Source Protection
   HOME

TheInfoList



OR:

Source protection, sometimes also referred to as source confidentiality or in the U.S. as the
reporter's privilege Reporter's privilege in the United States (also journalist's privilege, newsman's privilege, or press privilege), is a "reporter's protection under constitutional or statutory law, from being compelled to testify about confidential information or s ...
, is a right accorded to journalists under the laws of many countries, as well as under
international law International law (also known as public international law and the law of nations) is the set of rules, norms, and standards generally recognized as binding between states. It establishes normative guidelines and a common conceptual framework for ...
. It prohibits authorities, including the courts, from compelling a journalist to reveal the identity of an anonymous source for a story. The right is based on a recognition that without a strong guarantee of anonymity, many would be deterred from coming forward and sharing information of public interests with journalists. Regardless of whether the right to source confidentiality is protected by law, the process of communicating between journalists and sources can jeopardize the privacy and safety of sources, as third parties can hack electronic communications or otherwise spy on interactions between journalists and sources.
News media The news media or news industry are forms of mass media that focus on delivering news to the general public or a target public. These include news agencies, print media (newspapers, news magazines), broadcast news (radio and television), and th ...
and their sources have expressed concern over government covertly accessing their private communications. To mitigate these risks, journalists and sources often rely on
encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
messaging A message is a discrete unit of communication intended by the source for consumption by some recipient or group of recipients. A message may be delivered by various means, including courier, telegraphy, carrier pigeon and electronic bus. ...
. Journalists rely on source protection to gather and reveal information in the
public interest The public interest is "the welfare or well-being of the general public" and society. Overview Economist Lok Sang Ho in his ''Public Policy and the Public Interest'' argues that the public interest must be assessed impartially and, therefore ...
from
confidential Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access or places restrictions on certain types of information. Legal confidentiality By law, lawyers are often required ...
sources. Such sources may require anonymity to protect them from physical, economic or professional reprisals in response to their revelations. There is a strong tradition of legal source protection internationally, in recognition of the function that confidential sources play in facilitating '
watchdog Watchdog or watch dog may refer to: Animals *Guard dog, a dog that barks to alert its owners of an intruder's presence * Portuguese Watch Dog, Cão de Castro Laboreiro, a dog breed * Moscow Watchdog, a breed of dog that was bred in the Soviet ...
' or 'accountability' journalism. While professional journalistic practice entails multi-sourcing, verification and corroboration, confidential sources are a key component of this practice. Without confidential sources, many acts of investigative story-telling—from
Watergate The Watergate scandal was a major political scandal in the United States involving the administration of President Richard Nixon from 1972 to 1974 that led to Nixon's resignation. The scandal stemmed from the Nixon administration's continual ...
to the major 2014 investigative journalism project '' Offshore Leaks'' undertaken by the
International Consortium of Investigative Journalists The International Consortium of Investigative Journalists, Inc. (ICIJ), is an independent global network of 280 investigative journalists and over 140 media organizations spanning more than 100 countries. It is based in Washington, D.C. with pe ...
(ICIJ)—may never have surfaced. Even reporting that involves gathering opinions in the streets, or a background briefing often relies on trust that a journalist respects confidentiality where this is requested.


Relevance

Due to the centrality of communication between journalists and sources to the daily business of
journalism Journalism is the production and distribution of reports on the interaction of events, facts, ideas, and people that are the "news of the day" and that informs society to at least some degree. The word, a noun, applies to the occupation (profes ...
, the question of whether or not sources can expect to have their identity protected has significant effects on the ability of media to operate and investigate cases.Abramowicz, David. 2008. “Calculating the Public Interest in Protecting Journalists'  Confidential Sources.” ''Columbia Journalism Review'' 108(8):1949–90. Retrieved March 1, 2019 (www.jstor.org/stable/40041814) If a potential source can expect to face legal retaliation or other personal harm as a result of talking to a journalist, they may be less willing to talk to the media.


Context


Digital environment

The
digital environment A digital environment is an integrated communications environment where digital devices communicate and manage the content and activities within it. The concept is based on digital electronics systems which are integrated and implemented for a gl ...
poses challenges to traditional legal protections for journalists' sources. While protective laws and/or a reporter's commitment shielded the identity of sources in the analogue past, in the age of digital reporting,
mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
, mandatory data retention, and disclosure by third party intermediaries, this traditional shield can be penetrated. Technological developments and a change in operational methods of police and
intelligence services An intelligence agency is a government agency responsible for the collection, analysis, and exploitation of information in support of law enforcement, national security National security, or national defence, is the security and defence of ...
are redefining the legal classification of
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of a ...
and journalistic privilege internationally. With rapid technological advancement, law enforcement and national security agencies have shifted from a process of detecting crimes already committed, to one of threat prevention in the post-
September 11 Events Pre-1600 * 9 – The Battle of the Teutoburg Forest ends: The Roman Empire suffers the greatest defeat of its history and the Rhine is established as the border between the Empire and the so-called barbarians for the next four hu ...
environment. In the digital age, it is not the act of committing (or suspicion of committing) a crime that may result in a person being subject to surveillance, but the simple act of using certain modes of communication—such as mobile technology, email, social networks and the Internet. Journalists are now adapting their work in an effort to shield their sources from exposure, sometimes even seeking to avoid electronic devices and communications. The cost of the digital era source protection threat is significant—in terms of digital security tools, training, reversion to more labor-intensive analogue practices, and legal advice. Such tactics may be insufficient if legal protections are weak, anonymity is forbidden,
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
is disallowed, and sources themselves are unaware of the risks. The impact of these combined factors on the production and scope of
investigative journalism Investigative journalism is a form of journalism in which reporters deeply investigate a single topic of interest, such as serious crimes, political corruption, or corporate wrongdoing. An investigative journalist may spend months or years rese ...
based on confidential sources is significant. Where source protection is compromised, the impacts can include: * Pre-publication exposure of journalistic investigations which may trigger cover-ups, intimidation, or destruction of information, * Revelation of sources' identities with legal or extra-legal repercussions on them, * Sources of information running dry, *
Self-censorship Self-censorship is the act of censoring or classifying one's own discourse. This is done out of fear of, or deference to, the sensibilities or preferences (actual or perceived) of others and without overt pressure from any specific party or insti ...
by journalists and citizens more broadly.


Key issues

# Source protection laws are at risk of being trumped by
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
and
anti-terrorism legislation Anti-terrorism legislation are laws with the purpose of fighting terrorism. They usually, if not always, follow specific bombings or assassinations. Anti-terrorism legislation usually includes specific amendments allowing the state to bypass its ...
that increasingly broadens definitions of 'classified information' and limits exceptions for journalistic acts, # The widespread use of mass and
targeted surveillance Targeted surveillance (or targeted interception) is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance (or bulk interception). Both untargeted and targ ...
of journalists and their sources undercuts legal source protection frameworks by intercepting journalistic communications, # Expanding requirements for third party intermediaries to mandatory retain citizens' data for increasingly lengthy periods of time further exposes journalistic communications with confidential sources # Debates about digital media actors' entitlement to access source protection laws where they exist, while being more prominent in Western contexts, are intensifying around the world.


