a Better Bubble™

Freedom of the Press

Statement on the extension of prior restraint order against New York Times Project Veritas reporting

2 years 5 months ago

A New York judge today ruled that an earlier prior restraint against the New York Times should not be lifted, but instead extended until at least December 1. Freedom of the Press Foundation joined fifty news media organizations in signing an amicus brief urging the court to dissolve its previous order.

The following statement can be attributed to Freedom of the Press Foundation Advocacy Director Parker Higgins:

Today's decision to allow this prior restraint of New York Times publishing to continue — and to restrict the paper's reporters from engaging in common news gathering activities besides — is a shameful development. It is a cornerstone of the law in this country that any prior restraint, even a very temporary one, is constitutionally permissible only in the most extreme scenarios. As the Times noted in its briefing on the issue, the result has been that such an order has not been entered against it since the Pentagon Papers case some 50 years ago.

While it's not totally unheard of for a court to inadvertently cross that line, it's rare and troubling to see a judge double down on that mistake even as legal experts have shone a spotlight on the case.

Freedom of the Press Foundation

Prior restraint order in New York Times case on Project Veritas materials

2 years 5 months ago

A trial court judge has ordered The New York Times to stop disseminating information related to Project Veritas, in a shocking act of both prior restraint and restriction on protected newsgathering activities. Dean Baquet, executive editor of the Times, cited the Pentagon Papers case in calling the ruling "unconstitutional" and noting that it "sets a dangerous precedent." We agree.

Although an attorney for Project Veritas has claimed it is not a prior restraint, it is that and more. Incredibly, it also appears to call for the removal of existing stories, and to restrict the Times from acquiring related material — in other words, from basic reporting.

It is ironic and hypocritical that the group that requested this extraordinary measure is Project Veritas, a group that is currently in the center of a second press freedom firestorm. Earlier this month, FBI agents raided the homes of its founder James O'Keefe and two of his associates, apparently in connection with an investigation into a diary written by President Biden's daughter Ashley.

As we wrote this week, the press freedom implications of that raid, in the absence of evidence that O'Keefe or Veritas are directly connected to the theft, are profound. The First Amendment and laws such as the Privacy Protection Act limit the government's reach into activities that could be construed as journalistic. Importantly, they apply broadly, not just to a special class of designated journalists.

But that does not remotely excuse them for pursuing a blatantly unconstitutional prior restraint, effectively censoring the Times from reporting on them. And the judge should know better. Issuing such a gag order is a fundamental violation of the First Amendment. Even if the underlying materials were misappropriated or somehow unlawfully obtained by an outside source, the right to report on those materials, and to publish that reporting, is a cherished and long-established cornerstone of press freedom in this country. Indeed, in the Pentagon Papers case itself the paper was reporting on materials that had clearly not been lawfully obtained by their source.

As our colleagues at Reporters Committee for Freedom of the Press have noted, not since that case has such a broad prior restraint order been entered against the New York Times. Now, as then, such a demand offends the most basic principles of press freedom in this country.

Parker Higgins

Why the FBI raid of Project Veritas is concerning for press freedom

2 years 5 months ago

The FBI raided the homes of Project Veritas founder James O’Keefe and two of his associates earlier this month, in connection with an investigation into a diary reported to be stolen from President Biden’s daughter Ashley. Excerpts from the diary were published by another outlet — to little notice — in the run-up to last November’s election.

Based on the available information, this raid is a troubling development for press freedom. That the potential story was not a blockbuster public interest investigation, and that O’Keefe and Project Veritas have a long history of deception and manipulation, do not change that fact.

For good reason, neither the First Amendment nor the Privacy Protection Act — the little known but vital law that sets a very high bar for searches and seizures in cases that may touch on press freedom — create a special class of journalists entitled to rights beyond ordinary citizens. Instead, everyone is very broadly understood to have the legal right to engage in acts of journalism. (The PPA, in fact, doesn’t explicitly mention or define “journalists” at all: the law protects “work products” of any “person reasonably believed to have a purpose to disseminate to the public a newspaper, book, broadcast, or other similar form of public communication”.)

The benefits of this approach are that the government cannot deny the protection of law to political adversaries; or those who would publish embarrassing or challenging facts about people or institutions in power; or jail a part-time independent journalist for engaging in acts that journalists at The New York Times engage in regularly. At least in theory, the mechanisms of law enforcement cannot be legally used to intimidate targets who are not doing the “right” kind of journalism in the eyes of the government officials.

And indeed, much of the brave journalism that we celebrate, the kind that speaks truth to power and effects real change in the public interest, relies on those protections. For example, our SecureDrop system, which is used in dozens of news outlets in the United States, is hosted on-site in newsrooms, in part because newsrooms can give broad legal protections to the critical tips and important stories submitted by whistleblowers — even in cases where that material has been misappropriated by sources in some way.

The tradeoff to broad free speech rights, of course, is that people may speak in ways that are odious or deceitful, or engage in journalism which reasonably can be interpreted as unethical, even when it breaks no law. But any system designed to diminish those rights for known “bad actors” is a system that could be abused to silence speech — and can be turned on those who engage in acts of journalism that we consider noble and just.

Whether we — or anyone for that matter — consider O’Keefe and Project Veritas to be “journalists” is beside the point. If, in this particular case, they were engaged in acts of journalism — receiving information from a source and looking into whether they should publish it — the case may have serious implications for press freedom. This is why, in addition to Freedom of the Press Foundation, organizations like ACLU and the Committee to Protect Journalists have also issued statements expressing deep concern over the matter.

For the past decade, under administrations that span both parties, the Justice Department has infringed on the rights of many mainstream and independent journalists, often in secret — from engaging in invasive surveillance, to prosecuting their sources, and to this day, attempting to criminalize important aspects of the newsgathering process. Perhaps there’s reason not to trust as fact O’Keefe’s sworn statement to a court that the diary was legally obtained, given his organization’s history of deception; but we are not about to take the Justice Department’s word for it either, when they have not released any evidence at all that shows O’Keefe or his employees broke the law.

