions also exclude the growing group of academic writers and journalism students, lawyers, human rights workers and others, who produce journalism online, including investigative journalism. This has bearing on a controversy in 2015 in which Amnesty International objected to having been a subject of surveillance[11]

In December 2013, the United Nations General Assembly adopted a resolution which outlined a broad definition of journalistic actors that acknowledged that: "...journalism is continuously evolving to include inputs from media institutions, private individuals and a range of organizations that seek, receive and impart information and ideas of all kinds, online as well as offline, in the exercise of freedom of opinion and expression".[12]

In 2014, the Intergovernmental Council of UNESCO's International Program for the Development of Communications (IPDC) welcomed the UNESCO Director-General's Report on the Safety of Journalists and the Danger of Impunity, which uses the term 'journalists' to designate the range of "journalists, media workers and social media producers who generate a significant amount of public-interest journalism".[13]

The Arabic Media Internet Network's Dauoud Kuttab does not want to limit entitlement to source protection to recognized journalists, but to extend it to citizens as well.[14] Egyptian Media Studies Professor Rasha Abdullah said that source protection needs to be accessible to a broad range of communications actors: "It should apply to anyone who has information to expose, particularly in the age of digital media".[15] For Arab Reporters for Investigative Journalism's (ARIJ) Rana Sabbagh, "There is a difference between reporting the news, writing an editorial, and being an activist".[16]

United States media lawyer Charles Tobin is also in favor of a broad definition of journalism as a response to the rise of citizen journalists and bloggers.[17] In 2013, the USA's Society of Professional Journalists passed a unanimous motion that "strongly rejects any attempts to define a journalist in any way other than as someone who commits acts of journalism."[9]

Moving the framework to a protection of 'acts of journalism' rather than limiting it to the work of professional journalists is a conceptual shift, according to Stearns in a 2013 report.[10]

Issues

The 'trumping effect' of national security/anti-terrorism legislation

In 2007, Banisar noted that: "A major recent concern ... is the adoption of new anti terrorism laws that allow for access to records and oblige assistance. There are also problems in many countries with searches of newsrooms and with broadly defined state secrets acts which criminalize journalists who publish leaked information".[18]

The problem has grown in the intervening years, as a parallel to digital development, and occurs where it is unchecked by measures designed to preserve fundamental rights to freedom of expression and privacy, as well as accountability and transparency. In practice, Campbell considers that this leads to what can be identified as a 'trumping effect', where national security and anti-terrorism legislation effectively take precedence over legal and normative protections for confidential journalistic sources.[19] The classification of information as being protected by national security or anti-terrorism legislation has the effect of increasing the reluctance of sources to come forward.

A 2008 Council of Europe (CoE) report stated: "Terrorism is often used as a talisman to justify stifling dissenting voices in the way that calling someone a communist or capitalist were used during the Cold War". According to the COE report, following the 2001 terrorist attacks, many European countries adopted new laws or expanded the use of old laws to monitor communications.[20]

Gillian Phillips, Director of Editorial Legal Services of The Guardian has specifically referenced the implications of governments invoking national security and anti-terrorism measures that interfere with protections for journalists and their sources. Calls for unlimited monitoring and use of modern surveillance technologies to access all citizens' data, directly challenge journalists' rights to protect their confidential sources, she said.[21] A report by The Guardian in 2015, based on files leaked by Edward Snowden, highlighted the potential controversy in this area. It stated that a United Kingdom Government Communications Headquarters (GCHQ) information security assessment had listed "investigative journalists" alongside terrorists and hackers in a threat hierarchy.[22]

The role of mass and targeted surveillance in undercutting legal protections

Fuchs,[23] Eubanks,[24] and Giroux[25] have warned that surveillance is a broader problem than the impingement of individual privacy. Andrejevic (2014) has argued that it represents a fundamental alteration to the power dynamics of society: "...Surveillance should be understood as referring to forms of monitoring deeply embedded in structural conditions of asymmetrical power relations that underwrite domination and exploitation."[26]

Mass surveillance can be defined as the broad, arbitrary monitoring of an entire or substantial fraction of a population.[27] According to former United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Expression and Opinion, Frank La Rue, States can achieve almost complete control of telecommunications and online communications "...by placing taps on the fiber-optic cables, through which the majority of digital communication information flows, and applying word, voice and speech recognition...".[28]