Definition

Scholars, journalism organizations and press freedom advocacy groups
have put a lot of effort in defining journalism in a way that it would allow the best possible protection of themselves and their sources. Many Multi-stakeholder governance, stakeholders have argued in favor of legal protections being defined in connection with 'acts of journalism', rather than through the definition of the professional functions of a journalist. Some countries are broadening the legal definition of 'journalist' to ensure adequate protection for citizen reporters (working on and offline). This opens up debates about classifying journalists, and even about licensing and registering those who do journalism—debates that are particularly potent where there is a history of controls over
press freedom Freedom of the press or freedom of the media is the fundamental principle that communication and expression through various media, including printed and electronic media, especially published materials, should be considered a right to be exerci ...
. Many legal definitions of 'journalist' have been evaluated as overly narrow, as they tend to emphasis official contractual ties to legacy media organizations, may demand a substantial publication record, and/or require significant income to be derived from the practice of journalism. This leaves confidential sources relied upon by bloggers and citizen journalists largely unprotected, because these producers of journalism are not recognized as 'proper journalists'. Such definitions also exclude the growing group of academic writers and journalism students, lawyers, human rights workers and others, who produce journalism online, including investigative journalism. This has bearing on a controversy in 2015 in which
Amnesty International Amnesty International (also referred to as Amnesty or AI) is an international non-governmental organization focused on human rights, with its headquarters in the United Kingdom. The organization says it has more than ten million members and sup ...
objected to having been a subject of surveillance In December 2013, the
United Nations General Assembly The United Nations General Assembly (UNGA or GA; french: link=no, Assemblée générale, AG) is one of the six principal organs of the United Nations (UN), serving as the main deliberative, policymaking, and representative organ of the UN. Curr ...
adopted a resolution which outlined a broad definition of journalistic actors that acknowledged that: "...journalism is continuously evolving to include inputs from media institutions, private individuals and a range of organizations that seek, receive and impart information and ideas of all kinds, online as well as offline, in the exercise of freedom of opinion and expression". In 2014, the Intergovernmental Council of UNESCO's International Program for the Development of Communications (IPDC) welcomed the UNESCO Director-General's Report on the
Safety of Journalists Safety of journalists is the ability for journalists and media professionals to receive, produce and share information without facing physical or moral threats. Journalists can face violence and intimidation for exercising their fundamental ri ...
and the Danger of
Impunity Impunity is avoidance of punishment, loss, or other negative consequences for an action. In the international law of human rights, impunity is failure to bring perpetrators of human rights violations to justice and, as such, itself constitutes a d ...
, which uses the term 'journalists' to designate the range of "journalists, media workers and social media producers who generate a significant amount of public-interest journalism". The Arabic Media Internet Network's Dauoud Kuttab does not want to limit entitlement to source protection to recognized journalists, but to extend it to citizens as well. Egyptian Media Studies Professor Rasha Abdullah said that source protection needs to be accessible to a broad range of communications actors: "It should apply to anyone who has information to expose, particularly in the age of digital media". For Arab Reporters for Investigative Journalism's (ARIJ) Rana Sabbagh, "There is a difference between reporting the news, writing an editorial, and being an activist".
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
media lawyer Charles Tobin is also in favor of a broad definition of journalism as a response to the rise of citizen journalists and
blog A blog (a truncation of "weblog") is a discussion or informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts). Posts are typically displayed in reverse chronological order ...
gers. In 2013, the USA's
Society of Professional Journalists The Society of Professional Journalists (SPJ), formerly known as Sigma Delta Chi, is the oldest organization representing journalists in the United States. It was established on April 17, 1909, at DePauw University,2009 SPJ Annual Report, letter ...
passed a unanimous motion that "strongly rejects any attempts to define a journalist in any way other than as someone who commits acts of journalism." Moving the framework to a protection of 'acts of journalism' rather than limiting it to the work of professional journalists is a conceptual shift, according to Stearns in a 2013 report.


Issues


The 'trumping effect' of national security/anti-terrorism legislation

In 2007, Banisar noted that: "A major recent concern ... is the adoption of new anti terrorism laws that allow for access to records and oblige assistance. There are also problems in many countries with searches of
newsroom A newsroom is the central place where journalists—reporters, editors, and producers, associate producers, news anchors, news designers, photojournalists, videojournalists, associate editor, residence editor, visual text editor, Desk Head, s ...
s and with broadly defined state secrets acts which criminalize journalists who publish leaked information". The problem has grown in the intervening years, as a parallel to digital development, and occurs where it is unchecked by measures designed to preserve fundamental rights to freedom of expression and privacy, as well as accountability and transparency. In practice, Campbell considers that this leads to what can be identified as a 'trumping effect', where national security and anti terrorism legislation effectively take precedence over legal and normative protections for confidential journalistic sources. The classification of information as being protected by national security or anti-terrorism legislation has the effect of increasing the reluctance of sources to come forward. A 2008
Council of Europe The Council of Europe (CoE; french: Conseil de l'Europe, ) is an international organisation founded in the wake of World War II to uphold European Convention on Human Rights, human rights, democracy and the Law in Europe, rule of law in Europe. ...
(CoE) report stated: "
Terrorism Terrorism, in its broadest sense, is the use of criminal violence to provoke a state of terror or fear, mostly with the intention to achieve political or religious aims. The term is used in this regard primarily to refer to intentional violen ...
is often used as a talisman to justify stifling dissenting voices in the way that calling someone a
communist Communism (from Latin la, communis, lit=common, universal, label=none) is a far-left sociopolitical, philosophical, and economic ideology and current within the socialist movement whose goal is the establishment of a communist society, a s ...
or
capitalist Capitalism is an economic system based on the private ownership of the means of production and their operation for profit. Central characteristics of capitalism include capital accumulation, competitive markets, price system, priva ...
were used during the
Cold War The Cold War is a term commonly used to refer to a period of geopolitical tension between the United States and the Soviet Union and their respective allies, the Western Bloc and the Eastern Bloc. The term '' cold war'' is used because the ...
". According to the COE report, following the 2001 terrorist attacks, many European countries adopted new laws or expanded the use of old laws to monitor communications. Gillian Phillips, Director of Editorial Legal Services of
The Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers ''The Observer'' and ''The Guardian Weekly'', ''The Guardian'' is part of the Gu ...
has specifically referenced the implications of governments invoking national security and anti-terrorism measures that interfere with protections for journalists and their sources. Calls for unlimited monitoring and use of modern surveillance technologies to access all citizens' data, directly challenge journalists' rights to protect their confidential sources, she said. A report by The Guardian in 2015, based on files leaked by
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
, highlighted the potential controversy in this area. It stated that a
United Kingdom The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain, is a country in Europe, off the north-western coast of the continental mainland. It comprises England, Scotland, Wales and North ...
Government Communications Headquarters (GCHQ) information security assessment had listed "investigative journalists" alongside terrorists and
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
s in a threat hierarchy.


