The investigation is one of the most demanded journalistic genres today. This is the most effective and, at the same time, risky way of gathering information, considering the journalist’s personal safety.
CABAR.asia together with Factchek.kg Editor Bolot Temirov prepared rules that can help investigative journalist to protect him/herself, close people and data during the production of the material.
Protecting Information
The most important safety aspect during the investigation is information security. Therefore, we should create strong passwords for all our devices: phones, computers, tablets, and other equipment that we use in the process.
What does a strong password mean? Such password contains capitalization, numbers and symbols.
In your password, you should never use combinations of numbers or letters, or both, that can be associated with you personally. The date of birth is the worst way to protect your data from a hacker.
The access to data on Google Drive or on other servers should only be granted after entering a passwords and two-factor authentication.
The two-factor authentication is a method of identifying a user on a service by requesting two different types of identifying data, which provides more effective two-layer account protection against unauthorized access. In practice, it usually looks like this: the first factor is a login and password, the second is a special code that is sent via SMS or e-mail.
At the same time, an SMS code is not the best way to protect your social networks and mail accounts, so it is recommended to link the two-factor authentication to Google Authenticator.
Do not leave your gadgets that are not password-protected in public places.
If you enter the password in your phone in a public place, try to do it so that the person watching you from the side (via the security camera or in person) cannot reproduce it.
For correspondence, you should use mail servers that are linked to your website domain. If it is not possible, then Gmail or Protonmail is recommended.
The rule of strong passwords and two-factor authentication also applies here.
For interaction with sources of information or members of the investigation team, it is better to use instant messengers that encrypt data. The messenger Signal is preferable. To send voice messages, you can also use Telegram or WhatsApp. You can call via any of these messengers.
Protecting Yourself
Do not disclose information about your loved ones. Today, this is the only way to protect your family.
The most dangerous period is from the beginning of the investigation until the moment of its publication.
The risk level is increased if information is leaked, since the subject of the investigation becomes aware that material is being produced. For the same reason, the risk becomes greater when an investigator contacts a second party to receive a comment.
After an investigation is published, the risk level generally decreases.