You have 3 free guides left 😟
Unlock your guides
You have 3 free guides left 😟
Unlock your guides

Social media platforms collect vast amounts of user data, creating privacy concerns for journalists and sources. Information shared online can be easily spread beyond its intended audience, potentially exposing sensitive details or compromising confidentiality.

Journalists must navigate these risks carefully, obtaining and protecting source identities. Using secure communication channels, being transparent about intentions, and following ethical guidelines are crucial for maintaining trust and safeguarding information in the digital age.

Privacy and Confidentiality Concerns

Data Collection and Potential Breaches

Top images from around the web for Data Collection and Potential Breaches
Top images from around the web for Data Collection and Potential Breaches
  • Social media platforms collect vast amounts of user data, including personal information, location data, and browsing habits, which can be accessed by third parties or leaked in data breaches
    • Platforms like Facebook and Twitter track user activity, interests, and relationships to create detailed profiles for targeted advertising ()
    • Data breaches can expose sensitive user information to hackers or malicious actors (Equifax affecting 147 million users)
  • Journalists must be aware that information shared on social media, even in private or closed groups, can be screenshotted, shared, or made public without the original poster's consent
    • Private Facebook groups or Instagram stories can be easily screenshotted and shared beyond the intended audience
    • Closed Twitter accounts can still have tweets shared by approved followers

Risks to Sources and Digital Trails

  • Sources may not fully understand the public nature of social media or the potential consequences of sharing sensitive information online, putting them at risk of exposure or retaliation
    • Whistleblowers or individuals in vulnerable positions may face professional or personal repercussions if their identities are revealed (Reality Winner NSA leak case)
    • Sources from marginalized communities or oppressive regimes may face severe consequences for speaking out on social media (Arab Spring activists targeted by governments)
  • Engaging with sources or sharing information on social media can create digital trails that may compromise the privacy and confidentiality of both the journalist and their sources
    • Direct messages, comments, or likes can be used to establish connections between journalists and sources, potentially exposing confidential relationships
    • Metadata from social media interactions, such as timestamps or location tags, can reveal sensitive details about a journalist's activities or sources (EXIF data in photos revealing location of a protected source)

Ethical Guidelines for Social Media

  • Journalists should obtain informed consent from sources before sharing or publishing any information or content obtained through social media interactions
    • Sources should be fully aware of how their information will be used and the potential risks of being identified (obtaining written or verbal consent, explaining publication process)
    • Journalists should respect sources' requests for or confidentiality and take steps to protect their identities (using pseudonyms, blurring faces in photos)
  • When reporting on sensitive topics or vulnerable populations, journalists must take extra precautions to protect the identities and personal information of sources on social media
    • Survivors of sexual assault, minors, or individuals in dangerous situations may require additional safeguards to prevent re-traumatization or harm (avoiding identifying details, using content warnings)
    • Marginalized communities or activists may face disproportionate risks for speaking out and require extra protection (using secure communication channels, consulting with community leaders)

Transparency and Ethical Communication

  • Journalists should use secure communication channels, such as encrypted messaging apps or email, when discussing confidential information with sources via social media
    • Apps like Signal or WhatsApp provide end-to-end to prevent interception of sensitive messages (Edward Snowden's use of encrypted communications with journalists)
    • Encrypted email services like ProtonMail or Tutanota can be used for more secure document sharing or longer conversations
  • If a source requests anonymity, journalists must take steps to remove any identifying information, including names, usernames, and profile pictures, before publishing content obtained from social media
    • Redacting or blurring screenshots of social media posts to remove identifying details
    • Using generic descriptions or pseudonyms when quoting anonymous sources ("a senior official," "a former employee")
  • Journalists should be transparent about their identity and intentions when contacting sources through social media and should not use deceptive tactics to obtain information
    • Clearly identifying oneself as a journalist and explaining the purpose of the communication
    • Avoiding the use of fake profiles, impersonation, or other misleading tactics to solicit information (Sacha Baron Cohen's use of disguises to deceive interviewees)

Risks and Benefits of Private Messaging

Assessing Security and Confidentiality

  • Private or direct messaging can provide a more secure and confidential channel for communicating with sources compared to public posts or comments on social media
    • One-on-one conversations are less likely to be seen by unintended audiences or attract unwanted attention
    • Private messaging allows for more candid or sensitive discussions without fear of public scrutiny
  • However, private messages can still be screenshotted, forwarded, or accessed by third parties, such as hackers or government agencies, compromising the confidentiality of the conversation
    • Messages can be screenshotted by recipients and shared without the sender's knowledge or consent (Jeff Bezos's private messages leaked by National Enquirer)
    • Government surveillance programs or court orders may compel social media companies to turn over private message data (NSA's PRISM program)
  • Journalists should assess the sensitivity of the information being discussed and the trustworthiness of the source before engaging in private messaging on social media platforms
    • Evaluate the potential risks and benefits of discussing confidential information over private messaging
    • Consider the source's credibility, motives, and potential for deception or manipulation

Precautions and Secure Alternatives

  • When using private messaging, journalists should still take precautions to protect the identity of sources, such as using pseudonyms or avoiding sharing personal details
    • Use code names or initials instead of full names when discussing sensitive topics or individuals
    • Avoid exchanging personal information, such as phone numbers or email addresses, that could be used to identify sources
  • Journalists should consider using encrypted messaging apps or other secure communication channels for highly sensitive or confidential conversations with sources
    • Apps like Signal or Telegram offer self-destructing messages and other privacy features for added security
    • Secure email or file-sharing platforms like SecureDrop can be used for exchanging confidential documents or tips (The New Yorker's Strongbox system for anonymous sources)

Protocols for Secure Information Management

Secure Storage and Access Control

  • Journalists should establish clear guidelines for securely saving and storing any information, content, or data obtained through social media interactions with sources
    • Create a standardized system for organizing and labeling files or documents related to social media sources
    • Implement access controls, such as strong passwords or two-factor authentication, to prevent unauthorized access to stored information
  • Sensitive information should be encrypted and stored on secure devices or servers with limited access to prevent unauthorized access or data breaches
    • Use encryption software like VeraCrypt or BitLocker to protect confidential files or folders
    • Store sensitive data on external hard drives or offline devices, rather than cloud storage or networked computers (air-gapped computers for highly classified information)
  • Journalists should avoid saving or storing personal information or content from sources on public or shared devices, such as office computers or cloud storage accounts
    • Use dedicated, password-protected devices for handling sensitive information from social media sources
    • Avoid syncing or backing up confidential files to shared cloud storage accounts (iCloud hack exposing celebrity photos)

Sharing and Updating Protocols

  • Protocols should include guidelines for securely sharing or transferring sensitive information obtained through social media with editors, colleagues, or other relevant parties
    • Establish secure methods for sharing files or documents, such as encrypted email or secure file transfer services (Firefox Send for encrypted file sharing)
    • Limit access to sensitive information to only those who need it and ensure all parties follow the same security protocols
  • Journalists should regularly review and update their security protocols to ensure they are using the most up-to-date and effective methods for protecting information obtained through social media
    • Stay informed about new security threats, vulnerabilities, or best practices related to social media and communication technologies
    • Conduct periodic audits or risk assessments to identify potential weaknesses or areas for improvement in information security practices (regular security training for journalists and newsroom staff)
© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.


© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.

© 2024 Fiveable Inc. All rights reserved.
AP® and SAT® are trademarks registered by the College Board, which is not affiliated with, and does not endorse this website.
Glossary
Glossary