The role of mass and targeted surveillance in undercutting legal protections

Fuchs, Eubanks, and Giroux have warned that surveillance is a broader problem than the impingement of individual privacy. Andrejevic (2014) has argued that it represents a fundamental alteration to the power dynamics of society: "...Surveillance should be understood as referring to forms of monitoring deeply embedded in structural conditions of asymmetrical power relations that underwrite domination and exploitation." Mass surveillance can be defined as the broad, arbitrary monitoring of an entire or substantial fraction of a population. According to former United Nations Special Rapporteur on the Promotion and Protection of the Right to Freedom of Expression and Opinion, Frank La Rue, States can achieve almost complete control of
telecommunication Telecommunication is the transmission of information by various types of technologies over wire, radio, optical, or other electromagnetic systems. It has its origin in the desire of humans for communication over a distance greater than that fe ...
s and online communications "...by placing taps on the
fiber-optic An optical fiber, or optical fibre in Commonwealth English, is a flexible, transparent fiber made by drawing glass (silica) or plastic to a diameter slightly thicker than that of a human hair. Optical fibers are used most often as a means t ...
cables, through which the majority of digital communication information flows, and applying word, voice and speech recognition...". A report of the United Nations Special Rapporteur on the Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism,
Ben Emmerson Michael Benedict Emmerson CBE KC (born 30 August 1963) is a British barrister, specialising in public international law, human rights and humanitarian law, and international criminal law. From 2011 to 2017, he was the UN Special Rapporteur o ...
, has outlined that States can gain access to the telephone and email content of an effectively unlimited number of users and maintain an overview of Internet activity associated with particular websites. "All of this is possible without any prior suspicion related to a specific individual or organization. The communications of literally every
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
user are potentially open for inspection by intelligence and
law enforcement agencies A law enforcement agency (LEA) is any government agency responsible for the enforcement of the laws. Jurisdiction LEAs which have their ability to apply their powers restricted in some way are said to operate within a jurisdiction. LEA ...
in the States concerned". There is also concern about the extent of
targeted surveillance Targeted surveillance (or targeted interception) is a form of surveillance, such as wiretapping, that is directed towards specific persons of interest, and is distinguishable from mass surveillance (or bulk interception). Both untargeted and targ ...
, according to Emmerson's report: "Targeted surveillance...enables intelligence and law enforcement agencies to monitor the online activity of particular individuals, to penetrate databases and cloud facilities, and to capture the information stored on them". In 2013, the Monk School of Global Affairs' Citizen Lab research group at the
University of Toronto The University of Toronto (UToronto or U of T) is a public research university in Toronto, Ontario, Canada, located on the grounds that surround Queen's Park. It was founded by royal charter in 1827 as King's College, the first institution ...
discovered command and control servers for FinFisher software (also known as FinSpy) backdoors, in a total of 25 countries, including 14 countries in
Asia Asia (, ) is one of the world's most notable geographical regions, which is either considered a continent in its own right or a subcontinent of Eurasia, which shares the continental landmass of Afro-Eurasia with Africa. Asia covers an area ...
, nine in
Europe Europe is a large peninsula conventionally considered a continent in its own right because of its great physical size and the weight of its history and traditions. Europe is also considered a Continent#Subcontinents, subcontinent of Eurasia ...
and
North America North America is a continent in the Northern Hemisphere and almost entirely within the Western Hemisphere. It is bordered to the north by the Arctic Ocean, to the east by the Atlantic Ocean, to the southeast by South America and the Car ...
, one in
Latin America and the Caribbean The term Latin America and the Caribbean (LAC) is an English-language acronym referring to the Latin American and the Caribbean region. The term LAC covers an extensive region, extending from The Bahamas and Mexico to Argentina and Chile. The re ...
, and one in
Africa Africa is the world's second-largest and second-most populous continent, after Asia in both cases. At about 30.3 million km2 (11.7 million square miles) including adjacent islands, it covers 6% of Earth's total surface area ...
. This software is exclusively sold to
government A government is the system or group of people governing an organized community, generally a state. In the case of its broad associative definition, government normally consists of legislature, executive, and judiciary. Government is a ...
s and law enforcement agencies. A 2008 Council of Europe report detailed what it described as a "worrying trend in the use of both authorized and unauthorized electronic surveillance to monitor
journalist A journalist is an individual that collects/gathers information in form of text, audio, or pictures, processes them into a news-worthy form, and disseminates it to the public. The act or process mainly done by the journalist is called journalism ...
s by governments and private parties to track their activities and identify their sources". According to the report, most such incidents are not related to countering terrorism but they are authorized under the broad powers of national laws or undertaken illegally, in an attempt to identify the sources of journalistic information. These laws expand surveillance in a number of ways, according to the CoE study, such as: * Extending the range of crimes that interception is authorised for; * Relaxing legal limitations on approving and conducting surveillance including allowing for warrantless interception in some cases; * Authorizing the use of invasive techniques such as
Trojan horse The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
and remote keystroke monitoring to be used; * Increased demand for identification of users of telecommunications services. According to Polish law academic Jan Podkowik (2014), surveillance undertaken without a journalist's consent should be considered as an act of interference with the protection granted by Article 10 of the
European Convention on Human Rights The European Convention on Human Rights (ECHR; formally the Convention for the Protection of Human Rights and Fundamental Freedoms) is an international convention to protect human rights and political freedoms in Europe. Drafted in 1950 by t ...
. He proposed in a 2014 paper that interference with journalistic confidentiality by means of secret surveillance should be recognized at least as equally onerous as searches of a home or a workplace. "... it seems that in the digital era, it is necessary to redefine the scope of the protection of journalistic privilege and to include in that scope all the data acquired in the process of communication, preparation, processing or gathering of information that would enable the identification of an informant," Podkowik wrote.


The role of third party intermediaries and data retention

Compounding the impacts of surveillance on source protection and confidential source-dependent journalism globally is the interception, capture and long term storage of data by third party intermediaries. If
ISPs An Internet service provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet. ISPs can be organized in various forms, such as commercial, community-owned, non-profit, or otherwise private ...
,
search engines A search engine is a software system designed to carry out web searches. They search the World Wide Web in a systematic way for particular information specified in a textual web search query. The search results are generally presented in a ...
, telecommunication technologies, and
social media Social media are interactive media technologies that facilitate the creation and sharing of information, ideas, interests, and other forms of expression through virtual communities and networks. While challenges to the definition of ''social medi ...
platforms, for example, can be compelled to produce electronic records (stored for increasingly lengthy periods under mandatory data retention laws) that identify journalists' sources, then legal protections that shield journalists from disclosing confidential sources may be undercut by backdoor access to the data. A 2014 United Nations
Office of the High Commissioner for Human Rights The Office of the United Nations High Commissioner for Human Rights, commonly known as the Office of the High Commissioner for Human Rights (OHCHR) or the United Nations Human Rights Office, is a department of the Secretariat of the United Nati ...
Report, The
right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 1948 ...
in the Digital Age concludes that there is a pattern of "...increasing reliance of Governments on private sector actors to retain data 'just in case' it is needed for government purposes. Mandatory third-party data retention—a recurring feature of surveillance regimes in many States, where Governments require telephone companies and internet service providers to store
metadata Metadata is "data that provides information about other data", but not the content of the data, such as the text of a message or the image itself. There are many distinct types of metadata, including: * Descriptive metadata – the descriptive ...
about their customers' communications and location for subsequent law enforcement and intelligence agency access—appears neither necessary nor proportionate". States are introducing mandatory data retention laws. Such laws require telecommunications and Internet Service Providers to preserve communications data for inspection and analysis, according to a report of the Special Rapporteur on Promotion and Protection of Human Rights and Fundamental Freedoms while Countering Terrorism. In practice, this means that data on individuals' telecommunication and Internet transactions are collected and stored even when no suspicion of crime has been raised. Some of the data collected under these policies is known as metadata. Metadata is data that defines and describes other data. For the
International Organization for Standardization The International Organization for Standardization (ISO ) is an international standard development organization composed of representatives from the national standards organizations of member countries. Membership requirements are given in Ar ...
standard, metadata is defined as data that defines and describes other data and processes. As the
Electronic Frontier Foundation The Electronic Frontier Foundation (EFF) is an international non-profit digital rights group based in San Francisco, California. The foundation was formed on 10 July 1990 by John Gilmore, John Perry Barlow and Mitch Kapor to promote Internet ci ...
's Peter Eckersley has put it, "Metadata is information about what communications you send and receive, who you talk to, where you are when you talk to them, the length of your conversations, what kind of device you were using and potentially other information, like the subject line of your emails". Metadata may also include
geolocation Geopositioning, also known as geotracking, geolocalization, geolocating, geolocation, or geoposition fixing, is the process of determining or estimating the geographic position of an object. Geopositioning yields a set of Geographic coordinate s ...
information. Advocates of long-term metadata retention insist that there are no significant privacy or freedom of expression threats. Even when journalists
encrypt In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
the content, they may neglect the metadata, meaning they still leave behind a digital trail when they communicate with their sources. This data can easily identify a source, and safeguards against its illegitimate use are frequently limited, or non-existent.


Changes in entitlement to protection

In an era where citizens and other social communicators have the capacity to publish directly to their own audiences, and those sharing information in the public interest are recognized as legitimate journalistic actors by the
United Nations The United Nations (UN) is an intergovernmental organization whose stated purposes are to maintain international peace and international security, security, develop friendly relations among nations, achieve international cooperation, and be ...
, the question, for Julie Posetti is to know to whom source protection laws should be applied. On the one hand, broadening the legal definition of 'journalist' to ensure adequate protection for citizen reporters (working on and offline) is desirable, and case law is catching up gradually on this issue of redefinition. On the other hand, it opens up debates about licensing and registering those who do journalism and who wish to be recognized for protection of their sources.


