Skip to main content

To hoodwink intolerance, online guide asks journos to operate anonymously, use encryption for messaging

By A Representative
In a new guide on how to operate in a changed atmosphere of intolerance, journalists across the world have been told make it “difficult for anyone to try and intercept” their emails, text messages and phone calls as part of the measures “to make the lives of those who want to uncover your sources and the information being revealed to you much harder.”
Written by Michael Dagan, a senior editor with 25 years’ experience, the guide has been forwarded to www.counterview.net following the mention of the Committee to Protect Journalists in an article (click HERE), with the comment: “This is not an easy time for journalists all over the world, with the discoveries of surveillance on citizens, which includes journalists and their sources.”
Dagan says, “The degree of effort you’re prepared to take to protect your privacy, your sources’ anonymity and your data’s safety, should be commensurate to the likelihood of a real threat, be that hacking or spying.”
Pointing out that there is “an air of danger to freedom of speech and freedom of the press is spreading slowly like a dark cloud over the Western Hemisphere", the guide says, US today has a "serving president accuses a former president of surveillance”, even as preventing “central US media outlets access – so far always granted, and taken for granted – to press conferences he holds.”
In his 5,000-words guide, Dagan says, journalists should be “securing on-device applications and functions” thus reducing the “attack surface”, i.e. “limiting the installed apps to the bare minimum, installing only from trusted sources, selecting apps that require minimal rights, keeping the system fully patched and updated, and having as many security controls on the device.”
He wants journalists to isolate their “devices and/or their environment” with “physical insulation of a computer for the purpose of checking files, or the use of prepaid mobile devices.”
Cautioning the use of both “digital and real world”, Dagan says, “For example, never write down the name of the source, certainly not on any app or on any document that’s stored on your computer – and most certainly not on anything stored on the cloud.”
Giving a whole lot of information on how to “encrypt everything” using “full disk encryption” using “FileVault, VeraCrypt or BitLocker”, Dagan wants journalists not to put their computer to “sleep”, as it “may allow an attacker to bypass this defense.”
Asking journalists to “avoid chatting with sources on the phone”, Dagan says, “All phone companies store data related to the caller and the receiver’s numbers, as well as the location of the devices at the time calls were made.”
“In the US and several other countries, they’re required by law to disclose information on registered calls in their possession”, he points out, adding, “You should use a secure call service, such as the one the Signal app – which was tested repeatedly for security – possesses.”
Dagan warns, “Your calls (cellular ones and via landlines) can be monitored by law enforcement agencies and each SMS is like a postcard – all text is fully visible to those who may intercept it”, adding, “Therefore, use messengers that allow for secure end to end call”, especially those where “the Signal Protocol has been actually implemented into WhatsApp, Facebook Messenger, and Google Allo, making conversations using them encrypted.”
However, his advice says, “Do not use organizational chats” such as “Slack, Campfire, Skype and Google Hangouts”, especially for private conversations. “They are easy to break in, and are exposed to disclosure requests for courts use, to resolve legal issues at the workplace”, he adds.
Asking journalists to protect data on computer, Dagan says, “It’s very easy to break regular passwords, but it can take years to break passphrases – i.e., random combinations of words. We recommend trying secure password management tools like: LastPass and 1Password and KeePassX”, even as using “two-factor authentication”.
Other advices include on how to become anonymous online, using private browsing mode and alternative browsing, such as TOR, developed by the US Navy, which “allows you to operate in a hidden network, carry out private communications and set up web sites anonymously.”
---
Click HERE for the complete guide

Comments

TRENDING

Advocacy group decries 'hyper-centralization' as States’ share of health funds plummets

By A Representative   In a major pre-budget mobilization, the Jan Swasthya Abhiyan (JSA), India’s leading public health advocacy network, has issued a sharp critique of the Union government’s health spending and demanded a doubling of the health budget for the upcoming 2026-27 fiscal year. 

