ABSTRACT
The rise of social media and data-capable mobile devices in recent years has transformed the face of global journalism, supplanting the broadcast news anchor with a new source for breaking news: the citizen reporter. Social media's decentralized networks and instant re-broadcasting mechanisms mean that the reach of a single tweet can easily trump that of the most powerful broadcast satellite. Brief, text-based and easy to translate, social messages allow news audiences to skip the middleman and get news "straight from the source."
Whether used by "citizen" or professional reporters, however, social media technologies can also pose risks that endanger these individuals and, by extension, the press as a whole. First, social media platforms are usually proprietary, leaving users' data and activities on the system open to scrutiny by collaborating companies and/or governments. Second, the networks upon which social media reporting relies are inherently fragile, consisting of easily targeted devices and relatively centralized message-routing systems that authorities may block or simply shut down. Finally, this same privileged access can be used to flood the network with inaccurate or discrediting messages, drowning the signal of real events in misleading noise.
A citizen journalist can be anyone who is simply in the right place at the right time. Typically untrained and unevenly tech-savvy, citizen reporters are unaccustomed to thinking of their social media activities as high-risk, and may not consider the need to defend themselves against potential threats. Though often part of a crowd, they may have no formal affiliations; if targeted for retaliation, they may have nowhere to turn for help. The dangers citizen journalists face are personal and physical. They may be targeted in the act of reporting, and/or online through the tracking of their digital communications. Addressing their needs for protection, resilience, and recognition requires a move away from the major assumptions of in vitro communication security. For citizen journalists using social networks, the adversary is already inside, as the network itself may be controlled or influenced by the threatening party, while "outside" nodes, such as public figures, protest organizers, and other journalists can be trusted to handle content appropriately. In these circumstances there can be no seamless, guaranteed solution. Yet the need remains for technologies that improve the security of these journalists who in many cases may constitute a region's only independent press.
In this paper, we argue that a comprehensive and collaborative effort is required to make publishing and interacting with news websites more secure. Journalists typically enjoy stronger legal protection at least in some countries, such as the United States. However, this protection may prove ineffective, as many online tools compromise source protection. In the remaining sections, we identify a set of discussion topics and challenges to encourage a broader research agenda aiming to address jointly the need for social features and security for citizens journalists and readers alike. We believe communication technologies should embrace the methods and possibilities of social news rather than treating this as a pure security problem. We briefly touch upon a related initiative, Dispatch, that focuses on providing security to citizen journalists for publisihing content.
- S. Aday, H. Farell, M. Lynch, J. Sides, and D. Freelon. Blogs and Bullet II: New Media and Conflict After the Arab Spring. Report to the United States Institute of Peace, 2012.Google Scholar
- S. Arianfar, T. Koponen, B. Raghavan, and S. Shenker. On preserving privacy in content-oriented networks. In Proceedings of the ACM SIGCOMM workshop on Information-centric networking, ICN '11, 2011. Google ScholarDigital Library
- A. Balasubramanian, B. N. Levine, and A. Venkataramani. DTN routing as a resource allocation problem. In SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, 2007. Google ScholarDigital Library
- N. Banerjee, M. Corner, D. Towsley, and B. N. Levine. Relays, base stations, and meshes: enhancing mobile networks with infrastructure. MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking, 2008. Google ScholarDigital Library
- A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott. Impact of Human Mobility on Opportunistic Forwarding Algorithms. IEEE Transactions on Mobile Computing, 2007. Google ScholarDigital Library
- A. Chaintreau, A. Mtibaa, L. Massoulié, and C. Diot. The diameter of opportunistic mobile networks. In CoNEXT '07: Proceedings of the 2007 ACM CoNEXT conference, 2007. Google ScholarDigital Library
- J. Douceur. The sybil attack. Peer-to-peer Systems, 2002. Google ScholarDigital Library