Safety of women journalists

Female journalists working in the context of reporting conflict and organized crime are particularly vulnerable to physical attacks, including
sexual assault Sexual assault is an act in which one intentionally sexually touches another person without that person's consent, or coerces or physically forces a person to engage in a sexual act against their will. It is a form of sexual violence, which ...
, and
harassment Harassment covers a wide range of behaviors of offensive nature. It is commonly understood as behavior that demeans, humiliates or embarrasses a person, and it is characteristically identified by its unlikelihood in terms of social and moral ...
. In some contexts, their physical mobility may be restricted due to overt threats to their safety, or as a result of cultural prohibitions on women's conduct in public, including meeting privately with male sources. For the World Trends Report, women journalists need to be able to rely on secure non-physical means of communication with their sources. Women sources may face the same physical risks outlined above—especially if their journalistic contact is male and/or they experience cultural restrictions, or they are working in conflict zones. Additionally, female confidential sources who are
domestic abuse Domestic violence (also known as domestic abuse or family violence) is violence or other abuse that occurs in a domestic setting, such as in a marriage or cohabitation. ''Domestic violence'' is often used as a synonym for ''intimate partner v ...
victims may be physically unable to leave their homes, and therefore be reliant on
digital communications Data transmission and data reception or, more broadly, data communication or digital communications is the transfer and reception of data in the form of a digital bitstream or a digitized analog signal transmitted over a point-to-point or ...
. Women journalists need to be able to rely on secure digital communications to ensure that they are not at increased risk in conflict zones, or when working on dangerous stories, such as those about
corruption Corruption is a form of dishonesty or a criminal offense which is undertaken by a person or an organization which is entrusted in a position of authority, in order to acquire illicit benefits or abuse power for one's personal gain. Corruption m ...
and
crime In ordinary language, a crime is an unlawful act punishable by a State (polity), state or other authority. The term ''crime'' does not, in modern criminal law, have any simple and universally accepted definition,Farmer, Lindsay: "Crime, definit ...
. The ability to covertly intercept and analyze journalistic communications with sources increases the physical risk to both women journalists and their sources in such contexts.
Encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
communications and other defensive measures are therefore of great importance to ensure that their movements are not tracked and the identity of the source remains confidential. Journalists and sources using the Internet or mobile apps to communicate face greater risk of gendered harassment and threats of violence. These risks need to be understood and mitigated to avoid further chilling women's involvement in journalism—as practitioners or sources.


International regulations

"There is widespread recognition in international agreements, case law and declarations that protection of journalists' sources rea crucial aspect of freedom of expression that should be protected by all nations"
International Organizations An international organization or international organisation (see spelling differences), also known as an intergovernmental organization or an international institution, is a stable set of norms and rules meant to govern the behavior of states an ...
such as the United Nations (UN) or
UNESCO The United Nations Educational, Scientific and Cultural Organization is a specialized agency of the United Nations (UN) aimed at promoting world peace and security through international cooperation in education, arts, sciences and culture. It ...
,
Organisation of American States The Organization of American States (OAS; es, Organización de los Estados Americanos, pt, Organização dos Estados Americanos, french: Organisation des États américains; ''OEA'') is an international organization that was founded on 30 April ...
,
African Union The African Union (AU) is a continental union consisting of 55 member states located on the continent of Africa. The AU was announced in the Sirte Declaration in Sirte, Libya, on 9 September 1999, calling for the establishment of the Africa ...
,
Council of Europe The Council of Europe (CoE; french: Conseil de l'Europe, ) is an international organisation founded in the wake of World War II to uphold European Convention on Human Rights, human rights, democracy and the Law in Europe, rule of law in Europe. ...
, and the
Organization for Security and Co-operation in Europe The Organization for Security and Co-operation in Europe (OSCE) is the world's largest regional security-oriented intergovernmental organization with observer status at the United Nations. Its mandate includes issues such as arms control, prom ...
(OSCE) have specifically recognized journalists' right to protect their sources. The
European Court of Human Rights The European Court of Human Rights (ECHR or ECtHR), also known as the Strasbourg Court, is an international court of the Council of Europe which interprets the European Convention on Human Rights. The court hears applications alleging that a ...
(ECtHR) has found in several cases that it is an essential component of freedom of expression.


United Nations Actors


Resolutions

* 2012: Resolution adopted by the UN Human Rights Council (A/HRC/RES/20/8) on the promotion, protection and enjoyment of human rights on the Internet that recognize the need to uphold people's rights equally regardless of environment * 2012:
Human Rights Council The United Nations Human Rights Council (UNHRC), CDH is a United Nations body whose mission is to promote and protect human rights around the world. The Council has 47 members elected for staggered three-year terms on a regional group basis. ...
resolution A/HRC/RES/21/12 on the safety of journalists. * 2013: Resolution adopted by the UN General Assembly (A/RES/68/163) on the Safety of Journalists and Issue of Impunity (2013) * In November 2013, the 37th session of the UNESCO General Conference passed a Resolution on 'Internet-related issues: including access to information and knowledge, freedom of expression, privacy and ethical dimensions of the information society' (UNESCO 2013). * In December 2013 the
United Nations General Assembly The United Nations General Assembly (UNGA or GA; french: link=no, Assemblée générale, AG) is one of the six principal organs of the United Nations (UN), serving as the main deliberative, policymaking, and representative organ of the UN. Curr ...
(UNGA) adopted a resolution on the Right to Privacy in the Digital Age. (A/C.3/68/167) * 2014: Resolution adopted by the UN Human Rights Council (A/HRC/RES/27/5) on the
Safety of Journalists Safety of journalists is the ability for journalists and media professionals to receive, produce and share information without facing physical or moral threats. Journalists can face violence and intimidation for exercising their fundamental ri ...
* December 2014: UN General Assembly Resolution on The safety of journalists and the issue of impunity freedoms (A/RES/69/185)


Reports, recommendations, statements and comments

* July 2011: Office of the
International Covenant on Civil and Political Rights The International Covenant on Civil and Political Rights (ICCPR) is a multilateral treaty that commits nations to respect the civil and political rights of individuals, including the right to life, freedom of religion, freedom of speech, freedo ...
UN Human Rights Committee, General Comment no. 34 recognizes protection of all forms of expression and the means of their dissemination, including electronic and Internet-based modes of expression. * 2012: Carthage Declaration—participants at the UNESCO
World Press Freedom Day The United Nations General Assembly declared May 3 to be World Press Freedom Day or just World Press Day, observed to raise awareness of the importance of freedom of the press and remind governments of their duty to respect and uphold the righ ...
conference highlights the significance of the challenges posed by Internet communications to the maintenance of freedom of expression and privacy rights essential to the practice of investigative journalism. * June 2013: 'Report of the Special Rapporteur (Frank La Rue) on the Promotion and Protection of the Right to Freedom of Opinion and Expression' to the Human Rights Council (A/HRC/23/40) highlights the relationship between the rights to freedom of expression, and access to information and privacy that underpins source protection. * In July 2013, the then UN High Commissioner for Human Rights,
Navi Pillay Navanethem "Navi" Pillay (born 23 September 1941) is a South African jurist who served as the United Nations High Commissioner for Human Rights from 2008 to 2014. A South African of Indian Tamil origin, she was the first non-white woman judge o ...
spotlighted the right to privacy in protecting individuals who reveal human rights implicated information. * In February 2014, the UN hosted an international expert seminar on the Right to Privacy in the Digital Age (Geneva) Frank La Rue (then UN Special Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression), called for a special United Nations mandate for protecting the right to privacy. * July 2014 - Summary of the Human Rights Council panel discussion on the safety of journalists: Report of the Office of the United Nations High Commissioner for Human Rights the meeting heard that national security and anti-terrorism laws should not be used to silence journalists * 2014 UNESCO World Trends in Freedom of Expression and Media Development report highlights the role of national security, anti-terrorism and anti-extremism laws as instruments "...used in some cases to limit legitimate debate and to curtail dissenting views in the media, while also underwriting expanded surveillance, which may be seen to violate the right to privacy and to jeopardize freedom of expression" * July 2014: 'The right to privacy in the digital age: Report of the Office of the United Nations High Commissioner for Human Rights' * July 2015: UNESCO study "Keystones for the Internet" calls for enhanced protection of the confidentiality of sources of journalism in the digital age. * May 2015: UN
Office of the High Commissioner for Human Rights The Office of the United Nations High Commissioner for Human Rights, commonly known as the Office of the High Commissioner for Human Rights (OHCHR) or the United Nations Human Rights Office, is a department of the Secretariat of the United Nati ...
(OHCHR) Report on Encryption, Anonymity and the Human Rights Framework by UN Special on the Promotion and Protection of the Right to Freedom of Opinion and Expression, David Kaye (Kaye 2015) emphasizes the essential roles played by encryption and anonymity as defenses create a zone of privacy to protect opinion from outside scrutiny.


