Connect with us

Column

Securing Truth: The Intersection of Investigative Journalism and Cyber Security in Global South Nations

Published

on

Investigative journalism plays a crucial role in holding power to account, uncovering corruption, and promoting transparency in society. However, in the digital age, journalists are increasingly vulnerable to cyber security hacks and threats that can compromise their investigations and endanger sources. In Global South nations, where resources and infrastructure may be limited, addressing these challenges requires an adaptive approach that combines ethical deployment of cyber security measures with the principles of investigative journalism. This essay explores the intersection of investigative journalism and cyber security in Global South nations, focusing on ethical considerations, collaborative strategies, and the use of technology to safeguard information and integrity.

Investigative journalism plays a crucial role in uncovering corruption, fraud, and wrongdoing in various institutions. However, in recent years, journalists themselves have become targets of cybersecurity hacks in an attempt to silence their reporting and steal sensitive information.
Cyber security hacks targeted at journalists can take various forms, including phishing attacks, malware infections, and social engineering tactics. These hacks can compromise journalists’ email accounts, social media profiles, and even their devices, ultimately undermining their ability to conduct investigative journalism.
One high-profile example of a cyber security hack targeting investigative journalists is the case of the hacking group Fancy Bear targeting journalists at the Associated Press and other media outlets. Fancy Bear, a Russian hacking group linked to the Kremlin, targeted journalists in an attempt to access their emails and other sensitive information.
To protect themselves against cyber security hacks, investigative journalists must practice good digital hygiene, such as using strong and unique passwords, enabling two-factor authentication, and being cautious of suspicious emails and messages. Additionally, journalists can use encrypted communication tools and secure file-sharing services to protect their sensitive information.
Overall, the targeting of investigative journalists through cyber security hacks poses a serious threat to press freedom and the ability to hold powerful institutions accountable. Journalists must remain vigilant and take proactive measures to protect themselves and their important work.
In today’s digital age, journalists face unique challenges in safeguarding their data and ensuring the integrity of their reporting. The increasing prevalence of cyber security hacks poses a threat to investigative journalism, undermining efforts to uncover the truth and hold power to account. While the Global South Nations grapple with these issues, there is a growing recognition of the need to adopt ethical deployment of cyber security measures to protect journalistic integrity. By examining the key issues, thought processes, and solutions at the intersection of investigative journalism and cyber security, journalists can harness synergies to avoid hacks and maintain their commitment to truth-telling.
Maintaining cyber security and integrity as a journalist involves a multi-faceted approach that combines awareness of potential risks, technical solutions, and ethical considerations. Here are some synergies for journalists to avoid cybersecurity hacks and maintain integrity:
1. *Awareness of Risks*: Journalists must be aware of the various cyber security threats they may face, such as phishing attacks, malware infections, and social engineering tactics. They should stay informed about the latest trends in cybersecurity and consistently update their knowledge about potential risks.
2. *Secure Communication*: Journalists should use encrypted communication tools to securely communicate with sources, colleagues, and editors. Encrypted messaging apps like Signal and secure email services like ProtonMail can help protect sensitive information from being intercepted.
3. *Secure Data Storage*: Journalists should store their data securely, using encrypted storage solutions such as VeraCrypt or secure cloud storage services. Regularly backing up data and keeping it encrypted will help protect it from hackers or unauthorized access.
4. *Password Management*: Using strong, unique passwords for different accounts is essential to prevent unauthorized access. Password management tools like LastPass or Dashlane can help journalists generate and securely store complex passwords for various accounts.
5. *Two-Factor Authentication*: Enabling two-factor authentication adds an extra layer of security to accounts, requiring a second verification step beyond just entering a password. This can prevent unauthorized access even if a password is compromised.
6. *Social Engineering Awareness*: Journalists should be cautious of social engineering tactics, where hackers manipulate individuals into divulging sensitive information. Being vigilant and verifying the authenticity of requests for sensitive information can help prevent falling victim to social engineering attacks.
7. *Ethical Considerations*: Maintaining integrity as a journalist also involves ethical considerations when handling sensitive information. Journalists should follow ethical guidelines and seek consent from sources before disclosing any information. Safeguarding the identity of whistleblowers and protecting sensitive data are crucial aspects of maintaining integrity in journalism.
8. *Regular Training*: Continuous training on cyber security best practices can help journalists stay updated on the latest threats and prevention strategies. Media organizations should invest in providing cybersecurity training to their journalists to ensure they are equipped to handle potential risks effectively.
Essentially, maintaining cybersecurity and integrity as a journalist requires a combination of awareness, technical solutions, ethical considerations, and ongoing training. By implementing these synergies and staying vigilant, journalists can protect themselves from cybersecurity hacks and uphold the integrity of their work.
In the ever-evolving landscape of digital threats and information warfare, the symbiotic relationship between effective cybersecurity protocols and principled investigative journalism has become increasingly evident. As we witness a surge in cyber attacks targeting media outlets and journalists worldwide, the need for ethical solutions to safeguard data and preserve journalistic integrity has never been more pressing. By exploring successful examples of how cyber security measures have bolstered investigative journalism practices, we can discern the crucial role that ethical deployment plays in ensuring the persistence and triumph of truth-seeking endeavours.