A report of the United Nations Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism, Ben Emmerson, has outlined that States can gain access to the telephone and email content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites. "All of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every Internet user are potentially open for inspection by intelligence and law enforcement agencies in the States concerned".[29]

There is also concern about the extent of targeted surveillance, according to Emmerson's report: "Targeted surveillance...enables intelligence and law enforcement agencies to monitor the online activity of particular individuals, to penetrate databases and cloud facilities, and to capture the information stored on them".[29]

In 2013, the Monk School of Global Affairs' Citizen Lab research group at the University of Toronto discovered command and control servers for FinFisher software (also known as FinSpy) backdoors, in a total of 25 countries, including 14 countries in Asia, nine in Europe and North America, one in Latin America and the Caribbean, and one in Africa.[30] This software is exclusively sold to governments and law enforcement agencies.[31]

A 2008 Council of Europe report detailed what it described as a "worrying trend in the use of both authorized and unauthorized electronic surveillance to monitor journalists by governments and private parties to track their activities and identify their sources". According to the report, most such incidents are not related to countering terrorism but they are authorized under the broad powers of national laws or undertaken illegally, in an attempt to identify the sources of journalistic information.

These laws expand surveillance in a number of ways, according to the CoE study, such as:

According to Polish law academic Jan Podkowik (2014), surveillance undertaken without a journalist's consent should be considered as an act of interference with the protection granted by Article 10 of the European Convention on Human Rights. He proposed in a 2014 paper that interference with journalistic confidentiality by means of secret surveillance should be recognized at least as equally onerous as searches of a home or a workplace. "... it seems that in the digital era, it is necessary to redefine the scope of the protection of journalistic privilege and to include in that scope all the data acquired in the process of communication, preparation, processing or gathering of information that would enable the identification of an informant," Podkowik wrote.[32]

The role of third party intermediaries and data retention

Compounding the impacts of surveillance on source protection and confidential source-dependent journalism globally is the interception, capture and long term storage of data by third party intermediaries. If ISPs, search engines, telecommunication technologies, and social media platforms, for example, can be compelled to produce electronic records (stored for increasingly lengthy periods under mandatory data retention laws) that identify journalists' sources, then legal protections that shield journalists from disclosing confidential sources may be undercut by backdoor access to the data.[33]

A 2014 United Nations Office of the High Commissioner for Human Rights Report, The right to privacy in the Digital Age concludes that there is a pattern of "...increasing reliance of Governments on private sector actors to retain data 'just in case' it is needed for government purposes. Mandatory third-party data retention—a recurring feature of surveillance regimes in many States, where Governments require telephone companies and internet service providers to store metadata about their customers' communications and location for subsequent law enforcement and intelligence agency access—appears neither necessary nor proportionate".[34]

States are introducing mandatory data retention laws. Such laws require telecommunications and Internet Service Providers to preserve communications data for inspection and analysis, according to a report of the Special Rapporteur on Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism.[29] In practice, this means that data on individuals' telecommunication and Internet transactions are collected and stored even when no suspicion of crime has been raised.[35]

Some of the data collected under these policies is known as metadata. Metadata is data that defines and describes other data. For the International Organization for Standardization standard, metadata is defined as data that defines and describes other data and processes.[36] As the Electronic Frontier Foundation's Peter Eckersley has put it, "Metadata is information about what communications you send and receive, who you talk to, where you are when you talk to them, the length of your conversations, what kind of device you were using and potentially other information, like the subject line of your emails".[37] Metadata may also include geolocation information.

Advocates of long-term metadata retention insist that there are no significant privacy or freedom of expression threats.[38] Even when journalists encrypt the content, they may neglect the metadata, meaning they still leave behind a digital trail when they communicate with their sources. This data can easily identify a source, and safeguards against its illegitimate use are frequently limited, or non-existent.[39]

Changes in entitlement to protection

In an era where citizens and other social communicators have the capacity to publish directly to their own audiences, and those sharing information in the public interest are recognized as legitimate journalistic actors by the United Nations, the question, for Julie Posetti is to know to whom source protection laws should be applied. On the one hand, broadening the legal definition of 'journalist' to ensure adequate protection for citizen reporters (working on and offline) is desirable, and case law is catching up gradually on this issue of redefinition. On the other hand, it opens up debates about licensing and registering those who do journalism and who wish to be recognized for protection of their sources.

