Skip to main content

“Digital Security and Secured Communication, essential tools for Journalist in the Digital Age”, Noutcha Prudence, Senior Program Director at NewSeta

By Pedmia Shatu Tita
At the on-going National Training of Cameroonian Journalists taking place in Yaounde, journalists have been reminded of the need for digital security and Secured Communication in a digital Age. This was done by Prudence Noutcha, the Senior Programs Direct of the Network for Solidarity, Empowerment and Transformation for all.
In a very participatory session, Prudence engaged participants in their daily activities using their digital gadgets such as phones, Ipads, laptops, desktops etc. Most of the participants answered in the affirmative when the issues of passwords on phones and machines as well as documents were raised. Madame Prudence reiterated that there is need as journalist to secure information since they deal with very delicate information which if exposed may lead to harm on the journalist in question and even loss of integrity.
Considering that journalists use a variety of online accounts and these hold both personal and work-related information on themselves, their colleagues, families and sources. Securing these accounts and regularly backing up and removing information will help protect against hackers, Madame Prudence opined. She advanced the following steps which to her according to research are particularly important for journalists who may be targeted by an adversary with sophisticated tech capacity.

Prudence2
Prudence Noutcha, the Senior Programs Direct of the Network for Solidarity, Empowerment and Transformation for all.
  • Think about what information is stored in each account, and what the consequences would be for you, your family, and your sources if your account is breached.
  • Review your privacy settings and understand what information is public, especially on social media.
  • Create backup copies of any information that is sensitive or that you would not want made public, including private messages, then delete them from your account or device. Store the copies securely on an external drive or in the cloud.
  • Delete any accounts that you no longer use. Remember to create copies of any information you want to save.
  • Create long, unique passwords for every account. Do not reuse passwords. Use a password manager to help you manage your passwords.
  • Turn on two-factor authentication (2FA).
  • Regularly review the ‘account activity’ section of each of your accounts. This will reveal if devices you don’t recognize are logged in.
To secure devices, Prudence advised that devices be locked with a password, code, or PIN. Longer personal identification numbers or passwords are more difficult for others to unlock, update your operating system when prompted to help protect devices against the latest malware, audit the information stored on your devices and consider how it could put you or others at risk, back up your devices regularly in case they are destroyed, lost, or stolen. Store the backup copies securely, away from your regular workstation, delete sensitive information regularly, including chat messages. To prevent an adversary from restoring deleted files, use secure deletion software to wipe the device, if available; otherwise reset it and use it for unrelated activities in order to rewrite the device memory. (Back up anything you want to keep first or you will lose all your data.), don’t leave devices unattended in public, including when charging, as they could be stolen or tampered with, don’t plug devices into public USB ports or use USB flash drives that are handed out free at events. These could come loaded with malware which could infect your computer and be aware that your device may back up your data to the cloud account linked to the phone. Information stored in the cloud may not be encrypted. You can turn off automatic backups in the settings.
For secured communication, journalists learned that journalists can communicate with sources more securely using encrypted messaging apps or software that encrypts email so only the intended recipient can read it. Some tools are easier to use than others. Encryption protects the content of messages, but the companies involved can still see the metadata, including when you sent the message, who received it, and other revealing details. Companies have different policies on how they store this data and how they respond when authorities ask for it.

Secure communication
Power point presentation

Recommended messaging apps offer end-to-end encryption, meaning that the information is encrypted when it is being sent from the sender to the recipient. Both parties must have an account with the same app. anyone with access to a device sending or receiving the message or to the password of the account linked to the app can still intercept the message content. Examples of messaging apps with end-to-end encryption include Signal, WhatsApp, and Telegram.
Since Journalists often have a public profile and share their contact details to solicit tips. Adversaries looking to access journalists’ data and devices can target them–or a colleague or family member–with phishing attacks in the form of tailored email, SMS, social media, or chat messages designed to trick the recipient into sharing sensitive information or installing malware by clicking on a link or downloading a file. There are many types of malware and spyware which range in sophistication, but the most advanced can grant a remote attackers access to the device and all of its content.