One notable example of successful cyber security ethical solutions combined with investigative journalism prevailing is the case of the Panama Papers, which was a massive leak of 11.5 million documents from the Panamanian law firm Mossack Fonseca in 2016. The leak was obtained and shared with the International Consortium of Investigative Journalists (ICIJ) by an anonymous whistleblower.
The journalists involved in the Panama Papers investigation, from news outlets across the globe, meticulously analyzed the leaked documents to uncover widespread tax evasion and money laundering schemes involving high-profile individuals, corporations, and even heads of state. The investigation shed light on the secretive world of offshore finance and exposed how the global elite used offshore accounts to evade taxes and conceal illicit activities.
In this case, the successful ethical solution was the collaboration between journalists and the ICIJ to verify the authenticity of the leaked documents and ensure accuracy in reporting. The journalists involved adhered to ethical guidelines by cross-referencing information, protecting the identities of sources, and verifying the legality of their investigative methods.
The Panama Papers investigation exemplified how a combination of cyber security ethical solutions, such as safeguarding whistleblower anonymity and secure communication channels, with rigorous investigative journalism practices can lead to groundbreaking revelations and hold the powerful to account.
This case underscores the importance of ethical considerations in handling sensitive information, the value of collaboration in investigative journalism, and the significance of protecting sources and data integrity in the digital age. It serves as a prime example of how cyber security measures can be integrated with investigative journalism to expose corruption, promote transparency, and drive positive societal change.
In the burgeoning realm of digital information dissemination and the continued prevalence of cyber threats, the dynamic interplay between adaptive investigative journalism practices and ethical cyber security deployment is particularly crucial in the context of Global South nations. As these regions contend with unique socio-political challenges and technological limitations, the need for a nuanced approach that recognizes the intersection of journalistic integrity and digital protection grows ever more pronounced. By examining how investigative journalism can adapt to these contexts while upholding ethical cyber security standards, a framework emerges for achieving a harmonious balance between information dissemination and safeguarding against external intrusions in the Global South.
In the Global South nations, where there may be limited resources and infrastructure for both investigative journalism and cyber security, a more adaptive and collaborative approach is needed to address challenges and promote ethical practices in both fields. Here are some key considerations for an adaptive view of investigative journalism and cyber security ethical deployment in Global South nations:
1. Capacity building and training: Investing in training and capacity building programs for journalists and cyber security professionals in Global South nations is crucial. Providing education on ethical practices, digital security, and investigative techniques can empower individuals to conduct thorough and ethical investigations while safeguarding their digital communications and data.
2. Collaboration and partnerships: Encouraging collaboration between journalists, civil society organizations, academia, and government agencies can foster a more holistic approach to addressing issues related to corruption, human rights abuses, and cybersecurity threats. By working together, stakeholders can leverage their respective expertise to amplify impact and ensure the dissemination of accurate and reliable information.
3. Use of technology: Embracing technology tools and platforms can enhance the capabilities of investigative journalists and cyber security professionals in Global South nations. Implementing secure communication channels, encryption tools, and digital verification methods can help protect sources, data, and investigative findings from external threats.
4. Advocacy for press freedom and privacy rights: Promoting press freedom and advocating for privacy rights are essential components of ensuring the ethical deployment of investigative journalism and cyber security measures in Global South nations. Protecting journalists’ rights to freedom of expression and access to information is crucial for holding power to account and promoting transparency.
5. Ethical considerations: Upholding ethical standards, such as accuracy, transparency, and accountability, is paramount in investigative journalism and cyber security initiatives in Global South nations. Adhering to ethical guidelines and principles can help build trust with sources, stakeholders, and the public while maintaining integrity in reporting and data protection practices.
Overall, taking an adaptive view of investigative journalism and cyber security ethical deployment in Global South nations requires a multi-faceted approach that prioritizes capacity building, collaboration, technology use, advocacy, and ethical considerations. By working together and embracing innovative strategies, stakeholders can effectively address challenges, promote accountability, and uphold human rights in the digital age.
In conclusion, in a rapidly evolving digital landscape, the ethical deployment of cyber security measures and investigative journalism practices is essential to ensure the integrity and impact of reporting in Global South nations. By building capacity, fostering collaboration, embracing technology, advocating for press freedom, and upholding ethical standards, journalists and cyber security professionals can work together to strengthen investigative efforts, protect sensitive information, and promote transparency. As we navigate the challenges of the digital age, stakeholders in Global South nations must continue to adapt, innovate, and uphold the principles of accountability, integrity, and respect for human rights in their pursuit of truth and justice. Through a collective commitment to ethical journalism and cyber security practices, we can create a safer and more transparent environment for investigative reporting to thrive and make a lasting impact on society.