Safety of women journalists

See also: Safety of Journalists. Female journalists working in the context of reporting conflict and organized crime are particularly vulnerable to physical attacks, including sexual assault, and harassment. In some contexts, their physical mobility may be restricted due to overt threats to their safety, or as a result of cultural prohibitions on women's conduct in public, including meeting privately with male sources. For the World Trends Report, women journalists need to be able to rely on secure non-physical means of communication with their sources. Women sources may face the same physical risks outlined above—especially if their journalistic contact is male and/or they experience cultural restrictions, or they are working in conflict zones. Additionally, female confidential sources who are domestic abuse victims may be physically unable to leave their homes, and therefore be reliant on digital communications.[40]

Women journalists need to be able to rely on secure digital communications to ensure that they are not at increased risk in conflict zones, or when working on dangerous stories, such as those about corruption and crime. The ability to covertly intercept and analyze journalistic communications with sources increases the physical risk to both women journalists and their sources in such contexts. Encrypted communications and other defensive measures are therefore of great importance to ensure that their movements are not tracked and the identity of the source remains confidential.

Journalists and sources using the Internet or mobile apps to communicate face greater risk of gendered harassment and threats of violence. These risks need to be understood and mitigated to avoid further chilling women's involvement in journalism—as practitioners or sources.

International regulations

"There is widespread recognition in international agreements, case law and declarations that protection of journalists' sources [are] a crucial aspect of freedom of expression that should be protected by all nations"[18]

International Organizations such as the United Nations (UN) or UNESCO, Organisation of American States, African Union, Council of Europe, and the Organization for Security and Co-operation in Europe (OSCE) have specifically recognized journalists' right to protect their sources. The European Court of Human Rights (ECtHR) has found in several cases that it is an essential component of freedom of expression.

United Nations Actors

Resolutions

Reports, recommendations, statements and comments

Inter-regional institutions

Organisation for Security and Co-operation in Europe (OSCE)

The Organisation for Economic Co-operation and Development (OECD)

April 2013 draft report published: "CleanGovBiz Integrity in Practice, Investigative Media" argued that forcing a journalist to reveal a source in such cases would be a short sighted approach in many cases: "...once a corruption case has been brought to light by a journalist, law enforcement has an incentive to discover the anonymous source(s). While the source might indeed be valuable for the case in question either by providing additional information or through being a witness in court forcing the journalist to reveal the source would often be short-sighted."[59]

Status around the world

Africa

In Africa, the African Commission on Human and Peoples' Rights has adopted a Declaration of Principles on Freedom of Expression in Africa which includes a right to protection of sources under Principle XV.[60]

Legal framework

Article 9 of the African Charter of Human Rights gives every person the right to receive information and express and disseminate opinions. The 2002 Declaration of Principles on Freedom of Expression in Africa, released by the African Commission on Human and People's Rights, provided guidelines for member states of the African Union on protection of sources:

"XV Protection of Sources and other journalistic material Media practitioners shall not be required to reveal confidential sources of information or to disclose other material held for journalistic purposes except in accordance with the following principles:

Noteworthy developments since 2007:

Asia and the Pacific

The Association of Southeast Asian Nations (ASEAN) adopted a Human Rights Declaration in November 2012 with general provisions for freedom of expression and privacy (ASEAN 2012).[64] Reservations have been voiced regarding the wording of provisions on human rights and fundamental freedoms in relation to political, economic and cultural systems and the Declaration's provisions on "balancing" rights with individual duties as well as an absence of reference that legitimate restrictions of rights must be provided by law and conform to strict tests of necessity and proportionality[65] [66] [67]

In 2007, Banisar noted that: "A major recent concern in the region is the adoption of new anti-terrorism laws that allow for access to records and oblige assistance. There are also problems in many countries with searches of newsrooms and with broadly defined state secrets acts which criminalize journalists who publish leaked information".[18]

Europe

In Europe, the European Court of Human Rights stated in the 1996 case of Goodwin v. United Kingdom that "[p]rotection of journalistic sources is one of the basic conditions for press freedom ... Without such protection, sources may be deterred from assisting the press in informing the public on matters of public interest. As a result the vital public-watchdog role of the press may be undermined and the ability of the press to provide accurate and reliable information may be adversely affected."[68] The Court concluded that absent "an overriding requirement in the public interest", an order to disclose sources would violate the guarantee of free expression in Article 10[69] of the European Convention on Human Rights.

