6 results arranged by date
Entering the terms “NSO Group,” “journalists,” and “spying” into a Google search from a workstation in New York City recently produced a sponsored search result at the top of the page. The NSO Group manufactures some of the world’s most sophisticated and high-profile spyware, and its sponsored link invites readers to a slick website touting…
Upcoming report looks at leak investigations and surveillanceNew York, September 30, 2013– The Committee to Protect Journalists will release its first comprehensive report on press freedom conditions in the United States. Leonard Downie Jr., former Washington Post executive editor and now the Weil Family Professor of Journalism at Arizona State University’s Walter Cronkite School of Journalism and Mass Communication,…
Few cases better underscore the need for digital security among journalists. On Tuesday, ex-CIA officer John Kiriakou pleaded guilty to leaking the identity of another CIA operative to Matthew Cole, a journalist formerly with an ABC News investigative team. In a 2007 interview with ABC, Kiriakou became the first CIA official to confirm that waterboarding…
This week, Morgan Marquis-Boire and Bill Marczak of the University of Toronto’s Citizen Lab provided a disturbing look into the likely use of a commercial surveillance program, FinFisher, to remotely invade and control the computers of Bahraini activists. After the software installs itself onto unsuspecting users’ computer, it can record and relay emails, screenshots, and…
Nart Villeneuve has published a detailed summary of recent malware attacks on media and human rights groups who work on Chinese issues. He highlights a disturbing new trend. On Wednesday, Amnesty Hong Kong’s website was repurposed by hackers to infect visitors with a wide variety of nasty malware. The Nobel Prize’s website was also defaced earlier…
This weekend, staff at CPJ received a personal invitation to attend the Oslo awards ceremony for Nobel Peace Prize winner Liu Xiaobo. The invite, curiously, was in the form of an Adobe PDF document. We didn’t accept. We didn’t even open the e-mail. We did, however, begin analyzing the document to see was really inside…