♦ Professor Ojo Emmanuel Ademola is a Nigerian Professor of Cyber Security and Information Technology Management, and holds a Chartered Manager Status, and by extension, Chartered Fellow (CMgr FCMI) by the highly Reputable Royal Chartered Management Institute.

Texas Guardian News
Continue Reading
Click to comment

Leave a Reply

Column

Empowering Online Safety and Privacy in the Global South Toward a Secured Digital Future

Published

on

In today’s digital age, where technology is deeply embedded in our daily lives, online safety and privacy have emerged as crucial concerns that individuals must address proactively. The ever-evolving online ecosystem presents a myriad of cyber threats and privacy breaches that have the potential to compromise personal information, identity, and financial security. As such, individuals must navigate this complex landscape with vigilance, awareness, and a thorough understanding of best practices for safeguarding their online identities. By exploring examples, issues, thought processes, and potential solutions related to online safety and privacy, we can delve deeper into the strategies that empower individuals to protect themselves in the digital realm.

Online safety and privacy are paramount in the digital age, as individuals must navigate a complex online ecosystem where cyber threats and privacy breaches are prevalent. Let’s delve deeper into this topic by examining examples, issues, thought processes, and potential solutions related to online safety and privacy:
1. Examples:
– Using strong, unique passwords for online accounts and enabling two-factor authentication to enhance security.
– Be cautious when sharing personal information online, such as social security numbers, financial details, or sensitive data, to prevent identity theft or fraud.
– Avoid clicking on suspicious links, downloading unknown attachments, or responding to unsolicited emails to protect against malware, phishing scams, and other cyber threats.
– Regularly updating software and applications to patch security vulnerabilities and protect against potential exploits.
2. Issues:
– Data breaches and leaks can expose individuals’ personal information, including passwords, contact details, and financial data, leading to identity theft, fraud, or other malicious activities.
– Online scams, phishing attacks, and social engineering tactics can deceive individuals into sharing sensitive information or falling victim to fraudulent schemes.
– Privacy violations by companies, websites, or third-party apps may compromise individuals’ personal data, browsing habits, or online activities without their consent.
– Lack of awareness or understanding of online safety best practices can leave individuals vulnerable to cyber threats, scams, or privacy risks.
3. Thought processes:
– Recognizing the importance of safeguarding personal information and maintaining privacy online is the first step toward enhancing online safety and security.
– Being vigilant, sceptical, and cautious when interacting with online platforms, websites, or communications can help individuals identify potential risks and avoid falling for scams or malicious activities.
– Understanding common cybersecurity threats, such as phishing emails, ransomware attacks, or social engineering tactics, can empower individuals to protect themselves and mitigate risks effectively.
– Practicing good digital hygiene, such as regularly updating passwords, using secure connections, and avoiding public Wi-Fi networks, can bolster online safety and privacy.
4. Solutions:
– Educating individuals about online safety best practices, privacy protection, and cybersecurity awareness can help raise awareness and empower users to take proactive measures to safeguard their online identities.
– Implementing security features, such as encryption, secure authentication methods, and privacy controls, in online platforms and services can enhance user protection and mitigate potential risks.
– Engaging in ongoing training, workshops, or awareness campaigns focused on cybersecurity, phishing prevention, and data privacy can equip individuals with the knowledge and skills needed to navigate the online landscape securely.
– Advocating for stronger data protection laws, regulations, and accountability measures to ensure that companies and organizations safeguard users’ personal information and prioritize online privacy.
Essentially, online safety and privacy are critical considerations in the digital age, as individuals must be proactive in protecting their personal information and maintaining their privacy online. By understanding the examples, issues, thought processes, and solutions related to online safety and privacy, individuals can enhance their cybersecurity awareness, mitigate risks, and safeguard their digital identities in an increasingly interconnected and vulnerable online environment.