In the wake of Goodwin, the Council of Europe's Committee of Ministers issued a Recommendation to its member states on how to implement the protection of sources in their domestic legislation.[70] The Organization for Security and Co-operation in Europe has also called on states to respect the right.[71]

"The recognition of protection of journalistic sources is fairly well established in Europe both at the regional and domestic levels. For the most part, the protections seem to be respected by authorities...and direct demands to [expose] sources seem more the exception than the common practice". Banisar noted: "...There are still significant problems. Many of the national laws are limited in scope, or in the types of journalists that they protect. The protections are being bypassed in many countries by the use of searches of newsrooms and through increasing use of surveillance. There has also been an increase in the use of criminal sanctions against journalists, especially under national security grounds for receiving information from sources."

Since then, European organizations and law-making bodies have made significant attempts at a regional level to identify the risks posed to source protection in the changing digital environment, and to mitigate these risks.

European Court of Human Rights and European Union Court of Justice

Council of Europe (COE)

Bulgaria, Poland, and Romania

In Bulgaria, Poland, and Romania unauthorized access to information by government entities were identified in several cases.[85] In those political regions, policies such as mandatory registration of pre-paid SIM mobile phone cards and government access to CCTV make hacking tools and surveillance a lot easier.

Netherlands

In the Netherlands, a 2006 case ruled that in cases of minimal national security interest do not supersede source confidentiality. Bart Mos and Joost de Haas, of the Dutch daily De Telegraaf. In an article in January 2006, the two journalists alleged the existence of a leak in the Dutch secret services and quoted from what they claimed was an official dossier on Mink Kok, a notorious criminal. They further alleged that the dossier in question had fallen into the hands of Kok himself. A subsequent police investigation led to the prosecution of Paul H., an agent accused of selling the file in question. Upon motions by the prosecution and the defence, the investigative judge in the case ordered the disclosure of the source for the news story, on the grounds that it was necessary to safeguard national security and ensure a fair trial for H. The two journalists were subsequently detained for refusing to comply with the disclosure order, but were released on appeal after three days, on November 30. The Hague district court considered that the national security interest served by the order was minor and should not prevail over the protection of sources.[86]

North and South America

In the Americas, protection of sources has been recognized in the Inter-American Declaration of Principles on Freedom of Expression,[87] which states in Principle 8 that "every social communicator has the right to keep his/her source of information, notes, personal and professional archives confidential."

United States

See main article: Reporter's privilege. In the United States, unlike doctor-patient or lawyer-client confidentiality, reporters are not afforded a similar legal shield. Communications between reporters and sources have been used by the FBI and other law enforcement agencies as an avenue to information about specific individuals or groups related to pending criminal investigations.[88]

Branzburg v. Hayes

In the 1971 case of Branzburg v. Hayes the court ruled that reporter's privilege was not guaranteed by the First Amendment, but the publicity surrounding the case helped introduce the concept of reporter's privilege into public discussion. As a result of the case, Branzburg, a Kentucky reporter, was forced to testify about his sources and story to a grand jury.

Tracy v. Missoula

A University of Montana student, Linda Tracy, was issued a subpoena for video she took of a violent encounter between police officers and a group of residents. The case, which was ultimately dismissed, involved attaining unedited footage of the encounter which part of was used in a documentary Linda Tracy made as for an undergraduate journalism class. Although she won the case, her status as a real journalist was called into question. Even with the victory, the court did not specifically address if protections and privacy extended to student journalists, but because of the nature of her intent and the project she could not be coerced to releasing the footage.[89] The case helped help further battles in student journalism and press freedoms at an educational level.

Electronics Communications and Privacy Act

The Electronic Communications Privacy Act passed in 1986 and protects bank transactions, telephone digits, and other information. The act also encompasses what organizations must provide to law enforcement with a subpoena, such as name, address, durations of services used, type of device used, and source of payment. This is known as “required disclosure” policies. It later included provisions to prohibit access to stored electronic devices.[90]

Edward Snowden

Former CIA employee Edward Snowden further impacted the relationship between journalism, sources, and privacy. Snowden's actions as a whistleblower at the National Security Agency drew attention to the extent of US government surveillance operations.[91] Surveillance by network administrators may include being able to view how many times a journalist or source visits a website per day, the information they are reading or viewing, and online applications they utilize.