- W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-Flow Tracking System for Realtime PrivacyMonitoring on Smartphones. In Proceedings of OSDI, 2010. Google ScholarDigital Library
- K. Fall. A delay-tolerant network architecture for challenged internets. Proceedings of the 2003 conference on Applications, 2003. Google ScholarDigital Library
- D. Fifield, N. Hardison, J. Ellithorpe, E. Stark, R. Dingledine, P. Porras, and D. Boneh. Evading Censorship with Browser-Based Proxies. In Privacy Enhancing Technologies Symposium, pages 239--258, Vigo, Spain, 2012. Springer. Google ScholarDigital Library
- L. Gawhry. Assessing the Impact of Social Media on the 25 January 2011 Egyptian Revolution. 2012.Google Scholar
- A. Ghosh and P. McAfee. Incentivizing high-quality user-generated content. In WWW '11: Proceedings of the 20th international conference on World wide web, 2011. Google ScholarDigital Library
- D. Gunawardena, T. Karagiannis, A. Proutiere, E. Santos-Neto, and M. Vojnovic. Scoop: decentralized and opportunistic multicasting of information streams. In MobiCom '11: Proceedings of the 17th annual international conference on Mobile computing and networking, 2011. Google ScholarDigital Library
- S. Ioannidis, A. Chaintreau, and L. Massoulié. Optimal and Scalable Distribution of Content Updates over a Mobile Social Network. INFOCOM 2009, IEEE, 2009.Google ScholarCross Ref
- S. Isaacman, S. Ioannidis, A. Chaintreau, and M. Martonosi. Distributed rating prediction in user generated content streams. In RecSys '11: Proceedings of the fifth ACM conference on Recommender systems, 2011. Google ScholarDigital Library
- T. Lauinger, T. Strufe, T. Universitıt, N. Laoutaris, E. Biersack, P. Rodriguez, and E. Kirda. Privacy implications of ubiquitous caching in named data networking architectures.Google Scholar
- J. R. Mayer and J. C. Mitchell. Third-Party Web Tracking: Policy and Technology. Security and Privacy (SP), 2012 IEEE Symposium on, 2012. Google ScholarDigital Library
- B. Meeder, B. Karrer, A. Sayedi, R. Ravi, C. Borgs, and J. Chayes. We know who you followed last summer: inferring social link creation times in twitter. In WWW '11: Proceedings of the 20th international conference on World wide web, 2011. Google ScholarDigital Library
- A. Mislove, B. Viswanath, K. Gummadi, and P. Druschel. You are who you know: inferring user profiles in online social networks. Proceedings of the third ACM international conference on Web search and data mining, 2010. Google ScholarDigital Library
- A. Narayanan and V. Shmatikov. De-anonymizing Social Networks. Security and Privacy, 2009 30th IEEE Symposium on, 2009. Google ScholarDigital Library
- J. Pollock. Streetbook, MIT Technology Review, 2011.Google Scholar
- J. Pollock. People Power 2.0. MIT Technology Review, 2012.Google Scholar
- J. Reich and A. Chaintreau. The age of impatience: optimal replication schemes for opportunistic networks. In CoNEXT '09: Proceedings of the 5th international conference on Emerging networking experiments and technologies, 2009. Google ScholarDigital Library
- F. Roesner, T. Kohno, and D. Wetherall. Detecting and defending against third-party tracking on the web. In NSDI'12: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation, 2012. Google ScholarDigital Library
- A. Seth, D. Kroeker, M. Zaharia, S. Guo, and S. Keshav. Low-cost communication for rural internet kiosks using mechanical backhaul. In MobiCom '06: Proceedings of the 12th annual international conference on Mobile computing and networking, 2006. Google ScholarDigital Library
- M. Srivatsa and M. Hicks. Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel. CCS '12: Proceedings of the 19th ACM conference on Computer and communications security, 2012. Google ScholarDigital Library
- B. Viswanath, A. Post, K. Gummadi, and A. Mislove. An analysis of social network-based Sybil defenses. SIGCOMM '10: Proceedings of the ACM SIGCOMM 2010 conference on SIGCOMM, 2010. Google ScholarDigital Library
- J. C. York. Beyond Streetbook. MIT Technology Review, 2012.Google Scholar
- H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against sybil attacks. IEEE/ACM Transactions on Networking (ToN), 18:885--898, 2010. Google ScholarDigital Library
- H. Yu, M. Kaminsky, and P. Gibbons. SybilGuard: Defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking, 2008. Google ScholarDigital Library
Index Terms
- Weaving a safe web of news
Recommendations
Weaving Networks: An Educational Project for Digital Inclusion
Creative Industries and Urban DevelopmentIn this article, the authors describe the development of a digital training project aimed at groups at risk of social exclusion in the community of Cantabria, Spain. This project is in keeping with national and international policies—especially those ...
Comments