Thankfully, Reporters Committee for Freedom of the Press has filed a motion to unseal the search warrant application, citing the strong public interest in the case, and the government has been ordered to respond by Friday.

If the DOJ does have probable cause evidence that O’Keefe or Project Veritas were directly involved in the theft of the diary, then our concerns would be alleviated. But unless and until the DOJ releases such evidence, this episode will remain very worrying from a press freedom perspective.

Trevor Timm, Parker Higgins

Press freedom coalition calls for end to Assange prosecution, after shocking reporting on CIA misconduct

2 years 6 months ago

The United States prosecution of Julian Assange is a threat to press freedom around the globe. In light of that fact, and in light of shocking reporting late last month about CIA plans to kidnap or even assassinate him, the charges must be dropped. We've joined a coalition of more than two dozen press freedom, civil liberties, and international human rights groups reiterating that position in a letter delivered today to Attorney General Merrick Garland.

ACLU, Amnesty International, Human Rights Watch, Knight First Amendment Institute, Committee to Protect Journalists, and Reporters Without Borders are among the signatories to this unified message.

Today's letter follows up on a demand sent by the same 25 groups in the first weeks of the Biden administration. Biden and members of his administration have spoken about the importance of a free press and the work of journalists, but in this regard — a prosecution we have previously identified as "the most dangerous press freedom issue" in the United States — he has chosen to follow his notoriously anti-press predecessor in office. U.S. prosecutors have continued to pursue the case and an appeal of the Assange extradition denial.

Read the letter in full below.

Parker Higgins

Filecoin Foundation for the Decentralized Web funds largest grant in Freedom of the Press Foundation's history

2 years 7 months ago

Today is one of the most important days in the history of Freedom of the Press Foundation, and especially for SecureDrop, our open-source whistleblower submission system used by over 70 news organizations worldwide. Let me explain.

We have long been strong believers that open source technology — specifically privacy preserving tools that don’t attempt to make money through the traditional surveillance capitalist model — can have an outsized impact on protecting our rights online. In times where governments and tech giants have unprecedented surveillance capabilities, policy and legal protections often don’t shield reporters from having their sources exposed. Projects like SecureDrop are vital for enabling important investigative reporting in the digital age. While news outlets are understandably tight-lipped about how they use SecureDrop, the proof is in the pudding.

But herein lies the conundrum: while open-source software tools can be more impactful in protecting press freedom than anything else, they are also the hardest to fund. Many traditional foundations don’t have the expertise or ability to evaluate software projects, and are wary of directly funding their development. The few grantmaking outfits who specialize in open-source software development sometimes only fund prototypes or new projects, which leaves the tools journalists likely rely on most — those that have a track record of success — in a perilous funding desert.

In many ways, we’ve been lucky. Despite the many fundraising difficulties that open-source tools often face, we’ve had the benefit of loyal support from donors with long-term vision. With their help, we’ve been able to sustain the project. But developing and maintaining high-risk software which is relied on by so many journalists all over the world is also very expensive, and it means cobbling together support from dozens of different sources. SecureDrop represents 40% of Freedom of the Press Foundation’s $4 million budget, yet it is still drastically underfunded compared to for-profit tools of all kinds.

Over the past eight years, we have slowly grown our SecureDrop team by piecing together dozens of general support grants, private donations, and support contracts from news organizations. And while we’ve had great success compared to many other open-source projects, it always feels like a precarious position — especially given how many journalists and whistleblowers rely on SecureDrop for protection.

Today, for the first time, that calculus has changed. We’re thrilled to announce the largest grant in the history of Freedom of the Press Foundation that will ensure SecureDrop survives — and thrives — for years to come. The Filecoin Foundation for the Decentralized Web — a new grantmaking organization whose mission is to permanently preserve humanity’s most important information — is funding FPF at over $1.7 million for each of the next three years, for a total of $5.8 million.

The funding will largely go towards sustaining and expanding our SecureDrop team, funding the development of the next-generation of the system, including exploring a new zero-trust architecture for the decentralized servers. This grant will ensure that SecureDrop will not only be sustainable over the long term, but will be easier to use and hopefully safer than ever. In short, it will have a game-changing impact on how we can build and improve SecureDrop for journalists around the world. You can read about some of our technical plans for the future here.

In addition to helping upgrade SecureDrop, FPF will leverage its collaboration with FFDW to support several other efforts critical to safeguarding free speech, a free press, and the preservation of critical information using the decentralized web. Some of these projects include: publishing our comprehensive U.S. Press Freedom Tracker data on the decentralized web every year, exploring how we can further help news outlets who are under threat of being taken offline, and evaluating state-of-the-art privacy preserving tools within the decentralized web ecosystem that could provide network-level anonymity in decentralized web projects, in addition to our existing reliance on the Tor network.

We are incredibly grateful to the Filecoin Foundation for the Decentralized Web for believing in our mission and our results. And we can’t wait to get to work.

Trevor Timm

After shocking story about CIA illegal acts, Biden admin must drop Assange charges immediately

2 years 7 months ago

Today, Yahoo News published a long and deeply-sourced investigation that the CIA, led by Trump appointee Mike Pompeo, repeatedly and seriously considered kidnapping and even assassinating WikiLeaks founder Julian Assange. The agency engaged in so many shocking and extra-legal actions that the whole report needs to be read in full to be believed.

Yahoo News also reported that intelligence officials, in disturbing disregard for the First Amendment, pushed to have other journalists—including FPF board members Laura Poitras and Glenn Greenwald—re-categorized as “information brokers” for their award-winning reporting on the Snowden disclosures. Yahoo said that the purpose was to open up “the use of more investigative tools against them, potentially paving the way for their prosecution.”

The following statement can be attributed to Freedom of the Press Foundation (FPF) executive director Trevor Timm:

“The CIA is a disgrace. The fact that it contemplated and engaged in so many illegal acts against WikiLeaks, its associates, and even other award-winning journalists is an outright scandal that should be investigated by Congress and the Justice Department. The Biden Administration must drop its charges against Assange immediately. The case already threatens the rights of countless reporters. These new revelations, which involve a shocking disregard of the law, are truly beyond the pale.”