Mexico

In Mexico, it is reported that the government there has spent $300 million during one year to surveil and gather information from the population with specific interest in journalists to get access to their texts, phone calls, and emails.[92]

Canada

Under Canadian law journalists cannot be compelled to identify or disclose information likely to identify a journalistic source, unless a court of competent jurisdiction finds there is no other reasonable way to obtain the information in question, and that the public interest of administrating justice in the case outweighs the public interest of source protection.[93]

In 2019, the Supreme Court of Canada overturned an order that would have required a journalist to disclose the source of her reporting on the Sponsorship scandal, former cabinet minister Marc-Yvan Côté had sought the order in a bid to have charges against him stayed, arguing that officials from an anti-corruption police unit had leaked information about the case to the press. The case was remitted back to the Court of Quebec for further consideration of new facts.[94]

Technology

Newsrooms rely on end-to-end encryption technologies to protect the confidentiality of their communications. However, even these methods are not completely effective.

More schools of journalism are also beginning to include data and source protection and privacy into their curriculum.

Technologies used to protect source privacy include SecureDrop,[95] GlobaLeaks,[96] Off-the-Record Messaging, the Tails operating system, and Tor.

Latin America and the Caribbean

Banisar wrote: "There are important declarations from the Organisation of American States (OAS). Few journalists are ever required to testify on the identity of their sources. However direct demands for sources still occur regularly in many countries, requiring journalists to seek legal recourse in courts. There are also problems with searches of newsrooms and journalists' homes, surveillance and the use of national security laws".

In 1997, the Hemisphere Conference on Free Speech staged in Mexico City adopted the Chapultepec Declaration. Principle 3 states: "No journalist may be forced to reveal his or her sources of information."[97] Building on the Chapultepec Declaration, in 2000 the Inter-American Commission on Human Rights (IACHR) approved the Declaration of Principles on Freedom of Expression as a guidance document for interpreting Article 13 of the Inter American Convention of Human Rights. Article 8 of the Declaration states: "Every social communicator has the right to keep his/her source of information, notes, personal and professional archives confidential."[98]

There are developments with regards to the status of the above regional instruments since 2007:

