By Lori Andrews, JD

Julian Assange Skyped into the TMC conference to discuss “The Use and Abuse of Whistleblowers” with Juan Gonzales, Democracy Now!; Gavin MacFadyen, Centre for Investigative Journalism; and Bea Edwards, Government Accountability Project.
They use burner phones as they cross borders. They buy old Lenovo computers because there are fewer backdoors into those computers that allow surveillance.
They are not spies or criminals. They are investigative reporters trying to get on-the-ground stories to help us understand and sometimes change our world.
Last week, The Media Consortium and IIT Chicago-Kent College of Law joined forces to describe the challenges that reporters face in an era when intelligence agencies such as the National Security Agency and corporations such as Google spy on what each of us is doing on our digital devices. At the joint workshop, Josh Stearns of Free Press and the Freedom of the Press Foundation reported on how many journalists had been killed and jailed in last year. And it’s not just a problem abroad. According to the World Press Freedom Index, the United States has slipped to number 46 in a ranking of countries on how much freedom it gives its reporters, well below even countries such as Ghana and Uruguay. amalia deloney of the Center for Media Justice described how surveillance in general disproportionately affects people of color. She showed a slide of a police tower that one might have guessed was situated in Guatemala or another oppressive nation. Instead, it was in a primarily African-American neighborhood in Charlotte, North Carolina.
What information is the NSA collecting about activists, reporters and you? The NSA gathers the phone numbers, locations, and length of virtually all phone calls in the United States. It collects records of nearly everything you do online, including your browsing history and the contents of your emails and instant messages. It can create detailed graphs of your network of personal connections. It can create phony wireless connections in order to access your computer directly. It can intercept the delivery of an electronic device and add an “implant” allowing the agency to access it remotely. Continue reading →