Previously, a coalition of groups focused on civil liberties, human rights and press freedom—including Freedom of the Press Foundation—urged the Biden administration to drop its charges against Assange. The letter to Biden’s Justice Department was signed by the ACLU, Committee to Protect Journalists, Human Rights Watch, Amnesty International, and many more.

Freedom of the Press Foundation

As lawmakers debate drone tragedy, a key whistleblower remains behind bars

2 years 7 months ago

In the wake of its botched “righteous” drone strike that the United States now admits killed 10 civilians in Afghanistan, lawmakers on both sides of the aisle are raising questions about the horrific costs of the drone program. These are critically important questions to ask, with the highest possible stakes for people around the world. And yet, there is one person, largely left out of the conversation, who risked his well-being and freedom to bring to the public the information that informs this discussion. He is now just months into serving a nearly 4-year prison term for his whistleblowing.

Daniel Hale was sentenced this summer under the Espionage Act, a law that may have once been targeted at actual espionage but is now routinely used against national security whistleblowers who speak to U.S.-based journalists. As we have documented extensively, the Espionage Act has no "public interest" defense; even if someone reveals corruption, waste or illegal behavior on the part of the U.S. government, a defendant is barred from telling the jury about their motive or benefits of their actions.

In admitting that it killed civilians — rather than terrorists as initially claimed — the Pentagon specifically cited the excellent New York Times exposé on the incident that interviewed more than a half dozen people who were with the main victim that day. Of course, if the Times had instead gotten its information from a guilt-ridden military employee, rather than from on-the-ground interviews with witnesses, the paper would have likely faced angry denials, and that employee could have faced years in prison without the opportunity to justify themselves in court.

For at least five decades now, this injustice of the Espionage Act has been apparent, since Pentagon Papers whistleblower (and Freedom of the Press Foundation co-founder) Daniel Ellsberg was barred from offering prepared testimony about his motivation in exposing the myriad lies underpinning the Vietnam War. Every journalistic source who has been prosecuted under the Espionage Act since then has faced the same impossible hurdles in getting a fair trial, despite the clear public interest in their whistleblowing.

Hale's leaks, too, have indisputably served the public interest. The Intercept stories the government implied to be based on his leaks showed how drone strikes routinely killed civilians, even in the face of official denials. It was in the wake of reporting on documents he provided about the drone program that the Obama administration began disclosing information about inadvertent civilian deaths in drone strikes. (The Trump administration would later revoke the new transparency requirements.)

In response to the latest tragedy, senators and representatives have cited information about the ghastly number of inadvertent drone killings, but even these lawmakers are facing careful official denials based on selective declassification of information. Sen. Chris Murphy, for example, has faced official blowback for his suggestion that drone strikes hit the wrong target "maybe eight out of 10 times." In defending his claim, the U.S. senator from Connecticut cited his sources: "Since the government classifies data on the efficacy of drone strikes, the only full public data set is from a leak of the Haymaker drone campaign in Afghanistan," referring to the initial stories in The Intercept.

Hale and others like him provide the material that journalists communicate to the public to inform our understanding of these secret yet incredibly deadly and consequential programs. That role is always necessary, but never more so than when the government is able to pick and choose which information is made available for general consideration.

Although the Espionage Act does not allow for consideration of the public interest, Hale’s attorneys felt compelled to note his motivation in a filing with the court: “The facts regarding Mr. Hale’s motive are clear. He committed the offense to bring attention to what he believed to be immoral government conduct committed under the cloak of secrecy and contrary to public statements of then-President Obama regarding the alleged precision of the United States military’s drone program.”

Hale himself filed a handwritten document with the court speaking to his motivation for disclosing the drone records. “My conscience, once held at bay, came roaring back to life. At first, I tried to ignore it. … So I contacted an investigative reporter, with whom I had had an established prior relationship, and told him that I had something the American people needed to know.” In the wake of another tragedy, the people’s need to know is clearer than ever.

Trevor Timm, Parker Higgins

Supporting local journalism with the Local Journalism Sustainability Act

2 years 7 months ago
Andrew Bossi, CC BY-SA 2.5

Local journalism is critical to communities all over the country, but many organizations that have long employed reporters to cover important local news stories have struggled to find a financial footing over the past several decades.

The Local Journalism Sustainability Act — a bill introduced with bipartisan support in the House of Representatives and a notable slate of Democratic backers in the Senate — aims to remedy that disconnect with a collection of temporary benefits that could sustain small local news outlets and give them time to retool.

We are usually wary of federal legislation aimed at supporting local journalism, despite its importance, because of conflicts of interest that can emerge from the government picking what kinds of outlets qualify, or from direct subsidies coming from the subject of coverage. The Local Journalism Sustainability Act seems to solve those long-standing issues in an innovative way. We at Freedom of the Press Foundation endorse the bill.

Instead of laying out strict criteria to qualify for direct subsidies, the LJSA would provide three primary mechanisms that would potentially help all small local news outlets. Perhaps most notable for most readers, the law would cover a large portion of the cost of a local newspaper (or news non-profit) subscription in the form of a tax credit, up to $250. For the five years this law would be in effect, more Americans could pay much more than they currently do for local news with a subsidy from the federal government. This prong is well-structured: for households that pay federal income tax, a tax credit is effectively direct money towards subscriptions, more readily available than an itemized deduction, and would incentivize local news outlets to form relationships with readers.

The second mechanism is a payroll tax credit for the news outlets themselves towards the salaries of reporters, editors, and photographers. For outlets facing a vicious cycle of declining revenues leading to diminished newsroom staff leading to a less obvious value proposition to readers, a cash infusion that allows newsrooms to staff up could help tremendously.

Finally, also on the revenue side, the bill would provide tax credits to small businesses that pay to advertise on local news sites, in newspapers, or on television and radio.

American federal support of news reporting and publishing is nearly as old as the country itself, including similarly “content-neutral” postal subsidies for newspaper and pamphlet delivery. Over that time, defining "journalism" in a way that includes innovative and independent outlets has been a hard problem only gotten more difficult. (That difficulty has often been our sticking point with other proposals, such as increasing penalties for assaults on journalists.)