Inter-regional institutions


Organisation for Security and Co-operation in Europe (OSCE)

* The
OSCE The Organization for Security and Co-operation in Europe (OSCE) is the world's largest regional security-oriented intergovernmental organization with observer status at the United Nations. Its mandate includes issues such as arms control, prom ...
Representative on Freedom of the Media (RFOM) regularly issues statements and comments regarding breaches and threats to legal source protection frameworks. * June 2011 Organization for Security and Cooperation in Europe (OSCE)—Representative on Freedom of the Media: Vilnius Recommendations on
Safety of Journalists Safety of journalists is the ability for journalists and media professionals to receive, produce and share information without facing physical or moral threats. Journalists can face violence and intimidation for exercising their fundamental ri ...
. This set of recommendations included the following point relevant to source protection in connection with journalism safety: "Encourage legislators to increase safe working conditions for journalists by creating legislation that fosters media freedoms, including guarantees of free access to information, protection of confidential sources, and decriminalizing journalistic activities."


The Organisation for Economic Co-operation and Development (OECD)

April 2013 draft report published: "CleanGovBiz Integrity in Practice, Investigative Media" argued that forcing a journalist to reveal a source in such cases would be a short sighted approach in many cases: "...once a corruption case has been brought to light by a journalist, law enforcement has an incentive to discover the anonymous source(s). While the source might indeed be valuable for the case in question either by providing additional information or through being a witness in court forcing the journalist to reveal the source would often be short-sighted."


Status around the world


Africa

In Africa, the
African Commission on Human and Peoples' Rights The African Commission on Human and Peoples' Rights (ACHPR) is a quasi-judicial body tasked with promoting and protecting human rights and collective (peoples') rights throughout the African continent as well as interpreting the African Charter ...
has adopted a ''Declaration of Principles on Freedom of Expression in Africa'' which includes a right to protection of sources under Principle XV.


Legal framework

Article 9 of the African Charter of Human Rights gives every person the right to receive information and express and disseminate opinions. The 2002 Declaration of Principles on Freedom of Expression in Africa, released by the African Commission on Human and People's Rights, provided guidelines for
member states of the African Union The member states of the African Union are the 55 sovereign states that have ratified or acceded to the Constitutive Act of the African Union to become member states to the African Union (AU). The AU was the successor to the Organisation of Afr ...
on protection of sources: "XV Protection of Sources and other journalistic material Media practitioners shall not be required to reveal confidential sources of information or to disclose other material held for journalistic purposes except in accordance with the following principles: * The identity of the source is necessary for the investigation or prosecution of a serious crime, or the defense of a person accused of a criminal offense; * The information or similar information leading to the same result cannot be obtained elsewhere; * The
public interest The public interest is "the welfare or well-being of the general public" and society. Overview Economist Lok Sang Ho in his ''Public Policy and the Public Interest'' argues that the public interest must be assessed impartially and, therefore ...
in disclosure outweighs the harm to freedom of expression; * And disclosure has been ordered by a court, after a full hearing." Noteworthy developments since 2007: * April 2013 - Model Law on Access to Information in Africa by the Special Rapporteur on Freedom of Expression and Access to Information at the African Commission on Human and People's Rights was circulated. An information officer may refuse a request if the information: "(c) Consists of confidential communication between a journalist and her or his source". * May 2015 -
East African Court of Justice , image = , imagesize = , caption = , motto = , established = 30 November 2001 , country = 6 member states of the East African Community , location = Arusha, Tanzania , coordinates ...
(EAJC) judgement on Burundi Press Law (Burundian journalists' union v the Attorney General of the Republic of Burundi, Reference No.7 of 2013). In this judgement, the EAJC ruled Articles 19 & 20 of Burundi's 2013 Press Law violated democratic principles and should be repealed.


Asia and the Pacific

The
Association of Southeast Asian Nations ASEAN ( , ), officially the Association of Southeast Asian Nations, is a political and economic union of 10 member states in Southeast Asia, which promotes intergovernmental cooperation and facilitates economic, political, security, militar ...
(ASEAN) adopted a Human Rights Declaration in November 2012 with general provisions for freedom of expression and privacy (ASEAN 2012). Reservations have been voiced regarding the wording of provisions on human rights and fundamental freedoms in relation to political, economic and cultural systems and the Declaration's provisions on "balancing" rights with individual duties as well as an absence of reference that legitimate restrictions of rights must be provided by law and conform to strict tests of necessity and proportionality In 2007, Banisar noted that: "A major recent concern in the region is the adoption of new anti-terrorism laws that allow for access to records and oblige assistance. There are also problems in many countries with searches of
newsroom A newsroom is the central place where journalists—reporters, editors, and producers, associate producers, news anchors, news designers, photojournalists, videojournalists, associate editor, residence editor, visual text editor, Desk Head, s ...
s and with broadly defined state secrets acts which criminalize journalists who publish leaked information".


Europe

In Europe, the
European Court of Human Rights The European Court of Human Rights (ECHR or ECtHR), also known as the Strasbourg Court, is an international court of the Council of Europe which interprets the European Convention on Human Rights. The court hears applications alleging that a ...
stated in the 1996 case of ''Goodwin v. United Kingdom'' that " otection of journalistic sources is one of the basic conditions for press freedom ... Without such protection, sources may be deterred from assisting the press in informing the public on matters of public interest. As a result the vital public-watchdog role of the press may be undermined and the ability of the press to provide accurate and reliable information may be adversely affected." The Court concluded that absent "an overriding requirement in the public interest", an order to disclose sources would violate the guarantee of free expression in Article 10 of the
European Convention on Human Rights The European Convention on Human Rights (ECHR; formally the Convention for the Protection of Human Rights and Fundamental Freedoms) is an international convention to protect human rights and political freedoms in Europe. Drafted in 1950 by t ...
. In the wake of ''Goodwin'', the
Council of Europe The Council of Europe (CoE; french: Conseil de l'Europe, ) is an international organisation founded in the wake of World War II to uphold European Convention on Human Rights, human rights, democracy and the Law in Europe, rule of law in Europe. ...
's Committee of Ministers issued a Recommendation to its member states on how to implement the protection of sources in their domestic legislation. The
Organization for Security and Co-operation in Europe The Organization for Security and Co-operation in Europe (OSCE) is the world's largest regional security-oriented intergovernmental organization with observer status at the United Nations. Its mandate includes issues such as arms control, prom ...
has also called on states to respect the right. "The recognition of protection of journalistic sources is fairly well established in Europe both at the regional and domestic levels. For the most part, the protections seem to be respected by authorities...and direct demands to xposesources seem more the exception than the common practice". Banisar noted: "...There are still significant problems. Many of the national laws are limited in scope, or in the types of journalists that they protect. The protections are being bypassed in many countries by the use of searches of newsrooms and through increasing use of surveillance. There has also been an increase in the use of criminal sanctions against journalists, especially under national security grounds for receiving information from sources." Since then, European organizations and law-making bodies have made significant attempts at a regional level to identify the risks posed to source protection in the changing digital environment, and to mitigate these risks.