Iswar Chandra Vidyasagar’s views on religion as Tagore’s saw them

By Harasankar Adhikari   Religion has become a visible subject in India’s public discourse, particularly where it intersects with political debate. Recent events, including a mass Gita chanting programme in Kolkata and other incidents involving public expressions of faith, have drawn attention to how religion features in everyday life. These developments have raised questions about the relationship between modern technological progress and traditional religious practice.

Stands 'exposed': Cavalier attitude towards rushed construction of Char Dham project

By Bharat Dogra*  The nation heaved a big sigh of relief when the 41 workers trapped in the under-construction Silkyara-Barkot tunnel (Uttarkashi district of Uttarakhand) were finally rescued on November 28 after a 17-day rescue effort. All those involved in the rescue effort deserve a big thanks of the entire country. The government deserves appreciation for providing all-round support.

Delhi Jal Board under fire as CAG finds 55% groundwater unfit for consumption

By A Representative   A Comptroller and Auditor General (CAG) of India audit report tabled in the Delhi Legislative Assembly on 7 January 2026 has revealed alarming lapses in the quality and safety of drinking water supplied by the Delhi Jal Board (DJB), raising serious public health concerns for residents of the capital. 

Election bells ringing in Nepal: Can ousted premier Oli return to power?

By Nava Thakuria*  Nepal is preparing for a national election necessitated by the collapse of KP Sharma Oli’s government at the height of a Gen Z rebellion (youth uprising) in September 2025. The polls are scheduled for 5 March. The Himalayan nation last conducted a general election in 2022, with the next polls originally due in 2027.  However, following the dissolution of Nepal’s lower house of Parliament last year by President Ram Chandra Poudel, the electoral process began under the patronage of an interim government installed on 12 September under the leadership of retired Supreme Court judge Sushila Karki. The Hindu-majority nation of over 29 million people will witness more than 3,400 electoral candidates, including 390 women, representing 68 political parties as well as independents, vying for 165 seats in the 275-member House of Representatives.

Pairing not with law but with perpetrators: Pavlovian response to lynchings in India

By Vikash Narain Rai* Lynch-law owes its name to James Lynch, the legendary Warden of Galway, Ireland, who tried, condemned and executed his own son in 1493 for defrauding and killing strangers. But, today, what kind of a person will justify the lynching for any reason whatsoever? Will perhaps resemble the proverbial ‘wrong man to meet at wrong road at night!’

Zhou Enlai: The enigmatic premier who stabilized chaos—at what cost?

By Harsh Thakor*  Zhou Enlai (1898–1976) served as the first Premier of the People's Republic of China (PRC) from 1949 until his death and as Foreign Minister from 1949 to 1958. He played a central role in the Chinese Communist Party (CCP) for over five decades, contributing to its organization, military efforts, diplomacy, and governance. His tenure spanned key events including the Long March, World War II alliances, the founding of the PRC, the Korean War, and the Cultural Revolution. 

Jayanthi Natarajan "never stood by tribals' rights" in MNC Vedanta's move to mine Niyamigiri Hills in Odisha

By A Representative The Odisha Chapter of the Campaign for Survival and Dignity (CSD), which played a vital role in the struggle for the enactment of historic Forest Rights Act, 2006 has blamed former Union environment minister Jaynaynthi Natarjan for failing to play any vital role to defend the tribals' rights in the forest areas during her tenure under the former UPA government. Countering her recent statement that she rejected environmental clearance to Vendanta, the top UK-based NMC, despite tremendous pressure from her colleagues in Cabinet and huge criticism from industry, and the claim that her decision was “upheld by the Supreme Court”, the CSD said this is simply not true, and actually she "disrespected" FRA.

Uttarakhand tunnel disaster: 'Question mark' on rescue plan, appraisal, construction

By Bhim Singh Rawat*  As many as 40 workers were trapped inside Barkot-Silkyara tunnel in Uttarkashi after a portion of the 4.5 km long, supposedly completed portion of the tunnel, collapsed early morning on Sunday, Nov 12, 2023. The incident has once again raised several questions over negligence in planning, appraisal and construction, absence of emergency rescue plan, violations of labour laws and environmental norms resulting in this avoidable accident.