But it's undeniable that local news reporting provides important benefits to the communities that can sustain commercial or nonprofit newsrooms. This bill takes a very broad approach to the question of definition, and makes it easier for those communities to provide their own support for local outlets.

That reliance on existing community support has its flaws, too. For one thing, historically marginalized and underserved communities may not have existing outlets (or subscriber bases) to build up with the tax benefits. And by contrast, the many legacy outlets that have been dramatically cut back by hedge fund or private equity purchasers could stand to receive these benefits. Still, it would provide major help for many existing newsrooms that provide important coverage and could use the lifeline.

With broad bipartisan support in the House, this bill would have good odds in that chamber. Although the co-sponsors on the Senate side are exclusively Democrats to date, its supporters aim to include a version of this bill in the $3.5 trillion reconciliation package that is likely to pass with or without Republican support.

Parker Higgins

There’s no right time for Apple’s privacy-invading tech features

2 years 8 months ago

Apple announced Friday that it would postpone its planned roll-out of user device surveillance technology that had come under heavy fire from the privacy and civil liberties community. We at Freedom of the Press Foundation wrote last month that the technology was a “threat to user privacy and press freedom,” and could, if abused, threaten whistleblowers and journalists working on sensitive stories.

We were far from alone in raising the alarm about Apple's plans. Nearly one hundred civil society organizations signed an open letter to the tech giant urging it to reconsider, joining thousands of individuals, including security researchers, cryptographers, and privacy experts on a second letter. The strength and virtual unanimity of this outcry is heartening, and clearly had an effect. As our board president Edward Snowden put it on Twitter: “Don't ever let anyone tell you that there's nothing you can do when a company announces a plan to screw you.”

But while a delay is welcome, it’s not sufficient. Apple should drop its plans for this backdoor technology entirely. As we previously said about the technology, “No backdoor for law enforcement will be safe enough to keep bad actors from continuing to push it open just a little bit further.” The qualms from the privacy community weren’t nitpicks about implementation details, but a rejection of the underlying premise.

The danger of untrustworthy devices to journalists and sources has never been clearer, as we come off a summer of revelations of powerful spyware targeting reporters and the disclosure by investigators that encrypted messenger metadata was used to identify at least one whistleblower behind a major piece of financial reporting.

It’s crucial, then, that the developers of our technology and software keep their interests aligned with the privacy needs of their users. Apple has marketed itself on these very values, and indeed has often led the field towards more privacy preserving practices. This proposal could have been a dangerous move backwards; dropping it would be a step towards regaining user trust.

Parker Higgins

New lawsuit could finally bring FOIA transparency to the halls of Congress

2 years 8 months ago

Legislative Branch records don’t receive the kind of public scrutiny the Freedom of Information Act brings to the Executive, but that could change thanks to a novel lawsuit over video records related to the January 6 riot at the Capitol. If this litigation manages to bring more transparency to Congress, either through a win in court or other pressure, it would constitute a major victory for the public and for the journalists who cover the actions of the government.

This new lawsuit follows an opinion issued by a D.C. Circuit judge in June, which cited a “common law right” of public access to government records that could apply to Congress. In that earlier case, the conservative transparency organization Judicial Watch had sued for access to the subpoenas that the House Intelligence Committee had issued in its impeachment inquiry of President Donald Trump. Although that case was dismissed, Judge Karen LeCraft Henderson wrote in a concurring opinion, “I believe, in the right case, the application of the Speech or Debate Clause to a common law right of access claim would require careful balancing.”

Journalist Shawn Musgrave thinks he’s found the right case. Earlier this month, he sued for the release of the video, citing that "common law right of access.” The primary implications are significant — Congress has some 14,000 hours of surveillance footage from the Capitol on January 6, most of which is not available to the public — but more notably, if successful, this suit could usher in a new standard of transparency for Congress.

Without a doubt, open records laws — like FOIA and its many state- and municipality-level equivalents — underpin much important reporting. (We capture and highlight some of the stories that rely on those laws with our Twitter bot, FOIA Feed.) But these laws generally only apply to the executive branches of government. Congress, of course, has written FOIA and its many amendments over the previous 50+ years, and has steadfastly refused to apply the transparency law to itself.

As Musgrave's lawsuit contends, there's no reason the animating principle of laws like FOIA couldn't apply just as strongly to the legislature, including Congress. Fundamentally, if the people have a right to know what the government is doing, that right shouldn’t end at the steps of the Capitol.

Somewhat ironically, Congressional objections to increased transparency often focus on the "Speech or Debate Clause'' of the Constitution, which insulates legislators and their staff from arrest or inquiry for statements made on the floor of the House or Senate.

We've written before about how the Speech or Debate Clause represents a woefully underutilized opportunity to share important information with the public and expose government wrongdoing without fear of the draconian consequences that face many other whistleblowers; it's doubly shameful then that the same clause is used in this case to instead obscure the activities of government.

The Freedom of Information Act, and the laws that followed in its image, were revolutionary to the field of government transparency in the 1960s. The law remains vital to journalists, but as Freedom of the Press Foundation and many others have documented over the years, the law is also fundamentally broken.

Like any lawsuit with a novel legal theory, success is far from certain, and could take many shapes — for example, pressure from this lawsuit could and should prompt Congress into taking action with legislation that strengthens FOIA and expands its scope. Still, it's heartening to see journalists and members of the public continue to push the envelope on bringing the activity of the government to the people, and we are eagerly following this effort.

Parker Higgins

Apple’s device surveillance plan is a threat to user privacy — and press freedom

2 years 8 months ago
photo by Agê Barros

When Apple announced a new plan this month for scanning photos on user devices to detect known child sexual abuse material (CSAM), the company might have expected little controversy. After all, child sexual abuse is a problem everyone wants to solve.

But the backlash from privacy and human rights advocates was swift, loud, and nearly unanimous. The complaints were not largely about the precise implementation Apple announced, but rather the dangerous precedent it sets. The ways in which the technology could be misused when Apple and its partners come under outside pressure from governments or other powerful actors are almost too many to count.