Prudence open shot
Madame Prudence engaging participants

To defend against phishing attacks she advanced the following tips; Research the tech capabilities of your adversaries to understand the threat and the likelihood you or someone you know could be a target, be wary of messages that urge you to do something quickly or appear to be offering you something that appears to good to be true, especially if they involve clicking on a link or downloading an attachment, check the details of the sender’s account and the message content carefully to see if it is legitimate. Small variations in spelling, grammar, layout, or tone may indicate the account has been spoofed or hacked, verify the message with the sender using an alternative method, like a phone call, if anything about it is suspicious or unexpected, think carefully before clicking on links even if the message appears to be from someone you know. Hover your cursor over links to see if the URL looks legitimate, preview any attachments you receive by email; if you do not download the document, any malware will be contained. If in doubt, call the sender and ask them to copy the content into the email, upload suspicious links and documents to Virus Total, a service that will scan them for possible malware, though only those that are known, enable automatic updates and keep all software on your devices up-to-date. This will fix known vulnerabilities that malware relies on to compromise your security and stay particularly alert to phishing attempts during elections and periods of unrest or if colleagues or local civil society groups report being targeted.

Comments

Popular posts from this blog

NORTH WEST PUBLIC INDEPENDENT CONCILIATOR

The PIC while addressing local masses in Wum Council area, Mr. Tamfu Fai, appealed to the government to create divisional representations.   In the Anglo-Saxon tradition, it is customary to set up independent authorities responsible for settling disputes between users and regional and council administration. In line with this logic, Law No.2019/24 of 24 December 2019 to institute the General Code of Regional and Local Authorities provides for an independent authority called the Public Independent Conciliator (PIC) in the North-West and South-West Regions. The office holder is by no means a legal authority or a judge, as the competences and powers entrusted to him are not of a legal nature. The PIC is responsible, inter alia, for amicably settling disputes between users and the regional and council administration, defending and protecting rights and freedoms with regard to the relationship between citizens and the region or the councils thereof, conducting any investigation on the funct

Embracing Tranquility and Excitement: A Look into Wum Municipality.

In the heart of Wum municipality, a serene atmosphere envelopes its residents on this beautiful Monday morning. The peacefulness is juxtaposed with the echoes of the thrilling football matches that reverberated throughout the community over the weekend. As life moves forward, schools within the area are diligently preparing for their first sequence evaluations. Join us as we delve into the delightful harmony of calmness and excitement that defines Wum municipality. Waking up to a tranquil morning offers a sense of peace and serenity that can greatly impact one's well-being. Wum municipality, with its picturesque surroundings, owe inspiring valleys, breathtaking vegetation, mountains suitable for hiking, and welcoming community, basks in the glory of a calm ambiance. As residents start their day, they can enjoy the gentle breeze, the rustle of leaves, and the joy of feeling connected to nature though still afraid of the unknown as forces crouch in darkness are calling the shots for

FRENCH PRESIDENT, EMMANUEL MACRON, DISAVOWS DECENTRALIZATION AS SOLUTION TO ANGLOPHONE CONFLICT; OPTS FOR REGIONALISM.

  Image an elephant walked into the room. It's definitely something you would notice. It's also something people would describe in many different ways. Some might see it as a monster or a threat, while others (like The Colbert Factor) might think it's the greatest thing ever. It would ultimately mean something different to everyone, and that would influence the way each person understood it. The visit of the French President was the elephant walking into the Cameroon room.   Emmanuel Macron and Paul Biya in Yaoundé. July 25-27 2022 Last week's visit by recently re-elected French President, Emmanuel Macron, was too substantial to ignore. To most ordinary Cameroonians, his remarks after the close to two hours high-level talks with long-serving President Paul Biya, were great. To others, (especially those in government), they were a threat to what government had given a pat on its back for a fast-track of the decentralization process with a Special Status for the North Wes