See also

References

  1. Web site: A High-Tech War on Leaks. Liptak. Adam. February 11, 2012. New York Times. February 14, 2012.
  2. http://www.icij.org/offshore/leakedrecords-reveal-offshore-holdings-chinas-elite
  3. Book: Posetti, Julie. Protecting Journalism Sources in the Digital Age. UNESCO. 2017. 195.
  4. Abramowicz, David. 2008. “Calculating the Public Interest in Protecting Journalists'  Confidential Sources.” Columbia Journalism Review 108(8):1949–90. Retrieved March 1, 2019 (www.jstor.org/stable/40041814)
  5. Kitrosser. Heidi. 2015-03-15. Leak Prosecutions and the First Amendment: New Developments and a Closer Look at the Feasibility of Protecting Leakers. William & Mary Law Review. 56. 4. 1221. 0043-5589.
  6. Web site: Podkowik J. 2014. 'Secret surveillance, national security and journalistic privilege—in search of the balance between conflicting values in the age of new telecommunication technologies. University of Oslo. 28 May 2018.
  7. Web site: Banisar D. 2008. Speaking of terror: A survey of the effects of counter-terrorism legislation on freedom of the media in Europe . Council of Europe, Media and Information Society Division Directorate General of Human Rights and Legal Affairs Council of Europe. 28 May 2018.
  8. Russell L 2014, "Shielding the Media: In an Age of Bloggers, Tweeters, and Leakers, Will Congress Succeed in Defining the Term "Journalist" and in Passing a Long-Sought Federal Shield Act?" Oregon Law Review, 93, pp. 193-227
  9. Web site: Excellence in Journalism 2013 - Society of Professional Journalists . 2018-05-15 . https://web.archive.org/web/20180330105059/https://www.spj.org/c-recap13.asp . 2018-03-30 . dead .
  10. http://www.freepress.net/resource/105079/actsjournalism-defining-press-freedom-digital-age
  11. Web site: Shield laws and journalist's privilege: The basics every reporter should know. 2020-11-15. Columbia Journalism Review. en.
  12. Web site: UNGA 2013: A/RES/68/163. Seapa.org. 28 May 2018.
  13. Web site: The Safety of journalists and the danger of impunity: report by the Director-General. UNESCO. 2014. 28 May 2018.
  14. Kuttab, D (2015) Qualitative interview conducted by Alexandra Waldhorn for UNESCO Internet Study: Privacy and Journalists' Sources
  15. Web site: Egypt's Media in the Midst of Revolution. Rasha. Abdulla. Carnegieendowment.org. 28 May 2018.
  16. Sabbagh, R 2015 Qualitative interview conducted by Farrah Wael for UNESCO Internet Study: Privacy and Journalists' Sources
  17. Tobin, C, 2015 Qualitative interview conducted by Julie Posetti for UNESCO Internet Study: Privacy and Journalists' Sources
  18. Silencing Sources: An International Survey of Protections and Threats to Journalists' Sources. David. Banisar. 8 November 2007. 1706688.
  19. Web site: Campbell, M. 2013. 'Under Cover of Security, Governments Jail Journalists' Committee to Protect Journalists. Cpj.org. 28 May 2018.
  20. Web site: Reports. Coe.int. 28 May 2018.
  21. Web site: Europe's Journalists Caught in Widening National Security Net -. Journalism.cmpf.eui.eu. 28 May 2018.
  22. https://www.theguardian.com/uknews/2015/jan/19/gchq-intercepted-emails-journalists-ny-times-bbc-guardian-lemonde-reuters-nbc-washington-post
  23. Web site: Global Media Journal - Australian Edition - 5:1 2011 . 2018-05-15 . https://web.archive.org/web/20150506140311/http://www.hca.uws.edu.au/gmjau/archive/v5_2011_1/fuchs_RA.html . 2015-05-06 . dead .
  24. http://prospect.org/article/want-predict-futuresurveillance-ask-poor-communities
  25. Giroux, H, 2015, Totalitarian Paranoia in the Post-Orwellian Surveillance State, Cultural Studies, 29:2, pp.108-140.
  26. Mark Andrejevic, The Big Data Divide, 2014
  27. Web site: Issues. Eff.org. 28 May 2018.
  28. UNGA HRC 2013
  29. Web site: A/69/397 - E. Undocs.org. 28 May 2018.
  30. Marquis-Boire, Morgan; Marczak, Bill; Guarnieri, Claudio; Scott-Railton, John (April 30, 2013). "For their eyes only: the commercialization of digital spying"
  31. http://www.zdnet.com/article/top-govt-spyware-company-hackedgammas-finfisher-leaked/
  32. https://www.academia.edu/26131872/Secret_Surveillance_National_Security_and_Journalistic_Privilege_In_Search_of_a_Balance_Between_Conflicting_Values_in_the_Age_Age_of_New_Telecommunications_Technologies Jan Podkowik, Secret Surveillance, National Security and Journalistic Privilege: In Search of a Balance Between Conflicting Values in the Age Age of New Telecommunications Technologies, 2014