Very broadly speaking, the privacy invasions come from situations where "false positives" are generated — that is to say, an image or a device or a user is flagged even though there are no sexual abuse images present. These kinds of false positives could happen if the matching database has been tampered with or expanded to include images that do not depict child abuse, or if an adversary could trick Apple’s algorithm into erroneously matching an existing image. (Apple, for its part, has said that an accidental false positive — where an innocent image is flagged as child abuse material for no reason — is extremely unlikely, which is probably true.)

The false positive problem most directly touches on press freedom issues when considering that first category, with adversaries that can change the contents of the database that Apple devices are checking files against. An organization that could add leaked copies of its internal records, for example, could find devices that held that data — including, potentially, whistleblowers and journalists who worked on a given story. This could also reveal the extent of a leak if it is not yet known. Governments that could include images critical of its policies or officials could find dissidents that are exchanging those files.

These concerns aren’t purely hypothetical. China reportedly already forces some of its citizens to install apps directly onto devices that scan for images it deems to be pro-Uyghur.

Apple has promised to stand up against the forced inclusion of non-CSAM images to the hash database in an FAQ document it published amidst the backlash: "Apple would refuse such demands and our system has been designed to prevent that from happening." If only it were that simple! Even with the best of intentions, Apple (and the organizations that maintain the databases in question) are likely to face extreme pressure from governments all over the world to expand their efforts to all sorts of other types of “illegal” content. And legal orders are not exactly something companies can just “refuse.”

As EFF said, “if you build it, they will come.”

After extensive criticism, Apple last week issued more clarifications about efforts to mitigate those concerns. It would only match against images that had been flagged by groups in multiple countries, and sophisticated users would be able to check that the list of images their own phone was checking against was the same as on every other phone. While these assurances help mitigate the risk of a single point of failure, they do not fully address the risks posed by a state-level actor.

And unfortunately, the company has in some cases yielded to that kind of pressure. Reporting earlier this year documented Apple agreeing to store user data and encryption keys in China, at the government's behest, and complying with requests for iCloud data. The company has also removed apps and games from its marketplace to comply with local regulations. What would it do differently in the face of new demands to misuse this image matching tech?

Beyond the possibility of database tampering, another way false positives could occur is if adversaries are able to generate files that are "collisions" with known images in the database. Since even before Apple's formal announcement, researchers have called for the company to publish its matching algorithm so they could see how susceptible it is to these kinds of generated bogus matches (which are usually called "adversarial examples" in the world of machine learning).

Apple has thus far declined to make that matching function available, even as the company has called on security researchers to check its work. However, researchers appear to have recently extracted the matching function from iOS, and even generated a "pre-image" match — that is, generating a file from scratch that Apple's matching function cannot distinguish from another known image.

This research represents a serious problem for Apple's plans: adversaries that can generate false positives could flood the system with bad data, even using the devices of unsuspecting users to host it. The earliest adversarial examples look like white noise, but it is likely only a matter of time before they can be embedded in another image entirely.

Journalists, in particular, have increasingly relied on the strong privacy protections that Apple has provided even when other large tech companies have not. Apple famously refused to redesign its software to open the phone of an alleged terrorist — not because they wanted to shield the content on a criminal’s phone, but because they worried about the precedent it would set for other people who rely on Apple’s technology for protection. How is this situation any different?

No backdoor for law enforcement will be safe enough to keep bad actors from continuing to push it open just a little bit further. The privacy risks from this system are too extreme to tolerate. Apple may have had noble intentions with this announced system, but good intentions are not enough to save a plan that is rotten at its core.

Parker Higgins

Announcing U.S. Journalism School Digital Security Curriculum

2 years 9 months ago

At Freedom of the Press Foundation, one way we support news organizations is through digital security education for reporters. We believe that, just as newsrooms are developing digital security competencies in real-time, student journalists should develop these skills as well. That’s why we’re thrilled to share the U.S. Journalism School Digital Security Curriculum, a resource to assist J-school instructors in bringing digital security know-how to their program.

From our research with J-school students and instructors, we know that journalism professors are always juggling competing priorities in their coursework. They are under pressure to teach a variety of skills that are in flux. Students are learning programming skills, and mastery over various forms of digital media that vary from year to year. We found most accredited U.S. J-school programs— roughly three-in-four — provide no digital security education of any kind, despite its outsized importance.

Just as we are asking students to work with digital tools online, we believe digital security is part of doing this work more safely and sustainably. With help from dozens of J-school instructors and security experts, we are excited to share that our digital security team has created a semester-long curriculum, complete with slides, lesson plans, and more. With attribution instructors may use and adapt the materials to their own needs, for free. We hope this digital security curriculum will help programs get started developing their own.

Some rare programs, such as the University of Nevada, Reno, and University of Southern California Annenberg School offer dedicated courses on digital security. But we also know most U.S. J-schools do not have in-house expertise for instructing on digital security, and where it exists, it typically takes the form of short workshops and ad hoc training. Workshops are a good starting point, but we think we can help programs go further.

To help programs scale their digital security offerings, we wanted to provide a resource that would help instructors build out their own curriculum. Because most programs are juggling so many competing priorities, we also understand that full courses may be impractical for some programs.

To help J-schools introduce smaller-scale but in-depth lessons, we took a modular approach to creating our digital security curriculum, breaking the curriculum into several sections. The modules examine foundational security topics such as threat modeling, how the internet and telecommunications work, chat safety, to authentication practices, malware, file safety, and more. We also created a broad “Digital security 101” for those who want to start with a beginner-friendly digital security workshop. Each module provides plans on how to conduct the lesson, suggested discussion questions, and even slides. Instructors can reach out to our team at freedom.press/contact for help.

Want to get started? Check out the U.S. Journalism School Digital Security Curriculum.

Freedom of the Press Foundation

New research: Why don’t more J-schools teach digital security?

2 years 9 months ago

In recent years at Freedom of the Press Foundation — where we have one of the only full-time digital security teams focused on training journalists — we’ve seen firsthand how newsroom demand for security expertise has exploded. So you’d think educating the next generation of journalists about digital security would be a critical part of journalism schools as well. Unfortunately, our research suggests we have a long way to go.