European Court of Human Rights and European Union Court of Justice

* November 2007:
European Court of Human Rights The European Court of Human Rights (ECHR or ECtHR), also known as the Strasbourg Court, is an international court of the Council of Europe which interprets the European Convention on Human Rights. The court hears applications alleging that a ...
(ECtHR) - Tillack v Belgium (20477/05) involved a leak investigation targeting an investigative journalist. The ECtHRs judgment concluded that the authorities acted disproportionately and breached the journalist's right to freedom of expression enshrined in Article 10 of the
European Convention on Human Rights The European Convention on Human Rights (ECHR; formally the Convention for the Protection of Human Rights and Fundamental Freedoms) is an international convention to protect human rights and political freedoms in Europe. Drafted in 1950 by t ...
. * February 2008: European Court of Human Rights (ECtHR) Guja v. Moldova (14277/04) This judgement found in favour of Jacob Guja who had served as a
whistleblower A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
to a newspaper regarding cases of alleged political interference with the justice process. * December 2009: European Court of Human Rights (ECtHR)
Financial Times The ''Financial Times'' (''FT'') is a British daily newspaper printed in broadsheet and published digitally that focuses on business and economic current affairs. Based in London, England, the paper is owned by a Japanese holding company, Nik ...
ltd and others v. The United Kingdom (821/03). The Court ruled that the Financial Times, The Guardian,
The Times ''The Times'' is a British daily national newspaper based in London. It began in 1785 under the title ''The Daily Universal Register'', adopting its current name on 1 January 1788. ''The Times'' and its sister paper ''The Sunday Times'' (fou ...
,
The Independent ''The Independent'' is a British online newspaper. It was established in 1986 as a national morning printed paper. Nicknamed the ''Indy'', it began as a broadsheet and changed to tabloid format in 2003. The last printed edition was publis ...
and
Reuters Reuters ( ) is a news agency owned by Thomson Reuters Corporation. It employs around 2,500 journalists and 600 photojournalists in about 200 locations worldwide. Reuters is one of the largest news agencies in the world. The agency was estab ...
were right to protect their sources by rejecting a United Kingdom High Court order for them to turn over leaked documents connected to a takeover bid involving a
brewing company A brewery or brewing company is a business that makes and sells beer. The place at which beer is commercially made is either called a brewery or a beerhouse, where distinct sets of brewing equipment are called plant. The commercial brewing of beer ...
. * September 2010: European Court of Human Rights (ECtHR), Grand Chamber Appeal—Sanoma Uitgevers B.V. v
The Netherlands ) , anthem = ( en, "William of Nassau") , image_map = , map_caption = , subdivision_type = Sovereign state , subdivision_name = Kingdom of the Netherlands , established_title = Before independence , established_date = Spanish Netherl ...
. The ECtHR declared illegal the seizure by the Dutch police of a journalist's CD of photographs, which identified confidential sources. * November 2012: European Court of Human Rights (ECtHR) Telegraaf Media Nederland Landelijke Media b.v. and others v. the Netherlands (Application no. 39315/06) The complaint in this case was brought by a Dutch newspaper and two of its journalists. The journalists had been under investigation after publishing stories in
De Telegraaf ''De Telegraaf'' (; en, The Telegraph) is the largest Dutch daily morning newspaper. Haro Kraak,Gaat Paul Jansen de crisis bij De Telegraaf oplossen?, '' de Volkskrant'', 2015. Retrieved 1 August 2015. Paul Jansen has been the editor-in-chief s ...
about the circulation of state secrets, in the form of documents from the Netherlands' secret service (AIVD). The Court found that the journalists' rights under both Articles 8 and 10 of the European Convention on Human Rights had been violated. * April 2014: European Union Court of Justice judgement (Ireland Data Retention Directive). The Court observed, in its judgment declaring the
Data Retention Directive The Data Retention Directive (Directive 2006/24/EC), a directive, later declared invalid by the European Court of Justice, was at first passed on 15 March 2006 and regulated data retention, where data has been generated or processed in connect ...
invalid, that communications metadata "taken as a whole may allow very precise conclusions to be drawn concerning the private lives of the persons whose data has been retained" (Digital Rights Ireland Ltd C-293/12 v Minister for Communications et al. Ireland, 8 April 2014, Directive 2006/24/EC). * May 2014 Stichting Ostade Blade v The Netherlands in the ECtHR (Application no. 8406/06). The Court rejected a Dutch magazine's application against a police raid under Article 10 of the European Convention on Human Rights. This judgement demonstrates the narrow circumstances in which source protection laws can be legitimately over-ridden in the public interest.


Council of Europe (COE)

* September 2007: Guidelines of the Committee of Ministers of the Council of Europe on protecting freedom of expression and information in times of crisis adopted. These guidelines (CoE 2007) recommended that Member States adopt Recommendation No. R (2000)7 (CoE 2000) into law and practice. In March 2000, the Council of Europe's Committee of Ministers had adopted that Recommendation on the "right of journalists not to disclose their sources of information". * 2010: Report on the protection of journalists' sources from the Council of Europe (CoE) Parliamentary Assembly highlighted the need to limit exceptions to legal source protection provisions. * 2011: Council of Europe Human Rights Commission issues discussion paper on Protection of Journalists from Violence (CoE HRC 2011) noting that "the fight against terrorism does not allow the authorities to circumvent this right by going beyond what is permitted rticle 10 of the ECHR and Recommendation R (2000) 7 * 2011:
Council of Europe Parliamentary Assembly The Parliamentary Assembly of the Council of Europe (PACE) is the parliamentary arm of the Council of Europe, a 46-nation international organisation dedicated to upholding human rights, democracy and the rule of law. The Assembly is made up o ...
adopted Recommendation 1950 on the protection of journalists´ sources. (CoE 2011) recommending that the Committee of Ministers call on all their Member States to: legislate for source protection; review their national laws on surveillance,
anti-terrorism Counterterrorism (also spelled counter-terrorism), also known as anti-terrorism, incorporates the practices, military tactics, techniques, and strategies that governments, law enforcement, business, and intelligence agencies use to combat or el ...
,
data retention Data retention defines the policies of persistent data and records management for meeting legal and business data archival requirements. Although sometimes interchangeable, it is not to be confused with the Data Protection Act 1998. The differen ...
, and access to telecommunications records; co-operate with journalists' and
media freedom Freedom of the press or freedom of the media is the fundamental principle that communication and expression through various media, including printed and electronic media, especially published materials, should be considered a right to be exerci ...
organisations to produce guidelines for prosecutors and police officers and training materials for judges on the right of journalists not to disclose their sources; develop guidelines for public authorities and private service providers concerning the protection of the confidentiality of journalists' sources in the context of the interception or disclosure of
computer data In computer science, data (treated as singular, plural, or as a mass noun) is any sequence of one or more symbols; datum is a single symbol of data. Data requires interpretation to become information. Digital data is data that is represented us ...
and traffic data of computer network. * 2014 Declaration of the Committee of Ministers on the protection of journalism and safety of journalists and other media actors adopted: "A favorable environment for public debate requires States to refrain from judicial intimidation by restricting the right of individuals to disclose information of public interest through arbitrary or disproportionate application of the law, in particular the criminal law provisions relating to defamation, national security or terrorism. The arbitrary use of laws creates a chilling effect on the exercise of the right to impart information and ideas, and leads to self-censorship." * January 2015: Council of Europe Committee on Legal Affairs and Human Rights, Report on Mass Surveillance/Resolution and recommendation addressed the implications for journalistic source protection in the context of freedom of expression and access to information. The Resolution included the following statement: "The Parliamentary Assembly is deeply concerned about mass surveillance practices disclosed since June 2013 by journalists to whom a former United States national security insider, Mr.
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
, had entrusted a large amount of top secret data establishing the existence of mass surveillance and large-scale intrusion practices hitherto unknown to the general public and even to most political decision-makers." * May 2014: Council of the European Union - "EU Human Rights Guidelines on Freedom of Expression: Online and Offline" included the following statement: "States should protect by law the right of journalists not to disclose their sources in order to ensure that journalists can report on matters in the public interest without their sources fearing retribution. All governments must allow journalists to work in a free and enabling environment in safety and security, without the fear of censorship or restraint."