Intriguingly, in the dynamic context of the Global South, characterized by rapid digital transformation and emerging opportunities, the significance of online safety and privacy is paramount. As individuals in these regions navigate the intricate online landscape, they are confronted with a multitude of cyber threats and privacy breaches that jeopardize their personal information and digital identities. By delving deeper into this pivotal topic and tailoring adaptable approaches to the immediate needs, values, future of work, and sustainability concerns of Global South nations, we can develop strategies to empower individuals to safeguard themselves in this digital age.
Undoubtedly, recognizing and managing the importance of safeguarding personal data and maintaining privacy online is the foundational step towards enhancing online safety and security in these regions. Vigilance, scepticism, and caution in online interactions can help individuals identify and mitigate potential risks, such as data breaches, online scams, and privacy violations that may compromise their digital well-being. Understanding common cybersecurity threats and practising good digital hygiene, such as secure authentication methods and regular software updates, are essential components in bolstering online safety and privacy for individuals in the Global South. Through education, advocacy, and the implementation of security measures tailored to the specific needs of these regions, we can promote a culture of cybersecurity awareness and empower individuals to navigate the digital landscape securely. By fostering resilience, integrity, and a commitment to data protection, we can work towards a safer and more secure online environment that upholds privacy, trust, and digital empowerment for individuals in the Global South.
In conclusion, the digital age offers tremendous opportunities for connectivity, knowledge-sharing, and innovation, but it also brings inherent risks and vulnerabilities that individuals must address to safeguard their online identities. By adopting a proactive mindset, staying informed about cybersecurity threats, and implementing best practices for online safety and privacy, individuals can navigate the digital landscape with confidence and resilience. With ongoing education, awareness, and collaboration among stakeholders, we can strive towards a safer and more secure online environment that upholds the principles of privacy, data protection, and digital trust. Together, we can harness the transformative power of technology while ensuring that online safety and privacy remain paramount in our digital future.

♦ Professor Ojo Emmanuel Ademola is a Nigerian Professor of Cyber Security and Information Technology Management, and holds a Chartered Manager Status, and by extension, Chartered Fellow (CMgr FCMI) by the highly Reputable Royal Chartered Management Institute. 

Texas Guardian News
Continue Reading

Anthony Obi Ogbo

Historic HISD’s $4.4 billion bond – what is County Judge Hidalgo up to?

Published

on

Harris County Judge Lina Hidalgo has sparked controversy within her Democratic Party circle by publicly endorsing the contentious $4.4 billion Houston ISD bond less than two weeks before the upcoming election. In a recent social media post, Hidalgo revealed that a recent tour of an HISD school facility had shed light on the urgent need for additional funding, despite the Texas Education Agency’s (TEA) recent takeover of the district.

The bond, which is divided into two separate propositions, has faced significant backlash in recent months. Surprisingly, both Harris County Republicans and Democrats have united in opposition to the bond, citing concerns about potential mismanagement by the current leadership.

However, Hidalgo’s stance is rooted in her firsthand observations during the school tour. She raised the alarm at the inadequate conditions she witnessed, such as a mere fence separating the exterior from six classrooms, a musty smell emanating from the library due to a damaged HVAC system, and using mobile units from 1990 that were only designed to last 10 years. Additionally, she noted that the narrow walkways and lack of proper canopies made it difficult for students and staff during inclement weather, and classrooms’ heating and cooling systems were insufficient. Indeed, Hidalgo’s decision to support the bond is based on her commitment to addressing the pressing needs of HISD students and staff, as highlighted by her eye-opening visit to the school facility.