Recently, we presented new and original research on the barriers to digital security education in U.S. J-schools at the 2021 International Communications Association conference.

Just like contemporary newsrooms targeted for hacking and surveillance, student journalists who move to professional newsrooms will be expected to promote their work online. In turn, they will have to worry about communications being monitored by their governments, state-sponsored hackers infiltrating their newsrooms, coordinated harassment campaigns, and much more.

We wanted to know what journalism schools are doing to prepare students for this volatile environment for digital safety. In early 2020[1] we reached out to accredited and provisionally accredited graduate and undergraduate university programs across the U.S. — at the time 106 departments. We contacted department heads, professors focused on technology coursework, and department staff whose roles involve knowledge of the program (e.g., students services specialists), and asked if they offered digital security courses or related coursework. Of the programs we contacted, 43% responded. We also examined the non-responsive programs’ course offerings to learn if they had related listings. Finally, we interviewed 13 instructors and 10 students to learn more about security education at their programs.

Despite the clear need for digital security education, of the responsive programs, roughly one-in-four said they offered digital security education of some kind. When these efforts do take place, typically they are one-time lectures embedded in ongoing coursework, as well as informal, ad hoc workshops. At the time of the study, among accredited and provisionally accredited programs we identified two J-schools — University of Nevada, Reno’s Reynolds School and University of Southern California’s Annenberg School — that offered dedicated digital security courses as electives. (To be clear, there may be others that we lacked visibility into.)

One-off workshops cover digital security fundamentals, such as an introduction to risk assessment techniques, password practices, and encrypted chat tools like Signal. And while these types of seminars — which usually only last 2-3 hours — are a good starting point, students may not retain all of the information taught in a single workshop, given the range of tools and practices introduced in a relatively short time. Likewise, they may not have dedicated time to practice implementing the suggested security practices, and therefore may not develop the experience necessary to incorporate them into their work. Extended courses, by comparison, provide this time and space.

Many professors suggested that their program would have a difficult time accommodating digital security coursework because they already struggle to fit so many topics into their existing program. Each year, industry trends influence how departments prioritize their coursework, and in recent years departments have been pulled into dozens of less-familiar topic areas, such as novel digital media techniques and programming skills, further straining instructors’ time.

J-schools’ education priorities are highly market-driven. Many newsrooms are influencing J-schools to help them develop competencies that will be used in journalistic output, such as podcasting and data reporting. By contrast, digital security is often seen as less critical to the output of reporting—despite its outsized importance.

We also know the Accrediting Council on Education in Journalism and Mass Communications has prioritized a variety of digital media literacy topics, but does not ask departments to require any form of digital security education. Such a requirement would incentivize over a hundred programs to adopt digital security in their curriculum.

Another reason so few programs have digital security offerings is that department leadership is simply not aware of the significance of this problem. We spoke to a few instructors in positions of leadership who said that when they worked in a newsroom, security was not a contemporary issue. Likewise, though many students do have traumatic experiences online, students have not often faced digital attacks specifically in response to their reporting assignments, like the kind they will likely face on the job. With less exposure to security threats seen in newsrooms, these issues are often rendered invisible among faculty.

In other words, J-schools are dealing with significant knowledge gaps and competing incentives. Even when it’s a topic on their radar, J-school programs may not always have the in-house knowledge or the willingness to give this topic the time it needs. You could understand why, then, it’s rare for a program to dedicate more than 1-2 hours to digital security education.

It’s not all doom and gloom, however. A growing number of programs are turning their attention to the need for digital security skills in journalism. For example, the new Craig Newmark Center for Journalism Ethics and Security is making hefty investments in this area.

Likewise, a constellation of educators within and across J-schools are working to advance journalistic security. Susan McGregor is one of the few experts in this area who has studied and instructed on journalistic security in multiple programs at Columbia University. Dr. Gi W. Yun at the Reynolds School of Journalism at the University of Nevada, Reno, with help from the Electronic Frontier Foundation, has developed an innovative course on cybersecurity, privacy, and surveillance. At Freedom of the Press Foundation, we partnered with former national security reporter Marc Ambinder to help devise an exhaustive digital security course for the University of Southern California’s Annenberg School for Communication and Journalism. The people doing this work are few and far between, but they are out there.

We need more of these security champions. In J-schools, security champions advance journalistic security by organizing appropriate expertise (typically by going outside of the department), convincing department leadership it’s worthwhile, and by building sustainable infrastructure, such as external partnerships, funding, and advocating for opportunities to embed these lessons into the broader curriculum. Each program with a digital security offering started with one or more security champions who earned department buy-in.

Though digital security workshops conducted in many J-schools are often ad hoc, they are one of the few places where security education has broken through. Workshops also introduce opportunities to invite in external expertise. For example, at Freedom of the Press Foundation, the digital security team regularly conducts workshops with newsrooms and universities, and in 2020 over 1200 journalists attended at least one of these workshops.

While we think these workshops are vital to working journalists, they aren’t a one-size-fits-all solution. Consider the devices and platforms we use in a given day: cell phones, computers, and tablets of all different brands and models. Then add on top of that the ways we communicate over these devices: calls, emails, text messages, social media, and countless other apps. Those devices and platforms are constantly updating and changing, and the advice on what tools to use changes radically depending on the situation. (For example, the advice you’d give journalists covering national security in the U.S. is sometimes the opposite of what is necessary in Russia.) You can quickly see it would be impossible for journalists to learn everything they need to stay safe in a day or two. A workshop can be a meaningful starting point, but the time needed to reflect on and engage the material is often lacking.

To drive systemic change in security education needed in newsrooms today and in the future, journalism schools would ideally integrate these practices into a digital security curriculum, where students can not only learn the proper tools to use, but more importantly the mindset to think critically through these problems. That way, when the tools change they’ll be able to change with them. This is only possible to do when they have the time and space to take in everything they need to navigate their work in relative safety.