  33. In the UNESCO publication Fostering Freedom Online: The Role of Internet Intermediaries (MacKinnon et al 2014), the authors cite the Organisation for Economic Co-operation and Development's (OECD) definition of Internet intermediaries as entities that 'bring together or facilitate transactions between third parties on the Internet. They give access to, host, transmit and index content, products and services originated by third parties on the Internet or provide Internet-based services to third parties.' Most definitions of Internet intermediaries explicitly exclude content producers.
  34. Web site: OHCHR (UN). 2014. The right to privacy in the digital age Report of the Office of the United Nations High Commissioner for Human Rights. 28 May 2018.
  35. Web site: Freedom of Expression, Privacy and Anonymity on the Internet. 19 August 2012. Eff.org. 28 May 2018.
  36. Web site: ISO/IEC 11179-1:2004 - Information technology -- Metadata registries (MDR) -- Part 1: Framework. Iso.org. 28 May 2018.
  37. Web site: Success Story: Breaking News About Data Retention. 6 December 2012. Eff.org. 28 May 2018.
  38. Web site: Archived copy . 2018-05-15 . https://web.archive.org/web/20180529204254/https://www.skynews.com.au/culture/showbiz/tv/2015/03/23/metadata-grilling-gains-logienomination.html . 2018-05-29 . dead .
  39. Noorlander, P 2015 Qualitative interview conducted by Emma Goodman for UNESCO Internet Study: Privacy and Journalists' Sources
  40. Web site: World Trends in Freedom of Expression and Media Development Global Report. UNESCO. 2017.
  41. https://daccess-ods.un.org/TMP/4516555.66692352.html
  42. Web site: OHCHR - Session21 Resolutions, decisions and President's statements. Ohchr.org. 28 May 2018.
  43. Web site: A/RES/68/163 - E. Undocs.org. 28 May 2018.
  44. Web site: Resolution on Internet related issues: including access to information and knowledge, freedom of expression, privacy and ethical dimensions of the information society. Unesco.org. 28 May 2018.
  45. Web site: Volume 1 : Resolutions. Unesdoc.unesco.org. 28 May 2018.
  46. Web site: United Nations Official Document. Un.org. 28 May 2018.
  47. Web site: A/HRC/RES/27/5 - F. Undocs.org. 28 May 2018.
  48. Web site: A/RES/69/185 - E. Undocs.org. 28 May 2018.
  49. Web site: General comment No. 34 Article 19: Freedoms of opinion and expression. 2.ohchr.org. 28 May 2018.
  50. Web site: The Carthage Declaration. 3 May 2012. Afdb.org\accessdate=28 May 2018.
  51. Web site: Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion and expression. Frank La Rue. Ohchr.org. 28 May 2018.
  52. Web site: OHCHR - Right to Privacy in the Digital Age. Ohchr.org. 28 May 2018.
  53. Web site: Refworld - Summary of the Human Rights Council panel discussion on the safety of journalists : Report of the Office of the United Nations High Commissioner for Human Rights. Refworld.org. 28 May 2018.
  54. Web site: UNESCO. 2014. World Trends in Freedom of Expression and Media Development . 28 May 2018.
  55. Web site: Keystones to foster inclusive Knowledge Societies Access to information and knowledge, Freedom of Expression, Privacy, and Ethics on a Global Internet. Unesdoc.unesco.org. 28 May 2018.
  56. Web site: OHCHR - Report on encryption, anonymity, and the human rights framework. Ohchr.org. 28 May 2018.
  57. Web site: OSCE Representative on Freedom of the Media - OSCE. Osce.org. 28 May 2018.
  58. Web site: Vilnius Recommendations on Safety of Journalists. Osce.org. 28 May 2018.
  59. Web site: OECD 2013, 'CleanGovBiz Integrity in Practice, Investigative Media,' Secretary General of the OECD. Oecd.org. 28 May 2018.
  60. http://www.law.wits.ac.za/humanrts/achpr/expressionfreedomdec.html Declaration of Principles on Freedom of Expression in Africa
  61. Web site: Declaration of Principles on Freedom of Expression in Africa. hrlibrary.umn.edu. 28 May 2018.
  62. Web site: Model Law for African States on Access to Information / Legal Instruments / ACHPR. Achpr.org. 28 May 2018.
  63. Web site: Burundian Journalists' Union v. Attorney General - Global Freedom of Expression. Globalfreedomofexpression.columbia.edu. 28 May 2018.
  64. Web site: Asean Human Rights Document. Asean.org. 28 May 2018.
  65. Web site: UN experts raise concerns over 'landmark' Southeast Asian human rights declaration. 16 November 2012. Un.org. 28 May 2018.
  66. Web site: OHCHR -. Ohchr.org. 28 May 2018.
  67. Web site: OHCHR. Ohchr.org. 28 May 2018.
  68. Web site: GOODWIN v. THE UNITED KINGDOM - 17488/90 [1996] ECHR 16 (27 March 1996)]. 2022-01-19. worldlii.org.
  69. Web site: European Convention on Human Rights and its Five Protocols.
  70. https://search.coe.int/cm/Pages/result_details.aspx?ObjectID=09000016805e2fd2 Recommendation No. R (2000)7 of the Committee of Ministers to Member States on the right of journalists not to disclose their sources of information