Bulgaria, Poland, and Romania

In Bulgaria, Poland, and Romania unauthorized access to information by government entities were identified in several cases. In those political regions, policies such as mandatory registration of pre-paid SIM mobile phone cards and government access to
CCTV Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly t ...
make hacking tools and surveillance a lot easier.


Netherlands

In the Netherlands, a 2006 case ruled that in cases of minimal national security interest do not supersede source confidentiality. Bart Mos and Joost de Haas, of the Dutch daily ''
De Telegraaf ''De Telegraaf'' (; en, The Telegraph) is the largest Dutch daily morning newspaper. Haro Kraak,Gaat Paul Jansen de crisis bij De Telegraaf oplossen?, '' de Volkskrant'', 2015. Retrieved 1 August 2015. Paul Jansen has been the editor-in-chief s ...
''. In an article in January 2006, the two journalists alleged the existence of a
leak A leak is a way (usually an opening) for fluid to escape a container or fluid-containing system, such as a tank or a ship's hull, through which the contents of the container can escape or outside matter can enter the container. Leaks are usuall ...
in the Dutch secret services and quoted from what they claimed was an official dossier on Mink Kok, a notorious criminal. They further alleged that the dossier in question had fallen into the hands of Kok himself. A subsequent police investigation led to the
prosecution A prosecutor is a legal representative of the prosecution in states with either the common law adversarial system or the civil law inquisitorial system. The prosecution is the legal party responsible for presenting the case in a criminal trial ...
of Paul H., an agent accused of selling the file in question. Upon motions by the prosecution and the defence, the investigative judge in the case ordered the disclosure of the source for the news story, on the grounds that it was necessary to safeguard
national security National security, or national defence, is the security and defence of a sovereign state, including its citizens, economy, and institutions, which is regarded as a duty of government. Originally conceived as protection against military atta ...
and ensure a
fair trial A fair (archaic: faire or fayre) is a gathering of people for a variety of entertainment or commercial activities. Fairs are typically temporary with scheduled times lasting from an afternoon to several weeks. Types Variations of fairs incl ...
for H. The two journalists were subsequently detained for refusing to comply with the disclosure order, but were released on
appeal In law, an appeal is the process in which cases are reviewed by a higher authority, where parties request a formal change to an official decision. Appeals function both as a process for error correction as well as a process of clarifying and ...
after three days, on November 30.
The Hague The Hague ( ; nl, Den Haag or ) is a city and municipality of the Netherlands, situated on the west coast facing the North Sea. The Hague is the country's administrative centre and its seat of government, and while the official capital of ...
district court considered that the national security interest served by the order was minor and should not prevail over the protection of sources.


North and South America

In the Americas, protection of sources has been recognized in the ''Inter-American Declaration of Principles on Freedom of Expression'', which states in Principle 8 that "every social communicator has the right to keep his/her source of information, notes, personal and professional archives confidential."


United States

In the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
, unlike doctor-patient or lawyer-client confidentiality, reporters are not afforded a similar legal shield. Communications between reporters and sources have been used by the
FBI The Federal Bureau of Investigation (FBI) is the domestic Intelligence agency, intelligence and Security agency, security service of the United States and its principal Federal law enforcement in the United States, federal law enforcement age ...
and other
law enforcement agencies A law enforcement agency (LEA) is any government agency responsible for the enforcement of the laws. Jurisdiction LEAs which have their ability to apply their powers restricted in some way are said to operate within a jurisdiction. LEA ...
as an avenue to information about specific individuals or groups related to pending
criminal investigation Criminal investigation is an applied science that involves the study of facts that are then used to inform criminal trials. A complete criminal investigation can include searching, interviews, interrogations, evidence collection and preservatio ...
s.


= Branzburg v. Hayes

= In the 1971 case of '' Branzburg v. Hayes'' the court ruled that reporter's privilege was not guaranteed by the
First Amendment First or 1st is the ordinal form of the number one (#1). First or 1st may also refer to: *World record, specifically the first instance of a particular achievement Arts and media Music * 1$T, American rapper, singer-songwriter, DJ, and rec ...
, but the publicity surrounding the case helped introduce the concept of reporter's privilege into public discussion. As a result of the case, Branzburg'','' a Kentucky reporter, was forced to testify about his sources and story to a grand jury.


= Tracy v. Missoula

= A
University of Montana The University of Montana (UM) is a public research university in Missoula, Montana. UM is a flagship institution of the Montana University System and its second largest campus. UM reported 10,962 undergraduate and graduate students in the fal ...
student, Linda Tracy, was issued a
subpoena A subpoena (; also subpœna, supenna or subpena) or witness summons is a writ issued by a government agency, most often a court, to compel testimony by a witness or production of evidence under a penalty for failure. There are two common types of ...
for video she took of a violent encounter between police officers and a group of residents. The case, which was ultimately dismissed, involved attaining unedited footage of the encounter which part of was used in a documentary Linda Tracy made as for an undergraduate journalism class. Although she won the case, her status as a real journalist was called into question. Even with the victory, the court did not specifically address if protections and privacy extended to student journalists, but because of the nature of her intent and the project she could not be coerced to releasing the footage. The case helped help further battles in student journalism and press freedoms at an educational level.


= Electronics Communications and Privacy Act

= The
Electronic Communications Privacy Act Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added new pro ...
passed in 1986 and protects bank transactions, telephone digits, and other information. The act also encompasses what organizations must provide to law enforcement with a subpoena, such as name, address, durations of services used, type of device used, and source of payment. This is known as “required disclosure” policies. It later included provisions to prohibit access to stored electronic devices.McGregor, Susan. 2014. “DIGITAL SECURITY AND SOURCE PROTECTION FOR JOURNALISTS.” ''Tow Center for Digital Journalism A Tow/Knight.''pp. 03–88. Retrieved (https://academiccommons.columbia.edu/doi/10.7916/D89P3D4M).


= Edward Snowden

= Former CIA employee
Edward Snowden Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and su ...
further impacted the relationship between journalism, sources, and privacy. Snowden's actions as a
whistleblower A whistleblower (also written as whistle-blower or whistle blower) is a person, often an employee, who reveals information about activity within a private or public organization that is deemed illegal, immoral, illicit, unsafe or fraudulent. Whi ...
at the
National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collecti ...
drew attention to the extent of US government surveillance operations.Kleberg, C. F. (2015), The Death of Source Protection? Protecting Journalists’ Source in a Post-Snowden Age, London: LSE Polis. http://www.lse.ac.uk/media@lse/documents/Death-of-Source-Protection-Carl-Fridh-Kleberg.pdf Surveillance by network administrators may include being able to view how many times a journalist or source visits a website per day, the information they are reading or viewing, and online applications they utilize.


Mexico

In Mexico, it is reported that the government there has spent $300 million during one year to surveil and gather information from the population with specific interest in journalists to get access to their texts, phone calls, and emails.Silkie Carlo and Arjen Kamphuis. 2014. “Information Security for Investigative Journalists.” ''Centre for Investigative Journalism'' 1(21). Pp 1-97.  Retrieved (https://files.gendo.ch/Books/InfoSec_for_Journalists_V1.21.pdf).