To help instructors get started, later this year Freedom of the Press Foundation will be releasing an exhaustive digital security curriculum with modular lessons on security basics for journalists, which will be free and openly available to the community.

We desperately need more security champions in the field, and universities should be leading the way, instead of following from behind.

--

[1] We contacted universities to learn about their course offerings between February 20 to April 2, 2020, and gathered our interviews between January 29, 2020 to June 2, 2020.

Dr. Martin Shelton is principal researcher at Freedom of the Press Foundation, focused on security and user research.

Dr. Jennifer Henrichsen recently defended her dissertation at the University of Pennsylvania’s Annenberg School of Communication, and she worked with Freedom of the Press Foundation on this research. She is an incoming Assistant Professor at Washington State University in fall 2021.

Image credit: Elisabeth Woldt. CC-BY-NC 2.0

Martin Shelton, Dr. Jennifer Henrichsen

Congress must pass the Justice Dept’s new media surveillance rules into law

2 years 9 months ago

In a welcome and long-overdue move, the Department of Justice (DOJ) today formally adopted a policy prohibiting, with few exceptions, the use of surveillance on journalists "acting within the scope of newsgathering activities."

The new memo, signed by Attorney General Merrick Garland, codifies an announcement outlined last month, when the White House and DOJ promised important new restrictions of the kind of surveillance that has been used in leak investigations spanning at least four presidential administrations, including in a series of high-profile cases beginning under former President Trump but only disclosed earlier this year.

The following statement can be attributed to Freedom of the Press Foundation advocacy director Parker Higgins:

These new rules prohibiting the surveillance of journalists are the strongest in the modern history of the Department of Justice — and that’s a big victory for press freedom. But it’s important to note that this new policy could be undone by a future Department of Justice memo.

Congress must immediately codify these new guidelines into law so that they will be permanent and cannot be broken or ignored on the whim of whoever holds the office of the Attorney General. Senator Ron Wyden's PRESS Act would do just that, and members of both parties should get behind swift passage of the bill.

Freedom of the Press Foundation

Fifty years ago today, Senator Mike Gravel read the Pentagon Papers into the official record. More lawmakers should follow his lead.

2 years 10 months ago

Fifty years ago today, with the New York Times and the Washington Post tied up in the Supreme Court over whether they could report on the leaked Pentagon Papers, a young Senator named Mike Gravel was taking matters into his own hands.

Gravel had just obtained a second copy of the Pentagon Papers from whistleblower (and, much later, Freedom of the Press Foundation co-founder) Daniel Ellsberg, through a midnight curbside handoff from Ben Bagdikian, an editor and journalist at the Post. In an act of remarkable bravery, Gravel convened a subcommittee meeting, and read from the Papers until one A.M., culminating in an emotional description of the violence of war. He then inserted 4,100 pages of the document into the Congressional Record.

In the morning, the Supreme Court cleared the Times and the Post to continue publishing, in one of the most important press freedom decisions in the court's history.

Gravel took action despite considerable nerves; he reportedly "had not slept for three nights, overwrought with fatigue and fear that he might be headed to prison." But he was also protected by the "Speech or Debate Clause" of the U.S. Constitution, which protects Congress members from arrest or inquiry for statements made on the floor of the House or Senate. Many state constitutions have similar forms of parliamentary immunity.

Still, a Gravel aide faced a subpoena from a federal grand jury empaneled to investigate the Senator's actions. Gravel moved to intervene, and the question of whether the aide could be compelled to testify also made its way to the Supreme Court. In Gravel v. United States, the Court issued a 5-4 opinion holding that Congressional aides and employees enjoy the same legal protection as the legislators themselves.

(The decision also narrowed the Speech or Debate Clause in part, explicitly limiting it to actions "essential to the deliberations" of the legislative body, and thus deeming it did not cover Gravel's transmitting the Papers for private publication. In a powerful dissent to that portion in particular, Justice William O. Douglas argued: "To allow the press further to be cowed by grand jury inquiries and prosecution is to carry the concept of 'abridging' the press to frightening proportions.")

Senator Gravel died this weekend at 91 years old. Without a doubt, his willingness to bring the Pentagon Papers to the public is one shining example that more lawmakers should follow.

But despite the fact that Gravel’s heroic actions in protest of the nation’s broken secrecy system would be his defining legacy, other members of Congress have largely not followed in his footsteps. From the CIA torture program to NSA surveillance to extrajudicial drone strikes, the US government has used the classification system to shield corruption, abuse, and illegal behavior from the American public. In many cases, courts have protected the executive branch from accountability. At the same time, they have harshly punished whistleblowers who come forward to the press.

Members of Congress enjoy a unique broad immunity to expose illegal government programs and lies. And yet, besides Senator Gravel, no one has chosen to use it. We hope in the future, more members of Congress will show the same bravery he did fifty years ago today.

Parker Higgins

PayPal and Venmo enforcement procedures threaten First Amendment protected speech

2 years 11 months ago

PayPal and its subsidiary Venmo must bring more transparency and accountability to its practices around account freezes and closures, argues a new letter signed by Freedom of the Press Foundation and nearly two dozen human rights and civil liberties groups.

The payment giant has become notorious for suspending or disrupting transfers for lawful controversial content without due process, including of course in the financial blockade against the whistleblower site WikiLeaks in the early 2010s — an extralegal embargo that Freedom of the Press Foundation was founded in part to address. In another case, PayPal froze the account of News Media Canada over a payment to submit an article about Syrian refugees for an award.

The risk of arbitrary interruption to online payments can be a serious one, especially for independent reporters without institutional support. And the problem isn't limited to news reporting: supporters of the privacy network Tor, creators engaged in erotic fiction or sex work, and online communities simply accused of copyright infringement have all faced restrictions at one point or another. These disruptions can be existential, as we note in the letter:

In our increasingly digital world, in which websites and online consumers rely on payment processors such as PayPal to send online payments for goods and services, fund their online infrastructure, and even pay staff, these opaquely implemented account freezes can be disruptive and disadvantageous to individuals, nonprofits, and companies. PayPal and your subsidiary Venmo have over 360 million users — which means you have a staggering amount of influence over the financial lives of these individuals as well as access to an enormous trove of highly sensitive information that should not flow to the government without adequate safeguards.