  71. Web site: Vienna Follow-up Meeting CONCLUDING DOCUMENT.
  72. Web site: CEDH, AFFAIRE TILLACK c. BELGIQUE, 27 novembre 2007, 20477/05 - Doctrine. Cour européenne des droits de. l'homme. 27 November 2007. Doctrine. 28 May 2018.
  73. Web site: CEDH, AFFAIRE GUJA c. MOLDOVA, 12 février 2008, 14277/04 - Doctrine. Cour européenne des droits de. l'homme. 12 February 2008. Doctrine. 28 May 2018.
  74. Web site: Financial Times Ltd & Ors v United Kingdom - 5RB. 5rb.com. 28 May 2018.
  75. Web site: CASE OF SANOMA UITGEVERS B.V. v. THE NETHERLANDS. Vm.ee. 28 May 2018.
  76. Web site: European Court of Human Rights : Telegraaf Media Nederland Landelijke Media B.V. and Others v. the Netherlands. merlin.obs.coe.int. 28 May 2018.
  77. Web site: EUR-Lex - 62012CJ0293 - EN - EUR-Lex. eur-lex.europa.eu. 28 May 2018.
  78. Web site: Case Law, Strasbourg: Stichting Ostade Blade v Netherlands, The limits of the concept of "journalistic source" – Hugh Tomlinson QC. 22 June 2014. Informm.org. 28 May 2018.
  79. Web site: Recommendation No. R (2000) 7 of the Committee of Ministers to member states on the right of journalists not to disclose their sources of information. Coe.int. 28 May 2018.
  80. Web site: Commissioner for Human Rights - Protection of journalists from violence. Issue Discussion Paper commissioned and published by Thomas Hammarberg, Council of Europe Commissioner for Human Rights . 2018-05-15 . https://web.archive.org/web/20140723050714/https://wcd.coe.int/ViewDoc.jsp?id=1899957 . 2014-07-23 . dead .
  81. Web site: Recommendation 1950 (2011) The protection of journalists' sources. Coe.int. 28 May 2018.
  82. Web site: Document not found - Council of Europe . 2018-05-16 . https://web.archive.org/web/20180509211550/https://dispatch.coe.int/?home=wcd.coe.int . 2018-05-09 . dead .
  83. Web site: PACE - Resolution 2045 (2015) - Mass surveillance. assembly.coe.int. 28 May 2018.
  84. Web site: EU Human Rights Guidelines on Freedom of Expression Online and Offline. Eeas.europa.eu. 28 May 2018.
  85. Glowacka. Dorota. Siemaszko. Konrad. Smtek. Joanna. Warso. Zuzanna. 2018-06-01. Protecting journalistic sources against contemporary means of surveillance. Northern Lights: Film & Media Studies Yearbook. en. 16. 1. 97–111. 10.1386/nl.16.1.97_1. 189379837 . 1601-829X.
  86. http://www.iht.com/articles/ap/2006/11/30/europe/EU_GEN_Netherlands_Journalists_Released.php 'Dutch court releases 2 reporters jailed for refusing to reveal their sources'
  87. Web site: Inter-American Declaration of Principles on Freedom of Expression . 2006-12-01 . 2012-08-01 . https://archive.today/20120801170331/http://www.iachr.org/declaration.htm . dead .
  88. Koningisor. Christina. 2018-03-01. The De Facto Reporter's Privilege. The Yale Law Journal. 127. 5. 11–76. 0044-0094.
  89. Dee, Juliet Lushbough. 2010. Free Speech Yearbook: The Under Privileged Journalism Students. Vol. 1. Washington, D.C.: National Communication Association.
  90. McGregor, Susan. 2014. “DIGITAL SECURITY AND SOURCE PROTECTION FOR JOURNALISTS.” Tow Center for Digital Journalism A Tow/Knight.pp. 03–88. Retrieved (https://academiccommons.columbia.edu/doi/10.7916/D89P3D4M).
  91. Kleberg, C. F. (2015), The Death of Source Protection? Protecting Journalists’ Source in a Post-Snowden Age, London: LSE Polis. http://www.lse.ac.uk/media@lse/documents/Death-of-Source-Protection-Carl-Fridh-Kleberg.pdf
  92. Silkie Carlo and Arjen Kamphuis. 2014. “Information Security for Investigative Journalists.” Centre for Investigative Journalism 1(21). Pp 1-97.  Retrieved (https://files.gendo.ch/Books/InfoSec_for_Journalists_V1.21.pdf).
  93. Web site: Branch. Legislative Services. 2019-11-15. Consolidated federal laws of canada, Journalistic Sources Protection Act. 2020-11-19. laws-lois.justice.gc.ca.
  94. News: Supreme Court ruling bolsters journalists' authority to protect confidential sources. 2020-11-19.
  95. Berret, Charles. 2016. “How SecureDrop Helps CPJ Protect Journalists.” Tow Center for Digital Journalism A Tow/Knight .  pp. 03-77 Retrieved (https://academiccommons.columbia.edu/doi/10.7916/D84178B2).
  96. Web site: Steele. Shari. Tor at the Heart: GlobaLeaks. Tor Blog. 3 January 2017.
  97. Web site: OAS - Organization of American States: Democracy for peace, security, and development. OAS. 1 August 2009. Oas.org. 28 May 2018.
  98. Web site: OAS - Organization of American States: Democracy for peace, security, and development. OAS. 1 August 2009. Oas.org. 28 May 2018.

External links