To provide a comprehensive understanding of the Bond Proposal, let’s break it down: The proposal consists of two parts – Proposition A and Proposition B. Proposition A aims to enhance the district’s buildings and facilities. If approved, HISD will have the opportunity to borrow $3.96 billion for crucial repairs and upgrades. On the other hand, Proposition B focuses on enhancing technology in HISD schools, with a proposed borrowing of $440 million to modernize technology across all schools.

The Bond Proposal currently under consideration is undeniably significant, representing the first time in 12 years that HISD has sought funding for improvements. If approved, it would also become the largest bond in the history of the state of Texas. Major supporters of the bond, such as the Houston Food Bank, the Boys & Girls Clubs of Greater Houston, Mental Health America of Greater Houston, and Children at Risk, have valid concerns. They are particularly focused on the challenges faced by students in deteriorating school facilities.

However, there might be a glaring oversight in their assessment – the ability of HISD’s current leadership to effectively manage this initiative.  Since assuming the role of Superintendent of the Houston Independent School District in June of 2023, Mike Miles has consistently been making headlines, albeit for all the wrong reasons. Despite his responsibilities in organizing, leading, directing, policy-making, and execution, Miles has failed to pass every test required to excel in his position. He has consistently struggled to lead this school district. Teachers are feeling distressed and uncertain about their roles, parents are worried about their children’s future, and students are losing interest in their education. The situation at HISD is dire, and it is clear that a change in leadership may be necessary to restore trust and stability within the district.

It is not surprising that former Houston Mayor Sylvester Turner and other local leaders who oppose the bond have expressed concerns regarding this proposal. They criticized Miles and his administration for not seeking sufficient input in developing the bond proposal. Bishop James Dixon, who heads the local National Association for the Advancement of Colored People (NAACP) chapter, also criticized the lack of transparency in the bond proposal process. The Harris County Democratic Party Executive Committee voted unanimously to oppose it.  Their party Chair Mike Doyle suggested that the funds should be in the hands of an elected representative, not Miles.

These criticisms underscore the critical need for transparency and community involvement in decision-making processes, particularly when it comes to allocating public funds. Superintendent Miles failed to actively engage all stakeholders, including community members and organizations, to ensure that the needs and priorities of the people were adequately addressed. The opposition ultimately stems from a lack of trust. Many believe that Miles cannot be trusted to responsibly manage billions in taxpayer money.

In less than two weeks, voters will see HISD’s bond divided into two items on their ballots, one totaling approximately $4 billion and the other around $400 million. Voters must carefully consider the implications of passing such a large bond, especially when there are concerns about the leadership within HISD. Judge Hidalgo and other supporters of this bond must move beyond their emotions. It is widely recognized that HISD is facing challenges and requires assistance. Ultimately, the success of this bond will depend on not just the amount of funding allocated, but also on the ability of HISD’s leadership to effectively implement and oversee its use.

♦Publisher of the Guardian News, Professor Anthony Obi Ogbo, PhD, is on the Editorial Board of the West African Pilot News. He is the author of the Influence of Leadership (2015)  and the Maxims of Political Leadership (2019). Contact: anthony@guardiannews.us

Texas Guardian News
Continue Reading

Anthony Obi Ogbo

What is wrong with Houston’s Mayor, John Whitmire?

Published

on

The ongoing feud between Houston Mayor John Whitmire and the city’s chief financial officer, Controller Chris Hollins, is escalating into a distracting political spectacle.

During a heated press conference last week, Whitmire accused Hollins of engaging in pay-to-play by seeking sponsorships for a local annual investor conference. Whitmire’s main concern is that Hollins openly sought sponsorships reaching up to $100,000, with top sponsors being promised access to a private dinner with him, as stated in a document on the city’s website. Whitmire announced that he had launched an ethics investigation into the matter.

The ongoing feud between Houston Mayor John Whitmire and the city’s chief financial officer, Controller Chris Hollins, is escalating into a distracting political spectacle.