The recommendations in the letter are in line with the Santa Clara Principles on Transparency and Accountability in Content Moderation, which aim to help companies center human rights when moderating user-generated content and accounts.

Today's letter, which can be found in full below, was led by the Electronic Frontier Foundation and signed by 7amleh - The Arab Center for the Advancement of Social Media, Access, ACLU of Northern California, American Civil Liberties Union, Article 19, the Center for Democracy and Technology, Center for LGBTQ Economic Advancement & Research (CLEAR), Demand Progress Education Fund, European Legal Support Center (ELSC), Fight for the Future, Freedom of the Press Foundation, Global Voices, Masaar-Technology and Law Community, Mnemonic, New America’s Open Technology Institute, PDX Privacy, the Tor Project, Taraaz, Ranking Digital Rights, Restore the Fourth Minnesota, and SMEX.

Parker Higgins

Major news outlets must push Biden DOJ to drop Assange charges — their press freedom rights are at stake

2 years 11 months ago

Three major news organizations are set to meet with the Department of Justice (DOJ) today to discuss the recent journalist surveillance scandals, and talk with the Attorney General Merrick Garland about how the DOJ plans to to prevent the use of subpoenas and surveillance to root out journalistic sources in future leak investigations.

While the news outlets plan to push for more concrete promises from the Justice Department to prevent further spying on reporters, it’s vitally important that the same publishers use today’s opportunity to press the Attorney General to drop the prosecution of WikiLeaks founder Julian Assange, which constitutes the most clear and present danger to this country’s press freedom rights. If the case continues, it would render Garland’s new promises worthless.

Assange is charged under the Espionage Act and the Computer Fraud and Abuse Act, largely for activities U.S. national security journalists engage in all the time. When the Trump administration proceeded with the indictment, many major news publishers spoke out forcefully against it, despite harshly criticizing Assange in the past. Virtually every major human rights and civil liberties group in the country urged Biden's DOJ not to continue with the prosecution earlier this year.

Beyond the injustice of the case itself, though, its precedent threatens to undermine the very same new rules that publishers will discuss today. As Garland said in Senate testimony Wednesday: “In developing this policy, we have to distinguish between reporters doing their jobs and reporters committing crimes unrelated to the leaking.”

If the Justice Department is promising on the one hand not to use subpoenas against journalists unless they are otherwise engaged in a crime, and on the other hand is laying out the blueprint for charging journalists who report on sensitive national security information, the problem could not be more clear.

We are cautiously optimistic about the new Department of Justice rules, pending final language, and we view their introduction as a possible sea change for press freedom in the United States. We absolutely encourage the news organizations meeting today to push for the strongest possible guidelines, and for Congress to codify those guidelines into law that cannot be changed at the stroke of a future president's pen.

But we also must remain vigilant to loopholes and exceptions to these new guidelines, and expect this and future administrations to interpret the rules as they see fit. With the Knight First Amendment Institute, we've written about one major unknown in terms of who constitutes a "journalist" for the purpose of the guidelines.

Today, as stakeholders hammer out the details of this new rule, we urge the news organizations and the self-described press freedom advocates within the administration to consider the danger of pending Espionage Act charges against a publisher. And we continue to urge the Department of Justice to drop the prosecution.

Parker Higgins

In a sea change for press freedom, Biden administration vows not to spy on reporters doing their job

2 years 11 months ago

After a month of disclosures about the Trump Justice Department pursuing surveillance records of journalists through leak investigation subpoenas — culminating in yesterday’s revelation of a subpoena and a gag order pertaining to four New York Times journalists, served by the Trump administration and initially defended by the current Department of Justice — the Biden administration has announced a new policy that could signal a major shift in the interaction of press freedom and state surveillance.

White House press secretary Jen Psaski released a statement today saying “the issuing of subpoenas for the records of reporters in leak investigations is not consistent with the President’s policy direction to the Department.” The Justice Department separately told reporters: “in a change to its longstanding practice, [the DOJ] will not seek compulsory legal process in leak investigations to obtain source information from members of the news media doing their jobs."

The following statement can be attributed to Freedom of the Press Foundation executive director Trevor Timm:

This announcement is a potential sea change for press freedom rights in the United States. Over the past decade — spanning multiple administrations run by both parties — the Justice Department has increasingly spied on reporters doing their job, casting a chill over investigative reporting and putting countless whistleblowers at risk.

While we’re encouraged to see this announcement ending this invasive and disturbing tactic, the devil is — of course — in the details. The Justice Department must now write this categorical bar of journalist surveillance into its official ‘media guidelines,’ and Congress should also immediately enshrine the rules into law to ensure no administration can abuse its power again. If they follow through, this commendable and vitally important decision by the Biden administration has the potential to stem the tide of more than ten years of erosion of press freedom.

Freedom of the Press Foundation

Documenting an extraordinary year of press freedom violations

2 years 11 months ago

The U.S. Press Freedom Tracker, a project of Freedom of the Press Foundation and Committee to Protect Journalists, has published an overview of a truly remarkable year’s worth of press freedom violations during nationwide protests since the police killing of George Floyd. Building on individually reported accounts of every journalist assault, arrest, damaged equipment, or other press freedom violations, the Tracker aims to provide the definitive telling of the crackdown on journalists that emerged alongside the protests.

As reporters covered the movement, they were subjected to more than 150 arrests or detainments, 580 physical attacks, and 112 incidents of damaged equipment. The phenomenon peaked last summer and has continued into 2021, which has seen two dozen arrests or detainments, nearly three dozen physical attacks, and 9 incidents of damaged equipment.

“To say the past year was a historic chapter in the story of press freedom in the United States would be an understatement. I had to stop using the word ‘unprecedented’ even as we reported out case numbers that were unlike any we’d ever seen,” said U.S. Press Freedom Tracker’s managing editor Kirstin McCudden. “But even after following each case as it developed, pulling together a full year of data paints a picture of American press freedom that is shocking and alarming.”

Freedom of the Press Foundation