Canada

Under Canadian law journalists cannot be compelled to identify or disclose information likely to identify a journalistic source, unless a court of competent jurisdiction finds there is no other reasonable way to obtain the information in question, and that the public interest of administrating justice in the case outweighs the public interest of source protection. In 2019, the
Supreme Court of Canada The Supreme Court of Canada (SCC; french: Cour suprême du Canada, CSC) is the Supreme court, highest court in the Court system of Canada, judicial system of Canada. It comprises List of Justices of the Supreme Court of Canada, nine justices, wh ...
overturned an order that would have required a journalist to disclose the source of her reporting on the
Sponsorship scandal The sponsorship scandal, AdScam or Sponsorgate, was a scandal in Canada that came as a result of a federal government " sponsorship program" in the province of Quebec involving the Liberal Party of Canada, which was in power from 1993 to 2006. ...
, former cabinet minister Marc-Yvan Côté had sought the order in a bid to have charges against him stayed, arguing that officials from an anti-corruption police unit had leaked information about the case to the press. The case was remitted back to the
Court of Quebec The Court of Quebec (french: Cour du Québec) is a court of first instance in the Province of Quebec, Canada. The court has jurisdiction over civil matters, criminal and penal matters as well as over youth matters The court sits in administrat ...
for further consideration of new facts.


Technology

Newsrooms rely on
end-to-end encryption End-to-end encryption (E2EE) is a system of communication where only the communicating users can read the messages. In principle, it prevents potential eavesdroppers – including telecom providers, Internet providers, malicious actors, and even ...
technologies to protect the confidentiality of their communications. However, even these methods are not completely effective. More schools of journalism are also beginning to include data and source protection and privacy into their curriculum. Technologies used to protect source privacy include
SecureDrop SecureDrop is a free software platform for secure communication between journalists and sources (whistleblowers). It was originally designed and developed by Aaron Swartz and Kevin Poulsen under the name ''DeadDrop''. James Dolan also co-created ...
,
GlobaLeaks GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives. History The project started on 15 December 2010 and the first software prototype was announced on 6 September 2011. Relevant figure ...
, Off-the-Record Messaging, the Tails operating system, and Tor.


Latin America and the Caribbean

Banisar wrote: "There are important declarations from the
Organisation of American States The Organization of American States (OAS; es, Organización de los Estados Americanos, pt, Organização dos Estados Americanos, french: Organisation des États américains; ''OEA'') is an international organization that was founded on 30 April ...
(OAS). Few journalists are ever required to testify on the identity of their sources. However direct demands for sources still occur regularly in many countries, requiring journalists to seek legal recourse in courts. There are also problems with searches of newsrooms and journalists' homes, surveillance and the use of national security laws". In 1997, the Hemisphere Conference on Free Speech staged in
Mexico City Mexico City ( es, link=no, Ciudad de México, ; abbr.: CDMX; Nahuatl: ''Altepetl Mexico'') is the capital and largest city of Mexico, and the most populous city in North America. One of the world's alpha cities, it is located in the Valley o ...
adopted the Chapultepec Declaration. Principle 3 states: "No journalist may be forced to reveal his or her sources of information." Building on the Chapultepec Declaration, in 2000 the
Inter-American Commission on Human Rights The Inter-American Commission on Human Rights (the IACHR or, in the three other official languages Spanish, French, and Portuguese CIDH, ''Comisión Interamericana de los Derechos Humanos'', ''Commission Interaméricaine des Droits de l'Homme'', ...
(IACHR) approved the Declaration of Principles on Freedom of Expression as a guidance document for interpreting Article 13 of the Inter American Convention of Human Rights. Article 8 of the Declaration states: "Every social communicator has the right to keep his/her source of information, notes, personal and professional archives confidential." There are developments with regards to the status of the above regional instruments since 2007: *
Guatemala Guatemala ( ; ), officially the Republic of Guatemala ( es, República de Guatemala, links=no), is a country in Central America. It is bordered to the north and west by Mexico; to the northeast by Belize and the Caribbean; to the east by H ...
2013: (The then) President
Otto Pérez Molina Otto Fernando Pérez Molina (born 1 December 1950) is a Guatemalan politician and retired general, who was President of Guatemala from 2012 to 2015. Standing as the Patriotic Party (Guatemala), Patriotic Party (''Partido Patriota'') candidate, ...
expressed interest in signing the Declaration of Chapultepec, he later suspended the signing. *
Venezuela Venezuela (; ), officially the Bolivarian Republic of Venezuela ( es, link=no, República Bolivariana de Venezuela), is a country on the northern coast of South America, consisting of a continental landmass and many islands and islets in th ...
2013: announced its withdrawal from the Inter-American Commission on Human Rights (IACHR) and the Inter-American Court of Human Rights.


See also

*
Confidentiality Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits the access or places restrictions on certain types of information. Legal confidentiality By law, lawyers are often required ...
*
Senior Administration Official The title senior administration official is a term used by the American press to indicate the identity of a source while retaining his or her anonymity. As the title is subjective, the reporter writing the article is allowed to decide if a source ...
*
Shield laws in the United States A shield law is legislation designed to protect reporters' privilege. This privilege involves the right of news reporters to refuse to testify as to the information and/or sources of information obtained during the news gathering and disseminatio ...
* Barack Obama on mass surveillance *
Julian Assange Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. WikiLeaks came to international attention in 2010 when it published a series of leaks provided by U.S. Army inte ...
*
WikiLeaks WikiLeaks () is an international Nonprofit organization, non-profit organisation that published news leaks and classified media provided by anonymous Source (journalism), sources. Julian Assange, an Australian Internet activism, Internet acti ...
*
GlobaLeaks GlobaLeaks is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives. History The project started on 15 December 2010 and the first software prototype was announced on 6 September 2011. Relevant figure ...
* ''The Insider'' (film)


References

{{Free-content attribution , title = Protecting Journalism Sources in the Digital Age , author = Julie Posetti , publisher = UNESCO , page numbers = 193 , source = , documentURL = http://unesdoc.unesco.org/images/0024/002480/248054e.pdf , license statement URL = http://www.unesco.org/ulis/cgi-bin/ulis.pl?catno=248054&set=005AFAAD04_1_170&gp=1&lin=1&ll=1 , license = CC BY SA 3.0 IGO


External links


Silencing Sources: An International Survey of Protections and Threats to Journalists’ Sources
Global survey of source protection laws by Privacy International, 2007.
ECtHR case law factsheet on the protection of journalistic sourcesModel Brief on the Protection of Journalists' Sources
by Privacy International 2009. Creative Commons Non-Commercial Use
Amicus Curiae brief in ''Sanoma Uitgevers B.V. v the Netherlands''
providing an overview of International and European domestic law on protection of sources - the
Open Society Justice Initiative Open Society Foundations (OSF), formerly the Open Society Institute, is a grantmaking network founded and chaired by business magnate George Soros. Open Society Foundations financially supports civil society groups around the world, with a sta ...
, the
Committee to Protect Journalists The Committee to Protect Journalists (CPJ) is an American independent non-profit, non-governmental organization, based in New York City, New York, with correspondents around the world. CPJ promotes press freedom and defends the rights of journa ...
, the Media Legal Defence Initiative, ARTICLE 19, and
the Guardian ''The Guardian'' is a British daily newspaper. It was founded in 1821 as ''The Manchester Guardian'', and changed its name in 1959. Along with its sister papers ''The Observer'' and ''The Guardian Weekly'', ''The Guardian'' is part of the Gu ...
News and Media Limited, December 2009.
Infosec for Investigative Journalists, version 2016
by Silkie Carlo and Arjen Kamphuis Sources (journalism) Freedom of the press Secrecy Journalism