During a heated press conference last week, Whitmire accused Hollins of engaging in pay-to-play by seeking sponsorships for a local annual investor conference. Whitmire’s main concern is that Hollins openly sought sponsorships reaching up to $100,000, with top sponsors being promised access to a private dinner with him, as stated in a document on the city’s website. Whitmire announced that he had launched an ethics investigation into the matter.

In response, Hollins swiftly retaliated by submitting a memo to the City of Houston’s Office of Inspector General and the Houston City Council Ethics Committee, requesting that the investigation be expanded to include fundraising practices for the Mayor’s State of the City event. Hollins defended his actions by explaining that he utilized the same fundraising model for the Investor Conference that the Mayor had used for the State of the City event. The key difference is that the Mayor controls the proceeds from the State of the City, while proceeds from the Investor Conference are directed to a non-profit donor-advised fund, where an independent body has exclusive spending authority.

The two men have publicly disagreed over the city’s finances, but the latest drama marked a new level of animosity. Earlier this year, for instance, the duo clashed over Whitmire’s proposed $1.5 billion settlement with the firefighter’s union. Tensions escalated when Hollins halted the process and raised additional questions about the agreement. Hollins also argued that the Mayor did not provide him with enough time to assess the financial impact the contract would have on the city’s finances. In response, Whitmire, who played a significant role in negotiating the settlement, emphasized the need for swift approval to prevent any potential legal challenges that could result in the city being liable for a larger sum than agreed upon.

However, this recent clash with Hollins is just the tip of the iceberg. Since taking office as Houston’s mayor, Whitmire has frequently made headlines for his conflicts with other public officials, many of whom are fellow members of his Democratic Party.

Do you remember the Whitmire versus Hidalgo drama? Harris County Judge Lina Hidalgo supported the late Sheila Jackson Lee, Whitmire’s rival in a contentious mayoral race. Since Whitmire won and took office, his attitude towards Hidalgo and others who supported Jackson Lee has been quite vindictive. Whitmire has made it nearly impossible to meet with Hidalgo in person, even during major weather events that have hit Houston.

The officials had held separate briefings due to this ongoing discord. On May 16, they held their first joint news conference after an unexpected windstorm ravaged Houston. The exchange was disgraceful and awkward, with both even squabbling over who should speak at the podium. Whitmire remarked, “I’m glad I made the approval list,” to which Hidalgo responded, “Mayor, this is a disaster. Now is not the time.”

That was not the end of it. A month later, Whitmire stirred controversy with a derogatory comment on Hidalgo’s Facebook page regarding her bridal shower. Hidalgo had posted photos from the event, including one with her fiancé David James. Commenting from his official Facebook page, Whitmire wrote, “Wonderful. He sure looks like a nerd.” Whitmire’s comment generated awkward headlines and distractions from important policy matters for another week.

It is concerning that Whitmire has consistently found himself embroiled in controversies, yet appears unfazed by the backlash. In June, he sparked yet another contentious moment by stating to a news outlet that residents of Gulfton in Houston are predominantly undocumented immigrants seeking basic services and may not be welcomed in the Galleria. This comment prompted numerous local organizations to unite in signing and sending a letter demanding an apology for remarks they deemed highly offensive.

One significant concern with electing individuals of advanced age or nearing retirement to key political positions is that they often realize they have no long-term career to safeguard. This can ultimately result in a lack of decorum within the decision-making process, as these individuals prioritize their own agendas over the needs of those they are meant to serve.  In the long run, this shortsighted approach can have detrimental effects on the overall stability and prosperity of the constituency.

The approach taken by Mayor John Whitmire aligns well with the above analogy. At 75 years old, he has essentially reached the conclusion of his illustrious political career. Yet as his ongoing political dramas continue to captivate public attention, one cannot help but question his capacity to organize people. His behavior has become a major topic in the media, diverting attention from his official duties and raising concerns about his ability to work effectively with officials who would not agree with him. Ultimately, it is up to Whitmire to address these issues.

♦Publisher of the Guardian News, Professor Anthony Obi Ogbo, PhD, is on the Editorial Board of the West African Pilot News. He is the author of the Influence of Leadership (2015)  and the Maxims of Political Leadership (2019). Contact: anthony@guardiannews.us

Texas Guardian News
Continue Reading

Trending